Last modified by Frank Fock on 2026/04/03 12:19

From version 2.1
edited by Frank Fock
on 2026/04/03 12:19
Change comment: There is no comment for this version
To version 1.1
edited by Frank Fock
on 2024/05/25 20:40
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -1,4 +1,4 @@
1 -=== IETF RFC Compliance ===
1 +=== IETF RFC Compliance ===
2 2  
3 3  SNMP4J / SNMP4J-Agent implements the following IETF RFCs:
4 4  
... ... @@ -11,41 +11,40 @@
11 11  )))|=(% colspan="1" %)(((
12 12   Versions (SNMP4J)
13 13  )))
14 -|[[3410>>url:http://tools.ietf.org/html/rfc3410]]|Introduction and Applicability Statements for Internet Standard Management Framework|(% colspan="1" %)✅|(% colspan="1" %)
15 -|[[3411>>url:http://tools.ietf.org/html/rfc3411]]|An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks|(% colspan="1" %)✅|(% colspan="1" %)
16 -|[[3412>>url:http://tools.ietf.org/html/rfc3412]]|Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)
17 -|[[3413>>url:http://tools.ietf.org/html/rfc3413]]|Simple Network Management Protocol Applications|(% colspan="1" %)✅|(% colspan="1" %)
18 -|[[3414>>url:http://tools.ietf.org/html/rfc3414]]|User Based Security Model (USM) for SNMPv3|(% colspan="1" %)✅|(% colspan="1" %)
19 -|[[3415>>url:http://tools.ietf.org/html/rfc3415]]|View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)
20 -|[[3416 >>url:http://tools.ietf.org/html/rfc3416]]|Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)
21 -|[[3417 >>url:http://tools.ietf.org/html/rfc3417]]|Transport Mappings for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)✅
22 -UDP and TCP only|(% colspan="1" %)
23 -|(% colspan="1" %)[[3418 >>url:http://tools.ietf.org/html/rfc3418]]|(% colspan="1" %)Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)✅|(% colspan="1" %)
24 -|(% colspan="1" %)[[3584>>url:http://tools.ietf.org/html/rfc3584]]|(% colspan="1" %)Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |(% colspan="1" %)✅|(% colspan="1" %)
25 -|(% colspan="1" %)[[3826>>url:http://tools.ietf.org/html/rfc3826]] |(% colspan="1" %)The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model|(% colspan="1" %)✅|(% colspan="1" %)
26 -|(% colspan="1" %)[[4088>>url:http://tools.ietf.org/html/rfc4088]]|(% colspan="1" %)Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)>= 2.2
27 -|(% colspan="1" %)[[5343 >>url:http://tools.ietf.org/html/rfc5343]]|(% colspan="1" %)Simple Network Management Protocol (SNMP) Context EngineID Discovery|(% colspan="1" %)✅|(% colspan="1" %)>= 2
14 +|[[3410>>url:http://tools.ietf.org/html/rfc3410]]|Introduction and Applicability Statements for Internet Standard Management Framework|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
15 +|[[3411>>url:http://tools.ietf.org/html/rfc3411]]|An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
16 +|[[3412>>url:http://tools.ietf.org/html/rfc3412]]|Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
17 +|[[3413>>url:http://tools.ietf.org/html/rfc3413]]|Simple Network Management Protocol Applications|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
18 +|[[3414>>url:http://tools.ietf.org/html/rfc3414]]|User Based Security Model (USM) for SNMPv3|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
19 +|[[3415>>url:http://tools.ietf.org/html/rfc3415]]|View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
20 +|[[3416 >>url:http://tools.ietf.org/html/rfc3416]]|Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
21 +|[[3417 >>url:http://tools.ietf.org/html/rfc3417]]|Transport Mappings for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)UDP and TCP only|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
22 +|(% colspan="1" %)[[3418 >>url:http://tools.ietf.org/html/rfc3418]]|(% colspan="1" %)Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
23 +|(% colspan="1" %)[[3584>>url:http://tools.ietf.org/html/rfc3584]]|(% colspan="1" %)Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
24 +|(% colspan="1" %)[[3826>>url:http://tools.ietf.org/html/rfc3826]] |(% colspan="1" %)The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
25 +|(% colspan="1" %)[[4088>>url:http://tools.ietf.org/html/rfc4088]]|(% colspan="1" %)Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2.2
