Created on
‎09-28-2018
04:39 AM
Edited on
‎02-27-2024
11:21 AM
By
khoffman
Description
For additional information, refer to the Cisco product command reference.
Scope
FortiNAC.
Solution
- Switches must have unique Engine IDs. Engine IDs are used to identify the unit.
- Read and write SNMP v3 privileges are required. The write privileges are necessary for admin control of the port state.
- There are suggestions to skip using '@' symbol in the SNMP community strings (https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3se/consolidated_guide/b...).
An SNMP engine ID is generated automatically on Cisco devices based on Cisco's enterprise number and the physical address of one of the switch's interfaces.
Care should be taken when configuring a different engine ID. Refer to the appropriate Cisco documentation for consideration. It is not uncommon for customers to copy and paste configurations between switches.
If Engine IDs need to be deleted (due to duplicates):
- Identify the user that corresponds to the Engine ID to be deleted.
- Delete the user before deleting the corresponding Engine ID. A user cannot be deleted if its corresponding Engine ID was already removed. If the Engine ID was already deleted, add it back and then delete the user.
The commands below show what is configured for SNMP Engine ID, users, groups, and views:
show snmp user
show snmp group
Key:
ACL (if used) = fortinac-acl
SNMP v3 Username = fortinac-user
SNMP v3 Group = fortinac-group
SNMP v3 View (Permissions) = fortinac-view
Example:
snmp-server user fortinac-user fortinac-group v3 auth sha ******** priv aes 128 ******** access fortinac-acl
snmp-server group fortinac-group v3 priv read fortinac-view write fortinac-view notify fortinac-view access fortinac-acl
snmp-server group fortinac-group v3 priv context vlan- match prefix read fortinac-view access fortinac-acl
snmp-server view fortinac-view iso included
snmp-server view fortinac-view system included
snmp-server view fortinac-view interfaces included
snmp-server enable traps snmp coldstart warmstart
snmp-server enable traps mac-notification change move threshold
snmp-server host 192.168.22.131 traps version 3 priv fortinac-user mac-notification
snmp-server group fortinac-group v3 priv context vlan-21 read fortinac-view
snmp-server group fortinac-group v3 priv context vlan-22 read fortinac-view
Watch the event logs for SNMP errors. As issues are fixed, the errors will no longer appear.
Related articles: