SNMP
SNMP enables FortiIsolator administrators to monitor hardware on client’s network.
An admin user can configure the hardware, such as the FortiIsolator SNMP agent, to report system information and send traps (alarms or event messages) to SNMP managers. SNMP traps alert admin users to events that happen, such as the session limit is about to reach.
The FortiIsolator SNMP implementation is read-only. Currently SNMP v1/v2c compliant SNMP managers have read-only access to FortiIsolator system information through queries, and can receive trap messages from the FortiIsolator unit.
SNMP Configuration
Before a remote SNMP manager can connect to the FortiIsolator SNMP agent, configurations must be made on FortiIsolator interface and Community string in order to accept SNMP connections.
To configure a FortiIsolator interface and Community string to accept SNMP connections in the GUI:
- Go to System > SNMP.
- Under interface dropdown list, select an interface.
- In the Community box, enter SNMP community string.
-
Click OK.
To configure a FortiIsolator interface to accept SNMP connections in the CLI:
set snmpd-interface <internal|external|mgmt|ha>
set snmpd-interface mgmt
To configure a Community string to accept SNMP connections in the CLI:
set snmpd-community <fis_community>
set snmpd-community fis_public
File: /var/log/syslog/snmpd.conf
rocommunity fis_public default -V systemonly
Configuration for SNMP Traps:
set session-threshold [1-100]
set session-threshold 5
set trap-host-ip <host-ip>
set trap-host-ip 192.168.1.100
set trap-host-community <host-community>
set trap-host-community public
File: /etc/snmp/ snmptrapd.conf
authCommunity log,execute,net public
SNMP Server Configuration
Make sure to include these settings in SNMP .conf files:
> cat /etc/snmp/snmp.conf
mibs +ALL
> cat /etc/snmp/snmpd.conf
rocommunity fis_public default -V systemonly
> cat /var/log/syslog/snmptrapd.conf
authCommunity log,execute,net public
Example results from SNMP Traps:
> tail -f /var/log/syslog | grep snmp
Apr 14 15:07:00 bigdata snmptrapd[32688]: 2021-04-14 15:07:00 <UNKNOWN> [UDP: [FIS_IP]:56623->[SNMP_Server_IP]:162]:#012DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (1460730) 4:03:27.30#011SNMPv2-MIB::snmpTrapOID.0 = OID: FORTINET-FORTIISOLATOR-MIB::fisTrapSessOverThreshold#011FORTINET-FORTIISOLATOR-MIB::fisSessUsage = INTEGER: 5
Apr 14 15:07:00 bigdata snmptrapd[32688]: 2021-04-14 15:07:00 <UNKNOWN> [UDP: [FIS_IP]:56623->[SNMP_Server_IP]:162]:#012DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (1460730) 4:03:27.30#011SNMPv2-MIB::snmpTrapOID.0 = OID: FORTINET-FORTIISOLATOR-MIB::fisTrapSessOverThreshold#011FORTINET-FORTIISOLATOR-MIB::fisSessUsage = INTEGER: 5