Hide thumbs Also See for G350:
Table of Contents

Advertisement

If you communicate with a device using the write community, you are assigned the security name
WriteCommN. This security name is mapped to the WriteCommG group by default. This allows you to
view the agent's MIB tree and change any of the values in the MIB tree.
NOTE:
If you delete the ReadCommN or WriteCommN userrs, the ReadCommG or
WriteCommG groups, or the SNMPv1View, you may not be able to access the device
using SNMPv1 or SNMPv2c.
In addition, traps are sent to designated trap receivers. Packets with trap information also contain a trap
community string.
SNMPv2c
SNMPv2c is very similar to SNMPv1. However, SNMPv2c adds support for the get-bulk action and
supports a different trap format.
SNMPv3
SNMPv3 enables the following features over SNMPv1 or v2c:
User authentication with a user name and password.
Communication encryption between the Network Management Station (NMS) and the SNMP
agent at the application level.
Access control definition for specific MIB items available on the SNMP agent.
Notification of specified network events directed toward specified users.
Definition of roles using access control, each with unique access permissions and authentication
and encryption requirements.
The basic components in SNMPv3 access control are users, groups, and views. In addition, SNMPv2
uses an SNMP engine ID to identify SNMP identity. An SNMP engine ID is assigned to each IP address
of each device in the network. Each SNMP engine ID should be unique in the network.

Users

SNMPv3 uses the User-based Security Model (USM) for security, and the View-based Access Control
Model (VACM) for access control. USM uses the HMAC-MD5-96 and HMAC-SHA-96 protocols for
user authentication, and the CBC-DES56 protocol for encryption or privacy.
An unlimited number of uses can access SNMPv3 at the same time.
SNMP supports three security levels:
NoAuthNoPriv — This is the lowest level of SNMPv3 security. No Message Authentication
Code (MAC) is provided with the message, and no encryption is performed. This method
maintains the same security level as SNMPv1, but provides a method for limiting the access rights
of the user.
Administration of the Avaya G350 Media Gateway
June 2004
Configuring SNMP
SNMP versions
99

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents