RBTWS-TRAP-MIB

        Notifications emitted by Enterasys Networks wireless switches.
        
AP = Access Point;
AC = Access Controller (wireless switch),
     the device that runs a SNMP Agent implementing this MIB.
        
Copyright 2008 Enterasys Networks, Inc.
All rights reserved.
This SNMP Management Information Base
Specification (Specification) embodies
confidential and proprietary intellectual property.
        
This Specification is supplied 'AS IS' and Enterasys Networks
makes no warranty, either express or implied, as to the use,
operation, condition, or performance of the Specification.
    

Imported Objects

RbtwsApFingerprint, RbtwsRadioMimoState, RbtwsRadioChannelWidth, RbtwsApWasOperational, RbtwsApServiceAvailability, RbtwsApConnectSecurityType, RbtwsRadioConfigState, RbtwsApPortOrDapNum, RbtwsApFailDetail, RbtwsApTransition, RbtwsChannelChangeType, RbtwsRadioPowerChangeType, RbtwsPowerLevel, RbtwsRadioNum, RbtwsAccessType, RbtwsApSerialNum, RbtwsApNum, RbtwsRadioMode, RbtwsRadioType, RbtwsApAttachType, RbtwsCryptoTypeRBTWS-AP-TC
RbtwsClientSessionState, RbtwsClientAuthenProtocolType, RbtwsClientDot1xState, RbtwsUserAccessType, RbtwsClientAccessModeRBTWS-CLIENT-SESSION-TC
RbtwsRFDetectClassificationReasonRBTWS-RF-DETECT-TC
rbtwsMibs, rbtwsTraps, rbtwsTemporaryRBTWS-ROOT-MIB
Counter32, TimeTicks, Unsigned32, IpAddress, NOTIFICATION-TYPE, OBJECT-TYPE, MODULE-IDENTITYSNMPv2-SMI
TEXTUAL-CONVENTION, MacAddress, DisplayStringSNMPv2-TC

Type Definitions (16)

Name Base Type Values/Constraints
RbtwsApMgrChangeReasonother(1), failover(2), load-balancing(3)
RbtwsAssociationFailureTypeother(1), load-balance(2), quiet-period(3), dot1x(4), no-prev-assoc(5), glare(6), cipher-rejected(7), cipher-mismatch(8), wep-not-configured(9), bad-assoc-request(10), out-of-memory(11), tkip-cm-active(12), roam-in-progress(13)
RbtwsAuthenticationFailureTypeother(1), user-glob-mismatch(2), user-does-not-exist(3), invalid-password(4), server-timeout(5), signature-failed(6), local-certificate-error(7), all-servers-down(8), authentication-type-mismatch(9), server-rejected(10), fallthru-auth-misconfig(11), no-lastresort-auth(12), exceeded-max-attempts(13), password-expired(14)
RbtwsAuthorizationFailureTypeother(1), user-param(2), location-policy(3), vlan-tunnel-failure(4), ssid-mismatch(5), acl-mismatch(6), timeofday-mismatch(7), crypto-type-mismatch(8), mobility-profile-mismatch(9), start-date-mismatch(10), end-date-mismatch(11), svr-type-mismatch(12), ssid-defaults(13), qos-profile-mismatch(14), simultaneous-logins(15)
RbtwsBlacklistingCausebl-configured(1), bl-associate-pkt-flood(2), bl-re-associate-pkt-flood(3), bl-de-associate-pkt-flood(4)
RbtwsClientAuthorizationReasonother(1), new-client(2), re-auth(3), roam(4)
RbtwsClientClearedReasonother(1), normal(2), backup-failure(3)
RbtwsClientIpAddrChangeReasonclient-connected(1), other(2), dhcp-to-static(3)
RbtwsClusterFailureReasonother(1), validation-error(2)
RbtwsConfigSaveInitiatorTypeother(1), cli-console(2), cli-remote(3), https(4), snmp-set(5)
RbtwsDot1xFailureTypeother(1), quiet-period(2), administrative-kill(3), bad-rsnie(4), timeout(5), max-sessions-exceeded(6), fourway-hs-failure(7), user-glob-mismatch(8), bonded-auth-failure(9), reauth-disabled(10), gkhs-failure(11), force-unauth-configured(12), cert-not-installed(13)
RbtwsMichaelMICFailureCausedetected-by-ap(1), detected-by-client(2)
RbtwsMobilityDomainResiliencyStatusother(1), resilient(2), degraded(3)
RbtwsRFDetectDoSTypeprobe-flood(1), auth-flood(2), null-data-flood(3), mgmt-6-flood(4), mgmt-7-flood(5), mgmt-d-flood(6), mgmt-e-flood(7), mgmt-f-flood(8), fakeap-ssid(9), fakeap-bssid(10), bcast-deauth(11), null-probe-resp(12), disassoc-spoof(13), deauth-spoof(14), decrypt-err(15), weak-wep-iv(16), wireless-bridge(17), netstumbler(18), wellenreiter(19), adhoc-client-frame(20), associate-pkt-flood(21), re-associate-pkt-flood(22), de-associate-pkt-flood(23), bssid-spoof(24)
RbtwsSessionDisconnectTypeother(1), admin-disconnect(2), dyn-auth-disconnect(3)
RbtwsUserAttributeListrange: 0..2048

