⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-idr-bgp4-mib-06.txt

📁 xorp源码hg
💻 TXT
📖 第 1 页 / 共 5 页
字号:
Expires August 2001                                            [Page 26]INTERNET DRAFT                  BGP4-MIB                  Februrary 20018. References   [1]  Rekhter, Y., Li, T., "A Border Gateway Protocol 4 (BGP-4)", RFC        1771, March 1995.   [2]  Rekhter, Y., Gross, P., "Application of the Border Gateway        Protocol in the Internet", RFC 1772, March 1995.   [3]  Harrington, D., Presuhn, R., and B. Wijnen, "An Architecture for        Describing SNMP Management Frameworks", RFC 2271, Cabletron        Systems, Inc., BMC Software, Inc., IBM T. J. Watson Research,        January 1998   [4]  Rose, M., and K. McCloghrie, "Structure and Identification of        Management Information for TCP/IP-based Internets", RFC 1155,        Performance Systems International, Hughes LAN Systems, May 1990   [5]  Rose, M., and K. McCloghrie, "Concise MIB Definitions", RFC        1212, Performance Systems International, Hughes LAN Systems,        March 1991   [6]  M. Rose, "A Convention for Defining Traps for use with the        SNMP", RFC 1215, Performance Systems International, March 1991   [7]  Case, J., McCloghrie, K., Rose, M., and S. Waldbusser,        "Structure of Management Information for Version 2 of the Simple        Network Management Protocol (SNMPv2)", RFC 1902, SNMP        Research,Inc., Cisco Systems, Inc., Dover Beach Consulting,        Inc., International Network Services, January 1996.   [8]  Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Textual        Conventions for Version 2 of the Simple Network Management        Protocol (SNMPv2)", RFC 1903, SNMP Research, Inc., Cisco        Systems, Inc., Dover Beach Consulting, Inc., International        Network Services, January 1996.   [9]  Case, J., McCloghrie, K., Rose, M., and S. Waldbusser,        "Conformance Statements for Version 2 of the Simple Network        Management Protocol (SNMPv2)", RFC 1904, SNMP Research, Inc.,        Cisco Systems, Inc., Dover Beach Consulting, Inc., InternationalExpires August 2001                                            [Page 27]INTERNET DRAFT                  BGP4-MIB                  Februrary 2001        Network Services, January 1996.   [10] Case, J., Fedor, M., Schoffstall, M., and J. Davin, "Simple        Network Management Protocol", RFC 1157, SNMP Research,        Performance Systems International, Performance Systems        International, MIT Laboratory for Computer Science, May 1990.   [11] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser,        "Introduction to Community-based SNMPv2", RFC 1901, SNMP        Research, Inc., Cisco Systems, Inc., Dover Beach Consulting,        Inc., International Network Services, January 1996.   [12] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser,        "Transport Mappings for Version 2 of the Simple Network        Management Protocol (SNMPv2)", RFC 1906, SNMP Research, Inc.,        Cisco Systems, Inc., Dover Beach Consulting, Inc., International        Network Services, January 1996.   [13] Case, J., Harrington D., Presuhn R., and B. Wijnen, "Message        Processing and Dispatching for the Simple Network Management        Protocol (SNMP)", RFC 2272, SNMP Research, Inc., Cabletron        Systems, Inc., BMC Software, Inc., IBM T. J. Watson Research,        January 1998.   [14] Blumenthal, U., and B. Wijnen, "User-based Security Model (USM)        for version 3 of the Simple Network Management Protocol        (SNMPv3)", RFC 2274, IBM T. J. Watson Research, January 1998.   [15] Case, J., McCloghrie, K., Rose, M., and S. Waldbusser, "Protocol        Operations for Version 2 of the Simple Network Management        Protocol (SNMPv2)", RFC 1905, SNMP Research, Inc., Cisco        Systems, Inc., Dover Beach Consulting, Inc., International        Network Services, January 1996.   [16] Levi, D., Meyer, P., and B. Stewart, "SNMPv3 Applications", RFC        2273, SNMP Research, Inc., Secure Computing Corporation, Cisco        Systems, January 1998   [17] Wijnen, B., Presuhn, R., and K. McCloghrie, "View-based Access        Control Model (VACM) for the Simple Network Management ProtocolExpires August 2001                                            [Page 28]INTERNET DRAFT                  BGP4-MIB                  Februrary 2001        (SNMP)", RFC 2275, IBM T. J. Watson Research, BMC Software,        Inc., Cisco Systems, Inc., January 1998Expires August 2001                                            [Page 29]INTERNET DRAFT                  BGP4-MIB                  Februrary 20019. Security Considerations   There are a number of management objects defined in this MIB that   have a MAX-ACCESS clause of read-write:      bgpPeerAdminStatus      bgpPeerConnectRetryInterval      bgpPeerHoldTimeConfigured      bgpPeerKeepAliveConfigured      bgpPeerMinASOriginationInterval      bgpPeerMinRouteAdvertisementInterval   These objects should be considered sensitive or vulnerable in most   network environments.  