Specifications

SNMP Support on Enterasys Devices
March 28, 2011 Page 4 of 27
Community Name Strings
EarlierSNMPversions(v1andv2c)relyoncommunitynamestringsforauthentication.Inorder
forthenetworkmanagementstation(NMS)toaccesstheswitch,thecommunitystringdefinitions
ontheNMSmustmatchatleastoneofthethreecommunitystringdefinitionsontheswitch.A
communitystringcanhave
oneoftheseattributes:
•Readonly(ro)—GivesreadaccesstoauthorizedmanagementstationstoallobjectsintheMIB
exceptthecommunitystrings,butdoesnotallowwriteaccess.
•Readwrite(rw)—Givesreadandwriteaccesstoauthorizedmanagementstationstoall
objectsintheMIB,butdoesnot
allowaccesstothecommunitystring s.
User-Based
SNMPv3providesaUserBasedSecurityModel(USM)whichreliesonausernamematchfor
authenticatedaccesstonetworkmanagementcomponents.
RefertoSecurityModelsandLevelsonpage 7formoreinformation.
SNMP Support on Enterasys Devices
Bydefault,SNMPVersion1(SNMPv1)isconfiguredonEnterasysswitches.Thedefault
configurationincludesasinglecommunityname‐public‐whichgrantsreadwriteaccesstothe
wholeMIBtreeforbothSNMPv1andSNMPv2c.
Thissectionprovidesthef ollowinginformationaboutSNMPsupportonEnterasysdevices:
Versions Supported
EnterasysdevicessupportthreeversionsofSNMP:
•Version1(SNMPv1)ThisistheinitialimplementationofSNMP.RefertoRFC1157forafull
descriptionoffunctionality.
•Version2(SNMPv2c)ThesecondreleaseofSNMP,describedinRFC1907,hasadditions
andenhancementstodatatypes, countersize,and
protocoloperations.
•Version3(SNMPv3)ThisisthemostrecentversionofSNMP,andincludessignificant
enhancementstoadministrationandsecurity.ThemajordifferencebetweenSNMPv3and
earlierversionsisthatv3providesaUserBasedSecurityModel(USM)toassociateuserswith
managedaccesstosecurityinformation.Inaddition
tobettersecurityandbetteraccess
Note: This guide describes features supported on the Enterasys N-Series, S-Series, K-Series,
stackable, and standalone switch platforms. For information on Enterasys X Router support, refer to
the Enterasys X-Series Configuration Guide.
For information about... Refer to page...
Versions Supported 4
Terms and Definitions 5
Security Models and Levels 7
Access Control 7