2.1.c Configure and verify secure access through SNMP v3 using an ACL
Follow me on Twitter:
https://twitter.com/CCNADailyTIPS
ITProTV Lab:
https://www.itpro.tv/
My strategy to pass CCNA Security in 6 MONTHS:
https://www.youtube.com/watch?v=TRqDGTBsPM4
Video 1:
https://www.youtube.com/watch?v=loUUWQRTzlQ
Video 2:
https://www.youtube.com/watch?v=qv-mm9m0-QU
Video 3:
https://www.youtube.com/watch?v=LKhP2NkYfP8
Video 4:
https://youtu.be/NK7uaqr2fgM
Video 5:
https://youtu.be/FBCfrWImz2E
Video 6:
https://youtu.be/kb7lgscxt4A
Video 7:
https://youtu.be/av381O7mEVA
Video 8:
https://youtu.be/vKaFfvc1Xm0
Video 9 previous:
https://youtu.be/8fPE7JdI-yk
SNMPv1:
Open standard protocol, uses traps (receive no reply) has limitations (cannot retrieve batches of information)
SNMPv2 & 2c:
Addition of Informs (receives and responds)community string
SNMPv3:
Enhanced Security Authentication: ensures that traps are read by intended party only. Uses “Engine ID” to identify each SNMP entity. EngineID used to generate key for authenticated messages. Privacy: encrypts SNMP data.
SNMPv3 Security Levels:
- NoAuthNoPriv – no authentication password is exchanged, communication is not encrypted. SNMP request are authorized based on username match.
- AuthNoPriv – password authentication based on hash but no encryption
- AuthPriv – authentication is used and encryption is used. This requires the router to have the crypto set features on the image.