How to enable/configure SNMP on sonicwall switches

Description

SNMP (Simple Network Management Protocol) is a network protocol used over User Datagram Protocol (UDP) that allows network administrators to monitor the status of the SonicWall switch and receive notification of critical events as they occur on the network/device. The SonicWall switch supports SNMP v1/v2c/v3 and all relevant Management Information Base II (MIB) groups.

Resolution

Steps to configure and test SNMP with SonicWall Switches


Note: SNMP is supported on switch firmware version 1.1.1.0 & above

1.SNMP is enabled by default on the switch with default Engine ID

It can be customized but has to be the same on Server & Agent

It's a combination of Vendor OUI & Device serial number

EX: 8000aca2032cb8ed554eaa

2. Add User & select the Privilege mode according.

User Privilege Modes: NoAuth | Auth | Priv

3. Add a Community list for the new user created

4. Create a Group list for the user created, select the security mode

5. Create an Access List  for the Group created


  • Username | Community List name doesn't accept special characters/spaces


  1. SNMP is enabled by default on the switch with default Engine ID


SONICWALL' System Dashboard Network Administration System Information User Management Backup/Restore Authentication Firmware Images DHCP snooping DHCP Relay Time SonicWall Switch 48-Port SNMP / Switch / System / SNMP Global Settings Users Community List Agent Enable Engine ID: Group List Access List View List Target Params Target Address Notify Settings GLOBAL SETTINGS 8000aca2032cb8ed664eaa Set to default value


2. Add User & select the Privilege mode according.

User Privilege Modes: NoAuth | Auth | Priv

Add SNMP Users User name Privilege Mode Authentication Protocol Authentication Password Encryption Protocol Encryption Key testuser Auth MDS password - 64 Cancel
Add SNMP Users User name Privilege Mode Authentication Protocol Authentication Password Encryption Protocol Encryption Key Select the Auth type accordingly testuser Auth No Auth Auth - 64 Cancel

3. Add a Community list for the new user created



Add community list Community Name Security name Transport Tag testcom testusar o - 20 Cancel


  4. Create a Group list for the user created, select the security mode


Add Group Group name Security mode Security name tastgroup v2c testuser Cancel



   5. Create an Access List  for the Group created

Add Access Group name Security mode Privilige mode Read view Write view view testgroup v2c restricted restricted restricted Cancel
6. Test connecting from SNMP Manager, It's able to connect to the Agent and get the data

Paessler SNMP Tester - Eile Help 1. set Local [P: Device [P Fort: SNMP Version: Community: Authentcaton: Passnord: Encryption: v: Encryption Key: Context: Timeou t: Advanced Se tbngs Force 32-bi Single Get 20.2.4 10.10.10.g SNMP v2c •Slow' Tweak r Signed Use GetNext Hide SNMP Datatype from Wak Read As: 2. Select Request T Read Device Uptime 32-bit Traffic Counter: 64-bit Traffic Counter: Scan Inter faces custom OLD: Walk: scan OIDLIE: Mul bge t Test: r Repeat ever Y Nevv Test Paessler SNMP Tester - 20.2.4 computername: SPRADHA-70G60J31nterface: 10.10.10.100 7/6/2022 PM (1 ms) Device: 10.10.10.9 7/6/2022 PM (2 ms) : SNMP v2c 7/6/2022 PM (3 ms) : Uptime 7/6/2022 PM (61 ms) : SNMP Datatype: ASN_TIMETICKS 7/6/2022 PM (62 ms) : 7/6/2022 PM (63 ms) : = 1626240 ( 4 hours 31 minutes) 7/6/2022 PM (70 ms) : SNMP Datatype: 7/6/2022 PM (75 ms) : = 7/6/2022 PM (76 ms) : Done Save Log to File Clear Log r Log Ran Packets (not for Scan Interfaces and Walk)


Paessler SNMP Tester - Eile Help 1. set Local [P: Device [P Fort: Commun ty: Authentcaton: Passnord: Encryption: v: Encryption Key: Context: Timeou t: Advanced Se tbngs Force 32-bi Single Get 20.2.4 10.10.10.g SNMP v2c •Slow' Tweak r Signed Use GetNext Hide SNMP Datatype from Wak Read As: 2. Select Request T Read Device Uptime 32-bit Traffic Counter: 64-bit Traffic Counter: Scan Inter faces custom OLD: Walk: scan OIDLIE: Scan Script: Mulbget Test: I¯öl r Repeat every Nevv Test Paessler SNMP Tester - 20.2.4 computername: SPRADHA-70G60J31nterface: 10.10.10.100 7/6/2022 PM (1 ms) : Device: 10.10.10.9 7/6/2022 PM (2 ms) : SNMP v2c 7/6/2022 10: 13:06 PM (3 ms) : Scaninterfaces Scanning Standard Interfaces. 7/6/2022 PM Port scan: start scan 7/6/2022 PM Host: 10.10.10.9 7/6/2022 PM community: testcom 7/6/2022 PM SNMP Version: V2 7/6/2022 PM Delay: O 7/6/2022 PM Force32: No 7/6/2022 PM Single Get: No 7/6/2022 PM GET[01DVaD: 1.3.6.1.2.1.1.3.0 7/6/2022 PM GET[01DVaD: Try 1 7/6/2022 10 PM DoRequest[O] Init Session 7/6/2022 PM DoRequest[ O) 7/6/2022 10 PM DoRequest[O] Session: Open 7/6/2022 10 PM DoRequest[O] Session: Send Request 7/6/2022 10 PM DoRequest[O] Session: Send Done 7/6/2022 10 PM DoRequest[ O] SynchResponse[16854S32] Start 7/6/2022 10 PM DoRequest[O] SynchResponse[16854S32] Done: Status=O 7/6/2022 PM •158115T [ASN_UNIVERSAL] [1.3.6.1.2.1.1.3.0] 7/6/2022 PM 1.316.1.2.1.1.310 7/6/2022 PM GET[01DVaD: 1.3.6.1.2.1.2.1.0 7/6/2022 PM GET[01DVaD: Try 1 7/6/2022 10 PM DoRequest[ O] Init Session 7/6/2022 PM DoRequest[o] Init; Host: 10.10.10.9:161, Timeout: 2000000, Version: 2 7/6/2022 10 PM DoRequest[O] Session: Open 7/6/2022 10 PM DoRequest[ Session: Send Request 7/6/2022 10 PM DoRequest[O] Session: Send Done 7/6/2022 PM synchResponse[16854832] start 7/6/2022 10 PM DoRequest[O] SynchResponse[16854832] Done: Status=O 7/6/2022 PM •61' [ASN_UNIVERSAL] [1.3.6.1.2.1.2.1.0] 7/6/2022 PM 1.316.1.2.1.2.1.0 7/6/2022 PM Test 64bit 7/6/2022 10 PM GET NEXT: 1.3.6.1.2.1.31.1.1.1.6 7/6/2022 PM GET 1.3.6.1.2.1.31.1.1.1.6 '6/2022 PM DoRequest[o] Init session 7/6/2022 PM DoRequest[o] Init; Host: 10.10.10.9:161, Timeout: 2000000, Version: 2 7/6/2022 PM session: open 7/6/2022 PM session: send Request 7/6/2022 PM DoRequest[o] session: send Done 7/6/2022 PM synchResponse[16854832] start '6/2022 PM DoRequest[o] synchResponse[16854832] Done: status=o 7/6/2022 PM •1253942' [ASN_UNIVERSAL] 1.3.6.1.2.1.31.1.1.1.6[1.3.6.1.2. 7/6/2022 PM 64bit available Save Log to File Clear Log r Log Ran Packets (not for Scan Interfaces and Walk)


Related Articles

  • Sonicwall Switch: Auto-Discovery through CLI
    Read More
  • Supported SonicWall and 3rd party SFP and SFP+ Modules that can be used with SonicWall Switches
    Read More
  • Configuring storm control on SonicWall Switch
    Read More
not finding your answers?