blob: 32ae35d93eede10b32e746855f251d2b156d9ac0 [file] [log] [blame]
.TH SNMPGET 1 "13 July 1994"
.UC 4
.SH NAME
snmpusm - creates and maintains SNMPv3 user's on a remote entity.
.SH SYNOPSIS
snmpusm [ common arguments ] create username [cloneFromUser]
.br
snmpusm [ common arguments ] delete username
.br
snmpusm [ common arguments ] cloneFrom username cloneFromUser
.br
snmpusm [ common arguments ] passwd -O old_passphrase -N new_passphrase [-o] [-a] [-x]
.SH DESCRIPTION
Snmpusm is an SNMP application that can be used to do simple maintance
on a snmp agent's User based Security Module (USM) table. You can
create, delete, clone, and change the pasword of users configured on a
running snmp agent.
.PP
The SNMPv3 USM specifications (see RFC2574) dictate that users are
created and maintained by adding and modifying rows to the usmUser MIB
table. To create a new user you simply create the row using an
snmpset. User's profiles contain private keys that are never
transmitted over the wire in clear text (regardless of weather the
administration requests are in encrypted or not).
.PP
The secret key for a user is initially set by cloning another user in
the table, so that a user inherits the cloned user's secret key. A
user can only be cloned once, however, after which they must be
deleted and re-created to be re-cloned. The authentication and
privacy security types are also inherited during this cloning (E.G.,
MD5 vs SHA1). To change the secret key for a user, you must know the
user's old key as well as the new one. The passwd sub-command of the
snmpusm command, therefore, requires both the new and the old password
to be suplied.
.PP
The ucd-snmp agent comes with a few pre-configured template users
which you can use to clone new users from after setting the template
user's pass-phrases in the snmpd.conf file. These users are called
"templateMD5" and "templateSHA", and are configured to use MD5 and SHA
respectfully and DES encryption. After cloning from the appropriate
template, you should immediately change the new users password.
.SH EXAMPLES
.PP
Lets assume for our examples that the following VACM and USM
configurations lines were in the snmpd.conf file for a ucd-snmp agent,
which sets up another default user called "initial" with the
passphrase "setup_password" so that we can perform the initial setup
of an agent:
.RS
.nf
# VACM configuration entries
group v3group any initial
view all included .1 80
access v3group "" any auth 0 all all all
# The new user's access:
group v3group any wes
# USM configuration entries
userSetAuthPass initial * setup_password
userSetAuthPass templateMD5 * initial_MD5_pass
.fi
.RE
Note: that the "initial" user's setup should be removed after creating
a real user that you grant administrative privledges to (like the user
"wes" we'll be creating in this example.
.PP
Note: passwords (passphrases really) must be 8 characters minimum in
length.
.IP "snmpusm -v 3 -u initial -n none -l authNoPriv -a MD5 -A setup_password localhost create wes templateMD5"
Creates a new user, here named "wes" using the user "initial" to do
it. "wes" is cloned from templateMD5 in the process, so he inherits
that users pasword.
.IP "snmpusm -v 3 -u wes -n none -l authNoPriv -a MD5 -A initial_MD5_pass localhost passwd -O initial_MD5_pass -N new_passphrase -a"
After creating the user "wes" with the same password as the
"templateMD5" user, we need to change his passphrase for him. This
command changed it from "initial_MD5_pass", which was inherited from
the templateMD5 user, to "new_passphrase".
.IP "snmpget -v 3 -u wes -n none -l authNoPriv -a MD5 -A new_passphrase localhost sysUpTime.0"
If the above commands were successful, this command should have
properly performed an authenticated snmpv3 GET request to the agent.
.PP
Now, go remove the vacm "group" snmpd.conf entry for the "initial"
user and you have a valid user 'wes' that you can use for future
transactions instead of initial.
.PP
.SH "SEE ALSO"
snmpd.conf(5), snmp.conf(5)