01-08-2014 01:35 PM
Trying to block Symbol traps using the trapFilter.conf file. I tried each of the follwing entries:
# 8 Jan 2014 Symbol Wireless Traps (.188.8.131.52.4.1.388.50.0) <*, .184.108.40.206.220.127.116.11.18.104.22.168.22.214.171.1248.50.0.*>
Saved the file and the ran /opt/OV/bin/nnmtrapconfig.ovpl -readFilter
When I run /opt/OV/bin/nnmtrapdump.ovpl -trapid .126.96.36.199.4.1.3188.8.131.52.0.6 I still see the traps. Also the coun still rises when I look at [Tools][Total Traps Received by SNMP OID
Am I missing something?
01-09-2014 03:01 AM
you can try to modify also the first part of the line:
<*.*.*.*, .184.108.40.206.4.1.388.50.0.*> instead of <*, .220.127.116.11.4.1.388.50.0.*>
You can also be more concrete if posible inserting the IP addresses of the sources.
You can check the OIDs bloqued using the following command:
And also checking the following file:
Once you modified it, you can use nnmtrapconfig.ovpl –stop/start with option –readFilter to force to read the changes made.
You can check what's happening with the traps once they arrive to NNMi server by enabling the following trace:
- #nnmsetlogginglevel.ovpl com.hp.ov.nms.events FINEST
- #nnmsetlogginglevel.ovpl com.hp.ov.nms.trapd FINEST
- #nnmtrapdump.ovpl –last 5 –t when the traps arrive.
- Confirm that they are in the console.
Once you complete the tests, set the tracing levels back to CONFIG:
- #nnmsetlogginglevel.ovpl com.hp.ov.nms.events CONFIG
- #nnmsetlogginglevel.ovpl com.hp.ov.nms.trapd CONFIG
Hope it helps
01-09-2014 05:30 AM
Oscar is correct, your wildcard supposition needs to cover all octets for IPv4, the * alone isnt proper unless you have IPv6 licenced and enabled. Its in the upper portion of the configuration file.
# Both IP Addresses and Event Oids can be specified using wild card "*"
# or range using "-". The IP Address wildcard "*.*.*.*" indicates all
# IPv4 addresses, while "*" indicates all IP addresses in both IPv4 and
# IPv6 networks (when IPv6 support is licensed and enabled).
Andy Kemp, CISSP