Fortinet black logo
7.2.0

Ruckus Brocade

Ruckus Brocade

Reference:

https://docs.commscope.com/bundle/fastiron-08030-adminguide/page/GUID-04EE9011-98EE-41E2-AA7F-292D4C778A8A.html

SNMP V3

device(config)#snmp-server view internet internet included

device(config)#snmp-server view system system included

device(config)#snmp-server community ..... ro

device(config)#snmp-server community ..... rw

device(config)#snmp-server contact isc-operations

device(config)#snmp-server location sdh-pillbox

device(config)#snmp-server host <FortiNAC eth0 ip_address> .....

device(config)#snmp-server group ops v3 priv read internet write system

device(config)#snmp-server group admin v3 priv read internet write internet

device(config)#snmp-server group restricted v3 priv read internet

device(config)#snmp-server user ops ops v3 encrypted auth md5 ab8e9cd6d46e7a270b8c9549d92a069 priv encrypted des 0e1b153303b6188089411447dbc32de

device(config)#snmp-server user admin admin v3 encrypted auth md5 0d8a2123f91bfbd8695fef16a6f4207b priv encrypted des 18e0cf359fce4fcd60df19c2b6515448

device(config)#snmp-server user restricted restricted v3 encrypted auth md5 261fd8f56a3ad51c8bcec1e4609f54dc priv encrypted des d32e66152f89de9b2e0cb17a65595f43

Note:

  • MAC Change messages are sent by the switch for connections and disconnections.

Upon disconnect, the trap sent by the switch contains all zero's for the MAC address (00:00:00:00:00:00). If the VLAN in the trap matches the current VLAN on the port, FortiNAC treats it like a link down and updates the port status accordingly.

Ruckus Brocade

Reference:

https://docs.commscope.com/bundle/fastiron-08030-adminguide/page/GUID-04EE9011-98EE-41E2-AA7F-292D4C778A8A.html

SNMP V3

device(config)#snmp-server view internet internet included

device(config)#snmp-server view system system included

device(config)#snmp-server community ..... ro

device(config)#snmp-server community ..... rw

device(config)#snmp-server contact isc-operations

device(config)#snmp-server location sdh-pillbox

device(config)#snmp-server host <FortiNAC eth0 ip_address> .....

device(config)#snmp-server group ops v3 priv read internet write system

device(config)#snmp-server group admin v3 priv read internet write internet

device(config)#snmp-server group restricted v3 priv read internet

device(config)#snmp-server user ops ops v3 encrypted auth md5 ab8e9cd6d46e7a270b8c9549d92a069 priv encrypted des 0e1b153303b6188089411447dbc32de

device(config)#snmp-server user admin admin v3 encrypted auth md5 0d8a2123f91bfbd8695fef16a6f4207b priv encrypted des 18e0cf359fce4fcd60df19c2b6515448

device(config)#snmp-server user restricted restricted v3 encrypted auth md5 261fd8f56a3ad51c8bcec1e4609f54dc priv encrypted des d32e66152f89de9b2e0cb17a65595f43

Note:

  • MAC Change messages are sent by the switch for connections and disconnections.

Upon disconnect, the trap sent by the switch contains all zero's for the MAC address (00:00:00:00:00:00). If the VLAN in the trap matches the current VLAN on the port, FortiNAC treats it like a link down and updates the port status accordingly.