Network Management Security

Slides:



Advertisements
Similar presentations
Henric Johnson1 Chapter 12 Network Management Security Henric Johnson Blekinge Institute of Technology, Sweden
Advertisements

Net Security1 Chapter 8 Network Management Security Henric Johnson Blekinge Institute of Technology, Sweden Revised by Andrew Yang.
CS 678 P. T. Chung1 Network Management Security CS 678 Network Security, Dept. of Computer Science, Long Island University,Brooklyn, NY.
Chapter 19: Network Management Business Data Communications, 5e.
Network Management Security
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
EE579T/GD_6 #1 Summer 2003 © , Richard A. Stanley EE579T Network Security 7: An Overview of SNMP and Intrusion Detection Prof. Richard A. Stanley.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
CSEE W4140 Networking Laboratory Lecture 11: SNMP Jong Yul Kim
CSEE W4140 Networking Laboratory Lecture 11: SNMP Jong Yul Kim
EE579T/10 #1 Spring 2002 © , Richard A. Stanley WPI EE579T Network Security 10: An Overview of SNMP Prof. Richard A. Stanley.
NS-H /11041 SNMP. NS-H /11042 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
1 SNMP Simple Network Management Protocol. 2 SNMP Overview Define mechanism for remote management of network devices (routers, bridges, etc.) Fundamental.
EE579T/10 #1 Spring 2005 © , Richard A. Stanley EE579T Network Security 10: An Overview of SNMP Prof. Richard A. Stanley.
COMP4690, by Dr Xiaowen Chu, HKBU
EE579T/9 #1 Spring 2003 © , Richard A. Stanley EE579T Network Security 9: An Overview of SNMP Prof. Richard A. Stanley.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
SNMP (Simple Network Management Protocol) Jon Sevy Geometric and Intelligent Computing Laboratory Department of Mathematics and Computer Science Drexel.
Chapter 6 Overview Simple Network Management Protocol
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
SNMP ( Simple Network Management Protocol ) based Network Management.
SNMP: Simple Network Management Protocol
SNMP (Simple Network Management Protocol)
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
SNMP Simple Network Management Protocol Team: Matrix CMPE-208 Fall 2006.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
Network Management8-1 Chapter 8: Network Management Chapter goals: r introduction to network management m motivation m major components r Internet network.
1 © 1999 BMC SOFTWARE, INC. 2/10/00 SNMP Simple Network Management Protocol.
ECE Prof. John A. Copeland Office: Klaus or call.
Communication and Functional Models
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 13 Network Management.
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
CS 453 Computer Networks Lecture 22 Network Management.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Henric Johnson1 Chapter 12 Network Management Security Henric Johnson Blekinge Institute of Technology, Sweden
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
1 Chapter 8 Network Management Security. 2 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Network Management Security
Internet Standard Management Framework
Chapter 8: Network Management
CITA 440 Week 6 SNMPv1. Internet SNMP Management Internet Engineering Task Force (IETF) –1990SNMPv1 –1996SNMPv2 –1998SNMPv3 Internet documents: –Request.
Ch 9. Network Management Myungchul Kim
 Introduction  Structure of Management Information  Practical Issues  Summary 2.
Text Overview of SNMP, FTP, Telnet. Text Overview of SNMP.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Network Management Security in distributed and remote network management protocols.
or call for office visit, or call Kathy Cheek,
Computer and Information Security
Lec7: SNMP Management Information
Network Management: SNMP
Network Management Computer Networks.
Introduction to Internet Network Management
SNMP (Simple Network Management Protocol) based Network Management
SNMP (Simple Network Management Protocol) based Network Management
COMS/CSEE 4140 Networking Laboratory Lecture 10
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Network Management Security
Presentation transcript:

Network Management Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49

Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3

The Internet Standard Management Framework SNMP network management consists of four parts: Management Information Base (MIB) A map of the hierarchical order of all managed objects and how they are accessed Structure of Management Information (SMI) Rules specifying the format used to define objects managed on the network that the SNMP protocol accesses SNMP Protocol Defines format of messages exchanged by management systems and agents. Specifies the Get, GetNext, Set, and Trap operations Security and administration capabilities The addition of these capabilities represents the major enhancement in SNMPv3 over SNMPv2

Basic Concepts of SNMP An integrated collection of tools for network monitoring and control. Single operator interface Minimal amount of separate equipment. Software and network communications capability built into the existing equipment SNMP key elements: Management station Management agent Management information base Network Management protocol Get, Set and Notify

Management Information Bases (MIB) SNMP agent is software that runs on a piece of network equipment (host, router, printer, or others) and that maintains information about its configuration and current state in a database Information in the database is described by Management Information Bases (MIBs) The MIB specifies the managed objects

Management Information Bases (MIB) The MIB is a text file that describes managed objects using the syntax of ASN.1 (Abstract Syntax Notation 1) ASN.1 is a formal language for describing data and its properties In Linux, MIB files are in the directory /usr/share/snmp/mibs Multiple MIB files MIB-II (defined in RFC 1213) defines the managed objects of TCP/IP networks

Managed Objects Each managed object is assigned an object identifier (OID) The OID is specified in a MIB file. An OID can be represented as a sequence of integers separated by decimal points or by a text string. Example: 1.3.6.1.2.1.4.6. iso.org.dod.internet.mgmt.mib-2.ip.ipForwData When an SNMP manager requests an object, it sends the OID to the SNMP agent.

MIB Example ipForwDatagrams OBJECT-TYPE SYNTAX Counter ACCESS read-only STATUS mandatory DESCRIPTION "The number of input datagrams for which this entity was not their final IP destination, as a result of which an attempt was made to find a route to forward them to that final destination. In entities which do not act as IP Gateways, this counter will include only those packets which were Source-Routed via this entity, and the Source- Route option processing was successful." ::= { ip 6 }

Protocol context of SNMP

Proxy Configuration

SNMP v1 and v2 Trap – an unsolicited message (reporting an alarm condition) SNMPv1 is ”connectionless” since it utilizes UDP (rather than TCP) as the transport layer protocol. SNMPv2 allows the use of TCP for ”reliable, connection-oriented” service.

Comparison of SNMPv1 and SNMPv2 SNMPv1 PDU SNMPv2 PDU Direction Description GetRequest Manager to agent Request value for each listed object Request next value for each listed object ------ GetBulkRequest Request multiple values SetRequest Set value for each listed object InformRequest Manager to manager Transmit unsolicited information GetResponse Response Agent to manager or Manage to manager(SNMPv2) Respond to manager request Trap SNMPv2-Trap Agent to manager

SNMPv1 Community Facility SNMP Community – Relationship between an SNMP agent and SNMP managers. Three aspect of agent control: Authentication service Access policy Proxy service

SNMPv1 Administrative Concepts

SNMPv3 SNMPv3 defines a security capability to be used in conjunction with SNMPv1 or v2

SNMPv3 Flow

Typical SNMP Manager

Typical SNMP Agent

User Security Model (USM) Designed to secure against: Modification of information Masquerade Message stream modification Disclosure Not intended to secure against: Denial of Service (DoS attack) Traffic analysis

SNMP3 Message Format with USM

USM Encryption Authentication (using authKey) HMAC-MD5-96 HMAC-SHA1-96 Encryption (using privKey) DES CBC Uses first 64 bits of the 16-octet privKey Last 64 bits used as IV to DES CBC Key values not accessible from SNMP

Authoritative Engine SNMP messages with payloads that expect a response (Get…, Set, Inform) Receiver of message is authoritative SNMP messages with payload that does not expect response (Trap, Response, Report) Sender is authoritative

Key Localization Allows single user to own keys stored in multiple engines Key localized to each authoritative engine using hash functions Avoids problem of a single key being stored in many places Greatly slows brute force attack

Key Localization

Timeliness Determined by a clock kept at the authoritative engine When authoritative engine sends a message, it includes the current clock value Nonauthoritative agent synchronizes on clock value When nonauthoritative engine sends a message, it includes the estimated destination clock value These procedures allow assessing message timeliness

View-Based Access Control Model (VACM) VACM has two characteristics: Determines whether access to a managed object should be allowed. Make use of an MIB that: Defines the access control policy for this agent. Makes it possible for remote configuration to be used.

Access control decision

SNMPv3 Security SNMPv3 solves SNMP security problems, right? NOT! Decent security implementation, but reality is: SNMPv1 still holds ~95% of the market (2005) Even SNMPv2 not widely deployed Upgrading to SNMPv3 is difficult and costly (sort of like moving from WinXP to WinVista all at once) There is the issue of proxies and foreign clients SNMPv3 is the clear long-term choice