got a little Problem with the SNMP-Test connectivityFailure on our IronPorts C370 & M670 and URL. All our Webtraffic has to be transportet over a Proxy-Server. Updates on the Ironport works, proxy ist configured, just the SNMP-Test fails. Is it possible that the SNMP-Test doesn`t use the proxy by design or any other ideas? Test-URL is http://downloads.ironport.com
Start with SNMP disabled, then use snmpconfig to enable the agent, and select the option to enable all traps. Because trap connectivityFailure is enabled, every 5 to 7 seconds (not configurable) the management interface (by default) will try to connect to downloads.ironport.com on port 80 (configurable). It will then try an HTTP GET request, and it will expect a response code between 200 and 300. If fail, then trap. That's the only test for this trap. The interval is not configurable, but the path is. Let's say alerts should be sent when the appliance cannot connect somewhere, but the firewall is blocking the management port from opening port 80 at downloads.ironport.com. Or the appliance is supposed to use the configured proxy and connectivityFailure trap should be sent if proxy is not reachable. The URL should be changed.
1. Assuming all traps are enabled, use snmpconfig to ENABLE trap #3 connectivityFailure in the list
AGAIN, or disable it and re-enable it, it makes no difference.
2. An extra question will pop up every time it is set to ENABLE i(except when ALL traps are enabled):
What URL would you like to check for connectivity failure?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :