Rmon2
This presentation is the property of its rightful owner.
Sponsored Links
1 / 93

RMON2 PowerPoint PPT Presentation


  • 50 Views
  • Uploaded on
  • Presentation posted in: General

RMON2. RFC4502 (2021 Obsolete) Remote Monitor are often called “Monitor” or “Probe” Decode packets at layer 3 through 7 of the OSI Model An RMON probe can monitor traffic on the basis of network-layer protocol The probe can record traffic to and from host for particular applications.

Download Presentation

RMON2

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Rmon2

RMON2

  • RFC4502 (2021 Obsolete)

  • Remote Monitor are often called “Monitor” or “Probe”

  • Decode packets at layer 3 through 7 of the OSI Model

    • An RMON probe can monitor traffic on the basis of network-layer protocol

    • The probe can record traffic to and from host for particular applications


Network layer visibility

Network layer Visibility

  • Network Manager can answer these questions

    • If there is excessive load on the LAN due to incoming router traffic, what networks or hosts account for the bulk of incoming traffic?

    • If a router is overloaded because of high amount of outgoing traffic, what networks or hosts account for the bulk of outgoing traffic or to what destination networks or hosts is that traffic directed

    • If there is a high load of pass-through traffic (arriving via one router and departing via another router ), what networks or hosts are responsible for the bulk of this traffic


Application level visibility

Application Level Visibility

  • RMON2 probe is capable of seeing above the IP layer by reading the enclosed higher-level headers such as TCP/UDP and viewing the headers at the application protocol level

  • This information is useful in controlling load and maintaining performance

    • NMS can be implemented that will generate charts and graphs depicting traffic percentage by protocols or by applications


Rmon mib 1 2

RMON MIB (1&2)


Rmon2 mib 1

RMON2 MIB (1)

  • protocol directory – a master of directory off all protocols that probe can interpret

  • protocol distribution – aggregate statistics on the amount of traffic generated by each protocol per LAN segment

  • address map – match each network address to a specific MAC level address and port on an attached device and the physical address on this subnetwork

  • network layer host – statistics on the amount of traffic into and out of hosts on the basis of the network-layer address


Rmon2 mib 2

RMON2 MIB (2)

  • network-layer matrix – statistics on the amount of traffic between pairs of hosts on the basis of network address

  • application-layer host - statistics on the amount of traffic into and out of hosts on the basis of application-level address

  • application-layer matrix - statistics on the amount of traffic between pairs of hosts on the basis of application-level address


Rmon2 mib 3

RMON2 MIB (3)

  • User history collection – periodically samples user-specified variables and logs that data based on user-defined parameters

    • Ex. Collect data on a router-to-router connection

  • Probe configuration – define standard configuration parameters for RMON probes

    • To solve interoperability problems


New features in rmon2 1

New features in RMON2 (1)

  • Indexing with external objects

    • Reduce control index object in data table

    • To access instance of the data entry in RMON 1 Vs RMON2

      • Rm1datavalue.Rm1controlindex.Rm1dataindex

        • Rm1datavalue.2.89

        • 2 – Rm1controlindex / 89 – Rm1dataindex

      • Rm2datavalue.X.Rm2dataindex

        • X – the value of index that specifying set of data rows by the Xth row (external object)

        • Rm2datavalue.2.89

        • 2 – external object / 89 – Rm2dataindex


New features in rmon2 2

New features in RMON2 (2)

  • Time filtering Indexing

    • Typically, a network management app. is periodically to poll all probes for the values of objects

    • It is desirable to have the probe return values only for those objects whose value have changed since the last poll

    • No direct way in SNMP, but RMON2 has a mechanism


Example of time filtering

Example of time filtering


Footable

FooTable


Ex1 time filtering 1

EX1. Time filtering (1)

  • Suppose fooTable has 2 values of index – 1,2

    • If no fooTimeMark , a management station can see only two counter

    • With fooTimeMark, it is possible to request the values of these counter only if they have been updated since a given time


