summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc1351.txt
blob: deb2a873bec206b7937cccff8daf3017eabf6c17 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
1910
1911
1912
1913
1914
1915
1916
1917
1918
1919
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
1932
1933
1934
1935
1936
1937
1938
1939
1940
1941
1942
1943
1944
1945
1946
1947
1948
1949
1950
1951
1952
1953
1954
1955
1956
1957
1958
1959
1960
1961
1962
1963
Network Working Group                                          J. Davin
Request for Comments: 1351          MIT Laboratory for Computer Science
                                                              J. Galvin
                                      Trusted Information Systems, Inc.
                                                          K. McCloghrie
                                               Hughes LAN Systems, Inc.
                                                              July 1992


                       SNMP Administrative Model

Status of this Memo

   This document specifies an IAB standards track protocol for the
   Internet community, and requests discussion and suggestions for
   improvements. Please refer to the current edition of the "IAB
   Official Protocol Standards" for the standardization state and status
   of this protocol. Distribution of this memo is unlimited.

Table of Contents

   1.    Abstract  . . . . . . . . . . . . . . . . . . . . . . . . .  2
   2.    Introduction  . . . . . . . . . . . . . . . . . . . . . . .  2
   3.    Elements of the Model . . . . . . . . . . . . . . . . . . .  2
   3.1   SNMP Party  . . . . . . . . . . . . . . . . . . . . . . . .  2
   3.2   SNMP Protocol Entity  . . . . . . . . . . . . . . . . . . .  6
   3.3   SNMP Management Station . . . . . . . . . . . . . . . . . .  6
   3.4   SNMP Agent  . . . . . . . . . . . . . . . . . . . . . . . .  7
   3.5   View Subtree  . . . . . . . . . . . . . . . . . . . . . . .  7
   3.6   MIB View  . . . . . . . . . . . . . . . . . . . . . . . . .  7
   3.7   SNMP Management Communication . . . . . . . . . . . . . . .  8
   3.8   SNMP Authenticated Management Communication . . . . . . . .  9
   3.9   SNMP Private Management Communication   . . . . . . . . . .  9
   3.10  SNMP Management Communication Class . . . . . . . . . . . . 10
   3.11  SNMP Access Control Policy  . . . . . . . . . . . . . . . . 11
   3.12  SNMP Proxy Party  . . . . . . . . . . . . . . . . . . . . . 12
   3.13  Procedures  . . . . . . . . . . . . . . . . . . . . . . . . 13
   3.13.1  Generating a Request  . . . . . . . . . . . . . . . . . . 13
   3.13.2  Processing a Received Communication . . . . . . . . . . . 15
   3.13.3  Generating a Response . . . . . . . . . . . . . . . . . . 17
   4.    Application of the Model  . . . . . . . . . . . . . . . . . 17
   4.1   Non-Secure Minimal Agent Configuration  . . . . . . . . . . 17
   4.2   Secure Minimal Agent Configuration  . . . . . . . . . . . . 20
   4.3   Proxy Configuration   . . . . . . . . . . . . . . . . . . . 21
   4.3.1   Foreign Proxy Configuration . . . . . . . . . . . . . . . 22
   4.3.2   Native Proxy Configuration  . . . . . . . . . . . . . . . 25
   4.4   Public Key Configuration  . . . . . . . . . . . . . . . . . 27
   4.5   MIB View Configurations . . . . . . . . . . . . . . . . . . 29



Davin, Galvin, & McCloghrie                                     [Page 1]
^L
RFC 1351               SNMP Administrative Model               July 1992


   5.    Compatibility . . . . . . . . . . . . . . . . . . . . . . . 33
   6.    Security Considerations . . . . . . . . . . . . . . . . . . 33
   7.    References  . . . . . . . . . . . . . . . . . . . . . . . .
   8.    Authors' Addresses  . . . . . . . . . . . . . . . . . . . . 34

1.  Abstract

   This memo presents an elaboration of the SNMP administrative model
   set forth in [1]. This model provides a unified conceptual basis for
   administering SNMP protocol entities to support

     o authentication and integrity,

     o privacy,

     o access control, and

     o the cooperation of multiple protocol entities.

   Please send comments to the SNMP Security Developers mailing list
   (snmp-sec-dev@tis.com).

2.  Introduction

   This memo presents an elaboration of the SNMP administrative model
   set forth in [1]. It describes how the elaborated administrative
   model is applied to realize effective network management in a variety
   of configurations and environments.

   The model described here entails the use of distinct identities for
   peers that exchange SNMP messages. Thus, it represents a departure
   from the community-based administrative model set forth in [1]. By
   unambiguously identifying the source and intended recipient of each
   SNMP message, this new strategy improves upon the historical
   community scheme both by supporting a more convenient access control
   model and allowing for effective use of asymmetric (public key)
   security protocols in the future.

3.  Elements of the Model

3.1   SNMP Party

   A SNMP party  is a conceptual, virtual execution context whose
   operation is restricted (for security or other purposes) to an
   administratively defined subset of all possible operations of a
   particular SNMP protocol entity (see Section 3.2).  Whenever a SNMP
   protocol entity processes a SNMP message, it does so by acting as a
   SNMP party and is thereby restricted to the set of operations defined



Davin, Galvin, & McCloghrie                                     [Page 2]
^L
RFC 1351               SNMP Administrative Model               July 1992


   for that party. The set of possible operations specified for a SNMP
   party may be overlapping or disjoint with respect to the sets of
   other SNMP parties; it may also be a proper or improper subset of all
   possible operations of the SNMP protocol entity.

   Architecturally, each SNMP party comprises

     o a single, unique party identity,

     o a single authentication protocol and associated
       parameters by which all protocol messages originated by
       the party are authenticated as to origin and integrity,

     o a single privacy protocol and associated parameters by
       which all protocol messages received by the party are
       protected from disclosure,

     o a single MIB view (see Section 3.6) to which all
       management operations performed by the party are
       applied, and

     o a logical network location at which the party executes,
       characterized by a transport protocol domain and
       transport addressing information.

   Conceptually, each SNMP party may be represented by an ASN.1 value
   with the following syntax:


      SnmpParty ::= SEQUENCE {
        partyIdentity
           OBJECT IDENTIFIER,
        partyTDomain
           OBJECT IDENTIFIER,
        partyTAddr
           OCTET STRING,
        partyProxyFor
           OBJECT IDENTIFIER,
        partyMaxMessageSize
           INTEGER,
        partyAuthProtocol
           OBJECT IDENTIFIER,
        partyAuthClock
           INTEGER,
        partyAuthLastMsg
           INTEGER,
        partyAuthNonce
           INTEGER,



Davin, Galvin, & McCloghrie                                     [Page 3]
^L
RFC 1351               SNMP Administrative Model               July 1992


        partyAuthPrivate
           OCTET STRING,
        partyAuthPublic
           OCTET STRING,
        partyAuthLifetime
           INTEGER,
        partyPrivProtocol
           OBJECT IDENTIFIER,
        partyPrivPrivate
           OCTET STRING,
        partyPrivPublic
           OCTET STRING
      }


   For each SnmpParty value that represents a SNMP party, the following
   statements are true:

     o Its partyIdentity component is the party identity.

     o Its partyTDomain component is called the transport
       domain and indicates the kind of transport service by
       which the party receives network management traffic.
       An example of a transport domain is
       rfc1351Domain (SNMP over UDP, using SNMP
       parties).

     o Its partyTAddr component is called the transport
       addressing information and represents a transport
       service address by which the party receives network
       management traffic.

     o Its partyProxyFor component is called the proxied
       party  and represents the identity of a second SNMP
       party or other management entity with which
       interaction may be necessary to satisfy received
       management requests. In this context, the value
       noProxy signifies that the party responds to received
       management requests by entirely local mechanisms.

     o Its partyMaxMessageSize component is called the
       maximum message size and represents the length in
       octets of the largest SNMP message this party is
       prepared to accept.

     o Its partyAuthProtocol component is called the
       authentication protocol and identifies a protocol and a
       mechanism by which all messages generated by the party



