Skip to main content
NetApp Knowledge Base

Unwanted SNMP outbound traffic from management LIFs

Views:
612
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
hw
Last Updated:

Applies to

  • ONTAP 9
  • AFF / FAS
  • SNMP

Issue

  • On certain devices, unexpected SNMP traffic or SNMP authentication errors are received.
  • The source of the traffic is either a node-management LIF or a cluster management LIF.
  • Such unwanted traffic is deemed a security issue.

Sep 10, 2022, 8:33:15 PM             IOS @ 10.xx.xx.1         <131>4231: ]: Sep 10 20:33:14: %SNMP-3-AUTHFAIL: Authentication failure for SNMP req from host 10.xx.xx.2
Sep 10, 2022, 8:31:35 PM             IOS @ 10.xx.xx.1         <131>4230: ]: Sep 10 20:31:34: %SNMP-3-AUTHFAIL: Authentication failure for SNMP req from host 10.xx.xx.2
Sep 10, 2022, 8:30:13 PM             IOS @ 10.xx.xx.1         <131>4229: ]: Sep 10 20:30:12: %SNMP-3-AUTHFAIL: Authentication failure for SNMP req from host 10.xx.xx.2
Sep 10, 2022, 8:29:00 PM             IOS @ 10.xx.xx.1         <131>4228: ]: Sep 10 20:28:59: %SNMP-3-AUTHFAIL: Authentication failure for SNMP req from host 10.xx.xx.2
Sep 10, 2022, 8:27:55 PM             IOS @ 10.xx.xx.1         <131>4227: ]: Sep 10 20:27:54: %SNMP-3-AUTHFAIL: Authentication failure for SNMP req from host 10.xx.xx.2
Sep 10, 2022, 8:26:15 PM             IOS @ 10.xx.xx.1         <131>4226: ]: Sep 10 20:26:14: %SNMP-3-AUTHFAIL: Authentication failure for SNMP req from host 10.xx.xx.2

Or

09/08/22 09:47:46 00236 snmp: Security access violation from 192.xx.xx.4 for the community name or user name : cshm1! (11 times in 60 seconds) 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.

 

  • Was this article helpful?