ExamGecko
Question list
Search
Search

Related questions











Question 274 - 312-50v12 discussion

Report
Export

Bill is a network administrator. He wants to eliminate unencrypted traffic inside his company's network. He decides to setup a SPAN port and capture all traffic to the datacenter. He immediately discovers unencrypted traffic in port UDP 161.

what protocol is this port using and how can he secure that traffic?

A.
it is not necessary to perform any actions, as SNMP is not carrying important information.
Answers
A.
it is not necessary to perform any actions, as SNMP is not carrying important information.
B.
SNMP and he should change it to SNMP V3
Answers
B.
SNMP and he should change it to SNMP V3
C.
RPC and the best practice is to disable RPC completely
Answers
C.
RPC and the best practice is to disable RPC completely
D.
SNMP and he should change it to SNMP v2, which is encrypted
Answers
D.
SNMP and he should change it to SNMP v2, which is encrypted
Suggested answer: B

Explanation:

We have various articles already in our documentation for setting up SNMPv2 trap handling in Opsview, but SNMPv3 traps are a whole new ballgame. They can be quite confusing and complicated to set up the first time you go through the process, but when you understand what is going on, everything should make more sense.

SNMP has gone through several revisions to improve performance and security (version 1, 2c and 3).

By default, it is a UDP port based protocol where communication is based on a 'fire and forget' methodology in which network packets are sent to another device, but there is no check for receipt of that packet (versus TCP port when a network packet must be acknowledged by the other end of the communication link).

There are two modes of operation with SNMP – get requests (or polling) where one device requests information from an SNMP enabled device on a regular basis (normally using UDP port 161), and traps where the SNMP enabled device sends a message to another device when an event occurs (normally using UDP port 162). The latter includes instances such as someone logging on, the device powering up or down, or a wide variety of other problems that would need this type of investigation.

This blog covers SNMPv3 traps, as polling and version 2c traps are covered elsewhere in our documentation.

SNMP traps Since SNMP is primarily a UDP port based system, traps may be 'lost' when sending between devices; the sending device does not wait to see if the receiver got the trap. This means if the configuration on the sending device is wrong (using the wrong receiver IP address or port) or the receiver isn't listening for traps or rejecting them out of hand due to misconfiguration, the sender will never know.

The SNMP v2c specification introduced the idea of splitting traps into two types; the original 'hope it gets there' trap and the newer 'INFORM' traps. Upon receipt of an INFORM, the receiver must send an acknowledgement back. If the sender doesn't get the acknowledgement back, then it knows there is an existing problem and can log it for sysadmins to find when they interrogate the device.

asked 18/09/2024
Areeluck Parnsoonthorn
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first