DGS-3312SR Layer 3 Gigabit Switch
41
create snmp group
Message integrity
−
Ensures that packets have not been
tampered with during transit.
Authentication
−
Determines if an SNMP message is from
a valid source.
Encryption
−
Scrambles the contents of messages to
prevent it being viewed by an unauthorized source.
noauth_nopriv
−
Specifies that no authorization and no encryption
of packets is sent between the switch and a remote SNMP
manager.
auth_nopriv
−
Specifies that authorization will be required, but
there will be no encryption of packets sent between the switch and
a remote SNMP manager.
auth_priv
−
Specifies that authorization will be required, and that
packets sent between the switch and a remote SNMP manger will
be encrypted.
read_view
– Specifies that the SNMP group being created can
request SNMP messages.
•
<view_name 32>
−
An alphanumeric string of up to 32
characters that is used to identify the group of MIB
objects that a remote SNMP manager is allowed to
access on the switch.
write_view
– Specifies write privileges for the SNMP group being
created.
•
<view_name 32>
−
An alphanumeric string of up to 32
characters that is used to identify the group of MIB
objects that a remote SNMP manager is allowed to
access on the switch.
notify_view
−
Specifies that the SNMP group being created can
receive SNMP trap messages generated by the switch’s SNMP
agent.
•
<view_name 32>
−
An alphanumeric string of up to 32
characters that is used to identify the group of MIB
objects that a remote SNMP manager is allowed to
access on the switch.
Restrictions Only
administrator-level users can issue this command.
Example usage:
To create an SNMP group named “sg1:”
DGS-3312SR:4#create snmp group sg1 v3 noauth_nopriv read_view v1
write_view v1 notify_view v1
Command: create snmp group sg1 v3 noauth_nopriv read_view v1
write_view v1 notify_view v1
Success.
DGS-3312SR:4#