Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - justrest

#16
Quote from: Victor Kirhenshtein on May 05, 2023, 05:03:08 PMHi,
I've found a bug introduced in 4.3 which may cause incorrect decoding of strings received via SNMP (SNMP codepage was ignored in some cases). Fix will be included into upcoming patch release 4.3.6.
Best regards,
Victor
thanks very much!!
#17
Quote from: Victor Kirhenshtein on April 28, 2023, 09:57:57 AMYes, it actually could be related to codepage. Depending on entry type, NetXMS server may require to search for peers using texts (interface descriptions for example), and if it is received incorrectly search will fail. To be able to diagnose it I likely will need exact walk outputs though. We can move discussion to private messages or Telegram if you don't like to share such data publicly.
Best regards,
Victor
Currently the server configuration file netxmsd.conf as well as snmp.codepage and syslog.codepage are CP936, except that previously under version 4.2.461, the same configuration did not have this problem.
#18
Quote from: Victor Kirhenshtein on April 28, 2023, 09:57:57 AMYes, it actually could be related to codepage. Depending on entry type, NetXMS server may require to search for peers using texts (interface descriptions for example), and if it is received incorrectly search will fail. To be able to diagnose it I likely will need exact walk outputs though. We can move discussion to private messages or Telegram if you don't like to share such data publicly.
Best regards,
Victor
No, actually none of this information is considered private, it just seems like too much. Thank you very much for your reply, I've uploaded the relevant attachments, so please take the trouble to guide me, thank you very much!
#19
Quote from: Victor Kirhenshtein on April 12, 2023, 10:15:44 AMHi!
It could be related to LLDPv2 MIB support that we have added in 4.3. Could you please check if device responds to OID .1.3.111.2.802.1.1.13.1.3.2.0? If yes, could you provide result of SNMP walk on .1.3.111.2.802.1.1.13.1.4.1.1 and .1.0.8802.1.1.2.1.4.1.1?
Best regards,
Victor

Thank you very much for developing such an excellent network management software, could you please help to optimize the new version of LLDP protocol support, thank you very much!
#20
Quote from: Victor Kirhenshtein on April 26, 2023, 06:38:35 PMI've added processing of FDB record status 6 - next patch release should process them in a same way as status 3 (dynamic).

Best regards,
Victor

thanks very much!!
#21
Thank you very much for your reply! 

I'm on a business trip and can't import the list, but I had a colleague try and the SNMP walk results for .1.3.111.2.802.1.1.13.1.4.1.1 and .1.0.8802.1.1.1.2.1.4.1.1 seems containing  all the neighbor information, just some information that shows up as garbled. The current codepage setting of snmp is CP936 (Chinese), could this problem be related to the codepage setting?
#22
When the port opens the security policy, the port's mac address status will change from "learned" to "secure", which seems to be the official definition, but I don't know why it can't be learned by netxms。
Thanks for your replies!
#23
I tried different versions from 4.2.461 to 4.3.2, both windows and debian systems. The result is that 4.2.461 does not have the above problem, 4.3.0-4.3.2 are unable to get the complete peer node list.
#24
I have tried different versions from 4.2.461 to 4.3.2, including windows and debian systems, and found the same result.
#25
We need to locate the IP or mac address quickly, but if we configure a port security policy on the switch interface (as shown in the figure), the mac address status on the switch is "secure" instead of "learned". The problem is that netxms only learns the mac address of the "learned" state ( Switch Forwarding Database  ), the mac address of the "security" state seems to be ignored, please ask what is the way to learn all the mac addresses, thank you very much!
#26
I compared the nodes with normal and abnormal LLDP discovery and found that the difference is whether the VLAN list can be obtained during topology discovery. To test, I installed a new netxms, added only test node, and set the value of custom attribute " snmp.driver " to "H3C". Although SNMP can get vlan information normally through either public OID or private OID of H3C, the topology discovery still prompts: unable to get vlan list, and there is no more information in the debug 5 log.

Very eager for your help, thank you!
#27
2023.03.16 15:21:07.881 *D* [poll.topology      ] Started topology poll of node SW-HJ[241]
2023.03.16 15:21:07.942 *D* [poll.topology      ] Cannot retrieve VLAN list from node SW-HJ[241]
2023.03.16 15:21:10.998 *D* [topology.fdb      ] GetSwitchForwardingDatabase(SW-HJ[241]): 76 entries read from dot1qTpFdbTable
2023.03.16 15:21:11.001 *D* [topology.fdb      ] GetSwitchForwardingDatabase(SW-HJ[241]): 0 entries read from dot1dTpFdbTable
2023.03.16 15:21:11.002 *D* [poll.topology      ] Switch forwarding database retrieved for node SW-HJ[241]
2023.03.16 15:21:11.002 *D* [topology.lldp      ] Collecting LLDP topology information for node SW-HJ[241]
2023.03.16 15:21:25.630 *D* [topology.lldp      ] 550 entries in LLDP connection database for node SW-HJ[241]
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID D494E8582820
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 000E5EB9CF4F
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF4400
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF4400
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF4400
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF4400
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID D494E8582820
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF9A00
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895D9F420
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID D494E8582820
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID D494E8582820
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895DA0B40
2023.03.16 15:21:25.631 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895DA0B40
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895D9F420
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 90E710C7DA68
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 000E5EB9CF51
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 74258ABEAA4D
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 90E710C7C0A0
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 90E710C7C0A0
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 90E710C789A0
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 3897D6B7DF24
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895DA1A40
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF4200
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF4200
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 7485C436A73C
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 5CC999FFEEC3
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 586AB153E7F6
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 90E710C7F220
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID B0F9634FA800
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 703D155488DC
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 48BD3D3B64F6
2023.03.16 15:21:25.632 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 703D155464EC
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 70BAEFA16213
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF9600
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF9600
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895DA0550
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 04D7A51DF26A
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 3897D6B7DF24
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895DA1A40
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895DA1A90
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 90E710C7DA68
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895D9F970
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 5CC999FFEEC3
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID B0F9634FA800
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 90E710C79C30
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895D9F330
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 74258A14CE9F
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 441AFACF9A00
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID B0F9634BE400
2023.03.16 15:21:25.633 *D* [topology.lldp      ] ProcessLLDPConnectionEntry(SW-HJ[241]): SNMP get failed for remote ID 9CE895D9F330
2023.03.16 15:21:25.633 *D* [topology.lldp      ] Finished collecting LLDP topology information for node SW-HJ[241]
2023.03.16 15:21:25.634 *D* [topology.stp      ] Collecting STP topology information for node SW-HJ[241]
2023.03.16 15:21:26.248 *D* [topology.stp      ] Finished collecting STP topology information for node SW-HJ[241]
2023.03.16 15:21:26.248 *D* [poll.topology      ] Node::addHostConnections(SW-HJ[241]): FDB retrieved
2023.03.16 15:21:26.249 *D* [poll.topology      ] Link layer topology retrieved for node SW-HJ[241] (7 connections found)
2023.03.16 15:21:26.249 *D* [poll.topology      ] Link layer topology processed for node SW-HJ[241]
#28
version 4.3.2 ,debian 11
#29
Take an aggregation device as an example, it is down-connected to dozens of devices, all of which have LLDP and SNMP working normal and have added nodes in netxms, but regardless of the peer node column in the NIC list or in the network topology, only part of peer nodes can be found, and the debug log shows: ProcessLLDPConnectionEntry( :SNMP get failed for remote ID D494E8582820). Your help is urgently needed, thank you very much!
#30
Why are the epel and fedora sources not updated to the latest 4.3.2 version, thank you very much! Also, there seems to be a peer node recognition problem in 4.3.1, for example, aggregated devices can only recognize individual downlinked devices, while in the previous version 4.3.0 they could be fully recognized.