SNMP Usage Recommendations

Slides:



Advertisements
Similar presentations
Management Information Base for Version 2 of the Simple Network Management Protocol Presented by Zhou Ji (MIB for SNMPv2) By SNMPv2 Working Group.
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Implementing a Highly Available Network
The Application Layer Chapter 7. Where are we now?
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Information. Insight. Influence. securityindustry.org
Networked Device Management with SNMP SIA Working Group Presentation ASIS 2014 (Atlanta) SIA SNMP Working Group ASIS
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
COMP4690, by Dr Xiaowen Chu, HKBU
SNMP & MIME Rizwan Rehman, CCS, DU. Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems.
Introduction An introduction to the software and organization of the Internet Lab.
Introduction to SNMP AfNOG 11, Kigali/Rwanda.
ENS 1 SNMP M Clements. ENS 2 Simple Network Management Protocol Manages elements in networks – E.g. routers, switches, IP phones, printers etc. Uses manager.
1 Network Management Computer Networks. 2 OSI Network Management Model Performance Management e.g. utilization Fault Management e.g. SNMP traps Configuration.
Chapter 6 Overview Simple Network Management Protocol
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
HiVision SNMP Software.
Emanuele Pasqualucci Extending AppManager Monitoring with the SNMP Toolkit.
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
Characterizing the Existing Internetwork PART 1
Title: HP OpenView Network Node Manager SPI for SNMPv3 Session #: 326 Speakers: Jeff Scheaffer, HP OpenView NSM David Reid, SNMP Research.
Draft-loughney-what-standards-01.txt IETF 59 NEWTRK WG Presented by Spencer Dawkins.
Chapter 9.
Network Administration. What is a Systems Administrator?  Person responsible for:  Setting up servers  Configuring the environment for web and other.
Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems and emergencies in the network (router.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
ECE Prof. John A. Copeland Office: Klaus or call.
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Interior Gateway Protocol. Introduction An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with.
UNIT 6 SEMINAR Unit 6 Chapter 7 and 8, plus Lab 12 Course Name – IT482 Network Design Instructor – David Roberts – Office Hours:
Chapter 19: Network Management Business Data Communications, 4e.
A powerful network monitoring system
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
Management Information Base for Version 2 of the Simple Network Management Protocol (MIB for SNMPv2)
1 Kyung Hee University Prof. Choong Seon HONG SNMP Network Management Concepts.
Net Flow Network Protocol Presented By : Arslan Qamar.
Network Management CCNA 4 Chapter 7. Monitoring the Network Connection monitoring takes place every day when users log on Ping only shows that the connection.
Chapter 3 Selecting the Technology. Agenda Internet Technology –Architecture –Protocol –ATM IT for E-business –Selection Criteria –Platform –Middleware.
IP Over InfiniBand Working Group Management Information Bases 55th IETF Atlanta Sean Harnedy InfiniSwitch Corporation
UNIT 6 SEMINAR Unit 5 Chapter 7 and 8, plus Lab 10 Course Name – IT Network Design Instructor – Jan McDanolds, MS, Security+ Contact Information:
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
Network Management Security in distributed and remote network management protocols.
SNMP (Simple Network Management Protocol) Overview
YANG Modelling and NETCONF Protocol Discussion
or call for office visit, or call Kathy Cheek,
Overview – SOE Net-SNMP v5.7.2
Convergence of Network Management Protocols
Overview – SOE Net-SNMP v
Overview – SOE Net-SNMP v5.7.3
SNMP M Clements ENS.
Instructor & Todd Lammle
SNMP M Clements ENS.
IPv6 / IP Next Generation
Network Management Computer Networks.
SNMP (Simple Network Management Protocol) Overview
Introduction to Internet Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
SNMP M Clements ENS.
Chapter 8: Monitoring the Network
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Cisco networking CNET-448
Introduction to TCP/IP
A Brief Introduction to Internet Network Management
Network Management Security
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

SNMP Usage Recommendations SIA Working Group Presentation January 2015 SIA SNMP Working Group 2015 Information. Insight. Influence. www.securityindustry.org

SNMP Preferred Features Accurate device identification Support enough MIB objects to manage the device in question MIB publically distributed MIB “compilable” with standard tools Secure access (TLS please?) User configurable fields for site specific data Information. Insight. Influence. www.securityindustry.org

Preferred SNMP - Details Relevant MIB object groups From RFC 1213: System, Interfaces, Address Translation, IP, ICMP, TCP, UDP, EGP, Transmission, SNMP Multicast (RFC 5132) PoE (example: CISCO-POE-PD-MIB-V1SMI [2]) At least read access, preferably secure read/write Information. Insight. Influence. www.securityindustry.org

Recommended SNMP Use: Protocol TLS over TCP would be ideal as it provides secure NPE support SNMPv3 (with usernames) should be used as it provides security SNMPv2c (i.e. best available unencrypted UDP SNMP) should be widely deployed and stable (see for example Cisco switches) SNMP supports the network and some additional functional details. It’s not an application framework repurposed to examine the transport over which the application traffic travels. Information. Insight. Influence. www.securityindustry.org

Recommended SNMP Use: MIB Objects Relevant pre-existing MIB object groups From RFC 1213: System, Interfaces, Address Translation, IP, ICMP, TCP, UDP, EGP, Transmission, SNMP Multicast (RFC 5132) PoE (example: CISCO-POE-PD-MIB-V1SMI [2]) Information. Insight. Influence. www.securityindustry.org

Recommended SNMP Use: View/Manage Minimum is read-only access sufficient to troubleshoot network issues Ideal is read/write under secure conditions Management is about managing the network-attachment state of the device, not application management Vendor-specific device management is fully facilitated, provides for vendor value-add through technology diversity using interoperable protocols. Information. Insight. Influence. www.securityindustry.org

Recommended SNMP Use: MIB Content Actually use system group and other features to identify device, location, software version, etc. Support network management specifically to include statistics on network traffic Securely writeable values to manage the device Securely controllable remote restart Facilitate vendor facility for firmware upgrade Facilitate vendor device health check Information. Insight. Influence. www.securityindustry.org

OID Background Info Object Identifiers (OID’s) have been around for decades. It’s an international thing. There’s an arc, starts with one number. It’s defined in CCITT/ITU X.208 Organizations have carved up the number space, together. IETF manages a “private enterprise number- PEN” space e.g. IDmachines is 37770 and SIA is 42531. OID’s are used for many labelling purposes including certificates, SNMP, and other things. A conversation about the design of the OID’s and what SIA hopes to accomplish with them is a short term goal Information. Insight. Influence. www.securityindustry.org

SIA OID Architecture SIA – PEN from IETF SIA.1 – Experimental Use SIA.2 – Working Group Use SIA.2.1 SNMP WG SIA.2.2 ICAM WG SIA.3 PE+NPE Identity Objects SIA.4 SNMP NPE Objects Information. Insight. Influence. www.securityindustry.org

SIA OID Examples SIA.1.2.1 – experimental device type for WG work SIA.2.2.2 – NFI label for SIA test certs for FICAM interop work SIA.4.1.1 – hypothetical OID for a camera in the devices group within the SIA SNMP MIB. Information. Insight. Influence. www.securityindustry.org