AI-AP-MIB

        This MIB is for managing Aruba Instant WLAN
    

Imported Objects

aiEnterpriseMibModulesARUBA-MIB
OBJECT-GROUPSNMPv2-CONF
MODULE-IDENTITY, NOTIFICATION-TYPE, IpAddress, Counter64, Counter32, Integer32, snmpModules, OBJECT-TYPESNMPv2-SMI
DisplayString, PhysAddress, TimeInterval, RowStatus, StorageType, TestAndIncr, MacAddress, TruthValue, DateAndTime, TEXTUAL-CONVENTIONSNMPv2-TC

Type Definitions (66)

Name Base Type Values/Constraints
ArubaAccessPointModeairMonitor(1), accessPoint(2), accessPointAndMonitor(3), meshPortal(4), meshPoint(5), rfprotectSensor(6), spectrumSensor(7)
ArubaACLActiondeny(1), permit(2), srcNAT(3), dstNAT(4), redirect(5)
ArubaACLDomainalias(1), any(2), user(3), host(4), network(5)
ArubaACLNetworkServiceTypealias(1), any(2), tcp(3), udp(4), protocol(5)
ArubaActiveStateactive(1), inactive(2)
ArubaAddressTypesrcAddress(1), dstAddress(2), bssid(3)
ArubaAntennaSettingnotPresent(1), enabled(2), disabled(3)
ArubaAPConductorStatusup(1), down(2), move(3)
ArubaAPMasterStatusup(1), down(2), move(3)
ArubaAPMatchMethodnotApplicable(0), exactMatch(1), plusOneMatch(2), minusOneMatch(3), ouiMatch(4)
ArubaAPMatchTypeunknown(0), configuredWiredMac(1), ethernetWiredMac(2), apWiredMac(3), externalWiredMac(4), manual(5), baseBSSIDOverride(6), mms(7), ethernetGatewayWiredMac(8), classificationDisabled(9), apBSSID(10), propagatedEthernetWiredMac(11), apRule(12), systemWiredMac(13), systemGatewayMac(14)
ArubaAPStatusup(1), down(2)
ArubaAPUplinkChangeReasonlinkFailure(1), vpnFailure(2), preemption(3), internetFailover(4)
ArubaAPUplinkTypeethernet(1), usb(2), pppoe(3), wifi(4)
ArubaARMChangeReasonradarDetected(1), radarCleared(2), txHang(3), txHangClear(4), fortyMhzIntol(5), cancel40mhzIntol(6), fortyMhzAlign(7), armInterference(8), armInvalidCh(9), armErrorThresh(10), armNoiseThresh(11), armEmptyCh(12), armRogueCont(13), armDecreasePower(14), armIncreasePower(15), armTurnOffRadio(16), armTurnOnRadio(17)
ArubaAuthenticationMethodsnone(0), web(1), mac(2), vpn(3), dot1x(4), kerberos(5), secureId(7), pubcookie(15), xSec(16), xSecMachine(17), via-vpn(28), other(255)
ArubaAuthServerTypeinternaldb(1), radius(2), ldap(3), kerberos(4), tacacs(5)
ArubaBlackListReasonuserDefined(1), mitmAttack(2), authFailure(3), pingFlood(4), sessionFlood(5), synFlood(6), sessionBlacklist(7), ipSpoofing(8), esiBlacklist(9), other(100)
ArubaCallStatesidle(0), initiated(1), connecting(2), delivered(3), connected(4), offered(5), alerting(6), releasing(7), cancelling(8), challenging(9), transient(10), blockwait(11), succ(12), fail(13), aborted(14), blocked(15)
ArubaCardTypelc1(1), lc2(2), sc1(3), sc2(4), sw2400(5), sw800(6), sw200(7), m3mk1(8), sw3200(9), sw3400(10), sw3600(11), sw650(12), sw651(13), reserved1(14), reserved2(15), sw620(16)
ArubaConfigurationChangeTypecreate(1), delete(2), modify(3)
ArubaConfigurationStatesuccess(1), error(2)
ArubaDaysOfWeeksun(1), mon(2), tue(3), wed(4), thu(5), fri(6), sat(7)
ArubaDBTypemssql(1), mysql(2)
ArubaDenyListReasonuserDefined(1), mitmAttack(2), authFailure(3), pingFlood(4), sessionFlood(5), synFlood(6), sessionDenylist(7), ipSpoofing(8), esiDenylist(9), other(100)
ArubaDot1dStatedisabled(1), blocked(2), listening(3), learning(4), forwarding(5)
ArubaEnableValueenabled(1), disabled(2)
ArubaEncryptionMethodsdisabled(0), static-wep(1), dynamic-wep(2), static-wpa(3), dynamic-wpa(4), wpa2-psk-aes(5), wpa2-8021x-aes(6), wpa2PreAuth(7), xsec(8), wpa-psk-aes(9), wpa-aes(10), wpa2-psk-tkip(11), wpa2-8021x-tkip(12), bSec-128(13), bSec-256(14), owe-aes(16), wpa3-sae-aes(17), wpa3-cnsa(18), wpa3-aes-ccm-128(19), mpsk-aes(21), wpa3-aes-gcm-256(22)
ArubaEncryptionTypenone(0), static-wep(1), dynamic-wep(2), wpa-psk-tkip(3), wpa-tkip(4), wpa-psk-aes(5), wpa-aes(6), wpa2-psk-tkip(7), wpa2-tkip(8), wpa2-psk-aes(9), wpa2-aes(10), xSec(11), bSec-128(12), bSec-256(13), aes-128-cmac(14), unknown(15), ft-psk(16), ft-8021x(17), wpa3-cnsa(18), owe-aes(20), wpa3-sae-aes(21), wpa3-aes-gcmp-256(22)
ArubaEnet1ModeactiveStandby(1), tunnel(2), bridge(3), notApplicable(4), split(5)
ArubaESIServerModebridged(1), routed(2), nat(3)
ArubaESIServerStatusup(1), down(2)
ArubaFrameTypeassociateRequest(0), associateResponse(1), reassociateRequest(2), reassociateResponse(3), probeRequest(4), probeResponse(5), beacon(8), atim(9), disassociate(10), auth(11), deauth(12)
ArubaHashAlgorithmsmd5(1), sha(2)
ArubaHTExtChannelnone(1), above(2), below(3)
ArubaHTModenone(1), ht20(2), ht40(3), vht20(4), vht40(5), vht80(6), vht160(7), vht80plus80(8), he20(9), he40(10), he80(11), he160(12), he80plus80(13)
ArubaHTRateunknown(0), ht6dot5(1), ht13(2), ht13dot5(3), ht15(4), ht19dot5(5), ht26(6), ht27(7), ht30(8), ht39(9), ht40dot5(10), ht45(11), ht52(12), ht54(13), ht58dot5(14), ht60(15), ht65(16), ht78(17), ht81(18), ht90(19), ht104(20), ht108(21), ht117(22), ht120(23), ht121dot5(24), ht130(25), ht135(26), ht150(27), ht162(28), ht180(29), ht216(30), ht240(31), ht243(32), ht270(33), ht300(34)
ArubaIfTypeport(1), vlan(2), tunnel(3), loopback(4)
ArubaMeshRolenonmesh(0), point(1), portal(2)
ArubaMonAuthAlgorithmnone(0), psk(1), dot1x(2), ft8021x(3), ftpsk(4), dot1x256(5), psk256(6), tdls(7), sae(8), ftsae(9), other(10), suiteb(11), owe(12)
ArubaMonEncryptionCiphernone(0), wep40(1), wep104(2), tkip(3), aesccmp(4), other(5), gcm256(6)
ArubaMonEncryptionTypeopen(0), wep(1), wpa(2), wpa2(3), wpa3(4)
ArubaMonitorModeunknown(0), all(1), none(2), mixed(3)
ArubaOperStateValueup(1), down(2), testing(3)
ArubaPhyTypedot11a(1), dot11b(2), dot11g(3), dot11ag(4), wired(5), dot11ax6ghz(6)
ArubaPoeStatedisabled(1), enabled(2), enabledCisco(3), notAvailable(4)
ArubaPortalServerDownReasonconnectFail(1)
ArubaPortDuplexhalf(1), full(2), auto(3)
ArubaPortModeaccess(1), dot1q(2)
ArubaPortSpeedspeed10Mbps(1), speed100Mbps(2), speed1000Mbps(3), speedAuto(4), speed10Gbps(5)
ArubaPortTypefastethernet(1), gigabitethernet(2), xgigabitethernet(3)
ArubaRogueApTypevalid(1), interfering(2), unsecure(3), dos(4), unknown(5), knownInterfering(6), suspectedUnsecure(7)
ArubaStationTypevalid(1), interfering(2), dos(3)
ArubaSubAuthenticationMethodsauthPAP(1), authCHAP(2), authMSCHAP(3), authMSCHAPv2(4), eapTLS(5), eapTTLS(6), eapLEAP(7), eapMD5(8), eapPEAP(9)
ArubaSupportStatusunsupported(1), supported(2)
ArubaSwitchRoleconductor(1), local(2), backupconductor(3)
ArubaUnprovisionedStatusyes(1), no(2)
ArubaUSBStatusunknown(0), notPresent(1), inactive(2), active(3)
ArubaUserForwardModetunnel-encrypted(0), bridge(1), tunnel-decrypted(2), split-tunnel(3)
ArubaVlanValidRangerange: 1..4095
ArubaVoiceCacBitcacActiveLoadBalancing(0), cacHighCapThresholdReached(1), cacHandRsrvThresholdReached(2), cacPeakCapacityReached(3)
ArubaVoiceCdrDirectionog(0), ic(1)
ArubaVoipProtocolsccp(1), svp(2), vocera(3), sip(9), ua(11)
ArubaVoipProtocolTypesccp(1), svp(2), vocera(3), sip(4), unknown(10)
ArubaVoipRegStateunknown(0), registering(1), unregistering(2), challenge(3), registered(4), unregistered(5)
ArubaVrrpStateinitialize(1), backup(2), master(3)

