We are hitting the snmp limit on a few cisco devices. Show Snmp shows a large, and increasing, volume of Failed Community requests. Before I go and find/limit the valid requests, I want to lock down these failed community requests.

I was unable to obtain anything useful from "debug snmp (headers, packets, requests, sessions)". I am assuming what I see in "debug snmp packets" are only the packets that passed the ACL and security filters.


Any suggestions how we can trap/trace these?"



%SNMP-3-INPUT_QFULL_ERR: Packet dropped due to input queue full

#show snmp
    21662 Unknown community name

We have an access-list applied to snmp..

snmp-server engineID local 80000009030000D0032BAC00
snmp-server community {community} RO 69
snmp-server community {community} RW 70
snmp-server ifindex persist
snmp-server trap-source Loopback0
access-list 69 permit {ip address}
access-list 69 permit {ip address}
access-list 69 permit {ip address}
access-list 69 deny   any log



--

  Ryan Pavely
   Director Research And Development
   Net Access Corporation
   http://www.nac.net/

_______________________________________________
cisco-nsp mailing list  cisco-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-nsp
archive at http://puck.nether.net/pipermail/cisco-nsp/

Reply via email to