JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
man pages section 1M: System Administration Commands     Oracle Solaris 10 1/13 Information Library
search filter icon
search icon

Document Information

Preface

Introduction

System Administration Commands - Part 1

System Administration Commands - Part 2

metahs(1M)

metaimport(1M)

metainit(1M)

metaoffline(1M)

metaonline(1M)

metaparam(1M)

metarecover(1M)

metarename(1M)

metareplace(1M)

metaroot(1M)

metaset(1M)

metassist(1M)

metastat(1M)

metasync(1M)

metattach(1M)

mib2c(1M)

mib2mof(1M)

mibiisa(1M)

mipagent(1M)

mipagentconfig(1M)

mipagentstat(1M)

mkbootmedia(1M)

mkdevalloc(1M)

mkdevmaps(1M)

mkfifo(1M)

mkfile(1M)

mkfs(1M)

mkfs_pcfs(1M)

mkfs_udfs(1M)

mkfs_ufs(1M)

mknod(1M)

mkpwdict(1M)

modinfo(1M)

modload(1M)

modunload(1M)

mofcomp(1M)

mofreg(1M)

monacct(1M)

monitor(1M)

mount(1M)

mountall(1M)

mount_cachefs(1M)

mountd(1M)

mount_hsfs(1M)

mount_nfs(1M)

mount_pcfs(1M)

mount_tmpfs(1M)

mount_udfs(1M)

mount_ufs(1M)

mount_xmemfs(1M)

mpathadm(1M)

mpstat(1M)

msgid(1M)

mvdir(1M)

named(1M)

named-checkconf(1M)

named-checkzone(1M)

named-compilezone(1M)

ncaconfd(1M)

ncheck(1M)

ncheck_ufs(1M)

ndd(1M)

netservices(1M)

netstat(1M)

netstrategy(1M)

newaliases(1M)

newfs(1M)

newkey(1M)

nfs4cbd(1M)

nfsd(1M)

nfslogd(1M)

nfsmapid(1M)

nfsstat(1M)

nisaddcred(1M)

nisaddent(1M)

nisauthconf(1M)

nisbackup(1M)

nis_cachemgr(1M)

nisclient(1M)

nisd(1M)

nisd_resolv(1M)

nisinit(1M)

nisldapmaptest(1M)

nislog(1M)

nispasswdd(1M)

nisping(1M)

nispopulate(1M)

nisprefadm(1M)

nisrestore(1M)

nisserver(1M)

nissetup(1M)

nisshowcache(1M)

nisstat(1M)

nisupdkeys(1M)

nlsadmin(1M)

nscd(1M)

nslookup(1M)

nsupdate(1M)

ntpdate(1M)

ntpq(1M)

ntptrace(1M)

nulladm(1M)

obpsym(1M)

ocfserv(1M)

oplhpd(1M)

parse_dynamic_clustertoc(1M)

passmgmt(1M)

patchadd(1M)

patchrm(1M)

pbind(1M)

pcitool(1M)

pcmciad(1M)

pfinstall(1M)

pginfo(1M)

pgstat(1M)

pgxconfig(1M)

picld(1M)

ping(1M)

pkg2du(1M)

pkgadd(1M)

pkgadm(1M)

pkgask(1M)

pkgchk(1M)

pkgcond(1M)

pkgdep(1M)

pkgrm(1M)

plockstat(1M)

pmadm(1M)

pmconfig(1M)

pntadm(1M)

pooladm(1M)

poolbind(1M)

poolcfg(1M)

poold(1M)

poolstat(1M)

ports(1M)

powerd(1M)

poweroff(1M)

ppdmgr(1M)

pppd(1M)

pppoec(1M)

pppoed(1M)

pppstats(1M)

pprosetup(1M)

pprosvc(1M)

praudit(1M)

prctmp(1M)

prdaily(1M)

printmgr(1M)

privatepw(1M)

prodreg(1M)

projadd(1M)

projdel(1M)

projmod(1M)

prstat(1M)

prtacct(1M)

prtconf(1M)

prtdiag(1M)

prtdscp(1M)

prtfru(1M)

prtpicl(1M)

prtvtoc(1M)

psradm(1M)

psrinfo(1M)

psrset(1M)

putdev(1M)

putdgrp(1M)

pwck(1M)

pwconv(1M)

quot(1M)

quota(1M)

quotacheck(1M)

quotaoff(1M)

quotaon(1M)

raidctl(1M)

ramdiskadm(1M)

rarpd(1M)

rcapadm(1M)

rcapd(1M)

rctladm(1M)

rdate(1M)

rdisc(1M)

reboot(1M)

regadm(1M)

reject(1M)

rem_drv(1M)

remove_allocatable(1M)

removef(1M)

repquota(1M)

re-preinstall(1M)

restricted_shell(1M)

rexd(1M)

rexecd(1M)

rlogind(1M)

rm_install_client(1M)

rmmount(1M)

rmt(1M)

rndc(1M)

rndc-confgen(1M)

roleadd(1M)

roledel(1M)

rolemod(1M)

root_archive(1M)

route(1M)

routeadm(1M)

routed(1M)

rpcbind(1M)

rpc.bootparamd(1M)

rpcinfo(1M)

rpc.mdcommd(1M)

rpc.metad(1M)

rpc.metamedd(1M)

rpc.metamhd(1M)

rpc.nisd(1M)

rpc.nisd_resolv(1M)

rpc.nispasswdd(1M)

rpc.rexd(1M)

rpc.rstatd(1M)

rpc.rusersd(1M)

rpc.rwalld(1M)

rpc.smserverd(1M)

rpc.sprayd(1M)

rpc.yppasswdd(1M)

rpc.ypupdated(1M)

rpld(1M)

rquotad(1M)

rsh(1M)

rshd(1M)

rstatd(1M)

rtc(1M)

rtquery(1M)

runacct(1M)

rusersd(1M)

rwall(1M)

rwalld(1M)

rwhod(1M)

sa1(1M)

sa2(1M)

sac(1M)

sacadm(1M)

sadc(1M)

saf(1M)

sar(1M)

savecore(1M)

scadm(1M)

sckmd(1M)

sconadm(1M)

sdpadm(1M)

sendmail(1M)

setuname(1M)

setup_install_server(1M)

sf880drd(1M)

sftp-server(1M)

share(1M)

shareall(1M)

share_nfs(1M)

showmount(1M)

showrev(1M)

shutacct(1M)

shutdown(1M)

slpd(1M)

smartcard(1M)

smattrpop(1M)

smbios(1M)

smc(1M)

smccompile(1M)

smcconf(1M)

smcregister(1M)

smcron(1M)

smcwebserver(1M)

smdiskless(1M)

smexec(1M)

smgroup(1M)

smlog(1M)

smmaillist(1M)

smmultiuser(1M)

smosservice(1M)

smpatch(1M)

smprofile(1M)

smreg(1M)

smrole(1M)

smrsh(1M)

smserialport(1M)

smtnrhdb(1M)

smtnrhtp(1M)

smtnzonecfg(1M)

smuser(1M)

snmpbulkget(1M)

snmpbulkwalk(1M)

snmpcmd(1M)

snmpconf(1M)

snmpd(1M)

snmpdelta(1M)

snmpdf(1M)

snmpdx(1M)

snmpget(1M)

snmpgetnext(1M)

snmpinform(1M)

snmpnetstat(1M)

snmpset(1M)

snmptable(1m)

snmptest(1M)

snmptranslate(1m)

snmptrap(1M)

snmptrapd(1M)

snmpusm(1M)

snmpvacm(1M)

snmpwalk(1M)

snmpXdmid(1M)

snmpXwbemd(1M)

snoop(1M)

soconfig(1M)

soladdapp(1M)

soldelapp(1M)

solstice(1M)

sppptun(1M)

spray(1M)

sprayd(1M)

sshd(1M)

ssh-keysign(1M)

startup(1M)

statd(1M)

stclient(1M)

stmsboot(1M)

strace(1M)

strclean(1M)

strerr(1M)

sttydefs(1M)

su(1M)

sulogin(1M)

suninstall(1M)

SUNWafb_config(1M)

SUNWffb_config(1M)

SUNWgfb_config(1M)

SUNWifb_config(1M)

SUNWjfb_config(1M)

SUNWkfb_config(1M)

SUNWm64_config(1M)

SUNWnfb_config(1M)

SUNWpfb_config(1M)

SUNWzulu_config(1M)

svcadm(1M)

svccfg(1M)

svc.configd(1M)

svc.startd(1M)

swap(1M)

sync(1M)

syncinit(1M)

syncloop(1M)

syncstat(1M)

sysdef(1M)

syseventadm(1M)

syseventconfd(1M)

syseventd(1M)

sysidconfig(1M)

sysidkbd(1M)

sysidnet(1M)

sysidnfs4(1M)

sysidns(1M)

sysidpm(1M)

sysidroot(1M)

sysidsys(1M)

sysidtool(1M)

syslogd(1M)

sys-unconfig(1M)

talkd(1M)

tapes(1M)

taskstat(1M)

telinit(1M)

telnetd(1M)

tftpd(1M)

System Administration Commands - Part 3

snmpvacm

- perform maintenance on an SNMP agent's View-based Access Control Module (VACM) table

Synopsis

/usr/sfw/bin/snmpvacm [common options] [subcommand options] AGENT subcommand subcommand-args

Description

snmpvacm is a SNMP application that can be used to do maintenance on an SNMP agent's View-based Access Control Module (VACM) table. The VACM table defines a set of services that can be used for checking access rights, that is, checking whether a specific type of access to a specific managed object is allowed. snmpvacm supports three types of entries--group, view, and access. The agent maintains these entries in memory and stores VACM groups, views, and access entries in the persistent configuration file upon agent shutdown.

Subcommands

This section describes the snmpvacm subcommands.

createSec2Group

Creates SNMPv3 security to group name entries. A group name is used to define an access control policy for a group of principals.

Creates SNMPv3 security to group name entries. A group name is used to define an access control policy for a group of principals.

snmpvacm [common options] createSec2Group MODEL SECURITYNAME GROUPNAME
MODEL

An integer greater then zero representing a SNMPv3 security model, such as USM. The reserved values are as follows:

1

reserved for SNMPv1

2

reserved for SNMPv2c

3

User-Based Security Model (USM)

SECURITYNAME

A string representing a security name for the principal, represented in a security-model-independent format, which is mapped from this entry to a GROUPNAME.

GROUPNAME

A string that identifies the group to which this table entry (the combination of securityModel and securityName) belongs.

deleteSec2Group

Deletes SNMPv3 security to group name entries. The group entry to be deleted is indexed by the specified MODEL and SECURITYNAME.

snmpvacm [common options] deleteSec2Group MODEL SECURITYNAME
MODEL

An integer greater then zero representing a SNMPv3 security model, such as USM. The reserved values are as follows:

1

reserved for SNMPv1

2

reserved for SNMPv2c

3

User-Based Security Model (USM)

SECURITYNAME

A string representing a security name for the principal, represented in a security-model-independent format, which is mapped from this entry to a GROUPNAME.

createView

Creates a MIB view. A MIB view is a family of view subtrees, which are pairings of OID subtree values with bit string mask values.

Each MIB view is defined by two sets of view subtrees, included in or excluded from the MIB view.

snmpvacm [common options] [-Ce] createView NAME SUBTREE MASK
-Ce

An optional flag used when the MIB view type needs to be "excluded" from the MIB view. If not used, the type is defaulted to "included".

NAME

The OID subtree which when combined with the corresponding instance of MASK defines a family of view subtrees.

SUBTREE

The OID subtree which when combined with the corresponding instance of MASK defines a family of view subtrees.

MASK

The bit mask, a hex string, which, in combination with the corresponding instance SUBTREE, defines a family of view subtrees.

The mask indicates which sub-identifiers of the associated subtree OID are significant to a particular MIB view instance.

deleteView

Deletes a MIB view. A MIB view is a family of view subtrees. A view subtree is a pairing of an OID subtree value with a bit string mask value.

snmpvacm [common options] deleteView NAME SUBTREE
NAME

A string representing a MIB view name that is associated to a subtree/mask pairing.

SUBTREE

The OID subtree which, when combined with the corresponding instance of MASK, defines a family of view subtrees.

createAccess

Creates SNMPv3 access configuration entries. These entries are used to store the access rights defined for the groups. Each entry is indexed by a group name, a context prefix, a security model, and a security level. A group and view needs to be defined in order to make use of the access check.

snmpvacm [common options] createAccess GROUPNAME
[CONTEXTPREFIX] SECURITYMODEL SECURITYLEVEL
CONTEXTMATCH READVIEWNAME WRITEVIEWNAME
NOTIFYVIEWNAME
GROUPNAME

The name of the group to which this access right applies.

CONTEXTPREFIX

A string representing a contextName must match the value of the instance of this object exactly when CONTEXTMATCH is set to “exact” or partially when CONTEXTMATCH is set to “prefix”.

If not specified, the value reverts to the default, an empty string, "".

SECURITYMODEL

An integer representing the securityModel that must be used in order to gain access to this access right.

SECURITYLEVEL

An integer representing the minimum security level that must be used to gain access to this access right. A security level of noAuthNoPriv is less than authNoPriv and authNoPriv is less than authPriv.

Integer values supported:

1

noAuthNoPriv

2

authNoPriv

3

authPriv

CONTEXTMATCH

An integer whose value determines the type of match required. When set to "exact", the context name must exactly match the value in CONTEXTPREFIX. If set to "prefix", the context name must match the first few starting characters of the value in CONTEXTPREFIX.

Integer values supported:

1

exact

2

prefix

READVIEWNAME

The authorized MIB view name used for read access. If the value is an empty string, then there is no active view configured for read access.

WRITEVIEWNAME

The authorized MIB view name used for write access. If the value is an empty string, then there is no active view configured for write access.

NOTIFYVIEWNAME

The authorized MIB view name used for notify access. If the value is an empty string, then there is no active view configured for notify access.

deleteAccess

Deletes SNMPv3 access configuration entries, given a group name, context prefix, security model, and security level.

snmpvacm [common options] deleteAccess GROUPNAME
[CONTEXTPREFIX] SECURITYMODEL SECURITYLEVEL
GROUPNAME

The name of the group to which this access right applies.

CONTEXTPREFIX

A string representing a contextName must match the value of the instance of this object exactly when CONTEXTMATCH is set to "exact" or partially when CONTEXTMATCH is set to "prefix".

SECURITYMODEL

An integer representing the securityModel that must be used to gain access to this access right.

SECURITYLEVEL

An integer representing the minimum security level that must be used to gain access to this access right. A security level of noAuthNoPriv is less than authNoPriv and authNoPriv is less than authPriv.

The following integer values are supported:

1

noAuthNoPriv

2

authNoPriv

3

authPriv

Examples

For the following examples, the user is my_user and the password is my_password. Use net-snmp-config to create the first user (my_user). Then clone my_user to configure another SNMPv3 user, my_user_2. See snmpusm(1M).

Example 1 Creating a VACM Group Entry

Create a VACM group entry, as follows:

snmpvacm -v 3 -u my_user -l authPriv -a MD5 -A
        my_password -x DES -X my_password localhost createSec2Group
        3 my_user_2 my_group

Run snmpwalk(1M) to verify the group name was created:

snmpwalk -v 3 -u my_user -l authPriv -a MD5 -A
        my_password -x DES -X my_password localhost
        SNMP-VIEW-BASED-ACM-MIB::vacmGroupName

In addition to other configured VACM group entries, you will note an entry such as the following:

