Configure SNMP. Understand SNMP. This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series.

Similar documents
For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Configuration Fundamentals Command Reference

Configure Site Network Settings

Configuring SNMP. Information About SNMP. SNMP Functional Overview. This chapter contains the following sections:

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. About SNMP. SNMP Functional Overview

Manage Your Inventory

Restrictions for SNMP use on Cisco IOS XR Software

Manage Your Device Inventory

SNMPv3 Community MIB Support

SNMP Simple Network Management Protocol

This chapter describes how to configure Simple Network Management Protocol (SNMP) to monitor the Cisco ASA.

Manage Your Inventory

Configuring Simple Network Management Protocol

SNMP Agent Setup. Simple Network Management Protocol Support. SNMP Basics

Command Manual SNMP-RMON. Table of Contents

Network Management (NETW-1001)

Table of Contents 1 SNMP Configuration Commands RMON Configuration Commands 2-1

Configuring SNMP. Understanding SNMP CHAPTER

SNMP. Simple Network Management Protocol Philippines Network Operators Group, March Jonathan Brewer Telco2 Limited New Zealand

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Understanding SNMP CHAPTER

Configuring SNMP. Information About SNMP CHAPTER

Prerequisites for AES and 3-DES Encryption Support for SNMP. Version 3. Finding Feature Information

Defining IPsec Networks and Customers

Configuring SNMP. Information about SNMP CHAPTER

Discover Your Network

Table of Contents. 2 MIB Style Configuration 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1

Table of Contents. 2 MIB Configuration Commands 2-1 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1

Turn Up a Node. Before You Begin CHAPTER

SNMP Configuration Guide

Table of Contents. 2 MIB Style Configuration 2-1 Overview 2-1 Setting the MIB Style 2-1 Displaying and Maintaining MIB 2-1

Configuring SNMP CHAPTER. This chapter describes how to configure the Simple Network Management Protocol (SNMP) on your access point.

SNMP Commands CHAPTER

Implementing IPv6 for Network Management

SNMP. Simple Network Management Protocol

Table of Contents. 2 MIB Configuration Commands 2-1 display mib-style 2-1 mib-style 2-1

Configuring SNMP. Finding Feature Information. Prerequisites for SNMP

Chapter 3 Managing System Settings

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24

Operation Manual SNMP-RMON H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Implementing IPv6 for Network Management

Setting Up Physical Inventory

The Security feature available on the ME 1200 Web GUI allows you to set the security configurations for

This chapter will describe the architecture that the

Table of Contents Chapter 1 SNMP Configuration Commands

A small introduction to SNMPv3 and how it works with Network Node Manager -i

Configuring and Viewing System Properties

Outline. SNMP Simple Network Management Protocol. Before we start on SNMP. Simple Network Management Protocol

SNMP CEF-MIB Support

Configuring SNMP. Send documentation comments to CHAPTER

SNMP SNMP Overview CHAPTER

DELL EMC OPENMANAGE ESSENTIALS (OME) SNMPV3 SUPPORT

Implementing IPv6 for Network Management

RSA NetWitness Logs. Cisco Wireless LAN Controller. Event Source Log Configuration Guide

Platform Settings for Firepower Threat Defense

Configuring SNMP. Understanding SNMP CHAPTER

Configuring the Cisco APIC-EM Settings

Configuring Communication Services

WCCPv2 and WCCP Enhancements

Setting Up the MPLS VPN Environment

Operation Manual SNMP. Table of Contents

MPLS VPN MIB Support. Cisco IOS Release 12.0(24)S1 1

RSA NetWitness Logs. MySQL Enterprise. Event Source Log Configuration Guide. Last Modified: Wednesday, November 15, 2017

DGS Layer 2 Switch. Command Line Interface Reference Manual 6DGS3024C.04 RECYCLABLE. Fourth Edition (August 2006)

MIB Browser Version 10 User Guide

Connect the PC and Log into the GUI

User authentication configuration example 11 Command authorization configuration example 13 Command accounting configuration example 14

Appendix C Software Specifications

Cisco Unified CM SNMP

Configuring SNMP. Understanding SNMP CHAPTER

Configuring Security Features on an External AAA Server

Simple Network Management Protocol

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017

DES-3010F / DES-3010G / DES-3018 / DES-3026

Configuring the Management Interface and Security

SNMPv3 Secure, Safe and Still Simple

Configuring RADIUS. Information About RADIUS. RADIUS Network Environments. Send document comments to

Device Configuration Tasks for VNE Creation

This chapter explains Simple Network Management Protocol (SNMP) as implemented by CPT.

0] Chapter 2 Cisco ME 3400E Ethernet Access Switch Cisco IOS Commands shutdown. This command has no arguments or keywords.

Managing Southbound and Northbound Interfaces

Simple Network Management Protocol

Inventory Manager Window

RSA NetWitness Logs. IBM Domino. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017

SNMP Support on NFVIS

RSA NetWitness Logs. Trend Micro OfficeScan and Control Manager. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017

Connect the PC and Log into the GUI

Device Management Basics

Connect the PC and Log into the GUI

SNMP SIMULATOR. Description

Configuring L2TP over IPsec

SNMP Support on NFVIS

SNMP v3 Support for Image Services

2V] Chapter 2 Catalyst 3560 Switch Cisco IOS Commands shutdown. This command has no arguments or keywords.

Simple Network Management Protocol

Table of Contents. Cisco Cisco IOS SNMP Traps Supported and How to Configure Them

A12B / A46 SMNP V3 SCADA INTERFACE INSTRUCTIONS

The Discovery Wizard now provides the ability to create SNMP Setups that can be selected for individual discoveries. An SNMP Setup specifies:

Control Wireless Networks

7210 SAS E OS Routing Protocols Guide. Software Version: 7210 SAS OS 2.0 Rev. 02 July 2010 Document Part Number: * *

Transcription:

This chapter explains Simple Network Management Protocol (SNMP) as implemented by Cisco NCS 4000 series. Understand SNMP, page 1 Basic SNMP Components, page 2 SNMPv3 Support, page 3 SNMP Traps, page 4 NTP-K8 Using CTC, page 4 DLP-G498 Create Group Access Using CTC, page 5 DLP-G496 Creating an SNMPv3 User Using CTC, page 6 DLP-G497 Create MIB Views Using CTC, page 8 DLP-G499 v3 Trap Destination Using CTC, page 8 DLP-K88 Create SNMP Community Using CTC, page 10 DLP-K89 Enabling SNMP Trap Notifications Using CTC, page 11 DLP-G502 Manually Configuring the SNMPv3 Proxy Forwarder Table, page 11 DLP-G503 Automatically Configuring the SNMPv3 Proxy Forwarder Table, page 13 DLP-G505 Automatically Configuring the SNMPv3 Proxy Trap Forwarder Table, page 14 Understand SNMP SNMP is an application-layer communication protocol that allows Cisco NCS 4000 series network devices to exchange management information among these systems and with other devices outside the network. Through SNMP, network administrators can manage network performance, find and solve network problems, and plan network growth. NCS 4000 uses SNMP for asynchronous event notification to a network management system (NMS). SNMP implementation uses standard Internet Engineering Task Force (IETF) management information bases (MIBs) to convey node-level inventory, fault, and performance management information. 78-21449-03 1

Basic SNMP Components NCS 4000 supports SNMP Version 1 (SNMPv1), SNMP Version 2 (SNMPv2), and SNMP Version 3 (SNMPv3). As compared to SNMPv1, SNMPv2 includes additional protocol operations and 64-bit performance monitoring support. SNMPv3 provides authentication, encryption, and message integrity and is more secure. Basic SNMP Components In general terms, an SNMP-managed network consists of a management system, agents, and managed devices. A management system executes monitoring applications and controls managed devices. Management systems execute most of the management processes and provide the bulk of memory resources used for network management. A network might be managed by one or several management systems. The following figure illustrates the relationship between the network manager, the SNMP agent, and the managed devices. Figure 1: Example of the Primary SNMP Components An agent (such as SNMP) residing on each managed device translates local management information data such as performance information or event and error information caught in software traps, into a readable form 2 78-21449-03

