NTWS-TRAP-MIB: View SNMP OID List / Download MIB

VENDOR: SYNOPTICS


 Home MIB: NTWS-TRAP-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 ntwsDeviceId 1.3.6.1.4.1.45.6.1.2.1 object identifier no-access
Enumeration of devices as indicated in registration MIB. This object is used within notifications and is not accessible.
 ntwsMobilityDomainIp 1.3.6.1.4.1.45.6.1.2.2 ipaddress no-access
IP address of the other switch which the send switch is reporting on. This object is used within notifications and is not accessible.
 ntwsAPMACAddress 1.3.6.1.4.1.45.6.1.2.3 macaddress no-access
MAC address of the AP of interest. This object is used within notifications and is not accessible.
 ntwsClientMACAddress 1.3.6.1.4.1.45.6.1.2.4 macaddress no-access
MAC address of the client of interest. This object is used within notifications and is not accessible.
 ntwsRFDetectXmtrMacAddr 1.3.6.1.4.1.45.6.1.2.5 macaddress no-access
Describes the transmitter's MAC address. This object is used within notifications and is not accessible.
 ntwsPortNum 1.3.6.1.4.1.45.6.1.2.6 integer no-access
Port number on the AC which reported this rogue during a detection sweep. This object is used within notifications and is not accessible.
 ntwsAPRadioNum 1.3.6.1.4.1.45.6.1.2.7 ntwsradionum no-access
Radio number of the AP which reported this rogue during a detection sweep. This object is used within notifications and is not accessible.
 ntwsRadioRssi 1.3.6.1.4.1.45.6.1.2.8 integer no-access
The received signal strength as measured by the AP radio which reported this rogue during a detection sweep. This object is used within notifications and is not accessible. Not used by any notification.
 ntwsRadioBSSID 1.3.6.1.4.1.45.6.1.2.9 octet string no-access
The basic service set identifier of the rogue from the beacon frame reported by the AP during a detection sweep. This object is used within notifications and is not accessible.
 ntwsUserName 1.3.6.1.4.1.45.6.1.2.10 displaystring no-access
The client user name as learned from the AAA process. This object is used within notifications and is not accessible.
 ntwsClientAuthServerIp 1.3.6.1.4.1.45.6.1.2.11 ipaddress no-access
The client authentication server ip address. This object is used within notifications and is not accessible.
 ntwsClientSessionState 1.3.6.1.4.1.45.6.1.2.12 ntwsclientsessionstate no-access
The state for a client session. This object is used within notifications and is not accessible.
 ntwsDAPNum 1.3.6.1.4.1.45.6.1.2.13 integer no-access
The DAP number on the wireless switch. This object is used within notifications and is not accessible.
 ntwsClientIp 1.3.6.1.4.1.45.6.1.2.14 ipaddress no-access
The client ip address. This object is used within notifications and is not accessible.
 ntwsClientSessionId 1.3.6.1.4.1.45.6.1.2.15 displaystring no-access
The unique global id for a client session. This object is used within notifications and is not accessible.
 ntwsClientAuthenProtocolType 1.3.6.1.4.1.45.6.1.2.16 ntwsclientauthenprotocoltype no-access
The authentication protocol for a client. This object is used within notifications and is not accessible.
 ntwsClientVLANName 1.3.6.1.4.1.45.6.1.2.17 displaystring no-access
The vlan name a client is on. This object is used within notifications and is not accessible.
 ntwsClientSessionStartTime 1.3.6.1.4.1.45.6.1.2.18 timeticks no-access
The start time of a client session, relative to the sysUptime. This object is used within notifications and is not accessible. Obsolete. Do not use it because it's not vital information and often *cannot* be implemented to match the declared semantics: a client session might have been created on another wireless switch, *before* the current switch booted (the local zero of sysUptime).
 ntwsClientFailureCause 1.3.6.1.4.1.45.6.1.2.19 displaystring no-access
Display string for possible failure cause for a client session. This object is used within notifications and is not accessible.
 ntwsClientRoamedFromPortNum 1.3.6.1.4.1.45.6.1.2.20 integer no-access
The port number on the AC a client has roamed from. This object is used within notifications and is not accessible.
 ntwsClientRoamedFromRadioNum 1.3.6.1.4.1.45.6.1.2.21 ntwsradionum no-access
The radio number of the AP the client is roamed from. This object is used within notifications and is not accessible.
 ntwsClientRoamedFromDAPNum 1.3.6.1.4.1.45.6.1.2.22 integer no-access
The DAP number on the AC which reported this rogue during roam. This object is used within notifications and is not accessible.
 ntwsUserParams 1.3.6.1.4.1.45.6.1.2.23 displaystring no-access
A display string of User Parameters for client user authorization attributes learned through AAA and/or used by the system. Note that the syntax will be (name=value, name=value,..) for the parsing purpose. This object is used within notifications and is not accessible.
 ntwsClientLocationPolicyIndex 1.3.6.1.4.1.45.6.1.2.24 integer no-access
Index of the Location Policy rule applied to a user. This object is used within notifications and is not accessible.
 ntwsClientAssociationFailureCause 1.3.6.1.4.1.45.6.1.2.25 ntwsassociationfailuretype no-access
The client association failure cause. This object is used within notifications and is not accessible.
 ntwsClientAuthenticationFailureCause 1.3.6.1.4.1.45.6.1.2.26 ntwsauthenticationfailuretype no-access
The client authentication failure cause. This object is used within notifications and is not accessible.
 ntwsClientAuthorizationFailureCause 1.3.6.1.4.1.45.6.1.2.27 ntwsauthorizationfailuretype no-access
The client authorization failure cause. Note that if it is the user-param, we would additionally expect the failure cause description to list the user attribute value that caused the failure. This object is used within notifications and is not accessible.
