Netgear WFS709TP WFS709TP Setup Manual - Page 168

Table 13-4. SNMPv3 Access Point User Details, Table 13-3. Basic Access Point SNMP Parameters continued

Page 168 highlights

WFS709TP ProSafe Smart Wireless Switch Software Administration Manual Table 13-3. Basic Access Point SNMP Parameters (continued) Field Description Expected/Recommended Values Enable SNMP Traps Enables generation of SNMP traps from all Access Points. Refer to "SNMP Traps" on page 13-9 for a complete list of traps that may be generated by access points in the network. Select this option to enable generation of traps. Ensure that at least one trap receiver is configured to complete the traps configuration. Communities Community strings used to authenticate requests for SNMP versions before version 3. These are the community strings that are allowed to access the SNMP data from the WFS709TP (only needed if using SNMP v2c). Trap receivers Host information about a trap receiver. This host must be running a trap receiver to receive and interpret the traps sent by the access points. Configure the following for each host/ trap receiver: • IP address. • SNMP version (1 or 2c). • Community string. • (Optional) UDP port on which the trap receiver is listening for traps. The default is the UDP port number 162. 3. If you are using SNMPv3 for getting the values from the WFS709TP, refer to Table 13-4 to configure valid users for SNMPv3. Table 13-4. SNMPv3 Access Point User Details Field User name Authentication protocol Authentication protocol password Description Expected/Recommended Values A string representing the name of the A string value for the user name. user. An indication of whether messages sent on behalf of this user can be authenticated, and if so, the type of authentication protocol that is used. This can take one of two values: • MD5: HMAC-MD5-96 Digest Authentication Protocol. • SHA: HMAC-SHA-96 Digest Authentication Protocol. If messages sent on behalf of this user can be authenticated, the (private) authentication key for use with the authentication protocol. String password for MD5 or SHA, depending on the choice of protocol. 13-6 v1.0, June 2007 Configuring Management Utilities

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222

WFS709TP ProSafe Smart Wireless Switch Software Administration Manual
13-6
Configuring Management Utilities
v1.0, June 2007
3.
If you are using SNMPv3 for getting the values from the WFS709TP, refer to
Table 13-4
to
configure valid users for SNMPv3.
Enable SNMP Traps
Enables generation of SNMP traps
from all Access Points. Refer to
“SNMP
Traps” on page 13-9
for a complete list
of traps that may be generated by
access points in the network.
Select this option to enable generation
of traps.
Ensure that at least one trap receiver is
configured to complete the traps
configuration.
Communities
Community strings used to
authenticate requests for SNMP
versions before version 3.
These are the community strings that
are allowed to access the SNMP data
from the WFS709TP (only needed if
using SNMP v2c).
Trap receivers
Host information about a trap receiver.
This host must be running a trap
receiver to receive and interpret the
traps sent by the access points.
Configure the following for each host/
trap receiver:
IP address.
SNMP version (1 or 2c).
Community string.
(Optional) UDP port on which the trap
receiver is listening for traps. The
default is the UDP port number 162.
Table 13-4. SNMPv3 Access Point User Details
Field
Description
Expected/Recommended Values
User name
A string representing the name of the
user.
A string value for the user name.
Authentication
protocol
An indication of whether messages
sent on behalf of this user can be
authenticated, and if so, the type of
authentication protocol that is used.
This can take one of two values:
MD5: HMAC-MD5-96 Digest
Authentication Protocol.
SHA: HMAC-SHA-96 Digest
Authentication Protocol.
Authentication
protocol password
If messages sent on behalf of this user
can be authenticated, the (private)
authentication key for use with the
authentication protocol.
String password for MD5 or SHA,
depending on the choice of protocol.
Table 13-3. Basic Access Point SNMP Parameters (continued)
Field
Description
Expected/Recommended Values