The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsCisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 6.x
This chapter describes how to configure the SNMP feature on Cisco NX-OS devices.
This chapter contains the following sections:
The Simple Network Management Protocol (SNMP) is an application-layer protocol that provides a message format for communication between SNMP managers and agents. SNMP provides a standardized framework and a common language used for the monitoring and management of devices in a network.
The SNMP framework consists of three parts:
SNMP is defined in RFCs 3411 to 3418.
The device supports SNMPv1, SNMPv2c, and SNMPv3. Both SNMPv1 and SNMPv2c use a community-based form of security.
Cisco NX-OS supports SNMP over IPv6.
A key feature of SNMP is the ability to generate notifications from an SNMP agent. These notifications do not require that requests be sent from the SNMP manager. Notifications can indicate improper user authentication, restarts, the closing of a connection, loss of connection to a neighbor router, or other significant events.
Cisco NX-OS generates SNMP notifications as either traps or informs. A trap is an asynchronous, unacknowledged message sent from the agent to the SNMP managers listed in the host receiver table. Informs are asynchronous messages sent from the SNMP agent to the SNMP manager which the manager must acknowledge receipt of.
Traps are less reliable than informs because the SNMP manager does not send any acknowledgment when it receives a trap. The device cannot determine if the trap was received. An SNMP manager that receives an inform request acknowledges the message with an SNMP response protocol data unit (PDU). If the device never receives a response, it can send the inform request again.
You can configure Cisco NX-OS to send notifications to multiple host receivers.
The following table lists the SNMP traps that are enabled by default.
Trap Type | Description |
---|---|
generic | : coldStart |
entity | : entity_fan_status_change |
entity | : entity_mib_change |
entity | : entity_module_status_change |
entity | : entity_module_inserted |
entity | : entity_module_removed |
entity | : entity_power_out_change |
entity | : entity_power_status_change |
entity | : entity_unrecognised_module |
link | : cErrDisableInterfaceEventRev1 |
link | : cieLinkDown |
link | : cieLinkUp |
link | : cmn-mac-move-notification |
link | : delayed-link-state-change |
link | : extended-linkDown |
link | : extended-linkUp |
link | : linkDown |
link | : linkUp |
rf | : redundancy_framework |
license | : notify-license-expiry |
license | : notify-no-license-for-feature |
license | : notify-licensefile-missing |
license | : notify-license-expiry-warning |
upgrade | : UpgradeOpNotifyOnCompletion |
upgrade | : UpgradeJobStatusNotify |
entity | : entity_sensor |
rmon | : fallingAlarm |
rmon | : hcRisingAlarm |
rmon | : hcFallingAlarm |
rmon | : risingAlarm |
SNMPv3 provides secure access to devices by a combination of authenticating and encrypting frames over the network. The security features provided in SNMPv3 are the following:
SNMPv3 provides for both security models and security levels. A security model is an authentication strategy that is set up for a user and the role in which the user resides. A security level is the permitted level of security within a security model. A combination of a security model and a security level determines which security mechanism is employed when handling an SNMP packet.
The security level determines if an SNMP message needs to be protected from disclosure and if the message needs to be authenticated. The various security levels that exist within a security model are as follows:
Three security models are available: SNMPv1, SNMPv2c, and SNMPv3. The security model combined with the security level determine the security mechanism applied when the SNMP message is processed. The following table identifies what the combinations of security models and levels mean.
Uses a community string match for authentication.
Uses a community string match for authentication.
HMAC-MD5, or HMAC-SHA
Provides authentication based on the Hash-Based Message Authentication Code (HMAC) Message Digest 5 (MD5) algorithm or the HMAC Secure Hash Algorithm (SHA).
HMAC-MD5, or HMAC-SHA
Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. Provides Data Encryption Standard (DES) 56-bit encryption in addition to authentication based on the Cipher Block Chaining (CBC) DES (DES-56) standard.
The SNMPv3 User-Based Security Model (USM) refers to SNMP message-level security and offers the following services:
SNMPv3 authorizes management operations only by configured users and encrypts SNMP messages.
