Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    SNMP Trap Overview

    The system generates SNMP traps according to operating specifications defined in supported MIBs. This section provides information for:

    IP Hosts

    Traps are sent to IP hosts. The IP hosts are configured in a proprietary trap host table maintained by the router (the server). Each entry in the table contains:

    • IP address of the trap destination
    • Community name (v1 or v2c) or username (v3) to send in the trap message
    • SNMP format (v1 or v2) of the notification (trap) PDU to use for that destination
    • Types of traps enabled to be sent to that destination
    • Trap filters configured for the destination

    The maximum number of entries in the SNMP trap host table in each virtual router is eight.

    Trap Categories

    The router supports the following trap categories:

    • addrPool—Local address pool traps
    • atmPing—E Series router proprietary ATM ping traps
    • bfdmib—BFD MIB traps
    • bgp—BGP state change traps
    • bulkstats—Bulk statistics file full and nearly full traps
    • cliSecurityAlert—Security alert traps
    • dhcp—Dynamic Host Configuration Protocol traps
    • dismanEvent—Distributed management (disman) event traps
    • dosProtectionPlatform—DoS protection platform traps
    • dvmrp—Distance Vector Multicast Routing Protocol traps
    • dvmrpProp—E Series router proprietary DVMRP traps
    • environment—Power, optical power, temperature, fan, and memory utilization traps
    • fileXfer—File transfer status change traps
    • haRedundancy—High availability and redundancy traps
    • inventory—System inventory and status traps
    • ip—Internet Protocol traps
    • ldp—LDP traps
    • link—SNMP linkUp and linkDown traps
    • log—System log capacity traps
    • mobileIpv4—Mobile IPv4 traps
    • mplste—Mplste traps
    • mrouter—Mrouter traps
    • ntp—E Series router proprietary traps
    • ospf—Open Shortest Path First traps
    • ospfv3—Open Shortest Path First Version 3 traps
    • packetMirror—Packet mirroring traps; packet mirroring–related SNMP categories and traps are visible only to authorized users. See JunosE Policy Management Configuration Guide for information about using secure packet mirroring traps.
    • pim—Protocol Independent Multicast traps
    • ping—Ping operation traps in disman remops (remote operations) MIB
    • radius—RADIUS servers fail to respond to accounting and authentication requests traps, or servers return to active service traps
    • routeTable—Maximum route limit and warning threshold traps; when this trap is generated, the actual value of the exceeded warning threshold is displayed.
    • snmp—SNMP coldStart, warmStart, authenticationFailure; the trap option. The snmp-server enable traps snmp authentication command allows customized treatment for SNMP authentication failure traps.
    • sonet—SONET traps
    • traceroute—Traceroute operation traps (in disman remops MIB)
    • trapFilters—Global filters for SNMP trap recipients
    • vrrp—Virtual Router Redundancy Protocol traps

    To enable global trap categories, use the snmp-server enable traps command. To enable trap categories for a specific host, use the snmp-server host command. For more information about enabling global trap categories and traps categories for a specific host, see Enabling and Configuring the Trap Severity Level on a Global Basis and Configuring an SNMP Trap Host.

    Trap Severity Levels

    The router provides a method of filtering traps according to severity. Table 1 describes the supported severity levels.

    Table 1: Trap Severity Descriptions

    Severity Number

    Severity Name

    System Response

    0

    Emergency

    System unusable

    1

    Alert

    Immediate action needed

    2

    Critical

    Critical conditions exist

    3

    Error

    Error conditions exist

    4

    Warning

    Warning conditions exist

    5

    Notice

    Normal but significant conditions exist

    6

    Informational

    Informational messages

    7

    Debug

    Debug messages

    You can set up one or more of the following types of trap filters:

    • Global—Filters traps by type and severity level across all trap categories
    • Per-category—Filters traps for a specific category by type and severity level
    • Host-specific—Filters traps on a specific host by type and severity level

    Trap filters work as follows:

    1. An event is posted to the SNMP agent.
    2. The system determines whether the corresponding trap category is globally enabled and whether the trap meets the minimum severity level for the trap category. If the per-category filter is not defined for this trap, the global trap severity applies.
      • If the trap does not meet these criteria, the system discards the trap.
      • If the trap does meet these criteria, the trap goes to the trap host processor.
    3. The trap host processor determines whether the trap category is enabled on the host and whether the trap meets the minimum severity level set for the host.
      • If the trap does not meet these criteria, the system discards the trap.
      • If the trap does meet these criteria, the trap is sent to the trap recipient.

    To set up global severity filters, use the snmp-server enable traps command. To specify the trap severity level for a particular category, use the snmp-server enable traps per-category-trapFilters command. To set up a severity filter for a specific host, use the snmp-server host command. For more information about configuring severity filters, see Enabling and Configuring the Trap Severity Level on a Global Basis, Enabling and Configuring the Trap Severity Level on a Per-Category Basis, and Configuring an SNMP Trap Host.

    Published: 2014-08-12