• Nem Talált Eredményt

Protocol operations

In document Network Management Architectures (Pldal 74-77)

4 Internet Management

4.1 The original SNMP protocol

4.1.2 Protocol operations

In SNMP, communication from the manager to the agent system is performed in a confirmed way. The SNMP entity at the manager’s side takes the initiative by sending one of the following PDUs:GetRequest,GetNextRequest orSetRequest. The GetRequest andGetNextRequest are used to retrieve management information from the agent, the SetRequest is used to store (or change) management information.

After reception of one of these PDUs, the SNMP entity at the agent’s side responds with a Response PDU (Figure 4.2). This PDU carries the requested information or indicates failure of the previous request.

It is also possible that the SNMP entity at the agent’s side takes the initiative.

This happens in case the agent detects some extraordinary event, such as a re-initialization or a status change at one of its links. As a reaction, the agent’s SNMP entity sends aTrap PDU to the managing system (Traps may be compared to OSI Event-Reports). Reception of theTrap is not confirmed (Figure 4.3).

SNMP does not describe how to relate the variousGet,Set andTrap interactions.

What to do after reception of a Trap is, for example, not defined by SNMP.

Instead, determination of this relationship is considered to be a responsibility of the manager specific functions.

Figure 4.2: Managing system takes the initiative

GetRequest

Response

GetNextRequest

Response

SetRequest

Response

manager agent

side side

manager agent

side side

manager agent

side side

Figure 4.3: Agent system takes the initiative

Trap

manager side agent side

SNMPv2

65

4.2 SNMPv2

Since publication of the original SNMP protocol, several proposals have been presented to improve SNMP. In 1992 it was decided to collect these proposals and produce a new standard: SNMPv2. Unfortunately SNMPv2 became far more complex than the original SNMP [79]; whereas the description of the orig-inal SNMP protocol required, for example, only 35 pages, the description of SNMPv2 required about 250 pages1.

The main achievements of SNMPv2 are the improved performance (Subsection 4.2.1), the better security (Subsection 4.2.2) and the possibility to build a hier-archy of managers (Subsection 4.2.3).

4.2.1 Performance

As explained on page 64, the original SNMP protocol includes a rule which states that if the response to a Get or GetNext request would exceed the maxi-mum size of a packet, no information will be returned at all. Since managers can not determine the precise size of response packets in advance, they usu-ally take a conservative guess and request per PDU just a small amount. To obtain all information, managers may be required to issue a large number of consecutive requests.

To improve performance, SNMPv2 introduced the GetBulk PDU. As opposed to the Get and GetNext, the response to the GetBulk always returns as much infor-mation as possible. If the requested inforinfor-mation exceeds the maximum size of an UDP packet, the information will be truncated and only the part that fits within the packet will be returned.

4.2.2 Security

The original SNMP protocol had, except for a simple mechanism which involved the exchange of passwords (the term ‘community string’ was used to denote this password), no security features. To solve this deficiency, SNMPv2 introduced a full-fledged security mechanism. This mechanism is based upon the use of ‘parties’ and ‘contexts’; two concepts that can not be found in other management approaches. Although the SNMPv2 standards include definitions of both concepts, these definitions are difficult to understand. This subsection presents a somewhat simplified view of these concepts.

Parties have some resemblance to protocol entities. Usually multiple parties are active in a single SNMPv2 subsystem and these various parties will be con-figured in different ways. One party may, for instance, be concon-figured such that it is prepared to communicate with every other party in every other system.

1. These numbers do not include the pages describing the Structure of Management Informa-tion.

Internet Management

Another party may be configured such that it is only prepared to interact with one particular remote party. In such case, the MD5 authentication mechanism is used to ensure the authentication of the other party. Finally parties may be configured in a way that they are only prepared to interact with particular remote parties and in addition require that all management information is encrypted according to the DES algorithm.

A graphical representation of parties is provided in Figure 4.4. In this figure three parties have been configured in the manager system (Pa1, Pa2 and Pa3) and three parties in the agent system (Pb1, Pb2 and Pb3).

To control access to the various parts of a MIB, SNMPv2 has introduced the context concept. Each context refers a specific part of a MIB. In the example of Figure 4.4, contextC1 and contextC2 refer to the two dotted areas in the MIB.

Contexts may be overlapping and are dynamically configurable, which means that contexts may be created, deleted or modified during the network’s opera-tional phase. Different contexts may be configured for different systems.

Pb2 C2

C1

Pb3 Pb1

Pa2 Pa3 Pa1

UDP Manager

MIB

Figure 4.4: Parties and contexts

remote party local party context operation

get get + set

get Pa1

Pa2 Pa3

Pb1 Pb2 Pb3

C1 C1 C1

get

Pa3 Pb3 C2

Figure 4.5: Example of an Access Control List (ACL)

MIBs

67 To determine which parties are allowed to perform which operations upon which part of the MIB, SNMPv2 has associated with each agent an Access Con-trol List (ACL). Figure 4.5 shows an example of such a list. The first row indi-cates that party Pa1(in the manager system) may perform Get operations via partyPb1 (in the agent system) on that part of the MIB that is identified by con-text C1. The third row shows that Pa3 may via Pb3 also perform Set operations on this MIB part.

In document Network Management Architectures (Pldal 74-77)