Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

ECS 3.5.0.1 Administration Guide

PDF

Add an SNMPv3 trap recipient

You can configure Network Management Station clients as SNMPv3 trap recipients for the SNMP traps that are generated by the ECS fabric using SNMPv3 standard messaging.

Prerequisites

This operation requires the System Administrator role in ECS.

Steps

  1. In the ECS Portal, select Settings > Event Notification.
    On the Event Notification page, the SNMP tab displays by default and lists the SNMP servers that have been added to ECS.
  2. To add an SNMP server target, click New Target.
    The New SNMP Target page is displayed.
  3. On the New SNMP Target page, complete the following steps:
    1. In the FQDN/IP field, type the Fully Qualified Domain Name or IP address for the SNMPv3 trap recipient node that runs the snmptrapd server.
    2. In the Port field, type the port number of the SNMP 3c snmptrapd running on the Network Management Station client.
      The default port number is 162.
    3. In the Version field, select SNMPv3.
    4. In the Username field, type in the username that will be used in authentication and message traffic as per the User-based Security Model (USM) defined by RFC 3414.
      Both the SNMP server and any Network Management Station clients that access it must specify the same username to ensure communication. This is an octet string of up to 32 characters in length.
    5. In the Authentication box, click Enabled if you want to enable Message Digest 5 (MD5) (128-bit) or Secure Hash Algorithm 1 (SHA-1) (160-bit) authentication for all SNMPv3 data transmissions, and do the following:
      • In the Authentication Protocol field, select MD5 or SHA.

        This is the cryptographic hash function to use to verify message integrity between hosts. The default is MD5.

      • In the Authentication Passphrase field, type the string to use as a secret key for authentication between SNMPv3 USM standard hosts, when calculating a message digest.

        The passphrase can be 16 octets long for MD5 and 20 octets long for SHA-1.

    6. In the Privacy box, click Enabled if you want to enable Digital Encryption Standard (DES) (56-bit) or Advanced Encryption Standard (AES) (128-bit, 192-bit or 256-bit) encryption for all SNMPv3 data transmissions, and do the following:
      • In the Privacy Protocol field, select DES, AES128, AES192, or AES256.

        This is the cryptographic protocol to use in encrypting all traffic between SNMP servers and SNMP Network Management Station clients. The default is DES.

      • In the Privacy Passphrase field, type the string to use in the encryption algorithm as a secret key for encryption between SNMPv3 USM standard hosts.

        The length of this key must be 16 octets for DES and longer for the AES protocols.

  4. Click Save.

Results

When you create the first SNMPv3 configuration, the ECS system creates an SNMP Engine ID to use for SNMPv3 traffic. The Event Notification page displays that SNMP Engine ID in the Engine ID field. You could instead obtain an Engine ID from a Network Monitoring tool and specify that Engine ID in the Engine ID field. The important issue is that the SNMP server and any SNMP Network Management Station clients that have to communicate with it using SNMPv3 traffic must use the same SNMP Engine ID in that traffic.
NOTE Get the Engine ID from the SNMPv3 server and specify the Engine ID in the Engine ID field in the ECS UI.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\