Hey tgriep,
What do you mean by this from your post
"Once I restart the service the file continues to stay empty no matter what I do."
I meant once I cleared out my /etc/snmp/snmptt.conf and ran
service snmptt restart re-added the MIB's, my /etc/snmp/snmptt.conf continued to to be lacking any sort of resemblance to the new MIB's. I may have had a lack of understanding on this part.
1) Following your directions, I deleted all of the current MIB's in question. Following that I removed them from my snmptt.conf file
@npolovenko: And before you do that, delete the old entry in snmptt.conf. Delete everything from this line to the bottom of the file.
MIB: LIEBERT-GP-REGISTRATION-MIB (file:/usr/share/snmp/mibs/LIEBERT_GP_REG.MIB) converted on Fri Oct 13 09:54:26 2017 using snmpttconvertmib v1.4beta2
2) I re-uploaded all of the MIB's and
did not check the process trap on any of them. I uploaded them in this order following the "readme" instructions:
Load/compile the twelve individual MIB files onto your NMS in
the following order:
LIEBERT_GP_REG.MIB (Load First)
LIEBERT_GP_AGENT.MIB
LIEBERT_GP_COND.MIB
LIEBERT_GP_CONTROLLER.MIB
LIEBERT_GP_NOTIFY.MIB
LIEBERT_GP_SYSTEM.MIB
LIEBERT_GP_ENV.MIB
LIEBERT_GP_PDU.MIB
LIEBERT_GP_POWER.MIB
LIEBERT_GP_FLEXIBLE.MIB
LIEBERT_GP_FLEXIBLE_COND.MIB
RFC1628_UPS_MIB.MIB (Load Last)
It is important that the MIB files be loaded in the correct
order.
3) Once I did that, I re-enabled the SNMP trap service. I triggered an event by running a self test on the UPS itself. I watched the Nagios event log, and didn't get anything for the trap service. My other SNMP services worked, just not the trap service.
I checked the
/var/log/snmptt/snmptt.log and found nothing correlating to the test. I checked the
snmpttunknown.log and found these events but no trap was ever recognized by Nagios:
Code: Select all
Thu Oct 19 08:50:01 2017: Unknown trap (.1.3.6.1.2.1.33.2.0.3) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:56:56.38
Value 3: .1.3.6.1.2.1.33.2.0.3
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.2.1.33.2
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.33.1.6.2.1.1.1=1
Ent Value 1: .1.3.6.1.2.1.33.1.6.2.1.2.1=UPS-MIB::upsAlarmTestInProgress
Thu Oct 19 08:50:02 2017: Unknown trap (.1.3.6.1.2.1.33.2.0.3) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:56:56.39
Value 3: .1.3.6.1.2.1.33.2.0.3
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.2.1.33.2
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.33.1.6.2.1.1.1=1
Ent Value 1: .1.3.6.1.2.1.33.1.6.2.1.2.1=UPS-MIB::upsAlarmTestInProgress
Thu Oct 19 08:50:02 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.3.0.1) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:56:56.39
Value 3: .1.3.6.1.4.1.476.1.42.3.3.0.1
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.3
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.4.1.476.1.42.3.2.3.1.1.2=2
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.2.3.1.2.2=LIEBERT-GP-CONDITIONS-MIB::lgpConditionBatteryTestInProgress
Ent Value 2: .1.3.6.1.4.1.476.1.42.3.2.3.1.3.2=1:13:57:18.75
Thu Oct 19 08:50:02 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.3.0.1) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:56:56.39
Value 3: .1.3.6.1.4.1.476.1.42.3.3.0.1
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.3
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.4.1.476.1.42.3.2.3.1.1.2=2
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.2.3.1.2.2=LIEBERT-GP-CONDITIONS-MIB::lgpConditionBatteryTestInProgress
Ent Value 2: .1.3.6.1.4.1.476.1.42.3.2.3.1.3.2=1:13:57:18.75
Thu Oct 19 08:50:02 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.7.8.0.1) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:56:56.40
Value 3: .1.3.6.1.4.1.476.1.42.3.7.8.0.1
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.7.8
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.1.3=1:13:57:18.78
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.7.7=Active:Battery Under Test
Thu Oct 19 08:50:02 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.7.8.0.1) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:56:56.40
Value 3: .1.3.6.1.4.1.476.1.42.3.7.8.0.1
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.7.8
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.1.3=1:13:57:18.78
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.7.7=Active:Battery Under Test
Thu Oct 19 08:50:17 2017: Unknown trap (.1.3.6.1.2.1.33.2.0.4) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.92
Value 3: .1.3.6.1.2.1.33.2.0.4
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.2.1.33.2
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.33.1.6.2.1.1.1=1
Ent Value 1: .1.3.6.1.2.1.33.1.6.2.1.2.1=UPS-MIB::upsAlarmTestInProgress
Thu Oct 19 08:50:18 2017: Unknown trap (.1.3.6.1.2.1.33.2.0.4) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.92
Value 3: .1.3.6.1.2.1.33.2.0.4
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.2.1.33.2
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.33.1.6.2.1.1.1=1
Ent Value 1: .1.3.6.1.2.1.33.1.6.2.1.2.1=UPS-MIB::upsAlarmTestInProgress
Thu Oct 19 08:50:18 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.3.0.2) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.93
Value 3: .1.3.6.1.4.1.476.1.42.3.3.0.2
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.3
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.4.1.476.1.42.3.2.3.1.1.2=2
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.2.3.1.2.2=LIEBERT-GP-CONDITIONS-MIB::lgpConditionBatteryTestInProgress
Ent Value 2: .1.3.6.1.4.1.476.1.42.3.2.3.1.3.2=1:13:57:18.75
Thu Oct 19 08:50:18 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.3.0.2) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.93
Value 3: .1.3.6.1.4.1.476.1.42.3.3.0.2
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.3
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.4.1.476.1.42.3.2.3.1.1.2=2
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.2.3.1.2.2=LIEBERT-GP-CONDITIONS-MIB::lgpConditionBatteryTestInProgress
Ent Value 2: .1.3.6.1.4.1.476.1.42.3.2.3.1.3.2=1:13:57:18.75
Thu Oct 19 08:50:18 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.7.8.0.2) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.94
Value 3: .1.3.6.1.4.1.476.1.42.3.7.8.0.2
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.7.8
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.1.3=1:13:57:35.28
Ent Value 1: .1.3.6.1.4.1.476.1.42.2.1.6=1
Thu Oct 19 08:50:18 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.7.8.0.2) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.94
Value 3: .1.3.6.1.4.1.476.1.42.3.7.8.0.2
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.7.8
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.1.3=1:13:57:35.28
Ent Value 1: .1.3.6.1.4.1.476.1.42.2.1.6=1
Thu Oct 19 08:50:18 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.7.8.0.1) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.94
Value 3: .1.3.6.1.4.1.476.1.42.3.7.8.0.1
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.7.8
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.1.3=1:13:57:35.29
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.7.7=Message:System Return to Normal
Thu Oct 19 08:50:18 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.7.8.0.1) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.95
Value 3: .1.3.6.1.4.1.476.1.42.3.7.8.0.1
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.7.8
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.1.3=1:13:57:35.29
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.7.7=Message:System Return to Normal
Thu Oct 19 08:50:19 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.7.8.0.1) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.95
Value 3: .1.3.6.1.4.1.476.1.42.3.7.8.0.1
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.7.8
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.1.3=1:13:57:35.31
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.7.7=Cleared:Battery Under Test
Thu Oct 19 08:50:19 2017: Unknown trap (.1.3.6.1.4.1.476.1.42.3.7.8.0.1) received from 10.10.99.245 at:
Value 0: 10.10.99.245
Value 1: 10.10.99.245
Value 2: 1:13:57:12.95
Value 3: .1.3.6.1.4.1.476.1.42.3.7.8.0.1
Value 4: 10.10.99.245
Value 5: cafaro
Value 6: .1.3.6.1.4.1.476.1.42.3.7.8
Value 7:
Value 8:
Value 9:
Value 10:
Ent Value 0: .1.3.6.1.2.1.1.3=1:13:57:35.31
Ent Value 1: .1.3.6.1.4.1.476.1.42.3.7.7=Cleared:Battery Under Test
As well, after all of that, here is my snmptt.conf:
Code: Select all
#[root@NAGIOS snmp]# cat snmptt.conf
#
#
#
EVENT coldStart .1.3.6.1.6.3.1.1.5.1 "Status Events" Normal
FORMAT Device reinitialized (coldStart)
#EXEC qpage -f TRAP notifygroup1 "Device reinitialized (coldStart)"
SDESC
A coldStart trap signifies that the SNMPv2 entity, acting
in an agent role, is reinitializing itself and that its
configuration may have been altered.
EDESC
#
#
#
EVENT warmStart .1.3.6.1.6.3.1.1.5.2 "Status Events" Normal
FORMAT Device reinitialized (warmStart)
#EXEC qpage -f TRAP notifygroup1 "Device reinitialized (warmStart)"
SDESC
A warmStart trap signifies that the SNMPv2 entity, acting
in an agent role, is reinitializing itself such that its
configuration is unaltered.
EDESC
#
#
#
EVENT linkDown .1.3.6.1.6.3.1.1.5.3 "Status Events" Normal
FORMAT Link down on interface $1. Admin state: $2. Operational state: $3
#EXEC qpage -f TRAP notifygroup1 "Link down on interface $1. Admin state: $2. Operational state: $3"
SDESC
A linkDown trap signifies that the SNMP entity, acting in
an agent role, has detected that the ifOperStatus object for
one of its communication links is about to enter the down
state from some other state (but not from the notPresent
state). This other state is indicated by the included value
of ifOperStatus.
EDESC
#
#
#
EVENT linkUp .1.3.6.1.6.3.1.1.5.4 "Status Events" Normal
FORMAT Link up on interface $1. Admin state: $2. Operational state: $3
#EXEC qpage -f TRAP notifygroup1 "Link up on interface $1. Admin state: $2. Operational state: $3"
SDESC
A linkUp trap signifies that the SNMP entity, acting in an
agent role, has detected that the ifOperStatus object for
one of its communication links left the down state and
transitioned into some other state (but not into the
notPresent state). This other state is indicated by the
included value of ifOperStatus.
EDESC
#
#
#
EVENT authenticationFailure .1.3.6.1.6.3.1.1.5.5 "Status Events" Normal
FORMAT SNMP athentication failure
#EXEC qpage -f TRAP notifygroup1 "SNMP authentication failure"
SDESC
An authenticationFailure trap signifies that the SNMPv2
entity, acting in an agent role, has received a protocol
message that is not properly authenticated. While all
implementations of the SNMPv2 must be capable of generating
this trap, the snmpEnableAuthenTraps object indicates
whether this trap will be generated.
EDESC
#
#
#
#
MIB: FORTINET-FORTIGATE-MIB (file:/usr/share/snmp/mibs/FORTINET-FORTIGATE-MIB.mib) converted on Thu May 11 17:49:25 2017 using snmpttconvertmib v1.4beta2
#
#
#
#
MIB: FORTINET-CORE-MIB (file:/usr/share/snmp/mibs/FORTINET-CORE-MIB.mib) converted on Wed May 17 16:28:53 2017 using snmpttconvertmib v1.4beta2
#
#
#
EVENT fnTrapCpuThreshold .1.3.6.1.4.1.12356.100.1.3.0.101 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that the CPU usage has exceeded the configured threshold.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapMemThreshold .1.3.6.1.4.1.12356.100.1.3.0.102 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates memory usage has exceeded the configured threshold.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapLogDiskThreshold .1.3.6.1.4.1.12356.100.1.3.0.103 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Log disk usage has exceeded the configured threshold. Only available
on devices with log disks.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapTempHigh .1.3.6.1.4.1.12356.100.1.3.0.104 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
A temperature sensor on the device has exceeded its threshold.
Not all devices have thermal sensors. See manual for specifications.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapVoltageOutOfRange .1.3.6.1.4.1.12356.100.1.3.0.105 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Power levels have fluctuated outside of normal levels. Not all devices
have voltage monitoring instrumentation. See manual for specifications.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapPowerSupplyFailure .1.3.6.1.4.1.12356.100.1.3.0.106 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Power supply failure detected. Not available on all models. Available
on some devices which support redundant power supplies. See manual
for specifications.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapAmcIfBypassMode .1.3.6.1.4.1.12356.100.1.3.0.107 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
An AMC interface entered bypass mode. Available on models with an AMC
expansion slot. Used with the ASM-CX4 and ASM-FX2 cards.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapFanFailure .1.3.6.1.4.1.12356.100.1.3.0.108 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
A fan failure has been detected. Not all devices have fan sensors.
See manual for specifications.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapIpChange .1.3.6.1.4.1.12356.100.1.3.0.201 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that the IP address of the specified interface has been changed.
Variables:
1: fnSysSerial
2: sysName
3: ifIndex
EDESC
#
#
#
EVENT fnTrapTest .1.3.6.1.4.1.12356.100.1.3.0.999 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Trap sent for diagnostic purposes by an administrator.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
#
MIB: FORTINET-CORE-MIB (file:/usr/share/snmp/mibs/FORTINET-CORE-MIB.txt) converted on Fri May 19 08:46:35 2017 using snmpttconvertmib v1.4beta2
#
#
#
EVENT fnTrapCpuThreshold .1.3.6.1.4.1.12356.100.1.3.0.101 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that the CPU usage has exceeded the configured threshold.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapMemThreshold .1.3.6.1.4.1.12356.100.1.3.0.102 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates memory usage has exceeded the configured threshold.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapLogDiskThreshold .1.3.6.1.4.1.12356.100.1.3.0.103 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Log disk usage has exceeded the configured threshold. Only available
on devices with log disks.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapTempHigh .1.3.6.1.4.1.12356.100.1.3.0.104 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
A temperature sensor on the device has exceeded its threshold.
Not all devices have thermal sensors. See manual for specifications.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapVoltageOutOfRange .1.3.6.1.4.1.12356.100.1.3.0.105 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Power levels have fluctuated outside of normal levels. Not all devices
have voltage monitoring instrumentation. See manual for specifications.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapPowerSupplyFailure .1.3.6.1.4.1.12356.100.1.3.0.106 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Power supply failure detected. Not available on all models. Available
on some devices which support redundant power supplies. See manual
for specifications.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapAmcIfBypassMode .1.3.6.1.4.1.12356.100.1.3.0.107 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
An AMC interface entered bypass mode. Available on models with an AMC
expansion slot. Used with the ASM-CX4 and ASM-FX2 cards.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapFanFailure .1.3.6.1.4.1.12356.100.1.3.0.108 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
A fan failure has been detected. Not all devices have fan sensors.
See manual for specifications.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fnTrapIpChange .1.3.6.1.4.1.12356.100.1.3.0.201 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that the IP address of the specified interface has been changed.
