Specifications
SNMP Support on Enterasys Devices
March 28, 2011 Page 4 of 27
Community Name Strings
EarlierSNMPversions(v1andv2c)relyoncommunitynamestringsforauthentication.Inorder
forthenetworkmanagementstation(NMS)toaccesstheswitch,thecommunitystringdefinitions
ontheNMSmustmatchatleastoneofthethreecommunitystringdefinitionsontheswitch.A
communitystringcanhave
oneoftheseattributes:
•Read‐only(ro)—GivesreadaccesstoauthorizedmanagementstationstoallobjectsintheMIB
exceptthecommunitystrings,butdoesnotallowwriteaccess.
•Read‐write(rw)—Givesreadandwriteaccesstoauthorizedmanagementstationstoall
objectsintheMIB,butdoesnot
allowaccesstothecommunitystring s.
User-Based
SNMPv3providesaUser‐BasedSecurityModel(USM)whichreliesonausernamematchfor
authenticatedaccesstonetworkmanagementcomponents.
Referto“SecurityModelsandLevels”onpage 7formoreinformation.
SNMP Support on Enterasys Devices
Bydefault,SNMPVersion1(SNMPv1)isconfiguredonEnterasysswitches.Thedefault
configurationincludesasinglecommunityname‐public‐whichgrantsread‐writeaccesstothe
wholeMIBtreeforbothSNMPv1andSNMPv2c.
Thissectionprovidesthef ollowinginformationaboutSNMPsupportonEnterasysdevices:
Versions Supported
EnterasysdevicessupportthreeversionsofSNMP:
•Version1(SNMPv1)—ThisistheinitialimplementationofSNMP.RefertoRFC1157forafull
descriptionoffunctionality.
•Version2(SNMPv2c)—ThesecondreleaseofSNMP,describedinRFC1907,hasadditions
andenhancementstodatatypes, countersize,and
protocoloperations.
•Version3(SNMPv3)—ThisisthemostrecentversionofSNMP,andincludessignificant
enhancementstoadministrationandsecurity.ThemajordifferencebetweenSNMPv3and
earlierversionsisthatv3providesaUser‐BasedSecurityModel(USM)toassociateuserswith
managedaccesstosecurityinformation.Inaddition
tobettersecurityandbetteraccess
Note: This guide describes features supported on the Enterasys N-Series, S-Series, K-Series,
stackable, and standalone switch platforms. For information on Enterasys X Router support, refer to
the Enterasys X-Series Configuration Guide.
For information about... Refer to page...
Versions Supported 4
Terms and Definitions 5
Security Models and Levels 7
Access Control 7