NTWS-TRAP-MIB: View SNMP OID List / Download MIB
VENDOR: SYNOPTICS
Home | MIB: NTWS-TRAP-MIB | |||
---|---|---|---|---|
Download as: |
Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
|
|||
Object Name | OID | Type | Access | Info |
ntwsDeviceId | 1.3.6.1.4.1.45.6.1.2.1 | object identifier | no-access |
Enumeration of devices as indicated in registration MIB. This object is used within notifications and is not accessible. |
ntwsMobilityDomainIp | 1.3.6.1.4.1.45.6.1.2.2 | ipaddress | no-access |
IP address of the other switch which the send switch is reporting on. This object is used within notifications and is not accessible. |
ntwsAPMACAddress | 1.3.6.1.4.1.45.6.1.2.3 | macaddress | no-access |
MAC address of the AP of interest. This object is used within notifications and is not accessible. |
ntwsClientMACAddress | 1.3.6.1.4.1.45.6.1.2.4 | macaddress | no-access |
MAC address of the client of interest. This object is used within notifications and is not accessible. |
ntwsRFDetectXmtrMacAddr | 1.3.6.1.4.1.45.6.1.2.5 | macaddress | no-access |
Describes the transmitter's MAC address. This object is used within notifications and is not accessible. |
ntwsPortNum | 1.3.6.1.4.1.45.6.1.2.6 | integer | no-access |
Port number on the AC which reported this rogue during a detection sweep. This object is used within notifications and is not accessible. |
ntwsAPRadioNum | 1.3.6.1.4.1.45.6.1.2.7 | ntwsradionum | no-access |
Radio number of the AP which reported this rogue during a detection sweep. This object is used within notifications and is not accessible. |
ntwsRadioRssi | 1.3.6.1.4.1.45.6.1.2.8 | integer | no-access |
The received signal strength as measured by the AP radio which reported this rogue during a detection sweep. This object is used within notifications and is not accessible. Not used by any notification. |
ntwsRadioBSSID | 1.3.6.1.4.1.45.6.1.2.9 | octet string | no-access |
The basic service set identifier of the rogue from the beacon frame reported by the AP during a detection sweep. This object is used within notifications and is not accessible. |
ntwsUserName | 1.3.6.1.4.1.45.6.1.2.10 | displaystring | no-access |
The client user name as learned from the AAA process. This object is used within notifications and is not accessible. |
ntwsClientAuthServerIp | 1.3.6.1.4.1.45.6.1.2.11 | ipaddress | no-access |
The client authentication server ip address. This object is used within notifications and is not accessible. |
ntwsClientSessionState | 1.3.6.1.4.1.45.6.1.2.12 | ntwsclientsessionstate | no-access |
The state for a client session. This object is used within notifications and is not accessible. |
ntwsDAPNum | 1.3.6.1.4.1.45.6.1.2.13 | integer | no-access |
The DAP number on the wireless switch. This object is used within notifications and is not accessible. |
ntwsClientIp | 1.3.6.1.4.1.45.6.1.2.14 | ipaddress | no-access |
The client ip address. This object is used within notifications and is not accessible. |
ntwsClientSessionId | 1.3.6.1.4.1.45.6.1.2.15 | displaystring | no-access |
The unique global id for a client session. This object is used within notifications and is not accessible. |
ntwsClientAuthenProtocolType | 1.3.6.1.4.1.45.6.1.2.16 | ntwsclientauthenprotocoltype | no-access |
The authentication protocol for a client. This object is used within notifications and is not accessible. |
ntwsClientVLANName | 1.3.6.1.4.1.45.6.1.2.17 | displaystring | no-access |
The vlan name a client is on. This object is used within notifications and is not accessible. |
ntwsClientSessionStartTime | 1.3.6.1.4.1.45.6.1.2.18 | timeticks | no-access |
The start time of a client session, relative to the sysUptime. This object is used within notifications and is not accessible. Obsolete. Do not use it because it's not vital information and often *cannot* be implemented to match the declared semantics: a client session might have been created on another wireless switch, *before* the current switch booted (the local zero of sysUptime). |
ntwsClientFailureCause | 1.3.6.1.4.1.45.6.1.2.19 | displaystring | no-access |
Display string for possible failure cause for a client session. This object is used within notifications and is not accessible. |
ntwsClientRoamedFromPortNum | 1.3.6.1.4.1.45.6.1.2.20 | integer | no-access |
The port number on the AC a client has roamed from. This object is used within notifications and is not accessible. |
ntwsClientRoamedFromRadioNum | 1.3.6.1.4.1.45.6.1.2.21 | ntwsradionum | no-access |
The radio number of the AP the client is roamed from. This object is used within notifications and is not accessible. |
ntwsClientRoamedFromDAPNum | 1.3.6.1.4.1.45.6.1.2.22 | integer | no-access |
The DAP number on the AC which reported this rogue during roam. This object is used within notifications and is not accessible. |
ntwsUserParams | 1.3.6.1.4.1.45.6.1.2.23 | displaystring | no-access |
A display string of User Parameters for client user authorization attributes learned through AAA and/or used by the system. Note that the syntax will be (name=value, name=value,..) for the parsing purpose. This object is used within notifications and is not accessible. |
ntwsClientLocationPolicyIndex | 1.3.6.1.4.1.45.6.1.2.24 | integer | no-access |
Index of the Location Policy rule applied to a user. This object is used within notifications and is not accessible. |
ntwsClientAssociationFailureCause | 1.3.6.1.4.1.45.6.1.2.25 | ntwsassociationfailuretype | no-access |
The client association failure cause. This object is used within notifications and is not accessible. |
ntwsClientAuthenticationFailureCause | 1.3.6.1.4.1.45.6.1.2.26 | ntwsauthenticationfailuretype | no-access |
The client authentication failure cause. This object is used within notifications and is not accessible. |
ntwsClientAuthorizationFailureCause | 1.3.6.1.4.1.45.6.1.2.27 | ntwsauthorizationfailuretype | no-access |
The client authorization failure cause. Note that if it is the user-param, we would additionally expect the failure cause description to list the user attribute value that caused the failure. This object is used within notifications and is not accessible. |
ntwsClientFailureCauseDescription | 1.3.6.1.4.1.45.6.1.2.28 | displaystring | no-access |
Display string for describing the client failure cause. This object is used within notifications and is not accessible. |
ntwsClientRoamedFromWsIp | 1.3.6.1.4.1.45.6.1.2.29 | ipaddress | no-access |
The system IP address of the AC (wireless switch) a client roamed from. This object is used within notifications and is not accessible. |
ntwsClientRoamedFromAccessType | 1.3.6.1.4.1.45.6.1.2.30 | ntwsaccesstype | no-access |
The client access type (ap, dap, wired) that a client roamed from. This object is used within notifications and is not accessible. |
ntwsClientAccessType | 1.3.6.1.4.1.45.6.1.2.31 | ntwsaccesstype | no-access |
The client access type (ap, dap, wired). This object is used within notifications and is not accessible. For new traps, use ntwsClientAccessMode instead of this object. |
ntwsRadioMACAddress | 1.3.6.1.4.1.45.6.1.2.32 | macaddress | no-access |
AP Radio MAC address. This object is used within notifications and is not accessible. |
ntwsRadioPowerChangeReason | 1.3.6.1.4.1.45.6.1.2.33 | ntwsradiopowerchangetype | no-access |
The type of event that caused an AP radio power change; occurs due to auto-tune operation. This object is used within notifications and is not accessible. |
ntwsNewChannelNum | 1.3.6.1.4.1.45.6.1.2.34 | integer | no-access |
New channel number of the AP radio used after an auto tune event. This object is used within notifications and is not accessible. |
ntwsOldChannelNum | 1.3.6.1.4.1.45.6.1.2.35 | integer | no-access |
Old channel number of the AP radio used before an auto tune event. This object is used within notifications and is not accessible. |
ntwsChannelChangeReason | 1.3.6.1.4.1.45.6.1.2.36 | ntwschannelchangetype | no-access |
The type of event that caused an AP radio channel change; occurs due to auto-tune operation. This object is used within notifications and is not accessible. |
ntwsRFDetectListenerListInfo | 1.3.6.1.4.1.45.6.1.2.37 | octet string | no-access |
The RF Detection Listener list info including a list of (listener mac, rssi, channel, ssid, time). There will be a maximum of 6 entries in the list. Formats: MAC: 18 bytes: %2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X RSSI: 10 bytes: %10d CHANNEL: 3 bytes: %3d SSID: 32 bytes: %s TIME: 26 bytes: %s Maximum size per entry is 89+4+2 = 95 bytes. Maximum size of the string is 6*95= 571 bytes (include NULL). This object is used within notifications and is not accessible. |
ntwsRadioSSID | 1.3.6.1.4.1.45.6.1.2.38 | displaystring | no-access |
The radio SSID string This object is used within notifications and is not accessible. |
ntwsNewPowerLevel | 1.3.6.1.4.1.45.6.1.2.39 | ntwspowerlevel | no-access |
New power level of the AP radio used after an auto tune event. This object is used within notifications and is not accessible. |
ntwsOldPowerLevel | 1.3.6.1.4.1.45.6.1.2.40 | ntwspowerlevel | no-access |
Old power level of the AP radio used before an auto tune event. This object is used within notifications and is not accessible. |
ntwsRadioPowerChangeDescription | 1.3.6.1.4.1.45.6.1.2.41 | displaystring | no-access |
The radio power change description. In the case of reason being dup-pkts-threshold-exceed(1), and retransmit-threshold-exceed(2), clientMacAddress will be included in the description. This object is used within notifications and is not accessible. |
ntwsCounterMeasurePerformerListInfo | 1.3.6.1.4.1.45.6.1.2.42 | displaystring | no-access |
A list of information for APs performing Counter Measures including a list of performer mac addresses. This object is used within notifications and is not accessible. Not used by any notification. |
ntwsClientDot1xState | 1.3.6.1.4.1.45.6.1.2.43 | ntwsclientdot1xstate | no-access |
The state for a client 802.1X. This object is used within notifications and is not accessible. |
ntwsClientDot1xFailureCause | 1.3.6.1.4.1.45.6.1.2.44 | ntwsdot1xfailuretype | no-access |
The client 802.1X failure cause. This object is used within notifications and is not accessible. |
ntwsAPAccessType | 1.3.6.1.4.1.45.6.1.2.45 | ntwsaccesstype | no-access |
The access point access type (ap, dap,). This object is used within notifications and is not accessible. Not used by any notification. |
ntwsUserAccessType | 1.3.6.1.4.1.45.6.1.2.46 | ntwsuseraccesstype | no-access |
The user access type (MAC, WEB, DOT1X, LAST-RESORT). This object is used within notifications and is not accessible. |
ntwsClientSessionElapsedTime | 1.3.6.1.4.1.45.6.1.2.47 | timeticks | no-access |
The elapsed time for a client session. Obsoleted because session time is usually reported in seconds. This object is used within notifications and is not accessible. |
