AI-AP-MIB

        This MIB is for managing Aruba Instant WLAN
    
aiMIB 1.3.6.1.4.1.14823.2.3.3.1
Imported Objects
ARUBA-MIB aiEnterpriseMibModules
SNMPv2-CONF OBJECT-GROUP
SNMPv2-SMI Counter32 Counter64 Integer32 IpAddress MODULE-IDENTITY NOTIFICATION-TYPE OBJECT-TYPE snmpModules
SNMPv2-TC DateAndTime DisplayString MacAddress PhysAddress RowStatus StorageType TestAndIncr TEXTUAL-CONVENTION TimeInterval TruthValue
Type Definitions (66)
ArubaAccessPointMode Enumeration
airMonitor(1)
accessPoint(2)
accessPointAndMonitor(3)
meshPortal(4)
meshPoint(5)
rfprotectSensor(6)
spectrumSensor(7)
ArubaACLAction Enumeration
deny(1)
permit(2)
srcNAT(3)
dstNAT(4)
redirect(5)
ArubaACLDomain Enumeration
alias(1)
any(2)
user(3)
host(4)
network(5)
ArubaACLNetworkServiceType Enumeration
alias(1)
any(2)
tcp(3)
udp(4)
protocol(5)
ArubaActiveState Enumeration
active(1)
inactive(2)
ArubaAddressType Enumeration
srcAddress(1)
dstAddress(2)
bssid(3)
ArubaAntennaSetting Enumeration
notPresent(1)
enabled(2)
disabled(3)
ArubaAPConductorStatus Enumeration
up(1)
down(2)
move(3)
ArubaAPMasterStatus Enumeration
up(1)
down(2)
move(3)
ArubaAPMatchMethod Enumeration
notApplicable(0)
exactMatch(1)
plusOneMatch(2)
minusOneMatch(3)
ouiMatch(4)
ArubaAPMatchType Enumeration
unknown(0)
configuredWiredMac(1)
ethernetWiredMac(2)
apWiredMac(3)
externalWiredMac(4)
manual(5)
baseBSSIDOverride(6)
mms(7)
ethernetGatewayWiredMac(8)
classificationDisabled(9)
apBSSID(10)
propagatedEthernetWiredMac(11)
apRule(12)
systemWiredMac(13)
systemGatewayMac(14)
ArubaAPStatus Enumeration
up(1)
down(2)
ArubaAPUplinkChangeReason Enumeration
linkFailure(1)
vpnFailure(2)
preemption(3)
internetFailover(4)
ArubaAPUplinkType Enumeration
ethernet(1)
usb(2)
pppoe(3)
wifi(4)
ArubaARMChangeReason Enumeration
radarDetected(1)
radarCleared(2)
txHang(3)
txHangClear(4)
fortyMhzIntol(5)
cancel40mhzIntol(6)
fortyMhzAlign(7)
armInterference(8)
armInvalidCh(9)
armErrorThresh(10)
armNoiseThresh(11)
armEmptyCh(12)
armRogueCont(13)
armDecreasePower(14)
armIncreasePower(15)
armTurnOffRadio(16)
armTurnOnRadio(17)
ArubaAuthenticationMethods Enumeration
none(0)
web(1)
mac(2)
vpn(3)
dot1x(4)
kerberos(5)
secureId(7)
pubcookie(15)
xSec(16)
xSecMachine(17)
via-vpn(28)
other(255)
ArubaAuthServerType Enumeration
internaldb(1)
radius(2)
ldap(3)
kerberos(4)
tacacs(5)
ArubaBlackListReason Enumeration
userDefined(1)
mitmAttack(2)
authFailure(3)
pingFlood(4)
sessionFlood(5)
synFlood(6)
sessionBlacklist(7)
ipSpoofing(8)
esiBlacklist(9)
other(100)
ArubaCallStates Enumeration
idle(0)
initiated(1)
connecting(2)
delivered(3)
connected(4)
offered(5)
alerting(6)
releasing(7)
cancelling(8)
challenging(9)
transient(10)
blockwait(11)
succ(12)
fail(13)
aborted(14)
blocked(15)
ArubaCardType Enumeration
lc1(1)
lc2(2)
sc1(3)
sc2(4)
sw2400(5)
sw800(6)
sw200(7)
m3mk1(8)
sw3200(9)
sw3400(10)
sw3600(11)
sw650(12)
sw651(13)
reserved1(14)
reserved2(15)
sw620(16)
ArubaConfigurationChangeType Enumeration
create(1)
delete(2)
modify(3)
ArubaConfigurationState Enumeration
success(1)
error(2)
ArubaDaysOfWeek Enumeration
sun(1)
mon(2)
tue(3)
wed(4)
thu(5)
fri(6)
sat(7)
ArubaDBType Enumeration
mssql(1)
mysql(2)
ArubaDenyListReason Enumeration
userDefined(1)
mitmAttack(2)
authFailure(3)
pingFlood(4)
sessionFlood(5)
synFlood(6)
sessionDenylist(7)
ipSpoofing(8)
esiDenylist(9)
other(100)
ArubaDot1dState Enumeration
disabled(1)
blocked(2)
listening(3)
learning(4)
forwarding(5)
ArubaEnableValue Enumeration
enabled(1)
disabled(2)
ArubaEncryptionMethods Bits
disabled(0)
static-wep(1)
dynamic-wep(2)
static-wpa(3)
dynamic-wpa(4)
wpa2-psk-aes(5)
wpa2-8021x-aes(6)
wpa2PreAuth(7)
xsec(8)
wpa-psk-aes(9)
wpa-aes(10)
wpa2-psk-tkip(11)
wpa2-8021x-tkip(12)
bSec-128(13)
bSec-256(14)
owe-aes(16)
wpa3-sae-aes(17)
wpa3-cnsa(18)
wpa3-aes-ccm-128(19)
mpsk-aes(21)
wpa3-aes-gcm-256(22)
ArubaEncryptionType Enumeration
none(0)
static-wep(1)
dynamic-wep(2)
wpa-psk-tkip(3)
wpa-tkip(4)
wpa-psk-aes(5)
wpa-aes(6)
wpa2-psk-tkip(7)
wpa2-tkip(8)
wpa2-psk-aes(9)
wpa2-aes(10)
xSec(11)
bSec-128(12)
bSec-256(13)
aes-128-cmac(14)
unknown(15)
ft-psk(16)
ft-8021x(17)
wpa3-cnsa(18)
owe-aes(20)
wpa3-sae-aes(21)
wpa3-aes-gcmp-256(22)
ArubaEnet1Mode Enumeration
activeStandby(1)
tunnel(2)
bridge(3)
notApplicable(4)
split(5)
ArubaESIServerMode Enumeration
bridged(1)
routed(2)
nat(3)
ArubaESIServerStatus Enumeration
up(1)
down(2)
ArubaFrameType Enumeration
associateRequest(0)
associateResponse(1)
reassociateRequest(2)
reassociateResponse(3)
probeRequest(4)
probeResponse(5)
beacon(8)
atim(9)
disassociate(10)
auth(11)
deauth(12)
ArubaHashAlgorithms Enumeration
md5(1)
sha(2)
ArubaHTExtChannel Enumeration
none(1)
above(2)
below(3)
ArubaHTMode Enumeration
none(1)
ht20(2)
ht40(3)
vht20(4)
vht40(5)
vht80(6)
vht160(7)
vht80plus80(8)
he20(9)
he40(10)
he80(11)
he160(12)
he80plus80(13)
ArubaHTRate Enumeration
unknown(0)
ht6dot5(1)
ht13(2)
ht13dot5(3)
ht15(4)
ht19dot5(5)
ht26(6)
ht27(7)
ht30(8)
ht39(9)
ht40dot5(10)
ht45(11)
ht52(12)
ht54(13)
ht58dot5(14)
ht60(15)
ht65(16)
ht78(17)
ht81(18)
ht90(19)
ht104(20)
ht108(21)
ht117(22)
ht120(23)
ht121dot5(24)
ht130(25)
ht135(26)
ht150(27)
ht162(28)
ht180(29)
ht216(30)
ht240(31)
ht243(32)
ht270(33)
ht300(34)
ArubaIfType Enumeration
port(1)
vlan(2)
tunnel(3)
loopback(4)
ArubaMeshRole Enumeration
nonmesh(0)
point(1)
portal(2)
ArubaMonAuthAlgorithm Enumeration
none(0)
psk(1)
dot1x(2)
ft8021x(3)
ftpsk(4)
dot1x256(5)
psk256(6)
tdls(7)
sae(8)
ftsae(9)
other(10)
suiteb(11)
owe(12)
ArubaMonEncryptionCipher Enumeration
none(0)
wep40(1)
wep104(2)
tkip(3)
aesccmp(4)
other(5)
gcm256(6)
ArubaMonEncryptionType Enumeration
open(0)
wep(1)
wpa(2)
wpa2(3)
wpa3(4)
ArubaMonitorMode Enumeration
unknown(0)
all(1)
none(2)
mixed(3)
ArubaOperStateValue Enumeration
up(1)
down(2)
testing(3)
ArubaPhyType Enumeration
dot11a(1)
dot11b(2)
dot11g(3)
dot11ag(4)
wired(5)
dot11ax6ghz(6)
ArubaPoeState Enumeration
disabled(1)
enabled(2)
enabledCisco(3)
notAvailable(4)
ArubaPortalServerDownReason Enumeration
connectFail(1)
ArubaPortDuplex Enumeration
half(1)
full(2)
auto(3)
ArubaPortMode Enumeration
access(1)
dot1q(2)
ArubaPortSpeed Enumeration
speed10Mbps(1)
speed100Mbps(2)
speed1000Mbps(3)
speedAuto(4)
speed10Gbps(5)
ArubaPortType Enumeration
fastethernet(1)
gigabitethernet(2)
xgigabitethernet(3)
ArubaRogueApType Enumeration
valid(1)
interfering(2)
unsecure(3)
dos(4)
unknown(5)
knownInterfering(6)
suspectedUnsecure(7)
ArubaStationType Enumeration
valid(1)
interfering(2)
dos(3)
ArubaSubAuthenticationMethods Enumeration
authPAP(1)
authCHAP(2)
authMSCHAP(3)
authMSCHAPv2(4)
eapTLS(5)
eapTTLS(6)
eapLEAP(7)
eapMD5(8)
eapPEAP(9)
ArubaSupportStatus Enumeration
unsupported(1)
supported(2)
ArubaSwitchRole Enumeration
conductor(1)
local(2)
backupconductor(3)
ArubaUnprovisionedStatus Enumeration
yes(1)
no(2)
ArubaUSBStatus Enumeration
unknown(0)
notPresent(1)
inactive(2)
active(3)
ArubaUserForwardMode Enumeration
tunnel-encrypted(0)
bridge(1)
tunnel-decrypted(2)
split-tunnel(3)
ArubaVlanValidRange Integer32 range: 1..4095
ArubaVoiceCacBit Bits
cacActiveLoadBalancing(0)
cacHighCapThresholdReached(1)
cacHandRsrvThresholdReached(2)
cacPeakCapacityReached(3)
ArubaVoiceCdrDirection Enumeration
og(0)
ic(1)
ArubaVoipProtocol Enumeration
sccp(1)
svp(2)
vocera(3)
sip(9)
ua(11)
ArubaVoipProtocolType Enumeration
sccp(1)
svp(2)
vocera(3)
sip(4)
unknown(10)
ArubaVoipRegState Enumeration
unknown(0)
registering(1)
unregistering(2)
challenge(3)
registered(4)
unregistered(5)
ArubaVrrpState Enumeration
initialize(1)
backup(2)
master(3)
Objects (254)
aiMIB .1.3.6.1.4.1.14823.2.3.3.1
aiInfoGroup .1.3.6.1.4.1.14823.2.3.3.1.1
aiVirtualControllerKey SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.1
aiMeshTable .1.3.6.1.4.1.14823.2.3.3.1.1.15
aiMeshEntry aiMeshIndex .1.3.6.1.4.1.14823.2.3.3.1.1.15.1
aiMeshIndex Integer32 .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.1
aiMeshPointMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.2
aiMeshPortalMac SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.3
aiMeshChannel SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.4
aiMeshAvgRssi Integer32 .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.5
aiMeshHops Integer32 .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.6
aiMeshAge Integer32 .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.7
aiMeshCost SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.8
aiMeshRelation SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.9
aiConductorIPAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.1.16
aiVirtualControllerName SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.2
aiVirtualControllerOrganization SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.3
aiVirtualControllerVersion SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.4
aiVirtualControllerIPAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.1.5
aiMasterIPAddress obsolete SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.1.6
aiWlanSSIDTable .1.3.6.1.4.1.14823.2.3.3.1.1.7
aiWlanSSIDEntry aiSSIDIndex .1.3.6.1.4.1.14823.2.3.3.1.1.7.1
aiSSIDIndex Integer32 .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.1
aiSSID OctetString .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.2
aiSSIDStatus Enumeration .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.3
aiSSIDClientNum Integer32 .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.4
aiSSIDHide Enumeration .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.5
aiInterferAccessPointTable .1.3.6.1.4.1.14823.2.3.3.1.1.8
aiInterferAccessPointEntry aiInterferAPIndex .1.3.6.1.4.1.14823.2.3.3.1.1.8.1
aiInterferAPIndex Integer32 .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.1
aiInterferAPBSSID SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.2
aiInterferAPESSID OctetString .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.3
aiInterferAPChannel SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.4
aiInterferAPPhyType SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.5
aiInterferAPEncr SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.6
aiInterferAPAvgSnr Integer32 .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.7
aiInterferAPType SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.8
aiStateGroup .1.3.6.1.4.1.14823.2.3.3.1.2
aiAccessPointTable .1.3.6.1.4.1.14823.2.3.3.1.2.1
aiAccessPointEntry aiAPMACAddress .1.3.6.1.4.1.14823.2.3.3.1.2.1.1
aiAPMACAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.1
aiAPTotalMemory Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.10
aiAPStatus Enumeration .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.11
aiAPHwopmode Enumeration .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.12
aiAPRole SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.13
aiAPName OctetString .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.2
aiAPIPAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.3
aiAPSerialNum OctetString .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.4
aiAPModel ObjectIdentifier .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.5
aiAPModelName OctetString .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.6
aiAPCPUUtilization Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.7
aiAPMemoryFree Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.8
aiAPUptime SNMPv2-SMITimeTicks .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.9
aiRadioTable .1.3.6.1.4.1.14823.2.3.3.1.2.2
aiRadioEntry aiRadioAPMACAddressaiRadioIndex .1.3.6.1.4.1.14823.2.3.3.1.2.2.1
aiRadioAPMACAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.1
aiRadioTxMgmtFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.10
aiRadioTxDataFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.11
aiRadioTxDataBytes SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.12
aiRadioTxDrops SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.13
aiRadioRxTotalFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.14
aiRadioRxDataFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.15
aiRadioRxDataBytes SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.16
aiRadioRxMgmtFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.17
aiRadioRxBad SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.18
aiRadioPhyEvents SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.19
aiRadioIndex Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.2
aiRadioStatus Enumeration .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.20
aiRadioClientNum Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.21
aiRadioMode SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.22
aiRadioMACAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.3
aiRadioChannel SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.4
aiRadioTransmitPower Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.5
aiRadioNoiseFloor Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.6
aiRadioUtilization4 Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.7
aiRadioUtilization64 Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.8
aiRadioTxTotalFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.9
aiWlanTable .1.3.6.1.4.1.14823.2.3.3.1.2.3
aiWlanEntry aiWlanAPMACAddressaiWlanIndex .1.3.6.1.4.1.14823.2.3.3.1.2.3.1
aiWlanAPMACAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.1
aiWlanRxDataBytes SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.10
aiWlanIndex Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.2
aiWlanESSID SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.3
aiWlanMACAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.4
aiWlanTxTotalFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.5
aiWlanTxDataFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.6
aiWlanTxDataBytes SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.7
aiWlanRxTotalFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.8
aiWlanRxDataFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.9
aiClientTable .1.3.6.1.4.1.14823.2.3.3.1.2.4
aiClientEntry aiClientMACAddress .1.3.6.1.4.1.14823.2.3.3.1.2.4.1
aiClientMACAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.1
aiClientTxRetries SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.10
aiClientTxRate Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.11
aiClientRxDataFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.12
aiClientRxDataBytes SNMPv2-SMICounter64 .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.13
aiClientRxRetries SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.14
aiClientRxRate Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.15
aiClientUptime SNMPv2-SMITimeTicks .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.16
aiClientPhyType ArubaPhyType .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.17
aiClientHtMode ArubaHTMode .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.18
aiClientWlanMACAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.2
aiClientIPAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.3
aiClientAPIPAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.4
aiClientName SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.5
aiClientOperatingSystem SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.6
aiClientSNR Integer32 .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.7
aiClientTxDataFrames SNMPv2-SMICounter32 .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.8
aiClientTxDataBytes SNMPv2-SMICounter64 .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.9
aiVoiceClientTable .1.3.6.1.4.1.14823.2.3.3.1.2.5
aiVoiceClientEntry aiClientMac .1.3.6.1.4.1.14823.2.3.3.1.2.5.1
aiClientMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.2.5.1.1
aiClientIP SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.2.5.1.2
aiClientAPMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.2.5.1.3
aiClientAPName SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.2.5.1.4
aiTrapsGroup .1.3.6.1.4.1.14823.2.3.3.1.200
aiTrapObjectsGroup .1.3.6.1.4.1.14823.2.3.3.1.200.1
wlsxTrapAPMacAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.1
wlsxReceiverMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.10
wlsxTrapAPPrevMode ArubaAccessPointMode .1.3.6.1.4.1.14823.2.3.3.1.200.1.100
wlsxTrapAPARMChangeReason ArubaARMChangeReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.101
wlsxTrapAPChannelSec ArubaHTExtChannel .1.3.6.1.4.1.14823.2.3.3.1.200.1.102
wlsxTrapUserAttributeChangeType ArubaConfigurationChangeType .1.3.6.1.4.1.14823.2.3.3.1.200.1.103
wlsxTrapApControllerIp SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.104
wlsxTrapApMasterStatus obsolete ArubaAPMasterStatus .1.3.6.1.4.1.14823.2.3.3.1.200.1.105
wlsxTrapCaName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.106
wlsxTrapCrlName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.107
wlsxTrapCount Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.108
wlsxTrapTransmitterMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.11
wlsxTrapReceiverMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.12
wlsxTrapSnr Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.13
wlsxTrapAPPreviousUplinkType ArubaAPUplinkType .1.3.6.1.4.1.14823.2.3.3.1.200.1.130
wlsxTrapAPPreviousUplinkActiveTime SNMPv2-SMITimeTicks .1.3.6.1.4.1.14823.2.3.3.1.200.1.131
wlsxTrapAPActiveUplinkType ArubaAPUplinkType .1.3.6.1.4.1.14823.2.3.3.1.200.1.132
wlsxTrapAPUplinkChangeReason ArubaAPUplinkChangeReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.133
wlsxTrapAPManagedModeConfigFailure OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.138
wlsxTrapAuthServerAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.139
wlsxTrapSignatureName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.14
wlsxTrapPortalServerName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.140
wlsxTrapPortalServerAddress OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.141
wlsxTrapPortalServerDownReason ArubaPortalServerDownReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.142
wlsxTrapStationBlackListReasonStr obsolete OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.144
wlsxTrapAPUSBStatus OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.147
wlsxTrapUSBVendorProductID OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.148
wlsxTrapFrameType ArubaFrameType .1.3.6.1.4.1.14823.2.3.3.1.200.1.15
wlsxTrapAuthFailureReason OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.155
wlsxTrapStationDenyListReason ArubaDenyListReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.156
wlsxTrapStationDenyListReasonStr OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.157
wlsxTrapConductorIp SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.158
wlsxTrapConductorName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.159
wlsxTrapAddressType ArubaAddressType .1.3.6.1.4.1.14823.2.3.3.1.200.1.16
wlsxTrapApConductorStatus ArubaAPConductorStatus .1.3.6.1.4.1.14823.2.3.3.1.200.1.160
wlsxTrapAPHTMode ArubaHTMode .1.3.6.1.4.1.14823.2.3.3.1.200.1.161
wlsxTrapAPPhyType ArubaPhyType .1.3.6.1.4.1.14823.2.3.3.1.200.1.162
wlsxTrapAPPrevHTMode ArubaHTMode .1.3.6.1.4.1.14823.2.3.3.1.200.1.163
wlsxTrapAPPrevPhyType ArubaPhyType .1.3.6.1.4.1.14823.2.3.3.1.200.1.164
wlsxTrapAPSecChannel Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.165
wlsxTrapAPBand OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.166
wlsxTrapTargetAPBand OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.167
wlsxTrapMatchedIpv6 OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.168
wlsxTrapAPLocation OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.17
wlsxTrapAPChannel Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.18
wlsxTrapAPTxPower Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.19
wlsxTrapAPIpAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.2
wlsxTrapMatchedMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.20
wlsxTrapMatchedIp SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.21
wlsxTrapRogueIfoURL OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.22
wlsxTrapVlanId Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.23
wlsxTrapAdminStatus ArubaEnableValue .1.3.6.1.4.1.14823.2.3.3.1.200.1.24
wlsxTrapOperStatus ArubaOperStateValue .1.3.6.1.4.1.14823.2.3.3.1.200.1.25
wlsxTrapAuthServerName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.26
wlsxTrapAuthServerTimeout Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.27
wlsxTrapCardSlot Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.28
wlsxTrapTemperatureValue OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.29
wlsxTrapAPBSSID SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.3
wlsxTrapProcessName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.30
wlsxTrapFanNumber Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.31
wlsxTrapVoltageType OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.32
wlsxTrapVoltageValue OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.33
wlsxTrapStationBlackListReason obsolete ArubaBlackListReason .1.3.6.1.4.1.14823.2.3.3.1.200.1.34
wlsxTrapSpoofedIpAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.35
wlsxTrapSpoofedOldPhyAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.36
wlsxTrapSpoofedNewPhyAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.37
wlsxTrapDBName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.38
wlsxTrapDBUserName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.39
wlsxTrapEssid OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.4
wlsxTrapDBIpAddress OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.40
wlsxTrapDBType ArubaDBType .1.3.6.1.4.1.14823.2.3.3.1.200.1.41
wlsxTrapVrrpID Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.42
wlsxTrapVrrpMasterIp SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.43
wlsxTrapVrrpOperState ArubaVrrpState .1.3.6.1.4.1.14823.2.3.3.1.200.1.44
wlsxTrapESIServerGrpName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.45
wlsxTrapESIServerName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.46
wlsxTrapESIServerIpAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.47
wlsxTrapLicenseDaysRemaining Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.48
wlsxTrapSwitchIp SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.49
wlsxTrapTargetAPBSSID SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.5
wlsxTrapSwitchRole ArubaSwitchRole .1.3.6.1.4.1.14823.2.3.3.1.200.1.50
wlsxTrapUserIpAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.51
wlsxTrapUserPhyAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.52
wlsxTrapUserName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.53
wlsxTrapUserRole OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.54
wlsxTrapUserAuthenticationMethod ArubaAuthenticationMethods .1.3.6.1.4.1.14823.2.3.3.1.200.1.55
wlsxTrapAPRadioNumber Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.56
wlsxTrapRogueInfoURL OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.57
wlsxTrapInterferingAPInfoURL OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.58
wlsxTrapPortNumber Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.59
wlsxTrapTargetAPSSID OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.6
wlsxTrapTime SNMPv2-TCDateAndTime .1.3.6.1.4.1.14823.2.3.3.1.200.1.60
wlsxTrapHostIp SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.61
wlsxTrapHostPort Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.62
wlsxTrapConfigurationId Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.63
wlsxTrapCTSURL OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.64
wlsxTrapCTSTransferType OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.65
wlsxTrapConfigurationState ArubaConfigurationState .1.3.6.1.4.1.14823.2.3.3.1.200.1.66
wlsxTrapUpdateFailureReason OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.67
wlsxTrapUpdateFailedObj OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.68
wlsxTrapTableEntryChangeType ArubaConfigurationChangeType .1.3.6.1.4.1.14823.2.3.3.1.200.1.69
wlsxTrapTargetAPChannel Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.7
wlsxTrapGlobalConfigObj OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.70
wlsxTrapTableGenNumber Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.71
wlsxTrapLicenseId Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.72
wlsxTrapConfidenceLevel Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.73
wlsxTrapMissingLicenses OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.74
wlsxVoiceCurrentNumCdr Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.75
wlsxTrapTunnelId Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.76
wlsxTrapTunnelStatus Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.77
wlsxTrapTunnelUpReason OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.78
wlsxTrapTunnelDownReason OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.79
wlsxTrapNodeMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.8
wlsxTrapApSerialNumber OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.80
wlsxTrapTimeStr OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.81
wlsxTrapMasterIp obsolete SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.82
wlsxTrapLocalIp SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.83
wlsxTrapMasterName obsolete OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.84
wlsxTrapLocalName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.85
wlsxTrapPrimaryControllerIp SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.86
wlsxTrapBackupControllerIp SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.87
wlsxTrapSpoofedFrameType OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.88
wlsxTrapAssociationType OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.89
wlsxTrapSourceMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.9
wlsxTrapDeviceIpAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.90
wlsxTrapDeviceMac SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.91
wlsxTrapVcIpAddress SNMPv2-SMIIpAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.92
wlsxTrapVcMacAddress SNMPv2-TCMacAddress .1.3.6.1.4.1.14823.2.3.3.1.200.1.93
wlsxTrapAPName OctetString .1.3.6.1.4.1.14823.2.3.3.1.200.1.94
wlsxTrapApMode Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.95
wlsxTrapAPPrevChannel Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.96
wlsxTrapAPPrevChannelSec ArubaHTExtChannel .1.3.6.1.4.1.14823.2.3.3.1.200.1.97
wlsxTrapAPPrevTxPower Integer32 .1.3.6.1.4.1.14823.2.3.3.1.200.1.98
wlsxTrapAPCurMode ArubaAccessPointMode .1.3.6.1.4.1.14823.2.3.3.1.200.1.99
aiTrapDefinitionsGroup .1.3.6.1.4.1.14823.2.3.3.1.200.2
aiManagedInfoGroup .1.3.6.1.4.1.14823.2.3.3.1.3
aiManagedModeSinceLastSync SNMPv2-TCDisplayString .1.3.6.1.4.1.14823.2.3.3.1.3.1
Notifications / Traps (171)
NameOIDDescription
wlsxNodeRateAnomaly .1.3.6.1.4.1.14823.2.3.3.1.200.2.1003
This trap indicates that a node is exceeding the threshold set for 
the frame type.
wlsxNUserEntryCreated .1.3.6.1.4.1.14823.2.3.3.1.200.2.1014
This trap indicates that a new user was created.
wlsxNUserEntryDeleted .1.3.6.1.4.1.14823.2.3.3.1.200.2.1015
This trap indicates that a user was deleted.
wlsxNUserEntryAuthenticated .1.3.6.1.4.1.14823.2.3.3.1.200.2.1016
This trap indicates that a user is Authenticated.
wlsxNUserEntryDeAuthenticated .1.3.6.1.4.1.14823.2.3.3.1.200.2.1017
This trap indicates that a user is Deauthenticated.
wlsxNUserAuthenticationFailed .1.3.6.1.4.1.14823.2.3.3.1.200.2.1018
This trap indicates that a user authentication has failed.
wlsxNAuthServerReqTimedOut .1.3.6.1.4.1.14823.2.3.3.1.200.2.1019
This trap indicates that the authentication server request timed out.
wlsxNAuthServerTimedOut .1.3.6.1.4.1.14823.2.3.3.1.200.2.1020
This trap indicates that the authentication server timed out.
wlsxNAuthServerIsUp .1.3.6.1.4.1.14823.2.3.3.1.200.2.1021
This trap indicates that an authentication server is up.
wlsxNAccessPointIsUp .1.3.6.1.4.1.14823.2.3.3.1.200.2.1040
A Trap which indicates that an access point up.
wlsxNAccessPointIsDown .1.3.6.1.4.1.14823.2.3.3.1.200.2.1041
A Trap which indicates that an access point down.
wlsxNChannelChanged .1.3.6.1.4.1.14823.2.3.3.1.200.2.1043
This trap indicates that an access point at Location 
wlsxTrapAPLocation has changed the channel.
wlsxNStationAddedToBlackList .1.3.6.1.4.1.14823.2.3.3.1.200.2.1044
This trap indicates that the station is black listed. 
