> I have three questions: > > 1. What is the "[EMAIL PROTECTED] hack" and is it Cisco-specific?
Yes it is Cisco-specific. In your example, "com" is the snmp community string programmed into the switch. The "vlan hack" is suppose to represent the vlan number (or name) for which you want to pull certain mib variables. > 2. Despite what the comment says, the code still passes a community > string of [EMAIL PROTECTED] - er, help! ;-) > > 3. I suspect that Nortel/Bay do not support this "feature" - if anyone > knows more about this please share it! Cisco's hack allows one to get selected vlan-related information on a per-vlan basis, such as "which device mac addresses are associated with vlan 5" as one example. Cisco used this approach only on selected switches. The approach is very much non-standard, however if one studies the exact data retreival problem they attempted to address, there are no defined MIB standards that could have been used. The hack only applies to certain mib variables and is not needed for most mrtg uses, etc. Most other vendors made no attempt to address the snmp issue at all. -- Unsubscribe mailto:[EMAIL PROTECTED] Archive http://www.ee.ethz.ch/~slist/mrtg FAQ http://faq.mrtg.org Homepage http://www.mrtg.org WebAdmin http://www.ee.ethz.ch/~slist/lsg2.cgi
