Through further understanding of SNMP, we know how important this powerful protocol function is. Therefore, you must master the Linux SNMP service. I learned about Linux SNMP and learned about it as a Simple Network Management Protocol. The protocol used to manage nodes on an IP network. The communication port of the Linux SNMP Service is a UDP port, which is easily overlooked by most network administrators.
Some Network Management Configuration servers often block the establishment of the NetBIOS null session and think that the system security is quite guaranteed. However, due to the installation of the Linux SNMP service, it brings great potential risks to the system.
The most convenient and easy solution is to disable or uninstall the Linux SNMP service.
If it is inconvenient to disable the Linux SNMP service, you can modify the registry or directly modify the Linux SNMP service attribute of the graphic interface for security configuration.
Start -- program -- management tool -- Service -- SNMP Service -- Property -- Security
In this configuration interface, you can modify community strings, that is, Microsoft's "group name ". Or you can configure whether to allow Linux SNMP query from some security hosts.
However, friends in the NT4 environment must modify the registry.
Modify community strings. Under [HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ SNMP \ Parameters \ ValidCommunities], change the public name to another name.
If you want to restrict the allowed ip addresses for Linux SNMP query, you can enter [HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ SNMP \ Parameters \ PermittedManagers] to add a string named "1 ", the content is the IP address of the host to be allowed.
Of course, if multiple machines are allowed, the names must be "2, 3, 4" and so on.
At this point, the information spying and protection policies based on the Linux SNMP Service are basically finished.