Changes for page What standards are covered by SNMP4J (i.e., RFCs, FIPS 140-2)?
Last modified by Frank Fock on 2026/04/03 12:19
From version 2.1
edited by Frank Fock
on 2026/04/03 12:19
on 2026/04/03 12:19
Change comment:
There is no comment for this version
To version 1.1
edited by Frank Fock
on 2024/05/25 20:40
on 2024/05/25 20:40
Change comment:
There is no comment for this version
Summary
-
Page properties (1 modified, 0 added, 0 removed)
Details
- Page properties
-
- Content
-
... ... @@ -1,4 +1,4 @@ 1 -=== IETF RFC Compliance === 1 +=== IETF RFC Compliance === 2 2 3 3 SNMP4J / SNMP4J-Agent implements the following IETF RFCs: 4 4 ... ... @@ -11,41 +11,40 @@ 11 11 )))|=(% colspan="1" %)((( 12 12 Versions (SNMP4J) 13 13 ))) 14 -|[[3410>>url:http://tools.ietf.org/html/rfc3410]]|Introduction and Applicability Statements for Internet Standard Management Framework|(% colspan="1" %)✅|(% colspan="1" %) 15 -|[[3411>>url:http://tools.ietf.org/html/rfc3411]]|An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks|(% colspan="1" %)✅|(% colspan="1" %) 16 -|[[3412>>url:http://tools.ietf.org/html/rfc3412]]|Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %) 17 -|[[3413>>url:http://tools.ietf.org/html/rfc3413]]|Simple Network Management Protocol Applications|(% colspan="1" %)✅|(% colspan="1" %) 18 -|[[3414>>url:http://tools.ietf.org/html/rfc3414]]|User Based Security Model (USM) for SNMPv3|(% colspan="1" %)✅|(% colspan="1" %) 19 -|[[3415>>url:http://tools.ietf.org/html/rfc3415]]|View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %) 20 -|[[3416 >>url:http://tools.ietf.org/html/rfc3416]]|Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %) 21 -|[[3417 >>url:http://tools.ietf.org/html/rfc3417]]|Transport Mappings for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)✅ 22 -UDP and TCP only|(% colspan="1" %) 23 -|(% colspan="1" %)[[3418 >>url:http://tools.ietf.org/html/rfc3418]]|(% colspan="1" %)Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)✅|(% colspan="1" %) 24 -|(% colspan="1" %)[[3584>>url:http://tools.ietf.org/html/rfc3584]]|(% colspan="1" %)Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |(% colspan="1" %)✅|(% colspan="1" %) 25 -|(% colspan="1" %)[[3826>>url:http://tools.ietf.org/html/rfc3826]] |(% colspan="1" %)The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model|(% colspan="1" %)✅|(% colspan="1" %) 26 -|(% colspan="1" %)[[4088>>url:http://tools.ietf.org/html/rfc4088]]|(% colspan="1" %)Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)✅|(% colspan="1" %)>= 2.2 27 -|(% colspan="1" %)[[5343 >>url:http://tools.ietf.org/html/rfc5343]]|(% colspan="1" %)Simple Network Management Protocol (SNMP) Context EngineID Discovery|(% colspan="1" %)✅|(% colspan="1" %)>= 2 14 +|[[3410>>url:http://tools.ietf.org/html/rfc3410]]|Introduction and Applicability Statements for Internet Standard Management Framework|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 15 +|[[3411>>url:http://tools.ietf.org/html/rfc3411]]|An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 16 +|[[3412>>url:http://tools.ietf.org/html/rfc3412]]|Message Processing and Dispatching for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 17 +|[[3413>>url:http://tools.ietf.org/html/rfc3413]]|Simple Network Management Protocol Applications|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 18 +|[[3414>>url:http://tools.ietf.org/html/rfc3414]]|User Based Security Model (USM) for SNMPv3|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 19 +|[[3415>>url:http://tools.ietf.org/html/rfc3415]]|View-based Access Control Model (VACM) for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 20 +|[[3416 >>url:http://tools.ietf.org/html/rfc3416]]|Version 2 of the Protocol Operations for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 21 +|[[3417 >>url:http://tools.ietf.org/html/rfc3417]]|Transport Mappings for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)UDP and TCP only|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 22 +|(% colspan="1" %)[[3418 >>url:http://tools.ietf.org/html/rfc3418]]|(% colspan="1" %)Management Information Base (MIB) for the Simple Network Management Protocol (SNMP) |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 23 +|(% colspan="1" %)[[3584>>url:http://tools.ietf.org/html/rfc3584]]|(% colspan="1" %)Coexistence between Version 1, Version 2, and Version 3 of the Internet-standard Network Management Framework |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 24 +|(% colspan="1" %)[[3826>>url:http://tools.ietf.org/html/rfc3826]] |(% colspan="1" %)The Advanced Encryption Standard (AES) Cipher Algorithm in the SNMP User-based Security Model|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 25 +|(% colspan="1" %)[[4088>>url:http://tools.ietf.org/html/rfc4088]]|(% colspan="1" %)Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2.2 26 +|(% colspan="1" %)[[5343 >>url:http://tools.ietf.org/html/rfc5343]]|(% colspan="1" %)Simple Network Management Protocol (SNMP) Context EngineID Discovery|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2 28 28 |(% colspan="1" %)[[6353>>url:http://tools.ietf.org/html/rfc6353]]|(% colspan="1" %)Transport Layer Security (TLS) Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)((( 29 -✅ 30 -TLS 1.3 28 +[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] TLS 1.0, 1.2 31 31 32 -DTLS 30 +[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] DTLS 33 33 )))|(% colspan="1" %)((( 34 34 ~>= 2 (TLS 1.2 with Java SE 8 or later) 35 35 36 36 ~>= 3.0 37 37 ))) 38 -|(% colspan="1" %)[[5590 >>url:http://tools.ietf.org/html/rfc5590]]|(% colspan="1" %)Transport Subsystem for the Simple Network Management Protocol (SNMP)|(% colspan="1" %) ✅|(% colspan="1" %)>= 239 -|(% colspan="1" %)[[5591>>url:http://tools.ietf.org/html/rfc5591]]|(% colspan="1" %)Transport Security Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %) ✅|(% colspan="1" %)(((36 +|(% colspan="1" %)[[5590 >>url:http://tools.ietf.org/html/rfc5590]]|(% colspan="1" %)Transport Subsystem for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2 37 +|(% colspan="1" %)[[5591>>url:http://tools.ietf.org/html/rfc5591]]|(% colspan="1" %)Transport Security Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)((( 40 40 ~>= 2 41 41 42 42 CRL, OSCP revocation checking >= 3.6.0 43 43 ))) 44 -|(% colspan="1" %)[[5592 >>url:http://tools.ietf.org/html/rfc5592]]|(% colspan="1" %)Secure Shell Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %) ✅|(% colspan="1" %)45 -|(% colspan="1" %)[[7630>>url:http://tools.ietf.org/html/rfc7630]]|(% colspan="1" %)HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3|(% colspan="1" %) ✅|(% colspan="1" %)>= 2.446 -|(% colspan="1" %)[[draft-reeder-snmpv3-usm-3desede-00>>url:http://tools.ietf.org/html/draft-reeder-snmpv3-usm-3desede-00]] |(% colspan="1" %)Extension to the User-Based Security Model (USM) to Support Triple-DES EDE in "Outside" CBC Mode |(% colspan="1" %) ✅|(% colspan="1" %)47 -|(% colspan="1" %)[[draft-blumenthal-aes-usm-04>>url:http://tools.ietf.org/html/draft-blumenthal-aes-usm-04]] |(% colspan="1" %)The AES Cipher Algorithm in the SNMP's User-based Security Model |(% colspan="1" %) ✅(AES 192 + 256)|(% colspan="1" %)42 +|(% colspan="1" %)[[5592 >>url:http://tools.ietf.org/html/rfc5592]]|(% colspan="1" %)Secure Shell Transport Model for the Simple Network Management Protocol (SNMP)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/forbidden.svg||alt="(minus)"]]|(% colspan="1" %) 43 +|(% colspan="1" %)[[7630>>url:http://tools.ietf.org/html/rfc7630]]|(% colspan="1" %)HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)>= 2.4 44 +|(% colspan="1" %)[[draft-reeder-snmpv3-usm-3desede-00>>url:http://tools.ietf.org/html/draft-reeder-snmpv3-usm-3desede-00]] |(% colspan="1" %)Extension to the User-Based Security Model (USM) to Support Triple-DES EDE in "Outside" CBC Mode |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 45 +|(% colspan="1" %)[[draft-blumenthal-aes-usm-04>>url:http://tools.ietf.org/html/draft-blumenthal-aes-usm-04]] |(% colspan="1" %)The AES Cipher Algorithm in the SNMP's User-based Security Model |(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] (AES 192 + 256)|(% colspan="1" %)[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 48 48 47 + 49 49 SNMP4J-AgentX implements the follow IETF RFCs: 50 50 51 51 |=((( ... ... @@ -57,9 +57,10 @@ 57 57 )))|=(% colspan="1" %)((( 58 58 Versions 59 59 ))) 60 -| 2741| Agent Extensibility (AgentX) Protocol Version 1| ✅(TCP only)|(% colspan="1" %)61 -| 2742| Definitions of Managed Objects for Extensible SNMP Agents| ✅|(% colspan="1" %)59 +| 2741| Agent Extensibility (AgentX) Protocol Version 1|[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]] (TCP only)|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 60 +| 2742| Definitions of Managed Objects for Extensible SNMP Agents|[[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/check.svg||alt="(tick)"]]|(% colspan="1" %) [[image:https://doc.snmp.app/s/-yxgr8m/9012/8yg2g7/_/images/icons/emoticons/star_green.svg||alt="(green star)"]] 62 62 62 + 63 63 === FIPS 140-2 Compliance === 64 64 65 65 SNMP4J uses standard JCE hashing and encryption algorithms as provided through the Java Cryptography Extension (JCE) as listed in the table below. Thus, by using a FIPS 140-2 certified JCE provider, SNMP4J becomes FIPS 140-2 compliant: ... ... @@ -87,4 +87,5 @@ 87 87 (nonstandard)|Privacy 88 88 |DESede/CBC/NoPadding|Priv3DES|3DES|Privacy 89 89 90 + 90 90