AI-AP-MIB
This MIB is for managing Aruba Instant WLAN
aiMIB
1.3.6.1.4.1.14823.2.3.3.1
Imported Objects
| ARUBA-MIB | aiEnterpriseMibModules |
| SNMPv2-CONF | OBJECT-GROUP |
| SNMPv2-SMI | Counter32 Counter64 Integer32 IpAddress MODULE-IDENTITY NOTIFICATION-TYPE OBJECT-TYPE snmpModules |
| SNMPv2-TC | DateAndTime DisplayString MacAddress PhysAddress RowStatus StorageType TestAndIncr TEXTUAL-CONVENTION TimeInterval TruthValue |
Type Definitions (66)
| ArubaAccessPointMode | Enumeration |
airMonitor(1)accessPoint(2)accessPointAndMonitor(3)meshPortal(4)meshPoint(5)rfprotectSensor(6)spectrumSensor(7) |
| ArubaACLAction | Enumeration |
deny(1)permit(2)srcNAT(3)dstNAT(4)redirect(5) |
| ArubaACLDomain | Enumeration |
alias(1)any(2)user(3)host(4)network(5) |
| ArubaACLNetworkServiceType | Enumeration |
alias(1)any(2)tcp(3)udp(4)protocol(5) |
| ArubaActiveState | Enumeration |
active(1)inactive(2) |
| ArubaAddressType | Enumeration |
srcAddress(1)dstAddress(2)bssid(3) |
| ArubaAntennaSetting | Enumeration |
notPresent(1)enabled(2)disabled(3) |
| ArubaAPConductorStatus | Enumeration |
up(1)down(2)move(3) |
| ArubaAPMasterStatus | Enumeration |
up(1)down(2)move(3) |
| ArubaAPMatchMethod | Enumeration |
notApplicable(0)exactMatch(1)plusOneMatch(2)minusOneMatch(3)ouiMatch(4) |
| ArubaAPMatchType | Enumeration |
unknown(0)configuredWiredMac(1)ethernetWiredMac(2)apWiredMac(3)externalWiredMac(4)manual(5)baseBSSIDOverride(6)mms(7)ethernetGatewayWiredMac(8)classificationDisabled(9)apBSSID(10)propagatedEthernetWiredMac(11)apRule(12)systemWiredMac(13)systemGatewayMac(14) |
| ArubaAPStatus | Enumeration |
up(1)down(2) |
| ArubaAPUplinkChangeReason | Enumeration |
linkFailure(1)vpnFailure(2)preemption(3)internetFailover(4) |
| ArubaAPUplinkType | Enumeration |
ethernet(1)usb(2)pppoe(3)wifi(4) |
| ArubaARMChangeReason | Enumeration |
radarDetected(1)radarCleared(2)txHang(3)txHangClear(4)fortyMhzIntol(5)cancel40mhzIntol(6)fortyMhzAlign(7)armInterference(8)armInvalidCh(9)armErrorThresh(10)armNoiseThresh(11)armEmptyCh(12)armRogueCont(13)armDecreasePower(14)armIncreasePower(15)armTurnOffRadio(16)armTurnOnRadio(17) |
| ArubaAuthenticationMethods | Enumeration |
none(0)web(1)mac(2)vpn(3)dot1x(4)kerberos(5)secureId(7)pubcookie(15)xSec(16)xSecMachine(17)via-vpn(28)other(255) |
| ArubaAuthServerType | Enumeration |
internaldb(1)radius(2)ldap(3)kerberos(4)tacacs(5) |
| ArubaBlackListReason | Enumeration |
userDefined(1)mitmAttack(2)authFailure(3)pingFlood(4)sessionFlood(5)synFlood(6)sessionBlacklist(7)ipSpoofing(8)esiBlacklist(9)other(100) |
| ArubaCallStates | Enumeration |
idle(0)initiated(1)connecting(2)delivered(3)connected(4)offered(5)alerting(6)releasing(7)cancelling(8)challenging(9)transient(10)blockwait(11)succ(12)fail(13)aborted(14)blocked(15) |
| ArubaCardType | Enumeration |
lc1(1)lc2(2)sc1(3)sc2(4)sw2400(5)sw800(6)sw200(7)m3mk1(8)sw3200(9)sw3400(10)sw3600(11)sw650(12)sw651(13)reserved1(14)reserved2(15)sw620(16) |
| ArubaConfigurationChangeType | Enumeration |
create(1)delete(2)modify(3) |
| ArubaConfigurationState | Enumeration |
success(1)error(2) |
| ArubaDaysOfWeek | Enumeration |
sun(1)mon(2)tue(3)wed(4)thu(5)fri(6)sat(7) |
| ArubaDBType | Enumeration |
mssql(1)mysql(2) |
| ArubaDenyListReason | Enumeration |
userDefined(1)mitmAttack(2)authFailure(3)pingFlood(4)sessionFlood(5)synFlood(6)sessionDenylist(7)ipSpoofing(8)esiDenylist(9)other(100) |
| ArubaDot1dState | Enumeration |
disabled(1)blocked(2)listening(3)learning(4)forwarding(5) |
| ArubaEnableValue | Enumeration |
enabled(1)disabled(2) |
| ArubaEncryptionMethods | Bits |
disabled(0)static-wep(1)dynamic-wep(2)static-wpa(3)dynamic-wpa(4)wpa2-psk-aes(5)wpa2-8021x-aes(6)wpa2PreAuth(7)xsec(8)wpa-psk-aes(9)wpa-aes(10)wpa2-psk-tkip(11)wpa2-8021x-tkip(12)bSec-128(13)bSec-256(14)owe-aes(16)wpa3-sae-aes(17)wpa3-cnsa(18)wpa3-aes-ccm-128(19)mpsk-aes(21)wpa3-aes-gcm-256(22) |
| ArubaEncryptionType | Enumeration |
none(0)static-wep(1)dynamic-wep(2)wpa-psk-tkip(3)wpa-tkip(4)wpa-psk-aes(5)wpa-aes(6)wpa2-psk-tkip(7)wpa2-tkip(8)wpa2-psk-aes(9)wpa2-aes(10)xSec(11)bSec-128(12)bSec-256(13)aes-128-cmac(14)unknown(15)ft-psk(16)ft-8021x(17)wpa3-cnsa(18)owe-aes(20)wpa3-sae-aes(21)wpa3-aes-gcmp-256(22) |
| ArubaEnet1Mode | Enumeration |
activeStandby(1)tunnel(2)bridge(3)notApplicable(4)split(5) |
| ArubaESIServerMode | Enumeration |
bridged(1)routed(2)nat(3) |
| ArubaESIServerStatus | Enumeration |
up(1)down(2) |
| ArubaFrameType | Enumeration |
associateRequest(0)associateResponse(1)reassociateRequest(2)reassociateResponse(3)probeRequest(4)probeResponse(5)beacon(8)atim(9)disassociate(10)auth(11)deauth(12) |
| ArubaHashAlgorithms | Enumeration |
md5(1)sha(2) |
| ArubaHTExtChannel | Enumeration |
none(1)above(2)below(3) |
| ArubaHTMode | Enumeration |
none(1)ht20(2)ht40(3)vht20(4)vht40(5)vht80(6)vht160(7)vht80plus80(8)he20(9)he40(10)he80(11)he160(12)he80plus80(13) |
| ArubaHTRate | Enumeration |
unknown(0)ht6dot5(1)ht13(2)ht13dot5(3)ht15(4)ht19dot5(5)ht26(6)ht27(7)ht30(8)ht39(9)ht40dot5(10)ht45(11)ht52(12)ht54(13)ht58dot5(14)ht60(15)ht65(16)ht78(17)ht81(18)ht90(19)ht104(20)ht108(21)ht117(22)ht120(23)ht121dot5(24)ht130(25)ht135(26)ht150(27)ht162(28)ht180(29)ht216(30)ht240(31)ht243(32)ht270(33)ht300(34) |
| ArubaIfType | Enumeration |
port(1)vlan(2)tunnel(3)loopback(4) |
| ArubaMeshRole | Enumeration |
nonmesh(0)point(1)portal(2) |
| ArubaMonAuthAlgorithm | Enumeration |
none(0)psk(1)dot1x(2)ft8021x(3)ftpsk(4)dot1x256(5)psk256(6)tdls(7)sae(8)ftsae(9)other(10)suiteb(11)owe(12) |
| ArubaMonEncryptionCipher | Enumeration |
none(0)wep40(1)wep104(2)tkip(3)aesccmp(4)other(5)gcm256(6) |
| ArubaMonEncryptionType | Enumeration |
open(0)wep(1)wpa(2)wpa2(3)wpa3(4) |
| ArubaMonitorMode | Enumeration |
unknown(0)all(1)none(2)mixed(3) |
| ArubaOperStateValue | Enumeration |
up(1)down(2)testing(3) |
| ArubaPhyType | Enumeration |
dot11a(1)dot11b(2)dot11g(3)dot11ag(4)wired(5)dot11ax6ghz(6) |
| ArubaPoeState | Enumeration |
disabled(1)enabled(2)enabledCisco(3)notAvailable(4) |
| ArubaPortalServerDownReason | Enumeration |
connectFail(1) |
| ArubaPortDuplex | Enumeration |
half(1)full(2)auto(3) |
| ArubaPortMode | Enumeration |
access(1)dot1q(2) |
| ArubaPortSpeed | Enumeration |
speed10Mbps(1)speed100Mbps(2)speed1000Mbps(3)speedAuto(4)speed10Gbps(5) |
| ArubaPortType | Enumeration |
fastethernet(1)gigabitethernet(2)xgigabitethernet(3) |
| ArubaRogueApType | Enumeration |
valid(1)interfering(2)unsecure(3)dos(4)unknown(5)knownInterfering(6)suspectedUnsecure(7) |
| ArubaStationType | Enumeration |
valid(1)interfering(2)dos(3) |
| ArubaSubAuthenticationMethods | Enumeration |
authPAP(1)authCHAP(2)authMSCHAP(3)authMSCHAPv2(4)eapTLS(5)eapTTLS(6)eapLEAP(7)eapMD5(8)eapPEAP(9) |
| ArubaSupportStatus | Enumeration |
unsupported(1)supported(2) |
| ArubaSwitchRole | Enumeration |
conductor(1)local(2)backupconductor(3) |
| ArubaUnprovisionedStatus | Enumeration |
yes(1)no(2) |
| ArubaUSBStatus | Enumeration |
unknown(0)notPresent(1)inactive(2)active(3) |
| ArubaUserForwardMode | Enumeration |
tunnel-encrypted(0)bridge(1)tunnel-decrypted(2)split-tunnel(3) |
| ArubaVlanValidRange | Integer32 |
range: 1..4095 |
| ArubaVoiceCacBit | Bits |
cacActiveLoadBalancing(0)cacHighCapThresholdReached(1)cacHandRsrvThresholdReached(2)cacPeakCapacityReached(3) |
| ArubaVoiceCdrDirection | Enumeration |
og(0)ic(1) |
| ArubaVoipProtocol | Enumeration |
sccp(1)svp(2)vocera(3)sip(9)ua(11) |
| ArubaVoipProtocolType | Enumeration |
sccp(1)svp(2)vocera(3)sip(4)unknown(10) |
| ArubaVoipRegState | Enumeration |
unknown(0)registering(1)unregistering(2)challenge(3)registered(4)unregistered(5) |
| ArubaVrrpState | Enumeration |
initialize(1)backup(2)master(3) |
Objects (254)
|
|
.1.3.6.1.4.1.14823.2.3.3.1 |
|
|
|
.1.3.6.1.4.1.14823.2.3.3.1.1 |
|
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.1 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.1.15 |
|
|
|
aiMeshIndex | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.1 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.2 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.3 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.4 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.5 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.6 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.7 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.8 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.15.1.9 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.1.16 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.2 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.3 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.4 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.1.5 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.1.6 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.1.7 |
|
|
|
aiSSIDIndex | .1.3.6.1.4.1.14823.2.3.3.1.1.7.1 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.1 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.2 |
|
|
Enumeration | .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.3 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.4 |
|
|
Enumeration | .1.3.6.1.4.1.14823.2.3.3.1.1.7.1.5 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.1.8 |
|
|
|
aiInterferAPIndex | .1.3.6.1.4.1.14823.2.3.3.1.1.8.1 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.1 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.2 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.3 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.4 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.5 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.6 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.7 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.1.8.1.8 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.2 |
|
|
|
.1.3.6.1.4.1.14823.2.3.3.1.2.1 |
|
|
|
aiAPMACAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.1 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.10 |
|
|
Enumeration | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.11 |
|
|
Enumeration | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.12 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.13 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.2 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.3 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.4 |
|
|
ObjectIdentifier | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.5 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.6 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.7 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.8 |
|
|
SNMPv2-SMITimeTicks | .1.3.6.1.4.1.14823.2.3.3.1.2.1.1.9 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.2.2 |
|
|
|
aiRadioAPMACAddressaiRadioIndex | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.1 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.10 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.11 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.12 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.13 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.14 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.15 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.16 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.17 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.18 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.19 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.2 |
|
|
Enumeration | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.20 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.21 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.22 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.3 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.4 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.5 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.6 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.7 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.8 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.2.1.9 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.2.3 |
|
|
|
aiWlanAPMACAddressaiWlanIndex | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.1 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.10 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.2 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.3 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.4 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.5 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.6 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.7 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.8 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.3.1.9 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.2.4 |
|
|
|
aiClientMACAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.1 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.10 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.11 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.12 |
|
|
SNMPv2-SMICounter64 | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.13 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.14 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.15 |
|
|
SNMPv2-SMITimeTicks | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.16 |
|
|
ArubaPhyType | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.17 |
|
|
ArubaHTMode | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.18 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.2 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.3 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.4 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.5 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.6 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.7 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.8 |
|
|
SNMPv2-SMICounter64 | .1.3.6.1.4.1.14823.2.3.3.1.2.4.1.9 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.2.5 |
|
|
|
aiClientMac | .1.3.6.1.4.1.14823.2.3.3.1.2.5.1 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.5.1.1 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.5.1.2 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.2.5.1.3 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.2.5.1.4 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200 |
|
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.1 |
|
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.1 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.10 |
|
|
ArubaAccessPointMode | .1.3.6.1.4.1.14823.2.3.3.1.200.1.100 |
|
|
ArubaARMChangeReason | .1.3.6.1.4.1.14823.2.3.3.1.200.1.101 |
|
|
ArubaHTExtChannel | .1.3.6.1.4.1.14823.2.3.3.1.200.1.102 |
|
|
ArubaConfigurationChangeType | .1.3.6.1.4.1.14823.2.3.3.1.200.1.103 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.104 |
|
|
ArubaAPMasterStatus | .1.3.6.1.4.1.14823.2.3.3.1.200.1.105 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.106 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.107 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.108 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.11 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.12 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.13 |
|
|
ArubaAPUplinkType | .1.3.6.1.4.1.14823.2.3.3.1.200.1.130 |
|
|
SNMPv2-SMITimeTicks | .1.3.6.1.4.1.14823.2.3.3.1.200.1.131 |
|
|
ArubaAPUplinkType | .1.3.6.1.4.1.14823.2.3.3.1.200.1.132 |
|
|
ArubaAPUplinkChangeReason | .1.3.6.1.4.1.14823.2.3.3.1.200.1.133 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.138 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.139 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.14 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.140 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.141 |
|
|
ArubaPortalServerDownReason | .1.3.6.1.4.1.14823.2.3.3.1.200.1.142 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.144 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.147 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.148 |
|
|
ArubaFrameType | .1.3.6.1.4.1.14823.2.3.3.1.200.1.15 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.155 |
|
|
ArubaDenyListReason | .1.3.6.1.4.1.14823.2.3.3.1.200.1.156 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.157 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.158 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.159 |
|
|
ArubaAddressType | .1.3.6.1.4.1.14823.2.3.3.1.200.1.16 |
|
|
ArubaAPConductorStatus | .1.3.6.1.4.1.14823.2.3.3.1.200.1.160 |
|
|
ArubaHTMode | .1.3.6.1.4.1.14823.2.3.3.1.200.1.161 |
|
|
ArubaPhyType | .1.3.6.1.4.1.14823.2.3.3.1.200.1.162 |
|
|
ArubaHTMode | .1.3.6.1.4.1.14823.2.3.3.1.200.1.163 |
|
|
ArubaPhyType | .1.3.6.1.4.1.14823.2.3.3.1.200.1.164 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.165 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.166 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.167 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.168 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.17 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.18 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.19 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.2 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.20 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.21 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.22 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.23 |
|
|
ArubaEnableValue | .1.3.6.1.4.1.14823.2.3.3.1.200.1.24 |
|
|
ArubaOperStateValue | .1.3.6.1.4.1.14823.2.3.3.1.200.1.25 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.26 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.27 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.28 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.29 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.3 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.30 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.31 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.32 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.33 |
|
|
ArubaBlackListReason | .1.3.6.1.4.1.14823.2.3.3.1.200.1.34 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.35 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.36 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.37 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.38 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.39 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.4 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.40 |
|
|
ArubaDBType | .1.3.6.1.4.1.14823.2.3.3.1.200.1.41 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.42 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.43 |
|
|
ArubaVrrpState | .1.3.6.1.4.1.14823.2.3.3.1.200.1.44 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.45 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.46 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.47 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.48 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.49 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.5 |
|
|
ArubaSwitchRole | .1.3.6.1.4.1.14823.2.3.3.1.200.1.50 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.51 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.52 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.53 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.54 |
|
|
ArubaAuthenticationMethods | .1.3.6.1.4.1.14823.2.3.3.1.200.1.55 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.56 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.57 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.58 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.59 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.6 |
|
|
SNMPv2-TCDateAndTime | .1.3.6.1.4.1.14823.2.3.3.1.200.1.60 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.61 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.62 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.63 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.64 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.65 |
|
|
ArubaConfigurationState | .1.3.6.1.4.1.14823.2.3.3.1.200.1.66 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.67 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.68 |
|
|
ArubaConfigurationChangeType | .1.3.6.1.4.1.14823.2.3.3.1.200.1.69 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.7 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.70 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.71 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.72 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.73 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.74 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.75 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.76 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.77 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.78 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.79 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.8 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.80 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.81 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.82 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.83 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.84 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.85 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.86 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.87 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.88 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.89 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.9 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.90 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.91 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.92 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14823.2.3.3.1.200.1.93 |
|
|
OctetString | .1.3.6.1.4.1.14823.2.3.3.1.200.1.94 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.95 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.96 |
|
|
ArubaHTExtChannel | .1.3.6.1.4.1.14823.2.3.3.1.200.1.97 |
|
|
Integer32 | .1.3.6.1.4.1.14823.2.3.3.1.200.1.98 |
|
|
ArubaAccessPointMode | .1.3.6.1.4.1.14823.2.3.3.1.200.1.99 |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2 |
|
|
|
.1.3.6.1.4.1.14823.2.3.3.1.3 |
|
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14823.2.3.3.1.3.1 |
Notifications / Traps (171)
| Name | OID | Description |
|---|---|---|
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1003 |
This trap indicates that a node is exceeding the threshold set for the frame type. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1014 |
This trap indicates that a new user was created. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1015 |
This trap indicates that a user was deleted. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1016 |
This trap indicates that a user is Authenticated. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1017 |
This trap indicates that a user is Deauthenticated. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1018 |
This trap indicates that a user authentication has failed. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1019 |
This trap indicates that the authentication server request timed out. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1020 |
This trap indicates that the authentication server timed out. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1021 |
This trap indicates that an authentication server is up. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1040 |
A Trap which indicates that an access point up. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1041 |
A Trap which indicates that an access point down. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1043 |
This trap indicates that an access point at Location wlsxTrapAPLocation has changed the channel. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1044 |
This trap indicates that the station is black listed. **NOTE: this notification is obsoleted and replaced by wlsxNStationAddedToDenyList. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1045 |
This trap indicates that the station is removed from the black list. **NOTE: this notification is obsoleted and replaced by wlsxNStationRemovedFromDenyList |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1049 |
A Trap which indicates changes in the Radio attributes of an access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1053 |
This trap indicates that an unauthorized access point is connected to the wired network. The access point is declared Rogue because it was matched to a MAC address. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1054 |
This trap indicates that a previously detected access point, classified as Rogue, is no longer present in the network. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1055 |
This trap indicates that an AM detected Station Impersonation. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1056 |
This trap indicates that an AM detected an access point which is violating the Reserved Channel configuration. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1057 |
This trap indicates that an AP has detected an access point is violating Valid SSID configuration by using an SSID that is reserved for use by a valid AP only. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1058 |
This trap indicates that an AP detected an access point that has a channel misconfiguration because it is using a channel that is not valid. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1059 |
This trap indicates that an AP detected an access point that has an OUI misconfiguration because it is using an OUI that is not valid. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1060 |
This trap indicates that an AP detected an access point that has an SSID misconfiguration because it is using an SSID that is not valid. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1061 |
This trap indicates that an access point has bad Short preamble configuration. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1062 |
This trap indicates that an AP detected an access point that is misconfigured because it is not using WPA. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1063 |
This trap indicates that an AM has detected an Ad hoc network. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1064 |
This trap indicates that a previously detected Ad hoc Network is no longer present in the network. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1065 |
This trap indicates that Protection was enforced because a valid station's association to a non-valid access point violated Valid Station policy. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1066 |
This trap indicates that an AP detected that a valid access point is using the same WEP initialization vector in consecutive packets. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1067 |
This trap indicates that an AP detected that a valid access point is using a Weak WEP initialization vector. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1068 |
This trap indicates that an AP has detected channel interference. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1069 |
This trap indicates that a previously detected channel interference is no longer present. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1070 |
This trap indicates that an AP has detected interference for an access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1071 |
This trap indicates that the previously detected interference for an access point is no longer present. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1072 |
This trap indicates that an AP has detected interference for a station. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1073 |
This trap indicates that the previously detected interference for a station is no longer present. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1074 |
This trap indicates that an AP detected that an access point has exceeded the configured upper threshold for Frame Retry Rate. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1075 |
This trap indicates that an AP detected that an access point has exceeded the configured upper threshold for Frame Receive Error Rate. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1076 |
This trap indicates that an AP detected that an access point exceeded the configured upper threshold for Frame Fragmentation Rate. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1077 |
This trap indicates that an AP detected that a station or access point has exceeded the configured upper threshold for Bandwidth rate. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1078 |
This trap indicates that an AP detected that a station has exceeded the configured upper threshold for Low speed rate. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1079 |
This trap indicates that an AP detected that a station has exceeded the configured upper threshold for Non Unicast traffic rate. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1080 |
This trap indicates that an AM is reporting that an AP has enabled Load balancing. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1081 |
This trap indicates that an AM is reporting that an AP has enabled Load balancing. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1082 |
This trap indicates that an AP has detected that the configured upper threshold for Frame Retry Rate was exceeded on a channel. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1083 |
This trap indicates that an AP has detected that the configured upper threshold for Frame Fragmentation Rate was exceeded on a channel. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1084 |
This trap indicates that an AP has detected that the configured upper threshold for Frame Receive Error Rate was exceeded on a channel. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1085 |
This trap indicates that an AP detected a signature match in a frame from an access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1086 |
This trap indicates that an AP detected a signature match in a frame from a Station. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1087 |
This trap indicates that an AP detected frames on a channel which exceed the configured IDS rate threshold. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1088 |
This trap indicates that an AP detected frames transmitted or received by an access point, which exceed the configured IDS rate threshold. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1089 |
This trap indicates that an AP detected frames transmitted or received by a node, which exceed the configured IDS rate threshold. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1090 |
This trap indicates that the rate of EAP Handshake packets received by an AP has exceeded the configured IDS EAP Handshake rate threshold. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1091 |
This trap indicates that an AM detected a Signal Anomaly. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1092 |
This trap indicates that an AM received packets from an AP which exceeds the acceptable sequence number difference. The acceptable sequence number difference is an IDS configuration object. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1093 |
This trap indicates that an AM received packets from a Node which exceeds the acceptable sequence number difference. The acceptable sequence number difference is an IDS configuration object. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1094 |
This trap indicates that an AM detected a station Disconnect attack. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1095 |
This trap indicates that the number of potential fake APs detected by an AP has exceeded the configured IDS threshold. This is the total number of fake APs observed across all bands. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1096 |
This trap indicates that an AM detected an Ad hoc Network. An Station is connected to an ad hoc AP. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1097 |
This trap indicates that an AP detected a Wireless Bridge when a WDS frame was seen between the transmitter and receiver addresses. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1098 |
This trap indicates that an AP detected an invalid MAC OUI in the BSSID of a frame. An invalid MAC OUI suggests that the frame may be spoofed. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1099 |
This trap indicates that an AP detected an invalid MAC OUI in the SRC or DST address of a frame. An invalid MAC OUI suggests that the frame may be spoofed. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1100 |
This trap indicates that an AP detected an access point that is misconfigured because it does not have Privacy enabled. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1101 |
This trap indicates that an AP detected that a valid station is using the same WEP initialization vector in consecutive packets. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1102 |
This trap indicates that an AP detected that a valid station is using a Weak WEP initialization vector. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1103 |
This trap indicates that an AM detected a client associated with a Rogue access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1104 |
This trap indicates that a previously detected rogue access point association is no longer present. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1105 |
This trap indicates that an AM has detected an Ad hoc network that is bridging to a wired network |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1106 |
This trap indicates that an AP detected an access point classified as Interfering. The access point is declared Interfering because it is neither authorized or classified as Rogue. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1111 |
An enterprise version of cold start trap, which contains the controller time stamp. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1112 |
An enterprise version of warm start trap, which contains the controller time stamp. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1113 |
This trap indicates that an AP detected AP Impersonation because the number of beacons seen has exceeded the expected number by the configured percentage threshold. The expected number is calculated based on the Beacon Interval Field in the Beacon frame. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1115 |
This trap indicates that an authentication server is down. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1129 |
This trap indicates that an AM has detected a station that is bridging from a wireless network to a wired network |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1134 |
This trap indicates that an AP detected a signature match for Netstumbler from an access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1135 |
This trap indicates that an AP detected a signature match for Netstumbler from a Station. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1136 |
This trap indicates that an AP detected a signature match for ASLEAP from an access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1137 |
This trap indicates that an AP detected a signature match for ASLEAP from a Station. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1138 |
This trap indicates that an AP detected a signature match for AirJack from an access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1139 |
This trap indicates that an AP detected a signature match for AirJack from a Station. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1140 |
This trap indicates that an AP detected a signature match for Null-Probe-Response from an access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1141 |
This trap indicates that an AP detected a signature match for Null-Probe-Response from a Station. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1142 |
This trap indicates that an AP detected a signature match for Deauth-Broadcast from an access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1143 |
This trap indicates that an AP detected a signature match for Deauth-Broadcast from a Station. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1144 |
This trap indicates that an AP is detecting an access point that is bridging from a wireless network to a wired network. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1145 |
This trap indicates that an AP is detecting a station that is bridging from a wireless network to a wired network. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1146 |
This trap indicates that an AM has detected an Ad hoc network that is bridging to a wired network |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1147 |
This trap indicates that an AM has detected an Ad hoc network that is bridging to a wired network |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1148 |
This trap indicates that an AM detected a station disconnect attack. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1149 |
This trap indicates that an AM detected a station Disconnect attack. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1150 |
This trap indicates that an access point, classified as Suspected Rogue, has been detected by a Controller. The AP is suspected to be rogue, with the supplied confidence level, because it was matched to the wired MAC address. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1151 |
This trap indicates that a previously detected access point, classified Suspected Rogue, is either no longer present in the network or has changed its state. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1157 |
This trap indicates that an AP detected an access point that supports HT Greenfield mode. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1158 |
This trap indicates that an AP is detecting an access point with the HT 40MHz intolerance setting. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1159 |
This trap indicates that the system is detecting an HT 40MHz Intolerance setting from a Station. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1160 |
This trap indicates that all authentication servers is a server group are brought back in service. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1161 |