Ex1 time filtering 2

EX1. Time filtering (2)

  • For example, current value of

    • The counter associated with fooIndex = 1 is 5 and most recently updated at time 6

    • The counter associated with fooIndex=2 is 9 and most recently updated at time 8

    • Then, at time 10, a manager issues the request

      • GetRequest(fooCounts.7.1, fooCounts.7.2)

      • To get the value updated since time 7

      • The agent will response fooCounts.7.2=9


Ex2 time filtering 1

EX2. Time Filtering (1)


Ex2 time filtering 2

EX2. Time Filtering (2)

  • Assume that basic row 1 (fooIndex=1) was updated as follows:


Ex2 time filtering 3

EX2. Time Filtering (3)

  • Assume that basic row 2 (fooIndex=2) was updated as follows:


Ex2 time filtering 4

EX2. Time Filtering (4)

  • A manager station polls a probe every 15 seconds (clock nms records time in hundredths of second)

    1 At nms=1000, the manager does the baseline poll to get everything since the last agent restart (Timefilter =0)

    GetRequest (sysUpTime.0,fooCounts.0.1,fooCount.0.2)

    Response(sysUpTime.0=600,fooCounts.0.1=1,fooCount.0.2=0)

    2 At nms=2500 (15 second later), the manager get an update on all changes since the last report (agent time=600)

    GetRequest (sysUpTime.0, fooCounts.600.1, fooCount.600.2)

    Response(sysUpTime.0=2100,fooCounts.600.1=2,fooCount.600.2=2)


Ex2 time filtering 5

EX2. Time Filtering (5)

The agent received the request at a local time of 2100 ; a counter 1 was incremented at time 900 counter 2 was incremented at 1100 and 1400

3 At nms=4000, the manager get an update on all changes since the last report (agent time=2100)

GetRequest (sysUpTime.0, fooCounts.2100.1, fooCount.2100.2)

Response(sysUpTime.0=3600,fooCounts.2100.1=3)

A counter 1 was incremented at time 2300 counter 2 has not changed since 2100 , so no value returned


Ex2 time filtering 6

EX2. Time Filtering (6)

4 At nms=5500, the manager get an update on all changes since the last report (agent time=3600)

GetRequest (sysUpTime.0, fooCounts.3600.1, fooCount.3600.2)

Response(sysUpTime.0=5500,)

Neither counter has been updated since time 3600 , so no value returned


Protocol directory group

Protocol Directory Group

  • It provides a single central point for storing information about types of protocols

  • One entry in the table for each protocol for which the probe can decode and count protocol data unit (PDU)

  • One scalar objects

    • protocolDirLastChange which contains the time of the last table change

  • One columnar object (Table)

    • protocolDirTable

    • The table covers MAC, network and higher layer protocols


Protocoldirtable

protocolDirTable

  • Fig 10.5


Protocol identification

Protocol identification

  • protocolDirID object contains a unique octet string for a specific protocol.

  • Octet string identifiers for protocols are arranged in a tree structured hierarchy.

    • Each layer is identified by 32 bit value which is encoded as dot decimal format [a.b.c.d]

    • EX. Ethernet is hexadecimal 1 which is encoded as [0.0.0.1] and referred to symbolically as ether2


Protocol assignments

Protocol Assignments

  • Each layer is identified by a 32 bit number (four octets)

  • For MAC level protocols

    • ether2 = 1 [0.0.0.1]

    • llc = 2 [0.0.0.2]

    • snap = 3 [0.0.0.3]

    • vsnap = 4 [0.0.0.4]

    • ianaAssigned = 5 [0.0.0.5]

  • Protocol consideration

    • network layer, use type field of Ethernet frame (IP =0.0.8.0)

    • transport layer, use protocol field of IP header (UDP = 0.0.0.17)

    • application layer, use port field of UDP/TCP header (0.0.0.161)


Entry in protocoldirentry 1

Entry in protocolDirEntry (1)

