version 1 showing authors affecting page license.
.
Rev |
Author |
# |
Line |
1 |
perry |
1 |
nmtrapd |
|
|
2 |
!!!nmtrapd |
|
|
3 |
NAME |
|
|
4 |
SYNOPSIS |
|
|
5 |
DESCRIPTION |
|
|
6 |
PROTOCOL |
|
|
7 |
SEE ALSO |
|
|
8 |
AUTHORS |
|
|
9 |
---- |
|
|
10 |
!!NAME |
|
|
11 |
|
|
|
12 |
|
|
|
13 |
nmtrapd - A network management SNMP trap multiplexer. |
|
|
14 |
!!SYNOPSIS |
|
|
15 |
|
|
|
16 |
|
|
|
17 |
__nmtrapd__ [[ ''port'' ] |
|
|
18 |
|
|
|
19 |
|
|
|
20 |
________________________________________________________________________________________________________________________________________ |
|
|
21 |
!!DESCRIPTION |
|
|
22 |
|
|
|
23 |
|
|
|
24 |
The __nmtrapd__ trap daemon listens on the snmp-trap port |
|
|
25 |
(usually port 162/udp) for incoming SNMP trap or inform |
|
|
26 |
messages and forwards them to all connected clients (like |
|
|
27 |
__scotty__). The optional ''port'' argument allows to |
|
|
28 |
use the nmtrapd daemon to forward messages received on a non |
|
|
29 |
standard SNMP trap port. Port numbers below 1024 will be |
|
|
30 |
rejected with the exception of the snmp-trap port |
|
|
31 |
162/udp. |
|
|
32 |
|
|
|
33 |
|
|
|
34 |
The __nmtrapd__ daemon must be installed setuid root |
|
|
35 |
since UNIX systems require root permissions to open the |
|
|
36 |
standard SNMP trap port 162/udp. The __nmtrapd__ daemon |
|
|
37 |
rejects all ''port'' numbers below 1024 with the |
|
|
38 |
exception of port 162/udp in order to protect the system |
|
|
39 |
security. |
|
|
40 |
|
|
|
41 |
|
|
|
42 |
Clients connect to the __nmtrapd__ daemon by opening the |
|
|
43 |
AF_UNIX domain stream socket /tmp/.nmtrapd-''port''. |
|
|
44 |
Thus, the default AF_UNIX domain stream socket is named |
|
|
45 |
/tmp/.nmtrapd-162. |
|
|
46 |
!!PROTOCOL |
|
|
47 |
|
|
|
48 |
|
|
|
49 |
Received messages are forwarded using the following packet |
|
|
50 |
format: |
|
|
51 |
|
|
|
52 |
|
|
|
53 |
0 7 8 15 16 23 24 32 |
|
|
54 |
+--------+--------+--------+--------+ |
|
|
55 |
| version| unused | port number | |
|
|
56 |
+--------+--------+--------+--------+ |
|
|
57 |
| IPv4 address of the sender | |
|
|
58 |
+--------+--------+--------+--------+ |
|
|
59 |
| length of the trap message | |
|
|
60 |
+--------+--------+--------+--------+ |
|
|
61 |
| trap message | |
|
|
62 |
: : : : : |
|
|
63 |
+--------+--------+--------+--------+ |
|
|
64 |
|
|
|
65 |
|
|
|
66 |
The value of the version field is 0 and all the unused bits |
|
|
67 |
are set to 0. The port number and the length of the trap |
|
|
68 |
message are returned in network byte order. |
|
|
69 |
!!SEE ALSO |
|
|
70 |
|
|
|
71 |
|
|
|
72 |
scotty(1), tkined(1), Tnm(n) |
|
|
73 |
!!AUTHORS |
|
|
74 |
|
|
|
75 |
|
|
|
76 |
Erik Schoenfelder |
|
|
77 |
Juergen Schoenwaelder |
|
|
78 |
---- |