1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
Implementing a Highly Available Network
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
MJ08-A/07041 Session 08 SNMP V3 Adapted from Network Management: Principles and Practice © Mani Subramanian 2000 and solely used for Network Management.
CSEE W4140 Networking Laboratory Lecture 11: SNMP Jong Yul Kim
Network Management Principles and Protocols
Network Management Definition "...deploying and coordinating resources in order to plan, operate, administer, analyze, evaluate, design and expand communication.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
COMP4690, by Dr Xiaowen Chu, HKBU
SNMP Simple Network Management Protocol
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
1 Based on Behzad Akbari Fall 2011 Network Management lectures and These slides are based in parts upon slides of Prof. Dssouli (Concordia university )
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
ENS 1 SNMP M Clements. ENS 2 Simple Network Management Protocol Manages elements in networks – E.g. routers, switches, IP phones, printers etc. Uses manager.
Chapter 6 Overview Simple Network Management Protocol
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
SNMP ( Simple Network Management Protocol ) based Network Management.
SNMP (Simple Network Management Protocol)
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
Title: HP OpenView Network Node Manager SPI for SNMPv3 Session #: 326 Speakers: Jeff Scheaffer, HP OpenView NSM David Reid, SNMP Research.
SNMP Simple Network Management Protocol Team: Matrix CMPE-208 Fall 2006.
Cryptography and Network Security
Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems and emergencies in the network (router.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
Network Management8-1 Chapter 8: Network Management Chapter goals: r introduction to network management m motivation m major components r Internet network.
1 © 1999 BMC SOFTWARE, INC. 2/10/00 SNMP Simple Network Management Protocol.
Agenda 1. QUIZ 2. SNMP 3. SNMPv2 4. SNMPv3.
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
CS 453 Computer Networks Lecture 22 Network Management.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Network Management Security
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
Internet Standard Management Framework
SNMPv3 1.DESIGN REQUIREMENTS 2.BIRTH & FEATURES of SNMPv3 3.ARCHITECTURE 4.SECURE COMMUNICATION - USER SECURITY MODEL (USM) 5. ACCESS CONTROL - VIEW BASED.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Management Information Base for Version 2 of the Simple Network Management Protocol (MIB for SNMPv2)
SNMP.
Network Management Security
SNMP V2 & V3 W.lilakiatsakun. SNMP V2 Protocol RFC types of access to management information – Manager–agent request-response – Manager-Manager.
Ch 9. Network Management Myungchul Kim
Text Overview of SNMP, FTP, Telnet. Text Overview of SNMP.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Computer and Information Security
SNMP.
SNMP.
Network Management Computer Networks.
Introduction to Internet Network Management
System and Network Management
Chapter 8: Monitoring the Network
SNMP (Simple Network Management Protocol) based Network Management
COMS/CSEE 4140 Networking Laboratory Lecture 10
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Simple Network Management Protocol
Standards, Models and Language
Presentation transcript:

1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2  SNMPv3 – what’s new?

2 Network Management  Any complex system with many interacting components must be monitored, managed and controlled  In the early 1980 networks expansion prompted the need for automated network management

3 Network management scenarios  Detecting failure of an interface card in a device  Host monitoring  Traffic monitoring to optimize resource deployment  Detecting rapid changes in routing tables  Intrusion detection

4 ISO Network Management Model FCAPS:  Fault management  Configuration management  Accounting management  Performance management  Security Management

5 ISO Network Management Model  Fault management – log, detect and respond to fault conditions in the network  Configuration management – track devices and their h/w and s/w configs  Accounting management - specify, log and control user access to network resources  Performance management – quantify, measure, report, analyze and control performance of network components  Security Management – control access to network resources according to some well- defined policy

6 Network Management Architecture

7 Simple Network Management Protocol  Protocol for network management, part of TCP/IP suite  Current version SNMPv3  Includes communication protocol, set of data definitions and database schema  Basic components: Managers/NMS Managed devices SNMP Agents MIB

8 SNMPv3  Was implemented as a full standard in 2004  Only changes relate to security and remote configuration  SNMPv3 provides for encryption, authentication and message integrity

9 Network Management Architecture

10 MIB (Management Information Base)  MIB – virtual information store for a collection of managed objects  Describes structure of management data on managed device  Each variable that describes some part of device configuration is identified by a unique OID (object ID)  Vendors define MIB variables for their own use  MIB II – standard MIB implemented by all managed objects

11 SMI (Structure of management information)  SMI is the language used to define the management information residing in a managed object – logically  SMI states that each managed object should have a name, syntax and encoding  SMI is a subset of ASN.1 - a standard for describing data that is independent of machine- specific encoding.

12 Object naming by OID

13 MIB-II subtree

14 SNMP Transport

15 SNMP Transport

16 SNMP Operations  get  getnext  getbulk (SNMPv2 and SNMPv3)  set  getresponse  trap  notification (SNMPv2 and SNMPv3)  inform (SNMPv2 and SNMPv3)  report (SNMPv2 and SNMPv3)

17 SNMP Operations  Get and getresponse

18 SNMP Operations  Getnext – retreive a group of values

19 SNMP Operations  Getbulk – retreive a section of a table

20 SNMP Operations  Set – change value or create a new row in the table

21 SNMP Operations  Trap – asynchronous operation

22 Primary Goals of SNMPv3  Check message integrity - To verify that each received message has not been modified during its transmission.  User authentication - To verify the identity of the user on whose behalf a received message claims to have been generated.  Message timestamp – to detect outdated messages  Message confidentiality - To assure that the contents of each received message are protected/encrypted.

23 Primary Goals of SNMPv3

24 SNMPv3 security framework  Two core modules within the framework are the User-based Security Model (USM) and the View-based Access Control Model (VACM).  The USM is in charge of authenticating/encrypting/decrypting SNMP packets  The VACM is in charge of administering access to MIB data.

25 SNMPv3 security framework  Authentication -Each SNMP entity is identified by SNMPEngineID, and SNMP communication is possible only if an SNMP entity knows the identity of its peer. Traps and Notifications are exceptions to this rule. Protection against:  Modification of Information (Data Integrity) Ensure that the data is not maliciously altered during transit by an unauthorized entity.  Masquerading (Data Origin Authentication) Ensure that it is known exactly who and where the data came from to prevent an unauthorized entity from assuming the identity of an authorized user.  Disclosure (Data Confidentiality) Ensure that an unauthorized entity cannot eavesdrop on the data exchanges.  Message Stream Modification (Message Timeliness) Ensure that the data was received in a timely manner to prevent malicious re- ordering of data by an unauthorized entity.

26 SNMPv3 User-based Secuirity Model  USM communication mechanisms available:  Communication without authentication and privacy (NoAuthNoPriv).  Communication with authentication and without privacy (AuthNoPriv).  Communication with authentication and privacy (AuthPriv).  Different authentication and privacy protocols supported - Currently, the MD5 and SHA authentication protocols and the CBC_DES and CFB_AES_128 privacy protocols are supported in the USM.

27 SNMPv3 VCAM  The Access Control Subsystem of an SNMP entity has the responsibility for checking whether a specific type of access to a specific managed object is allowed.  Access control occurs in the agent when processing SNMP retrieval or modification request messages from a manager, and also when a notification message must be sent to the manager.  Elaborates on the concept of community strings in the previous versions of SNMP