This trap indicates that an AP detected an ad hoc network where a station is connected to an ad hoc access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1162 |
This trap indicates that an AP detected an ad hoc network that is bridging to a wired network. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1163 |
This trap indicates that an AP detected an ad hoc network that is bridging to a wired network. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1170 |
This trap indicates that the number of potential fake clients detected by an AP has exceeded the configured IDS threshold. This is the total number of fake clients observed across all bands. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1171 |
This trap indicates that an AP detected an unencrypted data frame between a valid client and an access point. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1172 |
This trap indicates that an AP detected an ad hoc network using a valid/protected SSID. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1173 |
This trap indicates that an AP detected that one of its virtual APs is being spoofed using MAC spoofing. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1174 |
This trap indicates that an AP detected a client trying to associate to one of its BSSIDs on the wrong channel. This can be a sign that the BSSID is being spoofed in order to fool the client into thinking the AP is operating on another channel. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1175 |
This trap indicates that an AP has determined that a client is under Disconnect Attack because the rate of Assoc/Reassoc Response packets received by that client exceeds the configured threshold. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1176 |
This trap indicates that an AP that had previously detected a client association to a Rogue access point is no longer detecting that association. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1177 |
This trap indicates that an AP detected an Omerta attack. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1178 |
This trap indicates that an AP detected a TKIP replay attack. If successful this could be the precursor to more advanced attacks. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1179 |
This trap indicates that an AP detected a ChopChop attack. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1180 |
This trap indicates that an AP detected a FATA-Jack attack. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1181 |
This trap indicates that an AP detected an invalid source and destination combination. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1182 |
This trap indicates that an AP detected a misassociation between a valid client and an unsafe AP. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1183 |
This trap indicates that an AP detected a malformed HT Information Element. This can be the result of a misbehaving wireless driver or it may be an indication of a new wireless attack. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1184 |
This trap indicates that an AP detected a malformed association request with a NULL SSID. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1185 |
This trap indicates that an AP detected a management frame with a malformed information element. The declared length of the element is larger than the entire frame containing the element. This may be used to corrupt or crash wireless drivers. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1186 |
This trap indicates that an AP detected a key in an EAPOL Key message with a specified length greater than the length of the entire message. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1187 |
This trap indicates that an AP detected an unusually large duration in a wireless frame. This may be an attempt to block other devices from transmitting. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1188 |
This trap indicates that an AP detected a beacon on one channel advertising another channel. This could be an attempt to lure clients away from a valid AP. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1189 |
This trap indicates that an AP detected an authentication frame with either a bad algorithm (similar to Fata-Jack) or a bad transaction. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1190 |
This trap indicates that the rate of CTS packets received by an AP exceeds the configured IDS threshold. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1191 |
This trap indicates that the rate of RTS packets received by an AP exceeds the configured IDS threshold. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1192 |
This trap indicates that an unauthorized access point is connected to the wired network. The access point is classified as Rogue by the system. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1193 |
This trap indicates that a previously detected access point, classified as Rogue, is either no longer present in the network or it changed its state. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1194 |
This trap indicates that an access point has been classified as a Neighbor by the system. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1195 |
This trap indicates that an access point has been classified as Interfering by the system. The access point is declared Interfering because it is not authorized, nor has it been classified as a Rogue. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1196 |
This trap indicates that an access point, classified as Suspected Rogue, is detected by the system. The AP is suspected to be rogue with the supplied confidence level. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1197 |
This trap indicates that a previously detected access point, classified as Suspected Rogue, is either no longer present in the network or has changed its state. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1198 |
This trap indicates that an attempt has been made to deny service to the source address by spoofing a block ACK add request that sets a sequence number window outside the currently used window. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1199 |
This trap indicates that a new AP has appeared immediately following a client probe request. This is indicative of the Hotspotter tool or similar that attempts to trap clients with a fake hotspot or other wireless network. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1200 |
This trap indicates that an AP detected a signature match in a frame. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1201 |
This trap indicates that an AP detected a signature match for Netstumbler in a frame. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1202 |
This trap indicates that an AP detected a signature match for ASLEAP in a frame. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1203 |
This trap indicates that an AP detected a signature match for Airjack in a frame. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1204 |
This trap indicates that an AP detected a signature match for Null-Probe-Response in a frame. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1205 |
This trap indicates that an AP detected a signature match for Deauth-Broadcast in a frame. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1206 |
This trap indicates that an AP detected a signature match for Disassoc-Broadcast in a frame. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1207 |
This trap indicates that an AP detected a signature match for Wellenreiter in a frame. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1208 |
This trap indicates that an AP has attempted to contain an access point by disconnecting its client. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1209 |
This trap indicates that an AP has attempted to contain a client by disconnecting it from the AP that it is associated with. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1210 |
This trap indicates that an AP has attempted to contain an access point by disrupting traffic to its client on the wired interface. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1211 |
This trap indicates that an AP has attempted to contain a client by disrupting traffic to it on the wired interface. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1212 |
This trap indicates that an AP has attempted to contain an access point by disrupting traffic to its client on the wired interface. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1213 |
This trap indicates that an AP has attempted to contain a client by disrupting traffic to it on the wired interface. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1214 |
This trap indicates that an AP has attempted to contain an access point by moving a client that is attempting to associate to it to a tarpit. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1216 |
This trap indicates that an AP changed its channel. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1217 |
This trap indicates that an AP changed its transmit power level. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1218 |
This trap indicates that an AP changed its mode from AP to APMonitor or vice versa. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1219 |
This trap indicates that the user entry attributes have changed. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1220 |
This trap indicates that an AP detected a Power Save DoS attack. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1221 |
This trap indicates that the status of the AP as seen by the master controller has changed. **NOTE: this notification is obsoleted and replaced by wlsxNAPConductorStatusChange |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1222 |
This trap indicates that an AP detected an ad hoc network node using a valid/protected SSID. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1224 |
This trap indicates that a management user authentication has failed. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1252 |
When the active uplink of an AP changes, a notification is sent to the Management Entity with the new uplink type |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1255 |
Indicated failure in applying config. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1256 |
This trap indicates that the authentication server accounting timed out. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1259 |
This trap indicates that the portal server is down. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1260 |
This trap indicates that the portal server is up. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1262 |
The trap represents a IAP voice client location update. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1267 |
This trap indicates there is a possible attack of the Fast BSS Transition causing a WPA key re-installation. This can be indicative of a security breach where an attacker can hijack a client's association and/or decrypt an otherwise secure connection. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1268 |
This trap indicates that an AP detected a possible channel-based Man in the Middle attack by someone using spoofed beacons with an invalid Channel Switch Announcement. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1271 |
This trap indicates that loop is detected on AP's secure jack port. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1272 |
This trap indicates that broadcast storm is detected on AP's secure jack port. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1274 |
This trap indicates that clearpass server is not valid when using the CA to verity the server for download-role. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1277 |
This trap indicates that an USB device is plugged in or out to an AP. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1284 |
This trap indicates the client is rejected by the max client count. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1285 |
This trap indicates the client PSK Authentication Failed. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1286 |
This trap indicates that the station is in deny list. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1287 |
This trap indicates that the station is removed from the deny list. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1288 |
This trap indicates that the status of the AP as seen by the conductor controller has changed. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1291 |
This trap indicates that an AP detected a wireless client associated to a WIFI-Direct Group Owner. |
|
|
.1.3.6.1.4.1.14823.2.3.3.1.200.2.1292 |
This trap indicates that containment is being enforced on a wireless client that is associated to a WIFI-Direct Group Owner. |