On 23 June 2011 20:13, George <ai...@yahoo.com> wrote:
> [root@xxx /usr/local/etc/rc.d]# vi /etc/snmptrapd.conf
> disableAuthorization yes
> authCommunity net public forward default udp:10.1.1.227:162 public

I presume this last entry should be split over two lines?



> [root@xxx /usr/local/etc/rc.d]# cat /etc/snmpd.conf
> rocommunity public
> rocommunity public localhost
> trapsink  localhost public 162
> trap2sink  localhost public 162
> trap2sink  10.1.1.227 public 162

Do you really want two copies of each trap sent
to the snmptrapd running on the local machine,
plus another copy sent directly to the remote server?
  (As well as the additional copy that's forwarded to
 the remote server by snmptrapd)



> Any ideas as to what is setup incorrectly?

Have you checked the firewall configuration on the destination host?
Is it accepting connections to port 162?

Try running the local snmptrapd with the flags   "-f -Le -d"
That will let you see packet dumps of the traffic coming in
and out.   Do you see the traps being received and forwarded?

Dave

------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a 
definitive record of customers, application performance, security 
threats, fraudulent activity and more. Splunk takes this data and makes 
sense of it. Business sense. IT sense. Common sense.. 
http://p.sf.net/sfu/splunk-d2d-c1
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users@lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to