User guide
File Administration Discovery Configurator (Service Provider)
30
AlliedView NMS Administration Guide
Communities will be attempted in the order displayed. The order may be modified by selecting a row and then clicking on
the up/down buttons.
Communities may be added, modified, or deleted with the Add, Modify or Delete Buttons. The Add button will add to the
list whatever is in the Read or Write text field. The Modify button will replace whatever is in the selected row with whatever
has been typed in the Read or Write text field.
The SNMP agent port, timeout, and retry count can be configured as well. The defaults are 161, 2, and 0 respectively.
Whereas 161 is the most commonly used SNMP agent port, others can be added as a space-separated list. Each port will be
tried in the given order.
3.1.2.2 SNMPv3
There is the option to enable SNMPv3 Discovery, which adds security and administration features. (For information on the
relationships between the SNMP versions refer to RFC 3416.)
The SNMP panel allows the addition of Users following the User-based security model defined in RFC 3414. As RFC 3416
states, only those principals (users) having legitimate rights can access or modify the values of any MIB objects supported by
that entity.
The SNMP panel includes the Enable SNMPv3 Discovery option, as shown in Figure 3-4. User Names are added by typing in
the User Name field, the Context Field, and then selecting Add. Names can continue to be added and the order changed
using the direction arrows. A name can be modified by selecting a name, changing the name in the User name field, and
selecting Modify. Selecting Save Changes writes the values to the NMS.
3.1.3 CWMP Tab
The CWMP (Common WAN Management Protocol) tab addresses TR-069 support. This tab allows you to set ACS (Auto
Configuration Server) and CPE (Customer Premise Equipment) login credentials for iMGs. The ACS login credentials are
used by iMGs when they connect to the ACS embedded with the NMS server. The NMS uses the credentials in the CPE list
during discovery to connect with an iMG. The credentials in each list are tried in the order they are listed. Duplicate
usernames with different passwords are allowed in each list.