Notifications emitted by Trapeze Networks wireless switches.
AP = Access Point;
AC = Access Controller (wireless switch),
the device that runs a SNMP Agent implementing this MIB.
Copyright 2004-2012 Trapeze Networks, Inc.
All rights reserved.
This Trapeze Networks SNMP Management Information Base
Specification (Specification) embodies Trapeze Networks'
confidential and proprietary intellectual property.
Trapeze Networks retains all title and ownership in
the Specification, including any revisions.
This Specification is supplied 'AS IS' and Trapeze Networks
makes no warranty, either express or implied, as to the use,
operation, condition, or performance of the Specification.
This trap is sent when RF detection sweep finds a ad-hoc user.
trpzRFDetectXmtrMacAddr is the MAC address of the ad-hoc user.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
trpzRFDetectRogueDisappearTrap
.1.3.6.1.4.1.14525.5.0.11
This trap is sent when a rogue has disappeared.
Obsoleted by trpzRFDetectRogueDeviceDisappearTrap.
trpzClientAuthenticationFailureTrap
.1.3.6.1.4.1.14525.5.0.12
This trap is sent if a client authentication fails.
trpzClientAuthorizationFailureTrap
.1.3.6.1.4.1.14525.5.0.13
This trap is sent if a client authorization fails.
trpzClientAssociationFailureTrap
.1.3.6.1.4.1.14525.5.0.14
This trap is sent if a client association fails.
trpzClientAuthorizationSuccessTrap
.1.3.6.1.4.1.14525.5.0.15
This trap is sent when a client authorizes.
Obsoleted by trpzClientAuthorizationSuccessTrap5.
trpzClientDeAssociationTrap
.1.3.6.1.4.1.14525.5.0.16
This trap is sent if a client de-association occurred.
Obsoleted by trpzClientDeAssociationTrap2.
trpzClientRoamingTrap
.1.3.6.1.4.1.14525.5.0.17
This trap is sent if a client roams from one location to another.
Obsoleted by trpzClientRoamingTrap2.
trpzAutoTuneRadioPowerChangeTrap
.1.3.6.1.4.1.14525.5.0.18
This trap is sent if a radio's power level has changed based
on auto-tune.
trpzAutoTuneRadioChannelChangeTrap
.1.3.6.1.4.1.14525.5.0.19
This trap is sent if a radio's channel has changed based on auto-tune.
trpzDeviceOkayTrap
.1.3.6.1.4.1.14525.5.0.2
The device has recovered
trpzCounterMeasureStartTrap
.1.3.6.1.4.1.14525.5.0.20
This trap is sent when counter measures are started against a rogue.
trpzRFDetectXmtrMacAddr is the mac address of the rogue we
are doing counter measures against.
trpzRadioMACAddress identifies the radio performing the countermeasures.
trpzCounterMeasureStopTrap
.1.3.6.1.4.1.14525.5.0.21
This trap is sent when counter measures are stopped against a rogue.
trpzRFDetectXmtrMacAddr is the mac address of the rogue we
were doing counter measures against.
trpzRadioMACAddress identifies the radio performing the countermeasures.
trpzClientDot1xFailureTrap
.1.3.6.1.4.1.14525.5.0.22
This trap is sent if a client failed 802.1X.
trpzClientClearedTrap
.1.3.6.1.4.1.14525.5.0.23
This trap is sent when a client session is cleared.
Obsoleted by trpzClientClearedTrap3.
trpzClientAuthorizationSuccessTrap2
.1.3.6.1.4.1.14525.5.0.24
This trap is sent when a client authorizes.
Obsoleted by trpzClientAuthorizationSuccessTrap5.
trpzRFDetectSpoofedMacAPTrap
.1.3.6.1.4.1.14525.5.0.25
This trap is sent when RF detection finds an AP using
the MAC of the listener.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectDoSTrap and trpzRFDetectRogueDeviceTrap2.
One of the two traps will be sent depending on the type of
AP MAC spoofing detected.
trpzRFDetectSpoofedSsidAPTrap
.1.3.6.1.4.1.14525.5.0.26
This trap is sent when RF detection finds an AP using
the SSID of the listener, and the AP is not in the
mobility domain.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectRogueDeviceTrap2
and trpzRFDetectSuspectDeviceTrap2.
One of the two traps will be sent,
depending on RF detection classification rules.
trpzRFDetectDoSTrap
.1.3.6.1.4.1.14525.5.0.27
This trap is sent when RF detection finds a denial
of service (DoS) occurring.
trpzRFDetectDoSType specifies the type of DoS.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
trpzRFDetectClientViaRogueWiredAPTrap
.1.3.6.1.4.1.14525.5.0.28
This trap is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
trpzSourceWsIp is the IP address of the AC (switch) with the wired port.
trpzPortNum is the port on the AC.
trpzClientVLANid is the VLAN ID of the client's traffic.
trpzClientVLANtag is the VLAN tag of the client's traffic.
trpzRFDetectXmtrMacAddr is the MAC address of the client.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectClientViaRogueWiredAPTrap3.
trpzRFDetectInterferingRogueAPTrap
.1.3.6.1.4.1.14525.5.0.29
This trap is sent when RF detection finds an interfering
rogue AP.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectSuspectDeviceTrap2.
trpzPoEFailTrap
.1.3.6.1.4.1.14525.5.0.3
PoE has failed on the indicated port
trpzRFDetectInterferingRogueDisappearTrap
.1.3.6.1.4.1.14525.5.0.30
This trap is sent when an interfering rogue has disappeared.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
Obsoleted by trpzRFDetectSuspectDeviceDisappearTrap.
trpzRFDetectUnAuthorizedSsidTrap
.1.3.6.1.4.1.14525.5.0.31
This trap is sent when RF detection finds use of
an unauthorized SSID.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectRogueDeviceTrap2
and trpzRFDetectSuspectDeviceTrap2.
One of the two traps will be sent if the device having an
unauthorized SSID is classified as rogue or suspect because of this.
trpzRFDetectUnAuthorizedOuiTrap
.1.3.6.1.4.1.14525.5.0.32
This trap is sent when RF detection finds use of
an unauthorized OUI.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectRogueDeviceTrap2
and trpzRFDetectSuspectDeviceTrap2.
One of the two traps will be sent if the device having an
unauthorized OUI is classified as rogue or suspect because of this.
trpzRFDetectUnAuthorizedAPTrap
.1.3.6.1.4.1.14525.5.0.33
This trap is sent when RF detection finds operation
of an unauthorized AP.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectRogueDeviceTrap2.
trpzDAPConnectWarningTrap
.1.3.6.1.4.1.14525.5.0.34
A DAP, tried to connect to the AC.
trpzDeviceModel provides the model of the DAP.
trpzDeviceSerNum provides the serial number of the DAP.
trpzRsaPubKeyFingerPrint provides the computed
fingerprint of the DAP.
trpzDAPconnectWarningType provides the type
of connect warning.
Replaced by trpzApNonOperStatusTrap2,
with trpzApTransition = 'connectFail'.
trpzRFDetectDoSPortTrap
.1.3.6.1.4.1.14525.5.0.35
This trap is sent when RF detection finds a denial
of service (DoS) occurring. This has port and
AP info instead of 'Listener info'.
trpzRFDetectDoSType specifies the type of DoS.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzClientAccessType specifies whether wired, AP, or DAP.
trpzPortNum (for wired or AP), the port that is used.
trpzDAPNum (for a DAP), the ID of the DAP.
trpzMpMichaelMICFailure2
.1.3.6.1.4.1.14525.5.0.36
Two Michael MIC failures were seen within 60 seconds of
each other. Object trpzClientMACAddress is the source
of the first failure, and object trpzClientMACAddress2
source of the second failure.
Obsoleted by trpzMichaelMICFailure.
trpzApNonOperStatusTrap
.1.3.6.1.4.1.14525.5.0.37
This trap is sent when the AP changes state
and the new one is a non-operational state.
Obsoleted by trpzApNonOperStatusTrap2.
trpzApOperRadioStatusTrap
.1.3.6.1.4.1.14525.5.0.38
This trap is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoleted by trpzApOperRadioStatusTrap3.
trpzClientIpAddrChangeTrap
.1.3.6.1.4.1.14525.5.0.39
This trap is sent when a client's IP address
changes. The most likely case for this is when
the client first connects to the network.
Obsoleted by trpzClientIpAddrChangeTrap2.
trpzApTimeoutTrap
.1.3.6.1.4.1.14525.5.0.4
The AP entering the AC at port trpzPortNum with MAC
trpzRadioMacAddress and of the access type (ap or dap)
has not responded.
Replaced by trpzApNonOperStatusTrap2,
with trpzApTransition = 'timeout'.
trpzClientAssociationSuccessTrap
.1.3.6.1.4.1.14525.5.0.40
This trap is sent if a client association succeeds.
WARNING: DO NOT enable it in normal use.
It may impair switch performance!
Only recommended for debugging network issues.
trpzClientAuthenticationSuccessTrap
.1.3.6.1.4.1.14525.5.0.41
This trap is sent if a client authentication succeeds.
trpzClientDeAuthenticationTrap
.1.3.6.1.4.1.14525.5.0.42
This trap is sent if a client de-authentication occurred.
Obsoleted by trpzClientDeAuthenticationTrap2.
trpzRFDetectBlacklistedTrap
.1.3.6.1.4.1.14525.5.0.43
This trap is sent if an association, re-association or de-association
request (packet) is detected from a blacklisted transmitter
(identified by MAC: 'trpzRFDetectXmtrMacAddr').
If 'trpzBlacklistingCause' is 'configured',
then 'trpzBlacklistingRemainingTime' will be zero, meaning indefinite
time (depending on administrative actions on the Black List).
Otherwise, 'trpzBlacklistingRemainingTime' will indicate the time
in seconds until this transmitter's requests could be allowed.
trpzRFDetectClientViaRogueWiredAPTrap2
.1.3.6.1.4.1.14525.5.0.44
This trap is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
trpzSourceWsIp is the IP address of the AC (switch)
with the wired port.
trpzPortNum is the port on the AC.
trpzClientVLANid is the VLAN ID of the client's traffic.
trpzClientVLANtag is the VLAN tag of the client's traffic.
trpzRFDetectXmtrMacAddr is the MAC address of the client.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
trpzRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired)
the client is connected to.
Obsoleted by trpzRFDetectClientViaRogueWiredAPTrap3.
trpzRFDetectAdhocUserDisappearTrap
.1.3.6.1.4.1.14525.5.0.45
This trap is sent when RF detection sweep finds that
an ad-hoc user disappeared.
trpzRFDetectXmtrMacAddr is the MAC address of the ad-hoc user.
trpzApRejectLicenseExceededTrap
.1.3.6.1.4.1.14525.5.0.46
This trap is sent when an AC (wireless switch) receives a packet
from an inactive AP and attaching that AP would make the AC
exceed the maximum (licensed) number of active APs.
trpzClientDynAuthorChangeSuccessTrap
.1.3.6.1.4.1.14525.5.0.47
This trap is sent when the authorization attributes for a user
are dynamically changed by an authorized dynamic authorization
client.
Obsoleted by trpzClientDynAuthorChangeSuccessTrap2.
trpzClientDynAuthorChangeFailureTrap
.1.3.6.1.4.1.14525.5.0.48
This trap is sent if a change of authorization request sent by
an authorized dynamic authorization client is unsuccessful.
trpzClientDisconnectTrap
.1.3.6.1.4.1.14525.5.0.49
This trap is sent when a client session is terminated administratively.
Obsoleted by trpzClientDisconnectTrap2.
trpzAPBootTrap
.1.3.6.1.4.1.14525.5.0.5
The AP entering the AC at port trpzPortNum with MAC
trpzRadioMacAddress and of the access type (ap or dap) has booted.
Replaced by trpzApNonOperStatusTrap2,
with trpzApTransition = 'bootSuccess'.
trpzMobilityDomainFailOverTrap
.1.3.6.1.4.1.14525.5.0.50
This trap is sent when the Mobility Domain fails over
to the secondary seed.
trpzMobilityDomainFailBackTrap
.1.3.6.1.4.1.14525.5.0.51
This trap is sent when the Mobility Domain fails back
to the primary seed.
trpzRFDetectRogueDeviceTrap
.1.3.6.1.4.1.14525.5.0.52
This trap is sent when RF detection finds a rogue device.
XmtrMacAddr is the radio MAC address from the beacon.
ListenerListInfo is a display string of a list of
listener information.
ClassificationReason indicates the reason why the device
is classified as rogue.
Obsoleted by trpzRFDetectRogueDeviceTrap2.
trpzRFDetectRogueDeviceDisappearTrap
.1.3.6.1.4.1.14525.5.0.53
This trap is sent when a rogue device has disappeared.
This trap obsoletes the trpzRFDetectRogueDisappearTrap.
trpzRFDetectSuspectDeviceTrap
.1.3.6.1.4.1.14525.5.0.54
This trap is sent when RF detection finds a suspect device.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
ClassificationReason indicates the reason why the device
is classified as suspect.
Obsoleted by trpzRFDetectSuspectDeviceTrap2.
trpzRFDetectSuspectDeviceDisappearTrap
.1.3.6.1.4.1.14525.5.0.55
This trap is sent when a suspect device has disappeared.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
This trap obsoletes the trpzRFDetectInterferingRogueDisappearTrap.
trpzRFDetectClientViaRogueWiredAPTrap3
.1.3.6.1.4.1.14525.5.0.56
This trap is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
trpzSourceWsIp is the IP address of the AC (switch)
with the wired port.
trpzPortNum is the port on the AC.
trpzClientVLANid is the VLAN ID of the client's traffic.
trpzClientVLANtag is the VLAN tag of the client's traffic.
trpzRFDetectXmtrMacAddr is the MAC address of the client.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
trpzRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired)
the client is connected to.
ClassificationReason indicates the reason why the AP
is classified as rogue.
This trap obsoletes the trpzRFDetectClientViaRogueWiredAPTrap and
trpzRFDetectClientViaRogueWiredAPTrap2.
trpzRFDetectClassificationChangeTrap
.1.3.6.1.4.1.14525.5.0.57
This trap is sent when RF detection classification rules change.
trpzConfigurationSavedTrap
.1.3.6.1.4.1.14525.5.0.58
This trap is sent when the running configuration of the switch
is written to a configuration file.
trpzApNonOperStatusTrap2
.1.3.6.1.4.1.14525.5.0.59
This trap is sent when the AP changes state
and the new one is a non-operational state.
Obsoletes trpzApNonOperStatusTrap.
trpzMobilityDomainJoinTrap
.1.3.6.1.4.1.14525.5.0.6
The mobility domain member has received an UP notice from the
remote address.
trpzApOperRadioStatusTrap2
.1.3.6.1.4.1.14525.5.0.60
This trap is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoleted by trpzApOperRadioStatusTrap3.
trpzMichaelMICFailure
.1.3.6.1.4.1.14525.5.0.61
Two Michael MIC failures were seen within 60 seconds of each other.
Object trpzClientMACAddress indicates
the source of the first failure,
and object trpzClientMACAddress2 indicates
the source of the second failure.
Service is interrupted for 60 seconds on the radio
due to TKIP countermeasures having commenced.
The radio is identified by trpzApNum and trpzAPRadioNum.
An alternative way to identify the radio is trpzRadioMACAddress.
Obsoletes trpzMpMichaelMICFailure and trpzMpMichaelMICFailure2.
trpzClientAuthorizationSuccessTrap3
.1.3.6.1.4.1.14525.5.0.62
This trap is sent when a client authorizes.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzAPRadioNum, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent.
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoleted by trpzClientAuthorizationSuccessTrap5.
trpzApManagerChangeTrap
.1.3.6.1.4.1.14525.5.0.63
This trap is sent when the AP's secondary link becomes its
primary link.
trpzClientClearedTrap2
.1.3.6.1.4.1.14525.5.0.64
This trap is sent when a client session is cleared.
