I'm attempting to get a TP-Link 3210 and 5428 working with PacketFence.  
I have created my switch object and have successfully configured a 
switch in PacketFence.

Nov 26 19:37:37 pfcmd.pl(19617) DEBUG: creating new 
pf::Switch::TPLink::TL_SG3210 object (pf::SwitchFactory::instantiate)


However, parseTrap() doesn't seem to be getting called.  (nor do any of 
the new class methods)

I also don't see any output in packetfence.log nor snmptrapd.log.

I have confirmed that the pf box is receiving the traps.

tcpdump -i enp5s0f0 -nnev -s0 udp port 162

tcpdump: listening on enp5s0f0, link-type EN10MB (Ethernet), capture size 65535 
byte

     192.168.14.249.161 > 192.168.14.60.162:  { SNMPv2c C=admin { V2Trap(168) 
R=5053  .1.3.6.1.2.1.1.3.0=7745881 
.1.3.6.1.6.3.1.1.4.1.0=.1.3.6.1.4.1.11863.1.1.5.2.3.4.1 
.1.3.6.1.4.1.11863.1.1.5.2.3.2.2.1.3.184.39.235.49.69.89.102=8 
.1.3.6.1.4.1.11863="The port 8 learns a dynamic address b8:27:eb:31:45:59, vid 
102." } }

19:43:47.171926 f4:f2:6d:61:7d:0c > 00:25:90:c7:3c:e4, ethertype IPv4 (0x0800), 
length 190: (tos 0x0, ttl 64, id 26741, offset 0, flags [none], proto UDP (17), 
length 176)

     192.168.14.249.161 > 192.168.14.60.162:  { SNMPv2c C=admin { V2Trap(132) 
R=5054  .1.3.6.1.2.1.1.3.0=7760595 .1.3.6.1.6.3.1.1.4.1.0=.1.3.6.1.6.3.1.1.5.3 
.1.3.6.1.2.1.2.2.1.1.3=3 .1.3.6.1.2.1.2.2.1.7.3=1 .1.3.6.1.2.1.2.2.1.8.3=2 
.1.3.6.1.4.1.11863="Port3 linkDown" } }

19:43:51.578752 f4:f2:6d:61:7d:0c > 00:25:90:c7:3c:e4, ethertype IPv4 (0x0800), 
length 188: (tos 0x0, ttl 64, id 26742, offset 0, flags [none], proto UDP (17), 
length 174)

     192.168.14.249.161 > 192.168.14.60.162:  { SNMPv2c C=admin { V2Trap(130) 
R=5055  .1.3.6.1.2.1.1.3.0=7761036 .1.3.6.1.6.3.1.1.4.1.0=.1.3.6.1.6.3.1.1.5.4 
.1.3.6.1.2.1.2.2.1.1.3=3 .1.3.6.1.2.1.2.2.1.7.3=1 .1.3.6.1.2.1.2.2.1.8.3=1 
.1.3.6.1.4.1.11863="Port3 linkUp" } }

19:44:07.932334 f4:f2:6d:61:7d:0c > 00:25:90:c7:3c:e4, ethertype IPv4 (0x0800), 
length 227: (tos 0x0, ttl 64, id 26743, offset 0, flags [none], proto UDP (17), 
length 213)

     192.168.14.249.161 > 192.168.14.60.162:  { SNMPv2c C=admin { V2Trap(169) 
R=5056  .1.3.6.1.2.1.1.3.0=7762671 
.1.3.6.1.6.3.1.1.4.1.0=.1.3.6.1.4.1.11863.1.1.5.2.3.4.1 
.1.3.6.1.4.1.11863.1.1.5.2.3.2.2.1.3.172.207.92.67.199.19.102=8 
.1.3.6.1.4.1.11863="The port 8 learns a dynamic address ac:cf:5c:43:c7:13, vid 
102." } }



Adding to the mystery, PacketFence is discovering the new macs on the 
switch as they are listed in the nodes page on the web interface.

Any push in the right direction would be appreciated.

Thanks



------------------------------------------------------------------------------
_______________________________________________
PacketFence-devel mailing list
PacketFence-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-devel

Reply via email to