Notifications emitted by Enterasys Networks wireless switches.
AP = Access Point;
AC = Access Controller (wireless switch),
the device that runs a SNMP Agent implementing this MIB.
Copyright 2008 Enterasys Networks, Inc.
All rights reserved.
This SNMP Management Information Base
Specification (Specification) embodies
confidential and proprietary intellectual property.
This Specification is supplied 'AS IS' and Enterasys Networks
makes no warranty, either express or implied, as to the use,
operation, condition, or performance of the Specification.
is sent when RF detection sweep finds a ad-hoc user.
rbtwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectRogueDisappearTrap
.1.3.6.1.4.1.52.4.15.1.5.0.11
is sent when a rogue has disappeared.
Obsoleted by rbtwsRFDetectRogueDeviceDisappearTrap.
rbtwsClientAuthenticationFailureTrap
.1.3.6.1.4.1.52.4.15.1.5.0.12
This trap is sent if a client authentication fails.
rbtwsClientAuthorizationFailureTrap
.1.3.6.1.4.1.52.4.15.1.5.0.13
This trap is sent if a client authorization fails.
rbtwsClientAssociationFailureTrap
.1.3.6.1.4.1.52.4.15.1.5.0.14
This trap is sent if a client association fails.
rbtwsClientAuthorizationSuccessTrap
.1.3.6.1.4.1.52.4.15.1.5.0.15
is sent when a client authorizes.
Obsoleted by rbtwsClientAuthorizationSuccessTrap4.
rbtwsClientDeAssociationTrap
.1.3.6.1.4.1.52.4.15.1.5.0.16
This trap is sent if a client de-association occurred.
rbtwsClientRoamingTrap
.1.3.6.1.4.1.52.4.15.1.5.0.17
This trap is sent if a client roams from one location to another.
rbtwsAutoTuneRadioPowerChangeTrap
.1.3.6.1.4.1.52.4.15.1.5.0.18
is sent if a radio's power level has changed based
on auto-tune.
rbtwsAutoTuneRadioChannelChangeTrap
.1.3.6.1.4.1.52.4.15.1.5.0.19
This trap is sent if a radio's channel has changed based on auto-tune.
rbtwsDeviceOkayTrap
.1.3.6.1.4.1.52.4.15.1.5.0.2
The device has recovered
rbtwsCounterMeasureStartTrap
.1.3.6.1.4.1.52.4.15.1.5.0.20
is sent when counter measures are started against a rogue.
rbtwsRFDetectXmtrMacAddr is the mac address of the rogue we
are doing counter measures against.
rbtwsRadioMACAddress identifies the radio performing the countermeasures.
rbtwsCounterMeasureStopTrap
.1.3.6.1.4.1.52.4.15.1.5.0.21
is sent when counter measures are stopped against a rogue.
rbtwsRFDetectXmtrMacAddr is the mac address of the rogue we
were doing counter measures against.
rbtwsRadioMACAddress identifies the radio performing the countermeasures.
rbtwsClientDot1xFailureTrap
.1.3.6.1.4.1.52.4.15.1.5.0.22
This trap is sent if a client failed 802.1X.
rbtwsClientClearedTrap
.1.3.6.1.4.1.52.4.15.1.5.0.23
is sent when a client session is cleared.
Obsoleted by rbtwsClientClearedTrap2.
rbtwsClientAuthorizationSuccessTrap2
.1.3.6.1.4.1.52.4.15.1.5.0.24
is sent when a client authorizes.
Obsoleted by rbtwsClientAuthorizationSuccessTrap4.
rbtwsRFDetectSpoofedMacAPTrap
.1.3.6.1.4.1.52.4.15.1.5.0.25
is sent when RF detection finds an AP using
the MAC of the listener.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectDoSTrap and rbtwsRFDetectRogueDeviceTrap2.
One of the two traps will be sent depending on the type of
AP MAC spoofing detected.
rbtwsRFDetectSpoofedSsidAPTrap
.1.3.6.1.4.1.52.4.15.1.5.0.26
is sent when RF detection finds an AP using
the SSID of the listener, and the AP is not in the
mobility domain.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2
and rbtwsRFDetectSuspectDeviceTrap2.
One of the two traps will be sent,
depending on RF detection classification rules.
rbtwsRFDetectDoSTrap
.1.3.6.1.4.1.52.4.15.1.5.0.27
is sent when RF detection finds a denial
of service (DoS) occurring.
rbtwsRFDetectDoSType specifies the type of DoS.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectClientViaRogueWiredAPTrap
.1.3.6.1.4.1.52.4.15.1.5.0.28
is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
rbtwsSourceWsIp is the IP address of the AC (switch) with the wired port.
rbtwsPortNum is the port on the AC.
rbtwsClientVLANid is the VLAN ID of the client's traffic.
rbtwsClientVLANtag is the VLAN tag of the client's traffic.
rbtwsRFDetectXmtrMacAddr is the MAC address of the client.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectClientViaRogueWiredAPTrap3.
rbtwsRFDetectInterferingRogueAPTrap
.1.3.6.1.4.1.52.4.15.1.5.0.29
is sent when RF detection finds an interfering
rogue AP.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectSuspectDeviceTrap2.
rbtwsPoEFailTrap
.1.3.6.1.4.1.52.4.15.1.5.0.3
PoE has failed on the indicated port
rbtwsRFDetectInterferingRogueDisappearTrap
.1.3.6.1.4.1.52.4.15.1.5.0.30
is sent when an interfering rogue has disappeared.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
Obsoleted by rbtwsRFDetectSuspectDeviceDisappearTrap.
rbtwsRFDetectUnAuthorizedSsidTrap
.1.3.6.1.4.1.52.4.15.1.5.0.31
is sent when RF detection finds use of
an unauthorized SSID.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2
and rbtwsRFDetectSuspectDeviceTrap2.
One of the two traps will be sent if the device having an
unauthorized SSID is classified as rogue or suspect because of this.
rbtwsRFDetectUnAuthorizedOuiTrap
.1.3.6.1.4.1.52.4.15.1.5.0.32
is sent when RF detection finds use of
an unauthorized OUI.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2
and rbtwsRFDetectSuspectDeviceTrap2.
One of the two traps will be sent if the device having an
unauthorized OUI is classified as rogue or suspect because of this.
rbtwsRFDetectUnAuthorizedAPTrap
.1.3.6.1.4.1.52.4.15.1.5.0.33
is sent when RF detection finds operation
of an unauthorized AP.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2.
rbtwsDAPConnectWarningTrap
.1.3.6.1.4.1.52.4.15.1.5.0.34
ed to connect to the AC.
rbtwsDeviceModel provides the model of the DAP.
rbtwsDeviceSerNum provides the serial number of the DAP.
rbtwsRsaPubKeyFingerPrint provides the computed
fingerprint of the DAP.
rbtwsDAPconnectWarningType provides the type
of connect warning.
Replaced by rbtwsApNonOperStatusTrap2,
with rbtwsApTransition = 'connectFail'.
rbtwsRFDetectDoSPortTrap
.1.3.6.1.4.1.52.4.15.1.5.0.35
is sent when RF detection finds a denial
of service (DoS) occurring. This has port and
AP info instead of 'Listener info'.
rbtwsRFDetectDoSType specifies the type of DoS.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsClientAccessType specifies whether wired, AP, or DAP.
rbtwsPortNum (for wired or AP), the port that is used.
rbtwsDAPNum (for a DAP), the ID of the DAP.
rbtwsMpMichaelMICFailure2
.1.3.6.1.4.1.52.4.15.1.5.0.36
l MIC failures were seen within 60 seconds of
each other. Object rbtwsClientMACAddress is the source
of the first failure, and object rbtwsClientMACAddress2
source of the second failure.
Obsoleted by rbtwsMichaelMICFailure.
rbtwsApNonOperStatusTrap
.1.3.6.1.4.1.52.4.15.1.5.0.37
is sent when the AP changes state
and the new one is a non-operational state.
Obsoleted by rbtwsApNonOperStatusTrap2.
rbtwsApOperRadioStatusTrap
.1.3.6.1.4.1.52.4.15.1.5.0.38
is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoleted by rbtwsApOperRadioStatusTrap3.
rbtwsClientIpAddrChangeTrap
.1.3.6.1.4.1.52.4.15.1.5.0.39
is sent when a client's IP address
changes. The most likely case for this is when
the client first connects to the network.
rbtwsApTimeoutTrap
.1.3.6.1.4.1.52.4.15.1.5.0.4
ering the AC at port rbtwsPortNum with MAC
rbtwsRadioMacAddress and of the access type (ap or dap)
has not responded.
Replaced by rbtwsApNonOperStatusTrap2,
with rbtwsApTransition = 'timeout'.
rbtwsClientAssociationSuccessTrap
.1.3.6.1.4.1.52.4.15.1.5.0.40
is sent if a client association succeeds.
WARNING: DO NOT enable it in normal use.
It may impair switch performance!
Only recommended for debugging network issues.
rbtwsClientAuthenticationSuccessTrap
.1.3.6.1.4.1.52.4.15.1.5.0.41
This trap is sent if a client authentication succeeds.
rbtwsClientDeAuthenticationTrap
.1.3.6.1.4.1.52.4.15.1.5.0.42
This trap is sent if a client de-authentication occured.
rbtwsRFDetectBlacklistedTrap
.1.3.6.1.4.1.52.4.15.1.5.0.43
is sent if an association, re-association or de-association
request (packet) is detected from a blacklisted transmitter
(identified by MAC: 'rbtwsRFDetectXmtrMacAddr').
If 'rbtwsBlacklistingCause' is 'configured',
then 'rbtwsBlacklistingRemainingTime' will be zero, meaning indefinite
time (depending on administrative actions on the Black List).
Otherwise, 'rbtwsBlacklistingRemainingTime' will indicate the time
in seconds until this transmitter's requests could be allowed.
rbtwsRFDetectClientViaRogueWiredAPTrap2
.1.3.6.1.4.1.52.4.15.1.5.0.44
is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
rbtwsSourceWsIp is the IP address of the AC (switch)
with the wired port.
rbtwsPortNum is the port on the AC.
rbtwsClientVLANid is the VLAN ID of the client's traffic.
rbtwsClientVLANtag is the VLAN tag of the client's traffic.
rbtwsRFDetectXmtrMacAddr is the MAC address of the client.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired)
the client is connected to.
Obsoleted by rbtwsRFDetectClientViaRogueWiredAPTrap3.
rbtwsRFDetectAdhocUserDisappearTrap
.1.3.6.1.4.1.52.4.15.1.5.0.45
is sent when RF detection sweep finds that
an ad-hoc user disappeared.
rbtwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user.
rbtwsApRejectLicenseExceededTrap
.1.3.6.1.4.1.52.4.15.1.5.0.46
is sent when an AC (wireless switch) receives a packet
from an inactive AP and attaching that AP would make the AC
exceed the maximum (licensed) number of active APs.
rbtwsClientDynAuthorChangeSuccessTrap
.1.3.6.1.4.1.52.4.15.1.5.0.47
is sent when the authorization attributes for a user
are dynamically changed by an authorized dynamic authorization
client.
rbtwsClientDynAuthorChangeFailureTrap
.1.3.6.1.4.1.52.4.15.1.5.0.48
is sent if a change of authorization request sent by
an authorized dynamic authorization client is unsuccessful.
rbtwsClientDisconnectTrap
.1.3.6.1.4.1.52.4.15.1.5.0.49
This trap is sent when a client session is terminated administratively.
rbtwsAPBootTrap
.1.3.6.1.4.1.52.4.15.1.5.0.5
ering the AC at port rbtwsPortNum with MAC
rbtwsRadioMacAddress and of the access type (ap or dap) has booted.
