19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

For the above-mentioned reasons, only the use of SNMPv1 is recommended<br />

from the perspective of <strong>IT</strong> baseline protection. If the network management<br />

protocol or the network security features need to fulfil additional security<br />

requirements, use should be made of SNMPv2u or SNMPv2* with user-based<br />

authentication, or of CMIP. In principle, aspects related to confidentiality and<br />

authenticity are evidently supported to a greater extent by more recent<br />

versions of SNMP, although this advantage is accompanied by losses in<br />

bandwidth.<br />

CMIP<br />

In contrast to SNMP, CMIP is based on an implemented OSI protocol stack<br />

(OSI layers 1 to 3 are implemented as a protocol stack) and is thus also<br />

connection-oriented. This restricts the use of CMIP to components which<br />

fulfil hardware-related and software-related requirements for the<br />

implementation of a complete OSI stack. Due to the high demands placed by<br />

this implementation, a "CMIP Over TCP/IP" (CMOT) was also defined (RFC<br />

1189). This allows CMIP to be operated in pure TCP/IP networks too.<br />

One of the objectives of the CMIP concept was to develop an object-oriented<br />

management system. Accordingly, CMIP has a consistently object-oriented<br />

design. A CMIP machine (CMIPM) performs the tasks which are assigned to<br />

the manager under SNMP. This CMIPM, which consists of a software<br />

program like the SNMP manager, receives service requests from the agents of<br />

the objects to be managed to perform various operations; in response, the<br />

CMIPM sends CMIP messages to these agents. In accordance with objectoriented<br />

principles, the objects are managed via several trees which exhibit<br />

different mutual relations and are characterised by different types of access.<br />

Due to its object-oriented design, CMIP is a very powerful and complex<br />

protocol. However, this protocol contains relatively few operations which<br />

allow full management on the basis of the above-mentioned object-oriented<br />

structure.<br />

<strong>The</strong> essential advantages and disadvantages are:<br />

+ Due to its object-oriented design, CMIP offers many more possibilities<br />

than SNMP, including the execution of actions and the management of<br />

instances of management objects.<br />

+ CMIP offers more security than SNMP, particularly through the<br />

availability of mechanisms for access control, user authentication and<br />

auditing.<br />

+ <strong>The</strong> CMIP protocol is defined by OSI, thus constituting an official,<br />

international standard, whereas SNMP is only regarded as a de-facto<br />

standard based on a RFC.<br />

+ CMIP does not have the afore-mentioned shortcomings of SNMP.<br />

- CMIP is a very complex protocol, whose diverse features are rarely<br />

required or capable of being used in its entirety. Due to the large number of<br />

possible settings, an elaborate configuration of this protocol is very<br />

difficult, and requires a great deal of know-how on the part of the<br />

administrator.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!