SlideShare a Scribd company logo
How to simulate network devices
using the Verax SNMP Simulator
(Linux/Windows)
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
Table of contents
Abstract ........................................................................................................................................... 3
1. Verax SNMP Simulator installation .......................................................................................... 4
2. Extracting SNMP record files from a physical device .............................................................. 6
3. Adding device to the list of simulated devices in SNMP simulator ....................................... 7
4. Starting the Verax SNMP Simulator ......................................................................................... 8
5. Adding simulated device to the Verax NMS .......................................................................... 10
APPENDIX...................................................................................................................................... 12

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 2 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
Abstract
This publication provides an overview on how to simulate devices using the Verax SNMP Simulator and it’s
intended for developers implementing SNMP solutions, QA specialists involved in testing SNMP tools or
other IT personnel involved in maintenance, testing and demonstrating SNMP tools, such as network
management systems.

Agenda
1.
2.
3.
4.
5.

Verax SNMP Simulator installation
Extracting SNMP record files from a physical device
Adding a device to the list of simulated devices in SNMP Simulator
Starting the Verax SNMP Simulator
Adding a simulated device to Verax NMS

System requirements
•

32 or 64 bit Linux distributions including: SuSE, RedHat Enterprise and Debian using i386 and x64
architectures.

•

32 or 64 bit Microsoft Windows systems including: XP, Server 2003, Vista, 7 and higher.

•

RAM: at least 128 MB (depending on the number of simulated SNMP agents).

•

Disk space: at least 100 MB (depending on the number of simulated SNMP agents).

•

TCP/IP network connection.

•

Java 1.6 or higher installed.

Notation used
The following logotypes are used to flag information relevant to a particular operating system:

LINUX
WIN

Linux

Microsoft Windows

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 3 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
1. Verax SNMP Simulator installation
In order to install the Verax SNMP Simulator, perform the following actions:
1. Download the Verax SNMP Agent Simulator package.
2. Unzip the package content to the installation directory (the directory must be created manually).
Recommended installation directory for the simulator is:

LINUX

WIN

/usr/local/vxsnmpsimulator

C:/Program Files/vxsnmpsimulator

3. Create and move simulator.conf file to the following directory:

LINUX
WIN

/etc/verax.d/

%SYSTEMROOT%etcverax.d
(where %SYSTEMROOT% indicates location where Windows system is installed;
usually C:Windows)

4. Open the simulator.conf file, find the line with the SIMULATOR_HOME variable and change the
variable to point to the installation directory, e.g.
SIMULATOR_HOME=/usr/local/vxsnmpsimulator
SIMULATOR_HOME= C:"Program Files"vxsnmpsimulator

5. Open the simulator.conf file and make sure that java.exe is in the PATH environment variable or
specify which java to use by setting the JRE_HOME variable in simulator.conf, e.g.
JRE_HOME=/usr/local/java/jdk1.6.0_14/bin/
JRE_HOME= C:"Program Files"Javajdk1.6.0_14bin

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 4 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
6. If running on Linux, pay attention to the name of the interface (e.g. 'eth1') which is used to create
interface aliases (e.g. 'eth1:0', 'eth1:1', etc.). The primary interface must be present before the Verax
SNMP Simulator starts, e.g.
PRIMARY_INTERFACE='eth1'
7. If running on Linux, copy the simulatord file to the /etc/init.d directory.
8. If running on Linux, give execute permission to the following files:
•
•
•
•

chmod +x /etc/init.d/simulatord
chmod +x /usr/local/vxsnmpsimulator/conf/stop
chmod +x /usr/local/vxsnmpsimulator/conf/vlan_up
chmod +x /usr/local/vxsnmpsimulator/conf/vlan_down

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 5 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
2. Extracting SNMP record files from a physical device
Extracting SNMP record files from a physical device can be done using the snmpwalk command. Therefore,
in order to extract SNMP record files from an existing device, the SNMP tools allowing for executing
snmpwalk command should be installed, e.g. NET-SNMP.
NET-SNMP can be downloaded for free from: http://sourceforge.net/projects/net-snmp
1. Open the Command Line and go to the NET-SNMP installation directory (e.g. C:userbin).
2. If running on Linux, open the terminal window (shell).

