CHAPTER 3. Software Overview3-2 © SAMSUNG Electronics Co., Ltd.User-Based Security Model (USM)The User-Based Security Model (USM) for SNMP v3 [RFC2574] is supported.To protect data integrity, USM uses MD5 and the Secure Hash Algorithm askeyed hashing algorithms for digest computation. This directly protectsagainst data modification attacks, indirectly provides data originauthentication, and defends against masquerade attacks.USM uses loosely synchronized, monotonically-increasing time indicators todefend against certain message stream modification attacks. Automatic clocksynchronization mechanisms based on the protocol are specified withoutdependence on third-party time sources and concomitant security considerations.USM uses the Data Encryption Standard (DES) in the Cipher Block Chaining(CBC) mode to protect against disclosure.View-based Access Control Model (VACM)The View-based Access Control Model for SNMP [RFC2575], which controlsaccess to management information, is supported.For security reasons, it is often beneficial to restrict the access rights of somegroups to only a subset of the management data in the management domain.To provide this capability, access to a context is through an MIB view, whichdetails a specific set of managed object types within that context.TRAPSAll applicable standard and enterprise traps are supported. The trap supportalso follows the AgentX architecture. The sub-agents will generate trapswhenever necessary and forward it to the master-agent using AgentX protocol.The master-agent will form a TRAP Packet Data Unit (PDU) and forward it tothe pre-configured Network Management Station/Trap receiving station.Ubigate iBG1000 product supports more than one trap-host (up to 5) to sendtraps to.