AIRESPACE-WIRELESS-MIB: View SNMP OID List / Download MIB

VENDOR: AIRESPACE, INC


 Home MIB: AIRESPACE-WIRELESS-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 bsnWireless 1.3.6.1.4.1.14179.2
This MIB is intended to be implemented on all those devices operating as Central Controllers (CC) that terminate the Light Weight Access Point Protocol tunnel from Light-weight LWAPP Access Points. This MIB provides configuration and status information for 802.11 Access Points, LAN configuration, AAA, Mobility, IpSec, Radio Rescouce Management and 802.11 global parameters. The relationship between controller and the LWAPP APs can be depicted as follows: +......+ +......+ +......+ +......+ + + + + + + + + + CC + + CC + + CC + + CC + + + + + + + + + +......+ +......+ +......+ +......+ .. . . . .. . . . . . . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ +......+ + + + + + + + + + + + AP + + AP + + AP + + AP + + AP + + + + + + + + + + + +......+ +......+ +......+ +......+ +......+ . . . . . . . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ +......+ + + + + + + + + + + + MN + + MN + + MN + + MN + + MN + + + + + + + + + + + +......+ +......+ +......+ +......+ +......+ The LWAPP tunnel exists between the controller and the APs. The MNs communicate with the APs through the protocol defined by the 802.11 standard. LWAPP APs, upon bootup, discover and join one of the controllers and the controller pushes the configuration, that includes the WLAN parameters, to the LWAPP APs. The APs then encapsulate all the 802.11 frames from wireless clients inside LWAPP frames and forward the LWAPP frames to the controller. GLOSSARY Access Point ( AP ) An entity that contains an 802.11 medium access control ( MAC ) and physical layer ( PHY ) interface and provides access to the distribution services via the wireless medium for associated clients. LWAPP APs encapsulate all the 802.11 frames in LWAPP frames and sends it to the controller to which it is logically connected. Basic Service Set Identifier (BSSID) The identifier for the service set comprising of all the 802.11 stations under the control of one coordinating Access Point. This identifier happens to be the MAC address of the dot11 radio interface of the Access Point. The wireless clients that associate with the Access Point get the wired uplink through this particular dot11 interface. Central Controller ( CC ) The central entity that terminates the LWAPP protocol tunnel from the LWAPP APs. Throughout this MIB, this entity also referred to as 'controller'. Light Weight Access Point Protocol ( LWAPP ) This is a generic protocol that defines the communication between the Access Points and the Central Controller. Mobile Node ( MN ) A roaming 802.11 wireless device in a wireless network associated with an access point. Station Management (SMT) This term refers to the internal management of the 802.11 protocol operations by the AP to work cooperatively with the other APs and 802.11 devices in the network. REFERENCE [1] Part 11 Wireless LAN Medium Access Control ( MAC ) and Physical Layer ( PHY ) Specifications. [2] Draft-obara-capwap-lwapp-00.txt, IETF Light Weight Access Point Protocol.
     bsnEss 1.3.6.1.4.1.14179.2.1
         bsnDot11EssTable 1.3.6.1.4.1.14179.2.1.1 no-access
Ess(WLAN) Configuration Table indexed by bsnDot11EssIndex. Maximum of 17 WLANs can be created on Airespace Switch. bsnDot11EssIndex of 17 is reserved for WLAN for Third Party APs(non-Airespace APs).
             bsnDot11EssEntry 1.3.6.1.4.1.14179.2.1.1.1 no-access
An entry in bsnDot11EssTable
                 bsnDot11EssIndex 1.3.6.1.4.1.14179.2.1.1.1.1 unsigned32 read-only
Index of the Ess(WLAN) within Airespace Switch. Airespace Switch supports 517 ESS(Wlans) so index will be from 1 to 517. 517 is to be used for ESS(WLAN) created for support of Third Party APs(non-Airespace APs)
                 bsnDot11EssSsid 1.3.6.1.4.1.14179.2.1.1.1.2 displaystring read-only
SSID assigned to ESS(WLAN)
                 bsnDot11EssSessionTimeout 1.3.6.1.4.1.14179.2.1.1.1.4 unsigned32 read-only
Maximum time of a Mobile Station session. Value of 0 means infinite time(no timeout set).
                 bsnDot11EssMacFiltering 1.3.6.1.4.1.14179.2.1.1.1.5 integer read-only
A type of security policy for Mobile Stations (Clients). Select to filter clients by MAC address. By selecting this Security, you need to create MacFilters in bsnUsersTable or have MacFilters configured on Radius Servers specified in bsnRadiusAuthenticationTable Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssAdminStatus 1.3.6.1.4.1.14179.2.1.1.1.6 integer read-only
Administrative Status of ESS(WLAN). By disabling an ESS the corresponding SSID is no longer broadcasted in AP beacons. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssSecurityAuthType 1.3.6.1.4.1.14179.2.1.1.1.7 integer read-only
Type of 802.11 Authentication. Enumeration: 'authOpen': 0, 'authSharedKey': 1, 'authCiscoLeap': 128.
                 bsnDot11EssStaticWEPSecurity 1.3.6.1.4.1.14179.2.1.1.1.8 integer read-only
Status of Static WEP Security policy. If enabled, WEP Encryption WEP Default Key, Key Index and Key Format should also be specified. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssStaticWEPEncryptionType 1.3.6.1.4.1.14179.2.1.1.1.9 integer read-only
Type of Static WEP Encryption. Length of key specified in Default Key depends on this attribute. Enumeration: 'wep40': 2, 'wep104': 0, 'wep128': 3, 'notset': 4.
                 bsnDot11EssStaticWEPDefaultKey 1.3.6.1.4.1.14179.2.1.1.1.10 wepkeytype read-only
Static WEP Default Key. For wep104 encryption either 26 bit hex key or 13 bit ascii key should be specified. For wep40 encryption 10 bit hex key or 5 bit ascii key should be specified. For wep128 encryption 32 bit hex key or 16 bit ascii key should be specified.
                 bsnDot11EssStaticWEPKeyIndex 1.3.6.1.4.1.14179.2.1.1.1.11 integer read-only
According to 802.11 standard 4 keys are supported. So 802.11 Mobile Stations(Client) can have upto 4 keys. This index is for informing Mobile Station which key it should use for Static WEP Authentication
                 bsnDot11EssStaticWEPKeyFormat 1.3.6.1.4.1.14179.2.1.1.1.12 integer read-only
This is not persistant.Reading this attribute will always return default. The format of the key specified in Airespace switch keeps record of the Index. Enumeration: 'default': 0, 'ascii': 2, 'hex': 1.
                 bsnDot11Ess8021xSecurity 1.3.6.1.4.1.14179.2.1.1.1.13 integer read-only
Status of 802.1X security policy. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11Ess8021xEncryptionType 1.3.6.1.4.1.14179.2.1.1.1.14 integer read-only
Type of 802.1X Encryption. This applies if bsnDot11Ess8021xSecurity is in enabled state. Enumeration: 'wep40': 2, 'none': 4, 'wep104': 0, 'wep128': 3.
                 bsnDot11EssWPASecurity 1.3.6.1.4.1.14179.2.1.1.1.16 integer read-only
Status of WPA security policy. This has been deprecated for cLWSecDot11EssCckmTable. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssWPAEncryptionType 1.3.6.1.4.1.14179.2.1.1.1.17 integer read-only
Type of WPA Encryption. This applies when bsnDot11EssWPASecurity is in enable state. This has been deprecated for cLWSecDot11EssCckmTable. Enumeration: 'wep40': 2, 'tkipmic': 5, 'wep104': 0, 'wep128': 3.
                 bsnDot11EssIpsecSecurity 1.3.6.1.4.1.14179.2.1.1.1.18 integer read-only
Status of IpSec (VPN) security policy. Note that this cannot be applied with Web security policy. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssVpnEncrTransform 1.3.6.1.4.1.14179.2.1.1.1.19 integer read-only
The Encryption algorithm employed by this Vpn(IpSec) Encryption. This applies only when bsnDot11EssIpsecSecurity is in enable state. Enumeration: 'tripleDes': 0, 'none': 1, 'des': 2, 'aes256Cbc': 4, 'aesCbc': 3.
                 bsnDot11EssVpnAuthTransform 1.3.6.1.4.1.14179.2.1.1.1.20 integer read-only
The Hash algorithm employed by the Vpn Encrpytion. This applies only when bsnDot11EssIpsecSecurity is in enable state. Enumeration: 'hmacMd5': 2, 'none': 1, 'hmacSha1': 0.
                 bsnDot11EssVpnIkeAuthMode 1.3.6.1.4.1.14179.2.1.1.1.21 integer read-only
The authentication type of the SA. It could be a certificate or a pre-shared key or xauthEnablePsk. This applies only when bsnDot11EssIpsecSecurity is in enable state. Enumeration: 'xauthEnablePsk': 0, 'certificate': 2, 'presharedKey': 3.
                 bsnDot11EssVpnSharedKey 1.3.6.1.4.1.14179.2.1.1.1.22 octet string read-only
VPN Shared Key. This applies only when bsnDot11EssVpnSharedKey is in enable state and bsnDot11EssVpnIkeAuthMode is xauthEnablePsk or presharedKey.
                 bsnDot11EssVpnSharedKeySize 1.3.6.1.4.1.14179.2.1.1.1.23 unsigned32 read-only
VPN Shared Key size. This applies only when bsnDot11EssVpnSharedKey is in enable state and bsnDot11EssVpnIkeAuthMode is xauthEnablePsk or presharedKey.
                 bsnDot11EssVpnIkePhase1Mode 1.3.6.1.4.1.14179.2.1.1.1.24 integer read-only
VPN IKE Phase 1 Mode type as per the IpSec standards. This applies only when bsnDot11EssIpsecSecurity is in enable state. Enumeration: 'main': 1, 'agressive': 0.
                 bsnDot11EssVpnIkeLifetime 1.3.6.1.4.1.14179.2.1.1.1.25 integer32 read-only
Vpn IKE's Lifetime. This applies only when bsnDot11EssIpsecSecurity is in enable state.
                 bsnDot11EssVpnIkeDHGroup 1.3.6.1.4.1.14179.2.1.1.1.26 integer read-only
IKE's Diffie-Hellman Group. This applies only when bsnDot11EssIpsecSecurity is in enable state. Enumeration: 'group5': 4, 'group1': 1, 'group14': 14, 'group2': 0.
                 bsnDot11EssIpsecPassthruSecurity 1.3.6.1.4.1.14179.2.1.1.1.27 integer read-only
Status of IpSec Passthru security policy. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssVpnPassthruGateway 1.3.6.1.4.1.14179.2.1.1.1.28 ipaddress read-only
Ip address of VpnPassthru Gateway. This applies only when bsnDot11EssIpsecPassthruSecurity is in enable state.
                 bsnDot11EssWebSecurity 1.3.6.1.4.1.14179.2.1.1.1.29 integer read-only
Status of Web security policy. Note this policy cannot be applied with IpSec security policy. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssRadioPolicy 1.3.6.1.4.1.14179.2.1.1.1.30 integer read-only
Radio Policy for a WLAN. It can either be All where it will be applicable to ALL types of protocols or it can be set to apply to combinations of 802.11a, 802.11b, 802.11g. Enumeration: 'all': 0, 'dot11bgOnly': 4, 'dot11bOnly': 1, 'dot11aOnly': 2, 'dot11gOnly': 3, 'dot11abOnly': 6, 'dot11agOnly': 5.
                 bsnDot11EssQualityOfService 1.3.6.1.4.1.14179.2.1.1.1.31 integer read-only
Quality of Service for a WLAN.Services such as VoIP should be set to Gold while non-discriminating services such as messaging can be set to Bronze. Enumeration: 'platinum': 3, 'gold': 2, 'silver': 1, 'bronze': 0.
                 bsnDot11EssDhcpRequired 1.3.6.1.4.1.14179.2.1.1.1.32 integer read-only
DHCP required for all clients on this WLAN Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssDhcpServerIpAddress 1.3.6.1.4.1.14179.2.1.1.1.33 ipaddress read-only
IP Address of the DHCP Server. Make it 0.0.0.0 to disable DHCP Relay. Any value other than 0.0.0.0, it will be assumed that DHCP Relay is turned on.
                 bsnDot11EssVpnContivityMode 1.3.6.1.4.1.14179.2.1.1.1.34 integer read-only
Specifies if contivity mode for the IpSec is enabled. If enabled, user needs to specify the Quote of the Day Server's IPAddress in bsnDot11EssVpnQotdServerAddress. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssVpnQotdServerAddress 1.3.6.1.4.1.14179.2.1.1.1.35 ipaddress read-only
IP Address of the Quote of the Day Server.
                 bsnDot11EssBlacklistTimeout 1.3.6.1.4.1.14179.2.1.1.1.37 integer32 read-only
Set the timeout for blacklisted Mobile Stations after which the mobile station will be automatically de-authenticated. Mobile Station are blacklisted by MAC address and their status can be obtained from bsnMobileStationStatus. A timeout setting of 0 indicates no blacklist timeout is set and administrative control (bsnMobileStationDeleteAction ) is required to deauthenticate the station.
                 bsnDot11EssNumberOfMobileStations 1.3.6.1.4.1.14179.2.1.1.1.38 counter32 read-only
No of Mobile Stations currently associated with the WLAN.
                 bsnDot11EssWebPassthru 1.3.6.1.4.1.14179.2.1.1.1.39 integer read-only
For switches with version before 2.0: This is applicable only when the Web Security Type is enabled. When this attribute is enabled, it allows a client's NetBIOS packets to go through the switch before web auth is completed. (This is obsolete for Switch versions 2.0 to 2.2). For switch verions 3.0 and above: This is reintroduced as the web policy where the client is connected through the web without authentication that is there is no username/password input required. Moreover, if the bsnDot11EssWebPassthroughEmail is enabled, the user will be asked to enter an email address. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssCraniteSecurity 1.3.6.1.4.1.14179.2.1.1.1.40 integer read-only
Status of Cranite Passthrough Security policy. If enabled, no other security can be enabled. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssBlacklistingCapability 1.3.6.1.4.1.14179.2.1.1.1.41 integer read-only
This is the flag that can enable or disable the client backlisting feature for a WLAN. If enabled, the clients can be blacklisted by the Switch in case of repetitive auth failure and other reasons like it. If disabled, the clients cannot be blacklisted by the switch. The blacklist timeout value will only be effective if this feature is turned on. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssInterfaceName 1.3.6.1.4.1.14179.2.1.1.1.42 displaystring read-only
Name of the interface used by this WLAN. By default it is set to be the management interface.
                 bsnDot11EssAclName 1.3.6.1.4.1.14179.2.1.1.1.43 displaystring read-only
Name of ACL for the WLAN. This is applicable only when Web Authentication is enabled as a security. An empty string value indicates that no ACL has been set (which is a valid option)
                 bsnDot11EssAAAOverride 1.3.6.1.4.1.14179.2.1.1.1.44 integer read-only
Enable or Disable AAA override for the global WLAN parameters. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssWPAAuthKeyMgmtMode 1.3.6.1.4.1.14179.2.1.1.1.45 integer read-only
Enable or Disable WPA Pre-shared Key Mode. If enabled, a preshared key should be set for WPA authentication. This has been deprecated for cLWSecDot11EssCckmTable. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssWPAAuthPresharedKey 1.3.6.1.4.1.14179.2.1.1.1.46 octet string read-only
WPA Authentication Preshared Key. This applies only when bsnDot11EssWPAAuthKeyMgmtMode is in enable state. This has been deprecated for cLWSecDot11EssCckmTable.
                 bsnDot11EssFortressSecurity 1.3.6.1.4.1.14179.2.1.1.1.47 integer read-only
Status of Fortress Passthrough Security policy. If enabled, no other security can be enabled. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssWepAllowSharedKeyAuth 1.3.6.1.4.1.14179.2.1.1.1.48 integer read-only
Enable this flag to allow Shared Key Authentication when Static WEP is enabled. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssL2tpSecurity 1.3.6.1.4.1.14179.2.1.1.1.49 integer read-only
Status of L2TP security policy. Note that this cannot be applied with Web security policy, Cranite or Fortress policy. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssWPAAuthPresharedKeyHex 1.3.6.1.4.1.14179.2.1.1.1.50 octet string read-only
WPA Authentication Preshared Key in the hex format. This applies only when bsnDot11EssWPAAuthKeyMgmtMode is in enable state. This has been deprecated for cLWSecDot11EssCckmTable.
                 bsnDot11EssBroadcastSsid 1.3.6.1.4.1.14179.2.1.1.1.51 integer read-only
This attribute when enabled allows the switch to broadcast this SSID. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssExternalPolicyValidation 1.3.6.1.4.1.14179.2.1.1.1.52 integer read-only
This attribute specifies if external policy servers will be used for validation. If no servers are configured in bsnExternalPolicyServerTable then it cannot be enabled. Enumeration: 'disabled': 0, 'enabled': 1.
                 bsnDot11EssRSNSecurity 1.3.6.1.4.1.14179.2.1.1.1.53 integer read-only
This attribute specifies status of RSN Security Policy. This has been deprecated for cLWSecDot11EssCckmTable. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssRSNWPACompatibilityMode 1.3.6.1.4.1.14179.2.1.1.1.54 integer read-only
This attribute specifies RSN security's compatibility mode with WPA. This has been deprecated for cLWSecDot11EssCckmTable. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssRSNAllowTKIPClients 1.3.6.1.4.1.14179.2.1.1.1.55 integer read-only
This attribute specifies whether TKIP clients are allowed by RSN Policy. This has been deprecated for cLWSecDot11EssCckmTable. Enumeration: 'yes': 1, 'no': 0.
                 bsnDot11EssRSNAuthKeyMgmtMode 1.3.6.1.4.1.14179.2.1.1.1.56 integer read-only
This attribute specifies whether Preshared key is used or not. If used user should specify a key between 8 and 63 characters in bsnDot11EssRSNAuthPresharedKey attribute. This has been deprecated for cLWSecDot11EssCckmTable. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssRSNAuthPresharedKey 1.3.6.1.4.1.14179.2.1.1.1.57 octet string read-only
RSN Authentication Preshared Key. This applies only when bsnDot11EssRSNAuthKeyMgmtMode is in enable state. This has been deprecated for cLWSecDot11EssCckmTable.
                 bsnDot11EssRSNAuthPresharedKeyHex 1.3.6.1.4.1.14179.2.1.1.1.58 octet string read-only
RSN Authentication Preshared Key in the hex format. This applies only when bsnDot11EssWPAAuthKeyMgmtMode is in enable state. This has been deprecated for cLWSecDot11EssCckmTable.
                 bsnDot11EssIPv6Bridging 1.3.6.1.4.1.14179.2.1.1.1.59 integer read-only
When enabled, IPv6 bridging is applied on the packets. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11EssRowStatus 1.3.6.1.4.1.14179.2.1.1.1.60 rowstatus read-only
A row status type for the bsnDot11EssEntry
                 bsnDot11EssWmePolicySetting 1.3.6.1.4.1.14179.2.1.1.1.61 integer read-only
When enabled, WME Policy is applied on the packets. Enumeration: 'required': 2, 'disable': 0, 'invalid': 3, 'allowed': 1.
                 bsnDot11Ess80211ePolicySetting 1.3.6.1.4.1.14179.2.1.1.1.62 integer read-only
When enabled, 802.11e Policy is applied on the packets. Enumeration: 'required': 2, 'disable': 0, 'invalid': 3, 'allowed': 1.
                 bsnDot11EssWebPassthroughEmail 1.3.6.1.4.1.14179.2.1.1.1.63 integer read-only
When enabled, along with the bsnDot11EssWebPassthru attribute, the client is allowed to connect by entering his/her email address on the web connection page. There is no further authentication required. Enumeration: 'enable': 1, 'disable': 0.
                 bsnDot11Ess7920PhoneSupport 1.3.6.1.4.1.14179.2.1.1.1.64 integer read-only
When client cac limit is enabled, the 7920 Phones with old software where the Call Admission Control (CAC) Limit is Specified on the client will be supported on the WLAN. The support for clientCacLimit (by setting to value 1 or 3) cannot be enabled when the bsnDot11EssWmePolicySetting is set to allowed or required. When ap cac limit is enabled, the 7920 Phones with new software where the Call Admission Control (CAC) Limit is advertised by the AP, will be supported on the WLAN. Enumeration: 'apCacLimit': 2, 'disable': 0, 'clientCacLimit': 1, 'both': 3.
                 bsnDot11EssRadiusAuthPrimaryServer 1.3.6.1.4.1.14179.2.1.1.1.95 displaystring read-only
Primary Radius Authentication Server for this wlan.
                 bsnDot11EssRadiusAuthSecondaryServer 1.3.6.1.4.1.14179.2.1.1.1.96 displaystring read-only
Secondary Radius Authentication Server for this wlan.
                 bsnDot11EssRadiusAuthTertiaryServer 1.3.6.1.4.1.14179.2.1.1.1.97 displaystring read-only
Tertiary Radius Authentication Server for this wlan.
                 bsnDot11EssRadiusAcctPrimaryServer 1.3.6.1.4.1.14179.2.1.1.1.98 displaystring read-only
Primary Radius Accounting Server for this wlan.
                 bsnDot11EssRadiusAcctSecondaryServer 1.3.6.1.4.1.14179.2.1.1.1.99 displaystring read-only
Secondary Radius Accounting Server for this wlan.
                 bsnDot11EssRadiusAcctTertiaryServer 1.3.6.1.4.1.14179.2.1.1.1.100 displaystring read-only
Tertiary Radius Accounting Server for this wlan.
         bsnMobileStationTable 1.3.6.1.4.1.14179.2.1.4 no-access
Mobile Station Table indexed by bsnMobileStationMacAddress. (Mobile Station is better referred to as Client in the current releases.)
             bsnMobileStationEntry 1.3.6.1.4.1.14179.2.1.4.1 no-access
An entry in bsnMobileStationTable.
                 bsnMobileStationMacAddress 1.3.6.1.4.1.14179.2.1.4.1.1 macaddress read-only
802.11 MAC Address of the Mobile Station.
                 bsnMobileStationIpAddress 1.3.6.1.4.1.14179.2.1.4.1.2 ipaddress read-only
IP Address of the Mobile Station
                 bsnMobileStationUserName 1.3.6.1.4.1.14179.2.1.4.1.3 displaystring read-only
User Name,if any, of the Mobile Station. This would be non empty in case of Web Authentication and IPSec.
                 bsnMobileStationAPMacAddr 1.3.6.1.4.1.14179.2.1.4.1.4 macaddress read-only
802.11 Mac Address of the AP to which the Mobile Station is associated.
                 bsnMobileStationAPIfSlotId 1.3.6.1.4.1.14179.2.1.4.1.5 integer read-only
Slot ID of AP Interface to which the mobile station is associated. The value 15 is used to indicate that the slot Id is invalid.
                 bsnMobileStationEssIndex 1.3.6.1.4.1.14179.2.1.4.1.6 integer read-only
Ess Index of the Wlan(SSID) that is being used by Mobile Station to connect to AP
                 bsnMobileStationSsid 1.3.6.1.4.1.14179.2.1.4.1.7 displaystring read-only
The SSID Advertised by Mobile Station
                 bsnMobileStationAID 1.3.6.1.4.1.14179.2.1.4.1.8 unsigned32 read-only
AID for the mobile station
                 bsnMobileStationStatus 1.3.6.1.4.1.14179.2.1.4.1.9 integer read-only
Status of the mobile station Enumeration: 'associated': 3, 'blacklisted': 8, 'tobedeleted': 6, 'idle': 0, 'disassociated': 5, 'probing': 7, 'authenticated': 2, 'powersave': 4, 'aaaPending': 1.
                 bsnMobileStationReasonCode 1.3.6.1.4.1.14179.2.1.4.1.10 integer read-only
Reason Code as defined by 802.11 standards Enumeration: 'inSufficientBandwidth': 202, 'qosPolicyMismatch': 201, 'maxAssociatedClientsReachedOnRadio': 105, 'class2FrameFromNonAssStation': 7, 'unSpecifiedQosFailure': 200, 'disassociationStaHasLeft': 8, 'previousAuthNotValid': 2, 'staReqAssociationWithoutAuth': 9, 'unspecified': 1, 'unicastCipherInvalid': 42, 'maxAssociatedClientsReached': 101, 'deauthenticationLeaving': 3, 'unsupportedRsnVersion': 44, 'inValidQosParams': 203, 'disassociationAPBusy': 5, 'invalidInformationElement': 40, 'groupCipherInvalid': 41, 'cipherSuiteRejected': 46, 'class2FrameFromNonAuthStation': 6, 'missingReasonCode': 99, 'maxAssociatedClientsReachedOnWlan': 106, 'disassociationDueToInactivity': 4, 'akmpInvalid': 43, 'invalidRsnIeCapabilities': 45.
                 bsnMobileStationMobilityStatus 1.3.6.1.4.1.14179.2.1.4.1.11 integer read-only
Mobility Role of the Mobile Station. Enumeration: 'handoff': 4, 'unassociated': 0, 'unknown': 5, 'foreign': 3, 'exportanchor': 6, 'local': 1, 'anchor': 2, 'exportforeign': 7.
                 bsnMobileStationAnchorAddress 1.3.6.1.4.1.14179.2.1.4.1.12 ipaddress read-only
If the Mobility Status of the Mobile Station is Anchor then it will have Peer Ip Address and will have Anchor IP if the Role is Foreign
                 bsnMobileStationCFPollable 1.3.6.1.4.1.14179.2.1.4.1.13 integer read-only
When this attribute is true, it shall indicate that the Mobile Station is able to respond to a CF-Poll with a data frame within a SIFS time. This attribute shall be false if the Mobile Station is not able to respond to a CF-Poll with a data frame within a SIFS time. Enumeration: 'implemented': 1, 'notimplemented': 0.
                 bsnMobileStationCFPollRequest 1.3.6.1.4.1.14179.2.1.4.1.14 integer read-only
Specifies whether CFP is requested by Mobile Station or not Enumeration: 'implemented': 1, 'notimplemented': 0.
                 bsnMobileStationChannelAgilityEnabled 1.3.6.1.4.1.14179.2.1.4.1.15 integer read-only
This attribute indicates that the PHY channel agility functionality is enabled. Enumeration: 'implemented': 1, 'notimplemented': 0.
                 bsnMobileStationPBCCOptionImplemented 1.3.6.1.4.1.14179.2.1.4.1.16 integer read-only
This attribute, when true, shall indicate that the PBCC modulation option as defined in subclause 18.4.6.6 is implemented. The default value of this attribute shall be false. Enumeration: 'implemented': 1, 'notimplemented': 0.
                 bsnMobileStationShortPreambleOptionImplemented 1.3.6.1.4.1.14179.2.1.4.1.17 integer read-only
This attribute, when true, shall indicate that the short preamble option as defined in subclause 18.2.2.2 is implemented. The default value of this attribute shall be false. Enumeration: 'implemented': 1, 'notimplemented': 0.
                 bsnMobileStationSessionTimeout 1.3.6.1.4.1.14179.2.1.4.1.18 unsigned32 read-only
Session Timeout of Mobile station
                 bsnMobileStationAuthenticationAlgorithm 1.3.6.1.4.1.14179.2.1.4.1.19 integer read-only
Authentication Algorithm of Mobile Station Enumeration: 'openSystem': 0, 'openAndEap': 128, 'sharedKey': 1, 'unknown': 2.
                 bsnMobileStationWepState 1.3.6.1.4.1.14179.2.1.4.1.20 integer read-only
WEP State of Mobile Station Enumeration: 'enable': 1, 'disable': 2.
                 bsnMobileStationPortNumber 1.3.6.1.4.1.14179.2.1.4.1.21 unsigned32 read-only
The Port Number of this Airespace Switch on which the traffic of the Mobile Station is coming through.
                 bsnMobileStationDeleteAction 1.3.6.1.4.1.14179.2.1.4.1.22 integer read-write
Action to Deauthenticate the Mobile Station. Set the State to delete. Enumeration: 'default': 0, 'delete': 1.
                 bsnMobileStationPolicyManagerState 1.3.6.1.4.1.14179.2.1.4.1.23 displaystring read-only
Policy Manager State of the mobile station.
                 bsnMobileStationSecurityPolicyStatus 1.3.6.1.4.1.14179.2.1.4.1.24 integer read-only
When this attribute has value completed, it shall indicate that the Mobile Station has completed the security policy checks. Otherwise the checks are yet to be completed. Enumeration: 'completed': 0, 'notcompleted': 1.
                 bsnMobileStationProtocol 1.3.6.1.4.1.14179.2.1.4.1.25 integer read-only
The 802.11 protocol type of the client. The protocol is mobile when this client detail is seen on the anchor i.e it's mobility status is anchor. Enumeration: 'dot3': 9, 'dot11n5': 7, 'dot11g': 3, 'unknown': 4, 'dot11b': 2, 'dot11a': 1, 'mobile': 5, 'dot11n24': 6, 'ethernet': 8.
                 bsnMobileStationMirrorMode 1.3.6.1.4.1.14179.2.1.4.1.26 integer read-write
If enabled, then mirroring for this client will be statically configured irrespective of the AP and the port this client is on. Enumeration: 'enable': 1, 'disable': 0.
                 bsnMobileStationInterface 1.3.6.1.4.1.14179.2.1.4.1.27 displaystring read-only
Name of the Interface of the mobile client to the switch.
                 bsnMobileStationApMode 1.3.6.1.4.1.14179.2.1.4.1.28 integer read-only
Mode of the AP to which the Mobile Station is associated. Enumeration: 'remote': 2, 'local': 0, 'monitor': 1, 'roguedetector': 3.
                 bsnMobileStationVlanId 1.3.6.1.4.1.14179.2.1.4.1.29 integer32 read-only
Vlan ID of the Interface to which the client is associated.
                 bsnMobileStationPolicyType 1.3.6.1.4.1.14179.2.1.4.1.30 integer read-only
Mode of the AP to which the Mobile Station is associated. Enumeration: 'wpa2vff': 3, 'unknown': 5, 'wpa2': 2, 'wpa1': 1, 'notavailable': 4, 'wapi': 6, 'dot1x': 0.
                 bsnMobileStationEncryptionCypher 1.3.6.1.4.1.14179.2.1.4.1.31 integer read-only
Mode of the AP to which the Mobile Station is associated. Enumeration: 'none': 5, 'unknown': 7, 'tkipMic': 1, 'wep104': 3, 'wapiSMS4': 8, 'wep128': 4, 'ccmpAes': 0, 'notavailable': 6, 'wep40': 2.
                 bsnMobileStationEapType 1.3.6.1.4.1.14179.2.1.4.1.32 integer read-only
Mode of the AP to which the Mobile Station is associated. Enumeration: 'unknown': 7, 'ttls': 1, 'peap': 2, 'leap': 3, 'eapTls': 0, 'speke': 4, 'notavailable': 6, 'eapFast': 5.
                 bsnMobileStationCcxVersion 1.3.6.1.4.1.14179.2.1.4.1.33 integer read-only
Represents the Cisco Compatible Extensions (CCX) Version the client is using for communication with the AP. Enumeration: 'ccxv2': 2, 'ccxv1': 1, 'ccxv3': 3, 'notSupported': 0, 'ccxv5': 5, 'ccxv4': 4, 'ccxv6': 6.
                 bsnMobileStationE2eVersion 1.3.6.1.4.1.14179.2.1.4.1.34 integer read-only
Represents the End-2-End Version the client is using for communication with the AP. Enumeration: 'notSupported': 0, 'e2ev1': 1, 'e2ev2': 2.
                 bsnMobileStationStatusCode 1.3.6.1.4.1.14179.2.1.4.1.42 integer read-only
Status Code of the Mobile Station
         bsnMobileStationPerRadioPerVapTable 1.3.6.1.4.1.14179.2.1.5 no-access
Mobile Station Per Radio Per VAP(WLAN) Table. This table lists all Mobile Stations on a particular Airespace AP Interface for a particular ESS(Wlan). It only lists MAC Addresses. Further details for a Mobile Station can be found from bsnMobileStationTable once the MAC Address is knonwn. (Mobile Station is better referred to as Client in the current releases.)
             bsnMobileStationPerRadioPerVapEntry 1.3.6.1.4.1.14179.2.1.5.1 no-access
An entry in MobileStationPerRadioPerVapTable.
                 bsnMobileStationPerRadioPerVapIndex 1.3.6.1.4.1.14179.2.1.5.1.1 integer32 read-only
The index of Mobile Station. The index starts from 1 and goes upto the total number of Mobile Stations on Airespace Radio Interface for a specific ESS (Wlan).
                 bsnMobileStationMacAddr 1.3.6.1.4.1.14179.2.1.5.1.20 macaddress read-only
The MAC Address of Mobile Station.
         bsnMobileStationStatsTable 1.3.6.1.4.1.14179.2.1.6 no-access
Mobile Station Statistics Table. (Mobile Station is better referred to as Client in the current releases.)
             bsnMobileStationStatsEntry 1.3.6.1.4.1.14179.2.1.6.1 no-access
An entry in bsnMobileStationStatsTable.
                 bsnMobileStationRSSI 1.3.6.1.4.1.14179.2.1.6.1.1 integer32 read-only
Average packet RSSI for the Mobile Station.
                 bsnMobileStationBytesReceived 1.3.6.1.4.1.14179.2.1.6.1.2 counter64 read-only
Bytes received from Mobile Station
                 bsnMobileStationBytesSent 1.3.6.1.4.1.14179.2.1.6.1.3 counter64 read-only
Bytes sent to Mobile Station
                 bsnMobileStationPolicyErrors 1.3.6.1.4.1.14179.2.1.6.1.4 counter64 read-only
Number of Policy Errors for Mobile Station
                 bsnMobileStationPacketsReceived 1.3.6.1.4.1.14179.2.1.6.1.5 counter64 read-only
Packets received from Mobile Station
                 bsnMobileStationPacketsSent 1.3.6.1.4.1.14179.2.1.6.1.6 counter64 read-only
Packets sent to Mobile Station
                 bsnMobileStationSnr 1.3.6.1.4.1.14179.2.1.6.1.26 integer32 read-only
Signal to noise Ratio of the Mobile Station.
         bsnRogueAPTable 1.3.6.1.4.1.14179.2.1.7 no-access
Rogue Table. This table lists all the Rogue APs detected by Airespace APs.
             bsnRogueAPEntry 1.3.6.1.4.1.14179.2.1.7.1 no-access
An Entry in bsnRogueAPTable.
                 bsnRogueAPDot11MacAddress 1.3.6.1.4.1.14179.2.1.7.1.1 macaddress read-only
MAC Address of Rogue Station.
                 bsnRogueAPTotalDetectingAPs 1.3.6.1.4.1.14179.2.1.7.1.2 integer32 read-only
Total number of Airespace APs that detected this rogue.
                 bsnRogueAPFirstReported 1.3.6.1.4.1.14179.2.1.7.1.3 displaystring read-only
Time Stamp when this Rogue was First Detected.
                 bsnRogueAPLastReported 1.3.6.1.4.1.14179.2.1.7.1.4 displaystring read-only
Time Stamp when this Rogue was Last Detected.
                 bsnRogueAPContainmentLevel 1.3.6.1.4.1.14179.2.1.7.1.5 integer read-only
If the state of the rogue is contained, this specifies the level of containment. Higher the level, more the number of detecting APs that are used to contain it. The value must be between 1 to 4 for 'contained' state. Enumeration: 'level4': 4, 'level1': 1, 'level2': 2, 'unassigned': 0, 'level3': 3.
                 bsnRogueAPType 1.3.6.1.4.1.14179.2.1.7.1.6 integer read-only
This attribute specifies if the Rogue is of ad-hoc type or is an AP. Enumeration: 'ap': 0, 'adhoc': 1.
                 bsnRogueAPOnNetwork 1.3.6.1.4.1.14179.2.1.7.1.7 integer read-only
This attribute specifies if the Rogue is on Wired Network or not. Enumeration: 'yes': 1, 'no': 0.
                 bsnRogueAPTotalClients 1.3.6.1.4.1.14179.2.1.7.1.8 integer32 read-only
Total number of Clients detected on this rogue.
                 bsnRogueAPRowStatus 1.3.6.1.4.1.14179.2.1.7.1.9 rowstatus read-only
Row Status
                 bsnRogueAPMaxDetectedRSSI 1.3.6.1.4.1.14179.2.1.7.1.10 integer32 read-only
This is the max RSSI value of all the detctecting APs, which have detected this rogue.
                 bsnRogueAPSSID 1.3.6.1.4.1.14179.2.1.7.1.11 displaystring read-only
This is the SSID of the rogue detected by Access Point, which has max RSSI value of all the detectecting APs of this rogue.
                 bsnRogueAPDetectingAPRadioType 1.3.6.1.4.1.14179.2.1.7.1.12 bits read-only
Radio type of detecting APs. If the radio type is detected by dot11bg radio or dot11a radio or both. Bits: 'dot11n5': 4, 'dot11g': 2, 'dot11n24': 3, 'dot11b': 0, 'dot11a': 1, 'dot11ac': 6, 'dot11abgn': 5.
                 bsnRogueAPDetectingAPMacAddress 1.3.6.1.4.1.14179.2.1.7.1.13 macaddress read-only
MAC Address of of detecting AP which received max RSSI
                 bsnRogueAPMaxRssiRadioType 1.3.6.1.4.1.14179.2.1.7.1.14 integer read-only
The radio type of detecting AP which received max RSSI value. Enumeration: 'dot11n5': 7, 'dot11g': 5, 'dot11n24': 6, 'dot11b': 1, 'dot11a': 2, 'dot11ac': 8, 'uwb': 4, 'dot11abgn': 3.
                 bsnRogueAPState 1.3.6.1.4.1.14179.2.1.7.1.24 integer read-only
This attribute is use to specify the state in which the Rogue AP is user can set the Rogue AP in alert, known or acknowledge state. Alert state means Rogue AP can be a potential threat. Trap will be sent out to trap recipients. Known state means its just internal AP which is not on the same Switch. Acknowledge state means an external AP whose existence is acceptable and not a threat (probably some other company's AP). Contained means containement is initiated and ongoing. Threat is usually the state when the rogue is found on wired network. known(4), knownContained(9) and trustedMissing(10) will appear in known rogue list. known rogues can be pre provisioned and known rogues state can be changed to alert(2) Enumeration: 'acknowledge': 5, 'trustedMissing': 10, 'alert': 2, 'containedPending': 8, 'contained': 6, 'knownContained': 9, 'threat': 7, 'initializing': 0, 'known': 4, 'pending': 1, 'detectedLrad': 3.
                 bsnRogueAPClassType 1.3.6.1.4.1.14179.2.1.7.1.25 integer read-only
The AP class type of the client detected. Enumeration: 'unclassified': 3, 'malicious': 2, 'friendly': 1, 'pending': 0, 'custom': 4.
                 bsnRogueAPChannel 1.3.6.1.4.1.14179.2.1.7.1.26 integer32 read-only
This is the channel number of the last detecting APs, which has detected this rogue.
                 bsnRogueAPDetectingAPName 1.3.6.1.4.1.14179.2.1.7.1.27 octet string read-only
AP name of the detecting AP which received max RSSI
         bsnRogueAPAirespaceAPTable 1.3.6.1.4.1.14179.2.1.8 no-access
Rogue Station Table. This table lists all the Airespace AP Interfaces that detected a particular Rogue.
             bsnRogueAPAirespaceAPEntry 1.3.6.1.4.1.14179.2.1.8.1 no-access
An entry in bsnRogueAPAirespaceAPEntry.
                 bsnRogueAPAirespaceAPMacAddress 1.3.6.1.4.1.14179.2.1.8.1.1 macaddress read-only
MAC Address of Airespace AP Interface that Detected the Rogue.
                 bsnRogueAPAirespaceAPSlotId 1.3.6.1.4.1.14179.2.1.8.1.2 unsigned32 read-only
The slot ID of the Airespace AP Interface that detected the Rogue.
                 bsnRogueAPRadioType 1.3.6.1.4.1.14179.2.1.8.1.3 integer read-only
The Airespace AP Interface type that detected the Rogue. Enumeration: 'dot11n5': 7, 'dot11g': 5, 'dot11n24': 6, 'dot11b': 1, 'dot11a': 2, 'dot11ac': 9, 'unknown': 8, 'uwb': 4, 'dot11abgn': 3.
                 bsnRogueAPAirespaceAPName 1.3.6.1.4.1.14179.2.1.8.1.4 displaystring read-only
Name of Airespace AP Interface that detected the Rogue.
                 bsnRogueAPChannelNumber 1.3.6.1.4.1.14179.2.1.8.1.5 integer32 read-only
The advertised Channel Number of the Airespace AP Interface picked up from the Rogue.
                 bsnRogueAPSsid 1.3.6.1.4.1.14179.2.1.8.1.6 displaystring read-only
The SSID Advertised by Rogue Station.
                 bsnRogueAPAirespaceAPRSSI 1.3.6.1.4.1.14179.2.1.8.1.7 integer32 read-only
Rogue RSSI as seen by Airespace AP Interface.
                 bsnRogueAPContainmentMode 1.3.6.1.4.1.14179.2.1.8.1.8 integer read-only
If the rogue is in 'contained' state, this attribute shows the containment mode used by the AP. Enumeration: 'max': 3, 'deauthBroadcast': 1, 'cfp': 2, 'invalid': 0, 'unknown': 99.
                 bsnRogueAPContainmentChannelCount 1.3.6.1.4.1.14179.2.1.8.1.9 unsigned32 read-only
The number of channels used for rogue containment.
                 bsnRogueAPContainmentChannels 1.3.6.1.4.1.14179.2.1.8.1.10 displaystring read-only
This is the comma separated string of channels used for rogue containment.
                 bsnRogueAPAirespaceAPLastHeard 1.3.6.1.4.1.14179.2.1.8.1.11 counter32 read-only
No of seconds ago when this Rogue was last heard by this AP.
                 bsnRogueAPAirespaceAPWepMode 1.3.6.1.4.1.14179.2.1.8.1.12 integer read-only
The WEP mode on this detecting AP. Enumeration: 'disabled': 0, 'enabled': 1.
                 bsnRogueAPAirespaceAPPreamble 1.3.6.1.4.1.14179.2.1.8.1.13 integer read-only
The Preamble on this detecting AP. Enumeration: 'notSupported': 2, 'short': 1, 'long': 0.
                 bsnRogueAPAirespaceAPWpaMode 1.3.6.1.4.1.14179.2.1.8.1.14 integer read-only
The WPA mode on this detecting AP. Enumeration: 'disabled': 0, 'enabled': 1.
                 bsnRogueAPAirespaceAPSNR 1.3.6.1.4.1.14179.2.1.8.1.27 integer32 read-only
SNR seen by Airespace AP Interface from Rogue
                 bsnRogueAPChannelWidth 1.3.6.1.4.1.14179.2.1.8.1.28 integer read-only
This object represents the channel width of the rogue. Enumeration: 'belowfortyBelowEighty': 9, 'ten': 2, 'abovefortyBelowEighty': 7, 'twenty': 3, 'belowforty': 5, 'aboveEightyBelowforty': 8, 'five': 1, 'aboveforty': 4, 'abovefortyAndEighty': 6.
         bsnThirdPartyAPTable 1.3.6.1.4.1.14179.2.1.9 no-access
Third Party Access Point Table. An entry needs to be configured in this table for a third party access point that needs to be supported by the Switch. Note: A third party ESS (Wlan) with ID 17 should be created in bsnDot11EssTable before adding entries here. Please also note that ACS currently supports only Aironet 350, 1200 and Orinoco 2000 Access Points as third party APs.
             bsnThirdPartyAPEntry 1.3.6.1.4.1.14179.2.1.9.1 no-access
An entry in bsnThirdPartyAPTable.
                 bsnThirdPartyAPMacAddress 1.3.6.1.4.1.14179.2.1.9.1.1 macaddress read-only
MAC Address of Third Party Access Point which is connected directly to this Airespace Switch.
                 bsnThirdPartyAPInterface 1.3.6.1.4.1.14179.2.1.9.1.2 integer32 read-only
Interface(Port Number) to which the Third Party AP is connected.
                 bsnThirdPartyAPIpAddress 1.3.6.1.4.1.14179.2.1.9.1.3 ipaddress read-only
Static IP address of the 3rd Party AP, 0.0.0.0 indicating x its using DHCP
                 bsnThirdPartyAP802Dot1XRequired 1.3.6.1.4.1.14179.2.1.9.1.4 integer read-only
If 802.1X is required for the 3rd Party AP Enumeration: 'enable': 1, 'disable': 0.
                 bsnThirdPartyAPMirrorMode 1.3.6.1.4.1.14179.2.1.9.1.5 integer read-only
If enabled, then data from all the foreign AP users and all the foreign APs on this APs port will be mirrored. These clients are dynamically added to the switch's mirrored MAC list. Enumeration: 'enable': 1, 'disable': 0.
                 bsnThirdPartyAPRowStatus 1.3.6.1.4.1.14179.2.1.9.1.24 rowstatus read-only
Row Status in the ThirdPartyAPEntry.
         bsnMobileStationByIpTable 1.3.6.1.4.1.14179.2.1.10 no-access
Mobile Station Table indexed by bsnMobileStationByIpAddress. NOTE: This is just to facilitate the search of mobile stations based on IP Address. Doing a get without the index doesn't return anything. (Mobile Station is better referred to as Client in the current releases.)
               bsnMobileStationByIpEntry 1.3.6.1.4.1.14179.2.1.10.1 no-access
An entry in bsnMobileStationByIpTable.
                   bsnMobileStationByIpAddress 1.3.6.1.4.1.14179.2.1.10.1.1 ipaddress read-only
IP Address of the Mobile Station
                   bsnMobileStationByIpMacAddress 1.3.6.1.4.1.14179.2.1.10.1.2 macaddress read-only
802.11 Mac Address of the Mobile Station.
         bsnMobileStationRssiDataTable 1.3.6.1.4.1.14179.2.1.11 no-access
Mobile Station RSSI data Table indexed by bsnMobileStationMacAddress, bsnMobileStationRssiDataApMacAddress, bsnMobileStationRssiDataApIfSlotId. (Mobile Station is better referred to as Client in the current releases.)
               bsnMobileStationRssiDataEntry 1.3.6.1.4.1.14179.2.1.11.1 no-access
An entry in bsnMobileStationRssiDataTable.
                   bsnMobileStationRssiDataApMacAddress 1.3.6.1.4.1.14179.2.1.11.1.1 macaddress read-only
802.11 Mac Address of the AP on which Mobile Station is associated.
                   bsnMobileStationRssiDataApIfSlotId 1.3.6.1.4.1.14179.2.1.11.1.2 unsigned32 read-only
SlotId of APIf on which mobile station is associated
                   bsnMobileStationRssiDataApIfType 1.3.6.1.4.1.14179.2.1.11.1.3 integer read-only
The interface type of the radio that sensed the rssi data. Enumeration: 'dot11bg': 1, 'dot11a': 2, 'unknown': 3.
                   bsnMobileStationRssiDataApName 1.3.6.1.4.1.14179.2.1.11.1.4 displaystring read-only
The Name of the AP that sensed the rssi data.
                   bsnMobileStationRssiData 1.3.6.1.4.1.14179.2.1.11.1.5 integer32 read-only
RSSI seen by Airespace AP Interface for the Mobile Station
                   bsnAPIfPhyAntennaIndex 1.3.6.1.4.1.14179.2.1.11.1.6 unsigned32 read-only
Antenna which recived the probe request from client. The antenna which reported the RSSI value for the client. For now value will be 0 to 1, in future it may change.
                   bsnMobileStationRssiDataLastHeard 1.3.6.1.4.1.14179.2.1.11.1.25 counter32 read-only
No of seconds ago when this RSSI data was recorded.
         bsnWatchListClientTable 1.3.6.1.4.1.14179.2.1.12 no-access
Table of watch listed clients. When clients are added to this table by username or MAC address, ACS collects data for them to show trend reports. The switch generates Client Association and Client Authentication traps for the watch listed clients.The watch list feature can be enbaled or diabled by the bsnWatchListFeatureEnable flag on the switch.
               bsnWatchListClientEntry 1.3.6.1.4.1.14179.2.1.12.1 no-access
An entry in bsnWatchListClientTable.
                   bsnWatchListClientKey 1.3.6.1.4.1.14179.2.1.12.1.1 octet string read-only
MAC Address or User Name of Client that is to be added to the watch list.
                   bsnWatchListClientType 1.3.6.1.4.1.14179.2.1.12.1.2 integer read-only
The type of the watch list client entry. The entry can be created by Client MAC Address or by Username. Enumeration: 'byUserName': 2, 'byMac': 1.
                   bsnWatchListClientRowStatus 1.3.6.1.4.1.14179.2.1.12.1.20 rowstatus read-only
A row status type for the bsnWatchListClientEntry
         bsnMobileStationByUsernameTable 1.3.6.1.4.1.14179.2.1.13 no-access
Mobile Station Table indexed by the Mobile Station Username and MAC Address. NOTE: This is just to facilitate the search of mobile stations based on User Name. Doing a get without the username doesn't return anything. (Mobile Station is better referred to as Client in the current releases.)
               bsnMobileStationByUsernameEntry 1.3.6.1.4.1.14179.2.1.13.1 no-access
An entry in bsnMobileStationByUsernameTable.
                   bsnMobileStationByUserName 1.3.6.1.4.1.14179.2.1.13.1.1 octet string read-only
Username of the Mobile Station
                   bsnMobileStationByUserMacAddress 1.3.6.1.4.1.14179.2.1.13.1.2 macaddress read-only
802.11 Mac Address of the Mobile Station.
         bsnRogueClientTable 1.3.6.1.4.1.14179.2.1.14 no-access
Rogue Client Table. This table lists all the Rogue Clients detected by Airespace APs.
               bsnRogueClientEntry 1.3.6.1.4.1.14179.2.1.14.1 no-access
An Entry in bsnRogueClientTable.
                   bsnRogueClientDot11MacAddress 1.3.6.1.4.1.14179.2.1.14.1.1 macaddress no-access
Mac Address of Rogue Station.
                   bsnRogueClientTotalDetectingAPs 1.3.6.1.4.1.14179.2.1.14.1.2 integer32 read-only
Total number of Airespace APs that detected this rogue.
                   bsnRogueClientFirstReported 1.3.6.1.4.1.14179.2.1.14.1.3 displaystring read-only
Time Stamp when this Rogue was First Detected.
                   bsnRogueClientLastReported 1.3.6.1.4.1.14179.2.1.14.1.4 displaystring read-only
Time Stamp when this Rogue was Last Detected.
                   bsnRogueClientBSSID 1.3.6.1.4.1.14179.2.1.14.1.5 macaddress read-only
This attribute specifies BSSID of the Rogue Client.
                   bsnRogueClientContainmentLevel 1.3.6.1.4.1.14179.2.1.14.1.6 integer read-write
If the state of the rogue is contained, this specifies the level of containment. Higher the level, more the number of detecting APs that are used to contain it. The value must be between 1 to 4 for 'contained' state. Enumeration: 'level4': 4, 'level1': 1, 'level2': 2, 'unassigned': 0, 'level3': 3.
                   bsnRogueClientLastHeard 1.3.6.1.4.1.14179.2.1.14.1.7 integer32 read-only
Number of seconds ago this rogue client was detected.
                   bsnRogueClientState 1.3.6.1.4.1.14179.2.1.14.1.24 integer read-write
This attribute is use to specify the state in which the Rogue AP is. User can set the Rogue Client in alert,known or acknowledge state. Alert state means Rogue Client can be a potential i threat.Trap will be sent out to trap recipients. Known state means its just internal Client which is not on the same Switch. Acknowledge state means an external Client whose existence is acceptable and not a threat (probably some other company's AP). Contained means containement is initiated and ongoing Enumeration: 'alert': 2, 'contained': 6, 'threat': 7, 'initializing': 0, 'containedpending': 8, 'pending': 1.
         bsnRogueClientAirespaceAPTable 1.3.6.1.4.1.14179.2.1.15 no-access
Rogue Station Table. This table lists all the Airespace AP Interface that detected a particular Rogue.
               bsnRogueClientAirespaceAPEntry 1.3.6.1.4.1.14179.2.1.15.1 no-access
An entry in bsnRogueClientAirespaceAPEntry.
                   bsnRogueClientAirespaceAPMacAddress 1.3.6.1.4.1.14179.2.1.15.1.1 macaddress read-only
Mac Address of Airespace AP Interface that Detected the Rogue.
                   bsnRogueClientAirespaceAPSlotId 1.3.6.1.4.1.14179.2.1.15.1.2 unsigned32 read-only
The slotId of the Airespace AP Interface that detected the Rogue.
                   bsnRogueClientRadioType 1.3.6.1.4.1.14179.2.1.15.1.3 integer read-only
The advertised SSID that the Airespace AP Interface picked up from the Rogue. Enumeration: 'unknown': 3, 'dot11b': 1, 'dot11a': 2.
                   bsnRogueClientAirespaceAPName 1.3.6.1.4.1.14179.2.1.15.1.4 displaystring read-only
Name of Airespace AP Interface that detected the Rogue.
                   bsnRogueClientChannelNumber 1.3.6.1.4.1.14179.2.1.15.1.5 integer32 read-only
The advertised Channel Number of that the Airespace AP Interface picked up from the Rogue.
                   bsnRogueClientAirespaceAPRSSI 1.3.6.1.4.1.14179.2.1.15.1.7 integer32 read-only
RSSI seen by Airespace AP Interface from the Rogue
                   bsnRogueClientAirespaceAPLastHeard 1.3.6.1.4.1.14179.2.1.15.1.11 displaystring read-only
No of seconds ago when this Rogue was last heard by this AP.
                   bsnRogueClientAirespaceAPSNR 1.3.6.1.4.1.14179.2.1.15.1.27 integer32 read-only
SNR seen by Airespace AP Interface from Rogue
         bsnRogueClientPerRogueAPTable 1.3.6.1.4.1.14179.2.1.16 no-access
Rogue Clients for each rogue. This table lists all Rogue Clients on a particular Rogue.
               bsnRogueClientPerRogueAPEntry 1.3.6.1.4.1.14179.2.1.16.1 no-access
An entry in RogueClientPerRogueAPTable.
                   bsnRogueAPDot11MacAddr 1.3.6.1.4.1.14179.2.1.16.1.1 macaddress read-only
The MAC Address of the Rogue AP.
                   bsnRogueClientDot11MacAddr 1.3.6.1.4.1.14179.2.1.16.1.20 macaddress read-only
MAC Address of the Rogue Client.
         bsnDot11QosProfileTable 1.3.6.1.4.1.14179.2.1.17 no-access
QOS Profiles specified in bsnDot11EssTable can be customized in this table. This is a lookup table for auto created profiles
               bsnDot11QosProfileEntry 1.3.6.1.4.1.14179.2.1.17.1 no-access
An entry in bsnDot11QosProfileTable.
                   bsnDot11QosProfileName 1.3.6.1.4.1.14179.2.1.17.1.1 octet string read-only
QOS Profile Name. This will be one of bronze,gold, platinum,silver,uranium.
                   bsnDot11QosProfileDesc 1.3.6.1.4.1.14179.2.1.17.1.2 octet string read-write
QOS Profile Description.
                   bsnDot11QosAverageDataRate 1.3.6.1.4.1.14179.2.1.17.1.3 integer read-write
This is one of the per user bandwidth contracts(k). Specifies Average Data Rate per user. Value of 0 indicates the feature is disabled.
                   bsnDot11QosBurstDataRate 1.3.6.1.4.1.14179.2.1.17.1.4 integer read-write
This is one of the per user bandwidth contracts(k). Specifies Average Burst Data Rate per user. Value of 0 indicates the feature is disabled.
                   bsnDot11QosAvgRealTimeDataRate 1.3.6.1.4.1.14179.2.1.17.1.5 integer read-write
This is one of the per user bandwidth contracts(k). Specifies Average Real Time Data Rate per user. Value of 0 indicates the feature is disabled.
                   bsnDot11QosBurstRealTimeDataRate 1.3.6.1.4.1.14179.2.1.17.1.6 integer read-write
This is one of the per user bandwidth contracts(k). Specifies Burst Real Time Data Rate per user. Value of 0 indicates the feature is disabled.
                   bsnDot11QosMaxRFUsagePerAP 1.3.6.1.4.1.14179.2.1.17.1.7 integer read-write
This is one of the over the Air QOS parameter. Specifies maximum RF Usage per AP in percentage.
                   bsnDot11QosProfileQueueDepth 1.3.6.1.4.1.14179.2.1.17.1.8 integer read-write
This is one of the over the Air QOS parameter. Specifies Queue depth for the current profile.
                   bsnDot11WiredQosProtocol 1.3.6.1.4.1.14179.2.1.17.1.9 integer read-write
This is one of the over the Air QOS parameter. Specifies Queue depth for the current profile. Enumeration: 'none': 0, 'dot1p': 1.
                   bsnDot11802Dot1PTag 1.3.6.1.4.1.14179.2.1.17.1.10 integer read-write
Specifies the type of wired QOS protocol for the current profile. Value of 0 indicates the feature is disabled.
                   bsnDot11ResetProfileToDefault 1.3.6.1.4.1.14179.2.1.17.1.40 integer read-write
Set this attribute to reset to restore the factory default value for the profile. Enumeration: 'reset': 1, 'default': 0.
         bsnTagTable 1.3.6.1.4.1.14179.2.1.18 no-access
RF ID Tag Table indexed by bsnTagDot11MacAddress.
               bsnTagEntry 1.3.6.1.4.1.14179.2.1.18.1 no-access
An entry in bsnTagTable.
                   bsnTagDot11MacAddress 1.3.6.1.4.1.14179.2.1.18.1.1 macaddress read-only
802.11 MAC Address of the RF ID Tag.
                   bsnTagType 1.3.6.1.4.1.14179.2.1.18.1.2 integer read-only
Type of the RF ID Tag. Enumeration: 'unknown': 0, 'type1': 2.
                   bsnTagTimeInterval 1.3.6.1.4.1.14179.2.1.18.1.3 unsigned32 read-only
Time Interval after which the tag transmits data.
                   bsnTagBatteryStatus 1.3.6.1.4.1.14179.2.1.18.1.4 integer read-only
Battery Status of the RF ID Tag. Enumeration: 'unknown': 0, 'medium': 3, 'low': 1, 'normal': 2.
                   bsnTagLastReported 1.3.6.1.4.1.14179.2.1.18.1.23 unsigned32 read-only
No of seconds ago when this tag was heard by any AP.
         bsnTagRssiDataTable 1.3.6.1.4.1.14179.2.1.19 no-access
RF ID Tag Detecting AP Table indexed by bsnTagDot11MacAddress, bsnTagRssiDataApMacAddress and bsnTagRssiDataApIfSlotId.
               bsnTagRssiDataEntry 1.3.6.1.4.1.14179.2.1.19.1 no-access
An entry in bsnTagRssiDataTable.
                   bsnTagRssiDataApMacAddress 1.3.6.1.4.1.14179.2.1.19.1.1 macaddress read-only
802.11 MAC Address of the AP detecting the RF ID Tag.
                   bsnTagRssiDataApIfSlotId 1.3.6.1.4.1.14179.2.1.19.1.2 unsigned32 read-only
Slot Id of the radio on AP detecting the RF ID Tag.
                   bsnTagRssiDataApIfType 1.3.6.1.4.1.14179.2.1.19.1.3 integer read-only
Interface Type of the radio on AP detecting the RF ID Tag. Enumeration: 'uwb': 4, 'dot11b': 1, 'dot11a': 2.
                   bsnTagRssiDataApName 1.3.6.1.4.1.14179.2.1.19.1.4 displaystring read-only
Name of the AP detecting the RF ID Tag.
                   bsnTagRssiDataLastHeard 1.3.6.1.4.1.14179.2.1.19.1.5 counter32 read-only
No of seconds ago when this tag was heard by this detecting AP.
                   bsnTagRssiData 1.3.6.1.4.1.14179.2.1.19.1.6 integer32 read-only
RSSI of the RF ID Tag as seen by the radio on this detecting AP.
                   bsnTagRssiDataSnr 1.3.6.1.4.1.14179.2.1.19.1.26 integer32 read-only
SNR of the RF ID tag as seen by the radio on this detecting AP.
         bsnTagStatsTable 1.3.6.1.4.1.14179.2.1.20 no-access
RF ID Tag Statistics Table.
               bsnTagStatsEntry 1.3.6.1.4.1.14179.2.1.20.1 no-access
An entry in bsnTagStatsTable.
                   bsnTagBytesReceived 1.3.6.1.4.1.14179.2.1.20.1.1 unsigned32 read-only
Bytes received from an RF ID Tag
                   bsnTagPacketsReceived 1.3.6.1.4.1.14179.2.1.20.1.20 unsigned32 read-only
Packets received from an RF ID Tag
         bsnMobileStationExtStatsTable 1.3.6.1.4.1.14179.2.1.21 no-access
This table was supported only by indoor mesh AP -cisco 1000. As this AP is not supported after 4.2.x.x. This table has been marked obsolete. Mobile Station Extended Statistics Table. (Mobile Station is better referred to as Client in the current releases.)
               bsnMobileStationExtStatsEntry 1.3.6.1.4.1.14179.2.1.21.1 no-access
An entry in bsnMobileStationExtStatsTable.
                   bsnMobileStationSampleTime 1.3.6.1.4.1.14179.2.1.21.1.1 integer32 read-only
Time stats were sampled as seconds since the epoch.
                   bsnMobileStationTxExcessiveRetries 1.3.6.1.4.1.14179.2.1.21.1.2 counter64 read-only
Tx packets dropped due to excessive retries.
                   bsnMobileStationTxRetries 1.3.6.1.4.1.14179.2.1.21.1.3 counter64 read-only
Tx packets retransmitted.
                   bsnMobileStationTxFiltered 1.3.6.1.4.1.14179.2.1.21.1.20 counter64 read-only
Tx packets dropped by the built-in Tx filter
     bsnAP 1.3.6.1.4.1.14179.2.2
         bsnAPTable 1.3.6.1.4.1.14179.2.2.1 no-access
Table of Airespace APs managed by this Airespace Switch.
             bsnAPEntry 1.3.6.1.4.1.14179.2.2.1.1 no-access
An entry in the bsnAPTable.
                 bsnAPDot3MacAddress 1.3.6.1.4.1.14179.2.2.1.1.1 macaddress read-only
The MAC address of an AP.
                 bsnAPNumOfSlots 1.3.6.1.4.1.14179.2.2.1.1.2 integer read-only
Number of Radio Interfaces on the Airespace AP. Currently maximum two interfaces are supported. One would be of type 802.11a and other of type 802.11b/g.
                 bsnAPName 1.3.6.1.4.1.14179.2.2.1.1.3 octet string read-write
Name assigned to this AP. If an AP is not configured its factory default name will be ap: eg. ap:af:12:be
                 bsnAPLocation 1.3.6.1.4.1.14179.2.2.1.1.4 octet string read-write
User specified location of this AP. While configuring AP, user should specify a location for the AP so that its easy to figure out for some one where the AP is located.
                 bsnAPMonitorOnlyMode 1.3.6.1.4.1.14179.2.2.1.1.5 integer read-write
Monitor Only Mode Setting. Enumeration: 'bridge': 5, 'remote': 2, 'monitor': 1, 'roguedetector': 3, 'seConnect': 6, 'remoteBridge': 7, 'sniffer': 4, 'local': 0.
                 bsnAPOperationStatus 1.3.6.1.4.1.14179.2.2.1.1.6 integer read-only
Operation State of the AP. When AP associates with the Airespace Switch its state will be associated. When Airespace AP is disassociated from the Switch, its state will be disassociating. The state is downloading when the AP is downloading its firmware. Enumeration: 'downloading': 3, 'associated': 1, 'disassociating': 2.
                 bsnAPSoftwareVersion 1.3.6.1.4.1.14179.2.2.1.1.8 displaystring read-only
Major Minor Software Version of AP
                 bsnAPBootVersion 1.3.6.1.4.1.14179.2.2.1.1.9 displaystring read-only
Major Minor Boot Version of AP
                 bsnAPPrimaryMwarName 1.3.6.1.4.1.14179.2.2.1.1.10 octet string read-write
sysName of the Airespace Switch which is suppose to be the Primary MWAR(switch) of the AP with which AP should associate. This work when AP is not directly connected to Airespace Switch, it tries to find Primary Switch and associates with it. If this attribute is left empty or AP is not able to find the Airespace Switch with this name, then it will associate with Secondary Switch.
                 bsnAPReset 1.3.6.1.4.1.14179.2.2.1.1.11 integer read-write
Set this attribute to reset the AP. When it comes up it will try to associate with the Primary Switch if that is set, else it will associate with the Master Switch. Reading this attribute will always return 0 Enumeration: 'reset': 1, 'default': 0.
                 bsnAPStatsTimer 1.3.6.1.4.1.14179.2.2.1.1.12 integer read-write
Configures the time interval in secs after which bsnAPDot11Counters Stats is sent from AP to Switch. If not configured this value is 0 which means never send the stats.
                 bsnAPPortNumber 1.3.6.1.4.1.14179.2.2.1.1.13 integer read-only
Port on the Switch on which this APs traffic is coming through.
                 bsnAPModel 1.3.6.1.4.1.14179.2.2.1.1.16 displaystring read-only
AP Model
                 bsnAPSerialNumber 1.3.6.1.4.1.14179.2.2.1.1.17 displaystring read-only
AP Serial Number.
                 bsnAPClearConfig 1.3.6.1.4.1.14179.2.2.1.1.18 integer read-write
Set this attribute to clear AP configuration and reset it to factory defaults. A value of clearAll(2) resets all values to factory defaults. A value of clear(1) resets all values except static IP of the AP. Reading this attribute will always return 0 Enumeration: 'default': 0, 'clear': 1, 'clearAll': 2.
                 bsnApIpAddress 1.3.6.1.4.1.14179.2.2.1.1.19 ipaddress read-write
IP address of the AP. This will not be available when the switch is operating in the Layer2 mode. In this case, the attribute will return 0 as value.
                 bsnAPMirrorMode 1.3.6.1.4.1.14179.2.2.1.1.20 integer read-write
If enabled, then this AP's Client's Data is mirrored and this AP's clients are dynamically added to the switch's mirrored MAC list. Enumeration: 'enable': 1, 'disable': 0.
                 bsnAPRemoteModeSupport 1.3.6.1.4.1.14179.2.2.1.1.21 integer read-only
This specifies if the the Remote Mode is supported on this AP or not. If supported user can set bsnAPMonitorOnlyMode to remote. Otherwise not. Enumeration: 'enable': 1, 'disable': 0.
                 bsnAPType 1.3.6.1.4.1.14179.2.2.1.1.22 integer read-only
This is the model of the AP in enumeration. Enumeration: 'wap2600e': 46, 'ap1570e': 53, 'ap3700p': 41, 'ap3500i': 18, 'ap3500e': 19, 'wap2600i': 45, 'ap1570i': 54, 'ap3600p': 36, 'ap3700e': 39, 'ap1040': 21, 'ap1260': 20, 'ap3600i': 27, 'ap1100': 5, 'ap3600e': 28, 'ap1140': 16, 'ap1200': 8, 'ap3700i': 40, 'ap3500p': 24, 'ap1550': 22, 'ap702e': 34, 'ap702i': 35, 'ap1310': 9, 'ap1240': 7, 'unknown': 4, 'ap1000': 1, 'ap602i': 23, 'wap1600i': 47, 'ap702w': 44, 'ap1700e': 52, 'wap1600e': 48, 'ap2700e': 42, 'ap1030': 2, 'ap1500': 10, 'ap1505': 12, 'ap1250': 11, 'ap802gn': 25, 'ap802hagn': 31, 'ap800agn': 17, 'mimo': 3, 'ap2700i': 43, 'ap2600i': 29, 'wap702i': 49, 'ap1530e': 38, 'ap1520': 14, 'ap1530i': 37, 'ap3201': 13, 'ap800': 15, 'ap1130': 6, 'ap2600e': 30, 'ap802agn': 26, 'ap1600i': 32, 'wap702e': 50, 'ap1600e': 33, 'ap1700i': 51.
                 bsnAPSecondaryMwarName 1.3.6.1.4.1.14179.2.2.1.1.23 octet string read-write
sysName of the Airespace Switch which is suppose to be the Secondary MWAR(switch) of the AP with which AP should associate if Primary Switch(configured through bsnAPPrimaryMwarName) is not available. If primary and secondary switches are not available then AP will associate with the tertiary switch.
                 bsnAPTertiaryMwarName 1.3.6.1.4.1.14179.2.2.1.1.24 octet string read-write
sysName of the Airespace Switch which is suppose to be the Tertiary MWAR(switch) of the AP with which AP should associate. If primary,secondary and tertiary switch are not available then it will associate with Master Switch.
                 bsnAPIsStaticIP 1.3.6.1.4.1.14179.2.2.1.1.25 integer read-write
This flag when disabled implies that AP will use DHCP to get the IP address. However, if it is enabled, then user should enter the IPAddress, Netmask and Gateway. Enumeration: 'enable': 1, 'disable': 0.
                 bsnAPNetmask 1.3.6.1.4.1.14179.2.2.1.1.26 ipaddress read-write
The Netmask of the IP address of the AP.
                 bsnAPGateway 1.3.6.1.4.1.14179.2.2.1.1.27 ipaddress read-write
The Gateway for the AP.
                 bsnAPStaticIPAddress 1.3.6.1.4.1.14179.2.2.1.1.28 ipaddress read-write
The Static IP-Address configuration for the AP. This can only be changed when the LWAPP mode is in Layer-3.
                 bsnAPBridgingSupport 1.3.6.1.4.1.14179.2.2.1.1.29 integer read-write
This specifies if this AP is a Bridging AP. Bridging APs can be used in Bridging or Mesh network configurations. Enumeration: 'enable': 1, 'disable': 0.
                 bsnAPGroupVlanName 1.3.6.1.4.1.14179.2.2.1.1.30 octet string read-write
The AP Group to which this AP has been associated with. If it is empty, then no AP Group overriding has been set.
                 bsnAPIOSVersion 1.3.6.1.4.1.14179.2.2.1.1.31 displaystring read-only
IOS Version of IOS Cisco AP. Zero length string will be returned for other APs
                 bsnAPCertificateType 1.3.6.1.4.1.14179.2.2.1.1.32 integer read-only
Enum values denoting AP Certificate Type. 1 : manufactureinstalled : Manufacture Installed Certificate type (MIC). 2 : selfsigned : Self Signed Certificate type (SSC). 3 : localsignificance : Local Significance. Enumeration: 'selfsigned': 2, 'unknown': 0, 'manufactureinstalled': 1, 'localsignificance': 3.
                 bsnAPEthernetMacAddress 1.3.6.1.4.1.14179.2.2.1.1.33 macaddress read-only
The Ethernet MAC address of the AP.
                 bsnAPAdminStatus 1.3.6.1.4.1.14179.2.2.1.1.37 integer read-write
Admin State of the AP Enumeration: 'enable': 1, 'disable': 2.
