Defining an snmp group – Brocade TurboIron 24X Series Configuration Guide User Manual
Page 202

168
Brocade TurboIron 24X Series Configuration Guide
53-100305301
Establishing SNMP community strings
•
Octets 1 through 4 represent the agent's SNMP management private enterprise number as 
assigned by the Internet Assigned Numbers Authority (IANA). The most significant bit of Octet 1 
is "1". For example, “000007c7” is the ID for Brocade Communications, Inc. in hexadecimal. 
With Octet 1 always equal to "1", the first four octets in the default engine ID is always 
“800007c7” (which is 1991 in decimal).
•
Octet 5 is always 03 in hexadecimal and indicates that the next set of values represent a MAC 
address.
•
Octets 6 through 11 form the MAC address of the lowest port in the management module.
NOTE
Engine ID must be a unique number among the various SNMP engines in the management domain. 
Using the default engine ID ensures the uniqueness of the numbers.
Defining an SNMP group
SNMP groups map SNMP users to SNMP views. For each SNMP group, you can configure a read 
view, a write view, or both. Users who are mapped to a group will use its views for access control.
To configure an SNMP user group, enter a command such as the following.
TurboIron(config)#snmp-server group admin v3 auth read all write all
Syntax: [no] snmp-server group 
NOTE
This command is not used for SNMP version 1 and SNMP version 2. In these versions, groups and 
group views are created internally using community strings. (refer to 
on page 164.) When a community string is created, two groups are created,
based on the community string name. One group is for SNMP version 1 packets, while the other is 
for SNMP version 2 packets.
The group 
The v1, v2, or v3 parameter indicates which version of SNMP is used. In most cases, you will be 
using v3, since groups are automatically created in SNMP versions 1 and 2 from community 
strings.
The auth | noauth parameter determines whether or not authentication will be required to access 
the supported views. If auth is selected, then only authenticated packets are allowed to access the 
view specified for the user group. Selecting noauth means that no authentication is required to 
access the specified view. Selecting priv means that an authentication password will be required 
from the users. 
The access 
filtered based on the standard ACL attached to the group.
The read 
belong to this group have either read or write access to the MIB. 
The 
If no view is specified, then the group has no access to the MIB.
