SNMP v3 Simple Network Management Protocol Februar y, 2003

advertisement
SNMP v3
Simple Network Management Protocol
A N A L C AT E L E X E C U T I V E B R I E F
Februar y, 2003
SNMP v3
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2
2. SNMP Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
3. SNMPv3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
3.1. User-based Security Model (USM) . . . . . . . . . . . . . . . . .4
3.2. View-based Access Control Model (VACM) . . . . . . . . . . .5
4. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Appendix A: Abbreviations and acronyms . . . . . . . . . . . . . . . .6
Appendix B: Sources for further information . . . . . . . . . . . . . . . .6
Copyright © 2003 Alcatel Internetworking.
The hyperlinks provided in this Executive Briefing are merely for the convenience of our Executive Briefing readers. Alcatel
Internetworking, Inc. has no interest in, responsibility for, or control over the linked-to sites. AII disclaims all warranties, expressed and
implied, including those of merchantability, fitness for a particular purpose and non-infringement, with respect to the information
contained herein, the hyperlinks provided, the information contained therein, and the use thereof. In no event shall AII be liable for any
damages resulting from the reader’s use of the information contained herein and/or the hyperlinks provided, even if AII has been
informed of the possibility of such damages.
P/N 031249-00 2/03
Alcatel Executive Briefing
> 1
SNMP v3
1.0 Introduction
Network managers need to be able to communicate with and control each
element in a network. With the large numbers of devices in networks today, it
would be difficult, if not impossible, to manage the network by configuring each
device manually. To add to the complexity, most networks contain a mixture of
network protocols.
Centralized management is the answer. The Simple Network Management Protocol
(SNMP) was initially designed as a stop-gap measure for network management
until a more sophisticated method could be developed. It was created to allow
simple yet effective network management. Despite being created as a temporary
solution, SNMP has continued to evolve. Today SNMP is supported by virtually
every enterprise network equipment manufacturer worldwide.
SNMPv1 (RFC 1157) was effective and easy to implement, but had problems.
SNMPv2 (RFC 1902) was developed to add new features and to correct the
limitations and bugs of the original. SNMPv2 improved the functionality of version
1, but still did not meet security requirements such as authentication and
encryption. SNMPv3 addresses these limitations with the addition of powerful
security features including access control, authentication, and privacy of
management information.
> 2 Alcatel
February, 2003
SNMP v3
2.0 SNMP Operation
Enhancements to SNMP are modular in nature to allow for gradual evolution of
the protocol. The architecture, structure, and framework of all three versions are
consistent.
The SNMP model consists of a network management station and the devices that
are managed, which are called agents. The management station uses User
Datagram Protocol (UDP) packets called protocol data units (PDUs) and the SNMP
protocol to communicate with devices running agent software.
Each network device agent maintains a database called a MIB that contains
configuration and traffic information about that network device. The MIB
(management information base) is a hierarchal database that the network
management software reads and modifies using SNMP commands sent in PDUs.
For example, a management station may send an SNMP PDU to an agent to
retrieve information about network statistics or to change a parameter in MIB.
SNMP offers the following basic functions:
Get – The get command retrieves specific information stored in the MIB. An
example of this command is, “Get 1.3.6.1.800.4.5.6.” The number that the
get command generates is similar to a file number. Every piece of MIB
information is identified this way.
Get next – Get next is almost identical to the get command, except it requests
the next incremental value. For example, one MIB file might show the current
number of packets received by a port, which is retrieved by a get. A get next
requests the next update.
Get reply – A get reply is sent with the information requested by a get or get
next command.
Set – Set is the command used to configure a device.
Trap (or event) – A trap is sent to the management station when a special
condition such as start up, shut down, an error, etc., occurs in the device.
A network management station uses the get, get reply, and set commands to
inspect, configure, and monitor a network device through the MIB. Unlike the
other SNMP functions, traps are unsolicited events, meaning that they come
directly from a device when it detects a problem. Trap PDUs are typically sent on
a well-known UDP port (162) so that any station that is set up to listen to that port
receives the traps.
