AWAMP-MIB: View SNMP OID List / Download MIB
VENDOR: AIRWAVE WIRELESS
Home | MIB: AWAMP-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
airwave | 1.3.6.1.4.1.12028 | |||
awamp | 1.3.6.1.4.1.12028.4 |
The MIB module for AirWave entities . iso(1).org(3).dod(6).internet(1).private(4). enterprises(1).airwave(12028).awamp(4) |
||
awampConformance | 1.3.6.1.4.1.12028.4.2 | |||
awampCompliances | 1.3.6.1.4.1.12028.4.2.1 | |||
awampCompliance | 1.3.6.1.4.1.12028.4.2.1.1 |
The compliance statement for the AirWave AMP. |
||
awampGroups | 1.3.6.1.4.1.12028.4.2.2 | |||
awampInfoGroup | 1.3.6.1.4.1.12028.4.2.2.1 |
The group of objects providing AMP information. |
||
awampEventGroup | 1.3.6.1.4.1.12028.4.2.2.2 |
The group of objects providing AMP events. |
||
awampNotificationGroup | 1.3.6.1.4.1.12028.4.2.2.3 |
The group of objects providing AMP notifications. |
||
awampSystem | 1.3.6.1.4.1.12028.4.10 | |||
awamp802dot11 | 1.3.6.1.4.1.12028.4.11 | |||
awampEvent | 1.3.6.1.4.1.12028.4.15 | |||
awampEventPrefix | 1.3.6.1.4.1.12028.4.15.0 | |||
tooManyDevAssocAMP | 1.3.6.1.4.1.12028.4.15.0.1 |
This trap is sent when too many devices are simultaneously associated with AMP for a period of time. |
||
tooManyDevAssocGroup | 1.3.6.1.4.1.12028.4.15.0.2 |
This trap is sent when too many devices are simultaneously associated with a Group for a period of time. |
||
tooManyDevAssocAp | 1.3.6.1.4.1.12028.4.15.0.3 |
This trap is sent when too many devices are associated simultaneously associated with an AP for a period of time. |
||
toomuchBWAMP | 1.3.6.1.4.1.12028.4.15.0.4 |
This trap is sent when there is too much BW being used on the WLAN for a period of time. |
||
toomuchBWGroup | 1.3.6.1.4.1.12028.4.15.0.5 |
This trap is sent when there is too much BW being used by a Group for a period of time. |
||
toomuchBWAP | 1.3.6.1.4.1.12028.4.15.0.6 |
This trap is sent when there is too much BW being used on an AP for a period of time. |
||
toomuchBWClient | 1.3.6.1.4.1.12028.4.15.0.7 |
This trap is sent when there is too much BW being used by a Client for a period of time. |
||
toomanyRoamsClient | 1.3.6.1.4.1.12028.4.15.0.8 |
This trap is sent when Client roams too frequently for a period of time. |
||
poorSignalAP | 1.3.6.1.4.1.12028.4.15.0.9 |
This trap is sent when an AP has poor Signal quality for a period of time. |
||
nonAMPAPChange | 1.3.6.1.4.1.12028.4.15.0.10 |
This trap is sent when an AP Changes configuration without the AMP's knowledge |
||
unauthenticatedClient | 1.3.6.1.4.1.12028.4.15.0.11 |
This trap is sent when Client is associated with WLAN for a period of time without authenticating. |
||
rogueAPDetected | 1.3.6.1.4.1.12028.4.15.0.12 |
This trap is sent when the AMP classifies a Rogue AP. |
||
downAP | 1.3.6.1.4.1.12028.4.15.0.13 |
This trap is sent when the AP is down (for instance, a missed SNMP Ping or SNMP Get). |
||
discoveredAP | 1.3.6.1.4.1.12028.4.15.0.14 |
This trap is sent when AP is discovered by AMP. Note that this only applies to AP discovery, not authorization. (A Config trap is sent when the AP is authorized. |
||
upAP | 1.3.6.1.4.1.12028.4.15.0.15 |
This trap is sent when AP is detected as UP after being marked DOWN by the AMP. |
||
downRadio | 1.3.6.1.4.1.12028.4.15.0.16 |
This trap is sent when the radio of an AP is not operating. |
||
clientAssociate | 1.3.6.1.4.1.12028.4.15.0.17 |
This trap is sent when a watched client mac address associates to an AP. |
||
authIssueClient | 1.3.6.1.4.1.12028.4.15.0.18 |
This trap is sent when a client experiences too many authentication failures. |
||
authIssueAP | 1.3.6.1.4.1.12028.4.15.0.19 |
This trap is sent when an AP experiences too many authentication failures. |
||
authIssueAMP | 1.3.6.1.4.1.12028.4.15.0.20 |
This trap is sent when AMP detects too many authentication failures. |
||
idsEventAP | 1.3.6.1.4.1.12028.4.15.0.21 |
This trap is sent when AMP receives too many IDS events from an AP. |
||
rfidTagNotHeard | 1.3.6.1.4.1.12028.4.15.0.22 |
This trap is sent when an RFID tag is not heard for a certain period of time. |
||
dot11Counters | 1.3.6.1.4.1.12028.4.15.0.23 |
This trap is sent when a Dot11 counter trigger fires. |
||
qosCounters | 1.3.6.1.4.1.12028.4.15.0.24 |
This trap is sent when a QOS counter trigger fires. |
||
deviceResources | 1.3.6.1.4.1.12028.4.15.0.25 |
This trap is sent when a Device Resources trigger fires. |
||
diskUsage | 1.3.6.1.4.1.12028.4.15.0.26 |
This trap is sent when a Disk Usage trigger fires. |
||
managedAmpDown | 1.3.6.1.4.1.12028.4.15.0.27 |
This trap is sent when a Managed AMP Down trigger fires. |
||
watchedAmpDown | 1.3.6.1.4.1.12028.4.15.0.28 |
This trap is sent when a Watched AMP Down trigger fires. |
||
interfaceBandwidth | 1.3.6.1.4.1.12028.4.15.0.29 |
This trap is sent when an Interface Bandwidth trigger fires. |
||
radioUtilization | 1.3.6.1.4.1.12028.4.15.0.30 |
This trap is sent when a Radio Utilization trigger fires. |
||
deviceEvent | 1.3.6.1.4.1.12028.4.15.0.31 |
This trap is sent when a Device Event trigger fires. |
||
rogueAPDetectedDetail | 1.3.6.1.4.1.12028.4.15.0.32 |
This trap is sent when the AMP classifies a Rogue AP. It includes more details: SSID, Manufacturer, Wired (boolean), Wireless (boolean), Classifying Rule Name, Last Discovering Agent, and AP Folder Name. |
||
ipv4LinkLocalAddresses | 1.3.6.1.4.1.12028.4.15.0.33 |
This trap is sent when a IPv4 Link-Local Addresses trigger fires. |
||
vpnUserConnect | 1.3.6.1.4.1.12028.4.15.0.34 |
This trap is sent when a new VPN user connects to a controller. |
||
clientOnRogueAP | 1.3.6.1.4.1.12028.4.15.0.35 |
This trap is sent when a new client is discovered on Rogue AP. It includes more details: Client MAC, Rogue SSID and Rogue Device Name. |
||
vpnUserAssociate | 1.3.6.1.4.1.12028.4.15.0.36 |
This trap is sent when a watched VPN username associates to a controller. |
||
toomuchBWVPNUser | 1.3.6.1.4.1.12028.4.15.0.37 |
This trap is sent when a new VPN user connects to a controller. |
||
toomuchGoodputClient | 1.3.6.1.4.1.12028.4.15.0.38 |
This trap is sent when there is too much Goodput being used by a Client for a period of time. |
||
speedClient | 1.3.6.1.4.1.12028.4.15.0.39 |
This trap is sent when speed of a Client is below (or above) a threshold for a period of time. |
||
noisefloorRadio | 1.3.6.1.4.1.12028.4.15.0.40 |
This trap is sent when noise floor of AP is below (or above) a threshold for a period of time. |
||
genericTrap | 1.3.6.1.4.1.12028.4.15.0.50 |
This trap will catch things not defined. |
||
internalAMLUnknown | 1.3.6.1.4.1.12028.4.15.0.51 |
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Blue and level 1 |
||
internalAMLNormal | 1.3.6.1.4.1.12028.4.15.0.52 |
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Green and level 2 |
||
internalAMLMinor | 1.3.6.1.4.1.12028.4.15.0.53 |
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents yellow and level 3 |
||
internalAMLCritcal | 1.3.6.1.4.1.12028.4.15.0.54 |
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Red and level 4 |
||
internalAMLWarning | 1.3.6.1.4.1.12028.4.15.0.56 |
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Cyan and level 6 |
||
internalAMLMajor | 1.3.6.1.4.1.12028.4.15.0.57 |
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Orange and level 7 |
||
uplinkDevice | 1.3.6.1.4.1.12028.4.15.0.58 |
This trap is sent when the device uplink status is changed. |
||
upRadio | 1.3.6.1.4.1.12028.4.15.0.59 |
This trap is sent when the radio of an AP is detected as UP after being marked DOWN. |
||
configAlert | 1.3.6.1.4.1.12028.4.15.0.200 |
This trap is sent every time a new device is discovered and authenticated on the AMP. Also sent upon change to IP, Name, Firmware, Group Association. |
||
awampEventObject | 1.3.6.1.4.1.12028.4.15.1 | |||
