Management Architecture and Standards II IACT 418 IACT 918 Corporate Network Planning Gene Awyzio Spring 2001.

Slides:



Advertisements
Similar presentations
Chapter 19: Network Management Business Data Communications, 5e.
Advertisements

CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
CCNA – Network Fundamentals
Chapter 19: Network Management Business Data Communications, 4e.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Pertemuan 10 Perbedaan antar versi SNMP
NS-H /11041 SNMP. NS-H /11042 Outline Basic Concepts of SNMP SNMPv1 Community Facility SNMPv3 Recommended Reading and WEB Sites.
1 SNMP Simple Network Management Protocol. 2 SNMP Overview Define mechanism for remote management of network devices (routers, bridges, etc.) Fundamental.
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
1 System support & Management Protocols Lesson 13 NETS2150/2850 School of Information Technologies.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
COMP4690, by Dr Xiaowen Chu, HKBU
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP & MIME Rizwan Rehman, CCS, DU. Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems.
SNMP Simple Network Management Protocol
Chapter 6 Overview Simple Network Management Protocol
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
SNMP: Simple Network Management Protocol
SNMP (Simple Network Management Protocol)
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
SNMP Simple Network Management Protocol Team: Matrix CMPE-208 Fall 2006.
Basic tasks that fall under this category are: What is Network Management? Fault Management Dealing with problems and emergencies in the network (router.
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
Network Management8-1 Chapter 8: Network Management Chapter goals: r introduction to network management m motivation m major components r Internet network.
Protocols and the TCP/IP Suite
Communication and Functional Models
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Network Management Security
POSTECH DP&NM Lab 1 Simple Network Management Protocol (SNMP) Mi-Jung Choi Dept. of Computer Science KNU
Simple Network Management Protocol (SNMP) SNMP v1 (RFC 1157) UDP Port 161 Operation supported by SNMP – Get: retrieves a scalar object value – Set: updates.
Management Architecture and Standards IACT 418 IACT 918 Corporate Network Planning Gene Awyzio Spring 2001.
Internet Standard Management Framework
SNMP 1. SNMP is an Internet protocol developed by the IETF. It is designed to facilitate the exchange of management information between network elements.
SNMPv3 1.DESIGN REQUIREMENTS 2.BIRTH & FEATURES of SNMPv3 3.ARCHITECTURE 4.SECURE COMMUNICATION - USER SECURITY MODEL (USM) 5. ACCESS CONTROL - VIEW BASED.
“ Vulnerabilities in SNMP Implementations ” CSCI Web Security Instructor: Dr. Andrew Yang Presented By: Harini Varatharajan.
SNMP.
Network Management Security
1 Kyung Hee University Prof. Choong Seon HONG SNMP Network Management Concepts.
CITA 440 Week 6 SNMPv1. Internet SNMP Management Internet Engineering Task Force (IETF) –1990SNMPv1 –1996SNMPv2 –1998SNMPv3 Internet documents: –Request.
Chapter 9 Network Management
Dept. of Computer Science and Engineering
Common Management Protocol W.lilakiatsakun. Topics SNMP (Widely used) SNMP (Widely used) Command Line Interface (CLI) Command Line Interface (CLI) Syslog.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Network Management Security in distributed and remote network management protocols.
Jaringan Telekomunikasi, Sukiswo ST, MT Sukiswo
Computer and Information Security
Simple Network Management Protocol (SNMP)
Chapter 19: Network Management
SNMP.
Simple Network Management Protocol (SNMP)
Network Management: SNMP
Lec 5: SNMP Network Management
Introduction to Internet Network Management
Fundamentals of Network Management
Lec 5: SNMP Network Management
SNMP (Simple Network Management Protocol) based Network Management
Network Management Security
Presentation transcript:

Management Architecture and Standards II IACT 418 IACT 918 Corporate Network Planning Gene Awyzio Spring 2001

SNMP - the Management Protocol Used for TCP/IP SNMP includes the following key capabilities: Get Set Trap The standards do not specify The number of management stations The ratio of management stations to agents

SNMP - the Management Protocol Used for TCP/IP In general, it is prudent to have at least two systems capable of performing the management station functions As SNMP is simple it can handle many agents SNMP is designed to be an application-level protocol that is part of the TCP/IP protocol suite which operates over the user datagram protocol (UDP)

SNMP - the Management Protocol Used for TCP/IP

From a management station, three types of SNMP messages are issued on behalf of a management application: GetRequest GetNextRequest SetRequest

SNMP - the Management Protocol Used for TCP/IP The first two are two variations of the get function All three messages are acknowledged by the agent in the form of a GetResponse message, which is passed up to the management application

SNMP - the Management Protocol Used for TCP/IP An agent may issue a trap message in response to an event that affects the MIB and the underlying managed resources - this is received by the manager SNMP relies on UDP, which is connectionless so SNMP is itself connectionless ie each exchange is a separate transaction between a management station and an agent

Trap - Directed Polling Preferred strategy is: A management station can poll all of the agents it knows for some key information Once the baseline is established, the management station refrains from polling Each agent is responsible for notifying the management station of any unusual event

Trap - Directed Polling These events are communicated in SNMP messages known as traps Once a management station is alerted to an exception condition, it chooses to take the appropriate action

Trap - Directed Polling Trap-directed polling can result in substantial savings of Network capacity Agent processing time Reduces unnecessary polling of agents by managers thus reducing management induced network traffic

Limitations of SNMP SNMP may not be suitable for the management of very large networks Each agent needs to be polled and generates trap traffic SNMP is not suited to retrieving large volumes of data such as a entire routing table SNMP traps are unacknowledged meaning the agent generating the trap does not know if the manager received it

Limitations of SNMP Basic SNMP standard only provides trivial authentication SNMP does not directly support imperative commands with parameters, conditions, status and results

Limitations of SNMP SNMP MIB model is limited not supporting sophisticated management queries based on object values or types SNMP does not support manager to manager communications ie no mechanism for one manager to find out about another network managers, managed network elements

SNMPv2 :1991/1992 Networks grow larger and larger SNMPv1 became more and more inadequate OSI implementations and standardization were still not ready Network managers recognised this, so the call went out for an extension to SNMP in the mean time till OSI’s CMIP became available

SNMPv2 :1991/1992 One major flaw SNMPv1 did not have any security facilities For this reason SNMPv1 network human managers often disabled the ‘set’ PDU crippling the network management facility

Adding Security To address this problem a set of RFC’s called ‘secure SNMP’ was issued as proposed in July 1992 secure SNMP did not address other deficiencies related to performance and functionality of SNMPv1 SMP was also issued in July 1992 as a set of 8 documents, they were not RFC’s They constituted a private proposal to the internet community to upgrade SNMPv1

SMP The proposed extensions defined in SMP fell into three categories Scope Size, speed, and efficiency Security and privacy

SMP and Secure SNMP The ‘Internet community’ came to the consensus that there should be a second generation SNMP that would include both security and functional enhancements enable users and vendors to make a smooth transition from SNMPv1 to what becomes known as SNMPv2

Adding Security Two working groups were formed: one for security aspects one for all other aspects such as protocol and management information Work began in October 1992 to be completed March 1993, but was completed by end of 1992

Adding Security The work of the two groups was combined and published as proposed internet standards in March 1993 SNMPv2 was revised in 1996 by an IETF task Force New RFC’s contained no security! The rest of the standard experienced minor changes

Community The standard SNMPv2 makes use of the SNMPv1 message wrapper, with its use of the community concept This “administrative framework” for SNMPv2 is termed “community based snmpv2” or SNMPv2c

Community In SNMPv1 an SNMP community is a relationship between A SNMP agent A set of SNMP managers That defines authentication, access control, and proxy characteristics

Community In SNMPv1 Communities are defined locally within the agent  Each community is given a unique (within the agent) community name The management station must keep track of and store all the community names of each of its managed agents  The management stations within the community are provided with and must use this community name in all set and get operations with this agent There is no reason why the same name may not be used by different agents - as the agent uses this name locally

Community The SNMPv2 message is wrapped with a PDU in a SNMPv1 format including a version number A community name

What Happened to the Security? Little enthusiasm among vendors and users for the way in which security was specified in the 1993 documents When the work began on the 1996 documents, it was hoped that some minor tune-ups to the security portion would suffice As the effort was nearing completion it was shown that the security portion of snmpv2 was fatally flawed!

What Happened to the Security? To make a long story short, there was an extension of the deadline for completing the new snmpv2 documents to allow time for a new consensus to develop on a new security specification Deadlock occurred No consensus reached Time ran out Then the plug was pulled on the process and the new snmpv2 was issued without security enhancements

What Happened to the Security? This decision had the advantage of solidifying the specification of the many functional enhancements found in snmpv2, but leads onto the need for another version of SNMP (version 3)

Standards RFCTitle 1901 Introduction to community-based SNMPv Structure of management information for SNMPv Textual conventions for SNMPv Conformance statements for SNMPv Protocol operations for SNMPv Transport mappings for SNMPv Management information base for SNMPv Coexistence between version 1 and version 2 of the internet-standard network management framework

SNMPv2 Enhancements An overall change implemented in SNMPv2 is that it can support either a highly centralized network management strategy or a distributed one For distributed some systems can operate as both a manager and a agent

SNMPv2 Enhancements For a system acting in dual modes of agent and manager it: accepts commands from a superior management system it can also issue trap messages to the superior manager

SNMPv2 Enhancements The key enhancements to SNMP that are provided in SNMPv2 fall into the following categories: Structure of management information (SMI) Manager-to-manager capability Protocol operations

SNMPv2 Protocol operations enhancements (over SNMPv1) The most noticeable change in protocol operations is the inclusion of two new PDUs: GetBulkRequest PDU : enables the manager to retrieve large blocks of data efficiently --- it is well suited to retrieving multiple rows in a table eg routing table. InformRequest PDU : enables one manager to send trap type of information to another manager.

SNMPv1 and SNMPv2 coexistence SNMPv2 was designed to co-exist with SNMPv1 This involved two areas of the standards: management information protocol operations Two approaches are described in the standard:  use of proxy agents  use of bilingual managers

For the proxy agent:

The main point here is that GetBulkRequest is converted to a GetNextRequest with only the first “row” of the table or variables being accessible (but the device is SNMPv1 enabled so its expecting that this is the norm)

For the bilingual manager:

This setup requires the manager to be able to handle both protocols and manager SNMPv1 and SNMPv2 agents While SNMPv2 provided enhancements in functionality, especially in the manager to manager functions, the lack of security still inhibits the secure use of SNMP on managed networks.