Management Access Policy Configuration
10-15
4. Select OK to update the SNMP Trap configuration. Select Reset to revert to the last saved configuration.
10.1.2 Management Access Deployment Considerations
Before defining an access control configuration as part of a Management Access policy, refer to the
following deployment guidelines to ensure the configuration is optimally effective:
• Unused management protocols should be disabled to reduce a potential attack.
• Use management interfaces providing encryption and authentication. Management services like HTTPS,
SSH and SNMPv3 should be used when possible, as they provide both data privacy and authentication.
• By default, SNMPv2 community strings on most devices are set to public for the read-only community
string and private for the read-write community string. Legacy Motorola Solutions devices may use other
community strings by default.
• Motorola Solutions recommends SNMPv3 be used for device management, as it provides both
encryption, and authentication.
• Enabling SNMP traps can provide alerts for isolated attacks at both small radio deployments or
distributed attacks occurring across multiple sites.
Port Set the server port dedicated to receiving SNMP traps. The default port is
port 162.
Version Set the SNMP version for sending SNMP traps. SNMPv2 is the default.