snmpd.trap(SFF)


snmpd.trap -- SNMP trap communities file

Synopsis

/etc/netmgt/snmpd.trap

Description

The snmpd.trap file contains the definitions for the hosts which will be sent a TRAP PDU by the SNMP agent/server daemon, snmpd(ADMN).

When a trap occurs, the SNMP agent sends a packet containing the trap information to each of the host addresses listed in this file.

The snmpd.trap file contains lines which consist of four items:


``protocol''
the protocol name (``ip'')

``community_string''
a session or community string that can be used by the system receiving the trap to filter out trap messages that it wants to monitor (in this case, the community string is not used for authentication purposes)

``address''
an IP address in decimal dot notation

``socket/port''
the port number for IP must be in decimal; according to RFC 1157, the port number for IP should always be 162
Lines which begin with a hash sign (#) are ignored.

Currently, two TRAP PDUs are generated by snmpd. They are the coldStart and authenticationFailure trap types. The coldStart trap is generated when snmpd is started. The authenticationFailure trap is generated when an authentication error occurs.

Warnings

The IP address 0.0.0.0 is used as a wildcard, meaning that the trap packet is broadcast over the indicated transport.

Examples

The following is a sample snmpd.trap file:
   ip test1 192.9.200.99 162
   ip test1 192.9.200.15 162
   ip test2 123.45.67.89 162
   ip public 0.0.0.0 162
As noted in the ``Description'', the community strings shown are used by the network management software receiving trap packets as a means of filtering out specific traps. For example, a particular network management station might be interested only in traps sent with the test1 or test2 community strings, and might ignore all of the traps sent with the public community string.

References

snmpd(ADMN)

RFC 1155, RFC 1157, RFC 1213, RFC 1420


© 2005 The SCO Group, Inc. All rights reserved.
SCO OpenServer Release 6.0.0 - 01 June 2005