SNMP Trap if a FEX goes down

hello,
need some assistance or help. I have a Nexus 7009 with  a FEX N2K-C2248PQ connected. If the N2K goes down (e.g. power down) a syslog event is generated but no snmp-trap from the N7K to the snmp server. Interface up/downs or power supply failures are traped. This is the syslog event:
 2014 Feb 13 10:47:47.594 n7009 %FEX-2-NOHMS_ENV_FEX_OFFLINE: FEX-113 Off-line (Serial Number xxxxxxxxx)
is  there anybody with an idea?

We've found no solution out-of-the-box, even after some intense research.
But we implemented a simple workaround:  Embedded Event Manager Applet. (EEM)
event manager applet EM-CHECK-FEX
  description "Checks FEX for availability because no trap would be send"
  event syslog occurs 1 pattern "FEX-2-NOHMS_ENV_FEX_OFFLINE"
  action 100 snmp-trap strdata "FEX changed to OFFLINE"
  action 101 syslog priority notifications msg TRAP_SEND: FEX changed to OFFLINE
The EEM tracks the occurence of the specific syslog-pattern.
If the syslog-pattern in question appears, a snmp-trap will be send.

Similar Messages

  • Link down and Link Up Snmp trap C#

    Hi i've configure my cisco router to receive the SNMP traps if the link goes up or down. However i found out that when i plugged out the cable i'm not receiving any link down on the network management system. Until i plugged in again the link will then show up or down state. May i know whats the reason why i can't receive the link down when i plugged out my cable?

    If your router has only fa0/0 as active interface, then this would be the interface that the router would use to communicate with the network management system. However when you unplug that interface now the router has no interface that it can use to send the link down trap to the network management system.
    HTH
    Rick

  • NX-OS snmp-trap strdata does not return string sent from device to object server

    NX-OS snmp-trap strdata does not return string sent from device to object server
    Applet was created:
        event manage applet TEST_VPC
        description "%ETHPORT-5-IF_DOWN_ADMIN_DOWN"
        event syslog occurs 1 priority 4 pattern "%ETHPORT-5-IF_DOWN_ADMIN_DOWN"
        action 1.0 snmp-trap strdata "Loopback0 is admin down"
    after event is generated (link admin down), trap is sent to snmp server, but string does not appear in received messages:
    2014-03-17T04:29:26: Debug: D-P_M-105-000: 1 trap in queue
    2014-03-17T04:29:26: Debug: D-P_M-105-000: V2/V3 trap/inform received
    2014-03-17T04:29:26: Information: I-P_M-104-000: Number of items in the trap queue is 0
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] ReqId: 1427018637
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] community: xxxx
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] IPaddress: x.x.x.x
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] PeerIPaddress: x.x.x.x
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] ReceivedPort: 162
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] ReceivedTime: 1395044966
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] Protocol: UDP
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] SNMP_Version: 2
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] UpTime: 1166940388
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] Uptime: 1:30:03.88
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] .1.3.6.1.2.1.1.3.0: (1166940388) 135 days, 1:30:03.88
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] notify: .1.3.6.1.4.1.9.9.43.2.0.2
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] .1.3.6.1.6.3.1.1.4.1.0: .1.3.6.1.4.1.9.9.43.2.0.2
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] OID1: .1.3.6.1.4.1.9.9.43.1.1.1.0
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] 1: (1166939868) 135 days, 1:29:58.68
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] 1_raw: (1166939868) 135 days, 1:29:58.68
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] 1_text: (1166939868) 135 days, 1:29:58.68
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] 1_hex: (1166939868) 135 days, 1:29:58.68
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] .1.3.6.1.4.1.9.9.43.1.1.1.0: (1166939868) 135 days, 1:29:58.68
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] OID2: .1.3.6.1.4.1.9.9.43.1.1.6.1.6.36
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] 2: 4
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] 2_raw: 4
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] 2_text: 4
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] 2_hex: 4
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] .1.3.6.1.4.1.9.9.43.1.1.6.1.6.36: 4
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] Node: xxx
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] PeerAddress: xxxx
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] EventCount: 360
    2014-03-17T04:29:26: Debug: D-UNK-000-000: [Event Processor] Processing alert {0 remaining} 
    please help figure this out

    This is a CISCO-CONFIG-MAN-MIB trap, not an EEM trap.  I don't think your EEM applet is being triggered since you have that priority argument in there.  Try removing that and leave the syslog pattern alone.  You will see the string as a varbind in the trap.

  • SNMP trapping PRI channels up/down

    Hi guys.
    I am re-configuring some routers to generate traps for our new monitoring tool.
    I have noticed that after I applied the snmp trap configs that we are getting traps for PRI channels (30 voice channels), which I wouldn´t like to. This happens when users are using the voice channels on demand. When they hang up, the used channel goes down and I get a trap.
    Basically, regargint the controller, the only interface that I must monitor is the signaling one (my case is the channel 0/3/0:15) or if the entire controller goes down.
    Below, the snmp trap config:
    snmp-server ifindex persist
    snmp-server trap-source Loopback0
    snmp-server enable traps snmp linkdown linkup coldstart warmstart
    snmp-server enable traps envmon
    snmp-server enable traps isdn layer2
    snmp-server enable traps isdn chan-not-avail
    snmp-server enable traps isdn ietf
    snmp-server enable traps bgp
    snmp-server enable traps hsrp
    snmp-server enable traps ipsla
    snmp-server enable traps voice poor-qov
    Could you please help me to figure out how I can solve this?
    Also, if you guys have any other advises and more ways to monitor the voice environment.
    Thanks in advance

    Duplicate post.
    Go HERE.

  • BGP Peer down monitoring through SNMP Traps

    Hello,
    I'm trying to figure out how I can monitor with BGP peer went down using SNMP traps or any other methods that are out there. Basically I would like to get a trap that tells me the IP address of the peer that went down.
    Looking over the SNMP MIBs for BGP all i can find is snmp traps that tell me there was a change in states in BGP, but don't say which neighbor.
    Is there any way to get such information? Would I have to use EEM with some script? This seems like a very common thing that people would want to know.
    Thank you in advance,
    Tom

    SNMP notifications can be configured on the router and GET operations can be performed from an external management station only after BGP SNMP support is enabled.
    SUMMARY STEPS
    1. enable
    2. configure terminal
    3. snmp-server enable traps bgp [state-changes {[all] [backward-trans] [limited]}] | [threshold prefix]
    4. exit

  • SNMP Traps by Nexus 5010

    I (my customer) does not get SNMP Traps from the N5k when he unplugs one power supply (only logs). He gets only traps when he turns both power supplies off. If I check show snmp trap all trap entity are enabled (rmon Trap are off). NX-OS is 4.2(1)N2(1).
    How he will get traps if one power supplies is off or fails?

    Hi
    Thanks for your support.
    First I like to mention that the issue is when an Nexus2k behind the 5k (FEX) looses the power on one power-supply.
    The trap I get if both power supplies are disconected is:
    "Power Status Change Event.
    The power operational status of a FRAU at entPhysicalTable index has changed to offEnvPower.
    Power Admin Status: . "
    4 seconds later I get than also the FRU Removal Event.
    like mentioned eralier we also would like to get snmp traps when only one power supply goes down, but can't not figure out the config for that.
    K.R.
    Markus

  • WLC 5508 - Set SNMP traps differently per AP

    Hey All,
    We have a controller with multiple remote AP's connected to it.  A couple of the AP's are at branch offices connected to very low quality DSL connections (which is all that is available) and because of this those AP's cut SNMP traps constantly.  For example last month one AP cut about 50 traps because the DSL connection kept cutting out...usually for only a few seconds/minutes.
    I looked though and couldnt find a way to set the traps per AP...only globally.  Is there a way to change the threshold per AP so for example it will only cut a trap if the AP is seen down for a 24 hour period as opposed to everytime it only goes down for a few minutes?
    Thanks!

    Hey All,
    We have a controller with multiple remote AP's connected to it.  A couple of the AP's are at branch offices connected to very low quality DSL connections (which is all that is available) and because of this those AP's cut SNMP traps constantly.  For example last month one AP cut about 50 traps because the DSL connection kept cutting out...usually for only a few seconds/minutes.
    I looked though and couldnt find a way to set the traps per AP...only globally.  Is there a way to change the threshold per AP so for example it will only cut a trap if the AP is seen down for a 24 hour period as opposed to everytime it only goes down for a few minutes?
    Thanks!

  • Manipulating SNMP Trap link_down severity level?

    Dear Cisco experts,
    I wonder if there's a way to manipulate sent traps from a switch with different severity levels?
    I now see SNMP link_down traps in my NMS, but they're all of the same level, but a link_down from a desktop is 'normal', a server link_down would be 'warning', but when an uplink to another data center goes down, it should result in all alarms going off, so should be 'critical'.
    Is there a way to tell my switch to send an SNMP trap on a different severity level dependent on the type of interface? This is most important because these links all have different SLAs.
    Many thanks for your support and suggestions.
    Marco van der Pal

    This is not possible, Only one sort of trap is possible
    You best approach woud be to disable up-down traps on ports that are not important.
    LMS now has port groups. That feature could be usefull for doing this
    Cheers,
    Michel

  • ASA has to be failed over when primary ISP goes down.

    I have an outside 7206 router that is configured with BGP.  Behind that I have an ASA 5520 with a failover.  Everytime my primary ISP goes down I have to failover the ASA to restablish a connection to the secondary ISP.  When the primary comes back on line I have to fail it over again.  I have had Cisco TAC look at the ASA and they didn't see anything misconfigured on the ASA.  Doesn't seem to be any problems with the router config either. Any Ideas on what could be causing this?

    Thanks for your responses. Sorry, I'm new to this. Here are the configs and a simple pic of the primary asa and router the way thery are deployed. I've been dealing with issue for a while.  Hoping to get some help here.
    7206 router:
    show runn
    Building configuration...
    Current configuration : 4678 bytes
    version 12.3
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    service password-encryption
    hostname lee-border
    boot-start-marker
    boot-end-marker
    enable secret 5 **********************
    no aaa new-model
    ip subnet-zero
    ip cef
    ip name-server 206.77.62.152
    interface FastEthernet0/0
    no ip address
    shutdown
    duplex half
    interface GigabitEthernet0/1
    description Univ. of Texas OTS for ISP and Inet2
    no ip address
    duplex full
    speed 100
    media-type rj45
    negotiation auto
    interface GigabitEthernet0/1.7
    description Internet2 Access
    encapsulation dot1Q 7
    ip address 192.88.12.238 255.255.255.252
    interface GigabitEthernet0/1.16
    description THENet-Access
    encapsulation dot1Q 16
    ip address 207.80.110.134 255.255.255.252
    interface GigabitEthernet0/1.743
    description UT OTS TX-BB Peering
    encapsulation dot1Q 743
    ip address 192.124.228.114 255.255.255.252
    interface GigabitEthernet0/2
    description Phonoscope ISP Service
    ip address 66.60.235.146 255.255.255.248
    duplex full
    speed 100
    media-type rj45
    negotiation auto
    interface GigabitEthernet0/3
    description Lee College Internal LANs
    ip address 68.232.208.241 255.255.255.240 secondary
    ip address 68.232.208.1 255.255.255.248
    duplex full
    speed auto
    media-type rj45
    negotiation auto
    interface ATM1/0
    no ip address
    shutdown
    no ima-group
    no atm ilmi-keepalive
    interface ATM1/1
    no ip address
    shutdown
    no ima-group
    no atm ilmi-keepalive
    interface ATM1/2
    no ip address
    shutdown
    no ima-group
    no atm ilmi-keepalive
    interface ATM1/3
    no ip address
    shutdown
    no ima-group
    no atm ilmi-keepalive
    interface ATM1/4
    no ip address
    shutdown
    no ima-group
    no atm ilmi-keepalive
    interface ATM1/5
    no ip address
    shutdown
    no ima-group
    no atm ilmi-keepalive
    interface ATM1/6
    no ip address
    shutdown
    no ima-group
    no atm ilmi-keepalive
    interface ATM1/7
    no ip address
    shutdown
    no ima-group
    no atm ilmi-keepalive
    interface FastEthernet2/0
    no ip address
    shutdown
    duplex half
    interface FastEthernet4/0
    no ip address
    duplex auto
    speed auto
    interface FastEthernet4/1
    no ip address
    shutdown
    duplex auto
    speed auto
    router bgp 46094
    no synchronization
    bgp log-neighbor-changes
    network 68.232.208.0 mask 255.255.240.0
    network 198.216.112.0 mask 255.255.252.0
    network 207.80.120.0 mask 255.255.252.0
    neighbor 66.60.235.145 remote-as 22442
    neighbor 66.60.235.145 description Phonoscope
    neighbor 66.60.235.145 next-hop-self
    neighbor 66.60.235.145 send-community
    neighbor 66.60.235.145 version 4
    neighbor 66.60.235.145 soft-reconfiguration inbound
    neighbor 66.60.235.145 route-map Lee-out out
    neighbor 192.88.12.237 remote-as 276
    neighbor 192.88.12.237 description Internet2 Peering
    neighbor 192.88.12.237 send-community
    neighbor 192.88.12.237 version 4
    neighbor 192.88.12.237 route-map I2-in in
    neighbor 192.88.12.237 route-map Lee-I2-out out
    neighbor 192.88.12.237 password 7 132C4546070901
    neighbor 192.124.228.113 remote-as 6922
    neighbor 192.124.228.113 description UT-Commodity
    neighbor 192.124.228.113 send-community
    neighbor 192.124.228.113 soft-reconfiguration inbound
    neighbor 192.124.228.113 route-map OTS-in in
    neighbor 192.124.228.113 route-map OTS-out out
    no auto-summary
    ip default-gateway 192.124.228.113
    ip classless
    ip route 68.232.208.0 255.255.240.0 Null0 250
    ip route 68.232.209.0 255.255.255.0 68.232.208.2
    ip route 68.232.211.0 255.255.255.0 68.232.208.2
    ip route 68.232.212.0 255.255.252.0 68.232.208.2
    ip route 68.232.216.0 255.255.248.0 68.232.208.2
    ip route 198.216.112.0 255.255.252.0 Null0 250
    ip route 198.216.113.0 255.255.255.0 198.216.115.1
    ip route 198.216.114.0 255.255.255.0 198.216.115.1
    ip route 207.80.8.0 255.255.255.0 198.216.115.1
    ip route 207.80.120.0 255.255.252.0 Null0 250
    ip route 207.80.120.0 255.255.255.0 198.216.115.1
    ip route 207.80.121.0 255.255.255.0 198.216.115.1
    ip route 207.80.122.0 255.255.255.0 198.216.115.1
    ip route 207.80.123.0 255.255.255.0 198.216.115.1
    no ip http server
    access-list 90 permit 68.232.208.0 0.0.15.255
    access-list 90 deny   any
    access-list 91 permit 198.216.112.0 0.0.3.255
    access-list 91 permit 207.80.112.0 0.0.15.255
    access-list 91 deny   any
    route-map OTS-out permit 10
    match ip address 90
    route-map Lee-out permit 10
    match ip address 90
    route-map I2-in permit 10
    set local-preference 200
    route-map Lee-I2-out permit 10
    match ip address 90
    route-map Lee-I2-out permit 20
    match ip address 91
    route-map OTS-in permit 10
    set local-preference 150
    line con 0
    stopbits 1
    line aux 0
    stopbits 1
    line vty 0 4
    password 7 *****************
    login
    end
    ASA (Primary)
    logging permit-hostdown
    mtu Outside 1500
    mtu inside 1500
    mtu LeeDMZ 1500
    mtu management 1500
    failover
    failover lan unit secondary
    failover lan interface failover GigabitEthernet0/3
    failover link failover GigabitEthernet0/3
    failover interface ip failover 172.16.1.1 255.255.255.0 standby 172.16.1.2
    icmp unreachable rate-limit 1 burst-size 1
    icmp permit any inside
    icmp permit any LeeDMZ
    asdm image disk0:/asdm-623.bin
    no asdm history enable
    arp timeout 14400
    global (Outside) 1 68.232.211.1-68.232.223.253
    global (Outside) 1 interface
    global (Outside) 1 68.232.223.254
    global (Outside) 2 68.232.209.25
    global (LeeDMZ) 1 interface
    nat (inside) 0 access-list inside_nat0_outbound
    nat (inside) 1 0.0.0.0 0.0.0.0 tcp 16384 12000
    nat (LeeDMZ) 2 access-list NAT_NEW_ISA
    nat (LeeDMZ) 1 192.168.10.0 255.255.255.0
    static (inside,Outside) 68.232.209.10 10.1.200.253 netmask 255.255.255.255
    static (inside,LeeDMZ) 10.1.0.0 10.1.0.0 netmask 255.255.0.0
    static (inside,LeeDMZ) 192.168.3.0 192.168.3.0 netmask 255.255.255.0
    static (inside,Outside) 68.232.209.53 10.1.254.3 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.5 192.168.10.5 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.6 192.168.10.6 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.51 192.168.10.51 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.37 192.168.10.37 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.75 192.168.10.75 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.101 192.168.10.101 netmask 255.255.255.255
    static (inside,LeeDMZ) 192.168.2.0 192.168.2.0 netmask 255.255.255.0
    static (LeeDMZ,Outside) 68.232.209.102 192.168.10.102 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.38 192.168.10.38 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.23 192.168.10.23 netmask 255.255.255.255
    static (inside,Outside) 68.232.209.136 10.1.7.37 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.111 192.168.10.111 netmask 255.255.255.255
    static (inside,Outside) 68.232.209.8 10.1.13.8 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.103 192.168.10.103 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.92 192.168.10.92 netmask 255.255.255.255