Objects

aiMIB .1.3.6.1.4.1.14823.2.3.3.1
aiInfoGroup .1.3.6.1.4.1.14823.2.3.3.1.1
aiVirtualControllerKey
.1.3.6.1.4.1.14823.2.3.3.1.1.1
aiMeshTable .1.3.6.1.4.1.14823.2.3.3.1.1.15
aiMeshEntry .1.3.6.1.4.1.14823.2.3.3.1.1.15.1
aiMeshIndex .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.1
aiMeshPointMac
.1.3.6.1.4.1.14823.2.3.3.1.1.15.1.2
aiMeshPortalMac
.1.3.6.1.4.1.14823.2.3.3.1.1.15.1.3
aiMeshChannel
.1.3.6.1.4.1.14823.2.3.3.1.1.15.1.4
aiMeshAvgRssi .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.5
aiMeshHops .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.6
aiMeshAge .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.7
aiMeshCost
.1.3.6.1.4.1.14823.2.3.3.1.1.15.1.8
aiMeshRelation
.1.3.6.1.4.1.14823.2.3.3.1.1.15.1.9
aiConductorIPAddress
.1.3.6.1.4.1.14823.2.3.3.1.1.16
aiVirtualControllerName
.1.3.6.1.4.1.14823.2.3.3.1.1.2
aiVirtualControllerOrganization
.1.3.6.1.4.1.14823.2.3.3.1.1.3
aiVirtualControllerVersion
.1.3.6.1.4.1.14823.2.3.3.1.1.4
aiVirtualControllerIPAddress
.1.3.6.1.4.1.14823.2.3.3.1.1.5
aiMasterIPAddress
.1.3.6.1.4.1.14823.2.3.3.1.1.6
aiWlanSSIDTable .1.3.6.1.4.1.14823.2.3.3.1.1.7
aiWlanSSIDEntry .1.3.6.1.4.1.14823.2.3.3.1.1.7.1
aiSSIDIndex .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.1
aiSSID .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.2
aiSSIDStatus .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.3
aiSSIDClientNum .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.4
aiSSIDHide .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.5
aiInterferAccessPointTable .1.3.6.1.4.1.14823.2.3.3.1.1.8
aiInterferAccessPointEntry .1.3.6.1.4.1.14823.2.3.3.1.1.8.1
aiInterferAPIndex .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.1
aiInterferAPBSSID
.1.3.6.1.4.1.14823.2.3.3.1.1.8.1.2
aiInterferAPESSID .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.3
aiInterferAPChannel
.1.3.6.1.4.1.14823.2.3.3.1.1.8.1.4
aiInterferAPPhyType
.1.3.6.1.4.1.14823.2.3.3.1.1.8.1.5
aiInterferAPEncr
.1.3.6.1.4.1.14823.2.3.3.1.1.8.1.6
aiInterferAPAvgSnr .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.7
aiInterferAPType
.1.3.6.1.4.1.14823.2.3.3.1.1.8.1.8
aiStateGroup .1.3.6.1.4.1.14823.2.3.3.1.2
aiAccessPointTable .1.3.6.1.4.1.14823.2.3.3.1.2.1
aiAccessPointEntry .1.3.6.1.4.1.14823.2.3.3.1.2.1.1
aiAPMACAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.1.1.1
aiAPTotalMemory .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.10
aiAPStatus .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.11
aiAPHwopmode .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.12
aiAPRole
.1.3.6.1.4.1.14823.2.3.3.1.2.1.1.13
aiAPName .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.2
aiAPIPAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.1.1.3
aiAPSerialNum .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.4
aiAPModel .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.5
aiAPModelName .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.6
aiAPCPUUtilization .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.7
aiAPMemoryFree .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.8
aiAPUptime
.1.3.6.1.4.1.14823.2.3.3.1.2.1.1.9
aiRadioTable .1.3.6.1.4.1.14823.2.3.3.1.2.2
aiRadioEntry .1.3.6.1.4.1.14823.2.3.3.1.2.2.1
aiRadioAPMACAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.1
aiRadioTxMgmtFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.10
aiRadioTxDataFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.11
aiRadioTxDataBytes
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.12
aiRadioTxDrops
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.13
aiRadioRxTotalFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.14
aiRadioRxDataFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.15
aiRadioRxDataBytes
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.16
aiRadioRxMgmtFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.17
aiRadioRxBad
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.18
aiRadioPhyEvents
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.19
aiRadioIndex .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.2
aiRadioStatus .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.20
aiRadioClientNum .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.21
aiRadioMode
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.22
aiRadioMACAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.3
aiRadioChannel
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.4
aiRadioTransmitPower .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.5
aiRadioNoiseFloor .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.6
aiRadioUtilization4 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.7
aiRadioUtilization64 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.8
aiRadioTxTotalFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.2.1.9
aiWlanTable .1.3.6.1.4.1.14823.2.3.3.1.2.3
aiWlanEntry .1.3.6.1.4.1.14823.2.3.3.1.2.3.1
aiWlanAPMACAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.3.1.1
aiWlanRxDataBytes
.1.3.6.1.4.1.14823.2.3.3.1.2.3.1.10
aiWlanIndex .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.2
aiWlanESSID
.1.3.6.1.4.1.14823.2.3.3.1.2.3.1.3
aiWlanMACAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.3.1.4
aiWlanTxTotalFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.3.1.5
aiWlanTxDataFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.3.1.6
aiWlanTxDataBytes
.1.3.6.1.4.1.14823.2.3.3.1.2.3.1.7
aiWlanRxTotalFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.3.1.8
aiWlanRxDataFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.3.1.9
aiClientTable .1.3.6.1.4.1.14823.2.3.3.1.2.4
aiClientEntry .1.3.6.1.4.1.14823.2.3.3.1.2.4.1
aiClientMACAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.1
aiClientTxRetries
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.10
aiClientTxRate .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.11
aiClientRxDataFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.12
aiClientRxDataBytes
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.13
aiClientRxRetries
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.14
aiClientRxRate .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.15
aiClientUptime
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.16
aiClientPhyType .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.17
aiClientHtMode .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.18
aiClientWlanMACAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.2
aiClientIPAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.3
aiClientAPIPAddress
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.4
aiClientName
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.5
aiClientOperatingSystem
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.6
aiClientSNR .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.7
aiClientTxDataFrames
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.8
aiClientTxDataBytes
.1.3.6.1.4.1.14823.2.3.3.1.2.4.1.9
aiVoiceClientTable .1.3.6.1.4.1.14823.2.3.3.1.2.5
aiVoiceClientEntry .1.3.6.1.4.1.14823.2.3.3.1.2.5.1
aiClientMac
.1.3.6.1.4.1.14823.2.3.3.1.2.5.1.1
aiClientIP
.1.3.6.1.4.1.14823.2.3.3.1.2.5.1.2
aiClientAPMac
.1.3.6.1.4.1.14823.2.3.3.1.2.5.1.3
aiClientAPName
.1.3.6.1.4.1.14823.2.3.3.1.2.5.1.4
aiTrapsGroup .1.3.6.1.4.1.14823.2.3.3.1.200
aiTrapObjectsGroup .1.3.6.1.4.1.14823.2.3.3.1.200.1
wlsxTrapAPMacAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.1
wlsxReceiverMac
.1.3.6.1.4.1.14823.2.3.3.1.200.1.10
wlsxTrapAPPrevMode .1.3.6.1.4.1.14823.2.3.3.1.200.1.100
wlsxTrapAPARMChangeReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.101
wlsxTrapAPChannelSec .1.3.6.1.4.1.14823.2.3.3.1.200.1.102
wlsxTrapUserAttributeChangeType .1.3.6.1.4.1.14823.2.3.3.1.200.1.103
wlsxTrapApControllerIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.104
wlsxTrapApMasterStatus .1.3.6.1.4.1.14823.2.3.3.1.200.1.105
wlsxTrapCaName .1.3.6.1.4.1.14823.2.3.3.1.200.1.106
wlsxTrapCrlName .1.3.6.1.4.1.14823.2.3.3.1.200.1.107
wlsxTrapCount .1.3.6.1.4.1.14823.2.3.3.1.200.1.108
wlsxTrapTransmitterMac
.1.3.6.1.4.1.14823.2.3.3.1.200.1.11
wlsxTrapReceiverMac
.1.3.6.1.4.1.14823.2.3.3.1.200.1.12
wlsxTrapSnr .1.3.6.1.4.1.14823.2.3.3.1.200.1.13
wlsxTrapAPPreviousUplinkType .1.3.6.1.4.1.14823.2.3.3.1.200.1.130
wlsxTrapAPPreviousUplinkActiveTime
.1.3.6.1.4.1.14823.2.3.3.1.200.1.131
wlsxTrapAPActiveUplinkType .1.3.6.1.4.1.14823.2.3.3.1.200.1.132
wlsxTrapAPUplinkChangeReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.133
wlsxTrapAPManagedModeConfigFailure .1.3.6.1.4.1.14823.2.3.3.1.200.1.138
wlsxTrapAuthServerAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.139
wlsxTrapSignatureName .1.3.6.1.4.1.14823.2.3.3.1.200.1.14
wlsxTrapPortalServerName .1.3.6.1.4.1.14823.2.3.3.1.200.1.140
wlsxTrapPortalServerAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.141
wlsxTrapPortalServerDownReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.142
wlsxTrapStationBlackListReasonStr .1.3.6.1.4.1.14823.2.3.3.1.200.1.144
wlsxTrapAPUSBStatus .1.3.6.1.4.1.14823.2.3.3.1.200.1.147
wlsxTrapUSBVendorProductID .1.3.6.1.4.1.14823.2.3.3.1.200.1.148
wlsxTrapFrameType .1.3.6.1.4.1.14823.2.3.3.1.200.1.15
wlsxTrapAuthFailureReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.155
wlsxTrapStationDenyListReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.156
wlsxTrapStationDenyListReasonStr .1.3.6.1.4.1.14823.2.3.3.1.200.1.157
wlsxTrapConductorIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.158
wlsxTrapConductorName .1.3.6.1.4.1.14823.2.3.3.1.200.1.159
wlsxTrapAddressType .1.3.6.1.4.1.14823.2.3.3.1.200.1.16
wlsxTrapApConductorStatus .1.3.6.1.4.1.14823.2.3.3.1.200.1.160
wlsxTrapAPHTMode .1.3.6.1.4.1.14823.2.3.3.1.200.1.161
wlsxTrapAPPhyType .1.3.6.1.4.1.14823.2.3.3.1.200.1.162
wlsxTrapAPPrevHTMode .1.3.6.1.4.1.14823.2.3.3.1.200.1.163
wlsxTrapAPPrevPhyType .1.3.6.1.4.1.14823.2.3.3.1.200.1.164
wlsxTrapAPSecChannel .1.3.6.1.4.1.14823.2.3.3.1.200.1.165
wlsxTrapAPBand .1.3.6.1.4.1.14823.2.3.3.1.200.1.166
wlsxTrapTargetAPBand .1.3.6.1.4.1.14823.2.3.3.1.200.1.167
wlsxTrapMatchedIpv6 .1.3.6.1.4.1.14823.2.3.3.1.200.1.168
wlsxTrapAPLocation .1.3.6.1.4.1.14823.2.3.3.1.200.1.17
wlsxTrapAPChannel .1.3.6.1.4.1.14823.2.3.3.1.200.1.18
wlsxTrapAPTxPower .1.3.6.1.4.1.14823.2.3.3.1.200.1.19
wlsxTrapAPIpAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.2
wlsxTrapMatchedMac
.1.3.6.1.4.1.14823.2.3.3.1.200.1.20
wlsxTrapMatchedIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.21
wlsxTrapRogueIfoURL .1.3.6.1.4.1.14823.2.3.3.1.200.1.22
wlsxTrapVlanId .1.3.6.1.4.1.14823.2.3.3.1.200.1.23
wlsxTrapAdminStatus .1.3.6.1.4.1.14823.2.3.3.1.200.1.24
wlsxTrapOperStatus .1.3.6.1.4.1.14823.2.3.3.1.200.1.25
wlsxTrapAuthServerName .1.3.6.1.4.1.14823.2.3.3.1.200.1.26
wlsxTrapAuthServerTimeout .1.3.6.1.4.1.14823.2.3.3.1.200.1.27
wlsxTrapCardSlot .1.3.6.1.4.1.14823.2.3.3.1.200.1.28
wlsxTrapTemperatureValue .1.3.6.1.4.1.14823.2.3.3.1.200.1.29
wlsxTrapAPBSSID
.1.3.6.1.4.1.14823.2.3.3.1.200.1.3
wlsxTrapProcessName .1.3.6.1.4.1.14823.2.3.3.1.200.1.30
wlsxTrapFanNumber .1.3.6.1.4.1.14823.2.3.3.1.200.1.31
wlsxTrapVoltageType .1.3.6.1.4.1.14823.2.3.3.1.200.1.32
wlsxTrapVoltageValue .1.3.6.1.4.1.14823.2.3.3.1.200.1.33
wlsxTrapStationBlackListReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.34
wlsxTrapSpoofedIpAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.35
wlsxTrapSpoofedOldPhyAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.36
wlsxTrapSpoofedNewPhyAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.37
wlsxTrapDBName .1.3.6.1.4.1.14823.2.3.3.1.200.1.38
wlsxTrapDBUserName .1.3.6.1.4.1.14823.2.3.3.1.200.1.39
wlsxTrapEssid .1.3.6.1.4.1.14823.2.3.3.1.200.1.4
wlsxTrapDBIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.40
wlsxTrapDBType .1.3.6.1.4.1.14823.2.3.3.1.200.1.41
wlsxTrapVrrpID .1.3.6.1.4.1.14823.2.3.3.1.200.1.42
wlsxTrapVrrpMasterIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.43
wlsxTrapVrrpOperState .1.3.6.1.4.1.14823.2.3.3.1.200.1.44
wlsxTrapESIServerGrpName .1.3.6.1.4.1.14823.2.3.3.1.200.1.45
wlsxTrapESIServerName .1.3.6.1.4.1.14823.2.3.3.1.200.1.46
wlsxTrapESIServerIpAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.47
wlsxTrapLicenseDaysRemaining .1.3.6.1.4.1.14823.2.3.3.1.200.1.48
wlsxTrapSwitchIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.49
wlsxTrapTargetAPBSSID
.1.3.6.1.4.1.14823.2.3.3.1.200.1.5
wlsxTrapSwitchRole .1.3.6.1.4.1.14823.2.3.3.1.200.1.50
wlsxTrapUserIpAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.51
wlsxTrapUserPhyAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.52
wlsxTrapUserName .1.3.6.1.4.1.14823.2.3.3.1.200.1.53
wlsxTrapUserRole .1.3.6.1.4.1.14823.2.3.3.1.200.1.54
wlsxTrapUserAuthenticationMethod .1.3.6.1.4.1.14823.2.3.3.1.200.1.55
wlsxTrapAPRadioNumber .1.3.6.1.4.1.14823.2.3.3.1.200.1.56
wlsxTrapRogueInfoURL .1.3.6.1.4.1.14823.2.3.3.1.200.1.57
wlsxTrapInterferingAPInfoURL .1.3.6.1.4.1.14823.2.3.3.1.200.1.58
wlsxTrapPortNumber .1.3.6.1.4.1.14823.2.3.3.1.200.1.59
wlsxTrapTargetAPSSID .1.3.6.1.4.1.14823.2.3.3.1.200.1.6
wlsxTrapTime
.1.3.6.1.4.1.14823.2.3.3.1.200.1.60
wlsxTrapHostIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.61
wlsxTrapHostPort .1.3.6.1.4.1.14823.2.3.3.1.200.1.62
wlsxTrapConfigurationId .1.3.6.1.4.1.14823.2.3.3.1.200.1.63
wlsxTrapCTSURL .1.3.6.1.4.1.14823.2.3.3.1.200.1.64
wlsxTrapCTSTransferType .1.3.6.1.4.1.14823.2.3.3.1.200.1.65
wlsxTrapConfigurationState .1.3.6.1.4.1.14823.2.3.3.1.200.1.66
wlsxTrapUpdateFailureReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.67
wlsxTrapUpdateFailedObj .1.3.6.1.4.1.14823.2.3.3.1.200.1.68
wlsxTrapTableEntryChangeType .1.3.6.1.4.1.14823.2.3.3.1.200.1.69
wlsxTrapTargetAPChannel .1.3.6.1.4.1.14823.2.3.3.1.200.1.7
wlsxTrapGlobalConfigObj .1.3.6.1.4.1.14823.2.3.3.1.200.1.70
wlsxTrapTableGenNumber .1.3.6.1.4.1.14823.2.3.3.1.200.1.71
wlsxTrapLicenseId .1.3.6.1.4.1.14823.2.3.3.1.200.1.72
wlsxTrapConfidenceLevel .1.3.6.1.4.1.14823.2.3.3.1.200.1.73
wlsxTrapMissingLicenses .1.3.6.1.4.1.14823.2.3.3.1.200.1.74
wlsxVoiceCurrentNumCdr .1.3.6.1.4.1.14823.2.3.3.1.200.1.75
wlsxTrapTunnelId .1.3.6.1.4.1.14823.2.3.3.1.200.1.76
wlsxTrapTunnelStatus .1.3.6.1.4.1.14823.2.3.3.1.200.1.77
wlsxTrapTunnelUpReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.78
wlsxTrapTunnelDownReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.79
wlsxTrapNodeMac
.1.3.6.1.4.1.14823.2.3.3.1.200.1.8
wlsxTrapApSerialNumber .1.3.6.1.4.1.14823.2.3.3.1.200.1.80
wlsxTrapTimeStr .1.3.6.1.4.1.14823.2.3.3.1.200.1.81
wlsxTrapMasterIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.82
wlsxTrapLocalIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.83
wlsxTrapMasterName .1.3.6.1.4.1.14823.2.3.3.1.200.1.84
wlsxTrapLocalName .1.3.6.1.4.1.14823.2.3.3.1.200.1.85
wlsxTrapPrimaryControllerIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.86
wlsxTrapBackupControllerIp
.1.3.6.1.4.1.14823.2.3.3.1.200.1.87
wlsxTrapSpoofedFrameType .1.3.6.1.4.1.14823.2.3.3.1.200.1.88
wlsxTrapAssociationType .1.3.6.1.4.1.14823.2.3.3.1.200.1.89
wlsxTrapSourceMac
.1.3.6.1.4.1.14823.2.3.3.1.200.1.9
wlsxTrapDeviceIpAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.90
wlsxTrapDeviceMac
.1.3.6.1.4.1.14823.2.3.3.1.200.1.91
wlsxTrapVcIpAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.92
wlsxTrapVcMacAddress
.1.3.6.1.4.1.14823.2.3.3.1.200.1.93
wlsxTrapAPName .1.3.6.1.4.1.14823.2.3.3.1.200.1.94
wlsxTrapApMode .1.3.6.1.4.1.14823.2.3.3.1.200.1.95
wlsxTrapAPPrevChannel .1.3.6.1.4.1.14823.2.3.3.1.200.1.96
wlsxTrapAPPrevChannelSec .1.3.6.1.4.1.14823.2.3.3.1.200.1.97
wlsxTrapAPPrevTxPower .1.3.6.1.4.1.14823.2.3.3.1.200.1.98
wlsxTrapAPCurMode .1.3.6.1.4.1.14823.2.3.3.1.200.1.99
aiTrapDefinitionsGroup .1.3.6.1.4.1.14823.2.3.3.1.200.2
aiManagedInfoGroup .1.3.6.1.4.1.14823.2.3.3.1.3
aiManagedModeSinceLastSync
.1.3.6.1.4.1.14823.2.3.3.1.3.1

