My understanding is snmpd is using tcpwrap lib. So, if we can use
hosts.allow/hosts.deny to control the access. What I have tried the following 4 steps:
1) If both hosts.allow and hosts.deny are not set (emtpy), it can access MIB
registered in snmpd and the subagents behind it.
2) If hosts.den
> As the title says, how the bulk-get and bulk-walk
> works?
Well, both of these commands are actually just wrappers
round the SNMP GETBULK protocol operation, so there's
no inherent difference between them. It's just that
the "bulkwalk" will repeat the request and/or truncate
the output to mat
Hello,
As the title says, how the bulk-get and bulk-walk
works?
More precisly, does the agent check all the access of
the requested oids , at one same time, or , is each
access on oid are checked one by one.
In fact I would like to know how the VACM is used in
case of bulk-request
Thanks,
Jeff
[ First - *please* don't mail me privately, without copying
any responses to the mailing list. I don't have the time
or inclination to offer private, unpaid, SNMP consultancy.
Keep discussions to the list, where others can both learn
and offer advice. T
> My community is "svpub" and I can use this community to run a normal
> mrtg system.
> However, when I tried to get CPU, RAM etc information for my mrtg, the
> system prompted below error.
> Received SNMP response with error code
> error status: noSuchName
> index 1 (OID: 1.3.6.1.4.1.2021.11
> How i can receive the traps that are generated by any agent
> 1) usding command line arguments
> 2) or by programmatically
Have a look at the application "snmptrapd".
That's the tool we provide for accepting and handling traps.
The source code (apps/snmptrapd.c) should also give some
guidelines