I imagine that 161 is outbound from the inside network to the devices you are
monitoring via SNMP and 162 (trap) is inbound to the internal network from
the devices you are monitoring.  Two things you want to do
are:
1. Block SNMP coming from the Internet on your Internet router.

2. Change the default SNMP read and read/write community string
   defaults on all devices which are public and private to something else.

One risk of SNMP is that the SNMP-set PDU on port 161 can be used to
change a device's configuration.  SNMP-get PDU on 161 can be used to
get information about a device's configuration.  That's why I'd
block SNMP from the Internet.  Also, community strings, which essentially
are passwords, are in plain text in most current implementations and 
have a well known default.

If you block SNMP from the Internet and set up your FW rules to be
specifically from the monitoring device to/from the monitored device
you will be more secure.  Sometimes SNMP is an necessary evil.

                   -Art


At 09:27 AM 3/14/00 -0500, Payton, John wrote:
>Well, against my protests, I am being directed to open these ports for SNMP
>through the Firewall.
>Could anyone please reply with URL's that discuss the security issues with
>opening these ports.
>
>Thanks for your time,
>
>John 
>
>
>Port                   Type                    Protocol
>161                    UDP                     SNMP
>162                    UDP                     SNMP
>6665                   UDP                     SNMP
>26017                  UDP                     SNMP
>
>-
>[To unsubscribe, send mail to [EMAIL PROTECTED] with
>"unsubscribe firewalls" in the body of the message.]
>
===========================================
Art Coble
Lucent - Netcare Professional Services
Senior Network Consultant
Email: [EMAIL PROTECTED]
Page:  800 INS 1 INS
=============================================
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to