 ntwsClientFailureCauseDescription 1.3.6.1.4.1.45.6.1.2.28 displaystring no-access
Display string for describing the client failure cause. This object is used within notifications and is not accessible.
 ntwsClientRoamedFromWsIp 1.3.6.1.4.1.45.6.1.2.29 ipaddress no-access
The system IP address of the AC (wireless switch) a client roamed from. This object is used within notifications and is not accessible.
 ntwsClientRoamedFromAccessType 1.3.6.1.4.1.45.6.1.2.30 ntwsaccesstype no-access
The client access type (ap, dap, wired) that a client roamed from. This object is used within notifications and is not accessible.
 ntwsClientAccessType 1.3.6.1.4.1.45.6.1.2.31 ntwsaccesstype no-access
The client access type (ap, dap, wired). This object is used within notifications and is not accessible. For new traps, use ntwsClientAccessMode instead of this object.
 ntwsRadioMACAddress 1.3.6.1.4.1.45.6.1.2.32 macaddress no-access
AP Radio MAC address. This object is used within notifications and is not accessible.
 ntwsRadioPowerChangeReason 1.3.6.1.4.1.45.6.1.2.33 ntwsradiopowerchangetype no-access
The type of event that caused an AP radio power change; occurs due to auto-tune operation. This object is used within notifications and is not accessible.
 ntwsNewChannelNum 1.3.6.1.4.1.45.6.1.2.34 integer no-access
New channel number of the AP radio used after an auto tune event. This object is used within notifications and is not accessible.
 ntwsOldChannelNum 1.3.6.1.4.1.45.6.1.2.35 integer no-access
Old channel number of the AP radio used before an auto tune event. This object is used within notifications and is not accessible.
 ntwsChannelChangeReason 1.3.6.1.4.1.45.6.1.2.36 ntwschannelchangetype no-access
The type of event that caused an AP radio channel change; occurs due to auto-tune operation. This object is used within notifications and is not accessible.
 ntwsRFDetectListenerListInfo 1.3.6.1.4.1.45.6.1.2.37 octet string no-access
The RF Detection Listener list info including a list of (listener mac, rssi, channel, ssid, time). There will be a maximum of 6 entries in the list. Formats: MAC: 18 bytes: %2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X RSSI: 10 bytes: %10d CHANNEL: 3 bytes: %3d SSID: 32 bytes: %s TIME: 26 bytes: %s Maximum size per entry is 89+4+2 = 95 bytes. Maximum size of the string is 6*95= 571 bytes (include NULL). This object is used within notifications and is not accessible.
 ntwsRadioSSID 1.3.6.1.4.1.45.6.1.2.38 displaystring no-access
The radio SSID string This object is used within notifications and is not accessible.
 ntwsNewPowerLevel 1.3.6.1.4.1.45.6.1.2.39 ntwspowerlevel no-access
New power level of the AP radio used after an auto tune event. This object is used within notifications and is not accessible.
 ntwsOldPowerLevel 1.3.6.1.4.1.45.6.1.2.40 ntwspowerlevel no-access
Old power level of the AP radio used before an auto tune event. This object is used within notifications and is not accessible.
 ntwsRadioPowerChangeDescription 1.3.6.1.4.1.45.6.1.2.41 displaystring no-access
The radio power change description. In the case of reason being dup-pkts-threshold-exceed(1), and retransmit-threshold-exceed(2), clientMacAddress will be included in the description. This object is used within notifications and is not accessible.
 ntwsCounterMeasurePerformerListInfo 1.3.6.1.4.1.45.6.1.2.42 displaystring no-access
A list of information for APs performing Counter Measures including a list of performer mac addresses. This object is used within notifications and is not accessible. Not used by any notification.
 ntwsClientDot1xState 1.3.6.1.4.1.45.6.1.2.43 ntwsclientdot1xstate no-access
The state for a client 802.1X. This object is used within notifications and is not accessible.
 ntwsClientDot1xFailureCause 1.3.6.1.4.1.45.6.1.2.44 ntwsdot1xfailuretype no-access
The client 802.1X failure cause. This object is used within notifications and is not accessible.
 ntwsAPAccessType 1.3.6.1.4.1.45.6.1.2.45 ntwsaccesstype no-access
The access point access type (ap, dap,). This object is used within notifications and is not accessible. Not used by any notification.
 ntwsUserAccessType 1.3.6.1.4.1.45.6.1.2.46 ntwsuseraccesstype no-access
The user access type (MAC, WEB, DOT1X, LAST-RESORT). This object is used within notifications and is not accessible.
 ntwsClientSessionElapsedTime 1.3.6.1.4.1.45.6.1.2.47 timeticks no-access
The elapsed time for a client session. Obsoleted because session time is usually reported in seconds. This object is used within notifications and is not accessible.
 ntwsLocalId 1.3.6.1.4.1.45.6.1.2.48 integer no-access
Local Id for the session. This object is used within notifications and is not accessible.
 ntwsRFDetectDoSType 1.3.6.1.4.1.45.6.1.2.49 ntwsrfdetectdostype no-access
The type of denial of service (DoS) attack. This object is used within notifications and is not accessible.
 ntwsSourceWsIp 1.3.6.1.4.1.45.6.1.2.50 ipaddress no-access
IP address of another AC (wireless switch). This object is used within notifications and is not accessible.
 ntwsClientVLANid 1.3.6.1.4.1.45.6.1.2.51 integer no-access
VLAN ID used by client traffic. This object is used within notifications and is not accessible.
 ntwsClientVLANtag 1.3.6.1.4.1.45.6.1.2.52 integer no-access
VLAN tag used by client traffic. This object is used within notifications and is not accessible.
 ntwsDeviceModel 1.3.6.1.4.1.45.6.1.2.53 displaystring no-access
The model of a device in printable US-ASCII. If unknown (or not available), then the value is a zero length string. This object is used within notifications and is not accessible.
 ntwsDeviceSerNum 1.3.6.1.4.1.45.6.1.2.54 ntwsapserialnum no-access
The serial number of an AP in printable US-ASCII. If unknown (or not available), then the value is a zero length string. Should NOT be used to identify other devices, for example an AC (wireless switch). This object is used within notifications and is not accessible.
 ntwsRsaPubKeyFingerPrint 1.3.6.1.4.1.45.6.1.2.55 ntwsapfingerprint no-access
The hash of the RSA public key (of a key pair) in binary form that uniquely identifies the public key of an AP. This object is used within notifications and is not accessible.
 ntwsDAPconnectWarningType 1.3.6.1.4.1.45.6.1.2.56 integer no-access
The type of DAP connect warning. The values are: not-configured-fingerprint-connect(1)...a DAP, which has an RSA keypair but did not have its fingerprint configured on the AC, has connected to the AC when 'dap security' set to 'OPTIONAL' secure-handshake-failure(2).............a DAP tried to connect to the AC with security, but the handshake failed not-configured-fingerprint-required(3)..a DAP tried to connect to the AC with security, but 'dap security' set to 'REQUIRED', and no fingerprint was configured for the DAP fingerprint-mismatch(4).................a DAP tried to connect to the AC with security and its fingerprint was configured, but the fingerprint did not match the computed one This object is used within notifications and is not accessible. Enumeration: 'not-configured-fingerprint-connect': 1, 'not-configured-fingerprint-required': 3, 'secure-handshake-failure': 2, 'fingerprint-mismatch': 4.
 ntwsClientMACAddress2 1.3.6.1.4.1.45.6.1.2.57 macaddress no-access
MAC address of the second client of interest. This object is used within notifications and is not accessible.
 ntwsApAttachType 1.3.6.1.4.1.45.6.1.2.58 ntwsapattachtype no-access
How the AP is attached to the AC (directly or via L2/L3 network). This object is used within notifications and is not accessible.
 ntwsApPortOrDapNum 1.3.6.1.4.1.45.6.1.2.59 ntwsapportordapnum no-access
The Port Number if the AP is directly attached, or the CLI-assigned DAP Number if attached via L2/L3 network. This object is used within notifications and is not accessible. Obsoleted by ntwsApNum. (In 6.0, direct- and network-attached APs were unified.)
 ntwsApName 1.3.6.1.4.1.45.6.1.2.60 displaystring no-access
The name of the AP, as assigned in AC's CLI; defaults to AP (examples: 'AP01', 'AP22', 'AP333', 'AP4444'); could have been changed from CLI to a meaningful name, for example the location of the AP (example: 'MeetingRoom73'). This object is used within notifications and is not accessible.
 ntwsApTransition 1.3.6.1.4.1.45.6.1.2.61 ntwsaptransition no-access
AP state Transition, as seen by the AC. This object is used within notifications and is not accessible.
 ntwsApFailDetail 1.3.6.1.4.1.45.6.1.2.62 ntwsapfaildetail no-access
Detailed failure code for some of the transitions specified in 'ntwsApTransition' object. This object is used within notifications and is not accessible.
 ntwsRadioType 1.3.6.1.4.1.45.6.1.2.63 ntwsradiotype no-access
Indicates the AP Radio Type, as seen by AC. This object is used within notifications and is not accessible.
 ntwsRadioConfigState 1.3.6.1.4.1.45.6.1.2.64 ntwsradioconfigstate no-access
Indicates the Radio State, as seen by the AC. This object is used within notifications and is not accessible.
 ntwsApConnectSecurityType 1.3.6.1.4.1.45.6.1.2.65 ntwsapconnectsecuritytype no-access
Indicates the security level of the connection between AP and AC. This object is used within notifications and is not accessible.
 ntwsApServiceAvailability 1.3.6.1.4.1.45.6.1.2.66 ntwsapserviceavailability no-access
Indicates the level of wireless service availability. This object is used within notifications and is not accessible.
 ntwsApWasOperational 1.3.6.1.4.1.45.6.1.2.67 ntwsapwasoperational no-access
Indicates whether the AP was operational before a transition occured. This object is used within notifications and is not accessible.
 ntwsClientTimeSinceLastRoam 1.3.6.1.4.1.45.6.1.2.68 unsigned32 no-access
The time in seconds since the most recent roam of a given client. This object is used within notifications and is not accessible.
 ntwsClientIpAddrChangeReason 1.3.6.1.4.1.45.6.1.2.69 ntwsclientipaddrchangereason no-access
Indicates the reason why client IP address changed. This object is used within notifications and is not accessible.
 ntwsRFDetectRogueAPMacAddr 1.3.6.1.4.1.45.6.1.2.70 macaddress no-access
Describes the MAC address of the Rogue AP the transmitter is connected to. This object is used within notifications and is not accessible.
 ntwsBlacklistingRemainingTime 1.3.6.1.4.1.45.6.1.2.71 unsigned32 no-access
The time in seconds remaining until a given transmitter could be removed from the Black List. This object is used within notifications and is not accessible.
 ntwsBlacklistingCause 1.3.6.1.4.1.45.6.1.2.72 ntwsblacklistingcause no-access
Indicates the reason why a given transmitter is blacklisted. This object is used within notifications and is not accessible.
 ntwsNumLicensedActiveAPs 1.3.6.1.4.1.45.6.1.2.73 unsigned32 no-access
Indicates the maximum (licensed) number of active APs for this AC. This object is used within notifications and is not accessible.
 ntwsClientDynAuthorClientIp 1.3.6.1.4.1.45.6.1.2.74 ipaddress no-access
The dynamic authorization client IP address which caused the change of authorization. This object is used within notifications and is not accessible.
 ntwsChangedUserParamOldValues 1.3.6.1.4.1.45.6.1.2.75 ntwsuserattributelist no-access
A display string listing the changed AAA attributes and their values, before the change of authorization was executed. This object is used within notifications and is not accessible.
 ntwsChangedUserParamNewValues 1.3.6.1.4.1.45.6.1.2.76 ntwsuserattributelist no-access
A display string listing the changed AAA attributes and their values, after the change of authorization was executed. This object is used within notifications and is not accessible.
 ntwsClientDisconnectSource 1.3.6.1.4.1.45.6.1.2.77 ntwssessiondisconnecttype no-access
The external source that initiated the termination of a session. This object is used within notifications and is not accessible.
 ntwsClientDisconnectDescription 1.3.6.1.4.1.45.6.1.2.78 displaystring no-access
Display string for providing available information related to the external source that initiated a session termination. This object is used within notifications and is not accessible.
 ntwsMobilityDomainSecondarySeedIp 1.3.6.1.4.1.45.6.1.2.79 ipaddress no-access
The secondary seed IP address to which the Mobility Domain has failed over. This object is used within notifications and is not accessible.
 ntwsMobilityDomainPrimarySeedIp 1.3.6.1.4.1.45.6.1.2.80 ipaddress no-access
The primary seed IP address to which the Mobility Domain has failed back. This object is used within notifications and is not accessible.
 ntwsRFDetectClassificationReason 1.3.6.1.4.1.45.6.1.2.81 ntwsrfdetectclassificationreason no-access
Indicates the reason why a RF device is classified the way it is. This object is used within notifications and is not accessible.
 ntwsConfigSaveFileName 1.3.6.1.4.1.45.6.1.2.82 displaystring no-access
Display string listing the name of the file to which the running configuration was saved. This object is used within notifications and is not accessible.
 ntwsConfigSaveInitiatorType 1.3.6.1.4.1.45.6.1.2.83 ntwsconfigsaveinitiatortype no-access
Indicates the source that initiated a configuration save. This object is used within notifications and is not accessible.
 ntwsConfigSaveInitiatorIp 1.3.6.1.4.1.45.6.1.2.84 ipaddress no-access
The IP address of the source that initiated a configuration save. This object is used within notifications and is not accessible.
 ntwsConfigSaveInitiatorDetails 1.3.6.1.4.1.45.6.1.2.85 displaystring no-access
Display string listing additional information regarding the source that initiated a configuration save, when available. This object is used within notifications and is not accessible.
 ntwsConfigSaveGeneration 1.3.6.1.4.1.45.6.1.2.86 counter32 no-access
Indicates the number of configuration changes since the last system boot. The generation count is used to track the number of times the running configuration has been changed due to administrative actions (set/clear), SNMP requests (SET), XML requests (e.g. WMS). This object is used within notifications and is not accessible.
 ntwsApNum 1.3.6.1.4.1.45.6.1.2.87 ntwsapnum no-access
The administratively assigned AP Number, unique on same AC (switch), regardless of how APs are attached to the AC. This object is used within notifications and is not accessible. Obsoletes ntwsApPortOrDapNum. For clarity, use this object to identify an AP since in 6.0 directly attached APs and DAPs were unified.
 ntwsRadioMode 1.3.6.1.4.1.45.6.1.2.88 ntwsradiomode no-access
Indicates the administratively controlled Radio Mode (enabled/disabled/sentry). This object is used within notifications and is not accessible.
 ntwsMichaelMICFailureCause 1.3.6.1.4.1.45.6.1.2.89 ntwsmichaelmicfailurecause no-access
Indicates the Michael MIC Failure cause / who detected it. This object is used within notifications and is not accessible.
 ntwsClientAccessMode 1.3.6.1.4.1.45.6.1.2.90 ntwsclientaccessmode no-access
The client access mode (ap, wired). This object is used within notifications and is not accessible. Intended to replace ntwsClientAccessType. (In 6.0, direct- and network-attached APs were unified.)
 ntwsClientAuthorizationReason 1.3.6.1.4.1.45.6.1.2.91 ntwsclientauthorizationreason no-access
Indicates the reason why client performed AAA authorization. This object is used within notifications and is not accessible.
 ntwsPhysPortNum 1.3.6.1.4.1.45.6.1.2.92 unsigned32 no-access
Physical Port Number on the AC. Zero means the port is unknown or not applicable (for example, when ntwsClientAccessMode = 'ap'). This object is used within notifications and is not accessible.
 ntwsApMgrOldIp 1.3.6.1.4.1.45.6.1.2.93 ipaddress no-access
The IP address of the AP's former primary manager switch. This object is used within notifications and is not accessible.
 ntwsApMgrNewIp 1.3.6.1.4.1.45.6.1.2.94 ipaddress no-access
The IP address of the AP's new primary manager switch. This address was formerly the AP's secondary backup link. This object is used within notifications and is not accessible.
 ntwsApMgrChangeReason 1.3.6.1.4.1.45.6.1.2.95 ntwsapmgrchangereason no-access
Indicates the reason why the AP's primary manager changed. This object is used within notifications and is not accessible.
 ntwsClientClearedReason 1.3.6.1.4.1.45.6.1.2.96 ntwsclientclearedreason no-access
Indicates the reason why client was cleared. This object is used within notifications and is not accessible.
 ntwsMobilityDomainResiliencyStatus 1.3.6.1.4.1.45.6.1.2.97 ntwsmobilitydomainresiliencystatus no-access
Indicates the current resilient capacity status for a mobility domain. This object is used within notifications and is not accessible.
 ntwsClientSessionElapsedSeconds 1.3.6.1.4.1.45.6.1.2.98 unsigned32 no-access
Indicates the time in seconds elapsed since the start of the Client Session. This object is used within notifications and is not accessible.
 ntwsRadioChannelWidth 1.3.6.1.4.1.45.6.1.2.99 ntwsradiochannelwidth no-access
Indicates the administratively controlled Channel Width (20MHz/40MHz). This object is used within notifications and is not accessible.
 ntwsRadioMimoState 1.3.6.1.4.1.45.6.1.2.100 ntwsradiomimostate no-access
Indicates the Radio MIMO State, as seen by the AC (1x1/2x3/3x3). This object is used within notifications and is not accessible.
 ntwsClientRadioType 1.3.6.1.4.1.45.6.1.2.101 ntwsradiotype no-access
Indicates the Client Radio Type, as detected by an attached AP and reported to the AC. This object is used within notifications and is not accessible.
 ntwsRFDetectXmtrRadioType 1.3.6.1.4.1.45.6.1.2.102 ntwsradiotype no-access
Indicates the Radio Type of the Transmitter, as detected by an attached AP and reported to the AC. The Transmitter may be a wireless client or an AP. This object is used within notifications and is not accessible.
 ntwsRFDetectXmtrCryptoType 1.3.6.1.4.1.45.6.1.2.103 ntwscryptotype no-access
Indicates the Crypto Type used by the Transmitter, as detected by an attached AP and reported to the AC. This object is used within notifications and is not accessible.
 ntwsClusterFailureReason 1.3.6.1.4.1.45.6.1.2.104 ntwsclusterfailurereason no-access
Indicates the reason why cluster configuration failed to apply. This object is used within notifications and is not accessible.
 ntwsClusterFailureDescription 1.3.6.1.4.1.45.6.1.2.105 displaystring no-access
Display string for describing the cluster configuration failure cause. This object is used within notifications and is not accessible.
 ntwsTrapMib 1.3.6.1.4.1.45.6.1.4.1
Notifications emitted by Nortel Networks wireless switches. AP = Access Point; AC = Access Controller (wireless switch), the device that runs a SNMP Agent implementing this MIB. Copyright 2008 Nortel Networks. All rights reserved. This Nortel Networks SNMP Management Information Base Specification (Specification) embodies Nortel Networks' confidential and proprietary intellectual property. This Specification is supplied 'AS IS' and Nortel Networks makes no warranty, either express or implied, as to the use, operation, condition, or performance of the Specification.
 ntwsTrapsV2 1.3.6.1.4.1.45.6.1.5.0
     ntwsDeviceFailTrap 1.3.6.1.4.1.45.6.1.5.0.1
The device has a failure indication
     ntwsDeviceOkayTrap 1.3.6.1.4.1.45.6.1.5.0.2
The device has recovered
     ntwsPoEFailTrap 1.3.6.1.4.1.45.6.1.5.0.3
PoE has failed on the indicated port
     ntwsApTimeoutTrap 1.3.6.1.4.1.45.6.1.5.0.4
The AP entering the AC at port ntwsPortNum with MAC ntwsRadioMacAddress and of the access type (ap or dap) has not responded. Replaced by ntwsApNonOperStatusTrap2, with ntwsApTransition = 'timeout'.
     ntwsAPBootTrap 1.3.6.1.4.1.45.6.1.5.0.5
The AP entering the AC at port ntwsPortNum with MAC ntwsRadioMacAddress and of the access type (ap or dap) has booted. Replaced by ntwsApNonOperStatusTrap2, with ntwsApTransition = 'bootSuccess'.
     ntwsMobilityDomainJoinTrap 1.3.6.1.4.1.45.6.1.5.0.6
The mobility domain member has received an UP notice from the remote address.
     ntwsMobilityDomainTimeoutTrap 1.3.6.1.4.1.45.6.1.5.0.7
The mobility domain member has declared the remote address to be DOWN.
     ntwsMpMichaelMICFailure 1.3.6.1.4.1.45.6.1.5.0.8
Two Michael MIC failures were seen within 60 seconds of each other. Obsoleted by ntwsMichaelMICFailure.
     ntwsRFDetectRogueAPTrap 1.3.6.1.4.1.45.6.1.5.0.9
This trap is sent when RF detection finds a rogue AP. XmtrMacAddr is the radio MAC address from the beacon. ListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2.
     ntwsRFDetectAdhocUserTrap 1.3.6.1.4.1.45.6.1.5.0.10
This trap is sent when RF detection sweep finds a ad-hoc user. ntwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user. ntwsRFDetectListenerListInfo is a display string of a list of listener information.
     ntwsRFDetectRogueDisappearTrap 1.3.6.1.4.1.45.6.1.5.0.11
This trap is sent when a rogue has disappeared. Obsoleted by ntwsRFDetectRogueDeviceDisappearTrap.
     ntwsClientAuthenticationFailureTrap 1.3.6.1.4.1.45.6.1.5.0.12
This trap is sent if a client authentication fails.
     ntwsClientAuthorizationFailureTrap 1.3.6.1.4.1.45.6.1.5.0.13
This trap is sent if a client authorization fails.
     ntwsClientAssociationFailureTrap 1.3.6.1.4.1.45.6.1.5.0.14
This trap is sent if a client association fails.
     ntwsClientAuthorizationSuccessTrap 1.3.6.1.4.1.45.6.1.5.0.15
This trap is sent when a client authorizes. Obsoleted by ntwsClientAuthorizationSuccessTrap4.
     ntwsClientDeAssociationTrap 1.3.6.1.4.1.45.6.1.5.0.16
This trap is sent if a client de-association occurred.
     ntwsClientRoamingTrap 1.3.6.1.4.1.45.6.1.5.0.17
This trap is sent if a client roams from one location to another.
     ntwsAutoTuneRadioPowerChangeTrap 1.3.6.1.4.1.45.6.1.5.0.18
This trap is sent if a radio's power level has changed based on auto-tune.
     ntwsAutoTuneRadioChannelChangeTrap 1.3.6.1.4.1.45.6.1.5.0.19
This trap is sent if a radio's channel has changed based on auto-tune.
     ntwsCounterMeasureStartTrap 1.3.6.1.4.1.45.6.1.5.0.20
This trap is sent when counter measures are started against a rogue. ntwsRFDetectXmtrMacAddr is the mac address of the rogue we are doing counter measures against. ntwsRadioMACAddress identifies the radio performing the countermeasures.
     ntwsCounterMeasureStopTrap 1.3.6.1.4.1.45.6.1.5.0.21
This trap is sent when counter measures are stopped against a rogue. ntwsRFDetectXmtrMacAddr is the mac address of the rogue we were doing counter measures against. ntwsRadioMACAddress identifies the radio performing the countermeasures.
     ntwsClientDot1xFailureTrap 1.3.6.1.4.1.45.6.1.5.0.22
This trap is sent if a client failed 802.1X.
     ntwsClientClearedTrap 1.3.6.1.4.1.45.6.1.5.0.23
This trap is sent when a client session is cleared. Obsoleted by ntwsClientClearedTrap2.
     ntwsClientAuthorizationSuccessTrap2 1.3.6.1.4.1.45.6.1.5.0.24
This trap is sent when a client authorizes. Obsoleted by ntwsClientAuthorizationSuccessTrap4.
     ntwsRFDetectSpoofedMacAPTrap 1.3.6.1.4.1.45.6.1.5.0.25
This trap is sent when RF detection finds an AP using the MAC of the listener. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectDoSTrap and ntwsRFDetectRogueDeviceTrap2. One of the two traps will be sent depending on the type of AP MAC spoofing detected.
     ntwsRFDetectSpoofedSsidAPTrap 1.3.6.1.4.1.45.6.1.5.0.26
This trap is sent when RF detection finds an AP using the SSID of the listener, and the AP is not in the mobility domain. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2 and ntwsRFDetectSuspectDeviceTrap2. One of the two traps will be sent, depending on RF detection classification rules.
     ntwsRFDetectDoSTrap 1.3.6.1.4.1.45.6.1.5.0.27
This trap is sent when RF detection finds a denial of service (DoS) occurring. ntwsRFDetectDoSType specifies the type of DoS. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information.
     ntwsRFDetectClientViaRogueWiredAPTrap 1.3.6.1.4.1.45.6.1.5.0.28
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. ntwsSourceWsIp is the IP address of the AC (switch) with the wired port. ntwsPortNum is the port on the AC. ntwsClientVLANid is the VLAN ID of the client's traffic. ntwsClientVLANtag is the VLAN tag of the client's traffic. ntwsRFDetectXmtrMacAddr is the MAC address of the client. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectClientViaRogueWiredAPTrap3.
     ntwsRFDetectInterferingRogueAPTrap 1.3.6.1.4.1.45.6.1.5.0.29
This trap is sent when RF detection finds an interfering rogue AP. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectSuspectDeviceTrap2.
     ntwsRFDetectInterferingRogueDisappearTrap 1.3.6.1.4.1.45.6.1.5.0.30
This trap is sent when an interfering rogue has disappeared. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. Obsoleted by ntwsRFDetectSuspectDeviceDisappearTrap.
     ntwsRFDetectUnAuthorizedSsidTrap 1.3.6.1.4.1.45.6.1.5.0.31
This trap is sent when RF detection finds use of an unauthorized SSID. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2 and ntwsRFDetectSuspectDeviceTrap2. One of the two traps will be sent if the device having an unauthorized SSID is classified as rogue or suspect because of this.
     ntwsRFDetectUnAuthorizedOuiTrap 1.3.6.1.4.1.45.6.1.5.0.32
This trap is sent when RF detection finds use of an unauthorized OUI. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2 and ntwsRFDetectSuspectDeviceTrap2. One of the two traps will be sent if the device having an unauthorized OUI is classified as rogue or suspect because of this.
     ntwsRFDetectUnAuthorizedAPTrap 1.3.6.1.4.1.45.6.1.5.0.33
This trap is sent when RF detection finds operation of an unauthorized AP. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by ntwsRFDetectRogueDeviceTrap2.
     ntwsDAPConnectWarningTrap 1.3.6.1.4.1.45.6.1.5.0.34
A DAP, tried to connect to the AC. ntwsDeviceModel provides the model of the DAP. ntwsDeviceSerNum provides the serial number of the DAP. ntwsRsaPubKeyFingerPrint provides the computed fingerprint of the DAP. ntwsDAPconnectWarningType provides the type of connect warning. Replaced by ntwsApNonOperStatusTrap2, with ntwsApTransition = 'connectFail'.
     ntwsRFDetectDoSPortTrap 1.3.6.1.4.1.45.6.1.5.0.35
This trap is sent when RF detection finds a denial of service (DoS) occurring. This has port and AP info instead of 'Listener info'. ntwsRFDetectDoSType specifies the type of DoS. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsClientAccessType specifies whether wired, AP, or DAP. ntwsPortNum (for wired or AP), the port that is used. ntwsDAPNum (for a DAP), the ID of the DAP.
