NetView SNMP query engine trace

This topic discusses the output produced by the SNMP query stack trace.

Figure 1 shows an example of the output produced by the SNMP query stack trace. This trace was produced by starting the SNMP query stack address space with start option -d 4, which is the maximum amount of trace records produced. In the figure, the column labeled "trc lvl" shows the lowest trace level required to see that particular trace entry. For example, lines five through nine have a "trc lvl" of four. This means that only the -d 4 trace option shows this type of trace entry. On the other hand, lines 10 through 17 have a "trc lvl" of two. This means that trace level two or higher produces this trace information.

Guideline: The column headed "line no." numbers the trace records for reference in the discussion that follows the figure. Neither the "trc lvl" nor the "line no." column appear in the actual trace output.
The following sequence of events occurred to create the trace output:
  1. Started the SNMP query stack address space

    Trace output lines in the range 1–3

  2. Started the SNMPIUCV subtask at the NetView® host (attempted connection to the query stack when started)

    Trace output line 4

  3. Issued an SNMP TRAPSON request (request 1001)

    Trace output lines in the range 5–27

  4. Incoming SNMP Trap-PDU received from SNMP agent

    Trace output lines in the range 28–61

  5. Issued an SNMP TRAPSOFF request (request 1002)

    Trace output lines in the range 62–82

  6. Incoming SNMP Trap-PDU received from SNMP agent

    Trace output lines in the range 83–104

  7. Issued an SNMP GET request (request 1003)

    Trace output lines in the range 105–148

  8. Received the response to request 1003

    Trace output lines in the range 149–191

  9. Issued an SNMP GETNEXT request (request 1004)

    Trace output lines in the range 192–235

  10. Received the response to request 1004

    Trace output lines in the range 236–278

  11. Issued an SNMP SET request (request 1005)

    Trace output lines in the range 279–326

  12. Received the response to request 1005

    Trace output lines in the range 327–369

  13. Issued an SNMP MIBVNAME request (request 1006)

    Trace output lines in the range 370–397

  14. Issued an SNMP PING request (request 1007)

    Trace output lines in the range 398–429

  15. Issued an SNMP GET request for a variable name not defined in the hlq.MIBDESC.DATA data set (request 1008)

    Trace output lines in the range 430–462

  16. Stopped the SNMPIUCV subtask of the NetView program

    Trace output line 463

Figure 1. SNMP query engine traces
trc  line
lvl  no.
 
 3    1  EZA6322I Using  'TCPCS.mibdesc.data'  as MIB description file
 0    2  EZA6275I SNMP Query Stack running and awaiting queries...
 2    3  EZA6276I There are 56 client connections possible
 0    4  EZA6290I Accepted new client connection
 4    5  EZA6292I Received following NVquery packet:
      6  EZA6305I dumping packet of 19 bytes:
      7  00 11 01 01 01 02 06 00 00 03 e9 00 00 00 00 00
      8  00 00 00
 2    9  EZA6359I major version:  1
     10  EZA6360I minor version:  1
     11  EZA6361I release:        1
     12  EZA6363I native set:     EBCDIC
     13  EZA6364I packet type:    TRAP REQUEST
     14  EZA6394I  filter id:         1001
     15  EZA6396I  network mask:      0.0.0.0
     16  EZA6397I  desired network:   0.0.0.0
 2   17  EZA6359I major version:  1
     18  EZA6360I minor version:  1
     19  EZA6361I release:        1
     20  EZA6363I native set:     EBCDIC
     21  EZA6364I packet type:    RESPONSE
     22  EZA6367I  sequence id:       1001
     23  EZA6388I  major error:       0
     24  EZA6389I  minor error:       0
     25  EZA6390I  error index:       0
     26  EZA6391I  error text len:    9
     27  EZA6392I  error text:        no error
 4   28  EZA6301I Received following SNMP_trap packet:
     29  EZA6305I dumping packet of 43 bytes:
     30           30 29 02 01 00 04 04 4d 56 53 4c a4 1e 06 0a 2b
     31           06 01 04 01 02 02 01 02 04 40 04 09 43 72 25 02
     32           01 04 02 01 00 43 02 25 80 30 00
 3   33  EZA6424I Decoded SNMP PDU :
     34  {
     35     version version-1,
     36     community '4d56534c'H,
     37     data {
     38        trap {
     39           enterprise 1.3.6.1.4.1.2.2.1.2.4,
     40           agent-addr {
     41              internet '09437225'H
     42           },
     43           generic-trap authenticationFailure,
     44           specific-trap 0,
     45           time-stamp 9600,
     46           variable-bindings {}
     47        }
     48     }
     49  }
 4   50  EZA6359I major version:  1
     51  EZA6360I minor version:  1
     52  EZA6361I release:        1
     53  EZA6363I native set:     EBCDIC
    
     54  EZA6364I packet type:        TRAP
     55  EZA6394I  filter id:         1001
     56  EZA6395I  agent address:     9.67.114.37
     57  EZA6399I  generic trap:      4     ( 0X4 )
     58  EZA6400I  specific trap:     0     ( 0X0 )
     59  EZA6401I  time stamp:        9600
     60  EZA6402I  enterprise len:    22
     61  EZA6403I  enterprise:        1.3.6.1.4.1.2.2.1.2.4
 4   62  EZA6292I Received following NVquery packet:
     63  EZA6305I dumping packet of 15 bytes:
     64  00 0d 01 01 01 02 07 00 00 03 ea 00 00 03 e9
 2   65  EZA6359I major version:  1
     66  EZA6360I minor version:  1
     67  EZA6361I release:        1
     68  EZA6363I native set:     EBCDIC
     69  EZA6364I packet type:    TRAP UN-REQUEST
     70  EZA6367I  sequence id:       1002
     71  EZA6394I  filter id:         1001
 2   72  EZA6359I major version:  1
     73  EZA6360I minor version:  1
     74  EZA6361I release:        1
     75  EZA6363I native set:     EBCDIC
     76  EZA6364I packet type:    RESPONSE
     77  EZA6367I  sequence id:       1002
     78  EZA6388I  major error:       0
     79  EZA6389I  minor error:       0
     80  EZA6390I  error index:       0
     81  EZA6391I  error text len:    9
     82  EZA6392I  error text:        no error
 4   83  EZA6301I Received following SNMP_trap packet:
     84  EZA6305I dumping packet of 43 bytes:
     85           30 29 02 01 00 04 04 4d 56 53 4c a4 1e 06 0a 2b
     86           06 01 04 01 02 02 01 02 04 40 04 09 43 72 25 02
     87           01 04 02 01 00 43 02 38 40 30 00
 3   88  EZA6424I Decoded SNMP PDU :
     89  {
     90     version version-1,
     91     community '4d56534c'H,
     92     data {
     93        trap {
     94           enterprise 1.3.6.1.4.1.2.2.1.2.4,
     95           agent-addr {
     96              internet '09437225'H
     97           },
     98           generic-trap authenticationFailure,
     99           specific-trap 0,
    100           time-stamp 14400,
 
    101           variable-bindings {}
    102        }
    103     }
    104  }
 4  105  EZA6292I Received following NVquery packet:
    106  EZA6305I dumping packet of 42 bytes:
    107  00 28 01 01 01 02 01 00 00 03 eb 00 05 d4 e5 e2
    108  d3 00 00 05 e2 d5 d4 d7 00 00 03 01 ff 01 00 0a
    109  e2 e8 e2 e4 d7 e3 c9 d4 c5 00
 2  110  EZA6359I major version:  1
    111  EZA6360I minor version:  1
    112  EZA6361I release:        1
    113  EZA6363I native set:     EBCDIC
    114  EZA6364I packet type:    GET
    115  EZA6367I  sequence id:       1003
    116  EZA6368I  hostname len:      5
    117  EZA6370I  hostname:          MVSL
    118  EZA6371I  community len:     5
    119  EZA6373I  community:         SNMP
    120  EZA6374I  optional length:   3
    121  EZA6375I  max. retries:      1
    122  EZA6376I  initial timeout:   255
    123  EZA6377I  backoff exponent:  1
    124  EZA6380I   name length:      16
    125  EZA6381I   name:             1.3.6.1.2.1.1.3
 3  126  EZA6424I Decoded SNMP PDU :
    127  {
    128     version version-1,
    129     community '534e4d50'H,
    130     data {
    131        get-request {
    132           request-id 1,
    133           error-status noError,
    134           error-index 0,
    135           variable-bindings {
    136              {
    137                 name 1.3.6.1.2.1.1.3,
    138                 value {
    139                    simple {
    140                       empty {}
    141                    }
    142                 }
    143              }
    144           }
    145        }
    146     }
    147  }
    148  EZA6308I sending SNMP request to 9.67.114.37
 4  149  EZA6295I Received following SNMP_response packet:
    150  EZA6305I dumping packet of 39 bytes:
    151           30 25 02 01 00 04 04 53 4e 4d 50 a2 1a 02 01 01
    152           02 01 00 02 01 00 30 0f 30 0d 06 07 2b 06 01 02
    153           01 01 03 43 02 48 a8
 3  154  EZA6424I Decoded SNMP PDU :
     
