Command Reference Guide
Error! Use the Home tab to apply 見出し 1 to the text that you want to appear here.  23 
The following table describes the SNMPv3 Information Menu options. 
Table 8  SNMPv3 Information Menu options 
Command 
Usage 
usm 
Displays User Security Model (USM) table information.  
view 
Displays information about view name, subtrees, mask and type of view.  
access 
Displays View-based Access Control information.  
group 
Displays information about the group that includes the security model, user 
name, and group name.  
comm 
Displays information about the community table.  
taddr 
Displays the Target Address table.  
tparam 
Displays the Target parameters table.  
notify 
Displays the Notify table.  
dump 
Displays all the SNMPv3 information.  
SNMPv3 USM User Table information 
Command: /info/sys/snmpv3/usm 
usmUser Table: 
User Name Protocol 
-------------------------------- -------------------------------- 
adminmd5 HMAC_MD5, DES PRIVACY 
adminsha HMAC_SHA, DES PRIVACY 
v1v2only NO AUTH, NO PRIVACY 
The User-based Security Model (USM) in SNMPv3 provides security services such as authentication and 
privacy of messages. This security model makes use of a defined set of user identities displayed in the USM 
user table. The USM user table contains information like: 
  the user name 
  a security name in the form of a string whose format is independent of the Security Model 
  an authentication protocol, which is an indication that the messages sent on behalf of the user can 
be authenticated 
  the privacy protocol. 
The following table describes the SNMPv3 User Table information. 
Table 9  SNMPv3 User Table parameters 
Field 
Description 
User Name 
This is a string that represents the name of the user that you can use to access the switch. 
Protocol 
This indicates whether messages sent on behalf of this user are protected from disclosure 
using a privacy protocol. The switch software supports DES algorithm for privacy. The 
software also supports two authentication algorithms: MD5 and HMAC-SHA. 










