Chapter 13
| Basic Administration Protocols
Simple Network Management Protocol
–
362
–
Simple Network Management Protocol
Simple Network Management Protocol (SNMP) is a communication protocol
designed specifically for managing devices on a network. Equipment commonly
managed with SNMP includes switches, routers and host computers. SNMP is
typically used to configure these devices for proper operation in a network
environment, as well as to monitor them to evaluate performance or detect
potential problems.
Managed devices supporting SNMP contain software, which runs locally on the
device and is referred to as an agent. A defined set of variables, known as managed
objects, is maintained by the SNMP agent and used to manage the device. These
objects are defined in a Management Information Base (MIB) that provides a
standard presentation of the information controlled by the agent. SNMP defines
both the format of the MIB specifications and the protocol used to access this
information over the network.
The switch includes an onboard agent that supports SNMP versions 1, 2c, and 3.
This agent continuously monitors the status of the switch hardware, as well as the
traffic passing through its ports. A network management station can access this
information using network management software. Access to the onboard agent
from clients using SNMP v1 and v2c is controlled by community strings. To
communicate with the switch, the management station must first submit a valid
community string for authentication.
Access to the switch from clients using SNMPv3 provides additional security
features that cover message integrity, authentication, and encryption; as well as
controlling user access to specific areas of the MIB tree.
The SNMPv3 security structure consists of security models, with each model having
it’s own security levels. There are three security models defined, SNMPv1, SNMPv2c,
and SNMPv3. Users are assigned to “groups” that are defined by a security model
and specified security levels. Each group also has a defined security access to set of
MIB objects for reading and writing, which are known as “views.” The switch has a
default view (all MIB objects) and default groups defined for security models v1 and
v2c. The following table shows the security models and levels available and the
system default settings.
Содержание GEL-5261
Страница 14: ...14 Contents Glossary 551 Index 559...
Страница 26: ...26 Figures...
Страница 30: ...30 Section I Getting Started...
Страница 42: ...42 Section II Web Configuration IP Services on page 527...
Страница 45: ...Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface 45 Figure 1 Dashboard...
Страница 62: ...62 Chapter 2 Using the Web Interface NavigatingtheWebBrowserInterface...
Страница 180: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 180...
Страница 208: ...Chapter 8 Congestion Control Storm Control 208 Figure 121 Configuring Storm Control...
Страница 218: ...218 Chapter 9 Class of Service Layer 3 4 Priority Settings Figure 128 Configuring DSCP to Queue Mapping...
Страница 228: ...228 Chapter 10 Quality of Service Attaching a Policy Map to a Port...
Страница 332: ...Chapter 12 Security Measures ARP Inspection 332 Figure 207 Displaying the ARP Inspection Log...
Страница 436: ...Chapter 13 Basic Administration Protocols LBD Configuration 436...
Страница 488: ...488 Chapter 14 Multicast Filtering Filtering MLD Query Packets on an Interface...
Страница 498: ...Chapter 15 IP Tools Address Resolution Protocol 498...
Страница 517: ...517 Chapter 16 IP Configuration Setting the Switch s IP Address IP Version 6 interface...
Страница 542: ...540 Section III Appendices...
Страница 560: ...Glossary 558...
Страница 569: ...567 Index web interface access requirements 43 configuration buttons 46 menu list 47 panel display 46...
Страница 570: ...568 Index E062017 ST R01...