3. If running on Windows, open the Command Line and go to the NET-SNMP installation directory (e.g.
C:userbin).
4. In order to prepare SNMP record file reflecting actual SNMP agent available at given IP address, use
the SNMP tools and issue the following command:
snmpwalk -On -Oe -OU -v2c -c public address > [destination folder]filename.txt
e.g.
snmpwalk -On -Oe -OU -v2c -c public 192.168.100.8 > C:”Program Files”vxsnmpsimulatordevice
cisco-snmprecordfile.txt
5. The cisco-snmprecordfile.txt file containing OIDs of the real device will be stored in the device
directory.

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 6 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
3. Adding device to the list of simulated devices in SNMP simulator
1. Go to the vxsnmpsimulator directory.
2. Navigate to the conf directory, open devices.conf.xml, and add a new <type> record for a simulated
device.
3. In order to add a new device, you have to provide a path to a recently generated file (ciscosnmprecordfile.txt) and add a new IP address. Remember that the new IP address must be virtual
(see APPENDIX).
e.g.

<type filepath="..devicecisco-snmprecordfile.txt)">
<devices>
<device ip="192.168.160.34" netmask="24" port="161"></device>
</devices>
</type>

4. The cisco-snmprecordfile.txt file containing OIDs of the real device will be stored in the device
directory.

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 7 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
4. Starting the Verax SNMP Simulator
Before running the Verax SNMP Simulator, make sure that port 161 is available. If not, stop any process using
port 161.
1. In order to start the Verax SNMP Simulator, perform the following steps:

WIN

1. Run the simulator.bat.
2. A menu is displayed with the following options:
1. Start Simulator
2. Stop Simulator
3. Connect console to simulator
4. Show status
5. Quit
3. Choose option 1 (Start Simulator).

LINUX

Issue the following command in a terminal window (shell):
service simulatord start

Please note that starting the service initiates the process of loading network configuration and creating
virtual interfaces (on Linux).
All errors and main activities of the simulator service are logged into the application log file. The log file
SimulatorSNMP.log is located in the installation directory. On Linux, the simulation process runs as a
background daemon and can be managed as any other service (e.g. can be configured to be run upon
system startup). On Windows, it runs as a foreground process started by the simulator.bat batch file.
2. Connect console to simulator.

WIN

LINUX

Choose option 3 (Connect console to simulator).

Issue the following command in the terminal window shell:
service simulatord console

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 8 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
3. The Management Console will ask for connection details (it may connect to multiple simulators). By
default, the simulator service process is running on the same server as the Management Console – in
such a case confirm the default parameters by pressing “y” at the prompt:
Do you want to connect to default simulator server? [y/n]
The default connection parameters are 127.0.0.1:43500 (localhost as the host name and 43500 for
TCP port).
4. Use the SHOW command to list simulated devices.
5. A list of simulated devices is displayed.

Figure 1: List of simulated devices
6. Make sure your simulated devices are in the “Running” state. If not, check if the simulator is able to
bind the interface or examine the log file.

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 9 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
5. Adding simulated device to Verax NMS
To add a simulated device to Verax NMS, perform the following steps:
1. Make sure that SNMP simulator is started.
2. Open Verax NMS.
3. Navigate to the Network view using the main menu and select the Device list tab.

Figure 2: Devices list view
4. Select Add from the global action menu and click Go.
5. Once the data has been loaded, the edit window appears with the device attributes ready for input.
NOTE: Provide IP address of device simulated by SNMP simulator.

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 10 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)

Figure 3: Adding a new device dialog

6. Click the Add button.
7. System will ask whether to rediscover newly added device, click Yes to accept.
8. The device has been successfully added to the list of devices monitored by Verax NMS.

Figure 4: Simulated device view

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 11 of 12
DL749
How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
APPENDIX
How to configure Virtual IP Address in Windows XP/2000/ME/2003
Important: This procedure can be performed only by a user with admin privilege.
1. Click Start, select Settings and Network Connections.
2. Select Local Area Connection and click Properties.
3. In the Local Area Connection Properties dialog box, click Internet Protocol (TCP/IP), and then
Properties.
4. Click Advanced. The Advanced TCP/IP settings dialog box is displayed showing all configured IP
addresses.
5. Click Add below the IP Addresses section and add a new IP address along with a corresponding
subnet mask (you may add as many addresses as required).
6. Restart the system for changes to take effect.

