TRAPEZE-NETWORKS-TRAP-MIB
Notifications emitted by Trapeze Networks wireless switches.
AP = Access Point;
AC = Access Controller (wireless switch),
the device that runs a SNMP Agent implementing this MIB.
Copyright 2004-2012 Trapeze Networks, Inc.
All rights reserved.
This Trapeze Networks SNMP Management Information Base
Specification (Specification) embodies Trapeze Networks'
confidential and proprietary intellectual property.
Trapeze Networks retains all title and ownership in
the Specification, including any revisions.
This Specification is supplied 'AS IS' and Trapeze Networks
makes no warranty, either express or implied, as to the use,
operation, condition, or performance of the Specification.
trpzTrapMib
1.3.6.1.4.1.14525.4.1
Imported Objects
| INET-ADDRESS-MIB | InetAddress InetAddressIPv4 InetAddressIPv6 InetAddressType |
| SNMPv2-SMI | Counter32 IpAddress MODULE-IDENTITY NOTIFICATION-TYPE OBJECT-TYPE TimeTicks Unsigned32 |
| SNMPv2-TC | DisplayString MacAddress TEXTUAL-CONVENTION |
| TRAPEZE-NETWORKS-AP-TC | TrpzAccessType TrpzApAttachType TrpzApConnectSecurityType TrpzApFailDetail TrpzApFingerprint TrpzApNum TrpzApPortOrDapNum TrpzApRadioIndex TrpzApSerialNum TrpzApServiceAvailability TrpzApTransition TrpzApWasOperational TrpzChannelChangeType TrpzChannelNum TrpzCryptoType TrpzPowerLevel TrpzRadioChannelWidth TrpzRadioConfigState TrpzRadioMimoState TrpzRadioMode TrpzRadioNum TrpzRadioPowerChangeType TrpzRadioType TrpzRssi |
| TRAPEZE-NETWORKS-BASIC-TC | TrpzIpPort TrpzPhysPortNumberOrZero |
| TRAPEZE-NETWORKS-CLIENT-SESSION-TC | TrpzClientAccessMode TrpzClientAuthenProtocolType TrpzClientDeviceGroupName TrpzClientDeviceProfileName TrpzClientDeviceType TrpzClientDot1xState TrpzClientSessionState TrpzUserAccessType |
| TRAPEZE-NETWORKS-RF-DETECT-TC | TrpzRFDetectClassificationReason |
| TRAPEZE-NETWORKS-RF-NOISE-TC-MIB | TrpzRFNoiseSourceID TrpzRFNoiseSourceType |
| TRAPEZE-NETWORKS-ROOT-MIB | trpzMibs trpzTemporary trpzTraps |
Type Definitions (24)
| TrpzApMgrChangeReason | Enumeration |
other(1)failover(2)load-balancing(3) |
| TrpzAssociationFailureType | Enumeration |
other(1)load-balance(2)quiet-period(3)dot1x(4)no-prev-assoc(5)glare(6)cipher-rejected(7)cipher-mismatch(8)wep-not-configured(9)bad-assoc-request(10)out-of-memory(11)tkip-cm-active(12)roam-in-progress(13) |
| TrpzAuthenticationFailureType | Enumeration |
other(1)user-glob-mismatch(2)user-does-not-exist(3)invalid-password(4)server-timeout(5)signature-failed(6)local-certificate-error(7)all-servers-down(8)authentication-type-mismatch(9)server-rejected(10)fallthru-auth-misconfig(11)no-lastresort-auth(12)exceeded-max-attempts(13)password-expired(14) |
| TrpzAuthorizationFailureType | Enumeration |
other(1)user-param(2)location-policy(3)vlan-tunnel-failure(4)ssid-mismatch(5)acl-mismatch(6)timeofday-mismatch(7)crypto-type-mismatch(8)mobility-profile-mismatch(9)start-date-mismatch(10)end-date-mismatch(11)svr-type-mismatch(12)ssid-defaults(13)qos-profile-mismatch(14)simultaneous-logins(15) |
| TrpzAutoTuneFailureReason | Enumeration |
other(1)ap-conn-lost(2)ws-conn-lost(3) |
| TrpzBlacklistingCause | Enumeration |
bl-configured(1)bl-associate-pkt-flood(2)bl-re-associate-pkt-flood(3)bl-de-associate-pkt-flood(4) |
| TrpzClientAuthorizationReason | Enumeration |
other(1)new-client(2)re-auth(3)roam(4) |
| TrpzClientClearedReason | Enumeration |
other(1)normal(2)backup-failure(3) |
| TrpzClientDeviceProfileChangeReason | Enumeration |
other(1)aaa-policy(2)device-type-changed(3) |
| TrpzClientIpAddrChangeReason | Enumeration |
client-connected-ipv4(1)other(2)dhcp-to-static(3)ipv6-global-addr(10) |
| TrpzClusterFailureReason | Enumeration |
other(1)validation-error(2) |
| TrpzConfigSaveInitiatorType | Enumeration |
other(1)cli-console(2)cli-remote(3)https(4)snmp-set(5) |
| TrpzDot1xFailureType | Enumeration |
other(1)quiet-period(2)administrative-kill(3)bad-rsnie(4)timeout(5)max-sessions-exceeded(6)fourway-hs-failure(7)user-glob-mismatch(8)bonded-auth-failure(9)reauth-disabled(10)gkhs-failure(11)force-unauth-configured(12)cert-not-installed(13) |
| TrpzM2UConvNotPossibleReason | Enumeration |
other(1)max-conv-limit(2) |
| TrpzMichaelMICFailureCause | Enumeration |
detected-by-ap(1)detected-by-client(2) |
| TrpzMobilityDomainResiliencyStatus | Enumeration |
other(1)resilient(2)degraded(3) |
| TrpzMultimediaCallDirection | Enumeration |
incoming(1)outgoing(2) |
| TrpzMultimediaCallFailureReason | Enumeration |
other(1)resource-unavailable(2) |
| TrpzMultimediaSignalingProtocol | Enumeration |
other(1)sip(2) |
| TrpzRadioBand | Enumeration |
bandAN(1)bandBGN(2) |
| TrpzRFDetectDoSType | Enumeration |
probe-flood(1)auth-flood(2)null-data-flood(3)mgmt-6-flood(4)mgmt-7-flood(5)mgmt-d-flood(6)mgmt-e-flood(7)mgmt-f-flood(8)fakeap-ssid(9)fakeap-bssid(10)bcast-deauth(11)null-probe-resp(12)disassoc-spoof(13)deauth-spoof(14)decrypt-err(15)weak-wep-iv(16)wireless-bridge(17)netstumbler(18)wellenreiter(19)adhoc-client-frame(20)associate-pkt-flood(21)re-associate-pkt-flood(22)de-associate-pkt-flood(23)bssid-spoof(24) |
| TrpzSessionDisconnectType | Enumeration |
other(1)admin-disconnect(2)dyn-auth-disconnect(3) |
| TrpzUserAttributeList | OctetString |
range: 0..2048 |
| TrpzWsTunnelLimitType | Enumeration |
other(1)platform-tunnel-limit(2)ap-ws-tunnel-limit(3) |
Objects (157)
|
|
ObjectIdentifier | .1.3.6.1.4.1.14525.2.1 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.10 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioMimoState | .1.3.6.1.4.1.14525.2.100 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioType | .1.3.6.1.4.1.14525.2.101 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioType | .1.3.6.1.4.1.14525.2.102 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzCryptoType | .1.3.6.1.4.1.14525.2.103 |
|
|
TrpzClusterFailureReason | .1.3.6.1.4.1.14525.2.104 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.105 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.106 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.107 |
|
|
TRAPEZE-NETWORKS-BASIC-TCTrpzIpPort | .1.3.6.1.4.1.14525.2.108 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.109 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.11 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.110 |
|
|
TRAPEZE-NETWORKS-BASIC-TCTrpzIpPort | .1.3.6.1.4.1.14525.2.111 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.112 |
|
|
TrpzMultimediaSignalingProtocol | .1.3.6.1.4.1.14525.2.113 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.114 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.115 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRssi | .1.3.6.1.4.1.14525.2.116 |
|
|
TrpzMultimediaCallFailureReason | .1.3.6.1.4.1.14525.2.117 |
|
|
TrpzMultimediaCallDirection | .1.3.6.1.4.1.14525.2.118 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.119 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientSessionState | .1.3.6.1.4.1.14525.2.12 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.120 |
|
|
TrpzWsTunnelLimitType | .1.3.6.1.4.1.14525.2.121 |
|
|
TRAPEZE-NETWORKS-RF-NOISE-TC-MIBTrpzRFNoiseSourceID | .1.3.6.1.4.1.14525.2.122 |
|
|
TRAPEZE-NETWORKS-RF-NOISE-TC-MIBTrpzRFNoiseSourceType | .1.3.6.1.4.1.14525.2.123 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzChannelNum | .1.3.6.1.4.1.14525.2.124 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRssi | .1.3.6.1.4.1.14525.2.125 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.126 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.127 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.128 |
|
|
INET-ADDRESS-MIBInetAddressType | .1.3.6.1.4.1.14525.2.129 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.13 |
|
|
INET-ADDRESS-MIBInetAddress | .1.3.6.1.4.1.14525.2.130 |
|
|
TrpzM2UConvNotPossibleReason | .1.3.6.1.4.1.14525.2.131 |
|
|
TrpzRadioBand | .1.3.6.1.4.1.14525.2.132 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.133 |
|
|
TrpzAutoTuneFailureReason | .1.3.6.1.4.1.14525.2.134 |
|
|
INET-ADDRESS-MIBInetAddressType | .1.3.6.1.4.1.14525.2.135 |
|
|
INET-ADDRESS-MIBInetAddress | .1.3.6.1.4.1.14525.2.136 |
|
|
INET-ADDRESS-MIBInetAddressType | .1.3.6.1.4.1.14525.2.137 |
|
|
INET-ADDRESS-MIBInetAddress | .1.3.6.1.4.1.14525.2.138 |
|
|
INET-ADDRESS-MIBInetAddressType | .1.3.6.1.4.1.14525.2.139 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.14 |
|
|
INET-ADDRESS-MIBInetAddress | .1.3.6.1.4.1.14525.2.140 |
|
|
INET-ADDRESS-MIBInetAddressType | .1.3.6.1.4.1.14525.2.141 |
|
|
INET-ADDRESS-MIBInetAddress | .1.3.6.1.4.1.14525.2.142 |
|
|
INET-ADDRESS-MIBInetAddressIPv4 | .1.3.6.1.4.1.14525.2.143 |
|
|
INET-ADDRESS-MIBInetAddressIPv6 | .1.3.6.1.4.1.14525.2.144 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApRadioIndex | .1.3.6.1.4.1.14525.2.145 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientAccessMode | .1.3.6.1.4.1.14525.2.146 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApNum | .1.3.6.1.4.1.14525.2.147 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApRadioIndex | .1.3.6.1.4.1.14525.2.148 |
|
|
TRAPEZE-NETWORKS-BASIC-TCTrpzPhysPortNumberOrZero | .1.3.6.1.4.1.14525.2.149 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.15 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientDeviceType | .1.3.6.1.4.1.14525.2.150 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientDeviceType | .1.3.6.1.4.1.14525.2.151 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientDeviceGroupName | .1.3.6.1.4.1.14525.2.152 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientDeviceProfileName | .1.3.6.1.4.1.14525.2.153 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientDeviceProfileName | .1.3.6.1.4.1.14525.2.154 |
|
|
TrpzClientDeviceProfileChangeReason | .1.3.6.1.4.1.14525.2.155 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientAuthenProtocolType | .1.3.6.1.4.1.14525.2.16 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.17 |
|
|
SNMPv2-SMITimeTicks | .1.3.6.1.4.1.14525.2.18 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.19 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.2 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.20 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioNum | .1.3.6.1.4.1.14525.2.21 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.22 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.23 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.24 |
|
|
TrpzAssociationFailureType | .1.3.6.1.4.1.14525.2.25 |
|
|
