HPN-ICF-DOT11-WIDS-MIB: View SNMP OID List / Download MIB
VENDOR: HEWLETT-PACKARD
Home | MIB: HPN-ICF-DOT11-WIDS-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
hpnicfDot11WIDS | 1.3.6.1.4.1.11.2.14.11.15.2.75.5 |
This MIB provides information about WIDS feature. GLOSSARY Wireless Intrusion Detection Sensor (WIDS) WIDS is designed to be employed in an area that is serviced by an existing wireless network. It aids in the early detection of malicious outsider attacks and intrusions via wireless networks. Rogue AP A rogue access point is any Wi-Fi access point connected to the network without authorization. As it is not authorized, if there is any weakness in the AP, the hacker will have chance to compromise the network. Rogue Station It is similiar to Rogue AP, while it is a station. Monitor AP An AP will scan or listen to the air, and try to detect wireless attack in the network. Some AP products will work only in monitor role, while some AP products could switch between normal AP role (only provide wireless access service)and monitor AP role. Ad Hoc Mode Station could work under Ad hoc mode, then they could directly do peer-to-peer communication without other device support. |
||
hpnicfDot11WIDSConfigGroup | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1 | |||
hpnicfDot11WIDSGlobalConfigGroup | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1 | |||
hpnicfDot11WIDSScanMode | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.1 | integer | read-write |
Represents the scope of channels to be scanned. The following value are supported all(1) - Do scan on all the channels. auto(2) - Do scan for the channels that automatically selected by WIDS. Enumeration: 'auto': 2, 'all': 1. |
hpnicfDot11WIDSScanChannelList | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.2 | octet string | read-write |
Represents the channel scope to be scanned when hpnicfDot11WIDSScanMode is configurated as channelSpec mode. Each channel value will be separated by comma character. |
hpnicfDot11CntMsrMode | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.3 | bits | read-write |
Represents the countermeasures mode. Bits: 'rogue': 0, 'config': 2, 'adhoc': 1. |
hpnicfDot11DevAgingTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.4 | integer32 | read-write |
Represents the age time for entries in the detected device table. If an entry is not detected within the interval, it is deleted from the detected device table. If the deleted entry is that of a rogue, it is added into the rogue history table. |
hpnicfDot11DynBlkListEnable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.5 | truthvalue | read-write |
Represents whether the dynamic blacklist feature is enabled or not. 'true' : Enable the dynamic blacklist feature to filter out unwanted clients, which will not get associated. 'false' : Disable the dynamic blacklist feature. |
hpnicfDot11DynBlkListLifeTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.6 | integer32 | read-write |
Represents the lifetime for dynamic blacklist entries. If a dynamic blacklist entry is not detected within the lifetime, the entry will be removed from the dynamic blacklist. The lifetime becomes active only if dynamic blacklist feature is enabled. |
hpnicfDot11FloodAtkDctEnable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.7 | truthvalue | read-write |
Represents whether detection of flood attack is enabled or not. 'true' : Enable the detection of flood attack. 'false' : Disable the detection of flood attack. |
hpnicfDot11SpoofAtkDctEnable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.8 | truthvalue | read-write |
Represents whether detection of Spoof attack is enabled or not. 'true' : Enable the detection of Spoof attack. 'false' : Disable the detection of Spoof attack. |
hpnicfDot11WeakIVAtkDctEnable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.9 | truthvalue | read-write |
Represents whether detection of weak-iv attack is enabled or not. 'true' : Enable the detection of weak-iv attack. 'false' : Disable the detection of weak-iv attack. |
hpnicfDot11ResetWIDSRogueHistory | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.10 | truthvalue | read-write |
This object is used to clear all entries from the rogue history table. It will return false for get operation. |
hpnicfDot11ResetWIDSHistroy | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.11 | truthvalue | read-write |
This object is used to clear the history information of attacks detected in the WLAN system. It will return false for get operation. |
hpnicfDot11ResetWIDSStatistics | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.12 | truthvalue | read-write |
This object is used to clear the statistics of attacks detected in the WLAN system. It will return false for get operation. |
hpnicfDot11ResetAllDynBlkList | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.13 | truthvalue | read-write |
This object is used to remove all entries from the dynamic blacklist. It will return false for get operation. |
