HP StorageWorks 4/16 Brocade OS Command Reference Manual Supporting Fabric OS - Page 618
SNMPv1 Configuration Parameters, Trap Recipient Severity Level, snmpadmin, snmpuser, authKey, privKey
View all HP StorageWorks 4/16 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 618 highlights
2 snmpConfig SNMPv1 Configuration Parameters There are six communities, respective trap recipients and trap recipient severity level supported by the agent. The first three communities are for read-write (rw) access and the last three are for read-only (ro) access. The default value for the trap recipient of each community is 0.0.0.0. The length of community string should be in range of 2 to 16 characters. The default values for the community strings are: Community 1: Secret C0de Community 2: OrigEquipMfr Community 3: private Community 4: public Community 5: common Community 6: FibreChannel When FCS policy s enabled, community strings can be changed on the primary FCS switch only, and only the primary FCS switch propagates changes across the fabric. For an SNMP management station to receive a trap generated by the agent, the administrator must configure a trap recipient to correspond to the IP address of the management station. In addition, the trap recipient must be able to pass the access control list (ACL) check as described in accessControl category. Trap Recipient Severity Level When an event occurs and if its severity level is at or below the set value, the SNMP traps, Event Trap traps (swEventTrap, connUnitEventTrap and swFabricWatchTrap), are sent to configured trap recipients. By default, this value is set at 0, implying that no Event Trap is sent. Possible values are 0 None 1 Critical 2 Error 3 Warning 4 Informational 5 Debug SNMPv3 Configuration Parameters Two user roles, snmpadmin and snmpuser are supported. snmpadmin provides read-write access and snmpuser provides read-only access. Entries are added to USM table corresponding to each role. Total of three entries for snmpadmin and snmpuser respectively are supported. Separate default passwords are provided for creation of authKey and privKey for each entry. The default set of passwords are published and the default algorithm (MD5/SHA) is used to create initial set of auth keys. You can change these passwords using this option. You have the option to select the authentication protocol MD5/SHA or no authentication for each entry. Select the following combination of protocols: NoAuth/NoPriv Auth/NoPriv Auth/Priv 592 Fabric OS Command Reference 53-1000599-01