Configuring SNMPv3 in a MetroCluster configuration
The authentication and privacy protocols on the switches and on the ONTAP system must be the same.
ONTAP currently supports AES-128 and AES-256 encryption.
- Create an SNMP user for each switch from the controller prompt: security login create
Controller_A_1::> security login create -user-or-group-name monitoringv3ro -application snmp -authentication-method usm -role none -remote-switch-ipaddress 10.10.10.10
- Respond to the following prompts as required at your site:
Enter the authoritative entity's EngineID [remote EngineID]:
Which authentication protocol do you want to choose (none, md5, sha, sha2-256) [none]: sha
Enter the authentication protocol password (minimum 8 characters long):
Enter the authentication protocol password again:
Which privacy protocol do you want to choose (none, des, aes128) [none]: aes128
Enter privacy protocol password (minimum 8 characters long):
Enter privacy protocol password again:NoteThe same username can be added to different switches with different IP addresses. - Create an SNMP user for the rest of the switches. The following example shows how to create a username for a switch with the IP address 10.10.10.10.
Controller_A_1::> security login create -user-or-group-name -application snmp -authentication-method usm -role none -remote-switch-ipaddress 10.
10.10.10 - Check that there is one login entry for each switch: security login show
Controller_A_1::> security login show -user-or-group-name snmpv3user -fields remote-switch-ipaddress
vserver user-or-group-name application authentication-method remote-switch-ipaddress
------------ ------------------ ----------- --------------------- -----------------------
node_A_1 SVM 1 snmpv3user snmp usm 10.10.10.10
node_A_1 SVM 2 snmpv3user snmp usm 10.10.10.11
node_A_1 SVM 3 snmpv3user snmp usm 10.10.10.12
node_A_1 SVM 4 snmpv3user snmp usm 10.10.10.13
4 entries were displayed. - Configure SNMPv3 on the switches from the switch prompt: snmpconfig --set snmpv3
Switch-A1:admin> snmpconfig --set snmpv3
SNMP Informs Enabled (true, t, false, f): [false] true
SNMPv3 user configuration(snmp user not configured in FOS user database will have physical AD and admin role as the default):
User (rw): [snmpadmin1]
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [3]
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [2]
Engine ID: [00:00:00:00:00:00:00:00:00]
User (ro): [snmpuser2] snmpv3user
Auth Protocol [MD5(1)/SHA(2)/noAuth(3)]: (1..3) [2]
Priv Protocol [DES(1)/noPriv(2)/AES128(3)/AES256(4)]): (2..2) [3]The example shows how to configure a read-only user. You can adjust the RW users if needed. You should also set passwords on unused accounts to secure them and use the best encryption available in your ONTAP release. - Configure encryption and passwords on the remaining switch users as required on your site.
Give documentation feedback