Planning For Snmpv3 Operation - Cambium Networks PTP 650 Series User Manual

Table of Contents

Advertisement

Chapter 3: System planning

Planning for SNMPv3 operation

SNMP security mode
Decide how SNMPv3 security will be configured.
MIB-based security management uses standard SNMPv3 MIBs to configure the user-based
security model and the view-based access control model. This approach provides considerable
flexibility, allowing a network operator to tailor views and security levels appropriate for different
types of user. MIB-based security management may allow a network operator to take advantage of
built-in security management capabilities of existing network managers.
Web-based security management allows an operator to configure users, security levels, privacy
and authentication protocols, and passphrases using the PTP 650 web-based management
interface. The capabilities supported are somewhat less flexible than those supported using the
MIB-based security management, but will be sufficient in many applications. Selection of web-
based management for SNMPv3 security disables the MIB-based security management. PTP 650
does not support concurrent use of MIB-based and web-based management of SNMPv3 security.
Web-based management of SNMPv3 security
Initial configuration of SNMPv3 security is available only to HTTP or HTTPS/TLS user accounts
with security role of Security Officer.
Identify the minimum security role of HTTP or HTTPS/TLS user accounts that will be permitted
access for web-based management of SNMPv3 security. The following roles are available:
System Administrator
Security Officer
Identify the format used for SNMP Engine ID. The following formats are available:
MAC address (default)
IPv4 address
Text string
IPv6 address
If SNMP Engine ID will be based on a text string, identify the text string required by the network
management system. This is often based on some identifier that survives replacement of the PTP
hardware.
Identify the user names and security roles of initial SNMPv3 users. Two security roles are
available:
Read Only
System Administrator
Page
3-35
Security planning

Advertisement

Table of Contents
loading

Table of Contents