SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Advertisements

Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
CCNA – Network Fundamentals
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Chapter 19: Network Management Business Data Communications, 4e.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 24 Network Management: SNMP.
Manajemen Jaringan dan Network Security Pertemuan 26 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Dr Alejandra Flores-Mosri Network Monitoring Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Explain.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
TCP/IP Protocol Suite 1 Chapter 21 Upon completion you will be able to: Network Management: SNMP Understand the SNMP manager and the SNMP agent Understand.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
CSEE W4140 Networking Laboratory Lecture 11: SNMP Jong Yul Kim
1 Pertemuan 26 Manajemen Jaringan dan Network Security Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
COMP4690, by Dr Xiaowen Chu, HKBU
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
SNMP Simple Network Management Protocol
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 Based on Behzad Akbari Fall 2011 Network Management lectures and These slides are based in parts upon slides of Prof. Dssouli (Concordia university )
SNMPv3 Yen-Cheng Chen Department of Information Management National Chi Nan University
Remote Monitoring and Desktop Management Week-7. SNMP designed for management of a limited range of devices and a limited range of functions Monitoring.
Chapter 6 Overview Simple Network Management Protocol
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
SNMP ( Simple Network Management Protocol ) based Network Management.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
SNMP (Simple Network Management Protocol)
Network Protocols UNIT IV – NETWORK MANAGEMENT FUNDAMENTALS.
SNMP ( Simple Network Management Protocol ) based Network Management.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
SNMP Simple Network Management Protocol Team: Matrix CMPE-208 Fall 2006.
9/15/2015© 2008 Raymond P. Jefferis IIILect Application Layer.
SNMP (Simple Network Management Protocol)
1 Introduction to Internet Network Management Mi-Jung Choi Dept. of Computer Science KNU
Network Management8-1 Chapter 8: Network Management Chapter goals: r introduction to network management m motivation m major components r Internet network.
Simple Network Management Protocol By - Suparna Sri.
Communication and Functional Models
BAI513 - PROTOCOLS SNMP BAIST – Network Management.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Network Management Security Behzad Akbari Fall 2009 In the Name of the Most High.
1 Version 3.0 Module 11 TCP Application and Transport.
CS 453 Computer Networks Lecture 22 Network Management.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Network Management Security
Chapter 19: Network Management Business Data Communications, 4e.
Simple Network Management Protocol (SNMP) SNMP v1 (RFC 1157) UDP Port 161 Operation supported by SNMP – Get: retrieves a scalar object value – Set: updates.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
SNMP.
Network Management Security
SNMP V2 & V3 W.lilakiatsakun. SNMP V2 Protocol RFC types of access to management information – Manager–agent request-response – Manager-Manager.
Network Management  introduction  Internet SNMP: Simple Network Management Protocol  required reading: section 7.3 in text.
Network Traffic Monitoring and Analysis - Shisheer Teli CCCF.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Jaringan Telekomunikasi, Sukiswo ST, MT Sukiswo
Simple Network Management Protocol
Computer and Information Security
Chapter 19: Network Management
Lec 5: SNMP Network Management
SNMP.
Fundamentals of Network Management
Lec 5: SNMP Network Management
SNMP (Simple Network Management Protocol) based Network Management
SNMP (Simple Network Management Protocol) based Network Management
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Presentation transcript:

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) VIJAY CHAND UYYURU VENKAT KANCHERLA PRATEEK ARORA

What is network management? Network management includes deployment, integration, and coordination of the hardware, software, and human elements to monitor, test, poll, configure, analyze, and control the network and element resources to meet the real-time , operational performance, and quality of service requirements at a reasonable cost.

Five areas of network management Performance management : to quantify, measure, report, analyze and control the performance of network components. Fault management : to log, detect, and respond to fault conditions in the network. Configuration management : allows a network manager to track which devices are on the managed network and the hardware and software configurations of these devices. Accounting management : allows the network manager to specify, log, and control user and devices access to network resources. Security management : to control access to network resources according to some well defined policy.

Protocols for Network management CMISE/CMIP (the Common Management Information Services Element/Common Management Information Protocol ) SNMP (Simple Network Management Protocol) Disadvantages of CMIP over SNMP the CMIP protocol takes more system resources than SNMP by a factor of ten CMIP is large and complete management system that only the best equipped networks can afford to run it. advantage of SNMP over CMIP is that its design is simple Disadvantages of SNMP Because it is so simple, the information it deals with is neither detailed, nor well organized enough to deal with the growing networks (corrected in later versions).

Evolution of SNMP In early days of the ARPANET, they used ping to detect the problem. When ARPANET turned into WWW, better tools to network management are needed. SNMP provided a systematic way of monitoring and managing a computer network. Three versions in SNMP SNMPv1 : The initial implementation of the SNMP protocol, which is described in RFC 1098 and RFC 1157 SNMPv2 : An improved version of SNMPv1 that includes additional protocol operations for the SNMPv2 Structure of Management Information (SMI) (RFC 1441-1452) SNMPv3 : SNMPv3 has yet to be standardized

What is SNMP? The Simple Network Management Protocol (SNMP) is an application-layer protocol that facilitates the exchange of management information between a network management system (NMS), agents, and managed devices. SNMP uses the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP is a part of Internet network Architecture SNMP enables network administrators to manage network performance, find and solve network problems, and plan for network growth.

Purpose of SNMP Although the original purpose of SNMP was to let network administrators remotely manage an Internet system, the design of SNMP lets network administrators manage applications as well as systems. Lets you manage and monitor all network components from one console

Network management architecture

Components of a managed network Managed nodes Agent Management stations Management Information Base (MIB) A management protocol

Management stations General-purpose computers running special software The management station contain one or more processes that communicate with agents over the network, issuing commands and getting responses An NMS (network management station) executes applications that monitor and control managed devices. It controls the collection, processing, analysis, and display of network management information NMSs provide the bulk of the processing and memory resources required for network management.

Managed device A managed device is a network node that contains an SNMP agent and that resides on a managed network Managed devices collect and store management information and make this information available to NMSs using SNMP A managed device might be a host, router, bridge, hub, printer, or modem.

Agent a network-management software module that resides in a managed device that communicates with management stations. An agent has local knowledge of management information and translates that information into a form compatible with SNMP.

SNMP Management information base Each device maintains one or more variables that describes its state. These variables are called objects. The collection of all objects in a network is given in a datastructure called MIB (management information base) MIBs are accessed using a network-management protocol such as SNMP and identified by object identifiers. The MIB hierarchy can be depicted as a tree with a nameless root, the levels of which are assigned by different organizations. When an SNMP manger requests information from an SNMP agent, the SNMP agent retrieves the current value of the requested information from the Management Information Base (MIB).

Network management protocol The protocol runs between the managing entity and managed device. Allows managing entity to query the status of managed device Agents use it to inform the managing entity of exceptional events. Data are sent using the ASN.1(abstract syntax notation one) transfer syntax. The structure of management information, SMI, is the language used to define the management information residing in a managed-network entity. SMI is used to ensure that the syntax and semantics of the network management data are well defined.

Windows Server 2003 SNMP Components at Each TCP/IP Layer

Windows Server 2003 SNMP Components Component Name Associated Programs Component Type Description Microsoft SNMP Service Snmp.exe Agent Receives SNMP requests and delivers them to the appropriate SNMP subagent DLL for processing. The service is also responsible for intercepting events (traps) from the SNMP subagents and forwarding trap messages to the appropriate management systems. SNMP Subagents Inetmib1.dll, Hostmib.dll, Lmmib2.dll, and others Provides a set of entry points. When an SNMP request is received, the SNMP service delivers it to the appropriate subagent by calling one of these entry points. After the subagent processes the message, it passes the information back to the SNMP service, which then forwards the message to the SNMP manager. SNMP Utility API Snmpapi.dll Both Agent and Manager Provides utilities that the SNMP service uses for memory management operations, address-decoding routines, object identifier handling routines, and so forth. Provides a set of routines that SNMP subagents use to handle and order SNMP objects. Although use of the Snmpapi.dll is not required, the framework defined by this tool greatly facilitates the development of new SNMP subagents. SNMP Trap Service Snmptrap.exe Manager Uses the WinSNMP API to forward a trap message sent by an SNMP agent to the appropriate SNMP manager application

Windows Server 2003 SNMP Components Component Name Associated Programs Component Type Description WinSNMP API -and- Management API Wsnmp32.dll Mgmtapi.dll Manager Helps develop SNMP management software applications: •The WinSNMP API provides a set of functions for encoding, decoding, sending, and receiving SNMP messages .•The Management API is a simple API that resides on top of the WinSNMP and SNMP Utility APIs. It provides a limited set of functions that you can use to develop basic SNMP management applications quickly. SNMP Manager Application Snmputil.exe Provides a basic command-line utility with which to retrieve information from any SNMP agent in your network. This example of a management application was developed using the Management API.

SNMP Protocol Basics SNMP does not manage the network by itself but instead provides a tool for the manager to manage the corresponding devices. The preferred transport protocol for carrying SNMP messages is UDP and the preferred port number for the SNMP is port 161. Port 162 is used for trap messages.

SNMP Management Systems and Agents SNMP manager: An SNMP manager, also known as an SNMP management system or a management console, is any computer that sends queries for IP-related information to a managed computer, known as an SNMP agent. SNMP agent: An SNMP agent is any computer or other network device that monitors and responds to queries from SNMP manager. The SNMP manager displays the information it receives. The SNMP agent does not display the information that it sends to an SNMP manager.

SNMP Community To enable SNMP communications between an SNMP manager and SNMP agents, we configure the SNMP manager and the SNMP agents that it manages as members of an SNMP community. The community name functions like a password to authenticate communications between the SNMP manager and agent. The SNMP community is an SNMP-defined group.

SNMP Community A community name acts as a password that is shared, typically by multiple SNMP agents and one or more SNMP managers. We configure the SNMP manager and the computers or devices that it manages as members of a single SNMP community. An SNMP agent only accepts requests from SNMP managers that are on the agents list of acceptable community names.

Understanding the Management Information Base (MIB) When an SNMP manager requests information from an SNMP agent, the SNMP agent retrieves the current value of the requested information from the Management Information Base (MIB). The MIB defines the managed objects that an SNMP manager monitors on an SNMP agent. Each system in a network maintains a MIB that reflects the status of the managed resources on that system, such as the version of the software, amount of free hard drive space etc.

Manager Requesting number of Sessions from an SNMP Agent

Manager Requesting number of Sessions from an SNMP Agent The SNMP manager, Host A, forms an SNMP message that contains an information request(Get) for the number of active sessions, the name of the community to which the SNMP manager belongs, and the destination of the message – the IP address of the SNMP agent, Host B. The SNMP manager sends the information request to Host B by using the SNMP service libraries.

Manager Requesting number of Sessions from an SNMP Agent When Host B receives the message, it verifies that the community name contained in the packet is on its list of acceptable community names, evaluates the request against the agents list of access permissions for that community, and verifies the source IP address. If the information is incorrect then the agent sends a trap message “authentication failure” to the specified trap destination, Host C. The master agent component of the SNMP agent calls the appropriate extension agent to retrieve the requested session information from the MIB.

Manager Requesting number of Sessions from an SNMP Agent Using the session information that it retrieved from the extension agent, the SNMP service forms a return SNMP message that contains the number of active sessions and the destination – the IP address of the SNMP manager, Host A. Host B sends the response to Host A.

Information Types An SNMP manager can request the following types of information from the SNMP agents that it monitors: Network protocol identification and statistics. Dynamic identification of devices attached to the network. Hardware and software configuration data. Device error and event messages. Program and application usage statistics.

SNMP Messages SNMP sends operation requests and responses as SNMP messages. An SNMP message consists of an SNMP protocol data unit (PDU) plus additional message header elements defined by the relevant RFC. An SNMP agent sends information in two situations: When it responds to a request from an SNMP manager and When a trap event occurs.

SNMP Message Types Get: Accesses and retrieves the current value of one or more MIB objects on an SNMP agent. GetResponse: Replies to a Get, GetNext, or Set operation. GetNext: Obtains the information from selected columns from one or more rows of a table. GetBulk: Accesses multiple values at one time without using GetNext message. Set: Changes the current value of an MIB object. Trap: Notifies the SNMP manager when an unexpected event occurs locally on the managed host. All the above messages except Trap and GetResponse are from Manager to Host.

SNMP Message Types

Message Sent Between an SNMP Manager and its Managed Devices

SNMP Basic Message Format

SNMP Message Header SNMPv2 message headers contain two fields: Version Number and Community Name. The following descriptions summarize these fields: Version number—Specifies the version of SNMP that is being used. Community name—Defines an access environment for a group of NMSs. NMSs within the community are said to exist within the same administrative domain. Community names serve as a weak form of authentication because devices that do not know the proper community name are precluded from SNMP operations.

PDU Formats Get, GetNext, Response, Set, and Trap PDUs Contain the Same Fields.

SNMP Protocol Data Unit (PDU) The following descriptions summarize the fields illustrated in Figure: PDU type—Identifies the type of PDU transmitted (Get, GetNext, Inform, Response, Set, or Trap). Request ID—Associates SNMP requests with responses.

SNMP Protocol Data Unit (PDU) Error status—Indicates one of a number of errors and error types. Only the response operation sets this field. Other operations set this field to zero. Error index—Associates an error with a particular object instance. Only the response operation sets this field. Other operations set this field to zero. Variable bindings—Serves as the data field of the SNMPv2 PDU. Each variable binding associates a particular object instance with its current value (with the exception of Get and GetNext requests, for which the value is ignored).

SNMP Applications Command generator: The command generator generates the GetRequest, GetNextRequest, GetBulkRequest, and SetRequest PDUs and handles the received responses to these PDUs. The command responder executes in an agent and receives, processes, and replies to received GetRequest, GetNextRequest, GetBulkRequest, and SetRequest PDUs.

SNMP Applications Notification originator: The notification originator application in an agent generates Trap PDUs; these PDUs are eventually received and processed in a notification receiver application at a managing entity. Proxy forwarder: The proxy forwarder application forwards request, notification, and response PDUs.

SNMP Vulnerability and Security

WHAT ARE THE THREATS? Modification of Information The modification threat is the danger that some unauthorized entity may alter in-transit SNMP messages generated on behalf of an authorized principal in such a way as to effect unauthorized management operations, including falsifying the value of an object.

WHAT ARE THE THREATS? (contd.) Masquerade The masquerade threat is the danger that management operations not authorized for some user may be attempted by assuming the identity of another user that has the appropriate authorizations.

WHAT ARE THE THREATS? (contd.) Disclosure The disclosure threat is the danger of eavesdropping on the exchanges between managed agents and a management station. Protecting against this threat may be required as a matter of local policy.

WHAT ARE THE THREATS? (contd.) Message Stream Modification The SNMP protocol is typically based upon a connection-less transport service which may operate over any sub-network service. The re-ordering, delay or replay of messages can and does occur through the natural operation of many such sub-network services. The message stream modification threat is the danger that messages may altered, in order to effect unauthorized management operations.

WHAT IS NOT A THREAT? Denial of Service The current SNMP security model does not attempt to address the broad range of attacks by which service on behalf of authorized users is denied. Indeed, such denial-of-service attacks are in many cases in distinguishable from the type of network failures with which any viable network management protocol must cope up with.

WHAT IS NOT A THREAT? (contd.) Traffic Analysis The current SNMP security model does not attempt to address traffic analysis attacks. Indeed, many traffic patterns are predictable – devices may be managed on a regular basis by a relatively small number of management applications – and therefore there is no significant advantage afforded by protecting against traffic analysis.

GOALS AND CONSTRAINTS Based on the foregoing account of threats in the SNMP network management environment, the goals of a SNMP security model are as follows: Provide for verification that each received SNMP message has not been modified during its transmission through the network. Provide for verification of the identity of the user on whose behalf a received SNMP message claims to have been generated.

GOALS AND CONSTRAINTS (contd.) Provide for detection of received SNMP messages, which request or contain management information, whose time of generation was not recent. Provide, when necessary, that the contents of each received SNMP message are protected from disclosure.

SECURITY SERVICES Data Integrity is provision of the property that data or data sequences has not been altered or destroyed in an unauthorized manner. Data Origin Authentication is the provision of the property that the claimed identity of the user on whose behalf received data was originated is corroborated.

SECURITY SERVICES (contd.) Data Confidentiality is the provision of the property that information is not made available or disclosed to unauthorized individuals, entities, entities, or processes. Message timeliness and limited replay protection is the provision of the property that a message whose generation time is outside of a specified time window is not accepted.

VULNERABILITY Following are some of the SNMP vulnerabilities with reference to CERT database. Vulnerability Note VU#4923: The Microsoft SNMP agent, prior to Windows NT 4.0 Service Pack 4.0, will leak memory. An intruder can craft a malicious SNMP packet and consume memory on a victim host. Solution is to upgrade to Windows NT service pack 4 or later. Vulnerability Note VU#173910: A vulnerability exists in multiple Symantec security appliances that could allow a remote attacker to modify the configuration of the device using SNMP. Solution according to the Symantec Advisory is to update the firmware from Symantec enterprise website.

VULNERABILITY (contd.) Vulnerability Note VU#835846: Ethereal contains a vulnerability in the way it processes that fails to properly handle malformed SNMP packets. Solution is to either upgrade to version 0.10.5 or later, or to disable SNMP protocol dissector. Vulnerability Note VU#329230: A vulnerability exists in multiple Symantec security appliances that could allow a remote attacker to bypass the firewall using a source port of 53/udp. Solution according to the Symantec Advisory, is to upgrade the product specific firmware and hot fixes are available via the Symantec Enterprise Support site.

Review questions What are the five areas of network management and explain them? What is the purpose of SNMP? What are the components in network management architecture and define them? What are the types of messages between SNMP manager and agent?