All I did was added this line in 'snmpd.conf': "defTarget snmptrap udp :50162" and restarted the snmpd service using: 'service snmpd restart'.
I used to get the first trap at the UDP port 50162. And I used to receive trap on my client Windows machine where the trap receiver was running at the default port 162 rather than the mentioned port. Any setting/tweaks (you remember) to be done on the client/server?! The command used to send dummy trap was 'snmptrap'. The server from which snmptrap was generated was RHEL 6.1 x64. Any idea why am I still not receiving traps at default port?! Thanks a ton for the response. ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2dcopy2 _______________________________________________ Net-snmp-coders mailing list Net-snmp-coders@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/net-snmp-coders