D-Link DXS-3400 User Manual - Page 46
SNMP Group Table Settings, Management>SNMP >SNMP Group Table Settings
View all D-Link DXS-3400 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 46 highlights
DXS-3400 Series Lite Layer 3 Stackable 10GbE Managed Switch Web UI Reference Guide Parameter View Name Access Right Description remote SNMP managers access to MIB objects in the Switch's SNMP agent. Enter an alphanumeric string of up to 32 characters that is used to identify the group of MIB objects that a remote SNMP manager is allowed to access on the Switch. The view name must exist in the SNMP View Table. Select the access right here. Options to choose from are Read Only, and Read Write. • Read Only- SNMP community members using the community string created can only read the contents of the MIBs on the Switch. • Read Write-SNMP community members using the community string created can read from, and write to the contents of the MIBs on the Switch. IP Access-List Name Enter the name of the standard access list to control the user to use this community string to access to the SNMP agent. Click the Add button to add a new entry based on the information entered. Click the Delete button to remove the specified entry. SNMP Group Table Settings An SNMP Group created with this table maps SNMP users (identified in the SNMP User Table) to the views created in the previous window. To view the following window, click Management>SNMP >SNMP Group Table Settings, as shown below: Figure 4-12SNMP Group Table Settings Window The fields that can be configured are described below: Parameter Group Name Read View Name User-based Security Model Description Enter the group name of a maximum of 32 characters. The syntax is general string that does not allow space. Enter the read view name that the group user can access. Select the security model here. Options to choose from are SNMPv1, SNMPv2c, and SNMPv3. • SNMPv1- Select to allow the group user to use the SNMPv1 security model. • SNMPv2c-Select to allow the group user to use the SNMPv2c security model. 36