M e r i d i a n I I U s e r M a n u a l
67
"Smarter Timing Solutions"
Chapter
Six
Simple Network Management Protocol (SNMP)
Your Meridian II Precision TimeBase includes the NET-SNMP version 5.5.1 implementation of an
SNMP agent,
snmpd
, and a SNMP notification/trap generation utility,
snmptrap
. It supports all
versions of the protocol in use today: SNMPv1 (the original Internet standard), SNMPv2c (never
reached standard status, often called “community SNMP”) and SNMPv3 (the latest Internet stan-
dard).
The NET-SNMP project has its roots in the Carnegie-Mellon University SNMP implementation. For
more detailed information about the NET-SNMP project and to obtain management software and
detailed configuration information, you can visit this website:
An excellent book which describes operation and configuration of various SNMP managers and
agents, including the NET-SNMP implementations, is available from O’Reilley & Associates:
Essential SNMP
, Mauro & Schmidt, O’Reilley & Associates, 2001
If you are planning to operate with SNMPv3, it is highly recommended that you make use of both of
these resources to familiarize yourself with the agent configuration concepts.
SNMPv3 Security
Prior to SNMPv3, SNMP had definite security inadequacies due to using two community names in
a manner analogous to passwords that were transmitted over the network as clear text. In addition,
since no mechanism existed for authenticating or encrypting session data, any number of man-in-
the-middle data corruption/replacement exploits were possible in addition to plain old snooping to
learn the community names. SNMPv3 implements the User-based Security Model (USM) defined in
RFC-2274 which employs modern cryptographic technologies to both authenticate multiple users and
to encrypt their session data for privacy, much in the same way that SSH does for remote login shell
users.
In addition, it implements the View-based Access Control Model (VACM) defined in RFC-2275.
This RFC defines mechanisms for limiting the access of multiple users having various security levels
(no authentication, authentication or authentication plus privacy) to specific “views” of the Structure
of Management Information (SMI) object tree.
Summary of Contents for Meridian II
Page 2: ......
Page 20: ...M e r i d i a n I I U s e r M a n u a l This page intentionally left blank...
Page 139: ...119 M e r i d i a n I I U s e r M a n u a l R E A R P A N E L I O...
Page 216: ...M e r i d i a n I I U s e r M a n u a l 196 A P P E N D I X J...
Page 235: ...215 M e r i d i a n I I U s e r M a n u a l S P E C I F I C AT I O N S...
Page 236: ...M e r i d i a n I I U s e r M a n u a l 216 A P P E N D I X K...
Page 239: ......