On 23 June 2011 20:13, George <ai...@yahoo.com> wrote: > [root@xxx /usr/local/etc/rc.d]# vi /etc/snmptrapd.conf > disableAuthorization yes > authCommunity net public forward default udp:10.1.1.227:162 public
I presume this last entry should be split over two lines? > [root@xxx /usr/local/etc/rc.d]# cat /etc/snmpd.conf > rocommunity public > rocommunity public localhost > trapsink localhost public 162 > trap2sink localhost public 162 > trap2sink 10.1.1.227 public 162 Do you really want two copies of each trap sent to the snmptrapd running on the local machine, plus another copy sent directly to the remote server? (As well as the additional copy that's forwarded to the remote server by snmptrapd) > Any ideas as to what is setup incorrectly? Have you checked the firewall configuration on the destination host? Is it accepting connections to port 162? Try running the local snmptrapd with the flags "-f -Le -d" That will let you see packet dumps of the traffic coming in and out. Do you see the traps being received and forwarded? Dave ------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense.. http://p.sf.net/sfu/splunk-d2d-c1 _______________________________________________ Net-snmp-users mailing list Net-snmp-users@lists.sourceforge.net Please see the following page to unsubscribe or change other options: https://lists.sourceforge.net/lists/listinfo/net-snmp-users