
xStinger®Administration Guide
Contents
Generating authentication keys .................................................................. 7-9
Generating privacy keys .............................................................................. 7-9
Example of SNMPv3 USM configuration .................................................. 7-10
Restricting the agent to SNMPv3 .............................................................. 7-10
SNMPv3 notifications................................................................................ 7-11
Configuring view-based access control ............................................................ 7-13
Enabling VACM......................................................................................... 7-14
Mapping a security name and security model to a security group............ 7-14
Specifying view names for different types of access.................................. 7-15
Defining views........................................................................................... 7-16
Managing SNMP interfaces .................................................................................... 7-17
Verifying SNMP state ....................................................................................... 7-18
Using the admin-state-perm-if profile..................................................... 7-18
Using the admin-state-phys-if profile..................................................... 7-19
Viewing SNMP interface numbers................................................................... 7-21
Initiating interface state changes ..................................................................... 7-21
Resetting the SNMP interface table sequentially ............................................. 7-22
Naming convention for SNMP-configured profiles ................................................ 7-22
Default naming convention ............................................................................. 7-22
Configurable naming convention .................................................................... 7-23
Selecting the naming convention for connection profiles............................... 7-23
Chapter 8 Watchdogs, Alarms, and Traps ........................................................8-1
Configuring SNMP watchdogs ................................................................................. 8-1
Settings in a watchdog-config profile ................................................................ 8-3
Enabling a watchdog to monitor fan failure...................................................... 8-3
Watchdog routines for input relays ................................................................... 8-4
Watchdog routines for a remote shelves ........................................................... 8-4
Defining alarms ........................................................................................................ 8-4
Overview of alarm profile settings ..................................................................... 8-5
Sample alarm profile configuration .................................................................. 8-7
Working with alarms ......................................................................................... 8-7
Listing alarms using the alarm command.................................................... 8-7
Using the alarm-stat profile ....................................................................... 8-8
Acknowledging alarms ................................................................................ 8-9
Clearing alarms ........................................................................................... 8-9
Turning off an alarm status light................................................................. 8-9
Closing a relay ............................................................................................. 8-9
Setting alarms for events on remote shelves ..................................................... 8-9
Monitoring environmental conditions ............................................................ 8-12
Configuring alarm settings for the alarm MIB................................................. 8-12
Setting the maximum number of alarms in alarmClearTable ..........8-13
Clearing alarms from alarmActiveTable and alarmClearedTable ...... 8-13
Deleting an alarm model table .................................................................. 8-13
Configuring SNMP traps......................................................................................... 8-13
Creating a trap profile ...................................................................................... 8-13
Configuring the trap profile ............................................................................ 8-14
Trap classes ...................................................................................................... 8-15
Alarm class traps ....................................................................................... 8-15
Security class traps .................................................................................... 8-18
Port class trap ............................................................................................ 8-19