Last modified by Frank Fock on 2026/04/03 12:19

From version 1.1
edited by Frank Fock
on 2024/05/25 20:40
Change comment: There is no comment for this version
To version 2.1
edited by Frank Fock
on 2026/04/03 12:19
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -1,4 +1,4 @@
1 -=== IETF RFC Compliance ===
1 +=== IETF RFC Compliance ===
2 2  
3 3  SNMP4J / SNMP4J-Agent implements the following IETF RFCs:
4 4  
... ... @@ -11,40 +11,41 @@
11 11  )))|=(% colspan="1" %)(((
12 12   Versions (SNMP4J)
13 13  )))
14 -|[[3410>>url:http://tools.ietf.org/html/rfc3410]]|Introduction and Applicability Statements for Internet Standard Management Framework|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
15 -|[[3411>>url:http://tools.ietf.org/html/rfc3411]]|An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
16 -|[[3412>>url:http://tools.ietf.org/html/rfc3412]]|Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
17 -|[[3413>>url:http://tools.ietf.org/html/rfc3413]]|Simple Network Management Protocol Applications|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
18 -|[[3414>>url:http://tools.ietf.org/html/rfc3414]]|User Based Security Model (USM) for SNMPv3|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
19 -|[[3415>>url:http://tools.ietf.org/html/rfc3415]]|View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
20 -|[[3416 >>url:http://tools.ietf.org/html/rfc3416]]|Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
21 -|[[3417 >>url:http://tools.ietf.org/html/rfc3417]]|Transport Mappings for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)UDP and TCP only|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
22 -|(% colspan="1" %)[[3418 >>url:http://tools.ietf.org/html/rfc3418]]|(% colspan="1" %)Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
23 -|(% colspan="1" %)[[3584>>url:http://tools.ietf.org/html/rfc3584]]|(% colspan="1" %)Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
24 -|(% colspan="1" %)[[3826>>url:http://tools.ietf.org/html/rfc3826]] |(% colspan="1" %)The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
25 -|(% colspan="1" %)[[4088>>url:http://tools.ietf.org/html/rfc4088]]|(% colspan="1" %)Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2.2
26 -|(% colspan="1" %)[[5343 >>url:http://tools.ietf.org/html/rfc5343]]|(% colspan="1" %)Simple Network Management Protocol (SNMP) Context EngineID Discovery|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2
14 +|[[3410>>url:http://tools.ietf.org/html/rfc3410]]|Introduction and Applicability Statements for Internet Standard Management Framework|(% colspan="1" %)✅|(% colspan="1" %)
15 +|[[3411>>url:http://tools.ietf.org/html/rfc3411]]|An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks|(% colspan="1" %)✅|(% colspan="1" %)
16 +|[[3412>>url:http://tools.ietf.org/html/rfc3412]]|Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)
17 +|[[3413>>url:http://tools.ietf.org/html/rfc3413]]|Simple Network Management Protocol Applications|(% colspan="1" %)✅|(% colspan="1" %)
18 +|[[3414>>url:http://tools.ietf.org/html/rfc3414]]|User Based Security Model (USM) for SNMPv3|(% colspan="1" %)✅|(% colspan="1" %)
19 +|[[3415>>url:http://tools.ietf.org/html/rfc3415]]|View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)
20 +|[[3416 >>url:http://tools.ietf.org/html/rfc3416]]|Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)
21 +|[[3417 >>url:http://tools.ietf.org/html/rfc3417]]|Transport Mappings for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)✅
22 +UDP and TCP only|(% colspan="1" %)
23 +|(% colspan="1" %)[[3418 >>url:http://tools.ietf.org/html/rfc3418]]|(% colspan="1" %)Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)✅|(% colspan="1" %)
24 +|(% colspan="1" %)[[3584>>url:http://tools.ietf.org/html/rfc3584]]|(% colspan="1" %)Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |(% colspan="1" %)✅|(% colspan="1" %)
25 +|(% colspan="1" %)[[3826>>url:http://tools.ietf.org/html/rfc3826]] |(% colspan="1" %)The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model|(% colspan="1" %)✅|(% colspan="1" %)
26 +|(% colspan="1" %)[[4088>>url:http://tools.ietf.org/html/rfc4088]]|(% colspan="1" %)Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)>= 2.2
