User`s manual

120
DWS-1008 User’s Manual
D-Link Systems, Inc.
Conguring SNMP
Setting SNMP Security
By default, MSS allows nonsecure SNMP message exchanges. You can congure
MSS to require secure SNMP exchanges instead.
Depending on the level of security you want MSS to enforce, you can require
authentication of message exchanges only, or of message exchanges and
notications. You also can require encryption in addition to authentication.
SNMPv1 and SNMPv2c do not support authentication or encryption. If you plan
to use SNMPv1 or SNMPv2c, leave the minimum level of SNMP security set to
unsecured.
To set the minimum level of security MSS requires for SNMP, use the following
command:
set snmp security {unsecured | authenticated | encrypted | auth-req-unsec-notify}
You can specify one of the following options:
unsecured - SNMP message exchanges are not secure. This is the default,
and is the only value supported for SNMPv1 and SNMPv2c. (This security
level is the same as the noAuthNoPriv level described in SNMPv3 RFCs.)
• authenticated - SNMP message exchanges are authenticated but are not
encrypted. (This security level is the same as the authNoPriv level described
in SNMPv3 RFCs.)
• encrypted - SNMP message exchanges are authenticated and encrypted.
(This security level is the same as the authPriv level described in SNMPv3
RFCs.)
• auth-req-unsec-notify - SNMP message exchanges are authenticated but are
not encrypted, and notications are neither authenticated nor encrypted.
Command Example
The following command sets the minimum level of SNMP security allowed to
authentication and encryption:
DWS-1008 set snmp security encrypted
success: change accepted.