80
To do…
Use the command…
Remarks
Associate this SNMP community
with the ACL
snmp-agent community
{
read
|
write
}
community-name
[
acl
acl-number
|
mib-view
view-name
]*
Associate the SNMP group with
the ACL
snmp-agent group
{
v1
|
v2c
}
group-name
[
read-view
read-view
] [
write-view
write-view
] [
notify-view
notify-view
] [
acl
acl-number
]
snmp-agent group
v3
group-name
[
authentication
|
privacy
]
[
read-view
read-view
]
[
write-view
write-view
]
[
notify-view
notify-view
] [
acl
acl-number
]
Associate the user with the ACL
snmp-agent usm-user
{
v1
|
v2c
}
user-name
group-name
[
acl
acl-number
]
snmp-agent usm-user
v3
user-name
group-name
[ [
cipher
]
authentication-mode
{
md5
|
sha
}
auth-password
[
privacy-mode
{
3des
|
aes128
|
des56
}
priv-password
] ] [
acl
acl-number
]
Required
You can associate the ACL when
creating the community, the SNMP
group, and the user.
For more information about
SNMP, see
Network Management
and Monitoring Configuration
Guide.
Source IP-based login control over NMS users configuration
example
Network requirements
As shown in
, configure the device to allow only NMS users from Host A and Host B to access.
Figure 34
Network diagram
Configuration procedure
# Create ACL 2000, and configure rule 1 to permit packets sourced from Host B, and rule 2 to permit
packets sourced from Host A.