Enable SNMPv3 on Windows and Linux: Complete Configuration Guide

 Published by Michael Becker
Last updated on November 17, 2025 • 15 minute read

enable snmpv3 on windows and linux complete configuration guide

If there are any other third party SNMP agents running (i.e. Net-SNMP) you must stop those services before the NuDesign SNMPv3 agent will operate correctly.

After installation, launch the NuDesign SNMP v3 agent configuration applet:

📌 Navigate to the installation directory (typically C:\Program Files\NuDesign Tools Eval)

📌 Run the configuration tool and select SNMPv3 as the protocol

📌 Configure the UDP port (default is 161)

📌 Under Authentication settings, specify which IP addresses can query the agent and add your network monitoring solution's IP address

📌 Configure User Security Management (USM) credentials with custom username, authentication password, and encryption key

The agent uses separate configuration files for security settings. Always change the default credentials (shaaes/shaaesauth/shaaespriv) to custom values for production use.

Testing SNMPv3 on Windows

Validate with snmpwalk/snmpget built for Windows (e.g., Net‑SNMP binaries) or your NMS (Network Monitoring Solution); ensure it supports your chosen algorithms (e.g., SHA‑2/AES‑256). You can also test your SNMP responses with PowerShell, though it has no built-in SNMPv3 cmdlets. Testing typically relies on external tools (e.g., snmpwalk) or vendor modules.


First, install the necessary SNMP packages. On Ubuntu or Debian-based systems, use the following commands for nano editor:

sudo apt-get update
sudo apt-get install snmpd snmp libsnmp-dev

For Red Hat-based distributions:

sudo yum install net-snmp net-snmp-utils

Creating SNMPv3 Users

The net-snmp package provides a convenient helper script for creating SNMPv3 users. Stop the snmpd service before creating users:

sudo systemctl stop snmpd

Create an SNMPv3 user with authentication and encryption:

sudo net-snmp-create-v3-user -ro -A AuthPassword123 -a SHA -X PrivPassword456 -x AES snmpuser
sudo systemctl start snmpd

⚠️ Use at least 8+ characters and distinct auth/priv passphrases; if your Net‑SNMP build supports it, prefer SHA‑2 (e.g., -a SHA-256).

This command creates a read-only user named "snmpuser" with SHA authentication and AES encryption. The script automatically adds configuration entries to /var/lib/net-snmp/snmpd.conf and /etc/snmp/snmpd.conf.

Configuring the snmpd.conf File

Edit the main configuration file to define access permissions and listening interfaces:

sudo nano /etc/snmp/snmpd.conf

Add or modify these key settings:

# Listen on all interfaces
agentAddress udp:161

# Define rocommunity for backward compatibility (optional)
rocommunity public localhost

# Configure system information
syslocation "Data Center Room 101"
syscontact admin@example.com

The configuration file (/etc/snmp/snmpd.conf) controls which IP address ranges can query the SNMP agent and which MIB objects are accessible. For enhanced security, restrict access to specific IP addresses:

# Allow only specific IP to query
rocommunity secret 192.168.1.100

Starting and Testing the SNMP Daemon

Enable and start the snmpd service:

sudo systemctl enable snmpd
sudo systemctl start snmpd

Verify the service is running:

sudo systemctl status snmpd

Test the SNMPv3 configuration locally:

snmpwalk -v3 -l authPriv -u snmpuser -a SHA -A AuthPassword123 -x AES -X PrivPassword456 **-r 1 -t 3** localhost **1.3.6.1.2.1.1**

Firewall Configuration

Ensure your firewall allows SNMP traffic on UDP port 161 from trusted subnets only:

sudo ufw allow from **192.168.1.0/24** to any port 161 proto udp

Or for firewalld:

sudo firewall-cmd --permanent --add-port=161/udp
sudo firewall-cmd --reload

SNMPv3 and its usage in IT Monitoring

Security Levels in SNMPv3

SNMPv3 supports three security levels:

▪️noAuthNoPriv: No authentication and no encryption. Only a username is required (no password). This is the least secure option and similar to SNMPv1 in terms of security.

▪️authNoPriv: Authentication with password but no encryption. Messages are authenticated but transmitted in clear text, similar to SNMPv2c in terms of missing encryption.

▪️authPriv: Both authentication and encryption (recommended for production).

For secure monitoring, always use the authPriv security level, which combines authentication protocols (SHA preferred over MD5) with encryption (AES-128 or higher recommended).

Troubleshooting SNMPv3

Common troubleshooting steps include:

▪️ Verify that authentication and encryption keys match between agent and monitoring system, including the SNMP EngineID association

▪️ Ensure username is correctly configured on both sides

▪️ Check that passwords and encryption keys are longer than 8 characters

▪️ Confirm firewall rules allow UDP traffic on port 161 for queries and port 162 for traps

▪️ Use snmpwalk to test connectivity and verify accessible OIDs

▪️ Review the snmpd service logs on Linux (/var/log/syslog or journalctl -u snmpd)

Performance implications

Authentication and encryption of SNMPv3 messages requires additional computational resources, so when compared to SNMP v1/v2c, it may have a heavier impact on CPU when polling hundreds of nodes, with very short polling intervals on both SNMP agent and monitoring server:

✨ Spread SNMPv3 sensors across multiple monitoring probes

✨ Increase scanning intervals for less critical metrics

✨ Use SNMP performance metrics to identify bottlenecks

✨ Consider SNMPv2c only if risk is acceptable and traffic is strictly controlled; prefer SNMPv3 (authPriv) wherever feasible

Integrating SNMPv3 with PRTG Network Monitor

After you have set up SNMPv3 on your Windows and Linux devices, it’s time to pair them with a powerful monitoring solution that can give you full visibility into your entire IT environment. Paessler PRTG Network Monitor supports SNMP v1, SNMP v2c, and SNMPv3 and has pre-configured sensors that automatically detect and monitor devices in your network.

With PRTG, you can use these SNMP features and sensors:

▪️ SNMP Traffic sensor: Bandwidth and network interface statistics

▪️ SNMP Hardware Status sensor: CPU, memory, fans, and power supplies

▪️ SNMP Custom sensor: Create your own for specific OIDs

▪️ SNMP Trap Receiver: Receive notifications & process traps (SNMPv2c)

▪️ SNMP Library sensor: Pre-configured sensors for Cisco, HP, Dell, and more vendors

To use SNMPv3 credentials with PRTG, go to the device settings and select SNMPv3 as the protocol, then provide your SNMPv3 user credentials, including username, authentication protocol (SHA), authentication password, encryption method (AES), and data encryption key. PRTG then automatically applies these credentials to all SNMP sensors for this device.

PRTG also self-monitors its own SNMPv3 performance using the Probe Health sensor, sending you alerts when its interval delay or open requests go up to let you know you may need to distribute the load. This helps you ensure your SNMPv3 implementation is as performant as possible even as your network scales.

If you’re monitoring a small office network, a data center, or a global enterprise infrastructure spread out over multiple locations, PRTG’s extensive SNMP support combined with SNMPv3’s top-notch security ensures your network gets the visibility it needs and the protection it deserves.

Ready to experience secure, comprehensive network monitoring?

Monitoring with SNMPv3 has never been easier. 

Summary

SNMPv3 is the only version of SNMP that provides secure network monitoring through authentication and encryption, unlike its predecessors v1 and v2c which transmit data in plaintext. On Windows, you need a third-party agent like NuDesign SNMPv3 Agent since Microsoft deprecated native SNMP support, while Linux systems can use the built-in net-snmp package for straightforward configuration. The setup process involves creating users with authentication (SHA recommended) and encryption (AES recommended) credentials, configuring access permissions, and testing connectivity with tools like snmpwalk. For production environments, always use the authPriv security level and integrate SNMPv3 with comprehensive monitoring solutions like PRTG Network Monitor to gain full visibility into your network infrastructure.