D-Link xstack DGS-3612G Instruction Manual page 38

Layer 3 gigabit ethernet managed switch
Hide thumbs Also See for xstack DGS-3612G:
Table of Contents

Advertisement

show snmp engineID
Purpose
Syntax
Description
Parameters
Restrictions
Example usage:
To display the current name of the SNMP engine on the Switch:
DGS-3612G:4#show snmp engineID
Command: show snmp engineID
SNMP Engine ID : 0035636666
DGS-3612G:4#
create snmp group
Purpose
Syntax
Description
Parameters
xStack DGS-3612G Layer 3 Gigabit Ethernet Managed Switch CLI Manual
Used to display the identification of the SNMP engine on the Switch.
show snmp engineID
The show snmp engineID command displays the identification of
the SNMP engine on the Switch.
None.
None.
Used to create a new SNMP group, or a table that maps SNMP users to SNMP
views.
create snmp group <groupname 32> [v1 | v2c | v3 [noauth_nopriv |
auth_nopriv | auth_priv]] {read_view <view_name 32> | write_view
<view_name 32> | notify_view <view_name 32>}
The create snmp group command creates a new SNMP group, or a table that
maps SNMP users to SNMP views.
<groupname 32> − An alphanumeric name of up to 32 characters that will identify
the SNMP group with which the new SNMP user will be associated.
v1 – Specifies that SNMP version 1 will be used. The Simple Network Management
Protocol (SNMP), version 1, is a network management protocol that provides a
means to monitor and control network devices.
v2c – Specifies that SNMP version 2c will be used. The SNMP v2c supports both
centralized and distributed network management strategies. It includes
improvements in the Structure of Management Information (SMI) and adds some
security features.
v3 – Specifies that the SNMP version 3 will be used. SNMP v3 provides secure
access to devices through a combination of authentication and encrypting packets
over the network. SNMP v3 adds:
Message integrity − Ensures that packets have not been tampered
with during transit.
Authentication − Determines if an SNMP message is from a valid
source.
Encryption − Scrambles the contents of messages to prevent it
being viewed by an unauthorized source.
noauth_nopriv − Specifies that there will be no authorization and no encryption of
packets sent between the Switch and a remote SNMP manager.
auth_nopriv − Specifies that authorization will be required, but there will be no
encryption of packets sent between the Switch and a remote SNMP manager.
auth_priv − Specifies that authorization will be required, and that packets sent
between the Switch and a remote SNMP manger will be encrypted.
read_view – Specifies that the SNMP group being created can request SNMP
35

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents