Configure notification by SNMP traps

Before you begin

  • To configure SNMP traps, you will require a server that will act as an SNMP server. The SNMP server can be any Windows or Linux system installed with an MIB browser such as iReasoning.
  • Make sure your Active Fail-Open chassis IP address can be reached within the network.
  • Make sure your SNMP server and Active Fail-Open chassis are able to communicate.
  • In addition, you will need to obtain MIB files to decode alert codes sent by the Active Fail-Open chassis. These files are specific to the Active Fail-Open chassis and can be obtained by clicking on the following link, KB86247.
Note: The SNMP feature of your Active Fail-Open chassis can only be used to send notifications through SNMP traps.


  1. Connect an RJ-45 cable to the Management port at the front of the Active Fail-Open chassis.
  2. Connect the other end to a network device so that the SNMP server is reachable through the network.
  3. Copy the Fail-Open module MIB files to a suitable location on the SNMP server.
  4. Set up the Active Fail-Open chassis IP address, network mask, and SNMP manager IP address by logging on to the web interface.
    Note: You are also able to configure various other parameters specific to SNMP traps.
  5. On the web interface, click the SNMP tab.
    The SNMP configuration page appears.

  6. To configure the SNMP server IPv4 address, enter it in the Server IP field.
    The credentials used will be the default credentials for the Fail-Open module.
  7. (Optional) If you want to configure multiple SNMP accounts, in the SNMP trap account section select set from the Operations drop-down.
    Note: If you do not configure additional SNMP trap accounts, all traps will be routed to the main SNMP trap account you have setup here.
  8. Enter the IPv4 address for the other account.
  9. (Optional) You can specify an alternate SNMPv3 password for the additional SNMP server.
    Note: SNMP Community strings are used only by devices which support SNMPv1 and SNMPv2c protocols. SNMPv3 uses username and password authentication, along with an encryption key. You can configure a community string if the SNMP software you use requires you to configure one regardless of the requirements in this user-interface.
  10. Click Apply to save your configuration.
  11. In the SNMP server, configure these settings to enable SNMPv3 traps for the active fail-open kit.
    • USM user: McAfee00
    • Security level: auth, priv
    • Auth algorithm: SHA
    • Auth password: McAfee00
    • Privacy algorithm: AES
    • Privacy password: McAfee00
  12. Load MIB file. If you do not have the appropriate MIB file, contact McAfee Support.
  13. Make sure the SNMP server and Fail-Open module are able to communicate through the network.


You have configured your active Fail-Open module to send SNMP traps to an SNMP server. You are also provided the option to configure multiple SNMP trap accounts. Access the SNMP server to view triggers.