HPN-ICF-DOT11-WIDS-MIB: View SNMP OID List / Download MIB

VENDOR: HEWLETT-PACKARD


 Home MIB: HPN-ICF-DOT11-WIDS-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 hpnicfDot11WIDS 1.3.6.1.4.1.11.2.14.11.15.2.75.5
This MIB provides information about WIDS feature. GLOSSARY Wireless Intrusion Detection Sensor (WIDS) WIDS is designed to be employed in an area that is serviced by an existing wireless network. It aids in the early detection of malicious outsider attacks and intrusions via wireless networks. Rogue AP A rogue access point is any Wi-Fi access point connected to the network without authorization. As it is not authorized, if there is any weakness in the AP, the hacker will have chance to compromise the network. Rogue Station It is similiar to Rogue AP, while it is a station. Monitor AP An AP will scan or listen to the air, and try to detect wireless attack in the network. Some AP products will work only in monitor role, while some AP products could switch between normal AP role (only provide wireless access service)and monitor AP role. Ad Hoc Mode Station could work under Ad hoc mode, then they could directly do peer-to-peer communication without other device support.
     hpnicfDot11WIDSConfigGroup 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1
         hpnicfDot11WIDSGlobalConfigGroup 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1
             hpnicfDot11WIDSScanMode 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.1 integer read-write
Represents the scope of channels to be scanned. The following value are supported all(1) - Do scan on all the channels. auto(2) - Do scan for the channels that automatically selected by WIDS. Enumeration: 'auto': 2, 'all': 1.
             hpnicfDot11WIDSScanChannelList 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.2 octet string read-write
Represents the channel scope to be scanned when hpnicfDot11WIDSScanMode is configurated as channelSpec mode. Each channel value will be separated by comma character.
             hpnicfDot11CntMsrMode 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.3 bits read-write
Represents the countermeasures mode. Bits: 'rogue': 0, 'config': 2, 'adhoc': 1.
             hpnicfDot11DevAgingTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.4 integer32 read-write
Represents the age time for entries in the detected device table. If an entry is not detected within the interval, it is deleted from the detected device table. If the deleted entry is that of a rogue, it is added into the rogue history table.
             hpnicfDot11DynBlkListEnable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.5 truthvalue read-write
Represents whether the dynamic blacklist feature is enabled or not. 'true' : Enable the dynamic blacklist feature to filter out unwanted clients, which will not get associated. 'false' : Disable the dynamic blacklist feature.
             hpnicfDot11DynBlkListLifeTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.6 integer32 read-write
Represents the lifetime for dynamic blacklist entries. If a dynamic blacklist entry is not detected within the lifetime, the entry will be removed from the dynamic blacklist. The lifetime becomes active only if dynamic blacklist feature is enabled.
             hpnicfDot11FloodAtkDctEnable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.7 truthvalue read-write
Represents whether detection of flood attack is enabled or not. 'true' : Enable the detection of flood attack. 'false' : Disable the detection of flood attack.
             hpnicfDot11SpoofAtkDctEnable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.8 truthvalue read-write
Represents whether detection of Spoof attack is enabled or not. 'true' : Enable the detection of Spoof attack. 'false' : Disable the detection of Spoof attack.
             hpnicfDot11WeakIVAtkDctEnable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.9 truthvalue read-write
Represents whether detection of weak-iv attack is enabled or not. 'true' : Enable the detection of weak-iv attack. 'false' : Disable the detection of weak-iv attack.
             hpnicfDot11ResetWIDSRogueHistory 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.10 truthvalue read-write
This object is used to clear all entries from the rogue history table. It will return false for get operation.
             hpnicfDot11ResetWIDSHistroy 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.11 truthvalue read-write
This object is used to clear the history information of attacks detected in the WLAN system. It will return false for get operation.
             hpnicfDot11ResetWIDSStatistics 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.12 truthvalue read-write
This object is used to clear the statistics of attacks detected in the WLAN system. It will return false for get operation.
