Specifications

Table Of Contents
Corrected and Known Anomalies
SPECTRUM Security
Software Release Notes Page 113
SPECTRUM Security
Known Security Anomalies in SPECTRUM 6.0
Problem 1: When you model a Cabletron device with a READ/WRITE
Community string, a security breach is opened for SPECTRUM READ
ONLY users with SPMAs. If a device is modeled using a READ/WRITE
Community Name, when a user launches the SPMA by right clicking on the
model and selecting Utilities ->Applications from the menu, SPECTUM
opens the Application view using the READ/WRITE Community Name that
the device was initially modeled with in SPECTRUM. If the user clicks the
Community Names button in the Application view, they are afforded
access to Read-Only, Read-Write, and Super-User Community Names for
this device.
Solution: Use the CommunityNameForSNMPSets (0x11a7f) attribute in
the following manner:
1. Model the device in SPECTRUM using a READ ONLY Community Name.
2. Assign a SPECTRUM Security String.
3. Set the CommunityNameForSNMPSets (0x11a7f) attribute to a
READ/WRITE Community Name.
When a user who has SPECTRUM WRITE privileges accesses that model,
the CommunityNameForSNMPSets (0x11a7f) Community Name attribute
is used. If a user who has SPECTRUM READ ONLY privileges accesses that
model, the Community _Name (0x10024) Community Name attribute is
used.
When a READ ONLY SPECTRUM user launches the SPMA by right clicking
on the model and selects Utilities ->Applications from the menu,
SPECTRUM opens the Application view using the Community_Name
(0x10024) Community Name attribute. When the user clicks the
Community Names button in the Applications view, they will have READ
ONLY access.