Davin, Galvin, & McCloghrie                                     [Page 4]
^L
RFC 1351               SNMP Administrative Model               July 1992


       are authenticated as to integrity and origin. In this
       context, the value noAuth signifies that messages
       generated by the party are not authenticated as to
       integrity and origin.

     o Its partyAuthClock component is called the
       authentication clock and represents a notion of the
       current time that is specific to the party. The
       significance of this component is specific to the
       authentication protocol.

     o Its partyAuthLastMsg component is called the
       last-timestamp and represents a notion of time
       associated with the most recent, authentic protocol
       message generated by the party. The significance of this
       component is specific to the authentication protocol.

     o Its partyAuthNonce component is called the nonce
       and represents a monotonically increasing integer
       associated with the most recent, authentic protocol
       message generated by the party. The significance of this
       component is specific to the authentication protocol.

     o Its partyAuthPrivate component is called the private
       authentication key and represents any secret value
       needed to support the authentication protocol. The
       significance of this component is specific to the
       authentication protocol.

     o Its partyAuthPublic component is called the public
       authentication key and represents any public value that
       may be needed to support the authentication protocol.
       The significance of this component is specific to the
       authentication protocol.

     o Its partyAuthLifetime component is called the
       lifetime and represents an administrative upper bound
       on acceptable delivery delay for protocol messages
       generated by the party. The significance of this
       component is specific to the authentication protocol.

     o Its partyPrivProtocol component is called the privacy
       protocol and identifies a protocol and a mechanism by
       which all protocol messages received by the party are
       protected from disclosure. In this context, the value
       noPriv signifies that messages received by the party are
       not protected from disclosure.




Davin, Galvin, & McCloghrie                                     [Page 5]
^L
RFC 1351               SNMP Administrative Model               July 1992


     o Its partyPrivPrivate component is called the private
       privacy key and represents any secret value needed to
       support the privacy protocol. The significance of this
       component is specific to the privacy protocol.

     o Its partyPrivPublic component is called the public
       privacy key and represents any public value that may be
       needed to support the privacy protocol. The significance
       of this component is specific to the privacy protocol.

   If, for all SNMP parties realized by a SNMP protocol entity, the
   authentication protocol is noAuth and the privacy protocol is noPriv,
   then that protocol entity is called non-secure.

3.2   SNMP Protocol Entity

   A SNMP protocol entity is an actual process which performs network
   management operations by generating and/or responding to SNMP
   protocol messages in the manner specified in [1]. When a protocol
   entity is acting as a particular SNMP party (see Section 3.1), the
   operation of that entity must be restricted to the subset of all
   possible operations that is administratively defined for that party.

   By definition, the operation of a SNMP protocol entity requires no
   concurrency between processing of any single protocol message (by a
   particular SNMP party) and processing of any other protocol message
   (by a potentially different SNMP party). Accordingly, implementation
   of a SNMP protocol entity to support more than one party need not be
   multi-threaded. However, there may be situations where implementors
   may choose to use multi-threading.

   Architecturally, every SNMP entity maintains a local database that
   represents all SNMP parties known to it -- those whose operation is
   realized locally, those whose operation is realized by proxy
   interactions with remote parties or devices, and those whose
   operation is realized by remote entities. In addition, every SNMP
   protocol entity maintains a local database that represents an access
   control policy (see Section 3.11) that defines the access privileges
   accorded to known SNMP parties.

3.3   SNMP Management Station

   A SNMP management station is the operational role assumed by a SNMP
   party when it initiates SNMP management operations by the generation
   of appropriate SNMP protocol messages or when it receives and
   processes trap notifications.

   Sometimes, the term SNMP management station is applied to partial



Davin, Galvin, & McCloghrie                                     [Page 6]
^L
RFC 1351               SNMP Administrative Model               July 1992


   implementations of the SNMP (in graphics workstations, for example)
   that focus upon this operational role. Such partial implementations
   may provide for convenient, local invocation of management services,
   but they may provide little or no support for performing SNMP
   management operations on behalf of remote protocol users.

3.4   SNMP Agent

   A SNMP agent is the operational role assumed by a SNMP party when it
   performs SNMP management operations in response to received SNMP
   protocol messages such as those generated by a SNMP management
   station (see Section 3.3).

   Sometimes, the term SNMP agent is applied to partial implementations
   of the SNMP (in embedded systems, for example) that focus upon this
   operational role. Such partial implementations provide for
   realization of SNMP management operations on behalf of remote users
   of management services, but they may provide little or no support for
   local invocation of such services.

3.5   View Subtree

   A view subtree is the set of all MIB object instances which have a
   common ASN.1 OBJECT IDENTIFIER prefix to their names. A view subtree
   is identified by the OBJECT IDENTIFIER value which is the longest
   OBJECT IDENTIFIER prefix common to all (potential) MIB object
   instances in that subtree.

3.6   MIB View

   A MIB view is a subset of the set of all instances of all object
   types defined according to the Internet-standard SMI [2] (i.e., of
   the universal set of all instances of all MIB objects), subject to
   the following constraints:

     o Each element of a MIB view is uniquely named by an
       ASN.1 OBJECT IDENTIFIER value. As such,
       identically named instances of a particular object type
       (e.g., in different agents) must be contained within
       different MIB views. That is, a particular object
       instance name resolves within a particular MIB view to
       at most one object instance.

     o Every MIB view is defined as a collection of view
       subtrees.






Davin, Galvin, & McCloghrie                                     [Page 7]
^L
RFC 1351               SNMP Administrative Model               July 1992


3.7   SNMP Management Communication

   A SNMP management communication is a communication from one specified
   SNMP party to a second specified SNMP party about management
   information that is represented in the MIB view of the appropriate
   party. In particular, a SNMP management communication may be

     o a query by the originating party about information in
       the MIB view of the addressed party (e.g., getRequest
       and getNextRequest),

     o an indicative assertion to the addressed party about
       information in the MIB view of the originating party
       (e.g., getResponse or trapNotification), or

     o an imperative assertion by the originating party about
       information in the MIB view of the addressed party
       (e.g., setRequest).

   A management communication is represented by an ASN.1 value with the
   syntax


      SnmpMgmtCom ::= [1] IMPLICIT SEQUENCE {
        dstParty
           OBJECT IDENTIFIER,
        srcParty
           OBJECT IDENTIFIER,
        pdu
           PDUs
      }


   For each SnmpMgmtCom value that represents a SNMP management
   communication, the following statements are true:

     o Its dstParty component is called the destination and
       identifies the SNMP party to which the communication
       is directed.

     o Its srcParty component is called the source and
       identifies the SNMP party from which the
       communication is originated.

     o Its pdu component has the form and significance
       attributed to it in [1].





Davin, Galvin, & McCloghrie                                     [Page 8]
^L
RFC 1351               SNMP Administrative Model               July 1992


3.8   SNMP Authenticated Management Communication

   A SNMP authenticated management communication is a SNMP management
   communication (see Section 3.7) for which the originating SNMP party
   is (possibly) reliably identified and for which the integrity of the
   transmission of the communication is (possibly) protected. An
   authenticated management communication is represented by an ASN.1
   value with the syntax


      SnmpAuthMsg ::= [1] IMPLICIT SEQUENCE {
        authInfo
           ANY, - defined by authentication protocol
        authData
           SnmpMgmtCom
      }


   For each SnmpAuthMsg value that represents a SNMP authenticated
   management communication, the following statements are true:

     o Its authInfo component is called the authentication
       information and represents information required in
       support of the authentication protocol used by the
       SNMP party originating the message. The detailed
       significance of the authentication information is specific
       to the authentication protocol in use; it has no effect on
       the application semantics of the communication other
       than its use by the authentication protocol in
       determining whether the communication is authentic or
       not.

     o Its authData component is called the authentication
       data and represents a SNMP management
       communication.