Variables:
1: fnSysSerial
2: sysName
3: ifIndex
EDESC
#
#
#
EVENT fnTrapTest .1.3.6.1.4.1.12356.100.1.3.0.999 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Trap sent for diagnostic purposes by an administrator.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
#
MIB: FORTINET-FORTIGATE-MIB (file:/usr/share/snmp/mibs/FORTINET-FORTIGATE-MIB.txt) converted on Fri May 19 08:46:45 2017 using snmpttconvertmib v1.4beta2
#
#
#
EVENT fgTrapVpnTunUp .1.3.6.1.4.1.12356.101.2.0.301 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that the specified VPN tunnel has been brought up.
Variables:
1: fnSysSerial
2: sysName
3: fgVpnTrapLocalGateway
4: fgVpnTrapRemoteGateway
5: fgVpnTrapPhase1Name
EDESC
#
#
#
EVENT fgTrapVpnTunDown .1.3.6.1.4.1.12356.101.2.0.302 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The specified VPN tunnel has been brought down.
Variables:
1: fnSysSerial
2: sysName
3: fgVpnTrapLocalGateway
4: fgVpnTrapRemoteGateway
5: fgVpnTrapPhase1Name
EDESC
#
#
#
EVENT fgTrapHaSwitch .1.3.6.1.4.1.12356.101.2.0.401 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The specified cluster member has transitioned from a slave role to a master role.
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapHaStateChange .1.3.6.1.4.1.12356.101.2.0.402 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Trap being sent when the HA cluster
member changes its state
Variables:
1: fnSysSerial
EDESC
#
#
#
EVENT fgTrapHaHBFail .1.3.6.1.4.1.12356.101.2.0.403 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The heartbeat device failure count has exceeded the configured threshold.
Variables:
1: fnSysSerial
EDESC
#
#
#
EVENT fgTrapHaMemberDown .1.3.6.1.4.1.12356.101.2.0.404 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The specified device (by serial number) is moving to a down state.
Variables:
1: fnSysSerial
EDESC
#
#
#
EVENT fgTrapHaMemberUp .1.3.6.1.4.1.12356.101.2.0.405 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
A new cluster member has joined the cluster.
Variables:
1: fnSysSerial
EDESC
#
#
#
EVENT fgTrapIpsSignature .1.3.6.1.4.1.12356.101.2.0.503 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
An IPS signature has been triggered
Variables:
1: fnSysSerial
2: sysName
3: fgIpsTrapSigId
4: fgIpsTrapSrcIp
5: fgIpsTrapSigMsg
EDESC
#
#
#
EVENT fgTrapIpsAnomaly .1.3.6.1.4.1.12356.101.2.0.504 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
An IPS anomaly has been detected
Variables:
1: fnSysSerial
2: sysName
3: fgIpsTrapSigId
4: fgIpsTrapSrcIp
5: fgIpsTrapSigMsg
EDESC
#
#
#
EVENT fgTrapIpsPkgUpdate .1.3.6.1.4.1.12356.101.2.0.505 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The IPS signature database has been updated
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapIpsFailOpen .1.3.6.1.4.1.12356.101.2.0.506 "Status Events" Normal
FORMAT The IPS network buffer is full $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "The IPS network buffer is full $*"
SDESC
The IPS network buffer is full
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapAvVirus .1.3.6.1.4.1.12356.101.2.0.601 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
A virus has been detected by the anti-virus engine
Variables:
1: fnSysSerial
2: sysName
3: fgAvTrapVirName
EDESC
#
#
#
EVENT fgTrapAvOversize .1.3.6.1.4.1.12356.101.2.0.602 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
An over-sized file has been detected by the anti-virus engine
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapAvPattern .1.3.6.1.4.1.12356.101.2.0.603 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The anti-virus engine has blocked a file because it matched a configured pattern
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapAvFragmented .1.3.6.1.4.1.12356.101.2.0.604 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The anti-virus engine has detected a fragmented file
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapAvEnterConserve .1.3.6.1.4.1.12356.101.2.0.605 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The anti-virus engine has entered conservation mode due to low memory conditions
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapAvBypass .1.3.6.1.4.1.12356.101.2.0.606 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The anti-virus engine has been bypassed due to conservation mode
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapAvOversizePass .1.3.6.1.4.1.12356.101.2.0.607 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
An over-sized file has been detected,
but has been passed due to configuration
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapAvOversizeBlock .1.3.6.1.4.1.12356.101.2.0.608 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
An over-sized file has been detected
and has been blocked
Variables:
1: fnSysSerial
2: sysName
EDESC
#
#
#
EVENT fgTrapFazDisconnect .1.3.6.1.4.1.12356.101.2.0.701 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The device has been disconnected from the FortiAnalyzer.
