Add or Change Trap Destination screen

When you click the Add or Change button on the Configure Trap Destinations screen, the Add Trap Destination or Change Trap Destination screen appears. These screens are similar, except that:

This topic covers:

Add or change a trap destination

To add a new trap destination, or to change information regarding an existing trap:

  1. On the main menu under the SNMP section, click the Configure Trap Destinations link.

  2. Choose the action you want to do next:

  3. When the appropriate screen appears, enter or modify the information as described below.

  4. Enable destination: Activate trap notification.

  5. IP address: Enter the IP address for the workstation that has the network management software (NMS)  that is to receive the trap notifications. This field is required for all versions of SNMP.

  6. SNMP version: Select the radio button for the version of SNMP that the corporate NMS is running. Fill out the required information for each version:

  7. When finished, click Add or Change.

Problems adding or changing traps

The Add or Change Trap Destinations screens display an error message if insufficient information is entered. To solve this:

  1. Review the error message to determine what information is missing.

  2. Click the Back button on your browser to return to the previous screen.

  3. Enter the required information, then click Add or Change again.

SNMP version-dependent information

The Avaya media server supports SNMP Version 1 (v1), Version 2c (v2c), and Version 3 (v3). Version-specific operation is covered in the following sections:

SNMP v2c and v3 inform operation

In SNMP v2c and v3, the media server can be configured to send informs. Informs are acknowledged traps, which means that the receiver of the trap is expected to respond with an SNMP message acknowledging receipt of the trap.

The destination port for an incoming inform/trap on the media server's corporate Ethernet interface is 162. The source port for this transaction is a random UDP port on this interface. If a firewall exists between the media server and the inform destination, then the firewall must be configured either to allow traffic on all user-based UDP ports, or to allow sessions in which a temporary hole is punched through the firewall (the recipient of the trap needs to get the acknowledgement back through the firewall). For the acknowledgement, the source port on the media server is 162 and the destination port is a random UDP port (the inverse of the what the inform had since the direction the packet is going is reversed).

For each destination, the media server's G3 alarm agent buffers alarms to be sent as informs; it does not send the next one until the current inform has been acknowledged. If a request is not acknowledged, the G3 alarm agent attempts the request again. This design may affect the timeliness in which alarms are reported. Also, alarms will be lost if the buffer fills up. To manage this, you can:

SNMP v3 user-based security model

SNMP v3 uses a user-based security model. If traps are to be sent using SNMP v3 with authentication and encryption, the trap receiver must be configured with the same user information (user name and passwords) to be able to authenticate and decrypt the message. If the user and password information doesn't match, authentication or decryption will fail and the trap will be discarded.

Also, in the authentication and privacy security models, SNMP v3 traps are sent using the v3 inform mechanism, but without retries (the media server makes only one attempt to send the trap). The v3 inform mechanism first obtains the necessary synchronization information by sending a query packet to the trap receiver. This query packet requires a response that has firewall implications. If a firewall exists between the media server and the trap destination, it must be configured to let the response through. If the firewall blocks the response, the inform will not succeed and an error message will be written to the Linux syslog.

Related topics

Configure Trap Destinations

Set LAN Security

Start/Stop SNMP Master Agent

View Process Status

View System Logs