Dennis,

The way to make Netcool work is usually: tuning the Netcool rules files. If you 
cannot
do this, you're IMO massively busted in a Netcool environment.

The only easy option could be: have your router send traps from the IETF-BGP
(or vendor-BGP) MIB state-change traps to Netcool directly, bypassing the Syslog
server.

I'd say: if sending traps directly from the router does not work for you: 
insist on
tuning of the rules files, and indeed add a custom variable. I do not know why 
you
cannot adapt the rules, but if this is because the BGP rules are used by other
parties as well that are not to be "disturbed", you could alternatively consider
making a fully cusomised trap, or even: some equipment provides means to send
the SYSLOG message encapsulated in trap directly from the router (which would
then need "syslog-in-snmp" rules separate from the native BGP rules).

From a totally different perspective: on the Netcool server, you'll find a tool
called "nco_postmsg". This allows to inject events directly into the Netcool 
database.
Or else, on the GAT site, you'll find the "perl-omnibus" package setting
libraries to connect and act upon the Omnibus database from within a perl
script. This would mean than you'll need a script that can read the syslog 
files,
extract BGP messages, does the event normalisation, and put events directly
into Omnibus.
Not necessarily recommended by IBM, and you may need to check license
policies of IBM, but for low event loads it may work,

Sufficient options, I guess, to not poke around anti-spoofing filters and 
security
policies (that would consider spoofing as hostile to start with).

This post should have been sent to the NetcoolUsers list BTW.

________________________________
From: Dennis Perisa [mailto:dennis.per...@gmail.com]
Sent: 06 September 2010 12:04
To: net-snmp-users@lists.sourceforge.net
Subject: SNMP v2 trap - how to spoof the source address?

Hi folks,

[I have had difficulty searching the mail archives so apologies if this has 
been answered previously]

Consider the following:

Routers send their syslog messages to a FreeBSD syslog server which runs a 
parsing script to detect BGP up/down events.  On detection of such events, the 
script generates a BGP trap using Net-SNMP tools towards a Netcool probe.

[Router]----syslog---->[syslog server]----trap---->[Netcool probe]

Now the problem is that the trap contains the source address of the syslog 
server.  However, the Netcool system needs to know the source of the original 
message (i.e. the router) for assurance purposes.

We considered an SNMP v1 trap and setting the agent address to that of the 
router, but the BGP v1 MIB does not contain the required bgpPeerRemoteAddr 
varbind.  So we must use v2 traps.

We are also prevented from making changes to the Netcool rules file so adding 
custom varbinds is not an option.

Is there a way to spoof the source address of an SNMP v2 trap with Net-SNMP?

Regards
Dennis


**** DISCLAIMER ****
http://www.belgacom.be/maildisclaimer
------------------------------------------------------------------------------
Start uncovering the many advantages of virtual appliances
and start using them to simplify application deployment and
accelerate your shift to cloud computing
http://p.sf.net/sfu/novell-sfdev2dev
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users@lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to