3.9   SNMP Private Management Communication

   A SNMP private management communication is a SNMP authenticated
   management communication (see Section 3.8) that is (possibly)
   protected from disclosure. A private management communication is
   represented by an ASN.1 value with the syntax









Davin, Galvin, & McCloghrie                                     [Page 9]
^L
RFC 1351               SNMP Administrative Model               July 1992


      SnmpPrivMsg ::= [1] IMPLICIT SEQUENCE {
        privDst
           OBJECT IDENTIFIER,
        privData
           [1] IMPLICIT OCTET STRING
      }


   For each SnmpPrivMsg value that represents a SNMP private management
   communication, the following statements are true:

     o Its privDst component is called the privacy destination
       and identifies the SNMP party to which the
       communication is directed.

     o Its privData component is called the privacy data and
       represents the (possibly encrypted) serialization
       (according to the conventions of [3] and [1]) of a SNMP
       authenticated management communication (see
       Section 3.8).

3.10   SNMP Management Communication Class

   A SNMP management communication class corresponds to a specific SNMP
   PDU type defined in [1]. A management communication class is
   represented by an ASN.1 INTEGER value according to the type of the
   identifying PDU (see Table 1).

                  Get             1
                  GetNext         2
                  GetResponse     4
                  Set             8
                  Trap           16

         Table 1: Management Communication Classes

   The value by which a communication class is represented is computed
   as 2 raised to the value of the ASN.1 context-specific tag for the
   appropriate SNMP PDU.

   A set of management communication classes is represented by the ASN.1
   INTEGER value that is the sum of the representations of the
   communication classes in that set. The null set is represented by the
   value zero.







Davin, Galvin, & McCloghrie                                    [Page 10]
^L
RFC 1351               SNMP Administrative Model               July 1992


3.11   SNMP Access Control Policy

   A SNMP access control policy is a specification of a local access
   policy in terms of the network management communication classes which
   are authorized between pairs of SNMP parties. Architecturally, such a
   specification comprises three parts:

     o the targets of SNMP access control - the SNMP parties
       that may perform management operations as requested
       by management communications received from other
       parties,

     o the subjects of SNMP access control - the SNMP parties
       that may request, by sending management
       communications to other parties, that management
       operations be performed, and

     o the policy that specifies the classes of SNMP
       management communications that a particular target is
       authorized to accept from a particular subject.

   Access to individual MIB object instances is determined implicitly
   since by definition each (target) SNMP party performs operations on
   exactly one MIB view. Thus, defining the permitted access of a
   (reliably) identified subject party to a particular target party
   effectively defines the access permitted by that subject to that
   target's MIB view and, accordingly, to particular MIB object
   instances.

   Conceptually, a SNMP access policy is represented by a collection of
   ASN.1 values with the following syntax:


      AclEntry ::= SEQUENCE {
        aclTarget
           OBJECT IDENTIFIER,
        aclSubject
           OBJECT IDENTIFIER,
        aclPrivileges
           INTEGER
      }


   For each such value that represents one part of a SNMP access policy,
   the following statements are true:






Davin, Galvin, & McCloghrie                                    [Page 11]
^L
RFC 1351               SNMP Administrative Model               July 1992


     o Its aclTarget component is called the target and
       identifies the SNMP party to which the partial policy
       permits access.

     o Its aclSubject component is called the subject and
       identifies the SNMP party to which the partial policy
       grants privileges.

     o Its aclPrivileges component is called the privileges and
       represents a set of SNMP management communication
       classes that are authorized to be processed by the
       specified target party when received from the specified
       subject party.

3.12   SNMP Proxy Party

   A SNMP proxy party is a SNMP party that performs management
   operations by communicating with another, logically remote party.

   When communication between a logically remote party and a SNMP proxy
   party is via the SNMP (over any transport protocol), then the proxy
   party is called a SNMP native proxy party. Deployment of SNMP native
   proxy parties is a means whereby the processing or bandwidth costs of
   management may be amortized or shifted -- thereby facilitating the
   construction of large management systems.

   When communication between a logically remote party and a SNMP proxy
   party is not via the SNMP, then the proxy party is called a SNMP
   foreign proxy party. Deployment of foreign proxy parties is a means
   whereby otherwise unmanageable devices or portions of an internet may
   be managed via the SNMP.

   The transparency principle that defines the behavior of a SNMP party
   in general applies in particular to a SNMP proxy party:

       The manner in which one SNMP party processes
       SNMP protocol messages received from another
       SNMP party is entirely transparent to the latter.

   The transparency principle derives directly from the historical SNMP
   philosophy of divorcing architecture from implementation. To this
   dichotomy are attributable many of the most valuable benefits in both
   the information and distribution models of the management framework,
   and it is the architectural cornerstone upon which large management
   systems may be built. Consistent with this philosophy, although the
   implementation of SNMP proxy agents in certain environments may
   resemble that of a transport-layer bridge, this particular
   implementation strategy (or any other!) does not merit special



Davin, Galvin, & McCloghrie                                    [Page 12]
^L
RFC 1351               SNMP Administrative Model               July 1992


   recognition either in the SNMP management architecture or in standard
   mechanisms for proxy administration.

   Implicit in the transparency principle is the requirement that the
   semantics of SNMP management operations are preserved between any two
   SNMP peers. In particular, the "as if simultaneous" semantics of a
   Set operation are extremely difficult to guarantee if its scope
   extends to management information resident at multiple network
   locations. For this reason, proxy configurations that admit Set
   operations that apply to information at multiple locations are
   discouraged, although such operations are not explicitly precluded by
   the architecture in those rare cases where they might be supported in
   a conformant way.

   Also implicit in the transparency principle is the requirement that,
   throughout its interaction with a proxy agent, a management station
   is supplied with no information about the nature or progress of the
   proxy mechanisms by which its requests are realized. That is, it
   should seem to the management station -- except for any distinction
   in underlying transport address -- as if it were interacting via SNMP
   directly with the proxied device. Thus, a timeout in the
   communication between a proxy agent and its proxied device should be
   represented as a timeout in the communication between the management
   station and the proxy agent. Similarly, an error response from a
   proxied device should -- as much as possible -- be represented by the
   corresponding error response in the interaction between the proxy
   agent and management station.

3.13   Procedures

   This section describes the procedures followed by a SNMP protocol
   entity in processing SNMP messages. These procedures are independent
   of the particular authentication and privacy protocols that may be in
   use.

3.13.1   Generating a Request

   This section describes the procedure followed by a SNMP protocol
   entity whenever either a management request or a trap notification is
   to be transmitted by a SNMP party.

    1. An ASN.1 SnmpMgmtCom value is constructed for
       which the srcParty component identifies the originating
       party, for which the dstParty component identifies the
       receiving party, and for which the other component
       represents the desired management operation.





Davin, Galvin, & McCloghrie                                    [Page 13]
^L
RFC 1351               SNMP Administrative Model               July 1992


    2. The local database is consulted to determine the
       authentication protocol and other relevant information
       for the originating SNMP party.

    3. An ASN.1 SnmpAuthMsg value is constructed with
       the following properties:

        o Its authInfo component is constructed according
          to the authentication protocol specified for the
          originating party.

          In particular, if the authentication protocol for the
          originating SNMP party is identified as noAuth,
          then this component corresponds to the OCTET
          STRING value of zero length.

        o Its authData component is the constructed
          SnmpMgmtCom value.

    4. The local database is consulted to determine the privacy
       protocol and other relevant information for the receiving
       SNMP party.

    5. An ASN.1 SnmpPrivMsg value is constructed with the
       following properties:

        o Its privDst component identifies the receiving
          SNMP party.

        o Its privData component is the (possibly
          encrypted) serialization of the SnmpAuthMsg
          value according to the conventions of [3] and [1].

          In particular, if the privacy protocol for the
          receiving SNMP party is identified as noPriv, then
          the privData component is unencrypted.
          Otherwise, the privData component is processed
          according to the privacy protocol.

    6. The constructed SnmpPrivMsg value is serialized
       according to the conventions of [3] and [1].

    7. The serialized SnmpPrivMsg value is transmitted
       using the transport address and transport domain for
       the receiving SNMP party.






