OpenSuSE Man Pages

Man Page or Keyword Search:
Man Architecture
Apropos Keyword Search (all sections) Output format
home | help
x SuSE Linux 13.1-RELEASE x
x SuSE Linux 13.1-RELEASEx
SNMPD.CONF(5)                      Net-SNMP                      SNMPD.CONF(5)

NAME
       snmpd.conf - configuration file for the Net-SNMP SNMP agent

DESCRIPTION
       The  Net-SNMP agent uses one or more configuration files to control its
       operation and the management information provided.   These  files  (sn-
       mpd.conf  and  snmpd.local.conf) can be located in one of several loca-
       tions, as described in the snmp_config(5) manual page.

       The (perl) application snmpconf can be used to  generate  configuration
       files for the most common agent requirements.  See the snmpconf(1) man-
       ual page for more information, or try running the command:

              snmpconf -g basic_setup

       There are a large number of directives that can be specified, but these
       mostly fall into four distinct categories:

       o      those controlling who can access the agent

       o      those configuring the information that is supplied by the agent

       o      those controlling active monitoring of the local system

       o      those concerned with extending the functionality of the agent.

       Some directives don't fall naturally into any of these four categories,
       but this covers the majority of the contents of  a  typical  snmpd.conf
       file.   A full list of recognised directives can be obtained by running
       the command:

              snmpd -H

AGENT BEHAVIOUR
       Although most configuration directives are concerned with the  MIB  in-
       formation supplied by the agent, there are a handful of directives that
       control the behaviour of snmpd considered simply as a daemon  providing
       a network service.

       agentaddress [<transport-specifier>:]<transport-address>[,...]
              defines  a  list of listening addresses, on which to receive in-
              coming SNMP requests.  See the section  LISTENING  ADDRESSES  in
              the  snmpd(8)  manual page for more information about the format
              of listening addresses.

              The default behaviour is to listen on UDP port 161 on  all  IPv4
              interfaces.

       agentgroup {GROUP|#GID}
              changes  to  the  specified  group  after  opening the listening
              port(s).  This may refer to a group by name (GROUP),  or  a  nu-
              meric group ID starting with '#' (#GID).

       agentuser {USER|#UID}
              changes  to  the  specified  user  after  opening  the listening
              port(s).  This may refer to a user by name (USER), or a  numeric
              user ID starting with '#' (#UID).

       leave_pidfile yes
              instructs  the  agent  to  not  remove its pid file on shutdown.
              Equivalent to specifying "-U" on the command line.

       maxGetbulkRepeats NUM
              Sets the maximum number of responses allowed for a single  vari-
              able  in  a getbulk request.  Set to 0 to enable the default and
              set it to -1 to enable unlimited.  Because memory  is  allocated
              ahead  of time, setting this to unlimited is not considered safe
              if your user population can not be  trusted.   A  repeat  number
              greater than this will be truncated to this value.

              This is set by default to -1.

       maxGetbulkResponses NUM
              Sets  the  maximum number of responses allowed for a getbulk re-
              quest.  This is set by default to 100.  Set to 0 to  enable  the
              default and set it to -1 to enable unlimited.  Because memory is
              allocated ahead of time, setting this to unlimited is  not  con-
              sidered safe if your user population can not be trusted.

              In general, the total number of responses will not be allowed to
              exceed the maxGetbulkResponses number, and the total number  re-
              turned  will  be  an integer multiple of the number of variables
              requested times the calculated number of repeats  allow  to  fit
              below this number.

              Also note that processing of maxGetbulkRepeats is handled first.

       ifmib_max_num_ifaces NUM
              Sets  the  maximum  number of interfaces included in IF-MIB data
              collection.  For servers with a large number of interfaces (ppp,
              dummy,  bridge,  etc)  the  IF-MIB  processing will take a large
              chunk of CPU for ioctl calls (on Linux).  Setting  a  reasonable
              maximum  for  the  CPU  used will reduce the CPU load for IF-MIB
              processing.  For example, configuring "ifmib_max_num_ifaces 500"
              will  include only the first 500 interfaces based on ifindex and
              ignore all others for IF-MIB processing.

              The default (without this configured) is to include  all  inter-
              faces.

       include_ifmib_iface_prefix PREFIX1 PREFIX2 ...
              Sets  the  interface name prefixes to include in the IF-MIB data
              collection.  For servers with a large number of interfaces (ppp,
              dummy,  bridge,  etc)  the  IF-MIB  processing will take a large
              chunk of CPU for ioctl calls (on Linux). A set  of  space  sepa-
              rated  interface  name prefixes will reduce the CPU load for IF-
              MIB    processing.     For     example,     configuring     "in-
              clude_ifmib_iface_prefix  eth dummy lo" will include only inter-
              faces with these prefixes and ignore all others for IF-MIB  pro-
              cessing.  If  regex support is compiled in, each of the prefixes
              is a regular expression (which is not  permitted  to  contain  a
              space or tab character).

              The  default  (without this configured) is to include all inter-
              faces.

   SNMPv3 Configuration - Real Security
       SNMPv3 is added flexible security models to the SNMP  packet  structure
       so that multiple security solutions could be used.  SNMPv3 was original
       defined with a "User-based Security Model"  (USM)  [RFC3414]  that  re-
       quired  maintaining  a SNMP-specific user database.  This was later de-
       termined to be troublesome to maintain and had some minor security  is-
       sues.   The  IETF  has since added additional security models to tunnel
       SNMP over SSH [RFC5592] and DTLS/TLS  [RFC-to-be].   Net-SNMP  contains
       robust  support  for  SNMPv3/USM, SNMPv3/TLS, and SNMPv3/DTLS.  It con-
       tains partial support for SNMPv3/SSH as well but has not been as exten-
       sively  tested.   It also contains code for support for an experimental
       Kerberos based SNMPv3 that never got standardized.

       Hopefully more SNMP software and devices will eventually  support  SNMP
       over (D)TLS or SSH, but it is likely that devices with original support
       for SNMP will only contain support for USM users.  If your network man-
       ager  supports SNMP over (D)TLS or SNMP over SSH we suggest you use one
       of these mechanisms instead of using USM, but as always  with  Net-SNMP
       we give you the options to pick from so you can make the choice that is
       best for you.

   SNMPv3 generic parameters
       These parameters are generic to all the forms of  SNMPv3.   The  SNMPv3
       protocol  defines  "engineIDs"  that  uniquely  identify an agent.  The
       string must be consistent through time and should not  change  or  con-
       flict  with  another  agent's engineID.  Ever.  Internally, Net-SNMP by
       default creates a unique engineID that is based off of the current sys-
       tem time and a random number.  This should be sufficient for most users
       unless you're embedding our agent in a device where these numbers won't
       vary between boxes on the devices initial boot.

              EngineIDs are used both as a "context" for selecting information
              from the device and SNMPv3 with USM uses it to create unique en-
              tries for users in its user table.

              The  Net-SNMP  agent offers the following mechanisms for setting
              the engineID, but again you should only use  them  if  you  know
              what you're doing:

       engineID STRING
              specifies  that the engineID should be built from the given text
              STRING.

       engineIDType 1|2|3
              specifies that the engineID should be built from  the  IPv4  ad-
              dress  (1),  IPv6  address  (2)  or  MAC address (3).  Note that
              changing the IP address  (or  switching  the  network  interface
              card) may cause problems.

       engineIDNic INTERFACE
              defines which interface to use when determining the MAC address.
              If engineIDType 3 is not specified, then this directive  has  no
              effect.

              The default is to use eth0.

   SNMPv3 over TLS
       SNMPv3  may  be tunneled over TLS and DTLS.  TLS runs over TCP and DTLS
       is the UDP equivalent.  Wes Hardaker (the  founder  of  Net-SNMP)  per-
       formed a study and presented it at an IETF meeting that showed that TCP
       based protocols are sufficient for stable networks but quickly  becomes
       a problem in unstable networks with even moderate levels of packet loss
       (~ 20-30%).  If you are going to use TLS or DTLS, you  should  use  the
       one  appropriate  for  your  networking environment.  You should poten-
       tially turn them both on so your management system  can  access  either
       the UDP or the TCP port as needed.

       Many  of  the  configuration tokens described below are prefixed with a
       '[snmp]' tag.  If you place these tokens in your snmpd.conf file,  this
       take  is  required.  See the snmp_config(5) manual page for the meaning
       of this context switch.

       [snmp] localCert <specifier>
              This token defines the default X.509 public key to  use  as  the
              server's identity.  It should either be a fingerprint or a file-
              name.   To  create  a  public  key  for  use,  please  run   the
              "net-snmp-cert"  utility which will help you create the required
              certificate.

              The default value for this is the  certificate  in  the  "snmpd"
              named certificate file.

       [snmp] tlsAlgorithms <algorithms>
              This  string  will select the algorithms to use when negotiating
              security during (D)TLS session establishment.  See  the  openssl
              manual  page  ciphers(1)  for  details  on the format.  Examples
              strings include:

              DEFAULT
              ALL
              HIGH
              HIGH:!AES128-SHA

              The default value is  whatever  openssl  itself  was  configured
              with.

       [snmp] x509CRLFile
              If  you  are using a Certificate Authority (CA) that publishes a
              Certificate Revocation List (CRL) then this token can be used to
              specify  the  location  in  the  filesystem of a copy of the CRL
              file.  Note that Net-SNMP will not pull a CRL over http and this
              must  be  a  file,  not  a  URL.  Additionally, OpenSSL does not
              reload a CRL file when it has changed so  modifications  or  up-
              dates to the file will only be noticed upon a restart of the sn-
              mpd agent.

       certSecName PRIORITY FINGERPRINT OPTIONS
              OPTIONS can be one of <--sn SECNAME | --rfc822 | --dns | --ip  |
              --cn | --any>.

              The  certSecName  token  will  specify  how to map a certificate
              field from the client's X.509 certificate to a SNMPv3  username.
              Use the --sn SECNAME flag to directly specify a securityName for
              a given certificate.  The other flags extract a particular  com-
              ponent  of  the  certificate  for  use as a snmpv3 securityName.
              These fields are one of: A SubjectAltName containing  an  rfc822
              value  (eg hardaker@net-snmp.org), A SubjectAltName containing a
              dns  name  value  (eg  foo.net-snmp.org),  an  IP  address   (eg
              192.0.2.1)  or  a  common  name  "Wes Hardaker".  The --any flag
              specifies that any of the  subjecAltName  fields  may  be  used.
              Make sure once a securityName has been selected that it is given
              authorization via the VACM controls discussed later in this man-
              ual page.

              See  the  http://www.net-snmp.org/wiki/index.php/Using_DTLS  web
              page for more detailed instructions for setting up (D)TLS.

       trustCert <specifier>
              For X509 to properly verify a certificate, it should be  verifi-
              able up until a trust anchor for it.  This trust anchor is typi-
              cally a CA certificate but it could also be a  self-signed  cer-
              tificate.  The "trustCert" token should be used to load specific
              trust anchors into the verification engine.

       SNMP over (D)TLS requires the  use  of  the  Transport  Security  Model
       (TSM), so read the section on the usage of the Transport Security Model
       as well.  Make sure when you configure the VACM to  accept  connections
       from (D)TLS that you use the "tsm" security model.  E.G.:

       rwuser -s tsm hardaker@net-snmp.org

   SNMPv3 over SSH Support
       To  use SSH, you'll need to configure sshd to invoke the sshtosnmp pro-
       gram as well as configure the access control settings to  allow  access
       through the tsm security model using the user name provided to snmpd by
       the ssh transport.

   SNMPv3 with the Transport Security Model (TSM)
       The Transport Security Model [RFC5591] defines a SNMPv3 security system
       for  use with "tunneled" security protocols like TLS, DTLS and SSH.  It
       is a very simple security model that  simply  lets  properly  protected
       packets  to  pass  through into the snmp application.  The transport is
       required to pass a securityName to use to the TSM and the TSM  may  op-
       tionally prefix this with a transport string (see below).

       tsmUseTransportPrefix (1|yes|true|0|no|false)
              If  set  to  true,  the  TSM module will take every securityName
              passed to it from the transports underneath and prefix it with a
              string  that specifically identities the transport it came from.
              This is useful to avoid  securityName  clashes  with  transports
              that generate identical security names.  For example, if the ssh
              security transport delivered the security name of "hardaker" for
              a  SSH  connection and the TLS security transport also delivered
              the security name of "hardaker" for a  TLS  connection  then  it
              would  be  impossible to separate out these two users to provide
              separate access control rights.  With the  tsmUseTransportPrefix
              set to true, however, the securityNames would be prefixed appro-
              priately with one of: "tls:", "dtls:" or "ssh:".

   SNMPv3 with the User-based Security Model (USM)
       SNMPv3 was originally  defined  using  the  User-Based  Security  Model
       (USM),  which contains a private list of users and keys specific to the
       SNMPv3 protocol.  The operational community,  however,  declared  it  a
       pain  to manipulate yet another database and would prefer to use exist-
       ing infrastructure.  To that end the  IETF  created  the  ISMS  working
       group  to  battle  that  problem, and the ISMS working group decided to
       tunnel SNMP over SSH and DTLS to make use existing user and authentica-
       tion infrastructures.

   SNMPv3 USM Users
       To use the USM based SNMPv3-specific users, you'll need to create them.
       It is recommended you use the net-snmp-config command to do  this,  but
       you  can  also do it by directly specifying createUser directives your-
       self instead:

       createUser             [-e              ENGINEID]              username
       (MD5|SHA|SHA-512|SHA-384|SHA-256|SHA-224)    authpassphrase   [DES|AES]
       [privpassphrase]

              MD5|SHA|SHA-512|SHA-384|SHA-256|SHA-224 are  the  authentication
              types to use.  DES and AES are the privacy protocols to use.  If
              the privacy passphrase is not specified, it is assumed to be the
              same as the authentication passphrase.  Note that the users cre-
              ated will be useless unless they are also added to the VACM  ac-
              cess control tables described above.

              SHA|SHA-512|SHA-384|SHA-256|SHA-224  authentication  and DES/AES
              privacy require OpenSSL to be installed  and  the  agent  to  be
              built  with  OpenSSL  support.   MD5  authentication may be used
              without OpenSSL.

              Warning: the minimum pass phrase length is 8 characters.

              SNMPv3 users can be created at runtime using the snmpusm(1) com-
              mand.

              Instead  of  figuring out how to use this directive and where to
              put it  (see  below),  just  run  "net-snmp-config  --create-sn-
              mpv3-user"  instead,  which  will  add one of these lines to the
              right place.

              This directive should be placed into  the  /var/lib/net-snmp/sn-
              mpd.conf file instead of the other normal locations.  The reason
              is that the information is read from the file and then the  line
              is  removed  (eliminating the storage of the master password for
              that user) and replaced with the key that is  derived  from  it.
              This  key is a localized key, so that if it is stolen it can not
              be used to access other agents.  If the password is stolen, how-
              ever, it can be.

              If  you need to localize the user to a particular EngineID (this
              is useful mostly in the similar snmptrapd.conf  file),  you  can
              use  the  -e argument to specify an EngineID as a hex value (EG,
              "0x01020304").

              If you want to generate either your master or localized keys di-
              rectly, replace the given password with a hexstring (preceded by
              a "0x") and precede the hex string by a -m or -l token  (respec-
              tively).  EGs:

              [these keys are *not* secure but are easy to visually parse for
              counting purposes.  Please generate random keys instead of using
              these examples]

              createUser myuser SHA -l 0x0001020304050607080900010203040506070809 AES -l 0x00010203040506070809000102030405
              createUser myuser SHA -m 0x0001020304050607080900010203040506070809 AES -m 0x0001020304050607080900010203040506070809

              Due  to the way localization happens, localized privacy keys are
              expected to be the length needed by the algorithm (128 bits  for
              all supported algorithms).  Master encryption keys, though, need
              to be the length required by the  authentication  algorithm  not
              the  length required by the encrypting algorithm (MD5: 16 bytes,
              SHA: 20 bytes).

ACCESS CONTROL
       snmpd supports the View-Based Access Control Model (VACM) as defined in
       RFC  2575,  to control who can retrieve or update information.  To this
       end, it recognizes various directives relating to access control.

   Traditional Access Control
       Most simple access control requirements can be specified using the  di-
       rectives rouser/rwuser (for SNMPv3) or rocommunity/rwcommunity (for SN-
       MPv1 or SNMPv2c).

       rouser [-s SECMODEL] USER [noauth|auth|priv [OID | -V VIEW [CONTEXT]]]

       rwuser [-s SECMODEL]  USER [noauth|auth|priv [OID | -V VIEW [CONTEXT]]]
              specify an SNMPv3 user that will be allowed read-only  (GET  and
              GETNEXT)  or  read-write  (GET,  GETNEXT and SET) access respec-
              tively.  By default, this will provide access to  the  full  OID
              tree  for  authenticated  (including encrypted) SNMPv3 requests,
              using the default  context.   An  alternative  minimum  security
              level  can  be  specified using noauth (to allow unauthenticated
              requests), or priv (to enforce  use  of  encryption).   The  OID
              field  restricts  access  for that user to the subtree rooted at
              the given OID, or the named view.  An optional context can  also
              be  specified,  or "context*" to denote a context prefix.  If no
              context field is specified (or the token "*" is used),  the  di-
              rective will match all possible contexts.

              If  SECMODEL is specified then it will be the security model re-
              quired for that user (note that identical user names may come in
              over  different  security models and will be appropriately sepa-
              rated via the access control settings).   The  default  security
              model  is  "usm" and the other common security models are likely
              "tsm" when using (D)TLS or SSH support and "ksm" if the Kerberos
              support has been compiled in.

       rocommunity COMMUNITY [SOURCE [OID | -V VIEW [CONTEXT]]]

       rwcommunity COMMUNITY [SOURCE [OID | -V VIEW [CONTEXT]]]
              specify  an  SNMPv1  or  SNMPv2c  community that will be allowed
              read-only (GET and GETNEXT) or read-write (GET, GETNEXT and SET)
              access  respectively.   By  default, this will provide access to
              the full OID tree for such requests, regardless  of  where  they
              were  sent from. The SOURCE token can be used to restrict access
              to requests from the specified system(s) - see com2sec  for  the
              full details.  The OID field restricts access for that community
              to the subtree rooted at the given OID, or named view.  Contexts
              are  typically  less  relevant to community-based SNMP versions,
              but the same behaviour applies here.

       rocommunity6 COMMUNITY [SOURCE [OID | -V VIEW [CONTEXT]]]

       rwcommunity6 COMMUNITY [SOURCE [OID | -V VIEW [CONTEXT]]]
              are directives relating to requests received using IPv6 (if  the
              agent  supports  such transport domains).  The interpretation of
              the SOURCE, OID, VIEW and CONTEXT tokens are exactly the same as
              for the IPv4 versions.

       In each case, only one directive should be specified for a given SNMPv3
       user, or community string.  It  is  not  appropriate  to  specify  both
       rouser  and  rwuser  directives  referring  to the same SNMPv3 user (or
       equivalent community settings). The rwuser directive provides  all  the
       access  of  rouser  (as  well as allowing SET support).  The same holds
       true for the community-based directives.

       More complex access requirements (such as access to two  or  more  dis-
       tinct OID subtrees, or different views for GET and SET requests) should
       use one of the other access control mechanisms.  Note that  if  several
       distinct  communities or SNMPv3 users need to be granted the same level
       of access, it would also be more efficient to use the main VACM config-
       uration directives.

   VACM Configuration
       The  full flexibility of the VACM is available using four configuration
       directives - com2sec, group, view and  access.   These  provide  direct
       configuration of the underlying VACM tables.

       com2sec  [-Cn CONTEXT] SECNAME SOURCE COMMUNITY

       com2sec6 [-Cn CONTEXT] SECNAME SOURCE COMMUNITY
              map  an  SNMPv1 or SNMPv2c community string to a security name -
              either from a particular range of source addresses, or  globally
              ("default").  A restricted source can either be a specific host-
              name (or address), or a subnet - represented  as  IP/MASK  (e.g.
              10.10.10.0/255.255.255.0),  or  IP/BITS (e.g. 10.10.10.0/24), or
              the IPv6 equivalents.  A restriction preceded by an  exclamation
              mark  (!)  denies  access  from  that  address  or subnet, e.g.,
              !10.10.10.0/24 denies requests from that sources in that subnet.
              Deny  restrictions  must  be before permit.  E.g., the following
              example  permits  access  from  all  of  10.0.0.0/8  except  for
              10.10.10.0/24:
                     com2sec sec1 !10.10.10.0/24 public
                     com2sec sec1 10.0.0.0/8 public

              Access from outside of 10.0.0.0/8 would still be denied.

