You want to set up basic SNMP services on a router.
To enable read-only SNMP services, use the following configuration command:
Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#snmp-server community ORARO ro Router(config)#end Router#
To enable read-write SNMP services, use the following command:
Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#snmp-server community ORARW rw Router(config)#end Router#
Starting with IOS Version 12.0(3)T, Cisco introduced a new system for configuring SNMP services by using the snmp-server group and snmp-server user configuration commands. Use the following commands to enable read-only SNMP services with this new method:
Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#snmp-server group COOKRO v1 Router(config)#snmp-server user TESTRO1 COOKRO v1 Router(config)#snmp-server group BOOKRO v2c Router(config)#snmp-server user TESTRO2 BOOKRO v2c Router(config)#end
SNMP services are disabled by default on all Cisco routers. The examples highlighted in the solutions section show only how to configure the router to allow inbound SNMP services so that it will respond to SNMP Get and Set requests. These configuration examples do not enable SNMP traps or informs, which we discuss in Recipe 17.14.
When inbound SNMP services are enabled, the router starts to listen for incoming SNMP requests on UDP port 161. It is important to note that these methods enable SNMP Version 1 and SNMP Version 2c only (SNMPv3 is covered in Recipe 17.23).
The first example shows the older method of enabling SNMP services. It uses the snmp community command to enable both SNMPv1 and SNMPv2c simultaneously:
Router(config)#snmp-server community ORARO ro
Cisco documentation often refers to this as bilingual SNMP support because it allows the router to speak both SNMP languages (or versions).
The show snmp group command gives details on exactly what SNMP versions are enabled, as well as the security models they use. Running this command after implementing the first two configuration examples gives the following output:
Router#show snmp group groupname: ORARO security model:v1 readview :v1default writeview: notifyview: row status: active groupname: ORARO security model:v2c readview :v1default writeview: notifyview: row status: active groupname: ORARW security model:v1 readview :v1default writeview: v1default notifyview: row status: active groupname: ORARW security model:v2c readview :v1default writeview: v1default notifyview: row status: active
This shows that the groups we have configured each created two entries, one for SNMPv1 and the other for SNMPv2c support. This is possible because SNMPv1 and SNMPv2c use the same community string authorization model. Therefore, the router is capable of responding to either version of SNMP.
With the new method for enabling SNMP services, using the snmp-server group command, you can create an SNMP group entry that belongs to a single SNMP security model (SNMPv1 or SNMPv2c). Cisco added this command to support SNMPv3 services, and it may eventually replace the legacy method.
Both methods for enabling SNMP services assign a community string that acts as a password of sorts to protect access. SNMP services run on a well-known UDP port, so the router needs this password to help prevent unauthorized access. The router will simply discard any SNMP requests that contain incorrect SNMP community strings. It is important to note that in both Versions 1 and 2c, SNMP transmits these community strings through the network in clear text, making it relatively insecure.
You can configure the router for either read-only or read-write SNMP service. Read-only access means that users can view the router's MIB tree. This is relatively benign, although information about the router's configuration could be useful when planning an attack on your network. Read-write access, on the other hand, permits users to change some of the values in the MIB tree. A user with read-write access could potentially wreak havoc by disabling IP routing, disabling interfaces, erasing router flash, downloading router configurations, uploading configuration commands, or making a variety of other dangerous changes.
Be extremely careful when providing SNMP write access. If SNMP write access is not absolutely required, we recommend disabling it. Far too many organizations automatically enable full SNMP write access without regard for the dangers of possible unauthorized changes.
If write access is required, then consider using SNMPv3 (discussed in Recipe 17.23). SNMPv3 offers advanced authentication and encryption services that ensure safe delivery over insecure networks. Unfortunately, SNMPv3 is still a relatively young standard, and many NMS systems don't support it yet.
So, in those cases where SNMP Version 1 or 2c write access is an absolute requirement, we recommend using the security features described in Recipes 17.6, 17.7, and 17.8. These describe how to implement SNMP ACLs, limit SNMP views, and restrict SNMP TFTP access to help to reduce the risk.
Recipe 17.6; Recipe 17.7; Recipe 17.8; Recipe 17.14; Recipe 17.23
Router Configuration and File Management
User Access and Privilege Levels
Handling Queuing and Congestion
Tunnels and VPNs
NTP and Time
Router Interfaces and Media
Simple Network Management Protocol
First Hop Redundancy Protocols
Appendix 1. External Software Packages
Appendix 2. IP Precedence, TOS, and DSCP Classifications