<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Interpreting SNMP Trap Events in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/interpreting-snmp-trap-events/m-p/1319226#M76882</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can lookup OIDs at this tool:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?local=en" target="_blank"&gt;http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?local=en&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are many free/commercial SNMP trap collectors that would help you in this purpose. Scripting can get really involved sometimes, but of course if you are an expert at it, no need to pay money to achieve your desired objectives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Jun 2009 12:59:48 GMT</pubDate>
    <dc:creator>Farrukh Haroon</dc:creator>
    <dc:date>2009-06-24T12:59:48Z</dc:date>
    <item>
      <title>Interpreting SNMP Trap Events</title>
      <link>https://community.cisco.com/t5/network-security/interpreting-snmp-trap-events/m-p/1319225#M76881</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm currently receiving SNMP traps for important alerts from the IPS we have set up.  The logs for these traps look something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ent Value 6: .1.3.6.1.4.1.9.9.383.1.2.3=This signature is a Metacomponent&lt;/P&gt;&lt;P&gt;Ent Value 7: .1.3.6.1.4.1.9.9.383.1.2.4=Visual Studio Msmask32.ocx ActiveX Buffer Overflow&lt;/P&gt;&lt;P&gt;Ent Value 8: .1.3.6.1.4.1.9.9.383.1.2.5=6990&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First, how can I find out what strings like "Ent Value 8: .1.3.6.1.4.1.9.9.383.1.2.5" mean?  Is it important?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second, what is the best way to interpret these traps?  I'm assuming I need to write a custom script to gather the important details and do what I want with them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any pointers would be very helpful!  I just want to know what I'm getting myself into. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interpreting-snmp-trap-events/m-p/1319225#M76881</guid>
      <dc:creator>natehausrath</dc:creator>
      <dc:date>2019-03-10T11:40:33Z</dc:date>
    </item>
    <item>
      <title>Re: Interpreting SNMP Trap Events</title>
      <link>https://community.cisco.com/t5/network-security/interpreting-snmp-trap-events/m-p/1319226#M76882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can lookup OIDs at this tool:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?local=en" target="_blank"&gt;http://tools.cisco.com/Support/SNMP/do/BrowseOID.do?local=en&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are many free/commercial SNMP trap collectors that would help you in this purpose. Scripting can get really involved sometimes, but of course if you are an expert at it, no need to pay money to achieve your desired objectives.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jun 2009 12:59:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interpreting-snmp-trap-events/m-p/1319226#M76882</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2009-06-24T12:59:48Z</dc:date>
    </item>
    <item>
      <title>Re: Interpreting SNMP Trap Events</title>
      <link>https://community.cisco.com/t5/network-security/interpreting-snmp-trap-events/m-p/1319227#M76883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Farrukh.  That's what I was looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now to either find a good free parser, or figure out the simplest way to do this myself...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jun 2009 13:07:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/interpreting-snmp-trap-events/m-p/1319227#M76883</guid>
      <dc:creator>natehausrath</dc:creator>
      <dc:date>2009-06-24T13:07:28Z</dc:date>
    </item>
  </channel>
</rss>

