|FAQ:||check our Frequently Asked Questions page for application tips and for information on known problems and workarounds.|
|Toll-free:||(866) 886-SNMP (7667)|
|Customer’s Zone:||We maintain secure access to our NETCONF, SNMP, CLI & RESTCONF Development Tools, Applications and Components and to our NETCONF, SNMP, CLI & RESTCONF SDK Libraries. This access is used for downloads of both newly purchased products and maintenance updates. Please obtain your download credentials from NuDesign’s support team. Should you run into download issues due to Norton’s AV applications please review this note.|
|NETCONF / SNMP
|Useful links related to NETCONF / YANG and SNMP / MIB technologies.|
|MIB Archive:||We have a large archive of Standard and Enterprise track MIBs.|
|Help Files On-Line:||Our products Help Files are maintained on-line. Also review the PDF Documents section of our Site Map.|
The Annual Technical Support and Subscription Service Contract provides one year of product enhancement and maintenance updates plus access to our engineering team (please review the terms here). Communications can be any combination of Phone, Fax or E-Mail. Phone support is limited to 9:00 A.M. to 5:00 P.M. Eastern Standard Time.
Please note that Extended Support Contracts and Design Consulting Services are available as well. Our goal is not just supplying technical talent but understanding of business requirements and the technologies needed; we analyze the current environment and find the best migration strategy from the current to planned environment, then design and develop the required solution.
For more details see our Pricing & License Options document.
US-CERT Vulnerability Note VU#878044 – a potential SNMPv3 authentication bypass – Sep, 2008
NuDesign announces that the SNMPv3 Authentication Bypass Vulnerability uncovered by the NetSNMP community, and discussed by the US-CERT US Computer Emergency Readiness Team as Technical Cyber Security Alert TA08-162A does not affect the NuDesign SNMPv3 stack.
US-CERT Vulnerability Note VU#107186 – Multiple vulnerabilities in SNMPv1 trap handling – Feb, 2002
US-CERT Vulnerability Note VU#854306 – Multiple vulnerabilities in SNMPv1 request handling – Feb, 2002
Please note that the CERT Coordination Center of the Software Engineering Institute at Carnegie Mellon University, Pittsburgh, Pennsylvania, U.S.A. in co-ordination with the Secure Programming Group at Oulu University in Finland have posted a security advisory regarding SNMPv1 management protocol. It deals with the manner in which SNMPv1 agents and managers handle request and trap messages. The full text can be viewed at CERT Coordination Center.
Associated with the advisory are test suites for testing susceptibility to the identified problems. These can be found at the Oulu University web site.
NuDesign has applied the test suites and found that our SNMP Agent and SNMP Trap receiving products were susceptible to this vulnerability. The required corrections have been applied and new versions of corrected NuDesign products have been released to customers with support contracts on Feb 18, 2002. Similarly corrected, free evaluations available for download from this site, have been upgraded on Feb 18, 2002.