Notifications/Traps

NameOIDDescription
wlsxNodeRateAnomaly


.1.3.6.1.4.1.14823.2.3.3.1.200.2.1003
This trap indicates that a node is exceeding the threshold set for 
the frame type.
wlsxNUserEntryCreated








.1.3.6.1.4.1.14823.2.3.3.1.200.2.1014
This trap indicates that a new user was created.
wlsxNUserEntryDeleted





.1.3.6.1.4.1.14823.2.3.3.1.200.2.1015
This trap indicates that a user was deleted.
wlsxNUserEntryAuthenticated




.1.3.6.1.4.1.14823.2.3.3.1.200.2.1016
This trap indicates that a user is Authenticated.
wlsxNUserEntryDeAuthenticated





.1.3.6.1.4.1.14823.2.3.3.1.200.2.1017
This trap indicates that a user is Deauthenticated.
wlsxNUserAuthenticationFailed








.1.3.6.1.4.1.14823.2.3.3.1.200.2.1018
This trap indicates that a user authentication has failed.
wlsxNAuthServerReqTimedOut









.1.3.6.1.4.1.14823.2.3.3.1.200.2.1019
This trap indicates that the authentication server request timed out.
wlsxNAuthServerTimedOut




.1.3.6.1.4.1.14823.2.3.3.1.200.2.1020
This trap indicates that the authentication server timed out.
wlsxNAuthServerIsUp




.1.3.6.1.4.1.14823.2.3.3.1.200.2.1021
This trap indicates that an authentication server is up.
wlsxNAccessPointIsUp


.1.3.6.1.4.1.14823.2.3.3.1.200.2.1040
A Trap which indicates that an access point up.
wlsxNAccessPointIsDown






.1.3.6.1.4.1.14823.2.3.3.1.200.2.1041
A Trap which indicates that an access point down.
wlsxNChannelChanged






.1.3.6.1.4.1.14823.2.3.3.1.200.2.1043
This trap indicates that an access point at Location 
wlsxTrapAPLocation has changed the channel.
wlsxNStationAddedToBlackList







.1.3.6.1.4.1.14823.2.3.3.1.200.2.1044
This trap indicates that the station is black listed. 
**NOTE: this notification is obsoleted and replaced by
wlsxNStationAddedToDenyList.
wlsxNStationRemovedFromBlackList




.1.3.6.1.4.1.14823.2.3.3.1.200.2.1045
This trap indicates that the station is removed from the black list. 
**NOTE: this notification is obsoleted and replaced by
wlsxNStationRemovedFromDenyList
wlsxNRadioAttributesChanged


.1.3.6.1.4.1.14823.2.3.3.1.200.2.1049
A Trap which indicates changes in the Radio attributes of an 
access point.
wlsxUnsecureAPDetected




