[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference 7.286::fddi

Title:FDDI - The Next Generation
Moderator:NETCAD::STEFANI
Created:Thu Apr 27 1989
Last Modified:Thu Jun 05 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:2259
Total number of notes:8590

502.0. "SNMP Traps on DECconcentrator 500????" by CSC32::WOESTEMEYER (Why??...Why not!!!) Mon Mar 16 1992 16:01

As almost a last resort, I hope that someone can assit me with SNMP
Traps on a DECconcentrator 500, V3.1.

At this point in time I have managed to set the IP address for SNMP
traps to be sent to via DECmcc - ELM.  I have set up a sink via DECmcc 
and alarms to check for interface ups.  No matter how I initialize a link
off the concentrator, power cycle the box, disable/enable a link, etc 
I can not get a trap to fire.  Using a similar alarm I can get the same
type of trap from a Translan Bridge.

Looking at snmpinTraps and snmpoutTraps via the SNMP/TCPIP access module 
these counters do not increment, staying at "0".  Since the only SNMP
managaement station I have available to me is DECmcc and the SNMP access
module I have added the DEC_ELAN_VENDOR_MIB_V20 to the dictionary and parse
tables.

The release notes for V3.1 of the concentrator indicates that the DEC
Vendor MIB, has "futher details" for setting up traps, yet I can find
no details to help in this questions.  The release notes also indicate
which SNMP object is to be the hostIpAddress for SNMP traps, how or can 
the hostIpAddress be set via the SNMP access module?

Last but not least, the customer I am working with upgraded all his 
DECconcentrator 500 from Model A01 to A03, with the console port.  
He used the console port to set his hostIpAddress.  I have access to the
same model concentrator and have tried using the RS232 port, unsuccessfully. 
All I can get out if it is garbage, does someone know the speed, character
size, and parity this port uses?

Thanks for any and all Help,
Steve Woestemeyer
CSC/CS - Network Support Team

Cross Posted in FDDI and MCC conferences

T.RTitleUserPersonal
Name
DateLines
502.1LEVERS::ANILMon Mar 16 1992 20:549
    DECconcentrator v3.1 sends traps to the community 'public'
    (ie, this is the community name in the Trap PDU).  I haven't set
    up a trap sink on MCC but assuming that it allows you to enter
    the expected community name in this process, it should be set up to
    accept 'public'.  Alternatively you could set up the DEFCN to
    send traps to whatever community MCC likes.  (look at the eauth
    group in DEC-ELAN-MIB to see how)
    
    Anil
502.2PUBLIC is being usedCSC32::WOESTEMEYERWhy??...Why not!!!Tue Mar 17 1992 07:506
    I have been using the default community name, which according to the
    release notes is 'public'.  As I stated in .0 it does no seem that the
    concentrator is even processing traps, the snmpintrap and snmpouttrap
    counters being 0.
    
    Any more ideas??
502.3Traps and Out of Band ManagementMUSSEL::C_MCDONALDTue Mar 17 1992 09:2515
Steve,

	Did you say you had set up your hostIPAddress in the concentrator trap
table?  Its possible that if there are no 'trap addresses' or hostIPAddresses
to notify in the event of a trap that our code will not bump the counters as
well.

	Secondly, with the Out of Band management set the baud rate to 2400.
Then I believe either 7 or 8 bits with no parity should allow you to use it.
You can set hostIPAddresses for the trap table through Out of Band Management.

	Give it a try and let me know what happens.


Charlie
502.4Still no successCSC32::WOESTEMEYERWhy??...Why not!!!Wed Mar 18 1992 10:50423
Well, 
    
    I seem to be able to get traps from a tranlan bridge, but not a
    concentrator.  Attached is a log from MCC which shows success for
    the translan but not the concentrator.  
    
    Open to any further ideas/suggestions.  
    
    Steve
    ------------------------------------------------------------------
display
!                         Default Entity = 
!                      Default Qualifier = 
!                                 Prompt = MCC> 
!                            Indentation = 42
!
!                            Symbol Name   Symbol Value
!                            -----------   ------------
!                                     BR : bridge
!                                     CN : concentrator
!                                     N4 : node4
!                                     SH : show
!                                     ST : station
!                                     TS : terminal_server
!
!No notify requests are currently in progress
!Command procedure verification is OFF
!Logging is ON, Logging file is snmp_trap.log
!
!>> set concentrator IP address
!
set concentrator nsu_con_1 ip address 16.63.16.187
!
!CONCENTRATOR KEROON_NS:.nsu_con_1 
!AT 18-MAR-1992 06:03:46 Characteristics
!
!Modification completed successfully.
!                             IP Address = 16.63.16.187
!
!>> add concentrator trap address
!
add concentrator nsu_con_1 trap address 16.63.16.27
!
!CONCENTRATOR KEROON_NS:.nsu_con_1 
!AT 18-MAR-1992 06:04:13 Characteristics
!
!The address was successfully added to the Trap Table.
!
!>> verify ip and trap addresses set
!
show concentrator nsu_con_1 all char
!
!CONCENTRATOR KEROON_NS:.nsu_con_1 
!AT 18-MAR-1992 06:04:29 Characteristics
!
!Examination of attributes shows:
!                          Hardware Type = DEFCN DECconcentrator 500
!                       Firmware Version = V0.0.0
!                                     ID = %X08002B168DD1
!                  Reset Defaults Switch = True
!                             IP Address = 16.63.16.187
!                     Trap Address Table = { 16.63.16.27 }
!                          Update Switch = False
!                       Software Version = "V3.1     "
!
!>> verify SNMP to nsu-con-1
!
show snmp nsu-con-1 snmp all char
!
!SNMP nsu-con-1 snmp 
!AT 18-MAR-1992 06:04:55 Characteristics
!
!Examination of attributes shows:
!                  snmpEnableAuthenTraps = disabled
!
! > Enable authentification Traps
!
set snmp nsu-con-1 snmp snmpEnableAuthenTraps enabled, by pass 08002b168dd1
!
!SNMP nsu-con-1 snmp 
!AT 18-MAR-1992 06:05:47 Characteristics
!
!Examination of Attributes Shows
!                  snmpEnableAuthenTraps = enabled
!
!>> Show SNMP counters for nsu-con-1
!>> note snmpOutTraps = 0
!
show snmp nsu-con-1 snmp all count
!
!SNMP nsu-con-1 snmp 
!AT 18-MAR-1992 06:06:18 Counters
!
!Examination of attributes shows:
!                           snmpOutTraps = 0
!                    snmpOutGetResponses = 6
!                     snmpOutSetRequests = 0
!                        snmpOutGetNexts = 0
!                     snmpOutGetRequests = 0
!                         snmpOutGenErrs = 0
!                       snmpOutBadValues = 0
!                     snmpOutNoSuchNames = 0
!                         snmpOutTooBigs = 0
!                            snmpInTraps = 0
!                     snmpInGetResponses = 0
!                      snmpInSetRequests = 1
!                         snmpInGetNexts = 0
!                      snmpInGetRequests = 5
!                     snmpInTotalSetVars = 1
!                     snmpInTotalReqVars = 25
!                          snmpInGenErrs = 0
!                        snmpInReadOnlys = 0
!                        snmpInBadValues = 0
!                      snmpInNoSuchNames = 0
!                          snmpInTooBigs = 0
!                     snmpInASNParseErrs = 0
!                 snmpInBadCommunityUses = 0
!                snmpInBadCommunityNames = 0
!                      snmpInBadVersions = 0
!                            snmpOutPkts = 7
!                             snmpInPkts = 8
!                    CounterCreationTime = 17-MAR-1992 15:08:52.05
!
!>> use SNMP to nsu-con-1 to verify communities
!>> note eauthTrapcommunity translates to 'public'
!
show snmp nsu-con-1 dec eauth1 all char, by pass 08002b168dd1
!
!SNMP nsu-con-1 dec eauth1 
!AT 18-MAR-1992 06:07:34 Characteristics
!
!Examination of attributes shows:
!                     eauthTrapCommunity = %X7075626C6963
!                 eauthReadOnlyCommunity = %X7075626C6963
!                eauthReadWriteCommunity = %X303830303262313638646431
!
!
!>> verify via SNMP that the trap address is set.
!
show snmp nsu-con-1 dec eauth1 EAUTHTRAPUSERTABLE * all char, by pass 08002b168dd1
!
!SNMP nsu-con-1 dec eauth1 eauthTrapUserTable 16.63.16.27 
!AT 18-MAR-1992 06:10:00 Characteristics
!
!Examination of attributes shows:
!                    eauthTrapUserStatus = other
!
show snmp nsu-con-1 dec eauth1 EAUTHTRAPUSERTABLE * all iden, by pass 08002b168dd1
!
!SNMP nsu-con-1 dec eauth1 eauthTrapUserTable 16.63.16.27 
!AT 18-MAR-1992 06:10:16 Identifiers
!
!Examination of attributes shows:
!                      eauthTrapUserAddr = 16.63.16.27
!
!
!>> show alrams rules for traps to 2 devices, nsu-con-1 and TL350-1
!>> note alarms enabled in an IMPM session
!
show mcc 0 alarms rule nsu-con-1_auth_file all char, in domain snmp
!
!MCC 0 ALARMS RULE nsu-con-1_auth_file 
!AT 18-MAR-1992 06:31:41 Characteristics
!
!Examination of attributes shows:
!                              Procedure = SYS$COMMON:[MCC]MCC_ALARMS_MAIL_ALARM.
!                                          COM;5
!                      Exception Handler = SYS$COMMON:[MCC]MCC_ALARMS_MAIL_EXCEPT
!                                          ION.COM;1
!                            Description = " Authentification failure  on 
!                                          NSU-CON-1 "
!                               Category = "NSU-CON-1 SNMP Auth Fail"
!                                  Queue = "sys$batch"
!                              Parameter = "keroon::woestemeyer"
!                             Expression = (OCCURS (SNMP NSU-CON-1 
!                                          authenticationfailure))
!                     Perceived Severity = Warning
!                             Event Type = QualityofServiceAlarm
!                         Probable Cause = Unknown
!
!
show mcc 0 alarms rule tl350-1_devspec, in domain snmp
!Using default ALL IDENTIFIERS
!
!MCC 0 ALARMS RULE tl350-1_devspec 
!AT 18-MAR-1992 06:32:24 Identifiers
!
!Examination of attributes shows:
!                                   NAME = tl350-1_devspec
!
show mcc 0 alarms rule tl350-1_devspec all char, in domain snmp
!
!MCC 0 ALARMS RULE tl350-1_devspec 
!AT 18-MAR-1992 06:32:33 Characteristics
!
!Examination of attributes shows:
!                              Procedure = SYS$COMMON:[MCC]MCC_ALARMS_MAIL_ALARM.
!                                          COM;5
!                      Exception Handler = SYS$COMMON:[MCC]MCC_ALARMS_MAIL_EXCEPT
!                                          ION.COM;1
!                            Description = "A DEVICE SPECIFIC trap has occured 
!                                          on TL350-1"
!                               Category = "TL350-1 entity specific trap"
!                                  Queue = "sys$batch"
!                              Parameter = "keroon::woestemeyer"
!                             Expression = (OCCURS (SNMP TL350-1  
!                                          enterprisespecific))
!                     Perceived Severity = Minor
!                             Event Type = QualityofServiceAlarm
!                         Probable Cause = Unknown
!
!
!>> verify snmpEnableAuthenTraps enabled on nsu-con-1
!
show snmp nsu-con-1 snmp all char
!
!SNMP nsu-con-1 snmp 
!AT 18-MAR-1992 06:33:56 Characteristics
!
!Examination of attributes shows:
!                  snmpEnableAuthenTraps = enabled
!
!>> verify sinks up and running
!
show mcc 0 tcpip_am sink all char
!
!MCC 0      TCPIP_AM SINK 
!AT 18-MAR-1992 06:34:40 Characteristics
!
!Examination of attributes shows:
!                      Component Version = T1.2.4
!               Component Identification = "MCC TCPIP/SNMP AM EVENT SINK"
!                     Sink Start Retries = 10
!                  Sink Start Wait Timer = 2
!
!>> note no traps received at this time
!
show mcc 0 tcpip_am sink all count
!
!MCC 0      TCPIP_AM SINK 
!AT 18-MAR-1992 06:34:48 Counters
!
!Examination of attributes shows:
!                        Current Clients = 5
!               coldStart Traps Received = 0
!               warmStart Traps Received = 0
!                linkDown Traps Received = 0
!                  linkUp Traps Received = 0
!   authenticationFailure Traps Received = 0
!         egpNeighborLoss Traps Received = 0
!      enterpriseSpecific Traps Received = 0
!                   Total Traps Received = 0
!                  Counter Creation Time = 17-MAR-1992 10:18:18.26
!
show mcc 0 tcpip_am sink all status
!
!MCC 0      TCPIP_AM SINK 
!AT 18-MAR-1992 06:34:58 Status
!
!Examination of attributes shows:
!                             Sink State = Running
!                 Time when Sink Started = 17-MAR-1992 10:18:18.26
!                     Time of Last Event = "not applicable"
!                     Type of Last Event = not applicable
!
!>> device specific trap generated on a translan bridge, TL350_1
!>> see alarm above
!>> Note sink counters and status indicate trap of expected type fired 
!>> and was recieved, IMPM icon did change for TL350-1
!
show mcc 0 tcpip_am sink all count
!
!MCC 0      TCPIP_AM SINK 
!AT 18-MAR-1992 06:39:09 Counters
!
!Examination of attributes shows:
!                        Current Clients = 5
!               coldStart Traps Received = 0
!               warmStart Traps Received = 0
!                linkDown Traps Received = 0
!                  linkUp Traps Received = 0
!   authenticationFailure Traps Received = 0
!         egpNeighborLoss Traps Received = 0
!      enterpriseSpecific Traps Received = 1
!                   Total Traps Received = 1
!                  Counter Creation Time = 17-MAR-1992 10:18:18.26
!
show mcc 0 tcpip_am sink all status
!
!MCC 0      TCPIP_AM SINK 
!AT 18-MAR-1992 06:39:32 Status
!
!Examination of attributes shows:
!                             Sink State = Running
!                 Time when Sink Started = 17-MAR-1992 10:18:18.26
!                     Time of Last Event = 18-MAR-1992 06:37:55.80
!                     Type of Last Event = enterpriseSpecific
!
!
!>> Show SNMP counters on nsu-con-1, verify snmpOutTraps still "0"
!
show snmp nsu-con-1 snmp all count
!
!SNMP nsu-con-1 snmp 
!AT 18-MAR-1992 06:40:52 Counters
!
!Examination of attributes shows:
!                           snmpOutTraps = 0
!                    snmpOutGetResponses = 33
!                     snmpOutSetRequests = 0
!                        snmpOutGetNexts = 0
!                     snmpOutGetRequests = 0
!                         snmpOutGenErrs = 0
!                       snmpOutBadValues = 0
!                     snmpOutNoSuchNames = 0
!                         snmpOutTooBigs = 0
!                            snmpInTraps = 0
!                     snmpInGetResponses = 0
!                      snmpInSetRequests = 1
!                         snmpInGetNexts = 4
!                      snmpInGetRequests = 28
