CHAPTER 3. Software Overview
3-2
© SAMSUNG Electronics Co., Ltd.
User-Based Security Model (USM)
The User-Based Security Model (USM) for SNMP v3
[RFC2574]
is supported.
To protect data integrity, USM uses MD5 and the Secure Hash Algorithm as
keyed hashing algorithms for digest computation. This directly protects
against data modification attacks, indirectly provides data origin
authentication, and defends against masquerade attacks.
USM uses loosely synchronized, monotonically-increasing time indicators to
defend against certain message stream modification attacks. Automatic clock
synchronization mechanisms based on the protocol are specified without
dependence on third-party time sources and concomitant security considerations.
USM uses the Data Encryption Standard (DES) in the Cipher Block Chaining
(CBC) mode to protect against disclosure.
View-based Access Control Model (VACM)
The View-based Access Control Model for SNMP [RFC2575], which controls
access to management information, is supported.
For security reasons, it is often beneficial to restrict the access rights of some
groups to only a subset of the management data in the management domain.
To provide this capability, access to a context is through an MIB view, which
details a specific set of managed object types within that context.
TRAPS
All applicable standard and enterprise traps are supported. The trap support
also follows the AgentX architecture. The sub-agents will generate traps
whenever necessary and forward it to the master-agent using AgentX protocol.
The master-agent will form a TRAP Packet Data Unit (PDU) and forward it to
the pre-configured Network Management Station/Trap receiving station.
Ubigate iBG1000 product supports more than one trap-host (up to 5) to send
traps to.