Created on
02-02-2022
08:56 AM
Edited on
12-16-2025
05:57 AM
By
Jean-Philippe_P
| Description | This article describes how to configure and test SNMPv3 and SNMPv2 config on FortiManager/FortiAnalyzer. |
| Scope | FortiManager, FortiAnalyzer. |
| Solution |
How to configure SNMP V3:
config system interface edit port1 set allowaccess snmp ... next end
end
If this is set to disable but the system snmp user has been configured, the debug will not generate anything.
config system snmp user
It is possible to choose the notifications and traps:
It is possible to choose a security level.
If the SNMP Trap received is 10.5.53.226, and the authorization password is 'Fortinet' as well as the privacy password, the following config will appear.
set query-port 161 (SNMPv3 query port (1 - 65535, default = 161)
Note: SNMPv1 and SNMPv2 support custom trap and query ports. However, SNMPv3 only supports custom query ports. Then, to test it, it is possible to use 'snmpwalk' on Linux:
If the FortiManager has IP 10.5.53.205, it will be the following command:
snmpwalk -v3 -l authPriv -u SEC-TEST -a SHA -A "fortinet" -x AES -X "fortinet" 10.5.53.205
To test SNMPv3 without authentication or privacy (no-auth-no-priv), configure the SNMPv3 user as follows:
config system snmp user edit "SEC-TEST" set events disk_low ha_switch intf_ip_chg sys_reboot cpu_high mem_low cpu-high-exclude-nice set notify-hosts 10.5.53.226 set security-level no-auth-no-priv set query-port 161 (SNMPv3 query port (1 - 65535, default = 161) set notify-port 162 (1 - 65535, default = 162) <-- This new feature will be available from FortiManager/FortiAnalyzer v7.6.1. next end
From a Linux system, test SNMP access using the command:
snmpwalk -v3 -l noAuthNoPriv -u SEC-TEST 192.168.251.75
In case a ticket needs to be opened with TAC, the following information needs to be collected and provided while opening a ticket:
config of the FortiManager or FortiAnalyzer <----- System Backup file. execute tac report <----- 1st CLI window. diagnose debug app snmpd 255 <----- 2nd CLI window. diagnose debug enable
In the 3rd CLI window:
diagnose sniffer packet any "port 161 and host <linux station>" 3 0 a
Then run the 'snmpwalk' command in step 2 and send the output of all the above commands.
How to configure SNMP V2:
config system interface edit port1 set allowaccess snmp ... next end
config system snmp user
It is possible to choose the notifications and traps:
It is possible to choose a security level.
If the SNMP Trap received is 10.5.209.160, and the authorization password is 'Fortinet' as well as the privacy password, the following config will appear.
set query-port 161 (SNMPv2 query port (1 - 65535, default = 161)
config system snmp community (community)# edit 1 (1)# set name SNMP-Linux (1)# set query_v2c_status enable (1)# set query_v2c_port 161 (1)# config hosts (hosts)# edit 1 (1)# set interface port1
snmpwalk -v2c -c "SNMP-Linux" -l authPriv -u FORTI-SNMP -a SHA -A "fortinet" -x AES -X "fortinet" 10.5.49.115
Fortinet supports only the 'SNM' v2c 'community version'.
In case a ticket needs to be opened with TAC (Support), the following information needs to be collected and provided while opening a ticket:
config of the FortiManager or FortiAnalyzer <----- System Backup file. execute tac report <----- 1st CLI window. diagnose debug app snmpd 255 <----- 2nd CLI window. diagnose debug enable
In the 3rd CLI window:
diagnose sniffer packet any "port 161 and host <linux station>" 3 0 a
Related documents: Technical Tip: How to get and troubleshoot MIBs and OIDs from SNMP Troubleshooting Tip: Testing FortiManager and FortiAnalyzer SNMPv3 from a Linux |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.