    static (inside,Outside) 68.232.209.4 10.1.6.2 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.219 192.168.10.219 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.217 192.168.10.217 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.206 192.168.10.206 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.234 192.168.10.234 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.33 192.168.10.33 netmask 255.255.255.255
    static (inside,Outside) 68.232.209.246 10.1.1.246 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.11 192.168.10.11 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.100 192.168.10.100 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.120 192.168.10.120 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.70 192.168.10.70 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.36 192.168.10.36 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.50 192.168.10.50 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.22 192.168.10.22 netmask 255.255.255.255
    static (inside,Outside) 68.232.209.121 10.1.1.121 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.20 192.168.10.20 netmask 255.255.255.255
    static (inside,Outside) 68.232.209.203 10.1.55.203 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.15 192.168.10.15 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.25 192.168.10.25 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.55 192.168.10.55 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.143 192.168.10.143 netmask 255.255.255.255
    static (LeeDMZ,Outside) 68.232.209.34 192.168.10.34 netmask 255.255.255.255
    access-group out-in in interface Outside
    access-group 170 in interface inside
    access-group dmz in interface LeeDMZ
    route Outside 0.0.0.0 0.0.0.0 68.232.208.1 1
    route inside 10.1.0.0 255.255.0.0 10.1.200.1 1
    route inside 192.168.2.0 255.255.255.0 10.1.200.254 1
    route inside 192.168.3.0 255.255.255.0 10.1.200.254 1
    route inside 192.168.5.0 255.255.255.0 10.1.200.254 1
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-record DfltAccessPolicy
    aaa-server TACACS+ protocol tacacs+
    aaa-server RADIUS protocol radius
    url-server (inside) vendor websense host 10.1.1.66 timeout 10 protocol TCP version 1 connections 5
    aaa authentication ssh console LOCAL
    filter url except 10.1.4.4 255.255.255.255 0.0.0.0 0.0.0.0
    filter url except 10.1.4.136 255.255.255.255 0.0.0.0 0.0.0.0
    filter url except 10.1.4.30 255.255.255.255 0.0.0.0 0.0.0.0
    filter url except 0.0.0.0 0.0.0.0 192.168.10.36 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 192.168.10.22 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 192.168.10.100 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 10.1.1.27 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 10.1.1.30 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 10.1.89.2 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 10.1.1.11 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 10.1.1.61 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 10.1.1.7 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 192.168.10.38 255.255.255.255 allow
    filter url except 0.0.0.0 0.0.0.0 10.1.89.10 255.255.255.255 allow
    filter url except 10.1.56.189 255.255.255.255 0.0.0.0 0.0.0.0
    filter url except 10.1.4.15 255.255.255.255 0.0.0.0 0.0.0.0
    filter https except 10.1.4.30 255.255.255.255 0.0.0.0 0.0.0.0
    filter url except 10.1.1.0 255.255.255.0 0.0.0.0 0.0.0.0
    filter url http 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow
    filter https 443 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow
    filter ftp 21 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 allow
    http server enable
    http 192.168.1.0 255.255.255.0 management
    http 10.1.4.29 255.255.255.255 management
    http 10.1.4.30 255.255.255.255 management
    http 10.1.4.31 255.255.255.255 management
    http 10.1.4.4 255.255.255.255 management
    snmp-server host inside 10.1.1.215 community *****
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart
    service resetoutside
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto ipsec security-association lifetime seconds 28800
    crypto ipsec security-association lifetime kilobytes 4608000
    crypto map Outside_map 1 match address Outside_1_cryptomap
    crypto map Outside_map 1 set peer 216.168.57.82
    crypto map Outside_map 1 set transform-set ESP-3DES-SHA
    crypto map Outside_map interface Outside
    crypto ca trustpoint ASDM_TrustPoint0
    enrollment self
    subject-name CN=LEE-ASA
    crl configure
    crypto ca trustpoint ASDM_Lee
    enrollment self
    subject-name CN=LEE-ASA
    crl configure
    crypto isakmp enable Outside
    crypto isakmp policy 10
    authentication pre-share
    encryption 3des
    hash sha
    group 2
    lifetime 86400
    telnet 10.1.4.29 255.255.255.255 management
    telnet 10.1.4.30 255.255.255.255 management
    telnet 10.1.4.31 255.255.255.255 management
    telnet 10.1.4.4 255.255.255.255 management
    telnet timeout 5
    ssh 0.0.0.0 0.0.0.0 LeeDMZ
    ssh 0.0.0.0 0.0.0.0 management
    ssh timeout 5
    console timeout 0
    threat-detection basic-threat
    threat-detection scanning-threat shun except ip-address 10.1.4.0 255.255.255.0
    threat-detection scanning-threat shun duration 3600
    threat-detection statistics host
    threat-detection statistics port
    threat-detection statistics protocol
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    url-block url-mempool 2500
    url-block url-size 4
    dynamic-filter updater-client enable
    dynamic-filter use-database
    dynamic-filter enable interface Outside
    dynamic-filter drop blacklist interface Outside
    dynamic-filter whitelist
    address 192.168.10.0 255.255.255.0
    address 10.1.1.6 255.255.255.255
    address 10.1.1.2 255.255.255.255
    dynamic-filter blacklist
    address 46.249.59.47 255.255.255.255
    address 95.215.2.8 255.255.255.255
    address 94.75.201.36 255.255.255.255
    ntp server 64.250.229.100 source Outside
    ntp server 24.56.178.140 source Outside prefer
    webvpn
    username **********************************
    username **************************************
    username ************************************
    tunnel-group 216.168.57.82 type ipsec-l2l
    tunnel-group 216.168.57.82 ipsec-attributes
    pre-shared-key *****
    class-map inspection_default
    match default-inspection-traffic
    policy-map type inspect dns migrated_dns_map_1
    parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
    class inspection_default
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect sqlnet
      inspect skinny
      inspect sunrpc
      inspect xdmcp
      inspect sip
      inspect netbios
      inspect tftp
      inspect ip-options
      inspect icmp
      inspect dns migrated_dns_map_1 dynamic-filter-snoop
      inspect rtsp
    service-policy global_policy global
    prompt hostname context
    call-home
    profile CiscoTAC-1
      no active
      destination address http
    https://tools.cisco.com/its/service/oddce/services/DDCEService
      destination address email
    [email protected]
      destination transport-method http
      subscribe-to-alert-group diagnostic
      subscribe-to-alert-group environment
      subscribe-to-alert-group inventory periodic monthly
      subscribe-to-alert-group configuration periodic monthly
      subscribe-to-alert-group telemetry periodic daily
    Cryptochecksum:************************************: end