SNMPv3 Support for the management system. The following figure illustrates SNMP agent get-requests that transport data to the network management software. Figure 2: Agent Gathering Data from a MIB and Sending Traps to the Manager The SNMP agent captures data from MIBs, which are device parameter and network data repositories, or from error or change traps. A managed element such as a router, access server, switch, bridge, hub, computer host, or network element (such as an ONS 15454 NCSNCS 4000) is accessed through the SNMP agent. Managed devices collect and store management information, making it available through SNMP to other management systems having the same protocol compatibility. SNMPv3 Support Cisco ONS 15454 NCS Software R9.0 and later supports SNMPv3 in addition to SNMPv1 and SNMPv2c. SNMPv3 is an interoperable standards-based protocol for network management. SNMPv3 provides secure access to devices by a combination of authentication and encryption packets over the network based on the User Based Security Model (USM) and the View-Based Access Control Model (VACM). Cisco NCS 4000 supports SNMPv1, SNMPv2, and SNMPv3. SNMPv3 is an interoperable standards-based protocol for network management. SNMPv3 provides secure access to devices by a combination of authentication and encryption packets over the network based on the User Based Security Model (USM) and the View-Based Access Control Model (VACM). User-Based Security Model The User-Based Security Model (USM) uses the HMAC algorithm for generating keys for authentication and privacy. SNMPv3 authenticates data based on its origin, and ensures that the data is received intact. SNMPv1 and v2 authenticate data based on the plain text community string, which is less secure when compared to the user-based authentication model. View-Based Access Control Model The view-based access control model controls the access to the managed objects. RFC 3415 defines the following five elements that VACM comprises: Groups A set of users on whose behalf the MIB objects can be accessed. Each user belongs to a group. The group defines the access policy, notifications that users can receive, and the security model and security level for the users. Security level The access rights of a group depend on the security level of the request. Contexts Define a named subset of the object instances in the MIB. MIB objects are grouped into collections with different access policies based on the MIB contexts. MIB views Define a set of managed objects as subtrees and families. A view is a collection or family of subtrees. Each subtree is included or excluded from the view. 78-21449-03 3

SNMP Traps Access policy Access is determined by the identity of the user, security level, security model, context, and the type of access (read/write). The access policy defines what SNMP objects can be accessed for reading, writing, and creating. Access to information can be restricted based on these elements. Each view is created with different access control details. An operation is permitted or denied based on the access control details. You can configure SNMPv3 on a node to allow SNMP get and set access to management information and configure a node to send SNMPv3 traps to trap destinations in a secure way. SNMPv3 can be configured in secure mode, non-secure mode, or disabled mode. SNMP, when configured in secure mode, only allows SNMPv3 messages that have the authpriv security level. SNMP messages without authentication or privacy enabled are not allowed. When SNMP is configured in non-secure mode, it allows SNMPv1, SNMPv2, and SNMPv3 message types. SNMP Traps The ONS 15454 NCSNCS 4000 uses SNMP traps to generate all alarms and events, such as raises and clears. The traps contain the following information: Object IDs that uniquely identify each event with information about the generating entity (the slot or port). Severity and service effect of the alarm (critical, major, minor, or event; service-affecting or non-service-affecting). Date and time stamp showing when the alarm occurred. NTP-K8 Using CTC Prerequisite s This procedure configures SNMP using CTC. DLP-G46 Log into CTC "Login to CTC" in System Setup and Software Installation Guide for Cisco NCS 4000 Series or remote 4 78-21449-03

DLP-G498 Create Group Access Using CTC Perform any of the following tasks as needed: DLP-G498 Create Group Access Using CTC DLP-G496 Creating an SNMPv3 User Using CTC DLP-G497 Create MIB Views Using CTC DLP-G499 v3 Trap Destination Using CTC DLP-K88 Create SNMP Community Using CTC DLP-K89 Enabling SNMP Trap Notifications Using CTC DLP-G502 Manually Configuring the SNMPv3 Proxy Forwarder Table DLP-G503 Automatically Configuring the SNMPv3 Proxy Forwarder Table NTP-K8 Using CTC DLP-G505 Automatically Configuring the SNMPv3 Proxy Trap Forwarder Table Stop. You have completed this procedure. DLP-G498 Create Group Access Using CTC Prerequisite s This procedure creates a user group and configures the access parameters for the users in the group. DLP-G46 Log into CTC "Login to CTC" in System Setup and Software Installation Guide for Cisco NCS 4000 Series 78-21449-03 5