Davin, Galvin, & McCloghrie                                    [Page 14]
^L
RFC 1351               SNMP Administrative Model               July 1992


3.13.2   Processing a Received Communication

   This section describes the procedure followed by a SNMP protocol
   entity whenever a management communication is received.

    1. If the received message is not the serialization (according
       to the conventions of [3] and [1]) of an ASN.1
       SnmpPrivMsg value, then that message is discarded
       without further processing.

    2. The local database is consulted for information about
       the receiving SNMP party identified by the privDst
       component of the SnmpPrivMsg value.

    3. If information about the receiving SNMP party is absent
       from the local database, or specifies a transport domain
       and address which indicates that the receiving party's
       operation is not realized by the local SNMP protocol
       entity, then the received message is discarded without
       further processing.

    4. An ASN.1 OCTET STRING value is constructed
       (possibly by decryption, according to the privacy
       protocol in use) from the privData component of said
       SnmpPrivMsg value.

       In particular, if the privacy protocol recorded for the
       party is noPriv, then the OCTET STRING value
       corresponds exactly to the privData component of the
       SnmpPrivMsg value.

    5. If the OCTET STRING value is not the serialization
       (according to the conventions of [3] and [1]) of an ASN.1
       SnmpAuthMsg value, then the received message is
       discarded without further processing.

    6. If the dstParty component of the authData
       component of the obtained SnmpAuthMsg value is
       not the same as the privDst component of the
       SnmpPrivMsg value, then the received message is
       discarded without further processing.

    7. The local database is consulted for information about
       the originating SNMP party identified by the srcParty
       component of the authData component of the
       SnmpAuthMsg value.





Davin, Galvin, & McCloghrie                                    [Page 15]
^L
RFC 1351               SNMP Administrative Model               July 1992


    8. If information about the originating SNMP party is
       absent from the local database, then the received
       message is discarded without further processing.

    9. The obtained SnmpAuthMsg value is evaluated
       according to the authentication protocol and other
       relevant information associated with the originating
       SNMP party in the local database.

       In particular, if the authentication protocol is identified
       as noAuth, then the SnmpAuthMsg value is always
       evaluated as authentic.

   10. If the SnmpAuthMsg value is evaluated as
       unauthentic, then the received message is discarded
       without further processing, and an authentication failure
       is noted.

   11. The ASN.1 SnmpMgmtCom value is extracted from
       the authData component of the SnmpAuthMsg
       value.

   12. The local database is consulted for access privileges
       permitted by the local access policy to the originating
       SNMP party with respect to the receiving SNMP party.

   13. The management communication class is determined
       from the ASN.1 tag value associated with the
       SnmpMgmtCom value.

   14. If the management communication class of the received
       message is either 16 or 4 (i.e., Trap or GetResponse) and
       this class is not among the access privileges, then the
       received message is discarded without further processing.

   15. If the management communication class of the received
       message is not among the access privileges, then the
       received message is discarded without further processing
       after generation and transmission of a response message.
       This response message is directed to the originating
       SNMP party on behalf of the receiving SNMP party. Its
       var-bind-list and request-id components are identical
       to those of the received request. Its error-index
       component is zero and its error-status component is
       readOnly.

   16. If the proxied party associated with the receiving SNMP
       party in the local database is identified as noProxy,



Davin, Galvin, & McCloghrie                                    [Page 16]
^L
RFC 1351               SNMP Administrative Model               July 1992


       then the management operation represented by the
       SnmpMgmtCom value is performed by the receiving
       SNMP protocol entity with respect to the MIB view
       identified with the receiving SNMP party according to
       the procedures set forth in [1].

   17. If the proxied party associated with the receiving SNMP
       party in the local database is not identified as noProxy,
       then the management operation represented by the
       SnmpMgmtCom value is performed through
       appropriate cooperation between the receiving SNMP
       party and the identified proxied party.

       In particular, if the transport domain associated with
       the identified proxied party in the local database is
       rfc1351Domain, then the operation requested by
       the received message is performed by the generation of a
       corresponding request to the proxied party on behalf of
       the receiving party. If the received message requires a
       response from the local SNMP protocol entity, then that
       response is subsequently generated from the response (if
       any) received from the proxied party corresponding to
       the newly generated request.

3.13.3   Generating a Response

   This section describes the procedure followed by a SNMP protocol
   entity whenever a response to a management request is generated.

   The procedure for generating a response to a SNMP management request
   is identical to the procedure for transmitting a request (see Section
   3.13.1), except for the derivation of the transport domain and
   address information.  In this case, the response is transmitted using
   the transport domain and address from which the corresponding request
   originated -- even if that is different from the transport
   information recorded in the local database.

4.  Application of the Model

   This section describes how the administrative model set forth above
   is applied to realize effective network management in a variety of
   configurations and environments. Several types of administrative
   configurations are identified, and an example of each is presented.

4.1   Non-Secure Minimal Agent Configuration

   This section presents an example configuration for a minimal, non-
   secure SNMP agent that interacts with one or more SNMP management



Davin, Galvin, & McCloghrie                                    [Page 17]
^L
RFC 1351               SNMP Administrative Model               July 1992


   stations. Table 2 presents information about SNMP parties that is
   known both to the minimal agent and to the manager, while Table 3
   presents similarly common information about the local access policy.

   As represented in Table 2, the example agent party operates at UDP
   port 161 at IP address 1.2.3.4 using the party identity gracie; the
   example manager operates at UDP port 2001 at IP address 1.2.3.5 using
   the identity george. At minimum, a non-secure SNMP agent
   implementation must provide for administrative configuration (and
   non-volatile storage) of the identities and transport addresses of
   two SNMP parties: itself and a remote peer. Strictly speaking, other
   information about these two parties (including access policy
   information) need not be configurable.

   Suppose that the managing party george wishes to interrogate the
   agent named gracie by issuing a SNMP GetNext request message. The
   manager consults its local database of party information. Because the
   authentication protocol for the party george is recorded as noAuth,
   the GetNext request message generated by the manager is not

    Identity          gracie                george
                      (agent)               (manager)
    Domain            rfc1351Domain         rfc1351Domain
    Address           1.2.3.4, 161          1.2.3.5, 2001
    Proxied Party     noProxy               noProxy
    Auth Prot         noAuth                noAuth
    Auth Priv Key     ""                    ""
    Auth Pub Key      ""                    ""
    Auth Clock        0                     0
    Auth Last Msg     0                     0
    Auth Lifetime     0                     0
    Priv Prot         noPriv                noPriv
    Priv Priv Key     ""                    ""
    Priv Pub Key      ""                    ""

         Table 2: Party Information for Minimal Agent



              Target    Subject   Privileges
              gracie    george    3
              george    gracie    20

        Table 3: Access Information for Minimal Agent

   authenticated as to origin and integrity. Because, according to the
   manager's database, the privacy protocol for the party gracie is
   noPriv, the GetNext request message is not protected from disclosure.



Davin, Galvin, & McCloghrie                                    [Page 18]
^L
RFC 1351               SNMP Administrative Model               July 1992


   Rather, it is simply assembled, serialized, and transmitted to the
   transport address (IP address 1.2.3.4, UDP port 161) associated in
   the manager's database with the party gracie.

   When the GetNext request message is received at the agent, the
   identity of the party to which it is directed (gracie) is extracted
   from the message, and the receiving protocol entity consults its
   local database of party information. Because the privacy protocol for
   the party gracie is recorded as noPriv, the received message is
   assumed not to be protected from disclosure. Similarly, the identity
   of the originating party (george) is extracted, and the local party
   database is consulted. Because the authentication protocol for the
   party george is recorded as noAuth, the received message is
   immediately accepted as authentic.

   The received message is fully processed only if the access policy
   database local to the agent authorizes GetNext request communications
   by the party george with respect to the agent party gracie. The
   access policy database presented as Table 3 authorizes such
   communications (as well as Get operations).

   When the received request is processed, a GetResponse message is
   generated with gracie as the source party and george, the party from
   which the request originated, as the destination party. Because the
   authentication protocol for gracie is recorded in the local party
   database as noAuth, the generated GetResponse message is not
   authenticated as to origin or integrity. Because, according to the
   local database, the privacy protocol for the party george is noPriv,
   the response message is not protected from disclosure. The response
   message is transmitted to the transport address from which the
   corresponding request originated -- without regard for the transport
   address associated with george in the local database.

   When the generated response is received by the manager, the identity
   of the party to which it is directed (george) is extracted from the
   message, and the manager consults its local database of party
   information. Because the privacy protocol for the party george is
   recorded as noPriv, the received response is assumed not to be
   protected from disclosure. Similarly, the identity of the originating
   party (gracie) is extracted, and the local party database is
   consulted. Because the authentication protocol for the party gracie
   is recorded as noAuth, the received response is immediately accepted
   as authentic.

   The received message is fully processed only if the access policy
   database local to the manager authorizes GetResponse communications
   by the party gracie with respect to the manager party george. The
   access policy database presented as Table 3 authorizes such response



Davin, Galvin, & McCloghrie                                    [Page 19]
^L
RFC 1351               SNMP Administrative Model               July 1992


   messages (as well as Trap messages).

4.2   Secure Minimal Agent Configuration

   This section presents an example configuration for a secure, minimal
   SNMP agent that interacts with a single SNMP management station.
   Table 4 presents information about SNMP parties that is known both to
   the minimal agent and to the manager, while Table 5 presents
   similarly common information about the local access policy.

   The interaction of manager and agent in this configuration is very
   similar to that sketched above for the non-secure minimal agent --
   except that all protocol messages are authenticated as to origin and
   integrity and protected from disclosure. This example requires
   encryption in order to support distribution of secret keys via the
   SNMP itself. A more elaborate example comprising an additional pair
   of SNMP parties could support the exchange of non-secret information
   in authenticated messages without incurring the cost of encryption.

   An actual secure agent configuration may require SNMP parties for
   which the authentication and privacy protocols are noAuth and noPriv,
   respectively, in order to support clock synchronization (see [4]).
   For clarity, these additional parties are not represented in this
   example.

     Identity          ollie                stan
                       (agent)              (manager)
     Domain            rfc1351Domain        rfc1351Domain
     Address           1.2.3.4, 161         1.2.3.5, 2001
     Proxied Party     noProxy              noProxy
     Auth Prot         md5AuthProtocol      md5AuthProtocol
     Auth Priv Key     "0123456789ABCDEF"   "GHIJKL0123456789"
     Auth Pub Key      ""                   ""
     Auth Clock        0                    0
     Auth Last Msg     0                    0
     Auth Lifetime     500                  500
     Priv Prot         desPrivProtocol      desPrivProtocol
     Priv Priv Key     "MNOPQR0123456789"   "STUVWX0123456789"
     Priv Pub Key      ""                   ""

      Table 4: Party Information for Secure Minimal Agent


               Target   Subject   Privileges
               ollie    stan      3
               stan     ollie     20

      Table 5: Access Information for Secure Minimal Agent



Davin, Galvin, & McCloghrie                                    [Page 20]
^L
RFC 1351               SNMP Administrative Model               July 1992


   As represented in Table 4, the example agent party operates at UDP
   port 161 at IP address 1.2.3.4 using the party identity ollie; the
   example manager operates at UDP port 2001 at IP address 1.2.3.5 using
   the identity stan. At minimum, a secure SNMP agent implementation
   must provide for administrative configuration (and non-volatile
   storage) of relevant information about two SNMP parties: itself and a
   remote peer. Both ollie and stan authenticate all messages that they
   generate by using the SNMP authentication protocol md5AuthProtocol
   and their distinct, private authentication keys. Although these
   private authentication key values ("0123456789ABCDEF" and
   "GHIJKL0123456789") are presented here for expository purposes,
   knowledge of private authentication keys is not normally afforded to
   human beings and is confined to those portions of the protocol
   implementation that require it.

   When using the md5AuthProtocol, the public authentication key for
   each SNMP party is never used in authentication and verification of
   SNMP exchanges. Also, because the md5AuthProtocol is symmetric in
   character, the private authentication key for each party must be
   known to another SNMP party with which authenticated communication is
   desired. In contrast, asymmetric (public key) authentication
   protocols would not depend upon sharing of a private key for their
   operation.

   All protocol messages originated by the party stan are encrypted on
   transmission using the desPrivProtocol privacy protocol and the
   private key "STUVWX0123456789"; they are decrypted upon reception
   according to the same protocol and key. Similarly, all messages
   originated by the party ollie are encrypted on transmission using the
   desPrivProtocol protocol and private privacy key "MNOPQR0123456789";
   they are correspondingly decrypted on reception. As with
   authentication keys, knowledge of private privacy keys is not
   normally afforded to human beings and is confined to those portions
   of the protocol implementation that require it.

4.3   Proxy Configuration

   This section presents examples of SNMP proxy configurations.  On one
   hand, foreign proxy configurations provide the capability to manage
   non-SNMP devices. On the other hand, native proxy configurations
   allow an administrator to shift the computational burden of rich
   management functionality away from network devices whose primary task
   is not management.  To the extent that SNMP proxy agents function as
   points of aggregation for management information, proxy
   configurations may also reduce the bandwidth requirements of large-
   scale management activities.

   The example configurations in this section are simplified for



Davin, Galvin, & McCloghrie                                    [Page 21]
^L
RFC 1351               SNMP Administrative Model               July 1992


   clarity: actual configurations may require additional parties in
   order to support clock synchronization and distribution of secrets.

4.3.1   Foreign Proxy Configuration

   This section presents an example configuration by which a SNMP
   management station may manage network elements that do not themselves
   support the SNMP. This configuration centers on a SNMP proxy agent
   that realizes SNMP management operations by interacting with a non-
   SNMP device using a proprietary protocol.

   Table 6 presents information about SNMP parties that is recorded in
   the local database of the SNMP proxy agent.  Table 7 presents
   information about SNMP parties that is recorded in the local database
   of the SNMP management station. Table 8 presents information about
   the access policy specified by the local administration.

   As represented in Table 6, the proxy agent party operates at UDP port
   161 at IP address 1.2.3.5 using the party identity moe; the example
   manager operates at UDP port 2002 at IP address 1.2.3.4 using the
   identity larry. Both larry and moe authenticate all messages that
   they generate by using the protocol md5AuthProtocol and their
   distinct, private authentication keys. Although these private
   authentication key values ("0123456789ABCDEF" and

   Identity        larry               moe                 curly
                   (manager)           (proxy)             (proxied)
   Domain          rfc1351Domain       rfc1351Domain       acmeMgmtPrtcl
   Address         1.2.3.4, 2002       1.2.3.5, 161        0x98765432
   Proxied Party   noProxy             curly               noProxy
   Auth Prot       md5AuthProtocol     md5AuthProtocol     noAuth
   Auth Priv Key   "0123456789ABCDEF"  "GHIJKL0123456789"  ""
   Auth Pub Key    ""                  ""                  ""
   Auth Clock      0                   0                   0
   Auth Last Msg   0                   0                   0
   Auth Lifetime   500                 500                 0
   Priv Prot       noPriv              noPriv              noPriv
   Priv Priv Key   ""                  ""                  ""
   Priv Pub Key    ""                  ""                  ""

         Table 6: Party Information for Proxy Agent










Davin, Galvin, & McCloghrie                                    [Page 22]
^L
RFC 1351               SNMP Administrative Model               July 1992


     Identity        larry               moe
                     (manager)           (proxy)
     Domain          rfc1351Domain       rfc1351Domain
     Address         1.2.3.4, 2002       1.2.3.5, 161
     Proxied Party   noProxy             noProxy
     Auth Prot       md5AuthProtocol     md5AuthProtocol
     Auth Priv Key   "0123456789ABCDEF"  "GHIJKL0123456789"
     Auth Pub Key    ""                  ""
     Auth Clock      0                   0
     Auth Last Msg   0                   0
     Auth Lifetime   500                 500
     Priv Prot       noPriv              noPriv
     Priv Priv Key   ""                  ""
     Priv Pub Key    ""                  ""

       Table 7: Party Information for Management Station



               Target   Subject   Privileges
               moe      larry     3
               larry    moe       20

         Table 8: Access Information for Foreign Proxy

   "GHIJKL0123456789") are presented here for expository purposes,
   knowledge of private keys is not normally afforded to human beings
   and is confined to those portions of the protocol implementation that
   require it.

