No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


MIB Reference

AR120, AR150, AR160, AR200, AR1200, AR2200, AR3200, and AR3600 V200R007

This document provides the function overview, relationships between tables, description of single objects, description of MIB tables, and description of alarm objects.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
SNMP Version

SNMP Version

There are three versions of SNMP: SNMPv1, SNMPv2c, and SNMPv3.

In SNMPv1 and SNMPv2c, the NMS controls the authority to access managed nodes by using the community name list. The agent does not check the validity of the community name. SNMP packets are transferred without encryption. That is, security is not guaranteed for authentication and confidentiality.

Compared with SNMPv1, SNMPv2c supports:

  • More operations and data types

  • Plenty of error codes

  • Multiple transport layer protocols

SNMPv3 provides all the functions of SNMPv1 and SNMPv2, and features a security mechanism that authenticates and encrypts SNMP packets. In terms of security, SNMPv3 emphasizes security of data and access control.

SNMPv3 ensures the security for SNMP packets in the following ways:

  • Data integrity check

    The data cannot be modified in an unauthorized manner. The change of the data sequence is limited to the allowed extent.

  • Data origin authentication

    SNMPv3 authenticates the managed node from which the received packet originates and not the application that generates the packet.

  • Data confidentiality

    When the NMS or the agent receives a packet, it checks the time at which the packet is generated. If the difference between the creation time and the system time exceeds the threshold, the packet is discarded. In this way, the packets that are modified by malicious users are not accepted.

SNMPv3 control the access to the MOs by the operations of the protocol.

Updated: 2019-06-05

Document ID: EDOC1000097213

Views: 121780

Downloads: 683

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next