1999
DOI: 10.17487/rfc2574
|View full text |Cite
|
Sign up to set email alerts
|

User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3)

Abstract: User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

1999
1999
2008
2008

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 128 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…ILMI uses simple network management protocol (SNMP) [10,25] to exchange information between switches and end systems in the UNI case or between peer switches in the PNNI case. It is highly recommended that SNMP Version 3 (SNMPv3) [9,11,30] be implemented using the appropriate SNMP security level of the authentication protocol identifier. If the network application requires additional security, the authentication protocol identifier and the privacy protocol identifier may be set.…”
Section: Required Information Elementsmentioning
confidence: 99%
See 1 more Smart Citation
“…ILMI uses simple network management protocol (SNMP) [10,25] to exchange information between switches and end systems in the UNI case or between peer switches in the PNNI case. It is highly recommended that SNMP Version 3 (SNMPv3) [9,11,30] be implemented using the appropriate SNMP security level of the authentication protocol identifier. If the network application requires additional security, the authentication protocol identifier and the privacy protocol identifier may be set.…”
Section: Required Information Elementsmentioning
confidence: 99%
“…If the network application requires additional security, the authentication protocol identifier and the privacy protocol identifier may be set. Strong key generation and key management procedures used for SNMPv3 [9] directly impact the strong key distribution and management scheme for ILMI. SNMP Version 1 (SNMPv1) has many security deficiencies, including the lack of authentication and message confidentiality mechanisms, and should not be used.…”
Section: Required Information Elementsmentioning
confidence: 99%
“…A second version of the SNMP message protocol, which is not an Internet standards track protocol, is called SNMPv2c and described in RFC 1901 [9] and RFC 1906 [10]. The third version of the message protocol is called SNMPv3 and described in RFC 1906 [10], RFC 2572 [11] and RFC 2574 [12].…”
Section: The Snmp Management Frameworkmentioning
confidence: 99%
“…It is recommended that the implementers consider the security features as provided by the SNMPv3 framework. Specifically, the use of the User-based Security Model RFC 2574 [12] and the View-based Access Control Model RFC 2575 [15] is recommended. Using these security features, customer/users can give access to the objects only to those principals (users) that have legitimate rights to GET or SET (change/create/delete) them.…”
Section: Radiusaccserveraddressmentioning
confidence: 99%
“…It is recommended that the implementors consider the security features as provided by the SNMPv3 framework. Specifically, the use of the User-based Security Model STD 62, RFC 3414[RFC3414] and the View-based Access Control Model STD 62, RFC 3415 [RFC3415] is recommended.…”
mentioning
confidence: 99%