256
e. Select v1 from the Security Model list. (This configuration must be the same as that
running on the NMS; otherwise, the NMS cannot receive any trap.)
f. Click Apply.
Figure 272 Adding target hosts of SNMP traps
Configuring the NMS
The configuration on NMS must be consistent with that on the agent. Otherwise, you cannot perform
corresponding operations.
1. Configure the SNMP version for the NMS as v1 or v2c.
2. Create a read-only community and name it public.
3. Create a read and write community and name it private.
For more information about configuring the NMS, see the NMS manual.
Verifying the configuration
• After the configuration, an SNMP connection is established between the NMS and the agent.
The NMS can get and configure the values of some parameters on the agent through MIB
nodes.
• Shut down or bring up an idle interface on the agent, and the NMS receives the corresponding
trap.
SNMPv3 configuration example
Network requirements
As shown in Figure 273, the NMS (1.1.1.2/24) uses SNMPv3 to monitor and manage the interface
status of the agent (1.1.1.1/24), and the agent automatically sends traps to report events to the NMS.
The NMS and the agent perform authentication when they set up an SNMP session. The
authentication algorithm is MD5 and the authentication key is authkey. The NMS and the agent also
encrypt the SNMP packets between them by using the DES algorithm and the privacy key prikey.