Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This is by no means a comprehensive list of the products we support.

Vendor / Operating SystemSHAAESNMIS Considerations
Cisco IOSSHA1
AES256CCisco IOS
AES256"aes256c" needs to be configured as the entry.configuration.privprotocol" value in NMIS
SHA1
AES192C
AES192"aes192c" needs to be configured as the entry.configuration.privprotocol" value in NMIS
Cisco IOS
SHA1AES128
Cisco NX-
OSSHA1AES128Cisco NX-OSSHA256AES128FortinetSHA256CAES256C
OSSHA1AES128
SHA256AES128
FortinetSHA256CAES256C"sha256" needs to be configured as the entry.configuration.authprotocol" value in NMIS AND "aes256c" needs to be configured as the entry.configuration.privprotocol" value in NMIS
Palo AltoSHA1AES128
SHA224AES128
SHA256AES128
SHA384AES128
SHA224AES192"aes192c" needs to be configured as the entry.configuration.privprotocol" value in NMIS
SHA256AES192"aes192c" needs to be configured as the entry.configuration.privprotocol" value in NMIS
SHA256AES256"aes256c" needs to be configured as the entry.configuration.privprotocol" value in NMIS
SHA384AES192"aes192c" needs to be configured as the entry.configuration.privprotocol" value in NMIS
SHA384AES256"aes256c" needs to be configured as the entry.configuration.privprotocol" value in NMIS

You may notice that when configuring SNMPv3 on a (for example) Cisco IOS device that there is not an explicit AES192C/AES256C in the command, rather it is needed to be defined as AES 192 and/or AES 256.

When configuring the device for NMIS, you will need to explicitly tell it to use AES192C/AES256C using node_admin.pl (example covered previously).

...