AWAMP-MIB: View SNMP OID List / Download MIB

VENDOR: AIRWAVE WIRELESS


 Home MIB: AWAMP-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 airwave 1.3.6.1.4.1.12028
             awamp 1.3.6.1.4.1.12028.4
The MIB module for AirWave entities . iso(1).org(3).dod(6).internet(1).private(4). enterprises(1).airwave(12028).awamp(4)
                 awampConformance 1.3.6.1.4.1.12028.4.2
                     awampCompliances 1.3.6.1.4.1.12028.4.2.1
                         awampCompliance 1.3.6.1.4.1.12028.4.2.1.1
The compliance statement for the AirWave AMP.
                     awampGroups 1.3.6.1.4.1.12028.4.2.2
                         awampInfoGroup 1.3.6.1.4.1.12028.4.2.2.1
The group of objects providing AMP information.
                         awampEventGroup 1.3.6.1.4.1.12028.4.2.2.2
The group of objects providing AMP events.
                         awampNotificationGroup 1.3.6.1.4.1.12028.4.2.2.3
The group of objects providing AMP notifications.
                 awampSystem 1.3.6.1.4.1.12028.4.10
                 awamp802dot11 1.3.6.1.4.1.12028.4.11
                 awampEvent 1.3.6.1.4.1.12028.4.15
                       awampEventPrefix 1.3.6.1.4.1.12028.4.15.0
                           tooManyDevAssocAMP 1.3.6.1.4.1.12028.4.15.0.1
This trap is sent when too many devices are simultaneously associated with AMP for a period of time.
                           tooManyDevAssocGroup 1.3.6.1.4.1.12028.4.15.0.2
This trap is sent when too many devices are simultaneously associated with a Group for a period of time.
                           tooManyDevAssocAp 1.3.6.1.4.1.12028.4.15.0.3
This trap is sent when too many devices are associated simultaneously associated with an AP for a period of time.
                           toomuchBWAMP 1.3.6.1.4.1.12028.4.15.0.4
This trap is sent when there is too much BW being used on the WLAN for a period of time.
                           toomuchBWGroup 1.3.6.1.4.1.12028.4.15.0.5
This trap is sent when there is too much BW being used by a Group for a period of time.
                           toomuchBWAP 1.3.6.1.4.1.12028.4.15.0.6
This trap is sent when there is too much BW being used on an AP for a period of time.
                           toomuchBWClient 1.3.6.1.4.1.12028.4.15.0.7
This trap is sent when there is too much BW being used by a Client for a period of time.
                           toomanyRoamsClient 1.3.6.1.4.1.12028.4.15.0.8
This trap is sent when Client roams too frequently for a period of time.
                           poorSignalAP 1.3.6.1.4.1.12028.4.15.0.9
This trap is sent when an AP has poor Signal quality for a period of time.
                           nonAMPAPChange 1.3.6.1.4.1.12028.4.15.0.10
This trap is sent when an AP Changes configuration without the AMP's knowledge
                           unauthenticatedClient 1.3.6.1.4.1.12028.4.15.0.11
This trap is sent when Client is associated with WLAN for a period of time without authenticating.
                           rogueAPDetected 1.3.6.1.4.1.12028.4.15.0.12
This trap is sent when the AMP classifies a Rogue AP.
                           downAP 1.3.6.1.4.1.12028.4.15.0.13
This trap is sent when the AP is down (for instance, a missed SNMP Ping or SNMP Get).
                           discoveredAP 1.3.6.1.4.1.12028.4.15.0.14
This trap is sent when AP is discovered by AMP. Note that this only applies to AP discovery, not authorization. (A Config trap is sent when the AP is authorized.
                           upAP 1.3.6.1.4.1.12028.4.15.0.15
This trap is sent when AP is detected as UP after being marked DOWN by the AMP.
                           downRadio 1.3.6.1.4.1.12028.4.15.0.16
This trap is sent when the radio of an AP is not operating.
                           clientAssociate 1.3.6.1.4.1.12028.4.15.0.17
This trap is sent when a watched client mac address associates to an AP.
                           authIssueClient 1.3.6.1.4.1.12028.4.15.0.18
This trap is sent when a client experiences too many authentication failures.
                           authIssueAP 1.3.6.1.4.1.12028.4.15.0.19
This trap is sent when an AP experiences too many authentication failures.
                           authIssueAMP 1.3.6.1.4.1.12028.4.15.0.20
This trap is sent when AMP detects too many authentication failures.
                           idsEventAP 1.3.6.1.4.1.12028.4.15.0.21
This trap is sent when AMP receives too many IDS events from an AP.
                           rfidTagNotHeard 1.3.6.1.4.1.12028.4.15.0.22
This trap is sent when an RFID tag is not heard for a certain period of time.
                           dot11Counters 1.3.6.1.4.1.12028.4.15.0.23
This trap is sent when a Dot11 counter trigger fires.
                           qosCounters 1.3.6.1.4.1.12028.4.15.0.24
This trap is sent when a QOS counter trigger fires.
                           deviceResources 1.3.6.1.4.1.12028.4.15.0.25
This trap is sent when a Device Resources trigger fires.
                           diskUsage 1.3.6.1.4.1.12028.4.15.0.26
This trap is sent when a Disk Usage trigger fires.
                           managedAmpDown 1.3.6.1.4.1.12028.4.15.0.27
This trap is sent when a Managed AMP Down trigger fires.
                           watchedAmpDown 1.3.6.1.4.1.12028.4.15.0.28
This trap is sent when a Watched AMP Down trigger fires.
                           interfaceBandwidth 1.3.6.1.4.1.12028.4.15.0.29
This trap is sent when an Interface Bandwidth trigger fires.
                           radioUtilization 1.3.6.1.4.1.12028.4.15.0.30
This trap is sent when a Radio Utilization trigger fires.
                           deviceEvent 1.3.6.1.4.1.12028.4.15.0.31
This trap is sent when a Device Event trigger fires.
                           rogueAPDetectedDetail 1.3.6.1.4.1.12028.4.15.0.32
This trap is sent when the AMP classifies a Rogue AP. It includes more details: SSID, Manufacturer, Wired (boolean), Wireless (boolean), Classifying Rule Name, Last Discovering Agent, and AP Folder Name.
                           ipv4LinkLocalAddresses 1.3.6.1.4.1.12028.4.15.0.33
This trap is sent when a IPv4 Link-Local Addresses trigger fires.
                           vpnUserConnect 1.3.6.1.4.1.12028.4.15.0.34
This trap is sent when a new VPN user connects to a controller.
                           clientOnRogueAP 1.3.6.1.4.1.12028.4.15.0.35
This trap is sent when a new client is discovered on Rogue AP. It includes more details: Client MAC, Rogue SSID and Rogue Device Name.
                           vpnUserAssociate 1.3.6.1.4.1.12028.4.15.0.36
This trap is sent when a watched VPN username associates to a controller.
                           toomuchBWVPNUser 1.3.6.1.4.1.12028.4.15.0.37
This trap is sent when a new VPN user connects to a controller.
                           toomuchGoodputClient 1.3.6.1.4.1.12028.4.15.0.38
This trap is sent when there is too much Goodput being used by a Client for a period of time.
                           speedClient 1.3.6.1.4.1.12028.4.15.0.39
This trap is sent when speed of a Client is below (or above) a threshold for a period of time.
                           noisefloorRadio 1.3.6.1.4.1.12028.4.15.0.40
This trap is sent when noise floor of AP is below (or above) a threshold for a period of time.
                           genericTrap 1.3.6.1.4.1.12028.4.15.0.50
This trap will catch things not defined.
                           internalAMLUnknown 1.3.6.1.4.1.12028.4.15.0.51
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Blue and level 1
                           internalAMLNormal 1.3.6.1.4.1.12028.4.15.0.52
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Green and level 2
                           internalAMLMinor 1.3.6.1.4.1.12028.4.15.0.53
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents yellow and level 3
                           internalAMLCritcal 1.3.6.1.4.1.12028.4.15.0.54
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Red and level 4
                           internalAMLWarning 1.3.6.1.4.1.12028.4.15.0.56
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Cyan and level 6
                           internalAMLMajor 1.3.6.1.4.1.12028.4.15.0.57
This is an internal trap designed for AML running on the NNM. It allows the AML to dynamically accept severity codes from the AMP. Because HP OpenView statically defines these in trapd.conf per trap, we are creating an internal for each severity level to work around issue. Represents Orange and level 7
                           uplinkDevice 1.3.6.1.4.1.12028.4.15.0.58
This trap is sent when the device uplink status is changed.
                           upRadio 1.3.6.1.4.1.12028.4.15.0.59
This trap is sent when the radio of an AP is detected as UP after being marked DOWN.
                           configAlert 1.3.6.1.4.1.12028.4.15.0.200
This trap is sent every time a new device is discovered and authenticated on the AMP. Also sent upon change to IP, Name, Firmware, Group Association.
                       awampEventObject 1.3.6.1.4.1.12028.4.15.1
                           awampEventID 1.3.6.1.4.1.12028.4.15.1.101 integer32 read-only
Random number AMP assigns to the event.
                           awampEventSeverityCode 1.3.6.1.4.1.12028.4.15.1.102 integer32 read-only
Level 1-6
                           awampEventDescription 1.3.6.1.4.1.12028.4.15.1.103 displaystring read-only
Concatenated String produced from AMP.
                           awampEventAPIPOld 1.3.6.1.4.1.12028.4.15.1.104 ipaddress read-only
Old IP of the AP when AMP changes and sends trap to HPOV.
                           awampEventAPMngURL 1.3.6.1.4.1.12028.4.15.1.105 displaystring read-only
URL to manage AP on AMP from HPOV.
                           awampEventAPMonURL 1.3.6.1.4.1.12028.4.15.1.106 displaystring read-only
URL to monitor AP on AMP from HPOV.
                           awampEventGroupMngURL 1.3.6.1.4.1.12028.4.15.1.107 displaystring read-only
URL to manage Group on AMP from HPOV.
                           awampEventGroupMonURL 1.3.6.1.4.1.12028.4.15.1.108 displaystring read-only
URL to monitor Group on AMP from HPOV.
                           awampEventAPICON 1.3.6.1.4.1.12028.4.15.1.109 displaystring read-only
Name of ICON to display on HPOV screen
                           awampEventRogueSSID 1.3.6.1.4.1.12028.4.15.1.110 displaystring read-only
SSID of detected Rogue AP.
                           awampEventRogueLANManufacturer 1.3.6.1.4.1.12028.4.15.1.111 displaystring read-only
Manufacturer of LAN of detected Rogue AP.
                           awampEventRogueRadioManufacturer 1.3.6.1.4.1.12028.4.15.1.112 displaystring read-only
Manufacturer of radio detected Rogue AP.
                           awampEventRogueIsWired 1.3.6.1.4.1.12028.4.15.1.113 truthvalue read-only
Detected Rogue AP was discovered on the wired network.
                           awampEventRogueIsWireless 1.3.6.1.4.1.12028.4.15.1.114 truthvalue read-only
Detected Rogue AP was discovered on the wireless network.
                           awampEventRogueClassifyingRule 1.3.6.1.4.1.12028.4.15.1.115 displaystring read-only
Rule used to classify detected rogue AP.
                           awampEventRogueDiscoveringAgent 1.3.6.1.4.1.12028.4.15.1.116 displaystring read-only
The discovering agent that last detected the rogue AP.
                           awampEventRogueDiscoveringAgentFolder 1.3.6.1.4.1.12028.4.15.1.117 displaystring read-only
The folder name of the discovering agent that last detected the rogue AP.
                           awampEventRogueClientMac 1.3.6.1.4.1.12028.4.15.1.118 displaystring read-only
MAC Address of client connected to rogue ap.
                           awampEventRogueName 1.3.6.1.4.1.12028.4.15.1.119 displaystring read-only
SSID to which the client is connected on rogue ap.
                 awampApName 1.3.6.1.4.1.12028.4.101 displaystring read-only
The AP Name
                 awampGroupName 1.3.6.1.4.1.12028.4.102 displaystring read-only
The Group Name
                 awampAPEthMAC 1.3.6.1.4.1.12028.4.103 macaddress read-only
IEEE Unique Identifier
                 awampAPIP 1.3.6.1.4.1.12028.4.104 ipaddress read-only
IP Address of the AP (Eth0)
                 awampAPMFG 1.3.6.1.4.1.12028.4.105 displaystring read-only
AP MFG
                 awampAPModel 1.3.6.1.4.1.12028.4.106 displaystring read-only
AP Model
                 awampAPFirmware 1.3.6.1.4.1.12028.4.107 displaystring read-only
AP Firmware
                 awampROCommString 1.3.6.1.4.1.12028.4.108 displaystring read-only
Read Only Community String (not currently used)
                 awampHPOVHostName 1.3.6.1.4.1.12028.4.109 displaystring read-only
Hostname of the AP
                 awampHPOVSYSID 1.3.6.1.4.1.12028.4.110 displaystring read-only
Hp OpenView Object Id
                 awampHPOVMAC1 1.3.6.1.4.1.12028.4.111 macaddress read-only
First Radio MAC on AP
                 awampHPOVIP1 1.3.6.1.4.1.12028.4.112 ipaddress read-only
First Radio IP AP
                 awampHPOVMAC2 1.3.6.1.4.1.12028.4.113 macaddress read-only
Second Radio MAC on AP
                 awampHPOVIP2 1.3.6.1.4.1.12028.4.114 ipaddress read-only
Second Radio IP AP
                 awampHPOVsysName 1.3.6.1.4.1.12028.4.115 displaystring read-only
Hostname of the AP
                 awampHPOVsysDescr 1.3.6.1.4.1.12028.4.116 displaystring read-only
Hostname of the AP