For the longest time in the networking industry, we had a running joke about Simple Network Management Protocol (SNMP). We would love to state that it actually stood for “Security is Not My Problem!”. This was because even though SNMP was dealing with all of this potentially sensitive information about your network device, it would rely on a plain text password for security. Yuck!
SNMP version 3 really responded to the security weaknesses of the protocol by introducing a security model within the protocol.The wonderful components of this new security model that we can leverage are the user, group and security level.
That’s right, this approach is so flexible, there are multiple security levels you can take advantage of depending on the security requirements of your environment. The following security levels exits:
“noAuthNoPriv” (no authentication and no encryption – use the noauth keyword in the CLI)
“AuthNoPriv” (messages are authenticated but not encrypted – use the auth keyword in the CLI)
“AuthPriv” (messages are authenticated and encrypted – use the priv keyword in the CLI)
You should note that the old SNMPv1 and SNMPv2 approaches only supported the “noAuthNoPriv” model since they used plain text community strings to match the incoming packets.
With our SNMPv3 implementations, you can configure the appropriate security model on per-group basis.
In SNMPv3, a group defines the access policy for a set of users. The access policy defines which SNMP objects can be accessed for reading and writing or which SNMP objects can generate notifications to the members of a group. A group also defines the security model and security level for its users.
Here is an example configuration for you. Here three groups are created. They are the TEST1, TEST2, and TEST3 groups. Notice these groups consist of users and can be associated with SNMP views to control the scope of access.
snmp-server view VIEW1 iso included
snmp-server view VIEW2 ifEntry.*.3 included
snmp-server group TEST1 v3 priv read VIEW1 write VIEW1
snmp-server group TEST2 v3 auth read VIEW2
snmp-server group TEST3 v3 priv
snmp-server user JOHN TEST1 v3 auth sha CISCO priv des56 CISCO
snmp-server user SARAH TEST2 v3 auth sha CISCO
snmp-server user LUCY TEST3 v3 auth sha CISCO priv des56 CISCO
So I am putting the finishing touches on my upcoming CCNA Exam Cram for 200-301 and I needed an additional resource for the first of the three Wireless chapters. As a result – enjoy this quick and fun WiFi Quiz on the various 802.11 amendments. Score of 100%? Let me know in the comments of this post and get entered to win a prize!
WiFi Standards Quiz
Congratulations - you have completed WiFi Standards Quiz.
You scored %%SCORE%% out of %%TOTAL%%.
Your performance has been rated as %%RATING%%
Your answers are highlighted below.
What wireless standard emerged in 209 and was the first accepted standard that implemented MIMO technology and speeds up to 600 Mbps?
What is the 2019 WiFi standard that utilizes the 2.4, 5, and 6 GHz bands?
What was the first WiFi standard to take advantage of the 5 GHz band?
What RF band is used by 802.11ac?
In what year did 802.11g emerge?
What channels in the RF 2.4 GHz band are nonoverlapping? Choose all that apply.
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
There are 6 questions to complete.
Shaded items are complete.
You have completed
Your score is
You have not finished your quiz. If you leave this page, your progress will be lost.