59
{
If you grant read-only permission to the community, the NMS can only read the values of the
objects in the MIB view.
{
If you grant read-write permission to the community, the NMS can read and set the values of
the objects in the MIB view.
•
Specify a basic IPv4 ACL or a basic IPv6 ACL for the community to filter illegitimate NMSs from
accessing the agent.
{
Only NMSs with the IPv4/IPv6 address permitted in the IPv4/IPv6 ACL can access the
SNMP agent.
{
If you do not specify an ACL, or the specified ACL does not exist, all NMSs in the SNMP
community can access the SNMP agent. If the specified ACL does not have any rules, no
NMS in the SNMP community can access the SNMP agent.
SNMPv3 access control
SNMPv3 uses username for authentication. To control NMS access to MIB objects, configure one or
both of the following settings on the username that the NMS uses:
•
Create an SNMPv3 group and assign the username to the group. The user has the same
access right as the group.
When you create the group, specify one or more MIB views for the group. The MIB views
include read-only MIB view, read-write MIB view, or notify MIB view. You can specify only one
MIB view of a type for a group.
{
Read-only MIB view only allows the group to read the values of the objects in the view.
{
Read-write MIB view allows the group to read and set the values of the object in the view.
{
Notify MIB view automatically sends a notification to the NMS when the group accesses the
view.
•
Specify a basic IPv4 ACL or a basic IPv6 ACL for both the user and group to filter illegitimate
NMSs from accessing the agent.
{
Only the NMSs permitted by ACLs specified for both the user and group can access the
agent.
{
If you do not specify an ACL, or the specified ACL does not exist, all NMSs in the SNMP
community can access the SNMP agent. If the specified ACL does not have any rules, no
NMS in the SNMP community can access the SNMP agent.