94
Configuring standard security features
You can also use these additional MIBs and their associated traps:
•
FICON-MIB (for FICON environments)
•
HA-MIB (for SAN Director 2/128 models)
•
SW-EXTTRAP
Includes the swSsn (Software Serial Number) as a part of SW traps. It is also used in conjunction with
the legacy 6400 integrated fabrics product to provide detailed group information for a particular trap.
For information on MIBs, refer to the
Fabric OS MIB Reference Manual
.
For information on the specific commands used in these procedures, refer to online help or to the
Fabric
OS Command Reference Manual.
Setting the security level
Use the
configure
command to set the security level (called “SNMP attributes”). You can specify no
security, authentication only, or authentication and privacy. For example, to configure for authentication
and privacy:
Using the
snmpConfig
command
Use the
snmpConfig --set
command to change either the SNMPv3 or SNMPv1 configuration. You
can also change access control, MIB capability, and system group.
switch:admin>
configure
Not all options will be available on an enabled switch.
To disable the switch, use the “switchDisable” command.
Configure...
System services (yes, y, no, n): [no]
ssl attributes (yes, y, no, n): [no]
http attributes (yes, y, no, n): [no]
snmp attributes (yes, y, no, n): [no]
y
Select SNMP Security Level:
(0 = No security, 1 = Authentication only, 2 = Authentication and Privacy):
(0..2) [0]
2
Summary of Contents for AE370A - Brocade 4Gb SAN Switch 4/12
Page 18: ...18 ...
Page 82: ...82 Managing user accounts ...
Page 102: ...102 Configuring standard security features ...
Page 126: ...126 Maintaining configurations ...
Page 198: ...198 Routing traffic ...
Page 238: ...238 Using the FC FC routing service ...
Page 260: ...260 Administering FICON fabrics ...
Page 280: ...280 Working with diagnostic features ...
Page 332: ...332 Administering Extended Fabrics ...
Page 414: ...398 Configuring the PID format ...
Page 420: ...404 Configuring interoperability mode ...
Page 426: ...410 Understanding legacy password behaviour ...
Page 442: ...426 ...
Page 444: ......
Page 447: ......