**NOTE: this notification is obsoleted and replaced by
wlsxNStationAddedToDenyList.
wlsxNStationRemovedFromBlackList .1.3.6.1.4.1.14823.2.3.3.1.200.2.1045
This trap indicates that the station is removed from the black list. 
**NOTE: this notification is obsoleted and replaced by
wlsxNStationRemovedFromDenyList
wlsxNRadioAttributesChanged .1.3.6.1.4.1.14823.2.3.3.1.200.2.1049
A Trap which indicates changes in the Radio attributes of an 
access point.
wlsxUnsecureAPDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1053
This trap indicates that an unauthorized access point is connected to the wired network. The access point is declared Rogue because it was matched to a MAC address.
wlsxUnsecureAPResolved .1.3.6.1.4.1.14823.2.3.3.1.200.2.1054
This trap indicates that a previously detected access point, classified as Rogue,
is no longer present in the network.
wlsxStaImpersonation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1055
This trap indicates that an AM detected Station Impersonation.
wlsxReservedChannelViolation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1056
This trap indicates that an AM detected an access point
which is violating the Reserved Channel configuration.
wlsxValidSSIDViolation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1057
This trap indicates that an AP has detected an access point is violating 
Valid SSID configuration by using an SSID that is reserved for use by a valid AP only.
wlsxChannelMisconfiguration .1.3.6.1.4.1.14823.2.3.3.1.200.2.1058
This trap indicates that an AP detected an access point that has a channel misconfiguration 
because it is using a channel that is not valid.
wlsxOUIMisconfiguration .1.3.6.1.4.1.14823.2.3.3.1.200.2.1059
This trap indicates that an AP detected an access point that has an OUI misconfiguration because
it is using an OUI that is not valid.
wlsxSSIDMisconfiguration .1.3.6.1.4.1.14823.2.3.3.1.200.2.1060
This trap indicates that an AP detected an access point that has an SSID misconfiguration because it is using
an SSID that is not valid.
wlsxShortPreableMisconfiguration .1.3.6.1.4.1.14823.2.3.3.1.200.2.1061
This trap indicates that an access point has bad Short preamble
configuration.
wlsxWPAMisconfiguration .1.3.6.1.4.1.14823.2.3.3.1.200.2.1062
This trap indicates that an AP detected an access point that is misconfigured because it is not using WPA.
wlsxAdhocNetworkDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1063
This trap indicates that an AM has detected an Ad hoc
network.
wlsxAdhocNetworkRemoved .1.3.6.1.4.1.14823.2.3.3.1.200.2.1064
This trap indicates that a previously detected Ad hoc Network is no
longer present in the network.
wlsxStaPolicyViolation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1065
This trap indicates that Protection was enforced because a valid station's association to a non-valid access point violated Valid Station policy.
wlsxRepeatWEPIVViolation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1066
This trap indicates that an AP detected that a valid access point is using the same WEP initialization vector in consecutive packets.
wlsxWeakWEPIVViolation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1067
This trap indicates that an AP detected that a valid access point is using a Weak WEP initialization vector.
wlsxChannelInterferenceDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1068
This trap indicates that an AP has detected channel interference.
wlsxChannelInterferenceCleared .1.3.6.1.4.1.14823.2.3.3.1.200.2.1069
This trap indicates that a previously detected channel interference
is no longer present.
wlsxAPInterferenceDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1070
This trap indicates that an AP has detected interference for an access point.
wlsxAPInterferenceCleared .1.3.6.1.4.1.14823.2.3.3.1.200.2.1071
This trap indicates that the previously detected interference for an access point
is no longer present.
wlsxStaInterferenceDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1072
This trap indicates that an AP has detected interference for a station.
wlsxStaInterferenceCleared .1.3.6.1.4.1.14823.2.3.3.1.200.2.1073
This trap indicates that the previously detected interference for a station
is no longer present.
wlsxFrameRetryRateExceeded .1.3.6.1.4.1.14823.2.3.3.1.200.2.1074
This trap indicates that an AP detected that an access point has exceeded the configured upper threshold for Frame Retry Rate.
wlsxFrameReceiveErrorRateExceeded .1.3.6.1.4.1.14823.2.3.3.1.200.2.1075
This trap indicates that an AP detected that an access point has exceeded the configured upper threshold for Frame Receive Error Rate.
wlsxFrameFragmentationRateExceeded .1.3.6.1.4.1.14823.2.3.3.1.200.2.1076
This trap indicates that an AP detected that an access point exceeded the configured upper threshold for Frame Fragmentation Rate.
wlsxFrameBandWidthRateExceeded .1.3.6.1.4.1.14823.2.3.3.1.200.2.1077
This trap indicates that an AP detected that a station or access point has exceeded the configured upper threshold for Bandwidth rate.
wlsxFrameLowSpeedRateExceeded .1.3.6.1.4.1.14823.2.3.3.1.200.2.1078
This trap indicates that an AP detected that a station has exceeded the configured upper threshold for Low speed rate.
wlsxFrameNonUnicastRateExceeded .1.3.6.1.4.1.14823.2.3.3.1.200.2.1079
This trap indicates that an AP detected that a station has exceeded the configured upper threshold for Non Unicast traffic rate.
wlsxLoadbalancingEnabled .1.3.6.1.4.1.14823.2.3.3.1.200.2.1080
This trap indicates that an AM is reporting that an AP 
has enabled Load balancing.
wlsxLoadbalancingDisabled .1.3.6.1.4.1.14823.2.3.3.1.200.2.1081
This trap indicates that an AM is reporting that an AP
has enabled Load balancing.
wlsxChannelFrameRetryRateExceeded .1.3.6.1.4.1.14823.2.3.3.1.200.2.1082
This trap indicates that an AP has detected that the configured upper threshold for Frame Retry Rate was exceeded on a channel.
wlsxChannelFrameFragmentationRateExceeded .1.3.6.1.4.1.14823.2.3.3.1.200.2.1083
This trap indicates that an AP has detected that the configured upper threshold for Frame Fragmentation Rate was exceeded on a channel.
wlsxChannelFrameErrorRateExceeded .1.3.6.1.4.1.14823.2.3.3.1.200.2.1084
This trap indicates that an AP has detected that the configured upper threshold for Frame Receive Error Rate was exceeded on a channel.
wlsxSignatureMatchAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1085
This trap indicates that an AP detected a signature match in a frame from an access point.
wlsxSignatureMatchSta .1.3.6.1.4.1.14823.2.3.3.1.200.2.1086
This trap indicates that an AP detected a signature match in a frame from a Station.
wlsxChannelRateAnomaly .1.3.6.1.4.1.14823.2.3.3.1.200.2.1087
This trap indicates that an AP detected frames on a channel which 
exceed the configured IDS rate threshold.
wlsxNodeRateAnomalyAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1088
This trap indicates that an AP detected frames transmitted or received by an 
access point, which exceed the configured IDS rate threshold.
wlsxNodeRateAnomalySta .1.3.6.1.4.1.14823.2.3.3.1.200.2.1089
This trap indicates that an AP detected frames transmitted or received by a 
node, which exceed the configured IDS rate threshold.
wlsxEAPRateAnomaly .1.3.6.1.4.1.14823.2.3.3.1.200.2.1090
This trap indicates that the rate of EAP Handshake packets 
received by an AP has exceeded the configured IDS EAP Handshake rate threshold.
wlsxSignalAnomaly .1.3.6.1.4.1.14823.2.3.3.1.200.2.1091
This trap indicates that an AM detected a Signal Anomaly.
wlsxSequenceNumberAnomalyAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1092
This trap indicates that an AM received packets from an AP
which exceeds the acceptable sequence number difference. 
The acceptable sequence number difference is an IDS configuration 
object.
wlsxSequenceNumberAnomalySta .1.3.6.1.4.1.14823.2.3.3.1.200.2.1093
This trap indicates that an AM received packets from a Node
which exceeds the acceptable sequence number difference. 
The acceptable sequence number difference is an IDS configuration 
object.
wlsxDisconnectStationAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1094
This trap indicates that an AM detected a station Disconnect 
attack.
wlsxApFloodAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1095
This trap indicates that the number of potential fake APs detected by 
an AP has exceeded the configured IDS threshold. This is the total number of fake APs observed across all bands.
wlsxAdhocNetwork .1.3.6.1.4.1.14823.2.3.3.1.200.2.1096
This trap indicates that an AM detected an Ad hoc 
Network. An Station is connected to an ad hoc AP.
wlsxWirelessBridge .1.3.6.1.4.1.14823.2.3.3.1.200.2.1097
This trap indicates that an AP detected a Wireless Bridge when a WDS frame was seen between the transmitter and receiver addresses.
wlsxInvalidMacOUIAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1098
This trap indicates that an AP detected an invalid MAC OUI in the BSSID of a frame.  An invalid MAC OUI suggests that the frame may be spoofed.
wlsxInvalidMacOUISta .1.3.6.1.4.1.14823.2.3.3.1.200.2.1099
This trap indicates that an AP detected an invalid MAC OUI in the SRC or DST address of a frame. An invalid MAC OUI suggests that the frame may be spoofed.
wlsxWEPMisconfiguration .1.3.6.1.4.1.14823.2.3.3.1.200.2.1100
This trap indicates that an AP detected an access point that is misconfigured because it does not have Privacy enabled.
wlsxStaRepeatWEPIVViolation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1101
This trap indicates that an AP detected that a valid station is using the same WEP initialization vector in consecutive packets.
wlsxStaWeakWEPIVViolation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1102
This trap indicates that an AP detected that a valid station is using a Weak WEP initialization vector.
wlsxStaAssociatedToUnsecureAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1103
This trap indicates that an AM detected a client associated
with a Rogue access point.
wlsxStaUnAssociatedFromUnsecureAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1104
This trap indicates that a previously detected rogue access point 
association is no longer present.
wlsxAdhocNetworkBridgeDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1105
This trap indicates that an AM has detected an Ad hoc
network that is bridging to a wired network
wlsxInterferingApDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1106
This trap indicates that an AP detected an access point classified as Interfering. The access point 
is declared Interfering because it is neither authorized or classified as Rogue.
wlsxColdStart .1.3.6.1.4.1.14823.2.3.3.1.200.2.1111
An enterprise version of cold start trap, which contains the controller time stamp.
wlsxWarmStart .1.3.6.1.4.1.14823.2.3.3.1.200.2.1112
An enterprise version of warm start trap, which contains the controller time stamp.
wlsxAPImpersonation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1113
This trap indicates that an AP detected AP Impersonation because the number of beacons seen has exceeded the expected number by the configured percentage threshold.
The expected number is calculated based on the Beacon Interval Field in the Beacon frame.
wlsxNAuthServerIsDown .1.3.6.1.4.1.14823.2.3.3.1.200.2.1115
This trap indicates that an authentication server is down.
wlsxWindowsBridgeDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1129
This trap indicates that an AM has detected a station
that is bridging from a wireless network 
to a wired network
wlsxSignAPNetstumbler .1.3.6.1.4.1.14823.2.3.3.1.200.2.1134
This trap indicates that an AP detected a signature match for Netstumbler from an access point.
wlsxSignStaNetstumbler .1.3.6.1.4.1.14823.2.3.3.1.200.2.1135
This trap indicates that an AP detected a signature match for Netstumbler from a Station.
wlsxSignAPAsleap .1.3.6.1.4.1.14823.2.3.3.1.200.2.1136
This trap indicates that an AP detected a signature match for ASLEAP from an access point.
wlsxSignStaAsleap .1.3.6.1.4.1.14823.2.3.3.1.200.2.1137
This trap indicates that an AP detected a signature match for ASLEAP from a Station.
wlsxSignAPAirjack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1138
This trap indicates that an AP detected a signature match for AirJack from an access point.
wlsxSignStaAirjack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1139
This trap indicates that an AP detected a signature match for AirJack from a Station.
wlsxSignAPNullProbeResp .1.3.6.1.4.1.14823.2.3.3.1.200.2.1140
This trap indicates that an AP detected a signature match for Null-Probe-Response from an access point.
wlsxSignStaNullProbeResp .1.3.6.1.4.1.14823.2.3.3.1.200.2.1141
This trap indicates that an AP detected a signature match for Null-Probe-Response from a Station.
wlsxSignAPDeauthBcast .1.3.6.1.4.1.14823.2.3.3.1.200.2.1142
This trap indicates that an AP detected a signature match for Deauth-Broadcast from an access point.
wlsxSignStaDeauthBcast .1.3.6.1.4.1.14823.2.3.3.1.200.2.1143
This trap indicates that an AP detected a signature match for Deauth-Broadcast from a Station.
wlsxWindowsBridgeDetectedAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1144
This trap indicates that an AP is detecting an access point that is bridging from a wireless network
to a wired network.
wlsxWindowsBridgeDetectedSta .1.3.6.1.4.1.14823.2.3.3.1.200.2.1145
This trap indicates that an AP is detecting a station that is bridging from a wireless network
to a wired network.
wlsxAdhocNetworkBridgeDetectedAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1146
This trap indicates that an AM has detected an Ad hoc
network that is bridging to a wired network
wlsxAdhocNetworkBridgeDetectedSta .1.3.6.1.4.1.14823.2.3.3.1.200.2.1147
This trap indicates that an AM has detected an Ad hoc
network that is bridging to a wired network
wlsxDisconnectStationAttackAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1148
This trap indicates that an AM detected a station disconnect 
attack.
wlsxDisconnectStationAttackSta .1.3.6.1.4.1.14823.2.3.3.1.200.2.1149
This trap indicates that an AM detected a station Disconnect 
attack.
wlsxSuspectUnsecureAPDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1150
This trap indicates that an access point, classified as Suspected Rogue, has been
detected by a Controller. The AP is suspected to be rogue, 
with the supplied confidence level, because it was matched to 
the wired MAC address.
wlsxSuspectUnsecureAPResolved .1.3.6.1.4.1.14823.2.3.3.1.200.2.1151
This trap indicates that a previously detected access point, classified Suspected 
Rogue, is either no longer present in the network or
has changed its state.
