On 28 June 2011 21:26, George <ai...@yahoo.com> wrote: > This didn't work: > > [root@freebsd /usr/local/etc/rc.d]# vi /usr/local/share/snmp/snmptrapd.conf > disableAuthorization yes > format2 '%B [%b]: Trap %#v\n' > authCommunity log,execute,net public > forward default udp:10.1.1.227:162
Let's simplify things for a moment. Forget about forwarding traps to another server for now. Concentrate on what things look like at the initial receiver. Try the following: Tweak the snmptrapd.conf file so that the format2 line looks like format2 '%B [%b]: %A [%a]: Trap %#v\n' and send it a trap. What does the output look like? Dave ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2d-c2 _______________________________________________ Net-snmp-users mailing list Net-snmp-users@lists.sourceforge.net Please see the following page to unsubscribe or change other options: https://lists.sourceforge.net/lists/listinfo/net-snmp-users