  • Enabled SNMP trap

    Hi Experts,
    When i configure Snmp trap in switches it is showing a list of commands, What exacatly is these are?
    snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
    snmp-server enable traps tty
    snmp-server enable traps vtp
    snmp-server enable traps vlancreate
    snmp-server enable traps vlandelete
    snmp-server enable traps stpx
    snmp-server enable traps port-security
    snmp-server enable traps config
    snmp-server enable traps entity
    snmp-server enable traps copy-config
    snmp-server enable traps fru-ctrl
    snmp-server enable traps flash insertion removal
    snmp-server enable traps syslog
    snmp-server enable traps bridge
    snmp-server enable traps envmon fan shutdown supply temperature status
    snmp-server enable traps hsrp
    snmp-server enable traps bgp
    snmp-server enable traps pim neighbor-change rp-mapping-change invalid-pim-message
    snmp-server enable traps ipmulticast
    snmp-server enable traps msdp
    snmp-server enable traps rtr
    snmp-server enable traps vlan-membership
    Does it cause more CPU utilization? Do i need to enable snmp traps to monitor network using solarwinds NPM. I have configured community string and snmpserver host address.
    Thanks
    Vipin

    Hi Vipin,
    We usually configure SNMP traps to monitor our network reachability and availability. If anything goes on Device whether it is a link down situation or any issue with protocol running on the Device. So, whenever anything goes wrong on the device it generates an SNMP Trap and notify you if you have configure SNMP-Server host to receive the notifications/traps.
    To configure SNMP host command following is the command that you need to configure:
    (config)#snmp-server host
    E.g.:
    snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
    Above trap will send you send you following information :
    >Authentication : if any one tries to poll the device using wrong community string
    >linkdown/linkup : if any of the interface/ports/links goes down it will notify you
    snmp-server enable traps bgp
    Above trap will send you traps regarding problems with BGP running on your Device
    Now I come to CPU part, yes it may spike CPU sometime if regular polling is done from the Management Server or if any MIB has long output. You can use Solarwinds NPM for the same however if it causes high cpu then you have to openup a TAC Case with NMS team to have the issue resolved.
    To know more about MIB's on your device you can execute command on your Device 'show snmp mib' and can translate the MIB's using following link to know more about particular MIB :
    http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?local=en&translate=Translate&objectInput=1.3.6.1.2.1.15
    Kindly let me know in case you have any other doubts.
    Thanks & Regards,
    Nikhil Gakhar

  • Cisco 3925 router with an ATM E3 card that never goes down!

    Hi all,
    We a Cisco 3925 router with an ATM E3 card (NM-1A-T3/E3) configured as below with 1 PVC. we see that the ATM subinterface we created for the PVC never goes down! not even when the WAN link is down! The problem with this is we are tracking the line protocol of the ATM sub interface to have VRRP failover to standby router. But because of this issue only BGP goes down whenever the WAN is down & line-protocol of the Subinterface remains up, the failover never happens & site is down. We can configure VRRP to track reachability of a BGP route as workaround but I would like an explanation or troubleshooting steps to check whats the trouble with current setup?
    Cisco IOS Software, C3900 Software (C3900-UNIVERSALK9-M), Version 15.1(2)T4.1, MAINTENANCE INTERIM SOFTWARE
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2011 by Cisco Systems, Inc.
    Compiled Tue 30-Aug-11 08:44 by prod_rel_team
    card type e3 1
    interface ATM1/0
     description Link to PE
     mtu 1500
     bandwidth 34010
     no ip address
     no ip proxy-arp
     logging event subif-link-status
     no atm ilmi-keepalive
     no atm enable-ilmi-trap
    end
    interface ATM1/0.101 point-to-point
     description PVC to MPLS PE
     mtu 1500
     bandwidth 2500
     ip address a.b.c.d 255.255.255.252
     no ip proxy-arp
     ip flow monitor FMforIP4in sampler ata1to100 input
     ip flow monitor FMforIP4out sampler ata1to100 output
     ip nat outside
     ip virtual-reassembly in
     no atm enable-ilmi-trap
     snmp trap link-status
     pvc 1/101
      vbr-nrt 8192 8192 1
      vc-hold-queue 2048
      oam-pvc manage
      oam retry 3 5 1
      oam ais-rdi 15 3
      encapsulation aal5snap
      protocol ip inarp
      queue-depth 5 3
      service-policy out Edge_Queueing
    end
    Thanks a lot in advance!

    Your router has some configuration on it already and it would help us give you better advice if we knew what is already in the configuration. So would you post the output of show running-config (if there is sensitive information like addresses and passwords you can mask them out.
    Changing the configuration register was a good start. I have a couple questions/observations that may help you get started. I notice what appears to be the same public IP address on Gig0/0 and on multilink. Did you get that address from your ISP? If so what kind of connection do you have to the ISP?
    In your description you tell us that Gig0/0 is connected to a small switch, which I assume is for the LAN of your network. But that also is the interface where the public address is configured. So I am confused whether this interface is for LAN or for connecting to the ISP. Can you clarify this?
    HTH
    Rick

  • WLSE doesn't seem to notice it when an Aironet device goes down

    WLSE type: 1105, version 2.7
    Aironet 1100 devices (267 pieces), IOS 12.2(13)JA4
    After the upgrade from version 2.6 to 2.7 we have a problem with the WLSE. Device discoveries and inventories run without a problem, but whenever a device goes down the WLSE doesn't seem to notice.
    With a sniffer we found the WLSE's polling the device, but there's no follow-up when there's no reply. As a result the device stays green.
    All configurations are the same with the exeption of one location. Here we've configured the WDS and this is the only location on which the WLSE reacts in the correct way.
    On several other locations there might be one or two devices on which the WLSE reacts correctly, but these are exeptions. We have compared configuration files, but can't find any differences between the devices.
    Whenever the WLSE does discover a failing device (with no WDS configured) it generates a P1 severity fault (default was P2).
    In case these devices have become reachable again the P1 severity fault is automatically acknowledged and remains this way. So far I haven't been able to clear these faults and therefor the device will keep it's alert status in the reportview.
    I do hope somebody has some idea about what's going on.
    After I encountered these problems after the upgrade I've started from scratch and used a clean installation of version 2.7. and a new discovery of our network.
    I really don't know what went wrong. Anybody with any suggestions is very welcome to vent them.
    Thanks for your help,
    Corine

    I'm having a similar issue. 500+ AP1200 units, IOS 15JA, newest WLSE version. Most of the time when a unit goes down, it will generate a SNMP unreachable fault message, and we are set to have the WLSE send an email in the event of a SNMP unreachable. That's great. Except once in awhile, it won't generate the fault. The device could be powered completely down for three or four days, and I'd never get a fault message. It's driving me nuts. All these AP's are configured the same using the exact same template, with only the IP info changed.

  • SNMP traps from BPEL

    Hi
    I have a requirement to send SNMP traps from BPEL. I am using FMW11.1.1.3 over weblogic.
    I was going through some documentation where i could see that SNMP traps can be created from the Weblogic Server console. Can some one help me on how to generate and sent the traps through SNMP.
    Thanks
    Vamsi

    Yes, I think the Network Devices need to be discovered first in order to receive traps and generate alerts.
    Juke Chou
    TechNet Community Support

  • SNMP Traps is not being sent clear event when DB is UP

    Test Traps everything else is also coming fine. Listener, Database Errors, down etc are all coming in fine thru' SNMP. SNMP traps and OEM all working ok. Question is for database up event there is no CLEAR event being sent. Is there anything else that needs to be configured?
    SQL> SELECT owner, name, enqueue_enabled, dequeue_enabled FROM dba_queues
    2 WHERE name like '%NOTIFY%';
    OWNER NAME ENQUEUE DEQUEUE
    SYS AQ_PROP_NOTIFY YES YES
    SYSMAN AQ$_MGMT_NOTIFY_QTABLE_E NO NO
    SYSMAN MGMT_NOTIFY_Q YES YES
    SYSMAN AQ$_MGMT_NOTIFY_INPUT_QTABLE_E NO NO
    SYSMAN MGMT_NOTIFY_INPUT_Q YES YES

    Hello,
    Under interface for specific interface: snmp trap link-status
    http://www.cisco.com/en/US/docs/ios/12_0/configfun/command/reference/frmonitr.html#wp1023375
    Also in newer IOS
    The snmp-server enable traps snmp [ linkup] [linkdown] form of this command replaces the snmp trap link-status interface configuration mode command.
    http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a05.shtml
    HTH
    Saju
    Pls rate helpful posts

