03-13-2014
Is the other server listening for incoming SNMP traffic all the time (real-time logging), or were you thinking of sending them in bulk at a fixed frequency?
RObin
10 More Discussions You Might Find Interesting
1. IP Networking
Hi,
I am writing a program in java to simulate a trap being sent from a device. I came to know that rawsocket cant be opened in java. Is there a provision to do in java?
My requirement is:
I am writing the java program in the machine 1.1.1.1
I want to simulate the trap being sent from a... (0 Replies)
Discussion started by: kkrish7
0 Replies
2. Solaris
Greetings To All!
I am trying to accomplish the following:
Using a public SNMP string, create a trap which will trap ALOM console messages on a Solaris Sunfire T-1000 ALOM console. The platform is Solaris 10. These newly created traps need to be configured in such a way that they will send... (0 Replies)
Discussion started by: RobSand
0 Replies
3. IP Networking
Hi,
do you know the syntax to send a snmp trap to a server ?
Many htanks. (2 Replies)
Discussion started by: big123456
2 Replies
4. Infrastructure Monitoring
Hi all,
I'm after a linux utility that can relay all incoming traffic on a certain port to another server. Can anyone recommend a good program?
I've taken a look at snmptrapd, but it's not obvious how this can be configured for my requirements.
Many thanks. (1 Reply)
Discussion started by: badoshi
1 Replies
5. Infrastructure Monitoring
I want to receive snmp traps only from specifis ip's or host.
I tried to get help from VACM , but it's complicated. Can any one please suggest me simple way to do it (0 Replies)
Discussion started by: nrbhole
0 Replies
6. Infrastructure Monitoring
Hi all,
I am currently doing a project regarding traps and would like to help me in this issue. I am knew to the trap world :confused::) and thought that by posting this thread helps me move forward in this project.
First of all I will begin exactly from the very beginning, i.e. the net-snmp... (0 Replies)
Discussion started by: Wizard_1979
0 Replies
7. Solaris
Hello
I am trying to monitor when a user account gets added to my solaris server.
Does anyone know how I can set up an snmptrap for changes in the /etc/passwd file ? (4 Replies)
Discussion started by: prince2010
4 Replies
8. UNIX for Advanced & Expert Users
I am using the following command to successfully send snmp traps on Linux but I cant get it to work on Solaris , can someone give me the syntax plz?
Linux:
/usr/sbin/snmptrap -v 2c -c org 10.100.10.211 \'\' 1.3.6.1.4.1.791.2.9.2 1.3.6.1.4.1.791.2.9.2 s \"$1 \"
Solaris:... (5 Replies)
Discussion started by: aliyesami
5 Replies
9. Shell Programming and Scripting
I have been searching and reading about syslog. I would like to know how to Transfer the logs being thrown into /var/log/messages into another file example /var/log/volumelog.
tail -f /var/log/messages
dblogger: msg_to_dbrow: no logtype using missing
dblogger: msg_to_dbrow_str: val ==... (2 Replies)
Discussion started by: kenshinhimura
2 Replies
10. Red Hat
hi
I get below error from console and message log in red hat linux
snmp Got trap from peer on fd 13 .
Any idea why there is error and how to fix it ??
Please use CODE tags as required by forum rules! (0 Replies)
Discussion started by: chuikingman
0 Replies
LEARN ABOUT DEBIAN
ipacct
IPFW(4) BSD Kernel Interfaces Manual IPFW(4)
NAME
ipfw -- IP packet filter and traffic accounting
SYNOPSIS
To compile ipfw into the kernel, place the following option in the kernel configuration file:
options IPFIREWALL
Other kernel options related to ipfw which may also be useful are:
options IPFIREWALL_DEFAULT_TO_ACCEPT
options IPFIREWALL_FORWARD
options IPFIREWALL_VERBOSE
options IPFIREWALL_VERBOSE_LIMIT=100
To load ipfw as a module at boot time, add the following line into the loader.conf(5) file:
ipfw_load="YES"
DESCRIPTION
The ipfw system facility allows filtering, redirecting, and other operations on IP packets travelling through network interfaces.
The default behavior of ipfw is to block all incoming and outgoing traffic. This behavior can be modified, to allow all traffic through the
ipfw firewall by default, by enabling the IPFIREWALL_DEFAULT_TO_ACCEPT kernel option. This option may be useful when configuring ipfw for
the first time. If the default ipfw behavior is to allow everything, it is easier to cope with firewall-tuning mistakes which may acciden-
tally block all traffic.
To enable logging of packets passing through ipfw, enable the IPFIREWALL_VERBOSE kernel option. The IPFIREWALL_VERBOSE_LIMIT option will
prevent syslogd(8) from flooding system logs or causing local Denial of Service. This option may be set to the number of packets which will
be logged on a per-entry basis before the entry is rate-limited.
Policy routing and transparent forwarding features of ipfw can be enabled by IPFIREWALL_FORWARD kernel option.
The user interface for ipfw is implemented by the ipfw(8) utility, so please refer to the ipfw(8) manpage for a complete description of the
ipfw capabilities and how to use it.
SEE ALSO
setsockopt(2), divert(4), ip(4), ipfw(8), sysctl(8), syslogd(8), pfil(9)
BSD
September 1, 2006 BSD