Brocade Fabric OS MIB Reference Supporting Fabric OS v7.0.0 (53-1002151-01, April 2011)

Fabric OS MIB Reference 1
53-1002151-01
Chapter
1
Understanding Brocade SNMP
In this chapter
Setting the SNMP security level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Understanding SNMP basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Loading Brocade MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Access Gateway and Brocade MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Firmware upgrades and enabled traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Fabric OS commands for configuring SNMP . . . . . . . . . . . . . . . . . . . . . . . . . 20
Support for Administrative Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Support for Role-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Support for IPv6 addressing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Support for Virtual Fabric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Setting the SNMP security level
The Simple Network Management Protocol (SNMP) is an industry-standard method of monitoring
and managing network devices. This protocol promotes interoperability because SNMP-capable
systems must adhere to a common set of framework and language rules.
Understanding the components of SNMP makes it possible to use third-party tools to view, browse,
and manipulate Brocade switch variables (MIBs) remotely as well as to set up an enterprise-level
management process. Every Brocade switch and director supports SNMP.
Recipients for SNMP traps are restricted according to security levels. Security levels are selected
and set for a switch using the snmpconfig --set seclevel command. To select and set SNMP security
levels, issue the command snmpconfig --set seclevel after having logged in to the switch as admin.
The following example sets the SNMP security level to 1 (authentication only). This setting allows all
SNMPv1 users to perform GET and SET operations on MIBs, but creates an exception for SNMPv3
users that do not have authentication and privacy privileges (noAuthnoPriv).
switch:admin> snmpconfig --set seclevel
Select SNMP Security Level
(0 = No security, 1 = Authentication only, 2 = Authentication and Privacy, 3 =
sxNo Access): (0..3) [0]
Select SNMP SET Security Level
(0 = No security, 1 = Authentication only, 2 = Authentication and Privacy, 3 =
No Access): (0..3) [0]