             hpnicfDot11ResetAllDynBlkList 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.13 truthvalue read-write
This object is used to remove all entries from the dynamic blacklist. It will return false for get operation.
             hpnicfDot11ResetAllStcBlkList 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.14 truthvalue read-write
This object is used to remove all entries from the static blacklist. It will return false for get operation.
             hpnicfDot11ResetAllWhtBlkList 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.15 truthvalue read-write
This object is used to remove all entries from the static whitelist. It will return false for get operation.
             hpnicfDot11ResetAllDctRogueAP 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.16 truthvalue read-write
This object is used to clear the information of all detected rogue APs. It will return false for get operation.
             hpnicfDot11ResetAllDctRogueSta 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.17 truthvalue read-write
This object is used to clear the information of all detected rogue clients. It will return false for get operation.
             hpnicfDot11ResetAllDctAdhoc 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.18 truthvalue read-write
This object is used to clear the information of all detected ad hoc devices. It will return false for get operation.
             hpnicfDot11ResetAllDctDevice 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.19 truthvalue read-write
This object is used to clear the information of all detected devices. It will return false for get operation.
             hpnicfDot11ResetAllDctSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.20 truthvalue read-write
This object is used to clear the information of all detected SSIDs. It will return false for get operation.
             hpnicfDot11WidsFloodInterval 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.21 unsigned32 read-write
The interval of WIDS flood detection.
             hpnicfDot11WidsBlackListThreshold 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.22 unsigned32 read-write
When flood attack exceeds the value of this node, the MAC address will be added into black list.
             hpnicfDot11SSIDFilterOnOff 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.23 integer read-write
Represents whether the SSID permit feature is enabled or not. Enumeration: 'on': 1, 'off': 2.
             hpnicfDot11BSSIDFilterOnOff 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.24 integer read-write
Represents whether the BSSID permit feature is enabled or not. Enumeration: 'on': 1, 'off': 2.
         hpnicfDot11WIDSPermitVendorTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2 no-access
The table provides the permitted vendor list, and each vendor will be identified by OUI. The legal device should be made by the permitted vendors.
             hpnicfDot11WIDSPermitVendorEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1 no-access
Each entry provides the information of permitted vendor.
                 hpnicfDot11VendorOUI 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1.1 octet string no-access
Represents the vendor OUI information of the wireless device.
                 hpnicfDot11PermitVendorRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1.2 rowstatus read-only
The status of this table entry.
                 hpnicfDot11VendorName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1.3 octet string read-only
Represents the vendor name of the wireless device.
         hpnicfDot11WIDSPermitSSIDTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3 no-access
The table represents the list of SSID could be permitted in the wireless network.
             hpnicfDot11WIDSPermitSSIDEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1 no-access
Each entry provides the information of permitted SSID.
                 hpnicfDot11PermitSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1.1 hpnicfdot11ssidstringtype no-access
Represents the permitted SSID in the wireless network.
                 hpnicfDot11PermitSSIDRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1.2 rowstatus read-only
The status of this table entry.
                 hpnicfDot11PermitSSIDDetected 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1.3 truthvalue read-only
Represents whether the permitted SSID is detected or not.
         hpnicfDot11WIDSIgnoreListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4 no-access
The table provides the MAC address list of stations or APs, and WIDS always take them as legal stations or APs.
             hpnicfDot11WIDSIgnoreListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1 no-access
Each entry contains the MAC address of station or AP, and WIDS always take it as legal station or AP.
                 hpnicfDot11IgnoreMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.1 macaddress no-access
Represents the MAC address of station or AP, and WIDS always take it as legal station or AP.
                 hpnicfDot11IgnoreListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.2 rowstatus read-only
The status of this table entry.
                 hpnicfDot11IgnoreMACDetected 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.3 truthvalue read-only
Represents whether the MAC address detected or not.
                 hpnicfDot11IgnoreDevType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.4 hpnicfdot11widsdevtype read-only
Represents the type of the MAC address detected. The value of this object always is unknown if the MAC address is not detected.
         hpnicfDot11WIDSAttackListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5 no-access
The table provides the MAC address list of rogue APs or rogue stations, the WIDS will take countermeasure as per the MAC address list.
             hpnicfDot11WIDSAttackListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1 no-access
Each entry contains the MAC address of rogue AP or rogue station, and the countermeasure will be taken for it.
                 hpnicfDot11AttackDeviceMac 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.1 macaddress no-access
Represents the MAC address of rogue AP or rogue station, and the countermeasure will be taken for it.
                 hpnicfDot11AttackListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.2 rowstatus read-only
The status of this table entry.
                 hpnicfDot11AttackDevDetected 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.3 truthvalue read-only
Represents whether the assigned MAC address in attack list is detected or not.
                 hpnicfDot11AttackDevType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.4 hpnicfdot11widsdevtype read-only
Represents the type of detected MAC address in attack list. If the MAC address is not detected, it will return unknown(5) for get operation.
         hpnicfDot11StaticWhiteListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6 no-access
The table provides the information of whitelist.
             hpnicfDot11StaticWhiteListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6.1 no-access
Each entry contains the information of whitelist.
                 hpnicfDot11StaticWhiteListMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6.1.1 macaddress no-access
Represents the MAC addresses in whitelist.
                 hpnicfDot11StaticWhiteListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6.1.2 rowstatus read-only
The status of this table entry.
         hpnicfDot11StaticBlackListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7 no-access
The table provides the information of static blacklist.
             hpnicfDot11StaticBlackListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7.1 no-access
Each entry contains the information of static blacklist.
                 hpnicfDot11StaticBlackListMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7.1.1 macaddress no-access
Represents the MAC addresses in static blacklist.
                 hpnicfDot11StaticBlackListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7.1.2 rowstatus read-only
The status of this table entry.
         hpnicfDot11WIDSPermitBSSIDTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8 no-access
The table represents the list of BSSID could be permitted in the wireless network.
             hpnicfDot11WIDSPermitBSSIDEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1 no-access
Each entry provides the information of permitted BSSID.
                 hpnicfDot11PermitBSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1.1 macaddress no-access
Represents the permitted BSSID in the wireless network.
                 hpnicfDot11PermitBSSIDDetected 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1.2 truthvalue read-only
Represents whether the permitted BSSID is detected or not.
                 hpnicfDot11PermitBSSIDRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1.3 rowstatus read-only
Represents the row status of permit BSSID table.
     hpnicfDot11WIDSDetectGroup 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2
         hpnicfDot11WIDSRogueAPTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1 no-access
The table represents the list of possible BSS information for rogue APs detected by the WIDS.
             hpnicfDot11WIDSRogueAPEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1 no-access
Each entry contains possible BSS information of each rogue AP detected by WIDS.
                 hpnicfDot11RogueAPBSSMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.1 macaddress no-access
Represents the BSS MAC address of rogue AP.
                 hpnicfDot11RogueAPVendorName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.2 octet string read-only
Represents the vendor name of rogue AP.
                 hpnicfDot11RogueAPMonitorNum 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.3 integer32 read-only
Represents the number of monitor APs which detected the rogue AP.
                 hpnicfDot11RogueAPFirstDetectTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.4 timeticks read-only
Represents the time that AP was detected as a rogue AP for the first time.
                 hpnicfDot11RogueAPLastDetectTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.5 timeticks read-only
Represents the time that AP was detected as a rogue AP for the last time.
                 hpnicfDot11RogueAPSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.6 hpnicfdot11ssidstringtype read-only
Represents the SSID broadcasted by rogue AP.
                 hpnicfDot11RogueAPMaxSigStrength 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.7 integer32 read-only
Represents the maximal value of signal strength that WIDS received from the rogue AP.
                 hpnicfDot11RogueAPChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.8 hpnicfdot11channelscopetype read-only
Represents on which radio channel of the rogue AP the maximal signal strength was received.
                 hpnicfDot11RogueAPBeaconInterval 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.9 integer32 read-only
Represents the interval for Beacon management frame of rogue AP.
                 hpnicfDot11RogueAPAttackedStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.10 truthvalue read-only
Represents whether the countermeasure have taken for the rogue AP.
                 hpnicfDot11RogueAPToIgnore 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.11 truthvalue read-write
Represents whether the rogue AP will be taken as a rogue AP. If the value is true, NMS should not display the rogue AP as NMS display rogue AP list, and the MAC address will be automatically added into hpnicfDot11WIDSIgnoreListTable. If the value is false, NMS will take it as a rogue AP.
                 hpnicfDot11RogueAPEncryptStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.12 truthvalue read-only
Represents whether the rogue AP encrypt the frame or not.
                 hpnicfDot11RogueAPReset 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.13 truthvalue read-write
This object is used to clear information of assigned AP. The information of AP which detect assigned rogue AP will be cleared together. It will return false for get operation.
                 hpnicfDot11RogueAPFirstDetectTmStr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.14 octet string read-only
Represents the time that AP was detected as a rogue AP for the first time.
                 hpnicfDot11RogueAPLastDetectTmStr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.15 octet string read-only
Represents the time that AP was detected as a rogue AP for the last time.
         hpnicfDot11WIDSRogueAPExtTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2 no-access
As each rogue AP could be detected by multiple monitor APs, each monitor AP could have some kind of detailed information about a specific rogue AP. In the hpnicfDot11WIDSRogueAPTable table, the detailed information for a specific rogue AP will be summarized from information in the hpnicfDot11WIDSRogueAPExtTable table. For example, multiple monitor APs could receive RF signal of one rogue AP, and each monitor AP has its maximum signal strength by itself. The information will be kept as hpnicfDot11DetectMaxAPSigStrength in the hpnicfDot11WIDSRogueAPExtTable table. While only the maximum value among all the hpnicfDot11DetectMaxAPSigStrength for each monitor AP will be kept in the hpnicfDot11WIDSRogueAPTable as hpnicfDot11RogueAPMaxSigStrength.
             hpnicfDot11WIDSRogueAPExtEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1 no-access
Each entry contains information of the rogue AP detected by each monitor AP.
                 hpnicfDot11WIDSAPID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.1 hpnicfdot11objectidtype no-access
To uniquely identify each AP, and relation-ship between hpnicfDot11WIDSAPID and AP device will be static.
                 hpnicfDot11DetectCurAPSigStrength 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.2 integer32 read-only
Represents the current value of signal strength that WIDS monitor AP received from the rogue AP.
                 hpnicfDot11DetectAPByChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.3 hpnicfdot11channelscopetype read-only
Represents on which radio channel that WIDS monitor AP detected the rogue AP.
                 hpnicfDot11DetectAPByRadioID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.4 hpnicfdot11radioscopetype read-only
Represents on which radio the monitor AP has detected the rogue AP.
                 hpnicfDot11AttackAPStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.5 truthvalue read-only
Represents whether monitor AP have taken countermeasure on the rogue AP.
                 hpnicfDot11DetectAPFirstTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.6 timeticks read-only
Represents the time that monitor AP detected the rogue AP for the first time.
                 hpnicfDot11DetectAPLastTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.7 timeticks read-only
Represents the time that monitor AP detected the rogue AP for the last time.
         hpnicfDot11WIDSRogueStaTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3 no-access
The table represents the list of rogue stations detected by the WIDS.
             hpnicfDot11WIDSRogueStaEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1 no-access
Each entry contains information of each rogue station.
                 hpnicfDot11RogueStaMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.1 macaddress no-access
Represents the MAC address of rogue station.
                 hpnicfDot11RogueStaVendorName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.2 octet string read-only
Represents the vendor name of rogue station.
                 hpnicfDot11RogueStaMonitorNum 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.3 integer32 read-only
Represents the number of monitor APs which detected the rogue station.
                 hpnicfDot11RogueStaFirstDetectTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.4 timeticks read-only
Represents the time that station was detected as a rogue station for the first time.
                 hpnicfDot11RogueStaLastDetectTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.5 timeticks read-only
Represents the time that station was detected as a rogue station for the last time.
                 hpnicfDot11RogueStaAccessBSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.6 macaddress read-only
Represents BSS MAC address that rogue station try to access.
                 hpnicfDot11RogueStaMaxSigStrength 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.7 integer32 read-only
Represents the maximal value of signal strength that WIDS received from the rogue station.
                 hpnicfDot11RogueStaChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.8 hpnicfdot11channelscopetype read-only
Represents on which radio channel the maximal signal strength was received.
                 hpnicfDot11RogueStaAttackedStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.9 truthvalue read-only
Represents whether the countermeasure have taken for the rogue station.
                 hpnicfDot11RogueStaToIgnore 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.10 truthvalue read-write
Represents whether the rogue AP will be taken as a rogue station. If the value is true, NMS should not display the rogue station as NMS display rogue station list, and the MAC address will be automatically added into hpnicfDot11WIDSIgnoreListTable. If the value is false, NMS will take it as a rogue station.
                 hpnicfDot11RogueStaAdHocStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.11 truthvalue read-only
Represents whether the rogue station work on the Ad Hoc mode or not.
                 hpnicfDot11RogueStaReset 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.12 truthvalue read-write
This object is used to clear information of assigned station. The information of AP which detects assigned rogue station will be cleared together. It will return false for get operation.
                 hpnicfDot11RogueStaFirstDetectTmStr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.13 octet string read-only
Represents the time that station was detected as a rogue station for the first time.
                 hpnicfDot11RogueStaLastDetectTmStr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.14 octet string read-only
Represents the time that station was detected as a rogue station for the last time.
         hpnicfDot11WIDSRogueStaExtTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4 no-access
As each rogue station could be detected by multiple monitor APs, each monitor AP could have some kind of detailed information about a specific rogue station. In the hpnicfDot11WIDSRogueStaTable table, the detailed information for a specific rogue station will be summarized from information in the hpnicfDot11WIDSRogueStaExtTable table. For example, multiple monitor APs could receive RF signal of one rogue station, and each monitor AP has its maximum signal strength by itself. The information will be kept as hpnicfDot11DetectMaxStaSigStrength in the hpnicfDot11WIDSRogueStaExtTable table. While only the maximum value among all the hpnicfDot11DetectMaxStaSigStrength for each monitor AP will be kept in the hpnicfDot11WIDSRogueStaTable as hpnicfDot11RogueStaMaxSigStrength.
             hpnicfDot11WIDSRogueStaExtEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1 no-access
Each entry contains information of rogue station detected by each monitor AP.
                 hpnicfDot11DetectCurStaSigStrength 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.1 integer32 read-only
Represents the current value of signal strength that WIDS monitor AP received from the rogue station.
                 hpnicfDot11DetectStaByChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.2 hpnicfdot11channelscopetype read-only
Represents on which radio channel the maximal signal strength was received.
                 hpnicfDot11DetectStaByRadioID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.3 hpnicfdot11radioscopetype read-only
Represents which radio on the monitor AP has detected the rogue station.
                 hpnicfDot11AttackStaStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.4 truthvalue read-only
Represents whether monitor AP have taken countermeasure for the rogue station.
                 hpnicfDot11DetectStaFirstTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.5 timeticks read-only
Represents the time that monitor AP detected the rogue station for the first time.
