Need to restart SNMP after DNS failure

Anonymous
2025-01-10T03:00:57+00:00

I have a number of Windows Servers ranging from 2016 to 2022 and all have this problem. If there is a network connectivity issue resulting in a drop is DNS, the SNMP server will continue to not accept inbound connections even after DNS is restored. Since I use FQDN to restrict access to SNMP via the security settings it makes sense that access would be blocked while DNS is unavailable. However, it continues to deny access after the network outage until I restart the SNMP service. When it's in that state, the service is still running and there's nothing in the Event Log to indicate a problem. Is this a bug in the service or is there a solution?

Windows for business | Windows Server | Networking | Other

Locked Question. This question was migrated from the Microsoft Support Community. You can vote on whether it's helpful, but you can't add comments or replies or follow the question. To protect privacy, user profiles for migrated questions are anonymized.

0 comments No comments
{count} votes
Accepted answer
  1. Anonymous
    2025-01-10T06:31:58+00:00

    Hello Gaven,

    The problem you're experiencing with SNMP (Simple Network Management Protocol) failing to accept inbound connections after DNS issues is likely due to how the SNMP service is handling

    Possible Causes:

    The SNMP service does not have a built-in mechanism to handle DNS failures dynamically when using FQDNs in security settings.

    A bug or limitation in certain versions of Windows Server that does not automatically recover from DNS issues after they are resolved.

    Solutions:

    1. Use IP Address for SNMP Security:

    Change SNMP Security Settings: Instead of using FQDNs for SNMP access control, consider using IP addresses in the SNMP security configuration. This will remove the dependency on DNS resolution and prevent the issue from occurring if DNS is unavailable.

    Pro: This eliminates the DNS-related issue entirely.

    Con: You lose the flexibility of using FQDNs, especially in dynamic or changing network environments.

    2. DNS Caching and TTL:

    Increase the DNS Cache TTL (Time-to-Live): If you must use FQDNs, check if your DNS server is caching records for a short period. You could increase the TTL in the DNS records so that the SNMP service doesn't need to rely on real-time DNS lookups and can work with cached records.

    Pro: This would reduce the impact of DNS failures and reduce the frequency of FQDN lookups.

    Con: Not a complete fix, but it could mitigate the issue during short DNS outages.

    3. Update Windows and SNMP Service:

    Check for Updates: Make sure that you are running the latest patches and updates for the version of Windows Server you're using. Microsoft may have released fixes for issues related to SNMP and DNS interactions in later updates.

    Pro: A patch or update could address the issue if it's a known bug.

    Con: It may not resolve the issue if it's an inherent limitation of the SNMP service.

    5. Use Event Log Monitoring:

    Monitor for DNS Failures: Even though you mentioned there's nothing in the Event Log, you could create custom monitoring for DNS failures and SNMP service states. Use tools like System Center Operations Manager (SCOM) or third-party solutions to get more granular visibility into service health, which could help in identifying whether there are underlying issues not logged by SNMP itself.

    Conclusion:

    The most reliable long-term solution is to switch from FQDN-based SNMP access control to using IP addresses. However, if you must continue using FQDNs, you can explore automating SNMP service restarts or increasing DNS cache TTL. Additionally, ensure that your systems are fully updated to prevent any known bugs from affecting SNMP functionality.

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful