Trap Versus Inform Messages ......................................................................................................... 12-3
Access to MIB Objects ........................................................................................................................... 12-3
Community Name Strings................................................................................................................. 12-3
User-Based....................................................................................................................................... 12-3
Versions Supported ................................................................................................................................ 12-4
Terms and Definitions ............................................................................................................................ 12-5
Security Models and Levels ................................................................................................................... 12-6
Access Control ....................................................................................................................................... 12-6
Configuring SNMP ........................................................................................................................................ 12-7
Configuration Basics .............................................................................................................................. 12-7
SNMP Defaults ....................................................................................................................................... 12-8
Configuring SNMPv1/SNMPv2c ............................................................................................................. 12-9
Creating a New Configuration .......................................................................................................... 12-9
Configuring SNMPv3 ............................................................................................................................ 12-10
Configuring an SNMP View ............................................................................................................12-14
Example.......................................................................................................................................... 12-17
Reviewing SNMP Settings .......................................................................................................................... 12-18
Neighbor Discovery Overview ...................................................................................................................... 13-1
Neighbor Discovery Operation ............................................................................................................... 13-1
LLDP-MED ............................................................................................................................................. 13-3
LLDPDU Frames .................................................................................................................................... 13-5
Configuring LLDP ......................................................................................................................................... 13-7
LLDP Configuration Commands ............................................................................................................ 13-7
Basic LLDP Configuration ...................................................................................................................... 13-9
LLDP Display Commands .................................................................................................................... 13-10
Cisco Discovery Protocol Configuration Commands ........................................................................... 13-12
Chapter 14: Configuring Syslog
System Logging Overview ............................................................................................................................ 14-1
Syslog Operation .......................................................................................................................................... 14-2
Basic Syslog Scenario ........................................................................................................................... 14-5
Interpreting Messages .................................................................................................................................. 14-6
Example ................................................................................................................................................. 14-6
x