System Management Guide SNMP
Edition: 01 3HE 11018 AAAC TQZZA 219
Context config>system>security>snmp
Description This command configures a view. Views control the accessibility of a MIB object within the
configured MIB view and subtree. Object identifiers (OIDs) uniquely identify MIB objects in
the subtree. OIDs are organized hierarchically with specific values assigned by different
organizations.
Once the subtree (OID) is identified, a mask can be created to select the portions of the
subtree to be included or excluded for access using this particular view. See the mask
command. The views configured with this command can subsequently be used in read, write,
and notify commands that are used to assign specific access group permissions to created
views and assigned to particular access groups.
Multiple subtrees can be added or removed from a view name to tailor a view to the
requirements of the user access group.
The no view view-name command removes a view and all subtrees.
The no view view-name subtree oid-value command removes a sub-tree from the view
name.
Default no views are defined
Parameters view-name — the 1 to 32 character view name
Default n/a
oid-value — the object identifier (OID) value for the view-name. This value, for example,
1.3.6.1.6.3.11.2.1, combined with the mask and include and exclude statements,
configures the access available in the view.
It is possible to have a view with different subtrees with their own masks and include
and exclude statements. This allows you to customize visibility and write capabilities
for specific user requirements
mask
Syntax mask mask-value [type {included | excluded}]
no mask
Context config>system>security>snmp>view view-name
Description The mask value and the mask type, along with the oid-value configured in the view
command, determines the access of each sub-identifier of an object identifier (MIB subtree)
in the view.
Each bit in the mask corresponds to a sub-identifier position; for example, the most significant
bit for the first sub-identifier, the next most significant bit for the second sub-identifier, and so
on. If the bit position on the sub-identifier is available, it can be included or excluded.