Submit a ticketCall us

Don’t fall victim to a ransomware attack
Backups are helpful, but sometimes that’s not enough to protect your business against ransomware. At our live webcast we will discuss how to protect against ransomware attacks with SolarWinds® Patch Manager and how to leverage log data to detect ransomware. Register now for our live webcast.

Home > Success Center > Network Performance Monitor (NPM) > Change view restrictions on IOS devices to enable SNMPv3 data

Change view restrictions on IOS devices to enable SNMPv3 data

Table of contents
No headers

SNMPv3 uses an user-based security model (USM). USM requires a username and a password for authentication, and an optional additional password to encrypt the payload of the SNMP packet.  Even without encryption, the authentication data is protected using either an MD5 or SHA hash.

 
Execute the commands to enable SNMPv3 read an IOS device. This configures the SNMPv3 authNoPriv using an MD5 hash authentication.

  1. The user, v3user is allowed to poll any object in the v1default (built-in) view. Password needs to have at least eight characters and also compatible with USM.
    • snmp-server group v3group v3 auth
    • snmp-server user v3user v3group v3 auth md5 v3pass123
  2. To provide read/write access, change the group line to:
    • snmp-server group v3group v3 auth write v1default
      
Last modified
13:32, 13 Nov 2015

Tags

Classifications

Public