ntwsClientIpAddrChangeTrap
NTWS-TRAP-MIB ·
.1.3.6.1.4.1.45.6.1.5.0.39
Object
notification
This trap is sent when a client's IP address changes. The most likely case for this is when the client first connects to the network.
Context
- MIB
- NTWS-TRAP-MIB
- OID
.1.3.6.1.4.1.45.6.1.5.0.39- Type
- notification
- Status
- current
- Parent
- ntwsTrapsV2
- Siblings
- 69
Syntax
No syntax metadata recorded.
Values & Constraints
No enumerated values or constraints recorded.
Related Objects
Sibling Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| ntwsDeviceFailTrap The device has a failure indication | notification | - | .1.3.6.1.4.1.45.6.1.5.0.1 |
| ntwsRFDetectAdhocUserTrap This trap is sent when RF detection sweep finds a ad-hoc user.
ntwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user.
ntwsRFDetectListenerListInfo is a display string of a… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.10 |
| ntwsRFDetectRogueDisappearTrap obsolete This trap is sent when a rogue has disappeared.
Obsoleted by ntwsRFDetectRogueDeviceDisappearTrap. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.11 |
| ntwsClientAuthenticationFailureTrap This trap is sent if a client authentication fails. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.12 |
| ntwsClientAuthorizationFailureTrap This trap is sent if a client authorization fails. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.13 |
| ntwsClientAssociationFailureTrap This trap is sent if a client association fails. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.14 |
| ntwsClientAuthorizationSuccessTrap obsolete This trap is sent when a client authorizes.
Obsoleted by ntwsClientAuthorizationSuccessTrap4. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.15 |
| ntwsClientDeAssociationTrap This trap is sent if a client de-association occurred. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.16 |
| ntwsClientRoamingTrap This trap is sent if a client roams from one location to another. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.17 |
| ntwsAutoTuneRadioPowerChangeTrap This trap is sent if a radio's power level has changed based
on auto-tune. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.18 |
| ntwsAutoTuneRadioChannelChangeTrap This trap is sent if a radio's channel has changed based on auto-tune. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.19 |
| ntwsDeviceOkayTrap The device has recovered | notification | - | .1.3.6.1.4.1.45.6.1.5.0.2 |
| ntwsCounterMeasureStartTrap This trap is sent when counter measures are started against a rogue.
ntwsRFDetectXmtrMacAddr is the mac address of the rogue we
are doing counter measures against.
ntwsRadioMACAdd… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.20 |
| ntwsCounterMeasureStopTrap This trap is sent when counter measures are stopped against a rogue.
ntwsRFDetectXmtrMacAddr is the mac address of the rogue we
were doing counter measures against.
ntwsRadioMACAd… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.21 |
| ntwsClientDot1xFailureTrap This trap is sent if a client failed 802.1X. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.22 |
| ntwsClientClearedTrap obsolete This trap is sent when a client session is cleared.
Obsoleted by ntwsClientClearedTrap2. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.23 |
| ntwsClientAuthorizationSuccessTrap2 obsolete This trap is sent when a client authorizes.
Obsoleted by ntwsClientAuthorizationSuccessTrap4. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.24 |
| ntwsRFDetectSpoofedMacAPTrap obsolete This trap is sent when RF detection finds an AP using
the MAC of the listener.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
ntwsRFDetectListenerListInfo is a … | notification | - | .1.3.6.1.4.1.45.6.1.5.0.25 |
| ntwsRFDetectSpoofedSsidAPTrap obsolete This trap is sent when RF detection finds an AP using
the SSID of the listener, and the AP is not in the
mobility domain.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.26 |
| ntwsRFDetectDoSTrap This trap is sent when RF detection finds a denial
of service (DoS) occurring.
ntwsRFDetectDoSType specifies the type of DoS.
ntwsRFDetectXmtrMacAddr is the radio MAC address from… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.27 |
| ntwsRFDetectClientViaRogueWiredAPTrap obsolete This trap is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
ntwsSourceWsIp is the IP address of the AC (switch) with the wired port… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.28 |
| ntwsRFDetectInterferingRogueAPTrap obsolete This trap is sent when RF detection finds an interfering
rogue AP.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
ntwsRFDetectListenerListInfo is a display stri… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.29 |
| ntwsPoEFailTrap PoE has failed on the indicated port | notification | - | .1.3.6.1.4.1.45.6.1.5.0.3 |
| ntwsRFDetectInterferingRogueDisappearTrap obsolete This trap is sent when an interfering rogue has disappeared.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
Obsoleted by ntwsRFDetectSuspectDeviceDisappearTrap. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.30 |
| ntwsRFDetectUnAuthorizedSsidTrap obsolete This trap is sent when RF detection finds use of
an unauthorized SSID.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
ntwsRFDetectListenerListInfo is a display … | notification | - | .1.3.6.1.4.1.45.6.1.5.0.31 |
| ntwsRFDetectUnAuthorizedOuiTrap obsolete This trap is sent when RF detection finds use of
an unauthorized OUI.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
ntwsRFDetectListenerListInfo is a display s… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.32 |
| ntwsRFDetectUnAuthorizedAPTrap obsolete This trap is sent when RF detection finds operation
of an unauthorized AP.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
ntwsRFDetectListenerListInfo is a disp… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.33 |
| ntwsDAPConnectWarningTrap obsolete A DAP, tried to connect to the AC.
ntwsDeviceModel provides the model of the DAP.
ntwsDeviceSerNum provides the serial number of the DAP.
ntwsRsaPubKeyFingerPrint provides the com… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.34 |
| ntwsRFDetectDoSPortTrap This trap is sent when RF detection finds a denial
of service (DoS) occurring. This has port and
AP info instead of 'Listener info'.
ntwsRFDetectDoSType specifies the type of DoS.… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.35 |
| ntwsMpMichaelMICFailure2 obsolete Two Michael MIC failures were seen within 60 seconds of
each other. Object ntwsClientMACAddress is the source
of the first failure, and object ntwsClientMACAddress2
source of the … | notification | - | .1.3.6.1.4.1.45.6.1.5.0.36 |
| ntwsApNonOperStatusTrap obsolete This trap is sent when the AP changes state
and the new one is a non-operational state.
Obsoleted by ntwsApNonOperStatusTrap2. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.37 |
| ntwsApOperRadioStatusTrap obsolete This trap is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoleted by nt… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.38 |
| ntwsApTimeoutTrap obsolete The AP entering the AC at port ntwsPortNum with MAC
ntwsRadioMacAddress and of the access type (ap or dap)
has not responded.
Replaced by ntwsApNonOperStatusTrap2,
with… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.4 |
| ntwsClientAssociationSuccessTrap This trap is sent if a client association succeeds.
WARNING: DO NOT enable it in normal use.
It may impair switch performance!
Only recommended for debugging network issues. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.40 |
| ntwsClientAuthenticationSuccessTrap This trap is sent if a client authentication succeeds. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.41 |
| ntwsClientDeAuthenticationTrap This trap is sent if a client de-authentication occured. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.42 |
| ntwsRFDetectBlacklistedTrap This trap is sent if an association, re-association or de-association
request (packet) is detected from a blacklisted transmitter
(identified by MAC: 'ntwsRFDetectXmtrMacAddr').
… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.43 |
| ntwsRFDetectClientViaRogueWiredAPTrap2 obsolete This trap is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
ntwsSourceWsIp is the IP address of the AC (switch)
with the wired port… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.44 |
| ntwsRFDetectAdhocUserDisappearTrap This trap is sent when RF detection sweep finds that
an ad-hoc user disappeared.
ntwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.45 |
| ntwsApRejectLicenseExceededTrap This trap is sent when an AC (wireless switch) receives a packet
from an inactive AP and attaching that AP would make the AC
exceed the maximum (licensed) number of active APs. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.46 |
| ntwsClientDynAuthorChangeSuccessTrap This trap is sent when the authorization attributes for a user
are dynamically changed by an authorized dynamic authorization
client. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.47 |
| ntwsClientDynAuthorChangeFailureTrap This trap is sent if a change of authorization request sent by
an authorized dynamic authorization client is unsuccessful. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.48 |
| ntwsClientDisconnectTrap This trap is sent when a client session is terminated administratively. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.49 |
| ntwsAPBootTrap obsolete The AP entering the AC at port ntwsPortNum with MAC
ntwsRadioMacAddress and of the access type (ap or dap) has booted.
Replaced by ntwsApNonOperStatusTrap2,
with ntwsAp… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.5 |
| ntwsMobilityDomainFailOverTrap This trap is sent when the Mobility Domain fails over
to the secondary seed. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.50 |
| ntwsMobilityDomainFailBackTrap This trap is sent when the Mobility Domain fails back
to the primary seed. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.51 |
| ntwsRFDetectRogueDeviceTrap obsolete This trap is sent when RF detection finds a rogue device.
XmtrMacAddr is the radio MAC address from the beacon.
ListenerListInfo is a display string of a list of
listener informat… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.52 |
| ntwsRFDetectRogueDeviceDisappearTrap This trap is sent when a rogue device has disappeared.
This trap obsoletes the ntwsRFDetectRogueDisappearTrap. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.53 |
| ntwsRFDetectSuspectDeviceTrap obsolete This trap is sent when RF detection finds a suspect device.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
ntwsRFDetectListenerListInfo is a display string of a… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.54 |
| ntwsRFDetectSuspectDeviceDisappearTrap This trap is sent when a suspect device has disappeared.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
This trap obsoletes the ntwsRFDetectInterferingRogueDisa… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.55 |
| ntwsRFDetectClientViaRogueWiredAPTrap3 This trap is sent when a client is detected that connected
via a rogue AP that is attached to a wired port.
ntwsSourceWsIp is the IP address of the AC (switch)
with the wired port… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.56 |
| ntwsRFDetectClassificationChangeTrap This trap is sent when RF detection classification rules change. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.57 |
| ntwsConfigurationSavedTrap This trap is sent when the running configuration of the switch
is written to a configuration file. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.58 |
| ntwsApNonOperStatusTrap2 This trap is sent when the AP changes state
and the new one is a non-operational state.
Obsoletes ntwsApNonOperStatusTrap. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.59 |
| ntwsMobilityDomainJoinTrap The mobility domain member has received an UP notice from the
remote address. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.6 |
| ntwsApOperRadioStatusTrap2 obsolete This trap is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoleted by nt… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.60 |
| ntwsMichaelMICFailure Two Michael MIC failures were seen within 60 seconds of each other.
Object ntwsClientMACAddress indicates
the source of the first failure,
and object ntwsClientMACAddress2 indicat… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.61 |
| ntwsClientAuthorizationSuccessTrap3 obsolete This trap is sent when a client authorizes.
If ntwsClientAccessMode = 'ap':
ntwsApNum, ntwsAPRadioNum, ntwsRadioSSID
identify the AP/radio/BSS providing wireless servic… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.62 |
| ntwsApManagerChangeTrap This trap is sent when the AP's secondary link becomes its
primary link. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.63 |
| ntwsClientClearedTrap2 This trap is sent when a client session is cleared.
Obsoletes ntwsClientClearedTrap. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.64 |
| ntwsMobilityDomainResiliencyStatusTrap This trap is sent by a mobility domain seed to announce
changes in resilient capacity status. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.65 |
| ntwsApOperRadioStatusTrap3 This trap is sent when the Radio changes state.
It also contains aggregate information about the AP
in operational state - security level and service availability.
Obsoletes ntwsA… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.66 |
| ntwsClientAuthorizationSuccessTrap4 This trap is sent when a client authorizes.
If ntwsClientAccessMode = 'ap':
ntwsApNum, ntwsAPRadioNum, ntwsRadioSSID
identify the AP/radio/BSS providing wireless servic… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.67 |
| ntwsRFDetectRogueDeviceTrap2 This trap is sent when RF detection finds a rogue device.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
ntwsRFDetectXmtrRadioType indicates the Type of Radio
u… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.68 |
| ntwsRFDetectSuspectDeviceTrap2 This trap is sent when RF detection finds a suspect device.
ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon.
ntwsRFDetectXmtrRadioType indicates the Type of Radio… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.69 |
| ntwsMobilityDomainTimeoutTrap The mobility domain member has declared the remote address
to be DOWN. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.7 |
| ntwsClusterFailureTrap This trap is sent when the cluster configuration failed to apply.
