![]() You don’t give out credit card information on Web sites that aren’t using SSL, right? (At least I hope you don’t.) So why not add an extra layer to SNMP’s security and encrypt it? Obviously, proper physical and access security are parts of the answer here, but why not encrypt the protocol? I mean, you encrypt other sensitive data. If someone got in and knew what to look for, they could slurp up a lot of information in a very short time. Prior to SNMPv3, about all you could do was restrict your SNMP use to behind a firewall or over a VPN, and hope for the best. That kind of information, when taken together, can give an attacker a very detailed view of your network and its major components-not something you’d want happening. Now, this is not that valuable to an attacker, but there are other kinds of SNMP queries that will tell you things like specific OS version for your servers, firmware version for your wireless access points, what processes are running on what server, and so forth. That happens to be the amount of time that particular server had been up in hundredths of a second.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |