blob: ba4c52934aa1cde0c4eaf92d34c0e70a8615edab [file] [log] [blame]
Network Working Group Editor of this version:
Request for Comments: 3417 R. Presuhn
STD: 62 BMC Software, Inc.
Obsoletes: 1906 Authors of previous version:
Category: Standards Track J. Case
SNMP Research, Inc.
K. McCloghrie
Cisco Systems, Inc.
M. Rose
Dover Beach Consulting, Inc.
S. Waldbusser
International Network Services
December 2002
Transport Mappings for
the Simple Network Management Protocol (SNMP)
Status of this Memo
This document specifies an Internet standards track protocol for the
Internet community, and requests discussion and suggestions for
improvements. Please refer to the current edition of the "Internet
Official Protocol Standards" (STD 1) for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2002). All Rights Reserved.
Abstract
This document defines the transport of Simple Network Management
Protocol (SNMP) messages over various protocols. This document
obsoletes RFC 1906.
Presuhn, et al. Standards Track [Page 1]
RFC 3417 Transport Mappings for SNMP December 2002
Table of Contents
1. Introduction ................................................ 2
2. Definitions ................................................. 3
3. SNMP over UDP over IPv4 ..................................... 7
3.1. Serialization ............................................. 7
3.2. Well-known Values ......................................... 7
4. SNMP over OSI ............................................... 7
4.1. Serialization ............................................. 7
4.2. Well-known Values ......................................... 8
5. SNMP over DDP ............................................... 8
5.1. Serialization ............................................. 8
5.2. Well-known Values ......................................... 8
5.3. Discussion of AppleTalk Addressing ........................ 9
5.3.1. How to Acquire NBP names ................................ 9
5.3.2. When to Turn NBP names into DDP addresses ............... 10
5.3.3. How to Turn NBP names into DDP addresses ................ 10
5.3.4. What if NBP is broken ................................... 10
6. SNMP over IPX ............................................... 11
6.1. Serialization ............................................. 11
6.2. Well-known Values ......................................... 11
7. Proxy to SNMPv1 ............................................. 12
8. Serialization using the Basic Encoding Rules ................ 12
8.1. Usage Example ............................................. 13
9. Notice on Intellectual Property ............................. 14
10. Acknowledgments ............................................ 14
11. IANA Considerations ........................................ 15
12. Security Considerations .................................... 16
13. References ................................................. 16
13.1. Normative References ..................................... 16
13.2. Informative References ................................... 17
14. Changes from RFC 1906 ...................................... 18
15. Editor's Address ........................................... 18
16. Full Copyright Statement ................................... 19
1. Introduction
For a detailed overview of the documents that describe the current
Internet-Standard Management Framework, please refer to section 7 of
RFC 3410 [RFC3410].
Managed objects are accessed via a virtual information store, termed
the Management Information Base or MIB. MIB objects are generally
accessed through the Simple Network Management Protocol (SNMP).
Objects in the MIB are defined using the mechanisms defined in the
Structure of Management Information (SMI). This memo specifies a MIB
Presuhn, et al. Standards Track [Page 2]
RFC 3417 Transport Mappings for SNMP December 2002
module that is compliant to the SMIv2, which is described in STD 58,
RFC 2578 [RFC2578], STD 58, RFC 2579 [RFC2579] and STD 58, RFC 2580
[RFC2580].
This document, Transport Mappings for the Simple Network Management
Protocol, defines how the management protocol [RFC3416] may be
carried over a variety of protocol suites. It is the purpose of this
document to define how the SNMP maps onto an initial set of transport
domains. At the time of this writing, work was in progress to define
an IPv6 mapping, described in [RFC3419]. Other mappings may be
defined in the future.
Although several mappings are defined, the mapping onto UDP over IPv4
is the preferred mapping for systems supporting IPv4. Systems
implementing IPv4 MUST implement the mapping onto UDP over IPv4. To
maximize interoperability, systems supporting other mappings SHOULD
also provide for access via the UDP over IPv4 mapping.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14, RFC 2119
[RFC2119].
2. Definitions
SNMPv2-TM DEFINITIONS ::= BEGIN
IMPORTS
MODULE-IDENTITY, OBJECT-IDENTITY,
snmpModules, snmpDomains, snmpProxys
FROM SNMPv2-SMI
TEXTUAL-CONVENTION
FROM SNMPv2-TC;
snmpv2tm MODULE-IDENTITY
LAST-UPDATED "200210160000Z"
ORGANIZATION "IETF SNMPv3 Working Group"
CONTACT-INFO
"WG-EMail: snmpv3@lists.tislabs.com
Subscribe: snmpv3-request@lists.tislabs.com
Co-Chair: Russ Mundy
Network Associates Laboratories
postal: 15204 Omega Drive, Suite 300
Rockville, MD 20850-4601
USA
EMail: mundy@tislabs.com
phone: +1 301 947-7107
Presuhn, et al. Standards Track [Page 3]
RFC 3417 Transport Mappings for SNMP December 2002
Co-Chair: David Harrington
Enterasys Networks
postal: 35 Industrial Way
P. O. Box 5005
Rochester, NH 03866-5005
USA
EMail: dbh@enterasys.com
phone: +1 603 337-2614
Editor: Randy Presuhn
BMC Software, Inc.
postal: 2141 North First Street
San Jose, CA 95131
USA
EMail: randy_presuhn@bmc.com
phone: +1 408 546-1006"
DESCRIPTION
"The MIB module for SNMP transport mappings.
Copyright (C) The Internet Society (2002). This
version of this MIB module is part of RFC 3417;
see the RFC itself for full legal notices.
"
REVISION "200210160000Z"
DESCRIPTION
"Clarifications, published as RFC 3417."
REVISION "199601010000Z"
DESCRIPTION
"Clarifications, published as RFC 1906."
REVISION "199304010000Z"
DESCRIPTION
"The initial version, published as RFC 1449."
::= { snmpModules 19 }
-- SNMP over UDP over IPv4
snmpUDPDomain OBJECT-IDENTITY
STATUS current
DESCRIPTION
"The SNMP over UDP over IPv4 transport domain.
The corresponding transport address is of type
SnmpUDPAddress."
::= { snmpDomains 1 }
Presuhn, et al. Standards Track [Page 4]
RFC 3417 Transport Mappings for SNMP December 2002
SnmpUDPAddress ::= TEXTUAL-CONVENTION
DISPLAY-HINT "1d.1d.1d.1d/2d"
STATUS current
DESCRIPTION
"Represents a UDP over IPv4 address:
octets contents encoding
1-4 IP-address network-byte order
5-6 UDP-port network-byte order
"
SYNTAX OCTET STRING (SIZE (6))
-- SNMP over OSI
snmpCLNSDomain OBJECT-IDENTITY
STATUS current
DESCRIPTION
"The SNMP over CLNS transport domain.
The corresponding transport address is of type
SnmpOSIAddress."
::= { snmpDomains 2 }
snmpCONSDomain OBJECT-IDENTITY
STATUS current
DESCRIPTION
"The SNMP over CONS transport domain.
The corresponding transport address is of type
SnmpOSIAddress."
::= { snmpDomains 3 }
SnmpOSIAddress ::= TEXTUAL-CONVENTION
DISPLAY-HINT "*1x:/1x:"
STATUS current
DESCRIPTION
"Represents an OSI transport-address:
octets contents encoding
1 length of NSAP 'n' as an unsigned-integer
(either 0 or from 3 to 20)
2..(n+1) NSAP concrete binary representation
(n+2)..m TSEL string of (up to 64) octets
"
SYNTAX OCTET STRING (SIZE (1 | 4..85))
Presuhn, et al. Standards Track [Page 5]
RFC 3417 Transport Mappings for SNMP December 2002
-- SNMP over DDP
snmpDDPDomain OBJECT-IDENTITY
STATUS current
DESCRIPTION
"The SNMP over DDP transport domain. The corresponding
transport address is of type SnmpNBPAddress."
::= { snmpDomains 4 }
SnmpNBPAddress ::= TEXTUAL-CONVENTION
STATUS current
DESCRIPTION
"Represents an NBP name:
octets contents encoding
1 length of object 'n' as an unsigned integer
2..(n+1) object string of (up to 32) octets
n+2 length of type 'p' as an unsigned integer
(n+3)..(n+2+p) type string of (up to 32) octets
n+3+p length of zone 'q' as an unsigned integer
(n+4+p)..(n+3+p+q) zone string of (up to 32) octets
For comparison purposes, strings are
case-insensitive. All strings may contain any octet
other than 255 (hex ff)."
SYNTAX OCTET STRING (SIZE (3..99))
-- SNMP over IPX
snmpIPXDomain OBJECT-IDENTITY
STATUS current
DESCRIPTION
"The SNMP over IPX transport domain. The corresponding
transport address is of type SnmpIPXAddress."
::= { snmpDomains 5 }
SnmpIPXAddress ::= TEXTUAL-CONVENTION
DISPLAY-HINT "4x.1x:1x:1x:1x:1x:1x.2d"
STATUS current
DESCRIPTION
"Represents an IPX address:
octets contents encoding
1-4 network-number network-byte order
5-10 physical-address network-byte order
11-12 socket-number network-byte order
"
SYNTAX OCTET STRING (SIZE (12))
Presuhn, et al. Standards Track [Page 6]
RFC 3417 Transport Mappings for SNMP December 2002
-- for proxy to SNMPv1 (RFC 1157)
rfc1157Proxy OBJECT IDENTIFIER ::= { snmpProxys 1 }
rfc1157Domain OBJECT-IDENTITY
STATUS deprecated
DESCRIPTION
"The transport domain for SNMPv1 over UDP over IPv4.
The corresponding transport address is of type
SnmpUDPAddress."
::= { rfc1157Proxy 1 }
-- ::= { rfc1157Proxy 2 } this OID is obsolete
END
3. SNMP over UDP over IPv4
This is the preferred transport mapping.
3.1. Serialization
Each instance of a message is serialized (i.e., encoded according to
the convention of [BER]) onto a single UDP [RFC768] over IPv4
[RFC791] datagram, using the algorithm specified in Section 8.
3.2. Well-known Values
It is suggested that administrators configure their SNMP entities
supporting command responder applications to listen on UDP port 161.
Further, it is suggested that SNMP entities supporting notification
receiver applications be configured to listen on UDP port 162.
When an SNMP entity uses this transport mapping, it must be capable
of accepting messages up to and including 484 octets in size. It is
recommended that implementations be capable of accepting messages of
up to 1472 octets in size. Implementation of larger values is
encouraged whenever possible.
4. SNMP over OSI
This is an optional transport mapping.
4.1. Serialization
Each instance of a message is serialized onto a single TSDU [IS8072]
[IS8072A] for the OSI Connectionless-mode Transport Service (CLTS),
using the algorithm specified in Section 8.
Presuhn, et al. Standards Track [Page 7]
RFC 3417 Transport Mappings for SNMP December 2002
4.2. Well-known Values
It is suggested that administrators configure their SNMP entities
supporting command responder applications to listen on transport
selector "snmp-l" (which consists of six ASCII characters), when
using a CL-mode network service to realize the CLTS. Further, it is
suggested that SNMP entities supporting notification receiver
applications be configured to listen on transport selector "snmpt-l"
(which consists of seven ASCII characters, six letters and a hyphen)
when using a CL-mode network service to realize the CLTS. Similarly,
when using a CO-mode network service to realize the CLTS, the
suggested transport selectors are "snmp-o" and "snmpt-o", for command
responders and notification receivers, respectively.
When an SNMP entity uses this transport mapping, it must be capable
of accepting messages that are at least 484 octets in size.
Implementation of larger values is encouraged whenever possible.
5. SNMP over DDP
This is an optional transport mapping.
5.1. Serialization
Each instance of a message is serialized onto a single DDP datagram
[APPLETALK], using the algorithm specified in Section 8.
5.2. Well-known Values
SNMP messages are sent using DDP protocol type 8. SNMP entities
supporting command responder applications listen on DDP socket number
8, while SNMP entities supporting notification receiver applications
listen on DDP socket number 9.
Administrators must configure their SNMP entities supporting command
responder applications to use NBP type "SNMP Agent" (which consists
of ten ASCII characters) while those supporting notification receiver
applications must be configured to use NBP type "SNMP Trap Handler"
(which consists of seventeen ASCII characters).