Cisco NX-OS uses three authentication protocols for SNMPv3:
Cisco NX-OS uses Advanced Encryption Standard (AES) as one of the privacy protocols for SNMPv3 message encryption and conforms with RFC 3826.
The priv option offers a choice of DES or 128-bit AES encryption for SNMP security encryption. The priv option and the aes-128 token indicate that this privacy password is for generating a 128-bit AES key. The AES priv password can have a minimum of eight characters. If the passphrases are specified in clear text, you can specify a maximum of 64 case-sensitive, alphanumeric characters. If you use the localized key, you can specify a maximum of 130 characters.
For an SNMPv3 operation using the external AAA server, you must use AES for the privacy protocol in the user configuration on the external AAA server.
SNMPv3 user management can be centralized at the Access Authentication and Accounting (AAA) server level. This centralized user management allows the SNMP agent in Cisco NX-OS to leverage the user authentication service of the AAA server. Once user authentication is verified, the SNMP PDUs are processed further. Additionally, the AAA server is also used to store user group names. SNMP uses the group names to apply the access/role policy that is locally available in the switch.
Any configuration changes made to the user group, role, or password results in database synchronization for both SNMP and AAA.
Cisco NX-OS synchronizes the user configuration in the following ways:
When you configure a passphrase/password in localized key/encrypted format, Cisco NX-OS does not synchronize the user information (passwords, roles, and so on).
Cisco NX-OS holds the synchronized user configuration for 60 minutes by default.
Because group is a standard SNMP term used industry-wide, we refer to roles as groups in this SNMP section.
SNMP access rights are organized by groups. Each group in SNMP is similar to a role through the CLI. Each group is defined with read access or read-write access.
You can begin communicating with the agent once your username is created, your roles are set up by your administrator, and you are added to the roles.
The Embedded Event Manager (EEM) feature monitors events, including SNMP MIB objects, and triggers an action based on these events. One of the actions could be to send an SNMP notification. EEM sends the cEventMgrPolicyEvent of CISCO-EMBEDDED-EVENT-MGR-MIB as the SNMP notification.
A device can support multiple instances of a logical network entity, such as protocol instances or virtual routing and forwarding (VRF) instances. Most existing MIBs cannot distinguish between these multiple logical network entities. For example, the original OSPF-MIB assumes a single protocol instance on a device, but you can now configure multiple OSPF instances on a device.
SNMPv3 uses contexts to distinguish between these multiple instances. An SNMP context is a collection of management information that you can access through the SNMP agent. A device can support multiple contexts for different logical network entities. An SNMP context allows the SNMP manager to access one of the multiple instances of a MIB module supported on the device for the different logical network entities.
Cisco NX-OS supports the CISCO-CONTEXT-MAPPING-MIB to map between SNMP contexts and logical network entities. You can associate an SNMP context to a VRF, protocol instance, or topology.
SNMPv3 supports contexts with the contextName field of the SNMPv3 PDU. You can map this contextName field to a particular protocol instance or VRF.
For SNMPv2c, you can map the SNMP community to a context using the snmpCommunityContextName MIB object in the SNMP-COMMUNITY-MIB (RFC 3584). You can then map this snmpCommunityContextName to a particular protocol instance or VRF using the CISCO-CONTEXT-MAPPING-MIB or the CLI.
Cisco NX-OS supports stateless restarts for SNMP. After a reboot or supervisor switchover, Cisco NX-OS applies the running configuration.
Cisco NX-OS supports one instance of the SNMP. SNMP supports multiple MIB module instances and maps them to logical network entities.
SNMP is also VRF aware. You can configure SNMP to use a particular VRF to reach the SNMP notification host receiver. You can also configure SNMP to filter notifications to an SNMP host receiver based on the VRF where the notification occurred.
SNMP has the following configuration guidelines and limitations:
The following table lists the default settings for SNMP parameters.
Parameters | Default |
---|---|
License notifications | Enabled |
You can configure a user for SNMP.
switch# configure terminal switch(config)#
Enters global configuration mode.