ntwsLocalId | 1.3.6.1.4.1.45.6.1.2.48 | integer | no-access |
Local Id for the session. This object is used within notifications and is not accessible. |
ntwsRFDetectDoSType | 1.3.6.1.4.1.45.6.1.2.49 | ntwsrfdetectdostype | no-access |
The type of denial of service (DoS) attack. This object is used within notifications and is not accessible. |
ntwsSourceWsIp | 1.3.6.1.4.1.45.6.1.2.50 | ipaddress | no-access |
IP address of another AC (wireless switch). This object is used within notifications and is not accessible. |
ntwsClientVLANid | 1.3.6.1.4.1.45.6.1.2.51 | integer | no-access |
VLAN ID used by client traffic. This object is used within notifications and is not accessible. |
ntwsClientVLANtag | 1.3.6.1.4.1.45.6.1.2.52 | integer | no-access |
VLAN tag used by client traffic. This object is used within notifications and is not accessible. |
ntwsDeviceModel | 1.3.6.1.4.1.45.6.1.2.53 | displaystring | no-access |
The model of a device in printable US-ASCII. If unknown (or not available), then the value is a zero length string. This object is used within notifications and is not accessible. |
ntwsDeviceSerNum | 1.3.6.1.4.1.45.6.1.2.54 | ntwsapserialnum | no-access |
The serial number of an AP in printable US-ASCII. If unknown (or not available), then the value is a zero length string. Should NOT be used to identify other devices, for example an AC (wireless switch). This object is used within notifications and is not accessible. |
ntwsRsaPubKeyFingerPrint | 1.3.6.1.4.1.45.6.1.2.55 | ntwsapfingerprint | no-access |
The hash of the RSA public key (of a key pair) in binary form that uniquely identifies the public key of an AP. This object is used within notifications and is not accessible. |
ntwsDAPconnectWarningType | 1.3.6.1.4.1.45.6.1.2.56 | integer | no-access |
The type of DAP connect warning. The values are: not-configured-fingerprint-connect(1)...a DAP, which has an RSA keypair but did not have its fingerprint configured on the AC, has connected to the AC when 'dap security' set to 'OPTIONAL' secure-handshake-failure(2).............a DAP tried to connect to the AC with security, but the handshake failed not-configured-fingerprint-required(3)..a DAP tried to connect to the AC with security, but 'dap security' set to 'REQUIRED', and no fingerprint was configured for the DAP fingerprint-mismatch(4).................a DAP tried to connect to the AC with security and its fingerprint was configured, but the fingerprint did not match the computed one This object is used within notifications and is not accessible. Enumeration: 'not-configured-fingerprint-connect': 1, 'not-configured-fingerprint-required': 3, 'secure-handshake-failure': 2, 'fingerprint-mismatch': 4. |
ntwsClientMACAddress2 | 1.3.6.1.4.1.45.6.1.2.57 | macaddress | no-access |
MAC address of the second client of interest. This object is used within notifications and is not accessible. |
ntwsApAttachType | 1.3.6.1.4.1.45.6.1.2.58 | ntwsapattachtype | no-access |
How the AP is attached to the AC (directly or via L2/L3 network). This object is used within notifications and is not accessible. |
ntwsApPortOrDapNum | 1.3.6.1.4.1.45.6.1.2.59 | ntwsapportordapnum | no-access |
The Port Number if the AP is directly attached, or the CLI-assigned DAP Number if attached via L2/L3 network. This object is used within notifications and is not accessible. Obsoleted by ntwsApNum. (In 6.0, direct- and network-attached APs were unified.) |
ntwsApName | 1.3.6.1.4.1.45.6.1.2.60 | displaystring | no-access |
The name of the AP, as assigned in AC's CLI; defaults to AP |
ntwsApTransition | 1.3.6.1.4.1.45.6.1.2.61 | ntwsaptransition | no-access |
AP state Transition, as seen by the AC. This object is used within notifications and is not accessible. |
ntwsApFailDetail | 1.3.6.1.4.1.45.6.1.2.62 | ntwsapfaildetail | no-access |
Detailed failure code for some of the transitions specified in 'ntwsApTransition' object. This object is used within notifications and is not accessible. |
ntwsRadioType | 1.3.6.1.4.1.45.6.1.2.63 | ntwsradiotype | no-access |
Indicates the AP Radio Type, as seen by AC. This object is used within notifications and is not accessible. |
ntwsRadioConfigState | 1.3.6.1.4.1.45.6.1.2.64 | ntwsradioconfigstate | no-access |
Indicates the Radio State, as seen by the AC. This object is used within notifications and is not accessible. |
ntwsApConnectSecurityType | 1.3.6.1.4.1.45.6.1.2.65 | ntwsapconnectsecuritytype | no-access |
Indicates the security level of the connection between AP and AC. This object is used within notifications and is not accessible. |
ntwsApServiceAvailability | 1.3.6.1.4.1.45.6.1.2.66 | ntwsapserviceavailability | no-access |
Indicates the level of wireless service availability. This object is used within notifications and is not accessible. |
ntwsApWasOperational | 1.3.6.1.4.1.45.6.1.2.67 | ntwsapwasoperational | no-access |
Indicates whether the AP was operational before a transition occured. This object is used within notifications and is not accessible. |
ntwsClientTimeSinceLastRoam | 1.3.6.1.4.1.45.6.1.2.68 | unsigned32 | no-access |
The time in seconds since the most recent roam of a given client. This object is used within notifications and is not accessible. |
ntwsClientIpAddrChangeReason | 1.3.6.1.4.1.45.6.1.2.69 | ntwsclientipaddrchangereason | no-access |
Indicates the reason why client IP address changed. This object is used within notifications and is not accessible. |
ntwsRFDetectRogueAPMacAddr | 1.3.6.1.4.1.45.6.1.2.70 | macaddress | no-access |
Describes the MAC address of the Rogue AP the transmitter is connected to. This object is used within notifications and is not accessible. |
ntwsBlacklistingRemainingTime | 1.3.6.1.4.1.45.6.1.2.71 | unsigned32 | no-access |
The time in seconds remaining until a given transmitter could be removed from the Black List. This object is used within notifications and is not accessible. |
ntwsBlacklistingCause | 1.3.6.1.4.1.45.6.1.2.72 | ntwsblacklistingcause | no-access |
Indicates the reason why a given transmitter is blacklisted. This object is used within notifications and is not accessible. |
ntwsNumLicensedActiveAPs | 1.3.6.1.4.1.45.6.1.2.73 | unsigned32 | no-access |
Indicates the maximum (licensed) number of active APs for this AC. This object is used within notifications and is not accessible. |
ntwsClientDynAuthorClientIp | 1.3.6.1.4.1.45.6.1.2.74 | ipaddress | no-access |
The dynamic authorization client IP address which caused the change of authorization. This object is used within notifications and is not accessible. |
ntwsChangedUserParamOldValues | 1.3.6.1.4.1.45.6.1.2.75 | ntwsuserattributelist | no-access |
A display string listing the changed AAA attributes and their values, before the change of authorization was executed. This object is used within notifications and is not accessible. |
ntwsChangedUserParamNewValues | 1.3.6.1.4.1.45.6.1.2.76 | ntwsuserattributelist | no-access |
A display string listing the changed AAA attributes and their values, after the change of authorization was executed. This object is used within notifications and is not accessible. |
ntwsClientDisconnectSource | 1.3.6.1.4.1.45.6.1.2.77 | ntwssessiondisconnecttype | no-access |
The external source that initiated the termination of a session. This object is used within notifications and is not accessible. |
ntwsClientDisconnectDescription | 1.3.6.1.4.1.45.6.1.2.78 | displaystring | no-access |
Display string for providing available information related to the external source that initiated a session termination. This object is used within notifications and is not accessible. |
ntwsMobilityDomainSecondarySeedIp | 1.3.6.1.4.1.45.6.1.2.79 | ipaddress | no-access |
The secondary seed IP address to which the Mobility Domain has failed over. This object is used within notifications and is not accessible. |
ntwsMobilityDomainPrimarySeedIp | 1.3.6.1.4.1.45.6.1.2.80 | ipaddress | no-access |
The primary seed IP address to which the Mobility Domain has failed back. This object is used within notifications and is not accessible. |
ntwsRFDetectClassificationReason | 1.3.6.1.4.1.45.6.1.2.81 | ntwsrfdetectclassificationreason | no-access |
Indicates the reason why a RF device is classified the way it is. This object is used within notifications and is not accessible. |
ntwsConfigSaveFileName | 1.3.6.1.4.1.45.6.1.2.82 | displaystring | no-access |
Display string listing the name of the file to which the running configuration was saved. This object is used within notifications and is not accessible. |
ntwsConfigSaveInitiatorType | 1.3.6.1.4.1.45.6.1.2.83 | ntwsconfigsaveinitiatortype | no-access |
Indicates the source that initiated a configuration save. This object is used within notifications and is not accessible. |
ntwsConfigSaveInitiatorIp | 1.3.6.1.4.1.45.6.1.2.84 | ipaddress | no-access |
The IP address of the source that initiated a configuration save. This object is used within notifications and is not accessible. |
ntwsConfigSaveInitiatorDetails | 1.3.6.1.4.1.45.6.1.2.85 | displaystring | no-access |
Display string listing additional information regarding the source that initiated a configuration save, when available. This object is used within notifications and is not accessible. |
ntwsConfigSaveGeneration | 1.3.6.1.4.1.45.6.1.2.86 | counter32 | no-access |
Indicates the number of configuration changes since the last system boot. The generation count is used to track the number of times the running configuration has been changed due to administrative actions (set/clear), SNMP requests (SET), XML requests (e.g. WMS). This object is used within notifications and is not accessible. |
ntwsApNum | 1.3.6.1.4.1.45.6.1.2.87 | ntwsapnum | no-access |
The administratively assigned AP Number, unique on same AC (switch), regardless of how APs are attached to the AC. This object is used within notifications and is not accessible. Obsoletes ntwsApPortOrDapNum. For clarity, use this object to identify an AP since in 6.0 directly attached APs and DAPs were unified. |
ntwsRadioMode | 1.3.6.1.4.1.45.6.1.2.88 | ntwsradiomode | no-access |
Indicates the administratively controlled Radio Mode (enabled/disabled/sentry). This object is used within notifications and is not accessible. |
ntwsMichaelMICFailureCause | 1.3.6.1.4.1.45.6.1.2.89 | ntwsmichaelmicfailurecause | no-access |
Indicates the Michael MIC Failure cause / who detected it. This object is used within notifications and is not accessible. |
ntwsClientAccessMode | 1.3.6.1.4.1.45.6.1.2.90 | ntwsclientaccessmode | no-access |
The client access mode (ap, wired). This object is used within notifications and is not accessible. Intended to replace ntwsClientAccessType. (In 6.0, direct- and network-attached APs were unified.) |
ntwsClientAuthorizationReason | 1.3.6.1.4.1.45.6.1.2.91 | ntwsclientauthorizationreason | no-access |
Indicates the reason why client performed AAA authorization. This object is used within notifications and is not accessible. |
ntwsPhysPortNum | 1.3.6.1.4.1.45.6.1.2.92 | unsigned32 | no-access |
Physical Port Number on the AC. Zero means the port is unknown or not applicable (for example, when ntwsClientAccessMode = 'ap'). This object is used within notifications and is not accessible. |
ntwsApMgrOldIp | 1.3.6.1.4.1.45.6.1.2.93 | ipaddress | no-access |
The IP address of the AP's former primary manager switch. This object is used within notifications and is not accessible. |
ntwsApMgrNewIp | 1.3.6.1.4.1.45.6.1.2.94 | ipaddress | no-access |
The IP address of the AP's new primary manager switch. This address was formerly the AP's secondary backup link. This object is used within notifications and is not accessible. |
ntwsApMgrChangeReason | 1.3.6.1.4.1.45.6.1.2.95 | ntwsapmgrchangereason | no-access |
Indicates the reason why the AP's primary manager changed. This object is used within notifications and is not accessible. |
ntwsClientClearedReason | 1.3.6.1.4.1.45.6.1.2.96 | ntwsclientclearedreason | no-access |
Indicates the reason why client was cleared. This object is used within notifications and is not accessible. |
ntwsMobilityDomainResiliencyStatus | 1.3.6.1.4.1.45.6.1.2.97 | ntwsmobilitydomainresiliencystatus | no-access |
Indicates the current resilient capacity status for a mobility domain. This object is used within notifications and is not accessible. |
ntwsClientSessionElapsedSeconds | 1.3.6.1.4.1.45.6.1.2.98 | unsigned32 | no-access |
Indicates the time in seconds elapsed since the start of the Client Session. This object is used within notifications and is not accessible. |
ntwsRadioChannelWidth | 1.3.6.1.4.1.45.6.1.2.99 | ntwsradiochannelwidth | no-access |
Indicates the administratively controlled Channel Width (20MHz/40MHz). This object is used within notifications and is not accessible. |
ntwsRadioMimoState | 1.3.6.1.4.1.45.6.1.2.100 | ntwsradiomimostate | no-access |
Indicates the Radio MIMO State, as seen by the AC (1x1/2x3/3x3). This object is used within notifications and is not accessible. |
ntwsClientRadioType | 1.3.6.1.4.1.45.6.1.2.101 | ntwsradiotype | no-access |
Indicates the Client Radio Type, as detected by an attached AP and reported to the AC. This object is used within notifications and is not accessible. |
ntwsRFDetectXmtrRadioType | 1.3.6.1.4.1.45.6.1.2.102 | ntwsradiotype | no-access |
Indicates the Radio Type of the Transmitter, as detected by an attached AP and reported to the AC. The Transmitter may be a wireless client or an AP. This object is used within notifications and is not accessible. |
ntwsRFDetectXmtrCryptoType | 1.3.6.1.4.1.45.6.1.2.103 | ntwscryptotype | no-access |
Indicates the Crypto Type used by the Transmitter, as detected by an attached AP and reported to the AC. This object is used within notifications and is not accessible. |
ntwsClusterFailureReason | 1.3.6.1.4.1.45.6.1.2.104 | ntwsclusterfailurereason | no-access |
Indicates the reason why cluster configuration failed to apply. This object is used within notifications and is not accessible. |
ntwsClusterFailureDescription | 1.3.6.1.4.1.45.6.1.2.105 | displaystring | no-access |
Display string for describing the cluster configuration failure cause. This object is used within notifications and is not accessible. |
ntwsTrapMib | 1.3.6.1.4.1.45.6.1.4.1 |
Notifications emitted by Nortel Networks wireless switches. AP = Access Point; AC = Access Controller (wireless switch), the device that runs a SNMP Agent implementing this MIB. Copyright 2008 Nortel Networks. All rights reserved. This Nortel Networks SNMP Management Information Base Specification (Specification) embodies Nortel Networks' confidential and proprietary intellectual property. This Specification is supplied 'AS IS' and Nortel Networks makes no warranty, either express or implied, as to the use, operation, condition, or performance of the Specification. |
||
ntwsTrapsV2 | 1.3.6.1.4.1.45.6.1.5.0 | |||
ntwsDeviceFailTrap | 1.3.6.1.4.1.45.6.1.5.0.1 |
The device has a failure indication |
||
ntwsDeviceOkayTrap | 1.3.6.1.4.1.45.6.1.5.0.2 |
The device has recovered |
||
ntwsPoEFailTrap | 1.3.6.1.4.1.45.6.1.5.0.3 |
PoE has failed on the indicated port |
||
ntwsApTimeoutTrap | 1.3.6.1.4.1.45.6.1.5.0.4 |
The AP entering the AC at port ntwsPortNum with MAC ntwsRadioMacAddress and of the access type (ap or dap) has not responded. Replaced by ntwsApNonOperStatusTrap2, with ntwsApTransition = 'timeout'. |
||
ntwsAPBootTrap | 1.3.6.1.4.1.45.6.1.5.0.5 |
The AP entering the AC at port ntwsPortNum with MAC ntwsRadioMacAddress and of the access type (ap or dap) has booted. Replaced by ntwsApNonOperStatusTrap2, with ntwsApTransition = 'bootSuccess'. |
||
ntwsMobilityDomainJoinTrap | 1.3.6.1.4.1.45.6.1.5.0.6 |
The mobility domain member has received an UP notice from the remote address. |
||
ntwsMobilityDomainTimeoutTrap | 1.3.6.1.4.1.45.6.1.5.0.7 |
The mobility domain member has declared the remote address to be DOWN. |
||
ntwsMpMichaelMICFailure | 1.3.6.1.4.1.45.6.1.5.0.8 |
Two Michael MIC failures were seen within 60 seconds of each other. Obsoleted by ntwsMichaelMICFailure. |
||
ntwsRFDetectRogueAPTrap | 1.3.6.1.4.1.45.6.1.5.0.9 |
This trap is sent when RF detection finds a rogue AP. XmtrMacAddr is the radio MAC address from the beacon. ListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2. |
||
ntwsRFDetectAdhocUserTrap | 1.3.6.1.4.1.45.6.1.5.0.10 |
