Users Guide

Field Description
Test Action Forwards a test trap to the specied destination using the
specied community string.
SNMP V3 Conguration
The following table describes the elds displayed in the SNMP V3 Conguration.
Table 198. SNMP V3 Conguration
Field Description
Agent IP Address Provide the SNMP agent IP address.
Engine ID Provide the unique engine ID of the SNMP agent.
Username Provide the user name required to execute the task on the
device.
Authentication Protocol Select the authentication protocol for the discovery of the
devices. The available options are MD5, SHA1, and none. The
device must be congured using the same authentication
protocol for the discovery to be successful. If the authentication
protocol is selected to be none, then the encryption option is
also disabled.
Authentication Password Provide the authentication password.
Encryption Protocol Select the encryption protocol for the discovery of the devices.
The available options are AES, DES, and none. The device must
be congured using the same encryption protocol for the
discovery to be successful.
Encryption Password Provide the encryption password.
Refresh Click to refresh the SNMP V3 Conguration page to display the
added SNMP V3 traps.
Add New Click to congure the SNMP V3 traps manually.
Import Click to import the .csv le containing the SNMP V3 trap
credentials.
Export Click to export the SNMP V3 trap credentials to a .csv le.
Save Click to save the SNMP V3 traps after importing the credentials
from a .csv le or by providing the credentials manually.
Delete Click to delete the selected SNMP V3 traps from the list.
SNMP V3 Conguration Wizard
Table 199. SNMP V3 Conguration Wizard
Field Description
Agent IP Address Provide the SNMP agent IP address.
Engine ID Provide the unique engine ID of the SNMP agent.
Username Provide the user name required to execute the task on the
device.
Authentication Protocol Select the authentication protocol for the discovery of the
devices. The available options are MD5, SHA1, and none. The
device must be congured using the same authentication
protocol for the discovery to be successful. If the authentication
protocol is selected to be none, then the encryption option is
also disabled.
263