DLP-G496 Creating an SNMPv3 User Using CTC In node view, click the Provisioning > SNMP > SNMP V3 > SNMP > Group Access tabs. Click Create. In the Create Group Access dialog box, enter the following information: Group Name The name of the SNMP group, or collection of users, who share a common access policy. SNMP Version Version of SNMP. The possible values are SNMPv1, SNMPv2, and SNMPv3. The security level for which the access parameters are defined. You can configure the security level only when SNMPv3 is selected. Select from the following options: Views noauthnopriv Uses a user name match for authentication. AuthNoPriv Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. AuthPriv Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. Provides DES 56-bit encryption based on the CBC-DES (DES-56) standard, in addition to authentication. If you select authnopriv or authpriv for a group, the corresponding user must be configured with an authentication protocol and password, with privacy protocol and password, or both. Read View Name Read view name for the group. Notify View Name Notify view name for the group. Write View Name Write view name for the group. Allow SNMP Sets Select this check box if you want the SNMP agent to accept SNMP SET requests. If this check box is not selected, SET requests are rejected. Step 5 Note SNMP SET request access is implemented for very few objects. Click OK to save the information. DLP-G496 Creating an SNMPv3 User Using CTC This procedure creates an SNMPv3 user. 6 78-21449-03

DLP-G496 Creating an SNMPv3 User Using CTC Prerequisite s DLP-G46 Log into CTC "Login to CTC" in System Setup and Software Installation Guide for Cisco NCS 4000 Series DLP-G498 Create Group Access Using CTC In node view, click the Provisioning > SNMP > SNMP V3 > SNMP > Users tabs. Click Create. In the Create User dialog box, enter the following information: User Name Specify the name of the user on the host that connects to the agent. The user name must be a minimum of 6 and a maximum of 40 characters (up to only 39 characters for the TACACS and RADIUS authentication). It includes alphanumeric (a-z, A-Z, 0-9) characters and the allowed special characters are @, "-" (hyphen), and "." (dot). For TL1 compatibility, the user name must be of 6 to 10 characters. Group Name Specify the group to which the user belongs. The SNMP version and security level of the group are displayed as read-only. Authentication Protocol Select the authentication algorithm that you want to use. The options are NONE, MD5, and SHA. Password Enter a password if you select MD5 or SHA. By default, the password length is set to a minimum of eight characters. Privacy Initiates a privacy authentication level setting session that enables the host to encrypt the contents of the message that is sent to the agent. Protocol Select the privacy authentication algorithm. The available options are, DES, and AES-256-CFB. Password Enter a password if you select a protocol other than. Step 5 Click OK to create an SNMP user. 78-21449-03 7

DLP-G497 Create MIB Views Using CTC DLP-G497 Create MIB Views Using CTC Prerequisite s This procedure creates an SNMPv3 MIB view. DLP-G46 Log into CTC "Login to CTC" in System Setup and Software Installation Guide for Cisco NCS 4000 Series In node view, click the Provisioning > SNMP > SNMP V3 > SNMP > MIB views tabs. Click Create. In the Create Views dialog box, enter the following information: Name Name of the view. Subtree OID The MIB subtree which, when combined with the mask, defines the family of subtrees. Bit Mask A family of view subtrees. Each bit in the bit mask corresponds to a sub-identifier of the subtree OID. Type Select the view type. Options are Included and Excluded. Type defines whether the family of subtrees that are defined by the subtree OID and the bit mask combination are included or excluded from the notification filter. Step 5 Click OK to save the information. DLP-G499 v3 Trap Destination Using CTC This procedure configures SNMPv3 trap destination. 8 78-21449-03

