Brocade Fabric OS Command Reference Manual Supporting Fabric OS v6.3.0 (53-1001337-01, July 2009)

Fabric OS Command Reference 817
53-1001337-01
SnmpConfig
2
2Error
3 Warning
4 Informational
5Debug
SNMPv3 Configuration Parameters
Two user roles, snmpadmin and snmpuser are supported. The snmpadmin role provides read-write
access and the snmpuser role provides read-only access. Entries are added to the USM table
corresponding to each role. A total of three entries for snmpadmin and snmpuser respectively are
supported. Separate default passwords are provided for creation of authKey and privKey for each
entry. The default set of passwords is published and the default algorithm (MD5/SHA) is used to
create the initial set of authentication keys. You can change these passwords using this option. You
can select the authentication protocol MD5/SHA or no authentication for each entry.
The following combinations of protocols are supported:
NoAuth/NoPriv
Auth/NoPriv
Auth/Priv
The user name must be between 2 and 32 characters long. The default user names are defined
with the noAuth and noPriv protocol. The factory default SNMPv3 user names are:
User 1: snmpadmin1
User 2: snmpadmin2
User 3: snmpadmin3
User 4: snmpuser1
User 5: snmpuser2
User 6: snmpuser3
The --default option sets the user name and password to default.
If an FCS policy is enabled, the configuration has to be updated on the primary switch and the
non-primary switches; unlike community strings, user names and passwords are not distributed for
other switches in the fabric.
When new passwords are entered for any user entry, a new authKey and privKey are generated.
The new passwords must be updated on the client (e.g., MIB browser) as well. AuthKey and privKey
can also be updated with the delta key mechanism provided by the SNMPv3 protocol.
The system prompts for password confirmation if a protocol other than NoAuth/NoPriv is selected.
Protocol passwords must be between 1 and 20 characters.
In order for an SNMP management station to receive SNMPv3 traps generated by the agent, the
administrator must configure a trap recipient value to correspond to the IP address of the
management station. In addition, the trap recipient must pass the ACL check as described in the
Access Control section. The trap recipient must be associated with one of the six users of SNMPv3
and trap severity level. The factory default value for the SNMPv3 trap recipient of each user is
0.0.0.0.