
9-41
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 9 Accessing and Monitoring PIX Firewall
Using SNMP
Using SNMP
This section describes how to enable SNMP for monitoring the PIX Firewall with a network
management system (NMS). It includes the following topics:
• Overview, page 9-41
• MIB Support, page 9-42
• SNMP CPU Utilization, page 9-42
• SNMP Usage Notes, page 9-43
• SNMP Traps, page 9-44
• Compiling Cisco Syslog MIB Files, page 9-45
• Using the Firewall and Memory Pool MIBs, page 9-46
Overview
The snmp-server command causes the PIX Firewall to send SNMP traps so that the PIX Firewall can
be monitored remotely. Use snmp-server host command to specify which systems receive the SNMP
traps.
The PIX Firewall SNMP MIB-II groups available are System and Interfaces. The Cisco Firewall MIB
and Cisco Memory Pool MIB are also available.
All SNMP values are read only (RO).
Using SNMP, you can monitor system events on the PIX Firewall. SNMP events can be read, but
information on the PIX
Firewall cannot be changed with SNMP.
ip audit name audit_name attack [action
[alarm] [drop] [reset]]
All attack signatures except those disabled or
excluded by the ip audit signature command are
considered part of the policy. The actions are the
same as described previously.
no ip audit name audit_name [attack]
Removes the audit specification audit_name.
show ip audit name [name [info | attack]]
Displays all audit policies or specific policies
referenced by name and possibly type.
ip audit interface if_name audit_name
Applies an audit specification or policy (via the ip
audit name command) to an interface.
no ip audit interface [if_name]
Removes a policy from an interface.
show ip audit interface
Displays the interface configuration.
Table 9-7 Commands to Control Syslog Messages (continued)
Command Effect
Komentarze do niniejszej Instrukcji