Dell X1000 Networking X-Series Switches User Guide - Page 278

Authentication, Privacy, Timeliness, Key Management, User Security Model, SNMPv1 and SNMPv2,

Page 278 highlights

FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Network_Admin_SNMP.fm SNMP v3 In addition to the features provided by SNMPv1 and SNMPv2, SNMPv3 applies access control and a new trap mechanism to SNMPv1 and SNMPv2 PDUs. In addition, a User Security Model (USM) can be defined, which includes: • Authentication - Provides data integrity and data origin authentication. • Privacy - Protects against disclosure of message content. Cipher Block- Chaining (CBC) is used for encryption. Either authentication alone can be enabled on an SNMP message, or both authentication and privacy can be enabled on an SNMP message. However privacy cannot be enabled without authentication. • Timeliness - Protects against message delay or message redundancy. The SNMP agent compares incoming message to the message time information. • Key Management - Defines key generation, updates, and use. The switch supports SNMP notification filters, based on Object IDs (OIDs), which are used by the system to manage switch features. Authentication or Privacy Keys are modified in the User Security Model (USM). SNMPv3 can only be enabled if the Local Engine ID is enabled. SNMP Access Rights Access rights in SNMP are managed in the following ways: • SNMPv1 and SNMPv2 - Communities The community name is a password sent by the SNMP management station to the device for authentication purposes. A community string is transmitted along with the SNMPv1,v2 frames, but neither the frames nor the community string are encrypted. Since SNMPv1 and SNMPv2 are not encrypted, they are not secure. Communities can be associated with views or groups, and they are defined in the Community pages. DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - FOR PROOF ONLY 278 Network Administration: SNMP Monitoring

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416

278
Network Administration: SNMP Monitoring
FILE LOCATION:
C:\Users\gina\Desktop\Checkout_new\Dell Astute\User
Guide\Dell_Astute_Network_Admin_SNMP.fm
DELL CONFIDENTIAL – PRELIMINARY 8/9/16 - FOR PROOF ONLY
SNMP v3
In addition to the features provided by SNMPv1 and SNMPv2, SNMPv3
applies access control and a new trap mechanism to SNMPv1 and SNMPv2
PDUs. In addition, a User Security Model (USM) can be defined, which
includes:
Authentication
— Provides data integrity and data origin authentication.
Privacy
— Protects against disclosure of message content. Cipher Block-
Chaining
(CBC) is used for encryption. Either authentication alone can
be enabled on an SNMP message, or both authentication and privacy can
be enabled on an SNMP message. However privacy cannot be enabled
without authentication.
Timeliness
— Protects against message delay or message redundancy. The
SNMP agent compares incoming message to the message time
information.
Key Management
— Defines key generation, updates, and use.
The switch supports SNMP notification filters, based on Object IDs (OIDs),
which are used by the system to manage switch features.
Authentication or Privacy Keys are modified in the
User Security Model
(USM)
.
SNMPv3 can only be enabled if the Local Engine ID is enabled.
SNMP Access Rights
Access rights in SNMP are managed in the following ways:
SNMPv1 and SNMPv2
— Communities
The community name is a password sent by the SNMP management
station to the device for authentication purposes.
A community string is transmitted along with the SNMPv1,v2 frames, but
neither the frames nor the community string are encrypted. Since
SNMPv1 and SNMPv2 are not encrypted, they are not secure.
Communities can be associated with views or groups, and they are defined
in the
Community
pages.