27 +|(% colspan="1" %)[[5343 >>url:http://tools.ietf.org/html/rfc5343]]|(% colspan="1" %)Simple Network Management Protocol (SNMP) Context EngineID Discovery|(% colspan="1" %)✅|(% colspan="1" %)>= 2
27 27  |(% colspan="1" %)[[6353>>url:http://tools.ietf.org/html/rfc6353]]|(% colspan="1" %)Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)(((
28 -[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] TLS 1.0, 1.2
29 +✅
30 +TLS 1.3
29 29  
30 -[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] DTLS
32 +DTLS
31 31  )))|(% colspan="1" %)(((
32 32  ~>= 2 (TLS 1.2 with Java SE 8 or later)
33 33  
34 34  ~>= 3.0
35 35  )))
36 -|(% colspan="1" %)[[5590 >>url:http://tools.ietf.org/html/rfc5590]]|(% colspan="1" %)Transport Subsystem for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2
37 -|(% colspan="1" %)[[5591>>url:http://tools.ietf.org/html/rfc5591]]|(% colspan="1" %)Transport Security Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)(((
38 +|(% colspan="1" %)[[5590 >>url:http://tools.ietf.org/html/rfc5590]]|(% colspan="1" %)Transport Subsystem for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)|(% colspan="1" %)>= 2
39 +|(% colspan="1" %)[[5591>>url:http://tools.ietf.org/html/rfc5591]]|(% colspan="1" %)Transport Security Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)|(% colspan="1" %)(((
38 38  ~>= 2
39 39  
40 40  CRL, OSCP revocation checking >= 3.6.0
41 41  )))
42 -|(% colspan="1" %)[[5592 >>url:http://tools.ietf.org/html/rfc5592]]|(% colspan="1" %)Secure Shell Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/forbidden.svg||alt="(minus)"]]|(% colspan="1" %)
43 -|(% colspan="1" %)[[7630>>url:http://tools.ietf.org/html/rfc7630]]|(% colspan="1" %)HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2.4
44 -|(% colspan="1" %)[[draft-reeder-snmpv3-usm-3desede-00>>url:http://tools.ietf.org/html/draft-reeder-snmpv3-usm-3desede-00]] |(% colspan="1" %)Extension to the User-Based Security Model (USM) to Support Triple-DES EDE in "Outside" CBC Mode |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
45 -|(% colspan="1" %)[[draft-blumenthal-aes-usm-04>>url:http://tools.ietf.org/html/draft-blumenthal-aes-usm-04]] |(% colspan="1" %)The AES Cipher Algorithm in the SNMP's User-based Security Model |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] (AES 192 + 256)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
44 +|(% colspan="1" %)[[5592 >>url:http://tools.ietf.org/html/rfc5592]]|(% colspan="1" %)Secure Shell Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)|(% colspan="1" %)
45 +|(% colspan="1" %)[[7630>>url:http://tools.ietf.org/html/rfc7630]]|(% colspan="1" %)HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3|(% colspan="1" %)|(% colspan="1" %)>= 2.4
46 +|(% colspan="1" %)[[draft-reeder-snmpv3-usm-3desede-00>>url:http://tools.ietf.org/html/draft-reeder-snmpv3-usm-3desede-00]] |(% colspan="1" %)Extension to the User-Based Security Model (USM) to Support Triple-DES EDE in "Outside" CBC Mode |(% colspan="1" %)|(% colspan="1" %)
47 +|(% colspan="1" %)[[draft-blumenthal-aes-usm-04>>url:http://tools.ietf.org/html/draft-blumenthal-aes-usm-04]] |(% colspan="1" %)The AES Cipher Algorithm in the SNMP's User-based Security Model |(% colspan="1" %)✅ (AES 192 + 256)|(% colspan="1" %)
46 46  
47 -
48 48  SNMP4J-AgentX implements the follow IETF RFCs:
49 49  
50 50  |=(((
... ... @@ -56,10 +56,9 @@
56 56  )))|=(% colspan="1" %)(((
57 57  Versions
58 58  )))
59 -| 2741| Agent Extensibility (AgentX) Protocol Version 1|[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] (TCP only)|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
60 -| 2742| Definitions of Managed Objects for Extensible SNMP Agents|[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
60 +| 2741| Agent Extensibility (AgentX) Protocol Version 1|✅ (TCP only)|(% colspan="1" %)
61 +| 2742| Definitions of Managed Objects for Extensible SNMP Agents||(% colspan="1" %)
61 61  
62 -
63 63  === FIPS 140-2 Compliance ===
64 64  
65 65  SNMP4J uses standard JCE hashing and encryption algorithms as provided through the Java Cryptography Extension (JCE) as listed in the table below. Thus, by using a FIPS 140-2 certified JCE provider, SNMP4J becomes FIPS 140-2 compliant:
... ... @@ -87,5 +87,4 @@
87 87  (nonstandard)|Privacy
88 88  |DESede/CBC/NoPadding|Priv3DES|3DES|Privacy
89 89  
90 -
91 91