<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX and SNMP traps? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-and-snmp-traps/m-p/397607#M698257</link>
    <description>&lt;P&gt;I see in the OpenView NNM Alarm Browser that PIX firewalls are hammering NNM with snmp traps about connections (show conn).  This is overloading NNM.  I propose the following change to stop trapping to NNM, but allow polling only;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BCBS-Pix515# show snmp&lt;/P&gt;&lt;P&gt;snmp-server host inside 10.10.254.233&lt;/P&gt;&lt;P&gt;snmp-server enable traps&lt;/P&gt;&lt;P&gt;BCBS-Pix515# config t&lt;/P&gt;&lt;P&gt;BCBS-Pix515(config)# snmp-server host inside 10.20.254.233 poll&lt;/P&gt;&lt;P&gt;BCBS-Pix515(config)#&lt;/P&gt;&lt;P&gt;!--- The host can query but is not to be sent traps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reference;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094a13.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094a13.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd still like to get traps, just not the connection entries, is there a better way?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 07:52:44 GMT</pubDate>
    <dc:creator>jason.aarons</dc:creator>
    <dc:date>2020-02-21T07:52:44Z</dc:date>
    <item>
      <title>PIX and SNMP traps?</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-snmp-traps/m-p/397607#M698257</link>
      <description>&lt;P&gt;I see in the OpenView NNM Alarm Browser that PIX firewalls are hammering NNM with snmp traps about connections (show conn).  This is overloading NNM.  I propose the following change to stop trapping to NNM, but allow polling only;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BCBS-Pix515# show snmp&lt;/P&gt;&lt;P&gt;snmp-server host inside 10.10.254.233&lt;/P&gt;&lt;P&gt;snmp-server enable traps&lt;/P&gt;&lt;P&gt;BCBS-Pix515# config t&lt;/P&gt;&lt;P&gt;BCBS-Pix515(config)# snmp-server host inside 10.20.254.233 poll&lt;/P&gt;&lt;P&gt;BCBS-Pix515(config)#&lt;/P&gt;&lt;P&gt;!--- The host can query but is not to be sent traps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reference;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094a13.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a0080094a13.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd still like to get traps, just not the connection entries, is there a better way?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:52:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-snmp-traps/m-p/397607#M698257</guid>
      <dc:creator>jason.aarons</dc:creator>
      <dc:date>2020-02-21T07:52:44Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and SNMP traps?</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-snmp-traps/m-p/397608#M698258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can turn off logging for just that particular message, something like:&lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;/B&gt;&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should get the TCP and UDP connection syslogs.  If there's another particular message that you're seeing a lot of, just add the above commands, the message number is the first number in the line.  For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%PIX-6-&lt;B&gt;302015&lt;/B&gt;: Built outbound UDP connection number for 10.1.1.1 to 200.1.1.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jan 2005 22:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-snmp-traps/m-p/397608#M698258</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2005-01-18T22:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: PIX and SNMP traps?</title>
      <link>https://community.cisco.com/t5/network-security/pix-and-snmp-traps/m-p/397609#M698259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't want to disable syslog, but rather SNMP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2005 00:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-and-snmp-traps/m-p/397609#M698259</guid>
      <dc:creator>jason.aarons</dc:creator>
      <dc:date>2005-01-19T00:41:41Z</dc:date>
    </item>
  </channel>
</rss>

