- (snmpusm.1): added to describe the snmpusm command.


git-svn-id: file:///home/hardaker/lib/sf-bkups/net-snmp-convert-svnrepo/trunk@3009 06827809-a52a-0410-b366-d66718629ded
diff --git a/man/snmpusm.1 b/man/snmpusm.1
new file mode 100644
index 0000000..d819599
--- /dev/null
+++ b/man/snmpusm.1
@@ -0,0 +1,84 @@
+.TH SNMPGET 1 "13 July 1994"
+.UC 4
+.SH NAME
+snmpusm - creates and maintains SNMPv3 user's on a remote entity.
+.SH SYNOPSIS
+snmpusm [ common arguments ] create username [cloneFromUser]
+.br
+snmpusm [ common arguments ] delete username
+.br
+snmpusm [ common arguments ] cloneFrom username cloneFromUser
+.br
+snmpusm [ common arguments ] passwd -O old_passphrase -N new_passphrase [-o] [-a] [-x]
+.SH DESCRIPTION
+Snmpusm is an SNMP application that can be used to do simple maintance
+on a snmp agent's User based Security Module (USM) table.  You can
+create, delete, clone, and change the pasword of users configured on a 
+running snmp agent.
+.PP
+The SNMPv3 USM specifications (see RFC2574) dictate that users are
+created and maintained by adding and modifying rows to the usmUser MIB
+table.  To create a new user you simply create the row using an
+snmpset.  User's profiles contain private keys that are never
+transmitted over the wire in clear text (regardless of weather the
+administration requests are in encrypted or not).  
+.PP
+The secret key for a user is initially set by cloning another user in
+the table, so that a user inherits the cloned user's secret key.  A
+user can only be cloned once, however, after which they must be
+deleted and re-created to be re-cloned.  The authentication and
+privacy security types are also inherited during this cloning (E.G.,
+MD5 vs SHA1).  To change the secret key for a user, you must know the
+user's old key as well as the new one.  The passwd sub-command of the
+snmpusm command, therefore, requires both the new and the old password 
+to be suplied.
+.PP
+The ucd-snmp agent comes with a few pre-configured template users
+which you can use to clone new users from after setting the template
+user's pass-phrases in the snmpd.conf file.  These users are called
+"templateMD5" and "templateSHA", and are configured to use MD5 and SHA 
+respectfully and DES encryption.  After cloning from the appropriate
+template, you should immediately change the new users password.
+.SH EXAMPLES
+.PP
+Lets assume for our examples that the following VACM and USM
+configurations lines were in the snmpd.conf file for a ucd-snmp agent,
+which sets up another default user called "initial" with the
+passphrase "setup_password" so that we can perform the initial setup
+of an agent:
+.RS
+# VACM configuration entries
+group v3group   any        initial
+view all    included  .1                               80
+access v3group   ""      any       auth    0      all    all   all
+# The new user's access:
+group v3group   any        wes
+# USM configuration entries
+userSetAuthPass initial * setup_password
+userSetAuthPass templateMD5 * initial_MD5_pass
+.RE
+Note: that the "initial" user's setup should be removed after creating
+a real user that you grant administrative privledges to (like the user 
+"wes" we'll be creating in this example.
+.PP
+Note: passwords (passphrases really) must be 8 characters minimum in
+length.
+.IP "snmpusm -v 3 -u initial -n none -l authNoPriv -a MD5 -A setup_password localhost create wes templateMD5"
+Creates a new user, here named "wes" using the user "initial" to do
+it.  "wes" is cloned from templateMD5 in the process, so he inherits
+that users pasword.
+.IP "snmpusm -v 3 -u wes -n none -l authNoPriv -a MD5 -A initial_MD5_pass localhost passwd -O initial_MD5_pass -N new_passphrase -a"
+After creating the user "wes" with the same password as the
+"templateMD5" user, we need to change his passphrase for him.  This
+command changed it from "initial_MD5_pass", which was inherited from
+the templateMD5 user, to "new_passphrase".
+.IP "snmpget -v 3 -u wes -n none -l authNoPriv -a MD5 -A new_passphrase localhost sysUpTime.0"
+If the above commands were successful, this command should have
+properly performed an authenticated snmpv3 GET request to the agent.
+.PP
+Now, go remove the vacm "group" snmpd.conf entry for the "initial"
+user and you have a valid user 'wes' that you can use for future
+transactions instead of initial.
+.PP
+.SH "SEE ALSO"
+snmpd.conf(5), snmp.conf(5)