RUCKUS-ZD-EVENT-MIB: View SNMP OID List / Download MIB

VENDOR: RUCKUS WIRELESS


 Home MIB: RUCKUS-ZD-EVENT-MIB
Download as:   

Download standard MIB format if you are planning to load a MIB file into some system (OS, Zabbix, PRTG ...) or view it with a MIB browser. CSV is more suitable for analyzing and viewing OID' and other MIB objects in excel. JSON and YAML formats are usually used in programing even though some systems can use MIB in YAML format (like Logstash).
Keep in mind that standard MIB files can be successfully loaded by systems and programs only if all the required MIB's from the "Imports" section are already loaded.
The tree-like SNMP object navigator requires no explanations because it is very simple to use. And if you stumbled on this MIB from Google note that you can always go back to the home page if you need to perform another MIB or OID lookup.


Object Name OID Type Access Info
 ruckusZDEventMIB 1.3.6.1.4.1.25053.2.2
Ruckus ZD event objects, including trap OID and trap payload.
     ruckusZDEventTraps 1.3.6.1.4.1.25053.2.2.1
         ruckusZDEventAPJoinTrap 1.3.6.1.4.1.25053.2.2.1.1
Trigger when there is a AP join event. The AP's MAC address is enclosed.
         ruckusZDEventSSIDSpoofTrap 1.3.6.1.4.1.25053.2.2.1.2
Trigger when a SSID-spoofing rogue AP is detected. The rogue AP's MAC address and SSID are enclosed.
         ruckusZDEventMACSpoofTrap 1.3.6.1.4.1.25053.2.2.1.3
Trigger when a MAC-spoofing rogue AP is detected. The rogue AP's MAC address and SSID are enclosed.
         ruckusZDEventRogueAPTrap 1.3.6.1.4.1.25053.2.2.1.4
Trigger when a rogue AP is detected. The rogue AP's MAC address and SSID are enclosed.
         ruckusZDEventAPLostTrap 1.3.6.1.4.1.25053.2.2.1.5
Trigger when AP lost contact. The AP's MAC address is enclosed.
         ruckusZDEventAPLostHeartbeatTrap 1.3.6.1.4.1.25053.2.2.1.6
Trigger when AP lost heartbeats. The AP's MAC address is enclosed.
         ruckusZDEventClientAuthFailBlockTrap 1.3.6.1.4.1.25053.2.2.1.7
Triggered when a client fails authentication too many times in a row. The client's MAC address, AP's MAC address and SSID are enclosed.
         ruckusZDEventAPResetTrap 1.3.6.1.4.1.25053.2.2.1.8
Trigger when AP reboots.
         ruckusZDEventIPChangeTrap 1.3.6.1.4.1.25053.2.2.1.9
Trigger when IP changes.
         ruckusZDEventSystemColdStartTrap 1.3.6.1.4.1.25053.2.2.1.10
Trigger when system performs cold start.
         ruckusZDEventAPChannelChangeTrap 1.3.6.1.4.1.25053.2.2.1.11
Trigger when AP channel changes.
         ruckusZDEventRadiusAuthUnavailableTrap 1.3.6.1.4.1.25053.2.2.1.12
Trigger when RADIUS authentication server unavailable.
         ruckusZDEventRadiusAcctUnavailableTrap 1.3.6.1.4.1.25053.2.2.1.13
Trigger when RADIUS accounting server unavailable.
         ruckusZDEventClientJoinFailAPBusyTrap 1.3.6.1.4.1.25053.2.2.1.14
Trigger when client joins fail because AP is busy.
         ruckusZDEventInterferenceADHoc 1.3.6.1.4.1.25053.2.2.1.15
Trigger when an interference AD hoc is detected.
         ruckusZDEventImageUpgradeFailTrap 1.3.6.1.4.1.25053.2.2.1.16
Trigger when AP image upgrade fails.
         ruckusZDEventHeartbeatTrap 1.3.6.1.4.1.25053.2.2.1.22
Trigger with trap heartbeat sent.
         ruckusZDEventAttackedTrap 1.3.6.1.4.1.25053.2.2.1.24
Trigger with a malicious attack is found.
         ruckusZDEventSystemWarmStartTrap 1.3.6.1.4.1.25053.2.2.1.25
Trigger when system performs warm start.
         ruckusZDEventInterfereAPTrap 1.3.6.1.4.1.25053.2.2.1.26
Trigger when a rogue AP used same channel with current AP is detected.
         ruckusZDEventAPSystemColdStartTrap 1.3.6.1.4.1.25053.2.2.1.31
Trigger when an AP performs cold start.
         ruckusZDEventAPSystemWarmStartTrap 1.3.6.1.4.1.25053.2.2.1.32
Trigger when an AP performs warm start.
         ruckusZDEventAPSSIDChangedTrap 1.3.6.1.4.1.25053.2.2.1.33
Trigger when an AP SSID changed.
         ruckusZDEventAPClientExceedValve 1.3.6.1.4.1.25053.2.2.1.34
Triggered when AP online client exceed valve.
         ruckusZDEventAPAvailableStatusTrap 1.3.6.1.4.1.25053.2.2.1.35
Trigger when AP is available.
         ruckusZDEventAPWirelessInterfaceFaultTrap 1.3.6.1.4.1.25053.2.2.1.36
Trigger when AP wireless interface is fault.
         ruckusZDEventSystemCpuUtilExceedValve 1.3.6.1.4.1.25053.2.2.1.37
Trigger when System CPU utilization is exceed valve.
         ruckusZDEventSystemMemUtilExceedValve 1.3.6.1.4.1.25053.2.2.1.38
Trigger when System memory utilization is exceed valve.
         ruckusZDEventSystemBandwidthUtilExceedValve 1.3.6.1.4.1.25053.2.2.1.39
Trigger when System bandwidth utilization is exceed valve.
         ruckusZDEventSystemDropPacketRateExceedValve 1.3.6.1.4.1.25053.2.2.1.40
Trigger when System drop packet rate is exceed valve.
         ruckusZDEventAPSyncTimeFail 1.3.6.1.4.1.25053.2.2.1.41
Trigger when AP sync clock failure with AC.
         ruckusZDEventSystemCpuUtilClrWarn 1.3.6.1.4.1.25053.2.2.1.42
Trigger when System CPU utilization is under the valve.
         ruckusZDEventSystemMemUtilClrwarn 1.3.6.1.4.1.25053.2.2.1.43
Trigger when System memory utilization is under the valve.
         ruckusZDEventClientJoin 1.3.6.1.4.1.25053.2.2.1.60
Triggered when a client join a AP success. The client's MAC address, AP's MAC address and SSID are enclosed.
         ruckusZDEventClientJoinFailed 1.3.6.1.4.1.25053.2.2.1.61
Triggered when a client join a AP failed. The client's MAC address, AP's MAC address and SSID are enclosed.
         ruckusZDEventClientJoinFailedAPBusy 1.3.6.1.4.1.25053.2.2.1.62
Triggered when a client join a AP failed because of AP too busy. The client's MAC address, AP's MAC address and SSID are enclosed.
         ruckusZDEventClientDisconnect 1.3.6.1.4.1.25053.2.2.1.63
Triggered when a client disconnect from AP. The client's MAC address, AP's MAC address and SSID are enclosed.
         ruckusZDEventClientRoamOut 1.3.6.1.4.1.25053.2.2.1.64
Triggered when a client roam out from AP. The client's MAC address, AP's MAC address and SSID are enclosed.
         ruckusZDEventClientRoamIn 1.3.6.1.4.1.25053.2.2.1.65
Triggered when a client roam in from AP. The client's MAC address, AP's MAC address and SSID are enclosed.
         ruckusZDEventClientAuthFailed 1.3.6.1.4.1.25053.2.2.1.66
Triggered when a client authenticate failure . The client's MAC address, AP's MAC address and SSID are enclosed.Failure reason.
         ruckusZDEventClientAuthorizationFailed 1.3.6.1.4.1.25053.2.2.1.67
Triggered when a client has no authorization to join a AP. The client's MAC address, AP's MAC address and SSID are enclosed.
         ruckusZDEventAPCPUvalve 1.3.6.1.4.1.25053.2.2.1.83
Triggered when AP cpu util exceed valve.
         ruckusZDEventAPMEMvalve 1.3.6.1.4.1.25053.2.2.1.84
Triggered when AP memory util exceed valve.
         ruckusZDEventAPCPUvalveClrwarn 1.3.6.1.4.1.25053.2.2.1.85
Trigger when AP cpu utilization is under the valve.
         ruckusZDEventAPMEMvalveClrwarn 1.3.6.1.4.1.25053.2.2.1.86
Trigger when AP memory utilization is under the valve.
         ruckusZDEventAPNumStaExceedValveClrwarn 1.3.6.1.4.1.25053.2.2.1.87
Trigger when online client clr warning.
         ruckusZDEventDhcpPoolFull 1.3.6.1.4.1.25053.2.2.1.88
Trigger when DHCP pool is full.
         ruckusZDEventDhcpPoolAbun 1.3.6.1.4.1.25053.2.2.1.89
Trigger when DHCP pool is abundant.
         ruckusZDEventSmartRedundancyChangetoActive 1.3.6.1.4.1.25053.2.2.1.100
[Smart Redundancy] Peer ZoneDirector peer ip not found, system changed to active state
         ruckusZDEventSmartRedundancyActiveConnected 1.3.6.1.4.1.25053.2.2.1.101
[Smart Redundancy] connected, system is in active state
         ruckusZDEventSmartRedundancyActiveDisconnected 1.3.6.1.4.1.25053.2.2.1.102
[Smart Redundancy] disconnected, system is in active state
         ruckusZDEventSmartRedundancyStandbyConnected 1.3.6.1.4.1.25053.2.2.1.103
[Smart Redundancy] connected, system is in standby state
         ruckusZDEventSmartRedundancyStandbyDisconnected 1.3.6.1.4.1.25053.2.2.1.104
[Smart Redundancy] disconnected, system is in standby state
     ruckusZDEventObjects 1.3.6.1.4.1.25053.2.2.2
         ruckusZDEventSerial 1.3.6.1.4.1.25053.2.2.2.1 octet string no-access
Trap serial number.
         ruckusZDEventNEID 1.3.6.1.4.1.25053.2.2.2.2 octet string no-access
Network element ID.
         ruckusZDEventSeverity 1.3.6.1.4.1.25053.2.2.2.3 octet string no-access
Severity level of the trap.
         ruckusZDEventType 1.3.6.1.4.1.25053.2.2.2.4 octet string no-access
Trap type.
         ruckusZDEventTime 1.3.6.1.4.1.25053.2.2.2.5 octet string no-access
Time when trap occured.
         ruckusZDEventStatus 1.3.6.1.4.1.25053.2.2.2.6 integer no-access
Trap status. Enumeration: 'clear': 2, 'raise': 1.
         ruckusZDEventTitle 1.3.6.1.4.1.25053.2.2.2.7 octet string no-access
Trap title.
         ruckusZDEventContent 1.3.6.1.4.1.25053.2.2.2.8 octet string no-access
Trap content.
         ruckusZDEventClientMacAddr 1.3.6.1.4.1.25053.2.2.2.15 octet string no-access
The client's MAC address.
         ruckusZDEventAPMacAddr 1.3.6.1.4.1.25053.2.2.2.18 octet string no-access
The AP's MAC address.
         ruckusZDEventRogueMacAddr 1.3.6.1.4.1.25053.2.2.2.20 octet string no-access
The rogue AP's MAC address.
         ruckusZDEventSSID 1.3.6.1.4.1.25053.2.2.2.23 octet string no-access
SSID.
         ruckusZDEventChannel 1.3.6.1.4.1.25053.2.2.2.25 unsigned32 no-access
Channel.
         ruckusZDEventReason 1.3.6.1.4.1.25053.2.2.2.28 octet string no-access
Failure Reason.
         ruckusZDEventIpAddr 1.3.6.1.4.1.25053.2.2.2.30 octet string no-access
IpAddress (ipv4 and ipv6).