awampEventID | 1.3.6.1.4.1.12028.4.15.1.101 | integer32 | read-only |
Random number AMP assigns to the event. |
awampEventSeverityCode | 1.3.6.1.4.1.12028.4.15.1.102 | integer32 | read-only |
Level 1-6 |
awampEventDescription | 1.3.6.1.4.1.12028.4.15.1.103 | displaystring | read-only |
Concatenated String produced from AMP. |
awampEventAPIPOld | 1.3.6.1.4.1.12028.4.15.1.104 | ipaddress | read-only |
Old IP of the AP when AMP changes and sends trap to HPOV. |
awampEventAPMngURL | 1.3.6.1.4.1.12028.4.15.1.105 | displaystring | read-only |
URL to manage AP on AMP from HPOV. |
awampEventAPMonURL | 1.3.6.1.4.1.12028.4.15.1.106 | displaystring | read-only |
URL to monitor AP on AMP from HPOV. |
awampEventGroupMngURL | 1.3.6.1.4.1.12028.4.15.1.107 | displaystring | read-only |
URL to manage Group on AMP from HPOV. |
awampEventGroupMonURL | 1.3.6.1.4.1.12028.4.15.1.108 | displaystring | read-only |
URL to monitor Group on AMP from HPOV. |
awampEventAPICON | 1.3.6.1.4.1.12028.4.15.1.109 | displaystring | read-only |
Name of ICON to display on HPOV screen |
awampEventRogueSSID | 1.3.6.1.4.1.12028.4.15.1.110 | displaystring | read-only |
SSID of detected Rogue AP. |
awampEventRogueLANManufacturer | 1.3.6.1.4.1.12028.4.15.1.111 | displaystring | read-only |
Manufacturer of LAN of detected Rogue AP. |
awampEventRogueRadioManufacturer | 1.3.6.1.4.1.12028.4.15.1.112 | displaystring | read-only |
Manufacturer of radio detected Rogue AP. |
awampEventRogueIsWired | 1.3.6.1.4.1.12028.4.15.1.113 | truthvalue | read-only |
Detected Rogue AP was discovered on the wired network. |
awampEventRogueIsWireless | 1.3.6.1.4.1.12028.4.15.1.114 | truthvalue | read-only |
Detected Rogue AP was discovered on the wireless network. |
awampEventRogueClassifyingRule | 1.3.6.1.4.1.12028.4.15.1.115 | displaystring | read-only |
Rule used to classify detected rogue AP. |
awampEventRogueDiscoveringAgent | 1.3.6.1.4.1.12028.4.15.1.116 | displaystring | read-only |
The discovering agent that last detected the rogue AP. |
awampEventRogueDiscoveringAgentFolder | 1.3.6.1.4.1.12028.4.15.1.117 | displaystring | read-only |
The folder name of the discovering agent that last detected the rogue AP. |
awampEventRogueClientMac | 1.3.6.1.4.1.12028.4.15.1.118 | displaystring | read-only |
MAC Address of client connected to rogue ap. |
awampEventRogueName | 1.3.6.1.4.1.12028.4.15.1.119 | displaystring | read-only |
SSID to which the client is connected on rogue ap. |
awampApName | 1.3.6.1.4.1.12028.4.101 | displaystring | read-only |
The AP Name |
awampGroupName | 1.3.6.1.4.1.12028.4.102 | displaystring | read-only |
The Group Name |
awampAPEthMAC | 1.3.6.1.4.1.12028.4.103 | macaddress | read-only |
IEEE Unique Identifier |
awampAPIP | 1.3.6.1.4.1.12028.4.104 | ipaddress | read-only |
IP Address of the AP (Eth0) |
awampAPMFG | 1.3.6.1.4.1.12028.4.105 | displaystring | read-only |
AP MFG |
awampAPModel | 1.3.6.1.4.1.12028.4.106 | displaystring | read-only |
AP Model |
awampAPFirmware | 1.3.6.1.4.1.12028.4.107 | displaystring | read-only |
AP Firmware |
awampROCommString | 1.3.6.1.4.1.12028.4.108 | displaystring | read-only |
Read Only Community String (not currently used) |
awampHPOVHostName | 1.3.6.1.4.1.12028.4.109 | displaystring | read-only |
Hostname of the AP |
awampHPOVSYSID | 1.3.6.1.4.1.12028.4.110 | displaystring | read-only |
Hp OpenView Object Id |
awampHPOVMAC1 | 1.3.6.1.4.1.12028.4.111 | macaddress | read-only |
First Radio MAC on AP |
awampHPOVIP1 | 1.3.6.1.4.1.12028.4.112 | ipaddress | read-only |
First Radio IP AP |
awampHPOVMAC2 | 1.3.6.1.4.1.12028.4.113 | macaddress | read-only |
Second Radio MAC on AP |
awampHPOVIP2 | 1.3.6.1.4.1.12028.4.114 | ipaddress | read-only |
Second Radio IP AP |
awampHPOVsysName | 1.3.6.1.4.1.12028.4.115 | displaystring | read-only |
Hostname of the AP |
awampHPOVsysDescr | 1.3.6.1.4.1.12028.4.116 | displaystring | read-only |
Hostname of the AP |