Situations or events that can trigger SNMP traps for a Brightmail Gateway or Mail Security 8300 Series appliance
search cancel

Situations or events that can trigger SNMP traps for a Brightmail Gateway or Mail Security 8300 Series appliance

book

Article ID: 177136

calendar_today

Updated On:

Products

Messaging Gateway

Issue/Introduction

You want to know which situations or events trigger Simple Network Management Protocol (SNMP) traps in the Brightmail Gateway or Mail Security 8300 Series appliance.


Resolution

The only SNMP traps that the appliance sends are related to the state of the raid controllers (and drives). See the following Management Information Bases (MIBs) bundled on a Brightmail Gateway or 8300 Series appliance for details. If you look in the afa-MIB.txt and PERC-MIB.txt files for the word "trap," You find the list of items that are sent as SNMP traps to the SNMP trap host.

Example:

8240 Megaraid raid card:
https://[hostname]:41443/brightmail/snmp-mibs/afa-MIB.txt

8260 PERC raid card:
https://[hostname]:41443/brightmail/snmp-mibs/PERC-MIB.txt

Passive SNMP monitoring is available for the following OS, hardware and MTA items (depending on your software update version, use one of the following links):

https://[hostname]:41443/brightmail/snmp-mibs/SYMANTEC-EMAIL-SECURITY.txt

OR

https://[hostname]:41443/brightmail/snmp-mibs/LSI-AdapterSAS.txt

Note that the following items regarding SNMP support--this information is available in the SNMP configuration tips section in the What’s New in SMS 8200 Series Version 4.1.0.

SNMP configuration tips
  • The SNMP implementation is read-only; you cannot change settings or perform SNMP-Set commands.
  • The SNMP community string is where you supply your SNMP v2c read-only community string. The default value for the community is public; we recommend that you change this. This is the only
    required field for the configuration. All other settings are on the page are optional.
  • The SNMP trap host field is where you specify an optional trap target. This target can be an IP address or hostname. Note that only certain events/components (specifically those related to the disk array) actually produce and send traps to the configured host. Please refer to afa-mib.txt and PERC-MIB.txt described below for the specific OIDs that generate traps.
  • For convenience, you can download the SNMP MIBs and import them in to any SMNP v2c-compliant monitoring program.
    The following MIBs are available:
    • SYMANTEC-EMAIL-SECURITY.txt: Custom symantec MIB that includes MTA statistics and redundancy metrics
    • afa-mib.txt: Raid controller, disk specific, and other hardware OIDs and traps for the 8240
    • PERC-MIB.txt: Raid controller, disk specific, and other hardware OIDs and traps for the 8260

To download the MIBs, log in to the Control Center, and then add /snmp-mibs to the URL path in your browser after /brightmail. For example: https://xx.xxx.xxx.xx:41443/brightmail/snmp-mibs (not a real link).