Active Management Services White Paper 2.0 for Ricoh Customers Prepared by Professional Services department of Ricoh International B.V. Monday, 14 January 2013
TABLE OF CONTENT 1. Introduction... 4 2. Document Information... 5 2.1 Document Revision Information... 5 2.2 Document Quality Control... 5 2.3 Contact Details... 5 3. General information... 6 3.1 Minimum Requirements... 6 3.2 SNMP Principles... 6 3.3 Management Information Base (MIB)... 7 4. Network traffic... 7 4.1 Incoming Traffic... 7 4.2 Outgoing Traffic... 7 5. Active Management SNMp Agent... 8 5.1 Discovery... 8 5.2 Polling... 8 5.3 Network Traffic Bandwidth... 8 6. protocols used... 9 6.1 General... 9 6.2 Security Protocol (SSL) explained... 9 Sources... 11 Appendix I Remote Protocols and Open Ports... 11 2013 Ricoh International B.V. Company Proprietary & Confidential - 3 -
1. INTRODUCTION Active Management Services (AMS) is a hosted MPS (Manage Print Services) solution supporting Sales and CSR teams for sales and environmental tracking. AMS is a Cloud based solution that includes: - A web Portal: to report data on the Portal The web Portal (main) server is hosted in Denmark - A client Agent: in order to use AMS for a Customer an SMNP agent (to detect network devices) needs to be installed at the customer s environment. This SNMP agent collects the data and reports it to the Web server. The AMS agent communicates with printers/mfd s on the network. The MIB data (Managed Information Base) will be analyzed, relevant data will be retrieved and processed in the web application. This document is intended for anyone who would get a clear understanding in the Technical part of AMS; specifically for IT Engineers with a good understanding of IT Technologies and protocols. Picture 1.0: Active Management Services - 4-2013 Ricoh International B.V. Company Proprietary & Confidential
2. DOCUMENT INFORMATION 2.1 Document Revision Information Author / Reviser Date Version No. Description Jorni Kastawi 14.01.2013 2.0 Updated Version 2.2 Document Quality Control Checked By Date Version Checked 2.0 Description 2.3 Contact Details Consultant Jorni Kastawi Jorni.Kastawi@ricoh-int.eu 2013 Ricoh International B.V. Company Proprietary & Confidential - 5 -
3. GENERAL INFORMATION 3.1 Minimum Requirements In order to run AMS customer need to have the following Hardware and Software running on a central server: 1. Windows Operation Systems (Windows XP, Vista, 2003 and 2008) 2. Latest updates of the windows server: to ensure that all windows components are installed 3. Latest Microsoft.Net 3.5 and.net.4 Framework 4. Local admin rights when installing SNMP Agent on the Windows Server 5. Port 80 (Standard SNMP port; already open for email and internet in most customers environment) or 6. Port 443 (when SSL encryption is required to be used) 7. Proxy server information ready (if used; If proxy is used it must be compliant with HTTP 1.1 protocol) 3.2 SNMP Principles The SNMP management protocol 1 is an asynchronous command/response polling protocol: all the management traffic is initiated by the SNMP-based network management station (except for trap messages), which addresses the managed entities in its management domain. Only the addressed managed entity answers the polling of the management station. The managed entities include a function called an SNMP agent, which is responsible for interpretation and handling of the management station requests to the managed entity, and the generation of properly-formatted responses to the management station. The SNMP protocol includes four types of operations: getrequest Command for retrieving specific management information from the managed entity. The managed entity responds with a getresponse message. getnextrequest setrequest trap Command for retrieving sequentially specific management information from the managed entity. The managed entity responds with a getresponse message. Command for manipulating specific management information within the managed entity. The managed entity responds with a setresponse message. Management message carrying unsolicited information on extraordinary events (e.g., alarms) reported by the managed entity. 1 For a thorough understanding on SNMP protocol, please consult the chapter Source on subject SNMP. - 6-2013 Ricoh International B.V. Company Proprietary & Confidential
Picture 2.0: Principle of SNMP communication In order to retrieve data on the Web server Portal, an SNMP agent (data collection tool) needs to be installed on customer s network. The agent reports the data to the Web server Portal. 3.3 Management Information Base (MIB) The management information base (MIB) includes a collection of managed objects. A managed object is defined as a parameter that can be managed, such as a performance statistics value. The MIB includes the definitions of relevant managed objects. Various MIBs can be defined for various management purposes, types of equipment, etc. 4. NETWORK TRAFFIC 4.1 Incoming Traffic The SNMP agent will download the latest configuration when changed and it will check the MIB library to get the latest MIB information of the detected devices; Check for new configuration 2 : Use latest MIB library 2 : Software update 2 : Checks for new configuration every 10 minutes Online check is following the frequency of the polling Checks for new version every 2 hours 2 The SNMP agent will contact the web portal: the web portal will not produce any incoming traffic. The frequency of exchanging information can be adjusted (if Low, Medium or High Network Bandwidth applies). 4.2 Outgoing Traffic The SNMP agent sends XML reports after a configured frequency. All from every 15 minutes to daily. Data is send as HTTP or encrypted HTTPS to service.3manager.net. This traffic point will route data to either the hosted server or local hosted server. 2013 Ricoh International B.V. Company Proprietary & Confidential - 7 -
5. ACTIVE MANAGEMENT SNMP AGENT If you have printer devices attached to the network and willing to use AMS, install the SMNP agent on your network (on a Central Printer Server); the agent uses a SNMP (simple network management protocol) to communicate with printers / MFD s on the network. IMPORTANT: SNMP must be enabled on the printer MIB, or else the SNMP agent will not get any information. This is normally enabled as standard on every printer. The MIB (Managed Information Base) will be analyzed; all relevant data will be retrieved and processed in the AMS web Portal. The SNMP agent has 2 running services: 1. Discovery 2. Polling 5.1 Discovery If given an IP-address during the setup and installation of the SNMP agent, the SNMP agent will search for devices within the IP-range example: 192.168.1.1-192.168.1.255. All devices discovered or found in that range will be reported to the customers Portal. This can be scheduled in any frequency. Our advice is to schedule it once a day or twice per week. During discovery the agent sends packets to each IP in the specified range. It sends about 500-800 packets a second, with packet size 85-100 bytes. The total bandwidth used is 50-200KB/s. The total data sent depends on the IP address count in the discovered IP range(s). 5.2 Polling The agent gets status every 15 minutes on devices found during discovery phase. MIB data, such as meters and toner status will be updated in this frequency. Devices are scanned using SNMP protocol. The data is sent as UDP packets. During polling agent queries configuration server via HTTP and sends SNMP queries for each discovered printer. There is one HTTP request for the configuration server for each printer 1-10KB in size. SNMP query count depends on the printer, but it ranges in 15-50 queries with 1-5KB in size, total bandwidth used is 15-250KB for each printer. 5.3 Network Traffic Bandwidth You can choose between the following scanning outputs: What Why Scanned Area Low If Scanning 256 IP-addresses simultaneously with 15 milliseconds delay If you have sites with low bandwidth which is a part of the network search Medium If Scanning 512 IP-addresses simultaneously with 10 If you have sites with medium bandwidth which is a part of the - 8-2013 Ricoh International B.V. Company Proprietary & Confidential
High milliseconds delay If Scanning 1024 IP-addresses simultaneously with 5 milliseconds delay network search Recommended in normal 10/100/1000 networks 6. PROTOCOLS USED 6.1 General When using AMS the following ports can be used: What Port Description For SNMP communication 161 and 162 Port 162 in common environments When sending data without encryption 80 Standard SNMP Port; already open for email and internet in most customers When sending data with 443 Optional; SSL encryption The SNMP agent supports the use of Proxy server. 6.2 Security Protocol (SSL) explained The Secure Socket Layer, SSL for short, is a protocol by which many services that communicate over the Internet can do so in a secure way. Most Internet services support the use of SSL as a mechanism for securing communications. To illustrate how SSL works, let us use another analogy. Customer wants to communicate with a company to send important information back and forth. Customer wants to be 100% sure that s/he is communicating with this particular company and that no one can eavesdrop on or intercept the communications. How can customer do this? Customer sends a courier to the company s address. The company has envelopes that, when closed, can only be opened by the company. The company and the courier go together to a trusted third party a notary which makes the company provides documentation to prove its identity. The notary certifies the company s secure envelopes and the courier takes these back to the customer. The customer gets the envelopes and, if it trusts the notary s reputation, can be sure that they are actually from the company indicated. The customer also has secure envelopes that once sealed, only the customer can open. It puts some of these in one of the company s secure envelopes and sends them back to the company. The company gets the sealed secure envelope. It opens the envelope (as only it can). It now has the customer s secure envelopes. The company has another kind of envelope that can be opened and sealed only by using a special combination. The company puts this special envelope with the combination lock, together with the combination, into one of the customer s secure envelopes. The company seals the envelope. The company has another type of secure envelope that anyone can open, but which only the company can seal. If you open one of these sealed envelopes, you know for sure that it was sent by the company. The company puts the whole package inside this and sends it to the customer. 2013 Ricoh International B.V. Company Proprietary & Confidential - 9 -
When the customer gets the secure envelope, it opens it and thus knows that it came from the company. It then opens the next secure envelope inside that can only be opened by the customer. Inside it gets out the combination-envelope and the combination itself. The customer the puts his data in the combination envelope, seals it and sends it to the company. The company receives it, opens it, and puts the response in the same secure envelope and sends it back. The procedure is repeated as often as necessary for required communications. SSL relies on the concept of public key cryptography to accomplish these tasks. In normal encryption, the two parties communicating share a password and that password is used to both encrypt and decrypt messages. While this is fast and efficient, how do you communicate these passwords to people you have not yet met in a way that is itself secure? In public key cryptography, each person has two keys a public key and a private key. Anything encrypted with the user s public key can only be decrypted with the private key and vice versa. Each person then tells the world what his public key is and keeps his private key safe and secure, and private. If John sends Mary a message encrypted with Mary s public key, then only Mary can open it, as only she has her private key. This is like an envelope that anyone can seal but which only Mary can open. If John sends Mary a message encrypted with John s private key, then anyone can open it, as everyone has access to John s public key. However, successfully opening the message proves that it was sent by John and no one else, as only John has access to his private key. This is like an envelope that only John can seal, but which anyone can open and thus prove that John sealed it. - 10-2013 Ricoh International B.V. Company Proprietary & Confidential
SOURCES SNMP: UDP: http://oreilly.com/catalog/esnmp/chapter/ch02.html http://oreilly.com/catalog/esnmp/chapter/ch02.html APPENDIX I REMOTE PROTOCOLS AND OPEN PORTS Port Usage and Communication Methodologies : No Occasion Communication Direction Port.No. Protocol Type 1 SNMP Agent is capturing Devices => Web Server 161/162 SNMP *UDP MIB information of device. 2 SNMP Agent is capturing Devices => Web Server 80 HTTP *UDP MIB information of device. 3 SNMP Agent is sending Devices => Web Server 443 HTTPS TCP notification to communication Server via HTTPS. Device is sending notification such as Alerts. Device => Web Server *UDP: User Datagram Protocol 2013 Ricoh International B.V. Company Proprietary & Confidential - 11 -
2013 Ricoh International B.V. Company Proprietary & Confidential