hpnicfDot11ResetAllStcBlkList | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.14 | truthvalue | read-write |
This object is used to remove all entries from the static blacklist. It will return false for get operation. |
hpnicfDot11ResetAllWhtBlkList | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.15 | truthvalue | read-write |
This object is used to remove all entries from the static whitelist. It will return false for get operation. |
hpnicfDot11ResetAllDctRogueAP | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.16 | truthvalue | read-write |
This object is used to clear the information of all detected rogue APs. It will return false for get operation. |
hpnicfDot11ResetAllDctRogueSta | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.17 | truthvalue | read-write |
This object is used to clear the information of all detected rogue clients. It will return false for get operation. |
hpnicfDot11ResetAllDctAdhoc | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.18 | truthvalue | read-write |
This object is used to clear the information of all detected ad hoc devices. It will return false for get operation. |
hpnicfDot11ResetAllDctDevice | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.19 | truthvalue | read-write |
This object is used to clear the information of all detected devices. It will return false for get operation. |
hpnicfDot11ResetAllDctSSID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.20 | truthvalue | read-write |
This object is used to clear the information of all detected SSIDs. It will return false for get operation. |
hpnicfDot11WidsFloodInterval | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.21 | unsigned32 | read-write |
The interval of WIDS flood detection. |
hpnicfDot11WidsBlackListThreshold | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.22 | unsigned32 | read-write |
When flood attack exceeds the value of this node, the MAC address will be added into black list. |
hpnicfDot11SSIDFilterOnOff | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.23 | integer | read-write |
Represents whether the SSID permit feature is enabled or not. Enumeration: 'on': 1, 'off': 2. |
hpnicfDot11BSSIDFilterOnOff | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.24 | integer | read-write |
Represents whether the BSSID permit feature is enabled or not. Enumeration: 'on': 1, 'off': 2. |
hpnicfDot11WIDSPermitVendorTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2 | no-access |
The table provides the permitted vendor list, and each vendor will be identified by OUI. The legal device should be made by the permitted vendors. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1 | no-access |
Each entry provides the information of permitted vendor. |
||
hpnicfDot11VendorOUI | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1.1 | octet string | no-access |
Represents the vendor OUI information of the wireless device. |
hpnicfDot11PermitVendorRowStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1.2 | rowstatus | read-only |
The status of this table entry. |
hpnicfDot11VendorName | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1.3 | octet string | read-only |
Represents the vendor name of the wireless device. |
hpnicfDot11WIDSPermitSSIDTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3 | no-access |
The table represents the list of SSID could be permitted in the wireless network. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1 | no-access |
Each entry provides the information of permitted SSID. |
||
hpnicfDot11PermitSSID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1.1 | hpnicfdot11ssidstringtype | no-access |
Represents the permitted SSID in the wireless network. |
hpnicfDot11PermitSSIDRowStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1.2 | rowstatus | read-only |
The status of this table entry. |
hpnicfDot11PermitSSIDDetected | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1.3 | truthvalue | read-only |
Represents whether the permitted SSID is detected or not. |
hpnicfDot11WIDSIgnoreListTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4 | no-access |
The table provides the MAC address list of stations or APs, and WIDS always take them as legal stations or APs. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1 | no-access |
Each entry contains the MAC address of station or AP, and WIDS always take it as legal station or AP. |
||
hpnicfDot11IgnoreMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.1 | macaddress | no-access |
Represents the MAC address of station or AP, and WIDS always take it as legal station or AP. |
hpnicfDot11IgnoreListRowStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.2 | rowstatus | read-only |
The status of this table entry. |
hpnicfDot11IgnoreMACDetected | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.3 | truthvalue | read-only |
Represents whether the MAC address detected or not. |
hpnicfDot11IgnoreDevType | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.4 | hpnicfdot11widsdevtype | read-only |
Represents the type of the MAC address detected. The value of this object always is unknown if the MAC address is not detected. |
hpnicfDot11WIDSAttackListTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5 | no-access |
The table provides the MAC address list of rogue APs or rogue stations, the WIDS will take countermeasure as per the MAC address list. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1 | no-access |
Each entry contains the MAC address of rogue AP or rogue station, and the countermeasure will be taken for it. |
||
hpnicfDot11AttackDeviceMac | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.1 | macaddress | no-access |
Represents the MAC address of rogue AP or rogue station, and the countermeasure will be taken for it. |
hpnicfDot11AttackListRowStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.2 | rowstatus | read-only |
The status of this table entry. |
hpnicfDot11AttackDevDetected | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.3 | truthvalue | read-only |
Represents whether the assigned MAC address in attack list is detected or not. |
hpnicfDot11AttackDevType | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.4 | hpnicfdot11widsdevtype | read-only |
Represents the type of detected MAC address in attack list. If the MAC address is not detected, it will return unknown(5) for get operation. |
hpnicfDot11StaticWhiteListTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6 | no-access |
The table provides the information of whitelist. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6.1 | no-access |
Each entry contains the information of whitelist. |
||
hpnicfDot11StaticWhiteListMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6.1.1 | macaddress | no-access |
Represents the MAC addresses in whitelist. |
hpnicfDot11StaticWhiteListRowStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6.1.2 | rowstatus | read-only |
The status of this table entry. |
hpnicfDot11StaticBlackListTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7 | no-access |
The table provides the information of static blacklist. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7.1 | no-access |
Each entry contains the information of static blacklist. |
||
hpnicfDot11StaticBlackListMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7.1.1 | macaddress | no-access |
Represents the MAC addresses in static blacklist. |
hpnicfDot11StaticBlackListRowStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7.1.2 | rowstatus | read-only |
The status of this table entry. |
hpnicfDot11WIDSPermitBSSIDTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8 | no-access |
The table represents the list of BSSID could be permitted in the wireless network. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1 | no-access |
Each entry provides the information of permitted BSSID. |
||
hpnicfDot11PermitBSSID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1.1 | macaddress | no-access |
Represents the permitted BSSID in the wireless network. |
hpnicfDot11PermitBSSIDDetected | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1.2 | truthvalue | read-only |
Represents whether the permitted BSSID is detected or not. |
hpnicfDot11PermitBSSIDRowStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1.3 | rowstatus | read-only |
Represents the row status of permit BSSID table. |
hpnicfDot11WIDSDetectGroup | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2 | |||
hpnicfDot11WIDSRogueAPTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1 | no-access |
The table represents the list of possible BSS information for rogue APs detected by the WIDS. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1 | no-access |
Each entry contains possible BSS information of each rogue AP detected by WIDS. |
||
hpnicfDot11RogueAPBSSMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.1 | macaddress | no-access |
Represents the BSS MAC address of rogue AP. |
hpnicfDot11RogueAPVendorName | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.2 | octet string | read-only |
Represents the vendor name of rogue AP. |
hpnicfDot11RogueAPMonitorNum | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.3 | integer32 | read-only |
Represents the number of monitor APs which detected the rogue AP. |
hpnicfDot11RogueAPFirstDetectTm | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.4 | timeticks | read-only |
Represents the time that AP was detected as a rogue AP for the first time. |
hpnicfDot11RogueAPLastDetectTm | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.5 | timeticks | read-only |
Represents the time that AP was detected as a rogue AP for the last time. |
hpnicfDot11RogueAPSSID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.6 | hpnicfdot11ssidstringtype | read-only |
Represents the SSID broadcasted by rogue AP. |
hpnicfDot11RogueAPMaxSigStrength | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.7 | integer32 | read-only |
Represents the maximal value of signal strength that WIDS received from the rogue AP. |
hpnicfDot11RogueAPChannel | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.8 | hpnicfdot11channelscopetype | read-only |
Represents on which radio channel of the rogue AP the maximal signal strength was received. |
hpnicfDot11RogueAPBeaconInterval | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.9 | integer32 | read-only |
Represents the interval for Beacon management frame of rogue AP. |
hpnicfDot11RogueAPAttackedStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.10 | truthvalue | read-only |
Represents whether the countermeasure have taken for the rogue AP. |
hpnicfDot11RogueAPToIgnore | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.11 | truthvalue | read-write |
Represents whether the rogue AP will be taken as a rogue AP. If the value is true, NMS should not display the rogue AP as NMS display rogue AP list, and the MAC address will be automatically added into hpnicfDot11WIDSIgnoreListTable. If the value is false, NMS will take it as a rogue AP. |
hpnicfDot11RogueAPEncryptStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.12 | truthvalue | read-only |
Represents whether the rogue AP encrypt the frame or not. |
hpnicfDot11RogueAPReset | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.13 | truthvalue | read-write |
This object is used to clear information of assigned AP. The information of AP which detect assigned rogue AP will be cleared together. It will return false for get operation. |
hpnicfDot11RogueAPFirstDetectTmStr | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.14 | octet string | read-only |
Represents the time that AP was detected as a rogue AP for the first time. |
hpnicfDot11RogueAPLastDetectTmStr | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.15 | octet string | read-only |
Represents the time that AP was detected as a rogue AP for the last time. |
hpnicfDot11WIDSRogueAPExtTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2 | no-access |
As each rogue AP could be detected by multiple monitor APs, each monitor AP could have some kind of detailed information about a specific rogue AP. In the hpnicfDot11WIDSRogueAPTable table, the detailed information for a specific rogue AP will be summarized from information in the hpnicfDot11WIDSRogueAPExtTable table. For example, multiple monitor APs could receive RF signal of one rogue AP, and each monitor AP has its maximum signal strength by itself. The information will be kept as hpnicfDot11DetectMaxAPSigStrength in the hpnicfDot11WIDSRogueAPExtTable table. While only the maximum value among all the hpnicfDot11DetectMaxAPSigStrength for each monitor AP will be kept in the hpnicfDot11WIDSRogueAPTable as hpnicfDot11RogueAPMaxSigStrength. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1 | no-access |
Each entry contains information of the rogue AP detected by each monitor AP. |
||
hpnicfDot11WIDSAPID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.1 | hpnicfdot11objectidtype | no-access |
To uniquely identify each AP, and relation-ship between hpnicfDot11WIDSAPID and AP device will be static. |
hpnicfDot11DetectCurAPSigStrength | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.2 | integer32 | read-only |
Represents the current value of signal strength that WIDS monitor AP received from the rogue AP. |
hpnicfDot11DetectAPByChannel | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.3 | hpnicfdot11channelscopetype | read-only |
Represents on which radio channel that WIDS monitor AP detected the rogue AP. |
hpnicfDot11DetectAPByRadioID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.4 | hpnicfdot11radioscopetype | read-only |
Represents on which radio the monitor AP has detected the rogue AP. |
hpnicfDot11AttackAPStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.5 | truthvalue | read-only |
Represents whether monitor AP have taken countermeasure on the rogue AP. |
hpnicfDot11DetectAPFirstTm | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.6 | timeticks | read-only |
Represents the time that monitor AP detected the rogue AP for the first time. |
hpnicfDot11DetectAPLastTm | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.7 | timeticks | read-only |
Represents the time that monitor AP detected the rogue AP for the last time. |
hpnicfDot11WIDSRogueStaTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3 | no-access |
The table represents the list of rogue stations detected by the WIDS. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1 | no-access |
Each entry contains information of each rogue station. |
||
hpnicfDot11RogueStaMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.1 | macaddress | no-access |
Represents the MAC address of rogue station. |
hpnicfDot11RogueStaVendorName | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.2 | octet string | read-only |
Represents the vendor name of rogue station. |
hpnicfDot11RogueStaMonitorNum | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.3 | integer32 | read-only |
Represents the number of monitor APs which detected the rogue station. |
hpnicfDot11RogueStaFirstDetectTm | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.4 | timeticks | read-only |
Represents the time that station was detected as a rogue station for the first time. |
hpnicfDot11RogueStaLastDetectTm | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.5 | timeticks | read-only |
Represents the time that station was detected as a rogue station for the last time. |
hpnicfDot11RogueStaAccessBSSID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.6 | macaddress | read-only |
Represents BSS MAC address that rogue station try to access. |
hpnicfDot11RogueStaMaxSigStrength | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.7 | integer32 | read-only |
Represents the maximal value of signal strength that WIDS received from the rogue station. |
hpnicfDot11RogueStaChannel | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.8 | hpnicfdot11channelscopetype | read-only |
Represents on which radio channel the maximal signal strength was received. |
hpnicfDot11RogueStaAttackedStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.9 | truthvalue | read-only |
Represents whether the countermeasure have taken for the rogue station. |
hpnicfDot11RogueStaToIgnore | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.10 | truthvalue | read-write |
Represents whether the rogue AP will be taken as a rogue station. If the value is true, NMS should not display the rogue station as NMS display rogue station list, and the MAC address will be automatically added into hpnicfDot11WIDSIgnoreListTable. If the value is false, NMS will take it as a rogue station. |
hpnicfDot11RogueStaAdHocStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.11 | truthvalue | read-only |
Represents whether the rogue station work on the Ad Hoc mode or not. |
hpnicfDot11RogueStaReset | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.12 | truthvalue | read-write |
This object is used to clear information of assigned station. The information of AP which detects assigned rogue station will be cleared together. It will return false for get operation. |
hpnicfDot11RogueStaFirstDetectTmStr | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.13 | octet string | read-only |
Represents the time that station was detected as a rogue station for the first time. |
hpnicfDot11RogueStaLastDetectTmStr | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.14 | octet string | read-only |
Represents the time that station was detected as a rogue station for the last time. |
hpnicfDot11WIDSRogueStaExtTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4 | no-access |
As each rogue station could be detected by multiple monitor APs, each monitor AP could have some kind of detailed information about a specific rogue station. In the hpnicfDot11WIDSRogueStaTable table, the detailed information for a specific rogue station will be summarized from information in the hpnicfDot11WIDSRogueStaExtTable table. For example, multiple monitor APs could receive RF signal of one rogue station, and each monitor AP has its maximum signal strength by itself. The information will be kept as hpnicfDot11DetectMaxStaSigStrength in the hpnicfDot11WIDSRogueStaExtTable table. While only the maximum value among all the hpnicfDot11DetectMaxStaSigStrength for each monitor AP will be kept in the hpnicfDot11WIDSRogueStaTable as hpnicfDot11RogueStaMaxSigStrength. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1 | no-access |
Each entry contains information of rogue station detected by each monitor AP. |
||
hpnicfDot11DetectCurStaSigStrength | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.1 | integer32 | read-only |
Represents the current value of signal strength that WIDS monitor AP received from the rogue station. |
hpnicfDot11DetectStaByChannel | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.2 | hpnicfdot11channelscopetype | read-only |
Represents on which radio channel the maximal signal strength was received. |
hpnicfDot11DetectStaByRadioID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.3 | hpnicfdot11radioscopetype | read-only |
Represents which radio on the monitor AP has detected the rogue station. |
hpnicfDot11AttackStaStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.4 | truthvalue | read-only |
Represents whether monitor AP have taken countermeasure for the rogue station. |
hpnicfDot11DetectStaFirstTm | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.5 | timeticks | read-only |
Represents the time that monitor AP detected the rogue station for the first time. |
hpnicfDot11DetectStaLastTm | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.6 | timeticks | read-only |
Represents the time that monitor AP detected the rogue station for the last time. |
hpnicfDot11WIDSDetectedDevTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5 | no-access |
This Table contains information of detected devices. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1 | no-access |
Each entry contains information of detected devices. |
||
hpnicfDot11WIDSDevMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.1 | macaddress | no-access |
Represents MAC address of the device detected. |
hpnicfDot11WIDSDevType | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.2 | hpnicfdot11widsdevtype | read-only |
Represents type of the device detected. |
hpnicfDot11WIDSDevPermitType | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.3 | hpnicfdot11widsdevpermittype | read-only |
Represents whether the device detected is a rogue device or not. |
hpnicfDot11WIDSDevVendor | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.4 | octet string | read-only |
Represents Vendor of the detected device. |
hpnicfDot11WIDSDevMonitorNum | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.5 | integer32 | read-only |
Represents the number of active APs that detect the device. |
hpnicfDot11WIDSDevSSID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.6 | octet string | read-only |
Represents the service set identifier for the ESS of the device. |
hpnicfDot11WIDSDevBSSID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.7 | macaddress | read-only |
Represents the basic service set identifier of the detected device. |
hpnicfDot11WIDSDevChannel | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.8 | hpnicfdot11channelscopetype | read-only |
Represents the channel in which the device was last detected. |
hpnicfDot11WIDSDevMaxRSSI | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.9 | integer32 | read-only |
Represents the maximum detected RSSI of the device. |
hpnicfDot11WIDSDevBeaconIntvl | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.10 | integer32 | read-only |
Represents the beacon interval for the detected AP. |
hpnicfDot11WIDSDevFstDctTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.11 | dateandtime | read-only |
Represents the time at which the device was first detected. |
hpnicfDot11WIDSDevLstDctTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.12 | dateandtime | read-only |
Represents the time at which the rogue AP was detected last time. |
hpnicfDot11WIDSDevReset | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.13 | truthvalue | read-write |
This object is used to clears the information of the device detected in the WLAN. It will return false for get operation. |
hpnicfDot11WIDSDevSnr | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.14 | integer32 | read-only |
Represents SNR of the device detected. |
hpnicfDot11WIDSRptAPTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6 | no-access |
This Table contains information of the AP which detected device in the WLAN. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1 | no-access |
Each entry contains information of the AP which detected device in the WLAN. |
||
hpnicfDot11WIDSRptAPMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.1 | macaddress | no-access |
Represents the MAC address of the AP that detected the device. |
hpnicfDot11WIDSRptAPName | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.2 | octet string | read-only |
Represents the name of the AP that detected the device. |
hpnicfDot11WIDSRptAPRadioID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.3 | hpnicfdot11radioscopetype | read-only |
Represents the radio index of the AP that detected the device. |
hpnicfDot11WIDSRptAPMaxRSSI | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.4 | integer32 | read-only |
Represents the maximum detected RSSI of the device. |
hpnicfDot11WIDSRptAPFstDctTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.5 | dateandtime | read-only |
Represents the time at which the rogue AP was detected first time. |
hpnicfDot11WIDSRptAPLstDctTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.6 | dateandtime | read-only |
Represents the time at which the rogue AP was detected last time. |
hpnicfDot11DynBlackListTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7 | no-access |
This table contains information of dynamic blacklist entries. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1 | no-access |
Each entry contains information of dynamic blacklist. |
||
hpnicfDot11DynBlackListMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.1 | macaddress | no-access |
Represents the MAC address of the device inserted into the dynamic blacklist. |
hpnicfDot11DynBlackListTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.2 | unsigned32 | read-only |
Represents the time elapsed since the entry was last updated. |
hpnicfDot11DynBlackListReason | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.3 | octet string | read-only |
Represents the reason why the entry was added into the dynamic blacklist. |
hpnicfDot11DynBlackListReset | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.4 | truthvalue | read-write |
This object is used to remove designated entry from the dynamic blacklist. The value which read from this object always is false. |
hpnicfDot11DynBlackListTimeTicks | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.5 | timeticks | read-only |
Represents the time elapsed since the entry was last updated in units TimeTicks. |
hpnicfDot11WIDSRogueHistoryTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8 | no-access |
This table contains information of all expired rogue devices which have been deleted from the list of detected rogue devices because they could not be detected within the device aging duration. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1 | no-access |
Each entry contains information of an expired rogue device which has been deleted from the list of detected rogue devices because they could not be detected within the device aging duration. |
||
hpnicfDot11WIDSRogueHisIndex | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.1 | integer32 | no-access |
Represents index of this entry. |
hpnicfDot11WIDSRogueHisMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.2 | macaddress | read-only |
Represents the MAC address of the device. |
hpnicfDot11WIDSRogueHisVendor | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.3 | octet string | read-only |
Represents the vendor for the device. |
hpnicfDot11WIDSRogueHisType | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.4 | hpnicfdot11widsdevtype | read-only |
Represents the type of the device. |
hpnicfDot11WIDSRogueHisChl | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.5 | hpnicfdot11channelscopetype | read-only |
Represents the channel in which the device was last detected. |
hpnicfDot11WIDSRogueHisSSID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.6 | octet string | read-only |
Represents the service set identifier for the ESS of the device. |
hpnicfDot11WIDSRogueHisLastDctTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.7 | dateandtime | read-only |
Represents the time at which the device was last detected. |
hpnicfDot11WIDSAtkHistroyTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9 | no-access |
This table contains information of the history of attacks detected in the WLAN system. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1 | no-access |
Each entry contains information of the history of attacks detected in the WLAN system. |
||
hpnicfDot11WIDSAtkHisIndex | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.1 | integer32 | no-access |
Represents index of this entry. |
hpnicfDot11WIDSAtkHisMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.2 | macaddress | read-only |
Represents the Mac address. In case of spoof attacks, this field provides the BSSID which was spoofed. In case of other attacks, this field provides the MAC address of the device which initiated the attack. |
hpnicfDot11WIDSAtkHisType | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.3 | hpnicfdot11widsatktype | read-only |
Represents the type of attack. |
hpnicfDot11WIDSAtkHisChl | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.4 | hpnicfdot11channelscopetype | read-only |
Represents the channel in which the attack was detected. |
hpnicfDot11WIDSAtkHisRSSI | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.5 | integer32 | read-only |
Represents the average RSSI of the designated attack. |
hpnicfDot11WIDSAtkHisDctTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.6 | dateandtime | read-only |
Represents the time at which this attack was detected. |
hpnicfDot11WIDSAtkHisAPName | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.7 | octet string | read-only |
Represents the name of the AP which detected this attack. |
hpnicfDot11WIDSAtkStatis | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10 | |||
hpnicfDot11WIDSAtkStasStartTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.1 | dateandtime | read-only |
Represents current attack tracking time. It is started at the system startup and is refreshed each hour subsequently. |
hpnicfDot11WIDSAtkStasTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2 | no-access |
This table contains information of the counts of attacks detected. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1 | no-access |
Each entry contains information of the counts of attacks detected. |
||
hpnicfDot11WIDSAtkStasType | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1.1 | hpnicfdot11widsatktype | no-access |
Represents the type of attack. |
hpnicfDot11WIDSAtkStasCurCnt | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1.2 | unsigned32 | read-only |
Represents the count of attacks detected since the time specified by the current attack tracking time. The current attack tracking time is started at the system startup and is refreshed each hour subsequently. |
hpnicfDot11WIDSAtkStasTotalCnt | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1.3 | unsigned32 | read-only |
Represents the total count of the attacks detected since the system startup. |
hpnicfDot11BlackListTable | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11 | no-access |
This table contains information of blacklist entries, including dynamic and static. |
|
1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1 | no-access |
Each entry contains information of blacklist. |
||
hpnicfDot11BlackListMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.1 | macaddress | no-access |
This object represents the MAC address of the device inserted into the table. |
hpnicfDot11BlackListTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.2 | unsigned32 | read-only |
Represents the time elapsed since the entry was last updated. If it is static blacklist, the value is always 0. |
hpnicfDot11BlackListReason | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.3 | octet string | read-only |
Represents the reason why the entry was added into the blacklist. |
hpnicfDot11BlackListRowStatus | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.4 | rowstatus | read-only |
This object represents the status of this table entry. |
hpnicfDot11BlackListTimeTicks | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.5 | timeticks | read-only |
Represents the time elapsed since the entry was last updated in timetick. If it is static blacklist, the value is always 0. |
hpnicfDot11WIDSNotifyGroup | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3 | |||
hpnicfDot11WIDSTraps | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1 | |||
hpnicfDot11WIDSDetectRogueTrap | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.1 |
The notification represents that a rogue AP or a station was detected by WIDS. The NMS would refer to MIB table under hpnicfDot11WIDSDetectGroup group to get more detailed information. |
||
hpnicfDot11WIDSAdHocTrap | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.2 |
The notification represents a rogue Ad hoc station was detected. |
||
hpnicfDot11WIDSUnauthorSSIDTrap | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.3 |
The notification represents which unauthorized SSID are accessed in the network. The notification will be sent to NMS when an unauthorized SSID is detected on the network for the first time. |
||
hpnicfDot11WIDSDisappearRogueTrap | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.4 |
The notification represents that a rogue device has aged out and moved to history table or the device type has been changed to friendly. The notification will be sent to NMS whenever a rogue disappears. |
||
hpnicfDot11WIDSDetectAttack | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.5 |
This notification occurs when some type of attack is detected. |
||
hpnicfDot11WIDSDetectWBridge | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.6 |
This notification occurs whenever a detected device is classified as rogue wireless-bridge. |
||
hpnicfDot11WIDSFloodTrap | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.7 |
This notification occurs when flood attack is detected. |
||
hpnicfDot11WIDSSpoofTrap | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.8 |
This notification occurs when spoof attack is detected. |
||
hpnicfDot11WIDSWeakIVTrap | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.9 |
This notification occurs when weak IV attack is detected. |
||
hpnicfDot11WIDSTrapVarObjects | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2 | |||
hpnicfDot11WIDSRogueMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.1 | macaddress | no-access |
Represents which rogue AP or station. |
hpnicfDot11WIDSRogueType | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.2 | integer | no-access |
Represents the rogue type. The following value are supported rogueAp(1) - A rogue AP rogueStation(2) - A rogue Station Enumeration: 'rogueStation': 2, 'rogueAp': 1. |
hpnicfDot11WIDSMonitorMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.3 | macaddress | no-access |
Represents which monitor detected the rogue AP or station. |
hpnicfDot11WIDSAdHocMAC | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.4 | macaddress | no-access |
Represents the MAC address of Ad hoc station. |
hpnicfDot11UnauthorSSIDName | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.5 | hpnicfdot11ssidstringtype | no-access |
Represents an unauthorized SSID. |
hpnicfDot11MonitorAPID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.6 | hpnicfdot11objectidtype | no-access |
Represents monitor AP's APID. |
hpnicfDot11MonitorApRadioID | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.7 | hpnicfdot11radioscopetype | no-access |
Represents monitor AP's radio ID |
hpnicfDot11WIDSAtkMac | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.8 | macaddress | no-access |
Represents mac address of attack source. |
hpnicfDot11WIDSAtkFrameType | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.9 | octet string | no-access |
Represents attack frame type. |
hpnicfDot11WIDSAtkChannel | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.10 | hpnicfdot11channelscopetype | no-access |
Represents attack channel. |
hpnicfDot11WIDSAtkTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.11 | octet string | no-access |
Represents when attacking happened. |
hpnicfDot11WIDSAtkDestMac | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.12 | macaddress | no-access |
Represents mac address of attack destination. |
hpnicfDot11WIDSFirstTrapTime | 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.13 | timeticks | no-access |
Represents the first trap time. |