Thomas, Thanks for the input. I am going to try to beat my proxy statement into submission. Below is some debug details for the record. I would also be interested in testing the new AIX related snmp code when it comes into play as well as try to figure out how AIX pulls that information from the kernel.
The output of the command is source$ snmpwalk -v1 -c public aix01:1610 1.3.6.1.2.1.4.20 Timeout: No Response from aix01:1610 source$ while the box shows that it is running and that the port is listening. Occasionally the log for the AIX snmpd will get updated and a packet flagged in it when you walk the host. AIX# ps auxwww|grep snmp root 454852 0.2 0.0 4748 4712 pts/4 A 13:53:53 0:01 /soft/net-snmp/5.4/sbin/snmpd -r -f -Lf /soft/net-snmp/5.4/log/snmpd.log -M /soft/net-snmp/5.4/share/snmp/mibs -c /soft/net-snmp/5.4/param/snmpd.conf -d 1 root 344188 0.0 0.0 172 176 pts/1 A 10:50:26 0:00 tail -f snmpmibd.log root 376838 0.0 0.0 1244 1164 - A 13:51:46 0:00 /usr/sbin/snmpmibd root 430150 0.0 0.0 168 172 pts/6 A 13:08:51 0:00 tail -f /usr/tmp/snmpdv3.log root 503906 0.0 0.0 676 708 pts/4 A 13:53:53 0:00 /bin/sh startnetsnmp.sh root 528422 0.0 0.0 212 224 pts/5 A 13:58:28 0:00 grep snmp root 561190 0.0 0.0 372 404 pts/8 A 13:21:49 0:00 less snmpd.conf root 295108 0.0 0.0 1176 1220 - A 13:51:36 0:00 /usr/sbin/snmpd -p 1610 # AIX# netstat -tan| grep 1610 udp4 0 0 *.1610 AIX# Debug info (adding -d 1 flag to calling net-snmpd) Received SNMP packet(s) from UDP: [200.20.34.62]:50336 GET message -- IP-MIB::ipAddrTable Sending 42 bytes to UDP: [127.0.0.1]:1610 0000: 30 28 02 01 00 04 06 70 75 62 6C 69 63 A0 1B 02 0(.....public .. 0016: 04 4A D9 33 F7 02 01 00 02 01 00 30 0D 30 0B 06 .JÙ3÷......0.0.. 0032: 07 2B 06 01 02 01 04 14 05 00 .+........ Received 42 bytes from UDP: [127.0.0.1]:1610 0000: 30 28 02 01 00 04 06 70 75 62 6C 69 63 A2 1B 02 0(.....public¢.. 0016: 04 4A D9 33 F7 02 01 02 02 01 01 30 0D 30 0B 06 .JÙ3÷......0.0.. 0032: 07 2B 06 01 02 01 04 14 05 00 .+........ Sending 42 bytes to UDP: [200.20.34.62]:50336 0000: 30 28 02 01 00 04 06 70 75 62 6C 69 63 A2 1B 02 0(.....public¢.. 0016: 04 71 14 B4 62 02 01 02 02 01 01 30 0D 30 0B 06 .q.´b......0.0.. 0032: 07 2B 06 01 02 01 04 14 05 00 .+........ TCPdump started when I try to walk the OID in question. source# tcpdump -i eth0 |grep drum tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 14:04:25.716741 IP source.50340 > namesvr01.domain: 19561+ A? drum01.util.uplink. (36) 14:04:25.717477 IP source.50340 > namesvr01.domain: 37005+ A? drum01.dish.uplink. (36) 14:04:25.720137 IP source.50340 > AIX.snmp: GetNextRequest(27) ip.ipAddrTable 14:04:25.720397 IP AIX.ssh > source.55988: P 477491983:477492071(88) ack 2750753606 win 65535 14:04:25.720409 IP source.55988 > AIX.ssh: . ack 88 win 65535 14:04:25.720430 IP AIX.ssh > source.55988: P 88:200(112) ack 1 win 65535 14:04:25.720438 IP source.55988 > AIX.ssh: . ack 200 win 65535 14:04:25.720465 IP AIX.ssh > source.55988: P 200:312(112) ack 1 win 65535 14:04:25.720479 IP source.55988 > AIX.ssh: . ack 312 win 65535 14:04:25.720493 IP AIX.ssh > source.55988: P 312:424(112) ack 1 win 65535 14:04:25.720501 IP source.55988 > AIX.ssh: . ack 424 win 65535 14:04:25.720516 IP AIX.ssh > source.55988: P 424:520(96) ack 1 win 65535 14:04:25.720522 IP source.55988 > AIX.ssh: . ack 520 win 65535 14:04:25.720537 IP AIX.ssh > source.55988: P 520:608(88) ack 1 win 65535 14:04:25.720548 IP source.55988 > AIX.ssh: . ack 608 win 65535 14:04:25.720608 IP AIX.ssh > source.55988: P 608:688(80) ack 1 win 65535 14:04:25.720615 IP source.55988 > AIX.ssh: . ack 688 win 65535 14:04:25.720641 IP AIX.ssh > source.55988: P 688:800(112) ack 1 win 65535 14:04:25.720648 IP source.55988 > AIX.ssh: . ack 800 win 65535 14:04:25.720683 IP AIX.ssh > source.55988: P 800:912(112) ack 1 win 65535 14:04:25.720691 IP source.55988 > AIX.ssh: . ack 912 win 65535 14:04:25.720709 IP AIX.ssh > source.55988: P 912:1024(112) ack 1 win 65535 14:04:25.720716 IP source.55988 > AIX.ssh: . ack 1024 win 65535 14:04:25.731688 IP AIX.ssh > source.55988: P 1024:1112(88) ack 1 win 65535 14:04:25.731696 IP source.55988 > AIX.ssh: . ack 1112 win 65535 14:04:25.731719 IP AIX.ssh > source.55988: P 1112:1224(112) ack 1 win 65535 14:04:25.731726 IP source.55988 > AIX.ssh: . ack 1224 win 65535 14:04:25.731745 IP AIX.ssh > source.55988: P 1224:1336(112) ack 1 win 65535 14:04:25.731751 IP source.55988 > AIX.ssh: . ack 1336 win 65535 14:04:25.731781 IP AIX.ssh > source.55988: P 1336:1496(160) ack 1 win 65535 14:04:25.731787 IP source.55988 > AIX.ssh: . ack 1496 win 65535 14:04:25.731802 IP AIX.ssh > source.55988: P 1496:1608(112) ack 1 win 65535 14:04:25.731812 IP source.55988 > AIX.ssh: . ack 1608 win 65535 14:04:25.731825 IP AIX.ssh > source.55988: P 1608:1720(112) ack 1 win 65535 14:04:25.731832 IP source.55988 > AIX.ssh: . ack 1720 win 65535 14:04:25.731865 IP AIX.ssh > source.55988: P 1720:1832(112) ack 1 win 65535 14:04:25.731928 IP source.55988 > AIX.ssh: . ack 1832 win 65535 14:04:25.744494 IP AIX.ssh > source.55988: P 1832:1920(88) ack 1 win 65535 14:04:25.744520 IP source.55988 > AIX.ssh: . ack 1920 win 65535 14:04:25.744531 IP AIX.ssh > source.55988: P 1920:2032(112) ack 1 win 65535 14:04:25.744536 IP source.50340 > AIX.snmp: GetRequest(27) ip.ipAddrTable 14:04:25.744554 IP AIX.ssh > source.55988: P 2032:2144(112) ack 1 win 65535 14:04:25.744570 IP source.55988 > AIX.ssh: . ack 2032 win 65535 14:04:25.744590 IP AIX.ssh > source.55988: P 2144:2304(160) ack 1 win 65535 14:04:25.744605 IP AIX.ssh > source.55988: P 2304:2416(112) ack 1 win 65535 14:04:25.744641 IP source.55988 > AIX.ssh: . ack 2144 win 65535 14:04:25.744642 IP AIX.ssh > source.55988: P 2416:2528(112) ack 1 win 65535 14:04:25.744666 IP AIX.ssh > source.55988: P 2528:2640(112) ack 1 win 65535 14:04:25.744683 IP source.55988 > AIX.ssh: . ack 2640 win 65535 14:04:25.745080 IP AIX.ssh > source.55988: P 2640:2728(88) ack 1 win 65535 14:04:25.745098 IP source.55988 > AIX.ssh: . ack 2728 win 65535 14:04:25.745112 IP AIX.ssh > source.55988: P 2728:2840(112) ack 1 win 65535 14:04:25.745140 IP AIX.ssh > source.55988: P 2840:2952(112) ack 1 win 65535 14:04:25.745154 IP source.55988 > AIX.ssh: . ack 2952 win 65535 14:04:25.745166 IP AIX.ssh > source.55988: P 2952:3064(112) ack 1 win 65535 14:04:25.745189 IP AIX.ssh > source.55988: P 3064:3160(96) ack 1 win 65535 14:04:25.745208 IP AIX.ssh > source.55988: P 3160:3240(80) ack 1 win 65535 14:04:25.745233 IP AIX.ssh > source.55988: P 3240:3320(80) ack 1 win 65535 14:04:25.745248 IP source.55988 > AIX.ssh: . ack 3320 win 65535 14:04:25.745266 IP AIX.ssh > source.55988: P 3320:3432(112) ack 1 win 65535 14:04:25.745291 IP AIX.ssh > source.55988: P 3432:3544(112) ack 1 win 65535 14:04:25.745321 IP AIX.ssh > source.55988: P 3544:3656(112) ack 1 win 65535 14:04:25.745341 IP source.55988 > AIX.ssh: . ack 3656 win 65535 14:04:25.762264 IP AIX.ssh > source.55988: P 3656:3744(88) ack 1 win 65535 14:04:25.762313 IP AIX.ssh > source.55988: P 3744:3856(112) ack 1 win 65535 14:04:25.762323 IP AIX.ssh > source.55988: P 3856:3968(112) ack 1 win 65535 14:04:25.762355 IP AIX.ssh > source.55988: P 3968:4128(160) ack 1 win 65535 14:04:25.762375 IP source.55988 > AIX.ssh: . ack 4128 win 65535 14:04:25.762372 IP AIX.ssh > source.55988: P 4128:4240(112) ack 1 win 65535 14:04:25.762398 IP AIX.ssh > source.55988: P 4240:4352(112) ack 1 win 65535 14:04:25.762420 IP AIX.ssh > source.55988: P 4352:4464(112) ack 1 win 65535 14:04:25.762500 IP source.55988 > AIX.ssh: . ack 4464 win 65535 Michael On Mon, 19 May 2008 21:36:48 +0200 Thomas Anders <[EMAIL PROTECTED]> wrote: > Michael Osburn wrote: > > I am in the process of setting up SNMP monitoring on an AIX 5.3 server > > and > > am having some issues. With the built in SNMPd I can access the hosts > > Ethernet > > interface stats. When I use Net-SNMP I can get all the other information > > that we > > want to see but am unable to get the interface information. I have tried to > > add > > "proxy -v 1 -c public localhost:1610 1.3.6.1.2.1.4.20" to the end of my > > snmpd.conf > > file to get this information. With the debugging cranked on high I can see > > the > > requests being processed to the native client but I cannot get any response > > back > > to the snmpwalk client for that OID. > > Until someone finds out how the native snmpd gets these interface information > from 64-bit AIX kernels and feeds us patches how to do something > similar in net-snmp, the proxy approach is your best bet. > > What's the output of "snmpwalk -v1 -c public localhost:1610 1.3.6.1.2.1.4.20"? > > > +Thomas > -- Michael Osburn [EMAIL PROTECTED] CAS Engineering Cheyenne Uplink Echostar Communications LLC Desk phone (307) 633-5232 ------------ This e-mail and its attachments is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited. If you received this in error, please contact the sender and delete the material from any computer. ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2008. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/ _______________________________________________ Net-snmp-users mailing list Net-snmp-users@lists.sourceforge.net Please see the following page to unsubscribe or change other options: https://lists.sourceforge.net/lists/listinfo/net-snmp-users