  • EX. Identification of SNMP running over UDP/IP on Ethernet

    • 16.0.0.0.1.0.0.8.0.0.0.0.17.0.0.0.161

    • 16 : the number of octets to follow

  • So, for previous example the probe is capable of

    • Interpreting all incoming Ethernet frames

    • Looking past the Ethernet header and trailer and interpreting the encapsulated IP datagram

    • Looking past the IP header and interpreting the encapsulated UDP segment

    • Looking past the UDP header and interpreting the encapsulated SNMP PDU


Entry in protocoldirentry 2

Entry in protocolDirEntry (2)

  • A separate entry is needed for each protocol that the probe can interpret and count

  • Then the four entries are needed in protocolDirEntry and the protocolDirID values would be

    • Ether2 (4.0.0.0.1)

    • Ether2.ip (8.0.0.1.0.0.8.0)

    • Ether2.ip.udp (12.0.0.0.1.0.0.8.0.0.0.0.17)

    • Ether2.ip.udp.snmp (16.0.0.0.1.0.0.8.0.0.0.0.17.0.0.0.161)


Format of index values for protocoldirtable

Format of index values for protocolDirTable


Protocol parameter 1

Protocol parameter (1)

  • The second index object for protocolDirTable is protocolDirParameters

  • This object instance contains information about the probe’s capability with the respect to a particular protocol

  • The value is structured as a one-octet count field followed by a set of N-octet parameters, one for each protocol layer in protocolDirID

  • Each bit in the parameter octet is encoded separately to define a particular capability


Protocol parameter 2

Protocol parameter (2)

  • 2 LSB are reserved for all protocols

    • CountFragment (bit0) : Higher-layer protocols encapsulated within this protocol will be counted correctly even if this protocol fragments the upper-layer PDUs into multiple fragments

    • tracksSessions (bit1) :Correctly attributes all packets of a port-mapped protocol, that is a protocol start session on a well-known port or socket and then transfer them to dynamically assigned ports or sockets for the duration of the session

      • TFTP (Trivial File Transfer Protocol)


Protocol parameter 3

Protocol parameter (3)

  • SNMP running over UDP/IP/Ethernet withfragments counted correctly for IP or above, the following encoding is for the two objects (protocolDirID, protocolDirParameter)

    16.0.0.0.1.0.0.8.0.0.0.0.17.0.0.0.161.4.0.1.0.0


Protocol directory table 1

Protocol Directory Table (1)

  • protocolDirType This object describes 2 attributes of this protocol directory entry.

  • SYNTAX – Bits {extensible(0) , addressRecognitionCapable(1) }


Protocol directory table 2

Protocol Directory Table (2)

  • protocolDirType

    • extensible(0) if the agent or manager may extend this table by creating entries that are children of this protocol

      • An example of an entry that will often allow extensibility is'ip.udp'. The probe may automatically populate some children of this node, such as 'ip.udp.snmp' and 'ip.udp.dns'.

    • addressRecognitionCapable(1) If this bit is set, the agent will recognize network-layer addresses for this protocol and populate the network- and application-layer host and matrix tables with these protocols.


Protocol directory table 3

Protocol Directory Table (3)

  • protocolDirAddressMapConfig

  • SYNTAX – Integer {notSupported(1) , supportedOff(2 supportedOn(3)}

  • This object describes and configures the probe's support for address mapping for this protocol.

    • notSupported(1) : if not capable of performing address mapping

    • If capable then the value may be set to supportedOff(2) or supportedOn(3)


Protocol directory table 4

Protocol Directory Table (4)

  • protocolDirHostConfig

  • SYNTAX – Integer {notSupported(1) , supportedOff(2 supportedOn(3)}

  • This object describes and configures the probe's support for the network-layer and application-layer host tables for this protocol.

    • If the value of this object is notSupported(1), the probe will not track the nlHostTable or alHostTable for this protocol

    • If the value of this object is supportedOn(3), the probe supports tracking of the nlHostTable and alHostTable for this protocol and is configured to track both tables for this protocol for all control entries and all interfaces.


