Reference Guide

Usage
Information
Changing the value of the SNMP Engine ID has important side effects. A user's password
(entered on the command line) is converted to an message digest algorithm (MD5) or secure
hash algorithm (SHA) security digest. This digest is based on both the password and the local
Engine ID. The command line password is then destroyed, as required by RFC 2274. Because of
this deletion, if the local value of the Engine ID changes, the security digests of SNMPv3 users
will be invalid and the users will have to be reconfigured.
For the remote Engine ID, the host IP and UDP port are the indexes to the command that are
matched to either overwrite or remove the configuration.
Related
Commands
show snmp engineID – displays the SNMP engine and all the remote engines that are
configured on the router.
show running-config snmp – displays the SNMP running configuration.
snmp-server group
Configure a new SNMP group or a table that maps SNMP users to SNMP views.
C-Series, E-Series, S-Series, Z-Series
Syntax
snmp-server group [group_name {1 | 2c | 3 {auth | noauth |
priv}}] [read name] [write name] [notify name] [access access-
list-name | ipv6 access-list-name | access-list-name ipv6
access-list-name]]
To remove a specified group, use the no snmp-server group [group_name {v1 |
v2c | v3 {auth | noauth | priv}}] [read name] [write name]
[notify name] [access access-list-name | ipv6 access-list-name
| access-list-name ipv6 access-list-name]] command.
Parameters
group_name
Enter a text string (up to 20 characters long) as the name of the group.
The following groups are created for mapping to read/write
community/security-names (defaults):
v1v2creadg — maps to a community/security-name with
ro permissions.
1v2cwriteg — maps to a community/security-name rw
permissions.
1 | 2c | 3 (OPTIONAL) Enter the security model version number (1, 2c, or 3):
1 is the least secure version.
3 is the most secure of the security modes.
2c allows transmission of informs and counter 64, which
allows for integers twice the width of what is normally
allowed.
The default is 1.
auth (OPTIONAL) Enter the keyword auth to specify authentication of a
packet without encryption.
1510