Hi,

so, more on this...

- on ASR9k, SNMPv3 is subject to regular control plane ACLs, so
  unless a SNMPv3 sender shows up in

    control-plane
     management-plane
      inband
       interface all
        allow all peer
         address ipv4 1.2.3.4/32
        !
        allow SNMP peer
         address ipv4 3.4.5.6/32

  the ASR9k will not reply (I assume that's generic IOS XR).  Good.

- on IOS XE, I found something that "seems to do the right thing", as
  in, block all SNMPv3 packets, including discovery, while still permitting
  SNMPv2

    asr920(config)#access-list 99 deny any log
    asr920(config)#snmp-server drop report  access 99 
    asr920(config)#do term mon
    asr920(config)#
    Sep 21 12:25:07: %SEC-6-IPACCESSLOGS: list 99 denied 1.1.27.20 1 packet 
    Sep 21 12:25:11: %SEC-6-IPACCESSLOGS: list 99 denied 1.1.0.18 1 packet 
    Sep 21 12:31:03: %SEC-6-IPACCESSLOGS: list 99 denied 1.1.27.20 5 packets 
    Sep 21 12:31:03: %SEC-6-IPACCESSLOGS: list 99 denied 1.1.0.18 5 packets 

  (these are the two test hosts that could do SNMP v3 discovery before)

  - since we're not using SNMPv3 anywhere, that is good enough for us.

  This is on IOS XE 16.06.10.

  Older IOS XE and IOS versions have "snmp-server drop unknown-user", but
  that still permits discovery.


So maybe the "snmp-server drop report" will at least help Hank... :-)

gert

-- 
"If was one thing all people took for granted, was conviction that if you 
 feed honest figures into a computer, honest figures come out. Never doubted 
 it myself till I met a computer with a sense of humor."
                             Robert A. Heinlein, The Moon is a Harsh Mistress

Gert Doering - Munich, Germany                             g...@greenie.muc.de

Attachment: signature.asc
Description: PGP signature

_______________________________________________
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Reply via email to