SNMP

17.6SNMP Security

17.6.1SNMP v1 Security

SNMP version 1 utilizes the community name for authentication. If the SNMP manager/client sends a request message containing the community name that doesn’t match the community name set in the SNMP Agent, the SNMP agent will respond with the authentication failure message. This community name is not encrypted during transmission.

17.6.2SNMP v3 Security - Authentication Protocol and Privacy Protocol

The CMM supports the highest security level for SNMP v3. MD5 is used for the authentication protocol in the CMM. The DES is used for the privacy protocol in the CMM. When in this mode, the user needs to specify each password (authKey, privKey) for these protocols. The SNMP v3 packet is securely encrypted during the transmission. This is the default security level of the CMM when configured for SNMP v3.

The following fields are defined to handle all SNMP v3 security levels:

Table 76. SNMP v3 Security Fields For Traps

Security Name

User Name

Default Value:

 

 

 

SecurityName

User name

root

 

 

 

AuthProtocol

authentication type

MD5

 

 

 

AuthKey

authentication password

publiccmm

 

 

 

PrivProtocol

privacy type

DES

 

 

 

PrivKey

privacy password

publiccmm

 

 

 

Table 77. SNMP v3 Security Fields For Queries

SecurityName

user name

Default Value:

 

 

 

SecurityName

User name

root

 

 

 

AuthProtocol

authentication type (MD5)

MD5

 

 

 

AuthKey

authentication password

cmmrootpass

 

 

 

PrivProtocol

privacy type (DES)

DES

 

 

 

PrivKey

privacy password

cmmrootpass

 

 

 

17.7SNMP Trap Descriptions

The list of possible SNMP trap strings is listed in Section 11, “Health Events” on page 104.

162MPCMM0001 Chassis Management Module Software Technical Product Specification

Page 162
Image 162
Intel MPCMM0001 manual Snmp Security Snmp v1 Security, Snmp Trap Descriptions, Snmp v3 Security Fields For Traps