| Description |
This article describes the steps to resolve the SNMP traffic policy violation issue. The issue occurs when the SNMP traffic is blocked due to a local-in policy violation, and debug flow show output as below:
id=65308 trace_id=110 func=print_pkt_detail line=5813 msg="vd-root:0 received a packet(proto=17, 10.10.3.6:54923->10.10.1.11:161) tun_id=0.0.0.0 from Vlan.934. " id=65308 trace_id=110 func=init_ip_session_common line=5997 msg="allocate a new session-00f3d090" id=65308 id=65308 trace_id=1304 func=__iprope_check_one_policy line=2243 msg="policy-4294967295 is matched, act-drop" |
| Scope | FortiGate, FortiOS. |
| Solution |
Make sure that not all the admin users have a trusted-host set. To resolve the SNMP traffic policy violation issue, follow these steps:
By adding the SNMP collector IP to the trusted host configuration, the SNMP traffic policy violation issue is resolved, and SNMP polling works. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.