Command Line Tools¶
This page shows you what are the command line tools shipped.
How to Acquire The Command Line Tools¶
Note
The sample projects have been moved to a new location.
Please acquire the source code and then launch Visual Studio 2017 to open
SharpSnmpLib.Samples.sln
.
The sample projects are under the “Samples” folder and divided into two languages, C# and VB.NET. Compile them and then they can be executed.
Typical Commands¶
Below describes typical commands for C# SNMP command line tools. For more information on each tools, you may refer to the source code.
SNMPGET¶
For SNMP v1 and v2c, typical commands are
snmpget -c=public -v=1 localhost 1.3.6.1.2.1.1.1.0
snmpget -c=public -v=2 localhost 1.3.6.1.2.1.1.1.0
For SNMP v3, typical commands are
snmpget -v=3 -l=noAuthNoPriv -u=neither localhost 1.3.6.1.2.1.1.1.0
snmpget -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen localhost 1.3.6.1.2.1.1.1.0
snmpget -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy localhost 1.3.6.1.2.1.1.1.0
SNMPSET¶
For SNMP v1 and v2c, typical commands are
snmpset -c=public -v=1 localhost 1.3.6.1.2.1.1.6.0 s Shanghai
snmpset -c=public -v=2 localhost 1.3.6.1.2.1.1.6.0 s Shanghai
For SNMP v3, typical commands are
snmpset -v=3 -l=noAuthNoPriv -u=neither localhost 1.3.6.1.2.1.1.6.0 s Shanghai
snmpset -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen localhost 1.3.6.1.2.1.1.6.0 s Shanghai
snmpset -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy localhost 1.3.6.1.2.1.1.6.0 s Shanghai
SNMPBULKGET¶
For SNMP v2c, typical command is
snmpbulkget -v=2 -c=public -Cr=10 localhost 1.3.6.1.2.1.1.1.0
For SNMP v3, typical commands are
snmpbulkget -v=3 -l=noAuthNoPriv -u=neither -Cr=10 localhost 1.3.6.1.2.1.1.1.0
snmpbulkget -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen -Cr=10 localhost 1.3.6.1.2.1.1.1.0
snmpbulkget -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy -Cr=10 localhost 1.3.6.1.2.1.1.1.0
SNMPGETNEXT¶
For SNMP v1 and v2c, typical commands are
snmpgetnext -c=public -v=1 localhost 1.3.6.1.2.1.1.1.0
snmpgetnext -c=public -v=2 localhost 1.3.6.1.2.1.1.1.0
For SNMP v3, typical commands are
snmpgetnext -v=3 -l=noAuthNoPriv -u=neither localhost 1.3.6.1.2.1.1.1.0
snmpgetnext -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen localhost 1.3.6.1.2.1.1.1.0
snmpgetnext -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy localhost 1.3.6.1.2.1.1.1.0
SNMPWALK¶
For SNMP v1, typical command is
snmpwalk -c=public -v=1 -m=subtree localhost 1.3.6.1.2.1.1
For SNMP v2c, typical command is
snmpwalk -v=2 -c=public -Cr=10 -m=subtree localhost 1.3.6.1.2.1.1
For SNMP v3, typical commands are
snmpwalk -v=3 -l=noAuthNoPriv -u=neither -m=subtree -Cr=10 localhost 1.3.6.1.2.1.1
snmpwalk -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen -m=subtree -Cr=10 localhost 1.3.6.1.2.1.1
snmpwalk -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy -m=subtree -Cr=10 localhost 1.3.6.1.2.1.1
Built-in community names and users for snmpd¶
Credentials to communicate with snmpd have been revised to match PySNMP, so you can refer to this article <https://docs.lextudio.com/snmp/snmp-simulation-service> for details.
Checkout¶
The samples can be used to carry out basic SNMP operations. So if you are going to learn the basics, you should follow them.
Pairing the SNMP test agent and the manager side tools¶
Run snmpd.exe as administrator and click “Start listening” button without modifying any settings. This allows the test SNMP agent to hook to port 161 on all network interfaces (IP v4 and v6).
Information about the agent builtin community names and user accounts can be found above in Built-in community names and users for snmpd .
Then the command line utilities can be run at command prompt with Typical Commands . The agent will respond with correct packets.
Pairing the SNMP test agent and the trap listener tool¶
Run snmptrapd.exe at command prompt as administrator. It will hook to port 162 and monitor incoming trap messages.
Click the “Sent Trap v1”, “Send Trap v2”, “Send Inform v2” and “Send Inform v3” buttons on the test agent panel. See those messages are captured by the trap listener tool.
Above setup assumes that all tools are running on the same machine. If you want to test out agent and manager sides each on a dedicate machine, make sure you open the firewall ports and allow SNMP packets to go through.