Fortinet white logo
Fortinet white logo

Administration Guide

SNMP

SNMP

SNMP enables FortiIsolator administrators to monitor hardware on client’s network.

An admin user can configure the hardware, such as the FortiIsolator SNMP agent, to report system information and send traps (alarms or event messages) to SNMP managers. SNMP traps alert admin users to events that happen, such as the session limit is about to reach.

The FortiIsolator SNMP implementation is read-only. Currently SNMP v1/v2c compliant SNMP managers have read-only access to FortiIsolator system information through queries, and can receive trap messages from the FortiIsolator unit.

SNMP Configuration

Before a remote SNMP manager can connect to the FortiIsolator SNMP agent, configurations must be made on FortiIsolator interface and Community string in order to accept SNMP connections.

To configure a FortiIsolator interface and Community string to accept SNMP connections in the GUI:

  1. Go to System > SNMP.
  2. Under interface dropdown list, select an interface.
  3. In the Community box, enter SNMP community string.
  4. Click OK.

To configure a FortiIsolator interface to accept SNMP connections in the CLI:

set snmpd-interface <internal|external|mgmt|ha>

set snmpd-interface mgmt

To configure a Community string to accept SNMP connections in the CLI:

set snmpd-community <fis_community>

set snmpd-community fis_public

File: /var/log/syslog/snmpd.conf

rocommunity fis_public default -V systemonly

Configuration for SNMP Traps:

set session-threshold [1-100]

set session-threshold 5

set trap-host-ip <host-ip>

set trap-host-ip 192.168.1.100

set trap-host-community <host-community>

set trap-host-community public

File: /etc/snmp/ snmptrapd.conf

authCommunity log,execute,net public

SNMP Server Configuration

Make sure to include these settings in SNMP .conf files:

> cat /etc/snmp/snmp.conf

mibs +ALL

> cat /etc/snmp/snmpd.conf

rocommunity fis_public default -V systemonly

> cat /var/log/syslog/snmptrapd.conf

authCommunity log,execute,net public

Example results from SNMP Traps:

> tail -f /var/log/syslog | grep snmp

Apr 14 15:07:00 bigdata snmptrapd[32688]: 2021-04-14 15:07:00 <UNKNOWN> [UDP: [FIS_IP]:56623->[SNMP_Server_IP]:162]:#012DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (1460730) 4:03:27.30#011SNMPv2-MIB::snmpTrapOID.0 = OID: FORTINET-FORTIISOLATOR-MIB::fisTrapSessOverThreshold#011FORTINET-FORTIISOLATOR-MIB::fisSessUsage = INTEGER: 5

Apr 14 15:07:00 bigdata snmptrapd[32688]: 2021-04-14 15:07:00 <UNKNOWN> [UDP: [FIS_IP]:56623->[SNMP_Server_IP]:162]:#012DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (1460730) 4:03:27.30#011SNMPv2-MIB::snmpTrapOID.0 = OID: FORTINET-FORTIISOLATOR-MIB::fisTrapSessOverThreshold#011FORTINET-FORTIISOLATOR-MIB::fisSessUsage = INTEGER: 5

SNMP

SNMP

SNMP enables FortiIsolator administrators to monitor hardware on client’s network.

An admin user can configure the hardware, such as the FortiIsolator SNMP agent, to report system information and send traps (alarms or event messages) to SNMP managers. SNMP traps alert admin users to events that happen, such as the session limit is about to reach.

The FortiIsolator SNMP implementation is read-only. Currently SNMP v1/v2c compliant SNMP managers have read-only access to FortiIsolator system information through queries, and can receive trap messages from the FortiIsolator unit.

SNMP Configuration

Before a remote SNMP manager can connect to the FortiIsolator SNMP agent, configurations must be made on FortiIsolator interface and Community string in order to accept SNMP connections.

To configure a FortiIsolator interface and Community string to accept SNMP connections in the GUI:

  1. Go to System > SNMP.
  2. Under interface dropdown list, select an interface.
  3. In the Community box, enter SNMP community string.
  4. Click OK.

To configure a FortiIsolator interface to accept SNMP connections in the CLI:

set snmpd-interface <internal|external|mgmt|ha>

set snmpd-interface mgmt

To configure a Community string to accept SNMP connections in the CLI:

set snmpd-community <fis_community>

set snmpd-community fis_public

File: /var/log/syslog/snmpd.conf

rocommunity fis_public default -V systemonly

Configuration for SNMP Traps:

set session-threshold [1-100]

set session-threshold 5

set trap-host-ip <host-ip>

set trap-host-ip 192.168.1.100

set trap-host-community <host-community>

set trap-host-community public

File: /etc/snmp/ snmptrapd.conf

authCommunity log,execute,net public

SNMP Server Configuration

Make sure to include these settings in SNMP .conf files:

> cat /etc/snmp/snmp.conf

mibs +ALL

> cat /etc/snmp/snmpd.conf

rocommunity fis_public default -V systemonly

> cat /var/log/syslog/snmptrapd.conf

authCommunity log,execute,net public

Example results from SNMP Traps:

> tail -f /var/log/syslog | grep snmp

Apr 14 15:07:00 bigdata snmptrapd[32688]: 2021-04-14 15:07:00 <UNKNOWN> [UDP: [FIS_IP]:56623->[SNMP_Server_IP]:162]:#012DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (1460730) 4:03:27.30#011SNMPv2-MIB::snmpTrapOID.0 = OID: FORTINET-FORTIISOLATOR-MIB::fisTrapSessOverThreshold#011FORTINET-FORTIISOLATOR-MIB::fisSessUsage = INTEGER: 5

Apr 14 15:07:00 bigdata snmptrapd[32688]: 2021-04-14 15:07:00 <UNKNOWN> [UDP: [FIS_IP]:56623->[SNMP_Server_IP]:162]:#012DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (1460730) 4:03:27.30#011SNMPv2-MIB::snmpTrapOID.0 = OID: FORTINET-FORTIISOLATOR-MIB::fisTrapSessOverThreshold#011FORTINET-FORTIISOLATOR-MIB::fisSessUsage = INTEGER: 5