16-6
Cisco Aironet 1400 Series Wireless Bridges Software Configuration Guide
OL-4059-01
Chapter 16 Configuring SNMP
Configuring SNMP
Beginning in privileged EXEC mode, follow these steps to configure a community string on the bridge:
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
snmp-server community
string
[
access-list-number
]
[
view
mib-view
]
[
ro
|
rw
]
Configure the community string.
•
For
string
, specify a string that acts like a password and
permits access to the SNMP protocol. You can configure one
or more community strings of any length.
•
(Optional) For
access-list-number
, enter an IP standard access
list numbered from 1 to 99 and 1300 to 1999.
•
(Optional) For
view
mib-view
, specify a MIB view to which
this community has access, such as
ieee802dot11
. See the
“Using the snmp-server view Command” section on page 16-9
for instructions on using the
snmp-server view
command to
access Standard IEEE 802.11 MIB objects through IEEE view.
•
(Optional) Specify either read-only (
ro
) if you want
authorized management stations to retrieve MIB objects, or
specify read/write (
rw
) if you want authorized management
stations to retrieve and modify MIB objects. By default, the
community string permits read-only access to all objects.
Note
To access the IEEE802dot11 MIB, you must enable either
a separate community string and view on the
IEEE802dot11 MIB or a common view and community
string on the ISO object in the MIB object tree.
Step 3
access-list
access-list-number
{
deny
|
permit
}
source
[
source-wildcard
]
(Optional) If you specified an IP standard access list number in
Step 2, then create the list, repeating the command as many times
as necessary.
•
For
access-list-number
, enter the access list number specified
in Step 2.
•
The
deny
keyword denies access if the conditions are
matched. The
permit
keyword permits access if the conditions
are matched.
•
For
source
, enter the IP address of the SNMP managers that
are permitted to use the community string to gain access to the
agent.
•
(Optional) For
source-wildcard
, enter the wildcard bits in
dotted decimal notation to be applied to the source. Place ones
in the bit positions that you want to ignore.
Recall that the access list is always terminated by an implicit deny
statement for everything.
Step 4
end
Return to privileged EXEC mode.
Step 5
show running-config
Verify your entries.
Step 6
copy running-config startup-config
(Optional) Save your entries in the configuration file.