SNMPv3 access to the switch
SNMPv3 access requires an IP address and subnet mask configured on the switch. If you are using DHCP/Bootp to configure the switch, ensure that the DHCP/Bootp process provides the IP address.
Once you have configured an IP address, the main steps for configuring SNMPv3 access management features are the following:
- Enable SNMPv3 for operation on the switch.
- Configure the appropriate SNMP users.
- Configure the appropriate SNMP communities.
- Configure the appropriate trap receivers.
In some networks, authorized IP manager addresses are not used. In this case, all management stations using the correct User and community name may access the switch with the View and Access levels that have been set for that community. If you want to restrict access to one or more specific nodes, you can use the IP Authorized Manager feature for the switch. (See the access security guide.)
SNMP version 3 (SNMPv3) adds some new commands
to the CLI for configuring SNMPv3 functions. To enable SNMMPv3 operation
on the switch, use the snmpv3 enable
command. An
initial user entry will be generated with MD5 authentication and DES
privacy.
You may (optionally) restrict access to only
SNMPv3 agents by using the snmpv3 only
command.
To restrict write-access to only SNMPv3 agents, use the snmpv3
restricted-access
command.
Restricting access to only version 3 messages will make the community named “public” inaccessible to network management applications (such as autodiscovery, traffic monitoring, SNMP trap generation, and threshold setting) from operating in the switch.