Snmp Group Table Settings - D-Link DGS-3630 Series Reference Manual

Layer 3 stackable managed switch web ui reference guide
Hide thumbs Also See for DGS-3630 Series:
Table of Contents

Advertisement

DGS-3630 Series Layer 3 Stackable Managed Switch Web UI Reference Guide

SNMP Group Table Settings

An SNMP group created with this table maps SNMP users to the views created in the SNMP View Table Settings
window.
To view the following window, click Management > SNMP > SNMP Group Table Settings, as shown below:
The fields that can be configured are described below:
Parameter
Group Name
Read View Name
User-based Security Model
Write View Name
Security Level
Notify View Name
IP Address-List Name
Click the Add button to add a new entry based on the information entered.
Click the Delete button to remove the specified entry.
Figure 4-11 SNMP Group Table Settings Window
Description
Enter the SNMP group name here. This name can be up to 32 characters long.
Spaces are not allowed.
Enter the read view name that users of the group can access.
Select the security model here. Options to choose from are SNMPv1, SNMPv2c,
and SNMPv3.
• SNMPv1 - Select to allow the group to use the SNMPv1 security model.
• SNMPv2c - Select to allow the group to use the SNMPv2c security model.
• SNMPv3 - Select to allow the group to use the SNMPv3 security model.
Enter the write view name that the users of the group can access.
When selecting SNMPv3 in the User-based Security Model drop-down list, this
option is available.
• NoAuthNoPriv - Specify that there will be no authorization and no
encryption of packets sent between the Switch and a remote SNMP
manager.
• AuthNoPriv - Specify that authorization will be required, but there will be no
encryption of packets sent between the Switch and a remote SNMP
manager.
• AuthPriv - Specify that authorization will be required, and that packets sent
between the Switch and a remote SNMP manger will be encrypted.
Enter the notify view name that users of the group can access. The notify view
describes the object that can be reported its status via trap packets to the group
user.
Enter the standard IP access control list (ACL) to associate with the group.
42

Advertisement

Table of Contents
loading

Table of Contents