跳转到主内容
NetApp Response to Russia-Ukraine Cyber Threat
In response to the recent rise in cyber threat due to the Russian-Ukraine crisis, NetApp is actively monitoring the global security intelligence and updating our cybersecurity measures. We follow U.S. Federal Government guidance and remain on high alert. Customers are encouraged to monitor the Cybersecurity and Infrastructure Security (CISA) website for new information as it develops and remain on high alert.

MetroCluster Tiebreaker 对 SNMP 陷阱使用了错误的 IP

Views:
Visibility:
Public
Votes:
0
Category:
metrocluster
Specialty:
metrocluster
Last Updated:

适用场景

  • MetroCluster 拉断器
  • 具有多个以太网接口的主机系统

问题描述

  • 运行 snmp config test Tiebreaker 时,不会使用预期的 IP 发送 SNMP 陷阱

示例:

ip addr 显示 ""

1: enp0s3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
    link/ether 08:01:23:49:12:34 brd ff:ff:ff:ff:ff:ff
    inet 10.0.2.15/24 brd 10.0.2.255 scope global noprefixroute dynamic enp0s3

2: enp0s8: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
    link/ether 12:34:27:f1:23:4d brd ff:ff:ff:ff:ff:ff
    inet 10.0.2.25/24 brd 10.0.2.255 scope global noprefixroute dynamic enp0s8

  • traphost 应从具有enp0s3 IP 的接口接收消息 10.0.2.15
  • 消息是通过接口发送的enp0s3、但它具有10.0.2.25 IP 、来自 enp0s8 
  • 这可以在 SNMP 陷阱主机日志或数据包跟踪中看到

 

Scan to view the article on your device
CUSTOMER EXCLUSIVE CONTENT

Registered NetApp customers get unlimited access to our dynamic Knowledge Base.

New authoritative content is published and updated each day by our team of experts.

Current Customer or Partner?

Sign In for unlimited access

New to NetApp?

Learn more about our award-winning Support