    155  {
    156     version version-1,
    157     community '534e4d50'H,
    158     data {
    159        get-response {
    160           request-id 1,
    161           error-status noError,
    162           error-index 0,
    163           variable-bindings {
    164              {
    165                 name 1.3.6.1.2.1.1.3,
    166                 value {
    167                    application-wide {
    168                       ticks 18600
    169                    }
    170                 }
    171              }
    172           }
    173        }
    174     }
    175  }
 2  176  EZA6359I major version:  1
    177  EZA6360I minor version:  1
    178  EZA6361I release:        1
    179  EZA6363I native set:     EBCDIC
    180  EZA6364I packet type:    RESPONSE
    181  EZA6367I  sequence id:       1003
    182  EZA6388I  major error:       0
    183  EZA6389I  minor error:       0
    184  EZA6390I  error index:       0
    185  EZA6391I  error text len:    9
    186  EZA6392I  error text:        no error
    187  EZA6380I   name length:      16
    188  EZA6381I   name:             1.3.6.1.2.1.1.3
    189  EZA6382I   value type:       time ticks
    190  EZA6384I   value length:     4
    191  EZA6387I   value:            18600
 4  192  EZA6292I Received following NVquery packet:
    193  EZA6305I dumping packet of 42 bytes:
    194           00 28 01 01 01 02 02 00 00 03 ec 00 05 d4 e5 e2
    195           d3 00 00 05 e2 d5 d4 d7 00 00 03 01 ff 01 00 0a
    196           c9 c6 c4 c5 e2 c3 d9 4b f0 00
 2  197  EZA6359I major version:  1
    198  EZA6360I minor version:  1
    199  EZA6361I release:        1
    200  EZA6363I native set:     EBCDIC
    201  EZA6364I packet type:    GET-NEXT
    202  EZA6367I  sequence id:       1004
    203  EZA6368I  hostname len:      5
    204  EZA6370I  hostname:          MVSL
    205  EZA6371I  community len:     5
    206  EZA6373I  community:         SNMP
    207  EZA6374I  optional length:   3
    208  EZA6375I  max. retries:      1
    209  EZA6376I  initial timeout:   255
  
       210  EZA6377I  backoff exponent:  1
    211  EZA6380I   name length:      22
    212  EZA6381I   name:             1.3.6.1.2.1.2.2.1.2.0
 3  213  EZA6424I Decoded SNMP PDU :
    214  {
    215     version version-1,
    216     community '534e4d50'H,
    217     data {
    218        get-next-request {
    219           request-id 2,
    220           error-status noError,
    221           error-index 0,
    222           variable-bindings {
    223              {
    224                 name 1.3.6.1.2.1.2.2.1.2.0,
    225                 value {
    226                    simple {
    227                       empty {}
    228                    }
    229                 }
    230              }
    231           }
    232        }
    233     }
    234  }
    235  EZA6308I sending SNMP request to 9.67.114.37
 4  236  EZA6295I Received following SNMP_response packet:
    237  EZA6305I dumping packet of 47 bytes:
    238           30 2d 02 01 00 04 04 53 4e 4d 50 a2 22 02 01 02
    239           02 01 00 02 01 00 30 17 30 15 06 0a 2b 06 01 02
    240           01 02 02 01 02 01 04 07 49 42 4d 20 4c 43 53
 3  241  EZA6424I Decoded SNMP PDU :
    242  {
    243     version version-1,
    244     community '534e4d50'H,
    245     data {
    246        get-response {
    247           request-id 2,
    248           error-status noError,
    249           error-index 0,
    250           variable-bindings {
    251              {
    252                 name 1.3.6.1.2.1.2.2.1.2.1,
    253                 value {
    254                    simple {
    255                       string '49424d204c4353'H
    256                    }
    257                 }
    258              }
    259           }
    260        }
    261     }
    262  }
 2  263  EZA6359I major version:  1
    264  EZA6360I minor version:  1
    265  EZA6361I release:        1
 
    266  EZA6363I native set:     EBCDIC
    267  EZA6364I packet type:    RESPONSE
    268  EZA6367I  sequence id:       1004
    269  EZA6388I  major error:       0
    270  EZA6389I  minor error:       0
    271  EZA6390I  error index:       0
    272  EZA6391I  error text len:    9
    273  EZA6392I  error text:        no error
    274  EZA6380I   name length:      22
    275  EZA6381I   name:             1.3.6.1.2.1.2.2.1.2.1
    276  EZA6382I   value type:       display string
    277  EZA6384I   value length:     7
    278  EZA6385I   value:            IBM LCS
 4  279  EZA6292I Received following NVquery packet:
    280  EZA6305I dumping packet of 57 bytes:
    281           00 37 01 01 01 02 03 00 00 03 ed 00 05 d4 e5 e2
    282           d3 00 00 05 e2 d5 d4 d7 00 00 03 01 ff 01 00 10
    283           c4 d7 c9 e2 c1 d4 d7 d3 c5 d5 e4 d4 c2 c5 d9 00
    284           00 00 06 f1 f2 f3 f4 f5 00
2   285  EZA6359I major version:  1
    286  EZA6360I minor version:  1
    287  EZA6361I release:        1
    288  EZA6363I native set:     EBCDIC
    289  EZA6364I packet type:    SET
    290  EZA6367I  sequence id:       1005
    291  EZA6368I  hostname len:      5
    292  EZA6370I  hostname:          MVSL
    293  EZA6371I  community len:     5
    294  EZA6373I  community:         SNMP
    295  EZA6374I  optional length:   3
    296  EZA6375I  max. retries:      1
    297  EZA6376I  initial timeout:   255
    298  EZA6377I  backoff exponent:  1
    299  EZA6380I   name length:      22
    
  300  EZA6381I   name:             1.3.6.1.4.1.2.2.1.4.1
    301  EZA6382I   value type:       number
    302  EZA6384I   value length:     4
    303  EZA6386I   value:            12345
 3  304  EZA6424I Decoded SNMP PDU :
    305  {
    306     version version-1,
    307     community '534e4d50'H,
    308     data {
    309        set-request {
    310           request-id 3,
    311           error-status noError,
    312           error-index 0,
    313           variable-bindings {
    314              {
    315                 name 1.3.6.1.4.1.2.2.1.4.1,
    316                 value {
    317                    simple {
    318                       number 12345
    319                    }
    320                 }
    321              }
    322           }
    323        }
    324     }
    325  }
    326  EZA6308I sending SNMP request to 9.67.114.37
 4  327  EZA6295I Received following SNMP_response packet:
    328  EZA6305I dumping packet of 42 bytes:
    329           30 28 02 01 00 04 04 53 4e 4d 50 a2 1d 02 01 03
    330           02 01 00 02 01 00 30 12 30 10 06 0a 2b 06 01 04
    331           01 02 02 01 04 01 02 02 30 39
 3  332  EZA6424I Decoded SNMP PDU :
    333  {
    334     version version-1,
    335     community '534e4d50'H,
    336     data {
    337        get-response {
    338           request-id 3,
    339           error-status noError,
    340           error-index 0,
    341           variable-bindings {
    342              {
    343                 name 1.3.6.1.4.1.2.2.1.4.1,
    344                 value {
    345                    simple {
    346                       number 12345
 
    347                    }
    348                 }
    349              }
    350           }
    351        }
    352     }
    353  }
 2  354  EZA6359I major version:  1
    355  EZA6360I minor version:  1
    356  EZA6361I release:        1
    357  EZA6363I native set:     EBCDIC
    358  EZA6364I packet type:    RESPONSE
    359  EZA6367I  sequence id:       1005
    360  EZA6388I  major error:       0
    361  EZA6389I  minor error:       0
    362  EZA6390I  error index:       0
    363  EZA6391I  error text len:    9
    364  EZA6392I  error text:        no error
    365  EZA6380I   name length:      22
    366  EZA6381I   name:             1.3.6.1.4.1.2.2.1.4.1
    367  EZA6382I   value type:       number
    368  EZA6384I   value length:     4
    369  EZA6386I   value:            12345
 4  370  EZA6292I Received following NVquery packet:
    371  EZA6305I dumping packet of 29 bytes:
    372           00 1b 01 01 01 02 08 00 00 03 ee 00 10 f1 4b f3
    373           4b f6 4b f1 4b f2 4b f1 4b f1 4b f1 00
 2  374  EZA6359I major version:  1
    375  EZA6360I minor version:  1
    376  EZA6361I release:        1
    377  EZA6363I native set:     EBCDIC
    378  EZA6364I packet type:    VAR_NAME
    379  EZA6367I  sequence id:       1006
    380  EZA6405I  object id len:     16
    381  EZA6406I  object id:         1.3.6.1.2.1.1.1
 2  382  EZA6359I major version:  1
    383  EZA6360I minor version:  1
    384  EZA6361I release:        1
    385  EZA6363I native set:     EBCDIC
    386  EZA6364I packet type:    RESPONSE
    387  EZA6367I  sequence id:       1006
    388  EZA6388I  major error:       0
    389  EZA6389I  minor error:       0
    390  EZA6390I  error index:       0
    391  EZA6391I  error text len:    9
    392  EZA6392I  error text:        no error
    393  EZA6380I   name length:      16
    394  EZA6381I   name:             1.3.6.1.2.1.1.1
    395  EZA6382I   value type:       display string
    396  EZA6384I   value length:     9
    397  EZA6385I   value:            sysDescr
 4  398  EZA6292I Received following NVquery packet:
    399  EZA6305I dumping packet of 23 bytes:
    400           00 15 01 01 01 02 0a 00 00 03 ef 00 05 d4 e5 e2
 
    401           d3 00 00 03 01 ff 01
 2  402  EZA6359I major version:  1
    403  EZA6360I minor version:  1
    404  EZA6361I release:        1
    405  EZA6363I native set:     EBCDIC
    406  EZA6364I packet type:    PING REQUEST
    407  EZA6367I  sequence id:       1007
    408  EZA6368I  hostname len:      5
    409  EZA6370I  hostname:          MVSL
    410  EZA6374I  optional length:   3
    411  EZA6375I  max. retries:      1
    412  EZA6376I  initial timeout:   255
    413  EZA6377I  backoff exponent:  1
 2  414  EZA6359I major version:  1
    415  EZA6360I minor version:  1
    416  EZA6361I release:        1
    417  EZA6363I native set:     EBCDIC
    418  EZA6364I packet type:    RESPONSE
    419  EZA6367I  sequence id:       1007
    420  EZA6388I  major error:       0
    421  EZA6389I  minor error:       0
    422  EZA6390I  error index:       0
    423  EZA6391I  error text len:    9
    424  EZA6392I  error text:        no error
    425  EZA6380I   name length:      34
    426  EZA6381I   name:             1.3.6.1.4.1.2.2.1.3.2.9.67.114.37
    427  EZA6382I   value type:       number
    428  EZA6384I   value length:     4
    429  EZA6386I   value:            76
 4  430  EZA6292I Received following NVquery packet:
    431  EZA6305I dumping packet of 39 bytes:
    432           00 25 01 01 01 02 01 00 00 03 f0 00 05 d4 e5 e2
    433           d3 00 00 05 e2 d5 d4 d7 00 00 03 01 ff 01 00 07
    434           c2 c1 c4 e5 c1 d9 00
 1  435  EZA6356E error code 7: unknown MIB variable
 2  436  EZA6359I major version:  1
    437  EZA6360I minor version:  1
    438  EZA6361I release:        1
    439  EZA6363I native set:     EBCDIC
    440  EZA6364I packet type:    GET
    441  EZA6367I  sequence id:       1008
    442  EZA6368I  hostname len:      5
    443  EZA6370I  hostname:          MVSL
    444  EZA6371I  community len:     5
    445  EZA6373I  community:         SNMP
    446  EZA6374I  optional length:   3
    447  EZA6375I  max. retries:      1
    448  EZA6376I  initial timeout:   255
    449  EZA6377I  backoff exponent:  1
    450  EZA6380I   name length:      2
    451  EZA6381I   name:             ?
 
2  452  EZA6359I major version:  1
    453  EZA6360I minor version:  1
    454  EZA6361I release:        1
    455  EZA6363I native set:     EBCDIC
    456  EZA6364I packet type:    RESPONSE
    457  EZA6367I  sequence id:       1008
    458  EZA6388I  major error:       2
    459  EZA6389I  minor error:       7
    460  EZA6390I  error index:       0
    461  EZA6391I  error text len:    17
    462  EZA6392I  error text:        unknown variable
 0  463  EZA6293I Terminated client connection
The following is an explanation of the traces in Figure 1.
  • Line 1 is an information message listing the actual name of the data set being used as the hlq.MIBDESC.DATA data set.
  • Line 2 is an informational message indicating that the SNMP query stack has been successfully started.
  • Line 3 is an informational message indicating the number of client connections the query stack allows. (A client connection is a connection from a program using the query stack protocol to communicate with the SNMP query stack to initiate SNMP requests. For example, the SNMPIUCV subtask of the NetView program is a client connection).
  • Line 4 is an information message indicating that the SNMPIUCV subtask of the NetView program has successfully contacted the query stack.
  • Lines 5–8 are the encoded packet received from the client (the SNMPIUCV subtask) by the query stack. This particular packet is the TRAPSON request.
  • Lines 9–16 are the decoded SNMPIUCV request. The decoded packet indicates that this request is number 1001 (line 14), and was a TRAPSON request (line 13) for network mask 0.0.0.0 (line 15) with the desired network 0.0.0.0 (line 16).
  • Lines 17–27 are the response sent back to SNMPIUCV from the query stack. The response (line 21) is to request number 1001 (line 22) and indicates that the TRAPSON request was successful (lines 23–27).
  • Line 28 indicates that an SNMP Trap-PDU was received. Lines 29–32 are the actual BER encoded SNMP packet as it was received by the query stack.
  • Lines 33–49 are the decoded version of the trap packet reported by lines 28–32.
  • Lines 50–61 are the trap information being passed from the query stack up to the SNMPIUCV subtask to be displayed to the NetView operator. This trap is being forwarded to the NetView program because the IP address of the agent sending the trap (line 56), when ANDed with the network mask (line 15) matches the desired network (line 16) of filter number 1001 (line 55) that was set by the TRAPSON request 1001 (line 14) received previously (lines 9–16).
  • Lines 62–64 show an incoming query stack packet sent from SNMPIUCV to the query stack.
  • Lines 65–71 are the decoded packet received in lines 62–64. This packet is the TRAPSOFF request (line 69). It requests that trap filter 1001 (line 71) be turned off.
  • Lines 72–82 are the response from the query stack to the SNMPIUCV subtask. The response indicates that the TRAPSOFF request was completed successfully (lines 78–82).
  • Lines 83–87 indicate that another SNMP Trap-PDU was received from an agent.
  • Lines 88–104 are the decoded Trap-PDU. Note that following this decoded PDU, there is no indication of the trap being forwarded to SNMPIUCV. This is because the trap filter has been turned off, so the query stack receives the trap but does not forward the information to SNMPIUCV.
  • Lines 105–109 indicate another request from SNMPIUCV being received by the query stack.
  • Lines 110–125 are the decoded query stack request. The request from SNMPIUCV was to issue a GetRequest-PDU (line 114) to host MVSL (line 117), using community name SNMP (line 119) and requesting variable 1.3.6.1.2.1.1.3 (line 125). Lines 121–123 are the retry information that SNMPIUCV has gotten from the SNMPARMS member of the DSIPARMS data set.
  • Lines 126–147 are the decoded SNMP GetRequest-PDU that the query stack has built as a result of the SNMPIUCV request received in lines 110–125. This PDU has been assigned request number 1 (line 132). This number is used to correlate the response when it is received.
  • Line 148 indicates that the encoded SNMP GetRequest-PDU has been sent to the SNMP agent at the specified IP address. This should be the IP address of the host specified in line 117.
  • Line 149 indicates that an SNMP GetResponse-PDU was received. Lines 150–153 are the encoded GetResponse-PDU.
  • Lines 154–175 are the decoded GetResponse-PDU. This was a GetResponse (line 159) in response to request number 1 (line 160, matches up to the request number in the request, line 132). The request was completed with no errors (lines 161–162). The requested variable 1.3.6.1.2.1.1.3 (line 165) has a value of 18600 timeticks (line 168).
  • Lines 176–191 are the query stack response to SNMPIUCV request number 1003 (lines 115 and 181). The response contains the information received from the agent in the GetResponse-PDU in lines 154–175.
  • Lines 192–196 are the next query stack protocol requests received from SNMPIUCV by the query stack.
  • Lines 197–212 are the decoded version of the query stack request. This is a GetNext request (line 201) to host MVSL (line 204) for variable 1.3.6.1.2.1.2.2.1.2.0 (line 212). The request number associated with this request is 1004 (line 202).
  • Lines 213–234 are the decoded SNMP GetRequest-PDU built as a result of the query stack request received in lines 197–212. This GetRequest-PDU is request number 2 (line 219).
  • Line 235 indicates that the encoded GetRequest-PDU has been sent to the requested host.
  • Lines 236–240 indicate that a GetResponse-PDU has been received.
  • Lines 241–262 are the decoded GetResponse-PDU. This is the response to request number 2 (line 247) for variable 1.3.6.1.2.1.2.2.1.2.1 (line 252). The value of the variable is a display string with the ASCII value of X'49424D204C4353' (line 255). The GetNext request completed successfully (lines 248–249).
  • Lines 263–278 are the query stack response to SNMPIUCV request 1004 (line 268). The response contains the information from the GetResponse-PDU (lines 241–262). Note that the variable value in line 255 has been converted to the proper display format in line 278.
  • Lines 279–284 are the next query stack protocol request from SNMPIUCV to the query stack.
  • Lines 285–303 are the decoded query stack request. It is a SET request (line 289) to host MVSL to set variable 1.3.6.1.4.1.2.2.1.4.1 (line 300) to 12345 (line 303). This is request number 1005 (line 290).
  • Lines 304–325 are the decoded SNMP SetRequest-PDU built as a result of the request received in lines 285–303. This is request number 3 (line 310).
  • Line 326 indicates that the SetRequest-PDU has been sent to the specified host.
  • Lines 327–331 indicate that a GetResponse-PDU has been received.
  • Lines 332–353 are the decoded GetResponse-PDU. This PDU is the response to the SetRequest-PDU number 3 (line 338). It was completed successfully (lines 339–340) and variable 1.3.6.1.4.1.2.2.1.4.1 (line 343) was set to 12345 (line 346).
  • Lines 354–369 are the query stack response to request 1005 (line 359) containing the information received in the GetResponse-PDU received in lines 332–353.
  • Lines 370–373 are the next query stack request packet from SNMPIUCV.
  • Lines 374–381 are the decoded query stack request. This is a MIBVNAME request (line 378) requesting the name of variable 1.3.6.1.2.1.1.1 (line 381). The request number is 1006 (line 379).
  • Lines 382–397 are the query stack response (line 386) to request 1006 (line 387). The request completed successfully (lines 388–392) and the name of variable 1.3.6.1.2.1.1.1 (line 394) is sysDescr (line 397).
  • Lines 398–401 are the next query stack request packet from SNMPIUCV.
  • Lines 402–413 are the decoded query stack request packet. This is a PING request (line 406) to ping host MVSL (line 409). The request number is 1007 (line 407).
  • Lines 414–429 are the query stack response (line 418) to request 1007 (line 419). The PING completed successfully (lines 420–424) and the round-trip response time was 76 milliseconds (line 429). Note that no SNMP PDUs were generated as a result of the PING request. The SNMP query stack uses a raw socket to send a PING to the requested host and SNMP protocols are not involved.
  • Lines 430–434 are the next query stack request packet received from SNMPIUCV.
  • Line 435 indicates that an error occurred while the query stack was decoding the request packet. The MIB variable name in the request was unknown to the query stack.
  • Lines 435–451 are the decoded query stack request. This is a GET request (line 440). The variable name is unknown (line 451). This is request 1008 (line 441).
  • Lines 452–462 are the query stack response (line 456) to SNMPIUCV request 1008 (line 457). The request was unsuccessful. The query stack returns major error code 2 (line 458), minor error code 7 (line 459), unknown variable (line 462). Note that no SNMP PDUs were generated since the query stack could not resolve the variable name.
  • Line 463 indicates that the client connection (SNMPIUCV) has been terminated. This is the result of the STOP TASK=SNMPIUCV command.