cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
738
Views
0
Helpful
3
Replies

CiscoWorks RME 4.2 Compliance Check Fails on SNMP Strings

slcornish
Level 1
Level 1

All,

RME 4.2 Compliance Check does not work when you try checking SNMP strings, passwords, or TACACS key because they're encrypted in the config archive. Is there a way to configure RME to have Compliance Check look at the actual value?

Stephanie

3 Replies 3

Joe Clarke
Cisco Employee
Cisco Employee

This is not true. SNMP communities are kept unencrypted in the archive, and you can run compliance checks on them. As for TACACS keys and passwords, they are encrypted, but you could run checks on the encrypted strings. If the cipher text is the same on the device as in your template, then the device is compliant.

All of my Compliance Checks are failing.

Attached is an example of one of my Baseline Templates and status from Baseline Jobs

This template is invalid because you're mixing IOS and CatOS commands. Create one template with the following:

+ snmp-server community COMMUNITY RO

+ snmp-server community COMMUNITY RW

Use that template to test your IOS devices. Then, create another template with:

+ set snmp community read-only COMMUNITY

+ set snmp community read-write COMMUNITY

Use that to test your CatOS devices.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: