Network requirements, Configuration procedure – H3C Technologies H3C SecBlade NetStream Cards User Manual
Page 69
54
To do…
Use the command…
Remarks
Associate the user with the
ACL
snmp-agent usm-user { v1 | v2c } user-name
group-name [ acl acl-number ]
snmp-agent usm-user v3 user-name
group-name [ [ cipher ] authentication-mode
{ md5 | sha } auth-password [ privacy-mode
{ 3des | aes128 | des56 } priv-password ] ]
[ acl acl-number ]
Source IP-based login control over NMS users configuration
example
Network requirements
As shown in
, configure the SecBlade card to allow only NMS users from Host A and Host B to
access.
Figure 21 Network diagram for configuring source IP-based login control over NMS users
Configuration procedure
# Create ACL 2000, and configure rule 1 to permit packets sourced from Host B, and rule 2 to permit
packets sourced from Host A.
[SecBlade] acl number 2000 match-order config
[SecBlade-acl-basic-2000] rule 1 permit source 10.110.100.52 0
[SecBlade-acl-basic-2000] rule 2 permit source 10.110.100.46 0
[SecBlade-acl-basic-2000] quit
# Associate the ACL with the SNMP community and the SNMP group.
[SecBlade] snmp-agent community read aaa acl 2000
[SecBlade] snmp-agent group v2c groupa acl 2000
[SecBlade] snmp-agent usm-user v2c usera groupa acl 2000
Host B
10.110.100.52
Host A
10.110.100.46
IP network
SecBlade
IP network
Device