![Supermicro SuperBlade SBM-GEM-X2C+ User Manual Download Page 168](http://html1.mh-extra.com/html/supermicro/superblade-sbm-gem-x2c/superblade-sbm-gem-x2c_user-manual_1404297168.webp)
Superblade Network Modules User’s Manual
7-40
SNMP Trap Settings
Clicking the T
RAP
M
ANAGER
tab brings up the SNMP T
RAP
S
ETTINGS
which configures the set of management targets that must receive notifications. The
parameters for this page are shown in
Table 7-22. SNMP Security Settings Page Parameters
Parameter
Description
User Name
U
SER
N
AME
is the (User-based Security) model dependent security ID.
Authentication Protocol
The A
UTHENTICATION
P
ROTOCOL
is used for authentication.
Authentication Key
The A
UTHENTICATION
K
EY
is the secret authentication key used for
messages sent on behalf of this user to/from the SNMP.
Privacy Protocol
P
RIVACY
P
ROTOCOL
is an indication of whether or not messages sent on
behalf of this user to/from the SNMP are protected from disclosure, and if
so, the type of privacy protocol that is used.
Privacy Key
P
RIVACY
K
EY
is an indication of whether or not messages sent on behalf of
this user to/from the SNMP are protected from disclosure.
Storage Type
S
TORAGE
T
YPE
can be configured as
Volatile
or
Non-Volatile
.
Figure 7-34. SNMP Trap Settings Page
Summary of Contents for SuperBlade SBM-GEM-X2C+
Page 4: ...Superblade Network Modules User s Manual iv Notes...
Page 16: ...Superblade Network Modules User s Manual xvi Notes...
Page 24: ...Superblade Network Modules User s Manual xxiv Notes...
Page 31: ...xxxi...
Page 32: ...Superblade Network Modules User s Manual xxxii Notes...
Page 52: ...SBI 7127R SH Blade Module User s Manual 2 18 Notes...
Page 70: ...Superblade Network Modules User s Manual 3 18 Notes...
Page 125: ...6 29 Chapter 6 1 Gb Ethernet Switch Firmware Figure 6 21 IGMP Snooping Screen...
Page 378: ...Superblade Network Modules User s Manual 7 250 Notes...
Page 396: ...Superblade Network Modules User s Manual B 6 Notes...
Page 402: ...Superblade Network Modules User s Manual C 6 Notes...