<div dir="ltr"><div>It is my belief Mathieu got his answer :<br><br><a href="https://community.brocade.com/t5/Ethernet-Switches-Routers/MLX-Disable-snmp-auth-failure-logging/td-p/92444">https://community.brocade.com/t5/Ethernet-Switches-Routers/MLX-Disable-snmp-auth-failure-logging/td-p/92444</a><br><br></div>HTH.<br><br><br><div class="gmail_extra"><br><div class="gmail_quote">2017-05-17 10:06 GMT+02:00 Franz Georg Koehler <span dir="ltr"><<a href="mailto:lists@openunix.de" target="_blank">lists@openunix.de</a>></span>:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On Wed, May 17, 2017 at 08:53:37AM +0200, Mathieu Adamczewski wrote:<br>
> Hello everyone,<br>
><br>
> I would like to know if it is possible to make my MLX forget messages in<br>
> logs when an unauthorized IP tries to connect to my equipment.<br>
><br>
> Because I have in my logs I constantly this kind of message:<br>
><br>
> May 15 10:05:51: I: Security: SNMP access from src IP 185.35.62.142<br>
> rejected, 1 attempt (s)<br>
<br>
</span>We see those messages in the logs for years now.<br>
While I initially thought this is related to a missing snmp filter, the filter<br>
is set correctly. It looks like the ACL in the snmp community statement does<br>
not prevent the packets from hitting the SNMP server (other than the ssh<br>
filters) and the SNMP server logs those messages.<br>
<br>
______________________________<wbr>_________________<br>
foundry-nsp mailing list<br>
<a href="mailto:foundry-nsp@puck.nether.net">foundry-nsp@puck.nether.net</a><br>
<a href="http://puck.nether.net/mailman/listinfo/foundry-nsp" rel="noreferrer" target="_blank">http://puck.nether.net/<wbr>mailman/listinfo/foundry-nsp</a><br>
</blockquote></div><br></div></div>