SNMP Configuration
Access
Access Edit Rules
The following table describes which parameters can be modified in a Access table entry.
Item | Edit Allowed |
|
|
Group Name | No |
|
|
Read View Name | Yes |
|
|
Write View Name | Yes |
|
|
Notify View Name | Yes |
|
|
Security Model | No |
|
|
Security Level | No |
|
|
Storage | Yes |
|
|
Access Policy
The USM/VACM configuration defines the complete access policy in effect for incoming SNMP requests in the system. SNMP users and a Security model define a SNMP group. Each Group along with a View defines one element of the Access Policy as defined in the Access table. When an SNMP request comes to the system, the system first determines which group the user sending the request belongs to. This is done by looking up the username and the Security model used (V1, V2 or USM) in the SNMP request. Once the group is determined the system looks up the Access table entries and decides:
•whether the authentication and encryption is required for the SNMP query. This is determined by looking up the “Security Level” parameter in the Access table. Authentication is verified based on the information in the User table parameters “Auth Key” or “Auth Password”. In case encryption is required, the key defined by User table parameters “Priv Key” or “Priv Pass- word” is used.
Broadmore 1750 - Release 4.6 |