TrpzAuthenticationFailureType | .1.3.6.1.4.1.14525.2.26 |
|
|
TrpzAuthorizationFailureType | .1.3.6.1.4.1.14525.2.27 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.28 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.29 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14525.2.3 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzAccessType | .1.3.6.1.4.1.14525.2.30 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzAccessType | .1.3.6.1.4.1.14525.2.31 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14525.2.32 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioPowerChangeType | .1.3.6.1.4.1.14525.2.33 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.34 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.35 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzChannelChangeType | .1.3.6.1.4.1.14525.2.36 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.37 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.38 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzPowerLevel | .1.3.6.1.4.1.14525.2.39 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14525.2.4 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzPowerLevel | .1.3.6.1.4.1.14525.2.40 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.41 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.42 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientDot1xState | .1.3.6.1.4.1.14525.2.43 |
|
|
TrpzDot1xFailureType | .1.3.6.1.4.1.14525.2.44 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzAccessType | .1.3.6.1.4.1.14525.2.45 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzUserAccessType | .1.3.6.1.4.1.14525.2.46 |
|
|
SNMPv2-SMITimeTicks | .1.3.6.1.4.1.14525.2.47 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.48 |
|
|
TrpzRFDetectDoSType | .1.3.6.1.4.1.14525.2.49 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14525.2.5 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.50 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.51 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.52 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14525.2.53 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApSerialNum | .1.3.6.1.4.1.14525.2.54 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApFingerprint | .1.3.6.1.4.1.14525.2.55 |
|
|
Enumeration | .1.3.6.1.4.1.14525.2.56 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14525.2.57 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApAttachType | .1.3.6.1.4.1.14525.2.58 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApPortOrDapNum | .1.3.6.1.4.1.14525.2.59 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.6 |
|
|
SNMPv2-TCDisplayString | .1.3.6.1.4.1.14525.2.60 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApTransition | .1.3.6.1.4.1.14525.2.61 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApFailDetail | .1.3.6.1.4.1.14525.2.62 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioType | .1.3.6.1.4.1.14525.2.63 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioConfigState | .1.3.6.1.4.1.14525.2.64 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApConnectSecurityType | .1.3.6.1.4.1.14525.2.65 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApServiceAvailability | .1.3.6.1.4.1.14525.2.66 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApWasOperational | .1.3.6.1.4.1.14525.2.67 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.68 |
|
|
TrpzClientIpAddrChangeReason | .1.3.6.1.4.1.14525.2.69 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioNum | .1.3.6.1.4.1.14525.2.7 |
|
|
SNMPv2-TCMacAddress | .1.3.6.1.4.1.14525.2.70 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.71 |
|
|
TrpzBlacklistingCause | .1.3.6.1.4.1.14525.2.72 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.73 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.74 |
|
|
TrpzUserAttributeList | .1.3.6.1.4.1.14525.2.75 |
|
|
TrpzUserAttributeList | .1.3.6.1.4.1.14525.2.76 |
|
|
TrpzSessionDisconnectType | .1.3.6.1.4.1.14525.2.77 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.78 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.79 |
|
|
Integer32 | .1.3.6.1.4.1.14525.2.8 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.80 |
|
|
TRAPEZE-NETWORKS-RF-DETECT-TCTrpzRFDetectClassificationReason | .1.3.6.1.4.1.14525.2.81 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.82 |
|
|
TrpzConfigSaveInitiatorType | .1.3.6.1.4.1.14525.2.83 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.84 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.85 |
|
|
SNMPv2-SMICounter32 | .1.3.6.1.4.1.14525.2.86 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzApNum | .1.3.6.1.4.1.14525.2.87 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioMode | .1.3.6.1.4.1.14525.2.88 |
|
|
TrpzMichaelMICFailureCause | .1.3.6.1.4.1.14525.2.89 |
|
|
OctetString | .1.3.6.1.4.1.14525.2.9 |
|
|
TRAPEZE-NETWORKS-CLIENT-SESSION-TCTrpzClientAccessMode | .1.3.6.1.4.1.14525.2.90 |
|
|
TrpzClientAuthorizationReason | .1.3.6.1.4.1.14525.2.91 |
|
|
TRAPEZE-NETWORKS-BASIC-TCTrpzPhysPortNumberOrZero | .1.3.6.1.4.1.14525.2.92 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.93 |
|
|
SNMPv2-SMIIpAddress | .1.3.6.1.4.1.14525.2.94 |
|
|
TrpzApMgrChangeReason | .1.3.6.1.4.1.14525.2.95 |
|
|
TrpzClientClearedReason | .1.3.6.1.4.1.14525.2.96 |
|
|
TrpzMobilityDomainResiliencyStatus | .1.3.6.1.4.1.14525.2.97 |
|
|
Unsigned32 | .1.3.6.1.4.1.14525.2.98 |
|
|
TRAPEZE-NETWORKS-AP-TCTrpzRadioChannelWidth | .1.3.6.1.4.1.14525.2.99 |
|
|
.1.3.6.1.4.1.14525.4.1 |
|
|
|
.1.3.6.1.4.1.14525.5.0 |
Notifications / Traps (88)
| Name | OID | Description |
|---|---|---|
|
|
.1.3.6.1.4.1.14525.5.0.1 |
The device has a failure indication |
|
|
.1.3.6.1.4.1.14525.5.0.10 |
This trap is sent when RF detection sweep finds a ad-hoc user. trpzRFDetectXmtrMacAddr is the MAC address of the ad-hoc user. trpzRFDetectListenerListInfo is a display string of a list of listener information. |
|
|
.1.3.6.1.4.1.14525.5.0.11 |
This trap is sent when a rogue has disappeared. Obsoleted by trpzRFDetectRogueDeviceDisappearTrap. |
|
|
.1.3.6.1.4.1.14525.5.0.12 |
This trap is sent if a client authentication fails. |
|
|
.1.3.6.1.4.1.14525.5.0.13 |
This trap is sent if a client authorization fails. |
|
|
.1.3.6.1.4.1.14525.5.0.14 |
This trap is sent if a client association fails. |
|
|
.1.3.6.1.4.1.14525.5.0.15 |
This trap is sent when a client authorizes. Obsoleted by trpzClientAuthorizationSuccessTrap5. |
|
|
.1.3.6.1.4.1.14525.5.0.16 |
This trap is sent if a client de-association occurred. Obsoleted by trpzClientDeAssociationTrap2. |
|
trpzUserName trpzClientSessionId trpzClientMACAddress trpzClientIp trpzClientAccessType trpzPortNum trpzAPRadioNum trpzDAPNum trpzRadioSSID trpzClientRoamedFromAccessType trpzClientRoamedFromPortNum trpzClientRoamedFromRadioNum trpzClientRoamedFromDAPNum trpzClientRoamedFromWsIp trpzClientTimeSinceLastRoam
|
.1.3.6.1.4.1.14525.5.0.17 |
This trap is sent if a client roams from one location to another. Obsoleted by trpzClientRoamingTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.18 |
This trap is sent if a radio's power level has changed based on auto-tune. |
|
|
.1.3.6.1.4.1.14525.5.0.19 |
This trap is sent if a radio's channel has changed based on auto-tune. |
|
|
.1.3.6.1.4.1.14525.5.0.2 |
The device has recovered |
|
|
.1.3.6.1.4.1.14525.5.0.20 |
This trap is sent when counter measures are started against a rogue. trpzRFDetectXmtrMacAddr is the mac address of the rogue we are doing counter measures against. trpzRadioMACAddress identifies the radio performing the countermeasures. |
|
|
.1.3.6.1.4.1.14525.5.0.21 |
This trap is sent when counter measures are stopped against a rogue. trpzRFDetectXmtrMacAddr is the mac address of the rogue we were doing counter measures against. trpzRadioMACAddress identifies the radio performing the countermeasures. |
|
|
.1.3.6.1.4.1.14525.5.0.22 |
This trap is sent if a client failed 802.1X. |
|
|
.1.3.6.1.4.1.14525.5.0.23 |
This trap is sent when a client session is cleared. Obsoleted by trpzClientClearedTrap3. |
|
|
.1.3.6.1.4.1.14525.5.0.24 |
This trap is sent when a client authorizes. Obsoleted by trpzClientAuthorizationSuccessTrap5. |
|
|
.1.3.6.1.4.1.14525.5.0.25 |
This trap is sent when RF detection finds an AP using the MAC of the listener. trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon. trpzRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by trpzRFDetectDoSTrap and trpzRFDetectRogueDeviceTrap2. One of the two traps will be sent depending on the type of AP MAC spoofing detected. |
|
|
.1.3.6.1.4.1.14525.5.0.26 |
This trap is sent when RF detection finds an AP using
the SSID of the listener, and the AP is not in the
mobility domain.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectRogueDeviceTrap2
and trpzRFDetectSuspectDeviceTrap2.
One of the two traps will be sent,
depending on RF detection classification rules.
|
|
|
.1.3.6.1.4.1.14525.5.0.27 |
This trap is sent when RF detection finds a denial of service (DoS) occurring. trpzRFDetectDoSType specifies the type of DoS. trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon. trpzRFDetectListenerListInfo is a display string of a list of listener information. |
|
|
.1.3.6.1.4.1.14525.5.0.28 |
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. trpzSourceWsIp is the IP address of the AC (switch) with the wired port. trpzPortNum is the port on the AC. trpzClientVLANid is the VLAN ID of the client's traffic. trpzClientVLANtag is the VLAN tag of the client's traffic. trpzRFDetectXmtrMacAddr is the MAC address of the client. trpzRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by trpzRFDetectClientViaRogueWiredAPTrap3. |
|
|
.1.3.6.1.4.1.14525.5.0.29 |
This trap is sent when RF detection finds an interfering rogue AP. trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon. trpzRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by trpzRFDetectSuspectDeviceTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.3 |
PoE has failed on the indicated port |
|
|
.1.3.6.1.4.1.14525.5.0.30 |
This trap is sent when an interfering rogue has disappeared. trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon. Obsoleted by trpzRFDetectSuspectDeviceDisappearTrap. |
|
|
.1.3.6.1.4.1.14525.5.0.31 |
This trap is sent when RF detection finds use of
an unauthorized SSID.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectRogueDeviceTrap2
and trpzRFDetectSuspectDeviceTrap2.
