- Try:
snmpwalk 147.252.133.149 public .iso.org.dod.internet.private.enterprises.breezecom.breezecomPrvRev.brznetmib.brzWlan.brzWlanParams.brzMaxRate
Result:
enterprises.breezecom.breezecomPrvRev.brznetmib.brzWlan.brzWlanParams.brzMaxRate.0 = INTEGER: 3
-
Network traffic:
12:58:48.249472 147.252.133.130.1027 > 147.252.133.149.snmp: GetNextRequest(31) .1.3.6.1.4.1.710.3.2.3.1.1
12:58:48.267173 147.252.133.149.snmp > 147.252.133.130.1027: GetResponse(33) .1.3.6.1.4.1.710.3.2.3.1.1.0=3 (DF)
12:58:48.279328 147.252.133.130.1027 > 147.252.133.149.snmp: GetNextRequest(32) .1.3.6.1.4.1.710.3.2.3.1.1.0
12:58:48.297271 147.252.133.149.snmp > 147.252.133.130.1027: GetResponse(33) .1.3.6.1.4.1.710.3.2.3.1.2.0=1 (DF)
- Try:
snmpwalk 147.252.133.149 public .1.3.6.1.4.1.710.3.2.3.1.1
Result:
enterprises.breezecom.breezecomPrvRev.brznetmib.brzWlan.brzWlanParams.brzMaxRate.0 = INTEGER: 3
-
Network traffic:
13:00:44.247344 147.252.133.130.1027 > 147.252.133.149.snmp: GetNextRequest(31) .1.3.6.1.4.1.710.3.2.3.1.1
13:00:44.265134 147.252.133.149.snmp > 147.252.133.130.1027: GetResponse(33) .1.3.6.1.4.1.710.3.2.3.1.1.0=3 (DF)
13:00:44.277608 147.252.133.130.1027 > 147.252.133.149.snmp: GetNextRequest(32) .1.3.6.1.4.1.710.3.2.3.1.1.0
13:00:44.295515 147.252.133.149.snmp > 147.252.133.130.1027: GetResponse(33) .1.3.6.1.4.1.710.3.2.3.1.2.0=1 (DF)
- Try:
snmpset 147.252.133.149 public .iso.org.dod.internet.private.enterprises.breezecom.breezecomPrvRev.brznetmib.brzWlan.brzWlanParams.brzMaxRate i 2
Result:
Error in packet.
Reason: There is no such variable name in this MIB.
This name doesn't exist:
enterprises.breezecom.breezecomPrvRev.brznetmib.brzWlan.brzWlanParams.brzMaxRate
-
Network traffic:
13:04:22.828409 147.252.133.130.1027 > 147.252.133.149.snmp: SetRequest(32) .1.3.6.1.4.1.710.3.2.3.1.1=2
13:04:22.844707 147.252.133.149.snmp > 147.252.133.130.1027: GetResponse(34) noSuchName@1 .1.3.6.1.4.1.710.3.2.3.1.1[err objVal!=NULL]2 (DF)
Local service terminal output:
MOD=0x1F. EV=0x110. SVR=0x00. error {NoAccess} on object: <.1.3.6.1.4.1.710.3.2>
- Try:
snmpset 147.252.133.149 private .iso.org.dod.internet.private.enterprises.breezecom.breezecomPrvRev.brznetmib.brzWlan.brzWlanParams.brzMaxRate i 2
Result:
Error in packet.
Reason: The value given has the wrong type or length
-
Network traffic:
13:08:37.575467 147.252.133.130.1027 > 147.252.133.149.snmp: C=private SetRequest(32) .1.3.6.1.4.1.710.3.2.3.1.1=2
13:08:37.592099 147.252.133.149.snmp > 147.252.133.130.1027: C=private GetResponse(34) badValue@1 .1.3.6.1.4.1.710.3.2.3.1.1[err objVal!=NULL]2 (DF)
Local service terminal output:
MOD=0x1F. EV=0x110. SVR=0x00. error {NoCreation} on object: <.1.3.6.1.4.1.710.3>
- Try:
snmpset 147.252.133.149 private .iso.org.dod.internet.private.enterprises.breezecom.breezecomPrvRev.brznetmib.brzWlan.brzWlanParams.brzMaxRate o 2
Result:
Error in packet.
Reason: The value given has the wrong type or length
-
Network traffic:
13:12:04.658081 147.252.133.130.1027 > 147.252.133.149.snmp: C=private SetRequest(37) .1.3.6.1.4.1.710.3.2.3.1.1=.1.3.6.1.2.1.2
13:12:04.674643 147.252.133.149.snmp > 147.252.133.130.1027: C=private GetResponse(39) badValue@1 .1.3.6.1.4.1.710.3.2.3.1.1[err objVal!=NULL].1.3.6.1.2.1.2 (DF)
Local service terminal output:
MOD=0x1F. EV=0x110. SVR=0x00. error {WrongType} on object: <.1.3.6.1.4.1.710.3.>
- Try:
from perl it works
-
Network traffic:
17:17:28.273570 147.252.133.130.1046 > 147.252.133.149.snmp: C=private SetRequest(38) .1.3.6.1.4.1.710.3.2.3.1.1.0=3
17:17:28.291190 147.252.133.149.snmp > 147.252.133.130.1046: C=private GetResponse(38) .1.3.6.1.4.1.710.3.2.3.1.1.0=3 (DF)
- Try:
And from shell finally also (error was missing object id):
snmpset 147.252.133.149 private .1.3.6.1.4.1.710.3.2.3.1.1.0 i 2
Result:
enterprises.710.3.2.3.1.1.0 = 2
-
Network traffic:
17:24:37.155948 147.252.133.130.1050 > 147.252.133.149.snmp: C=private SetRequest(38) .1.3.6.1.4.1.710.3.2.3.1.1.0=2
17:24:37.173858 147.252.133.149.snmp > 147.252.133.130.1050: C=private GetResponse(38) .1.3.6.1.4.1.710.3.2.3.1.1.0=2 (DF)
Note:This shows also an example, that the security inside SNMP is not
existing, guessing the right community name makes the device open to
manipulation. And even worse, sniffing the Ethernet traffic, during remote
administration opens all... Hence at least an firewall to UDP port 161 from
outside is a MUST !