Copyright © Verax Systems. All rights reserved.
All trademarks in this document are legal property of their owners.
www.veraxsystems.com

Page 12 of 12
DL749

More Related Content

What's hot

Automated Linux Management Infrastructure
Automated Linux Management InfrastructureAutomated Linux Management Infrastructure
Automated Linux Management Infrastructureelliando dias
 
Recommended Software and Modifications for Server Security
Recommended Software and Modifications for Server SecurityRecommended Software and Modifications for Server Security
Recommended Software and Modifications for Server Security
HTS Hosting
 
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
OlehLevytskyi1
 
Kernel_Crash_Dump_Analysis
Kernel_Crash_Dump_AnalysisKernel_Crash_Dump_Analysis
Kernel_Crash_Dump_AnalysisBuland Singh
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
Nutan Kumar Panda
 
OSDC 2018 | OPNsense: the “open” firewall for your datacenter by Thomas Niede...
OSDC 2018 | OPNsense: the “open” firewall for your datacenter by Thomas Niede...OSDC 2018 | OPNsense: the “open” firewall for your datacenter by Thomas Niede...
OSDC 2018 | OPNsense: the “open” firewall for your datacenter by Thomas Niede...
NETWAYS
 
Shell Shock (Bash Bug)
Shell Shock (Bash Bug)Shell Shock (Bash Bug)
Shell Shock (Bash Bug)
Kurapati Vishwak
 
ShellShock (Software BASH Bug)
ShellShock (Software BASH Bug)ShellShock (Software BASH Bug)
ShellShock (Software BASH Bug)
ViSolve, Inc.
 
Shellshock - A Software Bug
Shellshock - A Software BugShellshock - A Software Bug
Shellshock - A Software Bug
vwchu
 
Shutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esxShutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esx
moy725
 
Hardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix LinuxHardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix Linux
Security Session
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux Security
Michael Boman
 
Kdump and the kernel crash dump analysis
Kdump and the kernel crash dump analysisKdump and the kernel crash dump analysis
Kdump and the kernel crash dump analysis
Buland Singh
 
Metasploit Humla for Beginner
Metasploit Humla for BeginnerMetasploit Humla for Beginner
Metasploit Humla for Beginner
n|u - The Open Security Community
 
2 how to-build_document_management_system
2 how to-build_document_management_system2 how to-build_document_management_system
2 how to-build_document_management_system
Kichiemon Adachi
 
Building
BuildingBuilding
Building
Satpal Parmar
 
Linuxdd[1]
Linuxdd[1]Linuxdd[1]
Linuxdd[1]mcganesh
 
How to secure ubuntu 12.04
How to secure ubuntu 12.04 How to secure ubuntu 12.04
How to secure ubuntu 12.04 John Richard
 
Component pack 6006 install guide
Component pack 6006 install guideComponent pack 6006 install guide
Component pack 6006 install guide
Roberto Boccadoro
 

What's hot (20)

Automated Linux Management Infrastructure
Automated Linux Management InfrastructureAutomated Linux Management Infrastructure
Automated Linux Management Infrastructure
 
Recommended Software and Modifications for Server Security
Recommended Software and Modifications for Server SecurityRecommended Software and Modifications for Server Security
Recommended Software and Modifications for Server Security
 
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentationMacOS forensics and anti-forensics (DC Lviv 2019) presentation
MacOS forensics and anti-forensics (DC Lviv 2019) presentation
 
Kernel_Crash_Dump_Analysis
Kernel_Crash_Dump_AnalysisKernel_Crash_Dump_Analysis
Kernel_Crash_Dump_Analysis
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
 
OSDC 2018 | OPNsense: the “open” firewall for your datacenter by Thomas Niede...
OSDC 2018 | OPNsense: the “open” firewall for your datacenter by Thomas Niede...OSDC 2018 | OPNsense: the “open” firewall for your datacenter by Thomas Niede...
OSDC 2018 | OPNsense: the “open” firewall for your datacenter by Thomas Niede...
 
