- Community Home
- >
- Servers and Operating Systems
- >
- HPE ProLiant
- >
- Server Management - Systems Insight Manager
- >
- Re: SNMP over the Internet
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО10-05-2004 11:56 AM
тАО10-05-2004 11:56 AM
I understand from a previous post that - "HP SIM still relies on SNMP for status polling and traps. There are significant feature limitations if SNMP is not available"
As SNMP is essential, I have considered using the following SNMP configuration:-
- Set a non-default Community Name
- Set the Right to be READ_ONLY
- Only allow traffic from a single host
- Only allow SNMP communication over the internet between our head office (where the management server will be) and the customer site. So, our firewall will only allow traps from our customers IP, and our customers firewall will only allow traps from our IP.
Would this be considered adequate security?
Any help would be appreciated.
Kevin
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО10-05-2004 02:56 PM
тАО10-05-2004 02:56 PM
Re: SNMP over the Internet
I think monitoring anything over an unsecured internet connection would have potential risks.
Note the SNMP traffic can be two way, SNMP is used by HPSIM to identify and gain initial access to the device.
The device can also send SNMP Traps to the remote server so communication is two way.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО10-05-2004 09:19 PM
тАО10-05-2004 09:19 PM
Re: SNMP over the Internet
Thanks for your reply.
My scenario above does mean that two-way communication can take place by using firewall rules to forward the SNMP requests.
Also, SNMP would not be 'open' to the internet because the firewalls would only allow communication between our office IP Address and the customers IP Address, thus leaving SNMP 'closed' to the internet as a whole.
I hope my explanation is clear. Any further help would be appreciated.
Kevin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО10-07-2004 01:08 AM
тАО10-07-2004 01:08 AM
Re: SNMP over the Internet
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО10-07-2004 06:29 AM
тАО10-07-2004 06:29 AM
SolutionI would not consider this solution to be adequate security, as it ultimately involves sending sensitive information about your client's infrastructure unencrypted over an untrusted network. Most significantly, SNMP packets contain the community string as cleartext within the packet, but such packets would also include information about your client's network configuration, information your client most likely wants (or should want) to keep out of unknown hands. This configuraton could allow (as Matthew noted) sniffing and spoofing of packets, inclding the introduction of packets that could allow an attacker to manipulate or crash a server on your client's network, or to introduce false or misleading information, or block information from reaching, your monitoring station.
One option you might consider would be establishing a private connection to your client's network. Depending on where you are and your proximity to your client, you may be able to get an unlimited-use ISDN circuit for a reasonable cost (not much more than a POTS line for each circuit). Depending on the size of your client's network (I'm assuming it's rather small since they don't have an in-house IT staff to monitor Insight Manager), this should be adequate for you to service their needs. This involves a small up-front investment by your client, and a recurring monthly cost.
If the private ISDN is not an option, you could also consider placing the monitoring server at your client's site and gaining access through it's web-based interface. This way the information being received from your client's site is being received through an SSL connection. It is important to note that the monitoring "server" need not be true a true server-grade hardware or OS if implementation cost is an issue, though you will probably want the capacity to store and back up alert history.
-Terry
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО10-12-2004 12:39 AM
тАО10-12-2004 12:39 AM
Re: SNMP over the Internet
Another option is to buid a secure VPN Connection with IPsec using your existing Internetconnection and tunnel all your SNMP over this VPN.