Preview Tool

Cisco Bug: CSCur82459 - DIAMETER trap getting enabled when PKI trap enabled

Last Modified

Feb 28, 2018

Products (90)

  • Cisco IOS
  • Cisco 812 CiFi Integrated Services Router
  • Cisco 898 Secure G.SHDSL EFM/ATM with Multi-Mode 4G LTE ISR Router
  • Cisco C892FSP Integrated Services Router
  • Cisco 819 Hardened Integrated Services Router
  • Cisco C897VA Integrated Services Router
  • Cisco VG204XM Analog Voice Gateway
  • Cisco 2951 Integrated Services Router
  • Cisco 886VA-CUBE Integrated Services Router
  • Cisco 892W Integrated Services Router
View all products in Bug Search Tool Login Required

Known Affected Releases


Description (partial)

DIAMETER trap getting enabled when PKI trap enabled

Usually when a trap is implemented, we update corresponding TRAP_FLAG at "parser_defs_snmp.h".
At DIAMETER, trap flag TRAP_DIABASE is updated at parser_defs_snmp.h but its redefined to 150 at DIAMETER code. 
Due to this, when PKI MIB is implemented and updated the TRAP_FLAG at parser_defs_snmp.h, SNMP parser assigned value as 150 to TRAP_PKI which is exactly same as the value defined by TRAP_DIABASE.
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.