Lantronix X300 Series X300 Series User Guide Rev B - Page 112

SNMPv3 with User-based Security Model (USM), System Information and Monitoring, Active Monitoring

Page 112 highlights

10: Services  The Group and com2sec keywords determine who has this access. Figure 10-3 shows how the fields map in the VACM configuration model. com2sec secName Figure 10-3 VACM Configuration Model ipSource default community group access view groupName groupName viewName model v1 v2c usm context "" type included excluded secName model v1 v2c usm any oidSubtree level noauth auth priv prefix exact prefix readScope viewName none writeScope viewName none notifyScope viewName none [mask] SNMPv3 usm userName Security level NoAuth,NoPriv Auth,NoPriv Auth,Priv auth MD5 SHA privacy DES AES For SNMP v1/v2c/USM VACM configuration details, see Table 10-20 on page 116. SNMPv3 with User-based Security Model (USM) SNMPv3 with USM contains a private list of users and keys specific to the SNMPv3 protocol. To use this model, the SNMPv3 USM users must be created and added to the VACM group table (as security name). For SNMPv3 with USM user configuration details, see Table 10-22 on page 119. System Information and Monitoring System information includes system group information and monitoring information, which is described below. The system group information, such as name, location, contact, and description, are retrieved from the underlying network management system. The agent is built with support for monitoring the local system. The following directives can be specified:  Process monitoring - provides information about individual processes running on the local system  Disk usage monitoring - provides information about disk usage for specified disks or all disks  System load monitoring - provides information about system load average and swap space  Log file monitoring - monitors the file size of specified log files For system information and monitoring configuration details, see Table 10-19 on page 114. Active Monitoring The agent can be configured to generate trap notifications based on the following directives:  Authentication failure trap - generate authentication failure traps X300 Series IoT Cellular Gateway User Guide 112

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216

10: Services
X300 Series IoT Cellular Gateway User Guide
112
The Group and com2sec keywords determine who has this access.
Figure 10-3
shows how the fields map in the VACM configuration model.
Figure 10-3
VACM Configuration Model
For SNMP v1/v2c/USM VACM configuration details, see
Table 10-20 on page 116
.
SNMPv3 with User-based Security Model (USM)
SNMPv3 with USM contains a private list of users and keys specific to the SNMPv3 protocol. To
use this model, the SNMPv3 USM users must be created and added to the VACM group table (as
security name).
For SNMPv3 with USM user configuration details, see
Table 10-22 on page 119
.
System Information and Monitoring
System information includes system group information and monitoring information, which is
described below. The system group information, such as name, location, contact, and description,
are retrieved from the underlying network management system.
The agent is built with support for monitoring the local system. The following directives can be
specified:
Process monitoring – provides information about individual processes running on the local
system
Disk usage monitoring – provides information about disk usage for specified disks or all disks
System load monitoring – provides information about system load average and swap space
Log file monitoring – monitors the file size of specified log files
For system information and monitoring configuration details, see
Table 10-19 on page 114
.
Active Monitoring
The agent can be configured to generate trap notifications based on the following directives:
Authentication failure trap – generate authentication failure traps
group
groupName
secName
model
v1
v2c
usm
access
groupName
context
model
level
prefix
viewName
viewName
viewName
readScope
writeScope
notifyScope
""
v1
v2c
usm
any
noauth
auth
priv
exact
prefix
none
none
none
com2sec
secName
ipSource
community
default
SNMPv3 usm
userName
Security level
auth
privacy
NoAuth,NoPriv
Auth,NoPriv
Auth,Priv
MD5
SHA
DES
AES
view
viewName
type
oidSubtree
included
excluded