
30 MergePoint 5224/5240 Service Processor Manager Installer and Administrator Guide
authentication and encryption lacking in those protocol versions. The SNMP management
application can then be used to for SNMP management of the target device.
When versions 1 or 2c agents are used to obtain native management access to a target device,
no SNMP configuration is needed. Support is implemented entirely through the VPN
connection limited by iptables rules that restrict access to particular target devices.
CAUTION: The SNMP daemon, snmpd, running on the SP manager allows access to proxied data using the v1
and 2c protocols without the creation of a VPN tunnel, but the lack of security inherent in these protocols means
this option should be used with caution if it is used at all.
• The access method agent which supports version 3 is via a local Net-SNMP daemon. The
proxying of traps is not supported by Net
-SNMP. Forwarding of traps is supported, with
filtering by source address.
If SNMP is used as recommended, no public client is allowed unauthenticated access to either
managed clients or to the SP manager itself. For compatibility with other clients, unencrypted
transfer of data is possible with SNMP v3 connections, but unencrypted data transfer is
strongly discouraged.
User and group information for v3 connections must be different from the user and groupnames
used for accessing the SP manager for the following reasons:
• To keep the SP manager user information more secure, since SNMP usernames and passwords
are stored in cleartext in /etc/snmp/snmpd.conf
• To allow different users and groupings to be used for SNMP access
The administrator can configure the following:
• General information provided by the SP manager, including location and contact fields
• Who has access to SNMP information
• How traps are handled locally
• Trap forwarding
By default, SP manager traps occur on the following types of events:
• Interface up/down
• PC card insertion/removal
• Power supply events
Traps are handled the three following ways:
• When access is through a VPN tunnel, the public
-side computer directly receives SNMP traps
from the target device
• SNMP traps can be forwarded to SNMP agents based on the source address of the trap
• Locally, traps are sent to the syslog facility, which may use the information to
send notifications
Comentarios a estos manuales