Solved

Tracking path an SNMP Trap takes

Posted on 2010-11-30
3
502 Views
Last Modified: 2012-05-10
Hello,

Is there any way to track the path that an SNMP Trap takes one the trap generates?  What I am looking for is a way to track the path a trap takes much like a "tracert" results. I have verified that the Trap destination is correct but never see the Trap appear in my management Console even though I know the Trap condition has occurred.

Thanks for any detail on this.

0
Comment
Question by:Charlie_Melega
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Expert Comment

by:MajorBigDeal
ID: 34244663
I think the short answer is "No".

I think the longer answer is:

Are there any ACLs or other constructs between the device sending the trap  and the SNMP manager that would treat SNMP differently from ICMP?

Does the SNMP manager respond to pings?  Can you issue a ping from the device that is sending the trap?

If so, you get on the device that is issuing the trap and ping the SNMP manager.  Does it respond? If not, then you have a much easier question than the one you asked.

I'm guessing you already did some (or all) of this but I'm just trying to clarify the problem.

Thanks!
0
 
LVL 5

Accepted Solution

by:
group0 earned 500 total points
ID: 34365512
Check whether the UDP datagrams are being received by your trap server by using a packet sniffer like Wireshark or tcpdump to watch for UDP destination port 162.  If you don't see them, then you've got an communications issue (blocked by ACL, incorrect routing, blackholed IP, etc).  If you do see them come through, then you've got an application-level issue with processing them.
0
 
LVL 11

Expert Comment

by:MajorBigDeal
ID: 34769649
Any luck?
0

Featured Post

Webinar June 1st - Attacking Ransomware  

The global cyberattack that corrupted hundreds of thousands of computer systems on May 12th had a face, name, & price tag that we’ve seen all too often in recent years: Ransomware. With the stakes – and costs – of a ransomware attack higher than ever, is your business prepared ?

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
New firewall implementation guidance 12 114
NAT not working on trunk 6 66
creating SVI on layer 3 switch 1 74
BGP Local Preference 5 80
Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
Is your computer hacked? learn how to detect and delete malware in your PC
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question