Nexapp - SNMP Server
SNMP Server
Simple Network Management Protocol (SNMP) provides a standardized way to monitor and manage network devices like your firewall remotely. It allows authorized users to retrieve essential information such as device status, performance metrics, and configuration settings.
The SNMP server is disabled by default on your firewall. When enabled, it allows access from within your local area network (LAN) on all IPv4 and IPv6 addresses.
Note If the system has been updated from v1.4.1 or earlier, the SNMP server will be enabled by default. To disable it, follow the steps in the Disabling the SNMP Server section.
Configuring the SNMP Server
It’s crucial to configure the basic system identity fields so monitoring tools can correctly recognize your firewall.
Open a terminal window on your firewall.
Set the desired values for
sysLocation,sysContact, andsysName:
uci set snmpd.general.enabled=1
uci set snmpd.@system[0].sysLocation='<string>'
uci set snmpd.@system[0].sysContact='<string>'
uci set snmpd.@system[0].sysName='<string>'
Replace <string> with your environment details. Example:
uci set snmpd.general.enabled=1
uci set snmpd.@system[0].sysLocation='MyOffice'
uci set snmpd.@system[0].sysContact='admin@nethsecurity.org'
uci set snmpd.@system[0].sysName='firewall.nethsecurity.org'
- Apply the configuration:
uci commit snmpd
reload_config
The SNMP configuration is stored in:
/etc/config/snmpd
Testing SNMP
From a remote machine with SNMP tools installed, test using:
snmpwalk -v 2c -c public 127.0.0.1
Disabling the SNMP Server
If you don’t need SNMP, disable it to reduce attack surface.
Open a terminal on the firewall.
Disable SNMP:
uci set snmpd.general.enabled=0
uci commit snmpd
reload_config
Reminder: Disabling SNMP may impact monitoring systems that rely on it.
Enabling Remote Access
To use SNMP outside the LAN, you must allow inbound UDP/161 to the firewall.
Create a firewall input rule that:
- permits UDP
- destination port 161
- destination firewall itself
- source restricted to trusted IPs only
Opening SNMP publicly increases risk, so keep access tightly limited.
Security Considerations
Before enabling or exposing SNMP:
Use a strong community string Replace the default
"public"with a unique, complex value.Restrict access Allow SNMP only from specific monitoring servers or admin IP ranges using ACLs/firewall rules.