Smokeping_probes_CiscoRTTMonEchoICMP(3) | SmokePing | Smokeping_probes_CiscoRTTMonEchoICMP(3) |
Smokeping::probes::CiscoRTTMonEchoICMP - Probe for SmokePing
*** Probes *** +CiscoRTTMonEchoICMP forks = 5 offset = 50% step = 300 timeout = 15 # The following variables can be overridden in each target section ioshost = RTTcommunity@Myrouter.foobar.com.au # mandatory iosint = 10.33.22.11 packetsize = 56 pings = 5 timeout = 15 tos = 160 vrf = INTERNET # [...] *** Targets *** probe = CiscoRTTMonEchoICMP # if this should be the default probe # [...] + mytarget # probe = CiscoRTTMonEchoICMP # if the default probe is something else host = my.host ioshost = RTTcommunity@Myrouter.foobar.com.au # mandatory iosint = 10.33.22.11 packetsize = 56 pings = 5 timeout = 15 tos = 160 vrf = INTERNET
A probe for smokeping, which uses the ciscoRttMon MIB functionality ("Service Assurance Agent", "SAA") of Cisco IOS to measure ICMP echo ("ping") roundtrip times between a Cisco router and any IP address.
Supported probe-specific variables:
Example value: 5
Default value: 5
Example value: 50%
Example value: 300
Example value: 15
Default value: 5
Supported target-specific variables:
Example value: RTTcommunity@Myrouter.foobar.com.au
This setting is mandatory.
Example value: 10.33.22.11
Default value: 56
Example value: 5
Example value: 15
Default value: 15
Example value: 160
Default value: 0
Example value: INTERNET
Joerg.Kummer at Roche.com
It is highly recommended to use this probe with routers running IOS 12.0(3)T or higher and to test it on less critical routers first. I managed to crash a router with 12.0(9) quite consistently ( in IOS lingo 12.0(9) is older code than 12.0(3)T ). I did not observe crashes on higher IOS releases, but messages on the router like the one below, when multiple processes concurrently accessed the same router (this case was IOS 12.1(12b) ):
Aug 20 07:30:14: %RTT-3-SemaphoreBadUnlock: %RTR: Attempt to unlock semaphore by wrong RTR process 70, locked by 78
Aug 20 07:35:15: %RTT-3-SemaphoreInUse: %RTR: Could not obtain a lock for RTR. Process 80
To install this probe copy ciscoRttMonMIB.pm files to ($SMOKEPINGINSTALLDIR)/lib/Smokeping and CiscoRTTMonEchoICMP.pm to ($SMOKEPINGINSTALLDIR)/lib/Smokeping/probes. V0.97 or higher of Simon Leinen's SNMP_Session.pm is required.
The router(s) must be configured to allow read/write SNMP access. Sufficient is:
snmp-server community RTTCommunity RW
If you want to be a bit more restrictive with SNMP write access to the router, then consider configuring something like this
access-list 2 permit 10.37.3.5 snmp-server view RttMon ciscoRttMonMIB included snmp-server community RTTCommunity view RttMon RW 2
The above configuration grants SNMP read-write only to 10.37.3.5 (the smokeping host) and only to the ciscoRttMon MIB tree. The probe does not need access to SNMP variables outside the RttMon tree.
The probe sends unnecessary pings, i.e. more than configured in the "pings" variable, because the RTTMon MIB only allows to set a total time for all pings in one measurement run (one "life"). Currently the probe sets the life duration to "pings"*5+3 seconds (5 secs is the ping timeout value hardcoded into this probe).
<http://oss.oetiker.ch/smokeping/>
<http://www.switch.ch/misc/leinen/snmp/perl/>
The best source for background info on SAA is Cisco's documentation on <http://www.cisco.com> and the CISCO-RTTMON-MIB documentation, which is available at: <ftp://ftp.cisco.com/pub/mibs/v2/CISCO-RTTMON-MIB.my>
2022-10-15 | 2.7.3 |