         bsnAPIfTable 1.3.6.1.4.1.14179.2.2.2 no-access
Each entry represents an 802.11 interface in an Airespace AP.
             bsnAPIfEntry 1.3.6.1.4.1.14179.2.2.2.1 no-access
An entry in bsnAPIfTable.
                 bsnAPIfSlotId 1.3.6.1.4.1.14179.2.2.2.1.1 unsigned32 read-only
The slotId of this interface.
                 bsnAPIfType 1.3.6.1.4.1.14179.2.2.2.1.2 integer read-only
The type of this interface. dot11b also implies 802.11b/g. Enumeration: 'uwb': 4, 'dot11abgn': 3, 'dot11b': 1, 'dot11a': 2.
                 bsnAPIfPhyChannelAssignment 1.3.6.1.4.1.14179.2.2.2.1.3 integer read-write
If this value is true, then bsnAPDot11CurrentChannel in bsnAPIfDot11PhyDSSSTable is assigned by dynamic algorithm and is read-only. Enumeration: 'automatic': 1, 'customized': 2.
                 bsnAPIfPhyChannelNumber 1.3.6.1.4.1.14179.2.2.2.1.4 integer read-write
Current channel number of the AP Interface. Channel numbers will be from 1 to 14 for 802.11b interface type. Channel numbers will be from 34 to 173 for 802.11a interface type. Allowed channel numbers also depends on the current Country Code set in the Switch. This attribute cannot be set unless bsnAPIfPhyChannelAssignment is set to customized else this attribute gets assigned by dynamic algorithm. Enumeration: 'ch104': 104, 'ch100': 100, 'ch108': 108, 'ch165': 165, 'ch40': 40, 'ch42': 42, 'ch161': 161, 'ch44': 44, 'ch46': 46, 'ch48': 48, 'ch149': 149, 'ch169': 169, 'ch124': 124, 'ch26': 26, 'ch25': 25, 'ch24': 24, 'ch23': 23, 'ch22': 22, 'ch21': 21, 'ch20': 20, 'ch60': 60, 'ch64': 64, 'ch120': 120, 'ch140': 140, 'ch34': 34, 'ch112': 112, 'ch116': 116, 'ch36': 36, 'ch56': 56, 'ch52': 52, 'ch173': 173, 'ch132': 132, 'ch157': 157, 'ch136': 136, 'ch153': 153, 'ch12': 12, 'ch13': 13, 'ch10': 10, 'ch11': 11, 'ch14': 14, 'ch128': 128, 'ch38': 38, 'ch1': 1, 'ch2': 2, 'ch3': 3, 'ch4': 4, 'ch5': 5, 'ch6': 6, 'ch7': 7, 'ch8': 8, 'ch9': 9.
                 bsnAPIfPhyTxPowerControl 1.3.6.1.4.1.14179.2.2.2.1.5 integer read-write
If this value is true, then bsnAPIfPhyTxPowerLevel is assigned by dynamic algorithm and is read-only. Enumeration: 'automatic': 1, 'customized': 2.
                 bsnAPIfPhyTxPowerLevel 1.3.6.1.4.1.14179.2.2.2.1.6 integer read-write
The TxPowerLevel currently being used to transmit data. Some PHYs also use this value to determine the receiver sensitivity requirements for CCA. Valid values are between 1 to 8,depnding on what radio, and this attribute can be set only if bsnAPIfPhyTxPowerControl is set to customized.
                 bsnAPIfPhyAntennaMode 1.3.6.1.4.1.14179.2.2.2.1.7 integer read-write
Antenna Mode of the AP Interface. For 802.11a this attribute will always be omni for now. This attribute doesn't apply to interface of type 802.11b. Enumeration: 'notapplicable': 99, 'omni': 3, 'sectorA': 1, 'sectorB': 2.
                 bsnAPIfPhyAntennaType 1.3.6.1.4.1.14179.2.2.2.1.8 integer read-write
This attribute specified if the Antenna currently used by AP Radio is internal or external. For 802.11a the antenna is always internal. For 802.11b you can set antenna type to be external or internal. Enumeration: 'internal': 1, 'external': 2.
                 bsnAPIfPhyAntennaDiversity 1.3.6.1.4.1.14179.2.2.2.1.9 integer read-write
Diversity doesn't apply to AP Radio of type 802.11a. For 802.11b you can set it to connectorA, connectorB or enabled. Enumeration: 'connectorA': 0, 'connectorB': 1, 'enabled': 255.
                 bsnAPIfCellSiteConfigId 1.3.6.1.4.1.14179.2.2.2.1.10 unsigned32 read-write
In a cell site configuration, this would be the cell Id of this AP Interface
                 bsnAPIfNumberOfVaps 1.3.6.1.4.1.14179.2.2.2.1.11 integer read-only
Number of WLANs currently active on this AP Interface.
                 bsnAPIfOperStatus 1.3.6.1.4.1.14179.2.2.2.1.12 integer read-only
Operational status of the interface. Enumeration: 'down': 1, 'up': 2.
                 bsnAPIfPortNumber 1.3.6.1.4.1.14179.2.2.2.1.13 integer read-only
Port number on Airespace Switch on which the traffic from this AP interface is received.
                 bsnAPIfPhyAntennaOptions 1.3.6.1.4.1.14179.2.2.2.1.14 integer read-only
This attribute specifies the Antenna types supported by the AP Radio whether it is internal or external or both. internalAndExternal(0)- internal and external antenna for both 11a and 11b internal(1) - only internal antenna is allowed. siacAp- 11b internal and 11a external external - only external antenna is allowed for 11a and 11b ext11bInt11a - external antenna for 11b and internal antenna for 11a. Enumeration: 'internalAndExternal': 0, 'ext11bInt11a': 4, 'internal': 1, 'siacAp': 2, 'external': 3.
                 bsnApIfNoOfUsers 1.3.6.1.4.1.14179.2.2.2.1.15 counter32 read-only
No of Users associated with this radio.
                 bsnAPIfWlanOverride 1.3.6.1.4.1.14179.2.2.2.1.16 integer read-write
This flag when disabled implies that all WLANs are available from this radio. However, if this is enabled, then only those WLANs that appear in the bsnApIfWlanOverrideTable will be available from this radio. Enumeration: 'enable': 1, 'disable': 0.
                 bsnAPIfPacketsSniffingFeature 1.3.6.1.4.1.14179.2.2.2.1.17 integer read-write
This flag when enabled implies that AP will sniff the 802.11a/bg packets. However, if it is enabled, then user should enter the server-ip-address on which Airopeek is running and the 802.11a/bg-channel-number to be sniffed. The above feature will work only when AP is in 'Sniffer' mode. Enumeration: 'enable': 1, 'disable': 0.
                 bsnAPIfSniffChannel 1.3.6.1.4.1.14179.2.2.2.1.18 integer read-write
This the 802.11a/bg-channel-number on which AP will sniff the packets. Enumeration: 'ch104': 104, 'ch100': 100, 'ch108': 108, 'ch165': 165, 'ch40': 40, 'ch42': 42, 'ch161': 161, 'ch44': 44, 'ch46': 46, 'ch48': 48, 'ch149': 149, 'ch169': 169, 'ch124': 124, 'ch26': 26, 'ch25': 25, 'ch24': 24, 'ch23': 23, 'ch22': 22, 'ch21': 21, 'ch20': 20, 'ch60': 60, 'ch64': 64, 'ch120': 120, 'ch140': 140, 'ch34': 34, 'ch112': 112, 'ch116': 116, 'ch36': 36, 'ch56': 56, 'ch52': 52, 'ch173': 173, 'ch132': 132, 'ch157': 157, 'ch136': 136, 'ch153': 153, 'ch12': 12, 'ch13': 13, 'ch10': 10, 'ch11': 11, 'ch14': 14, 'ch128': 128, 'ch38': 38, 'ch0': 0, 'ch1': 1, 'ch2': 2, 'ch3': 3, 'ch4': 4, 'ch5': 5, 'ch6': 6, 'ch7': 7, 'ch8': 8, 'ch9': 9.
                 bsnAPIfSniffServerIPAddress 1.3.6.1.4.1.14179.2.2.2.1.19 ipaddress read-write
The machine ip address on which Airopeek application is running.
                 bsnAPIfAntennaGain 1.3.6.1.4.1.14179.2.2.2.1.20 integer read-write
Represents antenna gain in multiple of 0.5 dBi. An integer value 4 means 4 x 0.5 = 2 dBi of gain
                 bsnAPIfChannelList 1.3.6.1.4.1.14179.2.2.2.1.21 displaystring read-write
List of comma separated channels supported by this radio.
                 bsnAPIfAbsolutePowerList 1.3.6.1.4.1.14179.2.2.2.1.22 displaystring read-write
List of comma separated absolute power levels supported by this radio.
                 bsnAPIfRegulatoryDomainSupport 1.3.6.1.4.1.14179.2.2.2.1.23 integer read-only
If the regulatory domain on radio is supported or notSupported on the controller Enumeration: 'supported': 1, 'notSupported': 0.
                 bsnAPIfAdminStatus 1.3.6.1.4.1.14179.2.2.2.1.34 integer read-write
Admin status of the interface. Enumeration: 'enable': 1, 'disable': 2.
         bsnAPIfSmtParamTable 1.3.6.1.4.1.14179.2.2.3 no-access
Each entry represents SMT parameters on an 802.11 interface of an Airespace AP.
             bsnAPIfSmtParamEntry 1.3.6.1.4.1.14179.2.2.3.1 no-access
An entry in bsnAPIfSmtParamTable
                 bsnAPIfDot11BeaconPeriod 1.3.6.1.4.1.14179.2.2.3.1.1 integer read-only
This attribute shall specify the number of TU that a AP Interface shall use for scheduling Beacon tranmissions. This value is transmitted in Beacon and Probe Response frames.
                 bsnAPIfDot11MediumOccupancyLimit 1.3.6.1.4.1.14179.2.2.3.1.2 integer read-only
This attribute shall indicate the maximum amount of time, in TU, that a point coordinator may control the usage of the wireless medium without relinquishing control for long enough to allow at least one instance of DCF access to the medium. The default value of this attribute shall be 100, and the maximum value shall be 1000.
                 bsnAPIfDot11CFPPeriod 1.3.6.1.4.1.14179.2.2.3.1.3 integer read-only
The attribute shall describe the number of DTIM intervals between the start of CFPs. It is modified by MLME-START.request primitive.
                 bsnAPIfDot11CFPMaxDuration 1.3.6.1.4.1.14179.2.2.3.1.4 integer read-only
The attribute shall describe the maximum duration of the CFP in TU that may be generated by the PCF. It is modified by MLME-START.request primitive.
                 bsnAPIfDot11OperationalRateSet 1.3.6.1.4.1.14179.2.2.3.1.5 octet string read-only
This attribute shall specify the set of data rates at which the AP Interface may transmit data. Each octet contains a value representing a rate. Each rate shall be within the range from 2 to 127, corresponding to data rates in increments of 500 kb/s from 1 Mb/s to 63.5 Mb/s, and shall be supported (as indicated in the supported rates table) for receiving data. This value is reported in transmitted Beacon, Probe Request, Probe Response, Association Request, Association Response, Reassociation Request, and Reassociation Response frames, and is used to determine whether a BSS with which the AP Interface desires to synchronize is suitable. It is also used when starting a BSS, as specified in 10.3.
                 bsnAPIfDot11DTIMPeriod 1.3.6.1.4.1.14179.2.2.3.1.6 integer read-only
This attribute shall specify the number of beacon intervals that shall elapse between transmission of Beacons frames containing a TIM element whose DTIM Count field is 0. This value is transmitted in the DTIM Period field of Beacon frames.
                 bsnAPIfDot11MultiDomainCapabilityImplemented 1.3.6.1.4.1.14179.2.2.3.1.7 integer read-only
This attribute, when TRUE, indicates that the AP Interface implementation is capable of supporting multiple regulatory domains. The capability is disabled, otherwise. The default value of this attribute is FALSE. Enumeration: 'implemented': 1, 'notimplemented': 0.
                 bsnAPIfDot11MultiDomainCapabilityEnabled 1.3.6.1.4.1.14179.2.2.3.1.8 integer read-only
This attribute, when TRUE, indicates that the capability of the AP Interface to operate in multiple regulatory domains is enabled. The capability is disabled, otherwise. The default value of this attribute is FALSE. Enumeration: 'yes': 1, 'no': 0.
                 bsnAPIfDot11CountryString 1.3.6.1.4.1.14179.2.2.3.1.9 octet string read-only
This attribute identifies the country in which the AP Interface is operating. The first two octets of this string is the two character country code as described in document ISO/IEC 3166-1. The third octet shall be one of the following: 1. an ASCII space character, if the regulations under which the AP Interface is operating encompass all environments in the country, 2. an ASCII 'O' character, if the regulations under which the AP Interface is operating are for an Outdoor environment only, or 3. an ASCII 'I' character, if the regulations under which the AP Interface is operating are for an Indoor environment only.
                 bsnAPIfDot11SmtParamsConfigType 1.3.6.1.4.1.14179.2.2.3.1.10 integer read-only
This attribute suggests if the Station parameters for this radio are automatically set or have been customized. Enumeration: 'automatic': 0, 'customized': 1.
                 bsnAPIfDot11BSSID 1.3.6.1.4.1.14179.2.2.3.1.30 macaddress read-only
BSSID of this AP config which would be the MAC Address of AP
         bsnAPIfMultiDomainCapabilityTable 1.3.6.1.4.1.14179.2.2.4 no-access
Each entry represents an 803.2 or an 802.11 interface in an Airespace AP.
             bsnAPIfMultiDomainCapabilityEntry 1.3.6.1.4.1.14179.2.2.4.1 no-access
Each entry represents an 803.2 or an 802.11 interface in an Airespace AP.
                 bsnAPIfDot11MaximumTransmitPowerLevel 1.3.6.1.4.1.14179.2.2.4.1.1 integer32 read-only
This attribute shall indicate the maximum transmit power, in dBm, allowed in the subband for the associated domain country string. The default value of this attribute shall be zero.
                 bsnAPIfDot11FirstChannelNumber 1.3.6.1.4.1.14179.2.2.4.1.2 integer32 read-only
This attribute shall indicate the value of the lowest channel number in the subband for the associated domain country string. The default value of this attribute shall be zero.
                 bsnAPIfDot11NumberofChannels 1.3.6.1.4.1.14179.2.2.4.1.20 integer32 read-only
This attribute shall indicate the value of the total number of channels allowed in the subband for the associated domain country string. The default value of this attribute shall be zero.
         bsnAPIfMacOperationParamTable 1.3.6.1.4.1.14179.2.2.5 no-access
Group contains MAC attributes pertaining to the operation of the MAC. These would be read only attributes as they would be updated by RRM Dynamic Algorithm. If user needs to configure them then they can only be configured globally
             bsnAPIfMacOperationParamEntry 1.3.6.1.4.1.14179.2.2.5.1 no-access
An entry in the bsnAPIfMacOperationParamEntry Table. Interface tables in this MIB module are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId.
                 bsnAPIfDot11MacRTSThreshold 1.3.6.1.4.1.14179.2.2.5.1.1 integer read-only
If bsnAPIfMacParamsAutomaticOn is true then this is read only parameter updated by RRM dynamic algorithm
                 bsnAPIfDot11MacShortRetryLimit 1.3.6.1.4.1.14179.2.2.5.1.2 integer read-only
If bsnAPIfMacParamsAutomaticOn is true then this is read only parameter updated by RRM dynamic algorithm
                 bsnAPIfDot11MacLongRetryLimit 1.3.6.1.4.1.14179.2.2.5.1.3 integer read-only
If bsnAPIfMacParamsAutomaticOn is true then this is read only parameter updated by RRM dynamic algorithm
                 bsnAPIfDot11MacFragmentationThreshold 1.3.6.1.4.1.14179.2.2.5.1.4 integer read-only
If bsnAPIfMacParamsAutomaticOn is true then this is read only parameter updated by RRM dynamic algorithm
                 bsnAPIfDot11MacMaxTransmitMSDULifetime 1.3.6.1.4.1.14179.2.2.5.1.5 unsigned32 read-only
If bsnAPIfMacParamsAutomaticOn is true then this is read only parameter updated by RRM dynamic algorithm
                 bsnAPIfDot11MacParamsConfigType 1.3.6.1.4.1.14179.2.2.5.1.6 integer read-only
This attribute suggests if the MAC parameters for this radio are automatically set or have been customized. Enumeration: 'automatic': 0, 'customized': 1.
                 bsnAPIfDot11MacMaxReceiveLifetime 1.3.6.1.4.1.14179.2.2.5.1.25 unsigned32 read-only
If bsnAPIfMacParamsAutomaticOn is true then this is read only parameter updated by RRM dynamic algorithm
         bsnAPIfDot11CountersTable 1.3.6.1.4.1.14179.2.2.6 no-access
Group containing attributes that are MAC counters. Each instance represents counters on a AP dot11 interface
             bsnAPIfDot11CountersEntry 1.3.6.1.4.1.14179.2.2.6.1 no-access
An entry in the dot11CountersEntry Table. Interface tables in this MIB module are indexed by bsnAPDot3MacAddress and bsnAPIfSlotId
                 bsnAPIfDot11TransmittedFragmentCount 1.3.6.1.4.1.14179.2.2.6.1.1 counter32 read-only
This counter shall be incremented for an acknowledged MPDU with an individual address in the address 1 field or an MPDU with a multicast address in the address 1 field of type Data or Management.
                 bsnAPIfDot11MulticastTransmittedFrameCount 1.3.6.1.4.1.14179.2.2.6.1.2 counter32 read-only
This counter shall increment only when the multicast bit is set in the destination MAC address of a successfully transmitted MSDU. When operating as a STA in an ESS, where these frames are directed to the AP, this implies having received an acknowledgment to all associated MPDUs.
                 bsnAPIfDot11RetryCount 1.3.6.1.4.1.14179.2.2.6.1.3 counter32 read-only
This counter shall increment when an MSDU is successfully transmitted after one or more retransmissions.
                 bsnAPIfDot11MultipleRetryCount 1.3.6.1.4.1.14179.2.2.6.1.4 counter32 read-only
This counter shall increment when an MSDU is successfully transmitted after more than one retransmission.
                 bsnAPIfDot11FrameDuplicateCount 1.3.6.1.4.1.14179.2.2.6.1.5 counter32 read-only
This counter shall increment when a frame is received that the Sequence Control field indicates is a duplicate.
                 bsnAPIfDot11RTSSuccessCount 1.3.6.1.4.1.14179.2.2.6.1.6 counter32 read-only
This counter shall increment when a CTS is received in response to an RTS.
                 bsnAPIfDot11RTSFailureCount 1.3.6.1.4.1.14179.2.2.6.1.7 counter32 read-only
This counter shall increment when a CTS is not received in response to an RTS.
                 bsnAPIfDot11ACKFailureCount 1.3.6.1.4.1.14179.2.2.6.1.8 counter32 read-only
This counter shall increment when an ACK is not received when expected.
                 bsnAPIfDot11ReceivedFragmentCount 1.3.6.1.4.1.14179.2.2.6.1.9 counter32 read-only
This counter shall be incremented for each successfully received MPDU of type Data or Management.
                 bsnAPIfDot11MulticastReceivedFrameCount 1.3.6.1.4.1.14179.2.2.6.1.10 counter32 read-only
This counter shall increment when a MSDU is received with the multicast bit set in the destination MAC address.
                 bsnAPIfDot11FCSErrorCount 1.3.6.1.4.1.14179.2.2.6.1.11 counter32 read-only
This counter shall increment when an FCS error is detected in a received MPDU.
                 bsnAPIfDot11TransmittedFrameCount 1.3.6.1.4.1.14179.2.2.6.1.12 counter32 read-only
This counter shall increment for each successfully transmitted MSDU.
                 bsnAPIfDot11WEPUndecryptableCount 1.3.6.1.4.1.14179.2.2.6.1.13 counter32 read-only
This counter shall increment when a frame is received with the WEP subfield of the Frame Control field set to one and the WEPOn value for the key mapped to the TA's MAC address indicates that the frame should not have been encrypted or that frame is discarded due to the receiving STA not implementing the privacy option.
                 bsnAPIfDot11FailedCount 1.3.6.1.4.1.14179.2.2.6.1.33 counter32 read-only
This counter shall increment when an MSDU is not transmitted successfully due to the number of transmit attempts exceeding either the bsnAPIfDot11ShortRetryLimit or dot11LongRetryLimit.
         bsnAPIfDot11PhyTxPowerTable 1.3.6.1.4.1.14179.2.2.8 no-access
Group of attributes for bsnAPIfDot11PhyTxPowerTable. Implemented as a table indexed on STA ID to allow for multiple instances on an Agent. This table has been deprecated. The level and power can be obtained from bsnAPIfTable(bsnAPIfAbsolutePowerList).
             bsnAPIfDot11PhyTxPowerEntry 1.3.6.1.4.1.14179.2.2.8.1 no-access
An entry in the bsnAPIfDot11PhyTxPower Table. Interface tables in this MIB module are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId.
                 bsnAPIfDot11NumberSupportedPowerLevels 1.3.6.1.4.1.14179.2.2.8.1.1 integer read-only
The number of power levels supported by the PMD. This attribute can have a value of 1 to 8.
                 bsnAPIfDot11TxPowerLevel1 1.3.6.1.4.1.14179.2.2.8.1.2 integer read-only
The transmit output power for LEVEL1 in mW. This is also the default power level. It is same as the Maximum power level available on an AP interface.
                 bsnAPIfDot11TxPowerLevel2 1.3.6.1.4.1.14179.2.2.8.1.3 integer read-only
The transmit output power for LEVEL2 in mW. It is 1/2 of the Maximum power level available on an AP interface.
                 bsnAPIfDot11TxPowerLevel3 1.3.6.1.4.1.14179.2.2.8.1.4 integer read-only
The transmit output power for LEVEL3 in mW. It is 1/4th of the Maximum power level available on an AP interface.
                 bsnAPIfDot11TxPowerLevel4 1.3.6.1.4.1.14179.2.2.8.1.5 integer read-only
The transmit output power for LEVEL4 in mW. It is 1/8th of the Maximum power level available on an AP interface.
                 bsnAPIfDot11TxPowerLevel5 1.3.6.1.4.1.14179.2.2.8.1.6 integer read-only
The transmit output power for LEVEL5 in mW. It is 1/16th of the Maximum power level available on an AP interface.
                 bsnAPIfDot11TxPowerLevel6 1.3.6.1.4.1.14179.2.2.8.1.7 integer read-only
The transmit output power for LEVEL6 in mW. It is 1/32th of the Maximum power level available on an AP interface.
                 bsnAPIfDot11TxPowerLevel7 1.3.6.1.4.1.14179.2.2.8.1.8 integer read-only
The transmit output power for LEVEL7 in mW. It is 1/64th of the Maximum power level available on an AP interface.
                 bsnAPIfDot11TxPowerLevel8 1.3.6.1.4.1.14179.2.2.8.1.28 integer read-only
The transmit output power for LEVEL8 in mW. It is 1/128th of the Maximum power level available on an AP interface.
         bsnAPIfDot11PhyChannelTable 1.3.6.1.4.1.14179.2.2.9 no-access
Entry of attributes for bsnAPIfDot11PhyChannelEntry. Implemented as a table indexed on bsnAPDot3MacAddress, bsnAPIfSlotId allow for multiple instances on an Agent
             bsnAPIfDot11PhyChannelEntry 1.3.6.1.4.1.14179.2.2.9.1 no-access
An entry in the bsnAPIfDot11PhyChannelEntry Table. Interface tables in this MIB module are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId.
                 bsnAPIfDot11CurrentCCAMode 1.3.6.1.4.1.14179.2.2.9.1.1 integer read-only
The current CCA method in operation.Valid values are: energy detect only (edonly) = 01, carrier sense only (csonly) = 02, carrier sense and energy detect (edandcs)= 04 carrier sense with timer (cswithtimer)= 08 high rate carrier sense and energy detect (hrcsanded)=16. Enumeration: 'cswithtimer': 8, 'edandcs': 4, 'hrcsanded': 16, 'csonly': 2, 'edonly': 1.
                 bsnAPIfDot11EDThreshold 1.3.6.1.4.1.14179.2.2.9.1.2 integer32 read-only
The current Energy Detect Threshold being used by the Channel PHY.
                 bsnAPIfDot11TIThreshold 1.3.6.1.4.1.14179.2.2.9.1.23 integer32 read-only
The Threshold being used to detect a busy medium (frequency). CCA shall report a busy medium upon detecting the RSSI above this threshold.
         bsnAPIfProfileThresholdConfigTable 1.3.6.1.4.1.14179.2.2.12 no-access
Table of attributes for various thresholds to be set on each Airespace AP Interface for Load performance profile , interference performance profile and Noise performance profile.
               bsnAPIfProfileThresholdConfigEntry 1.3.6.1.4.1.14179.2.2.12.1 no-access
An entry (conceptual row) in the Phy Thresholds Table. Entries in this MIB are indexed by bsnAPDot3MacAddress and bsnAPIfSlotId
                   bsnAPIfProfileParamAssignment 1.3.6.1.4.1.14179.2.2.12.1.1 integer read-write
If this value is automatic then Profile Parameters in bsnRrmDot11aAPProfile at the global level will be used. If this value is customized then Profile Parameters in bsnAPIfProfileThresholdConfig Table will be used and user can customize them per AP. Enumeration: 'automatic': 1, 'customized': 2.
                   bsnAPIfForeignInterferenceThreshold 1.3.6.1.4.1.14179.2.2.12.1.2 integer read-write
foreign interference threshold between 0 and 100 percent.
                   bsnAPIfForeignNoiseThreshold 1.3.6.1.4.1.14179.2.2.12.1.3 integer read-write
foreign noise threshold between -100 and -50 dBm.
                   bsnAPIfRFUtilizationThreshold 1.3.6.1.4.1.14179.2.2.12.1.4 integer read-write
RF utlization threshold between 0 and 100 percent.
                   bsnAPIfThroughputThreshold 1.3.6.1.4.1.14179.2.2.12.1.5 unsigned32 read-write
Airespace AP data-rate threshold between 1000 and 100000
                   bsnAPIfMobilesThreshold 1.3.6.1.4.1.14179.2.2.12.1.6 integer read-write
Airespace AP mobiles threshold between 1 and 75
                   bsnAPIfCoverageThreshold 1.3.6.1.4.1.14179.2.2.12.1.7 integer read-write
Airespace AP coverage threshold between 3 and 50
                   bsnAPIfMobileMinExceptionLevel 1.3.6.1.4.1.14179.2.2.12.1.8 integer read-write
Airespace AP mobile minimum exception level between 1 and 1000
                   bsnAPIfCoverageExceptionLevel 1.3.6.1.4.1.14179.2.2.12.1.28 integer read-write
Airespace AP coverage exception level between 0 and 100 percent.
         bsnAPIfLoadParametersTable 1.3.6.1.4.1.14179.2.2.13 no-access
These are RRM performance related read only parameters per Airespace AP
               bsnAPIfLoadParametersEntry 1.3.6.1.4.1.14179.2.2.13.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress and bsnAPIfSlotId
                   bsnAPIfLoadRxUtilization 1.3.6.1.4.1.14179.2.2.13.1.1 integer read-only
This is the percentage of time the Airespace AP receiver is busy operating on packets. It is a number from 0-100 representing a load from 0 to 1.
                   bsnAPIfLoadTxUtilization 1.3.6.1.4.1.14179.2.2.13.1.2 integer read-only
This is the percentage of time the Airespace AP transmitter is busy operating on packets. It is a number from 0-100 representing a load from 0 to 1.
                   bsnAPIfLoadChannelUtilization 1.3.6.1.4.1.14179.2.2.13.1.3 integer read-only
Channel Utilization
                   bsnAPIfLoadNumOfClients 1.3.6.1.4.1.14179.2.2.13.1.4 integer32 read-only
This is the number of clients attached to this Airespace AP at the last measurement interval(This comes from APF)
                   bsnAPIfPoorSNRClients 1.3.6.1.4.1.14179.2.2.13.1.24 integer32 read-only
This is the number of clients with poor SNR attached to this Airespace AP at the last measurement interval ( This comes from APF ).
         bsnAPIfChannelInterferenceInfoTable 1.3.6.1.4.1.14179.2.2.14 no-access
This is a table of channel information like interference and noise from other 802.11 networks on each channel.
               bsnAPIfChannelInterferenceInfoEntry 1.3.6.1.4.1.14179.2.2.14.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId
                   bsnAPIfInterferenceChannelNo 1.3.6.1.4.1.14179.2.2.14.1.1 integer32 read-only
Channel Number on AP
                   bsnAPIfInterferencePower 1.3.6.1.4.1.14179.2.2.14.1.2 integer32 read-only
Power of Interference from other 802.11 networks on this channel
                   bsnAPIfInterferenceUtilization 1.3.6.1.4.1.14179.2.2.14.1.22 integer read-only
Interference from other 802.11 networks on this channel
         bsnAPIfChannelNoiseInfoTable 1.3.6.1.4.1.14179.2.2.15 no-access
This is a table of channel information like interference and noise from other 802.11 networks on each channel.
               bsnAPIfChannelNoiseInfoEntry 1.3.6.1.4.1.14179.2.2.15.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId
                   bsnAPIfNoiseChannelNo 1.3.6.1.4.1.14179.2.2.15.1.1 integer32 read-only
Channel Number on AP
                   bsnAPIfDBNoisePower 1.3.6.1.4.1.14179.2.2.15.1.21 integer32 read-only
This is the average noise power in dBm on each channel that is available to Airespace AP
         bsnAPIfProfileStateTable 1.3.6.1.4.1.14179.2.2.16 no-access
This is a table of state of interference monitor on each Airespace AP
               bsnAPIfProfileStateEntry 1.3.6.1.4.1.14179.2.2.16.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId
                   bsnAPIfLoadProfileState 1.3.6.1.4.1.14179.2.2.16.1.1 profilestate read-only
This field represents the current state of the LOAD monitor. This is a total measurement of the business of this Airespace AP. PASS indicates that this Airespace AP is performing adequately compared to the Airespace AP profile. FAIL indicates the Airespace AP is not performing adequately against the LOAD profile.
                   bsnAPIfInterferenceProfileState 1.3.6.1.4.1.14179.2.2.16.1.2 profilestate read-only
This field represents the current state of Interference monitor. This is a total measurement of the interference present at this Airespace AP. PASS indicates that this Airespace AP is performing adequately compared to the Interference profile. FAIL indicates the Airespace AP is not performing adequately against the Interference profile.
                   bsnAPIfNoiseProfileState 1.3.6.1.4.1.14179.2.2.16.1.3 profilestate read-only
This field represents the current state of Noise monitor. This is a total measurement of the noise present at this Airespace AP. PASS indicates that this Airespace AP is performing adequately compared to the noise profile. FAIL indicates the Airespace AP is not performing adequately against the noise profile.
                   bsnAPIfCoverageProfileState 1.3.6.1.4.1.14179.2.2.16.1.24 profilestate read-only
This field represents the current state of coverage monitor. This is a total measurement of the client coverage at this Airespace AP. PASS indicates that this Airespace AP is performing adequately compared to the coverage profile. FAIL indicates the Airespace AP is not performing adequately against the coverage profile.
         bsnAPIfRxNeighborsTable 1.3.6.1.4.1.14179.2.2.17 no-access
This is a table of Rx Neighbors for each Airespace AP with their RSSI value.
               bsnAPIfRxNeighborsEntry 1.3.6.1.4.1.14179.2.2.17.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress bsnAPIfSlotId, bsnAPIfRxNeighborMacAddress
                   bsnAPIfRxNeighborMacAddress 1.3.6.1.4.1.14179.2.2.17.1.1 macaddress read-only
MAC Address of Rx Neighbor of the Airespace AP
                   bsnAPIfRxNeighborIpAddress 1.3.6.1.4.1.14179.2.2.17.1.2 ipaddress read-only
IP Address of Rx Neighbor of the Airespace AP
                   bsnAPIfRxNeighborRSSI 1.3.6.1.4.1.14179.2.2.17.1.3 integer32 read-only
RSSI value of the Rx Neighbor
                   bsnAPIfRxNeighborSlot 1.3.6.1.4.1.14179.2.2.17.1.24 integer32 read-only
Slot value of the Rx Neighbor
                   bsnAPIfRxNeighborChannel 1.3.6.1.4.1.14179.2.2.17.1.26 integer32 read-only
This object represents Channel information which neighboring Access point is using.
                   bsnAPIfRxNeighborChannelWidth 1.3.6.1.4.1.14179.2.2.17.1.27 integer read-only
This object represents Channel bandwidth information which neighboring Access point is using. Enumeration: 'twenty': 3, 'aboveforty': 4, 'five': 1, 'ten': 2, 'belowforty': 5.
         bsnAPIfStationRSSICoverageInfoTable 1.3.6.1.4.1.14179.2.2.18 no-access
This is a table of channel information like interference and noise from other 802.11 networks on each channel.
               bsnAPIfStationRSSICoverageInfoEntry 1.3.6.1.4.1.14179.2.2.18.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId
                   bsnAPIfStationRSSICoverageIndex 1.3.6.1.4.1.14179.2.2.18.1.1 integer32 read-only
RSSI Coverage Index on AP
                   bsnAPIfRSSILevel 1.3.6.1.4.1.14179.2.2.18.1.2 integer32 read-only
RSSI Level
                   bsnAPIfStationCountOnRSSI 1.3.6.1.4.1.14179.2.2.18.1.23 integer32 read-only
Number of stations on this RSSI Level
         bsnAPIfStationSNRCoverageInfoTable 1.3.6.1.4.1.14179.2.2.19 no-access
This is a table of Signal to Noise ratio Coverage information on an AP Interface.
               bsnAPIfStationSNRCoverageInfoEntry 1.3.6.1.4.1.14179.2.2.19.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId
                   bsnAPIfStationSNRCoverageIndex 1.3.6.1.4.1.14179.2.2.19.1.1 integer32 read-only
SNR Coverage Index on AP
                   bsnAPIfSNRLevel 1.3.6.1.4.1.14179.2.2.19.1.2 integer32 read-only
SNR Level
                   bsnAPIfStationCountOnSNR 1.3.6.1.4.1.14179.2.2.19.1.23 integer32 read-only
Number of stations on this SNR Level
         bsnAPIfRecommendedRFParametersTable 1.3.6.1.4.1.14179.2.2.20 no-access
This table list Best Channel,Best TxPowerLevel, Best RTSThreshold,Best FragmentationThreshold etc for this AP Interface as determined by RRM.
               bsnAPIfRecommendedRFParametersEntry 1.3.6.1.4.1.14179.2.2.20.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId
                   bsnAPIfRecommendedChannelNumber 1.3.6.1.4.1.14179.2.2.20.1.1 integer32 read-only
Recommended ChannelNumber by RRM for this APIf
                   bsnAPIfRecommendedTxPowerLevel 1.3.6.1.4.1.14179.2.2.20.1.2 integer32 read-only
Recommended TxPowerLevel by RRM for this APIf
                   bsnAPIfRecommendedRTSThreshold 1.3.6.1.4.1.14179.2.2.20.1.3 integer32 read-only
Recommended RTSThreshold by RRM for this APIf
                   bsnAPIfRecommendedFragmentationThreshold 1.3.6.1.4.1.14179.2.2.20.1.24 integer32 read-only
Recommended Fragmentation Threshold by RRM for this APIf
         bsnAPIfWlanOverrideTable 1.3.6.1.4.1.14179.2.2.21 no-access
Each entry represents an SSID added to the AP when the attribute bsnAPIfWlanOverride on the radio is enabled. This means only those WLANs on the switch that are added to this table will be available on such a radio.
               bsnAPIfWlanOverrideEntry 1.3.6.1.4.1.14179.2.2.21.1 no-access
An entry in bsnAPIfWlanOverrideTable
                   bsnAPIfWlanOverrideId 1.3.6.1.4.1.14179.2.2.21.1.1 unsigned32 read-only
Index of the WLAN (bsnDot11EssIndex) added to the radio. Airespace Switch supports 16 Airespace WLANs so index will be from 1 to 16.
                   bsnAPIfWlanOverrideSsid 1.3.6.1.4.1.14179.2.2.21.1.2 displaystring read-only
SSID assigned to the override WLAN.
                   bsnAPIfWlanOverrideRowStatus 1.3.6.1.4.1.14179.2.2.21.1.15 rowstatus read-only
A row status type for the bsnAPIfWlanOverrideEntry
         bsnMeshNodeTable 1.3.6.1.4.1.14179.2.2.22 no-access
This is a table of mesh nodes.
               bsnMeshNodeEntry 1.3.6.1.4.1.14179.2.2.22.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress
                   bsnMeshNodeRole 1.3.6.1.4.1.14179.2.2.22.1.1 integer read-only
the role of this AP Enumeration: 'pap': 0, 'rap': 1.
                   bsnMeshNodeGroup 1.3.6.1.4.1.14179.2.2.22.1.2 octet string read-only
the bridge group name of this AP
                   bsnMeshNodeBackhaul 1.3.6.1.4.1.14179.2.2.22.1.3 integer read-only
the backhaul radio device for this AP Enumeration: 'dot11g': 2, 'dot11b': 1, 'dot11a': 0.
                   bsnMeshNodeBackhaulPAP 1.3.6.1.4.1.14179.2.2.22.1.4 integer read-only
the backhaul Enumeration: 'dot11g': 3, 'auto': 0, 'dot11b': 2, 'dot11a': 1.
                   bsnMeshNodeBackhaulRAP 1.3.6.1.4.1.14179.2.2.22.1.5 integer read-write
the backhaul radio device for this AP Enumeration: 'dot11g': 2, 'dot11b': 1, 'dot11a': 0.
                   bsnMeshNodeDataRate 1.3.6.1.4.1.14179.2.2.22.1.6 integer32 read-write
this nodes backhaul data rate
                   bsnMeshNodeChannel 1.3.6.1.4.1.14179.2.2.22.1.7 integer32 read-only
this nodes backhaul channel
                   bsnMeshNodeRoutingState 1.3.6.1.4.1.14179.2.2.22.1.8 integer read-only
routing state Enumeration: 'start': 1, 'maint': 5, 'seek': 2, 'sync': 3, 'auth': 4.
                   bsnMeshNodeMalformedNeighPackets 1.3.6.1.4.1.14179.2.2.22.1.9 counter32 read-only
the number of malformed neighbor packets.
                   bsnMeshNodePoorNeighSnr 1.3.6.1.4.1.14179.2.2.22.1.10 counter32 read-only
poor neighbor snr
                   bsnMeshNodeBlacklistPackets 1.3.6.1.4.1.14179.2.2.22.1.11 counter32 read-only
the number of blacklist packets received
                   bsnMeshNodeInsufficientMemory 1.3.6.1.4.1.14179.2.2.22.1.12 counter32 read-only
occurences of insufficient memory conditions
                   bsnMeshNodeRxNeighReq 1.3.6.1.4.1.14179.2.2.22.1.13 counter32 read-only
Rx neighbor requests
                   bsnMeshNodeRxNeighRsp 1.3.6.1.4.1.14179.2.2.22.1.14 counter32 read-only
Rx neighbor responses
                   bsnMeshNodeTxNeighReq 1.3.6.1.4.1.14179.2.2.22.1.15 counter32 read-only
Tx neighbor requests
                   bsnMeshNodeTxNeighRsp 1.3.6.1.4.1.14179.2.2.22.1.16 counter32 read-only
Tx neighbor responses
                   bsnMeshNodeParentChanges 1.3.6.1.4.1.14179.2.2.22.1.17 counter32 read-only
number of parent changes
                   bsnMeshNodeNeighTimeout 1.3.6.1.4.1.14179.2.2.22.1.18 counter32 read-only
number of neighbor timeouts
                   bsnMeshNodeParentMacAddress 1.3.6.1.4.1.14179.2.2.22.1.19 macaddress read-only
parents mac addressed
                   bsnMeshNodeAPType 1.3.6.1.4.1.14179.2.2.22.1.20 integer read-only
the type of AP Enumeration: 'outdoorBridge': 6, 'indoorBridge': 5.
                   bsnMeshNodeEthernetBridge 1.3.6.1.4.1.14179.2.2.22.1.21 integer read-write
enable : Enables ethernet bridging on the AP. disable : Disables ethernet bridging on the AP. Changes are only applicable when AP is in 'Bridge' mode. Enumeration: 'enable': 1, 'disable': 0.
                   bsnMeshNodeHops 1.3.6.1.4.1.14179.2.2.22.1.30 integer32 read-only
number of hops to rap
         bsnMeshNeighsTable 1.3.6.1.4.1.14179.2.2.23 no-access
This is a table of mesh neighbors.
               bsnMeshNeighsEntry 1.3.6.1.4.1.14179.2.2.23.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress and bsnMeshNeighNeighMacAddress
                   bsnMeshNeighMacAddress 1.3.6.1.4.1.14179.2.2.23.1.1 macaddress read-only
MAC Address of neighbor
                   bsnMeshNeighType 1.3.6.1.4.1.14179.2.2.23.1.2 integer read-only
neighbor type Enumeration: 'tentparent': 1, 'neigh': 2, 'blacklisted': 3, 'parent': 0, 'child': 4.
                   bsnMeshNeighState 1.3.6.1.4.1.14179.2.2.23.1.3 integer read-only
neighbor state Enumeration: 'updated': 0, 'needupdate': 1.
                   bsnMeshNeighSnr 1.3.6.1.4.1.14179.2.2.23.1.4 integer32 read-only
explicitly set SNR
                   bsnMeshNeighSnrUp 1.3.6.1.4.1.14179.2.2.23.1.5 integer32 read-only
snr up
                   bsnMeshNeighSnrDown 1.3.6.1.4.1.14179.2.2.23.1.6 integer32 read-only
snr down
                   bsnMeshNeighLinkSnr 1.3.6.1.4.1.14179.2.2.23.1.7 integer32 read-only
link snr
                   bsnMeshNeighAdjustedEase 1.3.6.1.4.1.14179.2.2.23.1.8 integer32 read-only
hops adjusted ease
                   bsnMeshNeighUnadjustedEase 1.3.6.1.4.1.14179.2.2.23.1.9 integer32 read-only
ease to root AP from this AP
                   bsnMeshNeighRapEase 1.3.6.1.4.1.14179.2.2.23.1.10 integer32 read-only
unadjusted ease received in last hello
                   bsnMeshNeighTxParent 1.3.6.1.4.1.14179.2.2.23.1.11 counter32 read-only
tx packets to this node while a parent
                   bsnMeshNeighRxParent 1.3.6.1.4.1.14179.2.2.23.1.12 counter32 read-only
rx packets from this node while a parent
                   bsnMeshNeighPoorSnr 1.3.6.1.4.1.14179.2.2.23.1.13 counter32 read-only
packets with poor snr received from this node
                   bsnMeshNeighLastUpdate 1.3.6.1.4.1.14179.2.2.23.1.14 integer32 read-only
last received hello from this neighbor
                   bsnMeshNeighParentChange 1.3.6.1.4.1.14179.2.2.23.1.20 integer32 read-only
when this node last became parent
         bsnAPIfRadarChannelStatisticsTable 1.3.6.1.4.1.14179.2.2.24 no-access
This is a table of channel information on which radar signal were detected. This will give the list of channels and last heard timestamp. Radar signals are detected only on 5Ghz range. So this will be detected for 802.11a interface.
               bsnAPIfRadarChannelStatisticsEntry 1.3.6.1.4.1.14179.2.2.24.1 no-access
An entry (conceptual row) in the Table. Entries in this MIB are indexed by bsnAPDot3MacAddress, bsnAPIfSlotId, bsnAPIfRadarDetectedCannelNumber.
                   bsnAPIfRadarDetectedChannelNumber 1.3.6.1.4.1.14179.2.2.24.1.1 integer32 read-only
Channel Number on which radar signals were detected.
                   bsnAPIfRadarSignalLastHeard 1.3.6.1.4.1.14179.2.2.24.1.2 integer32 read-only
This tells how many seconds ago radar signal was heard on the channel.
     bsnGlobalDot11 1.3.6.1.4.1.14179.2.3
         bsnGlobalDot11Config 1.3.6.1.4.1.14179.2.3.1
             bsnGlobalDot11PrivacyOptionImplemented 1.3.6.1.4.1.14179.2.3.1.1 integer read-only
This attribute, when true, shall indicate that the IEEE 802.11 WEP option is implemented. The default value of this attribute shall be false. Enumeration: 'implemented': 1, 'notimplemented': 0.
             bsnGlobalDot11AuthenticationResponseTimeOut 1.3.6.1.4.1.14179.2.3.1.2 unsigned32 read-write
This attribute shall specify the number of TU that a responding STA should wait for the next frame in the authentication sequence.
             bsnGlobalDot11MultiDomainCapabilityImplemented 1.3.6.1.4.1.14179.2.3.1.3 integer read-only
This attribute, when TRUE, indicates that the station implementation is capable of supporting multiple regulatory domains. The capability is disabled, otherwise. The default value of this attribute is FALSE. Enumeration: 'yes': 1, 'no': 0.
             bsnGlobalDot11MultiDomainCapabilityEnabled 1.3.6.1.4.1.14179.2.3.1.4 integer read-only
This attribute, when TRUE, indicates that the capability of the station to operate in multiple regulatory domains is enabled. The capability is disabled, otherwise. The default value of this attribute is FALSE. Enumeration: 'yes': 1, 'no': 0.
             bsnGlobalDot11CountryIndex 1.3.6.1.4.1.14179.2.3.1.5 integer read-write
This attribute identifies the country in which the station is operating. Enumeration: 'usalegacy': 7, 'romania': 61, 'indonesia': 53, 'unitedkingdom': 22, 'portugal': 20, 'mexico': 5, 'india': 24, 'israelOutdoor': 47, 'malaysia': 39, 'austria': 10, 'hungary': 36, 'malta': 59, 'colombia': 64, 'greece': 15, 'turkey': 52, 'japan': 4, 'taiwan': 31, 'cyprus': 33, 'saudiArabia': 51, 'canada': 2, 'venezuela': 67, 'italy': 17, 'estonia': 35, 'usa': 1, 'koreaExtended': 55, 'hongkong': 25, 'panama': 65, 'lithuania': 37, 'liechtenstein': 58, 'luxembourg': 18, 'france': 3, 'southafrica': 44, 'gibraltar': 57, 'ireland': 16, 'argentina': 48, 'norway': 28, 'brazil': 49, 'israel': 46, 'australia': 9, 'per': 66, 'singapore': 29, 'iceland': 27, 'slovakrepublic': 43, 'russianfederation': 62, 'czechrepublic': 34, 'slovenia': 42, 'netherlands': 19, 'germany': 14, 'chile': 63, 'belgium': 11, 'thailand': 30, 'spain': 6, 'japan2': 56, 'none': 23, 'korearepublic': 8, 'denmark': 12, 'poland': 41, 'finland': 13, 'newzealand': 40, 'sweden': 21, 'latvia': 38, 'monaco': 60, 'switzerland': 26, 'china': 54, 'philippines': 68, 'usachan165': 45.
             bsnGlobalDot11LoadBalancing 1.3.6.1.4.1.14179.2.3.1.6 integer read-write
This attribute specifies if load balancing of clients is enabled on disabled. Global configuration of Load Balancing is now removed. Use cLWlanLoadBalancingEnable to configure it per WLAN. Enumeration: 'enable': 1, 'disable': 0.
             bsnGlobalDot11RogueTimer 1.3.6.1.4.1.14179.2.3.1.7 integer32 read-write
This attribute specifies in seconds, the time interval after which a Rogue Entry in Rogue Table will expire if no beacon is heard from a Rogue.
             bsnPrimaryMwarForAPs 1.3.6.1.4.1.14179.2.3.1.8 integer read-write
This attribute specifies if this Switch acts a Master Switch for the Airespace APs. So if an Airespace AP doesn't find its Primary Switch, it will associate with this Switch. Enumeration: 'enable': 1, 'disable': 0.
             bsnRtpProtocolPriority 1.3.6.1.4.1.14179.2.3.1.9 integer read-write
Real Time Protocol Priority. Enumeration: 'highpriority': 1, 'nopriority': 0.
             bsnSystemCurrentTime 1.3.6.1.4.1.14179.2.3.1.10 displaystring read-only
This attribute will display the Current System time on the Switch.
             bsnUpdateSystemTime 1.3.6.1.4.1.14179.2.3.1.11 displaystring read-write
Use this attribute to change the System time on the Switch. Specify the new time in this Format MM/DD/YYYY HH:MM:SS
             bsnOperatingTemperatureEnvironment 1.3.6.1.4.1.14179.2.3.1.12 integer read-only
Operating Environment of the Airespace Switch. commercial is Commercial (0 to 40 C) and industrial is Industrial (-10 to 70 C) Enumeration: 'unknown': 0, 'industrial': 2, 'commercial': 1.
             bsnSensorTemperature 1.3.6.1.4.1.14179.2.3.1.13 integer32 read-only
Current Internal Temperature of the unit in Centigrade
             bsnTemperatureAlarmLowLimit 1.3.6.1.4.1.14179.2.3.1.14 integer32 read-only
Internal Temperature Alarm Low Limit in Centigrade. If the bsnSensorTemperature goes below this limit bsnSensedTemperatureTooLow Alarm will be sent out
             bsnTemperatureAlarmHighLimit 1.3.6.1.4.1.14179.2.3.1.15 integer32 read-only
Internal Temperature Alarm High Limit in Centigrade. If the bsnSensorTemperature goes above this limit bsnSensedTemperatureTooHigh Alarm will be sent out
             bsnVirtualGatewayAddress 1.3.6.1.4.1.14179.2.3.1.16 ipaddress read-write
Virtual Gateway Address of the Switch. This is used by web auth and Ipsec. If the virtual IP Address is changed, the Switch has to be rebooted for the new Address to take effect. This is now replaced by the Virtual Interface in bsnswitching MIB.
             bsnRFMobilityDomainName 1.3.6.1.4.1.14179.2.3.1.17 octet string read-write
RF Mobility Group Name to which this Airespace Switch belongs. Airespace Switches on a network form a RF Group as well as a Mobility Group. RF Groups does the channel and power management of AP while Mobility Group does load balancing and hand off for clients.
             bsnClientWatchListFeature 1.3.6.1.4.1.14179.2.3.1.18 integer read-write
This flag should be turned on for the client watch lists to be enabled on the switch. When enabled, the switch generates Client Association and Authentication traps for the watchlisted clients. Enumeration: 'enable': 1, 'disable': 0.
             bsnRogueLocationDiscoveryProtocol 1.3.6.1.4.1.14179.2.3.1.19 integer read-write
This flag should be turned on to enable the Rogue Location Discovery Protocol feature on the switch. We can either enable this feature for all the APs or only for APs in monitor mode. Enumeration: 'disable': 0, 'monitorAPOnly': 2, 'allAPs': 1.
             bsnRogueAutoContainFeature 1.3.6.1.4.1.14179.2.3.1.20 integer read-write
This flag should be turned on to allow the switch to contain the rogues automatically if detected on the wired network. Enumeration: 'enable': 1, 'disable': 0.
             bsnOverAirProvisionApMode 1.3.6.1.4.1.14179.2.3.1.21 integer read-write
Over the Air Provisioning Mode for APs Enumeration: 'enable': 1, 'disable': 0.
             bsnMaximumNumberOfConcurrentLogins 1.3.6.1.4.1.14179.2.3.1.22 integer32 read-write
This attribute specifies the maximum number of concurrent logins that the switch will allow for a single user. A value 0 implies that there is no restriction on the number of concurrent logins with a single username.
             bsnAutoContainRoguesAdvertisingSsid 1.3.6.1.4.1.14179.2.3.1.23 integer read-write
This flag should be set to 1 to allow the switch to contain automatically those rogues that are advertising our SSID. If value is 0, only an alarm will be generated when such a rogue is detected. Enumeration: 'alarmOnly': 0, 'contain': 1.
             bsnAutoContainAdhocNetworks 1.3.6.1.4.1.14179.2.3.1.24 integer read-write
This flag should be set to 1 to allow the switch to contain automatically the adhoc networks detected by the switch. If value is 0, only an alarm will be generated when such a network is detected. Enumeration: 'alarmOnly': 0, 'contain': 1.
             bsnAutoContainTrustedClientsOnRogueAps 1.3.6.1.4.1.14179.2.3.1.25 integer read-write
This flag should be set to 1 to allow the switch to contain automatically those trusted clients that are associated to rogue APs. If value is 0, only an alarm will be generated when such a client is detected. Enumeration: 'alarmOnly': 0, 'contain': 1.
             bsnValidateRogueClientsAgainstAAA 1.3.6.1.4.1.14179.2.3.1.26 integer read-write
This flag should be turned on to allow the switch to validate 'valid' mobiles associating with rogue APs. For example, if a client's MAC Address is found in the local MAC filter table, that client can be validated. Enumeration: 'enable': 1, 'disable': 0.
             bsnSystemTimezoneDelta 1.3.6.1.4.1.14179.2.3.1.27 integer32 read-write
The delta (difference) between the local time and the Universal Coordinated Time in hours. For example, it is -8 for the PST and +1 for France. If the delta is -5.30 then this attribute will store -5 and bsnSystemTimezoneDeltaMinutes will store 30. This value i should be between -23 to +23
             bsnSystemTimezoneDaylightSavings 1.3.6.1.4.1.14179.2.3.1.28 integer read-write
This flag specifies if daylight savings are enabled for the current timezone. Enumeration: 'enable': 1, 'disable': 0.
             bsnAllowAuthorizeApAgainstAAA 1.3.6.1.4.1.14179.2.3.1.29 integer read-write
This flag specifies if LWAPP is allowed to get authorization via RADIUS or local database for an AP. Enumeration: 'enable': 1, 'disable': 0.
             bsnSystemTimezoneDeltaMinutes 1.3.6.1.4.1.14179.2.3.1.30 integer32 read-write
The minutes component of delta (difference) between the local time and the Universal Coordinated Time.
             bsnApFallbackEnabled 1.3.6.1.4.1.14179.2.3.1.31 integer read-write
This flag specifies if the APs should continue LWAPP discoveries to fallback to the primary switch in case they are not already associated with it i.e they are associated with their respective secondary or tertiary switch instead. Enumeration: 'enable': 1, 'disable': 0.
             bsnAppleTalkEnabled 1.3.6.1.4.1.14179.2.3.1.32 integer read-write
This flag turns on the appletalk bridging in the switch such that the packets from Apple clients that use appletalk format can be processed by the switch. When this flag is off, these packets are dropped. Enumeration: 'enable': 1, 'disable': 0.
             bsnTrustedApPolicyConfig 1.3.6.1.4.1.14179.2.3.1.40
                   bsnPolicyForMisconfiguredAps 1.3.6.1.4.1.14179.2.3.1.40.1 integer read-write
This flag should be turned on to allow the switch to contain misconfigured APs. Enumeration: 'alarmOnly': 0, 'contain': 1.
                   bsnEncryptionPolicyEnforced 1.3.6.1.4.1.14179.2.3.1.40.2 integer read-write
The encryption policy that is enforced on the trusted APs. Enumeration: 'none': 0, 'wep': 2, 'open': 1, 'wpa': 3.
                   bsnPreamblePolicyEnforced 1.3.6.1.4.1.14179.2.3.1.40.3 integer read-write
The preamble policy that is enforced on the trusted APs. Enumeration: 'none': 0, 'short': 1, 'long': 2.
                   bsnDot11ModePolicyEnforced 1.3.6.1.4.1.14179.2.3.1.40.4 integer read-write
The 802.11 Mode policy that is enforced on the trusted APs. Enumeration: 'none': 0, 'pcfOnly': 2, 'dcfOnly': 1.
                   bsnRadioTypePolicyEnforced 1.3.6.1.4.1.14179.2.3.1.40.5 integer read-write
The radio type policy that is enforced on the trusted APs. Enumeration: 'bgOnly': 3, 'none': 0, 'aOnly': 1, 'bOnly': 2.
                   bsnValidateSsidForTrustedAp 1.3.6.1.4.1.14179.2.3.1.40.6 integer read-write
If enabled, the SSID of trusted APs will be validated by the switch. Enumeration: 'enable': 1, 'disable': 0.
                   bsnAlertIfTrustedApMissing 1.3.6.1.4.1.14179.2.3.1.40.7 integer read-write
If enabled, an alert will be generated when a trusted AP is missing. Enumeration: 'enable': 1, 'disable': 0.
                   bsnTrustedApEntryExpirationTimeout 1.3.6.1.4.1.14179.2.3.1.40.8 integer32 read-write
This attribute specifies in seconds, the time interval after which a Trusted AP Entry will expire if no beacon is heard from that AP.
             bsnClientExclusionPolicyConfig 1.3.6.1.4.1.14179.2.3.1.41
                   bsnExcessive80211AssocFailures 1.3.6.1.4.1.14179.2.3.1.41.1 integer read-write
This flag specifies if client should be excluded (blacklisted) if repeated 802.11 Association Failures occurs with a client. Enumeration: 'enable': 1, 'disable': 0.
                   bsnExcessive80211AuthFailures 1.3.6.1.4.1.14179.2.3.1.41.2 integer read-write
This flag specifies if client should be excluded (blacklisted) if repeated 802.11 Authentication Failures occurs with a client. Enumeration: 'enable': 1, 'disable': 0.
                   bsnExcessive8021xAuthFailures 1.3.6.1.4.1.14179.2.3.1.41.3 integer read-write
This flag specifies if client should be excluded (blacklisted) if repeated 802.1x Authentication Failures occurs with a client. Enumeration: 'enable': 1, 'disable': 0.
                   bsnExternalPolicyServerFailures 1.3.6.1.4.1.14179.2.3.1.41.4 integer read-write
This flag specifies if client should be excluded (blacklisted) if repeated external policy server failures occurs with a client. Enumeration: 'enable': 1, 'disable': 0.
                   bsnExcessiveWebAuthFailures 1.3.6.1.4.1.14179.2.3.1.41.5 integer read-write
This flag specifies if client should be excluded (blacklisted) if repeated Web Authentication Failures occurs with a client. Enumeration: 'enable': 1, 'disable': 0.
                   bsnIPTheftORReuse 1.3.6.1.4.1.14179.2.3.1.41.6 integer read-write
This flag specifies if client should be excluded (blacklisted) if it appears to be reusing an IP Address.(Possible IP Theft) Enumeration: 'enable': 1, 'disable': 0.
             bsnSignatureConfig 1.3.6.1.4.1.14179.2.3.1.42
                   bsnStandardSignatureTable 1.3.6.1.4.1.14179.2.3.1.42.1 no-access
The table listing Standard Signatures configured on the switch. The standard signatures are provided with the released product. The standard signatures can be updated via file download to the switch. The table is indexed by the precedence of the signatures.
                       bsnStandardSignatureEntry 1.3.6.1.4.1.14179.2.3.1.42.1.1 no-access
....
                           bsnStandardSignaturePrecedence 1.3.6.1.4.1.14179.2.3.1.42.1.1.1 unsigned32 read-only
Precedence of the signature. This specifies the order in which the signature is applied to a packet.
                           bsnStandardSignatureName 1.3.6.1.4.1.14179.2.3.1.42.1.1.2 displaystring read-only
This attribute is used to configure the name on a signature.
                           bsnStandardSignatureDescription 1.3.6.1.4.1.14179.2.3.1.42.1.1.3 displaystring read-only
This attribute is used to configure the description of a signature.
                           bsnStandardSignatureFrameType 1.3.6.1.4.1.14179.2.3.1.42.1.1.4 integer read-only
This attribute specifies the type of frame that needs to match a signature. Enumeration: 'management': 0, 'data': 1.
                           bsnStandardSignatureAction 1.3.6.1.4.1.14179.2.3.1.42.1.1.5 integer read-only
This attribute specifies the action to be taken once a packet is found to match a signature. Enumeration: 'report': 1, 'exclude': 3, 'none': 0, 'contain': 2.
                           bsnStandardSignatureState 1.3.6.1.4.1.14179.2.3.1.42.1.1.6 integer read-only
This attribute specifies the state of a signature. It is used to match packets only if the state is enabled. Enumeration: 'disabled': 0, 'enabled': 1.
                           bsnStandardSignatureFrequency 1.3.6.1.4.1.14179.2.3.1.42.1.1.7 unsigned32 read-write
This specifies the frequency of the matching packets after which the specified action is taken.
                           bsnStandardSignatureQuietTime 1.3.6.1.4.1.14179.2.3.1.42.1.1.8 unsigned32 read-write
This specifies the quiet time in seconds during which no matching packets are found after which the attack is considered stopped.
                           bsnStandardSignatureVersion 1.3.6.1.4.1.14179.2.3.1.42.1.1.9 unsigned32 read-only
This specifies the signature version.
                           bsnStandardSignatureConfigType 1.3.6.1.4.1.14179.2.3.1.42.1.1.10 integer read-only
This attribute specifies the type of Signature configuration. It's protocol when the protocol format is used in the UI to configure this. Pattern is the config type for all signatures in the released signature file and when signatures are configured using pattern format. Note: the signatures will be allowed to be i configured in later releases. Enumeration: 'pattern': 0, 'protocol': 1.
                           bsnStandardSignatureEnable 1.3.6.1.4.1.14179.2.3.1.42.1.1.11 truthvalue read-write
This object configures the status of a particular standard signature on LWAPP APs, for use in performing signature analysis on the received 802.11 data and/or management frames. A value of 'true' makes the Controller send the 'Signature Add LWAPP Message' to all the joined APs with the status field set to 'enable'. This makes the joined APs perform signature analysis on the received 802.11 data and/or management frames and report the discrepancies observed, if any, to the Controller. A value of 'false' makes the Controller send the 'Signature Add LWAPP Message' to all the joined APs with the status field set to 'disable'. The joined APs doesn't perform the signature analysis on the received 802.11 data and/or management frames for this particular signature, till the signature is enabled.
                           bsnStandardSignatureMacInfo 1.3.6.1.4.1.14179.2.3.1.42.1.1.12 bsntxtsignaturemacinfo read-only
This object defines the pattern followed by the LWAPP APs to perform signature analysis with this Standard signature and report the results to the Controller.
                           bsnStandardSignatureMacFreq 1.3.6.1.4.1.14179.2.3.1.42.1.1.13 unsigned32 read-write
This object specifies the frequency of matching packets from a particular source after which the specified action is taken.
                           bsnStandardSignatureRowStatus 1.3.6.1.4.1.14179.2.3.1.42.1.1.20 rowstatus read-only
Row Status for creation/deletion. Signature will allowed to be created, deleted and edited in later releases.
                           bsnStandardSignatureInterval 1.3.6.1.4.1.14179.2.3.1.42.1.1.21 unsigned32 read-write
Interval of the signature. This specifies the interval when the signature is applied to a packet.
                   bsnStandardSignaturePatternTable 1.3.6.1.4.1.14179.2.3.1.42.2 no-access
The table listing the matching patterns specified for a i Standard Signature. These are instrumental in matching the signature with a packet. A maximum of 5 i patterns may be specifed for a signature. These are used for matching in the order of their index.
                       bsnStandardSignaturePatternEntry 1.3.6.1.4.1.14179.2.3.1.42.2.1 no-access
....
                           bsnStandardSignaturePatternIndex 1.3.6.1.4.1.14179.2.3.1.42.2.1.1 unsigned32 read-only
Index of the pattern. This specifies the order in which the pattern is checked against the packet contents.
                           bsnStandardSignaturePatternOffset 1.3.6.1.4.1.14179.2.3.1.42.2.1.2 unsigned32 read-only
Offset from the start of the packet where the AP looks for a match to the pattern.
                           bsnStandardSignaturePatternString 1.3.6.1.4.1.14179.2.3.1.42.2.1.3 displaystring read-only
This is the pattern string that the AP uses to match at the offset. Example: 0x616c7068615f3178
                           bsnStandardSignaturePatternMask 1.3.6.1.4.1.14179.2.3.1.42.2.1.4 displaystring read-only
This is the pattern mask. This is the bit mask that the AP uses to mask out the bits in the packet at the given offset. Example: 0xffffffffffffffff
                           bsnStandardSignaturePatternOffSetStart 1.3.6.1.4.1.14179.2.3.1.42.2.1.5 bsnsignaturepatternoffsetstart read-only
This object indicates how an offset should be applied while doing signature analysis for QOS and non-QOS data frames with this standard signature.
                           bsnStandardSignaturePatternRowStatus 1.3.6.1.4.1.14179.2.3.1.42.2.1.15 rowstatus read-only
Row Status for creation/deletion. Signature Pattern will allowed to be created, deleted and edited in later releases.
                   bsnCustomSignatureTable 1.3.6.1.4.1.14179.2.3.1.42.3 no-access
The table listing Standard Signatures configured on the switch. The standard signatures are provided with the released product. The standard signatures can be updated via file download to the switch. The table is indexed by the precedence of the signatures.
                       bsnCustomSignatureEntry 1.3.6.1.4.1.14179.2.3.1.42.3.1 no-access
....
                           bsnCustomSignaturePrecedence 1.3.6.1.4.1.14179.2.3.1.42.3.1.1 unsigned32 read-only
Precedence of the signature. This specifies the order in which the signature is applied to a packet.
                           bsnCustomSignatureName 1.3.6.1.4.1.14179.2.3.1.42.3.1.2 displaystring read-only
This attribute is used to configure the name on a signature.
                           bsnCustomSignatureDescription 1.3.6.1.4.1.14179.2.3.1.42.3.1.3 displaystring read-only
This attribute is used to configure the description of a signature.
                           bsnCustomSignatureFrameType 1.3.6.1.4.1.14179.2.3.1.42.3.1.4 integer read-only
This attribute specifies the type of frame that needs to match a signature. Enumeration: 'management': 0, 'data': 1.
                           bsnCustomSignatureAction 1.3.6.1.4.1.14179.2.3.1.42.3.1.5 integer read-only
This attribute specifies the action to be taken once a packet is found to match a signature. Enumeration: 'report': 1, 'exclude': 3, 'none': 0, 'contain': 2.
                           bsnCustomSignatureState 1.3.6.1.4.1.14179.2.3.1.42.3.1.6 integer read-only
This attribute specifies the state of a signature. It is used to match packets only if the state is enabled. Enumeration: 'disabled': 0, 'enabled': 1.
                           bsnCustomSignatureFrequency 1.3.6.1.4.1.14179.2.3.1.42.3.1.7 unsigned32 read-write
This specifies the frequency of the matching packets after which the specified action is taken.
                           bsnCustomSignatureQuietTime 1.3.6.1.4.1.14179.2.3.1.42.3.1.8 unsigned32 read-write
This specifies the quiet time in seconds during which no matching packets are found after which the attack is considered stopped.
                           bsnCustomSignatureVersion 1.3.6.1.4.1.14179.2.3.1.42.3.1.9 unsigned32 read-only
This specifies the signature version.
                           bsnCustomSignatureConfigType 1.3.6.1.4.1.14179.2.3.1.42.3.1.10 integer read-only
This attribute specifies the type of Signature configuration. It's protocol when the protocol format is used in the UI to configure this. Pattern is the config type for all signatures in the released signature file and when signatures are configured using pattern format. Note: the signatures will be allowed to be configured in later releases. Enumeration: 'pattern': 0, 'protocol': 1.
                           bsnCustomSignatureEnable 1.3.6.1.4.1.14179.2.3.1.42.3.1.11 truthvalue read-write
This object configures the status of a particular Custom signature on LWAPP APs, for use in performing signature analysis on the received 802.11 data and/or management frames. A value of 'true' makes the Controller send the 'Signature Add LWAPP Message' to all the joined APs with the status field set to 'enable'. This makes the joined APs perform signature analysis on the received 802.11 data and/or management frames and report the discrepancies observed, if any, to the Controller. A value of 'false' makes the Controller send the 'Signature Add LWAPP Message' to all the joined APs with the status field set to 'disable'. The joined APs doesn't perform the signature analysis on the received 802.11 data and/or management frames for this particular signature, till the signature is enabled.
                           bsnCustomSignatureMacInfo 1.3.6.1.4.1.14179.2.3.1.42.3.1.12 bsntxtsignaturemacinfo read-only
This object defines the pattern followed by the LWAPP APs to perform signature analysis with this Custom signature and report the results to the Controller.
                           bsnCustomSignatureMacFreq 1.3.6.1.4.1.14179.2.3.1.42.3.1.13 unsigned32 read-write
This object specifies the frequency of matching packets from a particular source after which the specified action is taken.
                           bsnCustomSignatureRowStatus 1.3.6.1.4.1.14179.2.3.1.42.3.1.20 rowstatus read-only
Row Status for creation/deletion. Signature will allowed to be created, deleted and edited in later releases.
                           bsnCustomSignatureInterval 1.3.6.1.4.1.14179.2.3.1.42.3.1.21 unsigned32 read-write
Interval of the signature. This specifies the interval when the signature is applied to a packet.
                   bsnCustomSignaturePatternTable 1.3.6.1.4.1.14179.2.3.1.42.4 no-access
The table listing the matching patterns specified for a Standard Signature. These are instrumental in matching the signature with a packet. A maximum of 5 patterns may be specifed for a signature. These are used for matching in the order of their index.
                       bsnCustomSignaturePatternEntry 1.3.6.1.4.1.14179.2.3.1.42.4.1 no-access
....
                           bsnCustomSignaturePatternIndex 1.3.6.1.4.1.14179.2.3.1.42.4.1.1 unsigned32 read-only
Index of the pattern. This specifies the order in which the pattern is checked against the packet contents.
                           bsnCustomSignaturePatternOffset 1.3.6.1.4.1.14179.2.3.1.42.4.1.2 unsigned32 read-only
Offset from the start of the packet where the AP looks for a match to the pattern.
                           bsnCustomSignaturePatternString 1.3.6.1.4.1.14179.2.3.1.42.4.1.3 displaystring read-only
This is the pattern string that the AP uses to match at the offset. Example: 0x616c7068615f3178
                           bsnCustomSignaturePatternMask 1.3.6.1.4.1.14179.2.3.1.42.4.1.4 displaystring read-only
This is the pattern mask. This is the bit mask that the AP uses to mask out the bits in the packet at the given offset. Example: 0xffffffffffffffff
                           bsnCustomSignaturePatternOffSetStart 1.3.6.1.4.1.14179.2.3.1.42.4.1.5 bsnsignaturepatternoffsetstart read-only
This object indicates how an offset should be applied while doing signature analysis for QOS and non-QOS data frames with this custom signature.
                           bsnCustomSignaturePatternRowStatus 1.3.6.1.4.1.14179.2.3.1.42.4.1.15 rowstatus read-only
Row Status for creation/deletion. Signature Pattern will allowed to be created, deleted and edited in later releases.
                   bsnSignatureCheckState 1.3.6.1.4.1.14179.2.3.1.42.5 integer read-write
This flag should be enabled to enforce check of all standard and custom signatures. If disabled, there will be no check for signatures, both custom and standard, by the switch. Enumeration: 'enable': 1, 'disable': 0.
             bsnRfIdTagConfig 1.3.6.1.4.1.14179.2.3.1.43
                   bsnRfIdTagStatus 1.3.6.1.4.1.14179.2.3.1.43.1 integer read-write
This flag should be turned on to allow the switch to collect data for tags. Enumeration: 'enable': 1, 'disable': 0.
                   bsnRfIdTagDataTimeout 1.3.6.1.4.1.14179.2.3.1.43.2 unsigned32 read-write
This is the number of seconds after which the tag data is deleted by the switch from its database if it didn't hear from the tag again.
                   bsnRfIdTagAutoTimeoutStatus 1.3.6.1.4.1.14179.2.3.1.43.3 integer read-write
This flag should be turned on to allow auto deletion of tag data in the switch after expiration of Tag Data Timeout Enumeration: 'enable': 1, 'disable': 0.
             bsnAPNeighborAuthConfig 1.3.6.1.4.1.14179.2.3.1.44
                   bsnAPNeighborAuthStatus 1.3.6.1.4.1.14179.2.3.1.44.1 integer read-write
This flag should be turned on to allow the AP-Neighbor Authentication feature. Enumeration: 'enable': 1, 'disable': 0.
                   bsnAPNeighborAuthAlarmThreshold 1.3.6.1.4.1.14179.2.3.1.44.2 integer read-write
Authentication alarm trigger threshold.
             bsnRFNetworkName 1.3.6.1.4.1.14179.2.3.1.45 octet string read-write
RF Network Group Name to which this Airespace Switch belongs. Airespace Switches on a network form a RF Network Group as well as a Mobility Group. RF Network Groups does the channel and power management of AP while Mobility Group does load balancing and hand off for clients.
             bsnFastSSIDChangeFeature 1.3.6.1.4.1.14179.2.3.1.46 integer read-write
Configures Fast SSID changing feature for mobile-stations. When enabled, permits mobile-stations to change SSIDs without having to block and wait for SSID-cleanup on the switch to occur. Enumeration: 'enable': 1, 'disable': 0.
             bsnBridgingPolicyConfig 1.3.6.1.4.1.14179.2.3.1.47
                   bsnBridgingZeroTouchConfig 1.3.6.1.4.1.14179.2.3.1.47.1 integer read-write
If enabled, allows new bridging APs to negotiate with the switch to acquire the shared secret key. Enumeration: 'enable': 1, 'disable': 0.
                   bsnBridgingSharedSecretKey 1.3.6.1.4.1.14179.2.3.1.47.2 octet string read-write
Key that is used to negotiate a secure LWAPP connection between a switch and a bridging or mesh AP.
             bsnAcceptSelfSignedCertificate 1.3.6.1.4.1.14179.2.3.1.48 integer read-write
This flag specifies if controller will accept Self Signed Certificate from AP as part of authorization. Enumeration: 'enable': 1, 'disable': 0.
             bsnSystemClockTime 1.3.6.1.4.1.14179.2.3.1.49 unsigned32 read-only
This object represents the current clock time of the controller and expressed as the number of seconds elapsed since 00:00:00 on January 1, 1970, Coordinated Universal Time (UTC).
         bsnGlobalDot11b 1.3.6.1.4.1.14179.2.3.2
             bsnGlobalDot11bConfig 1.3.6.1.4.1.14179.2.3.2.1
                 bsnGlobalDot11bNetworkStatus 1.3.6.1.4.1.14179.2.3.2.1.1 integer read-write
802.11b Network Admin Status. Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11bBeaconPeriod 1.3.6.1.4.1.14179.2.3.2.1.2 integer read-write
This attribute shall specify the number of TU that a AP Radio shall use for scheduling Beacon tranmissions. This value is transmitted in Beacon and Probe Response frames.
                 bsnGlobalDot11bDynamicChannelAssignment 1.3.6.1.4.1.14179.2.3.2.1.3 integer read-write
Dynamic channel assignment(DCA) has three modes. When the mode is auto, the channel assignment will be periodically updated for all Airespace APs that permit this operation. When the DCA is runOnce, channel assignments are updated based on the UPDATE_CMD received from the management. When the DCA is static, no dynamic channel assignments occurs and value are set to their global default. Default is auto. Enumeration: 'static': 3, 'runOnce': 2, 'automatic': 1.
                 bsnGlobalDot11bCurrentChannel 1.3.6.1.4.1.14179.2.3.2.1.4 integer read-write
The current operating frequency channel of the DSSS PHY. Valid channel numbers are as defined in 15.4.6.2. This attribute will be read-only if bsnAPIfPhyChannelAutomaticOn is true.
                 bsnGlobalDot11bDynamicChannelUpdateInterval 1.3.6.1.4.1.14179.2.3.2.1.5 unsigned32 read-only
When Channel dynamic alogirthm is running, this interval (in secs) specifies how often Channel assignement updates are attempted on an Airespace AP. NOTE: hysteresis is built into the algorithms so we will not have uproductive changes occuring. Default value is 600 secs
                 bsnGlobalDot11bInputsForDCA 1.3.6.1.4.1.14179.2.3.2.1.6 unsigned32 read-write
This attribute is a bit mask specifying what to include in DCA optimization.Below is a list of parameters and their corresponding bits identifiers. options bit -------------------------------------- none 0 SIGNAL STRENGTH 1 NOISE 2 FOREIGN INTERFERENCE 4 LOAD 8 DEVICE INTERFERENCE 32 Default value is 63( all bits on).
                 bsnGlobalDot11bChannelUpdateCmdInvoke 1.3.6.1.4.1.14179.2.3.2.1.7 integer read-write
When set to activate this starts a DCA calculation regardless of the dynamic update interval. This command should be invoke on Group Leader Airespace Switch.Invoking on a Airespace Switch which is not a Group leader has no effect. Enumeration: 'default': 0, 'activate': 1.
                 bsnGlobalDot11bChannelUpdateCmdStatus 1.3.6.1.4.1.14179.2.3.2.1.8 integer32 read-only
After setting bsnGlobalDot11bChannelUpdateCmdInvoke to activate, the result of action can be monitored from here. It takes 5 minutes for the command to complete.
                 bsnGlobalDot11bDynamicTransmitPowerControl 1.3.6.1.4.1.14179.2.3.2.1.9 integer read-write
Dynamic transmit power (DTP) has three modes. When the mode is auto, the transmit power of each Airespace AP will be periodically updated for all Airespace APs that permit this operation. When the DTP is runOnce,transmit power update will occur based on the UPDATE_CMD received from the management. When the DTP is static, no dynamic transmit power updates occur and their global defaults are used. Default is auto. Enumeration: 'static': 3, 'runOnce': 2, 'automatic': 1.
                 bsnGlobalDot11bDynamicTxPowerControlInterval 1.3.6.1.4.1.14179.2.3.2.1.10 unsigned32 read-only
When Tx PowerControl dynamic alogirthm is running, this interval(in secs) specifies how often TxPower control updates are attempted on an Airespace AP. NOTE: hysteresis is build into the algorithms so we will not have uproductive changes occuring. Default value is 600 secs
                 bsnGlobalDot11bCurrentTxPowerLevel 1.3.6.1.4.1.14179.2.3.2.1.11 integer read-write
The TxPowerLevel N currently being used to transmit data. Some PHYs also use this value to determine the receiver sensitivity requirements for CCA.
                 bsnGlobalDot11bInputsForDTP 1.3.6.1.4.1.14179.2.3.2.1.12 unsigned32 read-write
This attribute is a bit mask specifying what to include in DCA optimization.Below is a list of parameters and their corresponding bits identifiers. options bit -------------------------------------- none 0 LOAD 1 SIGNAL STRENGTH 2 FOREIGN INTERFERENCE 4 NOISE 8 Default value is 15( all bits on).
                 bsnGlobalDot11bPowerUpdateCmdInvoke 1.3.6.1.4.1.14179.2.3.2.1.13 integer read-write
When set to activate this starts a DTP calculation regardless of the dynamic update interval. This command should be invoke on Group Leader Airespace Switch.Invoking on a Airespace Switch which is not a Group leader has no effect. Enumeration: 'default': 0, 'activate': 1.
                 bsnGlobalDot11bPowerUpdateCmdStatus 1.3.6.1.4.1.14179.2.3.2.1.14 integer32 read-only
After setting bsnGlobalDot11aChannelUpdateCmdInvoke to activate, the result of action can be monitored from here. It takes 5 minutes for the command to complete.
                 bsnGlobalDot11bDataRate1Mhz 1.3.6.1.4.1.14179.2.3.2.1.15 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate2Mhz 1.3.6.1.4.1.14179.2.3.2.1.16 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate5AndHalfMhz 1.3.6.1.4.1.14179.2.3.2.1.17 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate11Mhz 1.3.6.1.4.1.14179.2.3.2.1.18 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bShortPreamble 1.3.6.1.4.1.14179.2.3.2.1.19 integer read-write
802.11b Short Preamble. Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11bDot11gSupport 1.3.6.1.4.1.14179.2.3.2.1.20 integer read-write
This attribute is enabled to also support 802.11g protocol on the 802.11b network. Enabling 802.11g allows additional data rates: 6, 9, 12, 18, 24, 36, 48, 54 Mbps. Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11bDataRate6Mhz 1.3.6.1.4.1.14179.2.3.2.1.21 integer read-write
Specify if this rate is supported or mandatory or disabled. This is configurable only if 802.11g support is enabled. Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate9Mhz 1.3.6.1.4.1.14179.2.3.2.1.22 integer read-write
Specify if this rate is supported or mandatory or disabled. This is configurable only if 802.11g support is enabled. Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate12Mhz 1.3.6.1.4.1.14179.2.3.2.1.23 integer read-write
Specify if this rate is supported or mandatory or disabled. This is configurable only if 802.11g support is enabled. Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate18Mhz 1.3.6.1.4.1.14179.2.3.2.1.24 integer read-write
Specify if this rate is supported or mandatory or disabled. This is configurable only if 802.11g support is enabled. Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate24Mhz 1.3.6.1.4.1.14179.2.3.2.1.25 integer read-write
Specify if this rate is supported or mandatory or disabled. This is configurable only if 802.11g support is enabled. Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate36Mhz 1.3.6.1.4.1.14179.2.3.2.1.26 integer read-write
Specify if this rate is supported or mandatory or disabled. This is configurable only if 802.11g support is enabled. Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate48Mhz 1.3.6.1.4.1.14179.2.3.2.1.27 integer read-write
Specify if this rate is supported or mandatory or disabled. This is configurable only if 802.11g support is enabled. Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bDataRate54Mhz 1.3.6.1.4.1.14179.2.3.2.1.28 integer read-write
Specify if this rate is supported or mandatory or disabled. This is configurable only if 802.11g support is enabled. Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11bPicoCellMode 1.3.6.1.4.1.14179.2.3.2.1.29 integer read-write
Configures the 802.11b pico-cell mode. This cannot be enabled when the Fast Roaming Mode is enabled. Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11bFastRoamingMode 1.3.6.1.4.1.14179.2.3.2.1.30 integer read-write
Configures the 802.11b fast-roaming mode. This cannot be enabled when the Pico Cell Mode is enabled. Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11bFastRoamingVoipMinRate 1.3.6.1.4.1.14179.2.3.2.1.31 integer read-write
Configures the minimum transmission rate allowed for VoIP on any 802.11b radio. Enumeration: 'rate11Mbps': 4, 'rate5andHalfMbps': 3, 'rate1Mbps': 1, 'undefined': 0, 'rate2Mbps': 2.
                 bsnGlobalDot11bFastRoamingVoipPercentage 1.3.6.1.4.1.14179.2.3.2.1.32 integer read-write
Configures the percentage of effective bandwidth for the minimum rate reserved for VoIP. Enumeration: 'seventyfive': 4, 'zero': 1, 'hundred': 5, 'twentyfive': 2, 'fifty': 3.
                 bsnGlobalDot11b80211eMaxBandwidth 1.3.6.1.4.1.14179.2.3.2.1.33 integer read-write
This represents the maximum bandwidth allocated to 802.11e clients. It is expressed as percentage of the total bandwidth of 802.11b network. The value of this attribute can vary from 0 to 100.
                 bsnGlobalDot11bDTPCSupport 1.3.6.1.4.1.14179.2.3.2.1.34 integer read-write
This attribute may be used to enable the DTPC support on all 802.11b/g radios. DTPC or Dynamic Transmit Power Control support means that the radio's transmit power will be advertised in the beacons and probe responses. Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11bRxSopThreshold 1.3.6.1.4.1.14179.2.3.2.1.35 integer read-write
Configures the global 802.11b receiver start of packet threshold. Enumeration: 'high': 3, 'auto': 0, 'medium': 2, 'low': 1.
             bsnGlobalDot11bPhy 1.3.6.1.4.1.14179.2.3.2.2
                 bsnGlobalDot11bMediumOccupancyLimit 1.3.6.1.4.1.14179.2.3.2.2.1 integer read-only
This attribute shall indicate the maximum amount of time, in TU, that a point coordinator may control the usage of the wireless medium without relinquishing control for long enough to allow at least one instance of DCF access to the medium. The default value of this attribute shall be 100, and the maximum value shall be 1000.
                 bsnGlobalDot11bCFPPeriod 1.3.6.1.4.1.14179.2.3.2.2.2 integer read-only
The attribute shall describe the number of DTIM intervals between the start of CFPs. It is modified by MLME-START.request primitive.
                 bsnGlobalDot11bCFPMaxDuration 1.3.6.1.4.1.14179.2.3.2.2.3 integer read-only
The attribute shall describe the maximum duration of the CFP in TU that may be generated by the PCF. It is modified by MLME-START.request primitive.
                 bsnGlobalDot11bCFPollable 1.3.6.1.4.1.14179.2.3.2.2.5 integer read-only
When this attribute is true, it shall indicate that the STA is able to respond to a CF-Poll with a data frame within a SIFS time. This attribute shall be false if the STA is not able to respond to a CF-Poll with a data frame within a SIFS time. Enumeration: 'yes': 1, 'no': 0.
                 bsnGlobalDot11bCFPollRequest 1.3.6.1.4.1.14179.2.3.2.2.6 integer read-only
Specifies wheather CFP Enumeration: 'yes': 1, 'no': 0.
                 bsnGlobalDot11bDTIMPeriod 1.3.6.1.4.1.14179.2.3.2.2.7 integer read-write
This attribute shall specify the number of beacon intervals that shall elapse between transmission of Beacons frames containing a TIM element whose DTIM Count field is 0. This value is transmitted in the DTIM Period field of Beacon frames.
                 bsnGlobalDot11bMaximumTransmitPowerLevel 1.3.6.1.4.1.14179.2.3.2.2.8 integer32 read-only
This attribute shall indicate the maximum transmit power, in dBm, allowed in the subband for the associated domain country string. The default value of this attribute shall be zero.
                 bsnGlobalDot11bFirstChannelNumber 1.3.6.1.4.1.14179.2.3.2.2.9 integer32 read-only
This attribute shall indicate the value of the lowest channel number in the subband for the associated domain country string. The default value of this attribute shall be zero.
                 bsnGlobalDot11bNumberofChannels 1.3.6.1.4.1.14179.2.3.2.2.10 integer32 read-only
This attribute shall indicate the value of the total number of channels allowed in the subband for the associated domain country string. The default value of this attribute shall be zero.
                 bsnGlobalDot11bRTSThreshold 1.3.6.1.4.1.14179.2.3.2.2.11 integer read-only
This attribute shall indicate the number of octets in an MPDU, below which an RTS/CTS handshake shall not be performed. An RTS/CTS handshake shall be performed at the beginning of any frame exchange sequence where the MPDU is of type Data or Management, the MPDU has an individual address in the Address1 field, and the length of the MPDU is greater than this threshold. (For additional details, refer to Table 21 in 9.7.) Setting this attribute to be larger than the maximum MSDU size shall have the effect of turning off the RTS/CTS handshake for frames of Data or Management type transmitted by this STA. Setting this attribute to zero shall have the effect of turning on the RTS/CTS handshake for all frames of Data or Management type transmitted by this STA. The default value of this attribute shall be 2347.
                 bsnGlobalDot11bShortRetryLimit 1.3.6.1.4.1.14179.2.3.2.2.12 integer read-only
This attribute shall indicate the maximum number of transmission attempts of a frame, the length of which is less than or equal to bsnGlobalDot11RTSThreshold, that shall be made before a failure condition is indicated. The default value of this attribute shall be 7.
                 bsnGlobalDot11bLongRetryLimit 1.3.6.1.4.1.14179.2.3.2.2.13 integer read-only
This attribute shall indicate the maximum number of transmission attempts of a frame, the length of which is greater than bsnGlobalDot11RTSThreshold, that shall be made before a failure condition is indicated. The default value of this attribute shall be 4.
                 bsnGlobalDot11bFragmentationThreshold 1.3.6.1.4.1.14179.2.3.2.2.14 integer read-write
This attribute shall specify the current maximum size, in octets, of the MPDU that may be delivered to the PHY. An MSDU shall be broken into fragments if its size exceeds the value of this attribute after adding MAC headers and trailers. An MSDU or MMPDU shall be fragmented when the resulting frame has individual address in the Address1 field, and the length of the frame is larger than this threshold. The default value for this attribute shall be the lesser of 2346 or the aMPDUMaxLength of the attached PHY and shall never exceed the lesser of 2346 or the aMPDUMaxLength of the attached PHY. The value of this attribute shall never be less than 256.
                 bsnGlobalDot11bMaxTransmitMSDULifetime 1.3.6.1.4.1.14179.2.3.2.2.15 unsigned32 read-only
The MaxTransmitMSDULifetime shall be the elapsed time in TU, after the initial transmission of an MSDU, after which further attempts to transmit the MSDU shall be terminated. The default value of this attribute shall be 512.
                 bsnGlobalDot11bMaxReceiveLifetime 1.3.6.1.4.1.14179.2.3.2.2.16 unsigned32 read-only
The MaxReceiveLifetime shall be the elapsed time in TU, after the initial reception of a fragmented MMPDU or MSDU, after which further attempts to reassemble the MMPDU or MSDU shall be terminated. The default value shall be 512.
                 bsnGlobalDot11bEDThreshold 1.3.6.1.4.1.14179.2.3.2.2.17 integer32 read-only
The current Energy Detect Threshold being used by the DSSS PHY.
                 bsnGlobalDot11bChannelAgilityEnabled 1.3.6.1.4.1.14179.2.3.2.2.18 integer read-only
This attribute indicates that the PHY channel agility functionality is enabled. Enumeration: 'yes': 1, 'no': 0.
                 bsnGlobalDot11bPBCCOptionImplemented 1.3.6.1.4.1.14179.2.3.2.2.19 integer read-only
This attribute, when true, shall indicate that the PBCC modulation option as defined in subclause 18.4.6.6 is implemented. The default value of this attribute shall be false. Enumeration: 'yes': 1, 'no': 0.
                 bsnGlobalDot11bShortPreambleOptionImplemented 1.3.6.1.4.1.14179.2.3.2.2.20 integer read-only
This attribute, when true, shall indicate that the short preamble option as defined in subclause 18.2.2.2 is implemented. The default value of this attribute shall be false. Enumeration: 'yes': 1, 'no': 0.
         bsnGlobalDot11a 1.3.6.1.4.1.14179.2.3.3
             bsnGlobalDot11aConfig 1.3.6.1.4.1.14179.2.3.3.1
                 bsnGlobalDot11aNetworkStatus 1.3.6.1.4.1.14179.2.3.3.1.1 integer read-write
Dot11a Network Status Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11aLowBandNetwork 1.3.6.1.4.1.14179.2.3.3.1.2 integer read-only
Dot11a Low Band Network Status Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11aMediumBandNetwork 1.3.6.1.4.1.14179.2.3.3.1.3 integer read-only
Dot11a Mid Band Network Status Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11aHighBandNetwork 1.3.6.1.4.1.14179.2.3.3.1.4 integer read-only
Dot11a High Band Network Status Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11aBeaconPeriod 1.3.6.1.4.1.14179.2.3.3.1.5 integer read-write
This attribute shall specify the number of TU that a AP Radio shall use for scheduling Beacon tranmissions. This value is transmitted in Beacon and Probe Response frames.
                 bsnGlobalDot11aDynamicChannelAssignment 1.3.6.1.4.1.14179.2.3.3.1.6 integer read-write
Dynamic channel assignment(DCA) has three modes. When the mode is auto, the channel assignment will be periodically updated for all Airespace APs that permit this operation. When the DCA is runOnce, channel assignments are updated based on the UPDATE_CMD received from the management. When the DCA is static, no dynamic channel assignments occurs and value are set to their global default. Default is auto. Enumeration: 'static': 3, 'runOnce': 2, 'automatic': 1.
                 bsnGlobalDot11aCurrentChannel 1.3.6.1.4.1.14179.2.3.3.1.7 integer read-write
The number of the current operating frequency channel of the OFDM PHY.
                 bsnGlobalDot11aDynamicChannelUpdateInterval 1.3.6.1.4.1.14179.2.3.3.1.8 unsigned32 read-only
When Channel dynamic alogirthm is running, this interval(in secs) specifies how often Channel assignement updates are attempted on an Airespace AP. NOTE: hysteresis is build into the algorithms so we will not have uproductive changes occuring. Default value is 600 secs
                 bsnGlobalDot11aInputsForDCA 1.3.6.1.4.1.14179.2.3.3.1.9 unsigned32 read-write
This attribute is a bit mask specifying what to include in DCA optimization.Below is a list of parameters and their corresponding bits identifiers. options bit -------------------------------------- none 0 SIGNAL STRENGTH 1 NOISE 2 FOREIGN INTERFERENCE 4 LOAD 8 DEVICE INTERFERENCE 32 Default value is 63( all bits on).
                 bsnGlobalDot11aChannelUpdateCmdInvoke 1.3.6.1.4.1.14179.2.3.3.1.10 integer read-write
When set to activate this starts a DCA calculation regardless of the dynamic update interval. This command should be invoke on Group Leader Airespace Switch.Invoking on a Airespace Switch which is not a Group leader has no effect. Enumeration: 'default': 0, 'activate': 1.
                 bsnGlobalDot11aChannelUpdateCmdStatus 1.3.6.1.4.1.14179.2.3.3.1.11 integer32 read-only
After setting bsnGlobalDot11aChannelUpdateCmdInvoke to activate, the result of action can be monitored from here. It takes 5 minutes for the command to complete.
                 bsnGlobalDot11aDynamicTransmitPowerControl 1.3.6.1.4.1.14179.2.3.3.1.12 integer read-write
Dynamic transmit power (DTP) has three modes. When the mode is auto, the transmit power of each Airespace AP will be periodically updated for all Airespace APs that permit this operation. When the DTP is runOnce,transmit power update will occur based on the UPDATE_CMD received from the management. When the DTP is static, no dynamic transmit power updates occur and their global defaults are used. Default is auto. Enumeration: 'static': 3, 'runOnce': 2, 'automatic': 1.
                 bsnGlobalDot11aCurrentTxPowerLevel 1.3.6.1.4.1.14179.2.3.3.1.13 integer read-write
The TxPowerLevel N currently being used to transmit data. Some PHYs also use this value to determine the receiver sensitivity requirements for CCA.
                 bsnGlobalDot11aDynamicTxPowerControlInterval 1.3.6.1.4.1.14179.2.3.3.1.14 unsigned32 read-only
When Tx PowerControl dynamic alogirthm is running, this interval(in secs) specifies how often TxPower control updates are attempted on an Airespace AP. NOTE: hysteresis is build into the algorithms so we will not have uproductive changes occuring. Default value is 600 secs
                 bsnGlobalDot11aInputsForDTP 1.3.6.1.4.1.14179.2.3.3.1.15 unsigned32 read-write
This attribute is a bit mask specifying what to include in DCA optimization.Below is a list of parameters and their corresponding bits identifiers. options bit -------------------------------------- none 0 LOAD 1 SIGNAL STRENGTH 2 FOREIGN INTERFERENCE 4 NOISE 8 Default value is 15( all bits on).
                 bsnGlobalDot11aPowerUpdateCmdInvoke 1.3.6.1.4.1.14179.2.3.3.1.16 integer read-write
When set to activate this starts a DTP calculation regardless of the dynamic update interval. This command should be invoke on Group Leader Airespace Switch.Invoking on a Airespace Switch which is not a Group leader has no effect. Enumeration: 'default': 0, 'activate': 1.
                 bsnGlobalDot11aPowerUpdateCmdStatus 1.3.6.1.4.1.14179.2.3.3.1.17 integer32 read-only
After setting bsnGlobalDot11aChannelUpdateCmdInvoke to activate, the result of action can be monitored from here. It takes 5 minutes for the command to complete.
                 bsnGlobalDot11aDataRate6Mhz 1.3.6.1.4.1.14179.2.3.3.1.19 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11aDataRate9Mhz 1.3.6.1.4.1.14179.2.3.3.1.20 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11aDataRate12Mhz 1.3.6.1.4.1.14179.2.3.3.1.21 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11aDataRate18Mhz 1.3.6.1.4.1.14179.2.3.3.1.22 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11aDataRate24Mhz 1.3.6.1.4.1.14179.2.3.3.1.23 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11aDataRate36Mhz 1.3.6.1.4.1.14179.2.3.3.1.24 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11aDataRate48Mhz 1.3.6.1.4.1.14179.2.3.3.1.25 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11aDataRate54Mhz 1.3.6.1.4.1.14179.2.3.3.1.26 integer read-write
Specify if this rate is supported or mandatory or disabled Enumeration: 'disabled': 0, 'supported': 1, 'mandatory': 2.
                 bsnGlobalDot11aPicoCellMode 1.3.6.1.4.1.14179.2.3.3.1.27 integer read-write
Configures the 802.11a pico-cell mode. This cannot be enabled when the Fast Roaming Mode is enabled. Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11aFastRoamingMode 1.3.6.1.4.1.14179.2.3.3.1.28 integer read-write
Configures the 802.11a fast-roaming mode. This cannot be enabled when the Pico Cell Mode is enabled. Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11aFastRoamingVoipMinRate 1.3.6.1.4.1.14179.2.3.3.1.29 integer read-write
Configures the minimum transmission rate allowed for VoIP on any 802.11a radio. Enumeration: 'rate11Mbps': 4, 'rate5andHalfMbps': 3, 'rate1Mbps': 1, 'undefined': 0, 'rate2Mbps': 2.
                 bsnGlobalDot11aFastRoamingVoipPercentage 1.3.6.1.4.1.14179.2.3.3.1.30 integer read-write
Configures the percentage of effective bandwidth for the minimum rate reserved for VoIP. Enumeration: 'seventyfive': 4, 'zero': 1, 'hundred': 5, 'twentyfive': 2, 'fifty': 3.
                 bsnGlobalDot11a80211eMaxBandwidth 1.3.6.1.4.1.14179.2.3.3.1.31 integer read-write
This represents the maximum bandwidth allocated to 802.11e clients. It is expressed as percentage of the total bandwidth of 802.11a network. The value of this attribute can vary from 0 to 100.
                 bsnGlobalDot11aDTPCSupport 1.3.6.1.4.1.14179.2.3.3.1.32 integer read-write
This attribute may be used to enable the DTPC support on all 802.11a radios. DTPC or Dynamic Transmit Power Control support means that the radio's transmit power will be advertised in the beacons and probe responses. Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11aRxSopThreshold 1.3.6.1.4.1.14179.2.3.3.1.33 integer read-write
Configures the global 802.11a receiver start of packet threshold. Enumeration: 'high': 3, 'auto': 0, 'medium': 2, 'low': 1.
             bsnGlobalDot11aPhy 1.3.6.1.4.1.14179.2.3.3.2
                 bsnGlobalDot11aMediumOccupancyLimit 1.3.6.1.4.1.14179.2.3.3.2.1 integer read-only
This attribute shall indicate the maximum amount of time, in TU, that a point coordinator may control the usage of the wireless medium without relinquishing control for long enough to allow at least one instance of DCF access to the medium. The default value of this attribute shall be 100, and the maximum value shall be 1000.
                 bsnGlobalDot11aCFPPeriod 1.3.6.1.4.1.14179.2.3.3.2.2 integer read-only
The attribute shall describe the number of DTIM intervals between the start of CFPs. It is modified by MLME-START.request primitive.
                 bsnGlobalDot11aCFPMaxDuration 1.3.6.1.4.1.14179.2.3.3.2.3 integer read-only
The attribute shall describe the maximum duration of the CFP in TU that may be generated by the PCF. It is modified by MLME-START.request primitive.
                 bsnGlobalDot11aCFPollable 1.3.6.1.4.1.14179.2.3.3.2.5 integer read-only
When this attribute is true, it shall indicate that the STA is able to respond to a CF-Poll with a data frame within a SIFS time. This attribute shall be false if the STA is not able to respond to a CF-Poll with a data frame within a SIFS time. Enumeration: 'yes': 1, 'no': 0.
                 bsnGlobalDot11aCFPollRequest 1.3.6.1.4.1.14179.2.3.3.2.6 integer read-only
Specifies whether CFP Enumeration: 'yes': 1, 'no': 0.
                 bsnGlobalDot11aDTIMPeriod 1.3.6.1.4.1.14179.2.3.3.2.7 integer read-write
This attribute shall specify the number of beacon intervals that shall elapse between transmission of Beacons frames containing a TIM element whose DTIM Count field is 0. This value is transmitted in the DTIM Period field of Beacon frames.
                 bsnGlobalDot11aMaximumTransmitPowerLevel 1.3.6.1.4.1.14179.2.3.3.2.8 integer32 read-only
This attribute shall indicate the maximum transmit power, in dBm, allowed in the subband for the associated domain country string. The default value of this attribute shall be zero.
                 bsnGlobalDot11aFirstChannelNumber 1.3.6.1.4.1.14179.2.3.3.2.9 integer32 read-only
This attribute shall indicate the value of the lowest channel number in the subband for the associated domain country string. The default value of this attribute shall be zero.
                 bsnGlobalDot11aNumberofChannels 1.3.6.1.4.1.14179.2.3.3.2.10 integer32 read-only
This attribute shall indicate the value of the total number of channels allowed in the subband for the associated domain country string. The default value of this attribute shall be zero.
                 bsnGlobalDot11aRTSThreshold 1.3.6.1.4.1.14179.2.3.3.2.11 integer read-only
This attribute shall indicate the number of octets in an MPDU, below which an RTS/CTS handshake shall not be performed. An RTS/CTS handshake shall be performed at the beginning of any frame exchange sequence where the MPDU is of type Data or Management, the MPDU has an individual address in the Address1 field, and the length of the MPDU is greater than this threshold. (For additional details, refer to Table 21 in 9.7.) Setting this attribute to be larger than the maximum MSDU size shall have the effect of turning off the RTS/CTS handshake for frames of Data or Management type transmitted by this STA. Setting this attribute to zero shall have the effect of turning on the RTS/CTS handshake for all frames of Data or Management type transmitted by this STA. The default value of this attribute shall be 2347.
                 bsnGlobalDot11aShortRetryLimit 1.3.6.1.4.1.14179.2.3.3.2.12 integer read-only
This attribute shall indicate the maximum number of transmission attempts of a frame, the length of which is less than or equal to bsnGlobalDot11RTSThreshold, that shall be made before a failure condition is indicated. The default value of this attribute shall be 7.
                 bsnGlobalDot11aLongRetryLimit 1.3.6.1.4.1.14179.2.3.3.2.13 integer read-only
This attribute shall indicate the maximum number of transmission attempts of a frame, the length of which is greater than bsnGlobalDot11RTSThreshold, that shall be made before a failure condition is indicated. The default value of this attribute shall be 4.
                 bsnGlobalDot11aFragmentationThreshold 1.3.6.1.4.1.14179.2.3.3.2.14 integer read-write
This attribute shall specify the current maximum size, in octets, of the MPDU that may be delivered to the PHY. An MSDU shall be broken into fragments if its size exceeds the value of this attribute after adding MAC headers and trailers. MSDU or MMPDU shall be fragmented when the resulting frame has an individual address in the Address1 field, and the length of the frame is larger than this threshold. The default value for this attribute shall be the lesser of 2346 or the aMPDUMaxLength of the attached PHY and shall never exceed the lesser of 2346 or the aMPDUMaxLength of the attached PHY. The value of this attribute shall never be less than 256.
                 bsnGlobalDot11aMaxTransmitMSDULifetime 1.3.6.1.4.1.14179.2.3.3.2.15 unsigned32 read-only
The MaxTransmitMSDULifetime shall be the elapsed time in TU, after the initial transmission of an MSDU, after which further attempts to transmit the MSDU shall be terminated. The default value of this attribute shall be 512.
                 bsnGlobalDot11aMaxReceiveLifetime 1.3.6.1.4.1.14179.2.3.3.2.16 unsigned32 read-only
The MaxReceiveLifetime shall be the elapsed time in TU, after the initial reception of a fragmented MMPDU or MSDU, after which further attempts to reassemble the MMPDU or MSDU shall be terminated. The default value shall be 512.
                 bsnGlobalDot11aTIThreshold 1.3.6.1.4.1.14179.2.3.3.2.17 integer32 read-only
The Threshold being used to detect a busy medium (frequency). CCA shall report a busy medium upon detecting the RSSI above this threshold.
                 bsnGlobalDot11aChannelAgilityEnabled 1.3.6.1.4.1.14179.2.3.3.2.18 integer read-only
This attribute indicates that the PHY channel agility functionality is enabled. Enumeration: 'yes': 1, 'no': 0.
         bsnGlobalDot11h 1.3.6.1.4.1.14179.2.3.4
             bsnGlobalDot11hConfig 1.3.6.1.4.1.14179.2.3.4.1
                 bsnGlobalDot11hPowerConstraint 1.3.6.1.4.1.14179.2.3.4.1.1 integer read-write
Local maximum transmit power for a channel is defined as maximum transmit power level specified for the channel in the Country element minus the local power constraint specified for the channel in the Power Constraint element.The power constraint is coded as an unsigned integer in units of decibels. To disable power constraint set Power Constraint to 0.
                 bsnGlobalDot11hChannelSwitchEnable 1.3.6.1.4.1.14179.2.3.4.1.2 integer read-write
To enable or disable channel switch. When disabling Channel Switch no need to pass mode and count Enumeration: 'enable': 1, 'disable': 0.
                 bsnGlobalDot11hChannelSwitchMode 1.3.6.1.4.1.14179.2.3.4.1.3 integer read-write
The Channel Switch Mode indicates any restriction on transmission until a channel switch. An Channel mode set to 1 means that the STA in a BSS to which the frame containing the element is addressed shall tranmit no further frames with in the BSS until the scheduled channel switch. A Channel switch mode set to 0 does not impose any requirement on the receiving STA. Enumeration: 'loud': 0, 'quiet': 1.
     bsnRrm 1.3.6.1.4.1.14179.2.4
         bsnRrmDot11a 1.3.6.1.4.1.14179.2.4.1
             bsnRrmDot11aGroup 1.3.6.1.4.1.14179.2.4.1.1
                 bsnRrmDot11aGlobalAutomaticGrouping 1.3.6.1.4.1.14179.2.4.1.1.1 integer read-write
Dynamic grouping has two modes: on and off. When the grouping is off, no dynamic grouping occurs. Each Airespace Switch optimizes only its own Airespace APs' parameters. When grouping is on, the Airespace Switches form groups and elect leaders to perform better dynamic parameter optimization. Enumeration: 'off': 2, 'automatic': 1.
                 bsnRrmDot11aGroupLeaderMacAddr 1.3.6.1.4.1.14179.2.4.1.1.2 macaddress read-only
This is the MAC address of the group leader for the dot11a group containing this Airespace Switch.
                 bsnRrmIsDot11aGroupLeader 1.3.6.1.4.1.14179.2.4.1.1.3 integer read-only
If this Airespace Switch is a Dot11a Group Leader then this attribute will be true else it will be false. Enumeration: 'yes': 1, 'no': 0.
                 bsnRrmDot11aGroupLastUpdateTime 1.3.6.1.4.1.14179.2.4.1.1.4 unsigned32 read-only
Last time the dot11a grouping was updated on this Airespace Switch. This is valid only if the Airespace Switch is a group leader.
                 bsnRrmDot11aGlobalGroupInterval 1.3.6.1.4.1.14179.2.4.1.1.5 unsigned32 read-only
When grouping is on, this interval(in secs) represents the period with which the grouping algorithm is run. Grouping algorithm will also run when the group contents changes and the automatic grouping is enabled. A dynamic grouping can be started upon request from the system administrator. Default value is 3600 secs.
                 bsnWrasDot11aGroupTable 1.3.6.1.4.1.14179.2.4.1.1.9 no-access
This is a table of Airespace Switch addresses that identifies the members of the Dot11a RF group containing this Airespace Switch. Max size is 20 entries.This has been deprecated for clrRrmDot11BandGrpMemberTable.
                     bsnWrasDot11aGroupEntry 1.3.6.1.4.1.14179.2.4.1.1.9.1 no-access
...