DLP-G499 v3 Trap Destination Using CTC Prerequisite s DLP-G46 Log into CTC "Login to CTC" in System Setup and Software Installation Guide for Cisco NCS 4000 Series In node view, click the Provisioning > SNMP > SNMP V3 > SNMP > Trap Destinations (V3) > Trap Destinations tabs. Click Create. In the v3 Trap dialog box, enter the following information: Target Address Target to which the traps should be sent. Use an IPv4 or an IPv6 address. UDP Port UDP port number that the host uses. Default value is 162. User Name Specify the name of the user on the host that connects to the agent. Select one of the following options: noauthnopriv Uses a user name match for authentication. AuthNoPriv Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. AuthPriv Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. Provides DES 56-bit encryption based on the CBC-DES (DES-56) standard, in addition to authentication. Filter Profile Select this check box and enter the filter profile name. Traps are sent only if you provide a filter profile name and create a notification filter. For more information, see DLP-G501 Creating Notification Filters. Proxy Traps Only If selected, forwards only proxy traps from the ENE. Traps from this node are not sent to the trap destination identified by this entry. Proxy Tags Specify a list of tags. The tag list is needed on a GNE only if an ENE needs to send traps to the trap destination identified by this entry, and wants to use the GNE as the proxy. Step 5 Step 6 In the Create SNMP Trap dialog box, enter the IP address of your network management system (NMS). Click OK to save the information. 78-21449-03 9

DLP-K88 Create SNMP Community Using CTC DLP-K88 Create SNMP Community Using CTC Prerequisite s This procedure creates SNMP community. DLP-G46 Log into CTC "Login to CTC" in System Setup and Software Installation Guide for Cisco NCS 4000 Series DLP-G496 Creating an SNMPv3 User Using CTC DLP-G499 v3 Trap Destination Using CTC Step 5 Step 6 Step 7 Step 8 Step 9 In node view, click the Provisioning > SNMP > SNMP > Trap Destinations tabs. In the Communities area, click Create. The Create SNMP Community dialog box appears. In the Destination area, the Destination Address field displays the trap destination address configured in DLP-G499 v3 Trap Destination Using CTC. Enter the User Datagram Protocol (UDP) port on which you want to create a community in the UDP Port field. The default UDP port for SNMP is 162. In the User area, choose the user from the User Name droop-down list. The SNMP version and the security level of the selected user are displayed. In the Notification area, check the required basic trap types. The available options are BGP, Config, Syslog, and SNMP. From the Advance Trap Types drop-down list, choose or Copy Complete. Click OK to create SNMP community. 10 78-21449-03

DLP-K89 Enabling SNMP Trap Notifications Using CTC DLP-K89 Enabling SNMP Trap Notifications Using CTC Prerequisite s This procedure enables SNMP trap notifications that are sent to a MIB tree. "Login to CTC" in System Setup and Software Installation Guide for Cisco NCS 4000 Series In node view, click the Provisioning > SNMP > SNMP > Notifications tabs. In the Notifications area, enable the following notifications as required by checking the Enable check box next to each notification. BGP Border Gateway Protocol (BGP) trap notifications Config Configuration trap notifications SNMP SNMP trap notifications Syslog Trap notifications in the system log file Click Apply. DLP-G502 Manually Configuring the SNMPv3 Proxy Forwarder Table Prerequisite s This procedure creates an entry in the SNMPv3 Proxy Forwarder Table. DLP-G46 Log into CTC 78-21449-03 11

DLP-G502 Manually Configuring the SNMPv3 Proxy Forwarder Table In network view, click Provisioning > SNMPv3. In the SNMPv3 Proxy Server area, complete the following: From the GNE drop-down list, choose the GNE to be used as the SNMPv3 proxy server. Check the Enable IPv6 Target/Trap check box if the nodes and the NMS stations are on an IPv6 network. In the SNMPv3 Proxy Forwarder Table area, click Manual Create. In the Manual Configuration of SNMPv3 Proxy Forwarder dialog box, enter the following information: Target Address Target to which the request should be forwarded. Use an IPv4 or an IPv6 address. Context Engine ID The context engine ID of the ENE to which the request is to be forwarded. The context engine ID should be the same as the context engine ID of the incoming request. Proxy Type Type of SNMP request that needs to be forwarded. The options are Read and Write. Local User Details The details of the local user who proxies on behalf of the ENE user. User Name Specify the name of the user on the host that connects to the agent. Local Select the security level of the incoming requests that are to be forwarded. The options are noauthnopriv, AuthNoPriv, and AuthPriv. Remote User Details User to which the request is forwarded. User Name Specify the user name of the remote user. Remote Select the security level of the outgoing requests. The options are noauthnopriv, AuthNoPriv, and AuthPriv. Authentication Protocol Select the authentication algorithm you want to use. The options are NONE, MD5, and SHA. Password Enter the password if you select MD5 or SHA. Privacy Enables the host to encrypt the contents of the message that is sent to the agent. Protocol Select NONE, DES, or AES-256-CFB as the privacy authentication algorithm. Password Enter the password if you select protocol other than. The password should not exceed 64 characters. 12 78-21449-03

DLP-G503 Automatically Configuring the SNMPv3 Proxy Forwarder Table Step 5 Step 6 Click OK to save the information. DLP-G503 Automatically Configuring the SNMPv3 Proxy Forwarder Table Prerequisite s This procedure creates an entry in the SNMPv3 Proxy Forwarder Table. DLP-G46 Log into CTC In network view, click Provisioning > SNMPv3 tabs. In the SNMPv3 Proxy Server area, complete the following: From the GNE drop-down list, choose the GNE to be used as the SNMPv3 proxy server. Select the Enable IPv6 Target/Trap check box if the nodes and the NMS stations are on an IPv6 network. In the SNMPv3 Proxy Forwarder Table area, click Auto Create. In the Automatic Configuration of SNMPv3 Proxy Forwarder dialog box, enter the following information: Proxy Type Select the type of proxies to be forwarded. The options are Read and Write. Select the security level for the incoming requests that are to be forwarded. The options are: noauthnopriv Uses a username match for authentication. AuthNoPriv Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. AuthPriv Provides authentication based on the HMAC-MD5 or HMAC-SHA algorithms. Provides DES 56-bit encryption based on the CBC-DES (DES-56) standard, in addition to authentication. Target Address List Select the proxy destination. 78-21449-03 13

DLP-G505 Automatically Configuring the SNMPv3 Proxy Trap Forwarder Table Local User Name Select the user name from the list of users. Step 5 Step 6 Note When you configure SNMPv3 Proxy Forwarder Table automatically, the default_group is used on the ENE. The default_group does not have write access. To enable write access and allow SNMP sets, you need to edit the default_group on ENE. Click OK to save the settings. DLP-G505 Automatically Configuring the SNMPv3 Proxy Trap Forwarder Table Prerequisite s This procedure creates an entry in the SNMPv3 Proxy Trap Forwarder Table automatically. DLP-G46 Log into CTC In network view, click Provisioning > SNMPv3 tabs. In the SNMPv3 Proxy Server area, complete the following: From the GNE drop-down list, choose the GNE to be used as the SNMPv3 proxy server. Check the Enable IPv6 Target/Trap check box if the nodes and the NMS stations are on an IPv6 network. In the SNMPv3 Proxy Trap Forwarder Table area, click Auto Create. In the Automatic Configuration of SNMPv3 Proxy Trap Forwarder dialog box, enter the following information: Target Tag Specify the tag name. The tag identifies the list of NMS that should receive the forwarded traps. All GNE Trap destinations that have this tag in their proxy tags list are chosen. Source of Trap The list of ENEs whose traps are forwarded to the SNMPv3 Trap destinations that are identified by the Target Tag. 14 78-21449-03

DLP-G505 Automatically Configuring the SNMPv3 Proxy Trap Forwarder Table Step 5 Step 6 Click OK to save the information. 78-21449-03 15

DLP-G505 Automatically Configuring the SNMPv3 Proxy Trap Forwarder Table 16 78-21449-03