
Using Technician Interface Software
8-50
When the agent on the router receives the set request, it compares the decrypted
value with the value of its own counter plus 1. If the two values match, the agent
considers the
set request to be authentic and increments the counter by 2. The
agent stores the new value of the counter in an encrypted form in the MIB and
sends it back to Site Manager as the first variable binding in the response.
The manager receiving the response validates that the received counter matches
the manager’s counter plus 2. If the two values match, the response is declared
authentic.
The use of counters guards against masquerade security violations because an
intruder would have to know the encryption key and the correct counter to send as
the first variable binding. The security mechanism also guards against message
stream modification; an intruder cannot reorder a sequence of
set requests
because the requests’ counters would not match the next sequence expected by the
agent.
The following sections describe the Technician Interface commands you use to
manage the security feature.
Setting the Router to Operate in Secure Mode
The wfsnmpmode command allows you to specify whether or not you want the
router to operate in secure mode.
Enter the
wfsnmpmode command in the following format:
wfsnmpmode [1 | 3]
1 (trivial) indicates that the router should provide no additional security beyond a
simple community name.
3 (proprietary) indicates that the router should operate using our proprietary
security mechanism.
Note: Do not use the default (Public) community and wildcard manager
(0.0.0.0) with the router in Secure Mode. Instead, configure a specific SNMP
community and manager address. For more information on how to configure
SNMP communities, refer to the guide Configuring SNMP, BOOTP, DHCP,
and RARP Services.
Commentaires sur ces manuels