R3204P16-HP Load Balancing Module System Maintenance Command Reference-6PW101

53
3desmd5: Converts the plain text privacy key to an encrypted key for 3DES encryption used
together with MD5 authentication.
3dessha: Converts the plain text privacy key to an encrypted key for 3DES encryption used together
with SHA-1 authentication.
md5: Converts the plain text authentication key to an encrypted key for MD5 authentication, or
converts the plain text privacy key to an encrypted key for AES or DES encryption used in
conjunction with MD5.
sha: Converts the plain text authentication key to an encrypted key for SHA-1 authentication, or
converts the plain text privacy key to an encrypted key for AES or DES encryption used in
conjunction with SHA-1 authentication.
local-engineid: Uses the local engine ID to calculate the encrypted key. For engine ID-related
configuration, see the snmp-agent local-engineid command.
specified-engineid: Uses a user-defined engine ID to calculate the encrypted key.
engineid: Specifies an SNMP engine ID as a hexadecimal string. It must comprise an even number of
hexadecimal characters, which ranges from 10 to 64. All-zero and all-F strings are invalid.
Description
Use the snmp-agent calculate-password command to convert a plain text key to an encrypted key for
authentication or encryption.
This command helps you calculate encrypted authentication and privacy keys for SNMPv3 users that use
encrypted authentication and privacy keys. To create an SNMPv3 user, see the snmp-agent usm-user v3
command.
Enable SNMP before you execute the snmp-agent calculate-password command.
The encrypted key converted for SHA authentication is a string of 40 hexadecimal characters. For an
authentication key, all of the 40 hexadecimal characters are valid. For a privacy key, only the first 32
hexadecimal characters are valid.
The converted key is valid only under the specified engine ID.
Related commands: snmp-agent usm-user v3.
Examples
# Use local engine ID to convert the plain text key authkey to an encrypted key for MD5 authentication.
<Sysname> system-view
[Sysname] snmp-agent calculate-password authkey mode md5 local-engineid
The secret key is: 09659EC5A9AE91BA189E5845E1DDE0CC
snmp-agent community
Syntax
snmp-agent community { read | write } community-name [ acl acl-number | mib-view view-name ] *
undo snmp-agent community { read | write } community-name
View
System view
Default level
3: Manage level