![F-SECURE POLICY MANAGER 8.0 Administrator'S Manual Download Page 196](http://html1.mh-extra.com/html/f-secure/policy-manager-8-0/policy-manager-8-0_administrators-manual_3108771196.webp)
196
A.3
Configuring The SNMP Master Agent
The SNMP Service is installed from the Windows Control Panel Network
Options window. The SNMP Service option is in the TCP/IP Installation
Options window. After the SNMP Service software is installed on your
computer, you must configure it with valid information in order for SNMP
to operate.
To configure SNMP, you must be logged on as the administrator for the
local computer. The SNMP configuration information identifies
communities and trap destinations. A community is a group of hosts to
which a Windows NT computer running the SNMP service belongs. You
can specify one or more communities to which the computer will send
traps. The name of the community is included with the trap.
When the SNMP Service receives a request for information that does not
contain the correct community name and does not match an accepted
host name for the Service, the SNMP Service can send a trap to the trap
destination, indicating that the request failed authentication.
Trap destinations are the names or IP addresses of hosts to which you
want the SNMP Service to send traps with the selected community name.
If you want to use SNMP for statistics, but not for identifying communities
or traps, you can specify the "public" community name when you
configure the SNMP Service.
Use the SNMP Security Configuration dialog box to specify security
parameters for SNMP services. This dialog box appears when you click
the
Security
button in the SNMP Service Configuration dialog box.
SNMP security allows you to specify the communities and hosts from
which a computer will accept requests, and to specify whether to send an
authentication trap when an unauthorized community or host requests
information.
Summary of Contents for POLICY MANAGER 8.0
Page 1: ...F Secure Policy Manager 8 0 Administrator s Guide...
Page 8: ...viii Contact Information 213 Glossary 214 About F Secure Corporation...
Page 9: ...9 ABOUT THIS GUIDE Overview 10 How This Guide is Organized 11...
Page 15: ...15 1 INTRODUCTION Overview 16 Installation Order 17 Features 18 Policy Based Management 19...
Page 23: ...23 2 SYSTEM REQUIREMENTS F Secure Policy Manager Server 24 F Secure Policy Manager Console 25...
Page 41: ...CHAPTER3 41 Installing F Secure Policy Manager Server Click Next to continue...
Page 60: ...60 Step 4 Select F Secure Policy Manager Console Click Next to continue...
Page 64: ...64 Step 8 Click Finish to close the installer...
Page 182: ...182 10 F SECURE POLICY MANAGER PROXY Overview 183...
Page 198: ...198 B Ilaunchr Error Codes Overview 199 Error Codes 200...
Page 207: ...207 D NSC Notation for Netmasks Overview 208...
Page 214: ...214 GLOSSARY...
Page 221: ......