Snmp Version 1 And Version 2C; Adding A Community String; Deleting A Community String; Snmp Version 3 - Cisco DS-C9216I-K9 Configuration Manual

Switch guide
Table of Contents

Advertisement

About SNMP Security

SNMP Version 1 and Version 2c

SNMPv1 and SNMPv2c use a community string match for user authentication. Community strings
provided a weak form of access control in earlier versions of SNMP. SNMPv3 provides much improved
access control using strong authentication and should be preferred over SNMPv1 and SNMPv2c
wherever it is supported.

Adding a Community String

To add a community string, follows these steps:
From Fabric Manager, choose Security > SNMP from the Physical pane menu and click the
Step 1
Communities tab in the Information pane.
From Device Manager, choose SNMP > Security and click the Communities tab.
Click Create on the Device Manager dialog box, or click Create Row on the Fabric Manager toolbar.
Step 2
The Create Community string dialog box displays. (The dialog box from Fabric Manager also provides
check boxes to specify one or more switches.)
Enter the community name in the Community field.
Step 3
Step 4
Choose the role from the drop-down list. In Fabric Manager, you can enter a new role name in the field
if you do not want to choose one from the list. If you enter a new role name, you must go back and
configure this role appropriately (see the
Click Create to create the new entry or click Close to create the entry and close the dialog box.
Step 5

Deleting a Community String

To delete a community string, follows these steps:
From Fabric Manager, select Security > SNMP from the Physical pane menu and click the
Step 1
Communities tab in the Information pane.
From Device Manager, choose SNMP > Security and click the Communities tab.
Click once to highlight the name of the community you want to delete.
Step 2
Click Delete (Device Manager) or the Delete Row icon (Fabric Manager).
Step 3

SNMP Version 3

SNMPv3 is an interoperable standards-based protocol for network management. SNMPv3 provides
secure access to devices by a combination of authenticating and encrypting frames over the network. The
security features provided in SNMPv3 are:
Cisco MDS 9000 Fabric Manager Switch Configuration Guide
18-14
Message integrity—Ensures that a packet has not been tampered with in-transit.
Authentication—Determines the message is from a valid source.
Encryption—Scrambles the packet contents to prevent it from being seen by unauthorized sources.
"Configuring Common Roles" section on page
Chapter 18
Configuring Switch Security
18-16).
OL-7753-01

Advertisement

Table of Contents
loading

Table of Contents