Quantcast
Viewing latest article 1
Browse Latest Browse All 6

Nortel SNMP SNMPv3 and SSH

A small guide that i wrote to help to configure

Nortel (now Avaya) switches SSH and SNMP

Passport ( ERS 88600)

(5500 / 5510 / 4500 / 470 / 425..)

Small switches

(5500 / 5510 / 4500 / 470 / 425..)

SNMPv1 / 2

To configure the community strings for SNMPv1 / 2:

snmp-server community public ro
snmp-server community private rw

public = read only community
private = read/write community

To disable SNMPv1 / 2 only (SNMPv3 will continue to work):

No snmp-server community ro
No snmp-server community rw

SNMPv3

To use Privacy password, SSH image must be install at the switch,
A way to check if SSH image is installed is to check if the command SSH is available at the – “conf t” mode.

To delete the SNMPv3 root user:

no snmp-server user root

To configure SNMPv3 for a switch with SSH image:

no password security
snmp-server user root read-view snmpv1Objs write-view snmpv1Objs notify-view snmpv1Objs md5 password1 des password2

configure SNMPv3 for a switch without SSH image:

no password security
snmp-server user root read-view snmpv1Objs write-view snmpv1Objs notify-view snmpv1Objs md5 password1

no password security = enables the configuration of the passwords at the configuration line
(without that command the switch will ask for the passwords)
root = username
snmpv1Objs = snmp view name (the available view names can be checked with the command –
“show snmp-server view”
md5 = Authentication protocol (can be md5 or sha96)
password1 = Authentication password
des = Privacy protocol (can be des, aes or 3des), it better to use DES because is the only
protocol that ENMS know to use for communication with the switch)
password2 = Privacy password

SSH

To reset to default all the telnet/ssh users at the switch

 default username

SSH configuration

 no password security
 ssh pass-auth
 ssh
 username root password1 rw

no password security = enables the configuration of the passwords at the configuration line
(without that command the switch will ask for the passwords)
root = username
password1 = password

To disable telnet access to the switch:

telnet-access disable

Traps and syslog

To configure sending traps and log messages to a syslog server:

logging remote address x.x.x.x
logging remote enable
snmp-server host x.x.x.x "public"

x.x.x.x – server IP address
public – server community string

Passport (ERS 8600)

if you cant’t access the switch with SSH / SNMPv3 check the log, you will find there the reason.
The command is “show log file tail”

SNMPv1 / 2

To reset all snmp to the default seting:

conf snmp-server bootstrap min-secure

To configure SNMPv1 / 2:

config snmp-v3 mib-view create root 1
config snmp-v3 community create first public ro
config snmp-v3 community create second private rw
conf snmp-v3 group-member create ro snmpv1 ro_group
conf snmp-v3 group-member create ro snmpv2c ro_group
conf snmp-v3 group-member create rw snmpv2c rw_group
conf snmp-v3 group-member create rw snmpv1 rw_group
conf snmp-v3 group-access create ro_group "" snmpv1 no
conf snmp-v3 group-access create ro_group "" snmpv2c no
conf snmp-v3 group-access create rw_group "" snmpv2c no
conf snmp-v3 group-access create rw_group "" snmpv1 no
conf snmp-v3 group-access view rw_group "" snmpv1 no read root write root notify root
conf snmp-v3 group-access view rw_group "" snmpv2c no read root write root notify root
conf snmp-v3 group-access view ro_group "" snmpv2c no read root notify root
conf snmp-v3 group-access view ro_group "" snmpv1 no read root notify root

root = username
public = read only community
private = read/write community

To disable SNMPv1 / 2:

config snmp-v3 community delete first
 config snmp-v3 community delete second

SNMPv3

The configuration was tested on Version 4.1.6.3

To reset all snmp to the default seting:

conf snmp-server bootstrap min-secure

To configure SNMPv3:

copy x.x.x.x:/p80c4163.aes /flash/p80c4163.aes
config load-encryption-module DES
config snmp-v3 mib-view create root 1
config snmp-v3 usm create root md5 auth password1 priv-prot des priv password2
config snmp-v3 group-member create root usm tech_group
config snmp-v3 group-access create tech_group "" usm authPriv
config snmp-v3 group-access view tech_group "" usm authPriv read root write root notify root

x.x.x.x = ip address of tftp server
p80c4163.aes = encryption file
root = username
md5 = Authentication protocol (can be md5 or sha96)
password1 = Authentication password
des = Privacy protocol (can be des, aes or 3des),it better to use DES because is the only
protocol that ENMS know to use for communication with the passport)
password2 = Privacy password
tech_group = group-member name

To delete the SNMPv3 root user:

config snmp-v3 mib-view delete root 1
config snmp-v3 usm delete root
config snmp-v3 group-access delete tech_group "" usm authPriv

root = username
tech_group = group-member name

To allow SNMP at the access-policy:

use that lines only if there is an access policy and because of that you can’t connect to the switch with device manager

conf sys access-policy policy X service snmpv3 enable
conf sys access-policy policy X snmp-group-add ro_group snmpv1
conf sys access-policy policy X snmp-group-add rw_group snmpv1
conf sys access-policy policy X snmp-group-add ro_group snmpv2c
conf sys access-policy policy X snmp-group-add rw_group snmpv2c

X = access policy number

SSH

To configure SSH:

config bootconfig flags sshd true
save bootconfig
! now need to boot the system with the boot command !!!
copy x.x.x.x:/p80c4163.aes /flash/p80c4163.aes
config load-encryption-module 3DES
config sys set ssh enable false
config sys set ssh action rsa-keygen 1024
 y
config sys set ssh action dsa-keygen 1024
 y
config sys set ssh dsa-auth true
config sys set ssh max-sessions 4
config sys set ssh pass-auth true
config sys set ssh port 22
config sys set ssh rsa-auth true
config sys set ssh timeout 60
config sys set ssh version v2only
config sys set ssh enable true
config sys set ssh info

x.x.x.x = ip address of tftp server
p80c4163.aes = encryption file
y = if there is already a key stored at the switch, the switch will ask – “Are you sure? ( y / n )”

To disable telnet access:

config bootconfig flags telnetd false
save boot

Traps

To configure snmp traps:

It’s Snmp v1/2 traps Image may be NSFW.
Clik here to view.
:)

 config snmp-v3 target-addr create station1 x.x.x.x:162 TparamV2 taglist trapTag

x.x.x.x – server IP address

OID

OID of Nortel switches to monitor switches componnents

Replys are at ASCII
Ports- (x= port index- can be check with Device manager)
1.3.6.1.2.1.2.2.1.2.x – description
1.3.6.1.2.1.2.2.1.7.x – admin status (1= UP, 2= DOWN)
1.3.6.1.2.1.2.2.1.8.x – current status (1= UP, 2= DOWN)

FAN – slot 1
1.3.6.1.4.1.2272.1.4.7.1.1.1.1 – ID
1.3.6.1.4.1.2272.1.4.7.1.1.2.1 – State ( 2=up, 3 = down)
1.3.6.1.4.1.2272.1.4.7.1.1.3.1 – Temprature

FAN – slot 2
1.3.6.1.4.1.2272.1.4.7.1.1.1.2 – ID
1.3.6.1.4.1.2272.1.4.7.1.1.2.2 – State ( 2=up, 3 = down)
1.3.6.1.4.1.2272.1.4.7.1.1.3.2 – Temprature

Power suplly 1
1.3.6.1.4.1.2272.1.4.8.2.1.6.1 – Description
1.3.6.1.4.1.2272.1.4.8.1.1.2.1 – State ( 3=up, 4 = down)

Power suplly 2
1.3.6.1.4.1.2272.1.4.8.2.1.6.2 – Description
1.3.6.1.4.1.2272.1.4.8.1.1.2.2 – State ( 3=up, 4 = down)

Power suplly 3
1.3.6.1.4.1.2272.1.4.8.2.1.6.3 – Description
1.3.6.1.4.1.2272.1.4.8.1.1.2.3 – State ( 3=up, 4 = down)

CPU (and memory on CPU module)
1.3.6.1.4.1.2272.1.100.1.2.0 – Temperature
1.3.6.1.4.1.2272.1.1.20.0 – Primary CPU Percent
1.3.6.1.4.1.2272.1.1.44.0 – Secondary CPU Percent
1.3.6.1.4.1.2272.1.1.46.0 – Memory total
1.3.6.1.4.1.2272.1.1.47.0 – Memory used
1.3.6.1.4.1.2272.1.1.48.0 – Memory free
1.3.6.1.4.1.2272.1.1.21.0 – Primary Switch Fabric Percent
1.3.6.1.4.1.2272.1.1.45.0 – Secondary Switch Fabric Percent
1.3.6.1.4.1.2272.1.1.13.0 – Prinary Buffer Percent
1.3.6.1.4.1.2272.1.1.41.0 – Secondary Buffer Percent

By: Sharon Saadon

 

The post Image may be NSFW.
Clik here to view.
sharon saadon
Nortel SNMP SNMPv3 and SSH
appeared first on SharonTools.


Viewing latest article 1
Browse Latest Browse All 6

Trending Articles