Shell Shock (Bash Bug)
Shell Shock (Bash Bug)Shell Shock (Bash Bug)
Shell Shock (Bash Bug)
 
ShellShock (Software BASH Bug)
ShellShock (Software BASH Bug)ShellShock (Software BASH Bug)
ShellShock (Software BASH Bug)
 
Shellshock - A Software Bug
Shellshock - A Software BugShellshock - A Software Bug
Shellshock - A Software Bug
 
Shutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esxShutdown agent for_v_mware_esx
Shutdown agent for_v_mware_esx
 
Hardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix LinuxHardening Linux and introducing Securix Linux
Hardening Linux and introducing Securix Linux
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux Security
 
Blast off!
Blast off!Blast off!
Blast off!
 
Kdump and the kernel crash dump analysis
Kdump and the kernel crash dump analysisKdump and the kernel crash dump analysis
Kdump and the kernel crash dump analysis
 
Metasploit Humla for Beginner
Metasploit Humla for BeginnerMetasploit Humla for Beginner
Metasploit Humla for Beginner
 
2 how to-build_document_management_system
2 how to-build_document_management_system2 how to-build_document_management_system
2 how to-build_document_management_system
 
Building
BuildingBuilding
Building
 
Linuxdd[1]
Linuxdd[1]Linuxdd[1]
Linuxdd[1]
 
How to secure ubuntu 12.04
How to secure ubuntu 12.04 How to secure ubuntu 12.04
How to secure ubuntu 12.04
 
Component pack 6006 install guide
Component pack 6006 install guideComponent pack 6006 install guide
Component pack 6006 install guide
 

Viewers also liked

systemd
systemdsystemd
systemd
Susant Sahani
 
Summit demystifying systemd1
Summit demystifying systemd1Summit demystifying systemd1
Summit demystifying systemd1Susant Sahani
 
Systemd for administrators
Systemd for administratorsSystemd for administrators
Systemd for administratorsSusant Sahani
 
Systemd
SystemdSystemd
Systemd
Susant Sahani
 

Viewers also liked (6)

systemd
systemdsystemd
systemd
 
Summit demystifying systemd1
Summit demystifying systemd1Summit demystifying systemd1
Summit demystifying systemd1
 
Systemd for administrators
Systemd for administratorsSystemd for administrators
Systemd for administrators
 
Systemd
SystemdSystemd
Systemd
 
Week3 binary trees
Week3 binary treesWeek3 binary trees
Week3 binary trees
 
Demo preorder-stack
Demo preorder-stackDemo preorder-stack
Demo preorder-stack
 

Similar to How to-simulate-network-devices

Install websphere message broker 8 RHEL 6 64 bits
Install websphere message broker 8 RHEL 6 64 bitsInstall websphere message broker 8 RHEL 6 64 bits
Install websphere message broker 8 RHEL 6 64 bits
Manuel Vega
 
Creating your own AtoM demo data set for re-use with Vagrant
Creating your own AtoM demo data set for re-use with VagrantCreating your own AtoM demo data set for re-use with Vagrant
Creating your own AtoM demo data set for re-use with Vagrant
Artefactual Systems - AtoM
 
Linux clustering solution
Linux clustering solutionLinux clustering solution
Linux clustering solution
Chanaka Lasantha
 
Addmi 03-addm prerequisites
Addmi 03-addm prerequisitesAddmi 03-addm prerequisites
Addmi 03-addm prerequisitesodanyboy
 
Network and Internet Security.docx
Network and Internet Security.docxNetwork and Internet Security.docx
Network and Internet Security.docx
stirlingvwriters
 
Unix Administration 2
Unix Administration 2Unix Administration 2
Unix Administration 2
Information Technology
 
Presentación1
Presentación1Presentación1
Presentación1
davidalbanc
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
 
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and ResultsSecurity Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
Igor Beliaiev
 
Installation of ubuntu, ns3 and compiling first
Installation of ubuntu, ns3 and compiling firstInstallation of ubuntu, ns3 and compiling first
Installation of ubuntu, ns3 and compiling first
Jawad Khan
 
Drupalcamp es 2013 drupal with lxc docker and vagrant
Drupalcamp es 2013  drupal with lxc docker and vagrant Drupalcamp es 2013  drupal with lxc docker and vagrant
Drupalcamp es 2013 drupal with lxc docker and vagrant Ricardo Amaro
 
