This trap is caused by the detection of a
duplicate IP address. It means that there are
2 or more stations using the same IP address.
The first parameter is the IP Address which
is duplicated. The next three parameters are
the MAC address, VLAN ID, Group number and port
number of the switch from where the original
IP-MAC Address binding was detected. The
remaining three parameters are the MAC address,
VLAN ID, Group number and Port number of the
switch from where the spoofed IP-MAC Address
binding was detected.
eSWEnhStationMove
.1.3.6.1.4.1.298.0.11
The trap is caused by the detection of station
movement. The first two parameters are the IP
Address and MAC Address of the station which
was moved across the switch ports. The next
parameter is the VLAN ID to which eSWMonMAC MAC
Address has been classified.The next two
parameters are the Group number and Port number
within the switch where the station was originally
(first) detected. The next two parameters are
the Group number and Port number within the
switch where the station was moved.
eSWEnhNewNodeDetected
.1.3.6.1.4.1.298.0.12
The trap is generated when any port which is set
for New Node Detection Security level detects
any New Node. The two parameters are the Group
number and Port number. The next three parameters
are the MAC Address ,VLAN ID (to which eSWMonMAC MAC
Address has been classifiedand) and IP Address of the
newly detected node.
eSWEnhIntruderDetected
.1.3.6.1.4.1.298.0.13
The trap is generated when any secured port
detects Intruder node. For the secured port
Intruder nodes are the nodes whose MAC Address
is not part of port trusted MAC Address set.
The first two parameters are the Group number
and Port number. The next three parameters are the
MAC Address ,VLAN ID (to which eSWMonMAC MAC
Address has been classifiedand) and IP Address of
the Intruder Node.
eSWEnhIntruderPortDisable
.1.3.6.1.4.1.298.0.14
The trap is generated when any port which is
set for Intruder Port Disable security level
detects Intruder MAC Address and disables the
secured Port. For the secured port Intruder
nodes are the nodes whose MAC Address is not
part of port trusted MAC Address set. The first
two parameters are the Group number and Port
number. The next three parameters are the MAC
Address ,VLAN ID (to which eSWMonMAC MAC Address
has been classifiedand) and IP Address of the
Intruder Node which caused the port to be disabled.
eSWFanFail
.1.3.6.1.4.1.298.0.3
The SNMP trap that is generated when a fan in
the switch fails.
eSWExpPortConnectStateChange
.1.3.6.1.4.1.298.0.4
This trap will be sent when an MII module is
inserted or removed from the MII slot The trap
contains the port number of the MII slot whose
state has changed.
eSWIPSpoofing
.1.3.6.1.4.1.298.0.5
This trap is caused by the detection of a
duplicate IP address. It means that there are 2
or more stations using the same IP address. The
first three parameters are the IP address,
MAC address, and port number of the existing
workstation. The remaining three parameters are
the IP address, MAC address, and port number of
to the workstation which is trying to spoof the
network environment. Therefore, the IP addresses
should be the same, but the MAC addresses are
different.
eSWStationMove
.1.3.6.1.4.1.298.0.6
The trap is caused by the detection of station
moving.
eSWNewNodeDetected
.1.3.6.1.4.1.298.0.7
The trap is generated when any port which is set
for New Node Detection Security levels detects
any New Node.
eSWIntruderDetected
.1.3.6.1.4.1.298.0.8
The trap is generated when any port which is
set for security levels
1) Known MAC Address Forwarding
2) Known MAC Address Forwarding with Intruder
Lock detects any Intruder MAC Address.
eSWIntruderPortDisable
.1.3.6.1.4.1.298.0.9
The trap is generated when any port which is
set for security levels restricted Known MAC
Address Forwarding detects Intruder MAC Address
and disables the Port.