Table 6: Snmp Security Models And Levels - LevelOne GEL-2670 User Manual

24 ge + 2 ge sfp l2 managed switch
Table of Contents

Advertisement

| Configuring the Switch
C
4
HAPTER
Configuring Security

Table 6: SNMP Security Models and Levels

Model
Level
Community String
v1
noAuth
public
NoPriv
v1
noAuth
private
NoPriv
v1
noAuth
user defined
NoPriv
v2c
noAuth
public
NoPriv
v2c
noAuth
private
NoPriv
v2c
noAuth
user defined
NoPriv
v3
noAuth
user defined
NoPriv
v3
Auth
user defined
NoPriv
v3
Auth Priv user defined
MIB objects) and default groups defined for security models v1 and v2c.
The following table shows the security models and levels available and the
system default settings.
Group
default_ro_group
default_rw_group
user defined
default_ro_group
default_rw_group
user defined
default_rw_group
user defined
user defined
The predefined default groups and view can be deleted from the
N
:
OTE
system. You can then define customized groups and views for the SNMP
clients that require access.
C
SNMP S
ONFIGURING
Use the SNMP System Configuration page to configure basic settings and
traps for SNMP. To manage the switch through SNMP, you must first enable
the protocol and configure the basic access parameters. To issue trap
messages, the trap function must also be enabled and the destination host
specified.
P
ATH
Advanced Configuration, Security, Switch, SNMP, System
P
ARAMETERS
These parameters are displayed:
SNMP System Configuration
Mode - Enables or disables SNMP service. (Default: Disabled)
– 72 –
Read View
Write View
default_view
none
default_view
default_view
user defined
user defined
default_view
none
default_view
default_view
user defined
user defined
default_view
default_view
user defined
user defined
user defined
user defined
T
S
YSTEM AND
RAP
ETTINGS
Security
Community string only
Community string only
Community string only
Community string only
Community string only
Community string only
A user name match only
Provides user authentication
via MD5 or SHA algorithms
Provides user authentication
via MD5 or SHA algorithms
and data privacy using DES
56-bit encryption

Advertisement

Table of Contents
loading

Table of Contents