76
# Apply the ACL to the HTTP service so only a Web user on Host B can access the device.
[Sysname] ip http acl 2030
Controlling SNMP access
Use a basic ACL (2000 to 2999) to control SNMP access by source IP address. To access the
requested MIB view, an NMS must use a source IP address permitted by the ACL. If the ACL does
not exist or does not have any rules, no user login restriction is applied.
Configuration procedure
To control SNMPv1 or SNMPv2c access:
Step
Command
Remarks
1.
Enter system
view.
system-view
N/A
2.
Configure the
SNMP access
right.
•
(Method 1.) Create an SNMP community and specify
ACLs for the community:
In VACM mode:
snmp-agent
community
{
read
|
write
} [
simple
|
cipher
] community-name [
mib-view
view-name ]
[
acl
{
ipv4-acl-number | name ipv4-acl-name
} |
acl
ipv6
{
ipv6-acl-number | name ipv6-acl-name
} ] *
In RBAC mode:
snmp-agent
community
[
simple
|
cipher
]
community-name
user-role
role-name
[
acl
{
ipv4-acl-number | name ipv4-acl-name
} |
acl
ipv6
{
ipv6-acl-number
|
name ipv6-acl-name
}
] *
•
(Method 2.) Create an SNMPv1/v2c group and add a
user to the group, specifying ACLs for the group and
user:
a. snmp-agent
group
{
v1
|
v2c
}
group-name
[
read-view
view-name
] [
write-view
view-name
]
[
notify-view
view-name
] [
acl
{
ipv4-acl-number |
name ipv4-acl-name
} |
acl
ipv6
{
ipv6-acl-number
|
name ipv6-acl-name
} ] *
b. snmp-agent
usm-user
{
v1
|
v2c
}
user-name
group-name
[
acl
{
ipv4-acl-number | name
ipv4-acl-name
} |
acl
ipv6
{
ipv6-acl-number
|
name
ipv6-acl-name
}
] *
For more
information about
SNMP, see
Network
Management and
Monitoring
Configuration
Guide.
To control SNMPv3 access:
Step
Command
Remarks
1.
Enter system
view.
system-view
N/A
Содержание FlexNetwork 10500 Series
Страница 139: ...130 Sysname display version ...