> From: Angie Cao [mailto:[EMAIL PROTECTED] 
> Sent: Monday, November 05, 2007 11:15 AM

> Ok... I turned on the verbose output for snmptrapd by adding "-D
> ip_interface" switch. In the debug trace, here are the failure I
> found:
> 
> -------------
> trace: _sess_process_packet(): snmp_api.c, 4919:
> sess_process_packet: pre-parse fail

        This appears to be the rejection of the trap because the source address 
is not authorized.

> trace: _sess_read(): snmp_api.c, 5213:
> sess_read: not reading 6 (fdset 0xbff5af10 set 0)

        Not reading = no packet on this fd.

> trace: _sess_read(): snmp_api.c, 5213:
> sess_read: not reading 4 (fdset 0xbff5af10 set 0)
> trace: snmp_sess_select_info(): snmp_api.c, 5632:
> sess_select: for all sessions: 8 6 4
> -----------------
> 
> Obviously it is not able to process the packets. But I am not sure how
> to fix this problem...
> Appreciate if anyone understand this..

        Please calm down, slow down, and read the documentation on access 
control.  This will be a lot less painful if you do.


        HTH,

Mike

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Net-snmp-users mailing list
[email protected]
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to