Configuring Snmp Groups And Users - Cisco IE-4000 Software Configuration Manual

Industrial ethernet switch
Hide thumbs Also See for IE-4000:
Table of Contents

Advertisement

Configuring SNMP
How to Configure SNMP
Command
1.
configure terminal
2.
snmp-server community string
[view view-name] [ro | rw]
[access-list-number]
3.
access-list access-list-number
{deny | permit} source
[source-wildcard]
4.
end

Configuring SNMP Groups and Users

You can specify an identification name (engine ID) for the local or remote SNMP server engine on the switch. You can
configure an SNMP server group that maps SNMP users to SNMP views, and you can add new users to the SNMP group.
Purpose
Enters global configuration mode.
Configures the community string.
Note:
The @ symbol is used for delimiting the context information. Avoid
using the @ symbol as part of the SNMP community string when
configuring this command.
string—Specifies a string that acts like a password and permits access
to the SNMP protocol. You can configure one or more community
strings of any length.
(Optional) view—Specifies the view record accessible to the
community.
(Optional) Specifies either read-only (ro) if you want authorized
management stations to retrieve MIB objects, or specifies read-write
(rw) if you want authorized management stations to retrieve and
modify MIB objects. By default, the community string permits
read-only access to all objects.
(Optional) access-list-number—Specifies an IP standard access list
numbered from 1 to 99 and 1300 to 1999.
(Optional) If you specified an IP standard access list number in Step 2,
then create the list, repeating the command as many times as necessary.
access-list-number—Specifies the access list number specified in
Step 2.
deny — Denies access if the conditions are matched. The permit
keyword permits access if the conditions are matched.
source—Specifies the IP address of the SNMP managers that are
permitted to use the community string to gain access to the agent.
(Optional) source-wildcard—Specifies the wildcard bits in dotted
decimal notation to be applied to the source. Place ones in the bit
positions that you want to ignore.
The access list is always terminated by an implicit deny statement for
everything.
Returns to privileged EXEC mode.
535

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ie-5000Ie-4010

Table of Contents