Cisco Cisco Process Orchestrator 3.1 User Guide
13-111
Cisco Process Orchestrator 3.1 User Guide
Appendix 13 Using Adapters
SNMP Adapter
•
Community String—This field is displayed when the SNMPv1 or SNMPv2c versions is selected.
Specify the community string to be used for publishing traps. The default community string is
public.
public.
•
User name—Enter the user name assigned to the SNMP Credentials account.
•
Security level—The security level assigned to the user:
–
noAuthNoPriv—Communication without authentication and privacy
–
authNoPriv—Communication with authentication and without privacy. The protocols used for
Authentication are MD5 (Message Digest 5 Algorithm) and SHA (Secure Hash Algorithm).
Authentication are MD5 (Message Digest 5 Algorithm) and SHA (Secure Hash Algorithm).
–
authPriv—Communication with authentication and privacy.
•
Authentical protocol—The protocol used for authentication. This field is enabled when the security
level is set to authNoPriv or authPriv.
level is set to authNoPriv or authPriv.
–
SHA
–
MD5
•
Authentication Key—Password used for authentication
•
Privacy Protocol—Format for transmitting encrypting data between the two devices
This option is available when security level is set to authPriv.
–
DES—Data Encryption Standard uses a 56-bit key and uses the block cipher method, which
breaks text into 64-bit blocks and then encrypts the text.
breaks text into 64-bit blocks and then encrypts the text.
–
3DES—Non-standard convention of the DES encryption algorithm in which three 64-bit keys
are used, instead of one, for an overall key length of 192 bits. The first encryption is encrypted
with second key, and the resulting cipher text is again encrypted with a third key.
are used, instead of one, for an overall key length of 192 bits. The first encryption is encrypted
with second key, and the resulting cipher text is again encrypted with a third key.
–
AES128—Specifies the Advanced Encryption Standard which uses a symmetric 128-bit block
data encryption technique
data encryption technique
–
AES256—Specifies 256-bit AES as the encryption algorithm
Note
You must update your policy with JCE to use the AES256 encryption. To update the JCE
provider, click
provider, click
to download the correct local_policy.jar file and
US_export_policy.jar file to the local Java security folder. Before downloading, rename the
original security files in the Java installation folder. After downloading the files, restart Cisco
Process Orchestrator to apply the changes.
original security files in the Java installation folder. After downloading the files, restart Cisco
Process Orchestrator to apply the changes.
•
Privacy Key—Password used for encrypting data
Step 4
Click OK to close the dialog box and complete the procedure.
Defining a SNMP Trap Received Trigger
Use the SNMP Trap Received trigger to specify the criteria for the incoming traps from all SNMP agents
through the port specified in the SNMP adapter. This criteria must be met before the process executes.
through the port specified in the SNMP adapter. This criteria must be met before the process executes.
Step 1
Choose Definitions > Triggers > New > SNMP Trap Received.
Step 2
Click the General tab and enter the required information.