Protocol directory table 5

Protocol Directory Table (5)

  • protocolDirMatrixConfig

  • SYNTAX – Integer {notSupported(1) , supportedOff(2 supportedOn(3)}

  • This object describes and configures the probe's support for the network-layer and application-layer matrix tables for this protocol.

    • If the value of this object is notSupported(1), the probe will not track either of the nlMatrixTables or the alMatrixTables

    • If the value of this object is supportedOn(3), the probe supports tracking of both of the nlMatrixTables and (if implemented) both of the alMatrixTables for this protocol and is configured to track these tables for this protocol for all control entries and all interfaces.


Protocol distribution group 1

Protocol Distribution Group (1)

  • It summarizes how many octets and packets have been sent from each of the protocols supported

  • protocolDistControlTable – controls collection of basic statistics for all supported protocols

  • protocolDistStatsTable – records the data


Protocol distribution group 2

Protocol Distribution Group (2)

  • Each row in protocolDistControlTable refers to a unique network interface for this probe and controls a number of rows of protocolDistStatsTable, one for each protocol recognized on that interface


Protocol distribution group 3

Protocol Distribution Group (3)

  • protocolDistControlTable consists of

    • protocolDistControlIndex : an integer that uniquely identifies a row in the protocolDistControlTable

    • protocolDistControlDatasource : identifies the interface that is th source of the data for this row

    • protocolDistControlDroppedFrames : total number of received frames for this interface that the probe chose not to count (out of resources)

    • protocolDistControlCreateTime : the value of sysUptime when this control entry was activated


Protocol distribution group 4

Protocol Distribution Group (4)

  • The protocolDistStatsTable includes one row for each protocol in protocolDirTable for which at least one packet has been seen

  • It is indexed by protocolDistControlIndex and by protocolDirLocalIndex


Protocol distribution group 5

Protocol Distribution Group (5)

  • protocolDistStatsTable consists of

    • protocolDistStatsPkts: the number of packets received for this protocol

    • protocolDistStatsOctets: the number of octets transmitted to this address since it was added to nlHostTable


Address map group 1

Address Map Group (1)

  • It matches each network address to a specific MAC-level address

  • It is helpful in node discovery and network topology applications for pinpointing the specific path of the network traffic

  • 3 scalars objects, one control table (addressMapControlTable) and one data table (addressMapTable)


Address map group 11

Address Map Group (1)

  • 3 scalar objects are

    • addressMapInserts : the number of times an address-mapping entry has been inserted into the data table

    • addressMapDeletes: the number of times an address-mapping entry has been deleted into the data table

    • addressMapMaxDesiredEntries : the desired maximum number of entries in addressMapTable (if this value is set to -1, the probe may create any number of entries in addressMapTable)

      Data table size = addressMapInserts - addressMapDeletes


Address map group 2

Address Map Group (2)

  • The addressMapControlTable consists of

    • addressMapControlIndex: an integer that uniquely identifies a row in the addressMapControlTable

    • addressMapcontrolDatasource : identifies the interface that is the source of the data for this row and that this row is configured to analyze

    • addressMapControlDroppedFrames: total number of received frame for this interface that the probe chose not to count (out of resources)


Address map group 3

Address Map Group (3)

  • The addressMapTable will collect address mapping based on source MAC and network addresses seen in error-free MAC frames

  • The table will create entries for all protocols in the protocol directory table whose value of protocolDirAddressMapConfig is equal to supportedOn(3)


Address map group 4

Address Map Group (4)

  • The addressMapTable consists of

    • addressMapTimeMark : a time filter for this entry

    • addressMapNetworkAddress : the network address for this entry

    • addressMapSource : the last interface which the associated network address was seen

    • addressMapPhysicalAddress : the last source MAC address on which the associated network address was seen

    • addressMapLastChange : the value of sysUpTime at the time this entry was most recently updated


Network layer host group 1

Network-layer Host Group (1)

