User's Manual
Table Of Contents
- Chapter 1: Introduction 1-1
- Chapter 1: Introduction
- Chapter 2: Hardware Installation
- Chapter 3: Network Configuration
- Chapter 4: Initial Configuration
- Chapter 5: System Configuration
- Chapter 6: Command Line Interface
- Using the Command Line Interface
- Entering Commands
- Command Groups
- General Commands
- System Management Commands
- System Logging Commands
- System Clock Commands
- DHCP Relay Commands
- SNMP Commands
- snmp-server community
- snmp-server contact
- snmp-server location
- snmp-server enable server
- snmp-server host
- snmp-server trap
- snmp-server engine-id
- snmp-server user
- snmp-server targets
- snmp-server filter
- snmp-server filter-assignments
- show snmp groups
- show snmp users
- show snmp group-assignments
- show snmp target
- show snmp filter
- show snmp filter-assignments
- show snmp
- Flash/File Commands
- RADIUS Client
- 802.1X Authentication
- MAC Address Authentication
- Filtering Commands
- WDS Bridge Commands
- Spanning Tree Commands
- Ethernet Interface Commands
- Wireless Interface Commands
- interface wireless
- vap
- speed
- multicast-data-rate
- channel
- transmit-power
- radio-mode
- preamble
- antenna control
- antenna id
- antenna location
- beacon-interval
- dtim-period
- fragmentation-length
- rts-threshold
- super-g
- description
- ssid
- closed-system
- max-association
- assoc-timeout-interval
- auth-timeout-value
- shutdown
- show interface wireless
- show station
- Rogue AP Detection Commands
- Wireless Security Commands
- Link Integrity Commands
- IAPP Commands
- VLAN Commands
- WMM Commands
- Appendix A: Troubleshooting
- Appendix B: Cables and Pinouts
- Appendix C: Specifications
- Glossary
- Index
SNMP Commands
6-47
6
• The SNMP engine ID is used to compute the authentication/privacy digests
from the pass phrase. You should therefore configure the engine ID with the
snmp-server engine-id command before using this configuration
command.
• The access point enables SNMP v3 users to be assigned to three
pre-defined groups. Other groups cannot be defined. The available groups
are:
- RO - A read-only group using no authentication and no data encryption.
Users in this group use no security, either authentication or encryption, in
SNMP messages they send to the agent. This is the same as SNMP v1
or SNMP v2c.
- RWAuth - A read/write group using authentication, but no data
encryption. Users in this group send SNMP messages that use an MD5
key/password for authentication, but not a DES key/password for
encryption.
- RWPriv - A read/write group using authentication and data encryption.
Users in this group send SNMP messages that use an MD5 key/
password for authentication and a DES key/password for encryption.
Both the MD5 and DES key/passwords must be defined.
• The command prompts for the following information to configure an SNMP
v3 user:
- user-name - A user-defined string for the SNMP user. (32 characters
maximum)
- group-name - The name of the SNMP group to which the user is
assigned (32 characters maximum). There are three pre-defined groups:
RO, RWAuth, or RWPriv.
- auth-proto - The authentication type used for user authentication: md5 or
none.
-auth-passphrase - The user password required when authentication is
used (8 – 32 characters).
- priv-proto - The encryption type used for SNMP data encryption: des or
none.
- priv-passphrase - The user password required when data encryption is
used (8 – 32 characters).
• Users must be assigned to groups that have the same security levels. If a
user who has “AuthPriv” security (uses authentication and encryption) is
assigned to a read-only (RO) group, the user will not be able to access the
database. An AuthPriv user must be assigned to the RWPriv group with the
AuthPriv security level.
• To configure a user for the RWAuth group, you must include the auth-proto
and auth-passphrase keywords.
• To configure a user for the RWPriv group, you must include the auth-proto,
auth-passphrase, priv-proto, and priv-passphrase keywords.