David Dickson | 1 Jun 03:44 2003
Picon
Picon

Dept of Homeland Security - New Speaker Added - Cyber - 5 June - Arl Va.

 

TO:  net-snmp-users <at> lists.sourceforge.net

 

 

Protecting America’s Infrastructure:

Cyber Defense

Homeland Defense Training Conference™

 
Special Announcement

New Speakers Added

 

Government Opening Speaker

 

Mr. Mike Lombard, Director, Office of Infrastructure Analysis, Department of Homeland Security (DHS) IAIP/IPD
 

Other Speakers Include
 

§         Jeff Goldthorp, Chief, Network Technology Division, Office of Engineering and Technology, Federal Communications Commission (FCC)

 

§         Tom O'Keefe, Deputy Director for Information System Security, Federal Aviation Administration (FAA)

 

§         Martha Stansell-Gamm, Chief, Computer Crime Intellectual Property Section, US Department of Justice (DOJ)

 

§         Michael J. Skroch, Manager, Information Operations Red Team & Assessments, Sandia National Laboratories

 

§         Michael L. Jackson, Associate Director, Division of Supervision and Consumer Protection, Federal Deposit Insurance Corporation (FDIC)

 

§         Edward Roback, Division Chief, Computer Scientist, Computer Security Division, National Institute of Standards and Technology (NIST)

 

§         Tony Cole, Senior Manager, Critical Infrastructure Protection Programs, Symantec Corporation

 

§         Mark Lavoie, Communication Officer, Director of Navy Marine Corps Intranet (NMCI) Office

 

§         Perry Pederson, Infrastructure Protection Program Manager, Technical Support Working Group (TSWG)
 

Thursday, 5 June 2003
 

Executive Conference Center

NRECA Building

4301 Wilson Boulevard

Arlington, Virginia 22203

 

 

Time: 7:30 AM Registration

Program Starts: 8:30 AM

Wrap-up: 4:30 PM

 

Continental Breakfast, Refreshments, Lunch included.

Registration Fee
  • Industry Credit Card or Check in Advance $595

  • Government Training Forms/Invoice $395

About Cyber Defense

Presidential Decision Directive (PDD-63) calls for the protection of Americans against attacks on physical facilities and computer systems.  The directive outlines a coordinated, collaborative effort between all levels of government and the private sector to address and solve issues related to providing protection to critical infrastructures.

 

Recent events in the United States and in other parts of the world have focused considerable attention on the potential occurrence of major incidents of public terrorism.  In our own country, such incidents have included the bombings of the World Trade Center, the Pentagon, the Federal Building in Oklahoma City, and the Olympic Park in Atlanta. Throughout the rest of the world there have been bombings and chemical weapon attacks in Japan, Europe, the Middle East, South America, and Africa. The high level of concern about terrorism is reflected in the President’s creation of a Presidential Commission on Critical Infrastructure Protection and a White House Commission on Aviation Safety and Security.

 

The trends of growth in broadband access given to employees and the greater connectivity of computer systems and networks need to be counterbalanced by a corresponding growth in technologies to prevent cyber-invasions.  Current approaches, though useful, are insufficient against sophisticated perpetrators and cyber-terrorists.  Attacks against our most vital computer networks represent a significant threat to our safety and security.  Our critical infrastructure needs protection from acts of terrorism and crime with a rapid adaptability to natural or intentional disruptions.

 

Conference Goal

Market*Access will host a training conference for industry and government focusing on agency needs and requirements in the area of Homeland Defense regarding Cyber Security, Network Infrastructure Protection and Cyber Terrorism. This will be a public-level series of training presentations on the challenges ahead. Speakers will represent federal agencies and leading security, equipment and systems suppliers.

 

The goal of this meeting is to begin to prepare U.S. government and industry for the changes that will come about regarding cyber defense.

Exhibitors May Include
 

  • Wireless security

  • Mobile and wireless communications

  • Security planners

  • Federal systems integrators

  • Intrusion Detection, Firewalls

  • Network and Systems Security Training and Consulting

  • Disaster recovery and facility security

  • Help desk operators and builders

… and many others

Who Should Attend
 

  • Federal systems integrators and solutions providers

  • Federal, State and Local CIOs and IT teams

  • U.S. Civil agencies with critical IT and systems infrastructure to be protected

  • Computer and information systems security infrastructure executives

  • DoD systems planners

  • Federal managers and executives looking for information sharing initiatives

  • Security professionals

What you will learn
 

  • What are the possible programs and funding sources

  • Understanding cyber threats, issues and requirements

  • National strategy for infrastructure protection

  • New products in development and on the drawing boards in terms of Cyber Security and Networking

  • New initiatives being planned at the federal, state and local levels.

  • Civil agency organization and planning

  • R&D initiatives
Points of Contact:

  • For information on exhibitor arrangements, please contact Ms. Donna Anderson, 703/807-2740

  • For registration or general information about this event, please contact Mr. Parrish Knight, 703/807-2748.  
Corporate Sponsors
·         Alvarion
·         Symantec
·         IntruVert
·         INPUT
·         Tipping Point Technologies

 …others to be announced.

 
Organizational Exhibitors
·         Homeland Defense Journal
·         Contingency Planning and Management On-Line
·         Disaster Recovery Institute
·         Wireless Communications Association
 Become an Exhibitor

If you would like to become an exhibitor at this conference, call Donna Anderson at 703-807-2740. 

Registration Fee
  • Industry Credit Card or Check in Advance $595

  • Government Training Forms/Invoice $395

 

Conference Registration Options

[1]  Online Call 703-807-2027 to get information how you can register and pay on-line.

[2]  Fax the attached registration form to 703-807-2728.

[3]  Phone 703-807-2748 and speak to Mr. Parrish Knight.

[5]  U.S. Mail our attached registration form to:

     Market*Access International

     4301 Wilson Blvd. #1003

     Arlington, VA   22203 

Directions to the Executive Conference Center:

The Ellipse Conference Center at Ballston

The National Rural Electric Cooperative Association, Plaza Level
4301 Wilson Boulevard, Arlington, Virginia 22203

Ladies' and men's lounges, public telephones, and a coat room are conveniently located inside this A-rated Conference Center.

Transportation and Parking:

At the corner of Wilson Boulevard and N. Taylor in the heart of Arlington's Ballston district, the Ellipse Conference Center is easily accessible by public transportation or automobile.

From Metro's Orange Line, exit at Ballston; NRECA is less than one block southwest from the Ballston Station. A covered walkway is available from the Metro Station Plaza to the Ballston Common Mall; NRECA is less than one block northwest from the mall exit.

From I-66, take the Glebe Road/Ballston Exit. Follow Glebe until it intersects with Wilson; turn left onto Wilson and left again onto N. Taylor Street. The building's four-level parking garage is accessible from the N. Taylor Street ramp. Rates start at $2.50 per hour. Two shuttle elevators operate from each garage level to the Plaza Lobby.

Marketing, Conference Management and Production by:

Market*Access International, Inc.
(301) 455-5633

***** REGISTRATION FORM *****

 

Protecting America’s Infrastructure: Cyber Defense

 

June 5, 2003

Registration Form

 

(Use additional pages as needed for multiple employees)

 

Attendee Name:

 

Title:

 

Company/Agency:

 

Address:

 

City:

 

State:

 

Zip Code:

 

Email:

 

Telephone:

 

Fax:

 

Registration Fee

 

·  Industry Credit Card or Check in Advance $595

·  Government Credit Card or Check in Advance $395

 

Note: Payment requested in advance.

Please check one of the following as your form of payment:

 

[ ] Check

Make checks payable to: Market*Access International

Send to: Market*Access, 4301 Wilson Blvd. #1003, Arlington, VA 22203

 

[ ] VISA [ ] MasterCard [ ] American Express

 

Account Number: ___________________________Exp. Date___________________

 

Cardholder Name: ______________________________________________________

 

Signature (required) or telephone order

________________________________________________________________

 

If you wish to be REMOVED from this list, please REPLY and place REMOVE in the SUBJECT line.  We do not wish to send you emails that you do not wish to receive.

 

 

Corey M. Ellis | 1 Jun 17:19 2003
Picon
Picon

delayed_instance example question

Hi,

I am currently in the design phase of our sub-agent.  I am exploring
options, and I would like to know if the delayed instance example is a good
approach for us.  Our sub-agent will be answering GET/SET requests for
external Java apps.  The sub-agent will hold socket connections
(communication to the Java apps is via XML).

Now when I receive a GET/SET, I will need to query the Java app via XML, and
then respond with an answer, I was thinking that this delayed_instance
example may be what we need for our OID registrations.

I would like some questions answered concerning this example, if possible.

1)  How does the sub-agent know to check for that answer again, after being
notified of a delay.  Is it via the alarm call?  so once I issue an alarm
the sub-agent knows to look up the data?

2)  If all my registrations were using delayed_instances, how would this
effect the sub-agent in general? We don't foresee too many GET/SET requests,
but I just want to know if anyone is using this delayed architecture in any
of there agents.

3) Anything to watch out for when designing a sub-agent to use the delayed
method, or basically the example is adequate to follow?

Thanks

====================================
Corey M. Ellis
Senior Network Engineer
Comverse Technologies
909 3rd Avenue, NY, NY 10022
====================================

-------------------------------------------------------
This SF.net email is sponsored by: eBay
Get office equipment for less on eBay!
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users <at> lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

sri | 2 Jun 08:17 2003

Urgent snmpawalk output details help

Hi,
 
I have got the snmpwalk output .I want the details for below descrptions or expanding of these fields of
 
ifInOctets, ifInUcastPkts, ifInNUcastPkts, ifOutUcastPkts, ifInErrors, ifOutNUcastPkts
 

 

ifInOctets.2 = Counter32: 57641384

ifInUcastPkts.2 = Counter32: 434608

ifInNUcastPkts.2 = Counter32: 124705

ifInErrors.2 = Counter32: 48

ifOutUcastPkts.2 = Counter32: 301995

ifOutNUcastPkts.2 = Counter32: 653

ifOutErrors.2 = Counter32: 8

kasiwagi | 2 Jun 11:05 2003
Picon

What do I do to execute a command?

Hello.

I wanna execute a command on the agent and wanna return the result.
But I don't know how to write the MIB file and program.
For example,I do like the following;
(Ping.0::="/bin/ping")
% snmpget -c public localhost Ping.0
% <the result of /bin/ping>

net-snmp-5.0.8/mibs/NET-SNMP-MONITOR-MIB.txt says as following;
---
nsProcess                   OBJECT IDENTIFIER ::= {netSnmpObjects 21}
nsDisk                      OBJECT IDENTIFIER ::= {netSnmpObjects 22}
nsFile                      OBJECT IDENTIFIER ::= {netSnmpObjects 23}
nsLog                       OBJECT IDENTIFIER ::= {netSnmpObjects 24}

--
--  Process Monitoring
--

--
--  Disk Monitoring
--

--
--  File Monitoring
--

--
--  Log Monitoring
--
---

No information is got.

Please tell me how to write the mib file and what to do 
if I wanna execute a command on the agent.

-------------------------------------------------------
This SF.net email is sponsored by: eBay
Get office equipment for less on eBay!
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users <at> lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

afrasyab bashir | 2 Jun 12:47 2003
Picon

RE: how to get mac address?

Hi,


atonns <at> mail.ivillage.com wrote:

>If you're using Cisco equipment, this might help. It might even help if >you're not using cisco equipment :)

>http://www.cisco.com/warp/public/477/SNMP/cam_snmp.html

Dave Shields wrote:

> Try
>     snmpwalk -v 1 -c {community} {switch}
> BRIDGE-MIB::dot1dTpFdbAddress
>
> That will list all of the MAC addresses that it knows about.
> If you want to know which port each system is connected to,
> try
>     snmpwalk -v 1 -c {community} {switch} BRIDGE-MIB::dot1dTpFdbPort

Hi,

Not all switches implement BRIDGE-MIB but most do implement SNMPv2-SMI

and same (MACs) can be retrieved from

snmpwalk -c public -v 1 {SWITCH} SNMPv2-SMI::mib-2.17.4.3.1.1

and that which MAC is connected to which port, from

snmpwalk -c public -v 1 {SWITCH} SNMPv2-SMI::mib-2.17.4.3.1.2

PROBLEM:

like BRIDGE-MIB, above OID also returns a number of MACs connected to a single port (i.e. because it gets the MACs from whichever packet has passed through switch OR whatever good reason for it) as you can see the result from port 6 below (at the end of this mail).