                 hpnicfDot11DetectStaLastTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.6 timeticks read-only
Represents the time that monitor AP detected the rogue station for the last time.
         hpnicfDot11WIDSDetectedDevTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5 no-access
This Table contains information of detected devices.
             hpnicfDot11WIDSDetectedDevEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1 no-access
Each entry contains information of detected devices.
                 hpnicfDot11WIDSDevMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.1 macaddress no-access
Represents MAC address of the device detected.
                 hpnicfDot11WIDSDevType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.2 hpnicfdot11widsdevtype read-only
Represents type of the device detected.
                 hpnicfDot11WIDSDevPermitType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.3 hpnicfdot11widsdevpermittype read-only
Represents whether the device detected is a rogue device or not.
                 hpnicfDot11WIDSDevVendor 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.4 octet string read-only
Represents Vendor of the detected device.
                 hpnicfDot11WIDSDevMonitorNum 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.5 integer32 read-only
Represents the number of active APs that detect the device.
                 hpnicfDot11WIDSDevSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.6 octet string read-only
Represents the service set identifier for the ESS of the device.
                 hpnicfDot11WIDSDevBSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.7 macaddress read-only
Represents the basic service set identifier of the detected device.
                 hpnicfDot11WIDSDevChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.8 hpnicfdot11channelscopetype read-only
Represents the channel in which the device was last detected.
                 hpnicfDot11WIDSDevMaxRSSI 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.9 integer32 read-only
Represents the maximum detected RSSI of the device.
                 hpnicfDot11WIDSDevBeaconIntvl 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.10 integer32 read-only
Represents the beacon interval for the detected AP.
                 hpnicfDot11WIDSDevFstDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.11 dateandtime read-only
Represents the time at which the device was first detected.
                 hpnicfDot11WIDSDevLstDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.12 dateandtime read-only
Represents the time at which the rogue AP was detected last time.
                 hpnicfDot11WIDSDevReset 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.13 truthvalue read-write
This object is used to clears the information of the device detected in the WLAN. It will return false for get operation.
                 hpnicfDot11WIDSDevSnr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.14 integer32 read-only
Represents SNR of the device detected.
         hpnicfDot11WIDSRptAPTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6 no-access
This Table contains information of the AP which detected device in the WLAN.
             hpnicfDot11WIDSRptAPEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1 no-access
Each entry contains information of the AP which detected device in the WLAN.
                 hpnicfDot11WIDSRptAPMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.1 macaddress no-access
Represents the MAC address of the AP that detected the device.
                 hpnicfDot11WIDSRptAPName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.2 octet string read-only
Represents the name of the AP that detected the device.
                 hpnicfDot11WIDSRptAPRadioID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.3 hpnicfdot11radioscopetype read-only
Represents the radio index of the AP that detected the device.
                 hpnicfDot11WIDSRptAPMaxRSSI 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.4 integer32 read-only
Represents the maximum detected RSSI of the device.
                 hpnicfDot11WIDSRptAPFstDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.5 dateandtime read-only
Represents the time at which the rogue AP was detected first time.
                 hpnicfDot11WIDSRptAPLstDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.6 dateandtime read-only
Represents the time at which the rogue AP was detected last time.
         hpnicfDot11DynBlackListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7 no-access
This table contains information of dynamic blacklist entries.
             hpnicfDot11DynBlackListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1 no-access
Each entry contains information of dynamic blacklist.
                 hpnicfDot11DynBlackListMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.1 macaddress no-access
Represents the MAC address of the device inserted into the dynamic blacklist.
                 hpnicfDot11DynBlackListTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.2 unsigned32 read-only
Represents the time elapsed since the entry was last updated.
                 hpnicfDot11DynBlackListReason 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.3 octet string read-only
Represents the reason why the entry was added into the dynamic blacklist.
