Sasha,
See inline.
On Feb 7, 2013, at 7:38 AM, Alexander Vainshtein wrote:

Dear all,
My colleagues and I are interested in interpretation of the following text from 
RFC 4750 - OSPF Version 2 Management Information 
Base<http://tools.ietf.org/html/rfc4750>:

     ospfIfConfigError NOTIFICATION-TYPE
          OBJECTS { ospfRouterId, -- The originator of the trap
             ospfIfIpAddress,
             ospfAddressLessIf,
             ospfPacketSrc,  -- The source IP address
             ospfConfigErrorType, -- Type of error
             ospfPacketType
             }
          STATUS       current
          DESCRIPTION
             "An ospfIfConfigError trap signifies that a
             packet has been received on a non-virtual
             interface from a router whose configuration
             parameters conflict with this router's
             configuration parameters.  Note that the event
             optionMismatch should cause a trap only if it
             prevents an adjacency from forming."
          ::= { ospfTraps 4 }

The highlighted text could be interpreted that the trap is sent every time an 
offending packet has been received.
This could easily result in an incessant flow of traps (e.g., if you receive 
offending Hello packets from a misconfigured router on the LAN segment).

Hence two  questions:
1.       Is the interpretation mentioned above valid?

Yes. If you don't have rate limiting for your traps, your SNMP implementation 
is broken. Furthermore, an implementation should be allow traps to be 
selectively enabled and disabled.
For example, here is the command from my implementation:

[local]se-acee(config-ctx)#router ospf 1
[local]se-acee(config-ospf)#snmp traps ?
  all                 Enable sending all supported OSPF traps
  ifauthfailure       Enable sending ospfIfAuthFailure traps
  ifconfigerror       Enable sending ospfIfConfigError traps
  ifrxbadpacket       Enable sending ospfIfRxBadPacket traps
  ifstatechange       Enable sending ospfIfStateChange traps
  maxagelsa           Enable sending ospfMaxAgeLsa traps
  nbrstatechange      Enable sending ospfNbrStateChange traps
  originatelsa        Enable sending ospfOriginateLsa traps
  txretransmit        Enable sending ospftxretransmit traps
  virtifauthfailure   Enable sending ospfVirtIfAuthFailure traps
  virtifconfigerror   Enable sending ospfVirtIfConfigError traps
  virtifrxbadpacket   Enable sending ospfVirtIfRxBadPacket traps
  virtifstatechange   Enable sending ospfIfVirtIfStateChange traps
  virtiftxretransmit  Enable sending ospfVirtIfTxRetransmit traps
  virtnbrstatechange  Enable sending ospfVirtNbrStateChange traps

Hope this helps,
Acee
P.S. If you really want to see some traps, enable ospfOriginateLas and 
ospfMaxAgeLsa on a core router.



2.       If not, what is the valid interpretation and associated expected 
behavior?

Regards, and lots of thanks in advance,
     Sasha


This e-mail message is intended for the recipient only and contains information 
which is CONFIDENTIAL and which may be proprietary to ECI Telecom. If you have 
received this transmission in error, please inform us by e-mail, phone or fax, 
and then delete the original and all copies thereof.

_______________________________________________
OSPF mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ospf

Reply via email to