Simple Network Management Protocol 3

Access to the switch using from clients using SNMPv3 provides additional security features that cover message integrity, authentication, and encryption; as well as controlling user access to specific areas of the MIB tree.

The SNMPv3 security structure consists of security models, with each model having it’s own security levels. There are three security models defined, SNMPv1, SNMPv2c, and SNMPv3. Users are assigned to “groups” that are defined by a security model and specified security levels. Each group also has a defined security access to set of MIB objects for reading and writing, which are known as “views.” The switch has a default view (all MIB objects) and default groups defined for security models v1 and v2c. The following table shows the security models and levels available and the system default settings.

Table 3-4 SNMPv3 Security Models and Levels

Model

Level

Group

Read View

Write View

Notify View

Security

v1

noAuthNoPriv

public

defaultview

none

none

Community string only

 

 

(read only)

 

 

 

 

v1

noAuthNoPriv

private

defaultview

defaultview

none

Community string only

 

 

(read/write)

 

 

 

 

v1

noAuthNoPriv

user defined

user defined

user defined

user defined

Community string only

 

 

 

 

 

 

 

v2c

noAuthNoPriv

public

defaultview

none

none

Community string only

 

 

(read only)

 

 

 

 

v2c

noAuthNoPriv

private

defaultview

defaultview

none

Community string only

 

 

(read/write)

 

 

 

 

v2c

noAuthNoPriv

user defined

user defined

user defined

user defined

Community string only

 

 

 

 

 

 

 

v3

noAuthNoPriv

user defined

user defined

user defined

user defined

A user name match only

 

 

 

 

 

 

 

v3

AuthNoPriv

user defined

user defined

user defined

user defined

Provides user

 

 

 

 

 

 

authentication via MD5 or

 

 

 

 

 

 

SHA algorithms

v3

AuthPriv

user defined

user defined

user defined

user defined

Provides user

 

 

 

 

 

 

authentication via MD5 or

 

 

 

 

 

 

SHA algorithms and data

 

 

 

 

 

 

privacy using DES 56-bit

 

 

 

 

 

 

encryption

Note: The predefined default groups and view can be deleted from the system. You can then define customized groups and views for the SNMP clients that require access.

Setting Community Access Strings

You may configure up to five community strings authorized for management access. All community strings used for IP Trap Managers should be listed in this table. For security reasons, you should consider removing the default strings.

Command Attributes

SNMP Community Capability – Indicates that the switch supports up to five community strings.

3-39

Page 89
Image 89
Accton Technology ES3528M-SFP manual Setting Community Access Strings, SNMPv3 Security Models and Levels, User defined