6. Security
Controlling SNMP Access
There are three methods for limiting SNMP access:
T
T
T
Assigning SNMP Community Names and Access Types
The unit can be managed by an SNMP manager supporting SNMP. The
community name must be supplied by an external SNMP manager accessing an
object in the MIB.
To define SNMP community names, follow this menu selection sequence:
Refer to
Configuration Options , to:
T
T
T
Limiting SNMP Access through the IP Addresses of the Managers
The unit provides an additional level of security through validation of the IP
addresses.
The SNMP Management option must be enabled. To control SNMP access with IP
addresses, follow this menu selection sequence:
Refer to
Options . The SNMP access can be limited by:
T
T
6-6
Disable the SNMP management option. Refer to
Management Options,
in Appendix A, Configuration Options .
Assign SNMP community names and access types.
Limit SNMP access through validation of the IP address of each allowed
SNMP manager.
Main Menu
Configuration
Management and Communication
Table A-12, General SNMP Management Options,
Enable SNMP Management.
Assign the SNMP community names of the SNMP Managers that are allowed
to access the unit's Management Information Base (MIB).
Specify Read or Read/Write access for each SNMP community name.
Main Menu
Configuration
Management and Communication
Table A-13, SNMP NMS Security Options,
Enabling NMS IP address checking.
Add each IP address and access level.
NOTES:
— Do not change or delete the IP address or access level of the NMS
performing the sets, or enable IP address checking prior to adding the
NMS to the table.
— The SNMP NMS Security Options screen is not available if the unit is
connected to a DSLAM card running in IP Conservative mode.
December 2001
Table A-12, General SNMP
Current Configuration
General SNMP Management
Current Configuration
SNMP NMS Security
in Appendix A, Configuration
in Appendix A,
7900-A2-GB21-20