Title: Message

Hi! 

> when i say set the variable i.e., "snmpset -v2c -c public 192.168.157.41 ieee802dot11.1.1.1.2.1 i 1", it is not calling "*write_method = write_dot11MediumOccupancyLimit;" routine

> What are the access control settings in your snmpd.conf file? In particular, are you sure that you have given the "public" community write access? This isn't the default - most distributions will only allow "public" to read, not write (and may well restrict how much "public" can see, as well).

 > Dave

I have shown my snmpd.conf file below, pls let me known any mistake and where i need to put  write access to public.

trapcommunity public

trapsink 192.168.157.21

trap2sink 192.168.157.21

trapsink 192.168.157.43

trap2sink 192.168.157.43

trapsink 192.168.157.44

trap2sink 192.168.157.44

###############################################################################

#

# snmpd.conf:

# An example configuration file for configuring the ucd-snmp snmpd agent.

#

###############################################################################

#

# This file is intended to only be as a starting point. Many more

# configuration directives exist than are mentioned in this file. For

# full details, see the snmpd.conf(5) manual page.

#

# All lines beginning with a '#' are comments and are intended for you

# to read. All other lines are configuration commands for the agent.

###############################################################################

# Access Control

###############################################################################

# As shipped, the snmpd demon will only respond to queries on the

# system mib group until this file is replaced or modified for

# security purposes. Examples are shown below about how to increase the

# level of access.

# By far, the most common question I get about the agent is "why won't

# it work?", when really it should be "how do I configure the agent to

# allow me to access it?"

#

# By default, the agent responds to the "public" community for read

# only access, if run out of the box without any configuration file in

# place. The following examples show you other ways of configuring

# the agent so that you can change the community names, and give

# yourself write access to the mib tree as well.

#

# For more information, read the FAQ as well as the snmpd.conf(5)

# manual page.

####

# First, map the community name "public" into a "security name"

# sec.name source community

com2sec notConfigUser default public

com2sec ConfigUser default private

####

# Second, map the security name into a group name:

# groupName securityModel securityName

group notConfigGroup v1 notConfigUser

group notConfigGroup v2c notConfigUser

group ConfigGroup v1 ConfigUser

group ConfigGroup v2c ConfigUser

####

# Third, create a view for us to let the group have rights to:

# Make at least snmpwalk -v 1 localhost -c public system fast again.

# name incl/excl subtree mask(optional)

view systemview included .1.3.6.1.2.1

view systemview included .1.2.840.10036

view systemview included .1.3.6.1.4.1.6798.3

view systemview included .1.3.6.1.4.1.2021.13.14

####

# Finally, grant the group read-only access to the systemview view.

# group context sec.model sec.level prefix read write notif

access notConfigGroup "" any noauth exact systemview systemview none

access ConfigGroup "" any noauth exact systemview systemview none

# -----------------------------------------------------------------------------

# Here is a commented out example configuration that allows less

# restrictive access.

# YOU SHOULD CHANGE THE "COMMUNITY" TOKEN BELOW TO A NEW KEYWORD ONLY

# KNOWN AT YOUR SITE. YOU *MUST* CHANGE THE NETWORK TOKEN BELOW TO

# SOMETHING REFLECTING YOUR LOCAL NETWORK ADDRESS SPACE.

## sec.name source community

#com2sec local localhost COMMUNITY

#com2sec mynetwork NETWORK/24 COMMUNITY

## group.name sec.model sec.name

#group MyRWGroup any local

#group MyROGroup any mynetwork

#

#group MyRWGroup any otherv3user

#...

## incl/excl subtree mask

#view all included .1 80

## -or just the mib2 tree-

#view mib2 included .iso.org.dod.internet.mgmt.mib-2 fc

 

## context sec.model sec.level prefix read write notif

#access MyROGroup "" any noauth 0 all none none

#access MyRWGroup "" any noauth 0 all all all

 

###############################################################################

# Sample configuration to make net-snmpd RFC 1213.

# Unfortunately v1 and v2c don't allow any user based authentification, so

# opening up the default config is not an option from a security point.

#

# WARNING: If you uncomment the following lines you allow write access to your

# snmpd daemon from any source! To avoid this use different names for your

# community or split out the write access to a different community and

# restrict it to your local network.

# Also remember to comment the syslocation and syscontact parameters later as

# otherwise they are still read only (see FAQ for net-snmp).

#

# First, map the community name "public" into a "security name"

# sec.name source community

#com2sec notConfigUser default public

# Second, map the security name into a group name:

# groupName securityModel securityName

#group notConfigGroup v1 notConfigUser

#group notConfigGroup v2c notConfigUser

# Third, create a view for us to let the group have rights to:

# Open up the whole tree for ro, make the RFC 1213 required ones rw.

# name incl/excl subtree mask(optional)

#view roview included .1

#view rwview included system.sysContact

#view rwview included system.sysName

#view rwview included system.sysLocation

#view rwview included interfaces.ifTable.ifEntry.ifAdminStatus

#view rwview included at.atTable.atEntry.atPhysAddress

#view rwview included at.atTable.atEntry.atNetAddress

#view rwview included ip.ipForwarding

#view rwview included ip.ipDefaultTTL

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteDest

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteIfIndex

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric1

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric2

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric3

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric4

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteType

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteAge

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMask

#view rwview included ip.ipRouteTable.ipRouteEntry.ipRouteMetric5

#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaIfIndex

#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaPhysAddress

#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaNetAddress

#view rwview included ip.ipNetToMediaTable.ipNetToMediaEntry.ipNetToMediaType

#view rwview included tcp.tcpConnTable.tcpConnEntry.tcpConnState

#view rwview included egp.egpNeighTable.egpNeighEntry.egpNeighEventTrigger

#view rwview included snmp.snmpEnableAuthenTraps

# Finally, grant the group read-only access to the systemview view.

# group context sec.model sec.level prefix read write notif

#access notConfigGroup "" any noauth exact roview rwview none

 

#dlmod ieee802dot11_persistent /home/prakashms/amperion/siva/ieee80211_testing/ieee802dot11_persistent.so

dlmod ieee802dot11 /home/prakashms/amperion/siva/sivag/persistent/ieee802dot11.so

#dlmod snmpTargetAddressEntry /home/prakashms/amperion/siva/sivag/persistent_test/snmpTargetAddressEntryso

###############################################################################

# System contact information

#

# It is also possible to set the sysContact and sysLocation system

# variables through the snmpd.conf file:

syslocation Hyderabad (edit /etc/snmp/snmpd.conf)

syscontact Root <[EMAIL PROTECTED]> (configure /etc/snmp/snmp.local.conf)

# Example output of snmpwalk:

# % snmpwalk -v 1 localhost -c public system

# system.sysDescr.0 = "SunOS name sun4c"

# system.sysObjectID.0 = OID: enterprises.ucdavis.ucdSnmpAgent.sunos4

# system.sysUpTime.0 = Timeticks: (595637548) 68 days, 22:32:55

# system.sysContact.0 = "Me <[EMAIL PROTECTED]>"

# system.sysName.0 = "name"

# system.sysLocation.0 = "Right here, right now."

# system.sysServices.0 = 72

 

        With Regards,

G. Siva Prakash Reddy.

 

 


The information contained in, or attached to, this e-mail, contains confidential information and is intended solely for the use of the individual or entity to whom they are addressed and is subject to legal privilege. If you have received this e-mail in error you should notify the sender immediately by reply e-mail, delete the message from your system and notify your system manager. Please do not copy it for any purpose, or disclose its contents to any other person. The views or opinions presented in this e-mail are solely those of the author and do not necessarily represent those of the company. The recipient should check this e-mail and any attachments for the presence of viruses. The company accepts no liability for any damage caused, directly or indirectly, by any virus transmitted in this email.

www.aztecsoft.com
-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Net-snmp-coders mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders

Reply via email to