   Although all SNMP agents that use cryptographic keys in their
   communication with other protocol entities will almost certainly
   engage in private SNMP exchanges to distribute those keys, in order
   to simplify this example, neither the management station nor the
   proxy agent sends or receives private SNMP communications. Thus, the
   privacy protocol for each of them is recorded as noPriv.

   The party curly does not send or receive SNMP protocol messages;
   rather, all communication with that party proceeds via a hypothetical
   proprietary protocol identified by the value acmeMgmtPrtcl. Because
   the party curly does not participate in the SNMP, many of the
   attributes recorded for that party in a local database are ignored.

   In order to interrogate the proprietary device associated with the
   party curly, the management station larry constructs a SNMP GetNext
   request and transmits it to the party moe operating (see Table 7) at
   UDP port 161, and IP address 1.2.3.5. This request is authenticated
   using the private authentication key "0123456789ABCDEF."



Davin, Galvin, & McCloghrie                                    [Page 23]
^L
RFC 1351               SNMP Administrative Model               July 1992


   When that request is received by the party moe, the originator of the
   message is verified as being the party larry by using local knowledge
   (see Table 6) of the private authentication key "0123456789ABCDEF."
   Because party larry is authorized to issue GetNext requests with
   respect to party moe by the relevant access control policy (Table 8),
   the request is accepted. Because the local database records the
   proxied party for party moe as curly, the request is satisfied by its
   translation into appropriate operations of the acmeMgmtPrtcl directed
   at party curly. These new operations are transmitted to the party
   curly at the address 0x98765432 in the acmeMgmtPrtcl domain.

   When and if the proprietary protocol exchange between the proxy agent
   and the proprietary device concludes, a SNMP GetResponse management
   operation is constructed by the SNMP party moe to relay the results
   to party larry. This response communication is authenticated as to
   origin and integrity using the authentication protocol
   md5AuthProtocol and private authentication key "GHIJKL0123456789"
   specified for transmissions from party moe. It is then transmitted to
   the SNMP party larry operating at the management station at IP
   address 1.2.3.4 and UDP port 2002 (the source address for the
   corresponding request).

   When this response is received by the party larry, the originator of
   the message is verified as being the party moe by using local
   knowledge (see Table 7) of the private authentication key
   "GHIJKL0123456789." Because party moe is authorized to issue
   GetResponse communications with respect to party larry by the
   relevant access control policy (Table 8), the response is accepted,
   and the interrogation of the proprietary device is complete.

   It is especially useful to observe that the database of SNMP parties
   recorded at the proxy agent (Table 6) need be neither static nor
   configured exclusively by the management station.  For instance,
   suppose that, in this example, the acmeMgmtPrtcl was a proprietary,
   MAC-layer mechanism for managing stations attached to a local area
   network. In such an environment, the SNMP party moe would reside at a
   SNMP proxy agent attached to such a LAN and could, by participating
   in the LAN protocols, detect the attachment and disconnection of
   various stations on the LAN. In this scenario, the SNMP proxy agent
   could easily adjust its local database of SNMP parties to support
   indirect management of the LAN stations by the SNMP management
   station. For each new LAN station detected, the SNMP proxy agent
   would add to its database both an entry analogous to that for party
   curly (representing the new LAN station itself) and an entry
   analogous to that for party moe (representing a proxy for that new
   station in the SNMP domain).

   By using the SNMP to interrogate the database of parties held locally



Davin, Galvin, & McCloghrie                                    [Page 24]
^L
RFC 1351               SNMP Administrative Model               July 1992


   by the SNMP proxy agent, a SNMP management station can discover and
   interact with new stations as they are attached to the LAN.

4.3.2   Native Proxy Configuration

   This section presents an example configuration that supports SNMP
   native proxy operations -- indirect interaction between a SNMP agent
   and a management station that is mediated by a second SNMP (proxy)
   agent.

   This example configuration is similar to that presented in the
   discussion of SNMP foreign proxy above. In this example, however, the
   party associated with the identity curly receives messages via the
   SNMP, and, accordingly interacts with the SNMP proxy agent moe using
   authenticated SNMP communications.

   Table 9 presents information about SNMP parties that is recorded in
   the local database of the SNMP proxy agent.  Table 7 presents
   information about SNMP parties that is recorded in the local database
   of the SNMP management station. Table 10 presents information about
   the access policy specified by the local administration.

   As represented in Table 9, the proxy party operates at UDP port 161
   at IP address 1.2.3.5 using the party identity moe;

  Identity       larry              moe                curly
                 (manager)          (proxy)            (proxied)
  Domain         rfc1351Domain      rfc1351Domain      rfc1351Domain
  Address        1.2.3.4, 2002      1.2.3.5, 161       1.2.3.6, 16
  Proxied Party  noProxy            curly              noProxy
  Auth Prot      md5AuthProtocol    md5AuthProtocol    md5AuthProtocol
  Auth Priv Key  "0123456789ABCDEF" "GHIJKL0123456789" "MNOPQR0123456789"
  Auth Pub Key   ""                 ""                 ""
  Auth Clock     0                  0                  0
  Auth Last Msg  0                  0                  0
  Auth Lifetime  500                500                500
  Priv Prot      noPriv             noPriv             noPriv
  Priv Priv Key  ""                 ""                 ""
  Priv Pub Key   ""                 ""                 ""

         Table 9: Party Information for Proxy Agent










Davin, Galvin, & McCloghrie                                    [Page 25]
^L
RFC 1351               SNMP Administrative Model               July 1992


               Target   Subject   Privileges
               moe      larry     3
               larry    moe       20
               curly    moe       3
               moe      curly     20

         Table 10: Access Information for Native Proxy

   the example manager operates at UDP port 2002 at IP address 1.2.3.4
   using the identity larry; the proxied party operates at UDP port 161
   at IP address 1.2.3.6 using the party identity curly. Messages
   generated by all three SNMP parties are authenticated as to origin
   and integrity by using the authentication protocol md5AuthProtocol
   and distinct, private authentication keys. Although these private key
   values ("0123456789ABCDEF," "GHIJKL0123456789," and
   "MNOPQR0123456789") are presented here for expository purposes,
   knowledge of private keys is not normally afforded to human beings
   and is confined to those portions of the protocol implementation that
   require it.

   In order to interrogate the proxied device associated with the party
   curly, the management station larry constructs a SNMP GetNext request
   and transmits it to the party moe operating (see Table 7) at UDP port
   161 and IP address 1.2.3.5. This request is authenticated using the
   private authentication key "0123456789ABCDEF."

   When that request is received by the party moe, the originator of the
   message is verified as being the party larry by using local knowledge
   (see Table 9) of the private authentication key "0123456789ABCDEF."
   Because party larry is authorized to issue GetNext (and Get) requests
   with respect to party moe by the relevant access control policy
   (Table 10), the request is accepted. Because the local database
   records the proxied party for party moe as curly, the request is
   satisfied by its translation into a corresponding SNMP GetNext
   request directed from party moe to party curly. This new
   communication is authenticated using the private authentication key
   "GHIJKL0123456789" and transmitted to party curly at the IP address
   1.2.3.6.

   When this new request is received by the party curly, the originator
   of the message is verified as being the party moe by using local
   knowledge (see Table 9) of the private authentication key
   "GHIJKL0123456789." Because party moe is authorized to issue GetNext
   (and Get) requests with respect to party curly by the relevant access
   control policy (Table 10), the request is accepted. Because the local
   database records the proxied party for party curly as noProxy, the
   GetNext request is satisfied by local mechanisms. A SNMP GetResponse
   message representing the results of the query is then generated by



Davin, Galvin, & McCloghrie                                    [Page 26]
^L
RFC 1351               SNMP Administrative Model               July 1992


   party curly. This response communication is authenticated as to
   origin and integrity using the private authentication key
   "MNOPQR0123456789" and transmitted to party moe at IP address 1.2.3.5
   (the source address for the corresponding request).

