Version 7.5.1.0
Introduced on the C-Series.
E-Series legacy
command
Usage
Information
For this
snmp-server trap-source
command to be enabled, you must configure an IP
address on the interface and enable the interface configured as an SNMP trap source.
Related
Commands
snmp-server community
– sets the community string.
snmp-server user
Configure a new user to an SNMP group.
C-Series, E-Series, S-Series, Z-Series
Syntax
snmp-server user
name
{
group_name
remote
ip-address
udp-port
port-number
} [1 | 2c | 3] [encrypted] [auth {md5 | sha}
auth-
password
] [priv des56
priv password
] [access
access-list-name
|
ipv6
access-list-name
|
access-list-name
ipv6
access-list-name
]
To remove a user from the SNMP group, use the
no snmp-server user
name
{
group_name
remote
ip-address
udp-port
port-number
} [1 | 2c |
3] [encrypted] [auth {md5 | sha}
auth-password
] [priv des56
priv password
] [access
access-list-name
| ipv6
access-list-name
|
access-list-name
ipv6
access-list-name
]
command.
Parameters
name
Enter the name of the user (not to exceed 20 characters), on the host
that connects to the agent.
group_name
Enter a text string (up to 20 characters long) as the name of the group.
The following groups are created for mapping to read/write
community/security-names (defaults):
•
v1v2creadu
— maps to a community with
ro
permissions.
•
1v2cwriteu
— maps to a community
rw
permissions.
remote
ip-
address
Enter the keywords
udp-port
followed by the user datagram
protocol (UDP) port number on the remote device. The range is 0 to
65535. The default is 162.
udp-port
port-
number
Enter the keywords
udp-port
followed by the UDP (User Datagram
Protocol) port number on the remote device. The range is 0 to 65535.
The default is 162.
1 | 2c | 3
(OPTIONAL) Enter the security model version number (
1
,
2c
, or
3
):
•
1
is the least secure version.
•
3
is the most secure of the security modes.
•
2c
allows transmission of informs and counter 64, which
allows for integers twice the width of what is normally
allowed.
The default is 1.
1494
Содержание Force10 S4810P
Страница 1: ...FTOS Command Line Reference Guide for the S4810 System FTOS 9 1 0 0 ...
Страница 48: ...48 ...
Страница 62: ...62 ...
Страница 92: ...92 ...
Страница 102: ...102 ...
Страница 202: ...202 ...
Страница 216: ...216 ...
Страница 334: ...334 ...
Страница 564: ...564 ...
Страница 570: ...570 ...
Страница 594: ...594 ...
Страница 632: ...632 ...
Страница 642: ...642 ...
Страница 662: ...662 ...
Страница 670: ...Related Commands clear ip dhcp snooping clears the contents of the DHCP binding table 670 ...
Страница 688: ...688 ...
Страница 702: ...702 ...
Страница 712: ...712 ...
Страница 723: ...Related Commands show gvrp displays the GVRP configuration 723 ...
Страница 724: ...724 ...
Страница 736: ...736 ...
Страница 900: ...900 ...
Страница 934: ...934 ...
Страница 958: ...958 ...
Страница 966: ...966 ...
Страница 1018: ...1018 ...
Страница 1026: ...1026 ...
Страница 1086: ...1086 ...
Страница 1100: ...1100 ...
Страница 1116: ...1116 ...
Страница 1164: ...1164 ...
Страница 1268: ...1268 ...
Страница 1276: ...1276 ...
Страница 1286: ...1286 ...
Страница 1300: ...1300 ...
Страница 1376: ...1376 ...
Страница 1390: ...1390 ...
Страница 1460: ...1460 ...
Страница 1512: ...1512 ...
Страница 1518: ...1518 ...
Страница 1528: ...1528 ...
Страница 1538: ...1538 ...
Страница 1551: ...To display the type of STP guard Portfast BPDU root or loop guard enabled on a port enter the show spanning tree 0 command 1551 ...
Страница 1552: ...1552 ...
Страница 1572: ...1572 ...
Страница 1586: ... uplink state group creates an uplink state group and enables the tracking of upstream links 1586 ...
Страница 1598: ...FTOS config interface vlan 40 FTOS conf if vlan tagged TenGi 8 0 FTOS conf if vlan exit FTOS config 1598 ...
Страница 1612: ...1612 ...