.1.3.6.1.4.1.14823.2.3.3.1.200.2.1053
This trap indicates that an unauthorized access point is connected to the wired network. The access point is declared Rogue because it was matched to a MAC address.
wlsxUnsecureAPResolved.1.3.6.1.4.1.14823.2.3.3.1.200.2.1054
This trap indicates that a previously detected access point, classified as Rogue,
is no longer present in the network.
wlsxStaImpersonation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1055
This trap indicates that an AM detected Station Impersonation.
wlsxReservedChannelViolation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1056
This trap indicates that an AM detected an access point
which is violating the Reserved Channel configuration.
wlsxValidSSIDViolation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1057
This trap indicates that an AP has detected an access point is violating 
Valid SSID configuration by using an SSID that is reserved for use by a valid AP only.
wlsxChannelMisconfiguration.1.3.6.1.4.1.14823.2.3.3.1.200.2.1058
This trap indicates that an AP detected an access point that has a channel misconfiguration 
because it is using a channel that is not valid.
wlsxOUIMisconfiguration.1.3.6.1.4.1.14823.2.3.3.1.200.2.1059
This trap indicates that an AP detected an access point that has an OUI misconfiguration because
it is using an OUI that is not valid.
wlsxSSIDMisconfiguration.1.3.6.1.4.1.14823.2.3.3.1.200.2.1060
This trap indicates that an AP detected an access point that has an SSID misconfiguration because it is using
an SSID that is not valid.
wlsxShortPreableMisconfiguration.1.3.6.1.4.1.14823.2.3.3.1.200.2.1061
This trap indicates that an access point has bad Short preamble
configuration.
wlsxWPAMisconfiguration.1.3.6.1.4.1.14823.2.3.3.1.200.2.1062
This trap indicates that an AP detected an access point that is misconfigured because it is not using WPA.
wlsxAdhocNetworkDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1063
This trap indicates that an AM has detected an Ad hoc
network.
wlsxAdhocNetworkRemoved.1.3.6.1.4.1.14823.2.3.3.1.200.2.1064
This trap indicates that a previously detected Ad hoc Network is no
longer present in the network.
wlsxStaPolicyViolation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1065
This trap indicates that Protection was enforced because a valid station's association to a non-valid access point violated Valid Station policy.
wlsxRepeatWEPIVViolation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1066
This trap indicates that an AP detected that a valid access point is using the same WEP initialization vector in consecutive packets.
wlsxWeakWEPIVViolation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1067
This trap indicates that an AP detected that a valid access point is using a Weak WEP initialization vector.
wlsxChannelInterferenceDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1068
This trap indicates that an AP has detected channel interference.
wlsxChannelInterferenceCleared.1.3.6.1.4.1.14823.2.3.3.1.200.2.1069
This trap indicates that a previously detected channel interference
is no longer present.
wlsxAPInterferenceDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1070
This trap indicates that an AP has detected interference for an access point.
wlsxAPInterferenceCleared.1.3.6.1.4.1.14823.2.3.3.1.200.2.1071
This trap indicates that the previously detected interference for an access point
is no longer present.
wlsxStaInterferenceDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1072
This trap indicates that an AP has detected interference for a station.
wlsxStaInterferenceCleared.1.3.6.1.4.1.14823.2.3.3.1.200.2.1073
This trap indicates that the previously detected interference for a station
is no longer present.
wlsxFrameRetryRateExceeded.1.3.6.1.4.1.14823.2.3.3.1.200.2.1074
This trap indicates that an AP detected that an access point has exceeded the configured upper threshold for Frame Retry Rate.
wlsxFrameReceiveErrorRateExceeded.1.3.6.1.4.1.14823.2.3.3.1.200.2.1075
This trap indicates that an AP detected that an access point has exceeded the configured upper threshold for Frame Receive Error Rate.
wlsxFrameFragmentationRateExceeded.1.3.6.1.4.1.14823.2.3.3.1.200.2.1076
This trap indicates that an AP detected that an access point exceeded the configured upper threshold for Frame Fragmentation Rate.
wlsxFrameBandWidthRateExceeded.1.3.6.1.4.1.14823.2.3.3.1.200.2.1077
This trap indicates that an AP detected that a station or access point has exceeded the configured upper threshold for Bandwidth rate.
wlsxFrameLowSpeedRateExceeded.1.3.6.1.4.1.14823.2.3.3.1.200.2.1078
This trap indicates that an AP detected that a station has exceeded the configured upper threshold for Low speed rate.
wlsxFrameNonUnicastRateExceeded.1.3.6.1.4.1.14823.2.3.3.1.200.2.1079
This trap indicates that an AP detected that a station has exceeded the configured upper threshold for Non Unicast traffic rate.
wlsxLoadbalancingEnabled.1.3.6.1.4.1.14823.2.3.3.1.200.2.1080
This trap indicates that an AM is reporting that an AP 
has enabled Load balancing.
wlsxLoadbalancingDisabled.1.3.6.1.4.1.14823.2.3.3.1.200.2.1081
This trap indicates that an AM is reporting that an AP
has enabled Load balancing.
wlsxChannelFrameRetryRateExceeded.1.3.6.1.4.1.14823.2.3.3.1.200.2.1082
This trap indicates that an AP has detected that the configured upper threshold for Frame Retry Rate was exceeded on a channel.
wlsxChannelFrameFragmentationRateExceeded.1.3.6.1.4.1.14823.2.3.3.1.200.2.1083
This trap indicates that an AP has detected that the configured upper threshold for Frame Fragmentation Rate was exceeded on a channel.
wlsxChannelFrameErrorRateExceeded.1.3.6.1.4.1.14823.2.3.3.1.200.2.1084
This trap indicates that an AP has detected that the configured upper threshold for Frame Receive Error Rate was exceeded on a channel.
wlsxSignatureMatchAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1085
This trap indicates that an AP detected a signature match in a frame from an access point.
wlsxSignatureMatchSta.1.3.6.1.4.1.14823.2.3.3.1.200.2.1086
This trap indicates that an AP detected a signature match in a frame from a Station.
wlsxChannelRateAnomaly.1.3.6.1.4.1.14823.2.3.3.1.200.2.1087
This trap indicates that an AP detected frames on a channel which 
exceed the configured IDS rate threshold.
wlsxNodeRateAnomalyAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1088
This trap indicates that an AP detected frames transmitted or received by an 
access point, which exceed the configured IDS rate threshold.
wlsxNodeRateAnomalySta.1.3.6.1.4.1.14823.2.3.3.1.200.2.1089
This trap indicates that an AP detected frames transmitted or received by a 
node, which exceed the configured IDS rate threshold.
wlsxEAPRateAnomaly.1.3.6.1.4.1.14823.2.3.3.1.200.2.1090
This trap indicates that the rate of EAP Handshake packets 
received by an AP has exceeded the configured IDS EAP Handshake rate threshold.
wlsxSignalAnomaly.1.3.6.1.4.1.14823.2.3.3.1.200.2.1091
