RBTWS-TRAP-MIB: View SNMP OID List / Download MIB

VENDOR: ENTERASYS NETWORKS INC.


 Home MIB: RBTWS-TRAP-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 rbtwsDeviceId 1.3.6.1.4.1.52.4.15.1.2.1 object identifier no-access
Enumeration of devices as indicated in registration MIB. This object is used within notifications and is not accessible.
 rbtwsMobilityDomainIp 1.3.6.1.4.1.52.4.15.1.2.2 ipaddress no-access
IP address of the other switch which the send switch is reporting on. This object is used within notifications and is not accessible.
 rbtwsAPMACAddress 1.3.6.1.4.1.52.4.15.1.2.3 macaddress no-access
MAC address of the AP of interest. This object is used within notifications and is not accessible.
 rbtwsClientMACAddress 1.3.6.1.4.1.52.4.15.1.2.4 macaddress no-access
MAC address of the client of interest. This object is used within notifications and is not accessible.
 rbtwsRFDetectXmtrMacAddr 1.3.6.1.4.1.52.4.15.1.2.5 macaddress no-access
Describes the transmitter's MAC address. This object is used within notifications and is not accessible.
 rbtwsPortNum 1.3.6.1.4.1.52.4.15.1.2.6 integer no-access
Port number on the AC which reported this rogue during a detection sweep. This object is used within notifications and is not accessible.
 rbtwsAPRadioNum 1.3.6.1.4.1.52.4.15.1.2.7 rbtwsradionum no-access
Radio number of the AP which reported this rogue during a detection sweep. This object is used within notifications and is not accessible.
 rbtwsRadioRssi 1.3.6.1.4.1.52.4.15.1.2.8 integer no-access
The received signal strength as measured by the AP radio which reported this rogue during a detection sweep. This object is used within notifications and is not accessible. Not used by any notification.
 rbtwsRadioBSSID 1.3.6.1.4.1.52.4.15.1.2.9 octet string no-access
The basic service set identifier of the rogue from the beacon frame reported by the AP during a detection sweep. This object is used within notifications and is not accessible.
 rbtwsUserName 1.3.6.1.4.1.52.4.15.1.2.10 displaystring no-access
The client user name as learned from the AAA process. This object is used within notifications and is not accessible.
 rbtwsClientAuthServerIp 1.3.6.1.4.1.52.4.15.1.2.11 ipaddress no-access
The client authentication server ip address. This object is used within notifications and is not accessible.
 rbtwsClientSessionState 1.3.6.1.4.1.52.4.15.1.2.12 rbtwsclientsessionstate no-access
The state for a client session. This object is used within notifications and is not accessible.
 rbtwsDAPNum 1.3.6.1.4.1.52.4.15.1.2.13 integer no-access
The DAP number on the wireless switch. This object is used within notifications and is not accessible.
 rbtwsClientIp 1.3.6.1.4.1.52.4.15.1.2.14 ipaddress no-access
The client ip address. This object is used within notifications and is not accessible.
 rbtwsClientSessionId 1.3.6.1.4.1.52.4.15.1.2.15 displaystring no-access
The unique global id for a client session. This object is used within notifications and is not accessible.
 rbtwsClientAuthenProtocolType 1.3.6.1.4.1.52.4.15.1.2.16 rbtwsclientauthenprotocoltype no-access
The authentication protocol for a client. This object is used within notifications and is not accessible.
 rbtwsClientVLANName 1.3.6.1.4.1.52.4.15.1.2.17 displaystring no-access
The vlan name a client is on. This object is used within notifications and is not accessible.
 rbtwsClientSessionStartTime 1.3.6.1.4.1.52.4.15.1.2.18 timeticks no-access
The start time of a client session, relative to the sysUptime. This object is used within notifications and is not accessible. Obsolete. Do not use it because it's not vital information and often *cannot* be implemented to match the declared semantics: a client session might have been created on another wireless switch, *before* the current switch booted (the local zero of sysUptime).
 rbtwsClientFailureCause 1.3.6.1.4.1.52.4.15.1.2.19 displaystring no-access
Display string for possible failure cause for a client session. This object is used within notifications and is not accessible.
 rbtwsClientRoamedFromPortNum 1.3.6.1.4.1.52.4.15.1.2.20 integer no-access
The port number on the AC a client has roamed from. This object is used within notifications and is not accessible.
 rbtwsClientRoamedFromRadioNum 1.3.6.1.4.1.52.4.15.1.2.21 rbtwsradionum no-access
The radio number of the AP the client is roamed from. This object is used within notifications and is not accessible.
 rbtwsClientRoamedFromDAPNum 1.3.6.1.4.1.52.4.15.1.2.22 integer no-access
The DAP number on the AC which reported this rogue during roam. This object is used within notifications and is not accessible.
 rbtwsUserParams 1.3.6.1.4.1.52.4.15.1.2.23 displaystring no-access
A display string of User Parameters for client user authorization attributes learned through AAA and/or used by the system. Note that the syntax will be (name=value, name=value,..) for the parsing purpose. This object is used within notifications and is not accessible.
 rbtwsClientLocationPolicyIndex 1.3.6.1.4.1.52.4.15.1.2.24 integer no-access
Index of the Location Policy rule applied to a user. This object is used within notifications and is not accessible.
 rbtwsClientAssociationFailureCause 1.3.6.1.4.1.52.4.15.1.2.25 rbtwsassociationfailuretype no-access
The client association failure cause. This object is used within notifications and is not accessible.
 rbtwsClientAuthenticationFailureCause 1.3.6.1.4.1.52.4.15.1.2.26 rbtwsauthenticationfailuretype no-access
The client authentication failure cause. This object is used within notifications and is not accessible.
 rbtwsClientAuthorizationFailureCause 1.3.6.1.4.1.52.4.15.1.2.27 rbtwsauthorizationfailuretype no-access
The client authorization failure cause. Note that if it is the user-param, we would additionally expect the failure cause description to list the user attribute value that caused the failure. This object is used within notifications and is not accessible.
 rbtwsClientFailureCauseDescription 1.3.6.1.4.1.52.4.15.1.2.28 displaystring no-access
Display string for describing the client failure cause. This object is used within notifications and is not accessible.
 rbtwsClientRoamedFromWsIp 1.3.6.1.4.1.52.4.15.1.2.29 ipaddress no-access
The system IP address of the AC (wireless switch) a client roamed from. This object is used within notifications and is not accessible.
 rbtwsClientRoamedFromAccessType 1.3.6.1.4.1.52.4.15.1.2.30 rbtwsaccesstype no-access
The client access type (ap, dap, wired) that a client roamed from. This object is used within notifications and is not accessible.
 rbtwsClientAccessType 1.3.6.1.4.1.52.4.15.1.2.31 rbtwsaccesstype no-access
The client access type (ap, dap, wired). This object is used within notifications and is not accessible. For new traps, use rbtwsClientAccessMode instead of this object.
 rbtwsRadioMACAddress 1.3.6.1.4.1.52.4.15.1.2.32 macaddress no-access
AP Radio MAC address. This object is used within notifications and is not accessible.
 rbtwsRadioPowerChangeReason 1.3.6.1.4.1.52.4.15.1.2.33 rbtwsradiopowerchangetype no-access
The type of event that caused an AP radio power change; occurs due to auto-tune operation. This object is used within notifications and is not accessible.
 rbtwsNewChannelNum 1.3.6.1.4.1.52.4.15.1.2.34 integer no-access
New channel number of the AP radio used after an auto tune event. This object is used within notifications and is not accessible.
 rbtwsOldChannelNum 1.3.6.1.4.1.52.4.15.1.2.35 integer no-access
Old channel number of the AP radio used before an auto tune event. This object is used within notifications and is not accessible.
 rbtwsChannelChangeReason 1.3.6.1.4.1.52.4.15.1.2.36 rbtwschannelchangetype no-access
The type of event that caused an AP radio channel change; occurs due to auto-tune operation. This object is used within notifications and is not accessible.
 rbtwsRFDetectListenerListInfo 1.3.6.1.4.1.52.4.15.1.2.37 octet string no-access
The RF Detection Listener list info including a list of (listener mac, rssi, channel, ssid, time). There will be a maximum of 6 entries in the list. Formats: MAC: 18 bytes: %2.2X:%2.2X:%2.2X:%2.2X:%2.2X:%2.2X RSSI: 10 bytes: %10d CHANNEL: 3 bytes: %3d SSID: 32 bytes: %s TIME: 26 bytes: %s Maximum size per entry is 89+4+2 = 95 bytes. Maximum size of the string is 6*95= 571 bytes (include NULL). This object is used within notifications and is not accessible.
 rbtwsRadioSSID 1.3.6.1.4.1.52.4.15.1.2.38 displaystring no-access
The radio SSID string This object is used within notifications and is not accessible.
 rbtwsNewPowerLevel 1.3.6.1.4.1.52.4.15.1.2.39 rbtwspowerlevel no-access
New power level of the AP radio used after an auto tune event. This object is used within notifications and is not accessible.
 rbtwsOldPowerLevel 1.3.6.1.4.1.52.4.15.1.2.40 rbtwspowerlevel no-access
Old power level of the AP radio used before an auto tune event. This object is used within notifications and is not accessible.
 rbtwsRadioPowerChangeDescription 1.3.6.1.4.1.52.4.15.1.2.41 displaystring no-access
The radio power change description. In the case of reason being dup-pkts-threshold-exceed(1), and retransmit-threshold-exceed(2), clientMacAddress will be included in the description. This object is used within notifications and is not accessible.
 rbtwsCounterMeasurePerformerListInfo 1.3.6.1.4.1.52.4.15.1.2.42 displaystring no-access
A list of information for APs performing Counter Measures including a list of performer mac addresses. This object is used within notifications and is not accessible. Not used by any notification.
 rbtwsClientDot1xState 1.3.6.1.4.1.52.4.15.1.2.43 rbtwsclientdot1xstate no-access
The state for a client 802.1X. This object is used within notifications and is not accessible.
 rbtwsClientDot1xFailureCause 1.3.6.1.4.1.52.4.15.1.2.44 rbtwsdot1xfailuretype no-access
The client 802.1X failure cause. This object is used within notifications and is not accessible.
 rbtwsAPAccessType 1.3.6.1.4.1.52.4.15.1.2.45 rbtwsaccesstype no-access
The access point access type (ap, dap,). This object is used within notifications and is not accessible. Not used by any notification.
 rbtwsUserAccessType 1.3.6.1.4.1.52.4.15.1.2.46 rbtwsuseraccesstype no-access
The user access type (MAC, WEB, DOT1X, LAST-RESORT). This object is used within notifications and is not accessible.
 rbtwsClientSessionElapsedTime 1.3.6.1.4.1.52.4.15.1.2.47 timeticks no-access
The elapsed time for a client session. Obsoleted because session time is usually reported in seconds. This object is used within notifications and is not accessible.
 rbtwsLocalId 1.3.6.1.4.1.52.4.15.1.2.48 integer no-access
Local Id for the session. This object is used within notifications and is not accessible.
 rbtwsRFDetectDoSType 1.3.6.1.4.1.52.4.15.1.2.49 rbtwsrfdetectdostype no-access
The type of denial of service (DoS) attack. This object is used within notifications and is not accessible.
 rbtwsSourceWsIp 1.3.6.1.4.1.52.4.15.1.2.50 ipaddress no-access
IP address of another AC (wireless switch). This object is used within notifications and is not accessible.
 rbtwsClientVLANid 1.3.6.1.4.1.52.4.15.1.2.51 integer no-access
VLAN ID used by client traffic. This object is used within notifications and is not accessible.
 rbtwsClientVLANtag 1.3.6.1.4.1.52.4.15.1.2.52 integer no-access
VLAN tag used by client traffic. This object is used within notifications and is not accessible.
 rbtwsDeviceModel 1.3.6.1.4.1.52.4.15.1.2.53 displaystring no-access
The model of a device in printable US-ASCII. If unknown (or not available), then the value is a zero length string. This object is used within notifications and is not accessible.
 rbtwsDeviceSerNum 1.3.6.1.4.1.52.4.15.1.2.54 rbtwsapserialnum no-access
The serial number of an AP in printable US-ASCII. If unknown (or not available), then the value is a zero length string. Should NOT be used to identify other devices, for example an AC (wireless switch). This object is used within notifications and is not accessible.
 rbtwsRsaPubKeyFingerPrint 1.3.6.1.4.1.52.4.15.1.2.55 rbtwsapfingerprint no-access
The hash of the RSA public key (of a key pair) in binary form that uniquely identifies the public key of an AP. This object is used within notifications and is not accessible.
 rbtwsDAPconnectWarningType 1.3.6.1.4.1.52.4.15.1.2.56 integer no-access
The type of DAP connect warning. The values are: not-configured-fingerprint-connect(1)...a DAP, which has an RSA keypair but did not have its fingerprint configured on the AC, has connected to the AC when 'dap security' set to 'OPTIONAL' secure-handshake-failure(2).............a DAP tried to connect to the AC with security, but the handshake failed not-configured-fingerprint-required(3)..a DAP tried to connect to the AC with security, but 'dap security' set to 'REQUIRED', and no fingerprint was configured for the DAP fingerprint-mismatch(4).................a DAP tried to connect to the AC with security and its fingerprint was configured, but the fingerprint did not match the computed one This object is used within notifications and is not accessible. Enumeration: 'not-configured-fingerprint-connect': 1, 'not-configured-fingerprint-required': 3, 'secure-handshake-failure': 2, 'fingerprint-mismatch': 4.
 rbtwsClientMACAddress2 1.3.6.1.4.1.52.4.15.1.2.57 macaddress no-access
MAC address of the second client of interest. This object is used within notifications and is not accessible.
 rbtwsApAttachType 1.3.6.1.4.1.52.4.15.1.2.58 rbtwsapattachtype no-access
How the AP is attached to the AC (directly or via L2/L3 network). This object is used within notifications and is not accessible.
 rbtwsApPortOrDapNum 1.3.6.1.4.1.52.4.15.1.2.59 rbtwsapportordapnum no-access
The Port Number if the AP is directly attached, or the CLI-assigned DAP Number if attached via L2/L3 network. This object is used within notifications and is not accessible. Obsoleted by rbtwsApNum. (In 6.0, direct- and network-attached APs were unified.)
 rbtwsApName 1.3.6.1.4.1.52.4.15.1.2.60 displaystring no-access
The name of the AP, as assigned in AC's CLI; defaults to AP (examples: 'AP01', 'AP22', 'AP333', 'AP4444'); could have been changed from CLI to a meaningful name, for example the location of the AP (example: 'MeetingRoom73'). This object is used within notifications and is not accessible.
 rbtwsApTransition 1.3.6.1.4.1.52.4.15.1.2.61 rbtwsaptransition no-access
AP state Transition, as seen by the AC. This object is used within notifications and is not accessible.
 rbtwsApFailDetail 1.3.6.1.4.1.52.4.15.1.2.62 rbtwsapfaildetail no-access
Detailed failure code for some of the transitions specified in 'rbtwsApTransition' object. This object is used within notifications and is not accessible.
 rbtwsRadioType 1.3.6.1.4.1.52.4.15.1.2.63 rbtwsradiotype no-access
Indicates the AP Radio Type, as seen by AC. This object is used within notifications and is not accessible.
 rbtwsRadioConfigState 1.3.6.1.4.1.52.4.15.1.2.64 rbtwsradioconfigstate no-access
Indicates the Radio State, as seen by the AC. This object is used within notifications and is not accessible.
 rbtwsApConnectSecurityType 1.3.6.1.4.1.52.4.15.1.2.65 rbtwsapconnectsecuritytype no-access
Indicates the security level of the connection between AP and AC. This object is used within notifications and is not accessible.
 rbtwsApServiceAvailability 1.3.6.1.4.1.52.4.15.1.2.66 rbtwsapserviceavailability no-access
Indicates the level of wireless service availability. This object is used within notifications and is not accessible.
 rbtwsApWasOperational 1.3.6.1.4.1.52.4.15.1.2.67 rbtwsapwasoperational no-access
Indicates whether the AP was operational before a transition occured. This object is used within notifications and is not accessible.
 rbtwsClientTimeSinceLastRoam 1.3.6.1.4.1.52.4.15.1.2.68 unsigned32 no-access
The time in seconds since the most recent roam of a given client. This object is used within notifications and is not accessible.
 rbtwsClientIpAddrChangeReason 1.3.6.1.4.1.52.4.15.1.2.69 rbtwsclientipaddrchangereason no-access
Indicates the reason why client IP address changed. This object is used within notifications and is not accessible.
 rbtwsRFDetectRogueAPMacAddr 1.3.6.1.4.1.52.4.15.1.2.70 macaddress no-access
Describes the MAC address of the Rogue AP the transmitter is connected to. This object is used within notifications and is not accessible.
 rbtwsBlacklistingRemainingTime 1.3.6.1.4.1.52.4.15.1.2.71 unsigned32 no-access
The time in seconds remaining until a given transmitter could be removed from the Black List. This object is used within notifications and is not accessible.
 rbtwsBlacklistingCause 1.3.6.1.4.1.52.4.15.1.2.72 rbtwsblacklistingcause no-access
Indicates the reason why a given transmitter is blacklisted. This object is used within notifications and is not accessible.
 rbtwsNumLicensedActiveAPs 1.3.6.1.4.1.52.4.15.1.2.73 unsigned32 no-access
Indicates the maximum (licensed) number of active APs for this AC. This object is used within notifications and is not accessible.
