<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Disable SNMP authentication fail message in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58675#M17370</link>
    <description>Create Date: Mar  6 2013  9:25PM&lt;BR /&gt;
&lt;BR /&gt;
Apply a filter to your log config - the syntax is a bit complex so I'd say just search the concepts guide for it. I'd also apply an access-list to your SNMP service (as well as any other management services you run, like SSH or telnet) like so:&lt;BR /&gt;
&lt;BR /&gt;
Policy: ManagementAccess&lt;BR /&gt;
entry AllowTheseSubnets { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    source-address x.x.x.x /yy ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    permit  ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
This will cause a different log message to show up when it denies access, so be sure to filter that one as well.  (from Ansley_Barnes)</description>
    <pubDate>Wed, 08 Jan 2014 05:59:00 GMT</pubDate>
    <dc:creator>EtherNation_Use</dc:creator>
    <dc:date>2014-01-08T05:59:00Z</dc:date>
    <item>
      <title>Disable SNMP authentication fail message</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58674#M17369</link>
      <description>Create Date: Mar  6 2013  8:01PM&lt;BR /&gt;
&lt;BR /&gt;
Hi guys this message is filling up my syslog database "SNMP.Master: : Login failed through SNMPv1/v2c - bad community name" is there anyway that i can block a this message from generating a syslog message. Or block an ip from trying to connect throuch snmp to my switch?  (from Samueltechking)</description>
      <pubDate>Wed, 08 Jan 2014 05:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58674#M17369</guid>
      <dc:creator>EtherNation_Use</dc:creator>
      <dc:date>2014-01-08T05:59:00Z</dc:date>
    </item>
    <item>
      <title>RE: Disable SNMP authentication fail message</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58675#M17370</link>
      <description>Create Date: Mar  6 2013  9:25PM&lt;BR /&gt;
&lt;BR /&gt;
Apply a filter to your log config - the syntax is a bit complex so I'd say just search the concepts guide for it. I'd also apply an access-list to your SNMP service (as well as any other management services you run, like SSH or telnet) like so:&lt;BR /&gt;
&lt;BR /&gt;
Policy: ManagementAccess&lt;BR /&gt;
entry AllowTheseSubnets { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    source-address x.x.x.x /yy ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    permit  ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
This will cause a different log message to show up when it denies access, so be sure to filter that one as well.  (from Ansley_Barnes)</description>
      <pubDate>Wed, 08 Jan 2014 05:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58675#M17370</guid>
      <dc:creator>EtherNation_Use</dc:creator>
      <dc:date>2014-01-08T05:59:00Z</dc:date>
    </item>
    <item>
      <title>RE: Disable SNMP authentication fail message</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58676#M17371</link>
      <description>Create Date: Mar  7 2013  2:28PM&lt;BR /&gt;
&lt;BR /&gt;
To create a log filter you need to run the command:&lt;BR /&gt;
configure log filter "DefaultFilter" add exclude events SNMP.Master.AuthFail&lt;BR /&gt;
&lt;BR /&gt;
That will stop those message from occurring. However, those messages have an IP address in them from the source that is approaching the switch with "bad" community name. Have you checked what that IP address is?  (from ethernet)</description>
      <pubDate>Wed, 08 Jan 2014 05:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58676#M17371</guid>
      <dc:creator>EtherNation_Use</dc:creator>
      <dc:date>2014-01-08T05:59:00Z</dc:date>
    </item>
    <item>
      <title>RE: Disable SNMP authentication fail message</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58677#M17372</link>
      <description>Create Date: Mar  7 2013  4:25PM&lt;BR /&gt;
&lt;BR /&gt;
&lt;I&gt;ansleybarnes wrote:&lt;/I&gt;&lt;BR /&gt;
Apply a filter to your log config - the syntax is a bit complex so I'd say just search the concepts guide for it. I'd also apply an access-list to your SNMP service (as well as any other management services you run, like SSH or telnet) like so:&lt;BR /&gt;
&lt;BR /&gt;
Policy: ManagementAccess&lt;BR /&gt;
entry AllowTheseSubnets { &lt;BR /&gt;
if match all { &lt;BR /&gt;
    source-address x.x.x.x /yy ;&lt;BR /&gt;
}&lt;BR /&gt;
then {&lt;BR /&gt;
    permit  ;&lt;BR /&gt;
}&lt;BR /&gt;
}&lt;BR /&gt;
&lt;BR /&gt;
This will cause a different log message to show up when it denies access, so be sure to filter that one as well. I should note that the access-list doesn't have anything to do with the log messages - it's just a good idea to prevent management traffic from unauthorized sources from hitting the switch in the first place.&lt;BR /&gt;
&lt;BR /&gt;
  (from Ansley_Barnes)</description>
      <pubDate>Wed, 08 Jan 2014 05:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58677#M17372</guid>
      <dc:creator>EtherNation_Use</dc:creator>
      <dc:date>2014-01-08T05:59:00Z</dc:date>
    </item>
    <item>
      <title>RE: Disable SNMP authentication fail message</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58678#M17373</link>
      <description>Create Date: Mar  7 2013  4:46PM&lt;BR /&gt;
&lt;BR /&gt;
ansleybarnes. You bring up a great point. It is definitely a best practice to configure a policy where you only allow a specific IP (or IPs) to talk to the switch via SNMP. The same goes for telnet and SSH access.  (from ethernet)</description>
      <pubDate>Wed, 08 Jan 2014 05:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58678#M17373</guid>
      <dc:creator>EtherNation_Use</dc:creator>
      <dc:date>2014-01-08T05:59:00Z</dc:date>
    </item>
    <item>
      <title>RE: Disable SNMP authentication fail message</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58679#M17374</link>
      <description>Create Date: Mar  8 2013 12:18AM&lt;BR /&gt;
&lt;BR /&gt;
Thanks it worked. Yes it has an IP address. Its one of my coworker's computer running spiceworks.   (from Samueltechking)</description>
      <pubDate>Wed, 08 Jan 2014 05:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58679#M17374</guid>
      <dc:creator>EtherNation_Use</dc:creator>
      <dc:date>2014-01-08T05:59:00Z</dc:date>
    </item>
    <item>
      <title>RE: Disable SNMP authentication fail message</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58680#M17375</link>
      <description>Create Date: Mar  8 2013 12:20AM&lt;BR /&gt;
&lt;BR /&gt;
Thanks for your help. I didnt use this option because im not good at cofiguring acls on extreme switches. The syntax is a bit difficult but you are right its better to block it completely. Filtering the syslog is just hiding the problem.   (from Samueltechking)</description>
      <pubDate>Wed, 08 Jan 2014 05:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58680#M17375</guid>
      <dc:creator>EtherNation_Use</dc:creator>
      <dc:date>2014-01-08T05:59:00Z</dc:date>
    </item>
    <item>
      <title>RE: Disable SNMP authentication fail message</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58681#M17376</link>
      <description>Create Date: Mar 11 2013 12:13AM&lt;BR /&gt;
&lt;BR /&gt;
ACLs can be a bit intimidating, but applying the management policy files is pretty easy. You can copy/paste the one I put up above, changing the IP info so it's applicable of course, save it (in this example as ManagementAccess) then enable it like so:&lt;BR /&gt;
&lt;BR /&gt;
enable ssh2 access-profile ManagementAccess vr "VR-Default"&lt;BR /&gt;
configure snmp access-profile ManagementAccess&lt;BR /&gt;
&lt;BR /&gt;
That'll help boost your management security without complicating things.&lt;BR /&gt;
&lt;BR /&gt;
  (from Ansley_Barnes)</description>
      <pubDate>Wed, 08 Jan 2014 05:59:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/disable-snmp-authentication-fail-message/m-p/58681#M17376</guid>
      <dc:creator>EtherNation_Use</dc:creator>
      <dc:date>2014-01-08T05:59:00Z</dc:date>
    </item>
  </channel>
</rss>

