efault keys for secure services (SSH and SSL) indication
trap generated by RuggedCom devices.
bootVersionMismatchTrap
.1.3.6.1.4.1.15004.5.14
tware version indication trap generated by RuggedCom
devices.
rtcBatteryLowTrap
.1.3.6.1.4.1.15004.5.15
icating that the device's RTC Battery level is low enough
that there may be a problem after the next device reboot cycle.
It is generated by RuggedCom devices.
securityCertificateExpiryTrap
.1.3.6.1.4.1.15004.5.16
icating that at least one security certificate on the device
is within 30 days of expiration. It is generated by RuggedCom devices.
bfaTrap
.1.3.6.1.4.1.15004.5.17
p is generated when Brute Force Attack is detected
on the unit and source of attack is blocked, or released.
Different devices might block attacking IP address for all the
IP services, others might block the service on which
attack is detected for all IP addresses, while some might just
give a status of unit being under attack.
powerSupplyTrap
.1.3.6.1.4.1.15004.5.2
erated when a power supply fails or comes up. The first
trap would be generated on first power supply failure. The state
of power supply (failed or restored ) is retrieved via object
powerSupplyDescription at the time when trap is generated.
The status of power supply units in device can be retrieved via
objects rcDeviceStsPowerSupply1 and rcDeviceStsPowerSupply2.
powerSupplyIdentifier object is recommended to be added as an optional
parameter to the list of objects.
rcSuccessUsrChgPwdTrap
.1.3.6.1.4.1.15004.5.20
A trap generated when a user's password is successfully changed.
rcChgPswdAdminTrap
.1.3.6.1.4.1.15004.5.20.1
Admin Level Password Changed
rcChgPswdOperTrap
.1.3.6.1.4.1.15004.5.20.2
Operator Level Password Changed
rcChgPswdGuestTrap
.1.3.6.1.4.1.15004.5.20.3
Guest Level Password Changed
rcChgPswdRadiusTrap
.1.3.6.1.4.1.15004.5.20.4
RADIUS authenticate key changed
rcChgPswdTacplusTrap
.1.3.6.1.4.1.15004.5.20.5
Tacacs+ authenticate key changed
rcChgPswdDataStoreTrap
.1.3.6.1.4.1.15004.5.20.6
Data Storage pass-phrase changed
rcChgPswdSnmpCommunityTrap
.1.3.6.1.4.1.15004.5.20.7
SNMP community character string changed
rcChgPswdSnmpAuthKeyTrap
.1.3.6.1.4.1.15004.5.20.8
SNMP authenticate key changed
rcChgPswdSnmpPrivKeyTrap
.1.3.6.1.4.1.15004.5.20.9
SNMP private Key changed
deviceErrTrap
.1.3.6.1.4.1.15004.5.24
A device error indication trap generated by RuggedCom devices.
privKeySnmpV3UserUnknwnTrap
.1.3.6.1.4.1.15004.5.25
A trap indicating unknown private key from an SNMP V3 user.
loginInformationTrap
.1.3.6.1.4.1.15004.5.26
A trap informing successful login to the device.
loginFailureTrap
.1.3.6.1.4.1.15004.5.27
A trap indicating login failure attempt to the device.
excessLoginFailureTrap
.1.3.6.1.4.1.15004.5.28
A trap indicating excessive login failure attempts to the device.
rcGMRPCantLrnMoreAddrs
.1.3.6.1.4.1.15004.5.29
A trap indicating GMRP cannot learn more addresses
swUpgradeTrap
.1.3.6.1.4.1.15004.5.3
trap generated upon software upgrade.
The rate at which this notification can be provided is 60 seconds.
rcGVRPCantLrnMoreVLANs
.1.3.6.1.4.1.15004.5.30
A trap indicating GVRP cannot learn more VLANs
rcMcastCpuFiltTblFull
.1.3.6.1.4.1.15004.5.31
A trap indicating Mcast CPU filtering table is full
rcIgmpGrpMembershipTblFull
.1.3.6.1.4.1.15004.5.32
A trap indicating IGMP Group Membership table full
rcIgmpMcastForwardTblFull
.1.3.6.1.4.1.15004.5.33
A trap indicating IGMP Mcast Forwarding table full
rcMacAddressNotLearned
.1.3.6.1.4.1.15004.5.34
A trap indicating MAC address not learned
rcIeee1588HoldoverStateTrap
.1.3.6.1.4.1.15004.5.36
A trap generated to indicate that IEEE1588 PTP lost master clock, in holdover state now.
rcIeee1588BMCErrorTrap
.1.3.6.1.4.1.15004.5.37
A trap generated to indicate that IEEE1588 PTP BMC foreign master comparison error.
rcPortSecurityViolatedTrap
.1.3.6.1.4.1.15004.5.38
A trap generated upon port security violation.
cfgChangeTrap
.1.3.6.1.4.1.15004.5.4
trap generated upon configuration change.
The rate at which this notification can be provided is 60 seconds.
rcLoopedBpduRcvd
.1.3.6.1.4.1.15004.5.40
A trap generated when looped back BPDU received on the port.
rcBpduGuardActivated
.1.3.6.1.4.1.15004.5.41
A trap generated when BPDU Guard is activated on the port.
serialCommBlockedTrap
.1.3.6.1.4.1.15004.5.42
A trap generated to indicate serial communication is blocked.
unknownRouteSerialProto
.1.3.6.1.4.1.15004.5.43
A trap generated to indicate unknown route for serial protocol.
rcConsoleServiceChangedTrap
.1.3.6.1.4.1.15004.5.44
A trap generated to indicate the console service changed.
rcLocalConsoleServiceEnabledTrap
.1.3.6.1.4.1.15004.5.44.1
Local Console Enabled
rcLocalConsoleServiceDisabledTrap
.1.3.6.1.4.1.15004.5.44.2
Local Console Disabled
fileTransferEventTrap
.1.3.6.1.4.1.15004.5.49
A trap generated when a file transfer events takes place.
cfgChangeNoRevTrap
.1.3.6.1.4.1.15004.5.5
trap generated upon configuration change by
device that does not use the concept of configuration
revision number.
fanBankTrap
.1.3.6.1.4.1.15004.5.6
erated when a fan bank fails or fails to comes up. The
first trap would be generated on first fan bank failure. The state
of fan bank (failed or restored ) is retrieved via object
fan bank Description at the time when trap is generated.
The status of power supply units in device can be retrieved via
objects rcDeviceStsFanBank1 and rcDeviceStsFanBank2.
hotswapModuleStateChangeTrap
.1.3.6.1.4.1.15004.5.7
erated when a ROX 2 Module changes state. The first
traps would be generated during initial start up.
weakPasswordTrap
.1.3.6.1.4.1.15004.5.8
A weak password indication trap generated by RuggedCom devices.
moduleTypeMismatchTrap
.1.3.6.1.4.1.15004.5.9
erated when ROX 2 sees that, for a given slot, the configured module type
does not match the detected module type. The first
traps would be generated during initial start up.