 rbtwsClientDynAuthorClientIp 1.3.6.1.4.1.52.4.15.1.2.74 ipaddress no-access
The dynamic authorization client IP address which caused the change of authorization. This object is used within notifications and is not accessible.
 rbtwsChangedUserParamOldValues 1.3.6.1.4.1.52.4.15.1.2.75 rbtwsuserattributelist no-access
A display string listing the changed AAA attributes and their values, before the change of authorization was executed. This object is used within notifications and is not accessible.
 rbtwsChangedUserParamNewValues 1.3.6.1.4.1.52.4.15.1.2.76 rbtwsuserattributelist no-access
A display string listing the changed AAA attributes and their values, after the change of authorization was executed. This object is used within notifications and is not accessible.
 rbtwsClientDisconnectSource 1.3.6.1.4.1.52.4.15.1.2.77 rbtwssessiondisconnecttype no-access
The external source that initiated the termination of a session. This object is used within notifications and is not accessible.
 rbtwsClientDisconnectDescription 1.3.6.1.4.1.52.4.15.1.2.78 displaystring no-access
Display string for providing available information related to the external source that initiated a session termination. This object is used within notifications and is not accessible.
 rbtwsMobilityDomainSecondarySeedIp 1.3.6.1.4.1.52.4.15.1.2.79 ipaddress no-access
The secondary seed IP address to which the Mobility Domain has failed over. This object is used within notifications and is not accessible.
 rbtwsMobilityDomainPrimarySeedIp 1.3.6.1.4.1.52.4.15.1.2.80 ipaddress no-access
The primary seed IP address to which the Mobility Domain has failed back. This object is used within notifications and is not accessible.
 rbtwsRFDetectClassificationReason 1.3.6.1.4.1.52.4.15.1.2.81 rbtwsrfdetectclassificationreason no-access
Indicates the reason why a RF device is classified the way it is. This object is used within notifications and is not accessible.
 rbtwsConfigSaveFileName 1.3.6.1.4.1.52.4.15.1.2.82 displaystring no-access
Display string listing the name of the file to which the running configuration was saved. This object is used within notifications and is not accessible.
 rbtwsConfigSaveInitiatorType 1.3.6.1.4.1.52.4.15.1.2.83 rbtwsconfigsaveinitiatortype no-access
Indicates the source that initiated a configuration save. This object is used within notifications and is not accessible.
 rbtwsConfigSaveInitiatorIp 1.3.6.1.4.1.52.4.15.1.2.84 ipaddress no-access
The IP address of the source that initiated a configuration save. This object is used within notifications and is not accessible.
 rbtwsConfigSaveInitiatorDetails 1.3.6.1.4.1.52.4.15.1.2.85 displaystring no-access
Display string listing additional information regarding the source that initiated a configuration save, when available. This object is used within notifications and is not accessible.
 rbtwsConfigSaveGeneration 1.3.6.1.4.1.52.4.15.1.2.86 counter32 no-access
Indicates the number of configuration changes since the last system boot. The generation count is used to track the number of times the running configuration has been changed due to administrative actions (set/clear), SNMP requests (SET), XML requests (e.g. RASM). This object is used within notifications and is not accessible.
 rbtwsApNum 1.3.6.1.4.1.52.4.15.1.2.87 rbtwsapnum no-access
The administratively assigned AP Number, unique on same AC (switch), regardless of how APs are attached to the AC. This object is used within notifications and is not accessible. Obsoletes rbtwsApPortOrDapNum. For clarity, use this object to identify an AP since in 6.0 directly attached APs and DAPs were unified.
 rbtwsRadioMode 1.3.6.1.4.1.52.4.15.1.2.88 rbtwsradiomode no-access
Indicates the administratively controlled Radio Mode (enabled/disabled/sentry). This object is used within notifications and is not accessible.
 rbtwsMichaelMICFailureCause 1.3.6.1.4.1.52.4.15.1.2.89 rbtwsmichaelmicfailurecause no-access
Indicates the Michael MIC Failure cause / who detected it. This object is used within notifications and is not accessible.
 rbtwsClientAccessMode 1.3.6.1.4.1.52.4.15.1.2.90 rbtwsclientaccessmode no-access
The client access mode (ap, wired). This object is used within notifications and is not accessible. Intended to replace rbtwsClientAccessType. (In 6.0, direct- and network-attached APs were unified.)
 rbtwsClientAuthorizationReason 1.3.6.1.4.1.52.4.15.1.2.91 rbtwsclientauthorizationreason no-access
Indicates the reason why client performed AAA authorization. This object is used within notifications and is not accessible.
 rbtwsPhysPortNum 1.3.6.1.4.1.52.4.15.1.2.92 unsigned32 no-access
Physical Port Number on the AC. Zero means the port is unknown or not applicable (for example, when rbtwsClientAccessMode = 'ap'). This object is used within notifications and is not accessible.
 rbtwsApMgrOldIp 1.3.6.1.4.1.52.4.15.1.2.93 ipaddress no-access
The IP address of the AP's former primary manager switch. This object is used within notifications and is not accessible.
 rbtwsApMgrNewIp 1.3.6.1.4.1.52.4.15.1.2.94 ipaddress no-access
The IP address of the AP's new primary manager switch. This address was formerly the AP's secondary backup link. This object is used within notifications and is not accessible.
 rbtwsApMgrChangeReason 1.3.6.1.4.1.52.4.15.1.2.95 rbtwsapmgrchangereason no-access
Indicates the reason why the AP's primary manager changed. This object is used within notifications and is not accessible.
 rbtwsClientClearedReason 1.3.6.1.4.1.52.4.15.1.2.96 rbtwsclientclearedreason no-access
Indicates the reason why client was cleared. This object is used within notifications and is not accessible.
 rbtwsMobilityDomainResiliencyStatus 1.3.6.1.4.1.52.4.15.1.2.97 rbtwsmobilitydomainresiliencystatus no-access
Indicates the current resilient capacity status for a mobility domain. This object is used within notifications and is not accessible.