This trap is sent when RF detection sweep finds a ad-hoc user. ntwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user. ntwsRFDetectListenerListInfo is a display string of a list of listener information. |
||
ntwsRFDetectRogueDisappearTrap | 1.3.6.1.4.1.45.6.1.5.0.11 |
This trap is sent when a rogue has disappeared. Obsoleted by ntwsRFDetectRogueDeviceDisappearTrap. |
||
ntwsClientAuthenticationFailureTrap | 1.3.6.1.4.1.45.6.1.5.0.12 |
This trap is sent if a client authentication fails. |
||
ntwsClientAuthorizationFailureTrap | 1.3.6.1.4.1.45.6.1.5.0.13 |
This trap is sent if a client authorization fails. |
||
ntwsClientAssociationFailureTrap | 1.3.6.1.4.1.45.6.1.5.0.14 |
This trap is sent if a client association fails. |
||
ntwsClientAuthorizationSuccessTrap | 1.3.6.1.4.1.45.6.1.5.0.15 |
This trap is sent when a client authorizes. Obsoleted by ntwsClientAuthorizationSuccessTrap4. |
||
ntwsClientDeAssociationTrap | 1.3.6.1.4.1.45.6.1.5.0.16 |
This trap is sent if a client de-association occurred. |
||
ntwsClientRoamingTrap | 1.3.6.1.4.1.45.6.1.5.0.17 |
This trap is sent if a client roams from one location to another. |
||
ntwsAutoTuneRadioPowerChangeTrap | 1.3.6.1.4.1.45.6.1.5.0.18 |
This trap is sent if a radio's power level has changed based on auto-tune. |
||
ntwsAutoTuneRadioChannelChangeTrap | 1.3.6.1.4.1.45.6.1.5.0.19 |
This trap is sent if a radio's channel has changed based on auto-tune. |
||
ntwsCounterMeasureStartTrap | 1.3.6.1.4.1.45.6.1.5.0.20 |
This trap is sent when counter measures are started against a rogue. ntwsRFDetectXmtrMacAddr is the mac address of the rogue we are doing counter measures against. ntwsRadioMACAddress identifies the radio performing the countermeasures. |
||
ntwsCounterMeasureStopTrap | 1.3.6.1.4.1.45.6.1.5.0.21 |
This trap is sent when counter measures are stopped against a rogue. ntwsRFDetectXmtrMacAddr is the mac address of the rogue we were doing counter measures against. ntwsRadioMACAddress identifies the radio performing the countermeasures. |
||
ntwsClientDot1xFailureTrap | 1.3.6.1.4.1.45.6.1.5.0.22 |
This trap is sent if a client failed 802.1X. |
||
ntwsClientClearedTrap | 1.3.6.1.4.1.45.6.1.5.0.23 |
This trap is sent when a client session is cleared. Obsoleted by ntwsClientClearedTrap2. |
||
ntwsClientAuthorizationSuccessTrap2 | 1.3.6.1.4.1.45.6.1.5.0.24 |
This trap is sent when a client authorizes. Obsoleted by ntwsClientAuthorizationSuccessTrap4. |
||
ntwsRFDetectSpoofedMacAPTrap | 1.3.6.1.4.1.45.6.1.5.0.25 |
This trap is sent when RF detection finds an AP using the MAC of the listener. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectDoSTrap and ntwsRFDetectRogueDeviceTrap2. One of the two traps will be sent depending on the type of AP MAC spoofing detected. |
||
ntwsRFDetectSpoofedSsidAPTrap | 1.3.6.1.4.1.45.6.1.5.0.26 |
This trap is sent when RF detection finds an AP using the SSID of the listener, and the AP is not in the mobility domain. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2 and ntwsRFDetectSuspectDeviceTrap2. One of the two traps will be sent, depending on RF detection classification rules. |
||
ntwsRFDetectDoSTrap | 1.3.6.1.4.1.45.6.1.5.0.27 |
This trap is sent when RF detection finds a denial of service (DoS) occurring. ntwsRFDetectDoSType specifies the type of DoS. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. |
||
ntwsRFDetectClientViaRogueWiredAPTrap | 1.3.6.1.4.1.45.6.1.5.0.28 |
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. ntwsSourceWsIp is the IP address of the AC (switch) with the wired port. ntwsPortNum is the port on the AC. ntwsClientVLANid is the VLAN ID of the client's traffic. ntwsClientVLANtag is the VLAN tag of the client's traffic. ntwsRFDetectXmtrMacAddr is the MAC address of the client. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectClientViaRogueWiredAPTrap3. |
||
ntwsRFDetectInterferingRogueAPTrap | 1.3.6.1.4.1.45.6.1.5.0.29 |
This trap is sent when RF detection finds an interfering rogue AP. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectSuspectDeviceTrap2. |
||
ntwsRFDetectInterferingRogueDisappearTrap | 1.3.6.1.4.1.45.6.1.5.0.30 |
This trap is sent when an interfering rogue has disappeared. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. Obsoleted by ntwsRFDetectSuspectDeviceDisappearTrap. |
||
ntwsRFDetectUnAuthorizedSsidTrap | 1.3.6.1.4.1.45.6.1.5.0.31 |
This trap is sent when RF detection finds use of an unauthorized SSID. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2 and ntwsRFDetectSuspectDeviceTrap2. One of the two traps will be sent if the device having an unauthorized SSID is classified as rogue or suspect because of this. |
||
ntwsRFDetectUnAuthorizedOuiTrap | 1.3.6.1.4.1.45.6.1.5.0.32 |
This trap is sent when RF detection finds use of an unauthorized OUI. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2 and ntwsRFDetectSuspectDeviceTrap2. One of the two traps will be sent if the device having an unauthorized OUI is classified as rogue or suspect because of this. |
||
ntwsRFDetectUnAuthorizedAPTrap | 1.3.6.1.4.1.45.6.1.5.0.33 |
This trap is sent when RF detection finds operation of an unauthorized AP. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2. |
||
ntwsDAPConnectWarningTrap | 1.3.6.1.4.1.45.6.1.5.0.34 |
A DAP, tried to connect to the AC. ntwsDeviceModel provides the model of the DAP. ntwsDeviceSerNum provides the serial number of the DAP. ntwsRsaPubKeyFingerPrint provides the computed fingerprint of the DAP. ntwsDAPconnectWarningType provides the type of connect warning. Replaced by ntwsApNonOperStatusTrap2, with ntwsApTransition = 'connectFail'. |
