000033620 - Obtain SNMP security name and authentication password from command line with RSA Authentication Manager 8.X

Document created by RSA Customer Support Employee on Jul 27, 2016Last modified by RSA Customer Support on Jan 2, 2020
Version 5Show Document
  • View in full screen mode

Article Content

Article Number000033620
Applies ToRSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.x
IssueThis article explains how to obtain SNMP security name and authentication password from command line with RSA Authentication Manager 8.x
Resolution
  1. SSH to server using rsaadmin account.
  2. Change to root using sudo su -:


login as: rsaadmin
Using keyboard-interactive authentication.
Password: <enter operating system password>
Last login: Thu Jan  2 15:50:00 2020 from jumphost.vcloud.local
RSA Authentication Manager Installation Directory: /opt/rsa/am
rsaadmin@am82p:~> sudo su -
rsaadmin's password:<enter operating system password>
am82p:~ #


  1. Type the following command to view the snmpd.conf.
  2. The user name and password are shown below in bold.  In the example below the user name is snmpuser and the password is P4ssw0rd!.


am82p:~ # cat /etc/snmp/snmpd.conf
###########################################################################
#
# snmpd.conf
#
#   - created by the snmpconf configuration program
#
###########################################################################

createUser snmp_a0uvpzhu
rouser snmp_a0uvpzhu noauth .1.3.6.1.4.1.2021
iquerySecName snmp_a0uvpzhu
agentSecName snmp_a0uvpzhu

###########################################################################
agentaddress 161

proxy -v 3 -u snmpuser -l authPriv -a MD5 -A P4ssw0rd! -x DES -X Privacy1! 27.0.0.1:8002 .1.3.6.1.4.1.2197

disk / 1%
load 100.01 100.02 100.03

#monitor -S -r 600 -o dskPath -o dskErrorMsg "disk free space below threshhold"   dskErrorFlag != 0
#monitor -S -r 600 -o laNames -o laErrMessage "load above threshhold" laErrorFlag != 0
#monitor -S -r 600 -o memTotalFree -o memTotalReal "total free memory below threshhold" memTotalFree < 1024

#trapsess -v 3 -u remoteuser -a MD5 -A authPassword -x DES -X privPassword -l authPriv 1.2.3.4





 

Attachments

    Outcomes