Network Working Group J. Galvin Request for Comments: 1445 Trusted Information Systems K. McCloghrie Hughes LAN Systems April 1993 Administrative Model for version 2 of the Simple Network Management Protocol (SNMPv2) Status of this Memo This RFC specifes an IAB standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "IAB Official Protocol Standards" for the standardization state and status of this protocol. Distribution of this memo is unlimited. Table of Contents 1 Introduction .......................................... 2 1.1 A Note on Terminology ............................... 2 2 Elements of the Model ................................. 3 2.1 SNMPv2 Party ........................................ 3 2.2 SNMPv2 Entity ....................................... 6 2.3 SNMPv2 Management Station ........................... 7 2.4 SNMPv2 Agent ........................................ 7 2.5 View Subtree ........................................ 7 2.6 MIB View ............................................ 8 2.7 Proxy Relationship .................................. 8 2.8 SNMPv2 Context ...................................... 10 2.9 SNMPv2 Management Communication ..................... 10 2.10 SNMPv2 Authenticated Management Communication ...... 12 2.11 SNMPv2 Private Management Communication ............ 13 2.12 SNMPv2 Management Communication Class .............. 14 2.13 SNMPv2 Access Control Policy ....................... 14 3 Elements of Procedure ................................. 17 3.1 Generating a Request ................................ 17 3.2 Processing a Received Communication ................. 18 3.3 Generating a Response ............................... 21 Galvin & McCloghrie [Page i] RFC 1445 Administrative Model for SNMPv2 April 1993 4 Application of the Model .............................. 23 4.1 Non-Secure Minimal Agent Configuration .............. 23 4.2 Secure Minimal Agent Configuration .................. 26 4.3 MIB View Configurations ............................. 28 4.4 Proxy Configuration ................................. 32 4.4.1 Foreign Proxy Configuration ....................... 33 4.4.2 Native Proxy Configuration ........................ 37 4.5 Public Key Configuration ............................ 41 5 Security Considerations ............................... 44 6 Acknowledgements ...................................... 45 7 References ............................................ 46 8 Authors' Addresses .................................... 47 Galvin & McCloghrie