     ntwsMpMichaelMICFailure2 1.3.6.1.4.1.45.6.1.5.0.36
Two Michael MIC failures were seen within 60 seconds of each other. Object ntwsClientMACAddress is the source of the first failure, and object ntwsClientMACAddress2 source of the second failure. Obsoleted by ntwsMichaelMICFailure.
     ntwsApNonOperStatusTrap 1.3.6.1.4.1.45.6.1.5.0.37
This trap is sent when the AP changes state and the new one is a non-operational state. Obsoleted by ntwsApNonOperStatusTrap2.
     ntwsApOperRadioStatusTrap 1.3.6.1.4.1.45.6.1.5.0.38
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoleted by ntwsApOperRadioStatusTrap3.
     ntwsClientIpAddrChangeTrap 1.3.6.1.4.1.45.6.1.5.0.39
This trap is sent when a client's IP address changes. The most likely case for this is when the client first connects to the network.
     ntwsClientAssociationSuccessTrap 1.3.6.1.4.1.45.6.1.5.0.40
This trap is sent if a client association succeeds. WARNING: DO NOT enable it in normal use. It may impair switch performance! Only recommended for debugging network issues.
     ntwsClientAuthenticationSuccessTrap 1.3.6.1.4.1.45.6.1.5.0.41
This trap is sent if a client authentication succeeds.
     ntwsClientDeAuthenticationTrap 1.3.6.1.4.1.45.6.1.5.0.42
This trap is sent if a client de-authentication occured.
     ntwsRFDetectBlacklistedTrap 1.3.6.1.4.1.45.6.1.5.0.43
This trap is sent if an association, re-association or de-association request (packet) is detected from a blacklisted transmitter (identified by MAC: 'ntwsRFDetectXmtrMacAddr'). If 'ntwsBlacklistingCause' is 'configured', then 'ntwsBlacklistingRemainingTime' will be zero, meaning indefinite time (depending on administrative actions on the Black List). Otherwise, 'ntwsBlacklistingRemainingTime' will indicate the time in seconds until this transmitter's requests could be allowed.
     ntwsRFDetectClientViaRogueWiredAPTrap2 1.3.6.1.4.1.45.6.1.5.0.44
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. ntwsSourceWsIp is the IP address of the AC (switch) with the wired port. ntwsPortNum is the port on the AC. ntwsClientVLANid is the VLAN ID of the client's traffic. ntwsClientVLANtag is the VLAN tag of the client's traffic. ntwsRFDetectXmtrMacAddr is the MAC address of the client. ntwsRFDetectListenerListInfo is a display string of a list of listener information. ntwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired) the client is connected to. Obsoleted by ntwsRFDetectClientViaRogueWiredAPTrap3.
     ntwsRFDetectAdhocUserDisappearTrap 1.3.6.1.4.1.45.6.1.5.0.45
This trap is sent when RF detection sweep finds that an ad-hoc user disappeared. ntwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user.
     ntwsApRejectLicenseExceededTrap 1.3.6.1.4.1.45.6.1.5.0.46
This trap is sent when an AC (wireless switch) receives a packet from an inactive AP and attaching that AP would make the AC exceed the maximum (licensed) number of active APs.
     ntwsClientDynAuthorChangeSuccessTrap 1.3.6.1.4.1.45.6.1.5.0.47
This trap is sent when the authorization attributes for a user are dynamically changed by an authorized dynamic authorization client.
     ntwsClientDynAuthorChangeFailureTrap 1.3.6.1.4.1.45.6.1.5.0.48
This trap is sent if a change of authorization request sent by an authorized dynamic authorization client is unsuccessful.
     ntwsClientDisconnectTrap 1.3.6.1.4.1.45.6.1.5.0.49
This trap is sent when a client session is terminated administratively.
     ntwsMobilityDomainFailOverTrap 1.3.6.1.4.1.45.6.1.5.0.50
This trap is sent when the Mobility Domain fails over to the secondary seed.
     ntwsMobilityDomainFailBackTrap 1.3.6.1.4.1.45.6.1.5.0.51
This trap is sent when the Mobility Domain fails back to the primary seed.
     ntwsRFDetectRogueDeviceTrap 1.3.6.1.4.1.45.6.1.5.0.52
This trap is sent when RF detection finds a rogue device. XmtrMacAddr is the radio MAC address from the beacon. ListenerListInfo is a display string of a list of listener information. ClassificationReason indicates the reason why the device is classified as rogue. Obsoleted by ntwsRFDetectRogueDeviceTrap2.
     ntwsRFDetectRogueDeviceDisappearTrap 1.3.6.1.4.1.45.6.1.5.0.53
This trap is sent when a rogue device has disappeared. This trap obsoletes the ntwsRFDetectRogueDisappearTrap.
     ntwsRFDetectSuspectDeviceTrap 1.3.6.1.4.1.45.6.1.5.0.54
This trap is sent when RF detection finds a suspect device. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectListenerListInfo is a display string of a list of listener information. ClassificationReason indicates the reason why the device is classified as suspect. Obsoleted by ntwsRFDetectSuspectDeviceTrap2.
     ntwsRFDetectSuspectDeviceDisappearTrap 1.3.6.1.4.1.45.6.1.5.0.55
This trap is sent when a suspect device has disappeared. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. This trap obsoletes the ntwsRFDetectInterferingRogueDisappearTrap.
     ntwsRFDetectClientViaRogueWiredAPTrap3 1.3.6.1.4.1.45.6.1.5.0.56
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. ntwsSourceWsIp is the IP address of the AC (switch) with the wired port. ntwsPortNum is the port on the AC. ntwsClientVLANid is the VLAN ID of the client's traffic. ntwsClientVLANtag is the VLAN tag of the client's traffic. ntwsRFDetectXmtrMacAddr is the MAC address of the client. ntwsRFDetectListenerListInfo is a display string of a list of listener information. ntwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired) the client is connected to. ClassificationReason indicates the reason why the AP is classified as rogue. This trap obsoletes the ntwsRFDetectClientViaRogueWiredAPTrap and ntwsRFDetectClientViaRogueWiredAPTrap2.
     ntwsRFDetectClassificationChangeTrap 1.3.6.1.4.1.45.6.1.5.0.57
This trap is sent when RF detection classification rules change.
     ntwsConfigurationSavedTrap 1.3.6.1.4.1.45.6.1.5.0.58
This trap is sent when the running configuration of the switch is written to a configuration file.
     ntwsApNonOperStatusTrap2 1.3.6.1.4.1.45.6.1.5.0.59
This trap is sent when the AP changes state and the new one is a non-operational state. Obsoletes ntwsApNonOperStatusTrap.
     ntwsApOperRadioStatusTrap2 1.3.6.1.4.1.45.6.1.5.0.60
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoleted by ntwsApOperRadioStatusTrap3.
     ntwsMichaelMICFailure 1.3.6.1.4.1.45.6.1.5.0.61
Two Michael MIC failures were seen within 60 seconds of each other. Object ntwsClientMACAddress indicates the source of the first failure, and object ntwsClientMACAddress2 indicates the source of the second failure. Service is interrupted for 60 seconds on the radio due to TKIP countermeasures having commenced. The radio is identified by ntwsApNum and ntwsAPRadioNum. An alternative way to identify the radio is ntwsRadioMACAddress. Obsoletes ntwsMpMichaelMICFailure and ntwsMpMichaelMICFailure2.
     ntwsClientAuthorizationSuccessTrap3 1.3.6.1.4.1.45.6.1.5.0.62
This trap is sent when a client authorizes. If ntwsClientAccessMode = 'ap': ntwsApNum, ntwsAPRadioNum, ntwsRadioSSID identify the AP/radio/BSS providing wireless service to this client at the time this trap was sent. If ntwsClientAccessMode = 'wired': ntwsPhysPortNum identifies the physical port on the AC used by this wired-auth client. Obsoleted by ntwsClientAuthorizationSuccessTrap4.
     ntwsApManagerChangeTrap 1.3.6.1.4.1.45.6.1.5.0.63
This trap is sent when the AP's secondary link becomes its primary link.
     ntwsClientClearedTrap2 1.3.6.1.4.1.45.6.1.5.0.64
This trap is sent when a client session is cleared. Obsoletes ntwsClientClearedTrap.
     ntwsMobilityDomainResiliencyStatusTrap 1.3.6.1.4.1.45.6.1.5.0.65
This trap is sent by a mobility domain seed to announce changes in resilient capacity status.
     ntwsApOperRadioStatusTrap3 1.3.6.1.4.1.45.6.1.5.0.66
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoletes ntwsApOperRadioStatusTrap and ntwsApOperRadioStatusTrap2.
     ntwsClientAuthorizationSuccessTrap4 1.3.6.1.4.1.45.6.1.5.0.67
This trap is sent when a client authorizes. If ntwsClientAccessMode = 'ap': ntwsApNum, ntwsAPRadioNum, ntwsRadioSSID identify the AP/radio/BSS providing wireless service to this client at the time this trap was sent; ntwsClientRadioType gives the type of radio used by this client. If ntwsClientAccessMode = 'wired': ntwsPhysPortNum identifies the physical port on the AC used by this wired-auth client. Obsoletes ntwsClientAuthorizationSuccessTrap, ntwsClientAuthorizationSuccessTrap2, ntwsClientAuthorizationSuccessTrap3.
     ntwsRFDetectRogueDeviceTrap2 1.3.6.1.4.1.45.6.1.5.0.68
This trap is sent when RF detection finds a rogue device. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectXmtrRadioType indicates the Type of Radio used by the transmitter (rogue device). ntwsRFDetectXmtrCryptoType indicates the Type of Crypto used by the transmitter (rogue device). ntwsRFDetectListenerListInfo is a display string of a list of listener information. ntwsRFDetectClassificationReason indicates the reason why the device is classified as rogue. Obsoletes ntwsRFDetectRogueAPTrap, ntwsRFDetectUnAuthorizedAPTrap, ntwsRFDetectRogueDeviceTrap.
     ntwsRFDetectSuspectDeviceTrap2 1.3.6.1.4.1.45.6.1.5.0.69
This trap is sent when RF detection finds a suspect device. ntwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. ntwsRFDetectXmtrRadioType indicates the Type of Radio used by the transmitter (suspect device). ntwsRFDetectXmtrCryptoType indicates the Type of Crypto used by the transmitter (suspect device). ntwsRFDetectListenerListInfo is a display string of a list of listener information. ntwsRFDetectClassificationReason indicates the reason why the device is classified as suspect. Obsoletes ntwsRFDetectInterferingRogueAPTrap, ntwsRFDetectSuspectDeviceTrap.
     ntwsClusterFailureTrap 1.3.6.1.4.1.45.6.1.5.0.70
This trap is sent when the cluster configuration failed to apply. If ntwsClusterFailureReason = 'validation-error': The validation error is reported by the receiving end of the configuration updates. The receiving end can be any AC (switch) in the mobility domain: member, secondary seed or primary seed. - Primary seed will be the receiving end of configuration updates when Primary seed is joining the cluster and Secondary seed has preempt mode enabled. - Both Secondary seed and member will be at the receiving end when Primary seed is active.