Basic Dial NMS Implementation Guide
Table Of Contents
- Preface
- Overview of Basic SNMP Building Blocks
- Network Design for a DialNMSCase Study
- Dial MIBs and OIDs Used in the Case Study
- Task 1—Enabling SNMP in a Cisco IOS Device
- Task 2— Exploring SNMP Capabilities by Using UCD-SNMP
- Task 3—Using MRTG to Monitor and Graph Traffic Loads
- Task 4—Using Syslog, NTP, and Modem Call Records to Isolate and Troubleshoot Faults
- Task 5—Setting Up a Web Portal forthe DialNMS
- Task 6—Managing IP Addresses by Using DNS
- Task 7—Using HP OpenView to Create the SNMP Framework
- Task 8—Using CiscoWorks 2000 Resource Manager Essentials

Overview of Basic SNMP Building Blocks
About SNMP Security
Basic Dial NMS Implementation Guide
About SNMP Security
SNMP lacks authentication capabilities, which results in a variety of security threats:
Masquerading
—An unauthorized entity attempting to perform management operations by
assuming the identity of an authorized management entity.
Modification of information
—An unauthorized entity attempting to alter a message generated by
an authorized entity, so the message results in unauthorized accounting management or
configuration management operations.
Message sequence and timing modifications
—Occurs when an unauthorized entity reorders,
delays, or copies and later replays a message generated by an authorized entity.
Disclosure
—Results when an unauthorized entity extracts values stored in managed objects.
The entity can also learn of notifiable events by monitoring exchanges between managers and
agents.
Note
Because SNMP does not implement authentication, many vendors do not implement
Set
operations, which reduce SNMP to a monitoring facility.