||
ntwsRFDetectDoSPortTrap | 1.3.6.1.4.1.45.6.1.5.0.35 |
This trap is sent when RF detection finds a denial of service (DoS) occurring. This has port and AP info instead of 'Listener info'. ntwsRFDetectDoSType specifies the type of DoS. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsClientAccessType specifies whether wired, AP, or DAP. ntwsPortNum (for wired or AP), the port that is used. ntwsDAPNum (for a DAP), the ID of the DAP. |
||
ntwsMpMichaelMICFailure2 | 1.3.6.1.4.1.45.6.1.5.0.36 |
Two Michael MIC failures were seen within 60 seconds of each other. Object ntwsClientMACAddress is the source of the first failure, and object ntwsClientMACAddress2 source of the second failure. Obsoleted by ntwsMichaelMICFailure. |
||
ntwsApNonOperStatusTrap | 1.3.6.1.4.1.45.6.1.5.0.37 |
This trap is sent when the AP changes state and the new one is a non-operational state. Obsoleted by ntwsApNonOperStatusTrap2. |
||
ntwsApOperRadioStatusTrap | 1.3.6.1.4.1.45.6.1.5.0.38 |
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoleted by ntwsApOperRadioStatusTrap3. |
||
ntwsClientIpAddrChangeTrap | 1.3.6.1.4.1.45.6.1.5.0.39 |
This trap is sent when a client's IP address changes. The most likely case for this is when the client first connects to the network. |
||
ntwsClientAssociationSuccessTrap | 1.3.6.1.4.1.45.6.1.5.0.40 |
This trap is sent if a client association succeeds. WARNING: DO NOT enable it in normal use. It may impair switch performance! Only recommended for debugging network issues. |
||
ntwsClientAuthenticationSuccessTrap | 1.3.6.1.4.1.45.6.1.5.0.41 |
This trap is sent if a client authentication succeeds. |
||
ntwsClientDeAuthenticationTrap | 1.3.6.1.4.1.45.6.1.5.0.42 |
This trap is sent if a client de-authentication occured. |
||
ntwsRFDetectBlacklistedTrap | 1.3.6.1.4.1.45.6.1.5.0.43 |
This trap is sent if an association, re-association or de-association request (packet) is detected from a blacklisted transmitter (identified by MAC: 'ntwsRFDetectXmtrMacAddr'). If 'ntwsBlacklistingCause' is 'configured', then 'ntwsBlacklistingRemainingTime' will be zero, meaning indefinite time (depending on administrative actions on the Black List). Otherwise, 'ntwsBlacklistingRemainingTime' will indicate the time in seconds until this transmitter's requests could be allowed. |
||
ntwsRFDetectClientViaRogueWiredAPTrap2 | 1.3.6.1.4.1.45.6.1.5.0.44 |
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. ntwsSourceWsIp is the IP address of the AC (switch) with the wired port. ntwsPortNum is the port on the AC. ntwsClientVLANid is the VLAN ID of the client's traffic. ntwsClientVLANtag is the VLAN tag of the client's traffic. ntwsRFDetectXmtrMacAddr is the MAC address of the client. ntwsRFDetectListenerListInfo is a display string of a list of listener information. ntwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired) the client is connected to. Obsoleted by ntwsRFDetectClientViaRogueWiredAPTrap3. |
||
ntwsRFDetectAdhocUserDisappearTrap | 1.3.6.1.4.1.45.6.1.5.0.45 |
This trap is sent when RF detection sweep finds that an ad-hoc user disappeared. ntwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user. |
||
ntwsApRejectLicenseExceededTrap | 1.3.6.1.4.1.45.6.1.5.0.46 |
This trap is sent when an AC (wireless switch) receives a packet from an inactive AP and attaching that AP would make the AC exceed the maximum (licensed) number of active APs. |
||
ntwsClientDynAuthorChangeSuccessTrap | 1.3.6.1.4.1.45.6.1.5.0.47 |
This trap is sent when the authorization attributes for a user are dynamically changed by an authorized dynamic authorization client. |
||
ntwsClientDynAuthorChangeFailureTrap | 1.3.6.1.4.1.45.6.1.5.0.48 |
This trap is sent if a change of authorization request sent by an authorized dynamic authorization client is unsuccessful. |
||
ntwsClientDisconnectTrap | 1.3.6.1.4.1.45.6.1.5.0.49 |
This trap is sent when a client session is terminated administratively. |
||
ntwsMobilityDomainFailOverTrap | 1.3.6.1.4.1.45.6.1.5.0.50 |
This trap is sent when the Mobility Domain fails over to the secondary seed. |
||
ntwsMobilityDomainFailBackTrap | 1.3.6.1.4.1.45.6.1.5.0.51 |
This trap is sent when the Mobility Domain fails back to the primary seed. |
||
ntwsRFDetectRogueDeviceTrap | 1.3.6.1.4.1.45.6.1.5.0.52 |
This trap is sent when RF detection finds a rogue device. XmtrMacAddr is the radio MAC address from the beacon. ListenerListInfo is a display string of a list of listener information. ClassificationReason indicates the reason why the device is classified as rogue. Obsoleted by ntwsRFDetectRogueDeviceTrap2. |
||
ntwsRFDetectRogueDeviceDisappearTrap | 1.3.6.1.4.1.45.6.1.5.0.53 |
This trap is sent when a rogue device has disappeared. This trap obsoletes the ntwsRFDetectRogueDisappearTrap. |
||
ntwsRFDetectSuspectDeviceTrap | 1.3.6.1.4.1.45.6.1.5.0.54 |
This trap is sent when RF detection finds a suspect device. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. ClassificationReason indicates the reason why the device is classified as suspect. Obsoleted by ntwsRFDetectSuspectDeviceTrap2. |
||
ntwsRFDetectSuspectDeviceDisappearTrap | 1.3.6.1.4.1.45.6.1.5.0.55 |
This trap is sent when a suspect device has disappeared. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. This trap obsoletes the ntwsRFDetectInterferingRogueDisappearTrap. |
||
