120
DWS-1008 User’s Manual
D-Link Systems, Inc.
Configuring SNMP
Setting SNMP Security
By default, MSS allows nonsecure SNMP message exchanges. You can configure
MSS to require secure SNMP exchanges instead.
Depending on the level of security you want MSS to enforce, you can require
authentication of message exchanges only, or of message exchanges and
notifications. You also can require encryption in addition to authentication.
SNMPv1 and SNMPv2c do not support authentication or encryption. If you plan
to use SNMPv1 or SNMPv2c, leave the minimum level of SNMP security set to
unsecured
.
To set the minimum level of security MSS requires for SNMP, use the following
command:
set snmp security {unsecured | authenticated | encrypted | auth-req-unsec-notify}
You can specify one of the following options:
•
unsecured
- SNMP message exchanges are not secure. This is the default,
and is the only value supported for SNMPv1 and SNMPv2c. (This security
level is the same as the noAuthNoPriv level described in SNMPv3 RFCs.)
• authenticated - SNMP message exchanges are authenticated but are not
encrypted. (This security level is the same as the authNoPriv level described
in SNMPv3 RFCs.)
• encrypted - SNMP message exchanges are authenticated and encrypted.
(This security level is the same as the authPriv level described in SNMPv3
RFCs.)
• auth-req-unsec-notify - SNMP message exchanges are authenticated but are
not encrypted, and notifications are neither authenticated nor encrypted.
Command Example
The following command sets the minimum level of SNMP security allowed to
authentication
and
encryption:
DWS-1008
set snmp security encrypted
success: change accepted.