> [root@localhost ~]# snmpwalk -v 2c -c public 192.168.1.2 1.3.6.1.2.1.2.2.1.3 > IF-MIB::ifType.10101 = INTEGER: ethernetCsmacd(6) > IF-MIB::ifType.10102 = INTEGER: ethernetCsmacd(6) > IF-MIB::ifType.10103 = INTEGER: ethernetCsmacd(6) [...] > IF-MIB::ifType.10151 = INTEGER: ethernetCsmacd(6) > IF-MIB::ifType.10152 = INTEGER: ethernetCsmacd(6)
Your trap ifIndex seems to be in the 0-48 range while the switch clearly uses 10100-10148 ifIndexes. Now why is that? All the logs you sent so far showed us a vlan re-evaluation called from a change in node's characteristics. However original ifIndex comes from the trap sent by the switch. To make sure that the configuration is correct, I would like to see the logs of a new connection to a port where the MAC is unauthorized (so a secureMacAddrViolation trap will be sent to PF with ifIndex). -- Olivier Bilodeau [email protected] :: +1.514.447.4918 *115 :: www.inverse.ca Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence (www.packetfence.org) ------------------------------------------------------------------------------ Get a FREE DOWNLOAD! and learn more about uberSVN rich system, user administration capabilities and model configuration. Take the hassle out of deploying and managing Subversion and the tools developers use with it. http://p.sf.net/sfu/wandisco-d2d-2 _______________________________________________ Packetfence-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/packetfence-users
