Objective
This article explains how to get login and device identification information for the snmptrapd config file. Take the information gathered in this article and put it into the format as discussed in the: snmptrapd config file setup section.
Brother printer
The MFC-L2750DW SNMP setup looks like it accepts SHA/AES but it does not seem to work. MD5/DES works.
- Login into the Brother printer admin page.
- Go to: Network Tab > Protocol > SNMP Checked > SNMP Advanced Settings
- Use the following settings:
DO NOT USE Template is old. It is more problems than it is worth.
"Template SNMP Interfaces_3.0.0.xml" is a pre-req that must be imported BEFORE the "Template Brother Printers." Then assign the Brother template to the host.
Cisco Nexus
The following is a sample configuration:
Nutanix Prism Central
Prism Central will relay SNMP clients to the traps server for all clusters registered to it. So you only need to PC. If it is scale out, add all PC-VMs and PC-VIP.
For Prism Element, register ALL CVMs and the cluster VIP. The SNMP leader can move between any of the CVMs.
If you want to use the Nutanix template, add the macros to the host. Source: https://github.com/aldevar/Zabbix_Nutanix_Template.
Then add the Template to the PC/PE host:
Prism Element has an extra ncli command so that the CVMs can be walked. This is not enabled on Prism Central. For reference, the command for Prism Element is: snmp add-transport port=161 protocol=UDP.
The variables are as follows:
- userName: defined in the device AND snmp server
- shaPwd: defined in the device AND snmp server
- aesPwd: defined in the device AND snmp server
- snmpManagerIP: IP address of SNMP sever
If we put the variables together to create the command, it would look like:
- ncli
- snmp add-user username=userName priv-type=AES priv-key=aesPwd auth-type=sha auth-key=shaPwd
- snmp add-trap version=SNMPv3 username=userName address=snmpManagerIP port=162 inform=false protocol=UDP
For an actual example:
OPNsense
- Go to: Services > Zabbix Agent > Settings Main Settings.
- Click Add and enter the following settings.
- Click Save.
- Go to: Services > Zabbix Agent > Settings Main Settings.
- Click Add and enter the following settings.
- Click Save.
PfSense
Install the plugin.
- Go to: System > Package Manager > Available Packages.
- Search for "zabbix-agent5".
- Click the +Install button.
Configure the plugin
- Go to: Services > Zabbix Agent 5.0
- Use the following settings:
Manually add PfSense to Zabbix web interface just like any other device, except use the: "Template OS FreeBSD"
The firewall's interface came in with a 0.0.0.0 rather than it's actuall address. So update it to use the FQDN DNS name.
Supermicro Server
References:
- https://support.zabbix.com/browse/ZBXNEXT-2674
- https://www.zabbix.com/documentation/5.0/en/manual/discovery/low_level_discovery/host_interfaces
- https://www.zabbix.com/documentation/5.0/en/manual/discovery/low_level_discovery#discovery-rule-filter
There does not seem to be a way to automaticlly add a IPMI interface to a host through discovery. So this has to be done manually.
Reference the "Zabbix - Universal Macro Setup" to see how to add Global Macros. Enter the following Global Macros:
- Navigate to: Configuration > Hosts.
- Click on the desired IPMI device to modified.
- Go to: Host tab > Interfaces > Add IPMI device.
- Insert the IP address
- Insert the DNS name
- Select IP
- Go to: Templates tab
- Link new templates: Template Server Chassis by IPMI
- Click Select.
- Go to: IPMI tab
- Go to: Macros tab
- Click Inherited and host macros
- Click "Change" to add these items to the host:
- Click Update.
Ubiquiti
Ubiquiti uses the same password for the SHA and AES. This will allow you to monitor the devices attached to the controller. This will not allow you to monitor the controller itself. Monitor the controller just as you would for any other machine.
- Log into the UniFi controller.
- Go to: Settings > Services > SNMP Tab
- Use the following settings:
- SNMPv3 uses authProtocol SHA and privProtocol AES.
- Download the MIBs if you have not already done so.
VMware
vCenter
- SSH into the VCSA.
- To go to a BASH prompt
- If you log into the vCenter and you are greated with: Command > Type the following:
- To go to a Command > prompt.
- If you log into the vCenter and you are greated with: root@vc01 [ ~ ]# type the following, then logout.
- When you log back in, you will have a Command > prompt.
- To reset the SNMP config to defaults.
- Set the AUTH/PRIV protocols.
- Create the auth file for the hashing command below.
- Create the priv file for the hashing command below.
- Genorate the hashes.
- Command Format: snmp.hash --auth_hash filePath --priv_hash filePath
- Create the user.
- Command Format: snmp.set --user userid/authhash/privhash/security
- Set the SNMPv3 target.
- Command Format: snmp.set --v3targets hostname@port/userid/secLevel/trap
- Enable SNMP.
- To send a test message.
- Clean up after yourself.
- View the current configuration for SNMP:
ESXi Host
- SSH into the VCSA.
- To reset the SNMP config to defaults.
- VMware ESXi seems to use the same hash and engine id for each host. The engine id MUST be unique. The following are the current vmnic0 for each of the respective hosts.
- esx01.domain.local 0cc47a3ab028
- esx02.domain.local 0cc47a3ab02a
- esx03.domain.local 0cc47a3ab020
- Use the following command to set the engine id.
- Set authentication to SHA and privacy to AES128:
- Generating authentication and privacy hashes.
- Command Format: esxcli system snmp hash --auth-hash=SHAsecret --priv-hash=AESsecret --raw-secret
- Create a user. Replace authhash and privhash with the auth and priv hashes returned from the above command.
- Command Format: esxcli system snmp set --users userid/authhash/privhash/security
- Specify the SNMP target address.
- Command Format: esxcli system snmp set --v3targets trapsServer@port/user/priv/trap
- Enable SNMP.
- After the changes have been made, it is probably a good idea to restart SNMPD.
- View the current configuration for SNMP: