<Table> <Tr> <Td> </Td> <Td> This section needs additional citations for verification . Please help improve this article by adding citations to reliable sources . Unsourced material may be challenged and removed . (December 2015) (Learn how and when to remove this template message) </Td> </Tr> </Table> <Tr> <Td> </Td> <Td> This section needs additional citations for verification . Please help improve this article by adding citations to reliable sources . Unsourced material may be challenged and removed . (December 2015) (Learn how and when to remove this template message) </Td> </Tr> <P> Because SNMP is designed to allow administrators to monitor and configure network devices remotely it can also be used to penetrate a local area network (LAN). If SNMP is not used in a network it should be turned off, because aside from creating a vulnerability it will consume available network bandwidth and needlessly use CPU cycles . A significant number of software tools can scan the entire network over SNMP, therefore mistakes in the configuration of the read - write mode can make a network susceptible to attacks . </P> <P> In 2001 Cisco released information that even in read mode the SNMP implementation of Cisco IOS 11.0 and 12.0 (the operating system used by Switches and Routers) is vulnerable to certain denial of service attacks . These security issues can be fixed through an IOS upgrade . When configuring SNMP read - only mode close attention should be paid to the configuration of the access control and from which IP addresses SNMP messages are accepted . If the SNMP servers are identified by their IP, SNMP is only allowed to respond to these IPs and SNMP messages from other IP addresses would be denied . However, IP address spoofing remains a security concern . </P>

Which of the following protocols / port s are used for snmp. (simple network management protocol)