Objects

rbtwsDeviceId .1.3.6.1.4.1.52.4.15.1.2.1
rbtwsUserName .1.3.6.1.4.1.52.4.15.1.2.10
rbtwsRadioMimoState
.1.3.6.1.4.1.52.4.15.1.2.100
rbtwsClientRadioType
.1.3.6.1.4.1.52.4.15.1.2.101
rbtwsRFDetectXmtrRadioType
.1.3.6.1.4.1.52.4.15.1.2.102
rbtwsRFDetectXmtrCryptoType
.1.3.6.1.4.1.52.4.15.1.2.103
rbtwsClusterFailureReason .1.3.6.1.4.1.52.4.15.1.2.104
rbtwsClusterFailureDescription .1.3.6.1.4.1.52.4.15.1.2.105
rbtwsClientAuthServerIp
.1.3.6.1.4.1.52.4.15.1.2.11
rbtwsClientSessionState
.1.3.6.1.4.1.52.4.15.1.2.12
rbtwsDAPNum .1.3.6.1.4.1.52.4.15.1.2.13
rbtwsClientIp
.1.3.6.1.4.1.52.4.15.1.2.14
rbtwsClientSessionId .1.3.6.1.4.1.52.4.15.1.2.15
rbtwsClientAuthenProtocolType
.1.3.6.1.4.1.52.4.15.1.2.16
rbtwsClientVLANName .1.3.6.1.4.1.52.4.15.1.2.17
rbtwsClientSessionStartTime
.1.3.6.1.4.1.52.4.15.1.2.18
rbtwsClientFailureCause .1.3.6.1.4.1.52.4.15.1.2.19
rbtwsMobilityDomainIp
.1.3.6.1.4.1.52.4.15.1.2.2
rbtwsClientRoamedFromPortNum .1.3.6.1.4.1.52.4.15.1.2.20
rbtwsClientRoamedFromRadioNum
.1.3.6.1.4.1.52.4.15.1.2.21
rbtwsClientRoamedFromDAPNum .1.3.6.1.4.1.52.4.15.1.2.22
rbtwsUserParams .1.3.6.1.4.1.52.4.15.1.2.23
rbtwsClientLocationPolicyIndex .1.3.6.1.4.1.52.4.15.1.2.24
rbtwsClientAssociationFailureCause .1.3.6.1.4.1.52.4.15.1.2.25
rbtwsClientAuthenticationFailureCause .1.3.6.1.4.1.52.4.15.1.2.26
rbtwsClientAuthorizationFailureCause .1.3.6.1.4.1.52.4.15.1.2.27
rbtwsClientFailureCauseDescription .1.3.6.1.4.1.52.4.15.1.2.28
rbtwsClientRoamedFromWsIp
.1.3.6.1.4.1.52.4.15.1.2.29
rbtwsAPMACAddress
.1.3.6.1.4.1.52.4.15.1.2.3
rbtwsClientRoamedFromAccessType
.1.3.6.1.4.1.52.4.15.1.2.30
rbtwsClientAccessType
.1.3.6.1.4.1.52.4.15.1.2.31
rbtwsRadioMACAddress
.1.3.6.1.4.1.52.4.15.1.2.32
rbtwsRadioPowerChangeReason
.1.3.6.1.4.1.52.4.15.1.2.33
rbtwsNewChannelNum .1.3.6.1.4.1.52.4.15.1.2.34
rbtwsOldChannelNum .1.3.6.1.4.1.52.4.15.1.2.35
rbtwsChannelChangeReason
.1.3.6.1.4.1.52.4.15.1.2.36
rbtwsRFDetectListenerListInfo .1.3.6.1.4.1.52.4.15.1.2.37
rbtwsRadioSSID .1.3.6.1.4.1.52.4.15.1.2.38
rbtwsNewPowerLevel
.1.3.6.1.4.1.52.4.15.1.2.39
rbtwsClientMACAddress
.1.3.6.1.4.1.52.4.15.1.2.4
rbtwsOldPowerLevel
.1.3.6.1.4.1.52.4.15.1.2.40
rbtwsRadioPowerChangeDescription .1.3.6.1.4.1.52.4.15.1.2.41
rbtwsCounterMeasurePerformerListInfo .1.3.6.1.4.1.52.4.15.1.2.42
rbtwsClientDot1xState
.1.3.6.1.4.1.52.4.15.1.2.43
rbtwsClientDot1xFailureCause .1.3.6.1.4.1.52.4.15.1.2.44
rbtwsAPAccessType
.1.3.6.1.4.1.52.4.15.1.2.45
rbtwsUserAccessType
.1.3.6.1.4.1.52.4.15.1.2.46
rbtwsClientSessionElapsedTime
.1.3.6.1.4.1.52.4.15.1.2.47
rbtwsLocalId .1.3.6.1.4.1.52.4.15.1.2.48
rbtwsRFDetectDoSType .1.3.6.1.4.1.52.4.15.1.2.49
rbtwsRFDetectXmtrMacAddr
.1.3.6.1.4.1.52.4.15.1.2.5
rbtwsSourceWsIp
.1.3.6.1.4.1.52.4.15.1.2.50
rbtwsClientVLANid .1.3.6.1.4.1.52.4.15.1.2.51
rbtwsClientVLANtag .1.3.6.1.4.1.52.4.15.1.2.52
rbtwsDeviceModel
.1.3.6.1.4.1.52.4.15.1.2.53
rbtwsDeviceSerNum
.1.3.6.1.4.1.52.4.15.1.2.54
rbtwsRsaPubKeyFingerPrint
.1.3.6.1.4.1.52.4.15.1.2.55
rbtwsDAPconnectWarningType .1.3.6.1.4.1.52.4.15.1.2.56
rbtwsClientMACAddress2
.1.3.6.1.4.1.52.4.15.1.2.57
rbtwsApAttachType
.1.3.6.1.4.1.52.4.15.1.2.58
rbtwsApPortOrDapNum
.1.3.6.1.4.1.52.4.15.1.2.59
rbtwsPortNum .1.3.6.1.4.1.52.4.15.1.2.6
rbtwsApName
.1.3.6.1.4.1.52.4.15.1.2.60
rbtwsApTransition
.1.3.6.1.4.1.52.4.15.1.2.61
rbtwsApFailDetail
.1.3.6.1.4.1.52.4.15.1.2.62
rbtwsRadioType
.1.3.6.1.4.1.52.4.15.1.2.63
rbtwsRadioConfigState
.1.3.6.1.4.1.52.4.15.1.2.64
rbtwsApConnectSecurityType
.1.3.6.1.4.1.52.4.15.1.2.65
rbtwsApServiceAvailability
.1.3.6.1.4.1.52.4.15.1.2.66
rbtwsApWasOperational
.1.3.6.1.4.1.52.4.15.1.2.67
rbtwsClientTimeSinceLastRoam .1.3.6.1.4.1.52.4.15.1.2.68
rbtwsClientIpAddrChangeReason .1.3.6.1.4.1.52.4.15.1.2.69
rbtwsAPRadioNum
.1.3.6.1.4.1.52.4.15.1.2.7
rbtwsRFDetectRogueAPMacAddr
.1.3.6.1.4.1.52.4.15.1.2.70
rbtwsBlacklistingRemainingTime .1.3.6.1.4.1.52.4.15.1.2.71
rbtwsBlacklistingCause .1.3.6.1.4.1.52.4.15.1.2.72
rbtwsNumLicensedActiveAPs .1.3.6.1.4.1.52.4.15.1.2.73
rbtwsClientDynAuthorClientIp
.1.3.6.1.4.1.52.4.15.1.2.74
rbtwsChangedUserParamOldValues .1.3.6.1.4.1.52.4.15.1.2.75
rbtwsChangedUserParamNewValues .1.3.6.1.4.1.52.4.15.1.2.76
rbtwsClientDisconnectSource .1.3.6.1.4.1.52.4.15.1.2.77
rbtwsClientDisconnectDescription .1.3.6.1.4.1.52.4.15.1.2.78
rbtwsMobilityDomainSecondarySeedIp
.1.3.6.1.4.1.52.4.15.1.2.79
rbtwsRadioRssi .1.3.6.1.4.1.52.4.15.1.2.8
rbtwsMobilityDomainPrimarySeedIp
.1.3.6.1.4.1.52.4.15.1.2.80
rbtwsRFDetectClassificationReason
.1.3.6.1.4.1.52.4.15.1.2.81
rbtwsConfigSaveFileName .1.3.6.1.4.1.52.4.15.1.2.82
rbtwsConfigSaveInitiatorType .1.3.6.1.4.1.52.4.15.1.2.83
rbtwsConfigSaveInitiatorIp
.1.3.6.1.4.1.52.4.15.1.2.84
rbtwsConfigSaveInitiatorDetails .1.3.6.1.4.1.52.4.15.1.2.85
rbtwsConfigSaveGeneration
.1.3.6.1.4.1.52.4.15.1.2.86
rbtwsApNum
.1.3.6.1.4.1.52.4.15.1.2.87
rbtwsRadioMode
.1.3.6.1.4.1.52.4.15.1.2.88
rbtwsMichaelMICFailureCause .1.3.6.1.4.1.52.4.15.1.2.89
rbtwsRadioBSSID .1.3.6.1.4.1.52.4.15.1.2.9
rbtwsClientAccessMode
.1.3.6.1.4.1.52.4.15.1.2.90
rbtwsClientAuthorizationReason .1.3.6.1.4.1.52.4.15.1.2.91
rbtwsPhysPortNum .1.3.6.1.4.1.52.4.15.1.2.92
rbtwsApMgrOldIp
.1.3.6.1.4.1.52.4.15.1.2.93
rbtwsApMgrNewIp
.1.3.6.1.4.1.52.4.15.1.2.94
rbtwsApMgrChangeReason .1.3.6.1.4.1.52.4.15.1.2.95
rbtwsClientClearedReason .1.3.6.1.4.1.52.4.15.1.2.96
rbtwsMobilityDomainResiliencyStatus .1.3.6.1.4.1.52.4.15.1.2.97
rbtwsClientSessionElapsedSeconds .1.3.6.1.4.1.52.4.15.1.2.98
rbtwsRadioChannelWidth
.1.3.6.1.4.1.52.4.15.1.2.99
rbtwsTrapMib .1.3.6.1.4.1.52.4.15.1.4.1
rbtwsTrapsV2 .1.3.6.1.4.1.52.4.15.1.5.0

Notifications/Traps

NameOIDDescription
rbtwsDeviceFailTrap

.1.3.6.1.4.1.52.4.15.1.5.0.1
The device has a failure indication
rbtwsRFDetectAdhocUserTrap


.1.3.6.1.4.1.52.4.15.1.5.0.10
This trap is sent when RF detection sweep finds a ad-hoc user.
rbtwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectRogueDisappearTrap

.1.3.6.1.4.1.52.4.15.1.5.0.11
This trap is sent when a rogue has disappeared.
Obsoleted by rbtwsRFDetectRogueDeviceDisappearTrap.
rbtwsClientAuthenticationFailureTrap












.1.3.6.1.4.1.52.4.15.1.5.0.12
This trap is sent if a client authentication fails.
rbtwsClientAuthorizationFailureTrap














.1.3.6.1.4.1.52.4.15.1.5.0.13
This trap is sent if a client authorization fails.
rbtwsClientAssociationFailureTrap








.1.3.6.1.4.1.52.4.15.1.5.0.14
This trap is sent if a client association fails.
rbtwsClientAuthorizationSuccessTrap















.1.3.6.1.4.1.52.4.15.1.5.0.15
This trap is sent when a client authorizes.
Obsoleted by rbtwsClientAuthorizationSuccessTrap4.
rbtwsClientDeAssociationTrap












.1.3.6.1.4.1.52.4.15.1.5.0.16
This trap is sent if a client de-association occurred.
rbtwsClientRoamingTrap















.1.3.6.1.4.1.52.4.15.1.5.0.17
This trap is sent if a client roams from one location to another.
rbtwsAutoTuneRadioPowerChangeTrap





.1.3.6.1.4.1.52.4.15.1.5.0.18
This trap is sent if a radio's power level has changed based
on auto-tune.
rbtwsAutoTuneRadioChannelChangeTrap




.1.3.6.1.4.1.52.4.15.1.5.0.19
This trap is sent if a radio's channel has changed based on auto-tune.
rbtwsDeviceOkayTrap

.1.3.6.1.4.1.52.4.15.1.5.0.2
The device has recovered
rbtwsCounterMeasureStartTrap


.1.3.6.1.4.1.52.4.15.1.5.0.20
This trap is sent when counter measures are started against a rogue.
rbtwsRFDetectXmtrMacAddr is the mac address of the rogue we
are doing counter measures against.
rbtwsRadioMACAddress identifies the radio performing the countermeasures.
rbtwsCounterMeasureStopTrap


.1.3.6.1.4.1.52.4.15.1.5.0.21
This trap is sent when counter measures are stopped against a rogue.
rbtwsRFDetectXmtrMacAddr is the mac address of the rogue we
were doing counter measures against.
rbtwsRadioMACAddress identifies the radio performing the countermeasures.
rbtwsClientDot1xFailureTrap











.1.3.6.1.4.1.52.4.15.1.5.0.22
This trap is sent if a client failed 802.1X.
rbtwsClientClearedTrap











.1.3.6.1.4.1.52.4.15.1.5.0.23
This trap is sent when a client session is cleared.
Obsoleted by rbtwsClientClearedTrap2.
rbtwsClientAuthorizationSuccessTrap2
















.1.3.6.1.4.1.52.4.15.1.5.0.24
This trap is sent when a client authorizes.
Obsoleted by rbtwsClientAuthorizationSuccessTrap4.
rbtwsRFDetectSpoofedMacAPTrap


.1.3.6.1.4.1.52.4.15.1.5.0.25
This trap is sent when RF detection finds an AP using
the MAC of the listener.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectDoSTrap and rbtwsRFDetectRogueDeviceTrap2.
One of the two traps will be sent depending on the type of
AP MAC spoofing detected.
rbtwsRFDetectSpoofedSsidAPTrap


.1.3.6.1.4.1.52.4.15.1.5.0.26
This trap is sent when RF detection finds an AP using
the SSID of the listener, and the AP is not in the
mobility domain.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2
         and rbtwsRFDetectSuspectDeviceTrap2.
One of the two traps will be sent,
depending on RF detection classification rules.
rbtwsRFDetectDoSTrap



.1.3.6.1.4.1.52.4.15.1.5.0.27
This trap is sent when RF detection finds a denial
of service (DoS) occurring.
rbtwsRFDetectDoSType specifies the type of DoS.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectClientViaRogueWiredAPTrap






.1.3.6.1.4.1.52.4.15.1.5.0.28
This trap is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
rbtwsSourceWsIp is the IP address of the AC (switch) with the wired port.
rbtwsPortNum is the port on the AC.
rbtwsClientVLANid is the VLAN ID of the client's traffic.
rbtwsClientVLANtag is the VLAN tag of the client's traffic.
rbtwsRFDetectXmtrMacAddr is the MAC address of the client.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectClientViaRogueWiredAPTrap3.
rbtwsRFDetectInterferingRogueAPTrap


.1.3.6.1.4.1.52.4.15.1.5.0.29
This trap is sent when RF detection finds an interfering
rogue AP.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectSuspectDeviceTrap2.
rbtwsPoEFailTrap

.1.3.6.1.4.1.52.4.15.1.5.0.3
PoE has failed on the indicated port
rbtwsRFDetectInterferingRogueDisappearTrap

.1.3.6.1.4.1.52.4.15.1.5.0.30
This trap is sent when an interfering rogue has disappeared.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
Obsoleted by rbtwsRFDetectSuspectDeviceDisappearTrap.
rbtwsRFDetectUnAuthorizedSsidTrap


.1.3.6.1.4.1.52.4.15.1.5.0.31
This trap is sent when RF detection finds use of
an unauthorized SSID.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2
         and rbtwsRFDetectSuspectDeviceTrap2.
One of the two traps will be sent if the device having an
unauthorized SSID is classified as rogue or suspect because of this.
rbtwsRFDetectUnAuthorizedOuiTrap


.1.3.6.1.4.1.52.4.15.1.5.0.32
This trap is sent when RF detection finds use of
an unauthorized OUI.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2
         and rbtwsRFDetectSuspectDeviceTrap2.
One of the two traps will be sent if the device having an
unauthorized OUI is classified as rogue or suspect because of this.
rbtwsRFDetectUnAuthorizedAPTrap


.1.3.6.1.4.1.52.4.15.1.5.0.33
This trap is sent when RF detection finds operation
of an unauthorized AP.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2.
rbtwsDAPConnectWarningTrap




.1.3.6.1.4.1.52.4.15.1.5.0.34
A DAP, tried to connect to the AC.
rbtwsDeviceModel provides the model of the DAP.
rbtwsDeviceSerNum provides the serial number of the DAP.
rbtwsRsaPubKeyFingerPrint provides the computed
    fingerprint of the DAP.
rbtwsDAPconnectWarningType provides the type
    of connect warning.
          
Replaced by rbtwsApNonOperStatusTrap2,
with rbtwsApTransition = 'connectFail'.
rbtwsRFDetectDoSPortTrap





.1.3.6.1.4.1.52.4.15.1.5.0.35
This trap is sent when RF detection finds a denial
of service (DoS) occurring. This has port and
AP info instead of 'Listener info'.
rbtwsRFDetectDoSType specifies the type of DoS.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsClientAccessType specifies whether wired, AP, or DAP.
rbtwsPortNum (for wired or AP), the port that is used.
rbtwsDAPNum (for a DAP), the ID of the DAP.
rbtwsMpMichaelMICFailure2




.1.3.6.1.4.1.52.4.15.1.5.0.36
Two Michael MIC failures were seen within 60 seconds of
each other. Object rbtwsClientMACAddress is the source
of the first failure, and object rbtwsClientMACAddress2
source of the second failure.
          
Obsoleted by rbtwsMichaelMICFailure.
rbtwsApNonOperStatusTrap








.1.3.6.1.4.1.52.4.15.1.5.0.37
This trap is sent when the AP changes state
and the new one is a non-operational state.
Obsoleted by rbtwsApNonOperStatusTrap2.
rbtwsApOperRadioStatusTrap










.1.3.6.1.4.1.52.4.15.1.5.0.38
This trap is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoleted by rbtwsApOperRadioStatusTrap3.
rbtwsClientIpAddrChangeTrap
















.1.3.6.1.4.1.52.4.15.1.5.0.39
This trap is sent when a client's IP address
changes. The most likely case for this is when
the client first connects to the network.
rbtwsApTimeoutTrap




.1.3.6.1.4.1.52.4.15.1.5.0.4
The AP entering the AC at port rbtwsPortNum with MAC
rbtwsRadioMacAddress and of the access type (ap or dap)
has not responded.
          
Replaced by rbtwsApNonOperStatusTrap2,
with rbtwsApTransition = 'timeout'.
rbtwsClientAssociationSuccessTrap






.1.3.6.1.4.1.52.4.15.1.5.0.40
This trap is sent if a client association succeeds.
WARNING: DO NOT enable it in normal use.
It may impair switch performance!
Only recommended for debugging network issues.
rbtwsClientAuthenticationSuccessTrap






.1.3.6.1.4.1.52.4.15.1.5.0.41
This trap is sent if a client authentication succeeds.
rbtwsClientDeAuthenticationTrap












.1.3.6.1.4.1.52.4.15.1.5.0.42
This trap is sent if a client de-authentication occured.
rbtwsRFDetectBlacklistedTrap






.1.3.6.1.4.1.52.4.15.1.5.0.43
This trap is sent if an association, re-association or de-association
request (packet) is detected from a blacklisted transmitter 
(identified by MAC: 'rbtwsRFDetectXmtrMacAddr').
If 'rbtwsBlacklistingCause' is 'configured',
then 'rbtwsBlacklistingRemainingTime' will be zero, meaning indefinite
time (depending on administrative actions on the Black List).
Otherwise, 'rbtwsBlacklistingRemainingTime' will indicate the time
in seconds until this transmitter's requests could be allowed.
rbtwsRFDetectClientViaRogueWiredAPTrap2







.1.3.6.1.4.1.52.4.15.1.5.0.44
This trap is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
rbtwsSourceWsIp is the IP address of the AC (switch)
with the wired port.
rbtwsPortNum is the port on the AC.
rbtwsClientVLANid is the VLAN ID of the client's traffic.
rbtwsClientVLANtag is the VLAN tag of the client's traffic.
rbtwsRFDetectXmtrMacAddr is the MAC address of the client.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired)
the client is connected to.
Obsoleted by rbtwsRFDetectClientViaRogueWiredAPTrap3.
rbtwsRFDetectAdhocUserDisappearTrap

.1.3.6.1.4.1.52.4.15.1.5.0.45
This trap is sent when RF detection sweep finds that
an ad-hoc user disappeared.
rbtwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user.
rbtwsApRejectLicenseExceededTrap

.1.3.6.1.4.1.52.4.15.1.5.0.46
This trap is sent when an AC (wireless switch) receives a packet
from an inactive AP and attaching that AP would make the AC
exceed the maximum (licensed) number of active APs.
rbtwsClientDynAuthorChangeSuccessTrap
















.1.3.6.1.4.1.52.4.15.1.5.0.47
This trap is sent when the authorization attributes for a user
are dynamically changed by an authorized dynamic authorization
client.
rbtwsClientDynAuthorChangeFailureTrap













.1.3.6.1.4.1.52.4.15.1.5.0.48
This trap is sent if a change of authorization request sent by
an authorized dynamic authorization client is unsuccessful.
rbtwsClientDisconnectTrap












.1.3.6.1.4.1.52.4.15.1.5.0.49
This trap is sent when a client session is terminated administratively.
rbtwsAPBootTrap




.1.3.6.1.4.1.52.4.15.1.5.0.5
The AP entering the AC at port rbtwsPortNum with MAC
rbtwsRadioMacAddress and of the access type (ap or dap) has booted.
          
