Discuss the snmp service

Assignment Help Computer Networking
Reference no: EM131516268

Question: SNMP Service in Windows 8.1

Windows contains an embedded SNMP service, but it's not enabled by default. In this project, you turn the SNMP service on, configure the service to start collecting SNMP messages, and enable the SNMP Trap service. The following instructions are written for either Windows 7 or Windows 8.1.

1. Open the Control Panel. Click Programs, then click Turn Windows features on or off. After a pause, the Turn Windows features on or off dialog box opens.

2. Scroll down and click the plus sign (þ) next to "Simple Network Management Protocol (SNMP)." Click the Simple Network Management Protocol (SNMP) check box to select it, click the WMI SNMP Provider check box to select it, and then click OK. When Windows completes its changes, click Close.

3. To open the SNMP service from the Control Panel window, return to the Control Panel home screen, click System and Security and then click Administrative Tools. (You might need to scroll down to see Administrative Tools.)

4. In the Administrative Tools window, double-click the Services icon, and then, in the Services window, scroll down and double-click SNMP Service.

5. In the SNMP Service Properties (Local Computer) window, click the Security tab, verify that the Send authentication trap check box is selected, and then click Add under Accepted community names.

6. Leave the Community rights as READ ONLY, type public in the Community Name box, and then click Add.

7. Close the SNMP Service Properties (Local Computer) window, then double-click SNMP Trap. Near the bottom of the SNMP Trap Properties (Local Computer) window, click Start.

8. Open Task Manager and use the Resource Monitor to determine which ports the SNMP and SNMP Trap services are listening on, and which protocols (TCP or UDP) the services are using. What information did you find?

9. Return to the Services window, right-click on SNMP Service, click Stop, and repeat for the SNMP Trap service.

Reference no: EM131516268

Questions Cloud

How can network segmentation protect cardholder data : When you arrive at work one morning, your Inbox is full of messages complaining of a network slowdown. You collect a capture from your network monitor.
What is the human predicament and what caused it : Assignment: Army- What in the World is Wrong? What in the world is wrong? What is the human predicament and what caused it?
Write a paper about should physical education be mandatory : Write a research paper about Should Physical Education Be Mandatory. Your paper must have 10 credible references, double-spaced and one-inch margins.
What is the difference between circuit and packet switching : You need to see the physical switch at one of your company's remote locations to see if you can spot any visible reason why a link keeps failing.
Discuss the snmp service : Windows contains an embedded SNMP service, but it's not enabled by default. In this project, you turn the SNMP service on, configure the service to start.
The interviewee integrate career counseling : How does the interviewee integrate career counseling into his or her practice?What inventories or assessments does the person use.
Create an account as a first-time user : OpManager by ManageEngine The free version of ManageEngine's OpManager provides tools for monitoring activity and performance on a small network.
What blaming people for various illnesses : What have you learned about what blaming people for various illnesses and perceived weaknesses says about the society.
Define list of log types and their locations : Earlier in this chapter, you viewed and manipulated log file entries on a computer running Windows. In this project, you do the same on a computer running.

Reviews

Write a Review

Computer Networking Questions & Answers

  Design a network specified by bsw

ISIT925_2016 Major Project. The broad requirement delivered to you by Channel4 management is to analysis the network and design a network specification that can then be validated by BSW who will then provide management with recommendations about w..

  What would be the utilized the best in todays industry

Which of the security enhancements do you think is the most important, and why and dDiscuss your thoughts on what would be the utilized the best in today's industry. Do you feel it is ground-breaking technology?

  What are sample spaces for value of cw and value of backoff

Sample space In the IEEE 802.11 protocol, the congestion window (CW) parameter is used as follows: Initially, a terminal waits for a random time period.

  List the merits and demerits of the type of topology and

write a paper detailing the advantages and disadvantages of the three main topologies ring bus and star.include the

  Describe legal and ethical issues of expert system

Describe the legal and ethical issues of expert system providing incorrect information? Must Food and Drug Administration review and approve medical expert systems?

  Investigate the emergingwireless broadband services

Investigate the emergingwireless broadband services available in Australia and compile a brief report of around 1400 words.  Your references may come from websites, white papers, government documents or published conference or journal papers. Your re..

  Firewalls and intrusion detection systems

Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in..

  Specifics type and explain dell pentium

The office has 4 separate rooms, each one with its own set up of dental equipment and 1 X-ray room

  What kind of lan will your team design for this company

The firm also wants to make sure that every department has very fast access to the LAN, and, of course, it wants the LAN to remain up at all times

  How you would propose protecting your chosen cloud solution

How you would propose protecting your chosen cloud solution from cyber-attack using current password and data protection protocol. Why and how the use of social media can ensure your company has a competitive edge.

  Decision-making process to help the company grow

How would you utilize this information in the decision-making process to help the company grow?

  What are the characteristics of tcp-ip- http protocols

There is an alphabet soup of protocols in TCP/IP - HTTP,FTP,SMTP,POP3,TCP,UDP,IP,ARP,ICMP, and others. What are the characteristics of these protocols?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd