S
IMPLE
N
ETWORK
M
ANAGEMENT
P
ROTOCOL
5-2
Access to the switch using from clients using SNMPv3 provides additional
security features that cover message integrity, authentication, and
encryption; as well as controlling user access to specific areas of the MIB
tree.
The SNMPv3 security structure consists o f security models, with each
model having it’s own security levels. There are three security models
defined, SNMPv1, SNMPv2c, and SNMPv3. Users are assigned to
“groups” that are defined by a security model and specified security levels.
Each group also has a defined security access to set of MIB ob jects for
reading and writing, which are known as “views.” The switch has a default
view (all MIB objects) and default groups defined for security models v1
and v2c. The following table shows the security models and levels available
and the system default settings.
Table 5-1 SNMPv3 Security Models and Levels
Model Level Group Read View Write
View
Notify
View
Security
v1 noAuthNoPriv public
(read only)
defaultview none none Community
string only
v1 noAuthNoPriv private
(read/write)
defaultview defaultview none Community
string only
v1 noAuthNoPriv user defined user defined user defined user defined Community
string only
v2c noAuthNoPriv public
(read only)
defaultview none none Community
string only
v2c noAuthNoPriv private
(read/write)
defaultview defaultview none Community
string only
v2c noAuthNoPriv user defined user defined user defined user defined Community
string only
v3 noAuthNoPriv user defined user defined user defined user defined A user
name match
only