blank.gif (43 bytes)

Church Of The
Swimming Elephant

Search:
1.3. Goals and Constraints Connected: An Internet Encyclopedia
1.3. Goals and Constraints

Up: Connected: An Internet Encyclopedia
Up: Requests For Comments
Up: RFC 1446
Up: 1. Introduction
Prev: 1.2. Threats
Next: 1.4. Security Services

1.3. Goals and Constraints

1.3. Goals and Constraints

Based on the foregoing account of threats in the SNMP network management environment, the goals of a SNMPv2 security protocol are enumerated below.

  1. The protocol should provide for verification that each received SNMPv2 message has not been modified during its transmission through the network in such a way that an unauthorized management operation might result.

  2. The protocol should provide for verification of the identity of the originator of each received SNMPv2 message.

  3. The protocol should provide that the apparent time of generation for each received SNMPv2 message is recent.

  4. The protocol should provide, when necessary, that the contents of each received SNMPv2 message are protected from disclosure.

In addition to the principal goal of supporting secure network management, the design of any SNMPv2 security protocol is also influenced by the following constraints:

  1. When the requirements of effective management in times of network stress are inconsistent with those of security, the former are preferred.

  2. Neither the security protocol nor its underlying security mechanisms should depend upon the ready availability of other network services (e.g., Network Time Protocol (NTP) or secret/key management protocols).

  3. A security mechanism should entail no changes to the basic SNMP network management philosophy.


Next: 1.4. Security Services

Connected: An Internet Encyclopedia
1.3. Goals and Constraints

Cotse.Net

Protect yourself from cyberstalkers, identity thieves, and those who would snoop on you.
Stop spam from invading your inbox without losing the mail you want. We give you more control over your e-mail than any other service.
Block popups, ads, and malicious scripts while you surf the net through our anonymous proxies.
Participate in Usenet, host your web files, easily send anonymous messages, and more, much more.
All private, all encrypted, all secure, all in an easy to use service, and all for only $5.95 a month!

Service Details

 
.
www.cotse.com
Have you gone to church today?
.
All pages ©1999, 2000, 2001, 2002, 2003 Church of the Swimming Elephant unless otherwise stated
Church of the Swimming Elephant©1999, 2000, 2001, 2002, 2003 Cotse.com.
Cotse.com is a wholly owned subsidiary of Packetderm, LLC.

Packetderm, LLC
210 Park Ave #308
Worcester, MA 01609