beautypg.com

6 snmp-server community mode, 7 snmp-server community ro, 8 snmp-server community rw – Kontron AT8902 Full Size CLI User Manual

Page 258: 9 snmp-server enable traps violation, Snmp-server community mode - 18, Snmp-server community ro - 18, Snmp-server community rw - 18, Snmp-server enable traps violation - 18

background image

Management Commands

AT8901/2/3

AT8901/2/3 CLI Reference Manual

Page 6 - 18

6.6.5.1

no snmp-server community ipmask

This command sets a client IP mask for an SNMP community to 0.0.0.0. The name is
the applicable community name. The community name may be up to 16 alphanumeric
characters.

Format

no snmp-server community ipmask

Mode

Global Config

6.6.6

snmp-server community mode

This command activates an SNMP community. If a community is enabled, an SNMP
manager associated with this community manages the switch according to its access
right. If the community is disabled, no SNMP requests using this community are
accepted. In this case the SNMP manager associated with this community cannot
manage the switch until the Status is changed back to Enable.

Default

private and public communities - enabled
other four - disabled

Format

snmp-server community mode

Mode

Global Config

6.6.6.1

no snmp-server community mode

This command deactivates an SNMP community. If the community is disabled, no
SNMP requests using this community are accepted. In this case the SNMP manager
associated with this community cannot manage the switch until the Status is changed
back to Enable.

Format

no snmp-server community mode

Mode

Global Config

6.6.7

snmp-server community ro

This command restricts access to switch information. The access mode is read-only
(also called public).

Format

snmp-server community ro

Mode

Global Config

6.6.8

snmp-server community rw

This command restricts access to switch information. The access mode is read/write
(also called private).

Format

snmp-server community rw

Mode

Global Config

6.6.9

snmp-server enable traps violation

This command enables the sending of new violation traps designating when a packet
with a disallowed MAC address is received on a locked port.