NNMi SNMP Context Polling

NNMi version 23.4

We are an ISP using Cisco ASR9Ks that have many VRFs and Bridge Domains configured. Currently we have not defined snmp context names and mapped them to community strings for the VRFs and bridge domains because it requires a lot of extra configuration and the VRFs/BridgeDomains are dynamic as there is customer turnover.

NNMi detects that the non default contexts exist and tries to poll them, creating continuous SNMP authentication errors.

Sample error message in device:

"SNMP-SNMP-3-AUTH_FAIL : Received snmp request on unknown community from ..."

Sample of Configuration poll detecting the snmp contexts:

5/31/24 11:03:40 AM  Get SnmpContext. Found entries:88

Is there any way to configure NNMi so that it does not try polling the VRFs?

Thanks in advance.

Tags:

Parents
  • Suggested Answer

    0  

    Hello Dan,

    NNMi discovers VRF context names from MIBs in default context. As you mentioned it seems NNMi was able to discover 88 names.

    Since names were found NNMi will try to discover the content of contexts, IP addresses, for example. Since mapping communities to VRF

    contexts were not done you see authentication failures on devices. I am not aware of any solution on NNMi side for such environment.

    We do not have a configuration property to disable discovery of VRF contexts. The VRF discovery is triggered automatically as soon as context

    names are known. You can submit an idea to implement such property, but it can be done only in new NNMi releases. I could mention only a couple

    of solutions on devices. For example, you could use "exclude" option when configuring SNMP OID views to exclude OIDs with context names.

    After that NNMi will not be able to discover context names. If you post here device sysOID I could try to provide the OIDs to be blocked (nnmsnmpget.ovpl device-name  sysObjectID.0). Another approach would be to properly configure VRF contexts. For details of SNMP and VRF configuration please check the links below.


    www.cisco.com/.../b-system-management-cg-asr9000-75x.pdf
    www.cisco.com/.../snmp-server-commands.html

    Thank you.

    Best regards,

    Sergey Pankratov

Reply
  • Suggested Answer

    0  

    Hello Dan,

    NNMi discovers VRF context names from MIBs in default context. As you mentioned it seems NNMi was able to discover 88 names.

    Since names were found NNMi will try to discover the content of contexts, IP addresses, for example. Since mapping communities to VRF

    contexts were not done you see authentication failures on devices. I am not aware of any solution on NNMi side for such environment.

    We do not have a configuration property to disable discovery of VRF contexts. The VRF discovery is triggered automatically as soon as context

    names are known. You can submit an idea to implement such property, but it can be done only in new NNMi releases. I could mention only a couple

    of solutions on devices. For example, you could use "exclude" option when configuring SNMP OID views to exclude OIDs with context names.

    After that NNMi will not be able to discover context names. If you post here device sysOID I could try to provide the OIDs to be blocked (nnmsnmpget.ovpl device-name  sysObjectID.0). Another approach would be to properly configure VRF contexts. For details of SNMP and VRF configuration please check the links below.


    www.cisco.com/.../b-system-management-cg-asr9000-75x.pdf
    www.cisco.com/.../snmp-server-commands.html

    Thank you.

    Best regards,

    Sergey Pankratov

Children