Unit-5: Network management security

Network management security refers to the set of measures aimed at protecting network systems, components and data from unauthorized access, modification or destruction. This involves the use of various technologies, protocols, and processes to secure network infrastructure and ensure its availability, confidentiality, and integrity. Some key aspects of network management security include:

  1. Access control: implementing policies and mechanisms to control who can access the network, what they can do, and what data they can access.
  2. Authentication: verifying the identity of users before granting access to the network.
  3. Encryption: protecting sensitive information transmitted over the network by encoding it into an unreadable format.
  4. Firewall: a security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  5. Intrusion Detection and Prevention Systems (IDS/IPS): monitors network activity and identifies potential security threats, preventing them from spreading.
  6. Virtual Private Network (VPN): secure communication over the internet by encrypting data and establishing a private network connection over a public network.
  7. Patch management: regularly installing updates and patches to fix security vulnerabilities in network systems and software.
  8. Physical security: ensuring the protection of physical components of the network infrastructure.
  9. Disaster recovery and backup: having plans and mechanisms in place to quickly recover from network failures, data loss, and other disasters.

It is crucial for organizations to maintain a strong network management security posture to ensure the confidentiality, integrity and availability of their sensitive information and systems.

Overview of SNMP Architecture

SNMP (Simple Network Management Protocol) is a standard protocol used to monitor and manage network devices such as routers, switches, and servers. It provides a unified way for network administrators to monitor the performance and status of network devices, and make configuration changes as needed.

The SNMP architecture has three main components:

  1. Management Station (MS): A central component that sends SNMP requests and receives SNMP responses from network devices. The MS runs network management software, such as an SNMP management console, and acts as the central point for monitoring and controlling the network.
  2. Agent: A component that runs on each network device and implements the SNMP protocol. The agent collects information about the device’s performance, configuration, and status, and sends this information to the MS in response to SNMP requests.
  3. Management Information Base (MIB): A database of information that defines the management information available from the network devices. The MIB is a hierarchical tree structure that organizes information into objects, each of which is identified by a unique Object Identifier (OID).

SNMP works by sending SNMP messages, also known as packets, between the MS and the agents. The MS sends SNMP requests to the agent, asking for specific information or to set a configuration parameter. The agent then responds with the requested information or acknowledges the change. This allows the MS to monitor and control the network, ensuring its smooth operation and availability.

SNMPV1 communication facility

SNMPv1 (Simple Network Management Protocol version 1) is an Internet standard protocol for managing devices on IP networks. It provides a means for managing and monitoring network devices, such as routers, switches, and servers, as well as their performance and status. SNMPv1 uses a request/response model and relies on a centralized network management system (NMS) to collect and analyze information from network devices.

SNMPv1 architecture consists of the following components:

  1. Network Management System (NMS): A central computer system that monitors and manages the network devices using SNMP.
  2. Agents: Software programs running on the managed devices (e.g. routers, switches, servers) that provide information about the device to the NMS.
  3. Management Information Base (MIB): A database that contains information about the managed objects on a device and their values.
  4. Protocol Data Units (PDUs): The packets used by SNMP to carry information between the NMS and agents. The three types of PDUs are GetRequest, GetNextRequest, and SetRequest.
  5. Community Strings: Simple text passwords used to authenticate communication between the NMS and agents.

In this architecture, the NMS sends requests to the agents, the agents retrieve information from their MIBs, and respond to the NMS. The NMS uses the information to monitor and manage the network devices.


SNMPv3 (Simple Network Management Protocol version 3) is a newer version of the SNMP protocol that offers improved security features compared to previous versions (SNMPv1 and SNMPv2c). Key features of SNMPv3 include:

  1. Authentication: The use of passwords to verify the identity of the sender and receiver of SNMP messages.
  2. Encryption: The ability to encrypt SNMP messages to protect sensitive information from being intercepted or read.
  3. Access control: The ability to specify which SNMP messages are allowed and which are denied based on the identity of the sender.
  4. Context-based access control: The ability to specify different access control rules for different parts of the MIB tree.

By providing these security features, SNMPv3 helps ensure the confidentiality, integrity, and availability of the information exchanged between NMS and managed devices.