background image

Chapter 4: Remote Management HTTP and SNMP

the HTTP management password is lost or forgotten, it may be reset by accessing the HTTP management 
settings within the first minute after powerup and with no BNC cables attached to the unit.

SNMP statistics may initially be accessed using the read-only community name 

public

.  Write-community 

names and variable access authorization may be set through the HTTP management interface.

Security

Please also refer to the password section above.

HTTP Interface Security

Access to the HTTP management interface statistics and settings pages can be selectively limited to users 
knowing the HTTP management password, which is transmitted securely on the network using MD5 
encoding.  New values of management settings, or modifications of the administrator password are not 
encrypted and are visible to users monitoring network packets, as is statistical data requested by an MD5 
authorized user or any information visible on a HTTP page.

When logging out from any secure webpage, the browser window should always be closed!

  Browsers 

typically continue to send administrator credentials continuously even after apparent logout.

SNMP Security

The Monitor implements SNMPv2c, which is inherently an insecure protocol; however, the Monitor 
enhances security by implementing view-based access management (VACM), which can restrict read or 
write access to specific management settings and statistics.  When shipped, the Monitor allows read access 
to “safe” SNMP statistics and prohibits read and write access to statistics and settings which could allow 
determination of network topology or interfere with normal link traffic.  The VACM configuration can be 
updated through the HTTP management interface to meet the user's needs, and most SNMP variables can 
also be set through the HTTP management interface in a more secure manner than SNMP allows.

–  SNMP VACM Security Warning  –

As shipped, the default “safe_ro_view” is secure but not private.

View based access model VACM for SNMPv2c provides good restriction

 of access to only specified statistics but no data privacy and 

 minimal user authentication. When a specific variable is enabled

 for reading or writing, from a security perspective it should

 be considered either public for reading or public for writing.

Alternatively, most configuration parameters can be set through

 the HTTP password-protected interface which is secure.

Viewing snmpd.conf exposes it and community names to visibility by 

 3rd party network sniffers. All SNMPv2c data on the network 

 is visible. All community names can be "guessed" and, when used,

 become visible to sniffers. Source IP addresses of requests

 can be forged. Enabling a write community should be considered

 insecure with respect to the specific view variables enabled.

Variables in the groups: interface, ds3, dot3 & mau, control the

 link datapath; allowing write access allows disabling the link.

Specific variables disabled for all write users are secure.

 Specific statistics disabled for all read users are invisible

 and secure.

HTTP  Management

The Monitor contains a comprehensive, user-friendly HTTP management interface which allows a manager 
to monitor bit-error-rates on the DS3/E3 link, lost packets, and user-friendly status messages at a single, 

10

Содержание WAN Monitor

Страница 1: ...DS3 E3 WAN Monitor with Ethernet Output for HDLC PPP Applications V5 4 September 14th 2011 Operating Information...

Страница 2: ...ronado Ave San Carlos CA 94070 U S A http www ds3switch com support ds3switch com TEL 1 650 241 9941 FCC STATEMENT This device complies with Part 15 of the FCC Rules Operation is subject to the follow...

Страница 3: ...quipment were derived for commercial and industrial environments to provide reasonable protection against interference with licensed communication equipment Attention This is a Class A product In a do...

Страница 4: ...FIGURATION 12 TELECOM 12 Circuit Clock Speed 12 DS3 Circuit ID PMDL 12 PORT TO PORT PACKET FLOW 12 LAN to LAN 12 Loopback 12 LAN PORT SETTINGS 12 LAN Port Speed 13 Autonegotiation Problems 13 SFP Seco...

Страница 5: ...NOSIS 17 CHAPTER 11 THIRD PARTY COPYRIGHT NOTICES 18 ECOS LICENSE 18 THE FREEBSD COPYRIGHT 18 THE NET SNMP COPYRIGHT 18 THE APACHE LICENSE 20 THE SHA2 COPYRIGHT 21 THE BZIP2 LICENSE 21 THE ATHTTPD LIC...

Страница 6: ...evel MAC header VLAN Ethertype MPLS and pseudowire control word are all manually specified in the unit s configuration settings For ease of installation the Monitor does not require a configuration se...

Страница 7: ...e Out ports are not utilized and may be left open Once the monitor is receiving a valid TDM signal without alarms the DS3 E3 Port LED will change from orange to green Refer to the management chapter o...

Страница 8: ...Pv2c agent through either LAN port if second SFP LAN port has been purchased enabled Unit s IP MAC Address The source Ethernet MAC address of E3Switch Monitors is 00 50 C2 6F xx xx The Monitor s curre...

Страница 9: ...current IP and MAC addresses are both shown at the HTTP management screen Unknown IP Address Recovery The following methods may be used to determine a Monitor s IP address if lost or forgotten Note th...

Страница 10: ...ess to statistics and settings which could allow determination of network topology or interfere with normal link traffic The VACM configuration can be updated through the HTTP management interface to...

Страница 11: ...strict access to safe statistics and settings Please refer to the security discussion section of this document SNMP configuration of various parameters such as community names and trap destinations is...

Страница 12: ...t timing diagnosis DS3 Circuit ID PMDL DS3 Path Maintenance Data Link PMDL identification messages associated with C Bit framed DS3 links may be received Circuit ID messages convey human readable conf...

Страница 13: ...han one LAN port to 1000Mbit s is not recommended and may result in underflow overflow errors in certain high packet load memory intensive cases Autonegotiation Problems There are rare cases with olde...

Страница 14: ...ackets are being lost In such a case autonegotiation should be disabled on both the Monitor and the attached LAN equipment with both forced to 100BaseTX full duplex Autonegotiation interoperability an...

Страница 15: ...sources of external noise Third party fiber to copper media Monitors can be used with the E3Switch Monitor to implement fiber optic DS3 E3 links however refer to the interoperability section of this...

Страница 16: ...nistration screen will be truncated to fit within the specified LAN MTU 9600 byte jumbo MTU capability may be purchased as an option Transport Layer LAN packets are configured with simple MAC Layer 2...

Страница 17: ...machine which then returns a response packet There is a plethora of information about ping and the free public domain ping utilities available Ping is often supplied as a standard operating system uti...

Страница 18: ...and received Free public domain programs such as Wireshark are readily available Chapter 11 Third Party Copyright Notices E3Switch is grateful for and contributes to open source software development w...

Страница 19: ...SS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT...

Страница 20: ...Works thereof that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner For...

Страница 21: ...sibility of such damages 9 Accepting Warranty or Additional Liability While redistributing the Work or Derivative Works thereof You may choose to offer and charge a fee for acceptance of support warra...

Страница 22: ...Chapter 12 Technical Specifications and Standards Chapter 12 Technical Specifications and Standards Please see separate specification datasheet 22...

Отзывы: