EasyManuals Logo

Extreme Networks ExtremeWare XOS Guide User Manual

Extreme Networks ExtremeWare XOS Guide
698 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #88 background imageLoading...
Page #88 background image
Managing the Switch
ExtremeWare XOS 11.3 Concepts Guide
88
subtree that can be written to, and notify view defines the subtree that notifications can originate from.
MIB views are discussed in “SNMPv3 MIB Access Control” on page 89.
A number of default (permanent) groups are already defined. These groups are: admin, initial, v1v2c_ro,
v1v2c_rw. To display information about the access configuration of a group or all groups, use the
following command:
show snmpv3 access {[[hex <hex_group_name>] | <group_name>]}
Users are associated with groups using the following command:
configure snmpv3 add group [[hex <hex_group_name>] | <group_name>] user [[hex
<hex_user_name>] | <user_name>] {sec-model [snmpv1| snmpv2c | usm]} {volatile}
To show which users are associated with a group, use the following command:
show snmpv3 group {[[hex <hex_group_name>] | <group_name>] {user [[hex
<hex_user_name>] | <user_name>]}}
To delete a group, use the following command:
configure snmpv3 delete access [all-non-defaults | {[[hex <hex_group_name>] |
<group_name>] {sec-model [snmpv1 | snmpv2c | usm] sec-level [noauth | authnopriv |
priv]}}]
When you delete a group, you do not remove the association between the group and users of the group.
To delete the association between a user and a group, use the following command:
configure snmpv3 delete group {[[hex <hex_group_name>] | <group_name>]} user [all-non-
defaults | {[[hex <hex_user_name>] | <user_name>] {sec-model [snmpv1|snmpv2c|usm]}}]
Security Models and Levels. For compatibility, SNMPv3 supports three security models:
● SNMPv1—no security
● SNMPv2c—community strings based security
● SNMPv3—USM security
The default is USM. You can select the security model based on the network manager in your network.
The three security levels supported by USM are:
● noAuthnoPriv—No authentication, no privacy. This is the case with existing SNMPv1/v2c agents.
● AuthnoPriv—Authentication, no privacy. Messages are tested only for authentication.
● AuthPriv—Authentication, privacy. This represents the highest level of security and requires every
message exchange to pass the authentication and encryption tests.
When a user is created, an authentication method is selected, and the authentication and privacy
passwords or keys are entered.
When MD5 authentication is specified, HMAC-MD5-96 is used to achieve authentication with a 16-octet
key, which generates an 128-bit authorization code. This authorization code is inserted in
msgAuthenticationParameters field of SNMPv3 PDUs when the security level is specified as either
AuthnoPriv or AuthPriv. Specifying SHA authentication uses the HMAC-SHA protocol with a 20-octet
key for authentication.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Extreme Networks ExtremeWare XOS Guide and is the answer not in the manual?

Extreme Networks ExtremeWare XOS Guide Specifications

General IconGeneral
BrandExtreme Networks
ModelExtremeWare XOS Guide
CategorySoftware
LanguageEnglish

Related product manuals