  • Prime Infrastructure 2.1 - Fan-Failure SNMP-Trap Issue

    Hello,
    I am facing the following Prime Infrastructure (v2.1) issue:
    - A Fan-Failure SNMP-Trap from a Cisco 3650 switch doesn't appear on Prime, but a Link-Failure from the same switch does.
    - The both events appears on Prime with Syslog.
    - The command "snmp-server enable traps envmon fan shutdown supply temperature status" is set up.
    - The switch is in "Managed" state in PI, I have checked the ACL at the "snmp-server community" command, it is okay.
    - I have set up an SNMP-Trace for the switch on PI, but only "SNMP Null was returned for class com.cisco.server.managedobjects.bridge.Fan3KStats attribute fanIndex" arrived. Please find the log below.
    07/02/14 12:39:53.211 TRACE [presence-9] [] Adding attributes for object Fan3KStats[151206060_,1012]
    07/02/14 12:39:53.211 TRACE [presence-9] [] Index name : fanIndex
    07/02/14 12:39:53.211 TRACE [presence-9] [] Index Value : 1012
    07/02/14 12:39:53.211 TRACE [presence-9] [] Device MIB table index: .1012
    07/02/14 12:39:53.211 TRACE [presence-9] [] MIB table row index: .1012
    07/02/14 12:39:53.211 TRACE [presence-9] []     OID for : fanIndex = 1.3.6.1.2.1.47.1.1.1.1.1.1012
    07/02/14 12:39:53.211 TRACE [presence-9] []     OID for : fanOperStatus = 1.3.6.1.4.1.9.9.13.1.4.1.3.1012
    07/02/14 12:39:53.211 TRACE [presence-9] [] Get fragment
    07/02/14 12:39:53.211 TRACE [presence-9] [] Creating PDU: Get
    07/02/14 12:39:53.211 TRACE [presence-9] []     VarBind OID=1.3.6.1.2.1.47.1.1.1.1.1.1010
    07/02/14 12:39:53.211 TRACE [presence-9] []     VarBind OID=1.3.6.1.4.1.9.9.13.1.4.1.3.1010
    07/02/14 12:39:53.211 TRACE [presence-9] []     VarBind OID=1.3.6.1.2.1.47.1.1.1.1.1.1011
    07/02/14 12:39:53.211 TRACE [presence-9] []     VarBind OID=1.3.6.1.4.1.9.9.13.1.4.1.3.1011
    07/02/14 12:39:53.211 TRACE [presence-9] []     VarBind OID=1.3.6.1.2.1.47.1.1.1.1.1.1012
    07/02/14 12:39:53.211 TRACE [presence-9] []     VarBind OID=1.3.6.1.4.1.9.9.13.1.4.1.3.1012
    07/02/14 12:39:53.218 TRACE [presence-9] [] Error Status: 0
    07/02/14 12:39:53.218 TRACE [presence-9] [] Error index:  0
    07/02/14 12:39:53.218 TRACE [presence-9] [] SNMP Null was returned for class com.cisco.server.managedobjects.bridge.Fan3KStats attribute fanIndex
    07/02/14 12:39:53.218 TRACE [presence-9] []     Setting attribute: fanOperStatus
    07/02/14 12:39:53.218 TRACE [presence-9] []     SnmpInt Value : ?
    07/02/14 12:39:53.218 TRACE [presence-9] [] GetMultiAttributes, storing result, class=com.cisco.server.managedobjects.bridge.Fan3KStats, attr=fanOperStatus
    07/02/14 12:39:53.218 TRACE [presence-9] [] SNMP Null was returned for class com.cisco.server.managedobjects.bridge.Fan3KStats attribute fanIndex
    07/02/14 12:39:53.218 TRACE [presence-9] []     Setting attribute: fanOperStatus
    07/02/14 12:39:53.218 TRACE [presence-9] []     SnmpInt Value : ?
    07/02/14 12:39:53.218 TRACE [presence-9] [] GetMultiAttributes, storing result, class=com.cisco.server.managedobjects.bridge.Fan3KStats, attr=fanOperStatus
    07/02/14 12:39:53.218 TRACE [presence-9] [] SNMP Null was returned for class com.cisco.server.managedobjects.bridge.Fan3KStats attribute fanIndex
    07/02/14 12:39:53.218 TRACE [presence-9] []     Setting attribute: fanOperStatus
    07/02/14 12:39:53.218 TRACE [presence-9] []     SnmpInt Value : ?
    07/02/14 12:39:53.218 TRACE [presence-9] [] GetMultiAttributes, storing result, class=com.cisco.server.managedobjects.bridge.Fan3KStats, attr=fanOperStatus
    07/02/14 12:39:53.218 TRACE [presence-9] [] GetMultiAttributes, assembling attributes
    07/02/14 12:39:53.218 TRACE [presence-9] []     MIB lookup, OID for: powerSupplyIndex = 1.3.6.1.2.1.47.1.1.1.1.1
    07/02/14 12:39:53.218 TRACE [presence-9] []     GetMultiAttributes needs class=com.cisco.server.managedobjects.bridge.PowerSupply3kStats, field=powerSupplyIndex
    07/02/14 12:39:53.218 TRACE [presence-9] []     MIB lookup, OID for: powerSupplyOperStatus = 1.3.6.1.4.1.9.9.13.1.5.1.3
    07/02/14 12:39:53.218 TRACE [presence-9] []     GetMultiAttributes needs class=com.cisco.server.managedobjects.bridge.PowerSupply3kStats, field=powerSupplyOperStatus
    07/02/14 12:39:53.218 TRACE [presence-9] [] GetMultiAttributes invoked
    07/02/14 12:39:53.218 TRACE [presence-9] [] GetMultiAttributes building OIDs for next PDU
    07/02/14 12:39:53.218 TRACE [presence-9] [] Adding attributes for object PowerSupply3kStats[151206060_,1009]
    - The switch sends the SNMP Trap, based on the followings:
    Jul  7 13:38:30 UTC: SNMP: Packet sent via UDP to IP_ADDRESS
    Jul  7 13:38:30 UTC: %PLATFORM_THERMAL-6-FRU_FAN_OIR: Switch 1: System fan 1 removed
    Jul  7 13:38:30 UTC: %PLATFORM_THERMAL-1-FRU_FAN_NOT_PRESENT: Switch 1: System fan 1 not present
    Jul  7 13:38:30 UTC: SNMP: Queuing packet to IP_ADDRESS
    Jul  7 13:38:30 UTC: SNMP: V2 Trap, reqid 33202, errstat 0, erridx 0
    sysUpTime.0 = 576753333
    snmpTrapOID.0 = ciscoEnvMonMIBNotifications.8
    ciscoEnvMonFanStatusEntry.2.1010 = Switch 1 - FAN 1, NotExist
    ciscoEnvMonFanStatusEntry.3.1010 = 5
    Jul  7 13:38:30 UTC: SNMP: Queuing packet to IP_ADDRESS
    Jul  7 13:38:30 UTC: SNMP: V2 Trap, reqid 33203, errstat 0, erridx 0
    sysUpTime.0 = 576753333
    snmpTrapOID.0 = ciscoEnvMonMIBNotifications.8
    ciscoEnvMonFanStatusEntry.2.1010 = Switch 1 - FAN 1, NotExist
    ciscoEnvMonFanStatusEntry.3.1010 = 5
    Jul  7 13:38:30 UTC: SNMP: Queuing packet to IP_ADDRESS
    Jul  7 13:38:30 UTC: SNMP: V2 Trap, reqid 33204, errstat 0, erridx 0
    sysUpTime.0 = 576753333
    snmpTrapOID.0 = ciscoEnvMonMIBNotifications.8
    ciscoEnvMonFanStatusEntry.2.1010 = Switch 1 - FAN 1, NotExist
    ciscoEnvMonFanStatusEntry.3.1010 = 5
    Jul  7 13:38:30 UTC: SNMP: Queuing packet to IP_ADDRESS
    Jul  7 13:38:30 UTC: SNMP: V2 Trap, reqid 33205, errstat 0, erridx 0
    sysUpTime.0 = 576753333
    snmpTrapOID.0 = ciscoEnvMonMIBNotifications.8
    ciscoEnvMonFanStatusEntry.2.1010 = Switch 1 - FAN 1, NotExist
    ciscoEnvMonFanStatusEntry.3.1010 = 5
    Jul  7 13:38:31 UTC: SNMP: Packet sent via UDP to IP_ADDRESS
    Jul  7 13:38:31 UTC: SNMP: Packet sent via UDP to IP_ADDRESS
    Jul  7 13:38:31 UTC: SNMP: Packet sent via UDP to IP_ADDRESS
    Jul  7 13:38:31 UTC: SNMP: Packet sent via UDP to IP_ADDRESS 
    Jul  7 13:38:45 UTC: SNMP: Packet sent via UDP to IP_ADDRESS
    Jul  7 13:38:51 UTC: %PLATFORM_THERMAL-6-FRU_FAN_OIR: Switch 1: System fan 1 inserted
    Jul  7 13:38:54 UTC: SNMP: Queuing packet to IP_ADDRESS
    Jul  7 13:38:54 UTC: SNMP: V2 Trap, reqid 33206, errstat 0, erridx 0
    sysUpTime.0 = 576755733
    snmpTrapOID.0 = ciscoEnvMonMIBNotifications.8
    ciscoEnvMonFanStatusEntry.2.1010 = Switch 1 - FAN 1, Normal
    ciscoEnvMonFanStatusEntry.3.1010 = 1
    Jul  7 13:38:54 UTC: SNMP: Queuing packet to IP_ADDRESS
    Jul  7 13:38:54 UTC: SNMP: V2 Trap, reqid 33207, errstat 0, erridx 0
    sysUpTime.0 = 576755733
    snmpTrapOID.0 = ciscoEnvMonMIBNotifications.8
    ciscoEnvMonFanStatusEntry.2.1010 = Switch 1 - FAN 1, Normal
    ciscoEnvMonFanStatusEntry.3.1010 = 1
    Jul  7 13:38:54 UTC: SNMP: Queuing packet to IP_ADDRESS
    Jul  7 13:38:54 UTC: SNMP: V2 Trap, reqid 33208, errstat 0, erridx 0
    sysUpTime.0 = 576755733
    snmpTrapOID.0 = ciscoEnvMonMIBNotifications.8
    ciscoEnvMonFanStatusEntry.2.1010 = Switch 1 - FAN 1, Normal
    ciscoEnvMonFanStatusEntry.3.1010 = 1
    Jul  7 13:38:54 UTC: SNMP: Queuing packet to IP_ADDRESS
    Jul  7 13:38:54 UTC: SNMP: V2 Trap, reqid 33209, errstat 0, erridx 0
    sysUpTime.0 = 576755733
    snmpTrapOID.0 = ciscoEnvMonMIBNotifications.8
    ciscoEnvMonFanStatusEntry.2.1010 = Switch 1 - FAN 1, Normal
    ciscoEnvMonFanStatusEntry.3.1010 = 1
    Jul  7 13:38:55 UTC: SNMP: Packet sent via UDP to IP_ADDRESS
    Jul  7 13:38:55 UTC: SNMP: Packet sent via UDP to IP_ADDRESS
    Jul  7 13:38:55 UTC: SNMP: Packet sent via UDP to IP_ADDRESS
    Jul  7 13:38:55 UTC: SNMP: Packet sent via UDP to IP_ADDRESS
    It seems like PI and the switch doesn't understand each other concerning the fan...
    Thanks for any ideas, comments and feedbacks,
    Csaba

