Community strings are already configured on Management Center (MC) and a packet capture shows that MC not responding to snmpget nor snmpwalk.
You want to know how to configure configure SNMPv2 or SNMPv3 on Management Center to be polled by Network Management System (NMS)
SNMP polling against Management Center running version 2.0 and above.
Missing SNMP configuration on management center and/or ACL not allowing SNMP poll.
Management Center follows VACM base for SNMPv2c (RFC3415) and USM based (RFC3414) for SNMPv3 for Simple Network Management Protocol configuration.
By default Management Center's access control list (ACL) blocks SNMP requests.
configure terminal
snmp
agent version v2c
agent enable
community public
sec-name public
exit
vacm group bccm member public sec-model v2c
vacm view bcmc subtree 1.3 included
vacm group bccm access v2c no-auth-no-priv read-view bcmc
exit
configure terminal
snmp
agent version v3
agent enable
vacm group BCCM member sha-user sec-model usm
vacm view bcmc subtree 1.3 included
vacm group BCCM access usm auth-priv read-view bcmc
usm local user sha-user auth sha password publicv3
usm local user sha-user priv aes password publicv3
configure terminal
acl
rule 172.16.1.170/32 SNMP
exit
nms@
172.16.1.170$ snmpget -v2c -c public <IP.of.target.device> sysUpTimeInstance
nms@
172.16.1.170$ snmpwalk -v2c -c public <IP.of.target.device>
nms@
172.16.1.170$ snmpget -v3 -l authPriv -u sha-user -a sha -A "publicv3" -x AES -X "publicv3" <IP.of.target.device> hrSystemUptime
nms@
172.16.1.170$ snmpwalk -v3 -l authPriv -u sha-user -a sha -A "publicv3" -x AES -X "publicv3" <IP.of.target.device>
configure terminal
snmp
no vacm view bcmc subtree 1.3
no vacm group bccm
no community public
no agent version v2c
agent disable
configure terminal
snmp
no usm local user sha-user
no vacm view bcmc subtree 1.3
no vacm group BCCM
no agent version v3
agent disable
Further information for MC SNMP configuration and OIDs are available at Management Center SNMP Monitoring Best Practices .
MC MIB files can be download at Broadcom software portal under Management Center product
Tip: Identifying Management Center's OIDs can be pulled using snmp net tools
E.g.
<IP.of.target.device>
<IP.of.target.device>
"-m" load given list of MIBs (ALL loads everything)
"-On" print OIDs numerically
Note: Syntax may be different dependent on Linux distributions and/or snmp net tool version. Please refer to the snmp tools man page.