              It  is  also  possible to reference a specific netgroup starting
              with an through the NSS (Name Services Switch) making it  possi-
              ble to define the group locally or via NIS/LDAP.

              Note:  The  hostname  DNS lookup and netgroup resolution is done
              only during snmpd start or reload.

              The same community string can be specified in  several  separate
              directives  (presumably  with  different source tokens), and the
              first source/community combination that matches the incoming re-
              quest  will  be selected.  Various source/community combinations
              can also map to the same security name.

              If a CONTEXT is specified (using -Cn), the community string will
              be mapped to a security name in the named SNMPv3 context. Other-
              wise the default context ("") will be used.

       com2secunix [-Cn CONTEXT] SECNAME SOCKPATH COMMUNITY
              is the Unix domain sockets version of com2sec.

       group GROUP {v1|v2c|usm|tsm|ksm} SECNAME
              maps a security name (in the specified security  model)  into  a
              named  group.   Several  group  directives  can specify the same
              group name, allowing a single access setting to apply to several
              users and/or community strings.

              Note that groups must be set up for the two community-based mod-
              els separately - a single com2sec (or equivalent) directive will
              typically be accompanied by two group directives.

       view VNAME TYPE OID [MASK]
              defines  a named "view" - a subset of the overall OID tree. This
              is most commonly a single subtree, but several  view  directives
              can be given with the same view name (VNAME), to build up a more
              complex collection of OIDs.  TYPE  is  either  included  or  ex-
              cluded,  which  can again define a more complex view (e.g by ex-
              cluding certain sensitive objects from an  otherwise  accessible
              subtree).

              MASK  is  a  list  of hex octets (optionally separated by '.' or
              ':') with the set bits indicating which  subidentifiers  in  the
              view  OID  to match against.  If not specified, this defaults to
              matching the OID exactly (all bits set), thus defining a  simple
              OID subtree.  So:
                     view iso1 included .iso  0xf0
                     view iso2 included .iso
                     view iso3 included .iso.org.dod.mgmt  0xf0

              would  all  define  the  same  view,  covering  the whole of the
              'iso(1)' subtree (with the third example ignoring the subidenti-
              fiers not covered by the mask).

              More  usefully, the mask can be used to define a view covering a
              particular row (or rows) in a table, by matching against the ap-
              propriate  table index value, but skipping the column subidenti-
              fier:

                     view ifRow4 included .1.3.6.1.2.1.2.2.1.0.4  0xff:a0

              Note that a mask longer than 8 bits must use ':' to separate the
              individual octets.

       access  GROUP  CONTEXT  {any|v1|v2c|usm|tsm|ksm} LEVEL PREFX READ WRITE
       NOTIFY
              maps from a group of users/communities (with a particular  secu-
              rity  model  and  minimum security level, and in a specific con-
              text) to one of three views, depending on the request being pro-
              cessed.

              LEVEL is one of noauth, auth, or priv.  PREFX specifies how CON-
              TEXT should be matched against the context of the  incoming  re-
              quest, either exact or prefix.  READ, WRITE and NOTIFY specifies
              the view to be used for GET*, SET and TRAP/INFORM requests  (al-
              thought  the  NOTIFY view is not currently used).  For v1 or v2c
              access, LEVEL will need to be noauth.

   Typed-View Configuration
       The final group of directives extend the  VACM  approach  into  a  more
       flexible  mechanism,  which  can be applied to other access control re-
       quirements. Rather than the fixed three  views  of  the  standard  VACM
       mechanism,  this can be used to configure various different view types.
       As far as the main SNMP agent is concerned, the two main view types are
       read  and  write, corresponding to the READ and WRITE views of the main
       access directive.  See the 'snmptrapd.conf(5)' man page for  discussion
       of other view types.

       authcommunity TYPES  COMMUNITY   [SOURCE [OID | -V VIEW [CONTEXT]]]
              is  an  alternative  to  the rocommunity/rwcommunity directives.
              TYPES will usually be read or read,write respectively.  The view
              specification  can  either  be  an OID subtree (as before), or a
              named view (defined using the view directive) for greater flexi-
              bility.   If this is omitted, then access will be allowed to the
              full OID tree.  If CONTEXT is specified,  access  is  configured
              within  this SNMPv3 context.  Otherwise the default context ("")
              is used.

       authuser   TYPES [-s MODEL] USER  [LEVEL [OID | -V VIEW [CONTEXT]]]
              is an alternative to the rouser/rwuser directives.   The  fields
              TYPES,  OID, VIEW and CONTEXT have the same meaning as for auth-
              community.

       authgroup  TYPES [-s MODEL] GROUP [LEVEL [OID | -V VIEW [CONTEXT]]]
              is a companion to the authuser directive, specifying access  for
              a particular group (defined using the group directive as usual).
              Both authuser and authgroup default to authenticated requests  -
              LEVEL can also be specified as noauth or priv to allow unauthen-
              ticated requests, or require encryption respectively.  Both  au-
              thuser  and authgroup directives also default to configuring ac-
              cess for SNMPv3/USM requests - use the '-s' flag to  specify  an
              alternative  security model (using the same values as for access
              above).

       authaccess TYPES [-s MODEL] GROUP VIEW [LEVEL [CONTEXT]]
              also configures the access for a  particular  group,  specifying
              the  name  and type of view to apply. The MODEL and LEVEL fields
              are interpreted in the same way as for authgroup.  If CONTEXT is
              specified,  access  is configured within this SNMPv3 context (or
              contexts with this prefix if the CONTEXT field ends  with  '*').
              Otherwise the default context ("") is used.

       setaccess GROUP CONTEXT MODEL LEVEL PREFIX VIEW TYPES
              is  a  direct equivalent to the original access directive, typi-
              cally listing the view types as read or read,write as  appropri-
              ate.  (or see 'snmptrapd.conf(5)' for other possibilities).  All
              other fields have the same interpretation as with access.

SYSTEM INFORMATION
       Most of the information reported by the  Net-SNMP  agent  is  retrieved
       from  the underlying system, or dynamically configured via SNMP SET re-
       quests (and retained from one run of the agent to the next).   However,
       certain  MIB  objects  can  be  configured  or  controlled  via the sn-
       mpd.conf(5) file.

   System Group
       Most of the scalar objects in the 'system' group can be  configured  in
       this way:

       sysLocation STRING

       sysContact STRING

       sysName STRING
              set the system location, system contact or system name (sysLoca-
              tion.0, sysContact.0 and sysName.0) for the agent  respectively.
              Ordinarily  these  objects  are writable via suitably authorized
              SNMP SET requests.  However, specifying one of these  directives
              makes the corresponding object read-only, and attempts to SET it
              will result in a notWritable error response.

       sysServices NUMBER
              sets the value of the sysServices.0 object.  For a host  system,
              a  good  value is 72 (application + end-to-end layers).  If this
              directive is not specified, then no value will be  reported  for
              the sysServices.0 object.

       sysDescr STRING

       sysObjectID OID
              sets  the  system  description  or object ID for the agent.  Al-
              though these MIB objects are not SNMP-writable, these directives
              can  be  used  by  a network administrator to configure suitable
              values for them.

   Interfaces Group
       interface NAME TYPE SPEED
              can be used to provide appropriate type and speed  settings  for
              interfaces  where  the agent fails to determine this information
              correctly.  TYPE is a type value as given in the IANAifType-MIB,
              and  can  be specified numerically or by name (assuming this MIB
              is loaded).

       interface_fadeout TIMEOUT
              specifies, for how long the agent keeps entries in ifTable after
              appropriate  interfaces have been removed from system (typically
              various ppp, tap or tun interfaces). Timeout value  is  in  sec-
              onds. Default value is 300 (=5 minutes).

       interface_replace_old yes
              can  be  used to remove already existing entries in ifTable when
              an interface with the same name appears on the system. E.g. when
              ppp0  interface  is removed, it is still listed in the table for
              interface_fadeout seconds. This option  ensures,  that  the  old
              ppp0  interface  is  removed  even  before the interface_fadeout
              timeour when new ppp0 (with different ifIndex) shows up.

   Host Resources Group
       This requires that the agent was built with support for the host module
       (which  is  now  included as part of the default build configuration on
       the major supported platforms).

       ignoreDisk STRING
              controls which disk devices are scanned as  part  of  populating
              the  hrDiskStorageTable (and hrDeviceTable).  The HostRes imple-
              mentation code includes a list of disk device patterns appropri-
              ate  for  the  current operating system, some of which may cause
              the agent to block when trying to open  the  corresponding  disk
              devices.   This  might  lead to a timeout when walking these ta-
              bles, possibly resulting in inconsistent behaviour.  This direc-
              tive can be used to specify particular devices (either individu-
              ally or wildcarded) that should not be checked.

              Note:  Please consult the source (host/hr_disk.c) and check  for
                     the Add_HR_Disk_entry calls relevant for a particular O/S
                     to determine the list of devices that will be scanned.

              The pattern can include one or more wildcard  expressions.   See
              snmpd.examples(5) for illustration of the wildcard syntax.

       ignoremount [-r] STRING
              controls which mounts should be omitted from the hrStorageTable.
              If the Net-SNMP agent gets hung on accessing  a  filesystem,  or
              the filesystem is always mostly full (and thus leads to spurious
              alerts), you can omit it by listing the full path in this direc-
              tive.

              If  the  "-r" option is provided, the pattern can include one or
              more regular expressions.

       skipNFSInHostResources true
              controls whether NFS and NFS-like file systems should be omitted
              from the hrStorageTable (true or 1) or not (false or 0, which is
              the default).  If the Net-SNMP agent gets  hung  on  NFS-mounted
              filesystems, you can try setting this to '1'.

              Alternately,  more  granular control over which mounts should be
              omitted from the hrStorageTable can be achieved via the  ignore-
              mount directive.

       storageUseNFS [1|2]
              controls how NFS and NFS-like file systems should be reported in
              the hrStorageTable.  as 'Network Disks' (1) or 'Fixed Disks' (2)
              Historically,  the Net-SNMP agent has reported such file systems
              as 'Fixed Disks', and this is still the default behaviour.  Set-
              ting this directive to '1' reports such file systems as 'Network
              Disks', as required by the Host Resources MIB.

       realStorageUnits
              controlls  how  the  agent   reports   hrStorageAllocationUnits,
              hrStorageSize  and  hrStorageUsed  in  hrStorageTable.   For big
              storage drives with small allocation units the  agent  re-calcu-
              lates  these values so they all fit Integer32 and hrStorageAllo-
              cationUnits x hrStorageSize gives real size of the storage.

              Example:
                     Linux xfs 16TB filesystem with 4096  bytes  large  blocks
                     will  be reported as  hrStorageAllocationUnits = 8192 and
                     hrStorageSize = 2147483647, so 8192  x  2147483647  gives
                     real size of the filesystem (=16 TB).

              Setting this directive to '1' turns off this calculation and the
              agent reports real hrStorageAllocationUnits, but it might report
              wrong  hrStorageSize  for big drives because the value won't fit
              into Integer32. In this case, hrStorageAllocationUnits x hrStor-
              ageSize won't give real size of the storage.

   Process Monitoring
       The  hrSWRun group of the Host Resources MIB provides information about
       individual processes running on the local system.  The prTable  of  the
       UCD-SNMP-MIB  complements this by reporting on selected services (which
       may involve multiple processes).  This  requires  that  the  agent  was
       built  with  support for the ucd-snmp/proc module (which is included as
       part of the default build configuration).

       proc NAME [MAX [MIN]]
              monitors the number of processes called  NAME  (as  reported  by
              "/usr/bin/ps -e") running on the local system.

              If  the  number  of  NAMEd processes is less than MIN or greater
              than MAX, then the corresponding prErrorFlag  instance  will  be
              set  to  1,  and a suitable description message reported via the
              prErrMessage instance.

              Note:  This situation will not automatically trigger a  trap  to
                     report  the  problem  -  see the DisMan Event MIB section
                     later.

              If neither MAX nor MIN are specified, they will default  to  in-
              finity  and  1  respectively  ("at  least one").  If only MAX is
              specified, MIN will default to 0 ("no more than MAX").   If  MAX
              is 0 (and MIN is not), this indicates infinity ("at least MIN").
              If both MAX and MIN are 0, this indicates a process that  should
              not be running.

       procfix NAME PROG ARGS
              registers a command that can be run to fix errors with the given
              process NAME.  This will be invoked when the corresponding  prE-
              rrFix instance is set to 1.

              Note:  This command will not be invoked automatically.

              The  procfix directive must be specified after the matching proc
              directive, and cannot be used on its own.

       If no proc directives are defined, then walking the prTable  will  fail
       (noSuchObject).

   Disk Usage Monitoring
       This   requires   that  the  agent  was  built  with  support  for  the
       ucd-snmp/disk module (which is included as part of  the  default  build
       configuration).

       disk PATH [ MINSPACE | MINPERCENT% ]
              monitors  the  disk  mounted  at  PATH for available disk space.
              Disks mounted after the agent has started will not be monitored,
              unless includeAllDisks option is specified.

              The  minimum  threshold can either be specified in kB (MINSPACE)
              or as a percentage of the total disk  (MINPERCENT%  with  a  '%'
              character),  defaulting  to  100kB if neither are specified.  If
              the free disk space falls below this threshold, then the  corre-
              sponding  dskErrorFlag instance will be set to 1, and a suitable
              description message reported via the dskErrorMsg instance.

              Note:  This situation will not automatically trigger a  trap  to
                     report  the  problem  -  see the DisMan Event MIB section
                     later.

       includeAllDisks MINPERCENT%
              configures monitoring of all disks found on  the  system,  using
              the  specified  (percentage) threshold.  The dskTable is dynami-
              cally updated, unmounted disks  disappear  from  the  table  and
              newly  mounted  disks are added to the table.  The threshold for
              individual disks can be adjusted using suitable disk  directives
              (which  can  come either before or after the includeAllDisks di-
              rective).

              Note:  Whether disk  directives  appears  before  or  after  in-
                     cludeAllDisks may affect the indexing of the dskTable.

              Only  one  includeAllDisks  directive  should be specified - any
              subsequent copies will be ignored.

              The list of mounted  disks  will  be  determined  from  HOST-RE-
              SOURCES-MIB::hrFSTable.

       If  neither  any  disk  directives or includeAllDisks are defined, then
       walking the dskTable will fail (noSuchObject).

   Disk I/O Monitoring
       This  requires  that  the  agent  was  built  with  support   for   the
       ucd-snmp/diskio  module  (which  is not included as part of the default
       build configuration).

       By default, all block devices known to the  operating  system  are  in-
       cluded  in  the diskIOTable. On platforms other than Linux, this module
       has no configuration directives.

       On Linux systems, it is possible to exclude several  classes  of  block
       devices  from  the  diskIOTable  in order to avoid cluttering the table
       with useless zero statistics for pseudo-devices that often are  not  in
       use but are configured by default to exist in most recent Linux distri-
       butions.

       diskio_exclude_fd yes
              Excludes all Linux floppy disk block devices, whose names  start
              with "fd", e.g. "fd0"

       diskio_exclude_loop yes
              Excludes  all  Linux  loopback  block devices, whose names start
              with "loop", e.g. "loop0"

       diskio_exclude_ram yes
              Excludes all LInux ramdisk block devices, whose names start with
              "ram", e.g.  "ram0"

       On  Linux  systems,  it  is also possible to report only explicitly ac-
       cepted devices. It may take  significant  amount  of  time  to  process
       diskIOTable data on systems with tens of thousands of block devices and
       accept only the important ones avoids large CPU consumption.

       diskio <device>
              Enables acceptlist of devices and adds the  device  to  the  ac-
              ceptlist. Only explicitly acceptlisted devices will be reported.
              This option may be used multiple times.

   System Load Monitoring
       This requires that the agent was built  with  support  for  either  the
       ucd-snmp/loadave  module  or  the  ucd-snmp/memory  module respectively
       (both of which are included as part of  the  default  build  configura-
       tion).

       load MAX1 [MAX5 [MAX15]]
              monitors  the  load  average  of  the  local  system, specifying
              thresholds for the 1-minute, 5-minute  and  15-minute  averages.
              If  any of these loads exceed the associated maximum value, then
              the corresponding laErrorFlag instance will be set to 1,  and  a
              suitable  description  message reported via the laErrMessage in-
              stance.

              Note:  This situation will not automatically trigger a  trap  to
                     report  the  problem  -  see the DisMan Event MIB section
                     later.

              If the MAX15 threshold is omitted, it will default to  the  MAX5
              value.  If both MAX5 and MAX15 are omitted, they will default to
              the MAX1 value.  If this directive is not specified,  all  three
              thresholds will default to a value of DEFMAXLOADAVE.

              If  a  threshold  value of 0 is given, the agent will not report
              errors via the relevant laErrorFlag or  laErrMessage  instances,
              regardless of the current load.

       Unlike  the  proc  and disk directives, walking the walking the laTable
       will succeed (assuming the ucd-snmp/loadave module was configured  into
       the agent), even if the load directive is not present.

       swap MIN
              monitors the amount of swap space available on the local system.
              If this falls below the specified threshold (MIN kB),  then  the
              memErrorSwap object will be set to 1, and a suitable description
              message reported via memSwapErrorMsg.

              Note:  This situation will not automatically trigger a  trap  to
                     report  the  problem  -  see the DisMan Event MIB section
                     later.
       If this directive is not specified, the default threshold is 16 MB.

   Log File Monitoring
       This requires that the agent was built  with  support  for  either  the
       ucd-snmp/file  or ucd-snmp/logmatch modules respectively (both of which
       are included as part of the default build configuration).

       file FILE [MAXSIZE]
              monitors the size of the specified file (in kB).  If MAXSIZE  is
              specified, and the size of the file exceeds this threshold, then
              the corresponding fileErrorFlag instance will be set to 1, and a
              suitable  description  message reported via the fileErrorMsg in-
              stance.

              Note:  This situation will not automatically trigger a  trap  to
                     report  the  problem  -  see the DisMan Event MIB section
                     later.

              Note: A maximum of 20 files can be monitored.

              Note: If no  file  directives  are  defined,  then  walking  the
              fileTable will fail (noSuchObject).

       logmatch NAME FILE CYCLETIME REGEX
              monitors the specified file for occurances of the specified pat-
              tern REGEX. The file position is stored internally so the entire
              file  is  only  read  initially, every subsequent pass will only
              read the new lines added to the file since the last read.

              NAME   name of the logmatch instance (will appear  as  logMatch-
                     Name under logMatch/logMatchTable/logMatchEntry/logMatch-
                     Name in the ucd-snmp MIB tree)

              FILE   absolute path to the logfile to be monitored.  Note  that
                     this  path  can contain date/time directives (like in the
                     UNIX 'date' command). See the manual page for  'strftime'
                     for the various directives accepted.

              CYCLETIME
                     time interval for each logfile read and internal variable
                     update in seconds.  Note: an SNMPGET* operation will also
                     trigger an immediate logfile read and variable update.

              REGEX  the  regular  expression to be used. Note: DO NOT enclose
                     the regular expression in quotes even if there are spaces
                     in  the expression as the quotes will also become part of
                     the pattern to be matched!

              Example:

                     logmatch      apache-GETs      /usr/local/apache/logs/ac-
                     cess.log-%Y-%m-%d 60 GET.*HTTP.*

                     This  logmatch  instance  is  named  'apache-GETs',  uses
                     'GET.*HTTP.*' as its regular expression and it will moni-
                     tor  the  file  named  (assuming  today is May 6th 2009):
                     '/usr/local/apache/logs/access.log-2009-05-06',  tomorrow
                     it  will look for 'access.log-2009-05-07'. The logfile is
                     read every 60 seconds.

              Note: A maximum of 250 logmatch directives can be specified.

              Note: If no logmatch directives are defined,  then  walking  the
              logMatchTable will fail (noSuchObject).

ACTIVE MONITORING
       The  usual  behaviour of an SNMP agent is to wait for incoming SNMP re-
       quests and respond to them - if no requests are received, an agent will
       typically  not initiate any actions. This section describes various di-
       rectives that can configure snmpd to take a more active role.

   Notification Handling
       trapcommunity STRING
              defines the default community string to  be  used  when  sending
              traps.   Note that this directive must be used prior to any com-
              munity-based trap destination directives that need to use it.

       trapsink [-profile p] [-name n]  [-tag  t]  [-s  src]  HOST  [COMMUNITY
       [PORT]]

       trap2sink  [-profile  p]  [-name  n]  [-tag t] [-s src] HOST [COMMUNITY
       [PORT]]

       informsink [-profile p] [-name n] [-tag t]  [-s  src]  HOST  [COMMUNITY
       [PORT]]
              define  the  address  of  a notification receiver that should be
              sent SNMPv1 TRAPs, SNMPv2c TRAP2s, or  SNMPv2  INFORM  notifica-
              tions  respectively.  See the section LISTENING ADDRESSES in the
              snmpd(8) manual page for more information about  the  format  of
              listening  addresses.   If  COMMUNITY is not specified, the most
              recent trapcommunity string will be used.

              If the transport address does not include an explicit port spec-
              ification,  then  PORT  will be used.  If this is not specified,
              the well known SNMP trap port (162) will be used.

              Note:  This mechanism is being  deprecated,  and  the  listening
                     port  should be specified via the transport specification
                     HOST instead.

              The optional name and tag parameters specifies the name  or  tag
              that  will  be used for SNMP-NOTIFICATION-MIB table entries. The
              profile specifies which notification filter profile  entry  will
              be used for filtering outgoing notifications. (See notification-
              Filter)

              The optional src parameter specifies  the  source  address  that
              will  be  used when sending the trap packet to this sink.  It is
              specified as a <transport-address>, using the  same  <transport-
              specifier>  as  the destination HOST.  See the section LISTENING
              ADDRESSES in the snmpd(8) manual page for more information about
              the format.

              If  several  sink  directives  are specified, multiple copies of
              each notification (in the appropriate formats)  will  be  gener-
              ated.

              Note:  It is not normally appropriate to list two (or all three)
                     sink directives with the same destination.

       trapsess [-profile p] [-name n] [-tag t] [-s src] [SNMPCMD_ARGS] HOST
              provides a more generic mechanism for defining notification des-
              tinations.   SNMPCMD_ARGS should be the command-line options re-
              quired for an equivalent snmptrap  (or  snmpinform)  command  to
              send the desired notification.  The option -Ci can be used (with
              -v2c or -v3) to generate an INFORM notification rather  than  an
              unacknowledged TRAP.

              The  optional  name and tag parameters specifies the name or tag
              that will be used for SNMP-NOTIFICATION-MIB table  entries.  The
              profile  specifies  which notification filter profile entry will
              be used for filtering outgoing notifications. (See notification-
              Filter)

              This  is  the appropriate directive for defining SNMPv3 trap re-
              ceivers.   See  http://www.net-snmp.org/tutorial/tutorial-5/com-
              mands/snmptrap-v3.html for more information about SNMPv3 notifi-
              cation behaviour.

       notificationFilter NAME OID MASK TYPE
              specifies a SNMP-NOTIFICATION-MIB notification  filter  profile,
              which  may be used to filter traps. TYPE must be included or ex-
              cluded, Some examples:

                     notificationFilter all_ok .1.3 0x00 included
                     notificationFilter no_coldstart .1.3 0x00 included
                     notificationFilter no_coldstart .1.3.6.1.6.3.1.1.5.1 0x00 excluded

                     trapsink -profile no_coldstart 192.168.1.3:3162 secret3

       authtrapenable {1|2}
              determines whether to generate authentication failure traps (en-
              abled(1))  or  not  (disabled(2) - the default).  Ordinarily the
              corresponding  MIB  object  (snmpEnableAuthenTraps.0)  is  read-
              write,  but  specifying  this  directive makes this object read-
              only, and attempts to set the value via SET requests will result
              in a notWritable error response.

       v1trapaddress HOST
              defines  the agent address, which is inserted into SNMPv1 TRAPs.
              Arbitrary local IPv4 address is chosen if  this  option  is  om-
              mited.  This  option  is useful mainly when the agent is visible
              from outside world by specific address only  (e.g.   because  of
              network address translation or firewall).

   DisMan Event MIB
       The  previous directives can be used to configure where traps should be
       sent, but are not concerned with when to send such traps (or what traps
       should  be generated).  This is the domain of the Event MIB - developed
       by the Distributed Management (DisMan) working group of the IETF.

       This requires that the agent  was  built  with  support  for  the  dis-
       man/event  module  (which  is now included as part of the default build
       configuration for the most recent distribution).

              Note:  The behaviour of the  latest  implementation  differs  in
                     some  minor respects from the previous code - nothing too
                     significant, but existing scripts may possibly need  some
                     minor adjustments.

       iquerySecName NAME

       agentSecName NAME
              specifies  the  default  SNMPv3 username, to be used when making
              internal queries to retrieve any necessary  information  (either
              for evaluating the monitored expression, or building a notifica-
              tion payload).  These internal queries always use  SNMPv3,  even
              if normal querying of the agent is done using SNMPv1 or SNMPv2c.

              Note that this user must also be explicitly created (createUser)
              and given appropriate access rights (e.g. rouser).  This  direc-
              tive is purely concerned with defining which user should be used
              - not with actually setting this user up.

       monitor [OPTIONS] NAME EXPRESSION
              defines a MIB object to monitor.  If  the  EXPRESSION  condition
              holds  (see  below),  then  this  will trigger the corresponding
              event, and either send a notification or apply a SET  assignment
              (or  both).   Note  that  the event will only be triggered once,
              when the expression first matches.  This monitor entry will  not
              fire  again  until  the monitored condition first becomes false,
              and then matches again.  NAME is an administrative name for this
              expression,  and  is  used for indexing the mteTriggerTable (and
              related tables). Each monitor line must have a unique NAME. Mon-
              itor  lines  with a duplicate name are discarded and cause snmpd
              to log a duplicate index complaint.  Note also that  such  moni-
              tors use an internal SNMPv3 request to retrieve the values being
              monitored (even if normal agent queries typically use SNMPv1  or
              SNMPv2c).  See the iquerySecName token described above.

       EXPRESSION
              There  are  three  types  of monitor expression supported by the
              Event MIB - existence, boolean and threshold tests.

              OID | ! OID | != OID
                     defines an existence(0) monitor test.  A bare OID  speci-
                     fies a present(0) test, which will fire when (an instance
                     of) the monitored OID is created.  An expression  of  the
                     form  !  OID specifies an absent(1) test, which will fire
                     when the monitored OID is delected.  An expression of the
                     form  != OID specifies a changed(2) test, which will fire
                     whenever the monitored value(s) change.  Note that  there
                     must be whitespace before the OID token.

              OID OP VALUE
                     defines  a  boolean(1) monitor test.  OP should be one of
                     the defined comparison operators (!=, ==, <, <=,  >,  >=)
                     and  VALUE should be an integer value to compare against.
                     Note that there must be whitespace around the  OP  token.
                     A  comparison  such  as  OID !=0 will not be handled cor-
                     rectly.

              OID MIN MAX [DMIN DMAX]
                     defines a threshold(2) monitor test.  MIN and MAX are in-
                     teger  values, specifying lower and upper thresholds.  If
                     the value of the monitored  OID  falls  below  the  lower
                     threshold (MIN) or rises above the upper threshold (MAX),
                     then the monitor entry  will  trigger  the  corresponding
                     event.

                     Note  that  the  rising  threshold event will only be re-
                     armed when the monitored  value  falls  below  the  lower
                     threshold  (MIN).  Similarly, the falling threshold event
                     will be re-armed by the upper threshold (MAX).

                     The optional parameters DMIN and DMAX configure a pair of
                     similar  threshold tests, but working with the delta dif-
                     ferences between successive sample values.

       OPTIONS
              There are various options to control the behaviour of the  moni-
              tored expression.  These include:

              -D     indicates  that  the expression should be evaluated using
                     delta differences between sample values (rather than  the
                     values themselves).

              -d OID

              -di OID
                     specifies  a  discontinuity  marker  for validating delta
                     differences.  A -di object instance will be used  exactly
                     as  given.  A -d object will have the instance subidenti-
                     fiers from the corresponding (wildcarded) expression  ob-
                     ject  appended.   If the -I flag is specified, then there
                     is no difference between these two options.

                     This option also implies -D.

              -e EVENT
                     specifies the event to be invoked when this monitor entry
                     is  triggered.   If this option is not given, the monitor
                     entry will generate one of the standard notifications de-
                     fined in the DISMAN-EVENT-MIB.

              -I     indicates that the monitored expression should be applied
                     to the specified OID as a single instance.   By  default,
                     the  OID  will be treated as a wildcarded object, and the
                     monitor expanded to cover all matching instances.

              -i OID

              -o OID define additional varbinds to be added to  the  notifica-
                     tion  payload  when  this  monitor  trigger fires.  For a
                     wildcarded expression, the suffix of the matched instance
                     will  be added to any OIDs specified using -o, while OIDs
                     specified using -i will be treated  as  exact  instances.
                     If  the -I flag is specified, then there is no difference
                     between these two options.

                     See strictDisman for details of the ordering of notifica-
                     tion payloads.

              -r FREQUENCY
                     monitors the given expression every FREQUENCY, where FRE-
                     QUENCY is in seconds or optionally suffixed by one  of  s
                     (for  seconds),  m  (for  minutes), h (for hours), d (for
                     days), or w (for weeks).  By default, the expression will
                     be evaluated every 600s (10 minutes).

              -S     indicates that the monitor expression should not be eval-
                     uated when the agent first starts up.  The first  evalua-
                     tion  will be done once the first repeat interval has ex-
                     pired.

              -s     indicates that the monitor expression should be evaluated
                     when  the agent first starts up.  This is the default be-
                     haviour.

                     Note:  Notifications triggered by this initial evaluation
                            will be sent before the coldStart trap.

              -u SECNAME
                     specifies  a  security name to use for scanning the local
                     host, instead of the default iquerySecName.  Once  again,
                     this  user  must be explicitly created and given suitable
                     access rights.

       notificationEvent ENAME NOTIFICATION [-m] [-i OID | -o OID ]*
              defines a notification event named ENAME.  This can be triggered
              from  a  given  monitor  entry by specifying the option -e ENAME
              (see above).  NOTIFICATION should be the OID  of  the  NOTIFICA-
              TION-TYPE definition for the notification to be generated.

              If the -m option is given, the notification payload will include
              the standard varbinds as specified in the OBJECTS clause of  the
              notification  MIB  definition.   This option must come after the
              NOTIFICATION OID (and the relevant MIB file  must  be  available
              and  loaded  by  the  agent).  Otherwise, these varbinds must be
              listed explicitly (either here or in the  corresponding  monitor
              directive).

              The  -i OID and -o OID options specify additional varbinds to be
              appended to the notification payload, after the  standard  list.
              If  the monitor entry that triggered this event involved a wild-
              carded expression, the suffix of the matched  instance  will  be
              added to any OIDs specified using -o, while OIDs specified using
              -i will be treated as exact instances.  If the -I flag was spec-
              ified  to the monitor directive, then there is no difference be-
              tween these two options.

       setEvent ENAME [-I] OID = VALUE
              defines a set event named ENAME, assigning the  (integer)  VALUE
              to  the specified OID.  This can be triggered from a given moni-
              tor entry by specifying the option -e ENAME (see above).

              If the monitor entry that triggered this event involved a  wild-
              carded  expression, the suffix of the matched instance will nor-
              mally be added to the OID.  If the -I flag was specified to  ei-
              ther  of  the  monitor or setEvent directives, the specified OID
              will be regarded as an exact single instance.

       strictDisman yes
              The definition of SNMP notifications states  that  the  varbinds
              defined  in  the  OBJECT  clause should come first (in the order
              specified), followed by any "extra" varbinds that the  notifica-
              tion generator feels might be useful.  The most natural approach
              would be to associate these mandatory varbinds with the  notifi-
              cationEvent  entry,  and append any varbinds associated with the
              monitor entry that triggered the notification to the end of this
              list.   This  is the default behaviour of the Net-SNMP Event MIB
              implementation.

              Unfortunately, the  DisMan  Event  MIB  specifications  actually
              state  that the trigger-related varbinds should come first, fol-
              lowed by the event-related ones.  This directive can be used  to
              restore this strictly-correct (but inappropriate) behaviour.

              Note:  Strict  DisMan  ordering may result in generating invalid
                     notifications payload lists if the  notificationEvent  -n
                     flag is used together with monitor -o (or -i) varbind op-
                     tions.

              If no monitor entries specify payload varbinds, then the setting
              of this directive is irrelevant.

       linkUpDownNotifications yes
              will  configure  the Event MIB tables to monitor the ifTable for
              network interfaces being taken up  or  down,  and  triggering  a
              linkUp or linkDown notification as appropriate.

              This is exactly equivalent to the configuration:

                     notificationEvent  linkUpTrap    linkUp   ifIndex ifAdminStatus ifOperStatus
                     notificationEvent  linkDownTrap  linkDown ifIndex ifAdminStatus ifOperStatus

                     monitor  -r 60 -e linkUpTrap   "Generate linkUp" ifOperStatus != 2
                     monitor  -r 60 -e linkDownTrap "Generate linkDown" ifOperStatus == 2

       defaultMonitors yes
              will  configure  the  Event  MIB  tables  to monitor the various
              UCD-SNMP-MIB tables for problems (as indicated by the  appropri-
              ate xxErrFlag column objects).

              This is exactly equivalent to the configuration:

                     monitor   -o prNames -o prErrMessage "process table" prErrorFlag != 0
                     monitor   -o memErrorName -o memSwapErrorMsg "memory" memSwapError != 0
                     monitor   -o extNames -o extOutput "extTable" extResult != 0
                     monitor   -o dskPath -o dskErrorMsg "dskTable" dskErrorFlag != 0
                     monitor   -o laNames -o laErrMessage  "laTable" laErrorFlag != 0
                     monitor   -o fileName -o fileErrorMsg  "fileTable" fileErrorFlag != 0

       In  both these latter cases, the snmpd.conf must also contain a iquery-
       SecName directive, together with a corresponding createUser  entry  and
       suitable access control configuration.

   DisMan Schedule MIB
       The  DisMan working group also produced a mechanism for scheduling par-
       ticular actions (a specified SET assignment) at given times.  This  re-
       quires  that  the  agent was built with support for the disman/schedule
       module (which is included as part of the  default  build  configuration
       for the most recent distribution).

       There are three ways of specifying the scheduled action:

       repeat FREQUENCY OID = VALUE
              configures  a  SET  assignment of the (integer) VALUE to the MIB
              instance OID, to be run every FREQUENCY seconds, where FREQUENCY
              is  in seconds or optionally suffixed by one of s (for seconds),
              m (for minutes), h (for hours), d (for days), or w (for weeks).

       cron MINUTE HOUR DAY MONTH WEEKDAY  OID = VALUE
              configures a SET assignment of the (integer) VALUE  to  the  MIB
              instance  OID,  to  be  run at the times specified by the fields
              MINUTE to WEEKDAY.  These follow the same pattern as the equiva-
              lent crontab(5) fields.

              Note:  These  fields  should be specified as a (comma-separated)
                     list of numeric values.  Named values for the  MONTH  and
                     WEEKDAY  fields  are not supported, and neither are value
                     ranges. A wildcard match can be specified as '*'.

              The DAY field can also accept negative values, to indicate  days
              counting backwards from the end of the month.

       at MINUTE HOUR DAY MONTH WEEKDAY  OID = VALUE
              configures  a  one-shot  SET  assignment, to be run at the first
              matching time as specified by the fields MINUTE to WEEKDAY.  The
              interpretation  of  these  fields is exactly the same as for the
              cron directive.

   Data Delivery via Notfiications
       Note: this functionality is only available if the  deliver/deliverByNo-
       tify mib module was complied in to the agent

       In  some  situations  it  may be advantageous to deliver SNMP data over
       SNMP Notifications (TRAPs and INFORMs) rather than the typical  process
       of  having  the  manager issue requests for the data (via GETs and GET-
       NEXTs).  Reasons for doing this are  numerous,  but  frequently  corner
       cases.   The  most common reason for wanting this behaviour might be to
       monitor devices that reside behind NATs or Firewalls that  prevent  in-
       coming SNMP traffic.

       It should be noted that although most management software is capable of
       logging notifications, very little (if any)  management  software  will
       updated  their "knowledge database" based on the contents of SNMP noti-
       fications.  IE, it won't (for example)  update  the  interface  traffic
       counter  history  that  is used to produce graphs.  Most larger network
       management packages have a separate database for storing data  received
       via  SNMP requests (GETs and GETNEXTs) vs those received from notifica-
       tions.  Researching the capabilities of your management  station  soft-
       ware  is  required  before  assuming this functionality will solve your
       data delivery requirements.

       Notifications generated via this mechanism will be sent to the standard
       set  of  configured  notification  targets.  See the "Notification Han-
       dling" section of this document for further information.

       deliverByNotify [-p] [-m] [-s MAXSIZE] FREQUENCY OID
              This directive tells the SNMP agent to self-walk the  OID,  col-
              lect all the data and send it out every FREQUENCY seconds, where
              FREQUENCY is in seconds or optionally suffixed by one of s  (for
              seconds),  m  (for  minutes),  h (for hours), d (for days), or w
              (for weeks).  By default scalars are included in  the  notifica-
              tion  that  specify  the how often the notification will be sent
              (unless the -p option is specified) and which message number  of
              how  many  messages  a  particular notification is (unless -m is
              specified).  To break the notifications into  manageable  packet
              sizes, use the -s flag to specify the approximate maximum number
              of bytes that a notification message should be limited  to.   If
              more than MAXSIZE of bytes is needed then multiple notifications
              will be sent to deliver the data.  Note  that  the  calculations
              for ensuring the maximum size is met are approximations and thus
              it can be absolutely guaranteed they'll be under that  size,  so
              leave a padding buffer if it is critical that you avoid fragmen-
              tation.  A value of -1 indicates force everything into a  single
              message no matter how big it is.

              Example  usage:  the  following will deliver the contents of the
              ifTable once an hour and the contents of the system  group  once
              every 2 hours:

              deliverByNotify 3600 ifTable
              deliverByNotify 7200 system

       deliverByNotifyMaxPacketSize SIZEINBYTES
              Sets  the  default  notification  size  limit  (see  the -s flag
              above).

       deliverByNotifyOid OID

       deliverByNotifyFrequencyOid OID

       deliverByNotifyMessageNumberOid OID

       deliverByNotifyMaxMessageNumberOid OID
              These set the data OID that the notification will be sent under,
              the  scalar OID, the message number OID, and the maximum message
              number OID.  These default  to  objects  in  the  NET-SNMP-PERI-
              ODIC-NOTIFY-MIB.

EXTENDING AGENT FUNCTIONALITY
       One  of the first distinguishing features of the original UCD suite was
       the ability to extend the functionality of the agent - not just by  re-
       compiling  with  code  for new MIB modules, but also by configuring the
       running agent to report additional information. There are a  number  of
       techniques to support this, including:

       o      running external commands (exec, extend, pass)

       o      loading new code dynamically (embedded perl, dlmod)

       o      communicating with other agents (proxy, SMUX, AgentX)

   Arbitrary Extension Commands
       The  earliest extension mechanism was the ability to run arbitrary com-
       mands or shell scripts. Such commands do not need to be aware  of  SNMP
       operations, or conform to any particular behaviour - the MIB structures
       are designed to accommodate any form of command output.   Use  of  this
       mechanism  requires  that  the  agent  was  built  with support for the
       ucd-snmp/extensible and/or agent/extend modules  (which  are  both  in-
       cluded as part of the default build configuration).

       exec [MIBOID] NAME PROG ARGS

       sh [MIBOID] NAME PROG ARGS
              invoke  the  named  PROG with arguments of ARGS.  By default the
              exit status and first line of output from the  command  will  be
              reported via the extTable, discarding any additional output.

              Note:  Entries  in  this table appear in the order they are read
                     from the configuration file.  This means that adding  new
                     exec (or sh) directives and restarting the agent, may af-
                     fect the indexing of other entries.

              The PROG argument for exec directives must be a full path  to  a
              real  binary,  as it is executed via the exec() system call.  To
              invoke a shell script, use the sh directive instead.

              If MIBOID is specified, then the results will be rooted at  this
              point  in  the  OID  tree,  returning  the exit statement as MI-
              BOID.100.0 and the entire command output in a pseudo-table based
              at MIBNUM.101 - with one 'row' for each line of output.

              Note:  The  layout  of  this  "relocatable" form of exec (or sh)
                     output does not strictly  form  a  valid  MIB  structure.
                     This  mechanism  is being deprecated - please see the ex-
                     tend directive (described below) instead.

              The agent does not cache the exit status or output of  the  exe-
              cuted program.

       execfix NAME PROG ARGS
              registers a command that can be invoked on demand - typically to
              respond to or fix errors with the corresponding exec or  sh  en-
              try.  When the extErrFix instance for a given NAMEd entry is set
              to the integer value of 1, this command will be called.

              Note:  This directive can only be used  in  combination  with  a
                     corresponding exec or sh directive, which must be defined
                     first.  Attempting to define an unaccompanied execfix di-
                     rective will fail.

       exec  and sh extensions can only be configured via the snmpd.conf file.
       They cannot be set up via SNMP SET requests.

       extend [-cacheTime TIME] [-execType TYPE] [MIBOID] NAME PROG ARGS
              works in a similar manner to the exec directive, but with a num-
              ber  of  improvements.  The MIB tables (nsExtendConfigTable etc)
              are indexed by the NAME token, so are unaffected by the order in
              which  entries are read from the configuration files.  There are
              two result tables - one  (nsExtendOutput1Table)  containing  the
              exit status, the first line and full output (as a single string)
              for each extend entry, and the other (nsExtendOutput2Table) con-
              taining the complete output as a series of separate lines.

              If  -cacheTime  is  specified,  then its argument is used as the
              cache timeout (in whole seconds) for  this  extend  entry.  This
              mechanism provides a non-volatile way to specify the cache time-
              out.

              If -execType is specified and has a value of sh, then  this  ex-
              tend  entry  will be run in a shell. Otherwise it will be run in
              the default exec fashion. This mechanism provides a non-volatile
              way to specify the exec type.

              If MIBOID is specified, then the configuration and result tables
              will be rooted at this point in the OID tree, but are  otherwise
              structured in exactly the same way. This means that several sep-
              arate extend directives can specify the same MIBOID root,  with-
              out conflicting.

              The  exit  status  and output is cached for each entry individu-
              ally, and can be cleared (and the caching behaviour  configured)
              using the nsCacheTable.

       extendfix NAME PROG ARGS
              registers  a  command  that can be invoked on demand, by setting
              the appropriate nsExtendRunType instance to the  value  run-com-
              mand(3).  Unlike the equivalent execfix, this directive does not
              need to be paired with a corresponding extend entry, and can ap-
              pear on its own.

       Both extend and extendfix directives can be configured dynamically, us-
       ing SNMP SET requests to the NET-SNMP-EXTEND-MIB.

   MIB-Specific Extension Commands
       The first group of extension directives invoke arbitrary commands,  and
       rely  on  the  MIB  structure  (and management applications) having the
       flexibility to accommodate and interpret the output.  This is a  conve-
       nient  way  to make information available quickly and simply, but is of
       no use when implementing specific MIB objects, where the extension must
       conform  to the structure of the MIB (rather than vice versa).  The re-
       maining extension mechanisms are all concerned with  such  MIB-specific
       situations  - starting with "pass-through" scripts.  Use of this mecha-
       nism  requires  that  the  agent  was  built  with  support   for   the
       ucd-snmp/pass  and  ucd-snmp/pass_persist  modules  (which are both in-
       cluded as part of the default build configuration).

       pass [-p priority] MIBOID PROG
              will pass control of the subtree rooted at MIBOID to the  speci-
              fied  PROG  command.   GET  and GETNEXT requests for OIDs within
              this tree will trigger this command, called as:

                     PROG -g OID

                     PROG -n OID

              respectively, where OID is the requested OID.  The PROG  command
              should  return  the  response  varbind  as  three separate lines
              printed to stdout - the first line should be the OID of the  re-
              turned  value,  the  second  should be its TYPE (one of the text
              strings integer, gauge, counter, timeticks, ipaddress, objectid,
              octet,  or  string  ), and the third should be the value itself.
              (Note: octets are sent as ASCII,  space-separated  hex  strings,
              e.g. "00 3f dd 00 c6 be".)

              If  the  command  cannot return an appropriate varbind - e.g the
              specified OID did not correspond to a valid instance for  a  GET
              request,  or  there  were no following instances for a GETNEXT -
              then it should exit without producing any output.  This will re-
              sult in an SNMP noSuchName error, or a noSuchInstance exception.

                     Note:  The  SMIv2  type counter64 and SNMPv2 noSuchObject
                            exception are not supported.

              A SET request will result in the command being called as:

                     PROG -s OID TYPE VALUE

              where TYPE is one of the tokens  listed  above,  indicating  the
              type of the value passed as the third parameter.

              If  the  assignment  is successful, the PROG command should exit
              without producing any output.  Errors  should  be  indicated  by
              writing  one  of the strings not-writable, or wrong-type to std-
              out, and the agent will generate the appropriate error response.

                     Note:  The other SNMPv2 errors are not supported.

              In either case, the command should exit  once  it  has  finished
              processing.   Each request (and each varbind within a single re-
              quest) will trigger a separate invocation of the command.

              The default registration priority is 127.  This can  be  changed
              by supplying the optional -p flag, with lower priority registra-
              tions being used in preference to higher priority values.

       pass_persist [-p priority] MIBOID PROG
              will also pass control of the subtree rooted at  MIBOID  to  the
              specified  PROG  command.  However this command will continue to
              run after the initial request has been answered,  so  subsequent
              requests can be processed without the startup overheads.

              Upon  initialization, PROG will be passed the string "PING\n" on
              stdin, and should respond by printing "PONG\n" to stdout.

              For GET and GETNEXT requests, PROG will be passed two  lines  on
              stdin,  the  command (get or getnext) and the requested OID.  It
              should respond by printing three lines to stdout - the  OID  for
              the  result  varbind, the TYPE and the VALUE itself - exactly as
              for the pass directive above.  If the command cannot  return  an
              appropriate  varbind,  it  should print print "NONE\n" to stdout
              (but continue running).

              For SET requests, PROG will be passed three lines on stdin,  the
              command  (set)  and  the requested OID, followed by the type and
              value (both on the same line).  If the assignment is successful,
              the  command  should print "DONE\n" to stdout.  Errors should be
              indicated  by  writing  one   of   the   strings   not-writable,
              wrong-type,  wrong-length,  wrong-value or inconsistent-value to
              stdout, and the agent will generate the  appropriate  error  re-
              sponse.  In either case, the command should continue running.

              The  registration  priority can be changed using the optional -p
              flag, just as for the pass directive.

       pass and pass_persist extensions can only be  configured  via  the  sn-
       mpd.conf file.  They cannot be set up via SNMP SET requests.

   Embedded Perl Support
       Programs  using the previous extension mechanisms can be written in any
       convenient programming language - including perl,  which  is  a  common
       choice for pass-through extensions in particular.  However the Net-SNMP
       agent also includes support for embedded perl  technology  (similar  to
       mod_perl  for  the Apache web server).  This allows the agent to inter-
       pret perl scripts directly, thus avoiding the overhead of spawning pro-
       cesses and initializing the perl system when a request is received.

       Use  of  this  mechanism requires that the agent was built with support
       for the embedded perl mechanism, which is not part of the default build
       environment.  It  must  be explicitly included by specifying the '--en-
       able-embedded-perl' option to the configure script when the package  is
       first built.

       If enabled, the following directives will be recognised:

       disablePerl true
              will  turn off embedded perl support entirely (e.g. if there are
              problems with the perl installation).

       perlInitFile FILE
              loads the specified initialisation file (if present) immediately
              before  the  first  perl directive is parsed.  If not explicitly
              specified, the agent will look for  the  default  initialisation
              file /usr/share/snmp/snmp_perl.pl.

              The  default  initialisation  file creates an instance of a Net-
              SNMP::agent object - a variable $agent which can be used to reg-
              ister perl-based MIB handler routines.

       perl EXPRESSION
              evaluates the given expression.  This would typically register a
              handler routine to be called when a section of the OID tree  was
              requested:
                     perl use Data::Dumper;
                     perl sub myroutine  { print "got called: ",Dumper(@_),"\n"; }
                     perl $agent->register('mylink', '.1.3.6.1.8765', \&myroutine);

              This expression could also source an external file:
                     perl 'do /path/to/file.pl';

              or  perform  any  other  perl-based processing that might be re-
              quired.

   Dynamically Loadable Modules
       Most of the MIBs supported by the Net-SNMP agent are implemented  as  C
       code  modules,  which were compiled and linked into the agent libraries
       when the suite was first built.  Such implementation modules  can  also
       be compiled independently and loaded into the running agent once it has
       started.  Use of this mechanism requires that the agent was built  with
       support for the ucd-snmp/dlmod module (which is included as part of the
       default build configuration).

       dlmod NAME PATH
              will load the shared object module from the file PATH (an  abso-
              lute filename), and call the initialisation routine init_NAME.

              Note:  If  the specified PATH is not a fully qualified filename,
                     it will be interpreted relative to /usr/lib64/snmp/dlmod,
                     and .so will be appended to the filename.

       This  functionality  can  also be configured using SNMP SET requests to
       the UCD-DLMOD-MIB.

   Proxy Support
       Another mechanism for extending the functionality of the  agent  is  to
       pass  selected  requests  (or selected varbinds) to another SNMP agent,
       which can be running on the same host (presumably listening on  a  dif-
       ferent  port), or on a remote system.  This can be viewed either as the
       main agent delegating requests to the remote one, or acting as a  proxy
       for  it.   Use of this mechanism requires that the agent was built with
       support for the ucd-snmp/proxy module (which is included as part of the
       default build configuration).

       proxy [-Cn CONTEXTNAME] [SNMPCMD_ARGS] HOST OID [REMOTEOID]
              will pass any incoming requests under OID to the agent listening
              on the port specified by the transport address  HOST.   See  the
              section LISTENING ADDRESSES in the snmpd(8) manual page for more
              information about the format of listening addresses.

              Note:  To proxy the entire MIB tree, use the OID .1.3  (not  the
                     top-level .1)

       The  SNMPCMD_ARGS  should provide sufficient version and administrative
       information to generate a valid SNMP request (see snmpcmd(1)).

       Note:  The proxied request will not  use  the  administrative  settings
              from the original request.

       If  a CONTEXTNAME is specified, this will register the proxy delegation
       within the named context in the local agent.  Defining  multiple  proxy
       directives for the same OID but different contexts can be used to query
       several remote agents through a single proxy, by specifying the  appro-
       priate  SNMPv3  context in the incoming request (or using suitable con-
       figured community strings - see the com2sec directive).

       Specifying the REMOID parameter will map the local MIB tree  rooted  at
       OID to an equivalent subtree rooted at REMOID on the remote agent.

   SMUX Sub-Agents
       The Net-SNMP agent supports the SMUX protocol (RFC 1227) to communicate
       with SMUX-based subagents (such as gated, zebra  or  quagga).   Use  of
       this  mechanism  requires that the agent was built with support for the
       smux module, which is not part of the default  build  environment,  and
       must be explicitly included by specifying the '--with-mib-modules=smux'
       option to the configure script when the package is first built.

              Note:  This extension protocol has been officially deprecated in
                     favour of AgentX (see below).

       smuxpeer OID PASS
              will register a subtree for SMUX-based processing, to be authen-
              ticated using the password PASS.  If a subagent (or "peer") con-
              nects  to the agent and registers this subtree then requests for
              OIDs within it will be passed to that SMUX subagent for process-
              ing.

              A  suitable entry for an OSPF routing daemon (such as gated, ze-
              bra or quagga) might be something like
                     smuxpeer .1.3.6.1.2.1.14 ospf_pass

       smuxsocket <IPv4-address>
              defines the IPv4 address for SMUX peers to communicate with  the
              Net-SNMP agent.  The default is to listen on all IPv4 interfaces
              ("0.0.0.0"), unless the package has been configured with  "--en-
              able-local-smux"  at  build time, which causes it to only listen
              on 127.0.0.1 by default. SMUX uses the well-known TCP port 199.

       Note the Net-SNMP agent will only operate as a SMUX  master  agent.  It
       does not support acting in a SMUX subagent role.

   AgentX Sub-Agents
       The Net-SNMP agent supports the AgentX protocol (RFC 2741) in both mas-
       ter and subagent roles.  Use of this mechanism requires that the  agent
       was built with support for the agentx module (which is included as part
       of the default build configuration), and also that this support is  ex-
       plicitly enabled (e.g. via the snmpd.conf file).

       There  are two directives specifically relevant to running as an AgentX
       master agent:

       master agentx
              will enable the AgentX functionality  and  cause  the  agent  to
              start  listening  for  incoming  AgentX registrations.  This can
              also be activated by specifying the '-x' command-line option (to
              specify an alternative listening socket).

       agentXPerms SOCKPERMS [DIRPERMS [USER|UID [GROUP|GID]]]
              Defines  the permissions and ownership of the AgentX Unix Domain
              socket, and the parent directories of  this  socket.   SOCKPERMS
              and  DIRPERMS  must  be octal digits (see chmod(1) ). By default
              this socket will only be accessible to subagents which have  the
              same userid as the agent.

       There  is  one  directive specifically relevant to running as an AgentX
       sub-agent:

       agentXPingInterval NUM
              will make the subagent try and reconnect every  NUM  seconds  to
              the master if it ever becomes (or starts) disconnected.

       The  remaining  directives  are relevant to both AgentX master and sub-
       agents:

       agentXSocket [<transport-specifier>:]<transport-address>[,...]
              defines the address the master agent listens at, or the subagent
              should  connect  to.   The  default  is  the  Unix Domain socket
              "/run/agentx/master".  Another common alternative is  tcp:local-
              host:705.   See  the section LISTENING ADDRESSES in the snmpd(8)
              manual page for more information about the format of addresses.

              Note:  Specifying an AgentX socket does not automatically enable
                     AgentX  functionality  (unlike  the '-x' command-line op-
                     tion).

       agentXTimeout NUM
              defines the timeout period (NUM seconds) for an AgentX  request.
              Default is 1 second.  NUM also be specified with a suffix of one
              of s (for seconds), m (for  minutes),  h  (for  hours),  d  (for
              days), or w (for weeks).

       agentXRetries NUM
              defines the number of retries for an AgentX request.  Default is
              5 retries.

       net-snmp ships with both C and Perl APIs to  develop  your  own  AgentX
       subagent.

OTHER CONFIGURATION
       override [-rw] OID TYPE VALUE
              This  directive  allows  you to override a particular OID with a
              different value (and possibly a different type of  value).   The
              -rw  flag  will  allow  snmp  SETs to modify it's value as well.
              (note that if you're  overriding  original  functionality,  that
              functionality  will be entirely lost.  Thus SETS will do nothing
              more than modify the internal overridden value and will not per-
              form  any  of the original functionality intended to be provided
              by the MIB object.  It's an emulation only.)  An example:

                     override sysDescr.0 octet_str "my own sysDescr"

              That line will set the sysDescr.0 value to "my own sysDescr"  as
              well  as make it modifiable with SNMP SETs as well (which is ac-
              tually illegal according to the MIB specifications).

              Note that care must be taken when using this.  For  example,  if
              you  try  to  override  a  property  of the 3rd interface in the
              ifTable with a new value and  later  the  numbering  within  the
              ifTable  changes it's index ordering you'll end up with problems
              and your modified value won't appear in the right place  in  the
              table.

              Valid   TYPEs  are:  integer,  uinteger,  octet_str,  object_id,
              counter, null (for gauges, use "uinteger"; for bit strings,  use
              "octet_str").  Note that setting an object to "null" effectively
              delete's it as being accessible.  No VALUE needs to be given  if
              the object type is null.

              More types should be available in the future.

       If you're trying to figure out aspects of the various mib modules (pos-
       sibly some that you've added yourself), the following may help you spit
       out  some useful debugging information.  First off, please read the sn-
       mpd manual page on the -D flag.  Then the following  configuration  sn-
       mpd.conf token, combined with the -D flag, can produce useful output:

       injectHandler HANDLER modulename [beforeThis]
              This  will  insert new handlers into the section of the mib tree
              referenced by "modulename".  If "beforeThis" is  specified  then
              the  module  will  be injected before the named module.  This is
              useful for getting a handler into the exact  right  position  in
              the chain.

              The types of handlers available for insertion are:

              stash_cache
                     Caches  information  returned from the lower level.  This
                     greatly help the performance of the agent, at the cost of
                     caching  the  data  such that its no longer "live" for 30
                     seconds (in this  future,  this  will  be  configurable).
                     Note  that  this means snmpd will use more memory as well
                     while the information is  cached.   Currently  this  only
                     works  for  handlers  registered using the table_iterator
                     support, which is only a few mib tables.  To use it,  you
                     need to make sure to install it before the table_iterator
                     point in the chain, so to do this:

                       injectHandler stash_cache NAME table_iterator

                     If you want a table to play with, try walking the  nsMod-
                     uleTable with and without this injected.

              debug  Prints   out  lots  of  debugging  information  when  the
                     -Dhelper:debug flag is passed to the snmpd application.

              read_only
                     Forces turning off write support for the given module.

              serialize
                     If a module is failing to handle multiple requests  prop-
                     erly  (using the new 5.0 module API), this will force the
                     module to only receive one request at a time.

              bulk_to_next
                     If a module registers to handle getbulk support, but  for
                     some  reason  is  failing  to implement it properly, this
                     module will convert all getbulk requests to  getnext  re-
                     quests before the final module receives it.

       dontLogTCPWrappersConnects
              If  the snmpd was compiled with TCP Wrapper support, it logs ev-
              ery connection made to the agent. This setting disables the  log
              messages for accepted connections. Denied connections will still
              be logged.

       Figuring out module names
              To figure out which modules you can inject things into, run snm-
              pwalk  on  the nsModuleTable which will give a list of all named
              modules registered within the agent.

   Internal Data tables
       table NAME

       add_row NAME INDEX(ES) VALUE(S)

NOTES
       o      The Net-SNMP agent can be instructed to re-read the various con-
              figuration files, either via an snmpset assignment of integer(1)
              to                           UCD-SNMP-MIB::versionUpdateConfig.0
              (.1.3.6.1.4.1.2021.100.11.0),  or  by sending a kill -HUP signal
              to the agent process.

       o      All directives listed with a value of "yes"  actually  accept  a
              range  of  boolean  values.   These will accept any of 1, yes or
              true to enable the corresponding behaviour, or any of 0,  no  or
              false  to  disable it.  The default in each case is for the fea-
              ture to be turned off, so these directives  are  typically  only
              used to enable the appropriate behaviour.

EXAMPLE CONFIGURATION FILE
       See  the EXAMPLE.CONF file in the top level source directory for a more
       detailed example of how the above information is used in real examples.

FILES
       /etc/snmp/snmpd.conf

SEE ALSO
       snmpconf(1), snmpusm(1), snmp.conf(5), snmp_config(5), snmpd(8),  EXAM-
       PLE.conf, netsnmp_config_api(3).

V5.9.4.pre2                       30 Jun 2010                    SNMPD.CONF(5)

Want to link to this manual page? Use this URL:
<
https://star2.abcm.com/cgi-bin/bsdi-man?query=snmpd.conf&sektion=5&manpath=>

home | help