snmp traps / syslog message for optical values out normal range
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎08-09-2019 09:28 AM
show port 1:1 transceiver information
Port Temp TxPower RxPower TxBiasCurrent Voltage-Aux1/ Voltage-Aux2
(Celsius) (dBm) (dBm) (mA) Vcc (Volts) (Volts)
================================================================================
1:1 39.81 2.02 0.53* 8.86 3.31 N/A
================================================================================
N/A - parameter not applicable to transceiver connected to the port
* - value is out of normal range
-inf - negative infinity, parameter not defined
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎04-09-2020 07:51 AM
Hi!
The SE left Extreme for another job, so I’m afraid the request was dropped. I’ll see if I can get a customer or two to add this to their feature request lists. I brushed off the old email conversation and sent it again to the new SE among others, so we’ll see what happens. You’re more than welcome to remind me again in some time! I’ll try to remember to update you on the progress.
/Fredrik
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎04-09-2020 07:12 AM
Fredrik, did u get any response from the Swedish Extreme team?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎08-28-2019 01:31 PM
Also, I saw EtherMAN was using 21.4.1.4. We discovered a bug in that release that gave us the following symptoms:
xos0070961 - Broadcast SNMP get/set-request are being processed by switch eventhough no IP configured on any VLAN
The switch interprets and executes snmp for packets just going through a switch on a plain L2 VLAN, and even if there is no ip connectivity between the snmp client and the switch. You should NOT use generic communities like public and, specifically, not private, even if you think your switches' management IP is protected from the clients. We did a test where an SNMP packet was sent to the broadcast address with the correct SNMP SET community and we could then manipulate anything we wanted via these packets. I'm not sure in what release this was fixed, but we mitigated this with specific ACLs.
/Fredrik
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎08-26-2019 04:41 PM
Real question still remains is why a EXOS switch is sending out a trap as a ENTERASYS-MIB-NAMES|etsysModuleName-5624-1-2.85.1.0.2 when is should be not send out trap at all or sending out a private vendor trap as a EXOS switch
