Cisco 350 Series Administration Manual page 667

Managed switches
Hide thumbs Also See for 350 Series:
Table of Contents

Advertisement

SNMP
Overview
NOTE
NOTE
STEP 1
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
SNMP agents maintain a list of variables that are used to manage the device. These variables
are defined in the Management Information Base (MIB).
Due to the security vulnerabilities of other versions, it is recommended to use SNMPv3.
SNMPv3
In addition to the functionality provided by SNMPv1 and v2, SNMPv3 applies access control
and new trap mechanisms to SNMPv1 and SNMPv2 PDUs. SNMPv3 also defines a User
Security Model (USM) that includes:
Authentication—Provides data integrity and data origin authentication.
Privacy—Protects against disclosure message content. Cipher Block-Chaining (CBC-
DES) is used for encryption. Either authentication alone can be enabled on an SNMP
message, or both authentication and privacy can be enabled on an SNMP message.
However, privacy cannot be enabled without authentication.
Timeliness—Protects against message delay or playback attacks. The SNMP agent
compares the incoming message time stamp to the message arrival time.
Key Management—Defines key generation, key updates, and key use. The device
supports SNMP notification filters based on Object IDs (OID). OIDs are used by the
system to manage device features.
SNMP Workflow
For security reasons, SNMP is disabled by default. Before you can manage the device via
SNMP, you must enable SNMP on the
The following is the recommended series of actions for configuring SNMP:
If you decide to use SNMPv1 or v2:
Navigate to the
Communities
access rights and a view in Basic mode or with a group in Advanced mode. There are two
ways to define access rights of a community:
Basic mode—The access rights of a community can configure with Read Only, Read
Write, or SNMP Admin. In addition, you can restrict the access to the community to
only certain MIB objects by selecting a view (defined in the
Advanced Mode—The access rights of a community are defined by a group (defined
in the
Groups
page). You can configure the group with a specific security model. The
access rights of a group are Read, Write, and Notify.
TCP/UDP Services
page and click Add. The community can be associated with
page.
Views
page).
24
445

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents