User guide

930 Brocade 6910 Ethernet Access Switch Configuration Guide
53-1002581-01
Simple Network Management Protocol
42
Access to the switch from clients using SNMPv3 provides additional security features that cover
message integrity, authentication, and encryption; as well as controlling user access to specific
areas of the MIB tree.
The SNMPv3 security structure consists of security models, with each model having it’s own
security levels. There are three security models defined, SNMPv1, SNMPv2c, and SNMPv3. Users
are assigned to “groups” that are defined by a security model and specified security levels. Each
group also has a defined security access to set of MIB objects for reading and writing, which are
known as “views.” The switch has a default view (all MIB objects) and default groups defined for
security models v1 and v2c. The following table shows the security models and levels available and
the system default settings.
NOTE
The predefined default groups and view can be deleted from the system. You can
then define
customized groups and views for the SNMP clients that require access.
TABLE 175 SNMPv3 Security Models and Levels
Model Level Group Read View Write View Notify View Security
v1 noAuthNoPriv public
(read only)
defaultview none none Community string
only
v1 noAuthNoPriv private
(read/write)
defaultview defaultview none Community string
only
v1 noAuthNoPriv user defined user defined user defined user defined Community string
only
v2c noAuthNoPriv public
(read only)
defaultview none none Community string
only
v2c noAuthNoPriv private
(read/write)
defaultview defaultview none Community string
only
v2c noAuthNoPriv user defined user defined user defined user defined Community string
only
v3 noAuthNoPriv user defined user defined user defined user defined A user name match
only
v3 AuthNoPriv user defined user defined user defined user defined Provides user
authentication via
MD5 or SHA
algorithms
v3 AuthPriv user defined user defined user defined user defined Provides user
authentication via
MD5 or SHA
algorithms and data
privacy using DES
56-bit encryption