  • nlHost group enables users to decode packets based on their network-layer address

  • This group consists of 2 Tables

    • nlHostControlTable : control table

    • nlHostTable : data table


Network layer host group 2

Network-layer Host Group (2)

  • Each row in control table refers to a unique interface of the monitor

  • nlHostControlTable

    • nlhostControlIndex : an integer that uniquely identifies a row in the nlHostControlTable

    • nlHostControlDataSource : identifies the interface that is the source of the data for the data tableentries defined by this row

    • nlHostControlNlDroppedFrames : total number of received frames for this interface that the probe chose not to count for the associated nlHost entries


Network layer host group 3

Network-layer Host Group (3)

  • nlHostControlNlInserts : the number of times an nlHost entry has been inserted into the nlHostTable data table

  • nlHostControlNldeletes : the number of times an nlHost entry has been deleted from the nlHostTable data table

  • nlhostControlNlMaxDesiredEntries : the desired maximum number of entries in nlHostTable


Network layer host group 4

Network-layer Host Group (4)

  • nlHostControlAlDroppedFrames : total number of received frames for this interface that the probe chose not to count for the associated alHost entries

  • nlHostControlAlInserts : the number of times an alHost entry has been inserted into the alHostTable data table

  • nlHostControlAldeletes : the number of times an alHost entry has been deleted from the alHostTable data table

  • nlhostControlAlMaxDesiredEntries : the desired maximum number of entries in alHostTable


Network layer host group 5

Network-layer Host Group (5)

  • nlHostTable will create entries for all network-layer protocols in the protocol directory table whose value of protocolDirNlHostConfig is equal to supportedOn(3)

  • nlHostTable

    • nlHostTimeMark : a time filter for this entry

    • nlHostAddress : the network address for this entry

    • nlHostInPackets : the number of error-free packets transmitted to this address since it was added to the table


Network layer host group 6

Network-layer Host Group (6)

  • nlHostOutPackets : the number of error-free packets transmitted from this address since it was added to the table

  • nlHostInOctets : the number of octets (error-free packets) transmitted to this address since it was added to the table

  • nlHostOutOctets : the number of octets (error-free packets) transmitted from this address since it was added to the table


Network layer host group 7

Network-layer Host Group (7)

  • nlHostCreateTime : the value of sysUpTime when this control entry was activated

  • nlHostOutMacNonUnicastPkts : the number of packets transmitted by this address that were directed to the MAC broadcast address or ti any MAC multicast address since this entry was added to the table


Network layer host group 71

Network-layer Host Group (7)

  • nlHostTable is indexed by four objects:

    • nlHostControlIndex : define interface

    • nlHostTimeMark : a time filter

    • protocolDirLocalIndex : the identity of the protocol

    • nlHostAddress : the network address


Application layer host group 1

Application-Layer Host Group (1)

  • The nlHostControlTable also controls alHostTable

  • Only alHostTable in application-layer host group

  • alHostTable will create entries for all application-level protocols in the protocol directory table whose value of protocolDirALHostConfig is equal to supportedOn(3)


Application layer host group 2

Application-Layer Host Group (2)

  • alHostTable

    • alHostTimeMark : a time filter for this entry

    • alHostInPackets : the number of error-free packets of this protocol type transmitted to this address since it was added to the table

    • alHostOutPackets : the number of error-free packets of this protocol type transmitted from this address since it was added to the table


Application layer host group 3

Application-Layer Host Group (3)

  • alHostInOctets : the number of octets (error-free packets) of this protocol type transmitted to this address since it was added to the table

  • alHostOutOctets : the number of octets (error-free packets) of this protocol type transmitted from this address since it was added to the table

  • alHostCreateTime : the value of sysUpTime when this control entry was activated


Application layer host group 4

Application-Layer Host Group (4)

  • alHostTable is indexed by five objects:

