Table Of Contents
Prerequisites for Implementing SNMP Monitoring on Cisco Unity Express
Enabling the SNMP Agent, Passwords, and Trap Server
Required Data for This Procedure
Verifying the Enabling of the SNMP Agent, Passwords, and Trap Server
Setting Threshold Values for Subscriber Responses
Required Data for This Procedure
Verifying the SNMP Login and PIN Notification Thresholds
Enabling Cisco Unity Express Shutdown Requests
Verifying the Enabling of Shutdown Requests
Configuring SNMP Monitoring
Last Updated: July 25, 2006
This chapter describes the procedures for configuring Simple Network Monitoring Protocol (SNMP) on the Cisco Unity Express module to monitor the system's health, conduct performance monitoring, collect data, and manage traps for Cisco Unity Express voicemail and auto attendant applications.
See the Cisco Unity Express SNMP MIB Support guide for details about the CISCO-UNITY-EXPRESS-MIB.
The system monitoring commands are not available through the Cisco Unity Express graphical user interface (GUI).
This chapter contains the following sections:
•Prerequisites for Implementing SNMP Monitoring on Cisco Unity Express
•Enabling the SNMP Agent, Passwords, and Trap Server
•Setting Threshold Values for Subscriber Responses
•Enabling Cisco Unity Express Shutdown Requests
Prerequisites for Implementing SNMP Monitoring on Cisco Unity Express
See the Cisco Unity Express SNMP MIB Support guide for details about installing the CISCO-UNITY-EXPRESS-MIB on the Cisco Unity Express module.
Enabling the SNMP Agent, Passwords, and Trap Server
Activating the SNMP system monitoring on Cisco Unity Express requires the following tasks:
•Enabling the SNMP agent.
•Specifying the SNMP notification passwords.
•Specifying at least one host server that will receive the notifications.
Prerequisites
Be sure that the appropriate MIBs are installed. See the Cisco Unity Express SNMP MIB Support guide for details.
Required Data for This Procedure
•Passwords that permit subscribers to retrieve and change SNMP information. Specify whether these passwords will have read-only or read-write privileges. The system supports a maximum of 5 read-only and 5 read-write passwords. Each password may have a maximum of 15 alphanumeric characters, including letters A to Z, letters a to z, digits 0 to 9, underscore (_), and hyphen (-).
•IP address and password of the host server that will receive the SNMP information. If no host is defined, the system discards the trap information. The system supports a maximum of 5 servers. The password does not have to be the same as the subscriber passwords.
No host is considered the primary host. The system sends the SNMP notifications to all enabled hosts.
•(Optional) Server contact and location information.
SUMMARY STEPS
1. config t
2. snmp-server community community-string {ro | rw}
3. snmp-server enable traps
4. snmp-server host host-ipaddress community-string
5. (Optional) snmp-server contact contact-string
6. (Optional) snmp-server location location-string
7. end
8. copy running-config startup-config
DETAILED STEPS
Verifying the Enabling of the SNMP Agent, Passwords, and Trap Server
Use the show snmp configuration command in Cisco Unity Express EXEC mode to display the SNMP agent status and passwords.
The following example shows output from the show snmp configuration command:
se-10-0-0-0# config tEnter configuration commands, one per line. End with CNTL/Z.se-10-0-0-0(config)# snmp-server community myaccess rwse-10-0-0-0(config)# snmp-server community iminhere rose-10-0-0-0(config)# snmp-server enable trapsse-10-0-0-0(config)# snmp-server host 172.16.160.224 bigtrapsse-10-0-0-0(config)# snmp-server contact "Dial 71111 for system operator"se-10-0-0-0(config)# snmp-server location "Bldg A NYC"se-10-0-0-0(config)# endse-10-0-0-0# show snmp configurationContact: Dial 71111 for system operatorLocation: Bldg A NYCCommunity 1 RO: iminhereCommunity 1 RW: admin_mainCommunity 2 RW: myaccessTraps: enabledHost Community 1: 172.16.160.224 bigtrapscueShutdownRequest: disabledse-10-0-0-0#Setting Threshold Values for Subscriber Responses
Tracking spikes in the number of failures that occur within a short period of time for certain subscriber actions helps to identify possible security breaches in the system.
Each subscriber action has a default threshold value. Use the commands in this section if you want to change the default values.
Cisco Unity Express supports setting thresholds for the number of failures in a 5-minute interval for the following subscriber actions:
•Logging in.
•Entering a password.
•Entering a personal identification number (PIN) user ID.
•Entering a PIN password.
•Resetting a PIN.
When the number of attempts reaches the action's threshold, the system sends a notification to the SNMP host.
Prerequisites
Be sure that the appropriate MIBs are installed. See the Cisco Unity Express SNMP MIB Support guide for details.
Required Data for This Procedure
Number of times the following can occur before the system sends a notification to the SNMP host:
•Password errors (default is 30)
•Login errors (default is 30)
•PIN password errors (default is 30)
•PIN resets (default is 5)
•PIN user ID errors (default is 30)
SUMMARY STEPS
1. config t
2. (Optional) notification security login user threshold
3. (Optional) notification security login password threshold
4. (Optional) notification security pin uid threshold
5. (Optional) notification security pin password threshold
6. (Optional) notification security pin reset threshold
7. end
8. copy running-config startup-config
DETAILED STEPS
Verifying the SNMP Login and PIN Notification Thresholds
Use the show notification configuration command in Cisco Unity Express EXEC mode to display the SNMP login and password notification thresholds.
The following example shows output from the show notification configuration command:
se-10-0-0-0# config tEnter configuration commands, one per line. End with CNTL/Z.se-10-0-0-0(config)# notification security login user 10se-10-0-0-0(config)# notification security login password 6se-10-0-0-0(config)# notification security pin uid 12se-10-0-0-0(config)# notification security pin password 8se-10-0-0-0(config)# notification security pin reset 3se-10-0-0-0(config)# endse-10-0-0-0# show notification configurationLogin user threshold: 10 (errors within a 5 minute interval)Login password threshold: 6 (errors within a 5 minute interval)PIN uid threshold: 12 (errors within a 5 minute interval)PIN password threshold: 8 (errors within a 5 minute interval)PIN reset threshold: 3 (resets within a 5 minute interval)se-10-0-0-0#Enabling Cisco Unity Express Shutdown Requests
Enabling shutdown requests allows the Cisco Unity Express module to be gracefully halted. For example, suppose an uninterruptible power supply (UPS) sends a power out alert to the Cisco Unity Express management application. The management application would send an SNMP shutdown request to bring down the Cisco Unity Express module while power is still supplied from the UPS.
For security reasons, the shutdown capability is disabled by default.
To reset the Cisco Unity Express module, use the service-module service-engine slot/port reset command on the router housing the module.
Prerequisites
Be sure that the appropriate MIBs are installed. See the Cisco Unity Express SNMP MIB Support guide for details.
SUMMARY STEPS
1. config t
2. snmp-server enable cueShutdownRequest
3. end
4. copy running-config startup-config
DETAILED STEPS
Verifying the Enabling of Shutdown Requests
Use the show snmp configuration command in Cisco Unity Express EXEC mode to display the status of the shutdown request capability.
The following example shows output from the show snmp configuration command:
se-10-0-0-0# show snmp configurationContact: Dial 71111 for system operatorLocation: Bldg A NYCCommunity 1 RO: iminhereCommunity 1 RW: admin_mainCommunity 2 RW: myaccessTraps: enabledHost Community 1: 172.16.160.224 bigtrapscueShutdownRequest enabledse-10-0-0-0#