Brocade Fabric OS Command Reference (Supporting Fabric OS v7.3.0) User Manual

Page 1102

Advertising
background image

1072

Fabric OS Command Reference

53-1003131-01

snmpConfig

2

Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]

Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (1..4) [2]

Engine ID: [0:0:0:0:0:0:0:0:0]

User (ro): [snmpuser3]

Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]

Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (1..4) [2]

Engine ID: [0:0:0:0:0:0:0:0:0]

SNMPv3 trap recipient configuration:

Trap Recipient's IP address : [0.0.0.0]

Trap Recipient's IP address : [10.32.147.6]

UserIndex: (1..6) [2]

Trap recipient Severity level : (0..5) [5]

Trap recipient Port : (0..65535) [162]

Trap Recipient's IP address : [0.0.0.0]

Trap Recipient's IP address : [0.0.0.0]

Trap Recipient's IP address : [0.0.0.0]

Trap Recipient's IP address : [0.0.0.0]

To block access to SNMPv1/2c

switch:admin> snmpconfig --disable snmpv1

switch:admin> snmpconfig --show

SNMPv1 community and trap recipient configuration:

Community 1: ram (rw)

Trap recipient: 172.26.4.84

Trap port: 162

Trap recipient Severity level: 5

Community 2: OrigEquipMfr (rw)

No trap recipient configured yet

Community 3: private (rw)

No trap recipient configured yet

Community 4: public (ro)

No trap recipient configured yet

SNMPv1:Disabled

REFERENCES

Refer to the following publications for further information on SNMP:

SW_v5_x.mib, "Switch Management Information & Switch Enterprise Specific Trap"

RFC1157, "A Simple Network Management Protocol (SNMPv1)"

RFC1213, "Management information Base for Network Management of TCP/IP-based internets:
MIB-II"

RFC2574, "User-based Security Model (USM) for version 3 of the Simple Network Management
Protocol (SNMPv3)"

SEE ALSO

None

Advertising