<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking SNMP SET in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853177#M11391</link>
    <description>&lt;P&gt;Hi Seb&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you once again for prompt response. I wasn't confident if such solution exist on Cisco ASA hence wanted to verify.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;RT&lt;/P&gt;</description>
    <pubDate>Thu, 09 May 2019 13:07:15 GMT</pubDate>
    <dc:creator>rthakker</dc:creator>
    <dc:date>2019-05-09T13:07:15Z</dc:date>
    <item>
      <title>Blocking SNMP SET</title>
      <link>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853038#M11387</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was wondering if it is possible to block / deny&amp;nbsp; SNMP SET packets passing through Cisco ASA firewalls as well as targeted to Cisco ASA firewall but allow SNMP Get and Trap from specific host within a network?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;RT&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853038#M11387</guid>
      <dc:creator>rthakker</dc:creator>
      <dc:date>2020-02-21T17:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SNMP SET</title>
      <link>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853043#M11388</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;The only SNMP inspection that the ASA offers is to permit/deny based on SNMP version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to block SET commands why not just configure the device with SNMP-RO. If you want the SNMP server to be RW for some hosts/ subnets then just apply an ACL to the SNMP community in question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 10:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853043#M11388</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-05-09T10:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SNMP SET</title>
      <link>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853061#M11389</link>
      <description>&lt;P&gt;Hi Seb,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the prompt response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I have no control on the SNMP Server so I am unable to enforce&amp;nbsp;SNMP policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As per security requirements I wanted to secure the network where I must only permit SNMP Get and Traps but deny SNMP Set through the Firewall (directed to and from equipment behind the firewall) as well as directed to the Firewall.&amp;nbsp;I am trying to explore few options (either block on Firewall or introduce SNMP Proxy) to protect network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;RT&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 10:50:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853061#M11389</guid>
      <dc:creator>rthakker</dc:creator>
      <dc:date>2019-05-09T10:50:37Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SNMP SET</title>
      <link>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853113#M11390</link>
      <description>&lt;P&gt;Certainly the ASA is not capable of inspecting and filtering at the level you require.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have never implemented a SNMP proxy and was under the impression they were used to make a SNMP agents on a private network accessible from a single 'master' SNMP host/agent. If that master host can also provide filtering then that is the option to go for.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 11:48:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853113#M11390</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-05-09T11:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking SNMP SET</title>
      <link>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853177#M11391</link>
      <description>&lt;P&gt;Hi Seb&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you once again for prompt response. I wasn't confident if such solution exist on Cisco ASA hence wanted to verify.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;RT&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 13:07:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-snmp-set/m-p/3853177#M11391</guid>
      <dc:creator>rthakker</dc:creator>
      <dc:date>2019-05-09T13:07:15Z</dc:date>
    </item>
  </channel>
</rss>