One of the two traps will be sent if the device having an
unauthorized SSID is classified as rogue or suspect because of this.
|
|
|
.1.3.6.1.4.1.14525.5.0.32 |
This trap is sent when RF detection finds use of
an unauthorized OUI.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
Obsoleted by trpzRFDetectRogueDeviceTrap2
and trpzRFDetectSuspectDeviceTrap2.
One of the two traps will be sent if the device having an
unauthorized OUI is classified as rogue or suspect because of this.
|
|
|
.1.3.6.1.4.1.14525.5.0.33 |
This trap is sent when RF detection finds operation of an unauthorized AP. trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon. trpzRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by trpzRFDetectRogueDeviceTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.34 |
A DAP, tried to connect to the AC.
trpzDeviceModel provides the model of the DAP.
trpzDeviceSerNum provides the serial number of the DAP.
trpzRsaPubKeyFingerPrint provides the computed
fingerprint of the DAP.
trpzDAPconnectWarningType provides the type
of connect warning.
Replaced by trpzApNonOperStatusTrap2,
with trpzApTransition = 'connectFail'.
|
|
|
.1.3.6.1.4.1.14525.5.0.35 |
This trap is sent when RF detection finds a denial of service (DoS) occurring. This has port and AP info instead of 'Listener info'. trpzRFDetectDoSType specifies the type of DoS. trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon. trpzClientAccessType specifies whether wired, AP, or DAP. trpzPortNum (for wired or AP), the port that is used. trpzDAPNum (for a DAP), the ID of the DAP. |
|
|
.1.3.6.1.4.1.14525.5.0.36 |
Two Michael MIC failures were seen within 60 seconds of
each other. Object trpzClientMACAddress is the source
of the first failure, and object trpzClientMACAddress2
source of the second failure.
Obsoleted by trpzMichaelMICFailure.
|
|
|
.1.3.6.1.4.1.14525.5.0.37 |
This trap is sent when the AP changes state and the new one is a non-operational state. Obsoleted by trpzApNonOperStatusTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.38 |
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoleted by trpzApOperRadioStatusTrap3. |
|
|
.1.3.6.1.4.1.14525.5.0.39 |
This trap is sent when a client's IP address changes. The most likely case for this is when the client first connects to the network. Obsoleted by trpzClientIpAddrChangeTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.4 |
The AP entering the AC at port trpzPortNum with MAC
trpzRadioMacAddress and of the access type (ap or dap)
has not responded.
Replaced by trpzApNonOperStatusTrap2,
with trpzApTransition = 'timeout'.
|
|
|
.1.3.6.1.4.1.14525.5.0.40 |
This trap is sent if a client association succeeds. WARNING: DO NOT enable it in normal use. It may impair switch performance! Only recommended for debugging network issues. |
|
|
.1.3.6.1.4.1.14525.5.0.41 |
This trap is sent if a client authentication succeeds. |
|
|
.1.3.6.1.4.1.14525.5.0.42 |
This trap is sent if a client de-authentication occurred. Obsoleted by trpzClientDeAuthenticationTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.43 |
This trap is sent if an association, re-association or de-association request (packet) is detected from a blacklisted transmitter (identified by MAC: 'trpzRFDetectXmtrMacAddr'). If 'trpzBlacklistingCause' is 'configured', then 'trpzBlacklistingRemainingTime' will be zero, meaning indefinite time (depending on administrative actions on the Black List). Otherwise, 'trpzBlacklistingRemainingTime' will indicate the time in seconds until this transmitter's requests could be allowed. |
|
|
.1.3.6.1.4.1.14525.5.0.44 |
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. trpzSourceWsIp is the IP address of the AC (switch) with the wired port. trpzPortNum is the port on the AC. trpzClientVLANid is the VLAN ID of the client's traffic. trpzClientVLANtag is the VLAN tag of the client's traffic. trpzRFDetectXmtrMacAddr is the MAC address of the client. trpzRFDetectListenerListInfo is a display string of a list of listener information. trpzRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired) the client is connected to. Obsoleted by trpzRFDetectClientViaRogueWiredAPTrap3. |
|
|
.1.3.6.1.4.1.14525.5.0.45 |
This trap is sent when RF detection sweep finds that an ad-hoc user disappeared. trpzRFDetectXmtrMacAddr is the MAC address of the ad-hoc user. |
|
|
.1.3.6.1.4.1.14525.5.0.46 |
This trap is sent when an AC (wireless switch) receives a packet from an inactive AP and attaching that AP would make the AC exceed the maximum (licensed) number of active APs. |
|
trpzUserName trpzClientSessionId trpzClientMACAddress trpzClientIp trpzClientSessionState trpzClientDynAuthorClientIp trpzClientAuthenProtocolType trpzClientAccessType trpzPortNum trpzAPRadioNum trpzDAPNum trpzRadioSSID trpzUserAccessType trpzLocalId trpzChangedUserParamOldValues trpzChangedUserParamNewValues
|
.1.3.6.1.4.1.14525.5.0.47 |
This trap is sent when the authorization attributes for a user are dynamically changed by an authorized dynamic authorization client. Obsoleted by trpzClientDynAuthorChangeSuccessTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.48 |
This trap is sent if a change of authorization request sent by an authorized dynamic authorization client is unsuccessful. |
|
|
.1.3.6.1.4.1.14525.5.0.49 |
This trap is sent when a client session is terminated administratively. Obsoleted by trpzClientDisconnectTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.5 |
The AP entering the AC at port trpzPortNum with MAC
trpzRadioMacAddress and of the access type (ap or dap) has booted.
