Yuri Slobodyanyuk Blog on Information Security 2024年09月12日
ASA 8.2 now speaks SNMP v3 decently
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

文章介绍了ASA中SNMP的配置及相关安全问题,包括SNMPv2c的简单配置、SNMPv3的三种安全级别及配置方法等。

🎯SNMPv2c的配置较为简单,如设置位置、联系人、社区等信息,但存在信息以明文交换且无数据包加密认证的问题。

🔒SNMPv3有三种安全级别:noAuthNoPriv,数据包既未认证也未加密;authNoPriv,数据包认证但密码不以明文发送;authPriv,SNMP数据包既认证又加密内容。

📋配置SNMPv3的一般步骤包括为每个安全级别配置snmp-server组、创建用户并将其分配到相应组、创建snmp-server主机条目并指定版本和用户名。

❗文章提到在配置SNMP时输入的密码在日志中可见,存在一定安全隐患。

This article is all about SNMP in ASA. ASA has much less configuration options than IOS does, and this is good. Starting version 8.2 ASA supports version 3 of the SNMP protocol which adds new security model to the whole SNMP stack. But first we will start with old fashioned SNMP v2c (c is for ‘community’) . It takes about 15 secs to do it:

snmp-server location  935 Pennsylvania Avenue, NWsnmp-server contact Dont call us well call yousnmp-server community *****  // Note this community will be used if more specific one isnt given per hostsnmp-server enable traps snmp authentication linkup linkdown coldstart  //specific trapssnmp-server enable  // you enable server  snmp-server listen-port 161   // in case you want to change, who knows snmp-server host outside 195.95.193.8 community ****** version 1 udp-port 162  // only now SNMP polling is enabled and to the given host , also version 1 and port 162 on SNMP management (195.95.193.8) to send trapsno snmp-server enable traps ipsec start stop  // To disable specific traps 

As you already know this setup will exchange community strings in clear text and also no packet is cryptographically authenticated/verified. What a shame for “Adaptive Security Appliance” . The fix is on the way. It is called SNMP v3 and has 3 security levels to choose from:noAuthNoPriv – packets are neither authenticated nor encrypted . Basically the model used so far by SNMP v1 and v2c – everything clear text.

authNoPriv - packets are authenticated , that is user is sent in clear text but its password is not , (configurable) MD5 or SHA algorithm.

authPriv - the highest level, all SNMP packets are both authenticated using MD5 or SHA and their content is encrypted with DES/3DES/AES (128,196,256) algorithm.

Using the list above let’s configure our ASA for each level .General steps:

noAuthNoPriv.

snmp-server group v3-noauth v3 noauth   snmp-server user Jambo v3-noauth v3  snmp-server host outside 199.252.47.11 version 3 Jambo 

Querying the ASA:

snmpwalk -v 3 -u Jambo -l noauthnopriv  155.7.145.89

authNoPriv.

snmp-server group V3-auth v3 auth  snmp-server user AUTH V3-auth v3 auth md5 12345678  

Minimum pass length is 8 , and while ASA seems not to care it is a violation and snmpwalk will complain on pass < 8 and bail out .

snmp-server host outside 199.252.47.11 version 3 AUTH

Querying the ASA:

snmpwalk -v 3 -u AUTH -a md5 -A 12345678 -l authnopriv  155.7.145.89

authPriv.

Here everything will be encrypted.

snmp-server group v3-priv v3 priv  snmp-server user very_secure v3-priv v3  auth md5 12345678 v3-priv v3  auth md5 12345678 priv aes 128 12345678  snmp-server host outside 199.252.47.11 version 3 very_secure

N.B. To my surprise there is no such thing as debug snmp . Actually it does exist, but entering this command gives no error and produces no debug either.Noticed by the way. In logs you can see all the passwords you entered while configuring SNMP, not very secure I would rather say .

(config)# sh log | grep snmp

%ASA-5-111008: User 'enable_15' executed the 'snmp-server user AUTH V3-auth v3 auth md5 12345678' command.

Follow me on https://www.linkedin.com/in/yurislobodyanyuk/ not to miss what I publish on Linkedin, Github, blog, and more.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

SNMP ASA 安全级别 配置方法
相关文章