Management and Configuration Guide K/KA/KB.15.15

1. Type a model number of your switch (for example, 8212) or product number
in the Auto Search text box.
2. Select an appropriate product from the drop down list.
3. Click the Display selected button.
4. From the options that appear, select Software downloads.
5. MIBs are available with switch software in the Other category.
Click on software updates, then MIBs.
SNMPv1 and v2c access to the switch
SNMP access requires an IP address and subnet mask configured on the switch. If you are using
DHCP/Bootp to configure the switch, ensure that the DHCP/Bootp process provides the IP address.
Once an IP address is configured, the main steps for configuring SNMPv1 and v2c access
management features are:
1. Configure the appropriate SNMP communities. (See “SNMPv3 communities” (page 244).)
2. Configure the appropriate trap receivers. (See “SNMP notifications” (page 245).)
In some networks, authorized IP manager addresses are not used. In this case, all management
stations using the correct community name may access the switch with the View and Access levels
that have been set for that community. If you want to restrict access to one or more specific nodes,
you can use the switch's IP Authorized Manager feature. (See the Access Security Guide.)
CAUTION: For PCM/PCM+ version 1.5 or earlier (or any TopTools version), deleting the "public"
community disables some network management functions (such as traffic monitoring, SNMP trap
generation, and threshold setting.) If network management security is a concern, and you are using
the above software versions, HP recommends that you change the write access for the "public"
community to "Restricted."
SNMPv3 access to the switch
SNMPv3 access requires an IP address and subnet mask configured on the switch. If you are using
DHCP/Bootp to configure the switch, ensure that the DHCP/Bootp process provides the IP address.
Once you have configured an IP address, the main steps for configuring SNMPv3 access
management features are the following:
1. Enable SNMPv3 for operation on the switch.
2. Configure the appropriate SNMP users.
3. Configure the appropriate SNMP communities.
4. Configure the appropriate trap receivers.
In some networks, authorized IP manager addresses are not used. In this case, all management
stations using the correct User and community name may access the switch with the View and
Access levels that have been set for that community. If you want to restrict access to one or more
specific nodes, you can use the IP Authorized Manager feature for the switch. (See the Access
Security Guide.)
SNMP version 3 (SNMPv3) adds some new commands to the CLI for configuring SNMPv3 functions.
To enable SNMMPv3 operation on the switch, use the snmpv3 enable command. An initial user
entry will be generated with MD5 authentication and DES privacy.
You may (optionally) restrict access to only SNMPv3 agents by using the snmpv3 only command.
To restrict write-access to only SNMPv3 agents, use the snmpv3 restricted-access command.
CAUTION: Restricting access to only version 3 messages will make the community named public
inaccessible to network management applications (such as autodiscovery, traffic monitoring, SNMP
trap generation, and threshold setting) from operating in the switch.
242 Configuring for Network Management Applications