wlsxHtGreenfieldSupported .1.3.6.1.4.1.14823.2.3.3.1.200.2.1157
This trap indicates that an AP detected an access point that supports HT Greenfield mode.
wlsxHT40MHzIntoleranceAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1158
This trap indicates that an AP is detecting an access point with the HT 40MHz intolerance setting.
wlsxHT40MHzIntoleranceSta .1.3.6.1.4.1.14823.2.3.3.1.200.2.1159
This trap indicates that the system is detecting an HT 40MHz Intolerance setting from a Station.
wlsxNAuthServerAllInService .1.3.6.1.4.1.14823.2.3.3.1.200.2.1160
This trap indicates that all authentication servers is a server group are brought back in service.
wlsxNAdhocNetwork .1.3.6.1.4.1.14823.2.3.3.1.200.2.1161
This trap indicates that an AP detected an ad hoc 
network where a station is connected to an ad hoc access point.
wlsxNAdhocNetworkBridgeDetectedAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1162
This trap indicates that an AP detected an ad hoc
network that is bridging to a wired network.
wlsxNAdhocNetworkBridgeDetectedSta .1.3.6.1.4.1.14823.2.3.3.1.200.2.1163
This trap indicates that an AP detected an ad hoc
network that is bridging to a wired network.
wlsxClientFloodAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1170
This trap indicates that the number of potential fake clients detected by 
an AP has exceeded the configured IDS threshold. This is the total number of fake clients observed across all bands.
wlsxValidClientNotUsingEncryption .1.3.6.1.4.1.14823.2.3.3.1.200.2.1171
This trap indicates that an AP detected an unencrypted data frame between a valid client and an access point.
wlsxAdhocUsingValidSSID .1.3.6.1.4.1.14823.2.3.3.1.200.2.1172
This trap indicates that an AP detected an ad hoc network using a valid/protected SSID.
wlsxAPSpoofingDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1173
This trap indicates that an AP detected that one of its virtual APs is being spoofed using MAC spoofing.
wlsxClientAssociatingOnWrongChannel .1.3.6.1.4.1.14823.2.3.3.1.200.2.1174
This trap indicates that an AP detected a client trying to associate to one of its BSSIDs on the wrong channel.  This can be a sign that the BSSID is 
being spoofed in order to fool the client into thinking the AP is operating on another channel.
wlsxNDisconnectStationAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1175
This trap indicates that an AP has determined that a client is under Disconnect Attack because the rate of Assoc/Reassoc Response packets
received by that client exceeds the configured threshold.
wlsxNStaUnAssociatedFromUnsecureAP .1.3.6.1.4.1.14823.2.3.3.1.200.2.1176
This trap indicates that an AP that had previously detected a client association to a Rogue access point is no longer detecting that association.
wlsxOmertaAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1177
This trap indicates that an AP detected an Omerta attack.
wlsxTKIPReplayAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1178
This trap indicates that an AP detected a TKIP replay attack. If successful this could be the precursor to more
advanced attacks.
wlsxChopChopAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1179
This trap indicates that an AP detected a ChopChop attack.
wlsxFataJackAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1180
This trap indicates that an AP detected a FATA-Jack attack.
wlsxInvalidAddressCombination .1.3.6.1.4.1.14823.2.3.3.1.200.2.1181
This trap indicates that an AP detected an invalid source and destination combination.
wlsxValidClientMisassociation .1.3.6.1.4.1.14823.2.3.3.1.200.2.1182
This trap indicates that an AP detected a misassociation between a valid client and an unsafe AP.
wlsxMalformedHTIEDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1183
This trap indicates that an AP detected a malformed HT Information Element. This can be the result of a misbehaving wireless driver or it may be an indication of a new wireless attack.
wlsxMalformedAssocReqDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1184
This trap indicates that an AP detected a malformed association request with a NULL SSID.
wlsxOverflowIEDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1185
This trap indicates that an AP detected a management frame with a malformed information element. The declared length of the element is larger than the entire frame containing the element. This may be used to corrupt or crash wireless drivers.
wlsxOverflowEAPOLKeyDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1186
This trap indicates that an AP detected a key in an EAPOL Key message with a specified length greater than the length of the entire message.
wlsxMalformedFrameLargeDurationDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1187
This trap indicates that an AP detected an unusually large duration in a wireless frame. This may be an attempt to block other devices from transmitting.
wlsxMalformedFrameWrongChannelDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1188
This trap indicates that an AP detected a beacon on one channel advertising another channel. This could be an attempt to lure clients away from a valid AP.
wlsxMalformedAuthFrame .1.3.6.1.4.1.14823.2.3.3.1.200.2.1189
This trap indicates that an AP detected an authentication frame with
either a bad algorithm (similar to Fata-Jack) or a bad transaction.
wlsxCTSRateAnomaly .1.3.6.1.4.1.14823.2.3.3.1.200.2.1190
This trap indicates that the rate of CTS packets 
received by an AP exceeds the configured IDS threshold.
wlsxRTSRateAnomaly .1.3.6.1.4.1.14823.2.3.3.1.200.2.1191
This trap indicates that the rate of RTS packets 
received by an AP exceeds the configured IDS threshold.
wlsxNRogueAPDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1192
This trap indicates that an unauthorized access point is connected to the wired network. The access point is 
classified as Rogue by the system.
wlsxNRogueAPResolved .1.3.6.1.4.1.14823.2.3.3.1.200.2.1193
This trap indicates that a previously detected access point, classified as Rogue,
is either no longer present in the network or it changed its state.
wlsxNeighborAPDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1194
This trap indicates that an access point has been classified as a Neighbor by the system.
wlsxNInterferingAPDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1195
This trap indicates that an access point has been classified as Interfering by the system. The access point 
is declared Interfering because it is not authorized, nor has it been classified as a Rogue.
wlsxNSuspectRogueAPDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1196
This trap indicates that an access point, classified as Suspected Rogue, is 
detected by the system. The AP is suspected to be rogue 
with the supplied confidence level.
wlsxNSuspectRogueAPResolved .1.3.6.1.4.1.14823.2.3.3.1.200.2.1197
This trap indicates that a previously detected access point, classified as Suspected 
Rogue, is either no longer present in the network or
has changed its state.
wlsxBlockAckAttackDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1198
This trap indicates that an attempt has been made to deny service to
the source address by spoofing a block ACK add request that sets a
sequence number window outside the currently used window.
wlsxHotspotterAttackDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1199
This trap indicates that a new AP has appeared immediately following a client probe request.
This is indicative of the Hotspotter tool or similar that attempts to trap clients with a fake
hotspot or other wireless network.
wlsxNSignatureMatch .1.3.6.1.4.1.14823.2.3.3.1.200.2.1200
This trap indicates that an AP detected a signature match in a frame.
wlsxNSignatureMatchNetstumbler .1.3.6.1.4.1.14823.2.3.3.1.200.2.1201
This trap indicates that an AP detected a signature match for Netstumbler in a frame.
wlsxNSignatureMatchAsleap .1.3.6.1.4.1.14823.2.3.3.1.200.2.1202
This trap indicates that an AP detected a signature match for ASLEAP in a frame.
wlsxNSignatureMatchAirjack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1203
This trap indicates that an AP detected a signature match for Airjack in a frame.
wlsxNSignatureMatchNullProbeResp .1.3.6.1.4.1.14823.2.3.3.1.200.2.1204
This trap indicates that an AP detected a signature match for Null-Probe-Response in a frame.
wlsxNSignatureMatchDeauthBcast .1.3.6.1.4.1.14823.2.3.3.1.200.2.1205
This trap indicates that an AP detected a signature match for Deauth-Broadcast in a frame.
wlsxNSignatureMatchDisassocBcast .1.3.6.1.4.1.14823.2.3.3.1.200.2.1206
This trap indicates that an AP detected a signature match for Disassoc-Broadcast in a frame.
wlsxNSignatureMatchWellenreiter .1.3.6.1.4.1.14823.2.3.3.1.200.2.1207
This trap indicates that an AP detected a signature match for Wellenreiter in a frame.
wlsxAPDeauthContainment .1.3.6.1.4.1.14823.2.3.3.1.200.2.1208
This trap indicates that an AP has attempted to contain an access point by disconnecting its client.
wlsxClientDeauthContainment .1.3.6.1.4.1.14823.2.3.3.1.200.2.1209
This trap indicates that an AP has attempted to contain a client by disconnecting it from the AP that it is associated with.
wlsxAPWiredContainment .1.3.6.1.4.1.14823.2.3.3.1.200.2.1210
This trap indicates that an AP has attempted to contain an access point by disrupting traffic to its client on the wired interface.
wlsxClientWiredContainment .1.3.6.1.4.1.14823.2.3.3.1.200.2.1211
This trap indicates that an AP has attempted to contain a client by disrupting traffic to it on the wired interface.
wlsxAPTaggedWiredContainment .1.3.6.1.4.1.14823.2.3.3.1.200.2.1212
This trap indicates that an AP has attempted to contain an access point by disrupting traffic to its client on the wired interface.
wlsxClientTaggedWiredContainment .1.3.6.1.4.1.14823.2.3.3.1.200.2.1213
This trap indicates that an AP has attempted to contain a client by disrupting traffic to it on the wired interface.
wlsxTarpitContainment .1.3.6.1.4.1.14823.2.3.3.1.200.2.1214
This trap indicates that an AP has attempted to contain an access point by moving a client that is attempting to associate to it to a tarpit.
wlsxAPChannelChange .1.3.6.1.4.1.14823.2.3.3.1.200.2.1216
This trap indicates that an AP changed its channel.
wlsxAPPowerChange .1.3.6.1.4.1.14823.2.3.3.1.200.2.1217
This trap indicates that an AP changed its transmit power level.
wlsxAPModeChange .1.3.6.1.4.1.14823.2.3.3.1.200.2.1218
This trap indicates that an AP changed its mode from AP to APMonitor or vice versa.
wlsxUserEntryAttributesChanged .1.3.6.1.4.1.14823.2.3.3.1.200.2.1219
This trap indicates that the user entry attributes have changed.
wlsxPowerSaveDosAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1220
This trap indicates that an AP detected a Power Save DoS attack.
wlsxNAPMasterStatusChange .1.3.6.1.4.1.14823.2.3.3.1.200.2.1221
This trap indicates that the status of the AP as seen by
the master controller has changed.
**NOTE: this notification is obsoleted and replaced by
wlsxNAPConductorStatusChange
wlsxNAdhocUsingValidSSID .1.3.6.1.4.1.14823.2.3.3.1.200.2.1222
This trap indicates that an AP detected an ad hoc network node using a valid/protected SSID.
wlsxMgmtUserAuthenticationFailed .1.3.6.1.4.1.14823.2.3.3.1.200.2.1224
This trap indicates that a management user authentication has failed.
wlsxAPActiveUplinkChanged .1.3.6.1.4.1.14823.2.3.3.1.200.2.1252
When the active uplink of an AP changes, a notification is
sent to the Management Entity with the new uplink type
wlsxAPManagedModeConfigFailureTrap .1.3.6.1.4.1.14823.2.3.3.1.200.2.1255
Indicated failure in applying config.
wlsxNAuthServerAcctTimedOut .1.3.6.1.4.1.14823.2.3.3.1.200.2.1256
This trap indicates that the authentication server accounting timed out.
wlsxPortalServerDown .1.3.6.1.4.1.14823.2.3.3.1.200.2.1259
This trap indicates that the portal server is down.
wlsxPortalServerUp .1.3.6.1.4.1.14823.2.3.3.1.200.2.1260
This trap indicates that the portal server is up.
wlsxIAPVoiceClientLocationUpdate .1.3.6.1.4.1.14823.2.3.3.1.200.2.1262
The trap represents a IAP voice client location update.
wlsxWPAFTAttack .1.3.6.1.4.1.14823.2.3.3.1.200.2.1267
This trap indicates there is a possible attack of the Fast BSS Transition causing a WPA key re-installation.
This can be indicative of a security breach where an attacker can hijack a client's association and/or
decrypt an otherwise secure connection.
wlsxMitMDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1268
This trap indicates that an AP detected a possible channel-based Man in the Middle attack by someone using spoofed beacons with an invalid Channel Switch Announcement.
wlsxAPLoopDetected .1.3.6.1.4.1.14823.2.3.3.1.200.2.1271
This trap indicates that loop is detected on AP's secure jack port.
wlsxAPBROADCASTSTORM .1.3.6.1.4.1.14823.2.3.3.1.200.2.1272
This trap indicates that broadcast storm is detected on AP's secure jack port.
wlsxCLEARPASSSERVERINVALID .1.3.6.1.4.1.14823.2.3.3.1.200.2.1274
This trap indicates that clearpass server is not valid when using the CA to verity the server for download-role.
wlsxAPUSBPLUGALARM .1.3.6.1.4.1.14823.2.3.3.1.200.2.1277
This trap indicates that an USB device is plugged in or out to an AP.
wlsxClientRejectedByMaxClientCount .1.3.6.1.4.1.14823.2.3.3.1.200.2.1284
This trap indicates the client is rejected by the max client count.
wlsxClientPskAuthenticationFailed .1.3.6.1.4.1.14823.2.3.3.1.200.2.1285
This trap indicates the client PSK Authentication Failed.
wlsxNStationAddedToDenyList .1.3.6.1.4.1.14823.2.3.3.1.200.2.1286
This trap indicates that the station is in deny list.
wlsxNStationRemovedFromDenyList .1.3.6.1.4.1.14823.2.3.3.1.200.2.1287
This trap indicates that the station is removed from the deny list.
wlsxNAPConductorStatusChange .1.3.6.1.4.1.14823.2.3.3.1.200.2.1288
This trap indicates that the status of the AP as seen by
the conductor controller has changed.
wlsxPeerAssociatedToWifiDirectGo .1.3.6.1.4.1.14823.2.3.3.1.200.2.1291
This trap indicates that an AP detected a wireless client associated to a WIFI-Direct Group Owner.
wlsxPeerAssociatedToWifiDirectGoContainment .1.3.6.1.4.1.14823.2.3.3.1.200.2.1292
This trap indicates that containment is being enforced on a wireless client that is associated to a WIFI-Direct Group Owner.