The NBP name for SNMP entities supporting command responders and
notification receivers should be stable - NBP names should not change
any more often than the IP address of a typical TCP/IP node. It is
suggested that the NBP name be stored in some form of stable storage.
When an SNMP entity uses this transport mapping, it must be capable
of accepting messages that are at least 484 octets in size.
Implementation of larger values is encouraged whenever possible.
Presuhn, et al. Standards Track [Page 8]
RFC 3417 Transport Mappings for SNMP December 2002
5.3. Discussion of AppleTalk Addressing
The AppleTalk protocol suite has certain features not manifest in the
TCP/IP suite. AppleTalk's naming strategy and the dynamic nature of
address assignment can cause problems for SNMP entities that wish to
manage AppleTalk networks. TCP/IP nodes have an associated IP
address which distinguishes each from the other. In contrast,
AppleTalk nodes generally have no such characteristic. The network-
level address, while often relatively stable, can change at every
reboot (or more frequently).
Thus, when SNMP is mapped over DDP, nodes are identified by a "name",
rather than by an "address". Hence, all AppleTalk nodes that
implement this mapping are required to respond to NBP lookups and
confirms (e.g., implement the NBP protocol stub), which guarantees
that a mapping from NBP name to DDP address will be possible.
In determining the SNMP identity to register for an SNMP entity, it
is suggested that the SNMP identity be a name which is associated
with other network services offered by the machine.
NBP lookups, which are used to map NBP names into DDP addresses, can
cause large amounts of network traffic as well as consume CPU
resources. It is also the case that the ability to perform an NBP
lookup is sensitive to certain network disruptions (such as zone
table inconsistencies) which would not prevent direct AppleTalk
communications between two SNMP entities.
Thus, it is recommended that NBP lookups be used infrequently,
primarily to create a cache of name-to-address mappings. These
cached mappings should then be used for any further SNMP traffic. It
is recommended that SNMP entities supporting command generator
applications should maintain this cache between reboots. This
caching can help minimize network traffic, reduce CPU load on the
network, and allow for (some amount of) network trouble shooting when
the basic name-to-address translation mechanism is broken.
5.3.1. How to Acquire NBP names
An SNMP entity supporting command generator applications may have a
pre-configured list of names of "known" SNMP entities supporting
command responder applications. Similarly, an SNMP entity supporting
command generator or notification receiver applications might
interact with an operator. Finally, an SNMP entity supporting
command generator or notification receiver applications might
communicate with all SNMP entities supporting command responder or
notification originator applications in a set of zones or networks.
Presuhn, et al. Standards Track [Page 9]
RFC 3417 Transport Mappings for SNMP December 2002
5.3.2. When to Turn NBP names into DDP addresses
When an SNMP entity uses a cache entry to address an SNMP packet, it
should attempt to confirm the validity mapping, if the mapping hasn't
been confirmed within the last T1 seconds. This cache entry
lifetime, T1, has a minimum, default value of 60 seconds, and should
be configurable.
An SNMP entity supporting a command generator application may decide
to prime its cache of names prior to actually communicating with
another SNMP entity. In general, it is expected that such an entity
may want to keep certain mappings "more current" than other mappings,
e.g., those nodes which represent the network infrastructure (e.g.,
routers) may be deemed "more important".
Note that an SNMP entity supporting command generator applications
should not prime its entire cache upon initialization - rather, it
should attempt resolutions over an extended period of time (perhaps
in some pre-determined or configured priority order). Each of these
resolutions might, in fact, be a wildcard lookup in a given zone.
An SNMP entity supporting command responder applications must never
prime its cache. When generating a response, such an entity does not
need to confirm a cache entry. An SNMP entity supporting
notification originator applications should do NBP lookups (or
confirms) only when it needs to send an SNMP trap or inform.
5.3.3. How to Turn NBP names into DDP addresses
If the only piece of information available is the NBP name, then an
NBP lookup should be performed to turn that name into a DDP address.
However, if there is a piece of stale information, it can be used as
a hint to perform an NBP confirm (which sends a unicast to the
network address which is presumed to be the target of the name
lookup) to see if the stale information is, in fact, still valid.
An NBP name to DDP address mapping can also be confirmed implicitly
using only SNMP transactions. For example, an SNMP entity supporting
command generator applications issuing a retrieval operation could
also retrieve the relevant objects from the NBP group [RFC1742] for
the SNMP entity supporting the command responder application. This
information can then be correlated with the source DDP address of the
response.
5.3.4. What if NBP is broken
Under some circumstances, there may be connectivity between two SNMP
entities, but the NBP mapping machinery may be broken, e.g.,
Presuhn, et al. Standards Track [Page 10]
RFC 3417 Transport Mappings for SNMP December 2002
o the NBP FwdReq (forward NBP lookup onto local attached network)
mechanism might be broken at a router on the other entity's
network; or,
o the NBP BrRq (NBP broadcast request) mechanism might be broken at
a router on the entity's own network; or,
o NBP might be broken on the other entity's node.
An SNMP entity supporting command generator applications which is
dedicated to AppleTalk management might choose to alleviate some of
these failures by directly implementing the router portion of NBP.
For example, such an entity might already know all the zones on the
AppleTalk internet and the networks on which each zone appears.
Given an NBP lookup which fails, the entity could send an NBP FwdReq
to the network in which the SNMP entity supporting the command
responder or notification originator application was last located.
If that failed, the station could then send an NBP LkUp (NBP lookup
packet) as a directed (DDP) multicast to each network number on that
network. Of the above (single) failures, this combined approach will
solve the case where either the local router's BrRq-to-FwdReq
mechanism is broken or the remote router's FwdReq-to-LkUp mechanism
is broken.
6. SNMP over IPX
This is an optional transport mapping.
6.1. Serialization
Each instance of a message is serialized onto a single IPX datagram
[NOVELL], using the algorithm specified in Section 8.
6.2. Well-known Values
SNMP messages are sent using IPX packet type 4 (i.e., Packet Exchange
Protocol).
It is suggested that administrators configure their SNMP entities
supporting command responder applications to listen on IPX socket
36879 (900f hexadecimal). Further, it is suggested that those
supporting notification receiver applications be configured to listen
on IPX socket 36880 (9010 hexadecimal).
When an SNMP entity uses this transport mapping, it must be capable
of accepting messages that are at least 546 octets in size.
Implementation of larger values is encouraged whenever possible.
Presuhn, et al. Standards Track [Page 11]
RFC 3417 Transport Mappings for SNMP December 2002
7. Proxy to SNMPv1
Historically, in order to support proxy to SNMPv1, as defined in
[RFC2576], it was deemed useful to define a transport domain,
rfc1157Domain, which indicates the transport mapping for SNMP
messages as defined in [RFC1157].
8. Serialization using the Basic Encoding Rules
When the Basic Encoding Rules [BER] are used for serialization:
(1) When encoding the length field, only the definite form is used;
use of the indefinite form encoding is prohibited. Note that
when using the definite-long form, it is permissible to use
more than the minimum number of length octets necessary to
encode the length field.
(2) When encoding the value field, the primitive form shall be used
for all simple types, i.e., INTEGER, OCTET STRING, and OBJECT
IDENTIFIER (either IMPLICIT or explicit). The constructed form
of encoding shall be used only for structured types, i.e., a
SEQUENCE or an IMPLICIT SEQUENCE.
(3) When encoding an object whose syntax is described using the
BITS construct, the value is encoded as an OCTET STRING, in
which all the named bits in (the definition of) the bitstring,
commencing with the first bit and proceeding to the last bit,
are placed in bits 8 (high order bit) to 1 (low order bit) of
the first octet, followed by bits 8 to 1 of each subsequent
octet in turn, followed by as many bits as are needed of the
final subsequent octet, commencing with bit 8. Remaining bits,
if any, of the final octet are set to zero on generation and
ignored on receipt.
These restrictions apply to all aspects of ASN.1 encoding, including
the message wrappers, protocol data units, and the data objects they
contain.
Presuhn, et al. Standards Track [Page 12]
RFC 3417 Transport Mappings for SNMP December 2002
8.1. Usage Example
As an example of applying the Basic Encoding Rules, suppose one
wanted to encode an instance of the GetBulkRequest-PDU [RFC3416]:
[5] IMPLICIT SEQUENCE {
request-id 1414684022,
non-repeaters 1,
max-repetitions 2,
variable-bindings {
{ name sysUpTime,
value { unSpecified NULL } },
{ name ipNetToMediaPhysAddress,
value { unSpecified NULL } },
{ name ipNetToMediaType,
value { unSpecified NULL } }
}
}
Applying the BER, this may be encoded (in hexadecimal) as:
[5] IMPLICIT SEQUENCE a5 82 00 39
INTEGER 02 04 54 52 5d 76
INTEGER 02 01 01
INTEGER 02 01 02
SEQUENCE (OF) 30 2b
SEQUENCE 30 0b
OBJECT IDENTIFIER 06 07 2b 06 01 02 01 01 03
NULL 05 00
SEQUENCE 30 0d
OBJECT IDENTIFIER 06 09 2b 06 01 02 01 04 16 01 02
NULL 05 00
SEQUENCE 30 0d
OBJECT IDENTIFIER 06 09 2b 06 01 02 01 04 16 01 04
NULL 05 00
Note that the initial SEQUENCE in this example was not encoded using
the minimum number of length octets. (The first octet of the length,
82, indicates that the length of the content is encoded in the next
two octets.)
Presuhn, et al. Standards Track [Page 13]
RFC 3417 Transport Mappings for SNMP December 2002
9. Notice on Intellectual Property
The IETF takes no position regarding the validity or scope of any
intellectual property or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; neither does it represent that it
has made any effort to identify any such rights. Information on the
IETF's procedures with respect to rights in standards-track and
standards-related documentation can be found in BCP-11. Copies of
claims of rights made available for publication and any assurances of
licenses to be made available, or the result of an attempt made to
obtain a general license or permission for the use of such
proprietary rights by implementors or users of this specification can
be obtained from the IETF Secretariat.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights which may cover technology that may be required to practice
this standard. Please address the information to the IETF Executive
Director.
10. Acknowledgments
This document is the product of the SNMPv3 Working Group. Some
special thanks are in order to the following Working Group members:
Randy Bush
Jeffrey D. Case
Mike Daniele
Rob Frye
Lauren Heintz
Keith McCloghrie
Russ Mundy
David T. Perkins
Randy Presuhn
Aleksey Romanov
Juergen Schoenwaelder
Bert Wijnen
This version of the document, edited by Randy Presuhn, was initially
based on the work of a design team whose members were:
Jeffrey D. Case
Keith McCloghrie
David T. Perkins
Randy Presuhn
Juergen Schoenwaelder
Presuhn, et al. Standards Track [Page 14]
RFC 3417 Transport Mappings for SNMP December 2002
The previous versions of this document, edited by Keith McCloghrie,
was the result of significant work by four major contributors:
Jeffrey D. Case
Keith McCloghrie
Marshall T. Rose
Steven Waldbusser
Additionally, the contributions of the SNMPv2 Working Group to the
previous versions are also acknowledged. In particular, a special
thanks is extended for the contributions of:
Alexander I. Alten
Dave Arneson
Uri Blumenthal
Doug Book
Kim Curran
Jim Galvin
Maria Greene
Iain Hanson
Dave Harrington
Nguyen Hien
Jeff Johnson
Michael Kornegay
Deirdre Kostick
David Levi
Daniel Mahoney
Bob Natale
Brian O'Keefe
Andrew Pearson
Dave Perkins
Randy Presuhn
Aleksey Romanov
Shawn Routhier
Jon Saperia
Juergen Schoenwaelder
Bob Stewart
Kaj Tesink
Glenn Waters
Bert Wijnen
11. IANA Considerations
The SNMPv2-TM MIB module requires the allocation of a single object
identifier for its MODULE-IDENTITY. IANA has allocated this object
identifier in the snmpModules subtree, defined in the SNMPv2-SMI MIB
module.
Presuhn, et al. Standards Track [Page 15]
RFC 3417 Transport Mappings for SNMP December 2002
12. Security Considerations
SNMPv1 by itself is not a secure environment. Even if the network
itself is secure (for example by using IPSec), even then, there is no
control as to who on the secure network is allowed to access and
GET/SET (read/change) the objects accessible through a command
responder application.
It is recommended that the implementors consider the security
features as provided by the SNMPv3 framework. Specifically, the use
of the User-based Security Model STD 62, RFC 3414 [RFC3414] and the
View-based Access Control Model STD 62, RFC 3415 [RFC3415] is
recommended.
