SIP User's Manual  384  Document #: LTRT-12804 
  Mediant 800 MSBG 
 
5.7.1  Configuring SNMPv3 using SSH 
The procedure below describes how to configure SNMPv3 using SSH. This is a more 
secure way of configuring the SNMPv3 connection between the EMS and the device, i.e., 
before you have a secure SNMP connection, there could be eavesdropping.  
¾  To configure the device to operate with SNMPv3 via SSH: 
1.  Open an SSH Client session (e.g.  PuTTY), and then connect, using the default user 
name and password ("Admin" - case sensitive) to the device. If a message appears 
with the RSA host key, click “Yes” to continue. Verify that the shell prompt appears (“\> 
”). 
2.  Type Conf, and then press Enter. 
/CONFiguration> 
3.  Type cf set, and then press Enter; the following prompt is displayed: 
Enter data below. Type a period (.) on an empty line to 
finish. 
The configuration session is now active and all data entered at the terminal is parsed 
as configuration text (formatted as an ini file). 
4.  Type the following text at the configuration session: 
[ SNMPUsers ] 
FORMAT SNMPUsers_Index = SNMPUsers_Username, 
SNMPUsers_AuthProtocol, SNMPUsers_PrivProtocol, 
SNMPUsers_AuthKey, SNMPUsers_PrivKey, SNMPUsers_Group; 
SNMPUsers 0 = v3user, 2, 1,<auth password>,<priv password>, 1; 
[ \SNMPUsers ] 
where: 
•  <auth password> is the password for the for the authentication protocol  
•  <priv password> is the password for the privacy protocol 
Possible values for AuthProtocol: 
•  0 – none 
•  1 - MD5 
•  2 - SHA-1 
Possible values for PrivProtocol: 
•  0 – none 
•  1 – DES 
•  3 - AES128 
5.  To end the PuTTY configuration session, type a full-stop (“.”) on an empty line; the 
device responds with the following: 
INI File replaced 
6.  To save the configuration to the non-volatile memory, type sar; the device reboots 
with IPSec enabled.