No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

OceanStor 9000 V300R006C00 Object Storage Service (Compatible with Amazon S3 APIs) Administrator Guide 07

Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Configuring a Discovery Policy for a Switch

Configuring a Discovery Policy for a Switch

This operation enables you to configure a discovery policy for a switch.

Prerequisites

  • The switches have been configured.
  • You have logged in to the DeviceManager as an administrator that has the permission. The following administrators have the permission:
    • Super administrator
    • Administrator

Context

If switches are stacked, you can use the IP address of one stacking switch to discover all the other stacking switches.

Procedure

  1. Log in to DeviceManager.
  2. Choose Settings > Switch Management > Set Discovery Policy.
  3. Select a switch for which you want to configure a discovery policy and click Set Discovery Policy.
  4. In the Set Discovery Policy dialog box that is displayed, configure the discovery policy, the related parameters are shown in Table 18-2 below.

    Table 18-2  Discovery Policy Parameters

    Parameter

    Description

    Value

    IP Address

    IP address of the switch.

    [Value range]

    Complies with rules of setting an IP address.

    [Example]

    192.168.1.100

    SNMP Protocol Version

    Version of the SNMP protocol. Its value can be:
    • V2C: The SNMPv2c uses the community name authentication method and it expands this function of the SNMPv1. It supports more types of operations and data and provides rich error codes to distinguish errors subtly.
    • V3: The SNMPv3 uses the user security mode-based authentication. You can set the authentication and encryption functions. The authentication function verifies the validity of the packet sender, preventing accesses of unauthenticated users. The encryption function encrypts the packets transmitted between the NMS server and its managed devices, avoiding eavesdropping. The SNMPv3 improves the communication security by combining the authentication and encryption functions.
    NOTE:

    Security risks arise if the SNMP protocol version is set to V2C. You are advised to select the V3 SNMP protocol version.

    [Example]

    V3

    Port

    Port number of a specified network element (NE) that you want to access.

    [Value range]

    Its value is an integer ranging from 1 to 65535.

    [Example]

    161

    Read community

    Name of the community that has read permission.

    [Example]

    public

    [Description]

    If SNMP protocol is V2C, you need to set this parameter.

    Write community

    Name of the community that has write permission.

    [Example]

    private

    [Description]

    If SNMP protocol is V2C, you need to set this parameter.

    Security Username

    User name used for accessing the NE.

    [Example]

    user01

    [Description]

    If SNMP protocol is V3, you need to set this parameter.

    Context Name

    Context engine name.

    [Value range]

    This parameter value is the same as the context name on the NE or blank.

    [Description]

    This parameter is optional. If SNMP protocol is V3, you need to set this parameter.

    Context Engine ID

    Unique identifier of an SNMP engine. This ID is used together with the context name to determine an environment that uniquely identifies an SNMP entity. The SNMP message packet is processed only when the environments of the sender terminal and the recipient terminal are the same. Otherwise, the SNMP message packet will be discarded.

    This parameter supports two input modes:
    • Hexadecimal input mode: The ID must be in the format of #**.**.**. The validity verification involves the value length and each hexadecimal value. The value length is limited to 97 characters including pound signs (#).
    • Non-hexadecimal input mode: Enter the ID directly. The validity verification involves only the length. The value length is limited to 32 characters.
    NOTE:
    A context engine ID must be a hexadecimal that contains 10 to 64 letters. A content engine ID containing all zeros or F's is invalid.

    [Value range]

    The value is same as the context engine ID on the NE.

    [Description]

    This parameter is optional. If SNMP protocol is V3, you need to set this parameter.

    Authentication Protocol

    Protocol used for verifying messages.

    [Value range]

    The parameter value can be HMACMD5 or HMACSHA or no protocol is used.

    [Example]

    HMACMD5

    [Description]

    • If the HMACMD5 or HMACSHA protocol is selected, you need to set the authentication password.
    • If SNMP protocol is V3, you need to set this parameter.

    Authentication Password

    If the authentication protocol is used when messages are verified, you need to set the authentication password.

    [Example]

    wsx123456

    [Description]

    If SNMP protocol is V3, you need to set this parameter.

    Encryption Protocol

    Encryption protocol used for encapsulating data.

    You can select the DES or AES encryption protocol or no encryption protocol is selected. If the DES or AES encryption protocol is selected, you need to set the encryption password.

    [Example]

    DES

    [Description]

    If SNMP protocol is V3, you need to set this parameter.

    Encryption Password

    If the encryption algorithm is used for encapsulating data, you need to set the data encryption password.

    NOTE:
    An encryption password can contain 8 to 64 letters, digits, special characters (including `~!@#$%^&*()-_=+\|[{}];\: \"\'\<\,.\\\>\/?), and spaces.

    [Example]

    qaz123456

    [Description]

    If SNMP protocol is V3, you need to set this parameter.

    NOTE:

    The SNMP protocol parameters must be consistent with those configured for switches.

    Security risks arise if the SNMP protocol is set to V2C, or Authentication protocol or Data encryption protocol of SNMP V3 is set to protocols of low security levels.

  5. Click OK.
Translation
Download
Updated: 2019-04-28

Document ID: EDOC1000122523

Views: 11680

Downloads: 84

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next