Version 33.6.1 extends SNMPv3 password length support from 48 to 128 characters, enabling compliance with stringent security requirements.
The maximum password length for SNMPv3 user authentication and privacy passwords has been increased from 48 to 128 characters. Combined with the existing password policy commands, administrators can now enforce minimum password lengths up to 128 characters to meet advanced security requirements while maintaining backward compatibility with existing configurations.
Extended password length applies to:
Password formats supported:
The syntax for creating SNMPv3 users remains unchanged. The extended password length range is available automatically:
configure snmpv3 add user <user_name>
authentication [md5 | sha] <auth_password>
privacy [des | 3des | aes {128 | 192 | 192-legacy | 256 | 256-legacy}] <priv_password>
Example with 128-character passwords:
configure snmpv3 add user secureuser authentication md5
"12345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678"
privacy aes 128
"12345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678"

Note
Passwords are stored and displayed in encrypted form for security. The above example shows the clear-text password during initial configuration only.The password policy commands allow you to enforce minimum password lengths and other security requirements. The minimum length enforcement has been extended to support the new 128-character maximum.
Configuring Minimum Password Length:
Set minimum password length for authentication passwords:
configure snmpv3 user password-policy authentication min-length <num_characters>
Set minimum password length for privacy passwords:
configure snmpv3 user password-policy privacy min-length <num_characters>
Where num_characters is between 8 and 128 (default 8).
Example enforcing 64-character minimum passwords:
configure snmpv3 user password-policy authentication min-length 64 configure snmpv3 user password-policy privacy min-length 64
To disable minimum length enforcement:
configure snmpv3 user password-policy authentication min-length none configure snmpv3 user password-policy privacy min-length none
When minimum length policies are configured, password creation and modification is validated against the policy. Passwords that do not meet the minimum length requirement are rejected with an error message.
Example of policy enforcement:
# Set 64-character minimum
configure snmpv3 user password-policy authentication min-length 64
# Attempt to create user with short password fails
configure snmpv3 add user testuser authentication md5 "password1234567890"
Error: Password length cannot be less than 64 characters.
# User creation succeeds with compliant password
configure snmpv3 add user testuser authentication md5
"12345678901234567890123456789012345678901234567890123456789012345"
# (success - no error message)
Policy enforcement applies to:
The SNMPv3 password policy supports several security requirements beyond minimum length. These options remain unchanged and work with the extended password length:
Username Match Prevention:
configure snmpv3 user password-policy authentication username-match deny configure snmpv3 user password-policy privacy username-match deny
Prevents passwords from matching the username.
Character Repeat Prevention:
configure snmpv3 user password-policy authentication char-repeat deny configure snmpv3 user password-policy privacy char-repeat deny
Prevents passwords containing the same letter or number twice in a row (e.g., "aa", "11").
Long Sequence Prevention:
configure snmpv3 user password-policy authentication long-sequence deny configure snmpv3 user password-policy privacy long-sequence deny
Prevents passwords containing sequences of more than 3 characters in alphabetical, numerical, or keyboard order (e.g., "qwer", "1234").
Character Validation:
configure snmpv3 user password-policy authentication char-validation deny configure snmpv3 user password-policy privacy char-validation deny
Requires passwords to contain at least one each of: uppercase letters, lowercase letters, numbers, and special characters.
Password History:
configure snmpv3 user password-policy authentication history <num_passwords> configure snmpv3 user password-policy privacy history <num_passwords>
Or:
configure snmpv3 user password-policy authentication history duration <days> configure snmpv3 user password-policy privacy history duration <days>
Prevents reuse of recent passwords (1-10 previous passwords, or passwords used within 1-365 days).
To permit any policy (return to default):
configure snmpv3 user password-policy authentication username-match permit
To disable a policy:
configure snmpv3 user password-policy authentication history none
To view current SNMPv3 password policy settings, use the show snmpv3 command. The output displays configured policy requirements including minimum length:
show snmpv3
Sample output excerpt:
SNMPv3 Password Policy:
Authentication:
Minimum Length : 64 characters
Username Match : Deny
Character Repeat : Deny
Long Sequence : Deny
Character Validation : Deny
History : Last 5 passwords
Privacy:
Minimum Length : 64 characters
Username Match : Deny
Character Repeat : Deny
Long Sequence : Deny
Character Validation : Deny
History : Last 5 passwords
Existing SNMPv3 user configurations with passwords up to 48 characters continue to function normally. The extended password length is optional and enforced only when explicitly configured via password policy commands.
If minimum length is not configured or set below the existing password length, existing users are not affected. Only new user creation and password modifications are subject to the minimum length requirement.
Example:
Longer passwords enhance security but require careful consideration:
Benefits:
Operational Considerations:
Best Practices:
Extended password length also applies to hexadecimal and localized key formats:
Hexadecimal Passwords:
configure snmpv3 add user hexuser authentication md5 hex <hex_auth_password>
privacy aes 128 hex <hex_priv_password>
Hexadecimal passwords allow specifying passwords as hexadecimal strings. The byte length limits still apply (8-128 bytes), but each byte is represented by two hexadecimal characters, so the hex string length is 16-256 characters.
Localized Keys:
configure snmpv3 add user keyuser authentication md5 localized-key <auth_localized_key>
privacy aes 128 localized-key <priv_localized_key>
Localized keys are pre-computed MD5 or SHA hashes of the engine-id and user's password. Using localized keys avoids sending clear-text passwords over the network and can be more secure in certain deployment scenarios.
When configuring SNMP managers to use extended passwords:
snmpget -v3 -u secureuser -l authPriv -a MD5 -A "yourpassword" -x AES -X "yourpassword"
<switch-ip> sysDescr.0
If your SNMP manager does not support extended password lengths, you can continue using passwords up to 48 characters without any issues.
A financial institution requires all passwords to meet a 64-character minimum to comply with security regulations:
# Step 1: Configure password policy
configure snmpv3 user password-policy authentication min-length 64
configure snmpv3 user password-policy authentication char-validation deny
configure snmpv3 user password-policy authentication history 10
configure snmpv3 user password-policy privacy min-length 64
configure snmpv3 user password-policy privacy char-validation deny
configure snmpv3 user password-policy privacy history 10
# Step 2: Create SNMPv3 user with compliant password
# (Use a password manager to generate a strong 64+ character password)
configure snmpv3 add user monitor_user authentication sha
"Mk9@p3L#wQ7xZ$2nR8vY4tB6hD1fG5jK3mP0sA9uN7cV2eX6wQ8yT4rL1oI5hG3fD7sA9pZ0"
privacy aes 256
"wQ8pL3@xZ7#nR2$vY4tB6hD1fG5jK9mP0sA3uN7cV2eX6wQ8yT4rL1oI5hG3fD7sA9pZ0Mk9@"
# Step 3: Verify user creation
show snmpv3 user
# Step 4: Configure SNMP manager with same credentials
# Step 5: Test connectivity