!                     snmpInTotalSetVars = 1
!                     snmpInTotalReqVars = 116
!                          snmpInGenErrs = 0
!                        snmpInReadOnlys = 0
!                        snmpInBadValues = 0
!                      snmpInNoSuchNames = 0
!                          snmpInTooBigs = 0
!                     snmpInASNParseErrs = 0
!                 snmpInBadCommunityUses = 0
!                snmpInBadCommunityNames = 0
!                      snmpInBadVersions = 0
!                            snmpOutPkts = 34
!                             snmpInPkts = 35
!                    CounterCreationTime = 17-MAR-1992 15:08:52.31
!
!>> try to cause authentification trap to fire by using wrong community
!>> name when trying to disable snmpEnableAuthenTraps, a set command.
!
set snmp nsu-con-1 snmp snmpEnableAuthenTraps disable, by pass 1234 
!
!SNMP nsu-con-1 snmp 
!AT 18-MAR-1992 07:00:17 Characteristics
!
!No response from entity.
!
!>> show sink status, last trap reveived as still for the previous device
!>> specific trap for TL350-1
!
show mcc 0 tcpip_am sink all status
!
!MCC 0      TCPIP_AM SINK 
!AT 18-MAR-1992 07:08:44 Status
!
!Examination of attributes shows:
!                             Sink State = Running
!                 Time when Sink Started = 17-MAR-1992 10:18:18.26
!                     Time of Last Event = 18-MAR-1992 06:37:55.80
!                     Type of Last Event = enterpriseSpecific
!
!>> SNMP counter on nsu-con-1, snmpOutTraps, are still "0" 
!>> no trap generated
!
show snmp nsu-con-1 snmp all count
!
!SNMP nsu-con-1 snmp 
!AT 18-MAR-1992 07:12:48 Counters
!
!Examination of attributes shows:
!                           snmpOutTraps = 0
!                    snmpOutGetResponses = 51
!                     snmpOutSetRequests = 0
!                        snmpOutGetNexts = 0
!                     snmpOutGetRequests = 0
!                         snmpOutGenErrs = 0
!                       snmpOutBadValues = 0
!                     snmpOutNoSuchNames = 0
!                         snmpOutTooBigs = 0
!                            snmpInTraps = 0
!                     snmpInGetResponses = 0
!                      snmpInSetRequests = 1
!                         snmpInGetNexts = 4
!                      snmpInGetRequests = 46
!                     snmpInTotalSetVars = 1
!                     snmpInTotalReqVars = 165
!                          snmpInGenErrs = 0
!                        snmpInReadOnlys = 0
!                        snmpInBadValues = 0
!                      snmpInNoSuchNames = 0
!                          snmpInTooBigs = 0
!                     snmpInASNParseErrs = 0
!                 snmpInBadCommunityUses = 0
!                snmpInBadCommunityNames = 6
!                      snmpInBadVersions = 0
!                            snmpOutPkts = 52
!                             snmpInPkts = 59
!                    CounterCreationTime = 17-MAR-1992 15:08:52.82
!
!>> try to disable snmpEnableAuthenTraps  using default community name
!>> should give access to device for read, but note set
!
set snmp nsu-con-1 snmp snmpEnableAuthenTraps disable
!
!SNMP nsu-con-1 snmp 
!AT 18-MAR-1992 07:27:55 Characteristics
!
!No response from entity.
!
!>> Again failed to produce trap event
!
show mcc 0 tcpip_am sink all status
!
!MCC 0      TCPIP_AM SINK 
!AT 18-MAR-1992 07:33:26 Status
!
!Examination of attributes shows:
!                             Sink State = Running
!                 Time when Sink Started = 17-MAR-1992 10:18:18.26
!                     Time of Last Event = 18-MAR-1992 06:37:55.80
!                     Type of Last Event = enterpriseSpecific
!
exit
!
502.5Will check out in the lab hereMUSSEL::C_MCDONALDWed Mar 18 1992 14:086
Steve,

	We'll try to verify that traps are being sourced in the lab here.


Charlie
502.6Lab resultsQUIVER::P_SHORTFri Mar 20 1992 17:2353
Steve,

I have tried to duplicate your problem in the lab.  I have done the following
and found that the concentrator does send out traps.

1.  Set IP ADDRESS of my concentrator with ELMS
2.  Set TRAP ADDRESS with ELMS to be our MCC station address
3.  Used MCC SNMP AM to set snmpEnableAuthenTraps to enabled
4.  Set community (password) in MCC to be ethernet address of my concentrator
5.  Powered down and back up
    + Expect traps to be sent to the MCC station
6.  Used MCC SNMP AM to read counters
    - snmpouttraps = 2
    + Expected 2: 1 for cold start and 1 for link-up
7.  Used MCC SNMP AM to change eauthReadWriteCommunity to a "new" value
8.  Used MCC SNMP AM to show eauth1 
    - got No response from entity 
    + This was expected since the eauthReadWriteCommunity in the concentrator
      and that set in MCC no longer match.  Traps should be sent, counters
      bumped.
9.  Set community (password) in MCC to be the "new" value
    + The MCC and concentrator's community match now, so I can read the counters
10. Used MCC SNMP AM to read counters
    - snmpouttraps = 5 (original 2 from power-up, 1 from try, 2 retries)
      snmpInBadCommunityName = 3 (1 try, 2 retries)
11. Set community (password) in MCC back to original value 
    + This is now back to the mismatched value so expect that we cannot
      access the concentrator.
12. Used MCC SNMP AM to read counters
    - got No response from entity
    + This was the expected response; traps should be sent, counters bumped.
13. Used MCC SNMP AM to set snmpEnableAuthenTraps to be disabled.
    - got No response from entity
    + This was the expected response; traps should be sent, counters bumped.
14. Set community (password) in MCC to be the "new" value again
    + The MCC and concentrator's community match now, so I can read the counters
15. Used MCC SNMP AM to read counters 
    - snmpouttraps = 11 (3 more for each access with the mismatched values)
    - snmpInBadcommunityName = 9           "

We also looked out on the sniffer and saw the traps going out.
Now, the only thing I haven't tried is to use the ELMS AM to do the top
2 steps.

Any chance that you could do the power off/on and check to see that those
traps were sent?  Be sure that you don't have the nvram reset to defaults
switch set when you do this.  Also, be sure that your ip and trap address
are set and that authentication traps are enabled.

Pam


502.7NVRAM reset switch was enabledCSC32::WOESTEMEYERWhy??...Why not!!!Mon Mar 23 1992 13:4711
    To all that responded thanks.  I finally got this to work in our lab.
    It seems that if the NVRAM reset switch is enabled and the TRAP address
    is added then TRAPS are not sent.  If the trap address is entered when
    then the NVRAM reset switch is disabled, then traps are sent.
    
    This raises the question of how sending traps and the NVRAM reset
    switch are tied together.  I would expect that has long and the
    concentrator characteristies show an IP address and TRAP address, then
    traps should be sent reguardless of the NVRAM reset switch position.
    
    
502.8Don't reset NVRAM if you don't mean it.QUIVER::HARVELLTue Mar 24 1992 12:5210
    Nvram reset switch means reset the NVRAM back to its original shipping
    state.  Since all settable features are stored in NVRAM, when you reset
    NVRAM you reset all those parameters back to defaults.  Therefore IP
    address, Trap address and of course EnableAuthenticationTraps switch
    are set to their default values, which is not set.
    
    If you don't want these and other values removed don't set the NVRAM
    reset defaults switch to the enabled position.
    
    Scott
502.9to NVRAM or notCSC32::WOESTEMEYERWhy??...Why not!!!Tue Mar 24 1992 15:4028
    Scott,
    
    Either I stated the problem incorrectly, or you misunderstood.  I do
    know the purpose of the NVRAM reset switch.  In this case the NVRAM
    reset switch is enabled, ELMS has been used to set the ip address and
    trap address, and the SNMP access module used to enable
    authentification traps.  
    
