Snmp login control configuration example, Network requirements – H3C Technologies H3C SecBlade LB Cards User Manual
Page 99

89
Step Command
Remarks
2.
Create a basic ACL and
enter its view, or enter the
view of an existing basic
ACL.
acl [ ipv6 ] number acl-number [ name name ]
[ match-order { config | auto } ]
By default, no basic
ACL exists.
3.
Configure an ACL rule.
rule [ rule-id ] { deny | permit } [ counting |
fragment | logging | source { sour-addr
sour-wildcard | any } | time-range
time-range-name | vpn-instance
vpn-instance-name ] *
N/A
4.
Exit the basic ACL view.
quit
N/A
5.
Apply the ACL to an
SNMP community, group,
or user.
•
SNMPv1/v2c community:
snmp-agent community { read | write }
community-name [ mib-view view-name ] [ acl
acl-number | acl ipv6 ipv6-acl-number ] *
•
SNMPv1/v2c group:
snmp-agent group { v1 | v2c } group-name
[ read-view read-view ] [ write-view write-view ]
[ notify-view notify-view ] [ acl acl-number | acl
ipv6 ipv6-acl-number ] *
•
SNMPv3 group:
snmp-agent group v3 group-name
[ authentication | privacy ] [ read-view
read-view ] [ write-view write-view ]
[ notify-view notify-view ] [ acl acl-number | acl
ipv6 ipv6-acl-number ] *
•
SNMPv1/v2c user:
snmp-agent usm-user { v1 | v2c } user-name
group-name [ acl acl-number | acl ipv6
ipv6-acl-number ] *
•
SNMPv3 user:
snmp-agent usm-user v3 user-name
group-name [ [ cipher ] authentication-mode
{ md5 | sha } auth-password [ privacy-mode
{ 3des | aes128 | des56 } priv-password ] ] [ acl
acl-number | acl ipv6 ipv6-acl-number ] *
For more information
about SNMP, see
System Maintenance
Configuration Guide.
SNMP login control configuration example
Network requirements
Configure the LB product in
to allow Host A and Host B to access LB through SNMP.