Variables:
1: fnSysSerial
EDESC
#
#
#
EVENT fgTrapWcApUp .1.3.6.1.4.1.12356.101.2.0.801 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that the specified AP is up.
Variables:
1: fnSysSerial
2: sysName
3: fgWcApVdom
4: fgWcApSerial
5: fgWcApName
EDESC
#
#
#
EVENT fgTrapWcApDown .1.3.6.1.4.1.12356.101.2.0.802 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that the specified AP is down.
Variables:
1: fnSysSerial
2: sysName
3: fgWcApVdom
4: fgWcApSerial
5: fgWcApName
EDESC
#
#
#
EVENT fgTrapFcSwUp .1.3.6.1.4.1.12356.101.2.0.901 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that the specified switch controller session is up.
Variables:
1: fnSysSerial
2: sysName
3: fgFcSwVdom
4: fgFcSwSerial
5: fgFcSwName
EDESC
#
#
#
EVENT fgTrapFcSwDown .1.3.6.1.4.1.12356.101.2.0.902 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that the specified switch controller session is down.
Variables:
1: fnSysSerial
2: sysName
3: fgFcSwVdom
4: fgFcSwSerial
5: fgFcSwName
EDESC
#
#
#
EVENT fgFmTrapDeployComplete .1.3.6.1.4.1.12356.101.6.0.1000 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates when deployment of a new configuration has been completed. Used for verification by FortiManager.
Variables:
1: fnSysSerial
EDESC
#
#
#
EVENT fgFmTrapDeployInProgress .1.3.6.1.4.1.12356.101.6.0.1002 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Indicates that a configuration change was not immediate and that the change is currently in progress. Used for verification by FortiManager.
Variables:
1: fnSysSerial
EDESC
#
#
#
EVENT fgFmTrapConfChange .1.3.6.1.4.1.12356.101.6.0.1003 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
The device configuration has been changed by something other than the managing FortiManager device.
Variables:
1: fnSysSerial
EDESC
#
#
#
EVENT fgFmTrapIfChange .1.3.6.1.4.1.12356.101.6.0.1004 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
Trap is sent to the managing FortiManager if an interface IP is changed
Variables:
1: fnSysSerial
2: ifName
3: fgManIfIp
4: fgManIfMask
5: fgManIfIp6
EDESC
#
#
#
EVENT fgTrapServerLoadBalanceRealServerDown .1.3.6.1.4.1.12356.101.2.0.1101 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
One of servers in a Server Load Balance group goes down.
Variables:
1: fnSysSerial
2: sysName
3: fgServerLoadBalanceRealServerAddress
4: fgServerLoadBalanceVirtualServerName
EDESC
#
#
#
EVENT fgTrapDeviceNew .1.3.6.1.4.1.12356.101.2.0.1201 "Status Events" Normal
FORMAT $*
EXEC /usr/local/bin/snmptraphandling.py "$r" "SNMP Traps" "$s" "$@" "$-*" "$*"
SDESC
A new device is found.
Variables:
1: fnSysSerial
2: sysName
3: ifIndex
4: fgVdEntIndex
5: fgDeviceCreated
6: fgDeviceLastSeen
7: fgDeviceMacAddress
EDESC
#
#
I appreciate all of the help and my ignorance regarding SNMP Traps. Please let me know if you need anything else from me.