19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

5. Trap: used by agents in order to inform the manager of exceptional events.<br />

Unlike a GetResponse message, a Trap message is not preceded by a query<br />

from the manager.<br />

<strong>The</strong> essential advantages and disadvantages are:<br />

+ SNMP has a simple design and is thus easy to implement. This reduces its<br />

susceptibility to faults and improves the stability of the protocol.<br />

+ SNMP is used on a widespread basis and is regarded as a de-facto standard.<br />

As a result, it is supported by nearly all products in network and system<br />

technology.<br />

+ <strong>The</strong> protocol can be adapted very easily to future requirements. For this<br />

reason as well as the above-mentioned widespread use of SNMP, this<br />

protocol can be considered extremely future-oriented, thus providing a high<br />

degree of investment protection.<br />

+ SNMP is a simple, connectionless protocol on the transport level.<br />

Consequently, the transmission of SNMP packets in a network is more<br />

efficient compared with the connection-oriented CMIP.<br />

- <strong>The</strong> use of SNMP harbours security risks which could allow intruders to<br />

obtain detailed information on the system and network environment.<br />

Except for the community names (which, in the case of SNMP, allow the<br />

formation of groups and provide basic password protection), no real<br />

password protection is available for access to network components.<br />

- Due to its simple nature and the features it possesses, the SNMP protocol<br />

exhibits shortcomings when operated in very large or rapidly expanding<br />

networks.<br />

- <strong>The</strong> performance of version 1 proves inadequate in the case of complex<br />

MIB queries, as the complete MIB tree always needs to be specified.<br />

One of the main disadvantages of version 1 of the SNMP is that it does not<br />

support authentication for access to monitored components. Version 2 of the<br />

SNMP compensates for some of these disadvantages and provides better<br />

performance in the handling of MIB queries.<br />

However, different variants of SNMPv2 exist in terms of the security features<br />

supported. Only the variants SNMPv2* and SNMPv2u offer the possibility of<br />

symmetric, user-based authentication, while SNMPv2c continues to rely on<br />

communities. In SNMP, communities are firstly used to classify individual<br />

network components into groups, and secondly used as substitute passwords<br />

during access to these groups. SNMPv2* also offers the possibility of data<br />

encryption in accordance with the Data Encryption Standard in the Cipher<br />

Block Chaining Mode (DES-CBC). Due to the different variants of SNMPv2<br />

presently in use, manufacturers of network components and network<br />

management systems are quite uncertain about their installation strategies, as a<br />

result of which implementations based on SNMPv2 are not yet encountered on<br />

a widespread scale, and are only inter-operable to a restricted extent.<br />

<strong>The</strong> different variants of SNMPv2 are to be consolidated in the next SNMP<br />

version (SNMPv3). <strong>The</strong> release of SNMPv3 is currently being prepared but<br />

has not yet been completed.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!