                 hpnicfDot11DynBlackListReset 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.4 truthvalue read-write
This object is used to remove designated entry from the dynamic blacklist. The value which read from this object always is false.
                 hpnicfDot11DynBlackListTimeTicks 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.5 timeticks read-only
Represents the time elapsed since the entry was last updated in units TimeTicks.
         hpnicfDot11WIDSRogueHistoryTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8 no-access
This table contains information of all expired rogue devices which have been deleted from the list of detected rogue devices because they could not be detected within the device aging duration.
             hpnicfDot11WIDSRogueHistoryEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1 no-access
Each entry contains information of an expired rogue device which has been deleted from the list of detected rogue devices because they could not be detected within the device aging duration.
                 hpnicfDot11WIDSRogueHisIndex 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.1 integer32 no-access
Represents index of this entry.
                 hpnicfDot11WIDSRogueHisMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.2 macaddress read-only
Represents the MAC address of the device.
                 hpnicfDot11WIDSRogueHisVendor 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.3 octet string read-only
Represents the vendor for the device.
                 hpnicfDot11WIDSRogueHisType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.4 hpnicfdot11widsdevtype read-only
Represents the type of the device.
                 hpnicfDot11WIDSRogueHisChl 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.5 hpnicfdot11channelscopetype read-only
Represents the channel in which the device was last detected.
                 hpnicfDot11WIDSRogueHisSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.6 octet string read-only
Represents the service set identifier for the ESS of the device.
                 hpnicfDot11WIDSRogueHisLastDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.7 dateandtime read-only
Represents the time at which the device was last detected.
         hpnicfDot11WIDSAtkHistroyTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9 no-access
This table contains information of the history of attacks detected in the WLAN system.
             hpnicfDot11WIDSAtkHistroyEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1 no-access
Each entry contains information of the history of attacks detected in the WLAN system.
                 hpnicfDot11WIDSAtkHisIndex 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.1 integer32 no-access
Represents index of this entry.
                 hpnicfDot11WIDSAtkHisMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.2 macaddress read-only
Represents the Mac address. In case of spoof attacks, this field provides the BSSID which was spoofed. In case of other attacks, this field provides the MAC address of the device which initiated the attack.
                 hpnicfDot11WIDSAtkHisType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.3 hpnicfdot11widsatktype read-only
Represents the type of attack.
                 hpnicfDot11WIDSAtkHisChl 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.4 hpnicfdot11channelscopetype read-only
Represents the channel in which the attack was detected.
                 hpnicfDot11WIDSAtkHisRSSI 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.5 integer32 read-only
Represents the average RSSI of the designated attack.
                 hpnicfDot11WIDSAtkHisDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.6 dateandtime read-only
Represents the time at which this attack was detected.
                 hpnicfDot11WIDSAtkHisAPName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.7 octet string read-only
Represents the name of the AP which detected this attack.
         hpnicfDot11WIDSAtkStatis 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10
               hpnicfDot11WIDSAtkStasStartTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.1 dateandtime read-only
Represents current attack tracking time. It is started at the system startup and is refreshed each hour subsequently.
               hpnicfDot11WIDSAtkStasTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2 no-access
This table contains information of the counts of attacks detected.
                   hpnicfDot11WIDSAtkStasEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1 no-access
Each entry contains information of the counts of attacks detected.
                       hpnicfDot11WIDSAtkStasType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1.1 hpnicfdot11widsatktype no-access
Represents the type of attack.
                       hpnicfDot11WIDSAtkStasCurCnt 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1.2 unsigned32 read-only
Represents the count of attacks detected since the time specified by the current attack tracking time. The current attack tracking time is started at the system startup and is refreshed each hour subsequently.
                       hpnicfDot11WIDSAtkStasTotalCnt 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1.3 unsigned32 read-only
Represents the total count of the attacks detected since the system startup.
         hpnicfDot11BlackListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11 no-access
This table contains information of blacklist entries, including dynamic and static.
