HP StorageWorks 2/64 HP StorageWorks Fabric OS 5.x Command Reference Guide (AA - Page 640
SNMPv3 configuration parameters, NoAuth/NoPriv
View all HP StorageWorks 2/64 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 640 highlights
connUnitEventTrap, and swFabricWatchTrap), are sent to configured trap recipients. By default, this value is set at 0, implying that no Event Trap is sent. Possible values are: 0 None 1 Critical 2 Error 3 Warning 4 Informational 5 Debug SNMPv3 configuration parameters Two user roles, snmpadmin and snmpuser, are supported. snmpadmin provides read-write access and snmpuser provides read-only access. Entries are added to USM table corresponding to each role. A total of three entries of role snmpadmin and three entries of role snmpuser are supported. Separate default passwords are provided for creation of authKey and privKey for each entry. A default set of passwords is published and a default algorithm (MD5/SHA) is used to create initial set of auth keys. You can change these passwords using this option. You have the option to select authentication protocol MD5/SHA or no authentication for each entry. Select the following combination of protocols: NoAuth/NoPriv Auth/NoPriv Auth/Priv The length of the user name string should be in range of 2 to 32 characters. Note that the default user names are defined with the noAuth and noPriv protocol. The factory default SNMPv3 user names are: User 1: snmpadmin1 User 2: snmpadmin2 User 3: snmpadmin3 User 4: snmpuser1 User 5: snmpuser2 User 6: snmpuser3 The user configuration is available in both the secure and nonsecure mode. When the user selects the --default option, the user name and passwords are set to default. In secure mode, the above configuration has to be updated by the user on both primary and nonprimary switches individually. Unlike community strings, the user name and passwords are not distributed for other switches in the fabric. When new passwords are entered for any user entry, new authKey and privKey are generated. The administrator must update the new passwords on the client (such as a MIB browser) also. AuthKey and privKey can also be updated using delta key mechanism provided by SNMPv3 protocol. You are prompted for the password and for re-confirmation of the password, if any protocol is selected other than NoAuth/NoPriv. The length of protocol passwords should be in range of 1 to 20 characters. Note that in order for an SNMP management station to receive SNMPv3 traps generated by the agent, the administrator must configure a trap recipient value to correspond to the IP address of the management station. Also, the trap recipient should be able to pass the ACL check, as described in "accessControl configuration parameters" on page 641. The trap recipient value should be associated with one of the 640 Fabric OS commands