Hi Chris,

Hang in there. The problem is that (many) devices send us packets that are encoded incorrectly. It's usually something goofy like 64-bit IP addresses, for example. As we get reports like yours, we make small patches to adapt and allow whatever eccentricity your devices have. This would be a first for a cisco device: the usual culprit is 64-bit net-snmp devices.

If you could do this:

$ strace -s 10000 -e trace=network zenperfsnmp run -v 10 2>&1 | gzip >/tmp/send-to-eric.gz

Then send that file to me, I can decoded the packets recorded (in & out) and let you know what I find.

-Eric


[EMAIL PROTECTED] wrote:
Hi,

I've captured the traffic between Zenoss 170.132.208.101 and the router
wyn01cr001

during the Add Device.

There is no timeout of the SNMP connection.  The router sends all the
data to Zenmodeler, however

I still get the following error:

2006-10-11 15:18:57WARNING zen.ZenModelerno cmd plugins found for
wyn01cr001 2006-10-11 15:18:57INFO zen.ZenModelersnmp collection device wyn01cr001
2006-10-11 15:18:57INFO zen.ZenModelerplugins:
zenoss.snmp.DellDeviceMap, zenoss.snmp.HPDeviceMap,
zenoss.snmp.RouteMap, zenoss.snmp.DeviceMap, zenoss.snmp.InterfaceMap
2006-10-11 15:18:57WARNING zen.ZenModelerno portscan plugins found for
wyn01cr001 2006-10-11 15:21:57WARNING zen.ZenModelerclient wyn01cr001 timeout
2006-10-11 15:21:57INFO zen.Devicecollected snmp information for device
wyn01cr001
2006-10-11 15:21:57INFO zen.DeviceLoaderdevice wyn01cr001 loaded!

Any idea where I can look??  I'll be happy to do any additional testing
if necessary.

Thanks Much!

-Chris

TCPDUMP of SNMP Traffic:

ngTable.ipRouteEntry.ipRouteProto.10.128.21.208=14 [|snmp]

15:18:58.974944 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.128.21.208 [|snmp]

15:18:58.986038 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.128.109.80=14 =[|snmp]

15:18:59.017091 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.128.109.80 .iso.org[|snmp]

15:18:59.025978 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.130.132.16=14 [|snmp]

15:18:59.057974 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.130.132.16 [|snmp]

15:18:59.068341 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.249.8.0=14 =[|snmp]

15:18:59.098761 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.249.8.0 .iso.org[|snmp]

15:18:59.108659 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.254.46.0=14 =[|snmp]

15:18:59.139336 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.254.46.0 .iso.org[|snmp]

15:18:59.148995 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.152.0=14 [|snmp]

15:18:59.179369 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.152.0 [|snmp]

15:18:59.189534 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.163.0=14 [|snmp]

15:18:59.217153 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.163.0 [|snmp]

15:18:59.226023 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.164.0=14 [|snmp]

15:18:59.256911 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.164.0 [|snmp]

15:18:59.266982 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.165.0=14 [|snmp]

15:18:59.296233 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.165.0 [|snmp]

15:18:59.305921 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.165.128=14 [|snmp]

15:18:59.336643 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.165.128 [|snmp]

15:18:59.346258 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.165.144=14 [|snmp]

15:18:59.376690 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.165.144 [|snmp]

15:18:59.386503 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.165.160=14 [|snmp]

15:18:59.417575 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.165.160 [|snmp]

15:18:59.444711 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.165.192=14 [|snmp]

15:18:59.474107 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.165.192 [|snmp]

15:18:59.484367 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.165.200=14 [|snmp]

15:18:59.519252 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.165.200 [|snmp]

15:18:59.528719 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.165.240=14 [|snmp]

15:18:59.564630 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.165.240 [|snmp]

15:18:59.574974 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.165.252=14 [|snmp]

15:18:59.602856 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.165.252 [|snmp]

15:18:59.612840 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.10.255.177.0=14 [|snmp]

15:18:59.641662 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.10.255.177.0 [|snmp]

15:18:59.651828 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.62.73.128.112=14 =[|snmp]

15:18:59.680857 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.62.73.128.112 .iso.org[|snmp]

15:18:59.689622 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.62.73.128.128=14 [|snmp]

15:18:59.718627 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.62.73.128.128 [|snmp]

15:18:59.728477 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.64.238.199.200=14 [|snmp]

15:18:59.756867 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.64.238.199.200 [|snmp]

15:18:59.760855 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.64.238.199.201=14 [|snmp]

15:18:59.795614 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.64.238.199.201 [|snmp]

15:18:59.804351 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.64.238.199.202=14 [|snmp]

15:18:59.834522 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.64.238.199.202 [|snmp]

15:18:59.844570 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.64.238.199.203=14 [|snmp]

15:18:59.873376 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.64.238.199.203 [|snmp]

15:18:59.883157 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.64.238.199.204=14 [|snmp]

15:18:59.915371 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.64.238.199.204 [|snmp]

15:18:59.923999 IP wyn01cr001.snmp > 170.132.208.101.25006:  C=xb9SX
GetResponse(38)  ip.ipRouti
ngTable.ipRouteEntry.ipRouteProto.64.238.199.205=14 [|snmp]

15:18:59.953769 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.64.238.199.205 [|snmp]

15:18:59.993368 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.64.238.199.206 [|snmp]

15:19:00.032142 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.64.238.199.207 [|snmp]

15:19:00.074874 IP 170.132.208.101.25006 > wyn01cr001.snmp:  C=xb9SX
GetNextRequest(38)  ip.ipRo
utingTable.ipRouteEntry.ipRouteProto.64.238.199.208 [|snmp]

15:19:36.331060 IP 170.132.208.101.25001 > wyn01cr001.snmp:  C=xb9SX
GetRequest(26)  system.sysU                           pTime.0

15:19:36.334408 IP wyn01cr001.snmp > 170.132.208.101.25001:  C=xb9SX
GetResponse(30)  system.sys                           UpTime.0=402952554

15:19:38.915528 IP 170.132.208.101 > wyn01cr001: icmp 42: echo request
seq 0

15:19:38.917541 IP wyn01cr001 > 170.132.208.101: icmp 42: echo reply seq
0

15:20:36.330666 IP 170.132.208.101.25001 > wyn01cr001.snmp:  C=xb9SX
GetRequest(26)  system.sysUpTime.0

15:20:36.333227 IP wyn01cr001.snmp > 170.132.208.101.25001:  C=xb9SX
GetResponse(30)  system.sysUpTime.0=402958557

15:20:38.923180 IP 170.132.208.101 > wyn01cr001: icmp 42: echo request
seq 0

15:20:38.925173 IP wyn01cr001 > 170.132.208.101: icmp 42: echo reply seq
0

15:21:36.331740 IP 170.132.208.101.25001 > wyn01cr001.snmp:  C=xb9SX
GetRequest(26)  system.sysUpTime.0

15:21:36.334523 IP wyn01cr001.snmp > 170.132.208.101.25001:  C=xb9SX
GetResponse(30)  system.sysUpTime.0=402964558

15:21:38.931049 IP 170.132.208.101 > wyn01cr001: icmp 42: echo request
seq 0

15:21:38.933183 IP wyn01cr001 > 170.132.208.101: icmp 42: echo reply seq
0

15:22:36.339358 IP 170.132.208.101.25001 > wyn01cr001.snmp:  C=xb9SX
GetRequest(26)  system.sysUpTime.0

15:22:36.342167 IP wyn01cr001.snmp > 170.132.208.101.25001:  C=xb9SX
GetResponse(30)  system.sysUpTime.0=402970557

15:22:38.941405 IP 170.132.208.101 > wyn01cr001: icmp 42: echo request
seq 0

15:22:38.954576 IP wyn01cr001 > 170.132.208.101: icmp 42: echo reply seq
0

Chris Leonardos *  Network Engineer * SunGard * Corporate Information
Technology * 680 E. Swedesford Road Wayne, PA 19087 * office:
484.582.5628 * mobile: 484.678.0520 * www.sungard.com
<BLOCKED::http://www.sungard.com/>
CONFIDENTIALITY:  This email (including any attachments) may contain
confidential, proprietary and privileged information, and unauthorized
disclosure or use is prohibited.  If you received this email in error,
please notify the sender and delete this email from your system.


------------------------------------------------------------------------

_______________________________________________
zenoss-users mailing list
[email protected]
http://lists.zenoss.org/mailman/listinfo/zenoss-users

_______________________________________________
zenoss-users mailing list
[email protected]
http://lists.zenoss.org/mailman/listinfo/zenoss-users

Reply via email to