The purpose of this article is to provide steps that can be followed when troubleshooting SNMPv3 issues in SSP.
The easiest way to test SNMPv3 config in SSP is to utilize snmpget utility on any Linux based operating system.
testuser@Win10:~$ snmpget -v3 -l authPriv -u bob -a SHA1 -A "<password>" -x AES -X "<password>" IP_ADDR_OF_SSP iso.3.6.1.2.1.1.1.0iso.3.6.1.2.1.1.1.0 = STRING: "Blue Coat Virtual Appliance, ISG release 2.4.6.1 (282037)"
Above command sends snmpget and authenticates using "testuser" as username and "<password>" as password. SHA1 is used as authentication protocol and AES as encryption protocol
At the time of writing, SSP does not support SHA2 and AES stronger than 128. If unsupported protocol is used the following output can be observed:
testuser@Win10:~$ snmpget -v3 -l authPriv -u testuser -a SHA1 -A "<password>" -x AES256 -X "<password>" IP_ADDR_OF_SSP iso.3.6.1.2.1.1.1.0snmpget: Decryption error
testuser@Win10:~$ snmpget -v3 -l authPriv -u testuser -a SHA2 -A "<password>" -x AES -X "<password>" IP_ADDR_OF_SSP iso.3.6.1.2.1.1.1.0snmpget: Authentication failure (incorrect password, community or key)
Wireshark application has a capability to decrypt SNMPv3 traffic. To do that we need to navigate to Edit -> Preferences -> Protocols -> SNMP and click on Edit next to User Table:
The following window will appear:
To create SNMP user we need to click on highlighted '+' symbol and provide relevant information. If provided data is correct, SNMPv3 traffic will be decrypted:
While performing above tests, the following config was applied on SSP:
ISG# show running-config snmpsnmp agent enabled agent version v3 agent engine-id from-mac-address ##:##:##:##:##:## agent max-message-size 50000 system contact "" system name "" system location "" vacm group secure member testuser sec-model [ usm ] ! access usm auth-priv read-view bc write-view bc notify-view bc ! ! vacm view bc subtree 1.3 included ! !snmp agent enabled agent version v3 agent engine-id from-mac-address ##:##:##:##:##:## agent max-message-size 50000 system contact "" system name "" system location "" vacm group secure member testuser sec-model [ usm ] ! access usm auth-priv read-view bc write-view bc notify-view bc ! ! vacm view bc subtree 1.3 included ! ! usm local user testuser auth sha password <password> priv aes password <password> ! usm local user test auth sha password <password> priv aes password <password> !!