Hi Joni

Thank you very much for your easy solution. I have already tried it
out ... and on linux it works fine. The problem is, that my linux system does not have the same full access to firewalled networks like the spectroservers
have, but nevertheless its working fine for 90% of the secure stacks.

The grep construct btw. does only work with linux, the -A and -B options
do not exist on my solaris servers. But this is a minor problem.

In the meantime I've also received an answer from Enterasys secure
stack PM and they promised to work hard on the inclusion of the ps/fan mib
for their products.

Thank you again and best regards,

--Fritz.

On 03.11.2008, at 18:15, Joni Keller wrote:

Hi Fritz!

I wrote a shell (bash) script that uses ATG Tools (cliConfig) to log in
to our C2s.  Is that close enough for you?

The heart of it is:

cliConfig -l $LIST -telnetUser $USER -telnetPwd $PASSWD -c $CMDFILE |
grep -e ^1 -e "Fan2" -A 2 | grep -e "Operating" -B 6 | grep ^1

(Those grep ^1 passes catch all of the IP addresses we use.  You may
want to modify them to catch any line starting with a number!!! I just
took a quick-n-dirty shortcut for my environment.)  The CMDFILE is:

show sys
exit

So the first grep pipe picks up the IP address and the line about fans
ie "Fan2" and also includes 2 lines after the match. Next grep pipeline
looks for "Operating" and includes 6 lines before the match.  What's
left is IP addresses and bad fan messages, so I pull out just the IP
addresses. I recommend trying this a few times for yourself to see if I
have a glaring omission.  On the other hand, my script just caught two
switches on this week's run so it does something.

- Joni

---
To unsubscribe from enterasys, send email to [EMAIL PROTECTED] with the body: 
unsubscribe enterasys [EMAIL PROTECTED]

Reply via email to