Tip

This is the documentation for the 20.02 version. Looking for the documentation of the latest version? Have a look here.

SNMP ExampleΒΆ

The following example sets up SNMP access for a single community name which can read anything under .1 (.iso) in the OID tree, and does not write access.

snmp community community-name tnsrmon source 10.2.4.0/24 security-name TNSRMonitor
snmp group group-name ROGroup security-name TNSRMonitor security-model v1
snmp group group-name ROGroup security-name TNSRMonitor security-model v2c
snmp view view-name systemview view-type included oid .1
snmp access group-name ROGroup prefix exact model any level noauth read systemview write none

Following through line by line:

First, map the SNMPv1/SNMPv2c community named tnsrmon to the security name TNSRMonitor for clients connecting from 10.2.4.0/24, which in this example is a secure management network.

snmp community community-name tnsrmon source 10.2.4.0/24 security-name TNSRMonitor

Next, define a group named ROGroup, and specify that if the TNSRMonitor security name connects using SNMPv1, it is considered a member of this group.

snmp group group-name ROGroup security-name TNSRMonitor security-model v1

Add another entry to ROGroup for TNSRMonitor if it connects using SNMPv2c

snmp group group-name ROGroup security-name TNSRMonitor security-model v2c

Now define a view named systemview which includes the entire OID tree under .1. This could also have been specified by name, e.g. .iso.

snmp view view-name systemview view-type included oid .1

Finally, tie all the entries together by granting access for ROGroup to read from systemview when it connects using any security model, but do not specify a write group so that it has no write access.

snmp access group-name ROGroup prefix exact model any level noauth read systemview write none

Note

Since SNMPv3 is not yet supported, the values for prefix and level must be set as shown. See SNMP Access Rules.