This trap indicates that an AM detected a Signal Anomaly.
wlsxSequenceNumberAnomalyAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1092
This trap indicates that an AM received packets from an AP
which exceeds the acceptable sequence number difference. 
The acceptable sequence number difference is an IDS configuration 
object.
wlsxSequenceNumberAnomalySta.1.3.6.1.4.1.14823.2.3.3.1.200.2.1093
This trap indicates that an AM received packets from a Node
which exceeds the acceptable sequence number difference. 
The acceptable sequence number difference is an IDS configuration 
object.
wlsxDisconnectStationAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1094
This trap indicates that an AM detected a station Disconnect 
attack.
wlsxApFloodAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1095
This trap indicates that the number of potential fake APs detected by 
an AP has exceeded the configured IDS threshold. This is the total number of fake APs observed across all bands.
wlsxAdhocNetwork.1.3.6.1.4.1.14823.2.3.3.1.200.2.1096
This trap indicates that an AM detected an Ad hoc 
Network. An Station is connected to an ad hoc AP.
wlsxWirelessBridge.1.3.6.1.4.1.14823.2.3.3.1.200.2.1097
This trap indicates that an AP detected a Wireless Bridge when a WDS frame was seen between the transmitter and receiver addresses.
wlsxInvalidMacOUIAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1098
This trap indicates that an AP detected an invalid MAC OUI in the BSSID of a frame.  An invalid MAC OUI suggests that the frame may be spoofed.
wlsxInvalidMacOUISta.1.3.6.1.4.1.14823.2.3.3.1.200.2.1099
This trap indicates that an AP detected an invalid MAC OUI in the SRC or DST address of a frame. An invalid MAC OUI suggests that the frame may be spoofed.
wlsxWEPMisconfiguration.1.3.6.1.4.1.14823.2.3.3.1.200.2.1100
This trap indicates that an AP detected an access point that is misconfigured because it does not have Privacy enabled.
wlsxStaRepeatWEPIVViolation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1101
This trap indicates that an AP detected that a valid station is using the same WEP initialization vector in consecutive packets.
wlsxStaWeakWEPIVViolation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1102
This trap indicates that an AP detected that a valid station is using a Weak WEP initialization vector.
wlsxStaAssociatedToUnsecureAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1103
This trap indicates that an AM detected a client associated
with a Rogue access point.
wlsxStaUnAssociatedFromUnsecureAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1104
This trap indicates that a previously detected rogue access point 
association is no longer present.
wlsxAdhocNetworkBridgeDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1105
This trap indicates that an AM has detected an Ad hoc
network that is bridging to a wired network
wlsxInterferingApDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1106
This trap indicates that an AP detected an access point classified as Interfering. The access point 
is declared Interfering because it is neither authorized or classified as Rogue.
wlsxColdStart.1.3.6.1.4.1.14823.2.3.3.1.200.2.1111
An enterprise version of cold start trap, which contains the controller time stamp.
wlsxWarmStart.1.3.6.1.4.1.14823.2.3.3.1.200.2.1112
An enterprise version of warm start trap, which contains the controller time stamp.
wlsxAPImpersonation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1113
This trap indicates that an AP detected AP Impersonation because the number of beacons seen has exceeded the expected number by the configured percentage threshold.
The expected number is calculated based on the Beacon Interval Field in the Beacon frame.
wlsxNAuthServerIsDown.1.3.6.1.4.1.14823.2.3.3.1.200.2.1115
This trap indicates that an authentication server is down.
wlsxWindowsBridgeDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1129
This trap indicates that an AM has detected a station
that is bridging from a wireless network 
to a wired network
wlsxSignAPNetstumbler.1.3.6.1.4.1.14823.2.3.3.1.200.2.1134
This trap indicates that an AP detected a signature match for Netstumbler from an access point.
wlsxSignStaNetstumbler.1.3.6.1.4.1.14823.2.3.3.1.200.2.1135
This trap indicates that an AP detected a signature match for Netstumbler from a Station.
wlsxSignAPAsleap.1.3.6.1.4.1.14823.2.3.3.1.200.2.1136
This trap indicates that an AP detected a signature match for ASLEAP from an access point.
wlsxSignStaAsleap.1.3.6.1.4.1.14823.2.3.3.1.200.2.1137
This trap indicates that an AP detected a signature match for ASLEAP from a Station.
wlsxSignAPAirjack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1138
This trap indicates that an AP detected a signature match for AirJack from an access point.
wlsxSignStaAirjack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1139
This trap indicates that an AP detected a signature match for AirJack from a Station.
wlsxSignAPNullProbeResp.1.3.6.1.4.1.14823.2.3.3.1.200.2.1140
This trap indicates that an AP detected a signature match for Null-Probe-Response from an access point.
wlsxSignStaNullProbeResp.1.3.6.1.4.1.14823.2.3.3.1.200.2.1141
This trap indicates that an AP detected a signature match for Null-Probe-Response from a Station.
wlsxSignAPDeauthBcast.1.3.6.1.4.1.14823.2.3.3.1.200.2.1142
This trap indicates that an AP detected a signature match for Deauth-Broadcast from an access point.
wlsxSignStaDeauthBcast.1.3.6.1.4.1.14823.2.3.3.1.200.2.1143
This trap indicates that an AP detected a signature match for Deauth-Broadcast from a Station.
wlsxWindowsBridgeDetectedAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1144
This trap indicates that an AP is detecting an access point that is bridging from a wireless network
to a wired network.
wlsxWindowsBridgeDetectedSta.1.3.6.1.4.1.14823.2.3.3.1.200.2.1145
This trap indicates that an AP is detecting a station that is bridging from a wireless network
to a wired network.
wlsxAdhocNetworkBridgeDetectedAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1146
This trap indicates that an AM has detected an Ad hoc
network that is bridging to a wired network
wlsxAdhocNetworkBridgeDetectedSta.1.3.6.1.4.1.14823.2.3.3.1.200.2.1147
This trap indicates that an AM has detected an Ad hoc
network that is bridging to a wired network
wlsxDisconnectStationAttackAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1148
This trap indicates that an AM detected a station disconnect 
attack.
wlsxDisconnectStationAttackSta.1.3.6.1.4.1.14823.2.3.3.1.200.2.1149
This trap indicates that an AM detected a station Disconnect 
attack.
wlsxSuspectUnsecureAPDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1150
This trap indicates that an access point, classified as Suspected Rogue, has been
detected by a Controller. The AP is suspected to be rogue, 
with the supplied confidence level, because it was matched to 
the wired MAC address.
wlsxSuspectUnsecureAPResolved.1.3.6.1.4.1.14823.2.3.3.1.200.2.1151
This trap indicates that a previously detected access point, classified Suspected 
Rogue, is either no longer present in the network or
has changed its state.
wlsxHtGreenfieldSupported.1.3.6.1.4.1.14823.2.3.3.1.200.2.1157
This trap indicates that an AP detected an access point that supports HT Greenfield mode.
wlsxHT40MHzIntoleranceAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1158
This trap indicates that an AP is detecting an access point with the HT 40MHz intolerance setting.
wlsxHT40MHzIntoleranceSta.1.3.6.1.4.1.14823.2.3.3.1.200.2.1159
This trap indicates that the system is detecting an HT 40MHz Intolerance setting from a Station.
wlsxNAuthServerAllInService.1.3.6.1.4.1.14823.2.3.3.1.200.2.1160
This trap indicates that all authentication servers is a server group are brought back in service.
wlsxNAdhocNetwork.1.3.6.1.4.1.14823.2.3.3.1.200.2.1161
This trap indicates that an AP detected an ad hoc 
network where a station is connected to an ad hoc access point.
wlsxNAdhocNetworkBridgeDetectedAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1162
This trap indicates that an AP detected an ad hoc
network that is bridging to a wired network.
wlsxNAdhocNetworkBridgeDetectedSta.1.3.6.1.4.1.14823.2.3.3.1.200.2.1163
This trap indicates that an AP detected an ad hoc
network that is bridging to a wired network.
wlsxClientFloodAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1170
This trap indicates that the number of potential fake clients detected by 
an AP has exceeded the configured IDS threshold. This is the total number of fake clients observed across all bands.
wlsxValidClientNotUsingEncryption.1.3.6.1.4.1.14823.2.3.3.1.200.2.1171
This trap indicates that an AP detected an unencrypted data frame between a valid client and an access point.
wlsxAdhocUsingValidSSID.1.3.6.1.4.1.14823.2.3.3.1.200.2.1172
This trap indicates that an AP detected an ad hoc network using a valid/protected SSID.
wlsxAPSpoofingDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1173
This trap indicates that an AP detected that one of its virtual APs is being spoofed using MAC spoofing.
wlsxClientAssociatingOnWrongChannel.1.3.6.1.4.1.14823.2.3.3.1.200.2.1174
This trap indicates that an AP detected a client trying to associate to one of its BSSIDs on the wrong channel.  This can be a sign that the BSSID is 
being spoofed in order to fool the client into thinking the AP is operating on another channel.
wlsxNDisconnectStationAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1175
This trap indicates that an AP has determined that a client is under Disconnect Attack because the rate of Assoc/Reassoc Response packets
received by that client exceeds the configured threshold.
wlsxNStaUnAssociatedFromUnsecureAP.1.3.6.1.4.1.14823.2.3.3.1.200.2.1176
This trap indicates that an AP that had previously detected a client association to a Rogue access point is no longer detecting that association.
wlsxOmertaAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1177
This trap indicates that an AP detected an Omerta attack.
wlsxTKIPReplayAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1178
This trap indicates that an AP detected a TKIP replay attack. If successful this could be the precursor to more
advanced attacks.
wlsxChopChopAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1179
This trap indicates that an AP detected a ChopChop attack.
wlsxFataJackAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1180
This trap indicates that an AP detected a FATA-Jack attack.
wlsxInvalidAddressCombination.1.3.6.1.4.1.14823.2.3.3.1.200.2.1181
This trap indicates that an AP detected an invalid source and destination combination.
wlsxValidClientMisassociation.1.3.6.1.4.1.14823.2.3.3.1.200.2.1182
This trap indicates that an AP detected a misassociation between a valid client and an unsafe AP.
wlsxMalformedHTIEDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1183
This trap indicates that an AP detected a malformed HT Information Element. This can be the result of a misbehaving wireless driver or it may be an indication of a new wireless attack.
wlsxMalformedAssocReqDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1184
This trap indicates that an AP detected a malformed association request with a NULL SSID.
wlsxOverflowIEDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1185
This trap indicates that an AP detected a management frame with a malformed information element. The declared length of the element is larger than the entire frame containing the element. This may be used to corrupt or crash wireless drivers.
wlsxOverflowEAPOLKeyDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1186
This trap indicates that an AP detected a key in an EAPOL Key message with a specified length greater than the length of the entire message.
wlsxMalformedFrameLargeDurationDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1187
This trap indicates that an AP detected an unusually large duration in a wireless frame. This may be an attempt to block other devices from transmitting.
wlsxMalformedFrameWrongChannelDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1188
This trap indicates that an AP detected a beacon on one channel advertising another channel. This could be an attempt to lure clients away from a valid AP.
wlsxMalformedAuthFrame.1.3.6.1.4.1.14823.2.3.3.1.200.2.1189
This trap indicates that an AP detected an authentication frame with
either a bad algorithm (similar to Fata-Jack) or a bad transaction.
wlsxCTSRateAnomaly.1.3.6.1.4.1.14823.2.3.3.1.200.2.1190
This trap indicates that the rate of CTS packets 
received by an AP exceeds the configured IDS threshold.
wlsxRTSRateAnomaly.1.3.6.1.4.1.14823.2.3.3.1.200.2.1191
This trap indicates that the rate of RTS packets 
received by an AP exceeds the configured IDS threshold.
wlsxNRogueAPDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1192
This trap indicates that an unauthorized access point is connected to the wired network. The access point is 
classified as Rogue by the system.
wlsxNRogueAPResolved.1.3.6.1.4.1.14823.2.3.3.1.200.2.1193
This trap indicates that a previously detected access point, classified as Rogue,
is either no longer present in the network or it changed its state.
wlsxNeighborAPDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1194
This trap indicates that an access point has been classified as a Neighbor by the system.
wlsxNInterferingAPDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1195
This trap indicates that an access point has been classified as Interfering by the system. The access point 
is declared Interfering because it is not authorized, nor has it been classified as a Rogue.
wlsxNSuspectRogueAPDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1196
This trap indicates that an access point, classified as Suspected Rogue, is 
detected by the system. The AP is suspected to be rogue 
with the supplied confidence level.
wlsxNSuspectRogueAPResolved.1.3.6.1.4.1.14823.2.3.3.1.200.2.1197
This trap indicates that a previously detected access point, classified as Suspected 
Rogue, is either no longer present in the network or
has changed its state.
wlsxBlockAckAttackDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1198
This trap indicates that an attempt has been made to deny service to
the source address by spoofing a block ACK add request that sets a
sequence number window outside the currently used window.
wlsxHotspotterAttackDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1199
This trap indicates that a new AP has appeared immediately following a client probe request.
This is indicative of the Hotspotter tool or similar that attempts to trap clients with a fake
hotspot or other wireless network.
wlsxNSignatureMatch.1.3.6.1.4.1.14823.2.3.3.1.200.2.1200
This trap indicates that an AP detected a signature match in a frame.
wlsxNSignatureMatchNetstumbler.1.3.6.1.4.1.14823.2.3.3.1.200.2.1201
This trap indicates that an AP detected a signature match for Netstumbler in a frame.
wlsxNSignatureMatchAsleap.1.3.6.1.4.1.14823.2.3.3.1.200.2.1202
This trap indicates that an AP detected a signature match for ASLEAP in a frame.
wlsxNSignatureMatchAirjack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1203
This trap indicates that an AP detected a signature match for Airjack in a frame.
wlsxNSignatureMatchNullProbeResp.1.3.6.1.4.1.14823.2.3.3.1.200.2.1204
This trap indicates that an AP detected a signature match for Null-Probe-Response in a frame.
wlsxNSignatureMatchDeauthBcast.1.3.6.1.4.1.14823.2.3.3.1.200.2.1205
This trap indicates that an AP detected a signature match for Deauth-Broadcast in a frame.
wlsxNSignatureMatchDisassocBcast.1.3.6.1.4.1.14823.2.3.3.1.200.2.1206
This trap indicates that an AP detected a signature match for Disassoc-Broadcast in a frame.
wlsxNSignatureMatchWellenreiter.1.3.6.1.4.1.14823.2.3.3.1.200.2.1207
This trap indicates that an AP detected a signature match for Wellenreiter in a frame.
wlsxAPDeauthContainment.1.3.6.1.4.1.14823.2.3.3.1.200.2.1208
This trap indicates that an AP has attempted to contain an access point by disconnecting its client.
wlsxClientDeauthContainment.1.3.6.1.4.1.14823.2.3.3.1.200.2.1209
This trap indicates that an AP has attempted to contain a client by disconnecting it from the AP that it is associated with.
wlsxAPWiredContainment.1.3.6.1.4.1.14823.2.3.3.1.200.2.1210
This trap indicates that an AP has attempted to contain an access point by disrupting traffic to its client on the wired interface.
wlsxClientWiredContainment.1.3.6.1.4.1.14823.2.3.3.1.200.2.1211
This trap indicates that an AP has attempted to contain a client by disrupting traffic to it on the wired interface.
wlsxAPTaggedWiredContainment.1.3.6.1.4.1.14823.2.3.3.1.200.2.1212
This trap indicates that an AP has attempted to contain an access point by disrupting traffic to its client on the wired interface.
wlsxClientTaggedWiredContainment.1.3.6.1.4.1.14823.2.3.3.1.200.2.1213
This trap indicates that an AP has attempted to contain a client by disrupting traffic to it on the wired interface.
wlsxTarpitContainment.1.3.6.1.4.1.14823.2.3.3.1.200.2.1214
This trap indicates that an AP has attempted to contain an access point by moving a client that is attempting to associate to it to a tarpit.
wlsxAPChannelChange.1.3.6.1.4.1.14823.2.3.3.1.200.2.1216
This trap indicates that an AP changed its channel.
wlsxAPPowerChange.1.3.6.1.4.1.14823.2.3.3.1.200.2.1217
This trap indicates that an AP changed its transmit power level.
wlsxAPModeChange.1.3.6.1.4.1.14823.2.3.3.1.200.2.1218
This trap indicates that an AP changed its mode from AP to APMonitor or vice versa.
wlsxUserEntryAttributesChanged.1.3.6.1.4.1.14823.2.3.3.1.200.2.1219
This trap indicates that the user entry attributes have changed.
wlsxPowerSaveDosAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1220
This trap indicates that an AP detected a Power Save DoS attack.
wlsxNAPMasterStatusChange.1.3.6.1.4.1.14823.2.3.3.1.200.2.1221
This trap indicates that the status of the AP as seen by
the master controller has changed.
**NOTE: this notification is obsoleted and replaced by
wlsxNAPConductorStatusChange
wlsxNAdhocUsingValidSSID.1.3.6.1.4.1.14823.2.3.3.1.200.2.1222
This trap indicates that an AP detected an ad hoc network node using a valid/protected SSID.
wlsxMgmtUserAuthenticationFailed.1.3.6.1.4.1.14823.2.3.3.1.200.2.1224
This trap indicates that a management user authentication has failed.
wlsxAPActiveUplinkChanged.1.3.6.1.4.1.14823.2.3.3.1.200.2.1252
When the active uplink of an AP changes, a notification is
sent to the Management Entity with the new uplink type
wlsxAPManagedModeConfigFailureTrap.1.3.6.1.4.1.14823.2.3.3.1.200.2.1255
Indicated failure in applying config.
wlsxNAuthServerAcctTimedOut.1.3.6.1.4.1.14823.2.3.3.1.200.2.1256
This trap indicates that the authentication server accounting timed out.
wlsxPortalServerDown.1.3.6.1.4.1.14823.2.3.3.1.200.2.1259
This trap indicates that the portal server is down.
wlsxPortalServerUp.1.3.6.1.4.1.14823.2.3.3.1.200.2.1260
This trap indicates that the portal server is up.
wlsxIAPVoiceClientLocationUpdate.1.3.6.1.4.1.14823.2.3.3.1.200.2.1262
The trap represents a IAP voice client location update.
wlsxWPAFTAttack.1.3.6.1.4.1.14823.2.3.3.1.200.2.1267
This trap indicates there is a possible attack of the Fast BSS Transition causing a WPA key re-installation.
This can be indicative of a security breach where an attacker can hijack a client's association and/or
decrypt an otherwise secure connection.
wlsxMitMDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1268
This trap indicates that an AP detected a possible channel-based Man in the Middle attack by someone using spoofed beacons with an invalid Channel Switch Announcement.
wlsxAPLoopDetected.1.3.6.1.4.1.14823.2.3.3.1.200.2.1271
This trap indicates that loop is detected on AP's secure jack port.
wlsxAPBROADCASTSTORM.1.3.6.1.4.1.14823.2.3.3.1.200.2.1272
This trap indicates that broadcast storm is detected on AP's secure jack port.
wlsxCLEARPASSSERVERINVALID.1.3.6.1.4.1.14823.2.3.3.1.200.2.1274
This trap indicates that clearpass server is not valid when using the CA to verity the server for download-role.
wlsxAPUSBPLUGALARM.1.3.6.1.4.1.14823.2.3.3.1.200.2.1277
This trap indicates that an USB device is plugged in or out to an AP.
wlsxClientRejectedByMaxClientCount.1.3.6.1.4.1.14823.2.3.3.1.200.2.1284
This trap indicates the client is rejected by the max client count.
wlsxClientPskAuthenticationFailed.1.3.6.1.4.1.14823.2.3.3.1.200.2.1285
This trap indicates the client PSK Authentication Failed.
wlsxNStationAddedToDenyList.1.3.6.1.4.1.14823.2.3.3.1.200.2.1286
This trap indicates that the station is in deny list.
wlsxNStationRemovedFromDenyList.1.3.6.1.4.1.14823.2.3.3.1.200.2.1287
This trap indicates that the station is removed from the deny list.
wlsxNAPConductorStatusChange.1.3.6.1.4.1.14823.2.3.3.1.200.2.1288
This trap indicates that the status of the AP as seen by
the conductor controller has changed.