> From: Angie Cao [mailto:[EMAIL PROTECTED]
> Sent: Monday, November 05, 2007 11:15 AM
> Ok... I turned on the verbose output for snmptrapd by adding "-D
> ip_interface" switch. In the debug trace, here are the failure I
> found:
>
> -------------
> trace: _sess_process_packet(): snmp_api.c, 4919:
> sess_process_packet: pre-parse fail
This appears to be the rejection of the trap because the source address
is not authorized.
> trace: _sess_read(): snmp_api.c, 5213:
> sess_read: not reading 6 (fdset 0xbff5af10 set 0)
Not reading = no packet on this fd.
> trace: _sess_read(): snmp_api.c, 5213:
> sess_read: not reading 4 (fdset 0xbff5af10 set 0)
> trace: snmp_sess_select_info(): snmp_api.c, 5632:
> sess_select: for all sessions: 8 6 4
> -----------------
>
> Obviously it is not able to process the packets. But I am not sure how
> to fix this problem...
> Appreciate if anyone understand this..
Please calm down, slow down, and read the documentation on access
control. This will be a lot less painful if you do.
HTH,
Mike
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Net-snmp-users mailing list
[email protected]
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users