 rbtwsClientSessionElapsedSeconds 1.3.6.1.4.1.52.4.15.1.2.98 unsigned32 no-access
Indicates the time in seconds elapsed since the start of the Client Session. This object is used within notifications and is not accessible.
 rbtwsRadioChannelWidth 1.3.6.1.4.1.52.4.15.1.2.99 rbtwsradiochannelwidth no-access
Indicates the administratively controlled Channel Width (20MHz/40MHz). This object is used within notifications and is not accessible.
 rbtwsRadioMimoState 1.3.6.1.4.1.52.4.15.1.2.100 rbtwsradiomimostate no-access
Indicates the Radio MIMO State, as seen by the AC (1x1/2x3/3x3). This object is used within notifications and is not accessible.
 rbtwsClientRadioType 1.3.6.1.4.1.52.4.15.1.2.101 rbtwsradiotype no-access
Indicates the Client Radio Type, as detected by an attached AP and reported to the AC. This object is used within notifications and is not accessible.
 rbtwsRFDetectXmtrRadioType 1.3.6.1.4.1.52.4.15.1.2.102 rbtwsradiotype no-access
Indicates the Radio Type of the Transmitter, as detected by an attached AP and reported to the AC. The Transmitter may be a wireless client or an AP. This object is used within notifications and is not accessible.
 rbtwsRFDetectXmtrCryptoType 1.3.6.1.4.1.52.4.15.1.2.103 rbtwscryptotype no-access
Indicates the Crypto Type used by the Transmitter, as detected by an attached AP and reported to the AC. This object is used within notifications and is not accessible.
 rbtwsClusterFailureReason 1.3.6.1.4.1.52.4.15.1.2.104 rbtwsclusterfailurereason no-access
Indicates the reason why cluster configuration failed to apply. This object is used within notifications and is not accessible.
 rbtwsClusterFailureDescription 1.3.6.1.4.1.52.4.15.1.2.105 displaystring no-access
Display string for describing the cluster configuration failure cause. This object is used within notifications and is not accessible.
 rbtwsTrapMib 1.3.6.1.4.1.52.4.15.1.4.1
Notifications emitted by Enterasys Networks wireless switches. AP = Access Point; AC = Access Controller (wireless switch), the device that runs a SNMP Agent implementing this MIB. Copyright 2008 Enterasys Networks, Inc. All rights reserved. This SNMP Management Information Base Specification (Specification) embodies confidential and proprietary intellectual property. This Specification is supplied 'AS IS' and Enterasys Networks makes no warranty, either express or implied, as to the use, operation, condition, or performance of the Specification.
 rbtwsTrapsV2 1.3.6.1.4.1.52.4.15.1.5.0
     rbtwsDeviceFailTrap 1.3.6.1.4.1.52.4.15.1.5.0.1
The device has a failure indication
     rbtwsDeviceOkayTrap 1.3.6.1.4.1.52.4.15.1.5.0.2
The device has recovered
     rbtwsPoEFailTrap 1.3.6.1.4.1.52.4.15.1.5.0.3
PoE has failed on the indicated port
     rbtwsApTimeoutTrap 1.3.6.1.4.1.52.4.15.1.5.0.4
The AP entering the AC at port rbtwsPortNum with MAC rbtwsRadioMacAddress and of the access type (ap or dap) has not responded. Replaced by rbtwsApNonOperStatusTrap2, with rbtwsApTransition = 'timeout'.
     rbtwsAPBootTrap 1.3.6.1.4.1.52.4.15.1.5.0.5
The AP entering the AC at port rbtwsPortNum with MAC rbtwsRadioMacAddress and of the access type (ap or dap) has booted. Replaced by rbtwsApNonOperStatusTrap2, with rbtwsApTransition = 'bootSuccess'.
     rbtwsMobilityDomainJoinTrap 1.3.6.1.4.1.52.4.15.1.5.0.6
The mobility domain member has received an UP notice from the remote address.
     rbtwsMobilityDomainTimeoutTrap 1.3.6.1.4.1.52.4.15.1.5.0.7
The mobility domain member has declared the remote address to be DOWN.
     rbtwsMpMichaelMICFailure 1.3.6.1.4.1.52.4.15.1.5.0.8
Two Michael MIC failures were seen within 60 seconds of each other. Obsoleted by rbtwsMichaelMICFailure.
     rbtwsRFDetectRogueAPTrap 1.3.6.1.4.1.52.4.15.1.5.0.9
This trap is sent when RF detection finds a rogue AP. XmtrMacAddr is the radio MAC address from the beacon. ListenerListInfo is a display string of a list of listener information. Obsoleted by rbtwsRFDetectRogueDeviceTrap2.
     rbtwsRFDetectAdhocUserTrap 1.3.6.1.4.1.52.4.15.1.5.0.10
This trap is sent when RF detection sweep finds a ad-hoc user. rbtwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user. rbtwsRFDetectListenerListInfo is a display string of a list of listener information.
     rbtwsRFDetectRogueDisappearTrap 1.3.6.1.4.1.52.4.15.1.5.0.11
This trap is sent when a rogue has disappeared. Obsoleted by rbtwsRFDetectRogueDeviceDisappearTrap.
     rbtwsClientAuthenticationFailureTrap 1.3.6.1.4.1.52.4.15.1.5.0.12
This trap is sent if a client authentication fails.
     rbtwsClientAuthorizationFailureTrap 1.3.6.1.4.1.52.4.15.1.5.0.13
This trap is sent if a client authorization fails.
     rbtwsClientAssociationFailureTrap 1.3.6.1.4.1.52.4.15.1.5.0.14
This trap is sent if a client association fails.
     rbtwsClientAuthorizationSuccessTrap 1.3.6.1.4.1.52.4.15.1.5.0.15
This trap is sent when a client authorizes. Obsoleted by rbtwsClientAuthorizationSuccessTrap4.
     rbtwsClientDeAssociationTrap 1.3.6.1.4.1.52.4.15.1.5.0.16
This trap is sent if a client de-association occurred.
