You can configure Network Management Station clients as SNMPv3 trap recipients for the SNMP traps that are generated by the ECS fabric using SNMPv3 standard messaging.
Prerequisites
This operation requires the System Administrator role in ECS.
Steps
In the ECS Portal, select
Settings > Event Notification.
On the
Event Notification page, the
SNMP tab displays by default and lists the SNMP servers that have been added to ECS.
To add an SNMP server target, click
New Target.
The
New SNMP Target page is displayed.
On the
New SNMP Target page, complete the following steps:
In the
FQDN/IP field, type the Fully Qualified Domain Name or IP address for the SNMPv3 trap recipient node that runs the
snmptrapd server.
In the
Port field, type the port number of the SNMP 3c
snmptrapd running on the Network Management Station client.
The default port number is
162.
In the
Version field, select
SNMPv3.
In the
Username field, type in the username that will be used in authentication and message traffic as per the User-based Security Model (USM) defined by RFC 3414.
Both the SNMP server and any Network Management Station clients that access it must specify the same username to ensure communication. This is an octet string of up to 32 characters in length.
In the
Authentication box, click
Enabled if you want to enable Message Digest 5 (MD5) (128-bit) or Secure Hash Algorithm 1 (SHA-1) (160-bit) authentication for all SNMPv3 data transmissions, and do the following:
In the
Authentication Protocol field, select
MD5 or
SHA.
This is the cryptographic hash function to use to verify message integrity between hosts. The default is
MD5.
In the
Authentication Passphrase field, type the string to use as a secret key for authentication between SNMPv3 USM standard hosts, when calculating a message digest.
The passphrase can be 16 octets long for MD5 and 20 octets long for SHA-1.
In the
Privacy box, click
Enabled if you want to enable Digital Encryption Standard (DES) (56-bit) or Advanced Encryption Standard (AES) (128-bit, 192-bit or 256-bit) encryption for all SNMPv3 data transmissions, and do the following:
In the
Privacy Protocol field, select
DES,
AES128,
AES192, or
AES256.
This is the cryptographic protocol to use in encrypting all traffic between SNMP servers and SNMP Network Management Station clients. The default is
DES.
In the
Privacy Passphrase field, type the string to use in the encryption algorithm as a secret key for encryption between SNMPv3 USM standard hosts.
The length of this key must be 16 octets for DES and longer for the AES protocols.
Click
Save.
Results
When you create the first SNMPv3 configuration, the ECS system creates an SNMP Engine ID to use for SNMPv3 traffic. The
Event Notification page displays that SNMP Engine ID in the
Engine ID field. You could instead obtain an Engine ID from a Network Monitoring tool and specify that Engine ID in the
Engine ID field. The important issue is that the SNMP server and any SNMP Network Management Station clients that have to communicate with it using SNMPv3 traffic must use the same SNMP Engine ID in that traffic.
NOTE Get the Engine ID from the SNMPv3 server and specify the Engine ID in the
Engine ID field in the ECS UI.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\