On Tue, 2011-10-04 at 12:03 +0530, Vivek Nagaraj wrote:
> I have added my agent address to the snmpd.conf file. Or else I would
> have not received the trap at port no 162.

Read my lips. snmptrap *DOES NOT OPEN* snmpd.conf! You can write
anything you like in that file and it won't affect the operation of
snmptrap.

I posit that if you perform the following command:

snmptrap -v 1 -m ALL -c public \
135.36.115.62:162 .1.3.6.1.6.3169.254.1.1 127.128.129.130 6 1 20071105

you won't receive anything on the target machine either.

Also, please try these commands in a console and not from within your
program as they normally logs to standard output/error as they are
intended to be interactive. There are flags to redirect the logs to
other places. These are also described in the manual.


------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Net-snmp-coders mailing list
Net-snmp-coders@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders

Reply via email to