SNMP Server NOT Receiving TRAP when NAT/PAT is used
I have an issue receiving snmp traps, The scenario is, we have 4 snmp servers (A,B,C,D), out of which A and B are required to do snmp polling & trap , where as the server C, D are doing snmp polling only. There is a FTD firewall in between snmp servers (Inside) and the network devices (Outside ). Note that each network devices has unique public ip.
So we configured a Policy based PAT (inside -> outside) for all the 4 servers with a Public ip (E) , and there are two Static UNI-DIRECTIONAL NAT ( outside -> inside) for server A & B with public ip F, G to receive SNMP Traps.
Now there is no issue with SNMP polling, but there is no snmp trap traffic observed on FTD and SNMP server from network devices ,even though the snmp configuration is correct on the network devices.
My question is , is there any relation between NAT/PAT with SNMP traps to receive.
why the snmp servers are not receiving snmp traps from network devices, if a uni-directional static nat is configured for snmp servers.
A brief explanation and a solution is expected from experts. a sample diagram is attached.
SymptomsOutage during FTD code upgrade DiagnosisThe FTD code upgrade thru FMC will cause the traffic interruptionSolutionBelow process will upgrade the FTD with no downtime and no traffic interruption.Before the upgrade process:Download the FTD platf...
Process for FTD migration with PolicyAs per Cisco documentation, we have below steps for for de-register and register process. Please follow below steps :Step 1 : Break HA pair and de-register your FTD from FMC (old).Step 2 : Register your primary FTD wit...
Hi There,Is there a relationship between the hardware of the Cisco ASA 5505 FWs (V02) and the 9.x software version? Multiple ASA have been successfully updated with the same software. The ASAs that have been updated without any problems are V06 versi...
Dear Cisco Customers and Partners,
We know that the Cisco Identity Services Engine (ISE) is a critical element of your network security and so stability is of paramount importance. As a result, many of you asked us for a suggested release given sev...
Over 100-year-old Yokogawa Engineering Asia deploys Cisco Advanced Malware Protection (AMP) to shield itself against cyber attacks. With Cisco Talos threat intelligence, it stays ahead of the latest malicious behavior on the Internet. Learn more at http:/...