<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SNMP v3 encryption in Cloud Networking Platform</title>
    <link>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459770#M13889</link>
    <description>&lt;P&gt;I´ve only Switches in my Network and I´m trying to integrate them via SNMPv3 in my NMS which is on the LAN-side but in a different VLAN/IP-Subnet... I´m not able to get the informations via SNMP - any ideas?&lt;/P&gt;</description>
    <pubDate>Wed, 10 Dec 2025 09:32:36 GMT</pubDate>
    <dc:creator>whistleblower14</dc:creator>
    <dc:date>2025-12-10T09:32:36Z</dc:date>
    <item>
      <title>SNMP v3 encryption</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459764#M13883</link>
      <description>&lt;P&gt;Hi community,&lt;/P&gt;&lt;P&gt;the documentation &lt;A href="https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/SNMP_Overview_and_Configuration" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/General_Administration/Monitoring_and_Reporting/SNMP_Overview_and_Configuration&lt;/A&gt; says:&lt;/P&gt;&lt;P&gt;"SNMP v1/v2c sends the community string in plain text. If v3 is selected, you will need to configure a username and password. When using v3, Cisco Meraki devices will use SHA1 for authentication and DES for privacy, with the configured password used for both."&lt;/P&gt;&lt;P&gt;Is this true? DES encryption in 2023? The doc is last updated on Jun 28, 2023 ...&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 11:47:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459764#M13883</guid>
      <dc:creator>p.deleuw</dc:creator>
      <dc:date>2023-08-17T11:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP v3 encryption</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459765#M13884</link>
      <description>&lt;P&gt;Yes, it is. ,&lt;SPAN class="lia-unicode-emoji" title=":winking_face:"&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 11:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459765#M13884</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2023-08-17T11:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP v3 encryption</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459766#M13885</link>
      <description>&lt;P&gt;Thank you, &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/51406"&gt;@alessandrodematos&lt;/A&gt;. I managed to test it:&lt;/P&gt;&lt;P&gt;~$ snmpget -v3 -l authPriv -u snmpuser -a SHA -A snmpuser -x &lt;STRONG&gt;DES&lt;/STRONG&gt; -X snmpuser 10.3.0.4 iso.3.6.1.2.1.1.1.0&lt;BR /&gt;iso.3.6.1.2.1.1.1.0 = STRING: "Meraki MR33 Cloud Managed AP"&lt;BR /&gt;~$ snmpget -v3 -l authPriv -u snmpuser -a SHA -A snmpuser -x &lt;STRONG&gt;AES&lt;/STRONG&gt; -X snmpuser 10.3.0.4 iso.3.6.1.2.1.1.1.0&lt;BR /&gt;snmpget: &lt;STRONG&gt;Decryption error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Additionaly, you can poll the dashboard via snmp.meraki.com. You enable and configure it on Organization &amp;gt; Settings. Here you can choose between DES and AES (128).&lt;BR /&gt;~$ snmpget -v3 -l authPriv -u xxxxxx -a SHA -A snmpuser1 -x AES -X snmpuser1 snmp.meraki.com:16100 iso.3.6.1.2.1.1.1.0&lt;BR /&gt;iso.3.6.1.2.1.1.1.0 = STRING: "Cisco Meraki Cloud Controller"&lt;/P&gt;&lt;P&gt;You can poll::&lt;BR /&gt;Device MAC address&lt;BR /&gt;Device Serial number&lt;BR /&gt;Device Name&lt;BR /&gt;Device Status (Online or Offline)&lt;BR /&gt;Device Last Contacted - Date and Time&lt;BR /&gt;Mesh Status (Gateway or Repeater)&lt;BR /&gt;Public IP Address&lt;BR /&gt;Product Code (e.g. MR18-HW)&lt;BR /&gt;Product Description (e.g. Meraki Cloud-controller 802.11n AP)&lt;BR /&gt;Name of the Network that the device resides in (Dashboard Network)&lt;BR /&gt;Packets/Bytes In/Out on each physical interface&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Peter&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 14:35:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459766#M13885</guid>
      <dc:creator>p.deleuw</dc:creator>
      <dc:date>2023-08-17T14:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP v3 encryption</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459767#M13886</link>
      <description>&lt;P&gt;Worth remembering that, in a Meraki world, SNMP cannot be used for configuration.   I think it's safe to say that, as a cloud-native platform, we think there are probably better ways of securely managing IT systems these days, too.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 16:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459767#M13886</guid>
      <dc:creator>GreenMan</dc:creator>
      <dc:date>2023-08-17T16:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP v3 encryption</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459768#M13887</link>
      <description>&lt;P&gt;Yes, of course. The RestAPI is your friend. Secure remote administration via HTTPS. Flexible and scriptable. Scalable with action batches.&lt;/P&gt;&lt;P&gt;SNMP (read-only) is reasonable for integration with exiting monitoring systems.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 16:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459768#M13887</guid>
      <dc:creator>p.deleuw</dc:creator>
      <dc:date>2023-08-17T16:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP v3 encryption</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459769#M13888</link>
      <description>&lt;P&gt;Making a note that Cisco Meraki has since added AES-128 encryption as an option for SNMPv3 and still uses SHA1 for hashing.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2025 15:43:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459769#M13888</guid>
      <dc:creator>CyberDingo</dc:creator>
      <dc:date>2025-09-04T15:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP v3 encryption</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459770#M13889</link>
      <description>&lt;P&gt;I´ve only Switches in my Network and I´m trying to integrate them via SNMPv3 in my NMS which is on the LAN-side but in a different VLAN/IP-Subnet... I´m not able to get the informations via SNMP - any ideas?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 09:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459770#M13889</guid>
      <dc:creator>whistleblower14</dc:creator>
      <dc:date>2025-12-10T09:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP v3 encryption</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459771#M13890</link>
      <description>&lt;P&gt;I would start by making sure your switches have access to your NMS located in a different VLAN/subnet. Can you ping between each other? Once that is the case, you will have to set the configuration of the SNMPv3 on the NMS and the end client side. &lt;/P&gt;</description>
      <pubDate>Wed, 10 Dec 2025 13:22:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/snmp-v3-encryption/m-p/5459771#M13890</guid>
      <dc:creator>CyberDingo</dc:creator>
      <dc:date>2025-12-10T13:22:30Z</dc:date>
    </item>
  </channel>
</rss>

