_______________________________________________________________________________________________________
_______________________________________________________________________________________________________
© Virtual Access 2018
GW6600 Series User manual
Issue: 1.7
Page 421 of 519
39.2.1
System and agent settings
Web Field/UCI/Package Option
Description
System settings
Web: System Location
UCI: snmpd.system[0].sysLocation
Opt: sysLocation
Sets the system location, system contact or system name for the
agent. This information is reported in the ‘system’ group in the
mibII tree.
Web: System Contact
UCI: snmpd.system[0].sysContact
Opt: sysContact
Web: System Name
UCI: snmpd.system[0].sysName
Opt: sysName
Agent Settings
Web: Agent Address
UCI: snmpd.agent[0].agentaddress
Opt: agentaddress
Specifies the address(es) and port(s) on which the agent should
listen.
[(udp|tcp):]port[@address][,…]
Web: Enable Authentication Traps
UCI: snmpd.agent[0].authtrapenabled
Opt: authtrapenabled
Enables or disables SNMP authentication trap.
0
Disabled.
1
Enabled.
Note: this is the SNMP poll authentication trap to be set when
there is a community mismatch.
Web: Enable Link State Notification
UCI: snmpd.agent[0].link_updown_notify
Opt: link_updown_notify
Generates trap/info when interface goes up or down. When
enabled, the router sends a trap notification link up or down.
0
Disabled.
1
Enabled.
Table 150: Information table for system and agent settings
39.2.2
Com2Sec settings
To access Com2Sec settings, scroll down the SNMP Services page.
Use the COM2Sec section to map SNMP community names into an arbitrary security
name. Map community names into security names based on the community name and
the source subnet. Use the first source/community combination that matches the
incoming packet.
A community string is a password that is applied to a device to restrict both read-only
and read-write access to the SNMP data on the device. These community strings should
be chosen carefully to ensure they are not trivial. They should also be changed at regular
intervals and in accordance with network security policies.