Groups - Cisco 350 Series Administration Manual

Managed switches
Hide thumbs Also See for 350 Series:
Table of Contents

Advertisement

SNMP

Groups

STEP 4
STEP 5
STEP 6
Groups
NOTE
Cisco 350, 350X and 550X Series Managed Switches, Firmware Release 2.4, ver 0.4
Select or deselect Include in view. If this is selected, the selected MIBs are included in the
view, otherwise they are excluded.
Click Apply.
In order to verify your view configuration, select the user-defined views from the Filter: View
Name list. The following views exist by default:
Default—Default SNMP view for read and read/write views.
DefaultSuper—Default SNMP view for administrator views.
In SNMPv1 and SNMPv2, a community string is sent along with the SNMP frames. The
community string acts as a password to gain access to an SNMP agent. However, neither the
frames nor the community string are encrypted. Therefore, SNMPv1 and SNMPv2 are not
secure.
In SNMPv3, the following security mechanisms can be configured.
Authentication—The device checks that the SNMP user is an authorized system
administrator. This is done for each frame.
Privacy—SNMP frames can carry encrypted data.
Thus, in SNMPv3, there are three levels of security:
No security (No authentication and no privacy)
Authentication (Authentication and no privacy)
Authentication and privacy
SNMPv3 provides a means of controlling the content each user can read or write and the
notifications they receive. A group defines read/write privileges and a level of security. It
becomes operational when it is associated with an SNMP user or community.
To associate a non-default view with a group, first create the view in the
24
Views
page.
455

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents