Netgear XCM8806 - 8800 SERIES 6-SLOT CHASSIS SWITCH 사용자 설명서
![Netgear](https://files.manualsbrain.com/attachments/cf1ad5de25a3f8d6c88ef0ab489c1b137eebe11f/common/fit/150/50/17742d1e0cdacf24edeb88c30757620088415c5f7699f69b4517262e21e0/brand_logo.jpeg)
Chapter 3. Managing the Switch
|
79
NETGEAR 8800 User Manual
Configuring SNMPv1/v2c Settings
The following SNMPv1/v2c parameters can be configured on the switch:
•
Authorized trap receivers—An authorized trap receiver can be one or more network
management stations on your network. The switch sends SNMPv1/v2c traps to all
configured trap receivers. You can specify a community string and UDP port individually
for each trap receiver. All community strings must also be added to the switch using the
configured trap receivers. You can specify a community string and UDP port individually
for each trap receiver. All community strings must also be added to the switch using the
configure snmp add community
command.
To configure a trap receiver on a switch, use the following command:
configure snmp add trapreceiver [<ip_address> | <ipv6_address>] community [[hex
<hex_community_name>] | <community_name>] {port <port_number>} {from
[<src_ip_address> | <src_ipv6_address>]} {vr <vr_name>} {mode <trap_mode>}
<hex_community_name>] | <community_name>] {port <port_number>} {from
[<src_ip_address> | <src_ipv6_address>]} {vr <vr_name>} {mode <trap_mode>}
To delete a trap receiver on a switch, use the following command:
configure snmp delete trapreceiver [[<ip_address> | <ipv6_address>]
{<port_number>} | all]
Entries in the trap receiver list can also be created, modified, and deleted using the
RMON2 trapDestTable MIB table, as described in RFC 2021.
RMON2 trapDestTable MIB table, as described in RFC 2021.
•
SNMP access control—This feature allows the administrator to restrict SNMP
access by using the access control list (ACL) and implementing an ACL policy. The
administrator can configure an ACL policy to either permit or deny a specific list of
IP address and subnet masks. There are four subcommands for enacting access
control:
administrator can configure an ACL policy to either permit or deny a specific list of
IP address and subnet masks. There are four subcommands for enacting access
control:
•
To configure SNMP to use an ACL policy, use the following command:
configure snmp access-profile <profile_name>
By default, SNMP supports the read/write option.
•
To configure SNMP to remove a previously configured ACL policy, use the following
command:
configure snmp access-profile none
•
To configure SNMP to use an ACL policy and support the read-only option, use the
following command:
configure snmp access-profile <profile_name> readonly
•
To configure SNMP to use an ACL policy and support the read/write option explicitly,
use the following command:
configure snmp access-profile <profile_name> readwrite
In the ACL policy file for SNMP, the
source-address
field is the only supported match
condition. Any other match conditions are ignored.
•
Community strings—The community strings allow a simple method of authentication
between the switch and the remote network manager. There are two types of community
strings on the switch:
strings on the switch: