Chapter 13
| Basic Administration Protocols
Simple Network Management Protocol
– 406 –
The switch includes an onboard agent that supports SNMP versions 1, 2c, and 3.
This agent continuously monitors the status of the switch hardware, as well as the
traffic passing through its ports. A network management station can access this
information using network management software. Access to the onboard agent
from clients using SNMP v1 and v2c is controlled by community strings. To
communicate with the switch, the management station must first submit a valid
community string for authentication.
Access to the switch from clients using SNMPv3 provides additional security
features that cover message integrity, authentication, and encryption; as well as
controlling user access to specific areas of the MIB tree.
The SNMPv3 security structure consists of security models, with each model having
it’s own security levels. There are three security models defined, SNMPv1, SNMPv2c,
and SNMPv3. Users are assigned to “groups” that are defined by a security model
and specified security levels. Each group also has a defined security access to set of
MIB objects for reading and writing, which are known as “views.” The switch has a
default view (all MIB objects) and default groups defined for security models v1 and
v2c. The following table shows the security models and levels available and the
system default settings.
Note:
The predefined default groups and view can be deleted from the system.
You can then define customized groups and views for the SNMP clients that require
access.
Table 29: SNMPv3 Security Models and Levels
Model
Level
Group
Read View
Write View
Notify View
Security
v1
noAuthNoPriv public
(read only)
defaultview
none
none
Community string only
v1
noAuthNoPriv
private
(read/write)
defaultview
defaultview
none
Community string only
v1
noAuthNoPriv
user defined
user defined
user defined
user defined
Community string only
v2c
noAuthNoPriv
public
(read only)
defaultview
none
none
Community string only
v2c
noAuthNoPriv
private
(read/write)
defaultview
defaultview
none
Community string only
v2c
noAuthNoPriv
user defined
user defined
user defined
user defined
Community string only
v3
noAuthNoPriv
user defined
user defined
user defined
user defined
A user name match only
v3
AuthNoPriv
user defined
user defined
user defined
user defined
Provides user authentication via MD5 or SHA
algorithms
v3
AuthPriv
user defined
user defined
user defined
user defined
Provides user authentication via MD5 or SHA
algorithms and data privacy using DES 56-
bit encryption
Содержание GTL-2881
Страница 30: ...Figures 30 Figure 450 Showing RIP Peer Information 669 Figure 451 Resetting RIP Statistics 670 ...
Страница 34: ...Section I Getting Started 34 ...
Страница 48: ...Section II Web Configuration 48 Unicast Routing on page 651 ...
Страница 151: ...Chapter 4 Interface Configuration VLAN Trunking 151 Figure 69 Configuring VLAN Trunking ...
Страница 152: ...Chapter 4 Interface Configuration VLAN Trunking 152 ...
Страница 229: ...Chapter 8 Congestion Control Automatic Traffic Control 229 Figure 135 Configuring ATC Interface Attributes ...
Страница 230: ...Chapter 8 Congestion Control Automatic Traffic Control 230 ...
Страница 596: ...Chapter 14 Multicast Filtering Multicast VLAN Registration for IPv6 596 ...
Страница 620: ...Chapter 15 IP Configuration Setting the Switch s IP Address IP Version 6 620 ...
Страница 670: ...Chapter 18 Unicast Routing Configuring the Routing Information Protocol 670 Figure 451 Resetting RIP Statistics ...
Страница 672: ...Section III Appendices 672 ...
Страница 678: ...Appendix A Software Specifications Management Information Bases 678 ...
Страница 688: ...Appendix C License Statement GPL Code Statement Notification of Compliance 688 ...
Страница 696: ...Glossary 696 ...
Страница 706: ...GTL 2881 GTL 2882 E112016 ST R01 ...