Classification: UNCLASSIFIED
Caveats: FOUO

Instead of dealing with spectrum on this one, I'd simply disable IPv6 at the OS 
level.  If I'm judging right, you're likely running linux.  If this is redhat 
or centos, you can disable IPv6 by editing the /etc/sysconfig/network file or 
you can disable it from /etc/sysctl.conf with this line:

net.ipv6.conf.eth0.disable_ipv6 = 1

This will obviously require a complete restart of Spectrum and the OS.

________________________________

From: Kenneth Kirchner [k...@kirchners.com]
Sent: Saturday, October 11, 2014 3:25 AM
To: spectrum
Subject: [spectrum] Spectro SNMP Trap listener on IPv6 and not IPv4


Hello everyone,

I have a Spectrum instance in the lab (VERSION: 9.3.0.0.304) that does not seem 
to be responding at all to SNMP traps from my test router (Cisco 2600 and 1700 
models).  When I look at the processes and ports on the Spectro server, I see 
it listening on IPv6 and nothing on IPv4.  I am only using IPv4.  If I set up 
TCPdump, I see the traps coming in, but nothing appears in the event log and no 
alarms are raised for the device.  Polling is working since it does see the 
interface status changes.

What can I do to get SpectroServer listening for traps on the IPv4 interface?  
I have looked at my production servers and they do show the snmptrap listener 
on IPv4, not IPv6.  I am not sure what would have caused this configuration 
change.

[root@spectro-a ~]# lsof -i -n
COMMAND    PID     USER   FD   TYPE DEVICE SIZE/OFF NODE NAME
dhclient  1062     root    5u  IPv4   8127      0t0  UDP *:bootpc 
sshd      1151     root    3u  IPv4   8394      0t0  TCP *:ssh (LISTEN)
sshd      1151     root    4u  IPv6   8396      0t0  TCP *:ssh (LISTEN)
SpectroSE 1500 spectrum    6r  IPv6  10040      0t0  UDP *:54865 
SpectroSE 1500 spectrum    7u  IPv4  10041      0t0  UDP *:52640 
...
SpectroSE 1500 spectrum    8u  IPv6  10044      0t0  UDP *:snmptrap 
...
SpectroSE 1500 spectrum   11u  IPv4  10051      0t0  TCP 
10.0.1.98:36148->10.0.1.98:56063 (ESTABLISHED)
SpectroSE 1500 spectrum   12r  IPv4  10376      0t0  TCP 
10.0.1.98:37698->10.0.1.98:46479 (ESTABLISHED)
SpectroSE 1500 spectrum   48u  IPv4  10212      0t0  TCP 
10.0.1.98:58939->10.0.1.98:65259 (ESTABLISHED)
SpectroSE 1500 spectrum   49u  IPv6  10318      0t0  TCP 
10.0.1.98:14002->10.0.1.97:45570 (ESTABLISHED)
SpectroSE 1500 spectrum   54u  IPv6  10312      0t0  TCP *:14002 (LISTEN)
SpectroSE 1500 spectrum   60u  IPv4  10335      0t0  TCP *:48879 (LISTEN)
SpectroSE 1500 spectrum   61u  IPv4  10391      0t0  TCP 
10.0.1.98:48879->10.0.1.98:44576 (ESTABLISHED)





[root@spectro-a ~]# tcpdump -i eth0 -nn udp port 162
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode 
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes

18:20:28.691988 IP 10.0.1.88.52904 > 10.0.1.98.162:  C=cisco V2Trap(119)  
.1.3.6.1.2.1.1.3.0=16270713 .1.3.6.1.6.3.1.1.4.1.0=.1.3.6.1.4.1.9.9.43.2.0.1 
.1.3.6.1.4.1.9.9.43.1.1.6.1.3.5=1 .1.3.6.1.4.1.9.9.43.1.1.6.1.4.5=2 
.1.3.6.1.4.1.9.9.43.1.1.6.1.5.5=3



Any help is appreciated.

-Ken


---
Michael S. Votaw 
Senior Spectrum Analyst
Regional Cyber Center - Europe, 5th Signal Command
Northrop Grumman Contractor
NIPR: michael.s.votaw....@mail.mil
SIPR: michael.s.votaw....@mail.smil.mil
DSN: 314-565-6946 (+49 611-143-565-6946)
Cell: 01522 563 1987 (+49 1522 563 1987)

Classification: UNCLASSIFIED
Caveats: FOUO



---
To unsubscribe from spectrum, send email to lists...@unc.edu with the body: 
unsubscribe spectrum arch...@mail-archive.com

Reply via email to