Switches, Hubs, and Modems
cancel
Showing results for 
Search instead for 
Did you mean: 

HP 2900 vs 2610 - SNMP trap on auth failure

HP 2900 vs 2610 - SNMP trap on auth failure

Hi all,
on my HP2900 switches i enable traps
on failed CLI authentication login by using:

snmp-server enable traps login-failure-mgt

is there a command like that on procurve 2610 switches? I tried with:

snmp-server enable traps authentication

but it doesn't seem to work.

4 REPLIES
Pieter 't Hart
Honored Contributor

Re: HP 2900 vs 2610 - SNMP trap on auth failure

the Management and Configuration Guide says
1. Establish a Notification with the snmpv3 notify command.
2. Point the notification to a Address with the snmpv3 targetaddress command.
3. Establish a parameter record for the target address with the snmpv3 params command.
Pieter 't Hart
Honored Contributor

Re: HP 2900 vs 2610 - SNMP trap on auth failure

also :
Trap Receiver Commands Page 13-21
snmp-server host
[none | all | non-info| critical | debug]
snmp-server enable traps authentication

try "show snmp-server" to see current settings, maybe comunity name or level is wrong.
Pieter 't Hart
Honored Contributor

Re: HP 2900 vs 2610 - SNMP trap on auth failure

The comunity-name must be defined first :
=> from same manual :
If you specify a community name that does not existâ that is, has not yet been configured on the switchâ the switch still accepts the trap receiver assignment. However, no traps will be sent to that trap receiver until the community to which it belongs has been configured on the switch.

Re: HP 2900 vs 2610 - SNMP trap on auth failure

Hi.

I did not receive traps on failed authentication. Other traps are fine.

-----------------

show snmp-server

SNMP Communities

Community Name MIB View Write Access
---------------- -------- ------------
public Manager Restricted
xxxxxxxxx Manager Unrestricted

Trap Receivers

Link-Change Traps Enabled on Ports [All] : All

Send Authentication Traps [No] : Yes

Address Community Events Sent Notify Type Retry Timeout
--------------------- --------------- ----------- ----------- ----- -------
192.168.XXX.YYY public None trap 3 15


Excluded MIBs


Snmp Response Pdu Source-IP Information

Selection Policy : rfc1517

Trap Pdu Source-IP Information

Selection Policy : rfc1517