26 +|(% colspan="1" %)[[5343 >>url:http://tools.ietf.org/html/rfc5343]]|(% colspan="1" %)Simple Network Management Protocol (SNMP) Context EngineID Discovery|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2
28 28  |(% colspan="1" %)[[6353>>url:http://tools.ietf.org/html/rfc6353]]|(% colspan="1" %)Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)(((
29 -✅
30 -TLS 1.3
28 +[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] TLS 1.0, 1.2
31 31  
32 -DTLS
30 +[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] DTLS
33 33  )))|(% colspan="1" %)(((
34 34  ~>= 2 (TLS 1.2 with Java SE 8 or later)
35 35  
36 36  ~>= 3.0
37 37  )))
38 -|(% colspan="1" %)[[5590 >>url:http://tools.ietf.org/html/rfc5590]]|(% colspan="1" %)Transport Subsystem for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)|(% colspan="1" %)>= 2
39 -|(% colspan="1" %)[[5591>>url:http://tools.ietf.org/html/rfc5591]]|(% colspan="1" %)Transport Security Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)|(% colspan="1" %)(((
36 +|(% colspan="1" %)[[5590 >>url:http://tools.ietf.org/html/rfc5590]]|(% colspan="1" %)Transport Subsystem for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2
37 +|(% colspan="1" %)[[5591>>url:http://tools.ietf.org/html/rfc5591]]|(% colspan="1" %)Transport Security Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)(((
40 40  ~>= 2
41 41  
42 42  CRL, OSCP revocation checking >= 3.6.0
43 43  )))
44 -|(% colspan="1" %)[[5592 >>url:http://tools.ietf.org/html/rfc5592]]|(% colspan="1" %)Secure Shell Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)|(% colspan="1" %)
45 -|(% colspan="1" %)[[7630>>url:http://tools.ietf.org/html/rfc7630]]|(% colspan="1" %)HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3|(% colspan="1" %)|(% colspan="1" %)>= 2.4
46 -|(% colspan="1" %)[[draft-reeder-snmpv3-usm-3desede-00>>url:http://tools.ietf.org/html/draft-reeder-snmpv3-usm-3desede-00]] |(% colspan="1" %)Extension to the User-Based Security Model (USM) to Support Triple-DES EDE in "Outside" CBC Mode |(% colspan="1" %)|(% colspan="1" %)
47 -|(% colspan="1" %)[[draft-blumenthal-aes-usm-04>>url:http://tools.ietf.org/html/draft-blumenthal-aes-usm-04]] |(% colspan="1" %)The AES Cipher Algorithm in the SNMP's User-based Security Model |(% colspan="1" %)✅ (AES 192 + 256)|(% colspan="1" %)
42 +|(% colspan="1" %)[[5592 >>url:http://tools.ietf.org/html/rfc5592]]|(% colspan="1" %)Secure Shell Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/forbidden.svg||alt="(minus)"]]|(% colspan="1" %)
43 +|(% colspan="1" %)[[7630>>url:http://tools.ietf.org/html/rfc7630]]|(% colspan="1" %)HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2.4
44 +|(% colspan="1" %)[[draft-reeder-snmpv3-usm-3desede-00>>url:http://tools.ietf.org/html/draft-reeder-snmpv3-usm-3desede-00]] |(% colspan="1" %)Extension to the User-Based Security Model (USM) to Support Triple-DES EDE in "Outside" CBC Mode |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
45 +|(% colspan="1" %)[[draft-blumenthal-aes-usm-04>>url:http://tools.ietf.org/html/draft-blumenthal-aes-usm-04]] |(% colspan="1" %)The AES Cipher Algorithm in the SNMP's User-based Security Model |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] (AES 192 + 256)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
48 48  
47 +
49 49  SNMP4J-AgentX implements the follow IETF RFCs:
50 50  
51 51  |=(((
... ... @@ -57,9 +57,10 @@
57 57  )))|=(% colspan="1" %)(((
58 58  Versions
59 59  )))
60 -| 2741| Agent Extensibility (AgentX) Protocol Version 1|✅ (TCP only)|(% colspan="1" %)
61 -| 2742| Definitions of Managed Objects for Extensible SNMP Agents||(% colspan="1" %)
59 +| 2741| Agent Extensibility (AgentX) Protocol Version 1|[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] (TCP only)|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
60 +| 2742| Definitions of Managed Objects for Extensible SNMP Agents|[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]]
62 62  
62 +
63 63  === FIPS 140-2 Compliance ===
64 64  
65 65  SNMP4J uses standard JCE hashing and encryption algorithms as provided through the Java Cryptography Extension (JCE) as listed in the table below. Thus, by using a FIPS 140-2 certified JCE provider, SNMP4J becomes FIPS 140-2 compliant:
... ... @@ -87,4 +87,5 @@
87 87  (nonstandard)|Privacy
88 88  |DESede/CBC/NoPadding|Priv3DES|3DES|Privacy
89 89  
90 +
90 90