SteelHead™ Deployment Guide : Authentication, Security, Operations, and Monitoring : Configuring SNMP v3 Authentication and Privacy
  
Configuring SNMP v3 Authentication and Privacy
RiOS v7.0 or later includes privacy to the SNMP v3 feature to support authentication and privacy encryption of SNMPv3 messages. You can use AES 128 and DES to send an SNMP v3 encryption for GET action.
All SNMPv3 passwords (authentication/privacy) are stored as hashed (MD5/SHA), and they are all master keys, even if you provide plain text password during configuration.
An SNMP agent runs in every SteelHead that supports SNMP GET request action. Among the techniques to secure SNMP traffic, such as access control lists, you can use SNMP v3 to provide authentication and privacy. The main benefit for SNMP v3 authentication is to ensure the integrity of SNMP traffic, while privacy provides encryption protecting data from being seen by a third party.
Configuring an SNMP v3 GET request encryption is a two-part process:
  • Configure USM user
  • The user corresponds with the authentication and privacy mechanism that a management station uses to access the SteelHead.
  • Configure ACLs
  • To configure the ACLs, you need to add or edit a group, view and access policy. You cannot add an access policy with a group and a view. Security names are not supported by SNMPv3. To restrict SNMP v3 USM users from polling a specific subnet, use the RiOS ACL feature on the Administration > Security: Management ACL page.
    Views represent the OIDs a management station is allowed to access. You can create multiple views and restrict specific OIDs. A view starts with the highest level OID that you specify, and you can view all OIDs further down in the hierarchy, unless you specifically restrict them. You can only view OIDs in the hierarchy.
    You must associate a group with a view. After you associate a group with a view, you can define an access policy to link the user, group, and view together.
    The following procedure shows an example of a user named Cascade created with SHA authentication and AES encryption for privacy.
    To configure a USM user
    From the SteelHead Management Console, choose Administration > System Settings: SNMP v3.
    Select Add a New User.
    Figure 22‑3. Add a New USM User
    Select the Use Privacy Option check box.
    Select AES or DES from the Privacy Protocol drop-down list.
    Select any of the options in the Privacy drop-down list and complete any corresponding steps.
    Figure 22‑3 shows Supply a Password and the corresponding password.
    Click Add.
    The following procedure shows an example of a group NetProfiler created, and then user Cascade is associated with the group Profiler.
    To configure SNMP ACLs
    From the SteelHead Management Console, choose Administration > System Settings: SNMP ACLs.
    Select the Add a New Group tab.
    Figure 22‑4. Add a New Group
    Specify a group name.
    Select usm and select the user you created in To configure a USM user.
    Click Add.
    Select the Add a New View tab.
    Figure 22‑5. Add a New View
    Specify a view name.
    Specify the OIDs to include and exclude from the view.
    Click Add.
    Select Add a New Access Policy.
    Figure 22‑6. Add a New Access Policy
    Select the group name you created from the Group Name drop-down list.
    Select AuthPriv from the Security Level drop-down list.
    Select the view you created from the Read View drop-down list.
    Click Add.
    You can verify your configuration in Wireshark. Make sure the SNMP PDUs are encrypted.
    Figure 22‑7. Wireshark Verification
    To decrypt the SNMP packets for further troubleshooting
    From the Wireshark menu, choose Edit > Preferences > Protocols > SNMP.
    Select the Edit for the SNMP Users window.
    Figure 22‑8. SNMP Users Window
    Complete the information in the SNMP Users window.
    The engine ID is available on the SteelHead through the show snmp CLI command or near the end of the running-configuration. The username, authentication model, password, privacy protocol, and privacy password are the same settings you configured for the SNMPv3 user on the SteelHead.
    Click OK.
    Wireshark decrypts the SNMP encrypted packets and you can analyze further for troubleshooting.