You want to know which situations or events trigger Simple Network Management Protocol (SNMP) traps in the Brightmail Gateway or Mail Security 8300 Series appliance.
The only SNMP traps that the appliance sends are related to the state of the raid controllers (and drives). See the following Management Information Bases (MIBs) bundled on a Brightmail Gateway or 8300 Series appliance for details. If you look in the afa-MIB.txt and PERC-MIB.txt files for the word "trap," You find the list of items that are sent as SNMP traps to the SNMP trap host.
The SNMP implementation is read-only; you cannot change settings or perform SNMP-Set commands.
The SNMP community string is where you supply your SNMP v2c read-only community string. The default value for the community is public; we recommend that you change this. This is the only required field for the configuration. All other settings are on the page are optional.
The SNMP trap host field is where you specify an optional trap target. This target can be an IP address or hostname. Note that only certain events/components (specifically those related to the disk array) actually produce and send traps to the configured host. Please refer to afa-mib.txt and PERC-MIB.txt described below for the specific OIDs that generate traps.
For convenience, you can download the SNMP MIBs and import them in to any SMNP v2c-compliant monitoring program. The following MIBs are available:
SYMANTEC-EMAIL-SECURITY.txt: Custom symantec MIB that includes MTA statistics and redundancy metrics
afa-mib.txt: Raid controller, disk specific, and other hardware OIDs and traps for the 8240
PERC-MIB.txt: Raid controller, disk specific, and other hardware OIDs and traps for the 8260