The snmptrapd service is an SNMP application that receives and logs SNMP TRAP and INFORM messages.
Note: the default is to listen on UDP port 162 on all IPv4 interfaces. Since 162 is a privileged port, snmptrapd must typically be run as root.
installs and starts the snmptrapd service. To start the service without installing it, use the service command:
service start "snmptrapd service"
stops and removes the snmptrapd service. To stop the service without removing it, use the service command:
service stop "snmptrapd service"
runs snmptrapd as a normal program in the current console for debugging purposes.
Ignores authenticationFailure traps.
Reads FILE as a configuration file.
Does not read any configuration files except the one optionally specified by the
Dumps (in hexadecimal) the sent and received SNMP packets.
Turn on debugging output for the given "TOKEN"(s)." Try ALL for extremely verbose output.
Prints event numbers (rising/falling alarm etc.).
fork()from the calling shell. -FFORMAT
When logging to standard output, use the format in the string FORMAT. See the section FORMAT SPECIFICATIONS below for more details.
Displays a brief usage message and then exit.
Displays a list of configuration file directives understood by the trap daemon and then exit.
Specifies the syslog facility to use when logging to syslog. 'd' means LOG_DAEMON and 0 through 7 mean LOG_LOCAL0 through LOG_LOCAL7. LOG_LOCAL0 is the default.
Specifies a colon separated list of MIB modules to load for this application. This overrides the environment variable MIBS.
Specifies a colon separated list of directories to search for MIBs. This overrides the environment variable MIBDIRS.
Does not attempt to translate source addresses of incoming packets into hostnames.
Logs formatted incoming traps to FILE.
Prints formatted incoming traps to standard error.
Logs formatted incoming traps to syslog. These syslog messages are sent with a level of LOG_WARNING and facility as determined by the
-lflag (LOG_LOCAL0 by default). This is the default unless the -oor -Pflag is used. -uFILE
Saves the process ID of the trap daemon in FILE.
Prints version information for the trap daemon and then exit.
snmptrapd interprets format strings similarly to the
a literal %
decimal number of seconds since the operating system's epoch (as returned by time(2))
current year on the local system
current (numeric) month on the local system
current day of month on the local system
current hour on the local system
current minute on the local system
current second on the local system
the value of the sysUpTime.0 varbind in seconds
the year field from the sysUpTime.0 varbind
the numeric month field from the sysUpTime.0 varbind
the day of month field from the sysUpTime.0 varbind
the hour field from the sysUpTime.0 varbind
the minute field from the sysUpTime.0 varbind
the seconds field from the sysUpTime.0 varbind
the contents of the agent-addr field of the PDU (v1 TRAPs only)
the hostname corresponding to the contents of the agent-addr field of the PDU, if available, otherwise the contents of the agent-addr field of the PDU (v1 TRAPs only).
PDU source address (Note: this is not necessarily an IPv4 address)
PDU source hostname if available, otherwise PDU source address (see note above)
trap type (numeric, in decimal)
trap sub-type (numeric, in decimal)
security information from the PDU (community name for v1/v2c, user and context for v3)
list of trap's variable-bindings
In addition to these values, you may also specify an optional field
width and precision, just as in
The "use alternate form" flag changes the behavior of some format flags. Normally, the fields that display time information base it on the local timezone, but this flag tells them to use GMT instead. Also, the variable-binding list is normally a tab-separated list, but this flag changes it to a comma-separated one. The alternate form for the uptime is similar to "3 days, 0:14:34.65"
To get a message like "14:03 TRAP3.1 from humpty.ucd.edu" you could use something like this:
snmptrapd -P -F "%02.2h:%02.2j TRAP%w.%q from %A\n"
If you want the same thing but in GMT rather than local time, use:
snmptrapd -P -F "%#02.2h:%#02.2j TRAP%w.%q from %A\n"
By default, snmptrapd listens for incoming SNMP TRAP and INFORM packets on UDP port 162 on all IPv4 interfaces. However, it is possible to modify this behavior by specifying one or more listening addresses as arguments to snmptrapd.
As of net-snmp 5.0, the snmptrapd application supports the NOTIFICATION-LOG-MIB. It does this by opening an AgentX subagent connection to the master snmpd agent and registering the notification log tables. As long as the snmpd application is started first, it will attach itself to it and thus you should be able to view the last recorded notifications via the nlmLogTable and nlmLogVariableTable. See the snmptrapd.conf file and the "dontRetainLogs" token for turning off this support. See the NOTIFICATION-LOG-MIB for more details about the MIB itself.
See the snmptrapd.conf reference page.
All UNIX systems. Windows 7. Windows Server 2008 R2. Windows 8. Windows Server 2012. Windows 10. Windows Server 2016.
PTC MKS Toolkit for System Administrators
PTC MKS Toolkit for Developers
PTC MKS Toolkit for Interoperability
PTC MKS Toolkit for Professional Developers
PTC MKS Toolkit for Professional Developers 64-Bit Edition
PTC MKS Toolkit for Enterprise Developers
PTC MKS Toolkit for Enterprise Developers 64-Bit Edition
- File Formats:
PTC MKS Toolkit 10.1 patch 1 Documentation Build 2.