Step
2.
Apply the ACL
to an SNMP
community,
group, or user.
Configuration example
Network requirements
Configure the device in
Figure 15 Network diagram
Configuration procedure
# Create an ACL to permit packets sourced from Host A and Host B.
<Sysname> system-view
Command
•
SNMP community:
snmp-agent community { read | write }
community-name [ mib-view view-name ] [ acl
acl-number | acl ipv6 ipv6-acl-number ] *
•
SNMPv1/v2c group:
snmp-agent group { v1 | v2c } group-name
[ read-view view-name ] [ write-view view-name ]
[ notify-view view-name ] [ acl acl-number | acl ipv6
ipv6-acl-number ] *
•
SNMPv3 group:
snmp-agent group v3 group-name [ authentication |
privacy ] [ read-view view-name ] [ write-view
view-name ] [ notify-view view-name ] [ acl acl-number
| acl ipv6 ipv6-acl-number ] *
•
SNMPv1/v2c user:
snmp-agent usm-user { v1 | v2c } user-name
group-name [ acl acl-number | acl ipv6
ipv6-acl-number ] *
•
SNMPv3 user:
snmp-agent usm-user v3 user-name group-name
[ remote { ip-address | ipv6 ipv6-address }
[ vpn-instance vpn-instance-name ] ] [ { cipher |
simple } authentication-mode { md5 | sha }
auth-password [ privacy-mode { aes128 | des56 }
priv-password ] ] [ acl acl-number | acl ipv6
ipv6-acl-number ] *
Figure 15
to allow Host A and Host B to access the device through SNMP.
38
Remarks
For more information
about SNMP, see
Network Management
and Monitoring
Configuration Guide.