Replaced by rbtwsApNonOperStatusTrap2,
with rbtwsApTransition = 'bootSuccess'.
rbtwsMobilityDomainFailOverTrap
.1.3.6.1.4.1.52.4.15.1.5.0.50
is sent when the Mobility Domain fails over
to the secondary seed.
rbtwsMobilityDomainFailBackTrap
.1.3.6.1.4.1.52.4.15.1.5.0.51
is sent when the Mobility Domain fails back
to the primary seed.
rbtwsRFDetectRogueDeviceTrap
.1.3.6.1.4.1.52.4.15.1.5.0.52
is sent when RF detection finds a rogue device.
XmtrMacAddr is the radio MAC address from the beacon.
ListenerListInfo is a display string of a list of
listener information.
ClassificationReason indicates the reason why the device
is classified as rogue.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2.
rbtwsRFDetectRogueDeviceDisappearTrap
.1.3.6.1.4.1.52.4.15.1.5.0.53
is sent when a rogue device has disappeared.
This trap obsoletes the rbtwsRFDetectRogueDisappearTrap.
rbtwsRFDetectSuspectDeviceTrap
.1.3.6.1.4.1.52.4.15.1.5.0.54
is sent when RF detection finds a suspect device.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
ClassificationReason indicates the reason why the device
is classified as suspect.
Obsoleted by rbtwsRFDetectSuspectDeviceTrap2.
rbtwsRFDetectSuspectDeviceDisappearTrap
.1.3.6.1.4.1.52.4.15.1.5.0.55
is sent when a suspect device has disappeared.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
This trap obsoletes the rbtwsRFDetectInterferingRogueDisappearTrap.
rbtwsRFDetectClientViaRogueWiredAPTrap3
.1.3.6.1.4.1.52.4.15.1.5.0.56
is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
rbtwsSourceWsIp is the IP address of the AC (switch)
with the wired port.
rbtwsPortNum is the port on the AC.
rbtwsClientVLANid is the VLAN ID of the client's traffic.
rbtwsClientVLANtag is the VLAN tag of the client's traffic.
rbtwsRFDetectXmtrMacAddr is the MAC address of the client.
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired)
the client is connected to.
ClassificationReason indicates the reason why the AP
is classified as rogue.
This trap obsoletes the rbtwsRFDetectClientViaRogueWiredAPTrap and
rbtwsRFDetectClientViaRogueWiredAPTrap2.
rbtwsRFDetectClassificationChangeTrap
.1.3.6.1.4.1.52.4.15.1.5.0.57
This trap is sent when RF detection classification rules change.
rbtwsConfigurationSavedTrap
.1.3.6.1.4.1.52.4.15.1.5.0.58
is sent when the running configuration of the switch
is written to a configuration file.
rbtwsApNonOperStatusTrap2
.1.3.6.1.4.1.52.4.15.1.5.0.59
is sent when the AP changes state
and the new one is a non-operational state.
Obsoletes rbtwsApNonOperStatusTrap.
rbtwsMobilityDomainJoinTrap
.1.3.6.1.4.1.52.4.15.1.5.0.6
ty domain member has received an UP notice from the
remote address.
rbtwsApOperRadioStatusTrap2
.1.3.6.1.4.1.52.4.15.1.5.0.60
is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoleted by rbtwsApOperRadioStatusTrap3.
rbtwsMichaelMICFailure
.1.3.6.1.4.1.52.4.15.1.5.0.61
l MIC failures were seen within 60 seconds of each other.
Object rbtwsClientMACAddress indicates
the source of the first failure,
and object rbtwsClientMACAddress2 indicates
the source of the second failure.
Service is interrupted for 60 seconds on the radio
due to TKIP countermeasures having commenced.
The radio is identified by rbtwsApNum and rbtwsAPRadioNum.
An alternative way to identify the radio is rbtwsRadioMACAddress.
Obsoletes rbtwsMpMichaelMICFailure and rbtwsMpMichaelMICFailure2.
rbtwsClientAuthorizationSuccessTrap3
.1.3.6.1.4.1.52.4.15.1.5.0.62
is sent when a client authorizes.
If rbtwsClientAccessMode = 'ap':
rbtwsApNum, rbtwsAPRadioNum, rbtwsRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent.
