Okay, I found the answer to my own question:
I needed to specify the listening addresses as below:
* snmptrapd udp:162,udp6:162 -f -Le &
Then I was able to catch IPv6 traps as well as IPv4's:
2007-11-20 17:13:31 UDP/IPv6: [::1]:33350 [UDP/IPv6: [::1]:33350]:
RFC1213-MIB::s
On 20/11/2007, Younger Wang <[EMAIL PROTECTED]> wrote:
> In snmpcmd, vacmSecurityModel is used in example:
>
> snmpgetnext -c public -v 1 localhost vacmSecurityModel
> SNMP-VIEW-BASED-ACM-MIB::vacmSecurityModel.0."wes" = xxx
> It would make sense to change the example to:
>
> snmpgetnext -c publi
Hi,
In snmpcmd, vacmSecurityModel is used in example:
snmpgetnext -c public -v 1 localhost vacmSecurityModel
SNMP-VIEW-BASED-ACM-MIB::vacmSecurityModel.0."wes" = xxx
I tried many ways using the example, but net-snmp kept saying 'index out
of range'. And I read the MIB SNMP-VIEW-BASED-ACM-MIB: