> [root@localhost ~]# snmpwalk -v 2c -c public 192.168.1.2 1.3.6.1.2.1.2.2.1.3
> IF-MIB::ifType.10101 = INTEGER: ethernetCsmacd(6)
> IF-MIB::ifType.10102 = INTEGER: ethernetCsmacd(6)
> IF-MIB::ifType.10103 = INTEGER: ethernetCsmacd(6)
[...]
> IF-MIB::ifType.10151 = INTEGER: ethernetCsmacd(6)
> IF-MIB::ifType.10152 = INTEGER: ethernetCsmacd(6)

Your trap ifIndex seems to be in the 0-48 range while the switch clearly
uses 10100-10148 ifIndexes. Now why is that?

All the logs you sent so far showed us a vlan re-evaluation called from
a change in node's characteristics. However original ifIndex comes from
the trap sent by the switch.

To make sure that the configuration is correct, I would like to see the
logs of a new connection to a port where the MAC is unauthorized (so a
secureMacAddrViolation trap will be sent to PF with ifIndex).

-- 
Olivier Bilodeau
[email protected]  ::  +1.514.447.4918 *115  ::  www.inverse.ca
Inverse inc. :: Leaders behind SOGo (www.sogo.nu) and PacketFence
(www.packetfence.org)

------------------------------------------------------------------------------
Get a FREE DOWNLOAD! and learn more about uberSVN rich system, 
user administration capabilities and model configuration. Take 
the hassle out of deploying and managing Subversion and the 
tools developers use with it. http://p.sf.net/sfu/wandisco-d2d-2
_______________________________________________
Packetfence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to