<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SNMP AuthErrors Source in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/snmp-autherrors-source/m-p/68385#M18548</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;one of our switches showed a high cpu utilization and after a short look it seemed that someone sends SNMP requests without or with wrong authentication:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;SNMP stats:&lt;BR /&gt;InPkts 10230358 OutPkts   10230357 Errors 10188902 AuthErrors 10188902&lt;BR /&gt;Gets   10197808 GetNexts  32068   Sets   0       Drops      0&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;(Errors and AuthErrors kept increasing fast)&lt;/P&gt;&lt;P&gt;So I just checked the logs and thought I would find the source for these requests. Well, the only logs I found were in nvram and months old:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;07/08/2020 07:08:19.96 &amp;lt;Warn:SNMP.Master.AuthFail&amp;gt; Login failed through SNMPv1/v2c - bad community name (192.168.x.x)&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;The log configuration is default:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;show configuration ems detail &lt;BR /&gt;#&lt;BR /&gt;# Module ems configuration.&lt;BR /&gt;#&lt;BR /&gt;disable log debug-mode&lt;BR /&gt;configure log messages privilege admin&lt;BR /&gt;configure log filter DefaultFilter add events All &lt;BR /&gt;enable log target memory-buffer &lt;BR /&gt;configure log target memory-buffer filter DefaultFilter severity Debug-Data&lt;BR /&gt;configure log target memory-buffer match Any&lt;BR /&gt;enable log target nvram &lt;BR /&gt;configure log target nvram filter DefaultFilter severity Warning&lt;BR /&gt;configure log target nvram match Any&lt;BR /&gt;configure log target nvram format timestamp hundredths date mm/dd/yyyy event-name condition severity &lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;Any idea why these&amp;nbsp; AuthFails have been logged in the past, but now this isn’t the case anymore? Maybe changed with a newer firmware? (Switch currently runs 30.7.1.1-patch1-86)&amp;nbsp;&lt;/P&gt;&lt;P&gt;These logs have “Warning” as their severity, which should be included in both the memory-buffer (Debug-Data) and nvram logs (warning)&amp;nbsp; or do I miss something?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;BR /&gt;Stefan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Mar 2021 02:22:43 GMT</pubDate>
    <dc:creator>Stefan_K_</dc:creator>
    <dc:date>2021-03-12T02:22:43Z</dc:date>
    <item>
      <title>SNMP AuthErrors Source</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/snmp-autherrors-source/m-p/68385#M18548</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;one of our switches showed a high cpu utilization and after a short look it seemed that someone sends SNMP requests without or with wrong authentication:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;SNMP stats:&lt;BR /&gt;InPkts 10230358 OutPkts   10230357 Errors 10188902 AuthErrors 10188902&lt;BR /&gt;Gets   10197808 GetNexts  32068   Sets   0       Drops      0&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;(Errors and AuthErrors kept increasing fast)&lt;/P&gt;&lt;P&gt;So I just checked the logs and thought I would find the source for these requests. Well, the only logs I found were in nvram and months old:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;07/08/2020 07:08:19.96 &amp;lt;Warn:SNMP.Master.AuthFail&amp;gt; Login failed through SNMPv1/v2c - bad community name (192.168.x.x)&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;The log configuration is default:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;show configuration ems detail &lt;BR /&gt;#&lt;BR /&gt;# Module ems configuration.&lt;BR /&gt;#&lt;BR /&gt;disable log debug-mode&lt;BR /&gt;configure log messages privilege admin&lt;BR /&gt;configure log filter DefaultFilter add events All &lt;BR /&gt;enable log target memory-buffer &lt;BR /&gt;configure log target memory-buffer filter DefaultFilter severity Debug-Data&lt;BR /&gt;configure log target memory-buffer match Any&lt;BR /&gt;enable log target nvram &lt;BR /&gt;configure log target nvram filter DefaultFilter severity Warning&lt;BR /&gt;configure log target nvram match Any&lt;BR /&gt;configure log target nvram format timestamp hundredths date mm/dd/yyyy event-name condition severity &lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;Any idea why these&amp;nbsp; AuthFails have been logged in the past, but now this isn’t the case anymore? Maybe changed with a newer firmware? (Switch currently runs 30.7.1.1-patch1-86)&amp;nbsp;&lt;/P&gt;&lt;P&gt;These logs have “Warning” as their severity, which should be included in both the memory-buffer (Debug-Data) and nvram logs (warning)&amp;nbsp; or do I miss something?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;BR /&gt;Stefan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 02:22:43 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/snmp-autherrors-source/m-p/68385#M18548</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2021-03-12T02:22:43Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP AuthErrors Source</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/snmp-autherrors-source/m-p/68386#M18549</link>
      <description>&lt;P&gt;Hi Stefan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;just tested with a switch using 30.7.1.1-pacth1-86, an snmpv2 request with wrong community would be reported in the logs like that.&lt;/P&gt;&lt;P&gt;An snmpv3 request with wrong credentials however would not be logged by default and I cannot see a log event that you could enable.&lt;/P&gt;&lt;P&gt;However, I would recommend applying an access-profile to protect snmp and allow only SNMP from trusted IP addresses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 16:16:21 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/snmp-autherrors-source/m-p/68386#M18549</guid>
      <dc:creator>OscarK</dc:creator>
      <dc:date>2021-03-12T16:16:21Z</dc:date>
    </item>
    <item>
      <title>Re: SNMP AuthErrors Source</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/snmp-autherrors-source/m-p/68387#M18550</link>
      <description>&lt;P&gt;Hello Oscar,&lt;/P&gt;&lt;P&gt;thanks for your answer!&lt;/P&gt;&lt;P&gt;Yes, I could simply block those SNMP requests, but this would only cure the symptoms, not the cause. In this case we were able to find the device that sent the SNMP packets, because my customer remembered that they had an old monitoring-system. In other cases it would be nice to find the source of the SNMP packets (I mean, it&amp;nbsp; was possible for snmpv2, why not for snmpv3?) without using port-mirrors and checking tcp-dumps or something like that.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Mar 2021 18:15:49 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/snmp-autherrors-source/m-p/68387#M18550</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2021-03-12T18:15:49Z</dc:date>
    </item>
  </channel>
</rss>

