Using Logs and Reports : Configuring SNMP trap receivers for DDoS attack reporting
 
Configuring SNMP trap receivers for DDoS attack reporting
You configure SNMP trap receivers for FortiDDoS attack events separately from the system traps. This enables you to have separate configurations for each SPP, if necessary. You can configure multiple SNMP trap receivers—multiple managers that receive traps from the same SPP, or managers that receive traps from multiple SPPs.
Before you begin:
You must have Read-Write permission for Log & Report settings.
To configure SNMP trap receivers:
1. Go to Log & Report > Log Configuration > SNMP Trap Receivers.
2. Click Add to display the configuration editor.
3. Complete the configuration as described in Table 93.
4. Save the configuration.
Figure 93: SNMP trap receivers configuration page
 
Table 59: SNMP Trap Receivers configuration guidelines
Settings
Guidelines
Name
Identifies this SNMP trap receiver in the list of receivers.
Enable
Enable the configuration.
SPP
Select the SPP for the configuration.
Address
IP address of the SNMP manager that receives attack log traps.
Port
Listening port of the SNMP manager. The default value is 162.
Community Username
String that specifies the SNMP community to which the FortiDDoS system and the SNMP manager at the specified address belong.
SNMP Version
v2c
v3
SNMPv3
Engine ID
Engine ID that uniquely identifies the SNMP agent.
v3 Access Type
No authentication
Authentication
Privacy
Authentication Passphrase
If authentication is required, specify the authentication passphrase configured on the SNMP manager.
Privacy Passphrase
If privacy is required, specify the privacy passphrase configured on the SNMP manager.