Command Line Tools

By Lex Li

This page shows you what are the command line tools shipped.

In this article

How to Acquire The Command Line Tools

Please follow “Install #SNMP Library via source code” section in Installing #SNMP Library to acquire the source code. Then launch Visual Studio 2015 to open SharpSnmpLib.Classic.sln.

The sample projects are under the “Samples” folder and devided into two languages, C# and VB.NET. Compile them and then they can be executed.

Typical Commands

Below describes typical commands for #SNMP command line tools. For more information on each tools, you may refer to the source code.

SNMPGET

For SNMP v1 and v2c, typical commands are

snmpget -c=public -v=1 localhost 1.3.6.1.2.1.1.1.0
snmpget -c=public -v=2 localhost 1.3.6.1.2.1.1.1.0

For SNMP v3, typical commands are

snmpget -v=3 -l=noAuthNoPriv -u=neither localhost 1.3.6.1.2.1.1.1.0
snmpget -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen localhost 1.3.6.1.2.1.1.1.0
snmpget -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy localhost 1.3.6.1.2.1.1.1.0

SNMPSET

For SNMP v1 and v2c, typical commands are

snmpset -c=public -v=1 localhost 1.3.6.1.2.1.1.6.0 s Shanghai
snmpset -c=public -v=2 localhost 1.3.6.1.2.1.1.6.0 s Shanghai

For SNMP v3, typical commands are

snmpset -v=3 -l=noAuthNoPriv -u=neither localhost 1.3.6.1.2.1.1.6.0 s Shanghai
snmpset -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen localhost 1.3.6.1.2.1.1.6.0 s Shanghai
snmpset -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy localhost 1.3.6.1.2.1.1.6.0 s Shanghai

SNMPBULKGET

For SNMP v2c, typical command is

snmpbulkget -v=2 -c=public -Cr=10 localhost 1.3.6.1.2.1.1.1.0

For SNMP v3, typical commands are

snmpbulkget -v=3 -l=noAuthNoPriv -u=neither -Cr=10 localhost 1.3.6.1.2.1.1.1.0
snmpbulkget -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen -Cr=10 localhost 1.3.6.1.2.1.1.1.0
snmpbulkget -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy -Cr=10 localhost 1.3.6.1.2.1.1.1.0

SNMPGETNEXT

For SNMP v1 and v2c, typical commands are

snmpgetnext -c=public -v=1 localhost 1.3.6.1.2.1.1.1.0
snmpgetnext -c=public -v=2 localhost 1.3.6.1.2.1.1.1.0

For SNMP v3, typical commands are

snmpgetnext -v=3 -l=noAuthNoPriv -u=neither localhost 1.3.6.1.2.1.1.1.0
snmpgetnext -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen localhost 1.3.6.1.2.1.1.1.0
snmpgetnext -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy localhost 1.3.6.1.2.1.1.1.0

SNMPWALK

For SNMP v1, typical command is

snmpwalk -c=public -v=1 -m=subtree localhost 1.3.6.1.2.1.1

For SNMP v2c, typical command is

snmpwalk -v=2 -c=public -Cr=10 -m=subtree localhost 1.3.6.1.2.1.1

For SNMP v3, typical commands are

snmpwalk -v=3 -l=noAuthNoPriv -u=neither -m=subtree -Cr=10 localhost 1.3.6.1.2.1.1
snmpwalk -v=3 -l=authNoPriv -a=MD5 -A=authentication -u=authen -m=subtree -Cr=10 localhost 1.3.6.1.2.1.1
snmpwalk -v=3 -l=authPriv -a=MD5 -A=authentication -x=DES -X=privacyphrase -u=privacy -m=subtree -Cr=10 localhost 1.3.6.1.2.1.1

Built-in community names and users for snmpd

SNMP v1 and v2c

Get community name Set community name
public public

SNMP v3

Community names are obsolete in SNMP v3, so snmpd.exe supports three users (to match three modes).

User Security mode Authentication Phrase Privacy Phrase
neither noAuthNoPriv default N/A default N/A
authen authNoPriv MD5 authentication default N/A
privacy authPriv MD5 authentication DES privacyphrase

Checkout

The samples can be used to carry out basic SNMP operations. So if you are going to learn the basics, you should follow them.

Pairing the SNMP test agent and the manager side tools

Run snmpd.exe as administrator and click “Start listening” button without modifying any settings. This allows the test SNMP agent to hook to port 161 on all network interfaces (IP v4 and v6).

Information about the agent builtin community names and user accounts can be found above in Built-in community names and users for snmpd .

Then the command line utilities can be run at command prompt with Typical Commands . The agent will respond with correct packets.

Pairing the SNMP test agent and the trap listener tool

Run snmptrapd.exe at command prompt as administrator. It will hook to port 162 and monitor incoming trap messages.

Click the “Sent Trap v1”, “Send Trap v2”, “Send Inform v2” and “Send Inform v3” buttons on the test agent panel. See those messages are captured by the trap listener tool.

Above setup assumes that all tools are running on the same machine. If you want to test out agent and manager sides each on a dedicate machine, make sure you open the firewall ports and allow SNMP packets to go through.