Spec-Zone .ru
спецификации, руководства, описания, API
Spec-Zone .ru
спецификации, руководства, описания, API
Библиотека разработчика Mac Разработчик
Поиск

 

Эта страница руководства для  версии 10.9 Mac OS X

Если Вы выполняете различную версию  Mac OS X, просматриваете документацию локально:

Читать страницы руководства

Страницы руководства предназначаются как справочник для людей, уже понимающих технологию.

  • Чтобы изучить, как руководство организовано или узнать о синтаксисе команды, прочитайте страницу руководства для страниц справочника (5).

  • Для получения дополнительной информации об этой технологии, ищите другую документацию в Библиотеке Разработчика Apple.

  • Для получения общей информации о записи сценариев оболочки, считайте Shell, Пишущий сценарий Учебника для начинающих.



SNMPUSM(1)                                        Net-SNMP                                        SNMPUSM(1)



NAME
       snmpusm - creates and maintains SNMPv3 users on a network entity

SYNOPSIS
       snmpusm [COMMON OPTIONS] [-Cw] create USER [CLONEFROM-USER]
       snmpusm [COMMON OPTIONS] delete USER
       snmpusm [COMMON OPTIONS] cloneFrom USER CLONEFROM-USER
       snmpusm [COMMON OPTIONS] [-Ca] [-Cx] passwd OLD-PASSPHRASE NEW-PASSPHRASE [USER]
       snmpusm [COMMON OPTIONS] <-Ca | -Cx> -Ck passwd OLD-KEY-OR-PASSPHRASE NEW-KEY-OR-PASSPHRASE [USER]
       snmpusm [COMMON OPTIONS] [-Ca] [-Cx] changekey [USER]


DESCRIPTION
       snmpusm  is  an  SNMP  application that can be used to do simple maintenance on the users known to an
       SNMP agent, by manipulating the agent's User-based Security Module (USM) table.  The user needs write
       access to the usmUserTable MIB table.  This tool can be used to create, delete, clone, and change the
       passphrase of users configured on a running SNMP agent.


OPTIONS
       Common options for all snmpusm commands:

       -CE ENGINE-ID
              Set usmUserEngineID to be used as part of the index of the usmUserTable.  Default  is  to  use
              the contextEngineID (set via -E or probed) as the usmUserEngineID.

       -Cp STRING
              Set the usmUserPublic value of the (new) user to the specified STRING.

       Options for the passwd and changekey commands:

       -Ca    Change the authentication key.

       -Cx    Change the privacy key.

       -Ck    Allows  to  use localized key (must start with 0x) instead of passphrase.  When this option is
              used, either the -Ca or -Cx option (but not both) must also be used.


CREATING USERS
       An unauthenticated SNMPv3 user can be created using the command

              snmpusm [OPTIONS] create USER

       This constructs an (inactive) entry in the usmUserTable, with no authentication or privacy  settings.
       In  principle,  this user should be useable for 'noAuthNoPriv' requests, but in practise the Net-SNMP
       agent will not allow such an entry to be made active.  The user can be created via the  createAndWait
       operation  instead  by using the -Ca flag.  This will prevent the user from being marked as active in
       any agent until explicitly activated later via the activate command.


       In order to activate this entry, it is necessary to "clone" an existing user, using the command

              snmpusm [OPTIONS] cloneFrom USER CLONEFROM-USER

       The USER entry then inherits the same authentication and privacy settings (including pass phrases) as
       the CLONEFROM user.


       These two steps can be combined into one, by using the command

              snmpusm [OPTIONS] create USER CLONEFROM-USER


       The  two  forms of the create sub-command require that the user being created does not already exist.
       The cloneFrom sub-command requires that the user being cloned to does already exist.


       Cloning is the only way to specify which authentication and privacy protocols  to  use  for  a  given
       user,  and  it  is  only possible to do this once.  Subsequent attempts to reclone onto the same user
       will appear to succeed, but will be silently ignored.  This (somewhat unexpected) behaviour  is  man-dated mandated
       dated by the SNMPv3 USM specifications (RFC 3414).  To change the authentication and privacy settings
       for a given user, it is necessary to delete and recreate the user entry.  This is not  necessary  for
       simply  changing the pass phrases (see below).  This means that the agent must be initialized with at
       least one user for each combination of authentication and privacy protocols.  See  the  snmpd.conf(5)
       manual page for details of the createUser configuration directive.


