Dell PowerConnect Brocade M6505 Brocade 7.1.0 Fabric OS MIB Reference - Page 39

Access Gateway and Brocade MIBs

Page 39 highlights

Access Gateway and Brocade MIBs 1 (0 = No security, 1 = Authentication only, 2 = Authentication and Privacy, 3 = No Access): (2..3) [2] 2 switch:admin> snmpconfig --show secLevel GET security level = 2, SET level = 2 SNMP GET Security Level: Authentication and Privacy SNMP SET Security Level: Authentication and Privacy To set the security level to default: DCX_128:FID128:admin> snmpconfig --default seclevel GET security level = 0, SET level = 0 SNMP GET Security Level: No security SNMP SET Security Level: No security SNMP GET Security Level will be set to 'No Security' SNMP SET Security Level will be set to 'No Security' Do you want to continue? (yes, y, no, n): [no] y DCX_128:FID128:admin> DCX_128:FID128:admin> snmpconfig --show seclevel GET security level = 0, SET level = 0 SNMP GET Security Level: No security SNMP SET Security Level: No security DCX_128:FID128:admin 4. In the Manager (SNMP Browser), create a user snmpadmin1 with Authentication protocol as noAuth, Privacy protocol as noPriv, set the password and set the trap port as 162. (Same values are set as in the switch SNMPv3 configuration.) NOTE SNMPv3 supports AES128 and DES protocols. SNMPv3 does not support privacy protocols AES192, AES256, and 3DES. Access Gateway and Brocade MIBs Table 4 shows the MIBs supported by Brocade Access Gateway. .TABLE 4 MIB name Access Gateway MIB support Supported Description MIB-2 Entity-MIB HA-MIB SW-MIB FA-MIB Yes Updated to support Access Gateway in v5.2.1. Yes Supported in Access Gateway. Yes Supported in Access Gateway. No Disabled in Access Gateway because the conventions are specific to fabric switches. In Fabric OS v6.4.0, swConnUnitPortExtensionTable is supported in Access Gateway mode. In Fabric OS v7.0.0, SNMP allows you to access the following tables to support the Advanced Performance Monitoring feature on Access Gateway, even if the SW-MIB is disabled: • "swBlmPerfEEMntTable" • "swBlmPerfFltMntTable" Yes The connUnitSnsTable is not supported because a switch in Access Gateway does support name server services. Fabric OS MIB Reference 19 53-1002750-01

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370

Fabric OS MIB Reference
19
53-1002750-01
Access Gateway and Brocade MIBs
1
(0 = No security, 1 = Authentication only, 2 = Authentication and Privacy, 3 =
No Access): (2..3) [2] 2
switch:admin> snmpconfig --show secLevel
GET security level = 2, SET level = 2
SNMP GET Security Level: Authentication and Privacy
SNMP SET Security Level: Authentication and Privacy
To set the security level to default:
DCX_128:FID128:admin> snmpconfig --default seclevel
GET security level = 0, SET level = 0
SNMP GET Security Level: No security
SNMP SET Security Level: No security
SNMP GET Security Level will be set to 'No Security'
SNMP SET Security Level will be set to 'No Security'
Do you want to continue? (yes, y, no, n): [no] y
DCX_128:FID128:admin>
DCX_128:FID128:admin> snmpconfig --show seclevel
GET security level = 0, SET level = 0
SNMP GET Security Level: No security
SNMP SET Security Level: No security
DCX_128:FID128:admin
4.
In the Manager (SNMP Browser), create a user snmpadmin1 with Authentication protocol as
noAuth, Privacy protocol as noPriv, set the password and set the trap port as 162. (Same
values are set as in the switch SNMPv3 configuration.)
NOTE
SNMPv3 supports AES128 and DES protocols. SNMPv3 does not support privacy protocols AES192,
AES256, and 3DES.
Access Gateway and Brocade MIBs
Table 4
shows the MIBs supported by Brocade Access Gateway.
.
TABLE 4
Access Gateway MIB support
MIB name
Supported
Description
MIB-2
Yes
Updated to support Access Gateway in v5.2.1.
Entity-MIB
Yes
Supported in Access Gateway.
HA-MIB
Yes
Supported in Access Gateway.
SW-MIB
No
Disabled in Access Gateway because the conventions are specific to
fabric switches.
In Fabric OS v6.4.0, swConnUnitPortExtensionTable is supported in
Access Gateway mode.
In Fabric OS v7.0.0, SNMP allows you to access the following tables
to support the Advanced Performance Monitoring feature on Access
Gateway, even if the SW-MIB is disabled:
“swBlmPerfEEMntTable”
“swBlmPerfFltMntTable”
FA-MIB
Yes
The connUnitSnsTable is not supported because a switch in Access
Gateway does support name server services.