It is then a customer/user responsibility to ensure that the SNMP
entity giving access to a MIB is properly configured to give access
to the objects only to those principals (users) that have legitimate
rights to indeed GET or SET (change) them.
13. References
13.1. Normative References
[BER] Information processing systems - Open Systems
Interconnection - Specification of Basic Encoding Rules
for Abstract Syntax Notation One (ASN.1), International
Organization for Standardization. International Standard
8825, December 1987.
[IS8072] Information processing systems - Open Systems
Interconnection - Transport Service Definition,
International Organization for Standardization.
International Standard 8072, June 1986.
[IS8072A] Information processing systems - Open Systems
Interconnection - Transport Service Definition - Addendum
1: Connectionless-mode Transmission, International
Organization for Standardization. International Standard
8072/AD 1, December 1986.
[RFC768] Postel, J., "User Datagram Protocol", STD 6, RFC 768,
August 1980.
[RFC791] Postel, J., "Internet Protocol", STD 5, RFC 791,
September 1981.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Presuhn, et al. Standards Track [Page 16]
RFC 3417 Transport Mappings for SNMP December 2002
[RFC2578] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,
Rose, M. and S. Waldbusser, "Structure of Management
Information Version 2 (SMIv2)", STD 58, RFC 2578, April
1999.
[RFC2579] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,
Rose, M. and S. Waldbusser, "Textual Conventions for
SMIv2", STD 58, RFC 2579, April 1999.
[RFC2580] McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J.,
Rose, M. and S. Waldbusser, "Conformance Statements for
SMIv2", STD 58, RFC 2580, April 1999.
[RFC3414] Blumenthal, U. and B. Wijnen, "The User-Based Security
Model (USM) for Version 3 of the Simple Network
Management Protocol (SNMPv3)", STD 62, RFC 3414, December
2002.
[RFC3415] Wijnen, B., Presuhn, R. and K. McCloghrie, "View-based
Access Control Model (VACM) for the Simple Network
Management Protocol (SNMP)", STD 62, RFC 3415, December
2002.
[RFC3416] Presuhn, R., Case, J., McCloghrie, K., Rose, M. and S.
Waldbusser, "Version 2 of the Protocol Operations for the
Simple Network Management Protocol (SNMP)", STD 62, RFC
3416, December 2002.
13.2. Informative References
[APPLETALK] Sidhu, G., Andrews, R. and A. Oppenheimer, Inside
AppleTalk (second edition). Addison-Wesley, 1990.
[NOVELL] Network System Technical Interface Overview. Novell,
Inc., June 1989.
[RFC1157] Case, J., Fedor, M., Schoffstall, M. and J. Davin,
"Simple Network Management Protocol", STD 15, RFC 1157,
May 1990.
[RFC1742] Waldbusser, S. and K. Frisa, "AppleTalk Management
Information Base II", RFC 1742, January 1995.
[RFC2576] Frye, R., Levi, D., Routhier, S. and B. Wijnen,
"Coexistence between Version 1, Version 2, and Version 3
of the Internet-Standard Network Management Framework",
RFC 2576, March 2000.
Presuhn, et al. Standards Track [Page 17]
RFC 3417 Transport Mappings for SNMP December 2002
[RFC3410] Case, J., Mundy, R., Partain, D. and B. Stewart,
"Introduction and Applicability Statements for Internet-
Standard Management Framework", RFC 3410, December 2002.
[RFC3419] Daniele, M. and J. Schoenwaelder, "Textual Conventions
for Transport Addresses", RFC 3419, November 2002.
14. Changes from RFC 1906
This document differs from RFC 1906 only in editorial improvements.
The protocol is unchanged.
15. Editor's Address
Randy Presuhn
BMC Software, Inc.
2141 North First Street
San Jose, CA 95131
USA
Phone: +1 408 546-1006
EMail: randy_presuhn@bmc.com
Presuhn, et al. Standards Track [Page 18]
RFC 3417 Transport Mappings for SNMP December 2002
16. Full Copyright Statement
Copyright (C) The Internet Society (2002). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph are
included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Presuhn, et al. Standards Track [Page 19]