Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2)

@article{Galvin1993SecurityPF,
  title={Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2)},
  author={James M. Galvin and Keith McCloghrie},
  journal={RFC},
  year={1993},
  volume={1446},
  pages={1-52}
}
It is the purpose of this document, Security Protocols for SNMPv2, to define one such authentication and one such privacy protocol. [STANDARDS-TRACK] 

Administrative Model for version 2 of the Simple Network Management Protocol (SNMPv2)

TLDR
The Administrative Model for SNMPv2 is defined to define how the administrative framework is applied to realize effective network management in a variety of configurations and environments.

Security Architecture for the Internet Protocol

This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401

IP Authentication using Keyed MD5

TLDR
This document describes the use of keyed MD5 with the IP Authentication Header and describes the implications of this use.

IP Encapsulating Security Payload (ESP)

This document describes an updated version of the Encapsulating Security Payload (ESP) protocol, which is designed to provide a mix of security services in IPv4 and IPv6. ESP is used to provide

Introduction to version 2 of the Internet-standard Network Management Framework

The purpose of this document is to provide an overview of version 2 of the Internet-standard Network Management Framework, termed the SNMP version 2 framework (SNMPv2). [STANDARDS-TRACK]

Internet Security Protocols

  • W. Fumy
  • Computer Science
    State of the Art in Applied Cryptography
  • 1997
This article describes various efforts to address security in three areas of the Internet protocol suite: the Internet Protocol itself (IPsec), the domain between transport and application layer (the

On Internet Authentication

This document describes a spectrum of authentication technologies and provides suggestions to protocol developers on what kinds of authentication might be suitable for some kinds of protocols and

Sleepy Network-Layer Authentication Service for IPSEC

TLDR
This paper examines a sleepy approach, where the gateways normally do not authenticate or verify the packets unless security attacks are detected, and proposes a security protocol, SSGP (Sleepy Security Gateway Protocol), residing on top of the IPSEC (Internet Security Protocol).

Progress in internet security

Secure Remote Management in the ESPRIT MIDAS Project

TLDR
This paper describes work carried out in the ESPRIT "MIDAS" project to provide for secure management in the context of the ISO standards for network and system management and presents an analysis of the security requirements.

References

SHOWING 1-10 OF 20 REFERENCES

Protocol Operations for version 2 of the Simple Network Management Protocol (SNMPv2)

It is the purpose of this document, Protocol Operations for SNMPv2, to define the operations of the protocol with respect to the sending and receiving of the PDUs. [STANDARDS-TRACK]

Administrative Model for version 2 of the Simple Network Management Protocol (SNMPv2)

TLDR
The Administrative Model for SNMPv2 is defined to define how the administrative framework is applied to realize effective network management in a variety of configurations and environments.

Management Information Base for version 2 of the Simple Network Management Protocol (SNMPv2)

It is the purpose of this document to define managed objects which describe the behavior of a SNMPv2 entity. [STANDARDS-TRACK]

Transport Mappings for version 2 of the Simple Network Management Protocol (SNMPv2)

It is the purpose of this document to define how the SNMPv2 maps onto an initial set of transport domains. [STANDARDS-TRACK]

Simple Network Management Protocol

TLDR
This RFC defines a simple protocol by which management information for a network element may be inspected or altered by logically remote users and specifies a draft standard for the Internet community.

Guidelines for Implementing and Using the NBS Data Encryption Standard

TLDR
These guidelines provide information on what encryption is, general guidance on how encryption protects against certain vulnerabilities of computer networks, and specific guidance on the DES mode of operation in data communications applications.

The MD5 Message-Digest Algorithm

The MD4 message digest algorithm takes an input message of arbitrary length and produces an output 128-bit "fingerprint" or "message digest", in such a way that it is (hopefully) computationally

The American National Standards Institute

  • F. Andersen
  • Sociology
    IEEE Engineering in Medicine and Biology Magazine
  • 1984
TLDR
This document describes the organization and operations of the American National Standards Institute and describes the research and development activities of the institute.

Party MIB for version 2 of the Simple Network Management Protocol (SNMPv2)

TLDR
The purpose of this document, the Party MIB for SNMPv2, is to define managed objects which correspond to these properties associated with SNMP v2 parties, contexts, and access control policies.