Chapter 8 User Authentication
Avaya P334T-ML User’s Guide
41
’WriteCommG’ group by default. This allows you to
view the agent’s MIB tree and
change any of the values in the MIB tree.
L
If you delete the ReadCommN or WriteCommN users, the ReadCommG or
WriteCommG groups, or the SNMPv1View you may not be able to access the
switch using SNMPv1 or SNMPv2c.
In addition, traps are sent to designated trap receivers. Packets with trap
information also contains a trap community string.
SNMPv2c
SNMPv2c is very similar to SNMPv1. However, SNMPv2c adds support for the
get-bulk
action and supports a different trap format.
SNMPv3
SNMPv3 enables the following features over SNMPv1 or v2c:
•
User authentication with a username and password.
•
Communication encryption between the Network Management Station (NMS)
and the SNMP agent at the application level
•
Access control definition for specific MIB items available on the SNMP agent
•
Notification of specified network events directed toward specified users
•
Definition of roles using access control, each with unique access permissions
and authentication/encryption requirements
The basic components in SNMPv3 access control are users, groups, and views.
In addition. SNMPv3 uses an SNMP engine ID to identify SNMP identity. An
SNMP engine ID is assigned to each IP address of each device in the network. Each
SNMP engine ID should be unique in the network.
Users
SNMPv3 uses the User-based Security Model (USM) for security, and the
View-based Access Control Model (VACM) for access control. USM uses the
HMAC-MD5-96 and HMAC-SHA-96 protocols for user authentication, and the
CBC-DES56 protocol for encryption or privacy.
A maximum of 21 users, including local users and remote users getting notifications
can be defined on a stack. If the SNMP engine ID changes, all users other than the
default user for the stack are invalid and must be redefined. The SNMP engine ID
can be changed via the CLI. In addition, a change in the IP address of the stack
automatically changes the SNMP engine ID.
SNMPv3 supports three security levels:
•
NoAuthNoPriv
– This is the lowest level of SNMPv3 security. No (Message
Authentication Code) MAC is provided with the message, and no encryption is
performed. This method is maintains the same security level as SNMPv1, but
provides a method for limiting the access rights of a user.
Summary of Contents for P334T-ML
Page 14: ...IV Avaya P334T ML User s Guide ...
Page 15: ...Avaya SECTION 1 OVERVIEW ...
Page 16: ......
Page 30: ...Chapter 3 14 Avaya P334T ML User s Guide ...
Page 31: ...SECTION 2 INSTALLATION ...
Page 32: ......
Page 73: ...SECTION 3 CONFIGURATION ...
Page 74: ......
Page 78: ...Chapter 9 P330 Default Settings 62 Avaya P334T ML User s Guide ...
Page 92: ...Chapter 10 Switch Configuration 76 Avaya P334T ML User s Guide ...
Page 136: ...Chapter 11 Avaya P330 Layer 2 Features 120 Avaya P334T ML User s Guide ...
Page 146: ...Chapter 12 Avaya P330 Layer 3 Features 130 Avaya P334T ML User s Guide ...
Page 171: ...Avaya SECTION 4 TROUBLESHOOTING AND MAINTENANCE ...
Page 172: ......
Page 174: ...Chapter 13 Troubleshooting the Installation 158 Avaya P334T ML User s Guide ...
Page 176: ...Chapter 14 Maintenance 160 Avaya P334T ML User s Guide ...