Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. SNMP. Pros and Cons. Write at least 4 paragraphs, with at least 5 sentences i

ID: 3877147 • Letter: 1

Question

1.     SNMP. Pros and Cons. Write at least 4 paragraphs, with at least 5 sentences in each paragraph.   For the first 2 paragraphs detail several core advantages of using SNMP. Describe at least 2 specific tasks that you would perform using SNMP. In the second 2 paragraphs detail some of the risks and pitfalls of using SNMP. Describe at least 2 specific threats that could be performed using SNMP.  

2.     What would be two likely reasons why a Ping request to a host would not receive a response?

3.     Describe two critical processes a policy oversight process would perform.

4.     Explain why redundancy is a critical part of any successful network design.

5.     Describe two pros or cons associated with Spread Spectrum Transmissions.

6.     Consider the difficulties of using a ESS WLAN network where sessions are handed off. Write a ‘procedure’ statement, or best practices FAQ for laptop users that roam throughout your company site. Describe at least 4 core issues or considerations.

7.     WLAN Speeds. Describe in detail 4 specific items that would interfere with WLAN performances. Be sure you explain how the items are problematic - don’t just list items. Limit your discussion to Network layer services, do not describe security issues or attacks such as Denial of Service.

8.     Multiuser MIMO. Describe in detail two core advantages

Explanation / Answer

1.SNMP : Pros and Cons.

Simple Network Management Protocol (SNMP) is a popular protocol for network management. It is used for collecting information from, and configuring, network devices, such as servers, printers, hubs, switches, and routers on an Internet Protocol (IP) network. SNMP remote monitoring is a vital function for any company with a large network. When you have a network that isn't isolated within a single area, you need assistance to manage it remotely. Its usefulness in network administration comes from the fact that it allows information about network-connected devices to be collected in a standardized way across a large variety of hardware and software types.

For the first 2 paragraphs detail several core advantages of using SNMP.

Defined in 2002, SNMP version 3 includes security solutions like user accounts, authentication, and optional encryption of data packages. This enhances security and makes SNMP v3 the recommended SNMP version when it comes to security.

Describe at least 2 specific tasks that you would perform using SNMP.

As its name Simple Network Management Protocol says, it can be used for network management. In order to manage a network, admins need information about it. So as to say specific tasks I would perform using SNMP are

Network monitoring will result in a lot of data in monitoring database. Let the numbers speak for themselves and use them to create reports and statistics.

So, sysadmins know exactly where to take action when a problem arises, and sometimes they even know before it occurs.

In the second 2 paragraphs detail some of the risks and pitfalls of using SNMP.

Several pitfalls and security risks have been reported in many network management systems and some examples are given below:

o Insecure perimeter of your network: SNMP queries may be inadvertently allowed to firewalls and packet filters so that remote network scanners could be able to obtain the exact filter rules for your network.

o Not securing the defaults strings: The default name for the SNMP community string is PUBLIC and many products are shipped with this name. This is the first thing the attacker will look for.

o Worse then PUBLIC: Having no community name at all is worse than having just PUBLIC because now anyone can access the device, learn whatever they can from the device, and possibly alter its configuration.

o Stop authentication trapping: An advisory was issued about the ability to write to the snmpEnableAuthenTraps object within various systems. Potentially, an attacker could prevent the device from sending traps for failed authentication. Then the attacker could take his time to crack the admin password for the device, all without drawing attention to his activity.

o Controlling the access: A common problem mentioned is to not control the Read-Write community tightly, giving the wrong people the ability to alter the device. What this could lead to is having an attacker cause problems by bringing down the interface.

o Hidden SNMP communities: HP Openview was found to have a hidden SNMP community string that may allow unauthorized access to certainSNMP variables. Attackers may use this hidden community to learn about network topologyas well as to modify MIB variables. It was found that this problem extended to other vendors’ products such as Sun Solstice and Solaris.

o Remote Packet Capturing: There are tools that do packet-capturing over the network using SNMP. Now this could lead to an attacker who is eavesdropping to obtain information about the network and other critical data. Two such

tools come to my mind are Microsoft’s NetMon and NAI’s Distributed Sniffer.

o Printer hiccups: Some HP printers let malicious people execute DOS attack by sending SNMP gets, specifically the older firmware in the HP Series 5 printers.

o ICMP echo requests: Some routers, for example Cisco, can be configured to issue ICMP echo requests through the SNMP agent. If you repeat this numerous times the memory of the router can be filled. This would cause performance problems and an inability to respond to the ICMP echo requests.