03-09-2021 04:21 AM
Hello,
This weekend I upgradet to version 9.14(2)8, coming from 9.13(1)10. After that the SNMP-requests faild. It seems to me the problem is not yet solved.
Greatings
Theo Nelis
03-10-2021 02:09 PM
Hi. I have this exact same issue. Upgraded to 9.14(2)8 and since then our SNMP Server cannot connect to the ASA to authenticate.
We are using a Site to Site VPN and the SNMP server is on the other side of the VPN. This worked fine previously.
The SNMP poll interface is set to the same as the Management Access Interface.
04-03-2021 12:49 AM
Hi, problem not fixed in 9.14(2)13. Somebody knows when this is fixed ?
07-07-2021 11:46 PM
I'm tried 9.14.(2)15, 9.14.(3), 9.16.1 but still no luck
07-22-2021 03:42 AM
Hello,
Were you able to find a solution for this?
09-15-2021 12:59 AM
We are running 9.16.1, and have the same issue with PRTG where using SNMP to poll data over IPSec IKE1 and IKE2 VPN, which doesnt work. Anyting inside is working perfect.
Any news here?! **bleep** **bleep**......
07-22-2021 12:38 PM
Still working this issue, with no solution. Been on with support for months now.
07-23-2021 12:31 AM
I decided to include outside IP Adress of firewalls in crypto maps and use the workaround. I'm not sure if Cisco is fixing this. I tested workaround in lab and will use this when migrate to 9.14. Nevertheless the workaround is a deep impact on the configration of firewall and monitoring software.
07-26-2021 04:44 AM
Thank you Kerstin not a reliable solution knowing the risk of it especially if you dont have a public fix IP on your outside interface
Hope we will have a solution from Cisco with newer version
09-15-2021 01:00 AM
We are running 9.16.1, and have the same issue with PRTG where using SNMP to poll data over IPSec IKE1 and IKE2 VPN, which doesnt work. Anyting inside is working perfect.
Any news here?! **bleep** **bleep**..
11-25-2021 02:59 AM
Recently upgraded to 9.16.2 and this issues still persists.
Is Cisco really proposing that the solution is to push our SNMP traffic through the public internet 3 updates later?
Has there been any update on this and do Cisco plan to resolve this issue or is this "feature" here to stay?
04-05-2022 03:39 AM
Hi All !
it looks like is no resolved on 9.16(2)14 either (last recommended version as far as i know) anyone knows if this will be solved
05-16-2022 02:00 PM
Just upgraded to 9.16(3) and still not resolved, interestingly the Bug CSCvt97205 is showing as fixed but it is definitely not.
05-18-2022 01:05 AM
05-19-2022 04:02 AM
I guess they don't know how to fix. As of 9.14 snmpd runs under Linux as a separate NLP process (Non-Lina process) and connects to the outside world via internal nlp_int_tap interface. E.g. in 9.16.3:
ASA# show kernel ifconfig
tap_nlp Link encap:Ethernet HWaddr ba:1a:01:32:cc:cf
inet6 addr: fe80::b81a:1ff:fe32:cccf/64 Scope:Link
inet6 addr: fd00:0:0:1::2/64 Scope:Global
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:1434 errors:0 dropped:0 overruns:0 frame:0
TX packets:1464 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:101320 (98.9 KiB) TX bytes:109380 (106.8 KiB)
tap_nlp:1 Link encap:Ethernet HWaddr ba:1a:01:32:cc:cf
inet addr:169.254.1.2 Bcast:169.254.1.7 Mask:255.255.255.248
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
In order to reach the snmpd process running on 169.254.1.2 static NAT rule is created by the system between the interface used in the snmp-server command and the nlp_int_tap interface. E.g. when inside interface is used:
# snmp-server host inside 1.2.3.4 comm public version$
# show nat det
Manual NAT Policies Implicit (Section 0)
1 (nlp_int_tap) to (inside) source static nlp_server__snmp_1.2.3.4_intf2 interface destination static 0_1.2.3.4_18 0_1.2.3.4_18 service udp snmp snmp
translate_hits = 0, untranslate_hits = 0
Source - Origin: 169.254.1.2/32, Translated: 10.44.17.74/29
Destination - Origin: 1.2.3.4/32, Translated: 1.2.3.4/32
Service - Protocol: udp Real: snmp Mapped: snmp
As of 9.16 this rule is placed into the system section 0. It's unclear how to make use of this rule if traffic comes over VPN via outside interface. I guess it won't be hit even if "management-access inside" is configured (you can check untranslate_hits). Hence traffic doesn't reach snmpd. Also, another identity twice NAT rule is typically configured to exempt VPN traffic from NAT. If this rule is hit (on the outside), lookup isn't made for the 2nd one (system SNMP rule).
It's interesting what TAC is saying...
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide