Dell Force10 S4810P Reference Manual page 1484

Ftos command line reference guide for the s4810 system ftos 9.1.(0.0)
Hide thumbs Also See for Force10 S4810P:
Table of Contents

Advertisement

Version 8.3.7.0
Version 7.6.1.0
Version 7.5.1.0
pre-Version
6.2.1.1
Usage
The Example below configures a community named
Information
named
The security-name parameter maps the community string to an SNMPv3 user/security
name as defined by the community MIB.
If a community string is configured without a security-name (for example, snmp-
server community public ro), the community is mapped to a default security-name/
group:
This command is indexed by the community-name parameter.
If you do not configure the snmp-server community command, you cannot query SNMP
data. Only Standard IPv4 ACL and IPv6 ACL is supported in the optional access-list-
name.
The command options ipv6, security-name, and access-list-name are recursive.
In other words, each option can, in turn, accept any of the three options as a sub-option, and
each of those sub-options can accept any of the three sub-options as a sub-option, and so
forth. The second Example shows the creation of a standard IPv4 ACL called
then assigning it to the SNMP community
Example
FTOS#config
FTOS(conf)# snmp-server community public ro
FTOS(conf)# snmp-server community guest ro security-name
guestuser
FTOS(conf)#
Example
FTOS(conf)# ip access-list standard snmp-ro-acl
FTOS(config-std-nacl)#seq 5 permit host 10.10.10.224
FTOS(config-std-nacl)#seq 10 deny any count
!
FTOS(conf)#snmp-server community guest ro snmp-ro-acl
FTOS(conf)#
Related
ip access-list standard
Commands
address.
ipv6 access-list
show running-config
1484
Introduced on the S4810.
Introduced on the S-Series.
Introduced on the C-Series.
Introduced on the E-Series.
guestuser with Read Only (ro) permissions.
v1v2creadu / v1v2creadg — maps to a community with ro (read-only)
permissions.
v1v2cwriteu/ v1v2cwriteg — maps to a community with rw (read-write)
permissions.
NOTE: For IPv6 ACLs, only IPv6 and UDP types are valid for SNMP; TCP and ICMP rules
are not valid for SNMP. In IPv6 ACLs, port rules are not valid for SNMP.
– names (or selects) a standard access list to filter based on IP
– configures an access list based on IPv6 addresses or protocols.
snmp – displays the current SNMP configuration and defaults.
public that is mapped to the security
guest .
snmp-ro-acl and

Advertisement

Table of Contents
loading

Table of Contents