                         bsnWrasDot11aPeerMacAddress 1.3.6.1.4.1.14179.2.4.1.1.9.1.1 macaddress read-only
The MAC address of the member Switch.
                         bsnWrasDot11aPeerIpAddress 1.3.6.1.4.1.14179.2.4.1.1.9.1.21 ipaddress read-only
The IP address of the Airespace Switch.
             bsnRrmDot11aAPDefault 1.3.6.1.4.1.14179.2.4.1.6
                 bsnRrmDot11aForeignInterferenceThreshold 1.3.6.1.4.1.14179.2.4.1.6.1 integer read-write
foreign 802.11A interference threshold between 0 and 100 percent.
                 bsnRrmDot11aForeignNoiseThreshold 1.3.6.1.4.1.14179.2.4.1.6.2 integer read-write
802.11A foreign noise threshold between -127 and 0 dBm.
                 bsnRrmDot11aRFUtilizationThreshold 1.3.6.1.4.1.14179.2.4.1.6.3 integer read-write
802.11A RF utlization threshold between 0 and 100 percent.
                 bsnRrmDot11aThroughputThreshold 1.3.6.1.4.1.14179.2.4.1.6.4 unsigned32 read-write
802.11A throughput threshold between 1000 and 100000
                 bsnRrmDot11aMobilesThreshold 1.3.6.1.4.1.14179.2.4.1.6.5 integer read-write
802.11A mobiles threshold between 1 and 75
                 bsnRrmDot11aCoverageThreshold 1.3.6.1.4.1.14179.2.4.1.6.6 integer read-write
802.11A coverage threshold between 3 and 50.
                 bsnRrmDot11aMobileMinExceptionLevel 1.3.6.1.4.1.14179.2.4.1.6.7 integer read-write
802.11A mobile minimum exception level between 1 and 75
                 bsnRrmDot11aCoverageExceptionLevel 1.3.6.1.4.1.14179.2.4.1.6.8 integer read-write
802.11A coverage exception level between 0 and 100 percent.
                 bsnRrmDot11aSignalMeasurementInterval 1.3.6.1.4.1.14179.2.4.1.6.9 unsigned32 read-write
This interval (in secs) specifies how often do we get new signal strength measurements at each Airespace AP. Default is 300 secs
                 bsnRrmDot11aNoiseMeasurementInterval 1.3.6.1.4.1.14179.2.4.1.6.10 unsigned32 read-write
This interval( in secs) specifies how often do we get new noise and interference measurements at each Airespace AP. Default is 300 secs
                 bsnRrmDot11aLoadMeasurementInterval 1.3.6.1.4.1.14179.2.4.1.6.11 unsigned32 read-write
This interval( in secs) specifies how often do we get new load measurements at each Airespace AP. Default is 300 secs
                 bsnRrmDot11aCoverageMeasurementInterval 1.3.6.1.4.1.14179.2.4.1.6.12 unsigned32 read-write
This interval( in secs) specifies how often do we get new coverage measurements at each Airespace AP. Default is 300 secs
                 bsnRrmDot11aChannelMonitorList 1.3.6.1.4.1.14179.2.4.1.6.13 integer read-write
This attribute specifies the channels on which the switch monitors noise, interference and rogues. The first option allows monitoring on all channels while the second one on only those that are supported by the country of operation. the option dca implies that the monitor channel list will include those channels that are used by automatic channel assignment. Enumeration: 'country': 2, 'all': 1, 'dca': 3.
             bsnRrmDot11aSetFactoryDefault 1.3.6.1.4.1.14179.2.4.1.7 integer read-write
When set to activate all rrm parameters are reset to factory defaults Enumeration: 'default': 0, 'activate': 1.
         bsnRrmDot11b 1.3.6.1.4.1.14179.2.4.2
             bsnRrmDot11bGroup 1.3.6.1.4.1.14179.2.4.2.1
                 bsnRrmDot11bGlobalAutomaticGrouping 1.3.6.1.4.1.14179.2.4.2.1.1 integer read-write
Dynamic grouping has two modes: on and off. When the grouping is off, no dynamic grouping occurs. Each Airespace Switch optimizes only its own Airespace APs' parameters. When grouping is on, the Airespace Switchs form groups and elect leaders to perform better dynamic parameter optimization.This has been deprecated for clrRrmDot11BandGrpTable. Enumeration: 'off': 2, 'automatic': 1.
                 bsnRrmDot11bGroupLeaderMacAddr 1.3.6.1.4.1.14179.2.4.2.1.2 macaddress read-only
This is the MAC address of the group leader for the dot11b group containing this Airespace Switch.This has been deprecated for clrRrmDot11BandGrpTable.
                 bsnRrmIsDot11bGroupLeader 1.3.6.1.4.1.14179.2.4.2.1.3 integer read-only
If this Airespace Switch is a Dot11b Group Leader then this attribute will be true else it will be false.This has been deprecated for clrRrmDot11BandGrpTable. Enumeration: 'yes': 1, 'no': 0.
                 bsnRrmDot11bGroupLastUpdateTime 1.3.6.1.4.1.14179.2.4.2.1.4 unsigned32 read-only
Last time the dot11b grouping was updated on this Airespace Switch. This is valid only if the Airespace Switch is a group leader.This has been deprecated for clrRrmDot11BandGrpTable.
                 bsnRrmDot11bGlobalGroupInterval 1.3.6.1.4.1.14179.2.4.2.1.5 unsigned32 read-only
When grouping is on, this interval(in secs) represents the period with which the grouping algorithm is run. Grouping algorithm will also run when the group contents changes and the automatic grouping is enabled. A dynamic grouping can be started upon request from the system administrator. Default value is 3600 secs.This has been deprecated for clrRrmDot11BandGrpTable.
                 bsnWrasDot11bGroupTable 1.3.6.1.4.1.14179.2.4.2.1.9 no-access
This is a table of Airespace Switch addresses that identifies the members of the Dot11b RF group containing this Airespace Switch. Max size is 20 entries.This has been deprecated for clrRrmDot11BandGrpMemberTable.
                     bsnWrasDot11bGroupEntry 1.3.6.1.4.1.14179.2.4.2.1.9.1 no-access
...
                         bsnWrasDot11bPeerMacAddress 1.3.6.1.4.1.14179.2.4.2.1.9.1.1 macaddress read-only
The MAC address of the GIGE interface.
                         bsnWrasDot11bPeerIpAddress 1.3.6.1.4.1.14179.2.4.2.1.9.1.21 ipaddress read-only
The IP address of the Airespace Switch.
             bsnRrmDot11bAPDefault 1.3.6.1.4.1.14179.2.4.2.6
                 bsnRrmDot11bForeignInterferenceThreshold 1.3.6.1.4.1.14179.2.4.2.6.1 integer read-write
Foreign 802.11A interference threshold between 0 and 100 percent.
                 bsnRrmDot11bForeignNoiseThreshold 1.3.6.1.4.1.14179.2.4.2.6.2 integer read-write
802.11A foreign noise threshold between -127 and 0 dBm.
                 bsnRrmDot11bRFUtilizationThreshold 1.3.6.1.4.1.14179.2.4.2.6.3 integer read-write
802.11A RF utlization threshold between 0 and 100 percent.
                 bsnRrmDot11bThroughputThreshold 1.3.6.1.4.1.14179.2.4.2.6.4 unsigned32 read-write
802.11A Airespace AP data-rate threshold between 1000 and 100000
                 bsnRrmDot11bMobilesThreshold 1.3.6.1.4.1.14179.2.4.2.6.5 integer read-write
802.11A Airespace AP mobiles threshold between 1 and 75
                 bsnRrmDot11bCoverageThreshold 1.3.6.1.4.1.14179.2.4.2.6.6 integer read-write
802.11A Airespace AP coverage threshold between 3 and 50.
                 bsnRrmDot11bMobileMinExceptionLevel 1.3.6.1.4.1.14179.2.4.2.6.7 integer read-write
802.11A Airespace AP mobile minimum exception level between 1 and 75
                 bsnRrmDot11bCoverageExceptionLevel 1.3.6.1.4.1.14179.2.4.2.6.8 integer read-write
802.11A Airespace AP coverage exception level between 0 and 100 percent.
                 bsnRrmDot11bSignalMeasurementInterval 1.3.6.1.4.1.14179.2.4.2.6.9 unsigned32 read-write
This interval( in secs) specifies how often do we get new signal strength measurements at each Airespace AP. Default is 300 secs
                 bsnRrmDot11bNoiseMeasurementInterval 1.3.6.1.4.1.14179.2.4.2.6.10 unsigned32 read-write
This interval( in secs) specifies how often do we get new noise and interference measurements at each Airespace AP. Default is 300 secs
                 bsnRrmDot11bLoadMeasurementInterval 1.3.6.1.4.1.14179.2.4.2.6.11 unsigned32 read-write
This interval( in secs) specifies how often do we get new load measurements at each Airespace AP. Default is 300 secs
                 bsnRrmDot11bCoverageMeasurementInterval 1.3.6.1.4.1.14179.2.4.2.6.12 unsigned32 read-write
This interval( in secs) specifies how often do we get new coverage measurements at each Airespace AP. Default is 300 secs
                 bsnRrmDot11bChannelMonitorList 1.3.6.1.4.1.14179.2.4.2.6.13 integer read-write
This attribute specifies the channels on which the switch monitors noise, interference and rogues. The first option allows monitoring on all channels while the second one on only those that are supported by the country of operation. the option dca implies that the monitor channel list will include those channels that are used by automatic channel assignment. Enumeration: 'country': 2, 'all': 1, 'dca': 3.
             bsnRrmDot11bSetFactoryDefault 1.3.6.1.4.1.14179.2.4.2.7 integer read-write
When set to activate all rrm parameters are reset to factory defaults Enumeration: 'default': 0, 'activate': 1.
     bsnAAA 1.3.6.1.4.1.14179.2.5
         bsnRadiusAuthServerTable 1.3.6.1.4.1.14179.2.5.1 no-access
The (conceptual) table listing the RADIUS authentication servers with which the client shares a secret.
             bsnRadiusAuthServerEntry 1.3.6.1.4.1.14179.2.5.1.1 no-access
An entry (conceptual row) representing a RADIUS authentication server with which the client shares a secret.
                 bsnRadiusAuthServerIndex 1.3.6.1.4.1.14179.2.5.1.1.1 integer32 read-only
A number uniquely identifying each RADIUS Authentication server with which this client communicates.
                 bsnRadiusAuthServerAddress 1.3.6.1.4.1.14179.2.5.1.1.2 ipaddress read-only
The IP address of the RADIUS authentication server referred to in this table entry.
                 bsnRadiusAuthClientServerPortNumber 1.3.6.1.4.1.14179.2.5.1.1.3 integer32 read-only
The UDP port the client is using to send requests to this server.
                 bsnRadiusAuthServerKey 1.3.6.1.4.1.14179.2.5.1.1.4 octet string read-only
The authentication and encryption key shared between the Radius client and this Radius Server. When the bsnRadiusAuthServerKeyFormat is hex it can have max length of 128 bytes. If the bsnRadiusAuthServerKeyFormat is Ascii it can have max length of 64 bytes.
                 bsnRadiusAuthServerStatus 1.3.6.1.4.1.14179.2.5.1.1.5 integer read-only
Server enable or disable status. Enumeration: 'enable': 1, 'disable': 0.
                 bsnRadiusAuthServerKeyFormat 1.3.6.1.4.1.14179.2.5.1.1.6 integer read-only
Format of the server key. When hex, the number of characters in the key should be even. Enumeration: 'ascii': 2, 'hex': 1.
                 bsnRadiusAuthServerRFC3576 1.3.6.1.4.1.14179.2.5.1.1.7 integer read-only
Support for Dynamic Authorization Extensions to RADIUS. Enumeration: 'enable': 1, 'disable': 0.
                 bsnRadiusAuthServerIPSec 1.3.6.1.4.1.14179.2.5.1.1.8 integer read-only
IPSec over RADIUS Enumeration: 'enable': 1, 'disable': 0.
                 bsnRadiusAuthServerIPSecAuth 1.3.6.1.4.1.14179.2.5.1.1.9 integer read-only
The Hash algorithm employed by the IPSec Encrpytion. This applies only when bsnRadiusAuthServerIPSec is in enable state. Enumeration: 'hmacMd5': 1, 'none': 0, 'hmacSha1': 2.
                 bsnRadiusAuthServerIPSecEncryption 1.3.6.1.4.1.14179.2.5.1.1.10 integer read-only
The Encryption algorithm employed by this IpSec Encryption. This applies only when bsnRadiusAuthServerIPSec is in enable state. Enumeration: 'tripleDes': 2, 'none': 0, 'des': 1, 'aes256Cbc': 4, 'aesCbc': 3.
                 bsnRadiusAuthServerIPSecIKEPhase1 1.3.6.1.4.1.14179.2.5.1.1.11 integer read-only
VPN IKE Phase 1 Mode type as per the IpSec standards. This applies only when bsnRadiusAuthServerIPSec is in enable state. Enumeration: 'main': 1, 'agressive': 2.
                 bsnRadiusAuthServerIPSecIKELifetime 1.3.6.1.4.1.14179.2.5.1.1.12 integer32 read-only
IPSec IKE's Lifetime. This applies only when bsnRadiusAuthServerIPSec is in enable state.
                 bsnRadiusAuthServerIPSecDHGroup 1.3.6.1.4.1.14179.2.5.1.1.13 integer read-only
IKE's Diffie-Hellman Group. This applies only when bsnRadiusAuthServerIPSec is in enable state. Enumeration: 'group5': 5, 'group1': 1, 'group14': 14, 'group2': 2.
                 bsnRadiusAuthServerNetworkUserConfig 1.3.6.1.4.1.14179.2.5.1.1.14 integer read-only
When enabled, this entry is considered as network user radius authenticating server entry. Enumeration: 'enable': 1, 'disable': 0.
                 bsnRadiusAuthServerMgmtUserConfig 1.3.6.1.4.1.14179.2.5.1.1.15 integer read-only
When enabled, this entry is considered as management user radius authenticating server entry. Enumeration: 'enable': 1, 'disable': 0.
                 bsnRadiusAuthServerRetransmitTimeout 1.3.6.1.4.1.14179.2.5.1.1.17 integer read-only
Time in seconds after which a radius authentication request will timeout and a retransmission will be taken up by the switch.
                 bsnRadiusAuthServerKeyWrapKEKkey 1.3.6.1.4.1.14179.2.5.1.1.18 octet string read-only
Key-encryption-key (KEK) used as the key for the 128 bit AES Key Wrap algorithm to encrypt the PMK in the key attribute. If the key is present in request, it should be taken as a hint by the server that the sender prefers this method of encryption over others. To maintain security actual keys after configuration are never returned in get request. If keys are configured then '***' is returned. If keys are not configured then empty string is retunred. bsnRadiusAuthServerKeyFormat is used this key. if the format chosen is ascii then it should be 16 bytes in length. if the format chosen is hex then it should be 32 bytes in length.
                 bsnRadiusAuthServerKeyWrapMACKkey 1.3.6.1.4.1.14179.2.5.1.1.19 octet string read-only
Message-authenticator-code-key ( MACK) - used as the key for the HMAC-SHA-1 algorithm to sign the RADIUS message to prevent spoofing. MACK must be configured when KEK is configured. To maintain security actual keys after configuration are never returned in get request. If keys are configured then '***' is returned. If keys are not configured then empty string is returned. bsnRadiusAuthServerKeyFormat is used this key. if the format chosen is ascii then it should be 20 bytes in length. If the format chosen is hex then it should be 40 bytes in length.
                 bsnRadiusAuthServerKeyWrapFormat 1.3.6.1.4.1.14179.2.5.1.1.20 integer read-only
Format for the Key Wrap keys. This object is mandatory for manager to send if the key Wrap keys are being configured. Get on this object will always return hex(1) Enumeration: 'ascii': 2, 'hex': 1.
                 bsnRadiusAuthServerRowStatus 1.3.6.1.4.1.14179.2.5.1.1.26 rowstatus read-only
Row Status for creation/deletion
                 bsnRadiusAuthServerInetAddressType 1.3.6.1.4.1.14179.2.5.1.1.27 inetaddresstype read-only
The IP address of the RADIUS authentication server referred to in this table entry.
                 bsnRadiusAuthServerInetAddress 1.3.6.1.4.1.14179.2.5.1.1.28 inetaddress read-only
The IP address of the RADIUS authentication server referred to in this table entry.
         bsnRadiusAccServerTable 1.3.6.1.4.1.14179.2.5.2 no-access
The (conceptual) table listing the RADIUS accounting servers with which the client shares a secret.
             bsnRadiusAccServerEntry 1.3.6.1.4.1.14179.2.5.2.1 no-access
An entry (conceptual row) representing a RADIUS accounting server with which the client shares a secret.
                 bsnRadiusAccServerIndex 1.3.6.1.4.1.14179.2.5.2.1.1 integer32 read-only
A number uniquely identifying each RADIUS Accounting server with which this client communicates.
                 bsnRadiusAccServerAddress 1.3.6.1.4.1.14179.2.5.2.1.2 ipaddress read-only
The IP address of the RADIUS accounting server referred to in this table entry.
                 bsnRadiusAccClientServerPortNumber 1.3.6.1.4.1.14179.2.5.2.1.3 integer32 read-only
The UDP port the client is using to send requests to this server.
                 bsnRadiusAccServerKey 1.3.6.1.4.1.14179.2.5.2.1.4 octet string read-only
The authentication and encryption key shared between the Radius client and this Radius Server. When the bsnRadiusAccServerKeyFormat is hex it can have max length of 128 bytes. If the bsnRadiusAccServerKeyFormat is Ascii it can have max length of 64 bytes.
                 bsnRadiusAccServerStatus 1.3.6.1.4.1.14179.2.5.2.1.5 integer read-only
Server enable or disable status. Enumeration: 'enable': 1, 'disable': 0.
                 bsnRadiusAccServerKeyFormat 1.3.6.1.4.1.14179.2.5.2.1.6 integer read-only
Format of the server key. When hex, the number of characters in the key should be even. Enumeration: 'ascii': 2, 'hex': 1.
                 bsnRadiusAccServerIPSec 1.3.6.1.4.1.14179.2.5.2.1.7 integer read-only
IPSec over RADIUS Enumeration: 'enable': 1, 'disable': 0.
                 bsnRadiusAccServerIPSecAuth 1.3.6.1.4.1.14179.2.5.2.1.8 integer read-only
The Hash algorithm employed by the IPSec Encrpytion. This applies only when bsnRadiusAccServerIPSec is in enable state. Enumeration: 'hmacMd5': 1, 'none': 0, 'hmacSha1': 2.
                 bsnRadiusAccServerIPSecEncryption 1.3.6.1.4.1.14179.2.5.2.1.9 integer read-only
The Encryption algorithm employed by this IpSec Encryption. This applies only when bsnRadiusAccServerIPSec is in enable state. Enumeration: 'tripleDes': 2, 'none': 0, 'des': 1, 'aes256Cbc': 4, 'aesCbc': 3.
                 bsnRadiusAccServerIPSecIKEPhase1 1.3.6.1.4.1.14179.2.5.2.1.10 integer read-only
VPN IKE Phase 1 Mode type as per the IpSec standards. This applies only when bsnRadiusAccServerIPSec is in enable state. Enumeration: 'main': 1, 'agressive': 2.
                 bsnRadiusAccServerIPSecIKELifetime 1.3.6.1.4.1.14179.2.5.2.1.11 integer32 read-only
IPSec IKE's Lifetime. This applies only when bsnRadiusAccServerIPSec is in enable state.
                 bsnRadiusAccServerIPSecDHGroup 1.3.6.1.4.1.14179.2.5.2.1.12 integer read-only
IKE's Diffie-Hellman Group. This applies only when bsnRadiusAccServerIPSec is in enable state. Enumeration: 'group5': 5, 'group1': 1, 'group14': 14, 'group2': 2.
                 bsnRadiusAccServerNetworkUserConfig 1.3.6.1.4.1.14179.2.5.2.1.13 integer read-only
When enabled, this entry is considered as network user radius accounting server entry. Enumeration: 'enable': 1, 'disable': 0.
                 bsnRadiusAccServerRetransmitTimeout 1.3.6.1.4.1.14179.2.5.2.1.14 integer read-only
Time in seconds after which a radius accounting request will timeout and a retransmission will be taken up by the switch.
                 bsnRadiusAccServerRowStatus 1.3.6.1.4.1.14179.2.5.2.1.26 rowstatus read-only
Row Status for creation/deletion
                 bsnRadiusAccServerInetAddressType 1.3.6.1.4.1.14179.2.5.2.1.27 inetaddresstype read-only
The IP address of the RADIUS accounting server referred to in this table entry.
                 bsnRadiusAccServerInetAddress 1.3.6.1.4.1.14179.2.5.2.1.28 inetaddress read-only
The IP address of the RADIUS accounting server referred to in this table entry.
         bsnRadiusAuthServerStatsTable 1.3.6.1.4.1.14179.2.5.3 no-access
The listing the Statistics of RADIUS authentication servers.
             bsnRadiusAuthServerStatsEntry 1.3.6.1.4.1.14179.2.5.3.1 no-access
An entry representing statistics a RADIUS authentication server with which the client shares a secret.
                 bsnRadiusAuthClientRoundTripTime 1.3.6.1.4.1.14179.2.5.3.1.6 timeticks read-only
The time interval (in hundredths of a second) between the most recent Access-Reply/Access-Challenge and the Access-Request that matched it from this RADIUS authentication server.
                 bsnRadiusAuthClientAccessRequests 1.3.6.1.4.1.14179.2.5.3.1.7 counter32 read-only
The number of RADIUS Access-Request packets sent to this server. This does not include retransmissions.
                 bsnRadiusAuthClientAccessRetransmissions 1.3.6.1.4.1.14179.2.5.3.1.8 counter32 read-only
The number of RADIUS Access-Request packets retransmitted to this RADIUS authentication server.
                 bsnRadiusAuthClientAccessAccepts 1.3.6.1.4.1.14179.2.5.3.1.9 counter32 read-only
The number of RADIUS Access-Accept packets (valid or invalid) received from this server.
                 bsnRadiusAuthClientAccessRejects 1.3.6.1.4.1.14179.2.5.3.1.10 counter32 read-only
The number of RADIUS Access-Reject packets (valid or invalid) received from this server.
                 bsnRadiusAuthClientAccessChallenges 1.3.6.1.4.1.14179.2.5.3.1.11 counter32 read-only
The number of RADIUS Access-Challenge packets (valid or invalid) received from this server.
                 bsnRadiusAuthClientMalformedAccessResponses 1.3.6.1.4.1.14179.2.5.3.1.12 counter32 read-only
The number of malformed RADIUS Access-Response packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators or Signature attributes or unknown types are not included as malformed access responses.
                 bsnRadiusAuthClientBadAuthenticators 1.3.6.1.4.1.14179.2.5.3.1.13 counter32 read-only
The number of RADIUS Access-Response packets containing invalid authenticators or Signature attributes received from this server.
                 bsnRadiusAuthClientPendingRequests 1.3.6.1.4.1.14179.2.5.3.1.14 gauge32 read-only
The number of RADIUS Access-Request packets destined for this server that have not yet timed out or received a response. This variable is incremented when an Access-Request is sent and decremented due to receipt of an Acess-Accept, Access-Reject or Access-Challenge, a timeout or retransmission.
                 bsnRadiusAuthClientTimeouts 1.3.6.1.4.1.14179.2.5.3.1.15 counter32 read-only
The number of authentication timeouts to this server. After a timeout the client may retry to the same server, send to a different server, or give up. A retry to the same server is counted as a retransmit as well as a timeout. A send to a different server is counted as a Request as well as a timeout.
                 bsnRadiusAuthClientUnknownTypes 1.3.6.1.4.1.14179.2.5.3.1.16 counter32 read-only
The number of RADIUS packets of unknown type which were received from this server on the authentication port.
                 bsnRadiusAuthClientPacketsDropped 1.3.6.1.4.1.14179.2.5.3.1.36 counter32 read-only
The number of RADIUS packets of which were received from this server on the authentication port and dropped for some other reason.
         bsnRadiusAccServerStatsTable 1.3.6.1.4.1.14179.2.5.4 no-access
The (conceptual) table listing the RADIUS accounting servers with which the client shares a secret.
             bsnRadiusAccServerStatsEntry 1.3.6.1.4.1.14179.2.5.4.1 no-access
An entry (conceptual row) representing a RADIUS accounting server with which the client shares a secret.
                 bsnRadiusAccClientRoundTripTime 1.3.6.1.4.1.14179.2.5.4.1.6 timeticks read-only
The time interval between the most recent Accounting-Response and the Accounting-Request that matched it from this RADIUS accounting server.
                 bsnRadiusAccClientRequests 1.3.6.1.4.1.14179.2.5.4.1.7 counter32 read-only
The number of RADIUS Accounting-Request packets sent. This does not include retransmissions.
                 bsnRadiusAccClientRetransmissions 1.3.6.1.4.1.14179.2.5.4.1.8 counter32 read-only
The number of RADIUS Accounting-Request packets retransmitted to this RADIUS accounting server. Retransmissions include retries where the Identifier and Acct-Delay have been updated, as well as those in which they remain the same.
                 bsnRadiusAccClientResponses 1.3.6.1.4.1.14179.2.5.4.1.9 counter32 read-only
The number of RADIUS packets received on the accounting port from this server.
                 bsnRadiusAccClientMalformedResponses 1.3.6.1.4.1.14179.2.5.4.1.10 counter32 read-only
The number of malformed RADIUS Accounting-Response packets received from this server. Malformed packets include packets with an invalid length. Bad authenticators and unknown types are not included as malformed accounting responses.
                 bsnRadiusAccClientBadAuthenticators 1.3.6.1.4.1.14179.2.5.4.1.11 counter32 read-only
The number of RADIUS Accounting-Response packets which contained invalid authenticators received from this server.
                 bsnRadiusAccClientPendingRequests 1.3.6.1.4.1.14179.2.5.4.1.12 gauge32 read-only
The number of RADIUS Accounting-Request packets sent to this server that have not yet timed out or received a response. This variable is incremented when an Accounting-Request is sent and decremented due to receipt of an Accounting-Response, a timeout or a retransmission.
                 bsnRadiusAccClientTimeouts 1.3.6.1.4.1.14179.2.5.4.1.13 counter32 read-only
The number of accounting timeouts to this server. After a timeout the client may retry to the same server, send to a different server, or give up. A retry to the same server is counted as a retransmit as well as a timeout. A send to a different server is counted as an Accounting-Request as well as a timeout.
                 bsnRadiusAccClientUnknownTypes 1.3.6.1.4.1.14179.2.5.4.1.14 counter32 read-only
The number of RADIUS packets of unknown type which were received from this server on the accounting port.
                 bsnRadiusAccClientPacketsDropped 1.3.6.1.4.1.14179.2.5.4.1.34 counter32 read-only
The number of RADIUS packets which were received from this server on the accounting port and dropped for some other reason.
         bsnUsersTable 1.3.6.1.4.1.14179.2.5.5 no-access
The (conceptual) table listing Wlan Users
             bsnUsersEntry 1.3.6.1.4.1.14179.2.5.5.1 no-access
....
                 bsnUserName 1.3.6.1.4.1.14179.2.5.5.1.2 octet string read-only
User Name
                 bsnUserPassword 1.3.6.1.4.1.14179.2.5.5.1.3 octet string read-only
User Password
                 bsnUserEssIndex 1.3.6.1.4.1.14179.2.5.5.1.4 integer read-only
User WLAN ID. Value 0 implies that this applies to any WLAN ID.
                 bsnUserAccessMode 1.3.6.1.4.1.14179.2.5.5.1.5 integer read-only
User Access Mode. Enumeration: 'readWrite': 2, 'readOnly': 1.
                 bsnUserType 1.3.6.1.4.1.14179.2.5.5.1.6 integer read-only
User Type. Enumeration: 'management': 1, 'wlan': 2, 'macFilter': 3.
                 bsnUserInterfaceName 1.3.6.1.4.1.14179.2.5.5.1.7 octet string read-only
Interface Name.
                 bsnUserRowStatus 1.3.6.1.4.1.14179.2.5.5.1.26 rowstatus read-only
Row Status
         bsnBlackListClientTable 1.3.6.1.4.1.14179.2.5.6 no-access
The table listing Wlan Black Listed Clients
             bsnBlackListClientEntry 1.3.6.1.4.1.14179.2.5.6.1 no-access
....
                 bsnBlackListClientMacAddress 1.3.6.1.4.1.14179.2.5.6.1.1 octet string read-only
Black Listed Client MAC Address
                 bsnBlackListClientDescription 1.3.6.1.4.1.14179.2.5.6.1.2 octet string read-only
Black Listed Client Description
                 bsnBlackListClientRowStatus 1.3.6.1.4.1.14179.2.5.6.1.22 rowstatus read-only
Row Status
         bsnAclTable 1.3.6.1.4.1.14179.2.5.7 no-access
The table listing ACLs (Access Control Lists) on the Switch.
             bsnAclEntry 1.3.6.1.4.1.14179.2.5.7.1 no-access
....
                 bsnAclName 1.3.6.1.4.1.14179.2.5.7.1.1 octet string read-only
Name of the Access Control List.
                 bsnAclApplyMode 1.3.6.1.4.1.14179.2.5.7.1.2 integer read-only
The apply mode of the ACL on the switch. Mode value 'applied' means the ACL has been applied on the switch. Enumeration: 'notapplied': 0, 'applied': 1.
                 bsnAclRowStatus 1.3.6.1.4.1.14179.2.5.7.1.20 rowstatus read-only
Row Status of the ACL.
         bsnAclRuleTable 1.3.6.1.4.1.14179.2.5.8 no-access
The table listing Acl Rules(Access Control List Entries) on the ACL with name bsnAclName.
             bsnAclRuleEntry 1.3.6.1.4.1.14179.2.5.8.1 no-access
....
                 bsnAclRuleIndex 1.3.6.1.4.1.14179.2.5.8.1.2 unsigned32 read-only
Index of the ACL rule. This can be updated to reset the sequence of the rules of an ACL.
                 bsnAclRuleAction 1.3.6.1.4.1.14179.2.5.8.1.3 integer read-only
The permission mode of a rule. Enumeration: 'deny': 0, 'permit': 1.
                 bsnAclRuleDirection 1.3.6.1.4.1.14179.2.5.8.1.4 integer read-only
The direction of the packet to which the rule may be applied. Enumeration: 'inbound': 0, 'outbound': 1, 'any': 2.
                 bsnAclRuleSourceIpAddress 1.3.6.1.4.1.14179.2.5.8.1.5 ipaddress read-only
Source IP Address of the ACL rule. A value 0 implies any source address.
                 bsnAclRuleSourceIpNetmask 1.3.6.1.4.1.14179.2.5.8.1.6 ipaddress read-only
Source IP Netmask of the ACL rule. A value 0 implies any source mask.
                 bsnAclRuleDestinationIpAddress 1.3.6.1.4.1.14179.2.5.8.1.7 ipaddress read-only
Destination IP Address of the ACL rule. A value 0 implies any destination address.
                 bsnAclRuleDestinationIpNetmask 1.3.6.1.4.1.14179.2.5.8.1.8 ipaddress read-only
Destination Netmask of the ACL rule. A value 0 implies any destination mask.
                 bsnAclRuleProtocol 1.3.6.1.4.1.14179.2.5.8.1.9 unsigned32 read-only
Protocol of the packet. It can be either of the pre specified protocols like TCP, UDP, ICMP, ESP, AH, GRE, IP, Ethernet Over IP, OSPF or any number between 0 and 255. A value 256 implies that this rule applies to 'Any' protocol.
                 bsnAclRuleStartSourcePort 1.3.6.1.4.1.14179.2.5.8.1.10 unsigned32 read-only
Source Port of the packet. It can be either of the pre specified ports like HTTP, HTTPS, Telnet, RADIUS etc or any number between 0 and 65535. A value 65536 implies that this rule applies to 'Any' source port. This value can be set only if the protocol is set to TCP or UDP. Otherwise the value is set to Any(65536)
                 bsnAclRuleEndSourcePort 1.3.6.1.4.1.14179.2.5.8.1.11 unsigned32 read-only
Source Port of the packet. It can be either of the pre specified ports like HTTP, HTTPS, Telnet, RADIUS etc or any number between 0 and 65535. A value 65536 implies that this rule applies to 'Any' source port. This value can be set only if the protocol is set to TCP or UDP. Otherwise the value is set to Any(65536)
                 bsnAclRuleStartDestinationPort 1.3.6.1.4.1.14179.2.5.8.1.12 unsigned32 read-only
Destination Port of the packet. It can be either of the pre specified ports like HTTP, HTTPS, Telnet, RADIUS etc or any number between 0 and 65535. A value 65536 implies that this rule aplpies to 'Any' Destination port. This value can be set only if the protocol is set to TCP or UDP. Otherwise the value is set to Any(65536)
                 bsnAclRuleEndDestinationPort 1.3.6.1.4.1.14179.2.5.8.1.13 unsigned32 read-only
Destination Port of the packet. It can be either of the pre specified ports like HTTP, HTTPS, Telnet, RADIUS etc or any number between 0 and 65535. A value 65536 implies that this rule aplpies to 'Any' Destination port. This value can be set only if the protocol is set to TCP or UDP. Otherwise the value is set to Any(65536)
                 bsnAclRuleDscp 1.3.6.1.4.1.14179.2.5.8.1.14 unsigned32 read-only
DSCP value of the rule. A value 256 implies Any
                 bsnAclNewRuleIndex 1.3.6.1.4.1.14179.2.5.8.1.15 unsigned32 read-only
New Index of the ACL rule. This attribute should be updated if the requirement is to reset the sequence of the rules of an ACL. A read on this will not yield anything.
                 bsnAclRuleRowStatus 1.3.6.1.4.1.14179.2.5.8.1.40 rowstatus read-only
Row Status of the ACL Rule.
         bsnMacFilterTable 1.3.6.1.4.1.14179.2.5.9 no-access
The table listing MAC Filter entries
             bsnMacFilterEntry 1.3.6.1.4.1.14179.2.5.9.1 no-access
....
                 bsnMacFilterAddress 1.3.6.1.4.1.14179.2.5.9.1.1 octet string read-only
MAC Address of the entry
                 bsnMacFilterWlanId 1.3.6.1.4.1.14179.2.5.9.1.2 integer read-only
WLAN ID of the WLAN that the user can connect to. 0 means any WLAN ID.
                 bsnMacFilterInterfaceName 1.3.6.1.4.1.14179.2.5.9.1.3 octet string read-only
Interface Name.
                 bsnMacFilterDescription 1.3.6.1.4.1.14179.2.5.9.1.4 octet string read-only
Description of the MAC Filter entry.
                 bsnMacFilterRowStatus 1.3.6.1.4.1.14179.2.5.9.1.24 rowstatus read-only
Row Status
         bsnLocalNetUserTable 1.3.6.1.4.1.14179.2.5.10 no-access
The table listing Local Net User entries.
               bsnLocalNetUserEntry 1.3.6.1.4.1.14179.2.5.10.1 no-access
....
                   bsnLocalNetUserName 1.3.6.1.4.1.14179.2.5.10.1.1 octet string read-only
Name of the net user.
                   bsnLocalNetUserWlanId 1.3.6.1.4.1.14179.2.5.10.1.2 integer read-only
WLAN ID of the WLAN that the user can connect to. 0 means any WLAN ID.
                   bsnLocalNetUserPassword 1.3.6.1.4.1.14179.2.5.10.1.3 octet string read-only
User Password.
                   bsnLocalNetUserDescription 1.3.6.1.4.1.14179.2.5.10.1.4 octet string read-only
Description of the Net User entry.
                   bsnLocalNetUserLifetime 1.3.6.1.4.1.14179.2.5.10.1.5 timeinterval read-only
This object indicates the lifetime of an user account expressed in hundredths of a second. Lifetime period other than 0 will make it a guest-user. Minimum value for guest user is 60 seconds (6000). Once configured as non-guest user can not be change to guest user and vice-versa. Default value is for a day and max lifetime is 259200000(30 days). WLANIds, which have webauth policy are valid for guest access user.
                   bsnLocalNetUserStartTime 1.3.6.1.4.1.14179.2.5.10.1.6 timeticks read-only
This object indicates the time when the guest user account was created and expressed as the number of seconds elapsed since 1st Jan, 1970.
                   bsnLocalNetUserRemainingTime 1.3.6.1.4.1.14179.2.5.10.1.7 timeinterval read-only
This object indicates the remaining session time for the guest user in hundredths of a second.
                   bsnLocalNetUserRowStatus 1.3.6.1.4.1.14179.2.5.10.1.24 rowstatus read-only
Row Status
         bsnLocalManagementUserTable 1.3.6.1.4.1.14179.2.5.11 no-access
The (conceptual) table listing Local Management Users
               bsnLocalManagementUserEntry 1.3.6.1.4.1.14179.2.5.11.1 no-access
....
                   bsnLocalManagementUserName 1.3.6.1.4.1.14179.2.5.11.1.1 octet string read-only
User Name
                   bsnLocalManagementUserPassword 1.3.6.1.4.1.14179.2.5.11.1.2 octet string read-only
User Password
                   bsnLocalManagementUserAccessMode 1.3.6.1.4.1.14179.2.5.11.1.3 integer read-only
User Access Mode. Enumeration: 'readWrite': 2, 'readOnly': 1.
                   bsnLocalManagementUserRowStatus 1.3.6.1.4.1.14179.2.5.11.1.23 rowstatus read-only
Row Status
         bsnRadiusAuthKeyWrapEnable 1.3.6.1.4.1.14179.2.5.12 truthvalue read-write
When keyWrap is enable then for 801.1X and 802.11i client Authentication, request is sent to those radius servers which has KEK and MACK keys are configured. Radius servers are widely used for user authentications. In 802.11i and 802.1X type authentication, the controller recives Pairwise Master KEy(PMK) from RADIUS sever using vendor specific RADIUS attributes, which uses MPPE RFC3078. Since MPPE uses RC4 algorithm to provide data confidentiality, it is not FIPS approved. For this RADIUS key WRAP attributes, bsnRadiusAuthServerKeyWrap and bsnRadiusAuthServerKeyWrapMACKkey have been added, which are used to securely transfer encryption keys using non-proprietary techniques.
         bsnRadiusAuthCacheCredentialsLocally 1.3.6.1.4.1.14179.2.5.14 integer read-write
Enable or disable caching of credentials locally for RADIUS Auth servers. This is used when a client uses a one time password authentication scheme. Enumeration: 'enable': 1, 'disable': 0.
         bsnAAAMacDelimiter 1.3.6.1.4.1.14179.2.5.15 integer read-write
The delimiter to be used for mac filtering. It can be colon as in xx:xx:xx:xx:xx:xx or hyphen as in xx-xx-xx-xx-xx-xx or single hyphen as in xxxxxx-xxxxxx or no delimiter as in xxxxxxxxxxxx. Enumeration: 'singleHyphen': 3, 'hyphen': 2, 'colon': 1, 'noDelimiter': 0.
         bsnAAARadiusCompatibilityMode 1.3.6.1.4.1.14179.2.5.16 integer read-write
The required compatibility mode for MAC filtering. For ciscoACS, the expected MAC delimiter setting is colon and for orinocoRadius, it is singleHyphen. Enumeration: 'orinocoRadius': 1, 'other': 2, 'ciscoACS': 0.
         bsnAAARadiusCallStationIdType 1.3.6.1.4.1.14179.2.5.17 integer read-write
This attribute configures the call station ID information sent in RADIUS messages. The value undefined cannot be set during the write operation. Enumeration: 'apName': 5, 'macAddr': 1, 'apNameSsid': 4, 'apLocation': 8, 'apGroupName': 6, 'ipAddr': 0, 'apMacAddressSsid': 3, 'apMacEthAddress': 10, 'apMacEthAddressSsid': 11, 'apLabelAddressSsid': 13, 'apMacAddress': 2, 'flexGroupName': 7, 'apLabelAddress': 12, 'apVlanId': 9.
         bsnExternalPolicyServerAclName 1.3.6.1.4.1.14179.2.5.18 displaystring read-write
This attribute configures the ACL Name for External Policy Servers
         bsnExternalPolicyServerTable 1.3.6.1.4.1.14179.2.5.19 no-access
The (conceptual) table listing the External Policy servers with which client share a secret.
               bsnExternalPolicyServerEntry 1.3.6.1.4.1.14179.2.5.19.1 no-access
An entry (conceptual row) representing an External policy server with which the client shares a secret.
                   bsnExternalPolicyServerIndex 1.3.6.1.4.1.14179.2.5.19.1.1 integer32 read-only
A number uniquely identifying each External Policy server with which this client communicates.
                   bsnExternalPolicyServerAddress 1.3.6.1.4.1.14179.2.5.19.1.2 ipaddress read-only
The IP address of the External Policy server referred to in this table entry.
                   bsnExternalPolicyServerPortNumber 1.3.6.1.4.1.14179.2.5.19.1.3 integer32 read-only
The UDP port the client is using to send requests to this server.
                   bsnExternalPolicyServerKey 1.3.6.1.4.1.14179.2.5.19.1.4 octet string read-only
The authentication and encryption key shared between the client and this External Policy Server.
                   bsnExternalPolicyServerAdminStatus 1.3.6.1.4.1.14179.2.5.19.1.5 integer read-only
Server enable or disable status. Enumeration: 'enable': 1, 'disable': 0.
                   bsnExternalPolicyServerConnectionStatus 1.3.6.1.4.1.14179.2.5.19.1.6 integer read-only
Server enable or disable status. Enumeration: 'connected': 1, 'disconnected': 0.
                   bsnExternalPolicyServerRowStatus 1.3.6.1.4.1.14179.2.5.19.1.26 rowstatus read-only
Row Status for creation/deletion
         bsnAAALocalDatabaseSize 1.3.6.1.4.1.14179.2.5.20 integer32 read-write
This attribute is the total number of entries permitted in the local users database. This is the combined total of entries for Local Management Users, Local Net Users, Disabled Clients (previously known as blacklistclients and the MAC Filters. If the database size limit is reached, no more entries in any of these user lists are allowed to be created. To continue creating more entries, one should increase the size of the database. This value is applied on reboot and then matches the bsnAACurrentLocalDatabaseSize.
         bsnAAACurrentLocalDatabaseSize 1.3.6.1.4.1.14179.2.5.21 integer32 read-only
This attribute is the maximum number of entries in the local users database that is effective currently. This is the combined total of entries for Local Management Users, Local Net Users, Disabled Clients (previously known as blacklist clients) and the MAC Filters.
         bsnAPAuthorizationTable 1.3.6.1.4.1.14179.2.5.22 no-access
The table listing AP Authorization entries
               bsnAPAuthorizationEntry 1.3.6.1.4.1.14179.2.5.22.1 no-access
BsnAPAuthorizationEntry
                   bsnAPAuthMacAddress 1.3.6.1.4.1.14179.2.5.22.1.1 octet string read-only
MAC Address of the AP entry
                   bsnAPAuthCertificateType 1.3.6.1.4.1.14179.2.5.22.1.2 integer read-only
Supported certificate types are MIC, SSC (Self-Signed-Certificate) or no certificate. Enumeration: 'locSsc': 4, 'none': 5, 'unknown': 0, 'mic': 1, 'locMic': 3, 'ssc': 2, 'locSsc256': 6.
                   bsnAPAuthHashKey 1.3.6.1.4.1.14179.2.5.22.1.3 octet string read-only
SHA1 hash key for SSC certificate validation. It has to be 40/64 hexa-decimal characters. This is considered when certificate type is SSC.
                   bsnAPAuthRowStatus 1.3.6.1.4.1.14179.2.5.22.1.20 rowstatus read-only
Row Status
     bsnTrap 1.3.6.1.4.1.14179.2.6
         bsnTrapControl 1.3.6.1.4.1.14179.2.6.1
             bsnDot11StationTrapControlMask 1.3.6.1.4.1.14179.2.6.1.1 unsigned32 read-write
This mask describes what events merit traps to network management. If the bit for a particular event is turned on then notification will be generated on event occurence. Event corresponding value ----- ----------------- bsnDot11StationDisassociate 1 bsnDot11StationDeauthenticate 2 bsnDot11StationAuthenticateFail 4 bsnDot11StationAssociateFail 8 bsnDot11StationBlacklisted 16 bsnDot11StationAssociate 32 ciscoLwappDot11ClientMovedToRunState 64 By Default all bits are off.
             bsnAPTrapControlMask 1.3.6.1.4.1.14179.2.6.1.2 unsigned32 read-write
This mask describes what events merit traps to network management. If the bit for a particular event is turned on then notification will be generated on event occurance. Event corresponding bit ----- ----------------- bsnAPAssociate/Disassociate 1 bsnAPIfUp/Down 4 bsnAPAuthorizationFailureCause 16 bsnAPModeChanged 32 bsnAPTimeSyncFailure 64 By Default all bits are on.
             bsnAPProfileTrapControlMask 1.3.6.1.4.1.14179.2.6.1.3 unsigned32 read-write
This mask describes what events merit traps to network management. If the bit for a particular event is turned on then notification will be generated on event occurance. Event corresponding bit ----- ----------------- LoadProfileFail 1 NoiseProfileFail 2 InterferenceProfileFail 4 CoverageProfileFailed 8
             bsnAPParamUpdateTrapControlMask 1.3.6.1.4.1.14179.2.6.1.4 unsigned32 read-write
Mac Parameters are updated for a Airespace AP interface whenever Dynamic Algorithm are run. This mask describes what update events merit traps to network management. If the bit for a particular event is turned on then notification will be generated on event occurance. Event corresponding bit ----- ----------------- TxPowerChange 1 ChannelChange 2 AntennaChange 4 RTSCTSThresholdChange 8 EDThresholdChange 16 FragmentationThresholdChange 32
             bsnIpsecTrapsMask 1.3.6.1.4.1.14179.2.6.1.5 unsigned32 read-write
This mask describes what events merit traps to network management. If the bit for a particular event is turned on then notification will be generated on event occurance. Event corresponding bit ----- ----------------- bsnIpsecEspAuthFailureTrap 1 bsnIpsecEspReplayFailureTrap 2 bsnIpsecEspPolicyFailureTrap 4 bsnIpsecEspInvalidSpiTrap 8 bsnIpsecOtherPolicyFailureTrap 16 bsnIpsecIkeNegFailure 32 bsnIpsecSuiteNegFailure 64 bsnIpsecInvalidCookieTrap 128
             bsnRogueAPTrapEnable 1.3.6.1.4.1.14179.2.6.1.6 integer read-write
If Rogue AP Detection and Removed Traps need to be sent Enumeration: 'enable': 1, 'disable': 0.
             bsnRADIUSServerTrapEnable 1.3.6.1.4.1.14179.2.6.1.7 integer read-write
if RADIUS Server Traps need to be sent Enumeration: 'enable': 1, 'disable': 0.
             bsnAuthenticationFailureTrapEnable 1.3.6.1.4.1.14179.2.6.1.8 integer read-write
If Authentication Failure Traps need to be sent Enumeration: 'enable': 1, 'disable': 0.
             bsnConfigSaveTrapEnable 1.3.6.1.4.1.14179.2.6.1.9 integer read-write
If Rogue AP Detection and Removed Traps need to be sent Enumeration: 'enable': 1, 'disable': 0.
             bsn80211SecurityTrapControlMask 1.3.6.1.4.1.14179.2.6.1.10 unsigned32 read-write
This mask is for Security related trap controls. Event corresponding bit ----- ----------------- bsnWepKeyDecryptError 1 bsnSignatureAttackDetected 2 By Default all bits are off.
             bsnWpsTrapControlEnable 1.3.6.1.4.1.14179.2.6.1.11 integer read-write
This control is for WPS(Wireless Intrusion Protection System) related traps. Enumeration: 'enable': 1, 'disable': 0.
         bsnTrapVariable 1.3.6.1.4.1.14179.2.6.2
             bsnAuthFailureUserName 1.3.6.1.4.1.14179.2.6.2.1 octet string no-access
             bsnAuthFailureUserType 1.3.6.1.4.1.14179.2.6.2.2 integer no-access
Enumeration: 'wlanUser': 2, 'mgmtUser': 1, 'macFilter': 3.
             bsnRemoteIPv4Address 1.3.6.1.4.1.14179.2.6.2.3 ipaddress no-access
             bsnIpsecErrorCount 1.3.6.1.4.1.14179.2.6.2.4 integer32 no-access
             bsnIpsecSPI 1.3.6.1.4.1.14179.2.6.2.5 integer32 no-access
             bsnRemoteUdpPort 1.3.6.1.4.1.14179.2.6.2.6 integer32 no-access
             bsnIkeAuthMethod 1.3.6.1.4.1.14179.2.6.2.7 integer32 no-access
             bsnIkeTotalInitFailures 1.3.6.1.4.1.14179.2.6.2.8 integer32 no-access
             bsnIkeTotalInitNoResponses 1.3.6.1.4.1.14179.2.6.2.9 integer32 no-access
             bsnIkeTotalRespFailures 1.3.6.1.4.1.14179.2.6.2.10 integer32 no-access
             bsnNotifiesSent 1.3.6.1.4.1.14179.2.6.2.11 integer32 no-access
             bsnNotifiesReceived 1.3.6.1.4.1.14179.2.6.2.12 integer32 no-access
             bsnSuiteInitFailures 1.3.6.1.4.1.14179.2.6.2.13 integer32 no-access
             bsnSuiteRespondFailures 1.3.6.1.4.1.14179.2.6.2.14 integer32 no-access
             bsnInitiatorCookie 1.3.6.1.4.1.14179.2.6.2.15 octet string no-access
The initiator cookie used in an ISAKMP message, to be associated with a trap.
             bsnResponderCookie 1.3.6.1.4.1.14179.2.6.2.16 octet string no-access
The responder cookie used in an ISAKMP message, to be associated with a trap.
             bsnIsakmpInvalidCookies 1.3.6.1.4.1.14179.2.6.2.17 integer32 no-access
             bsnCurrentRadiosCount 1.3.6.1.4.1.14179.2.6.2.18 integer32 no-access
             bsnLicenseRadioCount 1.3.6.1.4.1.14179.2.6.2.19 integer32 no-access
             bsnAPMacAddrTrapVariable 1.3.6.1.4.1.14179.2.6.2.20 macaddress no-access
             bsnAPNameTrapVariable 1.3.6.1.4.1.14179.2.6.2.21 displaystring no-access
             bsnAPSlotIdTrapVariable 1.3.6.1.4.1.14179.2.6.2.22 integer32 no-access
Number of Radio Interfaces on the Airespace AP.
             bsnAPChannelNumberTrapVariable 1.3.6.1.4.1.14179.2.6.2.23 integer32 no-access
             bsnAPCoverageThresholdTrapVariable 1.3.6.1.4.1.14179.2.6.2.24 integer32 no-access
             bsnAPCoverageFailedClients 1.3.6.1.4.1.14179.2.6.2.25 integer32 no-access
             bsnAPCoverageTotalClients 1.3.6.1.4.1.14179.2.6.2.26 integer32 no-access
             bsnClientMacAddr 1.3.6.1.4.1.14179.2.6.2.27 macaddress no-access
             bsnClientRssi 1.3.6.1.4.1.14179.2.6.2.28 integer32 no-access
             bsnClientSnr 1.3.6.1.4.1.14179.2.6.2.29 integer32 no-access
             bsnInterferenceEnergyBeforeChannelUpdate 1.3.6.1.4.1.14179.2.6.2.30 integer32 no-access
             bsnInterferenceEnergyAfterChannelUpdate 1.3.6.1.4.1.14179.2.6.2.31 integer32 no-access
             bsnAPPortNumberTrapVariable 1.3.6.1.4.1.14179.2.6.2.32 integer32 no-access
             bsnMaxRogueCount 1.3.6.1.4.1.14179.2.6.2.33 integer32 no-access
             bsnStationMacAddress 1.3.6.1.4.1.14179.2.6.2.34 macaddress no-access
             bsnStationAPMacAddr 1.3.6.1.4.1.14179.2.6.2.35 macaddress no-access
             bsnStationAPIfSlotId 1.3.6.1.4.1.14179.2.6.2.36 integer no-access
             bsnStationReasonCode 1.3.6.1.4.1.14179.2.6.2.37 integer no-access
unspecified - Unspecified. previousAuthNotValid - Previous Authentication was not valid. deauthenticationLeaving - Leaving due to deauthentication. disassociationDueToInactivity - Disassociation due to Inactivity. disassociationAPBusy - Disassociation since AP was busy. class2FrameFromNonAuthStation - Class 2 frame from non authenticated station. class2FrameFromNonAssStation - Class 2 frame from non associated station. disassociationStaHasLeft - Station has left due to disassociation. staReqAssociationWithoutAuth - Station send association request without authentication. invalidInformationElement - Invalid information element. groupCipherInvalid - Invalid group Cipher. unicastCipherInvalid - Invalid unicast cipher. akmpInvalid - Invalid AKMP. unsupportedRsnVersion - Unsupported RSN version. invalidRsnIeCapabilities - Invalid RSN IE capabilities. cipherSuiteRejected - Cipher suite rejected. missingReasonCode - Reason code is missing. maxAssociatedClientsReached - Maximum allowed associated client number has reached. maxAssociatedClientsReachedOnRadio - Maximum allowed associated client number has reached on radio. maxAssociatedClientsReachedOnWlan - Maximum allowed associated client number has reached on wlan. unSpecifiedQosFailure - Unsupported QOS failure. qosPolicyMismatch - Mismatch on QOS policy. inSufficientBandwidth - Insufficient bandwidth. inValidQosParams - Invalid QOS parameters. Enumeration: 'inSufficientBandwidth': 202, 'qosPolicyMismatch': 201, 'maxAssociatedClientsReachedOnRadio': 105, 'class2FrameFromNonAssStation': 7, 'unSpecifiedQosFailure': 200, 'disassociationStaHasLeft': 8, 'previousAuthNotValid': 2, 'staReqAssociationWithoutAuth': 9, 'unspecified': 1, 'unicastCipherInvalid': 42, 'maxAssociatedClientsReached': 101, 'deauthenticationLeaving': 3, 'unsupportedRsnVersion': 44, 'inValidQosParams': 203, 'disassociationAPBusy': 5, 'invalidInformationElement': 40, 'groupCipherInvalid': 41, 'cipherSuiteRejected': 46, 'class2FrameFromNonAuthStation': 6, 'missingReasonCode': 99, 'maxAssociatedClientsReachedOnWlan': 106, 'disassociationDueToInactivity': 4, 'akmpInvalid': 43, 'invalidRsnIeCapabilities': 45.
             bsnStationBlacklistingReasonCode 1.3.6.1.4.1.14179.2.6.2.38 integer no-access
Enumeration: 'ipTheft': 3, 'failedWebAuth': 5, 'failed80211Auth': 1, 'failedAssociation': 2, 'failed8021xAuth': 4.
             bsnStationUserName 1.3.6.1.4.1.14179.2.6.2.39 displaystring no-access
The user name of a client. This is used for the Client Associated trap. It may be null when not known.
             bsnRogueAPOnWiredNetwork 1.3.6.1.4.1.14179.2.6.2.40 integer no-access
This is the flag used on the bsnRogueAPDetected trap to state if the rogue is found on the wired network. Typically, after a rogue is found, there may be another bsnRogueAPDetected trap that will have the value of this flag 1 if the rogue is detected on the wired network. Enumeration: 'yes': 1, 'no': 0.
             bsnNavDosAttackSourceMacAddr 1.3.6.1.4.1.14179.2.6.2.41 macaddress no-access
MAC address generating the attack.
             bsnWlanIdTrapVariable 1.3.6.1.4.1.14179.2.6.2.42 integer no-access
WLAN ID used by the client when the WPA MIC error counter measure was activated.
             bsnUserIpAddress 1.3.6.1.4.1.14179.2.6.2.43 ipaddress no-access
             bsnRogueAdhocMode 1.3.6.1.4.1.14179.2.6.2.44 integer no-access
This is the flag used on the bsnRogueAPDetected trap to state if the rogue found is an Adhoc rogue or it is an AP. Enumeration: 'yes': 1, 'no': 0.
             bsnClearTrapVariable 1.3.6.1.4.1.14179.2.6.2.45 integer no-access
This is the flag is used to indicate if this is a clear trap for the original alert or not. Enumeration: 'true': 1, 'false': 0.
             bsnDuplicateIpTrapVariable 1.3.6.1.4.1.14179.2.6.2.46 ipaddress no-access
This field is used on the bsnDuplicateIpAddressReported trap to contain the IP Address in question when switch or an AP detected a duplicate IP Address on another machine.
             bsnDuplicateIpTrapClear 1.3.6.1.4.1.14179.2.6.2.47 integer no-access
This is the flag used to indicate clear state for the bsnDuplicateIpAddressReported trap. Enumeration: 'true': 1, 'false': 0.
             bsnDuplicateIpReportedByAP 1.3.6.1.4.1.14179.2.6.2.48 integer no-access
This is the flag used on the bsnDuplicateIpAddressReported trap to indicate whether the switch or an AP detected a duplicate IP Address on another machine. Enumeration: 'yes': 1, 'no': 0.
             bsnTrustedApRadioPolicyRequired 1.3.6.1.4.1.14179.2.6.2.49 integer no-access
This is the radio policy required by a trusted Rogue. Enumeration: 'dot11bg': 3, 'none': 0, 'dot11b': 1, 'dot11a': 2.
             bsnTrustedApEncryptionUsed 1.3.6.1.4.1.14179.2.6.2.50 integer no-access
This is the encryption type used by a trusted Rogue. Enumeration: 'none': 0, 'wep': 2, 'open': 1, 'wpa': 3.
             bsnTrustedApEncryptionRequired 1.3.6.1.4.1.14179.2.6.2.51 integer no-access
This is the encryption type required by a trusted Rogue. Enumeration: 'none': 0, 'wep': 2, 'open': 1, 'wpa': 3.
             bsnTrustedApRadioPolicyUsed 1.3.6.1.4.1.14179.2.6.2.52 integer no-access
This is the radio policy used by a trusted Rogue. Enumeration: 'dot11bg': 3, 'none': 0, 'dot11b': 1, 'dot11a': 2.
             bsnNetworkType 1.3.6.1.4.1.14179.2.6.2.53 integer no-access
Enumeration: 'dot11b': 1, 'dot11a': 2.
             bsnNetworkState 1.3.6.1.4.1.14179.2.6.2.54 integer no-access
Enumeration: 'enable': 1, 'disable': 0.
             bsnSignatureType 1.3.6.1.4.1.14179.2.6.2.55 integer no-access
Type of Signature whose attack is detected by the switch. Enumeration: 'custom': 1, 'standard': 0.
             bsnSignatureName 1.3.6.1.4.1.14179.2.6.2.56 displaystring no-access
Name of the Signature whose attack is detected by the switch.
             bsnSignatureDescription 1.3.6.1.4.1.14179.2.6.2.57 displaystring no-access
Description of the Signature whose attack is detected by the switch.
             bsnImpersonatedAPMacAddr 1.3.6.1.4.1.14179.2.6.2.58 macaddress no-access
MAC Address of the AP impersonated by another AP.
             bsnTrustedApPreambleUsed 1.3.6.1.4.1.14179.2.6.2.59 integer no-access
The Preamble on this detecting AP. Enumeration: 'none': 0, 'short': 1, 'long': 2.
             bsnTrustedApPreambleRequired 1.3.6.1.4.1.14179.2.6.2.60 integer no-access
The Preamble on this detecting AP. Enumeration: 'none': 0, 'short': 1, 'long': 2.
             bsnSignatureAttackPreced 1.3.6.1.4.1.14179.2.6.2.61 integer no-access
The preced in the standard/custom signature list.
             bsnSignatureAttackFrequency 1.3.6.1.4.1.14179.2.6.2.62 integer no-access
The preced in the standard/custom signature list.
             bsnSignatureAttackChannel 1.3.6.1.4.1.14179.2.6.2.63 integer no-access
The preced in the standard/custom signature list.
             bsnSignatureAttackerMacAddress 1.3.6.1.4.1.14179.2.6.2.64 macaddress no-access
The MAC address of the Attacker's mac-interface.
             bsnLicenseKeyTrapVariable 1.3.6.1.4.1.14179.2.6.2.65 octet string no-access
This is the license key that has been found to be deleted, expired or is mismatched causing AP functionality to be disabled on the switch.
             bsnApFunctionalityDisableReasonCode 1.3.6.1.4.1.14179.2.6.2.66 integer no-access
This is the reason why the AP functionality was disabled on the switch. It could be either expiry or deletion or mismatch found of the license key. Enumeration: 'licenseKeyExpired': 1, 'unknown': 0, 'licenseKeyDeleted': 2, 'licenseKeyFeatureMismatch': 3.
             bsnLicenseKeyFeatureSetTrapVariable 1.3.6.1.4.1.14179.2.6.2.67 integer no-access
This is the switch feature set whose license key has expired or is deleted or is mismatched. To enable the AP functionality again, the license key for this feature set should be re-configured. Enumeration: 'all': 2, 'wps': 1.
             bsnApRegulatoryDomain 1.3.6.1.4.1.14179.2.6.2.68 integer no-access
The regulatory domain configured on an AP. Enumeration: 'a': 0, 'c': 16, 'e': 1, 'i': 6, 'k': 32, 'j': 9, 'n': 21, 'p': 33, 's': 34, 'r': 48, 't': 35, 'notavailable': 65535.
             bsnAPAuthorizationFailureCause 1.3.6.1.4.1.14179.2.6.2.69 integer no-access
This denotes the reason for AP authorization failure. [entrydoesnotexist]: The AP has not been added to Controller's AP Authorization List. [keymismatch]: The key entry in Controller's AP Authorization list does not match the SHA1 key received from the AP. [invalidCert]: Could not verify the self signed Certificate. [entryIsMIC]: AP has Self Signed Certificate where as in Controller AP Authorization list has Manufactured Installed Certificate [aaaEntryDoesNotExist]: RADIUS authorization for the AP failed. [unknown]: Default. Enumeration: 'unknown': 0, 'invalidCertifcate': 3, 'keymismatch': 1, 'entrydoesnotexist': 2, 'aaaEntryDoesNotExist': 5, 'entryIsMIC': 4.
             bsnAPIfUpDownCause 1.3.6.1.4.1.14179.2.6.2.70 integer no-access
This denotes the reason for AP If up or down normal - radio Failure - radio failed radioLowPower - AP is not able draw enough power. maxRetransmission - max retransmission of AP Reached. echoTimeout - heartbeat timeout. configAP - admin enable/disable AP configRadio - admin enable/disable config radio configNetwork - admin enable/disable network adminConfigured - admin configuration missedRekey - Missed Rekey detectingInLinePower - Detecting in-line power newDiscovery - New Discovery Enumeration: 'adminConfigured': 8, 'maxRetransmission': 3, 'unknown': 0, 'configRadio': 6, 'radioFailure': 1, 'echoTimeout': 4, 'radioLowPower': 2, 'missedRekey': 9, 'newDiscovery': 11, 'configAP': 5, 'configNetwork': 7, 'detectingInLinePower': 10.
             bsnAPInvalidRadioType 1.3.6.1.4.1.14179.2.6.2.71 integer no-access
Radio types which are not supported by controller. Enumeration: 'unsupportedRadio': 0.
             locationNotifyContent 1.3.6.1.4.1.14179.2.6.2.72 octet string no-access
This is the content of the notification.
             bsnSignatureMacInfo 1.3.6.1.4.1.14179.2.6.2.73 bsntxtsignaturemacinfo no-access
This object defines the pattern followed by the LWAPP APs to perform signature analysis with this signature and report the results to the Controller.
             bsnImpersonatingSourceMacAddr 1.3.6.1.4.1.14179.2.6.2.74 macaddress no-access
This is the source mac address which is impersonating the AP.
             bsnAPPreviousChannelNumberTrapVariable 1.3.6.1.4.1.14179.2.6.2.83 integer32 no-access
             bsnAPReasonCodeTrapVariable 1.3.6.1.4.1.14179.2.6.2.84 bits no-access
Bits: 'load': 4, 'noReason': 0, 'noise': 2, 'majorSIAQEvent': 7, 'radarClear': 8, 'signal': 1, 'interference': 3, 'deviceAware': 6, 'radar': 5, 'userInput': 9.
             bsnNoiseBeforeChannelUpdate 1.3.6.1.4.1.14179.2.6.2.85 integer32 no-access
             bsnNoiseAfterChannelUpdate 1.3.6.1.4.1.14179.2.6.2.86 integer32 no-access
             bsnInterferenceBeforeChannelUpdate 1.3.6.1.4.1.14179.2.6.2.87 integer32 no-access
             bsnInterferenceAfterChannelUpdate 1.3.6.1.4.1.14179.2.6.2.88 integer32 no-access
         bsnTraps 1.3.6.1.4.1.14179.2.6.3
             bsnDot11StationDisassociate 1.3.6.1.4.1.14179.2.6.3.1
The disassociate notification shall be sent when the Station sends a Disassociation frame. The value of the notification shall include the MAC address of the MAC to which the Disassociation frame was sent and the reason for the disassociation
             bsnDot11StationDeauthenticate 1.3.6.1.4.1.14179.2.6.3.2
The deauthenticate notification shall be sent when the Station sends a Deauthentication frame. The value of the notification shall include the MAC address of the MAC to which the Deauthentication frame was sent and the reason for the deauthentication.
             bsnDot11StationAuthenticateFail 1.3.6.1.4.1.14179.2.6.3.3
The authenticate failure notification shall be sent when the Station sends an Authentication frame with a status code other than 'successful'. The value of the notification shall include the MAC address of the MAC to which the Authentication frame was sent and the reason for the authentication failure.
             bsnDot11StationAssociateFail 1.3.6.1.4.1.14179.2.6.3.4
The associate failure notification shall be sent when the Station sends an Association frame with a status code other than 'successful'. The value of the notification shall include the MAC address of the MAC to which the Authentication frame was sent and the reason for the authentication failure.
             bsnAPUp 1.3.6.1.4.1.14179.2.6.3.5
When Airespace AP operation status goes up this trap will be sent
             bsnAPDown 1.3.6.1.4.1.14179.2.6.3.6
When Airespace AP operation status goes down this trap will be sent
             bsnAPAssociated 1.3.6.1.4.1.14179.2.6.3.7
When Airespace AP Associates to a Airespace Switch, AP associated notification will be sent with dot3 MAC address of Airespace AP.This will help management system to discover Airespace AP and add to system.
             bsnAPDisassociated 1.3.6.1.4.1.14179.2.6.3.8
When Airespace AP disassociates from Airespace Switch, AP disassociated notification will be sent with dot3 MAC address of Airespace AP management system to remove Airespace AP from this Airespace Switch
             bsnAPIfUp 1.3.6.1.4.1.14179.2.6.3.9
When Airespace AP's interface's operation status goes up this trap will be sent
             bsnAPIfDown 1.3.6.1.4.1.14179.2.6.3.10
When Airespace AP's interface's operation status goes down this trap will be sent.
             bsnAPLoadProfileFailed 1.3.6.1.4.1.14179.2.6.3.11
When LOAD Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF. This trap sending can be enable/disable using bsnRrmProfileTrapControlFlag
             bsnAPNoiseProfileFailed 1.3.6.1.4.1.14179.2.6.3.12
When Noise Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF. This trap sending can be enable/disable using bsnRrmProfileTrapControlFlag
             bsnAPInterferenceProfileFailed 1.3.6.1.4.1.14179.2.6.3.13
When Interference Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF. This trap sending can be enable/disable using bsnRrmProfileTrapControlFlag
             bsnAPCoverageProfileFailed 1.3.6.1.4.1.14179.2.6.3.14
When Coverage Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF. This trap sending can be enable/disable using bsnRrmProfileTrapControlFlag
             bsnAPCurrentTxPowerChanged 1.3.6.1.4.1.14179.2.6.3.15
Whenever dynamic algorithms are running and bsnAPIfPhyPowerAutomaticOn is true, Airespace AP Interface's CurrentTxPower might get updated by algorithm. When this occurs notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF along with the currentTxPower for this Airespace AP IF
             bsnAPCurrentChannelChanged 1.3.6.1.4.1.14179.2.6.3.16
Whenever dynamic algorithms are running and bsnAPIfPhyChannelAutomaticOn is true, Airespace AP Interface's CurrentChannel might get updated by algorithm. When this occurs notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF along with the currentChannel for this Airespace AP IF
             bsnRrmDot11aGroupingDone 1.3.6.1.4.1.14179.2.6.3.21
When Grouping is done, this notification will be sent from the previous Group Leader where grouping algorithm was run. It has MAC address of the new Group Leader.
             bsnRrmDot11bGroupingDone 1.3.6.1.4.1.14179.2.6.3.22
When Grouping is done, this notification will be sent from the previous Group Leader where grouping algorithm was run. It has MAC address of the new Group Leader.
             bsnConfigSaved 1.3.6.1.4.1.14179.2.6.3.23
When configuration is save either from CLI or web interface This trap will be sent to inform NMS to do refresh
             bsnDot11EssCreated 1.3.6.1.4.1.14179.2.6.3.24
Whenever a new Ess (WLAN) is created, this notification will be sent along with EssIndex
             bsnDot11EssDeleted 1.3.6.1.4.1.14179.2.6.3.25
Whenever a Ess (WLAN)is deleted, this notification will be sent along with EssIndex
             bsnRADIUSServerNotResponding 1.3.6.1.4.1.14179.2.6.3.26
This trap is to indicate that no RADIUS server(s) are responding to authentication requests sent by the RADIUS client within the MWAR device(Switch).
