BLADE OS™ ISCLI Reference HP GbE2c L2/L3 Ethernet Blade Switch Version 5.1 Advanced Functionality Software
BLADE OS 5.1 ISCLI Reference
196
Chapter 4: Configuration Commands BMD00115, August 2009
View-based Access Control Model Configuration
The view-based Access Control Model defines a set of services that an application can use for
checking access rights of the user. Access control is needed when the user has to process SNMP
retrieval or modification request from an SNMP entity.
Table 99 View-based Access Control Model Commands
Command Syntax and Usage
snmp-server access <1-32> name <1-32 characters>
Defines the name of the group.
Command mode: Global configuration
snmp-server access <1-32> security {usm|snmpv1|snmpv2}
Allows you to select the security model to be used.
Command mode: Global configuration
snmp-server access <1-32> level {noAuthNoPriv|authNoPriv|authPriv}
Defines the minimum level of security required to gain access rights. The level
noAuthNoPriv means that the SNMP message will be sent without authentication and
without using a privacy protocol. The level authNoPriv means that the SNMP message
will be sent with authentication but without using a privacy protocol. The authPriv means
that the SNMP message will be sent both with authentication and using a privacy protocol.
Command mode: Global configuration
snmp-server access <1-32> read-view <1-32 characters>
Defines a read view name that allows you read access to a particular MIB view. If the value is
empty or if there is no active MIB view having this value then no access is granted.
Command mode: Global configuration
snmp-server access <1-32> write-view <1-32 characters>
Defines a write view name that allows you write access to the MIB view. If the value is empty
or if there is no active MIB view having this value then no access is granted.
Command mode: Global configuration
snmp-server access <1-32> notify-view <1-32 characters>
Defines a notify view name that allows you notify access to the MIB view.
Command mode: Global configuration