on SRX: 1- add snmp community 2- add interface and protocol to sec zone 3- add security policy | SNMP root@RL104-SRX1500-1> show configuration | display set | match snmp set snmp community public authorization read-write set security zones security-zone untrust screen untrust-screen . . . set security zones security-zone untrust host-inbound-traffic system-services snmp set security zones security-zone untrust host-inbound-traffic system-services snmp-trap . . . set security zones security-zone untrust interfaces ge-0/0/0.0 |
test localy the snmpwalk | snmp walk show snmp mib walk system |
test from Bash windows ( ubuntu ) | snmpwalk root@jkriker-T460:~# snmpwalk -v2c -cpublic 192.168.0.103 1.3.6.1.2.1.1 iso.3.6.1.2.1.1.1.0 = STRING: "Juniper Networks, Inc. srx300 internet router, kernel JUNOS 19.3R2.9, Build date: 2019-11-23 05:19:29 UTC Copyright (c) 1996-2019 Juniper Networks, Inc." iso.3.6.1.2.1.1.2.0 = OID: iso.3.6.1.4.1.2636.1.1.1.2.133 iso.3.6.1.2.1.1.3.0 = Timeticks: (644693) 1:47:26.93 iso.3.6.1.2.1.1.4.0 = "" iso.3.6.1.2.1.1.5.0 = STRING: "serx300" iso.3.6.1.2.1.1.6.0 = "" iso.3.6.1.2.1.1.7.0 = INTEGER: 4 |
traceoptions on SRX | traceoption of snmp |
General
Content
Integrations