SNMPv3 Prfile import /export

Announcements

Changes to the LIVEcommunity experience are coming soon... Here's what you need to know.

Reply
clyde.franklin
L4 Transporter

SNMPv3 Prfile import /export

 I have a current SNMP  profile using snmpv3.  This setup in Panorama is in production. In the event  i want to mimic this SNMPv3 profile in my lab Panorama is it possible import  just the SNMPv3  profile portion of config with the encrpyted password as well into my lab from prod or would I have to manually type snmp auth/priv passwords in lab box ? lab box isnt in same panorama so  i cant add lab devices to prod Panorama. I ask because I dont know the auth/priv SNMP credentials.


Accepted Solutions
kiwi
Community Team Member

Hi @clyde.franklin,

 

Yes, that seems to work.

This is how I did it :

 

- Open XML from device A

- Copy everything between the <snmp-setting>...</snmp-setting> tags.  (include the tags).

- Open XML from device B

- Replace he <snmp-setting>...</snmp-setting> code with the code from device A

- Save the file.

- Import and load the config on device B and commit.

 

 

Now I can perfectly query device B ... I do need the auth pwd and priv pwd in my query :

 

kiwi$ snmpget -v 3 -u kiwi -l authPriv -a SHA -A <auth pwd> -x AES -X <priv pwd> 10.192.16.241 .1.3.6.1.2.1.1.1.0

SNMPv2-MIB::sysDescr.0 = STRING: Palo Alto Networks PA-3000 series firewall

 

I hope this helps.

 

Cheers !

-Kiwi.

View solution in original post


All Replies
kiwi
Community Team Member

Hi @clyde.franklin,

 

Yes, that seems to work.

This is how I did it :

 

- Open XML from device A

- Copy everything between the <snmp-setting>...</snmp-setting> tags.  (include the tags).

- Open XML from device B

- Replace he <snmp-setting>...</snmp-setting> code with the code from device A

- Save the file.

- Import and load the config on device B and commit.

 

 

Now I can perfectly query device B ... I do need the auth pwd and priv pwd in my query :

 

kiwi$ snmpget -v 3 -u kiwi -l authPriv -a SHA -A <auth pwd> -x AES -X <priv pwd> 10.192.16.241 .1.3.6.1.2.1.1.1.0

SNMPv2-MIB::sysDescr.0 = STRING: Palo Alto Networks PA-3000 series firewall

 

I hope this helps.

 

Cheers !

-Kiwi.

View solution in original post

clyde.franklin
L4 Transporter

ok since i dont know the actaul unencrypted password adn cant do snmp query  i will cause a alarm in my lab and see if it alerts in monitoring tool

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!