SNMP

Paragon Active Assurance supports both SNMPv2c and SNMPv3 trap messages for sending alarms or error conditions to external systems. How to set up such alarms is covered on this page.

The SNMP traps are sent from the host where Control Center is installed; no SNMP traps are sent directly from any Test Agent.

Version 2c

The SNMPv2 implementation in Paragon Active Assurance follows ► IETF RFC 1901.

  • IP address: The IP address of the SNMP manager (trap sink).

  • Port: The port of the SNMP manager (trap sink).

    Default: 162.

  • Community: The community string used for authentication.

Version 3

The SNMPv3 implementation in Paragon Active Assurance follows ► IETF RFC 3410.

  • IP address: The IP address of the SNMP manager (trap sink).

  • Port: The port of the SNMP manager (trap sink).

    Default: 162.

  • Community: The community string used for authentication.

  • Engine ID: The engine id to use. This should be the same in |paa-product| and in the manager.

  • User name: The user name to use for authentication.

  • Security: The security level to use for sent traps.

    The permitted security levels are: No encryption (noAuthNoPriv); Authentication only (authNoPriv); Authentication and privacy/encryption (authPriv).

  • Authentication password: Password to use for authentication protocol, minimum 8 characters.

  • Authentication protocol: Protocol to use for authentication.

    The permitted protocols are: MD5; SHA; SHA-224; SHA-256; SHA-384; SHA-512

  • Privacy password: Password to use for privacy protocol, minimum 8 characters.

  • Privacy protocol: Protocol to use for privacy.

    The permitted protocols are: DES; AES; AES-192; AES-256