Introducing SOC Insights for BloxOne Threat Defense: Boost your SOC efficiency with AI-driven insights to eliminate manual work and accelerate investigation and response times. Read the blog announcement here.

NIOS DNS DHCP IPAM

Reply

Sending SNMPTRAPS via CLI

Techie
Posts: 6
1325     1

Dear experts

 

NIOS sends SNMP Traps when a DHCP Range threshold is crossed. The Traps looks like this:

OID: IB-TRAP-MIB::ibThresholdCrossingEvent

011IB-TRAP-MIB::ibNodeName.0 = STRING: "10.54.45.151"

011IB-TRAP-MIB::ibTrapSeverity.0 = INTEGER: info(2)

011IB-TRAP-MIB::ibObjectName.0 = STRING: Threshold

011IB-TRAP-MIB::ibCurThresholdValue.0 = INTEGER: 85

011IB-TRAP-MIB::ibThresholdHigh.0 = INTEGER: 85

011IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 0

011IB-TRAP-MIB::ibTrapDesc.0 = STRING: DHCP high threshold crossed:#012 Member: 10.54.45.151#012  Network: 11.0.0.0/20/default#012  Range: 11.0.5.1/11.0.8.250///default/#012  High Trigger Mark: 85%#012  High Reset Mark: 80%#012  Current Usage: 85%#012  Active Leases: 866#012  Available Leases: 152#012  Total Addresses: 1018

 

I´m trying to simulate this Trap using the CLI "set snmptrap" This is the command I use

 

set snmptrap variable ibThresholdCrossingEvent address 10.54.27.43 ibNodeName 10.54.45.151 ibTrapSeverity 2 ibObjectName Threshold ibCurThresholdValue 95 ibThresholdHigh 85 ibThresholdLow 80 ibTrapDesc "DHCP high threshold crossed:#012 Member: 10.54.45.151#012 Network: 11.0.0.0/20/default#012 Range: 11.0.5.1/11.0.8.250///default/#012 High Trigger Mark: 85%#012 High Reset Mark: 80%#012 Current Usage: 85%#012 Active Leases: 866#012 Available Leases: 152#012 Total Addresses: 1018"  

 

Unfortunately this command does not work. The SNMP Trap that is received looks like this

 

OID: IB-TRAP-MIB::ibThresholdCrossingEvent

 

It does not contain any further information.

Does anyone know why this does not work and how to do it correctly?

 

Thanks in advance

 

VJ
Showing results for 
Search instead for 
Did you mean: 

Recommended for You