Replaced by rbtwsApNonOperStatusTrap2,
with rbtwsApTransition = 'bootSuccess'.
rbtwsMobilityDomainFailOverTrap

.1.3.6.1.4.1.52.4.15.1.5.0.50
This trap is sent when the Mobility Domain fails over
to the secondary seed.
rbtwsMobilityDomainFailBackTrap

.1.3.6.1.4.1.52.4.15.1.5.0.51
This trap is sent when the Mobility Domain fails back
to the primary seed.
rbtwsRFDetectRogueDeviceTrap



.1.3.6.1.4.1.52.4.15.1.5.0.52
This trap is sent when RF detection finds a rogue device.
XmtrMacAddr is the radio MAC address from the beacon.
ListenerListInfo is a display string of a list of
listener information.
ClassificationReason indicates the reason why the device
is classified as rogue.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2.
rbtwsRFDetectRogueDeviceDisappearTrap

.1.3.6.1.4.1.52.4.15.1.5.0.53
This trap is sent when a rogue device has disappeared.
This trap obsoletes the rbtwsRFDetectRogueDisappearTrap.
rbtwsRFDetectSuspectDeviceTrap



.1.3.6.1.4.1.52.4.15.1.5.0.54
This trap is sent when RF detection finds a suspect device.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
ClassificationReason indicates the reason why the device
is classified as suspect.
Obsoleted by rbtwsRFDetectSuspectDeviceTrap2.
rbtwsRFDetectSuspectDeviceDisappearTrap

.1.3.6.1.4.1.52.4.15.1.5.0.55
This trap is sent when a suspect device has disappeared.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
This trap obsoletes the rbtwsRFDetectInterferingRogueDisappearTrap.
rbtwsRFDetectClientViaRogueWiredAPTrap3








.1.3.6.1.4.1.52.4.15.1.5.0.56
This trap is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
rbtwsSourceWsIp is the IP address of the AC (switch)
with the wired port.
rbtwsPortNum is the port on the AC.
rbtwsClientVLANid is the VLAN ID of the client's traffic.
rbtwsClientVLANtag is the VLAN tag of the client's traffic.
rbtwsRFDetectXmtrMacAddr is the MAC address of the client.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired)
the client is connected to.
ClassificationReason indicates the reason why the AP
is classified as rogue.
This trap obsoletes the rbtwsRFDetectClientViaRogueWiredAPTrap and
rbtwsRFDetectClientViaRogueWiredAPTrap2.
rbtwsRFDetectClassificationChangeTrap.1.3.6.1.4.1.52.4.15.1.5.0.57
This trap is sent when RF detection classification rules change.
rbtwsConfigurationSavedTrap





.1.3.6.1.4.1.52.4.15.1.5.0.58
This trap is sent when the running configuration of the switch
is written to a configuration file.
rbtwsApNonOperStatusTrap2







.1.3.6.1.4.1.52.4.15.1.5.0.59
This trap is sent when the AP changes state
and the new one is a non-operational state.
Obsoletes rbtwsApNonOperStatusTrap.
rbtwsMobilityDomainJoinTrap

.1.3.6.1.4.1.52.4.15.1.5.0.6
The mobility domain member has received an UP notice from the
remote address.
rbtwsApOperRadioStatusTrap2










.1.3.6.1.4.1.52.4.15.1.5.0.60
This trap is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoleted by rbtwsApOperRadioStatusTrap3.
rbtwsMichaelMICFailure






.1.3.6.1.4.1.52.4.15.1.5.0.61
Two Michael MIC failures were seen within 60 seconds of each other.
Object rbtwsClientMACAddress indicates
the source of the first failure,
and object rbtwsClientMACAddress2 indicates
the source of the second failure.
          
Service is interrupted for 60 seconds on the radio
due to TKIP countermeasures having commenced.
          
The radio is identified by rbtwsApNum and rbtwsAPRadioNum.
An alternative way to identify the radio is rbtwsRadioMACAddress.
          
Obsoletes rbtwsMpMichaelMICFailure and rbtwsMpMichaelMICFailure2.
rbtwsClientAuthorizationSuccessTrap3
















.1.3.6.1.4.1.52.4.15.1.5.0.62
This trap is sent when a client authorizes.
          
If rbtwsClientAccessMode = 'ap':
rbtwsApNum, rbtwsAPRadioNum, rbtwsRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent.
          
If rbtwsClientAccessMode = 'wired':
rbtwsPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
          
Obsoleted by rbtwsClientAuthorizationSuccessTrap4.
rbtwsApManagerChangeTrap







.1.3.6.1.4.1.52.4.15.1.5.0.63
This trap is sent when the AP's secondary link becomes its
primary link.
rbtwsClientClearedTrap2












.1.3.6.1.4.1.52.4.15.1.5.0.64
This trap is sent when a client session is cleared.
Obsoletes rbtwsClientClearedTrap.
rbtwsMobilityDomainResiliencyStatusTrap

.1.3.6.1.4.1.52.4.15.1.5.0.65
This trap is sent by a mobility domain seed to announce
changes in resilient capacity status.
rbtwsApOperRadioStatusTrap3












.1.3.6.1.4.1.52.4.15.1.5.0.66
This trap is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoletes rbtwsApOperRadioStatusTrap
and rbtwsApOperRadioStatusTrap2.
rbtwsClientAuthorizationSuccessTrap4

















.1.3.6.1.4.1.52.4.15.1.5.0.67
This trap is sent when a client authorizes.
          
If rbtwsClientAccessMode = 'ap':
rbtwsApNum, rbtwsAPRadioNum, rbtwsRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
rbtwsClientRadioType gives the type of radio used by this client.
          
If rbtwsClientAccessMode = 'wired':
rbtwsPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
          
Obsoletes rbtwsClientAuthorizationSuccessTrap,
          rbtwsClientAuthorizationSuccessTrap2,
          rbtwsClientAuthorizationSuccessTrap3.
rbtwsRFDetectRogueDeviceTrap2





.1.3.6.1.4.1.52.4.15.1.5.0.68
This trap is sent when RF detection finds a rogue device.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectXmtrRadioType indicates the Type of Radio
used by the transmitter (rogue device).
rbtwsRFDetectXmtrCryptoType indicates the Type of Crypto
used by the transmitter (rogue device).
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectClassificationReason indicates the reason
why the device is classified as rogue.
Obsoletes rbtwsRFDetectRogueAPTrap,
          rbtwsRFDetectUnAuthorizedAPTrap,
          rbtwsRFDetectRogueDeviceTrap.
rbtwsRFDetectSuspectDeviceTrap2





.1.3.6.1.4.1.52.4.15.1.5.0.69
This trap is sent when RF detection finds a suspect device.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectXmtrRadioType indicates the Type of Radio
used by the transmitter (suspect device).
rbtwsRFDetectXmtrCryptoType indicates the Type of Crypto
used by the transmitter (suspect device).
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectClassificationReason indicates the reason
why the device is classified as suspect.
Obsoletes rbtwsRFDetectInterferingRogueAPTrap,
          rbtwsRFDetectSuspectDeviceTrap.
rbtwsMobilityDomainTimeoutTrap

.1.3.6.1.4.1.52.4.15.1.5.0.7
The mobility domain member has declared the remote address
to be DOWN.
rbtwsClusterFailureTrap


.1.3.6.1.4.1.52.4.15.1.5.0.70
This trap is sent when the cluster configuration failed to apply.
          
If rbtwsClusterFailureReason = 'validation-error':
          
  The validation error is reported by the receiving end
  of the configuration updates.
  The receiving end can be any AC (switch) in the mobility domain:
  member, secondary seed or primary seed.
          
    - Primary seed will be the receiving end of configuration updates
        when Primary seed is joining the cluster
        and Secondary seed has preempt mode enabled.
    - Both Secondary seed and member will be at the receiving end
        when Primary seed is active.
rbtwsMpMichaelMICFailure






.1.3.6.1.4.1.52.4.15.1.5.0.8
Two Michael MIC failures were seen within 60 seconds of each other.
          
Obsoleted by rbtwsMichaelMICFailure.
rbtwsRFDetectRogueAPTrap


.1.3.6.1.4.1.52.4.15.1.5.0.9
This trap is sent when RF detection finds a rogue AP.
XmtrMacAddr is the radio MAC address from the beacon.
ListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2.