   When this response is received by party moe, the originator of the
   message is verified as being the party curly by using local knowledge
   (see Table 9) of the private authentication key "MNOPQR0123456789."
   Because party curly is authorized to issue GetResponse communications
   with respect to party moe by the relevant access control policy
   (Table 10), the response is not rejected. Instead, it is translated
   into a response to the original GetNext request from party larry.
   This response is authenticated as to origin and integrity using the
   private authentication key "GHIJKL0123456789" and is transmitted to
   the party larry at IP address 1.2.3.4 (the source address for the
   original request).

   When this response is received by the party larry, the originator of
   the message is verified as being the party moe by using local
   knowledge (see Table 7) of the private authentication key
   "GHIJKL0123456789." Because party moe is authorized to issue
   GetResponse communications with respect to party larry by the
   relevant access control policy (Table 10), the response is accepted,
   and the interrogation is complete.

4.4   Public Key Configuration

   This section presents an example configuration predicated upon a
   hypothetical security protocol. This hypothetical protocol would be
   based on asymmetric (public key) cryptography as a means for
   providing data origin authentication (but not protection against
   disclosure). This example illustrates the consistency of the
   administrative model with public key technology, and the extension of
   the example to support protection against disclosure should be
   apparent.
















Davin, Galvin, & McCloghrie                                    [Page 27]
^L
RFC 1351               SNMP Administrative Model               July 1992


    Identity          ollie                      stan
                      (agent)                    (manager)
    Domain            rfc1351Domain              rfc1351Domain
    Address           1.2.3.4, 161               1.2.3.5, 2004
    Proxied Party     noProxy                    noProxy
    Auth Prot         pkAuthProtocol             pkAuthProtocol
    Auth Priv Key     "0123456789ABCDEF"         ""
    Auth Pub Key      ""                         "ghijkl0123456789"
    Auth Clock        0                          0
    Auth Last Msg     0                          0
    Auth Lifetime     500                        500
    Priv Prot         noPriv                     noPriv
    Priv Priv Key     ""                         ""
    Priv Pub Key      ""                         ""

       Table 11: Party Information for Public Key Agent

   The example configuration comprises a single SNMP agent that
   interacts with a single SNMP management station.  Tables 11 and 12
   present information about SNMP parties that is by the agent and
   manager, respectively, while Table 5 presents information about the
   local access policy that is known to both manager and agent.

   As represented in Table 11, the example agent party operates at UDP
   port 161 at IP address 1.2.3.4 using the party identity ollie; the
   example manager operates at UDP port 2004 at IP address 1.2.3.5 using
   the identity stan. Both ollie and stan authenticate all messages that
   they generate as to origin and integrity by using the hypothetical
   SNMP authentication protocol pkAuthProtocol and their distinct,
   private

    Identity          ollie                  stan
                      (agent)                (manager)
    Domain            rfc1351Domain          rfc1351Domain
    Address           1.2.3.4, 161           1.2.3.5, 2004
    Proxied Party     noProxy                noProxy
    Auth Prot         pkAuthProtocol         pkAuthProtocol
    Auth Priv Key     ""                     "GHIJKL0123456789"
    Auth Pub Key      "0123456789abcdef"     ""
    Auth Clock        0                      0
    Auth Last Msg     0                      0
    Auth Lifetime     500                    500
    Priv Prot         noPriv                 noPriv
    Priv Priv Key     ""                     ""
    Priv Pub Key      ""                     ""

   Table 12:  Party Information for Public Key Management
              Station



Davin, Galvin, & McCloghrie                                    [Page 28]
^L
RFC 1351               SNMP Administrative Model               July 1992


   authentication keys. Although these private authentication key values
   ("0123456789ABCDEF" and "GHIJKL0123456789") are presented here for
   expository purposes, knowledge of private keys is not normally
   afforded to human beings and is confined to those portions of the
   protocol implementation that require it.

   In most respects, the interaction between manager and agent in this
   configuration is almost identical to that in the example of the
   minimal, secure SNMP agent described above. The most significant
   difference is that neither SNMP party in the public key configuration
   has knowledge of the private key by which the other party
   authenticates its transmissions. Instead, for each received
   authenticated SNMP communication, the identity of the originator is
   verified by applying an asymmetric cryptographic algorithm to the
   received message together with the public authentication key for the
   originating party. Thus, in this configuration, the agent knows the
   manager's public key ("ghijkl0123456789") but not its private key
   ("GHIJKL0123456789"); similarly, the manager knows the agent's public
   key ("0123456789abcdef") but not its private key
   ("0123456789ABCDEF").

   For simplicity, privacy protocols are not addressed in this example
   configuration, although their use would be necessary to the secure,
   automated distribution of secret keys.

4.5   MIB View Configurations

   This section describes a convention for the definition of MIB views
   and, using that convention, presents example configurations of MIB
   views for SNMP parties.

   A MIB view is defined by a collection of view subtrees (see Section
   3.6), and any MIB view may be represented in this way. Because MIB
   view definitions may, in certain cases, comprise a very large number
   of view subtrees, a convention for abbreviating MIB view definitions
   is desirable.

   The convention adopted in [5] supports abbreviation of MIB view
   definitions in terms of families of view subtrees that are either
   included in or excluded from the definition of the relevant MIB view.
   By this convention, a table locally maintained by each SNMP entity
   defines the MIB view associated with each SNMP party realized by that
   entity.  Each entry in the table represents a family of view subtrees
   that (according to the status of that entry) is either included in or
   excluded from the MIB view of some SNMP party. Each table entry
   represents a subtree family as a pairing of an OBJECT IDENTIFIER
   value (called the family name) together with a bitstring value
   (called the family mask). The family mask indicates which



Davin, Galvin, & McCloghrie                                    [Page 29]
^L
RFC 1351               SNMP Administrative Model               July 1992


   subidentifiers of the associated family name are significant to the
   definition of the represented subtree family. For each possible MIB
   object instance, that instance belongs to the view subtree family
   represented by a particular table entry if

     o the OBJECT IDENTIFIER name of that MIB
       object instance comprises at least as many subidentifiers
       as does the family name for said table entry, and

     o each subidentifier in the name of said MIB object
       instance matches the corresponding subidentifier of the
       relevant family name whenever the corresponding bit of
       the associated family mask is non-zero.

   The appearance of a MIB object instance in the MIB view for a
   particular SNMP party is related to the membership of that instance
   in the subtree families associated with that party in local table
   entries:

     o If a MIB object instance belongs to none of the relevant
       subtree families, then that instance is not in the MIB
       view for the relevant SNMP party.

     o If a MIB object instance belongs to the subtree family
       represented by exactly one of the relevant table entries,
       then that instance is included in, or excluded from, the
       relevant MIB view according to the status of that entry.

     o If a MIB object instance belongs to the subtree families
       represented by more than one of the relevant table
       entries, then that instance is included in, or excluded
       from, the relevant MIB view according to the status of
       the single such table entry for which, first, the associated
       family name comprises the greatest number of
       subidentifiers, and, second, the associated family name is
       lexicographically greatest.

   The subtree family represented by a table entry for which the
   associated family mask is all ones corresponds to the single view
   subtree identified by the family name for that entry.  Because the
   convention of [5] provides for implicit extension of family mask
   values with ones, the subtree family represented by a table entry
   with a family mask of zero length always corresponds to a single view
   subtree.







