Configure Snmp For Remote Management - Cisco Catalyst 3850 Manual

Hide thumbs Also See for Catalyst 3850:
Table of Contents

Advertisement

Assign Initial Management Information

Configure SNMP for Remote Management

Step 4
Enable Simple Network Management Protocol (SNMP) to allow the network infrastructure devices to
be managed by a remote Network Management System (NMS). Configure SNMPv2c read-only and
read-write community strings, as shown in the following example. Once SNMP community strings are
configured, then SNMP tools can be used to monitor the 3850 which includes statistics.
snmp-server community
snmp-server community
Configure Local Login and Password for Switch Access
Step 5
Configure a local user ID and password to secure access to the switch.
We recommend that you encrypt passwords to secure access to the device configuration mode and
prevent the display of plain text passwords in configuration files.
username admin privilege 15 secret
enable secret
service password-encryption
Configure Centralized User Authentication Through TACACS+
Note
Configuring the TACACS+ protocol is optional and recommended only when using TACACS to manage
all of your network devices.
Configure centralized user authentication through the TACACS+ protocol.
Step 6
As networks increase the number of devices to maintain, there is an operational burden to maintain local
user accounts on every device. A centralized authentication, authorization, and accounting (AAA)
service reduces operational tasks on each device and provides an audit log of user access for security
compliance and root-cause analysis. When AAA is enabled for access control, all management access to
the network infrastructure devices (SSH and HTTPS) is controlled by the AAA service.
TACACS+ is the primary protocol used to authenticate management infrastructure devices to determine
whether access can be allowed to the AAA server. A local AAA user database defined on each network
infrastructure device to provide a fallback authentication source in case the centralized TACACS+ server
is unavailable.
This example shows how to configure the switch for TACACS administrative access.
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
20
my-SNMP-RO-name
my-SNMP-RW-name
my-secret-password
RO
RW
my-password
Initial Switch Configuration

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Catalyst 3650

Table of Contents