D-Link 3250TG Product Manual - Page 22
Authentication, Traps - ip address
UPC - 790069250682
View all D-Link 3250TG manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 22 highlights
D-Link DES-3250TG Standalone Layer 2 Switch named System and the z represents the corresponding number of subnets in CIDR notation. Using this method, the switch can be assigned an IP address and subnet mask that can then be used to connect a management station to the switch's Web-based management agent. SNMP The Simple Network Management Protocol (SNMP) is an OSI layer 7 (the application layer) protocol for remotely monitoring and configuring network devices. SNMP enables network management stations to read and modify the settings of gateways, routers, switches, and other network devices. SNMP can be used to perform many of the same functions as a directly connected console, or can be used within an integrated network management software package such as DView or HP OpenView. SNMP performs the following functions: • Sending and receiving SNMP packets through the IP protocol. • Collecting information about the status and current configuration of network devices. • Modifying the configuration of network devices. The DES-3250TG has a software program called an 'agent' that processes SNMP requests, but the user program that makes the requests and collects the responses runs on a management station (a designated computer on the network). The SNMP agent and the user program both use the UDP/IP protocol to exchange packets. Authentication The authentication protocol ensures that both the router SNMP agent and the remote user SNMP application program discard packets from unauthorized users. Authentication is accomplished using 'community strings', which function like passwords. The remote user SNMP application and the router SNMP must use the same community string. Traps Traps are messages that alert network personnel of events that occur on the Switch. The events can be as serious as a reboot (someone accidentally turned OFF the Switch), or less serious like a port status change. The Switch generates traps and sends them to the trap recipient (or network manager). Trap recipients are special users of the network who are given certain rights and access in overseeing the maintenance of the network. Trap recipients will receive traps sent from the Switch; they must immediately take certain actions to avoid future failure or breakdown of the network. You can also specify which network managers may receive traps from the Switch by entering a list of the IP addresses of authorized network managers. Up to ten trap recipient IP addresses, and ten corresponding SNMP community strings can be entered. SNMP community strings function like passwords in that the community string entered for a given IP address must be used in the management station software, or a trap will be sent. The following are trap types the switch can send to a trap recipient: • Cold Start - This trap signifies that the Switch has been powered up and initialized such that software settings are reconfigured and hardware systems are rebooted. A cold start is different 14