Lantronix G520 G520 User Guide - Page 125

SNMP Configuration, Agent Behavior, View-based Access Control Model (VACM)

Page 125 highlights

10: Services SNMP Model v1 v2c v3 v3 v3 Table 10-28 SNMP Security Models and Levels Level noAuthNoPriv Authentication Community String noAuthNoPriv Community String noAuthNoPriv Username authNoPriv MD5 or SHA authPriv MD5 or SHA Encryption No No No No DES or AES SNMP Configuration The SNMP agent must be configured to use the version of SNMP that is supported by the management station. An agent can communicate with multiple managers. You can configure the SNMP agent to support communication with one management station using SNMPv1, one using SNMPv2c, and one using SNMPv3. The web interface allows you to configure the SNMP settings. The configuration specifies directives in the following areas:  agent behavior  access control to the agent (VACM)  system information and monitoring  active monitoring of the local system Agent Behavior The following directives control the behavior of SNMP network service.  agent address - the listening address on which to receive incoming SNMP requests. The default behavior is to listen on UDP port 161 on all IPv4 interfaces  EngineID - SNMPv3 only. SNMPv3 requires an SNMP agent to define a unique engine ID to respond to SNMP requests. For configuration details, see Table 10-29 on page 128. View-based Access Control Model (VACM) SNMP v1/v2c/v3-USM follow the VACM model. VACM determines whether to allow access to a managed object in a local MIB by a remote principal. VACM makes use of a MIB that defines the access control policy for the agent and makes it possible to use remote configuration. The SNMP service uses four keywords to set up VACM:  Com2sec - maps a v1 and v2c community string and a source IP or network to a security name.  Group - maps a security name/security model pair to a group name.  View - maps an OID subtree family and bitstring value (mask-optional), or MIB view, to a view name.  Access - maps a group name to a minimum access level (noauth, auth, or priv) and read/ write/notify scope for a specified security model (v1, v2c, v3/usm, or any). In summary:  The Access and View keywords determine what access is being controlled. G520 Series IoT Cellular Gateway User Guide 125

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225

10: Services
G520 Series IoT Cellular Gateway User Guide
125
Table 10-28
SNMP Security Models and Levels
SNMP Configuration
The SNMP agent must be configured to use the version of SNMP that is supported by the
management station. An agent can communicate with multiple managers. You can configure the
SNMP agent to support communication with one management station using SNMPv1, one using
SNMPv2c, and one using SNMPv3.
The web interface allows you to configure the SNMP settings. The configuration specifies
directives in the following areas:
agent behavior
access control to the agent (VACM)
system information and monitoring
active monitoring of the local system
Agent Behavior
The following directives control the behavior of SNMP network service.
agent address – the listening address on which to receive incoming SNMP requests. The
default behavior is to listen on UDP port 161 on all IPv4 interfaces
EngineID – SNMPv3 only. SNMPv3 requires an SNMP agent to define a unique engine ID to
respond to SNMP requests.
For configuration details, see
Table 10-29 on page 128
.
View-based Access Control Model (VACM)
SNMP v1/v2c/v3-USM follow the VACM model. VACM determines whether to allow access to a
managed object in a local MIB by a remote principal. VACM makes use of a MIB that defines the
access control policy for the agent and makes it possible to use remote configuration.
The SNMP service uses four keywords to set up VACM:
Com2sec
– maps a v1 and v2c community string and a source IP or network to a security
name.
Group
– maps a security name/security model pair to a group name.
View
– maps an OID subtree family and bitstring value (mask-optional), or MIB view, to a view
name.
Access
– maps a group name to a minimum access level (noauth, auth, or priv) and read/
write/notify scope for a specified security model (v1, v2c, v3/usm, or any).
In summary:
The Access and View keywords determine what access is being controlled.
SNMP Model
Level
Authentication
Encryption
v1
noAuthNoPriv
Community String
No
v2c
noAuthNoPriv
Community String
No
v3
noAuthNoPriv
Username
No
v3
authNoPriv
MD5 or SHA
No
v3
authPriv
MD5 or SHA
DES or AES