Command Line Reference Guide
Command History
Version 9.0(1.3) Introduced on the S5000.
Usage
Information
For this snmp-server trap-source command to be enabled, you must configure an IP
address on the interface and enable the interface configured as an SNMP trap source.
Related
Commands
snmp-server community – sets the community string.
snmp-server user
Configure a new user to an SNMP group.
S5000
Syntax
snmp-server user name {group_name remote ip-address udp-port
port-number} [1 | 2c | 3] [encrypted] [auth {md5 | sha} auth-
password] [priv des56 priv password] [access access-list-name |
ipv6 access-list-name | access-list-name ipv6 access-list-name]
To remove a user from the SNMP group, use the no snmp-server user name
{group_name remote ip-address udp-port port-number} [1 | 2c |
3] [encrypted] [auth {md5 | sha} auth-password] [priv des56
priv password] [access access-list-name | ipv6 access-list-name
| access-list-name ipv6 access-list-name] command.
Parameters
name
Enter the name of the user (not to exceed 20 characters), on the host
that connects to the agent.
group_name
Enter a text string (up to 20 characters long) as the name of the group.
The following groups are created for mapping to read/write
community/security-names (defaults):
• v1v2creadu — maps to a community with ro permissions.
• 1v2cwriteu — maps to a community rw permissions.
remote
ip-
address
Enter the keywords udp-port followed by the user datagram
protocol (UDP) port number on the remote device. The range is 0 to
65535. The default is 162.
udp-port
port-
number
Enter the keywords udp-port followed by the UDP (User Datagram
Protocol) port number on the remote device. The range is 0 to 65535.
The default is 162.
1 | 2c | 3 (OPTIONAL) Enter the security model version number (1, 2c, or 3):
• 1 is the least secure version.
• 3 is the most secure of the security modes.
• 2c allows transmission of informs and counter 64, which
allows for integers twice the width of what is normally
allowed.
1203