Table of Contents
Your switches must be configured to send sFlow to sFlowTrend-Pro. There are two methods for configuring sFlow: telling sFlowTrend-Pro to configure the switch using SNMP or using the command line interface (CLI) on the switch.
sFlowTrend-Pro can use SNMP to configure a switch to send sFlow. You will need to make sure that the switch is configured to allow SNMP read/write access from sFlowTrend-Pro. You will also need to know the SNMP v2 read/write community string or the SNMP v3 settings that will allow write access. See Section 13.3.1, “Adding a switch configured via SNMP” for details on how to set up sFlowTrend-Pro so that it uses SNMP to configure a switch to send sFlow.
Alcatel-Lucent and ProCurve Networking by HP switches support SNMP configuration of sFlow.
You can use SNMP to configure ProCurve switches (except the 9300 and 9400 series) to send sFlow. For this to be possible you must ensure that sFlowTrend-Pro uses an SNMP community that is configured on the switch with unrestricted write access and that the IP address of the host running sFlowTrend-Pro is included in the list of authorized managers configured on the switch.
Assuming that sFlowTrend-Pro is running on host with IP
address
10.1.2.5
and is using the read/write SNMP community
snmprw
,
access the command line interface on the ProCurve
switch and take the following steps to set up the
switch so that it will allow sFlowTrend-Pro to configure
sFlow via SNMP:
Configure the SNMP community so that it will allow any MIB variable that has read/write access to be set:
(config)# snmp-server community snmprw manager unrestricted
Then verify this setting with:
(config)# show snmp-server
The result should be something like:
SNMP Communities Community Name MIB View Write Access ---------------- -------- ------------ snmprw Manager Unrestricted
Configure the IP authorized managers to include the IP address of the host running sFlowTrend-Pro:
(config)# ip authorized-managers 10.1.2.5
Then verify this setting with:
(config)# show ip authorized-managers
The result should be something like:
IP Managers Authorized Manager IP IP Mask Access Level ---------------------- ---------------------- ------------- 10.1.2.5 255.255.255.255 Manager