     rbtwsClientRoamingTrap 1.3.6.1.4.1.52.4.15.1.5.0.17
This trap is sent if a client roams from one location to another.
     rbtwsAutoTuneRadioPowerChangeTrap 1.3.6.1.4.1.52.4.15.1.5.0.18
This trap is sent if a radio's power level has changed based on auto-tune.
     rbtwsAutoTuneRadioChannelChangeTrap 1.3.6.1.4.1.52.4.15.1.5.0.19
This trap is sent if a radio's channel has changed based on auto-tune.
     rbtwsCounterMeasureStartTrap 1.3.6.1.4.1.52.4.15.1.5.0.20
This trap is sent when counter measures are started against a rogue. rbtwsRFDetectXmtrMacAddr is the mac address of the rogue we are doing counter measures against. rbtwsRadioMACAddress identifies the radio performing the countermeasures.
     rbtwsCounterMeasureStopTrap 1.3.6.1.4.1.52.4.15.1.5.0.21
This trap is sent when counter measures are stopped against a rogue. rbtwsRFDetectXmtrMacAddr is the mac address of the rogue we were doing counter measures against. rbtwsRadioMACAddress identifies the radio performing the countermeasures.
     rbtwsClientDot1xFailureTrap 1.3.6.1.4.1.52.4.15.1.5.0.22
This trap is sent if a client failed 802.1X.
     rbtwsClientClearedTrap 1.3.6.1.4.1.52.4.15.1.5.0.23
This trap is sent when a client session is cleared. Obsoleted by rbtwsClientClearedTrap2.
     rbtwsClientAuthorizationSuccessTrap2 1.3.6.1.4.1.52.4.15.1.5.0.24
This trap is sent when a client authorizes. Obsoleted by rbtwsClientAuthorizationSuccessTrap4.
     rbtwsRFDetectSpoofedMacAPTrap 1.3.6.1.4.1.52.4.15.1.5.0.25
This trap is sent when RF detection finds an AP using the MAC of the listener. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by rbtwsRFDetectDoSTrap and rbtwsRFDetectRogueDeviceTrap2. One of the two traps will be sent depending on the type of AP MAC spoofing detected.
     rbtwsRFDetectSpoofedSsidAPTrap 1.3.6.1.4.1.52.4.15.1.5.0.26
This trap is sent when RF detection finds an AP using the SSID of the listener, and the AP is not in the mobility domain. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by rbtwsRFDetectRogueDeviceTrap2 and rbtwsRFDetectSuspectDeviceTrap2. One of the two traps will be sent, depending on RF detection classification rules.
     rbtwsRFDetectDoSTrap 1.3.6.1.4.1.52.4.15.1.5.0.27
This trap is sent when RF detection finds a denial of service (DoS) occurring. rbtwsRFDetectDoSType specifies the type of DoS. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectListenerListInfo is a display string of a list of listener information.
     rbtwsRFDetectClientViaRogueWiredAPTrap 1.3.6.1.4.1.52.4.15.1.5.0.28
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. rbtwsSourceWsIp is the IP address of the AC (switch) with the wired port. rbtwsPortNum is the port on the AC. rbtwsClientVLANid is the VLAN ID of the client's traffic. rbtwsClientVLANtag is the VLAN tag of the client's traffic. rbtwsRFDetectXmtrMacAddr is the MAC address of the client. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by rbtwsRFDetectClientViaRogueWiredAPTrap3.
     rbtwsRFDetectInterferingRogueAPTrap 1.3.6.1.4.1.52.4.15.1.5.0.29
This trap is sent when RF detection finds an interfering rogue AP. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by rbtwsRFDetectSuspectDeviceTrap2.
     rbtwsRFDetectInterferingRogueDisappearTrap 1.3.6.1.4.1.52.4.15.1.5.0.30
This trap is sent when an interfering rogue has disappeared. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. Obsoleted by rbtwsRFDetectSuspectDeviceDisappearTrap.
     rbtwsRFDetectUnAuthorizedSsidTrap 1.3.6.1.4.1.52.4.15.1.5.0.31
This trap is sent when RF detection finds use of an unauthorized SSID. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by rbtwsRFDetectRogueDeviceTrap2 and rbtwsRFDetectSuspectDeviceTrap2. One of the two traps will be sent if the device having an unauthorized SSID is classified as rogue or suspect because of this.
     rbtwsRFDetectUnAuthorizedOuiTrap 1.3.6.1.4.1.52.4.15.1.5.0.32
This trap is sent when RF detection finds use of an unauthorized OUI. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by rbtwsRFDetectRogueDeviceTrap2 and rbtwsRFDetectSuspectDeviceTrap2. One of the two traps will be sent if the device having an unauthorized OUI is classified as rogue or suspect because of this.
     rbtwsRFDetectUnAuthorizedAPTrap 1.3.6.1.4.1.52.4.15.1.5.0.33
This trap is sent when RF detection finds operation of an unauthorized AP. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. Obsoleted by rbtwsRFDetectRogueDeviceTrap2.
     rbtwsDAPConnectWarningTrap 1.3.6.1.4.1.52.4.15.1.5.0.34
A DAP, tried to connect to the AC. rbtwsDeviceModel provides the model of the DAP. rbtwsDeviceSerNum provides the serial number of the DAP. rbtwsRsaPubKeyFingerPrint provides the computed fingerprint of the DAP. rbtwsDAPconnectWarningType provides the type of connect warning. Replaced by rbtwsApNonOperStatusTrap2, with rbtwsApTransition = 'connectFail'.
     rbtwsRFDetectDoSPortTrap 1.3.6.1.4.1.52.4.15.1.5.0.35
This trap is sent when RF detection finds a denial of service (DoS) occurring. This has port and AP info instead of 'Listener info'. rbtwsRFDetectDoSType specifies the type of DoS. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsClientAccessType specifies whether wired, AP, or DAP. rbtwsPortNum (for wired or AP), the port that is used. rbtwsDAPNum (for a DAP), the ID of the DAP.
     rbtwsMpMichaelMICFailure2 1.3.6.1.4.1.52.4.15.1.5.0.36
Two Michael MIC failures were seen within 60 seconds of each other. Object rbtwsClientMACAddress is the source of the first failure, and object rbtwsClientMACAddress2 source of the second failure. Obsoleted by rbtwsMichaelMICFailure.
     rbtwsApNonOperStatusTrap 1.3.6.1.4.1.52.4.15.1.5.0.37
This trap is sent when the AP changes state and the new one is a non-operational state. Obsoleted by rbtwsApNonOperStatusTrap2.
     rbtwsApOperRadioStatusTrap 1.3.6.1.4.1.52.4.15.1.5.0.38
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoleted by rbtwsApOperRadioStatusTrap3.
     rbtwsClientIpAddrChangeTrap 1.3.6.1.4.1.52.4.15.1.5.0.39
This trap is sent when a client's IP address changes. The most likely case for this is when the client first connects to the network.
     rbtwsClientAssociationSuccessTrap 1.3.6.1.4.1.52.4.15.1.5.0.40
This trap is sent if a client association succeeds. WARNING: DO NOT enable it in normal use. It may impair switch performance! Only recommended for debugging network issues.
     rbtwsClientAuthenticationSuccessTrap 1.3.6.1.4.1.52.4.15.1.5.0.41
This trap is sent if a client authentication succeeds.
     rbtwsClientDeAuthenticationTrap 1.3.6.1.4.1.52.4.15.1.5.0.42
This trap is sent if a client de-authentication occured.
     rbtwsRFDetectBlacklistedTrap 1.3.6.1.4.1.52.4.15.1.5.0.43
This trap is sent if an association, re-association or de-association request (packet) is detected from a blacklisted transmitter (identified by MAC: 'rbtwsRFDetectXmtrMacAddr'). If 'rbtwsBlacklistingCause' is 'configured', then 'rbtwsBlacklistingRemainingTime' will be zero, meaning indefinite time (depending on administrative actions on the Black List). Otherwise, 'rbtwsBlacklistingRemainingTime' will indicate the time in seconds until this transmitter's requests could be allowed.
     rbtwsRFDetectClientViaRogueWiredAPTrap2 1.3.6.1.4.1.52.4.15.1.5.0.44
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. rbtwsSourceWsIp is the IP address of the AC (switch) with the wired port. rbtwsPortNum is the port on the AC. rbtwsClientVLANid is the VLAN ID of the client's traffic. rbtwsClientVLANtag is the VLAN tag of the client's traffic. rbtwsRFDetectXmtrMacAddr is the MAC address of the client. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. rbtwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired) the client is connected to. Obsoleted by rbtwsRFDetectClientViaRogueWiredAPTrap3.
     rbtwsRFDetectAdhocUserDisappearTrap 1.3.6.1.4.1.52.4.15.1.5.0.45
This trap is sent when RF detection sweep finds that an ad-hoc user disappeared. rbtwsRFDetectXmtrMacAddr is the MAC address of the ad-hoc user.
     rbtwsApRejectLicenseExceededTrap 1.3.6.1.4.1.52.4.15.1.5.0.46
This trap is sent when an AC (wireless switch) receives a packet from an inactive AP and attaching that AP would make the AC exceed the maximum (licensed) number of active APs.
     rbtwsClientDynAuthorChangeSuccessTrap 1.3.6.1.4.1.52.4.15.1.5.0.47
This trap is sent when the authorization attributes for a user are dynamically changed by an authorized dynamic authorization client.
     rbtwsClientDynAuthorChangeFailureTrap 1.3.6.1.4.1.52.4.15.1.5.0.48
This trap is sent if a change of authorization request sent by an authorized dynamic authorization client is unsuccessful.
     rbtwsClientDisconnectTrap 1.3.6.1.4.1.52.4.15.1.5.0.49
This trap is sent when a client session is terminated administratively.
     rbtwsMobilityDomainFailOverTrap 1.3.6.1.4.1.52.4.15.1.5.0.50
This trap is sent when the Mobility Domain fails over to the secondary seed.
     rbtwsMobilityDomainFailBackTrap 1.3.6.1.4.1.52.4.15.1.5.0.51
This trap is sent when the Mobility Domain fails back to the primary seed.
     rbtwsRFDetectRogueDeviceTrap 1.3.6.1.4.1.52.4.15.1.5.0.52
This trap is sent when RF detection finds a rogue device. XmtrMacAddr is the radio MAC address from the beacon. ListenerListInfo is a display string of a list of listener information. ClassificationReason indicates the reason why the device is classified as rogue. Obsoleted by rbtwsRFDetectRogueDeviceTrap2.
     rbtwsRFDetectRogueDeviceDisappearTrap 1.3.6.1.4.1.52.4.15.1.5.0.53
This trap is sent when a rogue device has disappeared. This trap obsoletes the rbtwsRFDetectRogueDisappearTrap.
     rbtwsRFDetectSuspectDeviceTrap 1.3.6.1.4.1.52.4.15.1.5.0.54
This trap is sent when RF detection finds a suspect device. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. ClassificationReason indicates the reason why the device is classified as suspect. Obsoleted by rbtwsRFDetectSuspectDeviceTrap2.
     rbtwsRFDetectSuspectDeviceDisappearTrap 1.3.6.1.4.1.52.4.15.1.5.0.55
This trap is sent when a suspect device has disappeared. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. This trap obsoletes the rbtwsRFDetectInterferingRogueDisappearTrap.
     rbtwsRFDetectClientViaRogueWiredAPTrap3 1.3.6.1.4.1.52.4.15.1.5.0.56
This trap is sent when a client is detected that connected via a rogue AP that is attached to a wired port. rbtwsSourceWsIp is the IP address of the AC (switch) with the wired port. rbtwsPortNum is the port on the AC. rbtwsClientVLANid is the VLAN ID of the client's traffic. rbtwsClientVLANtag is the VLAN tag of the client's traffic. rbtwsRFDetectXmtrMacAddr is the MAC address of the client. rbtwsRFDetectListenerListInfo is a display string of a list of listener information. rbtwsRFDetectRogueAPMacAddr is the MAC address of the Rogue AP (wired) the client is connected to. ClassificationReason indicates the reason why the AP is classified as rogue. This trap obsoletes the rbtwsRFDetectClientViaRogueWiredAPTrap and rbtwsRFDetectClientViaRogueWiredAPTrap2.
     rbtwsRFDetectClassificationChangeTrap 1.3.6.1.4.1.52.4.15.1.5.0.57
This trap is sent when RF detection classification rules change.
     rbtwsConfigurationSavedTrap 1.3.6.1.4.1.52.4.15.1.5.0.58
This trap is sent when the running configuration of the switch is written to a configuration file.
     rbtwsApNonOperStatusTrap2 1.3.6.1.4.1.52.4.15.1.5.0.59
This trap is sent when the AP changes state and the new one is a non-operational state. Obsoletes rbtwsApNonOperStatusTrap.
     rbtwsApOperRadioStatusTrap2 1.3.6.1.4.1.52.4.15.1.5.0.60
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoleted by rbtwsApOperRadioStatusTrap3.
     rbtwsMichaelMICFailure 1.3.6.1.4.1.52.4.15.1.5.0.61
Two Michael MIC failures were seen within 60 seconds of each other. Object rbtwsClientMACAddress indicates the source of the first failure, and object rbtwsClientMACAddress2 indicates the source of the second failure. Service is interrupted for 60 seconds on the radio due to TKIP countermeasures having commenced. The radio is identified by rbtwsApNum and rbtwsAPRadioNum. An alternative way to identify the radio is rbtwsRadioMACAddress. Obsoletes rbtwsMpMichaelMICFailure and rbtwsMpMichaelMICFailure2.
     rbtwsClientAuthorizationSuccessTrap3 1.3.6.1.4.1.52.4.15.1.5.0.62
This trap is sent when a client authorizes. If rbtwsClientAccessMode = 'ap': rbtwsApNum, rbtwsAPRadioNum, rbtwsRadioSSID identify the AP/radio/BSS providing wireless service to this client at the time this trap was sent. If rbtwsClientAccessMode = 'wired': rbtwsPhysPortNum identifies the physical port on the AC used by this wired-auth client. Obsoleted by rbtwsClientAuthorizationSuccessTrap4.
     rbtwsApManagerChangeTrap 1.3.6.1.4.1.52.4.15.1.5.0.63
This trap is sent when the AP's secondary link becomes its primary link.
     rbtwsClientClearedTrap2 1.3.6.1.4.1.52.4.15.1.5.0.64
This trap is sent when a client session is cleared. Obsoletes rbtwsClientClearedTrap.
     rbtwsMobilityDomainResiliencyStatusTrap 1.3.6.1.4.1.52.4.15.1.5.0.65
This trap is sent by a mobility domain seed to announce changes in resilient capacity status.
     rbtwsApOperRadioStatusTrap3 1.3.6.1.4.1.52.4.15.1.5.0.66
This trap is sent when the Radio changes state. It also contains aggregate information about the AP in operational state - security level and service availability. Obsoletes rbtwsApOperRadioStatusTrap and rbtwsApOperRadioStatusTrap2.
     rbtwsClientAuthorizationSuccessTrap4 1.3.6.1.4.1.52.4.15.1.5.0.67
This trap is sent when a client authorizes. If rbtwsClientAccessMode = 'ap': rbtwsApNum, rbtwsAPRadioNum, rbtwsRadioSSID identify the AP/radio/BSS providing wireless service to this client at the time this trap was sent; rbtwsClientRadioType gives the type of radio used by this client. If rbtwsClientAccessMode = 'wired': rbtwsPhysPortNum identifies the physical port on the AC used by this wired-auth client. Obsoletes rbtwsClientAuthorizationSuccessTrap, rbtwsClientAuthorizationSuccessTrap2, rbtwsClientAuthorizationSuccessTrap3.
     rbtwsRFDetectRogueDeviceTrap2 1.3.6.1.4.1.52.4.15.1.5.0.68
This trap is sent when RF detection finds a rogue device. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectXmtrRadioType indicates the Type of Radio used by the transmitter (rogue device). rbtwsRFDetectXmtrCryptoType indicates the Type of Crypto used by the transmitter (rogue device). rbtwsRFDetectListenerListInfo is a display string of a list of listener information. rbtwsRFDetectClassificationReason indicates the reason why the device is classified as rogue. Obsoletes rbtwsRFDetectRogueAPTrap, rbtwsRFDetectUnAuthorizedAPTrap, rbtwsRFDetectRogueDeviceTrap.
     rbtwsRFDetectSuspectDeviceTrap2 1.3.6.1.4.1.52.4.15.1.5.0.69
This trap is sent when RF detection finds a suspect device. rbtwsRFDetectXmtrMacAddr is the radio MAC address from the beacon. rbtwsRFDetectXmtrRadioType indicates the Type of Radio used by the transmitter (suspect device). rbtwsRFDetectXmtrCryptoType indicates the Type of Crypto used by the transmitter (suspect device). rbtwsRFDetectListenerListInfo is a display string of a list of listener information. rbtwsRFDetectClassificationReason indicates the reason why the device is classified as suspect. Obsoletes rbtwsRFDetectInterferingRogueAPTrap, rbtwsRFDetectSuspectDeviceTrap.
     rbtwsClusterFailureTrap 1.3.6.1.4.1.52.4.15.1.5.0.70
This trap is sent when the cluster configuration failed to apply. If rbtwsClusterFailureReason = 'validation-error': The validation error is reported by the receiving end of the configuration updates. The receiving end can be any AC (switch) in the mobility domain: member, secondary seed or primary seed. - Primary seed will be the receiving end of configuration updates when Primary seed is joining the cluster and Secondary seed has preempt mode enabled. - Both Secondary seed and member will be at the receiving end when Primary seed is active.