Using SNMP
ExtremeWare 7.2e Installation and User Guide
59
To delete a user, use the following command:
configure snmpv3 delete user [all-non-defaults | {hex} <user name>]
NOTE
In the SNMPv3 specifications there is the concept of a security name. In the ExtremeWare
implementation, the user name and security name are identical. In this manual we use both terms to
refer to the same thing.
Groups.
Groups are used to manage access for the MIB. You use groups to define the security model,
the security level, and the portion of the MIB that members of the group can read or write. To
underscore the access function of groups, groups are defined using the following command:
configure snmpv3 add access {hex} <group name> {sec-model [snmpv1 | snmpv2 | usm]}
{sec-level [noauth | authnopriv | authpriv]} {read-view {hex} <view name>} {
write-view {hex} <view name>} {notify-view {hex} <view name>} {volatile}
The security model and security level are discussed in the section labeled “Security Models and Levels”.
The view names associated with a group define a subset of the MIB (subtree) that can be accessed by
members of the group. The read view defines the subtree that can be read, write view defines the
subtree that can be written to, and notify view defines the subtree that notifications can originate from.
MIB views are discussed in the section “MIB Access Control”.
There are a number of default (permanent) groups already defined. These groups are: admin, initial,
initialmd5, initialsha, initialmd5Priv, initialshaPriv, v1v2c_ro, v1v2c_rw. Use the following command to
display information about the access configuration of a group or all groups:
show snmpv3 access {{hex} <group name>}
Users are associated with groups using the following command:
configure snmpv3 add group {hex} <group name> user {hex} <user name> {sec-model
[snmpv1| snmpv2 | usm]} {volatile}
To show which users are associated with a group, use the following command:
show snmpv3 group {{hex} <group name> {user {hex} <user name>}}
To delete a group, use the following command:
configure snmpv3 delete access [all-non-defaults | {{hex} <group name>
{sec-model [snmpv1 | snmpv2c | usm] sec-level [noauth | authnopriv |
priv]}}]
When you delete a group, you do not remove the association between the group. To delete the
association between a user and a group, use the following command:
configure snmpv3 delete group {{hex} <group name>} user [all-non-defaults | {{hex}
<user name> {sec-model [snmpv1|snmpv2c|usm]}}]
Security Models and Levels.
For compatibility, SNMPv3 supports three security models:
•
SNMPv1—no security
Содержание ExtremeWare 7.2e
Страница 14: ...14 ExtremeWare 7 2 0 Software User Guide Contents...
Страница 18: ...18 ExtremeWare 7 2e Installation and User Guide Preface...
Страница 46: ...46 ExtremeWare 7 2e Installation and User Guide Summit 400 48t Switch Overview and Installation...
Страница 80: ...80 ExtremeWare 7 2e Installation and User Guide Accessing the Switch...
Страница 102: ...102 ExtremeWare 7 2e Installation and User Guide Virtual LANs VLANs...
Страница 108: ...108 ExtremeWare 7 2e Installation and User Guide Forwarding Database FDB...
Страница 180: ...180 ExtremeWare 7 2e Installation and User Guide Security...
Страница 194: ...194 ExtremeWare 7 2e Installation and User Guide Ethernet Automatic Protection Switching...
Страница 218: ...218 ExtremeWare 7 2e Installation and User Guide Spanning Tree Protocol STP...
Страница 248: ...248 ExtremeWare 7 2e Installation and User Guide Interior Gateway Protocols...
Страница 256: ...256 ExtremeWare 7 2e Installation and User Guide IP Multicast Routing...
Страница 308: ...308 ExtremeWare 7 2e Installation and User Guide Using ExtremeWare Vista on the Summit 400...
Страница 316: ...316 ExtremeWare 7 2e Installation and User Guide Technical Specifications...
Страница 324: ...324 ExtremeWare 7 2e Installation and User Guide Software Upgrade and Boot Options...