If rbtwsClientAccessMode = 'wired':
rbtwsPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoleted by rbtwsClientAuthorizationSuccessTrap4.
rbtwsApManagerChangeTrap
.1.3.6.1.4.1.52.4.15.1.5.0.63
is sent when the AP's secondary link becomes its
primary link.
rbtwsClientClearedTrap2
.1.3.6.1.4.1.52.4.15.1.5.0.64
is sent when a client session is cleared.
Obsoletes rbtwsClientClearedTrap.
rbtwsMobilityDomainResiliencyStatusTrap
.1.3.6.1.4.1.52.4.15.1.5.0.65
is sent by a mobility domain seed to announce
changes in resilient capacity status.
rbtwsApOperRadioStatusTrap3
.1.3.6.1.4.1.52.4.15.1.5.0.66
is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoletes rbtwsApOperRadioStatusTrap
and rbtwsApOperRadioStatusTrap2.
rbtwsClientAuthorizationSuccessTrap4
.1.3.6.1.4.1.52.4.15.1.5.0.67
is sent when a client authorizes.
If rbtwsClientAccessMode = 'ap':
rbtwsApNum, rbtwsAPRadioNum, rbtwsRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
rbtwsClientRadioType gives the type of radio used by this client.
If rbtwsClientAccessMode = 'wired':
rbtwsPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes rbtwsClientAuthorizationSuccessTrap,
rbtwsClientAuthorizationSuccessTrap2,
rbtwsClientAuthorizationSuccessTrap3.
rbtwsRFDetectRogueDeviceTrap2
.1.3.6.1.4.1.52.4.15.1.5.0.68
is sent when RF detection finds a rogue device.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectXmtrRadioType indicates the Type of Radio
used by the transmitter (rogue device).
rbtwsRFDetectXmtrCryptoType indicates the Type of Crypto
used by the transmitter (rogue device).
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectClassificationReason indicates the reason
why the device is classified as rogue.
Obsoletes rbtwsRFDetectRogueAPTrap,
rbtwsRFDetectUnAuthorizedAPTrap,
rbtwsRFDetectRogueDeviceTrap.
rbtwsRFDetectSuspectDeviceTrap2
.1.3.6.1.4.1.52.4.15.1.5.0.69
is sent when RF detection finds a suspect device.
rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
rbtwsRFDetectXmtrRadioType indicates the Type of Radio
used by the transmitter (suspect device).
rbtwsRFDetectXmtrCryptoType indicates the Type of Crypto
used by the transmitter (suspect device).
rbtwsRFDetectListenerListInfo is a display string of a list of
listener information.
rbtwsRFDetectClassificationReason indicates the reason
why the device is classified as suspect.
Obsoletes rbtwsRFDetectInterferingRogueAPTrap,
rbtwsRFDetectSuspectDeviceTrap.
rbtwsMobilityDomainTimeoutTrap
.1.3.6.1.4.1.52.4.15.1.5.0.7
ty domain member has declared the remote address
to be DOWN.
rbtwsClusterFailureTrap
.1.3.6.1.4.1.52.4.15.1.5.0.70
is sent when the cluster configuration failed to apply.
If rbtwsClusterFailureReason = 'validation-error':
The validation error is reported by the receiving end
of the configuration updates.
The receiving end can be any AC (switch) in the mobility domain:
member, secondary seed or primary seed.
- Primary seed will be the receiving end of configuration updates
when Primary seed is joining the cluster
and Secondary seed has preempt mode enabled.
- Both Secondary seed and member will be at the receiving end
when Primary seed is active.
rbtwsMpMichaelMICFailure
.1.3.6.1.4.1.52.4.15.1.5.0.8
l MIC failures were seen within 60 seconds of each other.
Obsoleted by rbtwsMichaelMICFailure.
rbtwsRFDetectRogueAPTrap
.1.3.6.1.4.1.52.4.15.1.5.0.9
is sent when RF detection finds a rogue AP.
XmtrMacAddr is the radio MAC address from the beacon.
ListenerListInfo is a display string of a list of
listener information.
Obsoleted by rbtwsRFDetectRogueDeviceTrap2.