Lantronix SLC 32 Lantronix SLC - User Guide - Page 66
Communities, Version 3, No Auth/No Encrypt
View all Lantronix SLC 32 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 66 highlights
7: Services Enable Traps Traps Enabled for Sending (Table listing types of traps) Traps are notifications of certain critical events. Disabled by default. This feature is applicable when SNMP is enabled. Examples of traps that the SLC console manager sends include: Ethernet Port Link Up Ethernet Port Link Down Authentication Failure SLC Booted SLC Shutdown Device Port Logging Power Supply Status Sysadmin user password changed The SLC device sends the traps to the host identified in the NMS field. NMS-When SNMP is enabled, an NMS (Network Management System) acts as a central server, requesting and receiving SNMP-type information from any computer using SNMP. The NMS can request information from the SLC device and receive traps from the SLC console manager. Enter the IP address of the NMS server. Required if you selected Enable Traps. Location-Physical location of the SLC device (optional). Useful for managing the SLC console manager using SNMP. Up to 20 characters. Contact-Description of the person responsible for maintaining the SLC device, for example, a name (optional). Up to 20 characters. Enables the sending of SNMP trap messages. Click the types of trap messages that you want to receive. Communities Read-Only Read-Write Trap Alarm Delay A string that acts like a password for an SNMP manager to access the read-only data the SLC SNMP agent provides. The default is public. A string that acts like a password for an SNMP manager to access the read-only data the SLC SNMP agent provides and to modify data where permitted. The default is private. The trap used for outgoing generic and enterprise traps. Traps sent with the Event trigger mechanism still use the trap community specified with the Event action. The default is public. Number of seconds delay between outgoing SNMP traps. Version 3 Security Auth with Levels of security available with SNMP v. 3 are: No Auth/No Encrypt: No authentication or encryption. Auth/No Encrypt: Authentication but no encryption. (default) Auth/Encrypt: Authentication and encryption. For Auth/No Encryp or Auth/Encrypt, the authentication method: MD5: Message-Digest algorithm 5 (default) SHA: Secure Hash Algorithm SLC™ Console Manager User Guide 66