Description | This article describes tips to interpret SNMP (Simple Network Management Protocol) debug output as a user downloads malware file. Step-by-step instructions are provided on how to read and analyze SNMP debug output. |
Scope | All FortiGate models. |
Solution |
In Troubleshooting Tip: How to troubleshoot SNMP traps not getting generated from the firewall, troubleshooting steps are described for enabling SNMP debugs in the firewall to confirm if TRAPS are generated by the FortiGate firewall (FortiGate). This guide will dive deep into the logs generated when a test file with a virus is downloaded as well as captures to see how the object identifier (OIDs) are displayed.
Network topology:
Test to see whether the FortiGate is generating and sending a trap when malware is downloaded:
Configuration:
The expected debugs from an SNMP perspective when a user downloads malware are as follows:
diagnose debug app snmp -1 diagnose debug enable
snmpd: attempting v1 trap: av_virus(601) <- Starts the process to generate the TRAP on V1.
The view from the packet capture:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.