Data Domain: SNMP Traps Fail After DDOS Upgrade to DDOS 8.3 or 8.1
Summary: Simple Network Management Protocol (SNMP) traps fail to send if the SNMP trap host configuration includes a port number. A defect in IP address validation introduced in DDOS 8.3 and 8.1 causes this issue ...
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
Applies to:
- System upgraded to DDOS versions before 8.3.1.10 AND 8.1.x, for example: DDOS system upgraded from 7.13.1.40 to 8.3.1.10
When an SNMP configuration includes a port appended to the IP address, the following symptoms appear:
- SNMP traps are not sent.
- The log
messages.engineeringdisplays "Invalid IP address" errors. - The error message shows the IP and port concatenated with "
!!."
Example log entries in messages.engineering:
#log view debug/messages.engineering
2023-10-08 09:52:43 xxxxx emsmon: ERROR: Invalid IP address: xxxxx!!162
2023-10-08 09:52:46 xxxxx emsmon: ERROR: Invalid IP address: xxxxx!!162
2023-10-08 09:53:09 xxxxx emsmon: ERROR: Invalid IP address: xxxxx!!162
2023-10-08 09:55:09 xxxxx emsmon: ERROR: Invalid IP address: xxxxx!!162Cause
The issue originates from an issue introduced in version 8.3 when a new validation check was added for the IP address configured for SNMP traps.
The check expects a pure IP address, but the implementation incorrectly passes the IP and port together as a single string formatted IP!!Port.
Because this combined string is not a valid IP address, the validation fails, preventing the trap from being sent.
Resolution
Fix:
- Upgrade DDOS to version 8.3.1.20 (LTS) or 8.4.x, where the issue is corrected.
- Download the appropriate package from the Dell Support portal.
- Install the package following the standard upgrade procedure as described in the DDOS Administration Guide for the given release.
Workaround:
- Check if the SNMP trap port has been specified.
- If the port has been specified, it shows as a number, otherwise shows as 'Default' (the default is port 162):
# snmp show trap-hosts
SNMP v2c Trap Hosts:
--------------------
Trap Host Port Community
--------- ---- ---------
x.x.x.x 162 x.x.x.x
--------- ---- ---------
- Remove the
trap-hostentry:
# snmp del trap-host x.x.x.x
- Add it without specifying a port:
# snmp add trap-host x.x.x.x version v2c community x.x.x.x
The same can be achieved in the DDOS graphical interface by removing the port number from the trap-host configuration found in Administration > Settings > SNMP
Affected Products
Data DomainArticle Properties
Article Number: 000393799
Article Type: Solution
Last Modified: 05 Dec 2025
Version: 2
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.