<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SNMP and SIM in Server Management - Systems Insight Manager</title>
    <link>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683851#M16830</link>
    <description>It's not going to be easy.&lt;BR /&gt;&lt;BR /&gt;SNMP can be made a lot more secure, having a blanket policy of the type described on an internal network would be quite restrictive.&lt;BR /&gt;&lt;BR /&gt;SNMP can be configured to only allow connections from selected hosts and you can dispense with the default community names and create your own.&lt;BR /&gt;You only need a Read Only SNMP name to get a lot of functionality.&lt;BR /&gt;&lt;BR /&gt;I've heard a few people say SNMP is not secure, but I've never found a definitive reference that says why.</description>
    <pubDate>Sun, 04 Dec 2005 19:09:04 GMT</pubDate>
    <dc:creator>Rob Buxton</dc:creator>
    <dc:date>2005-12-04T19:09:04Z</dc:date>
    <item>
      <title>SNMP and SIM</title>
      <link>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683848#M16827</link>
      <description>Is there a way to deploy SIM without enabling SNMP on every server you want to view at the SIM console?  Our security staff doesn't allow us to enable SNMP.&lt;BR /&gt;&lt;BR /&gt;Thanks in advance.</description>
      <pubDate>Fri, 02 Dec 2005 19:21:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683848#M16827</guid>
      <dc:creator>Bill L'Hotta</dc:creator>
      <dc:date>2005-12-02T19:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP and SIM</title>
      <link>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683849#M16828</link>
      <description>make use of WBEM/WMI. you can get a reasonable amount of data.</description>
      <pubDate>Sat, 03 Dec 2005 04:38:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683849#M16828</guid>
      <dc:creator>Aravindh Rajaram</dc:creator>
      <dc:date>2005-12-03T04:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP and SIM</title>
      <link>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683850#M16829</link>
      <description>If the problem is security u can define the snmp service to be private(only the group u define can see it).&lt;BR /&gt;Any other way(WMI,NTPerfmon,COda) won't get u hardware data.</description>
      <pubDate>Sat, 03 Dec 2005 06:03:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683850#M16829</guid>
      <dc:creator>Safi</dc:creator>
      <dc:date>2005-12-03T06:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP and SIM</title>
      <link>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683851#M16830</link>
      <description>It's not going to be easy.&lt;BR /&gt;&lt;BR /&gt;SNMP can be made a lot more secure, having a blanket policy of the type described on an internal network would be quite restrictive.&lt;BR /&gt;&lt;BR /&gt;SNMP can be configured to only allow connections from selected hosts and you can dispense with the default community names and create your own.&lt;BR /&gt;You only need a Read Only SNMP name to get a lot of functionality.&lt;BR /&gt;&lt;BR /&gt;I've heard a few people say SNMP is not secure, but I've never found a definitive reference that says why.</description>
      <pubDate>Sun, 04 Dec 2005 19:09:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683851#M16830</guid>
      <dc:creator>Rob Buxton</dc:creator>
      <dc:date>2005-12-04T19:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP and SIM</title>
      <link>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683852#M16831</link>
      <description>Ask the network infrastructure people if they are allowed to use SNMP and I'll bet the answer is yes.</description>
      <pubDate>Mon, 05 Dec 2005 01:52:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683852#M16831</guid>
      <dc:creator>David Claypool</dc:creator>
      <dc:date>2005-12-05T01:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP and SIM</title>
      <link>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683853#M16832</link>
      <description>Rob:&lt;BR /&gt;SNMP &amp;amp; Security: SNMP sends it's requests and answers unencrypted over the wire, so if you have someone sniffing the wire they'll "see" the community, passwords etc. Thats why it's considered unsecured..</description>
      <pubDate>Mon, 05 Dec 2005 08:10:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683853#M16832</guid>
      <dc:creator>Stefan Laemmer</dc:creator>
      <dc:date>2005-12-05T08:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP and SIM</title>
      <link>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683854#M16833</link>
      <description>Stefan:&lt;BR /&gt;&lt;BR /&gt;First of all, in a corporate LAN environment (not outside the firewall on the wide open Internet), if you have people sniffing your wire, you have a bigger problem than SNMP.&lt;BR /&gt;&lt;BR /&gt;SNMP in and of itself is not evil.  HP SIM uses it in a controlled and relatively 'safe' fashion:&lt;BR /&gt;&lt;BR /&gt;- Only read operations are performed by HP SIM using SNMP (any write operation is performed using an HTTP connection with SSL)&lt;BR /&gt;&lt;BR /&gt;- Additionally, the HP Management Agents use SNMP for sending events as SNMP traps&lt;BR /&gt;&lt;BR /&gt;- While the HP Insight Management Agents require a local write string, it is only used for intra-agent communication--it is never used across the wire&lt;BR /&gt;&lt;BR /&gt;If sniffing SNMP tells you a system's community string which lets you discover a system is running Windows or has 512MB of memory, it is not a very useful item of information to cause harm...</description>
      <pubDate>Mon, 05 Dec 2005 09:32:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/server-management-systems/snmp-and-sim/m-p/3683854#M16833</guid>
      <dc:creator>David Claypool</dc:creator>
      <dc:date>2005-12-05T09:32:51Z</dc:date>
    </item>
  </channel>
</rss>