    Now the NVRAM reset switch is still enabled, ELMS can be used to
    verify the IP and trap adresses, and SNMP AM to see that
    authentification trap are enabled.  If we generate an authentification
    trap at this time, NVRAM reset switch still enabled, the concentrator
    does not send it.  Nor does the SNMPoutTrap counter increment. 
    
    If at this time we disable the NVRAM reset switch, reboot the bridge,
    now we can still see that the ip address, trap address and
    authentification traps are still in place.  Now if we generate an
    authentification trap the management station does receive it.
    
    The question being, why even though the ip address, trap address and
    authentification trap are enable/set will the concentrator not send
    them until the concentrator is rebooted with the nvram reset switch 
    disabled.  Its almost like the elms 'add trap address ....' does not
    really take, if the nvram reset switch is enabled.
    
    Just food for thought,
    
    Steve 
502.10QUIVER::HARVELLWed Mar 25 1992 09:447
    Steve,
    
    You are correct, I did not understand your previous message.  If what
    you say is correct then there is a problem.  Its being looked into by
    the appropriate person.
    
    Scott
502.11Question on how to get a DC500 to generate a link up/down trapNSTG::RDAVIESIf God had meant us to be single, we would have been born that waySun Jun 05 1994 20:0972
I've just read through this note, and I still can't find the answer to the
original question (or at least the part of it that I'm interested in)


The Problem:
------------

I want my DECconcentrator500s to generate traps to DECmcc when links fail.

I don't care about authentication traps.

I have DECmcc on Ultrix with no ELMS, just SNMP. I have loaded the FDDI MIB and
the DEC_ELAN V2.7 MIB (even though the V2.7 MIB has never been officially 
registered - the V2.0 MIB is the only registered version of the MIB, which
is what ships with DECmcc)

I have a terminal server connection to the OBM port, through which I can
configure the DC500 if I need to.

I have configured the correct TRAP addresses in the concentrator, and I can 
power it up and down as many times as I like, and it keeps it's TRAP addresses,
so I don't think the NVRAM switch is a problem here.

I can talk to the concentrator using DECmcc/SNMP with no problem at all, using
the FDDI MIB, MIB-II and the DEC_ELAN MIB.

I have tried disconnecting the primary ring A/B ports AND various M-port
connections, and each time I can still reach the concentrator through SNMP, yet
it doesn't generate any TRAPs (the node running DECmcc is connected to an
M-port, through the default IP gateway configured into the concentrator)

DECmcc can receive traps from other devices with no problems. I have never seen
the snmpoutTraps variable on the concentrator increment, so I'm assuming that 
the reason I've never received a trap is because it has never sent one!

EsysRomVersion returns the value 10 - how does this relate to the firmware
version of the concentrator?? The concentrators were purchased in late 1993, so
have whatever version of firmware that was shipping at that point (ie. whatever
version '10' means)

I found this really useful-sounding SNMP variable in the V2.7 DEC_ELAN MIB

>   esysFddiPortTrapSwitch OBJECT-TYPE
>        SYNTAX  INTEGER {
>                           true(1),
>                           false(2)
>                        }
>        ACCESS  read-write
>        STATUS  mandatory
>        DESCRIPTION
>               "This is a switch to enable or diable FDDI port up and port
>               down traps.  When set to true, the concentrator will
>               send a trap when one of its ports comes up or goes down."
>        ::= { esysConcConfig 2 }

which sounds EXACTLY like what I need to set, however it returns 'attribute not
gettable'. There is no way to set anything like this from the OBM port, only the
TRAP addresses, and I've set those correctly. What would this value default to,
assuming it's in the firmware I have in the concentrators ?


I would very much appreciate any suggestions as to how I can get my
concentrators to generate traps whenever any of the links go up or down. 

Also, if anyone has a complete list of the traps that a DECconcentrator 500 can
generate, that would be EXTREMELY useful.


Thanks

Rob Davies
NSTG / MCI-NASDAQ Project Team