Note: The SLC supports both MIB-II (as defined by RFC 1213) and a private enterprise MIB. The SLC product CD includes the MIB definition files for the private enterprise MIB. The private enterprise MIB provides read-only access to all statistics and configurable items provided by the SLC. It provides read-write access to a select set of functions for controlling the SLC and device ports. See the MIB definition file for details.
Enter the following:
Enable Agent |
Enables or disables Simple Network Management Protocol (SNMP) agent, which allows read-only access to the system. Disabled by default. |
Enable Traps |
Traps are notifications of certain critical events. Disabled by default. This feature is applicable when SNMP is enabled. Examples of traps that the SLC sends include:
The SLC sends the traps to the host identified in the NMS field. |
NMS |
When SNMP is enabled, an NMS (Network Management System) acts as a central server, requesting and receiving SNMP-type information from any computer using SNMP. The NMS can request information from the SLC and receive traps from the SLC. Enter the IP address of the NMS server. Required if you selected Enable Traps. |
Communities |
|
Read-Only |
A string that acts like a password for an SNMP manager to access the read-only data the SLC SNMP agent provides. The default is public. |
Read-Write |
A string that acts like a password for an SNMP manager to access the read-only data the SLC SNMP agent provides and to modify data where permitted. The default is private. |
Trap |
The trap used for outgoing generic and enterprise traps. Traps sent with the Event trigger mechanism still use the trap community specified with the Event action. The default is public. |
|
|
Location |
Physical location of the SLC (optional). Useful for managing the SLC using SNMP. Up to 20 characters. |
Contact |
Description of the person responsible for maintaining the SLC, for example, a name (optional). Up to 20 characters. |
Alarm Delay |
Number of seconds delay between outgoing SNMP traps. |
Security |
Levels of security available with SNMP v. 3. No Auth/No: No authentication or encryption. Auth/No Encrypt: Authentication but no encryption. (default) Auth/Encrypt: Authentication and encryption. |
Auth with |
For Auth/No Encrypt or Auth/Encrypt, the authentication method: MD5: Message-Digest algorithm 5 (default) SHA: Secure Hash Algorithm |
Encrypt with |
Encryption standard to use: DES: Data Encryption Standard (default) AES: Advanced Encryption Standard |
User Name |
SNMP v3 is secure and requires user-based authorization to access SLC MIB objects. Enter a user ID. The default is snmpuser. Up to 20 characters. |
V3 Password/ |
Password for a user with read-only authority to use to access SNMP v3. The default is SNMPPASS. Up to 20 characters. |
Passphrase/ Retype Passphrase |
Passphrase associated with the password for a user with read-only authority. Up to 20 characters. |
User Name |
SNMP v3 is secure and requires user-based authorization to access SLC MIB objects. Enter a user ID for users with read-write authority. The default is snmprwuser. Up to 20 characters. |
V3 Password/ |
Password for the user with read-write authority to use to access SNMP v3. The default is SNMPRWPASS. Up to 20 characters. |
Passphrase/ Retype Passphrase |
Passphrase associated with the password for a user with read-write authority. Up to 20 characters. |
To save, click Apply.
See also