cancel
Showing results for 
Search instead for 
Did you mean: 

SNMPv2 and SNMPv3 Traps configuration guide in ICX switches

Chandini
RUCKUS Team Member

Summary:

This Article explains about how to setup SNMPv2 and SNMPv3 Traps in ICX switches. SNMP traps are used to trace Issues related to switches using monitoring tools. This article will help with configuration and tracing SNMP traps using captures.

Question:

How to configure and troubleshooting SNMPv2 and SNMPv3 Traps in ICX switches

Customer Environment:

Monitoring tools would be used to capture SNMPv2 and SNMPv3 traps. These monitoring tool could be for example SolarWinds , PRTG etc.

SNMPv2 Configuration:

This configuration applies on all versions for a ICX switches.

Configuration:

snmp-server community public rw
snmp-server host 10.177.89.241 version v2c public

SNMPv2 trap troubleshooting: To troubleshoot and isolate if the polling and trap are working good use the Wireshark to run Packet capture in the uplink of the switch or on port which falls in path of traffic that helps lead the traffic to monitoring tool.

SNMPv2 request from SNMP tool:

Chandini_0-1716917529763.png

SNMPv2 response from Switch:

Chandini_1-1716917606827.png

SNMPv2 Trap Response from the switch:

Here port 1/1/23 is disabled and enabled to generate SNMPv2 trap:

Port disabled:

Chandini_2-1716917637081.png

Chandini_3-1716917657898.png

Port Enabled:

Chandini_4-1716917690916.png

SNMPv3 Configuration:

This configuration applies on all versions for a ICX switches.

Configuration:

snmp-server enable ethernet 1/1/7
snmp-server host 10.177.89.241 version v3 auth test
snmp-server group admin v3 auth notify all read all write all
snmp-server user test admin v3 auth md5 testmd5123 priv des testdes123

SNMPv3 trap troubleshooting: To troubleshoot and isolate if the polling and trap are working good use the Wireshark to run Packet capture in the uplink of the switch or on port which falls in path of traffic that helps lead the traffic to monitoring tool.

SNMPv3 request from SNMP tool:

Chandini_5-1716917752505.png

SNMPv3 response from Switch:

Chandini_6-1716917780185.png

SNMPv3 Trap Response from the switch:

Here port 1/1/11 is disabled and enabled to generate SNMPv2 trap:

Port disabled:

Chandini_7-1716917808978.png

Port Enabled:

Chandini_8-1716917838967.png

How to Decrypt SNMPv3 packets in Wireshark

SNMPv3 Configuration used:

snmp-server enable ethernet 1/1/7
snmp-server host 10.177.89.241 version v3 auth test
snmp-server group admin v3 auth notify all read all write all
snmp-server user test admin v3 auth md5 testmd5123 priv des testdes123

When the SNMP packets are not decrypted it would look like below

Chandini_9-1716917910438.png

Steps:

  • Go to Edit > Preferences > Protocols.

Chandini_10-1716917953011.png

  • In protocols go to “SNMP” -> Edit “User Table”

Chandini_11-1716917974945.png

  • Click on “+” and add SNMPv3 details like Username, Authentication and privacy method and password

Chandini_12-1716918001419.png

Once the details are added the decoded SNMPv3 traps would look like below picture in Wireshark

Chandini_13-1716918018822.png

0 REPLIES 0