The support for SET operations in a non-secure   environment without proper protection can have a negative effect on   network operations.  Incorrect configuration of these parameters may   cause BGP peer connections to terminate early or to send more routes   under a flapping condition.   There are a number of managed objects in this MIB that may be   considered to contain sensitive information in the operation of a   network.  For example, a BGP peer's local and remote addresses may be   sensitive for ISPs who want to keep interface addresses on routers   confidential to prevent router addresses used for a denial of service   attack or spoofing.   Therefore, it may be important in some environments to control read   access to these objects and possibly to even encrypt the values of   these object when sending them over the network via SNMP.  Not all   versions of SNMP provide features for such a secure environment.   SNMPv1 by itself is not a secure environment.  Even if the network   itself is secure (for example by using IPSec), even then, there is no   control as to who on the secure network is allowed to access and   GET/SET (read/change/create/delete) the objects in this MIB.   It is recommended that the implementers consider the security   features as provided by the SNMPv3 framework.  Specifically, the use   of the User-based Security Model RFC 2274 [14] and the View-based   Access Control Model RFC 2275 [17] is recommended.   It is then a customer/user responsibility to ensure that the SNMP   entity giving access to an instance of this MIB, is properly   configured to give access to the objects only to those principals   (users) that have legitimate rights to indeed GET or SET   (change/create/delete) them.Expires August 2001                                            [Page 30]INTERNET DRAFT                  BGP4-MIB                  Februrary 200110. Authors' Address   Susan Hares   NextHop Technologies   517 Williams   Ann Arbor, MI 48103-4943   Phone: +1 734 936 2095   Fax:   +1 734 615-3241   Email: skh@nexthop.com   Jeff Johnson   RedBack Networks, Inc.   1389 Moffett Park Drive   Sunnyvale, CA  94089   Phone: +1 408 548 3516   Email: jeff@redback.com   Steve Willis   Argon Networks   25 Porter Road   Littleton, MA 01450   Phone: +1 508 486 0665   Fax:   +1 508 486 9379   Email: swills@argon.com   John Burruss   Windata Inc.   543 Great Road   Littleton MA 01460   Phone: +1 508 952 0170   Email: jburruss@windata.com   John Chu   Cosine Communications   1200 Bridge Parkway   Redwood City, CA 94065   Phone: 650-637-4780   Email: jchu@cosinecom.com11. Full Copyright Statement   Copyright (C) The Internet Society (1999).  All Rights Reserved.   This document and translations of it may be copied and furnished to   others, and derivative works that comment on or otherwise explain it   or assist in its implementation may be prepared, copied, published   and distributed, in whole or in part, without restriction of any   kind, provided that the above copyright notice and this paragraph areExpires August 2001                                            [Page 31]INTERNET DRAFT                  BGP4-MIB                  Februrary 2001   included on all such copies and derivative works.  However, this   document itself may not be modified in any way, such as by removing   the copyright notice or references to the Internet Society or other   Internet organizations, except as needed for the purpose of   developing Internet standards in which case the procedures for   copyrights defined in the Internet Standards process must be   followed, or as required to translate it into languages other than   English.   The limited permissions granted above are perpetual and will not be   revoked by the Internet Society or its successors or assigns.   This document and the information contained herein is provided on an   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.Expires August 2001                                            [Page 32]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -