Brocade Fabric OS Message Reference - Supporting Fabric OS v7.0.1 (53-1002448-01, March 2012)

8 Fabric OS Message Reference
53-1002448-01
Configuring the SNMP server hosts
1
3. Execute the snmpConfig --show snmpv1 command to verify the SNMPv1 agent configuration.
switch:admin> snmpconfig --show snmpv1
SNMPv1 community and trap recipient configuration:
Community 1: Secret C0de (rw)
Trap recipient: 10.24.32.122
Trap port: 162
Trap recipient Severity level: 5
Community 2: OrigEquipMfr (rw)
Trap recipient: fec0:60:69bc:200:213:72ff:fe64:47b9
Trap port: 162
Trap recipient Severity level: 5
Community 3: private (rw)
Trap recipient: WTQAXP.englab.brocade.com
Trap port: 162
Trap recipient Severity level: 5
Community 4: public (ro)
Trap recipient: 172.26.4.52
Trap port: 65530
Trap recipient Severity level: 1
Community 5: common (ro)
Trap recipient: fec0:60:69bc:200:213:72ff:fe64:489f
Trap port: 11
Trap recipient Severity level: 2
Community 6: FibreChannel (ro)
Trap recipient: WTAMP.corp.brocade.com
Trap port: 65521
Trap recipient Severity level: 2
SNMPv1:Enabled
Configuring the SNMPv3 trap recipient
To configure the SNMPv3 host to receive the trap, perform the following steps.
1. Log in to the switch as admin.
2. Execute the snmpConfig
--set snmpv3 command to configure the SNMP trap recipient. Ignore
the step to enable the SNMP informs “SNMP Informs Enabled”.
switch:admin> snmpconfig --set snmpv3
SNMP Informs Enabled (true, t, false, f): [false]
SNMPv3 user configuration(snmp user not configured in FOS user database will
have physical AD and admin role as the default):
User (rw): [snmpadmin1]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/AES256(6)]):
(2..2) [2]
User (rw): [snmpadmin2]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/AES256(6)]):
(2..2) [2]
User (rw): [snmpadmin3]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/3DES(3)/AES128(4)/AES192(5)/AES256(6)]):
(2..2) [2]
User (ro): [snmpuser1]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]