Guest

Preview Tool

Cisco Bug: CSCur82459 - DIAMETER trap getting enabled when PKI trap enabled

Last Modified

Aug 15, 2017

Products (90)

  • Cisco IOS
  • Cisco 2951 Integrated Services Router
  • Cisco 886VA-CUBE Integrated Services Router
  • Cisco 812 CiFi Integrated Services Router
  • Cisco VG204XM Analog Voice Gateway
  • Cisco 819 Hardened Integrated Services Router
  • Cisco C892FSP Integrated Services Router
  • Cisco 1905 Serial Integrated Services Router
  • Cisco 886VAG 3G Integrated Services Router
  • Cisco 892W Integrated Services Router
View all products in Bug Search Tool Login Required

Known Affected Releases

15.5(2)T

Description (partial)

Symptom:
DIAMETER trap getting enabled when PKI trap enabled

Conditions:
Usually when a trap is implemented, we update corresponding TRAP_FLAG at "parser_defs_snmp.h".
At DIAMETER, trap flag TRAP_DIABASE is updated at parser_defs_snmp.h but its redefined to 150 at DIAMETER code. 
Due to this, when PKI MIB is implemented and updated the TRAP_FLAG at parser_defs_snmp.h, SNMP parser assigned value as 150 to TRAP_PKI which is exactly same as the value defined by TRAP_DIABASE.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.