6. Security

Controlling SNMP Access

here are three methods for limiting SNMP access.

Disable the SNMP management option. Refer to Table A-13, General SNMP

Management Options, in Appendix A, Configuration Options.

TAssign SNMP community names and access types.

Limit SNMP access through validation of the IP address of each allowed SNMP manager.

Assigning SNMP Community Names and Access Types

he unit can be managed by an SNMP manager supporting SNMP. The community name must be supplied by an external SNMP manager accessing an object in the MIB.

o define SNMP community names, follow this menu selection sequence:

Main Menu Configuration Current Configuration

Management and Communication General SNMP Management

Refer to Table A-13, General SNMP Management Options, in Appendix A,

Configuration Options, to:

Enable SNMP Management.

Assign the SNMP community names of the SNMP Managers that are allowed

Tto access the unit’s Management Information Base (MIB).

Specify Read or Read/Write access for each SNMP community name.

Limiting SNMP Access through the IP Addresses of the Managers

he unit provides an additional level of security through validation of the IP addresses.

he SNMP Management option must be enabled. To control SNMP access with IP addresses, follow this menu selection sequence:

Main Menu Configuration Current Configuration

Management and Communication SNMP NMS Security

Refer to Table A-14, SNMP NMS Security Options, in Appendix A, Configuration Options. The SNMP access can be limited by:

TEnabling NMS IP address checking. Add each IP address and access level.

NOTE:

Do not change or delete the IP address or access level of the NMS performing the sets or enable IP address checking prior to adding the NMS to the table.

8700-A2-GB20-40

May 2002

6-5

Page 51
Image 51
Paradyne U8777, 8779 Controlling Snmp Access, Assigning Snmp Community Names and Access Types, Configuration Options, to