Chapter 4. Web Configuration & Operation
234
CHAPTER 4
WEB OPERATION & CONFIGURATION
NOTE:
For more information about alarm relay circuit on the terminal block, please see
4.5.3.3 SNMPv3 Community Configuration
Configure SNMPv3 community table on this page. The entry index key is Community.
Delete:
Check to delete the entry. It will be deleted during the next save.
Community:
Indicates the community access string to permit access to SNMPv3 agent. The allowed string length is 1
to 32, and the allowed content is ASCII characters from 0x21 to 0x7E. The community string will be treated as security
name and map a SNMPv1 or SNMPv2c community string. This string is case sensitive.
Source IP:
Indicates the SNMP access source address. A particular range of source addresses can be used to restrict
source subnet when combined with source mask.
Source Mask:
Indicates the SNMP access source address mask.
4.5.3.4 SNMPv3 User Configuration
Configure SNMPv3 user table on this page. The entry index keys are Engine ID and User Name.
Engine ID:
An octet string identifying the engine ID that this entry should belong to. The string must contain an even
number (in hexadecimal format) with number of digits between 10 and 64, but all-zeros and all-'F's are not allowed.
The SNMPv3 architecture uses the User-based Security Model (USM) for message security and the View-based Access
Control Model (VACM) for access control. For the USM entry, the usmUserEngineID and usmUserName are the entry's
keys. In a simple agent, usmUserEngineID is always that agent's own snmpEngineID value. The value can also take the
value of the snmpEngineID of a remote SNMP engine with which this user can communicate. In other words, if user
engine ID equal system engine ID then it is local user; otherwise it is a remote user.
User Name:
A string identifying the user name that this entry should belong to. The allowed string length is 1 to 32,
and the allowed content is ASCII characters from 0x21 to 0x7E.
Security Level:
Indicates the security model that this entry should belong to. Possible security models are:
NoAuth, NoPriv:
No authentication and no privacy.
Auth, NoPriv:
Authentication and no privacy.
Summary of Contents for IFS-1604GSM Series
Page 385: ......