Cisco Sg3008 Manual
Have a look at the manual Cisco Sg3008 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
SNMP Creating SNMP Groups 529 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 26 •Object ID Subtree View Type—Displays whether the defined subtree is included or excluded in the selected SNMP view. Creating SNMP Groups In SNMPv1 and SNMPv2, a community string is sent along with the SNMP frames. The community string acts as a password to gain access to an SNMP agent. However, neither the frames nor the community string are encrypted. Therefore, SNMPv1 and SNMPv2 are not secure. In SNMPv3, the following security mechanisms can be configured. •Authentication—The device checks that the SNMP user is an authorized system administrator. This is done for each frame. •Privacy—SNMP frames can carry encrypted data. Thus, in SNMPv3, there are three levels of security: •No security (No authentication and no privacy) •Authentication (Authentication and no privacy) •Authentication and privacy SNMPv3 provides a means of controlling the content each user can read or write and the notifications they receive. A group defines read/write privileges and a level of security. It becomes operational when it is associated with an SNMP user or community. NOTETo associate a non-default view with a group, first create the view in the Views page. To create an SNMP group: STEP 1Click SNMP > Groups. This page contains the existing SNMP groups and their security levels. STEP 2Click Add. STEP 3Enter the parameters. •Group Name—Enter a new group name.
SNMP Creating SNMP Groups Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 530 26 •Security Model—Select the SNMP version attached to the group, SNMPv1, v2, or v3. Three types of views with various security levels can be defined. For each security level, select the views for Read, Write and Notify by entering the following fields: •Enable—Select this field to enable the Security Level. •Security Level—Define the security level attached to the group. SNMPv1 and SNMPv2 support neither authentication nor privacy. If SNMPv3 is selected, choose one of the following: -No Authentication and No Privacy—Neither the Authentication nor the Privacy security levels are assigned to the group. -Authentication and No Privacy—Authenticates SNMP messages, and ensures the SNMP message origin is authenticated but does not encrypt them. -Authentication and Privacy—Authenticates SNMP messages, and encrypts them. •View—Associating a view with the read, write, and notify access privileges of the group limits the scope of the MIB tree to which the group has read, write, and notify access. -View—Select a previously-defined view for Read, Write and Notify. -Read—Management access is read-only for the selected view. Otherwise, a user or a community associated with this group is able to read all MIBs except those that control SNMP itself. -Write—Management access is write for the selected view. Otherwise, a user or a community associated with this group is able to write all MIBs except those that control SNMP itself. -Notify—Limits the available content of the traps to those included in the selected view. Otherwise, there is no restriction on the contents of the traps. This can only be selected for SNMPv3. STEP 4Click Apply. The SNMP group is saved to the Running Configuration file.
SNMP Managing SNMP Users 531 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 26 Managing SNMP Users An SNMP user is defined by the login credentials (username, passwords, and authentication method) and by the context and scope in which it operates by association with a group and an Engine ID. The configured user have the attributes of its group, having the access privileges configured within the associated view. Groups enable network managers to assign access rights to a group of users instead of to a single user. A user can only belong to a single group. To create an SNMPv3 user, the following must first exist: •An engine ID must first be configured on the device. This is done in the Engine ID page. •An SNMPv3 group must be available. An SNMPv3 group is defined in the Groups page. To display SNMP users and define new ones: STEP 1Click SNMP > Users. This page contains existing users. STEP 2Click Add. This page provides information for assigning SNMP access control privileges to SNMP users. STEP 3Enter the parameters. •User Name—Enter a name for the user. •Engine ID—Select either the local or remote SNMP entity to which the user is connected. Changing or removing the local SNMP Engine ID deletes the SNMPv3 User Database. To receive inform messages and request information, you must define both a local and remote user. -Local—User is connected to the local device. -Remote IP Address—User is connected to a different SNMP entity besides the local device. If the remote Engine ID is defined, remote devices receive inform messages, but cannot make requests for
SNMP Managing SNMP Users Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 532 26 information. Enter the remote engine ID. •Group Name—Select the SNMP group to which the SNMP user belongs. SNMP groups are defined in the Add Group page. NOTEUsers, who belong to groups which have been deleted, remain, but they are inactive. •Authentication Method—Select the Authentication method that varies according to the Group Name assigned. If the group does not require authentication, then the user cannot configure any authentication. The options are: -None—No user authentication is used. -MD5 Password—A password that is used for generating a key by the MD5 authentication method. -SHA Password—A password that is used for generating a key by the SHA (Secure Hash Algorithm) authentication method. •Authentication Password—If authentication is accomplished by either a MD5 or a SHA password, enter the local user password in either Encrypted or Plaintext. Local user passwords are compared to the local database. and can contain up to 32 ASCII characters. •Privacy Method—Select one of the following options: -None—Privacy password is not encrypted. -DES—Privacy password is encrypted according to the Data Encryption Standard (DES). •Privacy Password—16 bytes are required (DES encryption key) if the DES privacy method was selected. This field must be exactly 32 hexadecimal characters. The Encrypted or Plaintext mode can be selected. STEP 4Click Apply to save the settings.