Obsoleted by trpzClientClearedTrap3.
trpzMobilityDomainResiliencyStatusTrap
.1.3.6.1.4.1.14525.5.0.65
This trap is sent by a mobility domain seed to announce
changes in resilient capacity status.
trpzApOperRadioStatusTrap3
.1.3.6.1.4.1.14525.5.0.66
This trap is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoletes trpzApOperRadioStatusTrap
and trpzApOperRadioStatusTrap2.
trpzClientAuthorizationSuccessTrap4
.1.3.6.1.4.1.14525.5.0.67
This trap is sent when a client authorizes.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzAPRadioNum, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
trpzClientRadioType gives the type of radio used by this client.
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoleted by trpzClientAuthorizationSuccessTrap5.
trpzRFDetectRogueDeviceTrap2
.1.3.6.1.4.1.14525.5.0.68
This trap is sent when RF detection finds a rogue device.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectXmtrRadioType indicates the Type of Radio
used by the transmitter (rogue device).
trpzRFDetectXmtrCryptoType indicates the Type of Crypto
used by the transmitter (rogue device).
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
trpzRFDetectClassificationReason indicates the reason
why the device is classified as rogue.
Obsoletes trpzRFDetectRogueAPTrap,
trpzRFDetectUnAuthorizedAPTrap,
trpzRFDetectRogueDeviceTrap.
trpzRFDetectSuspectDeviceTrap2
.1.3.6.1.4.1.14525.5.0.69
This trap is sent when RF detection finds a suspect device.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectXmtrRadioType indicates the Type of Radio
used by the transmitter (suspect device).
trpzRFDetectXmtrCryptoType indicates the Type of Crypto
used by the transmitter (suspect device).
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
trpzRFDetectClassificationReason indicates the reason
why the device is classified as suspect.
Obsoletes trpzRFDetectInterferingRogueAPTrap,
trpzRFDetectSuspectDeviceTrap.
trpzMobilityDomainTimeoutTrap
.1.3.6.1.4.1.14525.5.0.7
The mobility domain member has declared the remote address
to be DOWN.
trpzClusterFailureTrap
.1.3.6.1.4.1.14525.5.0.70
This trap is sent when the cluster configuration failed to apply.
If trpzClusterFailureReason = 'validation-error':
The validation error is reported by the receiving end
of the configuration updates.
The receiving end can be any AC (switch) in the mobility domain:
member, secondary seed or primary seed.
- Primary seed will be the receiving end of configuration updates
when Primary seed is joining the cluster
and Secondary seed has preempt mode enabled.
- Both Secondary seed and member will be at the receiving end
when Primary seed is active.
trpzMultimediaCallFailureTrap
.1.3.6.1.4.1.14525.5.0.71
This trap is sent when a multimedia call fails.
trpzApTunnelLimitExceededTrap
.1.3.6.1.4.1.14525.5.0.72
This trap is sent by the AP primary controller (PAM)
when an AP rejects a tunnel creation request because
it has already created the maximum number of tunnels it can support.
trpzWsTunnelLimitExceededTrap
.1.3.6.1.4.1.14525.5.0.73
This trap is sent when the AC (wireless switch)
rejects a tunnel creation request because it has reached
the maximum number of tunnels supported
(indicated by 'trpzWsTunnelLimit').
When trpzWsTunnelLimitType = 'platform-tunnel-limit' (2)
the AC has reached the maximum tunnel capacity,
which depends on the platform.
When trpzWsTunnelLimitType = 'ap-ws-tunnel-limit' (3)
the AC has reached the AP-to-switch tunnels limit,
which depends on the current situation of the AC
(mobility domain, network domain, network resiliency status).
trpzRFNoiseSourceTrap
.1.3.6.1.4.1.14525.5.0.74
This trap is sent upon the appearance of a new noise source.
'trpzRadioMACAddress' indicates the listener
(the AP radio reporting the noise).