Replaced by trpzApNonOperStatusTrap2,
with trpzApTransition = 'bootSuccess'.
|
|
|
.1.3.6.1.4.1.14525.5.0.50 |
This trap is sent when the Mobility Domain fails over to the secondary seed. |
|
|
.1.3.6.1.4.1.14525.5.0.51 |
This trap is sent when the Mobility Domain fails back to the primary seed. |
|
|
.1.3.6.1.4.1.14525.5.0.52 |
This trap is sent when RF detection finds a rogue device. XmtrMacAddr is the radio MAC address from the beacon. ListenerListInfo is a display string of a list of listener information. ClassificationReason indicates the reason why the device is classified as rogue. Obsoleted by trpzRFDetectRogueDeviceTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.53 |
This trap is sent when a rogue device has disappeared. This trap obsoletes the trpzRFDetectRogueDisappearTrap. |
|
|
.1.3.6.1.4.1.14525.5.0.54 |
This trap is sent when RF detection finds a suspect device. trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon. trpzRFDetectListenerListInfo is a display string of a list of listener information. ClassificationReason indicates the reason why the device is classified as suspect. Obsoleted by trpzRFDetectSuspectDeviceTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.55 |
This trap is sent when a suspect device has disappeared. trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon. This trap obsoletes the trpzRFDetectInterferingRogueDisappearTrap. |
|
|
.1.3.6.1.4.1.14525.5.0.56 |
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. trpzSourceWsIp is the IP address of the AC (switch) with the wired port. trpzPortNum is the port on the AC. trpzClientVLANid is the VLAN ID of the client's traffic. trpzClientVLANtag is the VLAN tag of the client's traffic. trpzRFDetectXmtrMacAddr is the MAC address of the client. trpzRFDetectListenerListInfo is a display string of a list of listener information. trpzRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired) the client is connected to. ClassificationReason indicates the reason why the AP is classified as rogue. This trap obsoletes the trpzRFDetectClientViaRogueWiredAPTrap and trpzRFDetectClientViaRogueWiredAPTrap2. |
|
|
.1.3.6.1.4.1.14525.5.0.57 |
This trap is sent when RF detection classification rules change. |
|
|
.1.3.6.1.4.1.14525.5.0.58 |
This trap is sent when the running configuration of the switch is written to a configuration file. |
|
|
.1.3.6.1.4.1.14525.5.0.59 |
This trap is sent when the AP changes state and the new one is a non-operational state. Obsoletes trpzApNonOperStatusTrap. |
|
|
.1.3.6.1.4.1.14525.5.0.6 |
The mobility domain member has received an UP notice from the remote address. |
|
|
.1.3.6.1.4.1.14525.5.0.60 |
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoleted by trpzApOperRadioStatusTrap3. |
|
|
.1.3.6.1.4.1.14525.5.0.61 |
Two Michael MIC failures were seen within 60 seconds of each other.
Object trpzClientMACAddress indicates
the source of the first failure,
and object trpzClientMACAddress2 indicates
the source of the second failure.
Service is interrupted for 60 seconds on the radio
due to TKIP countermeasures having commenced.
The radio is identified by trpzApNum and trpzAPRadioNum.
An alternative way to identify the radio is trpzRadioMACAddress.
Obsoletes trpzMpMichaelMICFailure and trpzMpMichaelMICFailure2.
|
|
|
.1.3.6.1.4.1.14525.5.0.62 |
This trap is sent when a client authorizes.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzAPRadioNum, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent.
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoleted by trpzClientAuthorizationSuccessTrap5.
|
|
|
.1.3.6.1.4.1.14525.5.0.63 |
This trap is sent when the AP's secondary link becomes its primary link. |
|
|
.1.3.6.1.4.1.14525.5.0.64 |
This trap is sent when a client session is cleared. Obsoleted by trpzClientClearedTrap3. |
|
|
.1.3.6.1.4.1.14525.5.0.65 |
This trap is sent by a mobility domain seed to announce changes in resilient capacity status. |
|
|
.1.3.6.1.4.1.14525.5.0.66 |
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoletes trpzApOperRadioStatusTrap and trpzApOperRadioStatusTrap2. |
|
trpzUserName trpzClientSessionId trpzClientMACAddress trpzClientIp trpzClientVLANName trpzClientSessionState trpzClientAuthServerIp trpzClientAuthenProtocolType trpzClientAccessMode trpzPhysPortNum trpzApNum trpzAPRadioNum trpzRadioSSID trpzClientRadioType trpzUserAccessType trpzLocalId trpzClientAuthorizationReason
|
.1.3.6.1.4.1.14525.5.0.67 |
This trap is sent when a client authorizes.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzAPRadioNum, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
trpzClientRadioType gives the type of radio used by this client.
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoleted by trpzClientAuthorizationSuccessTrap5.
|
|
|
.1.3.6.1.4.1.14525.5.0.68 |
This trap is sent when RF detection finds a rogue device.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectXmtrRadioType indicates the Type of Radio
used by the transmitter (rogue device).
trpzRFDetectXmtrCryptoType indicates the Type of Crypto
used by the transmitter (rogue device).
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
trpzRFDetectClassificationReason indicates the reason
why the device is classified as rogue.
Obsoletes trpzRFDetectRogueAPTrap,
trpzRFDetectUnAuthorizedAPTrap,
trpzRFDetectRogueDeviceTrap.
|
|
|
.1.3.6.1.4.1.14525.5.0.69 |
This trap is sent when RF detection finds a suspect device.
trpzRFDetectXmtrMacAddr is the radio MAC address from the beacon.
trpzRFDetectXmtrRadioType indicates the Type of Radio
used by the transmitter (suspect device).
trpzRFDetectXmtrCryptoType indicates the Type of Crypto
used by the transmitter (suspect device).
trpzRFDetectListenerListInfo is a display string of a list of
listener information.
trpzRFDetectClassificationReason indicates the reason
why the device is classified as suspect.
Obsoletes trpzRFDetectInterferingRogueAPTrap,
trpzRFDetectSuspectDeviceTrap.
|
|
|
.1.3.6.1.4.1.14525.5.0.7 |
The mobility domain member has declared the remote address to be DOWN. |
|
|
.1.3.6.1.4.1.14525.5.0.70 |
This trap is sent when the cluster configuration failed to apply.
If trpzClusterFailureReason = 'validation-error':
The validation error is reported by the receiving end
of the configuration updates.
The receiving end can be any AC (switch) in the mobility domain:
member, secondary seed or primary seed.
- Primary seed will be the receiving end of configuration updates
when Primary seed is joining the cluster
and Secondary seed has preempt mode enabled.
- Both Secondary seed and member will be at the receiving end
when Primary seed is active.
|
|
trpzClientMACAddress trpzClientAccessMode trpzPhysPortNum trpzApNum trpzAPRadioNum trpzRadioSSID trpzMultimediaCommunicationServerID trpzMultimediaCallDirection trpzMultimediaLocalStationIp trpzMultimediaLocalStationPort trpzMultimediaLocalStationEndpointID trpzMultimediaRemoteStationIp trpzMultimediaRemoteStationPort trpzMultimediaRemoteStationEndpointID trpzMultimediaSignalingProtocol trpzMultimediaCallBandwidthAndCodec trpzMultimediaCallDataRate trpzMultimediaCallRssi trpzMultimediaCallFailureReason
|
.1.3.6.1.4.1.14525.5.0.71 |
This trap is sent when a multimedia call fails. |
|
|
.1.3.6.1.4.1.14525.5.0.72 |
This trap is sent by the AP primary controller (PAM) when an AP rejects a tunnel creation request because it has already created the maximum number of tunnels it can support. |
|
|
.1.3.6.1.4.1.14525.5.0.73 |
This trap is sent when the AC (wireless switch)
rejects a tunnel creation request because it has reached
the maximum number of tunnels supported
(indicated by 'trpzWsTunnelLimit').
When trpzWsTunnelLimitType = 'platform-tunnel-limit' (2)
the AC has reached the maximum tunnel capacity,
which depends on the platform.
When trpzWsTunnelLimitType = 'ap-ws-tunnel-limit' (3)
the AC has reached the AP-to-switch tunnels limit,
which depends on the current situation of the AC
(mobility domain, network domain, network resiliency status).
|
|
|
.1.3.6.1.4.1.14525.5.0.74 |
This trap is sent upon the appearance of a new noise source.
'trpzRadioMACAddress' indicates the listener
(the AP radio reporting the noise).
A given combination of noise source ID, listener and channel
should trigger this trap at most once every 15 minutes.
|
|
|
.1.3.6.1.4.1.14525.5.0.75 |
This trap is sent when multicast to unicast conversion is enabled on the AP, but cannot be performed. |
|
|
.1.3.6.1.4.1.14525.5.0.76 |
This trap is sent when the multicast to unicast conversion can be resumed on the AP, after disruption. |
|
|
.1.3.6.1.4.1.14525.5.0.77 |
This trap is sent when an auto-tune operation completed successfully. |
|
|
.1.3.6.1.4.1.14525.5.0.78 |
This trap is sent when an auto-tune operation failed to complete. |
|
|
.1.3.6.1.4.1.14525.5.0.79 |
This trap is sent if a client de-association occurred.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
before deassociation;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientDeAssociationTrap.
|
|
|
.1.3.6.1.4.1.14525.5.0.8 |
Two Michael MIC failures were seen within 60 seconds of each other.
Obsoleted by trpzMichaelMICFailure.
|
|
trpzUserName trpzClientSessionId trpzClientMACAddress trpzClientIPv4Addr trpzClientIPv6LinkLocalAddr trpzClientAccessMode trpzPhysPortNum trpzApNum trpzApRadioIndex trpzRadioSSID trpzClientRoamedFromAccessMode trpzClientRoamedFromPhysPortNum trpzClientRoamedFromApNum trpzClientRoamedFromRadioIndex trpzClientRoamedFromWsAddrType trpzClientRoamedFromWsAddr trpzClientTimeSinceLastRoam
|
.1.3.6.1.4.1.14525.5.0.80 |
This trap is sent if a client roams from one location to another.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client,
after roam;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client, after roam.
Obsoletes trpzClientRoamingTrap.
|
|
trpzUserName trpzClientSessionId trpzClientMACAddress trpzClientIpAddrType trpzClientIpAddr trpzClientVLANName trpzClientSessionState trpzClientAuthServerAddrType trpzClientAuthServerAddr trpzClientAuthenProtocolType trpzClientAccessMode trpzPhysPortNum trpzApNum trpzApRadioIndex trpzRadioSSID trpzUserAccessType trpzLocalId trpzClientIpAddrChangeReason
|
.1.3.6.1.4.1.14525.5.0.81 |
This trap is sent when an IP address of a client changes.
The most likely cases for this are when the client first
connects to the network and when a new IPv6 global address is
assigned to the client.
The pair of objects trpzClientIpAddrType/trpzClientIpAddr
indicates the type and the value of the new IP address.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientIpAddrChangeTrap.
|
|
|
.1.3.6.1.4.1.14525.5.0.82 |
This trap is sent if a client de-authentication occurred.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientDeAuthenticationTrap.
|
|
trpzUserName trpzClientSessionId trpzClientMACAddress trpzClientIPv4Addr trpzClientIPv6LinkLocalAddr trpzClientSessionState trpzClientDynAuthorClientAddrType trpzClientDynAuthorClientAddr trpzClientAuthenProtocolType trpzClientAccessMode trpzPhysPortNum trpzApNum trpzApRadioIndex trpzRadioSSID trpzUserAccessType trpzLocalId trpzChangedUserParamOldValues trpzChangedUserParamNewValues
|
.1.3.6.1.4.1.14525.5.0.83 |
This trap is sent when the authorization attributes for a user
are dynamically changed by an authorized dynamic authorization
client.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientDynAuthorChangeSuccessTrap.
|
|
|
.1.3.6.1.4.1.14525.5.0.84 |
This trap is sent when a client session is terminated administratively.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientDisconnectTrap.
|
|
|
.1.3.6.1.4.1.14525.5.0.85 |
This trap is sent when a client session is cleared.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientClearedTrap,
trpzClientClearedTrap2.
|
|
trpzUserName trpzClientSessionId trpzClientMACAddress trpzClientIPv4Addr trpzClientIPv6LinkLocalAddr trpzClientVLANName trpzClientSessionState trpzClientAuthServerAddrType trpzClientAuthServerAddr trpzClientAuthenProtocolType trpzClientAccessMode trpzPhysPortNum trpzApNum trpzApRadioIndex trpzRadioSSID trpzClientRadioType trpzUserAccessType trpzLocalId trpzClientAuthorizationReason
|
.1.3.6.1.4.1.14525.5.0.86 |
This trap is sent when a client authorizes.
If trpzClientAccessMode = 'ap':
trpzApNum, trpzApRadioIndex, trpzRadioSSID
identify the AP/radio/BSS providing wireless service to this client
at the time this trap was sent;
trpzClientRadioType gives the type of radio used by this client.
If trpzClientAccessMode = 'wired':
trpzPhysPortNum identifies the physical port on the AC
used by this wired-auth client.
Obsoletes trpzClientAuthorizationSuccessTrap,
trpzClientAuthorizationSuccessTrap2,
trpzClientAuthorizationSuccessTrap3,
trpzClientAuthorizationSuccessTrap4.
|
|
trpzUserName trpzClientSessionId trpzClientMACAddress trpzClientIPv4Addr trpzClientIPv6LinkLocalAddr trpzClientDeviceType trpzClientDeviceTypeOld trpzClientDeviceGroup trpzClientDeviceProfileName trpzClientVLANName trpzClientSessionState trpzClientAuthServerAddrType trpzClientAuthServerAddr trpzClientAuthenProtocolType trpzClientAccessMode trpzPhysPortNum trpzApNum trpzApRadioIndex trpzRadioSSID trpzUserAccessType trpzLocalId
|
.1.3.6.1.4.1.14525.5.0.87 |
This trap is sent when the detected device type
of a client changes.
The new device type is indicated by trpzClientDeviceType.
trpzClientDeviceGroup indicates the group that
the new device type belongs to.
As of release 8.0, device detection is done only for
wireless clients (trpzClientAccessMode = 'ap').
|
|
trpzUserName trpzClientSessionId trpzClientMACAddress trpzClientIPv4Addr trpzClientIPv6LinkLocalAddr trpzClientDeviceType trpzClientDeviceGroup trpzClientDeviceProfileName trpzClientDeviceProfileNameOld trpzClientDeviceProfileChangeReason trpzClientVLANName trpzClientSessionState trpzClientAuthServerAddrType trpzClientAuthServerAddr trpzClientAuthenProtocolType trpzClientAccessMode trpzPhysPortNum trpzApNum trpzApRadioIndex trpzRadioSSID trpzUserAccessType trpzLocalId
|
.1.3.6.1.4.1.14525.5.0.88 |
This trap is sent when the device profile for
a client device changes.
The new device profile is indicated by trpzClientDeviceProfileName.
trpzClientDeviceProfileChangeReason indicates the reason
why the device profile changed.
As of release 8.0, device detection is done only for
wireless clients (trpzClientAccessMode = 'ap').
|
|
|
.1.3.6.1.4.1.14525.5.0.9 |
This trap is sent when RF detection finds a rogue AP. XmtrMacAddr is the radio MAC address from the beacon. ListenerListInfo is a display string of a list of listener information. Obsoleted by trpzRFDetectRogueDeviceTrap2. |