Davin, Galvin, & McCloghrie                                    [Page 30]
^L
RFC 1351               SNMP Administrative Model               July 1992


     Party Identity  Status     Family Name    Family Mask
     lucy            include    internet       ""h

         Table 13: View Definition for Minimal Agent

   Using this convention for abbreviating MIB view definitions, some of
   the most common definitions of MIB views may be conveniently
   expressed. For example, Table 13 illustrates the MIB view definitions
   required for a minimal SNMP entity that locally realizes a single
   SNMP party for which the associated MIB view embraces all instances
   of all MIB objects defined within the internet network management
   framework.  The represented table has a single entry. The SNMP party
   (lucy) for which that entry defines the MIB view is identified in the
   first column. The status of that entry (include) signifies that any
   MIB object instance belonging to the subtree family represented by
   that entry may appear in the MIB view for party lucy. The family name
   for that entry is internet, and the zero-length family mask value
   signifies that the relevant subtree family corresponds to the single
   view subtree rooted at that node.

   Another example of MIB view definition (see Table 14) is that of a
   SNMP protocol entity that locally realizes multiple SNMP parties with
   distinct MIB views. The MIB view associated with the party lucy
   comprises all instances of all MIB objects defined within the
   internet network management framework, except those pertaining to the
   administration of SNMP parties. In contrast, the MIB view attributed
   to the party ricky contains only MIB object instances defined in the
   system group of the internet-standard MIB together with those object
   instances by which SNMP parties are administered.

   A more complicated example of MIB view configuration illustrates the
   abbreviation of related collections of view subtrees by view subtree
   families (see Table 15). In this


     Party Identity  Status     Family Name    Family Mask
     lucy            include    internet       ""h
     lucy            exclude    snmpParties    ""h
     ricky           include    system         ""h
     ricky           include    snmpParties    ""h

         Table 14: View Definition for Multiple Parties

   example, the MIB view associated with party lucy includes all object
   instances in the system group of the internet-standard MIB together
   with some information related to the second network interface
   attached to the managed device. However, this interface-related
   information does not include the speed of the interface. The family



Davin, Galvin, & McCloghrie                                    [Page 31]
^L
RFC 1351               SNMP Administrative Model               July 1992


   mask value "FFA0"h in the second table entry signifies that a MIB
   object instance belongs to the relevant subtree family if the initial
   prefix of its name places it within the ifEntry portion of the
   registration hierarchy and if the eleventh subidentifier of its name
   is 2. The MIB object instance representing the speed of the second
   network interface belongs to the subtree families represented by both
   the second and third entries of the table, but that particular
   instance is excluded from the MIB view for party lucy because the
   lexicographically greater of the relevant family names appears in the
   table entry with status exclude.

   The MIB view for party ricky is also defined in this example.  The
   MIB view attributed to the party ricky includes all object instances
   in the icmp group of the internet-standard MIB, together with all
   information relevant to the fifth network interface attached to the
   managed device. In addition, the MIB view attributed to party ricky
   includes the number of octets received on the fourth attached network
   interface.

   While, as suggested by the examples above, a wide range of MIB view
   configurations are efficiently supported by the abbreviated
   representation of [5], prudent MIB design can sometimes further
   reduce the size and complexity of the most


    Party Identity  Status     Family Name        Family Mask
    lucy            include    system             ""h
    lucy            include    { ifEntry 0 2 }    "FFA0"h
    lucy            exclude    { ifSpeed 2 }      ""h
    ricky           include    icmp               ""h
    ricky           include    { ifEntry 0 5 }    "FFA0"h
    ricky           include    { ifInOctets 4 }   ""h

          Table 15: More Elaborate View Definitions

   likely MIB view definitions. On one hand, it is critical that
   mechanisms for MIB view configuration impose no absolute constraints
   either upon the access policies of local administrations or upon the
   structure of MIB namespaces; on the other hand, where the most common
   access policies are known, the configuration costs of realizing those
   policies may be slightly reduced by assigning to distinct portions of
   the registration hierarchy those MIB objects for which local policies
   most frequently require distinct treatment. The relegation in [5] of
   certain objects to a distinct arc in the MIB namespace is an example
   of this kind of optimization.






Davin, Galvin, & McCloghrie                                    [Page 32]
^L
RFC 1351               SNMP Administrative Model               July 1992


5.  Compatibility

   Ideally, all SNMP management stations and agents would communicate
   exclusively using the secure facilities described in this memo. In
   reality, many SNMP agents may implement only the insecure SNMP
   mechanisms described in [1] for some time to come.

   New SNMP agent implementations should never implement both the
   insecure mechanisms of [1] and the facilities described here. Rather,
   consistent with the SNMP philosophy, the burden of supporting both
   sorts of communication should fall entirely upon managers. Perhaps
   the best way to realize both old and new modes of communication is by
   the use of a SNMP proxy agent deployed locally on the same system
   with a management station implementation. The management station
   implementation itself operates exclusively by using the newer, secure
   modes of communication, and the local proxy agent translates the
   requests of the manager into older, insecure modes as needed.

   It should be noted that proxy agent implementations may require
   additional information beyond that described in this memo in order to
   accomplish the requisite translation tasks implicit in the definition
   of the proxy function. This information could easily be retrieved
   from a filestore.

6.  Security Considerations

   It is important to note that, in the example configuration for native
   proxy operations presented in this memo, the use of symmetric
   cryptography does not securely prevent direct communication between
   the SNMP management station and the proxied SNMP agent.

   While secure isolation of the management station and the proxied
   agent can, according to the administrative model set forth in this
   memo, be realized using symmetric cryptography, the required
   configuration is more complex and is not described in this memo.
   Rather, it is recommended that native proxy configurations that
   require secure isolation of management station from proxied agent be
   implemented using security protocols based on asymmetric (or "public
   key") cryptography. However, no SNMP security protocols based on
   asymmetric cryptography are currently defined.

   In order to participate in the administrative model set forth in this
   memo, SNMP implementations must support local, non-volatile storage
   of the local party database. Accordingly, every attempt has been made
   to minimize the amount of non-volatile storage required.






Davin, Galvin, & McCloghrie                                    [Page 33]
^L
RFC 1351               SNMP Administrative Model               July 1992


7.  References

   [1] Case, J., M. Fedor, M. Schoffstall, and J. Davin, The Simple
       Network Management Protocol", RFC 1157, University of Tennessee
       at Knoxville, Performance Systems International, Performance
       Systems International, and the MIT Laboratory for Computer
       Science, May 1990.  (Obsoletes RFC 1098.)

   [2] Rose, M., and K. McCloghrie, "Structure and Identification of
       Management Information for TCP/IP based internets", RFC 1155,
       Performance Systems International, Hughes LAN Systems, May 1990.
       (Obsoletes RFC 1065.)

   [3] Information Processing -- Open Systems Interconnection --
       Specification of Basic Encoding Rules for Abstract Syntax
       Notation One (ASN.1), International Organization for
       Standardization/International Electrotechnical Institute, 1987,
       International Standard 8825.

   [4] Galvin, J., McCloghrie, K., and J. Davin, "SNMP Security
       Protocols", RFC 1352, Trusted Information Systems, Inc., Hughes
       LAN Systems, Inc., MIT Laboratory for Computer Science, July
       1992.

   [5] McCloghrie, K., Davin, J., and J. Galvin, "Definitions of Managed
       Objects for Administration of SNMP Parties", RFC 1353, Hughes LAN
       Systems, Inc., MIT Laboratory for Computer Science, Trusted
       Information Systems, Inc., July 1992.

8.  Authors' Addresses

       James R. Davin
       MIT Laboratory for Computer Science
       545 Technology Square
       Cambridge, MA 02139

       Phone:  (617) 253-6020
       EMail:  jrd@ptt.lcs.mit.edu


       James M. Galvin
       Trusted Information Systems, Inc.
       3060 Washington Road, Route 97
       Glenwood, MD 21738

       Phone:  (301) 854-6889
       EMail:  galvin@tis.com




Davin, Galvin, & McCloghrie                                    [Page 34]
^L
RFC 1351               SNMP Administrative Model               July 1992


       Keith McCloghrie
       Hughes LAN Systems, Inc.
       1225 Charleston Road
       Mountain View, CA 94043

       Phone:  (415) 966-7934
       EMail:  kzm@hls.com












































Davin, Galvin, & McCloghrie                                    [Page 35]
^L