White Papers

Table Of Contents
snmp-server community
Configure a new community string access for SNMPv1 v2 and v3.
Syntax
snmp-server community community-name {ro | rw} [security-name name][access-
list-name]
To remove access to a community, use the no snmp-server community community-string
{ro | rw} [security-name name [access-list-name] command.
Parameters
community-name
Enter a text string (up to 20 characters long) to act as a password for SNMP.
ro Enter the keyword ro to specify read-only permission.
rw Enter the keyword rw to specify read-write permission.
security-name
name
(Optional) Enter the keywords security-name then the security name as
defined by the community MIB.
access-list-name
(Optional) Enter a standard IPv4 access list name (a string up to 16 characters
long).
Defaults none
Command Modes CONFIGURATION
Supported Modes FullSwitch Mode
Command
History
Version Description
9.9(0.0) Introduced on the FN IOM.
8.3.16.1 Introduced on the MXL 10/40GbE Switch IO Module.
Usage
Information
The following example configures a community named public that is mapped to the security named
guestuser with Read Only (ro) permissions.
The security-name parameter maps the community string to an SNMPv3 user/security name as
defined by the community MIB.
If a community string is configured without a security-name (for example, snmp-server
community public ro), the community is mapped to a default security-name/group:
v1v2creadu / v1v2creadg maps to a community with ro (read-only) permissions.
v1v2cwriteu/ v1v2cwriteg maps to a community with rw (read-write) permissions.
The community-name parameter indexes this command.
If you do not configure the snmp-server community command, you cannot query SNMP data. Only
Standard IPv4 ACL and IPv6 ACL is supported in the optional access-list-name.
The command options ipv6, security-name, and access-list-name are recursive. In other words,
each option can, in turn, accept any of the three options as a sub-option, and each of those sub-options
can accept any of the three sub-options as a sub-option, and so forth. The second Example shows the
creation of a standard IPv4 ACL called snmp-ro-acl and then assigning it to the SNMP community guest.
NOTE: For IPv6 ACLs, only IPv6 and UDP types are valid for SNMP; TCP and ICMP rules are not
valid for SNMP. In IPv6 ACLs, port rules are not valid for SNMP.
Example
Dell#config
Dell(conf)# snmp-server community public ro
Dell(conf)# snmp-server community guest ro security-name guestuser
Dell(conf)#
Example
Dell(conf)# ip access-list standard snmp-ro-acl
Dell(config-std-nacl)#seq 5 permit host 10.10.10.224
Dell(config-std-nacl)#seq 10 deny any count
!
Simple Network Management Protocol (SNMP) and Syslog 1089