A given combination of noise source ID, listener and channel
should trigger this trap at most once every 15 minutes.
trpzM2UConvNotPossibleTrap
.1.3.6.1.4.1.14525.5.0.75
This trap is sent when multicast to unicast conversion is enabled
on the AP, but cannot be performed.
trpzM2UConvAvailabilityRestoredTrap
.1.3.6.1.4.1.14525.5.0.76
This trap is sent when the multicast to unicast conversion can be
resumed on the AP, after disruption.
trpzAutoTuneSuccessTrap
.1.3.6.1.4.1.14525.5.0.77
This trap is sent when an auto-tune operation completed successfully.
trpzAutoTuneFailureTrap
.1.3.6.1.4.1.14525.5.0.78
This trap is sent when an auto-tune operation failed to complete.
trpzClientDeAssociationTrap2
.1.3.6.1.4.1.14525.5.0.79
This trap is sent if a client de-association occurred.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
before deassociation;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientDeAssociationTrap.
trpzMpMichaelMICFailure
.1.3.6.1.4.1.14525.5.0.8
Two Michael MIC failures were seen within 60 seconds of each other.
Obsoleted by trpzMichaelMICFailure.
trpzClientRoamingTrap2
.1.3.6.1.4.1.14525.5.0.80
This trap is sent if a client roams from one location to another.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client,
after roam;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client, after roam.
Obsoletes trpzClientRoamingTrap.
trpzClientIpAddrChangeTrap2
.1.3.6.1.4.1.14525.5.0.81
This trap is sent when an IP address of a client changes.
The most likely cases for this are when the client first
connects to the network and when a new IPv6 global address is
assigned to the client.
The pair of objects trpzClientIpAddrType/trpzClientIpAddr
indicates the type and the value of the new IP address.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientIpAddrChangeTrap.
trpzClientDeAuthenticationTrap2
.1.3.6.1.4.1.14525.5.0.82
This trap is sent if a client de-authentication occurred.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientDeAuthenticationTrap.
trpzClientDynAuthorChangeSuccessTrap2
.1.3.6.1.4.1.14525.5.0.83
This trap is sent when the authorization attributes for a user
are dynamically changed by an authorized dynamic authorization
client.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientDynAuthorChangeSuccessTrap.
trpzClientDisconnectTrap2
.1.3.6.1.4.1.14525.5.0.84
This trap is sent when a client session is terminated administratively.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientDisconnectTrap.
trpzClientClearedTrap3
.1.3.6.1.4.1.14525.5.0.85
This trap is sent when a client session is cleared.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientClearedTrap,
trpzClientClearedTrap2.
trpzClientAuthorizationSuccessTrap5
.1.3.6.1.4.1.14525.5.0.86
This trap is sent when a client authorizes.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
trpzClientRadioType gives the type of radio used by this client.
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientAuthorizationSuccessTrap,
trpzClientAuthorizationSuccessTrap2,
trpzClientAuthorizationSuccessTrap3,
trpzClientAuthorizationSuccessTrap4.
trpzClientDeviceTypeChangeTrap
.1.3.6.1.4.1.14525.5.0.87
This trap is sent when the detected device type
of a client changes.
The new device type is indicated by trpzClientDeviceType.
trpzClientDeviceGroup indicates the group that
the new device type belongs to.
As of release 8.0, device detection is done only for
wireless clients (trpzClientAccessMode = 'ap').
trpzClientDeviceProfileChangeTrap
.1.3.6.1.4.1.14525.5.0.88
This trap is sent when the device profile for
a client device changes.
The new device profile is indicated by trpzClientDeviceProfileName.
trpzClientDeviceProfileChangeReason indicates the reason
why the device profile changed.
As of release 8.0, device detection is done only for
wireless clients (trpzClientAccessMode = 'ap').
trpzRFDetectRogueAPTrap
.1.3.6.1.4.1.14525.5.0.9
This trap is sent when RF detection finds a rogue AP.
XmtrMacAddr is the radio MAC address from the beacon.
ListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectRogueDeviceTrap2.