HP StorageWorks 1606 Brocade Fabric OS MIB Reference v6.3.0 (53-1001339-01, Ju - Page 19

Understanding Brocade SNMP, In this Setting the SNMP security level

Page 19 highlights

Chapter Understanding Brocade SNMP 1 In this chapter •Setting the SNMP security level 1 •Understanding SNMP basics 2 •Loading Brocade MIBs 6 •Brocade 7500 / FR4-18i and Brocade MIBs 13 •Firmware upgrades and enabled traps 13 •Fabric OS commands for configuring SNMP 14 Setting the SNMP security level The Simple Network Management Protocol (SNMP) is an industry-standard method of monitoring and managing network devices. This protocol promotes interoperability because SNMP-capable systems must adhere to a common set of framework and language rules. Understanding the components of SNMP makes it possible to use third-party tools to view, browse, and manipulate Brocade switch variables (MIBs) remotely as well as to set up an enterprise-level management process. Every Brocade switch and director supports SNMP. Recipients for SNMP traps are restricted according to security levels. Security levels are selected and set for a switch using the snmpconfig --set seclevel command. To select and set SNMP security levels, issue the command snmpconfig --set seclevel after having logged in to the switch as admin. The following example sets the SNMP security level to 1 (authentication only). This setting allows all SNMPv1 users to perform GET and SET operations on MIBs, but creates an exception for SNMPv3 users that do not have authentication and privacy privileges (noAuthnoPriv). switch:admin> snmpconfig --set seclevel Select SNMP Security Level (0 = No security, 1 = Authentication only, 2 = Authentication and Privacy, 3 = sxNo Access): (0..3) [0] Select SNMP SET Security Level (0 = No security, 1 = Authentication only, 2 = Authentication and Privacy, 3 = No Access): (0..3) [0] TABLE 1 Security level options Security level Protocol No security [0] (noAuthnoPriv) Authentication only [1] (authNoPriv) SNMPv1 SNMPv3 SNMPv1 SNMPv3 Query behavior Allowed. Allowed. Allowed. All SNMPv3 users allowed except noAuthNoPriv users. Traps Sent. Sent. Sent. Sent for all SNMPv3 users except noAuthNoPriv users. Fabric OS MIB Reference 1 53-1001339-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354

Fabric OS MIB Reference
1
53-1001339-01
Chapter
1
Understanding Brocade SNMP
In this chapter
Setting the SNMP security level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1
Understanding SNMP basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
Loading Brocade MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
Brocade 7500 / FR4-18i and Brocade MIBs. . . . . . . . . . . . . . . . . . . . . . . . .
13
Firmware upgrades and enabled traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
13
Fabric OS commands for configuring SNMP . . . . . . . . . . . . . . . . . . . . . . . . .
14
Setting the SNMP security level
The Simple Network Management Protocol (SNMP) is an industry-standard method of monitoring
and managing network devices. This protocol promotes interoperability because SNMP-capable
systems must adhere to a common set of framework and language rules.
Understanding the components of SNMP makes it possible to use third-party tools to view, browse,
and manipulate Brocade switch variables (MIBs) remotely as well as to set up an enterprise-level
management process. Every Brocade switch and director supports SNMP.
Recipients for SNMP traps are restricted according to security levels. Security levels are selected
and set for a switch using the
snmpconfig --set seclevel
command. To select and set SNMP security
levels, issue the command
snmpconfig --set seclevel
after having logged in to the switch as
admin
.
The following example sets the SNMP security level to
1
(authentication only). This setting allows all
SNMPv1 users to perform GET and SET operations on MIBs, but creates an exception for SNMPv3
users that do not have authentication and privacy privileges (noAuthnoPriv).
switch:admin>
snmpconfig --set seclevel
Select SNMP Security Level
(0 = No security, 1 = Authentication only, 2 = Authentication and Privacy, 3 =
sxNo Access): (0..3)
[
0
]
Select SNMP SET Security Level
(0 = No security, 1 = Authentication only, 2 = Authentication and Privacy, 3 =
No Access): (0..3)
[
0
]
TABLE 1
Security level options
Security level
Protocol
Query behavior
Traps
No security [
0
]
(noAuthnoPriv)
SNMPv1
SNMPv3
Allowed.
Allowed.
Sent.
Sent.
Authentication only [
1
]
(authNoPriv)
SNMPv1
SNMPv3
Allowed.
All SNMPv3 users allowed except
noAuthNoPriv users.
Sent.
Sent for all SNMPv3 users
except noAuthNoPriv users.