               hpnicfDot11BlackListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1 no-access
Each entry contains information of blacklist.
                   hpnicfDot11BlackListMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.1 macaddress no-access
This object represents the MAC address of the device inserted into the table.
                   hpnicfDot11BlackListTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.2 unsigned32 read-only
Represents the time elapsed since the entry was last updated. If it is static blacklist, the value is always 0.
                   hpnicfDot11BlackListReason 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.3 octet string read-only
Represents the reason why the entry was added into the blacklist.
                   hpnicfDot11BlackListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.4 rowstatus read-only
This object represents the status of this table entry.
                   hpnicfDot11BlackListTimeTicks 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.5 timeticks read-only
Represents the time elapsed since the entry was last updated in timetick. If it is static blacklist, the value is always 0.
     hpnicfDot11WIDSNotifyGroup 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3
         hpnicfDot11WIDSTraps 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1
             hpnicfDot11WIDSDetectRogueTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.1
The notification represents that a rogue AP or a station was detected by WIDS. The NMS would refer to MIB table under hpnicfDot11WIDSDetectGroup group to get more detailed information.
             hpnicfDot11WIDSAdHocTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.2
The notification represents a rogue Ad hoc station was detected.
             hpnicfDot11WIDSUnauthorSSIDTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.3
The notification represents which unauthorized SSID are accessed in the network. The notification will be sent to NMS when an unauthorized SSID is detected on the network for the first time.
             hpnicfDot11WIDSDisappearRogueTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.4
The notification represents that a rogue device has aged out and moved to history table or the device type has been changed to friendly. The notification will be sent to NMS whenever a rogue disappears.
             hpnicfDot11WIDSDetectAttack 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.5
This notification occurs when some type of attack is detected.
             hpnicfDot11WIDSDetectWBridge 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.6
This notification occurs whenever a detected device is classified as rogue wireless-bridge.
             hpnicfDot11WIDSFloodTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.7
This notification occurs when flood attack is detected.
             hpnicfDot11WIDSSpoofTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.8
This notification occurs when spoof attack is detected.
             hpnicfDot11WIDSWeakIVTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.9
This notification occurs when weak IV attack is detected.
         hpnicfDot11WIDSTrapVarObjects 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2
             hpnicfDot11WIDSRogueMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.1 macaddress no-access
Represents which rogue AP or station.
             hpnicfDot11WIDSRogueType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.2 integer no-access
Represents the rogue type. The following value are supported rogueAp(1) - A rogue AP rogueStation(2) - A rogue Station Enumeration: 'rogueStation': 2, 'rogueAp': 1.
             hpnicfDot11WIDSMonitorMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.3 macaddress no-access
Represents which monitor detected the rogue AP or station.
             hpnicfDot11WIDSAdHocMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.4 macaddress no-access
Represents the MAC address of Ad hoc station.
             hpnicfDot11UnauthorSSIDName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.5 hpnicfdot11ssidstringtype no-access
Represents an unauthorized SSID.
             hpnicfDot11MonitorAPID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.6 hpnicfdot11objectidtype no-access
Represents monitor AP's APID.
             hpnicfDot11MonitorApRadioID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.7 hpnicfdot11radioscopetype no-access
Represents monitor AP's radio ID
             hpnicfDot11WIDSAtkMac 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.8 macaddress no-access
Represents mac address of attack source.
             hpnicfDot11WIDSAtkFrameType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.9 octet string no-access
Represents attack frame type.
             hpnicfDot11WIDSAtkChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.10 hpnicfdot11channelscopetype no-access
Represents attack channel.
             hpnicfDot11WIDSAtkTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.11 octet string no-access
Represents when attacking happened.
             hpnicfDot11WIDSAtkDestMac 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.12 macaddress no-access
Represents mac address of attack destination.
             hpnicfDot11WIDSFirstTrapTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.13 timeticks no-access
Represents the first trap time.