CLI Guide

snmp-server community
Congure a new community string access for SNMPv1 v2 and v3.
Syntax
snmp-server community community-name {ro | rw} [security-name name][access-
list-name]
To remove access to a community, use the no snmp-server community community-string {ro |
rw} [security-name name [access-list-name] command.
Parameters
community-name Enter a text string (up to 20 characters long) to act as a password for SNMP.
ro Enter the keyword ro to specify read-only permission.
rw Enter the keyword rw to specify read-write permission.
security-name
name
(Optional) Enter the keywords security-name then the security name as dened by
the community MIB.
access-list-name (Optional) Enter a standard IPv4 access list name (a string up to 16 characters long).
Defaults none
Command Modes CONFIGURATION
Supported Modes Full–Switch Mode
Command History
Version Description
9.9(0.0) Introduced on the FN IOM.
8.3.16.1 Introduced on the MXL 10/40GbE Switch IO Module.
Usage Information The following example congures a community named public that is mapped to the security named guestuser with
Read Only (ro) permissions.
The security-name parameter maps the community string to an SNMPv3 user/security name as dened by
the community MIB.
If a community string is congured without a security-name (for example, snmp-server community
public ro), the community is mapped to a default security-name/group:
v1v2creadu / v1v2creadg — maps to a community with ro (read-only) permissions.
v1v2cwriteu/ v1v2cwriteg — maps to a community with rw (read-write) permissions.
The community-name parameter indexes this command.
If you do not congure the snmp-server community command, you cannot query SNMP data. Only Standard
IPv4 ACL and IPv6 ACL is supported in the optional access-list-name.
The command options ipv6, security-name, and access-list-name are recursive. In other words, each
option can, in turn, accept any of the three options as a sub-option, and each of those sub-options can accept any
of the three sub-options as a sub-option, and so forth. The second Example shows the creation of a standard IPv4
ACL called snmp-ro-acl and then assigning it to the SNMP community guest.
NOTE: For IPv6 ACLs, only IPv6 and UDP types are valid for SNMP; TCP and ICMP rules are not valid
for SNMP. In IPv6 ACLs, port rules are not valid for SNMP.
1206 Simple Network Management Protocol (SNMP) and Syslog