SNMP Defining SNMP Communities 533 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 26 Defining SNMP Communities Access rights in SNMPv1 and SNMPv2 are managed by defining communities in the Communities page. The community name is a type of shared password between the SNMP management station and the device. It is used to authenticate the SNMP management station. Communities are only defined in SNMPv1 and v2 because SNMPv3 works with users instead of communities. The users belong to groups that have access rights assigned to them. The Communities page associates communities with access rights, either directly (Basic mode) or through groups (Advanced mode): •Basic mode—The access rights of a community can configure with Read Only, Read Write, or SNMP Admin. In addition, you can restrict the access to the community to only certain MIB objects by selecting a view (defined in the SNMP Views page). •Advanced Mode—The access rights of a community are defined by a group (defined in the Groups page). You can configure the group with a specific security model. The access rights of a group are Read, Write, and Notify. To define SNMP communities: STEP 1Click SNMP > Communities. This page contains a table of configured SNMP communities and their properties. STEP 2Click Add. This page enables network managers to define and configure new SNMP communities. STEP 3SNMP Management Station—Click User Defined to enter the management station IP address that can access the SNMP community. Click All to indicate that any IP device can access the SNMP community. •IP Version—Select either IPv4 or IPv6. •IPv6 Address Type—Select the supported IPv6 address type if IPv6 is used. The options are:
SNMP Defining SNMP Communities Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 534 26 -Link Local—The IPv6 address uniquely identifies hosts on a single network link. A link local address has a prefix of FE80, is not routable, and can be used for communication only on the local network. Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. -Global—The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. •Link Local Interface—If the IPv6 address type is Link Local, select whether it is received through a VLAN or ISATAP. •IP Address—Enter the SNMP management station IP address. •Community String—Enter the community name used to authenticate the management station to the device. •Basic—Select this mode for a selected community. In this mode, there is no connection to any group. You can only choose the community access level (Read Only, Read Write, or SNMP Admin) and, optionally, further qualify it for a specific view. By default, it applies to the entire MIB. If this is selected, enter the following fields: -Access Mode—Select the access rights of the community. The options are: Read Only—Management access is restricted to read-only. Changes cannot be made to the community. Read Write—Management access is read-write. Changes can be made to the device configuration, but not to the community. SNMP Admin—User has access to all device configuration options, as well as permissions to modify the community. SNMP Admin is equivalent to Read Write for all MIBs except for the SNMP MIBs. SNMP Admin is required for access to the SNMP MIBs. -View Name—Select an SNMP view (a collection of MIB subtrees to which access is granted). •Advanced—Select this mode for a selected community. -Group Name—Select an SNMP group that determines the access rights. STEP 4Click Apply. The SNMP Community is defined, and the Running Configuration is updated.
SNMP Defining Trap Settings 535 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 26 Defining Trap Settings The Trap Settings page enables configuring whether SNMP notifications are sent from the device, and for which cases. The recipients of the SNMP notifications can be configured in the Notification Recipients SNMPv1,2 page, or the Notification Recipients SNMPv3 page. To d e f i n e t r a p s e t t i n g s : STEP 1Click SNMP > Trap Set tings. STEP 2Select Enable for SNMP Notifications to specify that the device can send SNMP notifications. STEP 3Select Enable for Authentication Notifications to enable SNMP authentication failure notification. STEP 4Click Apply. The SNMP Trap settings are written to the Running Configuration file. Notification Recipients Trap messages are generated to report system events, as defined in RFC 1215. The system can generate traps defined in the MIB that it supports. Trap receivers (aka Notification Recipients) are network nodes where the trap messages are sent by the device. A list of notification recipients are defined as the targets of trap messages. A trap receiver entry contains the IP address of the node and the SNMP credentials corresponding to the version that is included in the trap message. When an event arises that requires a trap message to be sent, it is sent to every node listed in the Notification Recipient Table. The Notification Recipients SNMPv1,2 page and the Notification Recipients SNMPv3 page enable configuring the destination to which SNMP notifications are sent, and the types of SNMP notifications that are sent to each destination (traps or informs). The Add/Edit pop-ups enable configuring the attributes of the notifications. An SNMP notification is a message sent from the device to the SNMP management station indicating that a certain event has occurred, such as a link up/ down.
SNMP Notification Recipients Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 536 26 It is also possible to filter certain notifications. This can be done by creating a filter in the Notification Filter page and attaching it to an SNMP notification recipient. The notification filter enables filtering the type of SNMP notifications that are sent to the management station based on the OID of the notification that is about to be sent. Defining SNMPv1,2 Notification Recipients To define a recipient in SNMPv1,2: STEP 1Click SNMP > Notification Recipients SNMPv1,2. This page displays recipients for SNMPv1,2. STEP 2Enter the following fields: •Informs IPv4 Source Interface—Select the source interface whose IPv4 address will be used as the source IPv4 address in inform messages for communication with IPv4 SNMP servers. •Traps IPv4 Source Interface—Select the source interface whose IPv6 address will be used as the source IPv6 address in trap messages for communication with IPv6 SNMP servers. •Informs IPv6 Source Interface—Select the source interface whose IPv4 address will be used as the source IPv4 address in inform messages for communication with IPv4 SNMP servers. •Traps IPv6 Source Interface—Select the source interface whose IPv6 address will be used as the source IPv6 address in trap messages for communication with IPv6 SNMP servers. NOTEIf the Auto option is selected, the system takes the source IP address from the IP address defined on the outgoing interface. STEP 3Click Add. STEP 4Enter the parameters. •Server Definition—Select whether to specify the remote log server by IP address or name. •IP Version—Select either IPv4 or IPv6. •IPv6 Address Type—Select either Link Local or Global.
SNMP Notification Recipients 537 Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 26 -Link Local—The IPv6 address uniquely identifies hosts on a single network link. A link local address has a prefix of FE80, is not routable, and can be used for communication only on the local network. Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. -Global—The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. •Link Local Interface—If the IPv6 address type is Link Local, select whether it is received through a VLAN or ISATAP. •Recipient IP Address/Name—Enter the IP address or server name of where the traps are sent. •UDP Port—Enter the UDP port used for notifications on the recipient device. •Notification Type—Select whether to send Traps or Informs. If both are required, two recipients must be created. •Ti m e o u t—Enter the number of seconds the device waits before re-sending informs. •Retries—Enter the number of times that the device resends an inform request . •Community String—Select from the pull-down the community string of the trap manager. Community String names are generated from those listed in the Community page. •Notification Version—Select the trap SNMP version. Either SNMPv1 or SNMPv2 may be used as the version of traps, with only a single version enabled at a time. •Notification Filter—Select to enable filtering the type of SNMP notifications sent to the management station. The filters are created in the Notification Filter page. •Filter Name—Select the SNMP filter that defines the information contained in traps (defined in the Notification Filter page). STEP 5Click Apply. The SNMP Notification Recipient settings are written to the Running Configuration file.
SNMP Notification Recipients Cisco Small Business 200, 300 and 500 Series Managed Switch Administration Guide (Internal Version) 538 26 Defining SNMPv3 Notification Recipients To define a recipient in SNMPv3: STEP 1Click SNMP > Notification Recipients SNMPv3. This page displays recipients for SNMPv3. •Informs IPv4 Source Interface—Select the source interface whose IPv4 address will be used as the source IPv4 address in inform messages for communication with IPv4 SNMP servers. •Traps IPv4 Source Interface—Select the source interface whose IPv6 address will be used as the source IPv6 address in trap messages for communication with IPv6 SNMP servers. •Informs IPv6 Source Interface—Select the source interface whose IPv4 address will be used as the source IPv4 address in inform messages for communication with IPv4 SNMP servers. •Traps IPv6 Source Interface—Select the source interface whose IPv6 address will be used as the source IPv6 address in trap messages for communication with IPv6 SNMP servers. STEP 2Click Add. STEP 3Enter the parameters. •Server Definition—Select whether to specify the remote log server by IP address or name. •IP Version—Select either IPv4 or IPv6. •IPv6 Address Type—Select the IPv6 address type (if IPv6 is used). The options are: -Link Local—The IPv6 address uniquely identifies hosts on a single network link. A link local address has a prefix of FE80, is not routable, and can be used for communication only on the local network. Only one link local address is supported. If a link local address exists on the interface, this entry replaces the address in the configuration. -Global—The IPv6 address is a global Unicast IPV6 type that is visible and reachable from other networks. •Link Local Interface—Select the link local interface (if IPv6 Address Type Link Local is selected) from the pull-down list.