ureFailure signifies that the switch hardware
has detected under- or overtemperature condition.
switchPoeVoltageFailure
.1.3.6.1.4.1.266.20.0.10
The switch has detected a PoE over- or undervoltage conditions.
switchPoeOverloadFailure
.1.3.6.1.4.1.266.20.0.11
The switch has detected a overload for the PoE power supply.
portPoeOverloadFailure
.1.3.6.1.4.1.266.20.0.12
The switch has detected a PoE overload condition at the port.
portActiveLoopDetectionFailure
.1.3.6.1.4.1.266.20.0.13
The active loop protection has disabled the port.
switchIndustrialAlarmM1
.1.3.6.1.4.1.266.20.0.14
The alarm state of the industrial alarm output M1 has changed.
switchIndustrialAlarmM2
.1.3.6.1.4.1.266.20.0.15
The alarm state of the industrial alarm output M2 has changed.
switchInternalVoltageFailure
.1.3.6.1.4.1.266.20.0.16
The switch has detected a internal over- or undervoltage conditions.
tftpMessage
.1.3.6.1.4.1.266.20.0.17
ful or failed TFTP transfer has been occured.
This does not include TFTP transfers executed from Nexan Manager.
sfpEvent
.1.3.6.1.4.1.266.20.0.18
has detected one of the following SFP events:
- a SFP module has been inserted
- a SFP module has been removed
- the optical receive power has fallen below the configured threshold
- the optical transmit power has fallen below the configured threshold
- the laser bias current has exceeded the configured threshold
In the case of a threshold event, the trap will only send out every
five minutes.
clientRemoved
.1.3.6.1.4.1.266.20.0.19
on this port has been removed because the link down time
has exceeded the configured 'Link Down Timeout'.
portLinkChange
.1.3.6.1.4.1.266.20.0.2
s sent whenever the link state of a port changes
from link-up to link-down or from link-down to link-up
internalMgmtWarning
.1.3.6.1.4.1.266.20.0.20
l management warning has been detected. Please consult
Nexans for further informations regarding the reported warning code.
switchFunctionInputAlarm
.1.3.6.1.4.1.266.20.0.21
The state of a function input 1...4 has changed.
switchConfigurationChanged
.1.3.6.1.4.1.266.20.0.22
The configuration of the switch has been changed.
portErrorDisabled
.1.3.6.1.4.1.266.20.0.23
The port has been error disabled.
portStateChanged
.1.3.6.1.4.1.266.20.0.24
The port state has been changed from blocking to forwarding or vice versa.
portNewMacAddress
.1.3.6.1.4.1.266.20.0.3
ce MAC address has been detected on a switch port. This trap is only
send for ports which have port-security enabled with the setting
autoAllowOneMacAddr, autoAllowTwoMacAddr or autoAllowThreeMacAddr.
portSecurityFailure
.1.3.6.1.4.1.266.20.0.4
rized source MAC address has accessed a port which has port-security
enabled.
portErrorCountFailure
.1.3.6.1.4.1.266.20.0.5
rror counter has incremented by 2 or more within a timewindow of
two seconds. An counter increment by 1 ist not reported because single increments
often may result because of link-changes.
switchMgmtAuthFailure
.1.3.6.1.4.1.266.20.0.6
has tried to access the switch management with a wrong
authentication. This includes wrong user/password for telnet, wrong
community for SNMP read/write and wrong accessrights in the accesslist.
radiusMgmtAuthReject
.1.3.6.1.4.1.266.20.0.7
has tried to access the switch management with radius
authentication enabled and the radius server has rejected the request.
radiusPortSecurityReject
.1.3.6.1.4.1.266.20.0.8
has tried to access the switch with radius port security
authentication enabled and the radius server has rejected the request.
portLoopBcastFailure
.1.3.6.1.4.1.266.20.0.9
roadcast/multicast counter has incremented by 25 packets/second for
more then 10 successive seconds. Excessive multicast or broadcast packets may
result in case of a loop between two port of the switch.