Solved

Tracking path an SNMP Trap takes

Posted on 2010-11-30
3
481 Views
Last Modified: 2012-05-10
Hello,

Is there any way to track the path that an SNMP Trap takes one the trap generates?  What I am looking for is a way to track the path a trap takes much like a "tracert" results. I have verified that the Trap destination is correct but never see the Trap appear in my management Console even though I know the Trap condition has occurred.

Thanks for any detail on this.

0
Comment
Question by:Charlie_Melega
  • 2
3 Comments
 
LVL 11

Expert Comment

by:MajorBigDeal
ID: 34244663
I think the short answer is "No".

I think the longer answer is:

Are there any ACLs or other constructs between the device sending the trap  and the SNMP manager that would treat SNMP differently from ICMP?

Does the SNMP manager respond to pings?  Can you issue a ping from the device that is sending the trap?

If so, you get on the device that is issuing the trap and ping the SNMP manager.  Does it respond? If not, then you have a much easier question than the one you asked.

I'm guessing you already did some (or all) of this but I'm just trying to clarify the problem.

Thanks!
0
 
LVL 5

Accepted Solution

by:
group0 earned 500 total points
ID: 34365512
Check whether the UDP datagrams are being received by your trap server by using a packet sniffer like Wireshark or tcpdump to watch for UDP destination port 162.  If you don't see them, then you've got an communications issue (blocked by ACL, incorrect routing, blackholed IP, etc).  If you do see them come through, then you've got an application-level issue with processing them.
0
 
LVL 11

Expert Comment

by:MajorBigDeal
ID: 34769649
Any luck?
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now