set snmp trap-source 172.20.1.1
or
set snmp trap-source loopback
The configuration above establishes that standard traps are sent to the manager with address
10.1.10.25 on port 162 (default for SNMP traps) with the community publictrap.
In order to activate traps on attempts of unauthorized access, the following sequence of commands
can be used:
set snmp authtrap
set snmp on
In order to activate traps on ISDN calls, the following sequence of commands can be used:
set snmp trap-isdn
set snmp on
In order to configure control parameters on the generation and transmission of traps, the following
sequence of commands is used:
set snmp trap-poll-frequency <value>
set snmp trap-retries <value>
set snmp trap-timeout <value>
set snmp on
For example the sequence of commands:
set snmp trap-poll-frequency 30
set snmp trap-retries 5
set snmp trap-timeout 10
set snmp on
establishes that the status of the interfaces is checked every 30 seconds and establishes that when
the manager do not reply, 5 retries at intervals of 10 seconds are executed.
The default values are:
trap-poll-frequency 20
trap-retries 3
trap-timeout 5
In order to disable the community and the transmission of traps the following commands are used:
set snmp no-authtrap
set snmp no-community <value> access ro|rw
set snmp no-trapcommunity <value>
set snmp no-traphost <ipaddr>
set snmp no-trap-isdn
SNMP V3 CONFIGURATION
If properly configured, SNMP agent can reply to SNMPv3 requests. The SNMPv3 specifications are
about security and encryption aspects.