Alcatel Executive Briefing
> 3
SNMP v3
3.0 SNMPv3
SNMPv3, first defined in IETF RFCs 2271-2275 and again in 3410-3415, is
designed to be backward compatible with SNMP versions 1 and 2 and add
security in the form of access control, authentication, and encryption to existing
SNMP implementations. As such, version 3 is essentially version 2 with the
addition of security features and other enhancements. Two of the most significant
additions provided by SNMPv3 are the User-based Security Model (USM) and
View-based Access Control Model (VACM).
3.1 User-based Security Model (USM)
The User-based Security Model (USM) of SNMPv3 defines mechanisms for
providing message-level security for SNMP implementations. The USM is
designed to protect against threats such as:
• Modification of information – changing management information in transit
between the SNMP manager and agent
• Masquerade – a non-authorized user assuming the identity of a user
authorized to perform management operations
• Message stream modification – reordering or copying packets in a
management message stream for malicious purposes
• Disclosure – a non-authorized user accessing a message in transit to learn
information (e.g., passwords) contained in the stream
SNMPv3 provides authentication, ensures data integrity, and prevents
masquerading.
After a network manager logs on to a management station with a username
and password, SNMPv3 authentication consists of applying MD5 (Message
Digest 5) or SHA (Secure Hash Algorithm) to PDU packets using a key. The
algorithm produces an authentication value and places it in the message.
The receiver applies the same algorithm with the same key and checks if its
produced value is the same as the one in the message. The key used for the
authentication is associated to the network manager’s user name, which is
present within the SNMP message. The authentication functionality ensures
that each SNMP message comes from an authorized manager or agent and
that it was not tampered with in transit.
> 4 Alcatel
February, 2003
SNMP v3
SNMP messages are encrypted with DES (Data Encryption Standard) to
prevent eavesdropping and ensure privacy of management information. DES
uses a key system for encryption. When sending or receiving a message
encrypted with DES, both the sender and receiver of the message must have
the same private key. This means that data in transit cannot be deciphered
without the appropriate key.
The USM also has mechanisms for checking the timeliness of SNMP PDU
delivery using synchronization and time-window checking techniques. This
helps detect messages that have been delayed, which is important because
delay is often an indicator that packets have been altered.
3.2 View-based Access Control Model (VACM)
The SNMPv3 View-based Access Control Model (VACM) is designed to
control access to management information based on a user’s identity. The
VACM allows different access levels (read, write, notify) to be defined for
different users and for each piece of MIB information.
After a network manager authenticates as specified in the USM, all SNMP
commands generated carry his/her credentials. SNMP agents check the
user’s information against a pre-configured access control database before
allowing access to any MIB object. This gives network managers the ability
to define different access rights for different administrators.
4.0 Conclusion
One of the most significant deficiencies in earlier versions addressed with the
standardization of SNMPv3 is the addition of security features. Security including
authentication, privacy, and access control, which is of paramount importance in
today’s mission critical networks, and SNMPv3 allows network managers to take
advantage of SNMP management capabilities without compromising security.
Though SNMP was originally created as a stop-gap measure until a more robust
network management standard could be created, its simple, modular nature has
instead contributed to its longevity. With the edition of security features in
SNMPv3, the protocol continues to hold ground in the network management
community.
Alcatel Executive Briefing
> 5
SNMP v3
Appendix A: Abbreviations and acronyms
DES
Data Encryption Standard
IETF
Internet Engineering Task Force
MD5
Message Digest 5
MIB
management information base
PDU
protocol data unit
SHA
Secure Hash Algorithm
SNMP
Simple Network Management Protocol
UDP
User Datagram Protocol
USM
User-based Security Model
VACM
View-based Access Control Model
Appendix B: Sources for further information
IETF RFC Pages
http://www.ietf.org/rfc.html
Introduction to SNMPv3 – RFC
http://www.ietf.org/rfc/rfc3410.txt?number=3410
The Simple Times
http://www.simple-times.org/
SNMPv3 Documentation
http://www.ibr.cs.tu-bs.de/ietf/snmpv3/
Want to receive executive briefings like this one every
month, delivered directly to your email inbox?
Sign up for the Alcatel Information Resource Center today.
Visit us on the web at www.alcatel.com/enterprise,
call us at 800.995.2612, or email us at
end-enterprise-noram-solutions@ind.alcatel.com
ARCH ITECT S OF AN INTER NET WOR LD
Download