SNMP

Why Use SNMP:

Procedures:

Note: The SNMP view, SNMP group, and SNMP users features are only available on the cryptographic version of the switch software image.

Tips on Using this Window:

  • Click the column headings to sort information.
  • Click Submit to save your changes.
  • Click Cancel to discard unsaved changes.

Back to the top

What Is SNMP

The switch supports Simple Network Management Protocol (SNMP) versions 1, 2C, and 3. SNMP is a protocol that allows the switch to be remotely managed through other network management software.

SNMP is based on three concepts: SNMP managers (or the management stations), SNMP agents (or the network devices), and the Management Information Base (MIB).

The SNMP manager runs SNMP management software. Network devices to be managed, such as bridges, routers, servers, and workstations, have an agent software module. The agent provides access to a local MIB of objects that reflects the resources and activity of the device. The agent also responds to manager commands to retrieve values from the MIB and to set values in the MIB. The agent and the MIB are on the switch. To configure SNMP, you define the relationship between the manager and the agent.

Both SNMPv1 and v2C use a community-based form of security. SNMP managers can access the agent MIB through passwords referred to as community strings. SNMPv1 and v2C are generally used for network monitoring without network control.

SNMPv3 provides network monitoring and control. It provides secure access to devices by a combination of authenticating and encrypting packets over the network. Note: SNMPv3 is only available on the cryptographic version of the switch software image.

The security model used by SNMPv3 is an authentication strategy that is set up for a user and the user's group. A security level is the permitted level of security within a security model. A combination of a security model and a security level determines which security mechanism is used for an SNMP packet.

Note the following about SNMPv3 objects:

  • Each user belongs to a group.
  • A group defines the access policy for a set of users.
  • An access policy defines which SNMP objects can be accessed for reading, writing, and creating.
  • A group determines the list of notifications that its users can receive.
  • A group also defines the security model and the security level for its users.
  • An SNMP view is a list of MIBs that a group can access.
  • Data can be securely collected from SNMP devices without fear of the data being tampered with or corrupted.
  • Confidential information, for example, SNMP Set command packets that change a router configuration, can be encrypted to prevent the contents from being exposed on the network.

Back to the top

System Options

Enable SNMP if you plan to have the switch managed through another network management application. To enable SNMP, click Enable on the main SNMP window. The default is that the Enable check box is not checked, meaning SNMP is disabled.

Other general SNMP settings include the name of the switch or the network administrator and the switch location. This information appears in the Switch Information area on the Dashboard.

System Contact The name of the administrator for the switch or network. The name can have up to 31 alphanumeric characters. The name cannot contain a ? or a tab.
System Location The location of the switch. The location can have up to 31 alphanumeric characters. The location name cannot contain a ? or a tab.

Back to the top

Create and Remove Community Strings

Community strings are passwords to the switch Management Information Base (MIB). You can create community strings that allow a remote manager read-only or read-write access to the switch.

To create a community string:

  1. Click Read-Only if the string should allow only read-only access to the switch.
    Click Read-Write if the string should allow read-write access to the switch.

    • The Read-Only community string enables the switch to validate Get (read-only) requests from a network management station. If you set the SNMP read community, users can access MIB objects, but cannot change them.
    • The Read-Write community string enables the switch to validate Set (read-write) requests from a network management station. If you set the SNMP write community, users can access and change MIB objects.

  2. Enter a community string in the New String field. The string can be up to 31 alphanumeric characters. The string cannot contain a ?, a space, or a tab. The Read community string and the Write community string cannot be the same.

  3. Click Add.

  4. Repeat Steps 1 to 3 until you have created all of your community strings.

  5. Click Submit to save your changes.

Back to the top

To remove community strings from the list:

  1. Highlight the string.
  2. Click Remove.

Back to the top

Display an SNMP View

Click the View tab to display the SNMP object identifiers (OIDs) of objects that can be accessed. This tab displays the v1default view, which provides access to all of the switch MIBs.

Back to the top

Display an SNMP Group

Click the Groups tab to display the attributes of the v1defaultGroup SNMP group.

Back to the top

Add, Change, and Delete SNMP Users

To add a user to the v1defaultGroup SNMP group:

  1. Click Create from the SNMP Users tab.

  2. Enter the name of a user. The string can be up to 31 alphanumeric characters. The string cannot contain a ?, a space, or a tab.

    Note: This field is required.

  3. Choose an authentication algorithm to protect the SNMP traffic.

    • None means that no security mechanism is required for SNMP packets.
    • MD5 means that authentication is based on the hash-based Message Authentication Code Message Digest 5 (HMAC-MD5) algorithm.
    • SHA means that authentication is based on the hash-based Message Authentication Code Secure Hash (HMAC-SHA) algorithm.

  4. Enter a password. The string can be up to 64 alphanumeric characters.

  5. Enter the password again.

  6. Click Done.

  7. Click Submit to save your changes.

Back to the top

To change a user:

  1. Check the check box for the user on the SNMP Users tab.

  2. Click Modify.

  3. Choose an authentication algorithm to protect the SNMP traffic.

    • None means that no security mechanism is required for SNMP packets.
    • MD5 means that authentication is based on the hash-based Message Authentication Code Message Digest 5 (HMAC-MD5) algorithm.
    • SHA means that authentication is based on the hash-based Message Authentication Code Secure Hash (HMAC-SHA) algorithm.

  4. Enter a password. The string can be up to 64 alphanumeric characters.

  5. Enter the password again.

  6. Click Done.

  7. Click Submit to save your changes.

Back to the top

To delete a user:

  1. On the Users tab, select one or more users:

    • Check the check box at the top of the Select column to select all users.
    • Check the check box for one or more specific users.

  2. Click Delete.

  3. Click Submit to save your changes.

Back to the top