Skip to content

Network SNMP Trap Management Dashboard - rConfig V8 UI

SNMP Trap Handler: User Interface and Administration

Section titled “SNMP Trap Handler: User Interface and Administration”

The SNMP Trap Handler provides a comprehensive web-based interface for monitoring, filtering, and managing SNMP trap notifications from your network devices. This guide covers all aspects of the trap management interface, from real-time dashboard monitoring to advanced filter configuration and device resolution mapping.


Navigate to the SNMP Trap Handler interface through the rConfig main navigation:

Network Services → SNMP Traps

rConfig V8 navigation menu showing SNMP Trap Handler location in Network Services section

The interface is organized into four primary sections accessible via tabs:

  • Dashboard: Real-time monitoring and trap activity overview
  • Trap Filters: Configure rules to match and process specific traps
  • Device Resolution: Map trap source IPs to rConfig device records
  • Logs: Historical trap records and processing details

The SNMP Trap Dashboard provides at-a-glance visibility into trap reception, processing status, and system health.

rConfig V8 SNMP Trap Dashboard displaying service status, performance metrics, and real-time trap monitoring

Service Status Panel: Displays current operational state of the SNMP Trap Handler service:

  • Online (Green): Service running and receiving traps
  • Port 162 Inactive (Yellow): Service running but not bound to standard port
  • Offline (Red): Service not running or unreachable

Last Update Timestamp: Shows when the dashboard last refreshed data from the trap handler, confirming real-time communication between the UI and the background service.

View Docs Link: Quick access to trap handler documentation and configuration guides.

The dashboard displays four primary metrics providing operational insights:

Traps Today:

  • Total number of traps received since midnight
  • Percentage change compared to previous day
  • Positive change indicates increased trap volume (potential issues or expanded monitoring)
  • Negative change suggests reduced activity (potential device connectivity issues)

Matched Filters:

  • Number of traps that matched configured filter rules today
  • Total number of filter rules currently configured
  • Low match rate may indicate filters need refinement or new filters required

Config Downloads:

  • Number of configuration backups triggered by trap-based automation
  • Shows effectiveness of trap-driven backup workflows
  • Useful for tracking event-driven configuration captures

Failed Processing:

  • Count of traps that encountered processing errors
  • Failure rate percentage of total traps received
  • High failure rates require investigation via Logs section

Real-time table displaying the latest SNMP traps as they arrive:

ColumnDescription
TimeTimestamp when trap was received (timezone: server local time)
SourceIP address of device that sent the trap
TypeTrap classification (if matched to filter) or “Unknown Trap”
StatusProcessing status: Received, Matched, Processed, Failed

Status Indicators:

  • Received: Trap successfully received by handler
  • Matched: Trap matched one or more configured filters
  • Processed: Associated actions executed successfully
  • Failed: Error occurred during trap processing

Unknown Trap Classification: Traps showing “Unknown Trap” have not matched any configured filters. This is normal for devices sending traps without filter rules configured, but frequent unknown traps from important devices suggest filters should be created.

Visual chart displaying devices generating the highest trap volumes over the selected time period. Useful for identifying:

  • Most active devices requiring filter configuration
  • Potential trap storms from malfunctioning equipment
  • Devices needing trap rate limiting or source filtering

No Device Activity: Displayed when no traps have been received or device resolution has not mapped trap sources to rConfig devices.

Filter Match Statistics:

  • Matched Traps: Count of traps successfully matched by filters
  • Unmatched Traps: Count of traps with no filter match
  • Match Rate: Percentage of total traps matching filters

Optimization Insight: Low match rates indicate opportunity to expand filter coverage. High match rates confirm effective filter configuration for your environment.

Processing Metrics:

  • Avg Processing Time: Mean time to process each trap (milliseconds)
  • Actions Executed: Total number of automated actions triggered by matched traps
  • Device Summary: Statistics on device resolution effectiveness

Performance Expectations:

  • Processing times under 50ms: Excellent performance
  • Processing times 50-200ms: Normal performance
  • Processing times over 200ms: May indicate database optimization needed or complex filter actions

Trap filters define rules that match incoming SNMP traps and trigger automated actions. Filters enable intelligent trap handling, transforming raw notifications into actionable workflows.

rConfig V8 SNMP Trap Filters management table displaying configured filter rules for network event processing

What Filters Do:

Trap filters examine incoming SNMP traps against defined criteria (OID, vendor, source) and execute specified actions when matches occur. This automation enables:

  • Selective Configuration Backups: Capture device config when “configuration changed” traps received
  • Alert Routing: Send notifications for critical traps while ignoring routine events
  • Event Correlation: Link trap events with configuration changes for audit trails
  • Action Throttling: Prevent action overload using cooldown periods

Filter Matching Process:

  1. Trap received from network device
  2. Handler extracts trap OID and varbinds
  3. Compares trap against all enabled filters
  4. First matching filter triggers configured actions
  5. Cooldown period prevents repeat action execution

The Filters table displays all configured trap filters with key attributes:

ColumnDescription
NameDescriptive filter identifier
DescriptionDetailed purpose and use case
Trap OIDObject Identifier that filter matches
VendorDevice manufacturer/platform
StatusEnabled/Disabled state
ActionsEdit or delete filter

Bulk Operations: Select multiple filters to enable, disable, or delete in a single operation.

Click Add to launch the trap filter creation form:

rConfig V8 Add SNMP Trap Filter form interface for creating network device trap processing rules

Trap Type (Optional):

  • Select from pre-configured trap examples imported from common vendor MIBs
  • Auto-populates Name, Description, OID, and Vendor fields
  • Useful for standard traps (linkDown, configChanged, authenticationFailure)
  • Leave blank for custom or uncommon traps

Name (Required):

  • Descriptive identifier for the filter
  • Best practice: Include vendor, trap purpose, and action
  • Example: “Cisco Config Change - Auto Backup”

Description:

  • Detailed explanation of filter purpose and expected behavior
  • Document business rationale and troubleshooting notes
  • Example: “Triggers immediate configuration backup when Cisco device sends ciscoConfigManEvent trap. Used for audit compliance on production core routers.”

Trap OID (Required):

  • Complete SNMP Object Identifier for the trap
  • Must match trap OID from device exactly
  • Example: 1.3.6.1.4.1.9.9.43.2.0.1 (Cisco config change)
  • Use MIB browsers or vendor documentation to identify correct OIDs

Vendor (Required):

  • Select device manufacturer from dropdown
  • Used for filter organization and reporting
  • Helps identify vendor-specific trap patterns

Status:

  • Enabled: Filter actively matches traps and executes actions
  • Disabled: Filter stored but inactive (useful for testing or temporary suspension)

Cooldown Override:

  • Minimum time period (seconds) before filter can trigger again for the same device
  • Prevents action overload during trap storms or rapid repeated events
  • Default: 300 seconds (5 minutes)
  • Lower values: More responsive but higher action frequency
  • Higher values: Reduces action load but may miss legitimate events

Cooldown Use Cases:

  • Configuration backup filters: 300-600 seconds (avoid backup storms)
  • Critical alerts: 60-120 seconds (ensure timely notification)
  • Routine monitoring: 600-1800 seconds (reduce notification noise)

Available Actions:

Select one or more actions to execute when the filter matches a trap:

  • Download Configuration: Trigger immediate device backup
  • Send Email Notification: Alert specified recipients
  • Execute Webhook: POST trap data to external systems
  • Create Incident Ticket: Integrate with ticketing systems
  • Run Custom Script: Execute user-defined automation

Action Sequencing: Actions execute in the order displayed. Critical actions (backups, tickets) should precede notifications to ensure data capture before alerting.

Action Configuration Example:

Filter: "Juniper Config Commit Notification"
Actions:
1. Download Configuration (Primary device)
2. Send Email Notification ([email protected])
3. Execute Webhook (https://monitoring.company.com/api/events)

Step-by-step demonstration of creating a trap filter from selection to action configuration

Start with Common Traps: Configure filters for high-value traps first:

  • Configuration change notifications
  • Authentication failures
  • Critical hardware alerts
  • Link state changes on critical interfaces

Test Before Enabling: Create filters in disabled state, verify OID accuracy in logs, then enable after confirming matches.

Document Filter Logic: Use description field to explain:

  • Why filter was created
  • Expected trap frequency
  • What actions accomplish
  • Any special considerations

Monitor Match Rates: Review dashboard filter performance regularly. Filters with zero matches may have incorrect OIDs or be obsolete.

Use Appropriate Cooldowns: Balance responsiveness with action overload. Start conservative (5-10 minutes), adjust based on actual trap patterns.


Device Resolution maps trap source IP addresses to rConfig device records, enabling trap correlation with device configurations and automated workflows.

rConfig V8 SNMP Trap Device Resolution mapping table for associating trap source IPs with managed devices

The Challenge: Network devices often send traps from management interfaces, loopback addresses, or secondary IPs that don’t match the IP address configured in rConfig for device management. Without resolution mapping, rConfig cannot associate traps with device records.

The Solution: Device IP mappings explicitly link trap source IPs to rConfig devices, enabling:

  • Accurate trap-to-device correlation in logs and reports
  • Device-specific filter actions (backup correct device when trap received)
  • Historical analysis of trap patterns per device
  • Integration with device-specific configuration workflows

Example Scenario:

  • Device “core-router-01” in rConfig: 10.1.1.1 (management IP)
  • Traps sent from: 192.168.100.1 (loopback interface)
  • Without mapping: Traps show “No device” in logs
  • With mapping: Traps correctly associated with core-router-01

Displays all configured IP mappings:

ColumnDescription
DevicerConfig device name
IP AddressTrap source IP to map
StatusEnabled/Disabled
NotesMapping documentation
ActionsEdit or delete mapping

Click Add to create a new device IP mapping:

rConfig V8 Add Device IP Mapping form for SNMP trap source device identification and resolution

Device (Required):

  • Select target device from rConfig device inventory
  • Use search/filter to locate device by name or IP
  • Device must exist in rConfig before creating mapping

IP Address (Required):

  • Enter trap source IP address exactly as seen in trap logs
  • Format: Standard IPv4 (e.g., 192.168.100.1) or IPv6
  • This is the IP address from which the device sends traps

Status:

  • Enabled: Mapping actively resolves trap sources
  • Disabled: Mapping stored but not used (testing or temporary)

Notes:

  • Document why mapping is needed
  • Record interface or source information
  • Example: “Loopback0 interface used for all SNMP operations”

Demonstration of identifying unmapped trap sources and creating device resolution mappings

Identify Unmapped Sources: Review trap logs for “No device” entries, note source IPs, create mappings for devices sending valuable traps.

Document Interface Context: Use Notes field to record which physical/logical interface sends traps. Aids troubleshooting when trap sources change.

Verify After Creation: After adding mapping, confirm next trap from that IP correctly associates with device in trap logs.

Handle Multi-Interface Devices: Devices with multiple management IPs sending traps may require multiple mappings (one per source IP).

Update During Network Changes: When devices are readdressed or management interfaces change, update or create new mappings to maintain correlation.


The Logs section provides searchable, filterable access to all received SNMP traps with detailed processing information.

rConfig V8 SNMP Trap Logs table with search filters and historical network trap event records
ColumnDescription
IDUnique trap record identifier
SourceIP address that sent the trap
Trap OIDObject Identifier of received trap (N/A if not parsed)
Event TypeTrap classification from filter or parsed MIB
DeviceMapped device name or “No device” if unmapped
Filter MatchName of matched filter or “No match”
StatusProcessing status (received, processed, failed)
CreatedTimestamp when trap was received
ActionsView details, raw trap data, or delete

Example Log Entry:

ID: 1009
Source: 127.0.0.1
Trap OID: N/A
Event Type: Memory Usage Check
Device: No device
Filter Match: No match
Status: received
Created: 12/10/2025, 20:15:13

Analysis: This trap was received from localhost (likely test trap), did not match any filter, and has no device mapping. The event type suggests it’s a monitoring trap that may not require action.

Search Capabilities:

  • Filter by source IP address
  • Search by device name
  • Filter by event type or trap OID
  • Date range selection
  • Status filtering (received, processed, failed)

Common Search Scenarios:

Find all traps from specific device:

  1. Enter device name in search
  2. Review trap frequency and types
  3. Identify candidates for filter creation

Identify failed processing:

  1. Filter status: “failed”
  2. Review error details in trap details
  3. Troubleshoot filter actions or device mappings

Analyze trap patterns:

  1. Select date range
  2. Export filtered results
  3. Analyze in spreadsheet for trends

Click the actions menu (⋯) and select “View Details” to see complete trap information:

Detail View Includes:

  • Complete varbind list (all OID-value pairs in trap)
  • Raw trap PDU data
  • Processing timeline (received, matched, actions executed)
  • Error messages if processing failed
  • Associated device configuration snapshot (if backup action triggered)

Use Cases for Detail View:

  • Troubleshooting filter matching issues
  • Verifying trap content for filter creation
  • Investigating processing failures
  • Auditing automated actions executed

Automatic Retention: Trap logs are retained according to system configuration (default: 90 days). Older logs are automatically purged to manage database size.

Manual Log Management:

  • Export logs to CSV for external analysis
  • Delete specific trap records manually
  • Bulk delete using filters and date ranges

Workflow 1: Setting Up Trap-Driven Backups

Section titled “Workflow 1: Setting Up Trap-Driven Backups”

Objective: Automatically backup device configuration when config change traps received.

Steps:

  1. Identify Config Change Traps:

    • Review Logs for traps from target devices
    • Note trap OID for configuration change events
    • Example Cisco OID: 1.3.6.1.4.1.9.9.43.2.0.1
  2. Create Device Mapping (if needed):

    • Navigate to Device Resolution
    • Add mapping for trap source IP to rConfig device
    • Verify mapping works by checking subsequent trap logs
  3. Configure Trap Filter:

    • Navigate to Trap Filters
    • Click Add, name filter “Config Change - Auto Backup”
    • Enter trap OID from step 1
    • Select vendor (Cisco)
    • Add action: “Download Configuration”
    • Set cooldown: 300 seconds (5 minutes)
    • Enable filter
  4. Test Configuration:

    • Make configuration change on test device
    • Verify trap appears in logs with filter match
    • Confirm backup job created in rConfig
    • Validate configuration captured correctly
  5. Monitor and Adjust:

    • Review dashboard metrics daily
    • Adjust cooldown if too many/few backups triggered
    • Expand to additional devices as validated

Workflow 2: Resolving “Unknown Trap” Sources

Section titled “Workflow 2: Resolving “Unknown Trap” Sources”

Objective: Identify and map unmapped trap sources to rConfig devices.

Steps:

  1. Identify Unknown Sources:

    • Navigate to Dashboard
    • Review Recent Trap Activity
    • Note source IPs showing “No device”
  2. Cross-Reference with rConfig Inventory:

    • Open Devices section
    • Search for devices potentially sending traps
    • Check device management IP vs. trap source IP
    • Identify devices with secondary management interfaces
  3. Create Device Mappings:

    • Navigate to Device Resolution
    • For each unmapped source IP:
      • Add mapping to corresponding device
      • Document interface in Notes
      • Enable mapping
  4. Verify Resolution:

    • Return to Logs
    • Check if new traps from mapped IPs show device names
    • Confirm “No device” count decreasing in dashboard

Workflow 3: Troubleshooting Failed Trap Processing

Section titled “Workflow 3: Troubleshooting Failed Trap Processing”

Objective: Diagnose and resolve trap processing failures.

Steps:

  1. Identify Failures:

    • Check Dashboard “Failed Processing” metric
    • Navigate to Logs, filter by status: “failed”
    • Review failed trap entries
  2. Analyze Failure Details:

    • Click actions menu on failed trap
    • Select “View Details”
    • Review error message and processing timeline
    • Common issues:
      • Device mapping missing
      • Filter action failed (backup unreachable device)
      • Webhook endpoint unavailable
      • Email notification misconfigured
  3. Resolve Root Cause:

    • For mapping issues: Create device resolution entry
    • For action failures: Verify action configuration (email, webhook URL)
    • For device issues: Verify device accessibility from rConfig
    • For filter problems: Review filter OID and action settings
  4. Test Resolution:

    • Trigger test trap to verify fix
    • Monitor for recurring failures
    • Adjust filter or mapping configuration if needed

Refresh Behavior: Dashboard auto-refreshes every 30 seconds when viewing. Manual refresh available via browser refresh.

Large Dataset Handling: Dashboards with thousands of daily traps may show brief loading delays. This is normal for high-volume environments.

For Large Log Tables (100,000+ entries):

  • Use specific date ranges rather than “All time”
  • Filter by device or source IP before exporting
  • Schedule regular log purges for old data
  • Consider archiving historical logs externally

Optimize Filter Performance:

  • Keep total filter count under 100 for optimal performance
  • Disable unused or obsolete filters rather than deleting (preserves historical data)
  • Use specific trap OIDs rather than wildcard matching
  • Monitor processing time metrics in dashboard

Symptom: Service status indicator shows red “Offline” state.

Resolution:

  1. Verify Supervisor service status:
    Terminal window
    supervisorctl status rconfig-snmp-trap
  2. If stopped, start service:
    Terminal window
    supervisorctl start rconfig-snmp-trap
  3. If won’t start, review troubleshooting in Supervisor Management
  4. Refresh dashboard after service startup

Symptom: Traps appear in logs but show “No match” despite configured filters.

Resolution:

  1. Verify filter is enabled (Status column in Trap Filters table)
  2. Check trap OID in logs matches filter OID exactly
  3. Review filter configuration for typos in OID
  4. Verify vendor selection matches trap source device
  5. Check filter cooldown hasn’t prevented matching (wait cooldown period, retry)

Symptom: Traps still show “No device” after creating mapping.

Resolution:

  1. Verify mapping is enabled (Status column)
  2. Confirm IP address entered matches trap source exactly (check Logs)
  3. Verify device exists in rConfig device inventory
  4. Check for typos in IP address or device selection
  5. Try deleting and recreating mapping

Symptom: Filters match but actions don’t execute (no backup, no email).

Resolution:

  1. Check trap detail view for action execution errors
  2. Verify action configuration in filter settings:
    • Backup action: Device is reachable and in rConfig
    • Email action: SMTP configured correctly in rConfig
    • Webhook action: Endpoint URL is accessible
  3. Review error logs: storage/logs/snmp-trap-handler-error.log
  4. Test action manually outside trap handler to verify configuration

User Permissions: SNMP trap management requires administrative privileges. Ensure only authorized personnel have access to:

  • Trap filter configuration (prevents unauthorized automation)
  • Device resolution settings (maintains device association integrity)
  • Log viewing (trap data may contain sensitive device information)

Trap Content Awareness: SNMP traps may contain sensitive information:

  • Configuration snippets
  • Internal IP addresses and network topology
  • User authentication failures with usernames
  • System health metrics revealing vulnerabilities

Best Practices:

  • Restrict log access to network operations staff only
  • Implement log retention policies compliant with data protection requirements
  • Sanitize trap data before external integrations (webhooks, tickets)
  • Audit filter configurations regularly to prevent unauthorized data exfiltration


Navigation: Network Services → SNMP Traps
  • Traps Today: Total traps received since midnight
  • Matched Filters: Traps matching configured rules
  • Config Downloads: Backups triggered by traps
  • Failed Processing: Traps with processing errors
  1. Navigate to Trap Filters tab
  2. Click Add button
  3. Enter Name (required), Description, Trap OID (required)
  4. Select Vendor (required)
  5. Configure Actions (Download Configuration, Send Email, etc.)
  6. Set Status to Enabled
  7. Click Save
  1. Navigate to Device Resolution tab
  2. Click Add button
  3. Select Device from dropdown (required)
  4. Enter trap source IP Address (required)
  5. Add Notes documenting interface/purpose
  6. Set Status to Enabled
  7. Click Save
  1. Navigate to Logs tab
  2. Locate trap record in table
  3. Click actions menu (⋯)
  4. Select “View Details”
  5. Review complete trap information and processing timeline