
S e n d f e e d b a c k t o n x 5 0 0 0 - d o c f e e d b a c k @ c i s c o . c o m
1-2
Cisco Nexus 5000 Series Switch CLI Software Configuration Guide
OL-16597-01
Chapter 1 Configuring SNMP
Information About SNMP
SNMP is defined in RFCs 3411 to 34180.
Note
Cisco NX-OS does not support SNMP sets for Ethernet MIBs.
Cisco Nexus 5000 Series switch supports SNMPv1, SNMPv2c and SNMPv3. Both SNMPv1 and
SNMPv2c use a community-based form of security.
SNMP Notifications
A key feature of SNMP is the ability to generate notifications from an SNMP agent. These notifications
do not require that requests be sent from the SNMP manager. Notifications can indicate improper user
authentication, restarts, the closing of a connection, loss of connection to a neighbor router, or other
significant events.
Cisco Nexus 5000 Series switch generates SNMP notifications as either traps or informs. Traps are less
reliable than informs because the SNMP manager does not send any acknowledgment when it receives
a trap. Cisco Nexus 5000 Series switch cannot determine if the trap was received. An SNMP manager
that receives an inform request acknowledges the message with an SNMP response protocol data unit
(PDU). If the Cisco Nexus 5000 Series switch never receives a response, it can send the inform request
again.
You can configure the Cisco Nexus 5000 Series switch to send notifications to multiple host receivers.
See the
“Configuring SNMP Notification Receivers” section on page 1-7
for more information about
host receivers.
SNMPv3
SNMPv3 provides secure access to devices by a combination of authenticating and encrypting frames
over the network. The security features provided in SNMPv3 are the following:
•
Message integrity—Ensures that a packet has not been tampered with in-transit.
•
Authentication—Determines the message is from a valid source.
•
Encryption—Scrambles the packet contents to prevent it from being seen by unauthorized sources.
SNMPv3 provides for both security models and security levels. A security model is an authentication
strategy that is set up for a user and the role in which the user resides. A security level is the permitted
level of security within a security model. A combination of a security model and a security level
determines which security mechanism is employed when handling an SNMP packet.
This section contains the following topics:
•
Security Models and Levels for SNMPv1, v2, v3, page 1-3
•
User-Based Security Model, page 1-3
•
CLI and SNMP User Synchronization, page 1-4
•