<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: devices send snmp trap to stealthwach in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4777280#M1097885</link>
    <description>&lt;P&gt;Well, yes.&amp;nbsp; When you define an SNMP server you are essentially telling the ASA to send SNMP traps to that server. If you do not want the ASA to send any SNMP traps remove the commands for &lt;STRONG&gt;snmp-server enable traps&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Feb 2023 09:03:46 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2023-02-17T09:03:46Z</dc:date>
    <item>
      <title>devices send snmp trap to stealthwach</title>
      <link>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4776714#M1097850</link>
      <description>&lt;P&gt;I noticed strange situation, I configured netflow exporter on the asa's and snmp server for SMC to get name of interfaces, and I can see that SMC sent snmp request to device &amp;gt;161/udp, but device response to 162/udp. Why does it happen?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;flow-export destination inside 192.168.0.55 2055
flow-export template timeout-rate 1
flow-export delay flow-create 60

class-map Netflow_Monitor
match any


policy-map global_policy
class Netflow_Monitor
  flow-export event-type all destination 192.168.0.55

SNMP:
snmp-server host inside 192.168.0.50 community snmpCom ver 2c&lt;/LI-CODE&gt;</description>
      <pubDate>Thu, 16 Feb 2023 11:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4776714#M1097850</guid>
      <dc:creator>dijix1990</dc:creator>
      <dc:date>2023-02-16T11:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: devices send snmp trap to stealthwach</title>
      <link>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4776721#M1097853</link>
      <description>&lt;P&gt;UDP/161 is used for SNMP polling by default, and UDP/162 is used by the device to send unsolicited SNMP traps.&lt;/P&gt;
&lt;P&gt;did this answer your question?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 11:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4776721#M1097853</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-02-16T11:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: devices send snmp trap to stealthwach</title>
      <link>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4777130#M1097883</link>
      <description>&lt;P&gt;Hi, I know it, use it in zabbix, but why ASA sends snmp trap to SMC, maybe it usual situation for connecting with SMC, because I didn't configure snmp trap, I try to understand why my CPI server can get snmp response and SMC can't, configuration the same and when I start to check session and noticed that asa send snmp trap&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 02:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4777130#M1097883</guid>
      <dc:creator>dijix1990</dc:creator>
      <dc:date>2023-02-17T02:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: devices send snmp trap to stealthwach</title>
      <link>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4777131#M1097884</link>
      <description>&lt;P&gt;I found, when you run command -&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;snmp-server host inside 192.168.0.50 community snmpCom ver 2c&lt;/LI-CODE&gt;&lt;P&gt;asa does it as&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;snmp-server host inside 192.168.0.50 community snmpCom ver 2c udp-port 162&lt;/LI-CODE&gt;&lt;P&gt;so, it's because of asa behavour&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 02:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4777131#M1097884</guid>
      <dc:creator>dijix1990</dc:creator>
      <dc:date>2023-02-17T02:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: devices send snmp trap to stealthwach</title>
      <link>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4777280#M1097885</link>
      <description>&lt;P&gt;Well, yes.&amp;nbsp; When you define an SNMP server you are essentially telling the ASA to send SNMP traps to that server. If you do not want the ASA to send any SNMP traps remove the commands for &lt;STRONG&gt;snmp-server enable traps&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 09:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/devices-send-snmp-trap-to-stealthwach/m-p/4777280#M1097885</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-02-17T09:03:46Z</dc:date>
    </item>
  </channel>
</rss>

