Loading...
Select Version
&pagelevel(3)&pagelevel
This chapter provides notes and recommendations on how to implement secure use of the SNMP-based BS2000 management system with security in mind. It is not however intended as a set of instructions on security analysis or on how to draw up security guidelines. Both of these important subjects go beyond the context of the present manual.
For functional details of how to set the configuration parameters of the SNMP agent in BS2000 with security in mind, see section “Advanced security options for receiving SNMP requests”.