While making a software program this is usually required (MAC of machine physically connected to switch) by those, who are trying to find the topology (or something like it) of a network. When so many machines come connected to a single port then which one is actually (physically) connected? that is difficult to know and thus is a problem.

I was just seeing the pattern and found out that most of the time the first entry(as the first reply in the example below, at the end of mail) is that of a physically connected machine. and that is how i have moved forward but i've yet to find out the correct and cent percent sure procedure. Could you please put some light on that??

regards

afrasyab

OUTPUT FROM PORT 6 of SWITCH 14.32.6.17

nms-server2:/home/ccarring> snmpwalk -c public <at> 6 14.32.6.17 dot1dTpFdbAddress
.1.3.6.1.2.1.17.4.3.1.1.0.2.185.144.76.102 = Hex-STRING: 00 02 B9 90 4C 66
.1.3.6.1.2.1.17.4.3.1.1.0.2.253.106.170.243 = Hex-STRING: 00 02 FD 6A AA F3
.1.3.6.1.2.1.17.4.3.1.1.0.16.13.56.16.0 = Hex-STRING: 00 10 0D 38 10 00
.1.3.6.1.2.1.17.4.3.1.1.0.96.84.144.248.0 = Hex-STRING: 00 60 54 90 F8 00
.1.3.6.1.2.1.17.4.3.1.1.0.208.2.214.120.10 = Hex-STRING: 00 D0 02 D6 78 0A
.1.3.6.1.2.1.17.4.3.1.1.0.208.211.54.162.60 = Hex-STRING: 00 D0 D3 36 A2 3C
.1.3.6.1.2.1.17.4.3.1.1.0.224.30.159.10.210 = Hex-STRING: 00 E0 1E 9F 0A D2

 

Do you Yahoo!?
Free online calendar with sync to Outlook(TM).
Satya | 2 Jun 13:27 2003
Picon

Reg Enterprise Traps


I would like to know whether the following info which i know about the
generating of enterprise specific traps is correct or not.

1. We need to write an MIB file with the enterprise trap oids.

2. Using mib2c we can generate the .c and .h files

3. Finetune the generated code.

4. Intergrate the new mib with the Agent or try to execute the snmptrap
command with the newly created MIB file.

Regds,
Satya

-------------------------------
N. Satya Narayana
#68, NCST
Electronics City
Bangalore - 561229
Phone: 080 - 8523300 Extn: 2202

-------------------------------------------------------
This SF.net email is sponsored by: eBay
Get office equipment for less on eBay!
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users <at> lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Kevin_Synott | 2 Jun 13:48 2003
Picon

RE: how to get mac address?


I must admit to finding this confusing :-)

afrasyab claims that many switches do not support the BRIDGE-MIB and then
uses 2 objects from it.

SNMPv2-SMI::mib-2.17.4.3.1.1 is BRIDGE-MIB::dot1dTpFdbAddress

SNMPv2-SMI::mib-2.17.4.3.1.2 is BRIDGE-MIB::dot1dTpFdbPort

They are just written in different human readable ways.  They have the same
object ids.  They are the same objects.

Reading SNMPv2-SMI::mib-2.17.4.3.1.1 (BRIDGE-MIB::dot1dTpFdbAddress) is
unnecessary in this case.  When BRIDGE-MIB::dot1dTpFdbPort is walked, the
returned values contain the port information and the returned object id
indices contain  the MAC addresses associated with that port.

BRIDGE-MIB::dot1dTpFdbAddress is the index for the dot1dTpFdbTable.
Reading the index object is not always a wise option, since in many latter
day tables, the index object has a MAX-ACCESS of not-accessible.  In this
case, dot1dTpFdbAddress has an access of read-only...

Kevin Synott
Senior Software Engineer
Design and Development Centre
Pioneer Technology UK
Pioneer House
Hollybush Hill
Stoke Poges
Slough
Buckinghamshire
SL2 4QP
UK

Tel: +44(0) 1753 789622
Fax: +44(0) 1753 789612

                                                                                                                                     
                    afrasyab bashir                                                                                                  
                    <netsnmp <at> yahoo.com>                    To:     net-snmp-users <at> lists.sourceforge.net                              
                    Sent by:                               cc:     atonns <at> mail.ivillage.com                                          
                    net-snmp-users-admin <at> lists.sourc       Subject:     RE: how to get mac address?                                  
                    eforge.net                                                                                                       

                                                                                                                                     
                    02/06/2003 11:47                                                                                                 

Hi,

atonns <at> mail.ivillage.com wrote:

>If you're using Cisco equipment, this might help. It might even help if
>you're not using cisco equipment :)

>http://www.cisco.com/warp/public/477/SNMP/cam_snmp.html

Dave Shields wrote:

> Try
>     snmpwalk -v 1 -c {community} {switch}
> BRIDGE-MIB::dot1dTpFdbAddress
>
> That will list all of the MAC addresses that it knows about.
> If you want to know which port each system is connected to,
> try
>     snmpwalk -v 1 -c {community} {switch} BRIDGE-MIB::dot1dTpFdbPort

Hi,

Not all switches implement BRIDGE-MIB but most do implement SNMPv2-SMI

and same (MACs) can be retrieved from

snmpwalk -c public -v 1 {SWITCH} SNMPv2-SMI::mib-2.17.4.3.1.1

and that which MAC is connected to which port, from

snmpwalk -c public -v 1 {SWITCH} SNMPv2-SMI::mib-2.17.4.3.1.2

PROBLEM:

like BRIDGE-MIB, above OID also returns a number of MACs connected to a
single port (i.e. because it gets the MACs from whichever packet has passed
through switch OR whatever good reason for it) as you can see the result
from port 6 below (at the end of this mail).

While making a software program this is usually required (MAC of machine
physically connected to switch) by those, who are trying to find the
topology (or something like it) of a network. When so many machines come
connected to a single port then which one is actually (physically)
connected? that is difficult to know and thus is a problem.

I was just seeing the pattern and found out that most of the time the first
entry(as the first reply in the example below, at the end of mail) is that
of a physically connected machine. and that is how i have moved forward but
i've yet to find out the correct and cent percent sure procedure. Could you
please put some light on that??

regards

afrasyab

OUTPUT FROM PORT 6 of SWITCH 14.32.6.17

nms-server2:/home/ccarring> snmpwalk -c public <at> 6 14.32.6.17
dot1dTpFdbAddress
.1.3.6.1.2.1.17.4.3.1.1.0.2.185.144.76.102 = Hex-STRING: 00 02 B9 90 4C 66
.1.3.6.1.2.1.17.4.3.1.1.0.2.253.106.170.243 = Hex-STRING: 00 02 FD 6A AA F3
.1.3.6.1.2.1.17.4.3.1.1.0.16.13.56.16.0 = Hex-STRING: 00 10 0D 38 10 00
.1.3.6.1.2.1.17.4.3.1.1.0.96.84.144.248.0 = Hex-STRING: 00 60 54 90 F8 00
.1.3.6.1.2.1.17.4.3.1.1.0.208.2.214.120.10 = Hex-STRING: 00 D0 02 D6 78 0A
.1.3.6.1.2.1.17.4.3.1.1.0.208.211.54.162.60 = Hex-STRING: 00 D0 D3 36 A2 3C
.1.3.6.1.2.1.17.4.3.1.1.0.224.30.159.10.210 = Hex-STRING: 00 E0 1E 9F 0A D2

Do you Yahoo!?
Free online calendar with sync to Outlook(TM).

This e-mail and any files transmitted with it are confidential and intended solely for the use of the
individual to whom they are addressed.
If you have received this e-mail in error please notify your system manager.

Please note that any views or opinions presented in this e-mail are solely those of the author and do not
necessarily represent those of the company.

Finally, the recipient should check this e-mail and any attachments for the presence of viruses. The
company accepts no liability for any damage caused by any virus transmitted by this e-mail.

-------------------------------------------------------
This SF.net email is sponsored by: eBay
Get office equipment for less on eBay!
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users <at> lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Dave Shield | 2 Jun 14:43 2003
Picon

Re: Re-posting question about snmptrapd


>                                                                       I was
> hoping too take some of the NET-SNMP API code for parsing traps and instead
> of writing to a file as snmptrapd does; I would rather store information and
> then resend the trap from the sub-agent using send_V2trap() call.
> 
> This is what I would like to do.  Any ideas, or suggestions?

OK - as promised, I've been working on this over the last couple of days,
and have just committed some new code to the main CVS tree.   This replaces
the existing trapd internals with a much more modular approach, allowing
new styles of trap handling to be added relatively easily.

   In particular, I've also written a (very simple) trap forwarding
mechanism, that can resend an incoming notification PDU out to another
destination.   There's a fair bit more polishing that I'd like to do,
but Wes is always on at me to commit little-and-often rather than the
typical Shield delete-all-and-insert updates.

   It doesn't (yet) support forwarding via AgentX, as we discussed last
week.   That'd actually be quite simple to do, but I'm due to go any
see our proposed new building in twenty minutes, and wanted to get this
made available before we went over!

Anyway, I'd be interested in hearing what you (or anyone else) thinks
about this.

Dave

-------------------------------------------------------
This SF.net email is sponsored by: eBay
Get office equipment for less on eBay!
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users <at> lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Dave Shield | 2 Jun 16:15 2003
Picon

Re: lm sensors and net-snmp across Redhat 7.0,7.2 and 8.0

> I have gone and pulled the LM-SENSORS-MIB.txt file for lmsensors off of
> the net. .....                    Is that txt file just the skeleton
> architecture for lm sensors?

Sort of.   That defines the structure of the data being reported.
As such, the clients can use it to interpret any responses that they
receive from an agent.

In itself, this isn't sufficient for the agent to actually report the
object.   Think of it as the formal design specification for a program.
Having been given the design, you still need to actually write code to
implement the thing,

>                            Am going to have to go in and build out
> this section myself?  Or has anyone already done this and can give me
> some pointers on where to look?

There appears to be an implementation of it under ucd-snmp/lmSensors
If you configure this into the agent, you should be able to retrieve
the objects.
   But I've not tried this myself, so I don't know if there are
any hidden pitfalls.   Suck it and See.

Dave

-------------------------------------------------------
This SF.net email is sponsored by: eBay
Get office equipment for less on eBay!
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users <at> lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users

Andrew E. Page | 2 Jun 16:18 2003

Re: Urgent snmpawalk output details help

Find the IF-MIB.txt file on your system.   If you look around line 300,
you'll see some more details of these entries.  You might also want to
look at the book ESSENTIAL SNMP from O'Reilly & Associates, Appendix A.

On Mon, 2003-06-02 at 02:17, sri wrote:
> Hi,
> 
> I have got the snmpwalk output .I want the details for below descrptions or expanding of these fields of
> 
> ifInOctets, ifInUcastPkts, ifInNUcastPkts, ifOutUcastPkts, ifInErrors, ifOutNUcastPkts
> 
> 
> 
> ifInOctets.2 = Counter32: 57641384
> 
> ifInUcastPkts.2 = Counter32: 434608
> 
> ifInNUcastPkts.2 = Counter32: 124705
> 
> ifInErrors.2 = Counter32: 48
> 
> ifOutUcastPkts.2 = Counter32: 301995
> 
> ifOutNUcastPkts.2 = Counter32: 653
> 
> ifOutErrors.2 = Counter32: 8
> 

-------------------------------------------------------
This SF.net email is sponsored by: eBay
Get office equipment for less on eBay!
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
_______________________________________________
Net-snmp-users mailing list
Net-snmp-users <at> lists.sourceforge.net
Please see the following page to unsubscribe or change other options:
https://lists.sourceforge.net/lists/listinfo/net-snmp-users


Gmane