Configuring Firewall SNMP alerts / traps configuration in Zabbix
SNMP Monitoring and Trap Reception in Zabbix (Palo Alto Firewall)
Purpose: This document confirms that Zabbix supports SNMP-based monitoring and SNMP trap reception, and describes the steps followed to validate SNMP polling and trap capability using a Palo Alto firewall.
1. SNMP Package Installation
The required SNMP packages were installed on the Zabbix server:
Command used:
sudo apt install snmp snmptrapd -y
This enables:
- SNMP polling tools
- SNMP trap reception via UDP port 162
2. Zabbix SNMP Trapper Configuration
Verified SNMP trapper settings in Zabbix configuration:
File:
/etc/zabbix/zabbix_server.conf
Verified parameters:
StartSNMPTrapper=1
SNMPTrapperFile=/var/log/snmptrap/snmptrap.log
This confirms:
- SNMP trapper is enabled
- Trap logs are written to the specified file
3. SNMP Trap Listener Verification
Verified that the Zabbix server is listening on SNMP trap port (UDP 162):
Command:
ss -unlp | grep 162
Output confirms:
- UDP port 162 is listening on all interfaces (IPv4 and IPv6)
This confirms the server is technically ready to receive SNMP traps.
4. SNMP Trap Log Verification:
Verified SNMP trap log file existence and permissions:
Command:
ls -l /var/log/snmptrap/snmptrap.log
Observed:
- File exists
- Owned by zabbix:zabbix
- Correct read/write permissions
This ensures Zabbix can process incoming traps.
- SNMP was enabled on the Palo Alto firewall for the Zabbix server IP.
- Confirmation received from Network Team that SNMP is enabled on firewall.
5.SNMP Polling Validation (Active Monitoring)
To validate SNMP polling:
- Palo Alto firewall template was downloaded from:
https://github.com/zabbix/community-templates
- Template imported into Zabbix
- Host created with:
- Management interface IP of firewall
- SNMP interface selected
- Palo Alto SNMP template linked
Result:
- SNMP interface status turned green
- Metrics started populating in Zabbix
6.Trigger Validation
A High CPU Utilization trigger was configured.
Testing method:
- Threshold temporarily reduced to 10%
- Current CPU was ~16%
Result:
- Zabbix immediately generated a PROBLEM alert
- Alert was visible in dashboard
Threshold was later restored to normal value (90%).
This confirms:
- SNMP polling is working
- Triggering logic works correctly
7.SNMP Trap Behavior Clarification
- SNMP traps are NOT generated continuously
- Traps are generated only for specific events, such as:
- Hardware failure
- Interface up/down
- Critical system events
Normal operational states generate logs but may not generate traps.
This behavior is device-specific and expected.
Trap Testing Status
At present:
- Zabbix trap listener is active
- Firewall is configured to send traps
- No critical trap condition was triggered yet
8.Conclusion:
Confirmed:
Zabbix supports SNMP polling
Zabbix supports SNMP trap reception
SNMP polling from Palo Alto firewall is working
Zabbix triggers based on SNMP data are working
Zabbix server is ready to receive SNMP traps