Chapter 21: Simple Network Management Protocol SNMPv3
276
SNMPv3 Overview
The SNMPv3 protocol builds on the existing SNMPv1 and SNMPv2c
protocol implementation which is described in Chapter 20 on page 265. In
SNMPv3, User-based Security Model (USM) authentication is
implemented along with encryption, allowing you to configure a secure
SNMP environment.
The SNMPv3 protocol uses different terminology than the SNMPv1 and
SNMPv2c. In the SNMPv1 and SNMPv2c protocols, the terms agent and
manager are used. An agent is the software within an SNMP user while a
manager is an SNMP host. In the SNMPv3 protocol, agents and
managers are called entities. In any SNMPv3 communication, there is an
authoritative entity and a non-authoritative entity. The authoritative entity
checks the authenticity of the non-authoritative entity. And, the non-
authoritative entity checks the authenticity of the authoritative entity.
With the SNMPv3 protocol, you create users, determine the protocol used
for message authentication as well as determine if data transmitted
between two SNMP entities is encrypted. In addition, you can restrict user
privileges by defining which portions of the Management Information
Bases (MIB) that a user can view. In this way, you restrict which MIBs a
user can display and modify. In addition, you can restrict the types of
messages, or traps, the user can send. (A trap is a type of SNMP
message.) After you have created a user, you define SNMPv3 message
notification. This consists of determining where messages are sent and
what types of messages can be sent. This configuration is similar to the
SNMPv1 and SNMPv2c configuration because you configure IP
addresses of trap receivers, or hosts. In addition, with the SNMPv3
implementation you decide what types of messages are sent.
This section further describes the features of the SNMPv3 protocol. The
following subsections are included:
“SNMPv3 Authentication Protocols” on page 276
“SNMPv3 Privacy Protocol” on page 277
“SNMPv3 MIB Views” on page 277
“SNMPv3 Configuration Process” on page 278
SNMPv3
Authentication
Protocols
The SNMPv3 protocol supports two authentication protocols - HMAC-
MD5-96 (MD5) and HMAC-SHA-96 (SHA). Both MD5 and SHA use an
algorithm to generate a message digest. Each authentication protocol
authenticates a user by checking the message digest. In addition, both
protocols use keys to perform authentication. The keys for both protocols
are generated locally using the Engine ID and the user password. You
modify a key only by modifying the user password.
Содержание AT-GS950/24
Страница 12: ...Figures 12 ...
Страница 14: ...List of Tables 14 ...
Страница 18: ...Preface 18 ...
Страница 29: ...AT GS950 24 Web Interface User Guide 29 Note You can add up to 10 IP address to the IP Access List table ...
Страница 60: ...Chapter 2 Basic Switch Configuration 60 ...
Страница 68: ...Chapter 3 Port Configuration 68 ...
Страница 74: ...Chapter 4 Port Mirroring 74 ...
Страница 94: ...Chapter 5 Virtual LANs 94 ...
Страница 102: ...Chapter 6 GVRP 102 ...
Страница 132: ...Chapter 8 STP and RSTP 132 ...
Страница 146: ...Chapter 9 Multiple Spanning Tree Protocol 146 ...
Страница 156: ...Chapter 10 Static Port Trunking 156 ...
Страница 178: ...Chapter 12 Quality of Service CoS 178 ...
Страница 206: ...Chapter 13 Access Control Configuration 206 ...
Страница 226: ...Chapter 15 MAC Address Table 226 ...
Страница 238: ...Chapter 16 DHCP Snooping 238 ...
Страница 244: ...Chapter 17 IGMP Snooping 244 ...
Страница 288: ...Chapter 21 Simple Network Management Protocol SNMPv3 288 ...
Страница 300: ...Chapter 22 RMON 300 ...
Страница 322: ...Chapter 24 Management Software Updates 322 ...
Страница 348: ...Appendix A MSTP Overview 348 ...
Страница 366: ...Appendix A AT GS950 24 Default Parameters 366 ...