Nortel 2350 参考指南
182 Configuring WSS System Parameters
NN47250-102 (320666-G Version 02.01)
•
HTTPS
•
Telnet
•
SSH
•
Web Portal
•
SNMP
2
To change the Telnet service port, select or type the new port number in the Port box next to Telnet. The
default TCP port is 23.
default TCP port is 23.
3
To change the idle timeout for CLI management sessions, edit the value in the Idle Timeout checkbox.
You can specify from 0 to 86400 seconds (one day). The default is 3600 (one hour). If you specify 0, the
idle timeout is disabled. The timeout interval is in 30-second increments. For example, the interval can be
0, or 30 seconds, or 60 seconds, or 90 seconds, and so on. If you enter an interval that is not divisible by
30, the switch rounds up to the next 30-second increment. For example, if you enter 31, the switch rounds
up to 60.
idle timeout is disabled. The timeout interval is in 30-second increments. For example, the interval can be
0, or 30 seconds, or 60 seconds, or 90 seconds, and so on. If you enter an interval that is not divisible by
30, the switch rounds up to the next 30-second increment. For example, if you enter 31, the switch rounds
up to 60.
This option applies to all types of CLI management sessions: console, Telnet, and SSH. The timeout
change applies to new sessions only, not to existing sessions.
change applies to new sessions only, not to existing sessions.
4
To configure SNMP settings, go to
. Otherwise, click Save.
Configuring SNMP
1
Click the checkbox next to SNMP to enable it, if you have not already done so. By default, SNMP is
disabled.
disabled.
2
To change the minimum level of security WSS Software requires for SNMP, select one of the following
from the Security Level drop-down list:
from the Security Level drop-down list:
•
Unsecured—SNMP message exchanges are not secure. This is the default, and is the only value
supported for SNMPv1 and SNMPv2c. (This security level is the same as the noAuthNoPriv
level described in SNMPv3 RFCs.)
supported for SNMPv1 and SNMPv2c. (This security level is the same as the noAuthNoPriv
level described in SNMPv3 RFCs.)
•
Authenticated—SNMP message exchanges are authenticated but are not encrypted. (This
security level is the same as the authNoPriv level described in SNMPv3 RFCs.)
security level is the same as the authNoPriv level described in SNMPv3 RFCs.)
•
Encrypted—SNMP message exchanges are authenticated and encrypted. (This security level is
the same as the authPriv level described in SNMPv3 RFCs.)
the same as the authPriv level described in SNMPv3 RFCs.)
•
AuthRequest-UnsecuredNotify—SNMP message exchanges are authenticated but are not
encrypted, and notifications are neither authenticated nor encrypted.
encrypted, and notifications are neither authenticated nor encrypted.
The only security level supported for SNMPv1 and SNMPv2c is Unsecured.
3
Select the version(s) of SNMP you want the switch to run:
Note.
On each switch in the network plan, you must enable notifications and configure
WLAN Management Software Services as a notification target (trap receiver). WLAN
Management Software Services does not start listening for SNMP notifications from a WSS
until you add WLAN Management Software Services as an SNMP notification target to the
switch. (For simple configuration of WLAN Management Software Services as an SNMP
notification target, see
Management Software Services does not start listening for SNMP notifications from a WSS
until you add WLAN Management Software Services as an SNMP notification target to the
switch. (For simple configuration of WLAN Management Software Services as an SNMP
notification target, see