On 28 June 2011 21:26, George <ai...@yahoo.com> wrote:
> This didn't work:
>
> [root@freebsd /usr/local/etc/rc.d]# vi /usr/local/share/snmp/snmptrapd.conf
> disableAuthorization yes
> format2 '%B [%b]: Trap %#v\n'
> authCommunity log,execute,net public
> forward default udp:10.1.1.227:162

Let's simplify things for a moment.
Forget about forwarding traps to another server for now.
Concentrate on what things look like at the initial receiver.

Try the following:

Tweak the snmptrapd.conf file so that the format2 line looks like

   format2  '%B [%b]:  %A [%a]:  Trap %#v\n'

and send it a trap.
What does the output look like?


Dave

------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users@lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Reply via email to