Using SNMP to view and configure switch authentication features
hpSwitchAuth
) features. This means that the switches covered by this guide allow, by default, manager-only SNMP read/write access to a subset of the authentication MIB objects for the following features:
number of primary and secondary login and enable attempts
TACACS+ server configuration and status
RADIUS server configuration
selected 802.1X settings
key management subsystem chain configuration
key management subsystem key configuration
OSPF interface authentication configuration
local switch operator and manager usernames and passwords
With SNMP access to the
hpSwitchAuth
MIB enabled, a device with management access to the switch can view the configuration for the authentication features listed above (excluding usernames, passwords, and keys). Using SNMP sets, a management device can change the authentication configuration (including changes to usernames, passwords and keys). operator read/write access to the authentication MIB is always denied.
Regarding Security: All usernames, passwords, and keys configured in the
hpSwitchAuth
MIB are not returned through SNMP, and the response to SNMP queries for such information is a null string. However, SNMP sets can be used to configure username, password, and key MIB objects.
To help prevent unauthorized access to the switch authentication MIB, Hewlett Packard Enterprise recommends following the reviewing Viewing and changing the SNMP access configuration.
If you do not want to use SNMP access to the switch authentication configuration MIB, then use the
snmp-server mib hpswitchauthmib excluded
command to disable this access, as described in the next section.
If you choose to leave SNMP access to the security MIB open (the default setting), Hewlett Packard Enterprise recommends that you configure the switch with the SNMP version 3 management and access security feature, and disable SNMP version 2c access. See “SNMP access to the authentication configuration MIB.”