IP SLA with TRAPS

R4_SYSLOG_TRAP#
!
ip sla logging traps
logging 192.168.19.135
snmp-server host 192.168.19.135 CISCO ipsla
!
ip sla 1
icmp-echo 1.1.1.5 source-interface FastEthernet0/1
threshold 30
ip sla reaction-configuration 1 react rtt threshold-value 30 10 threshold-type immediate action-type trapOnly
ip sla reaction-configuration 1 react timeout action-type trapOnly threshold-type immediate
ip sla schedule 1 life forever start-time now

R4_SYSLOG_TRAP#
*Mar 1 00:16:56.339: %RTT-4-OPER_TIMEOUT: condition occurred, entry number = 1

*Mar 1 00:16:56.375: SNMP: Queuing packet to 192.168.19.135

*Mar 1 00:16:56.375: SNMP: V1 Trap, ent rttMonNotificationsPrefix, addr 192.168.19.136, gentrap 6, spectrap 2
rttMonCtrlAdminTag.1 =
rttMonHistoryCollectionAddress.1 = 01 01 01 05
rttMonCtrlOperTimeoutOccurred.1 = 1

*Mar 1 00:16:56.443: SNMP: Queuing packet to 192.168.19.135

*Mar 1 00:16:56.443: SNMP: V1 Trap, ent rttMonNotificationsPrefix, addr 192.168.19.136, gentrap 6, spectrap 5
rttMonCtrlAdminTag.1 =
rttMonHistoryCollectionAddress.1 = 01 01 01 05
rttMonCtrl.19.1.2.1 = 7
rttMonCtrl.19.1.10.1 = 1
rttMonCtrl.19.1.9.1 = 1
rttMonCtrl.19.1.5.1 = 0
rttMonCtrl.19.1.6.1 = 0
rttMonEchoAdminEntry.33.1 = 00 00 00 00

*Mar 1 00:16:56.463: %RTT-3-IPSLATHRESHOLD: IP SLAs(1): Threshold Occurred for timeout

*Mar 1 00:16:56.627: SNMP: Packet sent via UDP to 192.168.19.135
*Mar 1 00:16:56.879: SNMP: Packet sent via UDP to 192.168.19.135

kiwi_syslog_trap