smb76 wrote:
Thanks Ian, Mark and Frank for replying...
I checked with my client for the suggestions regarding using Filters in Wireshark and NetMon utility in Windows 2008..(Spectrrum installed on Windows 2008).
1. For Wireshark, their Internal Security is not ready for any sniffing tool even if the filters would be applied.
2. For Netmon, Bank's Network team would discuss internally and get back to CA.
What else can we check if the alarms are not clearing? Has anyone seen this issue at any other client site? How BGP is set at other clients?
Please guide or provide some documentation for review.
Thanks,
Sachin
sachiny@gmail.com
Hello Sachin,
The earlier poster is correct in that if the trap arrives and generates an alarm, then it is highly unlikely that the clear trap, if it is being sent to Spectrum, is not arriving due to network problems. Unless of course the device is not sending the clear trap at all for some reason related to a configuration problem or bug in the devices software related to traps.
If packet capture/sniffing tools are not an option you can try to debug the trap reception and processing in Spectrum by doing the following:
CLI option for trap alarm processing debug:
This writes logging data to the VNM.out file on the SpectroSERVER
1 - Open a command prompt on the SpectroSERVER and log in to the bash shell with the command:
bash -login
2 - Change directories to the $SPECROOT/vnmsh directory with the command:
cd vnmsh
3 - Connect to the CLI with the command:
./connect
4 - Once connected, run this command to enable the debug:
./update action=0x10245 mh=<VNM_ModelHandle>
(Will need to have the Model Handle attribute value for the VNM model handy)
When done with the debugging, to disable it run the following command:
./update action=0x10246 mh=<VNM modelhandle>
Further Tips and Tricks for this debug:
To turn on debug for a specific IP, 10.10.5.1 for example:
./update action=0x10245 mh=<VNM mh> index=0,attr=1,type=0x13,val=10.10.5.1
That should show processing of the alarm for all models, or that specific model based on IP if that version of debug command was run, in the VNM.out found in the $SPECROOT/SS directory.
If we see data showing processing of that raise and clear trap it means the trap made it the SS and was processed for alarm raise or clear in the OC server.
If still no alarm raise or clear check:
- Alarm processing attributes on the model
- Ensure the model is not in Maintenance Mode
Hope that helps you move this problem forward toward resolution.
Thanks,
Michael