How to monitor and manage Apache Tomcat
How to monitor and manage Apache TomcatHow to monitor and manage Apache Tomcat
How to monitor and manage Apache Tomcat
Egnyte
 
Netxms install guide
Netxms install guideNetxms install guide
Netxms install guideNaga Raju N
 
Jana treek 4
Jana treek 4Jana treek 4
Jana treek 4
Jana Treek
 
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
IGedeArieYogantaraSu
 
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSXTECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
Symantec
 
Ansible automation tool with modules
Ansible automation tool with modulesAnsible automation tool with modules
Ansible automation tool with modulesmohamedmoharam
 
NetSim Technology Library - Emulator
NetSim Technology Library - EmulatorNetSim Technology Library - Emulator
NetSim Technology Library - Emulator
Vishal Sharma
 

Similar to How to-simulate-network-devices (20)

Install websphere message broker 8 RHEL 6 64 bits
Install websphere message broker 8 RHEL 6 64 bitsInstall websphere message broker 8 RHEL 6 64 bits
Install websphere message broker 8 RHEL 6 64 bits
 
Creating your own AtoM demo data set for re-use with Vagrant
Creating your own AtoM demo data set for re-use with VagrantCreating your own AtoM demo data set for re-use with Vagrant
Creating your own AtoM demo data set for re-use with Vagrant
 
Linux clustering solution
Linux clustering solutionLinux clustering solution
Linux clustering solution
 
Addmi 03-addm prerequisites
Addmi 03-addm prerequisitesAddmi 03-addm prerequisites
Addmi 03-addm prerequisites
 
Network and Internet Security.docx
Network and Internet Security.docxNetwork and Internet Security.docx
Network and Internet Security.docx
 
Unix Administration 2
Unix Administration 2Unix Administration 2
Unix Administration 2
 
Presentación1
Presentación1Presentación1
Presentación1
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Security Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and ResultsSecurity Walls in Linux Environment: Practice, Experience, and Results
Security Walls in Linux Environment: Practice, Experience, and Results
 
Installation of ubuntu, ns3 and compiling first
Installation of ubuntu, ns3 and compiling firstInstallation of ubuntu, ns3 and compiling first
Installation of ubuntu, ns3 and compiling first
 
Drupalcamp es 2013 drupal with lxc docker and vagrant
Drupalcamp es 2013  drupal with lxc docker and vagrant Drupalcamp es 2013  drupal with lxc docker and vagrant
Drupalcamp es 2013 drupal with lxc docker and vagrant
 
How to monitor and manage Apache Tomcat
How to monitor and manage Apache TomcatHow to monitor and manage Apache Tomcat
How to monitor and manage Apache Tomcat
 
Netxms install guide
Netxms install guideNetxms install guide
Netxms install guide
 
Jana treek 4
Jana treek 4Jana treek 4
Jana treek 4
 
KCC_Final.pdf
KCC_Final.pdfKCC_Final.pdf
KCC_Final.pdf
 
Wissbi osdc pdf
Wissbi osdc pdfWissbi osdc pdf
Wissbi osdc pdf
 
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdfLaporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
Laporan Praktikum Keamanan Siber - Tugas 1 - Kelas C - Kelompok 3.pdf
 
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSXTECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
 
Ansible automation tool with modules
Ansible automation tool with modulesAnsible automation tool with modules
Ansible automation tool with modules
 
NetSim Technology Library - Emulator
NetSim Technology Library - EmulatorNetSim Technology Library - Emulator
NetSim Technology Library - Emulator
 

More from Susant Sahani

systemd
systemdsystemd
systemd
Susant Sahani
 
How to debug systemd problems fedora project
How to debug systemd problems   fedora projectHow to debug systemd problems   fedora project
How to debug systemd problems fedora project
Susant Sahani
 
Systemd vs-sys vinit-cheatsheet.jpg
Systemd vs-sys vinit-cheatsheet.jpgSystemd vs-sys vinit-cheatsheet.jpg
Systemd vs-sys vinit-cheatsheet.jpg
Susant Sahani
 
Systemd cheatsheet
Systemd cheatsheetSystemd cheatsheet
Systemd cheatsheet
Susant Sahani
 
Systemd for administrators
Systemd for administratorsSystemd for administrators
Systemd for administrators
Susant Sahani
 
Pdf c1t tlawaxb
Pdf c1t tlawaxbPdf c1t tlawaxb
Pdf c1t tlawaxb
Susant Sahani
 
Systemd mlug-20140614
Systemd mlug-20140614Systemd mlug-20140614
Systemd mlug-20140614
Susant Sahani
 
Systemd evolution revolution_regression
Systemd evolution revolution_regressionSystemd evolution revolution_regression
Systemd evolution revolution_regressionSusant Sahani
 
Interface between kernel and user space
Interface between kernel and user spaceInterface between kernel and user space
Interface between kernel and user spaceSusant Sahani
 
Van jaconson netchannels
Van jaconson netchannelsVan jaconson netchannels
Van jaconson netchannelsSusant Sahani
 
Synchronization linux
Synchronization linuxSynchronization linux
Synchronization linuxSusant Sahani
 
L kernel-logging-apis-pdf
L kernel-logging-apis-pdfL kernel-logging-apis-pdf
L kernel-logging-apis-pdfSusant Sahani
 
Introduction to freebsd_6_kernel_hacking
Introduction to freebsd_6_kernel_hackingIntroduction to freebsd_6_kernel_hacking
Introduction to freebsd_6_kernel_hackingSusant Sahani
 
Www.dedoimedo.com crash-book
Www.dedoimedo.com crash-bookWww.dedoimedo.com crash-book
Www.dedoimedo.com crash-bookSusant Sahani
 

More from Susant Sahani (19)

systemd
systemdsystemd
systemd
 
How to debug systemd problems fedora project
How to debug systemd problems   fedora projectHow to debug systemd problems   fedora project
How to debug systemd problems fedora project
 
Systemd vs-sys vinit-cheatsheet.jpg
Systemd vs-sys vinit-cheatsheet.jpgSystemd vs-sys vinit-cheatsheet.jpg
Systemd vs-sys vinit-cheatsheet.jpg
 
Systemd cheatsheet
Systemd cheatsheetSystemd cheatsheet
Systemd cheatsheet
 
Systemd for administrators
Systemd for administratorsSystemd for administrators
Systemd for administrators
 
Pdf c1t tlawaxb
Pdf c1t tlawaxbPdf c1t tlawaxb
Pdf c1t tlawaxb
 
Systemd mlug-20140614
Systemd mlug-20140614Systemd mlug-20140614
Systemd mlug-20140614
 
Systemd evolution revolution_regression
Systemd evolution revolution_regressionSystemd evolution revolution_regression
Systemd evolution revolution_regression
 
Systemd poettering
Systemd poetteringSystemd poettering
Systemd poettering
 
Interface between kernel and user space
Interface between kernel and user spaceInterface between kernel and user space
Interface between kernel and user space
 
Van jaconson netchannels
Van jaconson netchannelsVan jaconson netchannels
Van jaconson netchannels
 
Trees
TreesTrees
Trees
 
Synchronization linux
Synchronization linuxSynchronization linux
Synchronization linux
 
Bacnet white paper
Bacnet white paperBacnet white paper
Bacnet white paper
 
Api presentation
Api presentationApi presentation
Api presentation
 
L kernel-logging-apis-pdf
L kernel-logging-apis-pdfL kernel-logging-apis-pdf
L kernel-logging-apis-pdf
 
Introduction to freebsd_6_kernel_hacking
Introduction to freebsd_6_kernel_hackingIntroduction to freebsd_6_kernel_hacking
Introduction to freebsd_6_kernel_hacking
 
Www.dedoimedo.com crash-book
Www.dedoimedo.com crash-bookWww.dedoimedo.com crash-book
Www.dedoimedo.com crash-book
 
Sctp tutorial
Sctp tutorialSctp tutorial
Sctp tutorial
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 

How to-simulate-network-devices

  • 1. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)
  • 2. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) Table of contents Abstract ........................................................................................................................................... 3 1. Verax SNMP Simulator installation .......................................................................................... 4 2. Extracting SNMP record files from a physical device .............................................................. 6 3. Adding device to the list of simulated devices in SNMP simulator ....................................... 7 4. Starting the Verax SNMP Simulator ......................................................................................... 8 5. Adding simulated device to the Verax NMS .......................................................................... 10 APPENDIX...................................................................................................................................... 12 Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 2 of 12 DL749
  • 3. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) Abstract This publication provides an overview on how to simulate devices using the Verax SNMP Simulator and it’s intended for developers implementing SNMP solutions, QA specialists involved in testing SNMP tools or other IT personnel involved in maintenance, testing and demonstrating SNMP tools, such as network management systems. Agenda 1. 2. 3. 4. 5. Verax SNMP Simulator installation Extracting SNMP record files from a physical device Adding a device to the list of simulated devices in SNMP Simulator Starting the Verax SNMP Simulator Adding a simulated device to Verax NMS System requirements • 32 or 64 bit Linux distributions including: SuSE, RedHat Enterprise and Debian using i386 and x64 architectures. • 32 or 64 bit Microsoft Windows systems including: XP, Server 2003, Vista, 7 and higher. • RAM: at least 128 MB (depending on the number of simulated SNMP agents). • Disk space: at least 100 MB (depending on the number of simulated SNMP agents). • TCP/IP network connection. • Java 1.6 or higher installed. Notation used The following logotypes are used to flag information relevant to a particular operating system: LINUX WIN Linux Microsoft Windows Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 3 of 12 DL749
  • 4. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) 1. Verax SNMP Simulator installation In order to install the Verax SNMP Simulator, perform the following actions: 1. Download the Verax SNMP Agent Simulator package. 2. Unzip the package content to the installation directory (the directory must be created manually). Recommended installation directory for the simulator is: LINUX WIN /usr/local/vxsnmpsimulator C:/Program Files/vxsnmpsimulator 3. Create and move simulator.conf file to the following directory: LINUX WIN /etc/verax.d/ %SYSTEMROOT%etcverax.d (where %SYSTEMROOT% indicates location where Windows system is installed; usually C:Windows) 4. Open the simulator.conf file, find the line with the SIMULATOR_HOME variable and change the variable to point to the installation directory, e.g. SIMULATOR_HOME=/usr/local/vxsnmpsimulator SIMULATOR_HOME= C:"Program Files"vxsnmpsimulator 5. Open the simulator.conf file and make sure that java.exe is in the PATH environment variable or specify which java to use by setting the JRE_HOME variable in simulator.conf, e.g. JRE_HOME=/usr/local/java/jdk1.6.0_14/bin/ JRE_HOME= C:"Program Files"Javajdk1.6.0_14bin Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 4 of 12 DL749
  • 5. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) 6. If running on Linux, pay attention to the name of the interface (e.g. 'eth1') which is used to create interface aliases (e.g. 'eth1:0', 'eth1:1', etc.). The primary interface must be present before the Verax SNMP Simulator starts, e.g. PRIMARY_INTERFACE='eth1' 7. If running on Linux, copy the simulatord file to the /etc/init.d directory. 8. If running on Linux, give execute permission to the following files: • • • • chmod +x /etc/init.d/simulatord chmod +x /usr/local/vxsnmpsimulator/conf/stop chmod +x /usr/local/vxsnmpsimulator/conf/vlan_up chmod +x /usr/local/vxsnmpsimulator/conf/vlan_down Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 5 of 12 DL749
  • 6. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) 2. Extracting SNMP record files from a physical device Extracting SNMP record files from a physical device can be done using the snmpwalk command. Therefore, in order to extract SNMP record files from an existing device, the SNMP tools allowing for executing snmpwalk command should be installed, e.g. NET-SNMP. NET-SNMP can be downloaded for free from: http://sourceforge.net/projects/net-snmp 1. Open the Command Line and go to the NET-SNMP installation directory (e.g. C:userbin). 2. If running on Linux, open the terminal window (shell). 3. If running on Windows, open the Command Line and go to the NET-SNMP installation directory (e.g. C:userbin). 4. In order to prepare SNMP record file reflecting actual SNMP agent available at given IP address, use the SNMP tools and issue the following command: snmpwalk -On -Oe -OU -v2c -c public address > [destination folder]filename.txt e.g. snmpwalk -On -Oe -OU -v2c -c public 192.168.100.8 > C:”Program Files”vxsnmpsimulatordevice cisco-snmprecordfile.txt 5. The cisco-snmprecordfile.txt file containing OIDs of the real device will be stored in the device directory. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 6 of 12 DL749
