Submit a ticketCall us
Home > Success Center > User Device Tracker (UDT) > UDT - Knowledgebase Articles > Enable SNMPv3 access for layer 2/3 Bridge MIBs for Cisco IOS

Enable SNMPv3 access for layer 2/3 Bridge MIBs for Cisco IOS

Table of contents
Created by Eric Bryant, last modified by Nigel on Jul 06, 2018

Views: 2,107 Votes: 1 Revisions: 13

Overview

This article provides information on enabling the ACL for layer 2/3 MIB.

In the compatibility checker, you will see authorization error for layer 2 OIDs:

892440.PNG

Environment

All UDT versions

Steps

The  following is a list of SNMPv3 commands used to communicate to UDT:

 

Please refer to the following detailed information from vendor on appropriate configurations before reading further: Securing Simple Network Management Protocol - infrastructure ACLs (External link, verified 7/6/2018).


These commands can be performed in any order.

  • snmp-server view "VIEW"internet included
  • snmp-server view "VIEW" system included
  • snmp-server view "VIEW" interfaces included
  • snmp-server view "VIEW" chassis included
  • snmp-server group ???? v3 priv write ????
  • snmp-server view "VIEW" mib-2 included
  • snmp-server group ????? v3 auth context vlan- match prefix
  • snmp-server user ???? "GROUP" v3 auth md5 PASSWORD priv des PASSWORD 
  • snmp-server view "VIEW"internet included
  • snmp-server view "VIEW" system included
  • snmp-server view "VIEW" interfaces included
  • snmp-server view "VIEW" chassis included
  • snmp-server group ???? v3 priv write ????
  • snmp-server view "VIEW" mib-2 included
  • snmp-server group ????? v3 auth context vlan- match prefix
  • snmp-server user ???? "GROUP" v3 auth md5 PASSWORD priv des PASSWORD  

 

Further troubleshooting steps can be found here: SNMPv3 BRIDGE-MIB commands need to be added to Cisco devices

 

 

Last modified

Tags

Classifications

Public