(Optional) show snmp user
switch(config)# show snmp user
Displays information about one or more SNMP users.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
You can configure SNMP to require authentication or encryption for incoming requests. By default, the SNMP agent accepts SNMPv3 messages without authentication and encryption. When you enforce privacy, Cisco NX-OS responds with an authorization error for any SNMPv3 PDU request using a security level parameter of either noAuthNoPriv or authNoPriv .
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server user name enforcePriv
switch(config)# snmp-server user Admin enforcePriv
Enforces SNMP message encryption for this user.
switch(config)# snmp-server globalEnforcePriv
Enforces SNMP message encryption for all users.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
After you configure an SNMP user, you can assign multiple roles for the user.
Only users belonging to a network-admin role can assign roles to other users.
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server user name group
switch(config)# snmp-server user Admin superuser
Associates this SNMP user with the configured user role.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
You can create SNMP communities for SNMPv1 or SNMPv2c.
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server community name
switch(config)# snmp-server community public ro
Creates an SNMP community string.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
ACL with SNMPv3 user is not supported. You can assign an access control list (ACL) to an SNMPv2 community to filter SNMP requests. If the assigned ACL allows the incoming request packet, SNMP processes the request. If the ACL denies the request, SNMP drops the request and sends a system message.
Create the ACL with the following parameters:
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server community name [ use-ipv4acl acl-name ]
switch(config)# snmp-server community public use-ipv4acl myacl
Assigns an IPv4 ACL to an SNMPv2 community to filter SNMP requests.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
You can configure Cisco NX-OS to generate SNMP notifications to multiple host receivers.
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server host ip-address traps version 1 community [ udp_port number ]
switch(config)# snmp-server host 192.0.2.1 traps version 1 public
Configures a host receiver for SNMPv1 traps. The ip-address can be an IPv4 or IPv6 address. The community can be any alphanumeric string up to 255 characters. The UDP port number range is from 0 to 65535.
snmp-server host ip-address < traps | informs >version 2c community [ udp_port number ]
switch(config)# snmp-server host 192.0.2.1 informs version 2c public
Configures a host receiver for SNMPv2c traps or informs. The ip-address can be an IPv4 or IPv6 address. The community can be any alphanumeric string up to 255 characters. The UDP port number range is from 0 to 65535.
snmp-server host ip-address < traps | informs >version 3 < auth | noauth | priv >username [ udp_port number ]
switch(config)# snmp-server host 192.0.2.1 informs version 3 auth NMS
The SNMP manager must know the user credentials (authKey/PrivKey) based on the SNMP engine ID of the Cisco NX-OS device to authenticate and decrypt the SNMPv3 messages.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
You can configure SNMP to use the IP address of an interface as the source IP address for notifications. When a notification is generated, its source IP address is based on the IP address of this configured interface.
You can configure a source interface as follows:
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server host ip-address source-interface if-type if-number traps version 2c name
snmp-server host 192.0.2.1 source-interface ethernet 2/1 traps version 2c public
(Optional) Send Traps messages to this host.
The traps version is the SNMP version to use for notification messages. 2c indicates that SNMPv2c is to be used.
snmp-server host ip-address source-interface if-type if-number use-vrf vrf-name
snmp-server host 192.0.2.1 source-interface ethernet 2/1 use-vrf default
Configures SNMP to use the selected VRF to communicate with the host receiver. The ip-address can be an IPv4 or IPv6 address. The VRF name can be any alphanumeric string up to 32 characters.
This command does not remove the host configuration.
snmp-server host ip-address source-interface if-type if-number [ udp_port number ]
switch(config)# snmp-server host 192.0.2.1 source-interface ethernet 2/1
Configures a host receiver for SNMPv2c traps or informs. The ip-address can be an IPv4 or IPv6 address. Use ? to determine the supported interface types. The UDP port number range is from 0 to 65535.
This configuration overrides the global source interface configuration.
snmp-server source-interface < traps | informs >if-type if-number
switch(config)# snmp-server source-interface traps ethernet 2/1
Configures a source interface for sending out SNMPv2c traps or informs. Use ? to determine the supported interface types.
show snmp source-interface
switch(config)# show snmp source-interface
Displays information about configured source interfaces.
You must configure a notification target user on the device to send SNMPv3 inform notifications to a notification host receiver.
Cisco NX-OS uses the credentials of the notification target user to encrypt the SNMPv3 inform notification messages to the configured notification host receiver.
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server user name [ auth < md5 | sha | sha-256 >passphrase [ auto ] [ priv [ aes-128 ] passphrase ] [ engineID id ]
switch(config)# snmp-server user NMS auth sha abcd1234 priv abcdefgh engineID 00:00:00:63:00:01:00:10:20:15:10:03
Configures the notification target user with the specified engine ID for the notification host receiver. The engine ID format is a 12-digit colon-separated decimal number.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
SNMP adds entries into the cExtSnmpTargetVrfTable of the CISCO-SNMP-TARGET-EXT-MIB when you configure the VRF reachability and filtering options for an SNMP notification receiver.
You must configure the host before configuring the VRF reachability or filtering options.
You can configure Cisco NX-OS to use a configured VRF to reach the host receiver or to filter notifications based on the VRF in which the notification occurred.
switch# configure terminal switch(config)#
Enters global configuration mode.
[ no ] snmp-server host ip-address use-vrf vrf-name [ udp_port number ]
switch(config)# snmp-server host 192.0.2.1 use-vrf Blue
Configures SNMP to use the selected VRF to communicate with the host receiver. The ip-address can be an IPv4 or IPv6 address. The VRF name can be any alphanumeric string up to 255 characters. The UDP port number range is from 0 to 65535. This command adds an entry into the ExtSnmpTargetVrfTable of the CISCO-SNMP-TARGET-EXT-MB.
The no form of this command removes the VRF reachability information for the configured host and removes the entry from the ExtSnmpTargetVrfTable of the CISCO-SNMP-TARGET-EXT-MB.
This command does not remove the host configuration.
[ no ] snmp-server host ip-address filter-vrf vrf-name [ udp_port number ]
switch(config)# snmp-server host 192.0.2.1 filter-vrf Red
Filters notifications to the notification host receiver based on the configured VRF. The ip-address can be an IPv4 or IPv6 address. The VRF name can be any alphanumeric string up to 255 characters. The UDP port number range is from 0 to 65535.
This command adds an entry into the ExtSnmpTargetVrfTable of the CISCO-SNMP-TARGET-EXT-MB.
The no form of this command removes the VRF filter information for the configured host and removes the entry from the ExtSnmpTargetVrfTable of the CISCO-SNMP-TARGET-EXT-MB.
This command does not remove the host configuration.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
You can configure SNMP to send traps using an inband port. To do so, you must configure the source interface (at the global or host level) and the VRF used to send the traps.
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server source-interface traps if-type if-number
switch(config)# snmp-server source-interface traps ethernet 1/2
Globally configures a source interface for sending out SNMP traps. Use ? to determine the supported interface types.
You can configure the source interface at the global level or at a host level. When the source interface is configured globally, any new host configuration uses the global configuration to send the traps.
(Optional) show snmp source-interface
switch(config)# show snmp source-interface
Displays information about configured source interfaces.
snmp-server host ip-address use-vrf vrf-name [ udp_port number ]
switch(config)# snmp-server host 171.71.48.164 use-vrf default
Configures SNMP to use the selected VRF to communicate with the host receiver. The ip-address can be an IPv4 or IPv6 address. The VRF name can be any alphanumeric string up to 255 characters. The UDP port number range is from 0 to 65535. This command adds an entry into the ExtSnmpTargetVrfTable of the CISCO-SNMP-TARGET-EXT-MB.
(Optional) show snmp host
switch(config)# show snmp host
Displays information about configured SNMP hosts.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
You can enable or disable notifications. If you do not specify a notification name, Cisco NX-OS enables all notifications except BGP, EIGRP, and OSPF notifications.
The following table lists the commands that enable the notifications for Cisco NX-OS MIBs.
All notifications (except BGP, EIGRP, and OSPF)
snmp-server enable traps
snmp-server enable traps aaa
snmp-server enable traps aaa server-state-change
snmp-server enable traps bgp
snmp-server enable traps callhome
snmp-server enable traps callhome event-notify
snmp-server enable traps callhome smtp-send-fail
snmp-server enable traps config
snmp-server enable traps config ccmCLIRunningConfigChanged
snmp-server enable traps eigrp [ tag ]
snmp-server enable traps link cerrDisableInterfaceEventRev1
snmp-server enable traps entity
snmp-server enable traps entity entity_fan_status_change
snmp-server enable traps entity entity_mib_change
snmp-server enable traps entity entity_module_inserted
snmp-server enable traps entity entity_module_removed
snmp-server enable traps entity entity_module_status_change
snmp-server enable traps entity entity_power_out_change
snmp-server enable traps entity entity_power_status_change
snmp-server enable traps entity entity_unrecognised_module
snmp-server enable traps feature-control
snmp-server enable traps feature-control FeatureOpStatusChange
snmp-server enable traps hsrp
snmp-server enable traps hsrp state-change
snmp-server enable traps license
snmp-server enable traps license notify-license-expiry
snmp-server enable traps license notify-license-expiry-warning
snmp-server enable traps license notify-licensefile-missing
snmp-server enable traps license notify-no-license-for-feature
snmp-server enable traps link
snmp-server enable traps link IETF-extended-linkDown
snmp-server enable traps link IETF-extended-linkUp
snmp-server enable traps link cisco-extended-linkDown
snmp-server enable traps link cisco-extended-linkUp
snmp-server enable traps link linkDown
snmp-server enable traps link Up
snmp-server enable traps ospf [ tag ]
snmp-server enable traps ospf lsa
snmp-server enable traps ospf rate-limit rate
snmp-server enable traps rf
snmp-server enable traps rf redundancy_framework
snmp-server enable traps rmon
snmp-server enable traps rmon fallingAlarm
snmp-server enable traps rmon hcFallingAlarm
snmp-server enable traps rmon hcRisingAlarm
snmp-server enable traps rmon risingAlarm
snmp-server enable traps snmp
snmp-server enable traps snmp authentication
storm-control action trap
snmp-server enable traps stpx stpxMstInconsistencyUpdate
snmp-server enable traps bridge
snmp-server enable traps bridge newroot
snmp-server enable traps bridge topologychange
snmp-server enable traps stpx
snmp-server enable traps stpx inconsistency
snmp-server enable traps stpx loop-inconsistency
snmp-server enable traps stpx root-inconsistency
snmp-server enable traps sysmgr
snmp-server enable traps sysmgr cseFailSwCoreNotifyExtended
snmp-server enable traps upgrade
snmp-server enable traps upgrade UpgradeJobStatusNotify
snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion
snmp-server enable traps vtp
snmp-server enable traps vtp notifs
snmp-server enable traps vtp vlancreate
snmp-server enable traps vtp vlandelete
Use the following commands in the configuration mode shown to enable the specified notification:
Example:
switch(config)# snmp-server enable traps
Enables all SNMP notifications.
Example:
switch(config)# snmp-server enable traps aaa
Enables the AAA SNMP notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps bgp
Enables Border Gateway Protocol (BGP) SNMP notifications.
Example:
switch(config)# snmp-server enable traps bridge
Enables STP bridge SNMP notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps callhome
Enables Call Home notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps config
Enables SNMP notifications for configuration changes.
Example:
switch(config)# snmp-server enable traps eigrp
Enables CISCO-EIGRP-MIB SNMP notifications.
Example:
switch(config)# snmp-server enable traps entity
Enables ENTITY-MIB SNMP notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps feature-control
Enables feature-control SNMP notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps hsrp
Enables CISCO-HSRP-MIB SNMP notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps license
Enables ENTITY-MIB SNMP notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps link
Enables IF-MIB link notifications. Optionally, enable the following specific notifications:
Example:
switch(config)# snmp-server enable traps ospf
Enables Open Shortest Path First (OSPF) notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps rf
Enables redundancy framework (RF) SNMP notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps rmon
Enables remote monitoring (RMON) SNMP notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps snmp
Enables general SNMP notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps stpx
Enables SNMP STPX notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps syslog
Sends syslog messages as traps to the defined SNMP host. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps sysmgr
Enables software change notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps upgrade
Enables upgrade notifications. Optionally, enables the following specific notifications:
Example:
switch(config)# snmp-server enable traps vtp
Enables VTP notifications. Optionally, enables the following specific notifications:
Example:
switch(config-if)# storm-control action traps
Enables traffic storm control notifications when the traffic storm control limit is reached.
You can disable linkUp and linkDown notifications on an individual interface. You can use this limit notifications on flapping interface (an interface that transitions between up and down repeatedly).
switch# configure terminal switch(config)#
Enters global configuration mode.
interface type slot / port
switch(config)# interface ethernet 2/2
Disables SNMP link-state traps for the interface. This command is enabled by default.
no snmp trap link-status
switch(config-if)# no snmp trap link-status
Disables SNMP link-state traps for the interface. This command is enabled by default.
(Optional) copy running-config startup-config
switch(config-if)# copy running-config startup-config
Copies the running configuration to the startup configuration.
The SNMP ifIndex is used across multiple SNMP MIBs to link related interface information.
show interface snmp-ifindex
switch# show interface snmp-ifindex | grep -i Eth12/1 Eth12/1 441974784 (0x1a580000)
Displays the persistent SNMP ifIndex value from the IF-MIB for all interfaces. Optionally, use the | keyword and the grep keyword to search for a particular interface in the output.
You can enable a one-time authentication for SNMP over a TCP session.
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server tcp-session [ auth ]
switch(config)# snmp-server tcp-session
Enables a one-time authentication for SNMP over a TCP session. The default is disabled.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
You can assign the device contact information, which is limited to 32 characters (without spaces) and the device location.
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server contact name
switch(config)# snmp-server contact Admin
Configures sysContact, which is the SNMP contact name.
snmp-server location name
switch(config)# snmp-server location Lab-7
Configures sysLocation, which is the SNMP location.
(Optional) show snmp
switch(config)# show snmp
Displays information about one or more destination profiles.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
You can configure an SNMP context to map to a logical network entity, such as a protocol instance or VRF.
Determine the logical network entity instance. For more information on VRFs and protocol instances, see the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide or the Cisco Nexus 9000 Series NX-OS Multicast Routing Configuration Guide.
switch# configure terminal switch(config)#
Enters global configuration mode.
[ no ] snmp-server context context-name [ instance instance-name ] [ vrf vrf-name ] [ topology topology-name ]
switch(config)# snmp-server context public1 vrf red
Maps an SNMP context to a protocol instance, VRF, or topology. The names can be any alphanumeric string up to 32 characters.
The no option deletes the mapping between an SNMP context and a protocol instance, VRF, or topology.
(Optional) snmp-server mib community-map community-name context context-name
switch(config)# snmp-server mib community-map public context public1
Maps an SNMPv2c community to an SNMP context. The names can be any alphanumeric string up to 32 characters.
(Optional) show snmp context
switch(config)# show snmp context
Displays information about one or more SNMP contexts.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
You can disable SNMP on the device.
switch# configure terminal switch(config)#
Enters global configuration mode.
no snmp-server protocol enable
switch(config)# no snmp-server protocol enable
Disables SNMP. SNMP is enabled by default.
You cannot disable SNMPv1 without disabling SNMPv2. If you want to disable SNMPv1, then configure only SNMPv3, or disable SNMP entirely.
You can modify how long Cisco NX-OS holds the synchronized user configuration.
switch# configure terminal switch(config)#
Enters global configuration mode.
snmp-server aaa-user cache-timeout seconds
switch(config)# snmp-server aaa-user cache-timeout 1200
Configures how long the AAA synchronized user configuration stays in the local cache. The range is from 1 to 86400 seconds. The default is 3600.
(Optional) copy running-config startup-config
switch(config)# copy running-config startup-config
Copies the running configuration to the startup configuration.
To display SNMP configuration information, perform one of the following tasks:
Displays the SNMP ifIndex value for all interfaces (from IF-MIB).
Displays the SNMP running configuration.
Beginning with 9.3(8) release, SNMPv3 users under show run will be represented in SALT format instead of hash.
Displays the SNMP status.
Displays the SNMP community strings.
If the name of the SNMP context in the snmp-server mib community-map command is more than 11 characters, the output of the show snmp community command is displayed in a vertical format instead of a tabular format.
Displays the SNMP context mapping.
Displays the SNMP engineID.
Displays SNMP roles.
Displays information about configured SNMP hosts.
Displays SNMP sessions.
Displays information about configured source interfaces.
Displays the SNMP notifications enabled or disabled.
Displays SNMPv3 users.
This example shows how to configure Cisco NX-OS to send the Cisco linkUp or Down notifications to one notification host receiver using the Blue VRF and defines two SNMP users, Admin and NMS:
configure terminal snmp-server contact Admin@company.com snmp-server user Admin auth sha abcd1234 priv abcdefgh snmp-server user NMS auth sha abcd1234 priv abcdefgh engineID 00:00:00:63:00:01:00:22:32:15:10:03 snmp-server host 192.0.2.1 informs version 3 auth NMS snmp-server host 192.0.2.1 use-vrf Blue snmp-server enable traps link cisco
This example shows how to configure SNMP to send traps using an inband port configured at the host level:
switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# snmp-server host 171.71.48.164 version 2c public switch(config)# snmp-server host 171.71.48.164 source-interface ethernet 1/2 switch(config)# show snmp host ------------------------------------------------------------------- Host Port Version Level Type SecName ------------------------------------------------------------------- 171.71.48.164 162 v2c noauth trap public Source interface: Ethernet 1/2 ------------------------------------------------------------------- switch(config)# snmp-server host 171.71.48.164 use-vrf default switch(config)# show snmp host ------------------------------------------------------------------- Host Port Version Level Type SecName ------------------------------------------------------------------- 171.71.48.164 162 v2c noauth trap public Use VRF: default Source interface: Ethernet 1/2 -------------------------------------------------------------------
This example shows how to configure SNMP to send traps using a globally configured inband port:
switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# snmp-server source-interface traps ethernet 1/2 switch(config)# show snmp source-interface ------------------------------------------------------------------- Notification source-interface ------------------------------------------------------------------- trap Ethernet1/2 inform - ------------------------------------------------------------------- switch(config)# snmp-server host 171.71.48.164 use_vrf default switch(config)# show snmp host ------------------------------------------------------------------- Host Port Version Level Type SecName ------------------------------------------------------------------- 171.71.48.164 162 v2c noauth trap public Use VRF: default Source interface: Ethernet 1/2 -------------------------------------------------------------------
This example shows how to map VRF red to the SNMPv2c public community string:
switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# vrf context red switch(config-vrf)# exit switch(config)# snmp-server context public1 vrf red switch(config)# snmp-server mib community-map public context public1
This example shows how to map OSPF instance Enterprise to the same SNMPv2c public community string:
switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. switch(config)# feature ospf switch(config)# router ospf Enterprise switch(config-router)# exit switch(config)# snmp-server context public1 instance Enterprise switch(config)# snmp-server mib community-map public context public1
Related Topic | Document Title |
---|---|
IP ACLs and AAA | Cisco Nexus 9000 Series NX-OS Security Configuration Guide |
MIBs | Cisco Nexus 7000 Series and 9000 Series NX-OS MIB Quick Reference |
RFC | Title |
---|---|
RFC 3414 | User-based Security Model (USM) for Version 3 of the Simple Network Management Protocol (SNMPv3) |
RFC 3415 | View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP) |