  • 7. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) 3. Adding device to the list of simulated devices in SNMP simulator 1. Go to the vxsnmpsimulator directory. 2. Navigate to the conf directory, open devices.conf.xml, and add a new <type> record for a simulated device. 3. In order to add a new device, you have to provide a path to a recently generated file (ciscosnmprecordfile.txt) and add a new IP address. Remember that the new IP address must be virtual (see APPENDIX). e.g. <type filepath="..devicecisco-snmprecordfile.txt)"> <devices> <device ip="192.168.160.34" netmask="24" port="161"></device> </devices> </type> 4. The cisco-snmprecordfile.txt file containing OIDs of the real device will be stored in the device directory. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 7 of 12 DL749
  • 8. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) 4. Starting the Verax SNMP Simulator Before running the Verax SNMP Simulator, make sure that port 161 is available. If not, stop any process using port 161. 1. In order to start the Verax SNMP Simulator, perform the following steps: WIN 1. Run the simulator.bat. 2. A menu is displayed with the following options: 1. Start Simulator 2. Stop Simulator 3. Connect console to simulator 4. Show status 5. Quit 3. Choose option 1 (Start Simulator). LINUX Issue the following command in a terminal window (shell): service simulatord start Please note that starting the service initiates the process of loading network configuration and creating virtual interfaces (on Linux). All errors and main activities of the simulator service are logged into the application log file. The log file SimulatorSNMP.log is located in the installation directory. On Linux, the simulation process runs as a background daemon and can be managed as any other service (e.g. can be configured to be run upon system startup). On Windows, it runs as a foreground process started by the simulator.bat batch file. 2. Connect console to simulator. WIN LINUX Choose option 3 (Connect console to simulator). Issue the following command in the terminal window shell: service simulatord console Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 8 of 12 DL749
  • 9. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) 3. The Management Console will ask for connection details (it may connect to multiple simulators). By default, the simulator service process is running on the same server as the Management Console – in such a case confirm the default parameters by pressing “y” at the prompt: Do you want to connect to default simulator server? [y/n] The default connection parameters are 127.0.0.1:43500 (localhost as the host name and 43500 for TCP port). 4. Use the SHOW command to list simulated devices. 5. A list of simulated devices is displayed. Figure 1: List of simulated devices 6. Make sure your simulated devices are in the “Running” state. If not, check if the simulator is able to bind the interface or examine the log file. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 9 of 12 DL749
  • 10. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) 5. Adding simulated device to Verax NMS To add a simulated device to Verax NMS, perform the following steps: 1. Make sure that SNMP simulator is started. 2. Open Verax NMS. 3. Navigate to the Network view using the main menu and select the Device list tab. Figure 2: Devices list view 4. Select Add from the global action menu and click Go. 5. Once the data has been loaded, the edit window appears with the device attributes ready for input. NOTE: Provide IP address of device simulated by SNMP simulator. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 10 of 12 DL749
  • 11. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) Figure 3: Adding a new device dialog 6. Click the Add button. 7. System will ask whether to rediscover newly added device, click Yes to accept. 8. The device has been successfully added to the list of devices monitored by Verax NMS. Figure 4: Simulated device view Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 11 of 12 DL749
  • 12. How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) APPENDIX How to configure Virtual IP Address in Windows XP/2000/ME/2003 Important: This procedure can be performed only by a user with admin privilege. 1. Click Start, select Settings and Network Connections. 2. Select Local Area Connection and click Properties. 3. In the Local Area Connection Properties dialog box, click Internet Protocol (TCP/IP), and then Properties. 4. Click Advanced. The Advanced TCP/IP settings dialog box is displayed showing all configured IP addresses. 5. Click Add below the IP Addresses section and add a new IP address along with a corresponding subnet mask (you may add as many addresses as required). 6. Restart the system for changes to take effect. Copyright © Verax Systems. All rights reserved. All trademarks in this document are legal property of their owners. www.veraxsystems.com Page 12 of 12 DL749