SNMP-VIEW-BASED-ACM-MIB::vacmGroupName.3."my_user_2" = STRING: my_group

Example 2 Creating a MIB View Entry

The command below creates a MIB view entry applicable only to the system group MIB.

snmpvacm -v 3 -u my_user -l authPriv -a MD5 -A
        my_password -x DES -X my_password localhost createView
        my_view .1.3.6.1.2.1.1 FF

Run snmpwalk(1M) to verify the my_view MIB view was created:

snmpwalk -v 3 -u my_user -l authPriv -a MD5 -A
        my_password -x DES -X my_password localhost
        SNMP-VIEW-BASED-ACM-MIB::vacmViewTreeFamilyTable

In snmpwalk output, observe the lines, such as those below, related to the my_view MIB view.

SNMP-VIEW-BASED-ACM-MIB::vacmViewTreeFamilyMask."my_view".2.1.3.6.1.2.1.1\
= Hex-STRING: FF 
SNMP-VIEW-BASED-ACM-MIB::vacmViewTreeFamilyType."my_view".2.1.3.6.1.2.1.1\
= INTEGER: included(1)
SNMP-VIEW-BASED-ACM-MIB::vacmViewTreeFamilyStorageType.\
"my_view".2.1.3.6.1.2.1.1 = INTEGER: nonVolatile(3)
SNMP-VIEW-BASED-ACM-MIB::vacmViewTreeFamilyStatus.\
"my_view".2.1.3.6.1.2.1.1 = INTEGER: active(1)

Example 3 Creating an Access Entry

The command below creates an access entry using the following components:

snmpvacm -v 3 -u my_user -l authPriv -a MD5 -A
        my_password -x DES -X my_password localhost createAccess
        my_group "" 3 3 1 my_view "" ""

Run snmpwalk(1M) to verify the access entry was created:

snmpwalk -v 3 -u my_user -l authPriv -a MD5 -A
        my_password -x DES -X my_password localhost
        SNMP-VIEW-BASED-ACM-MIB::vacmAccessTable

SNMP-VIEW-BASED-ACM-MIB::vacmAccessContextMatch."my_group"."".3.authPriv\
= INTEGER: exact(1)
SNMP-VIEW-BASED-ACM-MIB::vacmAccessReadViewName."my_group"."".3.authPriv\
= STRING: my_view
SNMP-VIEW-BASED-ACM-MIB::vacmAccessWriteViewName."my_group"."".3.authPriv\
= STRING:
SNMP-VIEW-BASED-ACM-MIB::vacmAccessNotifyViewName."my_group"."".3.authPriv\
= STRING:
SNMP-VIEW-BASED-ACM-MIB::vacmAccessStorageType."my_group"."".3.authPriv\
= INTEGER: nonVolatile(3)
SNMP-VIEW-BASED-ACM-MIB::vacmAccessStatus."my_group"."".3.authPriv\
= INTEGER: active(1)

Example 4 Testing the Configuration

Test the preceding setup by verifying the access setup. You do this by accessing an object in the system group and another object outside this range. Note the use of the user name my_user_2.

snmpget -mALL -v 3 -u my_user_2 -l authPriv -a MD5
        -A my_password -x DES -X my_password localhost sysObjectID.0

At this point, when you to access an object outside the access range, the attempt fails with an appropriate error:

snmpgetnext -mALL -v 3 -u my_user_2 -l authPriv -a MD5
        -A my_password -x DES -X my_password localhost ifTable

    RFC1213-MIB::ifTable = No more variables left in this MIB View (It is
        past the end of the MIB tree)

Exit Status

0

Successful completion.

1

A usage syntax error. A usage message displays. Also used for time out errors.

2

An error occurred while executing the command. An error message displays.

Attributes

See attributes(5) for descriptions of the following attributes:

ATTRIBUTE TYPE
ATTRIBUTE VALUE
Availability
SUNWsmcmd
Interface Stability
Stable

See Also

snmpusm(1M), snmpwalk(1M), snmpd.conf(4), attributes(5)

RFC 3415