If ntwsClusterFailureReason = 'validation-error':
The validation error is reported by the… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.70 |
| ntwsMpMichaelMICFailure obsolete Two Michael MIC failures were seen within 60 seconds of each other.
Obsoleted by ntwsMichaelMICFailure. | notification | - | .1.3.6.1.4.1.45.6.1.5.0.8 |
| ntwsRFDetectRogueAPTrap obsolete This trap is sent when RF detection finds a rogue AP.
XmtrMacAddr is the radio MAC address from the beacon.
ListenerListInfo is a display string of a list of
listener information.… | notification | - | .1.3.6.1.4.1.45.6.1.5.0.9 |
Notification Objects
| Object | Type | Syntax | OID |
|---|---|---|---|
| ntwsUserName The client user name as learned from the AAA process. This object
is used within notifications and is not accessible. | scalar | OctetString | .1.3.6.1.4.1.45.6.1.2.10 |
| ntwsClientSessionId The unique global id for a client session. This object is used
within notifications and is not accessible. | scalar | OctetString | .1.3.6.1.4.1.45.6.1.2.15 |
| ntwsClientMACAddress MAC address of the client of interest. This object is used
within notifications and is not accessible. | scalar | SNMPv2-TCMacAddress | .1.3.6.1.4.1.45.6.1.2.4 |
| ntwsClientIp The client ip address. This object is used
within notifications and is not accessible. | scalar | SNMPv2-SMIIpAddress | .1.3.6.1.4.1.45.6.1.2.14 |
| ntwsClientVLANName The vlan name a client is on. This object is used within
notifications and is not accessible. | scalar | OctetString | .1.3.6.1.4.1.45.6.1.2.17 |
| ntwsClientSessionState The state for a client session. This object is used
within notifications and is not accessible. | scalar | NTWS-CLIENT-SESSION-TCNtwsClientSessionState | .1.3.6.1.4.1.45.6.1.2.12 |
| ntwsClientAuthServerIp The client authentication server ip address. This object is used
within notifications and is not accessible. | scalar | SNMPv2-SMIIpAddress | .1.3.6.1.4.1.45.6.1.2.11 |
| ntwsClientAuthenProtocolType The authentication protocol for a client.
This object is used within notifications and is not accessible. | scalar | NTWS-CLIENT-SESSION-TCNtwsClientAuthenProtocolType | .1.3.6.1.4.1.45.6.1.2.16 |
| ntwsClientAccessType The client access type (ap, dap, wired).
This object is used within notifications and is not accessible.
For new traps, use ntwsClientAccessMode instead of this object. | scalar | NTWS-AP-TCNtwsAccessType | .1.3.6.1.4.1.45.6.1.2.31 |
| ntwsPortNum Port number on the AC which reported this rogue during a detection
sweep. This object is used within notifications and
is not accessible. | scalar | Integer32 | .1.3.6.1.4.1.45.6.1.2.6 |
| ntwsAPRadioNum Radio number of the AP which reported this rogue during a detection
sweep. This object is used within notifications and is not accessible. | scalar | NTWS-AP-TCNtwsRadioNum | .1.3.6.1.4.1.45.6.1.2.7 |
| ntwsDAPNum The DAP number on the wireless switch. This object is used
within notifications and is not accessible. | scalar | Integer32 | .1.3.6.1.4.1.45.6.1.2.13 |
| ntwsRadioSSID The radio SSID string
This object is used within notifications and is not accessible. | scalar | OctetString | .1.3.6.1.4.1.45.6.1.2.38 |
| ntwsUserAccessType The user access type (MAC, WEB, DOT1X, LAST-RESORT).
This object is used within notifications and is not accessible. | scalar | NTWS-CLIENT-SESSION-TCNtwsUserAccessType | .1.3.6.1.4.1.45.6.1.2.46 |
| ntwsLocalId Local Id for the session.
This object is used within notifications and is not accessible. | scalar | Integer32 | .1.3.6.1.4.1.45.6.1.2.48 |
| ntwsClientIpAddrChangeReason Indicates the reason why client IP address changed.
This object is used within notifications and is not accessible. | scalar | NtwsClientIpAddrChangeReason | .1.3.6.1.4.1.45.6.1.2.69 |