DELETING USERS
       A user can be deleted from the usmUserTable using the command

              snmpusm [OPTIONS] delete USER


CHANGING PASS PHRASES
       User profiles contain private keys that are never transmitted over the wire in clear text (regardless
       of whether the administration requests are encrypted or not).  To change the secret key for  a  user,
       it is necessary to specify the user's old passphrase as well as the new one.  This uses the command

              snmpusm [OPTIONS] [-Ca] [-Cx] passwd OLD-PASSPHRASE NEW-PASSPHRASE [USER]


       After  cloning  a new user entry from the appropriate template, you should immediately change the new
       user's passphrase.


       If USER is not specified, this command will change the passphrase of the (SNMPv3)  user  issuing  the
       command.   If  the -Ca or -Cx options are specified, then only the authentication or privacy keys are
       changed.  If these options are not specified, then both  the  authentication  and  privacy  keys  are
       changed.


              snmpusm [OPTIONS] [-Ca] [-Cx] changekey [USER]


       This  command  changes  the  key  in  a perfect-forward-secrecy compliant way through a diffie-helman
       exchange.  The remote agent must support the SNMP-USM-DH-OBJECTS-MIB for this command to  work.   The
       resulting keys are printed to the console and may be then set in future command invocations using the
       --defAuthLocalizedKey  and  --defPrivLocalizedKey  options  or  in  your  snmp.conf  file  using  the
       defAuthLocalizedKey and defPrivLocalizedKey keywords.


       Note  that  since  these  keys  are randomly generated based on a diffie helman exchange, they are no
       longer derived from a more easily typed password.  They are, however, much more secure.


       To change from a localized key back to a password, the following variant of the passwd sub-command is
       used:


              snmpusm [OPTIONS] <-Ca | -Cx> -Ck passwd OLD-KEY-OR-PASSPHRASE NEW-KEY-OR-PASSPHRASE [USER]


       Either  the  -Ca  or  the -Cx option must be specified.  The OLD-KEY-OR-PASSPHRASE and/or NEW-KEY-OR-PASSPHRASE NEW-KEY-ORPASSPHRASE
       PASSPHRASE arguments can either be a passphrase or a  localized  key  starting  with  "0x",  e.g.  as
       printed out by the changekey sub-command.


EXAMPLES
       Let's  assume  for  our  examples  that  the  following VACM and USM configurations lines were in the
       snmpd.conf file for a Net-SNMP agent.  These lines set up a default user called  "initial"  with  the
       authentication passphrase "setup_passphrase" so that we can perform the initial setup of an agent:

              # VACM configuration entries
              rwuser initial
              # lets add the new user we'll create too:
              rwuser wes
              # USM configuration entries
              createUser initial MD5 setup_passphrase DES

       Note: the "initial" user's setup should be removed after creating a real user that you grant adminis-trative administrative
       trative privileges to (like the user "wes" we'll be creating in this example.

       Note: passphrases must be 8 characters minimum in length.

   Create a new user
       snmpusm -v3 -u initial -n "" -l authNoPriv -a MD5 -A setup_passphrase localhost create wes initial

              Creates a new user, here named "wes" using the user "initial" to do it.  "wes" is cloned  from
              "initial" in the process, so he inherits that user's passphrase ("setup_passphrase").

   Change the user's passphrase
       snmpusm  -v 3 -u wes -n "" -l authNoPriv -a MD5 -A setup_passphrase localhost passwd setup_passphrase
       new_passphrase

              After creating the user "wes" with the same passphrase as  the  "initial"  user,  we  need  to
              change  his  passphrase  for him.  The above command changes it from "setup_passphrase", which
              was inherited from the initial user, to "new_passphrase".

   Test the new user
       snmpget -v 3 -u wes -n "" -l authNoPriv -a MD5 -A new_passphrase localhost sysUpTime.0

              If the above commands were successful, this command should have properly performed an  authen-ticated authenticated
              ticated SNMPv3 GET request to the agent.

       Now,  go  remove  the  vacm "group" snmpd.conf entry for the "initial" user and you have a valid user
       'wes' that you can use for future transactions instead of initial.


WARNING
       Manipulating the usmUserTable using this command can only be done using SNMPv3.   This  command  will
       not work with the community-based versions, even if they have write access to the table.


SEE ALSO
       snmpd.conf(5), snmp.conf(5), RFC 3414



V5.6                                             11 Dec 2009                                      SNMPUSM(1)

Сообщение о проблемах

Способ сообщить о проблеме с этой страницей руководства зависит от типа проблемы:

Ошибки содержания
Ошибки отчета в содержании этой документации со ссылками на отзыв ниже.
Отчеты об ошибках
Сообщите об ошибках в функциональности описанного инструмента или API через Генератор отчетов Ошибки.
Форматирование проблем
Отчет, форматирующий ошибки в интерактивной версии этих страниц со ссылками на отзыв ниже.