Setup Guide

Table Of Contents
Version Description
9.2(1.0) Introduced on the Z9500.
9.0.2.0 Introduced on the S6000.
8.3.19.0 Introduced on the S4820T.
8.3.11.1 Introduced on the Z9000.
8.3.7.0 Introduced on the S4810.
7.6.1.0 Introduced on the S-Series.
7.5.1.0 Introduced on the C-Series.
E-Series legacy
command
Usage
Information
Changing the value of the SNMP Engine ID has important side effects. A users password (entered on
the command line) is converted to a message digest algorithm (MD5) or secure hash algorithm (SHA)
security digest. This digest is based on both the password and the local Engine ID. The command line
password is then destroyed, as required by RFC 2274. Because of this deletion, if the local value of
the Engine ID changes, the security digests of SNMPv3 users is invalid and the users will have to be
reconfigured.
For the remote Engine ID, the host IP and UDP port are the indexes to the command that are matched to
either overwrite or remove the configuration.
Related
Commands
show snmp engineID displays the SNMP engine and all the remote engines that are configured on
the router.
show running-config snmp displays the SNMP running configuration.
snmp-server group
Configure a new SNMP group or a table that maps SNMP users to SNMP views.
Syntax
snmp-server group [group_name {1 | 2c | 3 {auth | noauth | priv}}] [read
name] [write name] [notify name] [access access-list-name | ipv6 access-
list-name | access-list-name ipv6 access-list-name]]
To remove a specified group, use the no snmp-server group [group_name {v1 | v2c |
v3 {auth | noauth | priv}}] [read name] [write name] [notify name] [access
access-list-name | ipv6 access-list-name | access-list-name ipv6 access-
list-name]] command.
Parameters
group_name
Enter a text string (up to 20 characters long) as the name of the group. The
following groups are created for mapping to read/write community/security-names
(defaults):
v1v2creadg maps to a community/security-name with ro permissions.
1v2cwriteg maps to a community/security-name rw permissions.
1 | 2c | 3 (OPTIONAL) Enter the security model version number (1, 2c, or 3):
1 is the least secure version.
3 is the most secure of the security modes.
2c allows transmission of informs and counter 64, which allows for integers
twice the width of what is normally allowed.
The default is 1.
auth (OPTIONAL) Enter the keyword auth to specify authentication of a packet
without encryption.
noauth (OPTIONAL) Enter the keyword noauth to specify no authentication of a packet.
Simple Network Management Protocol (SNMP) and Syslog 1381