    I have the very same problem.
    The switch has a power supply error (one of the two is down). There is the syslog message in PI about it, but no event has created, so nor alarm is there as well.
    When I check the status of the switch in the Device Work Center, and choose the Environment in Device Details I can see that PI has not realized the power supply error.
    However when I click on the Sync for this very device the power supply status is updated, but still no event or alarm.
    This is the case with the FANs as well.

Maybe you are looking for

  • Does Creative Cloud Work with Windows Vista?

    Someone please confirm either way, my Pc is dual core 64 bit so I know im alright there.

  • DMS I want to attach a document to Delivery document

    Is is possible to attah a document at delivery level with he help of Document management system. If yes please tell how to do it , if possible with screen shots. deepak

  • Sound problem thru minidisplayport to HDMI on AVR

    Hi! When i connect my iMac '27 (mid 2010) to my AVReciever (Harman Kardon AVR 255) i hear the sound, but on every few seconds the sound dissapear for a 2 seconds and comes back. Its really frustrating...The thing is, that on Mountain Lion was everyth

  • Please help , "Connection refused: connect "

    hello, i have got this exception while connecting to server ? what does it mean ? and what can i do to solve this problem ? this is so important for me ! i have to solve this in a short time. thanks for helps. Musa YILMAZ // == ERROR com.mysql.jdbc.C

  • Show user name and IP address

    Hi All, When we upload or create contents or post the messages in the discussion. The user name will be recorded.  Is there any ways to record and show both name and IP address of user? Thanks, Anucha