FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
gcortes1
Staff
Staff
Article Id 190736
Description
This article addresses the issue where the FortiGate presents high processor usage by the SNMPD process when monitoring via SNMP has been enabled.

Solution
1. Validate the process ID for the SNMP daemon:
FW # diagnose sys top 10 4
Run Time:  0 days, 6 hours and 48 minutes
0U, 0N, 2S, 98I; 1000T, 618F, 120KF
          snmpd      226      R       99.4     1.3
       ipsengine      116      S <     0.0     5.1
       scanunitd      218      S <     0.0     3.6
       scanunitd      219      S <     0.0     3.6

2. Confirm the SNMP index for the interface:
FW # show system interface
config system interface
    edit "wan1"
        set vdom "root"
        set ip 192.168.1.99 255.255.255.0
        set allowaccess ping https ssh snmp http fgfm
        set type physical
        set description "WAN1"
        set snmp-index 1
    next
    edit "wan2"
        set vdom "root"
        set ip 192.168.2.99 255.255.255.0
        set allowaccess ping https ssh http fgfm auto-ipsec
        set type physical
        set description "WAN2"
        set snmp-index 1 < index 1 for example change to 4
    next
    edit "modem"
        set vdom "root"
        set mode pppoe
        set type physical
        set snmp-index 3
    next

3. Change the SNMP index for the interface:
FW # config system interface
FW (interface) # edit wan2
FW (wan2) # set snmp-index 4
FW (wan2) # end

4. Once the SNMP index has been changed, kill the process using "diag sys kill 9 <snmpd index>" or reboot the unit.

Contributors