U2.5 SNMPv1

Description

Masters Degree Network Security Mind Map on U2.5 SNMPv1, created by Craig Parker on 21/04/2014.
Craig Parker
Mind Map by Craig Parker, updated more than 1 year ago More Less
jjanesko
Created by jjanesko about 10 years ago
Craig Parker
Copied by Craig Parker about 10 years ago
11
0

Resource summary

U2.5 SNMPv1
  1. general
    1. ISO 7498-2
      1. network mgt protocols provide
        1. configuration management
          1. accounting
            1. event logging
            2. defines network mgt security in general
          2. architectural model
            1. SNMP protocol entities

              Attachments:

              1. at least one management station
                1. acts as management role
                2. a number of network elements
                  1. manages systems, iE routers, servers gateways
                  2. At least one agent
                  3. all entities have a management information base (MIB)
                    1. SNMP access MIB on top of UDP and IP

                      Attachments:

                      1. connectionless!!
                        1. ports
                          1. 161
                            1. for requests (GET, SET)
                            2. 162
                              1. for traps
                          2. MIB Contains configuration and operational data
                        2. 3 operations
                          1. GET
                            1. enables mgt station to retrieve object values from managed entity
                            2. SET
                              1. enables the management station to set object values in managed entity
                              2. TRAP
                                1. enables a managed entity to notify the management station of significant events
                                  1. Traps are sent by NW entities when they want to inform the management station of some event
                                  2. implemented with "protocol data units" (PDUs)
                                    1. 3 parts to a PDU message
                                      1. version
                                        1. community
                                          1. SNMP operation
                                      2. threats
                                        1. primary
                                          1. data modification of messages in transit
                                            1. masquerade. as agent or mgmt device
                                            2. secondary
                                              1. message stream modification. recording or replay of messages
                                                1. eavesdropping
                                              2. vulnerabilities
                                                1. no integrity protection
                                                  1. no timeliness guarantee
                                                    1. no replay protection
                                                      1. weath authentication mechanism
                                                        1. no confidentiality protection
                                                        2. Uses UPD, connectionless protocol so no guarantee that mgmt traffic sent is recieved
                                                          1. Advantages
                                                            1. reduced overhead
                                                              1. protocol simplicity
                                                              2. Disadvantages
                                                                1. no inbuilt reliability
                                                                  1. connection oriented operations must be built into upper layer applications
                                                                2. To prevent one device acting with the authority of another device, IE masquerading as the management console
                                                                  1. security services provided
                                                                    1. authentication service
                                                                      1. Assure the destination device that the SNMP PDU does come from the source from which it claims to be
                                                                      2. access control service
                                                                        1. Limit the SNMP operations that a device can request according to device's identity
                                                                        2. security mechanisms provided to implement these services based on idea of communities
                                                                          1. authentication mechanism
                                                                            1. community name
                                                                              1. All PDUs from mgt station must contain the community name
                                                                            2. access mode mechanism
                                                                              1. community profile
                                                                                1. Each device stores a community profile that specifies which MIB values and how those values can be access by an entity bearing the associated community name.
                                                                        Show full summary Hide full summary

                                                                        Similar

                                                                        CCNA Security 210-260 IINS - Exam 1
                                                                        Mike M
                                                                        CCNA Security 210-260 IINS - Exam 2
                                                                        Mike M
                                                                        SY0-401 Part 1 (50 questions)
                                                                        desideri
                                                                        CCNA Security 210-260 IINS - Exam 1
                                                                        Ricardo Nuñez
                                                                        CCNA Security 210-260 IINS - Exam 3
                                                                        irvin pastora
                                                                        1.3 Network and Security Components
                                                                        DJ Perrone
                                                                        U1. OSI 7 Layer Reference Model
                                                                        Craig Parker
                                                                        Types of Attacks
                                                                        River L.
                                                                        CCNA Security 210-260 IINS - Exam 1
                                                                        irvin pastora
                                                                        Network Security Vocabulary
                                                                        Shantal K Green
                                                                        CCNA Security 210-260 IINS - Exam 2
                                                                        irvin pastora