SNMP Traps
If SNMP-capable devices in the network are configured to send traps to Meridian, these traps are transformed into events according to preconfigured rules.
The Trapd
service daemon, which lets Meridian receive SNMP traps, is enabled by default.
Disabling the Trapd service daemon will render Meridian incapable of receiving SNMP traps.
|
Event definitions are included with Meridian for traps from many vendors' equipment.
Trap Value Representation
When octet strings are translated into event parameters, OpenNMS first attempts to treat them as character encodings. If all bytes in the string are valid UTF-8 or ISO-8859-1 characters, the string is stored as these characters. If this is not possible, the value is encoded as a Base64 string.
Traps Forwarded via Proxy
When SNMP traps are forwarded through a proxy using SNMPv2c or SNMPv3, preserving the original source IP address is a challenge due to the lack of an agent-addr
field in the TRAP-V2
PDU used in those protocol versions.
RFC 3584 defines an optional varbind snmpTrapAddress (.1.3.6.1.6.3.18.1.3.0)
that can be added to forwarded traps to convey the original source IP address.
To configure Meridian to honor snmpTrapAddress
when present, set use-address-from-varbind="true"
in the top-level element of ${OPENNMS_HOME}/etc/trapd-configuration.xml
and restart Meridian.
<trapd-configuration snmp-trap-port="1162"(1)
new-suspect-on-trap="false"(2)
use-address-from-varbind="true" />(3)
1 | Set the SNMP trap daemon listening port to 1162/udp |
2 | Don’t create new nodes when receiving a SNMP Trap with an unknown source IP address |
3 | Try using the identifier source IP address from the snmpTrapAddress varbind instead of the UDP source IP address |