    • nlHostControlIndex : define interface

    • alHostTimeMark : a time filter

    • protocolDirLocalIndex : the identity of the network layer protocol

    • nlHostAddress : the network address

    • protocolDirLocalIndex : the identity of the application layer protocol


Network layer matrix group 1

Network Layer Matrix Group(1)

  • It gathers statistics based on source and destination network-layer address

  • For network layer statistic consists of one control table and 2 data tables

    • nlMatrixControlTable : control table for network layer matrix group and application layer matrix group

    • nlMatrixSDTable : stores statistics on traffic from a particular source network-layer address to a number of destinations

    • nlMatrixDSTable : stores statistics on traffic to a particular destination network-layer address from a number of sources


Network layer matrix group 2

Network Layer Matrix Group(2)

  • The nlMatrixSDTable is indexed

    • the row of nlMatrixControlTable that control it then

    • by a time filter: nlMatrixSDTimeMark then

    • by the network-layer protocol : protocolDirLocalIndex then

    • by the network layer source address : nlMatrixSDSourceAddress then

    • by the network layer destination address : nlMatrixSDDestAddress


Network layer matrix group 3

Network Layer Matrix Group(3)

  • The nlMatrixDSTable is indexed

    • the row of nlMatrixControlTable that control it then

    • by a time filter: nlMatrixDSTimeMark then

    • by the network-layer protocol : protocolDirLocalIndex then

    • by the network layer destination address : nlMatrixDSDestAddress

    • by the network layer source address : nlMatrixDSSourceAddress then


Network layer topn statistics 1

Network-Layer TopN Statistics (1)

  • To determine which pairs of hosts rank in the top N according to some metric

  • One control table and one datatable

    • nlMatrixTopNControlTable

    • nlMatrixTopNTaable


Network layer topn statistics 2

Network-Layer TopN Statistics (2)

  • nlMatrixTopNControlTable

    • nlMatrixTopNRateBase : specifies one of two variables (nlMatrixTopNPackets(1) /nlMatrixTopNOctets(2) )

    • nlMatrixTopNRequestedSize: the maximum number of matrix entries requested for the topN table


Network layer topn statistics 3

Network-Layer TopN Statistics (3)

  • nlMatrixTopNtable

    • nlMatrixTopNPktRate – the number of packets seen from source host to destination host during this sampling interval

    • nlMatrixTopNReversePktRate – same as above (but destination to source)

    • nlMatrixTopNOctetRate – the number of octets seen from source host to destination host during this sampling interval

    • nlMatrixTopNReverseOctetRate – same as above (but destination to source)


Network layer topn statistics 4

Network-Layer TopN Statistics (4)

  • The nlMatrixTopNTable is indexed by

    • nlMatrixTopNControlIndex

    • nlMatrixTopNIndex


Application layer matrix group 1

Application-Layer Matrix Group (1)

  • Statistical collection of information based on source and destination application address (port number)

  • This group consists of 3 data tables and 1 control table

    • alMatrixSDTable

    • alMatrixDSTable

    • alMatrixTopNControlTable

    • alMatrixTopNTable


Almatrix group 2

alMatrix Group (2)

  • Fig 10.15


Application layer matrix group 2

Application-Layer Matrix Group (2)

  • The alMatrixSDTable (alMatrixDSTable) is indexed by

    • nlMatrixControlIndex : that identifies a unique subnetwork

    • nlMatrixSDTimeMark : time filter

    • protocolDirLocalIndex : the network-layer protocol

    • nlMatrixSDSourceAddress : the network layer source address

    • nlMatrixSDDestAddress : the network layer destination address

    • protocolDirLocalIndex : the application-layer protocol


Application layer matrix group 3

Application-Layer Matrix Group (3)

  • alMatrixTopNControlTable has the same structure as the nlMatrixTopNControlTable

  • Only difference is the definition of the rate base object: alMatrixTopNRateBase

    • alMatrixTopNTerminalsPkts(1) count only protocolpackets (no child protocol)

    • alMatrixTopNTerminalsOctets(2) count only protocoloctets

      (no child protocol)

    • alMatrixTopNAllPkts(3)

    • alMatrixTopNAllOctets(4 )


Application layer matrix group 4

Application-Layer Matrix Group (4)

  • alMatrixTopNtable

    • alMatrixTopNPktRate – the number of packets seen from source host to destination host during this sampling interval

    • alMatrixTopNReversePktRate – same as above (Destination to source)


User history collection group 1

User history collection group (1)

  • User history collection group

    • Collect particular statistics and variables then logs that data based on user-defined parameters

  • User history collection group consists of usrHistoryControlTable, usrHistoryObjectTable,


  • User history collection group 2

    User history collection group (2)


    User history collection group 3

    User history collection group (3)

    • userControlTable

      • usrHistoryControlIndex

      • usrHistoryControlObjects

      • usrHistoryControlBucketsRequested

      • usrHistoryControlBucketsGranted

      • usrHistoryControlInterval

      • usrHistoryControlOwner

      • usrHistoryControlStatus


    User history collection group 4

    User history collection group (4)

    • UsrHistoryObjectTable

      • usrHistoryObjectIndex

      • usrHistoryObjectVariable : Identify Variable to be collected

      • usrHistoryObjectSampleType : absolute or delta value


    User history collection group 5

    User history collection group (5)

    • UsrHistoryTable

      • usrHistorySampleIndex

      • usrHistoryIntervalStart

      • usrHistoryIntervalEnd

      • usrHistoryAbsValue

      • usrHistoryValStatus


    User history collection group 31

    User history collection group (3)


    Probe configuration group

    Probe configuration group

    • Probe configuration group

      • To solve interoperability among RMON probe and managers


    Security consideration 1

    Security Consideration (1)

    • The usrHistoryGroupperiodically samples the values of user-specified variables on the probe and stores them in another table.

      • The agent MUST ensure that usrHistoryObjectVariable is not writable in MIB views that don't already have read access to the entire agent. Because the access control configuration can change over time, information could later be deemed sensitive that would still be accessible to this function.


    Security consideration 2

    Security Consideration (2)

    • A probe implementing this MIB is likely to also implement RMON [RFC2819], which includes functions for returning the contents of captured packets, potentially including sensitive user data or passwords.

      • It is recommended that SNMP access to these functions be restricted


    Security consideration 3

    Security Consideration (3)

    • There are a number of management objects defined in this MIB that have a MAX-ACCESS clause of read-write and/or read-create.

      • Such objects may be considered sensitive or vulnerable in some network environments.

      • The support for SET operations in a non-secure environment without proper protection can have a negative effect on network operations.


    Security consideration 4

    Security Consideration (4)

    • Some of the readable objects in this MIB module (i.e., objects with a MAX-ACCESS other than not-accessible) may be considered sensitive or vulnerable in some network environments.

      • It is thus important to control even GET and/or NOTIFY access to these objects and possibly to even encrypt the values of these objects when sending them over the network via SNMP.


    Security consideration 5

    Security Consideration (5)

    • SNMP versions prior to SNMPv3 did not include adequate security.

    • Even if the network itself is secure (for example by using IPSec), even then, there is no control as to who on the secure network is allowed to access and GET/SET (read/change/create/delete) the objects in this MIB module.

    • It is RECOMMENDED that implementers consider the security features as provided by the SNMPv3 framework (see [RFC3410], section 8), including full support for the SNMPv3 cryptographic mechanisms (for authentication and privacy).


    Security consideration 6

    Security Consideration (6)

    • Deployment of SNMP versions prior to SNMPv3 is NOT RECOMMENDED.

    • Instead, it is RECOMMENDED to deploy SNMPv3 and to enable cryptographic security. It is then a customer/operator responsibility to ensure that the SNMP entity giving access to an instance of this MIB module is properly configured to give access to the objects only to those principals (users) that have legitimate rights to indeed GET or SET (change/create/delete) them.


    Practical issues

    Practical Issues


  • Login