HP 6125G HP 6125G & 6125G/XG Blade Switches Fundamentals Configuration - Page 74

SNMP login control configuration example, Network requirements

Page 74 highlights

Step 5. Apply the ACL to an SNMP community, group or user. Command • SNMPv1/v2c community: snmp-agent community { read | write } community-name [ mib-view view-name ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * • SNMPv1/v2c group: snmp-agent group { v1 | v2c } group-name [ read-view read-view ] [ write-view write-view ] [ notify-view notify-view ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * • SNMPv3 group: snmp-agent group v3 group-name [ authentication | privacy ] [ read-view read-view ] [ write-view write-view ] [ notify-view notify-view ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * • SNMPv1/v2c user: snmp-agent usm-user { v1 | v2c } user-name group-name [ acl acl-number | acl ipv6 ipv6-acl-number ] * • SNMPv3 user: snmp-agent usm-user v3 user-name group-name [ [ cipher ] authentication-mode { md5 | sha } auth-password [ privacy-mode { 3des | aes128 | des56 } priv-password ] ] [ acl acl-number | acl ipv6 ipv6-acl-number ] * Remarks For more information about SNMP, see Network Management and Monitoring Configuration Guide. SNMP login control configuration example Network requirements As shown in Figure 33, configure the device to allow only NMS users from Host A and Host B to access. Figure 33 Network diagram 68

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135

68
Step
Command
Remarks
5.
Apply the ACL to an
SNMP community, group
or user.
SNMPv1/v2c community:
snmp-agent
community
{
read
|
write
}
community
-
name
[
mib-view
view-name
]
[
acl
acl-number
|
acl
ipv6
ipv6-acl-number
] *
SNMPv1/v2c group:
snmp-agent
group
{
v1
|
v2c
}
group-name
[
read-view
read-view
]
[
write-view
write-view
] [
notify-view
notify-view
] [
acl
acl-number
|
acl
ipv6
ipv6-acl-number
] *
SNMPv3 group:
snmp-agent
group
v3
group-name
[
authentication
|
privacy
] [
read-view
read-view
] [
write-view
write-view
]
[
notify-view
notify-view
] [
acl
acl-number
|
acl
ipv6
ipv6-acl-number
] *
SNMPv1/v2c user:
snmp-agent
usm-user
{
v1
|
v2c
}
user-name
group-name
[
acl
acl-number
|
acl
ipv6
ipv6-acl-number
] *
SNMPv3 user:
snmp-agent
usm-user
v3
user-name
group-name
[ [
cipher
]
authentication-mode
{
md5
|
sha
}
auth-password
[
privacy-mode
{
3des
|
aes128
|
des56
}
priv-password
] ] [
acl
acl-number
|
acl
ipv6
ipv6-acl-number
] *
For more information about
SNMP, see
Network
Management and
Monitoring Configuration
Guide.
SNMP login control configuration example
Network requirements
As shown in
Figure 33
, configure the device to allow only NMS users from Host A and Host B to access.
Figure 33
Network diagram