             bsnAuthenticationFailure 1.3.6.1.4.1.14179.2.6.3.27
This trap is to inform that client authentication failure has occured at MWAR(Switch). This could be cli/web user, wlan user, or Mac Authorized user. ServiceType will indicate which type of user it is and userName will be cli/web/wlan userName or MacAddress of Mac Authorized User
             bsnIpsecEspAuthFailureTrap 1.3.6.1.4.1.14179.2.6.3.28
IPsec packets with invalid hashes were found in an inbound ESP SA. The total number of authentication errors accumulated is sent for the specific row of the ipsecSaEspInTable table for the SA; this provides the identity of the SA in which the error occurred. Implementations SHOULD send one trap per SA (within a reasonable time period), rather than sending one trap per packet.
             bsnIpsecEspReplayFailureTrap 1.3.6.1.4.1.14179.2.6.3.29
IPsec packets with invalid sequence numbers were found in an inbound ESP SA. The total number of replay errors accumulated is sent for the specific row of the ipsecSaEspInTable table for the SA; this provides the identity of the SA in which the error occurred. Implementations SHOULD send one trap per SA (within a reasonable time period), rather than sending one trap per packet.
             bsnIpsecEspInvalidSpiTrap 1.3.6.1.4.1.14179.2.6.3.31
A packet with an unknown SPI was detected from the specified peer with the specified SPI using the specified protocol. The destination address of the received packet is specified by ipsecLocalAddress. The value ifIndex may be 0 if this optional linkage is unsupported. If the object ipsecSecurityProtocol has the value for IPcomp, then the ipsecSPI object is the CPI of the packet. Implementations SHOULD send one trap per peer (within a reasonable time period), rather than sending one trap per packet.
             bsnIpsecIkeNegFailure 1.3.6.1.4.1.14179.2.6.3.33
An attempt to negotiate a phase 1 IKE SA failed. The notification counts are also sent as part of the trap, along with the current value of the total negotiation error counters for ISAKMP.
             bsnIpsecSuiteNegFailure 1.3.6.1.4.1.14179.2.6.3.34
An attempt to negotiate a phase 2 SA suite for the specified selector failed. The current total failure counts are passed as well as the notification type counts for the notify involved in the failure.
             bsnIpsecInvalidCookieTrap 1.3.6.1.4.1.14179.2.6.3.35
ISAKMP packets with invalid cookies were detected from the specified source, intended for the specified destination. The initiator and responder cookies are also sent with the trap. The current count is sent to allow the trap to accurately relfect dropped and throttled traps. Implementations SHOULD send one trap per peer (within a reasonable time period, rather than sending one trap per packet.
             bsnRogueAPDetected 1.3.6.1.4.1.14179.2.6.3.36
When a Rogue AP is detected this Trap will be sent out along with APMacAddress on which its detected
             bsnAPLoadProfileUpdatedToPass 1.3.6.1.4.1.14179.2.6.3.37
When LOAD Profile state changes from FAIL to PASSt this notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF. This trap sending can be enable/disable using bsnRrmProfileTrapControlFlag
             bsnAPNoiseProfileUpdatedToPass 1.3.6.1.4.1.14179.2.6.3.38
When Noise Profile state changes from FAIL tp PASS, notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF. This trap sending can be enable/disable using bsnRrmProfileTrapControlFlag
             bsnAPInterferenceProfileUpdatedToPass 1.3.6.1.4.1.14179.2.6.3.39
When Interference Profile state changes from FAIL tp PASS, notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF. This trap sending can be enable /disable using bsnRrmProfileTrapControlFlag
             bsnAPCoverageProfileUpdatedToPass 1.3.6.1.4.1.14179.2.6.3.40
When Coverage Profile state changes from FAIL tp PASS, notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF. This trap sending can be enable/disable using bsnRrmProfileTrapControlFlag
             bsnRogueAPRemoved 1.3.6.1.4.1.14179.2.6.3.41
When a Rogue AP that was detected earlier no longer exists this Trap will be sent out along with APMacAddress on which its detected
             bsnRadiosExceedLicenseCount 1.3.6.1.4.1.14179.2.6.3.42
Whenever the currently associated Radios exceed the License Count This trap will be sent to annoy the Customer
             bsnSensedTemperatureTooHigh 1.3.6.1.4.1.14179.2.6.3.43
Temperature sensor temp too High - temp is too high on the unit. Immediate action should be taken
             bsnSensedTemperatureTooLow 1.3.6.1.4.1.14179.2.6.3.44
Temperature sensor temp too Low - temp is too high on the unit. Immediate action should be taken
             bsnTemperatureSensorFailure 1.3.6.1.4.1.14179.2.6.3.45
Temperature sensor hw failure - temp sensor has failed. Temperature is unknown
             bsnTemperatureSensorClear 1.3.6.1.4.1.14179.2.6.3.46
Temperature sensor clear -- temp sensor alarm condition is over. sensor is operating within proper temp range
             bsnPOEControllerFailure 1.3.6.1.4.1.14179.2.6.3.47
POE Controller has failed. Its a very critical trap. User intervention is required.
             bsnMaxRogueCountExceeded 1.3.6.1.4.1.14179.2.6.3.48
The number of rogues has exceeded the maximum Rogues allowed
             bsnMaxRogueCountClear 1.3.6.1.4.1.14179.2.6.3.49
The number of rogues is within the maximum Rogues allowed
             bsnApMaxRogueCountExceeded 1.3.6.1.4.1.14179.2.6.3.50
The number of rogues has exceeded the maximum Rogues allowed on the AP
             bsnApMaxRogueCountClear 1.3.6.1.4.1.14179.2.6.3.51
The number of rogues is within the maximum Rogues allowed on the AP
             bsnDot11StationBlacklisted 1.3.6.1.4.1.14179.2.6.3.52
The station blacklisted notification shall be sent when the client is blacklisted. The reason could be repeated auth or association failures or IP Address theft. The value of the notification shall include the MAC address of the MAC to which the Authentication frame was sent, the MAC and Slot Id of AP that client was associated to and the reason for black listing.
             bsnDot11StationAssociate 1.3.6.1.4.1.14179.2.6.3.53
The associate notification shall be sent when any of the watchlisted clients(present on at least one watch list) associates with an AP. The value of the notification shall include the MAC address and the Slot ID of the radio to which the station Associated.
             bsnApBigNavDosAttack 1.3.6.1.4.1.14179.2.6.3.55
The AP sent a string of messages with large NAV field. This is most likely a malicious denial of service attack.
             bsnTooManyUnsuccessLoginAttempts 1.3.6.1.4.1.14179.2.6.3.56
The Management User made too many unsuccessful login attempts.
             bsnWepKeyDecryptError 1.3.6.1.4.1.14179.2.6.3.57
Issued when a decrypt error occurrs. The WEP Key configured at the station may be wrong.
             bsnWpaMicErrorCounterActivated 1.3.6.1.4.1.14179.2.6.3.58
Issued when a WPA MIC error occurs and a counter measure is activated at the AP.
             bsnRogueAPDetectedOnWiredNetwork 1.3.6.1.4.1.14179.2.6.3.59
When a Rogue is detected on the wired network this trap will be sent out. The same trap with bsnRogueAPOnWiredNetwork set to no will clear the previous trap.
             bsnApHasNoRadioCards 1.3.6.1.4.1.14179.2.6.3.60
When an AP has no radio cards present on it, the switch sends this trap.
             bsnDuplicateIpAddressReported 1.3.6.1.4.1.14179.2.6.3.61
This trap is issued when the switch or an AP detects another machine using its IP Address. The first variable has value yes if the duplicate IP is reported by an AP. In that case, the second attribute will carry the AP MAC Address. The third variable is the duplicate IP address in question and the last attribute is the MAC Address of the machine that is found to be using the duplicate IP.
             bsnAPContainedAsARogue 1.3.6.1.4.1.14179.2.6.3.62
When our AP detects that it is being contained by another AP, this trap is issued. The clear flag is true if the AP is no longer being contained.
             bsnTrustedApHasInvalidSsid 1.3.6.1.4.1.14179.2.6.3.63
Issued when a Trusted Rogue AP is auto contained for advertising invalid SSID. If the clear variable has value true, then the trap clears the earlier alert.
             bsnTrustedApIsMissing 1.3.6.1.4.1.14179.2.6.3.64
Issued when a Trusted Rogue AP is missing or has failed. If the clear variable has value true, then the trap clears the earlier alert.
             bsnAdhocRogueAutoContained 1.3.6.1.4.1.14179.2.6.3.65
Issued when an Adhoc Rogue is auto contained. If the clear variable has value true, then the trap clears the earlier alert.
             bsnRogueApAutoContained 1.3.6.1.4.1.14179.2.6.3.66
Issued when a Rogue AP is auto contained for advertising our SSID. If the clear variable has value true, then the trap clears the earlier alert.
             bsnTrustedApHasInvalidEncryption 1.3.6.1.4.1.14179.2.6.3.67
Issued when a Trusted Rogue AP is auto contained for using invalid encryption. The second param is for the encryption used and the third param is for encryption required. If the clear variable has value true, then the trap clears the earlier alert.
             bsnTrustedApHasInvalidRadioPolicy 1.3.6.1.4.1.14179.2.6.3.68
Issued when a Trusted Rogue AP is auto contained for using invalid radio policy. The second param is for the radio policy used and the third param is for radio policy required. If the clear variable has value true, then the trap clears the earlier alert.
             bsnNetworkStateChanged 1.3.6.1.4.1.14179.2.6.3.69
When the 802.11a or b/g network state is changed this trap is issued.
             bsnSignatureAttackDetected 1.3.6.1.4.1.14179.2.6.3.70
This trap is sent out when a signature attack is detected by the switch. The standard and custom signatures are predefined on the switch (see bsnSignatureConfig group). The signatures also defines if its detection should be reported. The trap variables bsnSignatureName and bsnSignatureDescription are retrieved from the detected signature definition. Clear Trap Variable is turned on when the signature attack stops. The signature's quiet time configuration speicifes the time after which the clear trap would be sent. bsnSignatureMacInfo indicates whether the signature is used to track pattern matches for all source MAC addresses together or seperately for individual source MAC addresses. bsnSignatureAttackFrequency will carry the value for a specific MAC address or for all MAC addresses depending on bsnSignatureMacInfo.
             bsnAPRadioCardTxFailure 1.3.6.1.4.1.14179.2.6.3.71
This trap is sent by the switch when a radio card on an AP stops transmitting.
             bsnAPRadioCardTxFailureClear 1.3.6.1.4.1.14179.2.6.3.72
This trap is sent by the switch when a radio card on an AP starts transmitting again after a prior failure.
             bsnAPRadioCardRxFailure 1.3.6.1.4.1.14179.2.6.3.73
This trap is sent by the switch when a radio card on an AP stops receiving.
             bsnAPRadioCardRxFailureClear 1.3.6.1.4.1.14179.2.6.3.74
This trap is sent by the switch when a radio card on an AP starts receiving again after a prior failure.
             bsnAPImpersonationDetected 1.3.6.1.4.1.14179.2.6.3.75
This trap is sent by the switch when a radio of an authenticated AP hears from another AP whose MAC Address neither matches that of a rogue's and nor is it an authenticated neighbor of the detecting AP.
             bsnTrustedApHasInvalidPreamble 1.3.6.1.4.1.14179.2.6.3.76
Issued when a Trusted Rogue AP is auto contained for using invalid preamble. The second param is for the preamble used and the third param is for preamble required. If the clear variable has value true, then the trap clears the earlier alert.
             bsnAPIPAddressFallback 1.3.6.1.4.1.14179.2.6.3.77
This trap is sent out when an AP, with the configured static ip-address, fails to establish connection with outside world and starts using DHCP as a fallback option.
             bsnAPFunctionalityDisabled 1.3.6.1.4.1.14179.2.6.3.78
This trap is sent out when AP functionality on the switch is disabled because the License key has expired or has been deleted or doesn't match the switch image.
             bsnAPRegulatoryDomainMismatch 1.3.6.1.4.1.14179.2.6.3.79
This trap is generated if an AP's regulatory domain doesn't match the country the switch is configured for. Due to the mismatch, the AP will fail to associate with the Switch.
             bsnRxMulticastQueueFull 1.3.6.1.4.1.14179.2.6.3.80
This trap indicates that the CPU's Receive Multicast Queue is Full.
             bsnRadarChannelDetected 1.3.6.1.4.1.14179.2.6.3.81
This trap is sent when radar signals are detected on the current channel
             bsnRadarChannelCleared 1.3.6.1.4.1.14179.2.6.3.82
This trap will be generated, if a radar trap has been generated earlier, after the expiry of Non-Occupancy Period.
             bsnAPAuthorizationFailure 1.3.6.1.4.1.14179.2.6.3.83
This trap is sent out in case of authorization failure while attempting to associate the AP to the controller. bsnAPDot3MacAddress represents the mac-address of that AP. bsnAPName is name of AP
             radioCoreDumpTrap 1.3.6.1.4.1.14179.2.6.3.84
When radio module in AP dumps core, it informs controller and controller generates this trap. The core file can be retrieved on demand.
             invalidRadioTrap 1.3.6.1.4.1.14179.2.6.3.85
This trap will be generated when an AP has joined is using unsupported radio or a radio slot not currently not being used.
             countryChangeTrap 1.3.6.1.4.1.14179.2.6.3.86
This trap will be generated when an operator changes the country of operation. New country code will be sent in trap.
             unsupportedAPTrap 1.3.6.1.4.1.14179.2.6.3.87
This trap will be generated when unsupported AP try to join 40xx/410x or 3500 with 64MB flash.
             heartbeatLossTrap 1.3.6.1.4.1.14179.2.6.3.88
This trap will be generated when controller loses connection with the Supervisor Switch in which it is physically embedded and doesn't hear the heartbeat keepalives from the Supervisor.
             locationNotifyTrap 1.3.6.1.4.1.14179.2.6.3.89
This trap will be generated by the location server for notifications of location events.
     bsnUtility 1.3.6.1.4.1.14179.2.7
         bsnSyslog 1.3.6.1.4.1.14179.2.7.1
             bsnSyslogEnable 1.3.6.1.4.1.14179.2.7.1.1 integer read-write
Enumeration: 'yes': 1, 'no': 0.
             bsnSyslogRemoteAddress 1.3.6.1.4.1.14179.2.7.1.2 displaystring read-write
This would be the IP Address or host name
         bsnPing 1.3.6.1.4.1.14179.2.7.2
             bsnPingTestTable 1.3.6.1.4.1.14179.2.7.2.1 no-access
PingTest Table
                 bsnPingTestEntry 1.3.6.1.4.1.14179.2.7.2.1.1 no-access
An Entry (conceptual row) in the bsnPingTest Table.
                     bsnPingTestId 1.3.6.1.4.1.14179.2.7.2.1.1.1 integer32 read-only
Test ID
                     bsnPingTestIPAddress 1.3.6.1.4.1.14179.2.7.2.1.1.2 ipaddress read-only
Ip Address to ping
                     bsnPingTestSendCount 1.3.6.1.4.1.14179.2.7.2.1.1.3 integer32 read-only
Number of bytes sent
                     bsnPingTestReceivedCount 1.3.6.1.4.1.14179.2.7.2.1.1.4 integer32 read-only
Number of bytes received.
                     bsnPingTestStatus 1.3.6.1.4.1.14179.2.7.2.1.1.5 integer read-only
Status of the ping test Enumeration: 'inprogress': 1, 'complete': 2.
                     bsnPingTestMaxTimeInterval 1.3.6.1.4.1.14179.2.7.2.1.1.6 unsigned32 read-only
Maximum time interval in msec.
                     bsnPingTestMinTimeInterval 1.3.6.1.4.1.14179.2.7.2.1.1.7 unsigned32 read-only
Minimum time interval in msec.
                     bsnPingTestAvgTimeInterval 1.3.6.1.4.1.14179.2.7.2.1.1.8 unsigned32 read-only
Average time interval in msec.
                     bsnPingTestRowStatus 1.3.6.1.4.1.14179.2.7.2.1.1.25 rowstatus read-only
Row Status
         bsnLinkTest 1.3.6.1.4.1.14179.2.7.3
             bsnLinkTestTable 1.3.6.1.4.1.14179.2.7.3.1 no-access
LinkTest Table
                 bsnLinkTestEntry 1.3.6.1.4.1.14179.2.7.3.1.1 no-access
An Entry (conceptual row) in the bsnLinkTest Table.
                     bsnLinkTestId 1.3.6.1.4.1.14179.2.7.3.1.1.1 integer32 read-only
Link Test ID
                     bsnLinkTestMacAddress 1.3.6.1.4.1.14179.2.7.3.1.1.2 macaddress read-only
MAC Address of link to test
                     bsnLinkTestSendPktCount 1.3.6.1.4.1.14179.2.7.3.1.1.3 integer32 read-only
Number of packets sent.
                     bsnLinkTestSendPktLength 1.3.6.1.4.1.14179.2.7.3.1.1.4 integer32 read-only
Length of sent packet
                     bsnLinkTestReceivedPktCount 1.3.6.1.4.1.14179.2.7.3.1.1.5 integer32 read-only
Number of received packets.
                     bsnLinkTestClientRSSI 1.3.6.1.4.1.14179.2.7.3.1.1.6 integer32 read-only
Client RSSI value of link.
                     bsnLinkTestLocalSNR 1.3.6.1.4.1.14179.2.7.3.1.1.7 integer32 read-only
Local SNR of the link
                     bsnLinkTestLocalRSSI 1.3.6.1.4.1.14179.2.7.3.1.1.8 integer32 read-only
Local RSSI of the link.
                     bsnLinkTestStatus 1.3.6.1.4.1.14179.2.7.3.1.1.9 integer read-only
Status of the link test. Enumeration: 'inprogress': 1, 'complete': 2.
                     bsnLinkTestRowStatus 1.3.6.1.4.1.14179.2.7.3.1.1.30 rowstatus read-only
Row Status
     bsnMobility 1.3.6.1.4.1.14179.2.8
         bsnMobilityConfig 1.3.6.1.4.1.14179.2.8.1
             bsnMobilityProtocolPortNum 1.3.6.1.4.1.14179.2.8.1.1 integer32 read-write
Port Number on which mobility Protocol runs
             bsnMobilityDynamicDiscovery 1.3.6.1.4.1.14179.2.8.1.3 integer read-write
Statically Configured is always enabled if members are defined. To further enable rrm discovery, learned discovery, broadcast discovery, enable/disable this attribute. Enumeration: 'enable': 1, 'disable': 0.
             bsnMobilityStatsReset 1.3.6.1.4.1.14179.2.8.1.4 integer read-write
Reset mobility statistics by setting this atribute to resetNow. If you try to read this attribute value will always be 0. Enumeration: 'default': 0, 'resetNow': 1.
             bsnMobilityGroupMembersTable 1.3.6.1.4.1.14179.2.8.1.10 no-access
MWAR List (statically configured members of the mobility group)
                   bsnMobilityGroupMembersEntry 1.3.6.1.4.1.14179.2.8.1.10.1 no-access
An Entry (conceptual row) in the bsnMobilityGroupMembers Table.
                       bsnMobilityGroupMemberMacAddress 1.3.6.1.4.1.14179.2.8.1.10.1.1 macaddress read-only
Member switch MAC Address
                       bsnMobilityGroupMemberIPAddress 1.3.6.1.4.1.14179.2.8.1.10.1.2 ipaddress read-only
Member switch IP Address
                       bsnMobilityGroupMemberGroupName 1.3.6.1.4.1.14179.2.8.1.10.1.3 displaystring read-only
Member's group name. If left empty while adding a new group member, this assumes the default mobility group name of the switch.
                       bsnMobilityGroupMemberRowStatus 1.3.6.1.4.1.14179.2.8.1.10.1.22 rowstatus read-only
Row Status
             bsnMobilityAnchorsTable 1.3.6.1.4.1.14179.2.8.1.11 no-access
Statically configured mobility anchors
                   bsnMobilityAnchorsEntry 1.3.6.1.4.1.14179.2.8.1.11.1 no-access
An Entry (conceptual row) in the bsnMobilityAnchorsTable Table.
                       bsnMobilityAnchorWlanSsid 1.3.6.1.4.1.14179.2.8.1.11.1.1 displaystring read-only
Local wlan-ssid to connect to Guest/Anchor switch
                       bsnMobilityAnchorSwitchIPAddress 1.3.6.1.4.1.14179.2.8.1.11.1.2 ipaddress read-only
Guest/Anchor switch IP Address
                       bsnMobilityAnchorRowStatus 1.3.6.1.4.1.14179.2.8.1.11.1.20 rowstatus read-only
Row Status
         bsnMobilityStats 1.3.6.1.4.1.14179.2.8.2
             bsnTotalHandoffRequests 1.3.6.1.4.1.14179.2.8.2.1 counter32 read-only
Total handoff requests
             bsnTotalHandoffs 1.3.6.1.4.1.14179.2.8.2.2 counter32 read-only
Total handoffs
             bsnCurrentExportedClients 1.3.6.1.4.1.14179.2.8.2.3 counter32 read-only
Current exported client count
             bsnTotalExportedClients 1.3.6.1.4.1.14179.2.8.2.4 counter32 read-only
Total exported client count
             bsnCurrentImportedClients 1.3.6.1.4.1.14179.2.8.2.5 counter32 read-only
Current Imported client count
             bsnTotalImportedClients 1.3.6.1.4.1.14179.2.8.2.6 counter32 read-only
Total Imported client count
             bsnTotalHandoffErrors 1.3.6.1.4.1.14179.2.8.2.7 counter32 read-only
Total handoff errors
             bsnTotalCommunicationErrors 1.3.6.1.4.1.14179.2.8.2.8 counter32 read-only
Total communication errors
             bsnMobilityGroupDirectoryTable 1.3.6.1.4.1.14179.2.8.2.9 no-access
MWAR List (statically configured members of the mobility group)
                 bsnMobilityGroupDirectoryEntry 1.3.6.1.4.1.14179.2.8.2.9.1 no-access
An Entry (conceptual row) in the bsnMobilityGroupDirectory Table.
                     bsnGroupDirectoryMemberIPAddress 1.3.6.1.4.1.14179.2.8.2.9.1.1 ipaddress read-only
Mwar Ip Address
                     bsnGroupDirectoryMemberMacAddress 1.3.6.1.4.1.14179.2.8.2.9.1.2 macaddress read-only
Mwar Mac Address
                     bsnGroupDirectoryDicoveryType 1.3.6.1.4.1.14179.2.8.2.9.1.3 integer read-only
Discovery type of the Group Directory. Enumeration: 'broadcast': 3, 'rrm': 2, 'static': 1, 'learned': 4.
                     bsnMemberCurrentAnchoredClients 1.3.6.1.4.1.14179.2.8.2.9.1.4 counter32 read-only
Current anchored client count
                     bsnMemberTotalAnchoredClients 1.3.6.1.4.1.14179.2.8.2.9.1.5 counter32 read-only
Total anchored client count
                     bsnMemberCurrentExportedClients 1.3.6.1.4.1.14179.2.8.2.9.1.6 counter32 read-only
Current exported client count
                     bsnMemberTotalExportedClients 1.3.6.1.4.1.14179.2.8.2.9.1.7 counter32 read-only
Total exported client count
                     bsnMemberCurrentImportedClients 1.3.6.1.4.1.14179.2.8.2.9.1.8 counter32 read-only
Current Imported client count
                     bsnMemberTotalImportedClients 1.3.6.1.4.1.14179.2.8.2.9.1.9 counter32 read-only
Total Imported client count
                     bsnMemberTotalHandoffErrors 1.3.6.1.4.1.14179.2.8.2.9.1.10 counter32 read-only
Total handoff errors
                     bsnMemberTotalCommunicationErrors 1.3.6.1.4.1.14179.2.8.2.9.1.30 counter32 read-only
Total Communication errors
             bsnTotalReceiveErrors 1.3.6.1.4.1.14179.2.8.2.10 counter32 read-only
Total receive errors
             bsnTotalTransmitErrors 1.3.6.1.4.1.14179.2.8.2.11 counter32 read-only
Total Transmit errors
             bsnTotalResponsesRetransmitted 1.3.6.1.4.1.14179.2.8.2.12 counter32 read-only
Total Responses Retransmitted
             bsnTotalHandoffEndRequestsReceived 1.3.6.1.4.1.14179.2.8.2.13 counter32 read-only
Total Handoff End Requests Received
             bsnTotalStateTransitionsDisallowed 1.3.6.1.4.1.14179.2.8.2.14 counter32 read-only
Total State Transitions Disallowed
             bsnTotalResourceErrors 1.3.6.1.4.1.14179.2.8.2.15 counter32 read-only
Total Resource Errors
             bsnTotalHandoffRequestsSent 1.3.6.1.4.1.14179.2.8.2.16 counter32 read-only
Total Handoff Requests Sent
             bsnTotalHandoffRepliesReceived 1.3.6.1.4.1.14179.2.8.2.17 counter32 read-only
Total Handoff Replies Received
             bsnTotalHandoffAsLocalReceived 1.3.6.1.4.1.14179.2.8.2.18 counter32 read-only
Total Handoffs As Local Received
             bsnTotalHandoffAsForeignReceived 1.3.6.1.4.1.14179.2.8.2.19 counter32 read-only
Total Handoffs As Foreign Received
             bsnTotalHandoffDeniesReceived 1.3.6.1.4.1.14179.2.8.2.20 counter32 read-only
Total Handoff Denies Received
             bsnTotalAnchorRequestsSent 1.3.6.1.4.1.14179.2.8.2.21 counter32 read-only
Total Anchor Requests Sent
             bsnTotalAnchorDenyReceived 1.3.6.1.4.1.14179.2.8.2.22 counter32 read-only
Total Anchor Deny Received
             bsnTotalAnchorGrantReceived 1.3.6.1.4.1.14179.2.8.2.23 counter32 read-only
Total Anchor Grant Received
             bsnTotalAnchorTransferReceived 1.3.6.1.4.1.14179.2.8.2.24 counter32 read-only
Total Anchor Transfer Received
             bsnTotalHandoffRequestsIgnored 1.3.6.1.4.1.14179.2.8.2.25 counter32 read-only
Total Handoff Requests Ignored
             bsnTotalPingPongHandoffRequestsDropped 1.3.6.1.4.1.14179.2.8.2.26 counter32 read-only
Total Ping Pong Handoff Requests Dropped
             bsnTotalHandoffRequestsDropped 1.3.6.1.4.1.14179.2.8.2.27 counter32 read-only
Total Handoff Requests Dropped
             bsnTotalHandoffRequestsDenied 1.3.6.1.4.1.14179.2.8.2.28 counter32 read-only
Total Handoff Requests Denied
             bsnTotalClientHandoffAsLocal 1.3.6.1.4.1.14179.2.8.2.29 counter32 read-only
Total Client Handoffs As Local
             bsnTotalClientHandoffAsForeign 1.3.6.1.4.1.14179.2.8.2.30 counter32 read-only
Total Client Handoffs As Foreign
             bsnTotalAnchorRequestsReceived 1.3.6.1.4.1.14179.2.8.2.31 counter32 read-only
Total Anchor Requests Received
             bsnTotalAnchorRequestsDenied 1.3.6.1.4.1.14179.2.8.2.32 counter32 read-only
Total Anchor Requests Denied
             bsnTotalAnchorRequestsGranted 1.3.6.1.4.1.14179.2.8.2.33 counter32 read-only
Total Anchor Requests Granted
             bsnTotalAnchorTransferred 1.3.6.1.4.1.14179.2.8.2.34 counter32 read-only
Total Anchor Transferred
             bsnTotalHandoffRequestsReceived 1.3.6.1.4.1.14179.2.8.2.35 counter32 read-only
Total Handoff Requests Received
     bsnIpsec 1.3.6.1.4.1.14179.2.9
         bsnWrasIpsecCACertificate 1.3.6.1.4.1.14179.2.9.1 octet string read-only
         bsnWrasIpsecCACertificateUpdate 1.3.6.1.4.1.14179.2.9.2 octet string read-write
Note this attribute is for updating the certificate If you try to read it, it will always be ***
         bsnWrasIpsecCertTable 1.3.6.1.4.1.14179.2.9.3 no-access
A table of Certificates.
             bsnWrasIpsecCertEntry 1.3.6.1.4.1.14179.2.9.3.1 no-access
Each entry contains a specific certificate.
                 bsnWrasIpsecCertName 1.3.6.1.4.1.14179.2.9.3.1.1 displaystring read-only
The name assigned to this set of IKE Certificates.
                 bsnWrasIpsecCertificateUpdate 1.3.6.1.4.1.14179.2.9.3.1.2 octet string read-only
If you try to read this it will always be ***
                 bsnWrasIpsecCertificate 1.3.6.1.4.1.14179.2.9.3.1.3 octet string read-only
                 bsnWrasIpsecCertPassword 1.3.6.1.4.1.14179.2.9.3.1.4 octet string read-only
                 bsnWrasIpsecCertStatus 1.3.6.1.4.1.14179.2.9.3.1.24 rowstatus read-only
A row status type for the IKE Cert Entry.
     bsnAPGroupsVlanConfig 1.3.6.1.4.1.14179.2.10
           bsnAPGroupsVlanFeature 1.3.6.1.4.1.14179.2.10.1 integer read-write
When enabled, Site Specific WLAN feature is enforced. Enumeration: 'enable': 1, 'disable': 0.
           bsnAPGroupsVlanTable 1.3.6.1.4.1.14179.2.10.2 no-access
Wireless Sites Table.
               bsnAPGroupsVlanEntry 1.3.6.1.4.1.14179.2.10.2.1 no-access
An entry in bsnAPGroupsVlanTable.
                   bsnAPGroupsVlanName 1.3.6.1.4.1.14179.2.10.2.1.1 octet string read-only
The string is an unique identifier/name assigned to a site.
                   bsnAPGroupsVlanDescription 1.3.6.1.4.1.14179.2.10.2.1.2 octet string read-only
Description about the site.
                   bsnAPGroupsVlanRowStatus 1.3.6.1.4.1.14179.2.10.2.1.20 rowstatus read-only
Row Status for creation/deletion of entries in bsnAPGroupsVlanTable
           bsnAPGroupsVlanMappingTable 1.3.6.1.4.1.14179.2.10.3 no-access
A table for the WLAN-interace-mappings allowed for each configured site. Each site can have a set of WLANs associated with it.
               bsnAPGroupsVlanMappingEntry 1.3.6.1.4.1.14179.2.10.3.1 no-access
An entry in bsnAPGroupsVlanMappingTable.
                   bsnAPGroupsVlanMappingSsid 1.3.6.1.4.1.14179.2.10.3.1.1 displaystring read-only
When an AP is associated with a site, and the site has an associated set of WLANs, then only those WLANs are beamed by the AP. Here 'bsnAPGroupsVlanMappingSsid' is the wlan to be used when a client connects on this AP.
                   bsnAPGroupsVlanMappingInterfaceName 1.3.6.1.4.1.14179.2.10.3.1.2 octet string read-only
When an AP is associated with a site, and the site has an associated set of WLANs, then only those WLANs are beamed by the AP. Here 'bsnAPGroupsVlanMappingInterfaceName' is the interface to be used when a client connects to the 'bsnAPGroupsVlanMappingSsid' WLAN on this AP.
                   bsnAPGroupsVlanMappingRowStatus 1.3.6.1.4.1.14179.2.10.3.1.20 rowstatus read-only
Row Status for creation/deletion of WLAN-interface-mappings asscoiated with sites.
     bsnWrasGroups 1.3.6.1.4.1.14179.2.50
           bsnEssGroup 1.3.6.1.4.1.14179.2.50.1
This collection of objects provides information about Airespace Wireless LAN Configuration Attributes These objects are defined under bsnEss object.
           bsnApGroup 1.3.6.1.4.1.14179.2.50.2
This collection of objects provide the information about Airespace APs that are associated with the Switch. These objects are defined under bsnAP object.
           bsnGlobalDot11Group 1.3.6.1.4.1.14179.2.50.3
This collection of objects provide the information about Airespace 802.11 standard attributes applied globally. These objects are defined under bsnGlobalDot11 object.
           bsnRrmGroup 1.3.6.1.4.1.14179.2.50.4
This collection of objects provide the information about Airespace Radio Resource Management Configuration Parameters. These objects are defined under bsnRrm object.
           bsnAAAGroup 1.3.6.1.4.1.14179.2.50.5
This collection of objects provide the information about Airespace Authentication, Authorization, and Accounting Attributes. These objects are defined under bsnAAA object.
           bsnTrapsGroup 1.3.6.1.4.1.14179.2.50.6
This collection of objects provide the information about Airespace Trap Configuration and Trap definition. These objects are defined under bsnTrap.
           bsnUtilityGroup 1.3.6.1.4.1.14179.2.50.7
This collection of objects provide the information about Airespace General Utilities such as ping, syslog. These objects are defined under bsnUtility.
           bsnMobilityGroup 1.3.6.1.4.1.14179.2.50.8
This collection of objects provide the information about Airespace Mobility Group Parameters and ststistics. These are objects defined under bsnMobility.
           bsnIpsecGroup 1.3.6.1.4.1.14179.2.50.9
This collection of objects provide the information about Airespace Global IpSec Group. These objects are defined under bsnIpsec.
           bsnWrasDepGroup 1.3.6.1.4.1.14179.2.50.10
This collection of objects are derprecated in bsnWireless module.
           bsnWrasObsGroup 1.3.6.1.4.1.14179.2.50.11
This collection of objects are obsoleted in bsnWireless module.
           bsnWrasTrap 1.3.6.1.4.1.14179.2.50.12
This collection of objects provides all notification that Switch need to generate to the Management System.
           bsnEssGroupRev1 1.3.6.1.4.1.14179.2.50.13
This collection of objects provides information about Airespace Wireless LAN Configuration Attributes These objects are defined under bsnEss object.
           bsnGlobalDot11GroupRev1 1.3.6.1.4.1.14179.2.50.14
This collection of objects provide the information about Airespace 802.11 standard attributes applied globally. These objects are defined under bsnGlobalDot11 object.
           bsnAAAGroupRev1 1.3.6.1.4.1.14179.2.50.15
This collection of objects provide the information about Airespace Authentication, Authorization, and Accounting Attributes. These objects are defined under bsnAAA object.
           bsnTrapsGroupRev1 1.3.6.1.4.1.14179.2.50.16
This collection of objects provide the information about Airespace Trap Configuration and Trap definition. These objects are defined under bsnTrap.
           bsnWrasTrapRev1 1.3.6.1.4.1.14179.2.50.17
This collection of objects provides all notification that Switch need to generate to the Management System.
           bsnApGroupRev1 1.3.6.1.4.1.14179.2.50.18
This collection of objects provide the information about Airespace APs that are associated with the Switch. These objects are defined under bsnAP object.
           bsnUtilityGroupRev1 1.3.6.1.4.1.14179.2.50.19
This collection of objects provide the information about Airespace General Utilities such as ping, syslog. These objects are defined under bsnUtility.
           bsnWrasObsGroupRev1 1.3.6.1.4.1.14179.2.50.20
This collection of objects are obsoleted in bsnWireless module.
           bsnWrasObsTrap 1.3.6.1.4.1.14179.2.50.21
This collection of objects provides all notification that Switch need to generate to the Management System.
     bsnWrasCompliances 1.3.6.1.4.1.14179.2.51
           bsnWrasCompliance 1.3.6.1.4.1.14179.2.51.1
The compliance statement for the SNMP entities that implement the bsnWireless module.
           bsnWrasComplianceRev1 1.3.6.1.4.1.14179.2.51.2
The compliance statement for the SNMP entities that implement the bsnWireless module.