ntwsRFDetectClientViaRogueWiredAPTrap3 | 1.3.6.1.4.1.45.6.1.5.0.56 |
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. ntwsSourceWsIp is the IP address of the AC (switch) with the wired port. ntwsPortNum is the port on the AC. ntwsClientVLANid is the VLAN ID of the client's traffic. ntwsClientVLANtag is the VLAN tag of the client's traffic. ntwsRFDetectXmtrMacAddr is the MAC address of the client. ntwsRFDetectListenerListInfo is a display string of a list of listener information. ntwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired) the client is connected to. ClassificationReason indicates the reason why the AP is classified as rogue. This trap obsoletes the ntwsRFDetectClientViaRogueWiredAPTrap and ntwsRFDetectClientViaRogueWiredAPTrap2. |
||
ntwsRFDetectClassificationChangeTrap | 1.3.6.1.4.1.45.6.1.5.0.57 |
This trap is sent when RF detection classification rules change. |
||
ntwsConfigurationSavedTrap | 1.3.6.1.4.1.45.6.1.5.0.58 |
This trap is sent when the running configuration of the switch is written to a configuration file. |
||
ntwsApNonOperStatusTrap2 | 1.3.6.1.4.1.45.6.1.5.0.59 |
This trap is sent when the AP changes state and the new one is a non-operational state. Obsoletes ntwsApNonOperStatusTrap. |
||
ntwsApOperRadioStatusTrap2 | 1.3.6.1.4.1.45.6.1.5.0.60 |
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoleted by ntwsApOperRadioStatusTrap3. |
||
ntwsMichaelMICFailure | 1.3.6.1.4.1.45.6.1.5.0.61 |
Two Michael MIC failures were seen within 60 seconds of each other. Object ntwsClientMACAddress indicates the source of the first failure, and object ntwsClientMACAddress2 indicates the source of the second failure. Service is interrupted for 60 seconds on the radio due to TKIP countermeasures having commenced. The radio is identified by ntwsApNum and ntwsAPRadioNum. An alternative way to identify the radio is ntwsRadioMACAddress. Obsoletes ntwsMpMichaelMICFailure and ntwsMpMichaelMICFailure2. |
||
ntwsClientAuthorizationSuccessTrap3 | 1.3.6.1.4.1.45.6.1.5.0.62 |
This trap is sent when a client authorizes. If ntwsClientAccessMode = 'ap': ntwsApNum, ntwsAPRadioNum, ntwsRadioSSID identify the AP/radio/BSS providing wireless service to this client at the time this trap was sent. If ntwsClientAccessMode = 'wired': ntwsPhysPortNum identifies the physical port on the AC used by this wired-auth client. Obsoleted by ntwsClientAuthorizationSuccessTrap4. |
||
ntwsApManagerChangeTrap | 1.3.6.1.4.1.45.6.1.5.0.63 |
This trap is sent when the AP's secondary link becomes its primary link. |
||
ntwsClientClearedTrap2 | 1.3.6.1.4.1.45.6.1.5.0.64 |
This trap is sent when a client session is cleared. Obsoletes ntwsClientClearedTrap. |
||
ntwsMobilityDomainResiliencyStatusTrap | 1.3.6.1.4.1.45.6.1.5.0.65 |
This trap is sent by a mobility domain seed to announce changes in resilient capacity status. |
||
ntwsApOperRadioStatusTrap3 | 1.3.6.1.4.1.45.6.1.5.0.66 |
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoletes ntwsApOperRadioStatusTrap and ntwsApOperRadioStatusTrap2. |
||
ntwsClientAuthorizationSuccessTrap4 | 1.3.6.1.4.1.45.6.1.5.0.67 |
This trap is sent when a client authorizes. If ntwsClientAccessMode = 'ap': ntwsApNum, ntwsAPRadioNum, ntwsRadioSSID identify the AP/radio/BSS providing wireless service to this client at the time this trap was sent; ntwsClientRadioType gives the type of radio used by this client. If ntwsClientAccessMode = 'wired': ntwsPhysPortNum identifies the physical port on the AC used by this wired-auth client. Obsoletes ntwsClientAuthorizationSuccessTrap, ntwsClientAuthorizationSuccessTrap2, ntwsClientAuthorizationSuccessTrap3. |
||
ntwsRFDetectRogueDeviceTrap2 | 1.3.6.1.4.1.45.6.1.5.0.68 |
This trap is sent when RF detection finds a rogue device. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectXmtrRadioType indicates the Type of Radio used by the transmitter (rogue device). ntwsRFDetectXmtrCryptoType indicates the Type of Crypto used by the transmitter (rogue device). ntwsRFDetectListenerListInfo is a display string of a list of listener information. ntwsRFDetectClassificationReason indicates the reason why the device is classified as rogue. Obsoletes ntwsRFDetectRogueAPTrap, ntwsRFDetectUnAuthorizedAPTrap, ntwsRFDetectRogueDeviceTrap. |
||
ntwsRFDetectSuspectDeviceTrap2 | 1.3.6.1.4.1.45.6.1.5.0.69 |
This trap is sent when RF detection finds a suspect device. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectXmtrRadioType indicates the Type of Radio used by the transmitter (suspect device). ntwsRFDetectXmtrCryptoType indicates the Type of Crypto used by the transmitter (suspect device). ntwsRFDetectListenerListInfo is a display string of a list of listener information. ntwsRFDetectClassificationReason indicates the reason why the device is classified as suspect. Obsoletes ntwsRFDetectInterferingRogueAPTrap, ntwsRFDetectSuspectDeviceTrap. |
||
ntwsClusterFailureTrap | 1.3.6.1.4.1.45.6.1.5.0.70 |
This trap is sent when the cluster configuration failed to apply. If ntwsClusterFailureReason = 'validation-error': The validation error is reported by the receiving end of the configuration updates. The receiving end can be any AC (switch) in the mobility domain: member, secondary seed or primary seed. - Primary seed will be the receiving end of configuration updates when Primary seed is joining the cluster and Secondary seed has preempt mode enabled. - Both Secondary seed and member will be at the receiving end when Primary seed is active. |