Snmp login control configuration example, Network requirements – H3C Technologies H3C SecBlade LB Cards User Manual

Page 99

Advertising
background image

89

Step Command

Remarks

2.

Create a basic ACL and
enter its view, or enter the

view of an existing basic
ACL.

acl [ ipv6 ] number acl-number [ name name ]
[ match-order { config | auto } ]

By default, no basic
ACL exists.

3.

Configure an ACL rule.

rule [ rule-id ] { deny | permit } [ counting |
fragment | logging | source { sour-addr

sour-wildcard | any } | time-range

time-range-name | vpn-instance
vpn-instance-name ] *

N/A

4.

Exit the basic ACL view.

quit

N/A

5.

Apply the ACL to an
SNMP community, group,

or user.

SNMPv1/v2c community:
snmp-agent community { read | write }

community-name [ mib-view view-name ] [ acl

acl-number | acl ipv6 ipv6-acl-number ] *

SNMPv1/v2c group:

snmp-agent group { v1 | v2c } group-name

[ read-view read-view ] [ write-view write-view ]
[ notify-view notify-view ] [ acl acl-number | acl

ipv6 ipv6-acl-number ] *

SNMPv3 group:
snmp-agent group v3 group-name

[ authentication | privacy ] [ read-view

read-view ] [ write-view write-view ]

[ notify-view notify-view ] [ acl acl-number | acl
ipv6 ipv6-acl-number ] *

SNMPv1/v2c user:
snmp-agent usm-user { v1 | v2c } user-name

group-name [ acl acl-number | acl ipv6

ipv6-acl-number ] *

SNMPv3 user:

snmp-agent usm-user v3 user-name

group-name [ [ cipher ] authentication-mode

{ md5 | sha } auth-password [ privacy-mode
{ 3des | aes128 | des56 } priv-password ] ] [ acl

acl-number | acl ipv6 ipv6-acl-number ] *

For more information
about SNMP, see

System Maintenance

Configuration Guide.

SNMP login control configuration example

Network requirements

Configure the LB product in

Figure 53

to allow Host A and Host B to access LB through SNMP.

Advertising
This manual is related to the following products: