Computer and Information Security

Slides:



Advertisements
Similar presentations
Henric Johnson1 Chapter 12 Network Management Security Henric Johnson Blekinge Institute of Technology, Sweden
Advertisements

Net Security1 Chapter 8 Network Management Security Henric Johnson Blekinge Institute of Technology, Sweden Revised by Andrew Yang.
CS 678 P. T. Chung1 Network Management Security CS 678 Network Security, Dept. of Computer Science, Long Island University,Brooklyn, NY.
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
CCNA – Network Fundamentals
Chapter 19: Network Management Business Data Communications, 4e.
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
Management Architecture and Standards II IACT 418 IACT 918 Corporate Network Planning Gene Awyzio Spring 2001.
NS-H /11041 SNMP. NS-H /11042 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
EE579T/10 #1 Spring 2005 © , Richard A. Stanley EE579T Network Security 10: An Overview of SNMP Prof. Richard A. Stanley.
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
COMP4690, by Dr Xiaowen Chu, HKBU
EE579T/9 #1 Spring 2003 © , Richard A. Stanley EE579T Network Security 9: An Overview of SNMP Prof. Richard A. Stanley.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
1 Based on Behzad Akbari Fall 2011 Network Management lectures and These slides are based in parts upon slides of Prof. Dssouli (Concordia university )
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
Chapter 6 Overview Simple Network Management Protocol
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
SNMP: Simple Network Management Protocol
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
SNMP Simple Network Management Protocol Team: Matrix CMPE-208 Fall 2006.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
ECE Prof. John A. Copeland Office: Klaus or call.
Communication and Functional Models
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Henric Johnson1 Chapter 12 Network Management Security Henric Johnson Blekinge Institute of Technology, Sweden
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
1 Chapter 8 Network Management Security. 2 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Network Management Security
Network Management Security
1 Kyung Hee University Prof. Choong Seon HONG SNMP Network Management Concepts.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Network Management Security in distributed and remote network management protocols.
Jaringan Telekomunikasi, Sukiswo ST, MT Sukiswo
or call for office visit, or call Kathy Cheek,
Network management Communication model
Simple Network Management Protocol (SNMP)
Chapter 19: Network Management
Lec 5: SNMP Network Management
Network Management Computer Networks.
Introduction to Internet Network Management
CHAPTER 3 Architectures for Distributed Systems
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Chapter 3: Windows7 Part 4.
Protocols and the TCP/IP Suite
Fundamentals of Network Management
Lec 5: SNMP Network Management
SNMP (Simple Network Management Protocol) based Network Management
SNMP (Simple Network Management Protocol) based Network Management
Chapter 1 Data Communications and NM Overview 1-1 Chapter 1
Protocols and the TCP/IP Suite
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Network Management Security
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Standards, Models and Language
Presentation transcript:

Computer and Information Security Chapter 12 Network Management Security Slides by H. Johnson & S. Malladi, L. Brown -Modified by SJF-S‘12

Outline Basic Concepts of SNMP Network Management Architecture SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites

Basic Concepts of SNMP As a networks grow larger it becomes more indispensable to the organization more thing can go wrong disabling the network to an unacceptable level A large network is too complex to be managed by human effort and requires automated network management tools, such as the Simple Network Management Protocol (SNMP)

Basic Concepts of SNMP Network Management Architecture A network management system is an integrated collection of tools for network monitoring and control. Single operator interface Minimal amount of separate equipment. Software and network communications capability built into the existing equipment Active elements of the network provide regular feedback of status information to the network control center.

SNMP Architecture SNMP key elements: Management station -often a stand-alone device, which servesas the human interface Management agent- responds to requests for information from the maanagement station Management information base (MIB) -collection of access points at the agent for the station Network Management protocol -links station and agents and includes: Get- retrieve value of objects at agent Set - set value of objects at agent Notify - notifies station of significant events

Network Management Protocol Architecture 1988 SNMP - became dominant Most vendors of routers, workstations, PCs, etc. offer SNMP agent packages, that allow their products to be managed by an SNMP management station SNMP -easily implemented, uses minimal processor and network resources

Network Management Protocol Architecture SNMP designed to be an application level protocol that is part of TCP/IP intended to operate over the User Datagram Protocol (UDP) each agent must implement SNMP, UDP, and IP

Protocol Context of SNMP 3 Types of messages are issued: GetRequest GetNextRequest SetRequest All are acknowledged by GetResponse An agent may issue a trap message in response to an event

Protocol context of SNMP

Protocol Context of SNMP SNMP relies on UDP which is connectionless, and SNMP is also connectionless. No connections are maintained between a management station and an agent.

Proxies Proxies were developed for devices that do not support UDP or implement SNMP. An SNMP agent acts as a proxy for one or more other devices. Management station sends queries to proxy agent, which converts it to the management protocol used by the device. When agent receives a reply, it passes it to the management station.

Proxy Configuration

SNMP v1 and v2 Trap – an unsolicited message (reporting an alarm condition) SNMPv1 is ”connectionless” since it utilizes UDP (rather than TCP) as the transport layer protocol. SNMPv2 allows the use of TCP for ”reliable, connection-oriented” service. Any device that does not run SNMPv2 must be managed by proxy.

SNMPv2 Strength of SNMP is its simplicity. SNMP provides a basic set of tools that is easy to implement and configure. Deficiencies –become apparent in large networks: Lack of support for distributed network management Functional deficiencies Security deficiencies (addressed in SNMPv3)

Distributed Network Management One host has the function of a management station; two or three others may have a back-up role. Remaining devices contain agent software and MIB to allow monitoring control from management station. MIB- Management Information Base, a database of objects that can be monitored by a network management system. As network grows in size this is unmanageable and a decentralized management scheme works best.

Decentralized (Distributed) Network Management Multiple top-level management stations or management servers Each server manages a pool of agents or delegates the management to an intermediate manager Intermediate manager monitors and controls its agents Spreads the processing burden and reduces total network traffic

SNMPv2 SNMPv2 support either a centralized strategy or a distributed one. Some systems operate both in the role of manager and of agent Some commands require the agent to act as a proxy for remote devices and pproxy assumes role of manager to access information at remote device, then as an agent passes the information to a superior manager.

Functional Enhancements SNMPv1 – 5 commands (GetREquest, GetNextRequest, Set Request, GetResponse, Trap) issued as protocol data units (PDU) SNMPv2 – all 5 commands from v1, plus two new ones Inform command, sent from one management station to another GetBulk – allows manager to retrieve large block of data at once Get is atomic in SNMPv1, but not in SNMPv2- may return partial results

Comparison of SNMPv1 and SNMPv2 Transmit unsolicited information Agent to manager SNMPv2-Trap Trap Respond to manager request Agent to manager or Manager to manager(SNMPv2) Response GetResponse Manager to manager InformRequest ------ Set value for each listed object Manager to agent SetRequest Request multiple values GetBulkRequest Request next value for each listed object GetRequest Request value for each listed object Description Direction SNMPv2 PDU SNMPv1 PDU

SNMPv1 Community Facility SNMP Community – Relationship between an SNMP agent and SNMP managers-defined locally at agent. Three aspect of agent control: Authentication service- agent may limit access to MIB to authorized managers Access policy- agent may give different acceees privileges to different managers Proxy service – agent may act as a proxy to other agents All of these raise security concerns

SNMPv1 Administrative Concepts

SNMPv3 SNMPv3 defines a security capability to be used in conjunction with SNMPv1 or v2

SNMPv3 SNMPv3is not a stand alone replacement for versions1 and2 SNMPv3 defines a security capability to be used with SNMPv2 (preferred) or SNMPv1 Describes an architecture for current and future versions of SNMP Like SNMPv2 with security and administrative capabilities.

SNMPv3 Architecture Modular architecture Allows implementation over a wide range of operational environments Makes it possible to move portions of the architecture forward in the standards track even if consensus is not reached on all pieces Accommodates alternate security modes

SNMP Entity Each SNMP entity includes a single SNMP engine Engine implements functions for sending and receiving messages, authenticating, encrypting and decrypting messages and controlling access to managed objects. Both the engine and the applications are collections of discrete modules.

SNMP Entity This architecture provides advantages: Role of an entity is determined by which modules are implemented in the entity Modular structure lends itself to defining different versions of each module makes it possible to define alternative or enhanced capabilities clearly specifies coexistence and transition strategies

Traditional SNMP manager Manager interacts with agents by issuing commands(get, set) and by receiving trap messages. Manager may also interact with other managers by issuing Inform Request PDU’s, which provide alerts, and by receiving Inform Response PDU’s, which acknowledge Inform Request.

Traditional SNMP manager Includes three categories of applications: Command Generator Applications – monitor and manipulate management data at remote agents (using SNMPv1 or SNMPv2) Notification Originator Application- originates asynchronous messages (using InformRequest) Notification Receiver Application-processes incoming asynchronous messages

Traditional SNMP Manager

Traditional SNMP Manager SNMP engine performs two functions: Accepts outgoing PDUs from SNMP applications, performs necessary processing, including inserting authentication codes and encrypting, and encapsulates for transmission Accepts incoming SNMP messages from the transport layer, performs necessary processing, including inserting authentication codes and encrypting, extracts PDUs and passes thse on to SNMP applications

SNMP Engine Contains A Dispatcher – simple traffic manager- accepts PDUs, determines the type of processing and passes it to Message processor; for incoming messages from transport layer, routes it to application A Message Processing Subsystem – wraps PDUs in message and returns to the Dispatcher A Security Subsystem – performs authentication and encryption

Traditional SNMP Agent Containt 3 types of applications: Command Responder- provides access to management data Notification Originator- initiates asynchronous messages Proxy Forwarder- forwards messages between applications

Traditional SNMP Agent

SNMPv3 Flow

SNMP3 Message Format with USM

User Security Model (USM) Designed to secure against: Modification of information Masquerade Message stream modification Disclosure Not intended to secure against: Denial of Service (DoS attack) Traffic analysis

Key Localization Process

View-Based Access Control Model (VACM) VACM has two characteristics: Determines wheter access to a managed object should be allowed. Make use of an MIB that: Defines the access control policy for this agent. Makes it possible for remote configuration to be used.

Access control decision

Recommended Reading and WEB Sites Subramanian, Mani. Network Management. Addison-Wesley, 2000 Stallings, W. SNMP, SNMPv1, SNMPv3 and RMON 1 and 2. Addison-Wesley, 1999 IETF SNMPv3 working group (Web sites) SNMPv3 Web sites