There have been several attempts in the past to secure the Simple Network Management Protocol (SNMP). Version 3 of the SNMP protocol introduced a User-based Security Model (USM) which comes with its own user and key-management infrastructure. However, many operators are reluctant to introduce a new user and key management infrastructure just to secure SNMP. This paper describes how the Secure Shell (SSH) protocol can be used to secure SNMP and it provides a performance analysis of a prototype implementation which compares the performance of SNMP over SSH with other secure and insecure versions of SNMP. © IFIP International Federation for Information Processing 2006.
CITATION STYLE
Marinov, V., & Schönwälder, J. (2006). Performance analysis of SNMP over SSH. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4269 LNCS, pp. 25–36). Springer Verlag. https://doi.org/10.1007/11907466_3
Mendeley helps you to discover research relevant for your work.