Changes for page What standards are covered by SNMP4J (i.e., RFCs, FIPS 140-2)?
Last modified by Frank Fock on 2026/04/03 12:19
From version 1.1
edited by Frank Fock
on 2024/05/25 20:40
on 2024/05/25 20:40
Change comment:
There is no comment for this version
To version 2.1
edited by Frank Fock
on 2026/04/03 12:19
on 2026/04/03 12:19
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -1,4 +1,4 @@ 1 -=== IETF RFC Compliance ===1 +=== IETF RFC Compliance === 2 2 3 3 SNMP4J / SNMP4J-Agent implements the following IETF RFCs: 4 4 ... ... @@ -11,40 +11,41 @@ 11 11 )))|=(% colspan="1" %)((( 12 12 Versions (SNMP4J) 13 13 ))) 14 -|[[3410>>url:http://tools.ietf.org/html/rfc3410]]|Introduction and Applicability Statements for Internet Standard Management Framework|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 15 -|[[3411>>url:http://tools.ietf.org/html/rfc3411]]|An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 16 -|[[3412>>url:http://tools.ietf.org/html/rfc3412]]|Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 17 -|[[3413>>url:http://tools.ietf.org/html/rfc3413]]|Simple Network Management Protocol Applications|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 18 -|[[3414>>url:http://tools.ietf.org/html/rfc3414]]|User Based Security Model (USM) for SNMPv3|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 19 -|[[3415>>url:http://tools.ietf.org/html/rfc3415]]|View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 20 -|[[3416 >>url:http://tools.ietf.org/html/rfc3416]]|Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 21 -|[[3417 >>url:http://tools.ietf.org/html/rfc3417]]|Transport Mappings for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)UDP and TCP only|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 22 -|(% colspan="1" %)[[3418 >>url:http://tools.ietf.org/html/rfc3418]]|(% colspan="1" %)Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 23 -|(% colspan="1" %)[[3584>>url:http://tools.ietf.org/html/rfc3584]]|(% colspan="1" %)Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 24 -|(% colspan="1" %)[[3826>>url:http://tools.ietf.org/html/rfc3826]] |(% colspan="1" %)The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 25 -|(% colspan="1" %)[[4088>>url:http://tools.ietf.org/html/rfc4088]]|(% colspan="1" %)Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2.2 26 -|(% colspan="1" %)[[5343 >>url:http://tools.ietf.org/html/rfc5343]]|(% colspan="1" %)Simple Network Management Protocol (SNMP) Context EngineID Discovery|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2 14 +|[[3410>>url:http://tools.ietf.org/html/rfc3410]]|Introduction and Applicability Statements for Internet Standard Management Framework|(% colspan="1" %)✅|(% colspan="1" %) 15 +|[[3411>>url:http://tools.ietf.org/html/rfc3411]]|An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks|(% colspan="1" %)✅|(% colspan="1" %) 16 +|[[3412>>url:http://tools.ietf.org/html/rfc3412]]|Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %) 17 +|[[3413>>url:http://tools.ietf.org/html/rfc3413]]|Simple Network Management Protocol Applications|(% colspan="1" %)✅|(% colspan="1" %) 18 +|[[3414>>url:http://tools.ietf.org/html/rfc3414]]|User Based Security Model (USM) for SNMPv3|(% colspan="1" %)✅|(% colspan="1" %) 19 +|[[3415>>url:http://tools.ietf.org/html/rfc3415]]|View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %) 20 +|[[3416 >>url:http://tools.ietf.org/html/rfc3416]]|Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %) 21 +|[[3417 >>url:http://tools.ietf.org/html/rfc3417]]|Transport Mappings for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)✅ 22 +UDP and TCP only|(% colspan="1" %) 23 +|(% colspan="1" %)[[3418 >>url:http://tools.ietf.org/html/rfc3418]]|(% colspan="1" %)Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)✅|(% colspan="1" %) 24 +|(% colspan="1" %)[[3584>>url:http://tools.ietf.org/html/rfc3584]]|(% colspan="1" %)Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |(% colspan="1" %)✅|(% colspan="1" %) 25 +|(% colspan="1" %)[[3826>>url:http://tools.ietf.org/html/rfc3826]] |(% colspan="1" %)The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model|(% colspan="1" %)✅|(% colspan="1" %) 26 +|(% colspan="1" %)[[4088>>url:http://tools.ietf.org/html/rfc4088]]|(% colspan="1" %)Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)>= 2.2 27 +|(% colspan="1" %)[[5343 >>url:http://tools.ietf.org/html/rfc5343]]|(% colspan="1" %)Simple Network Management Protocol (SNMP) Context EngineID Discovery|(% colspan="1" %)✅|(% colspan="1" %)>= 2 27 27 |(% colspan="1" %)[[6353>>url:http://tools.ietf.org/html/rfc6353]]|(% colspan="1" %)Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)((( 28 -[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] TLS 1.0, 1.2 29 +✅ 30 +TLS 1.3 29 29 30 - [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]DTLS32 +DTLS 31 31 )))|(% colspan="1" %)((( 32 32 ~>= 2 (TLS 1.2 with Java SE 8 or later) 33 33 34 34 ~>= 3.0 35 35 ))) 36 -|(% colspan="1" %)[[5590 >>url:http://tools.ietf.org/html/rfc5590]]|(% colspan="1" %)Transport Subsystem for the Simple Network Management Protocol (SNMP)|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 237 -|(% colspan="1" %)[[5591>>url:http://tools.ietf.org/html/rfc5591]]|(% colspan="1" %)Transport Security Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)(((38 +|(% colspan="1" %)[[5590 >>url:http://tools.ietf.org/html/rfc5590]]|(% colspan="1" %)Transport Subsystem for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)>= 2 39 +|(% colspan="1" %)[[5591>>url:http://tools.ietf.org/html/rfc5591]]|(% colspan="1" %)Transport Security Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)((( 38 38 ~>= 2 39 39 40 40 CRL, OSCP revocation checking >= 3.6.0 41 41 ))) 42 -|(% colspan="1" %)[[5592 >>url:http://tools.ietf.org/html/rfc5592]]|(% colspan="1" %)Secure Shell Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/forbidden.svg||alt="(minus)"]]|(% colspan="1" %)43 -|(% colspan="1" %)[[7630>>url:http://tools.ietf.org/html/rfc7630]]|(% colspan="1" %)HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2.444 -|(% colspan="1" %)[[draft-reeder-snmpv3-usm-3desede-00>>url:http://tools.ietf.org/html/draft-reeder-snmpv3-usm-3desede-00]] |(% colspan="1" %)Extension to the User-Based Security Model (USM) to Support Triple-DES EDE in "Outside" CBC Mode |(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(greenstar)"]]45 -|(% colspan="1" %)[[draft-blumenthal-aes-usm-04>>url:http://tools.ietf.org/html/draft-blumenthal-aes-usm-04]] |(% colspan="1" %)The AES Cipher Algorithm in the SNMP's User-based Security Model |(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] (AES 192 + 256)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(greenstar)"]]44 +|(% colspan="1" %)[[5592 >>url:http://tools.ietf.org/html/rfc5592]]|(% colspan="1" %)Secure Shell Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %) 45 +|(% colspan="1" %)[[7630>>url:http://tools.ietf.org/html/rfc7630]]|(% colspan="1" %)HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3|(% colspan="1" %)✅|(% colspan="1" %)>= 2.4 46 +|(% colspan="1" %)[[draft-reeder-snmpv3-usm-3desede-00>>url:http://tools.ietf.org/html/draft-reeder-snmpv3-usm-3desede-00]] |(% colspan="1" %)Extension to the User-Based Security Model (USM) to Support Triple-DES EDE in "Outside" CBC Mode |(% colspan="1" %)✅|(% colspan="1" %) 47 +|(% colspan="1" %)[[draft-blumenthal-aes-usm-04>>url:http://tools.ietf.org/html/draft-blumenthal-aes-usm-04]] |(% colspan="1" %)The AES Cipher Algorithm in the SNMP's User-based Security Model |(% colspan="1" %)✅ (AES 192 + 256)|(% colspan="1" %) 46 46 47 - 48 48 SNMP4J-AgentX implements the follow IETF RFCs: 49 49 50 50 |=((( ... ... @@ -56,10 +56,9 @@ 56 56 )))|=(% colspan="1" %)((( 57 57 Versions 58 58 ))) 59 -| 2741| Agent Extensibility (AgentX) Protocol Version 1| [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] (TCP only)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]60 -| 2742| Definitions of Managed Objects for Extensible SNMP Agents| [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]60 +| 2741| Agent Extensibility (AgentX) Protocol Version 1|✅ (TCP only)|(% colspan="1" %) 61 +| 2742| Definitions of Managed Objects for Extensible SNMP Agents|✅|(% colspan="1" %) 61 61 62 - 63 63 === FIPS 140-2 Compliance === 64 64 65 65 SNMP4J uses standard JCE hashing and encryption algorithms as provided through the Java Cryptography Extension (JCE) as listed in the table below. Thus, by using a FIPS 140-2 certified JCE provider, SNMP4J becomes FIPS 140-2 compliant: ... ... @@ -87,5 +87,4 @@ 87 87 (nonstandard)|Privacy 88 88 |DESede/CBC/NoPadding|Priv3DES|3DES|Privacy 89 89 90 - 91 91