18.10.2013 Views

FTOS Command Reference for the S-Series - Force10 Networks

FTOS Command Reference for the S-Series - Force10 Networks

FTOS Command Reference for the S-Series - Force10 Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

snmp-server group<br />

Parameters<br />

Defaults As above<br />

<strong>Command</strong> Modes CONFIGURATION<br />

<strong>Command</strong><br />

History<br />

Usage<br />

In<strong>for</strong>mation<br />

Related<br />

<strong>Command</strong>s<br />

local engineID Enter <strong>the</strong> keyword local followed by <strong>the</strong> engine ID number that<br />

identifies <strong>the</strong> copy of <strong>the</strong> SNMP on <strong>the</strong> local device.<br />

Format (as specified in RFC 3411): 12 octets.<br />

• The first 4 octets are set to <strong>the</strong> private enterprise number.<br />

• The remaining 8 octets are <strong>the</strong> MAC address of <strong>the</strong> chassis.<br />

remote ip-address Enter <strong>the</strong> keyword remote followed by <strong>the</strong> IP address that identifies<br />

<strong>the</strong> copy of <strong>the</strong> SNMP on <strong>the</strong> remote device.<br />

udp-port port-number<br />

engineID<br />

Version 7.6.1.0 Support added <strong>for</strong> S-<strong>Series</strong><br />

Version 7.5.1.0 Support added <strong>for</strong> C-<strong>Series</strong><br />

E-<strong>Series</strong> legacy command<br />

Enter <strong>the</strong> keyword udp-port followed by <strong>the</strong> UDP (User Datagram<br />

Protocol) port number on <strong>the</strong> remote device.<br />

Range: 0 to 65535<br />

Default: 162<br />

Changing <strong>the</strong> value of <strong>the</strong> SNMP Engine ID has important side effects. A user's password<br />

(entered on <strong>the</strong> command line) is converted to an MD5 (Message Digest Algorithm) or SHA<br />

(Secure Hash Algorithm) security digest. This digest is based on both <strong>the</strong> password and <strong>the</strong><br />

local Engine ID. The command line password is <strong>the</strong>n destroyed, as required by RFC 2274.<br />

Because of this deletion, if <strong>the</strong> local value of <strong>the</strong> Engine ID changes, <strong>the</strong> security digests of<br />

SNMPv3 users will be invalid, and <strong>the</strong> users will have to be reconfigured.<br />

For <strong>the</strong> remote Engine ID, <strong>the</strong> host IP and UDP port are <strong>the</strong> indexes to <strong>the</strong> command that are<br />

matched to ei<strong>the</strong>r overwrite or remove <strong>the</strong> configuration.<br />

show snmp engineID<br />

Display SNMP engine and all remote engines that are configured on<br />

<strong>the</strong> router<br />

show running-config snmp Display <strong>the</strong> SNMP running configuration<br />

snmp-server group<br />

c e s Configure a new SNMP group or a table that maps SNMP users to SNMP views.<br />

Syntax snmp-server group [group_name {1 | 2c | 3 {auth | noauth | priv}}] [read name]<br />

[write name] [notify name] [access-list-name | ipv6 access-list-name |<br />

access-list-name ipv6 access-list-name]]<br />

112 SNMP and Syslog <strong>Command</strong>s

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!