isms-2----Page:5
1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16 

SNMPv3/USM
Each operation is independent from each other
Each message provides for identity verification, message integrity check (MIC), encryption, and timeliness and limited replay detection
Identities are in a name-space that is independent of all other existing security infrastructures
Key for authentication verification also used for MIC
Authentication and encryption keys are long lived, since they are typically changed together and based on identity pass-phrase
PPT Version