Whenever dynamic algorithms are running and
bsnAPIfPhyChannelAutomaticOn is true, Airespace AP
Interface's CurrentChannel might get updated by algorithm.
When this occurs notification will be sent with Dot3 MAC
address of Airespace AP and slot ID of Airespace AP IF along
with the currentChannel for this Airespace AP IF
Parsed from file AIRESPACE-WIRELESS-MIB.mib
Module: AIRESPACE-WIRELESS-MIB
Whenever dynamic algorithms are running and
bsnAPIfPhyChannelAutomaticOn is true, Airespace AP
Interface's CurrentChannel might get updated by algorithm.
When this occurs notification will be sent with Dot3 MAC
address of Airespace AP and slot ID of Airespace AP IF along
with the currentChannel for this Airespace AP IF
Parsed from file AIRESPACE-WIRELESS-MIB.my.txt
Company: None
Module: AIRESPACE-WIRELESS-MIB
Whenever dynamic algorithms are running and
bsnAPIfPhyChannelAutomaticOn is true, Airespace AP
Interface's CurrentChannel might get updated by algorithm.
When this occurs notification will be sent with Dot3 MAC
address of Airespace AP and slot ID of Airespace AP IF along
with the currentChannel for this Airespace AP IF
bsnAPCurrentChannelChanged NOTIFICATION-TYPE OBJECTS { bsnAPMacAddrTrapVariable,bsnAPSlotIdTrapVariable, bsnAPChannelNumberTrapVariable, bsnInterferenceEnergyBeforeChannelUpdate, bsnInterferenceEnergyAfterChannelUpdate } STATUS current DESCRIPTION "Whenever dynamic algorithms are running and bsnAPIfPhyChannelAutomaticOn is true, Airespace AP Interface's CurrentChannel might get updated by algorithm. When this occurs notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF along with the currentChannel for this Airespace AP IF" ::= { bsnTraps 16 }
Vendor: Airespace, Inc (formerly Black Storm Networks)
Module: AIRESPACE-WIRELESS-MIB
[Automatically extracted from oidview.com]
bsnAPCurrentChannelChanged NOTIFICATION-TYPE OBJECTS { bsnAPMacAddrTrapVariable, bsnAPSlotIdTrapVariable, bsnAPChannelNumberTrapVariable, bsnInterferenceEnergyBeforeChannelUpdate, bsnInterferenceEnergyAfterChannelUpdate, bsnAPPreviousChannelNumberTrapVariable, bsnAPReasonCodeTrapVariable, bsnNoiseBeforeChannelUpdate, bsnNoiseAfterChannelUpdate, bsnInterferenceBeforeChannelUpdate, bsnInterferenceAfterChannelUpdate, bsnAPName } STATUS current DESCRIPTION "Whenever dynamic algorithms are running and bsnAPIfPhyChannelAutomaticOn is true, Airespace AP Interface's CurrentChannel might get updated by algorithm. When this occurs notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF along with the currentChannel for this Airespace AP IF" ::= { bsnTraps 16 }
bsnAPCurrentChannelChanged NOTIFICATION-TYPE OBJECTS { bsnAPMacAddrTrapVariable, bsnAPSlotIdTrapVariable, bsnAPChannelNumberTrapVariable, bsnInterferenceEnergyBeforeChannelUpdate, bsnInterferenceEnergyAfterChannelUpdate, bsnAPPreviousChannelNumberTrapVariable, bsnAPReasonCodeTrapVariable, bsnNoiseBeforeChannelUpdate, bsnNoiseAfterChannelUpdate, bsnInterferenceBeforeChannelUpdate, bsnInterferenceAfterChannelUpdate, bsnAPName } STATUS current DESCRIPTION "Whenever dynamic algorithms are running and bsnAPIfPhyChannelAutomaticOn is true, Airespace AP Interface's CurrentChannel might get updated by algorithm. When this occurs notification will be sent with Dot3 MAC address of Airespace AP and slot ID of Airespace AP IF along with the currentChannel for this Airespace AP IF" ::= { bsnTraps 16 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.14179.2.6.3.1 | bsnDot11StationDisassociate | 0 | 0 | The disassociate notification shall be sent when the Station sends a Disassociation frame. The value of the notification shall in… |
1.3.6.1.4.1.14179.2.6.3.2 | bsnDot11StationDeauthenticate | 0 | 0 | The deauthenticate notification shall be sent when the Station sends a Deauthentication frame. The value of the notification shal… |
1.3.6.1.4.1.14179.2.6.3.3 | bsnDot11StationAuthenticateFail | 0 | 0 | The authenticate failure notification shall be sent when the Station sends an Authentication frame with a status code other than … |
1.3.6.1.4.1.14179.2.6.3.4 | bsnDot11StationAssociateFail | 0 | 0 | The associate failure notification shall be sent when the Station sends an Association frame with a status code other than 'succe… |
1.3.6.1.4.1.14179.2.6.3.5 | bsnAPUp | 0 | 0 | When Airespace AP operation status goes up this trap will be sent |
1.3.6.1.4.1.14179.2.6.3.6 | bsnAPDown | 0 | 0 | When Airespace AP operation status goes down this trap will be sent |
1.3.6.1.4.1.14179.2.6.3.7 | bsnAPAssociated | 0 | 0 | When Airespace AP Associates to a Airespace Switch, AP associated notification will be sent with dot3 MAC address of Airespace AP… |
1.3.6.1.4.1.14179.2.6.3.8 | bsnAPDisassociated | 0 | 0 | When Airespace AP disassociates from Airespace Switch, AP disassociated notification will be sent with dot3 MAC address of Airesp… |
1.3.6.1.4.1.14179.2.6.3.9 | bsnAPIfUp | 0 | 0 | When Airespace AP's interface's operation status goes up this trap will be sent |
1.3.6.1.4.1.14179.2.6.3.10 | bsnAPIfDown | 0 | 0 | When Airespace AP's interface's operation status goes down this trap will be sent. |
1.3.6.1.4.1.14179.2.6.3.11 | bsnAPLoadProfileFailed | 0 | 0 | When LOAD Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot ID of… |
1.3.6.1.4.1.14179.2.6.3.12 | bsnAPNoiseProfileFailed | 0 | 0 | When Noise Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot ID o… |
1.3.6.1.4.1.14179.2.6.3.13 | bsnAPInterferenceProfileFailed | 0 | 0 | When Interference Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and sl… |
1.3.6.1.4.1.14179.2.6.3.14 | bsnAPCoverageProfileFailed | 0 | 0 | When Coverage Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot I… |
1.3.6.1.4.1.14179.2.6.3.15 | bsnAPCurrentTxPowerChanged | 0 | 0 | Whenever dynamic algorithms are running and bsnAPIfPhyPowerAutomaticOn is true, Airespace AP Interface's CurrentTxPower might get… |
1.3.6.1.4.1.14179.2.6.3.21 | bsnRrmDot11aGroupingDone | 0 | 0 | When Grouping is done, this notification will be sent from the previous Group Leader where grouping algorithm was run. It has MAC… |
1.3.6.1.4.1.14179.2.6.3.22 | bsnRrmDot11bGroupingDone | 0 | 0 | When Grouping is done, this notification will be sent from the previous Group Leader where grouping algorithm was run. It has MAC… |
1.3.6.1.4.1.14179.2.6.3.23 | bsnConfigSaved | 0 | 0 | When configuration is save either from CLI or web interface This trap will be sent to inform NMS to do refresh |
1.3.6.1.4.1.14179.2.6.3.24 | bsnDot11EssCreated | 0 | 0 | Whenever a new Ess (WLAN) is created, this notification will be sent along with EssIndex |
1.3.6.1.4.1.14179.2.6.3.25 | bsnDot11EssDeleted | 0 | 0 | Whenever a Ess (WLAN)is deleted, this notification will be sent along with EssIndex |
1.3.6.1.4.1.14179.2.6.3.26 | bsnRADIUSServerNotResponding | 0 | 0 | This trap is to indicate that no RADIUS server(s) are responding to authentication requests sent by the RADIUS client within the… |
1.3.6.1.4.1.14179.2.6.3.27 | bsnAuthenticationFailure | 0 | 0 | This trap is to inform that client authentication failure has occured at MWAR(Switch). This could be cli/web user, wlan user, or … |
1.3.6.1.4.1.14179.2.6.3.28 | bsnIpsecEspAuthFailureTrap | 0 | 0 | IPsec packets with invalid hashes were found in an inbound ESP SA. The total number of authentication errors accumulated is sent … |
1.3.6.1.4.1.14179.2.6.3.29 | bsnIpsecEspReplayFailureTrap | 0 | 0 | IPsec packets with invalid sequence numbers were found in an inbound ESP SA. The total number of replay errors accumulated is sen… |
1.3.6.1.4.1.14179.2.6.3.31 | bsnIpsecEspInvalidSpiTrap | 0 | 0 | A packet with an unknown SPI was detected from the specified peer with the specified SPI using the specified protocol. The destin… |
1.3.6.1.4.1.14179.2.6.3.33 | bsnIpsecIkeNegFailure | 0 | 0 | An attempt to negotiate a phase 1 IKE SA failed. The notification counts are also sent as part of the trap, along with the curren… |
1.3.6.1.4.1.14179.2.6.3.34 | bsnIpsecSuiteNegFailure | 0 | 0 | An attempt to negotiate a phase 2 SA suite for the specified selector failed. The current total failure counts are passed as well… |
1.3.6.1.4.1.14179.2.6.3.35 | bsnIpsecInvalidCookieTrap | 0 | 0 | ISAKMP packets with invalid cookies were detected from the specified source, intended for the specified destination. The initiato… |
1.3.6.1.4.1.14179.2.6.3.36 | bsnRogueAPDetected | 0 | 0 | When a Rogue AP is detected this Trap will be sent out along with APMacAddress on which its detected |
1.3.6.1.4.1.14179.2.6.3.37 | bsnAPLoadProfileUpdatedToPass | 0 | 0 | When LOAD Profile state changes from FAIL to PASSt this notification will be sent with Dot3 MAC address of Airespace AP and slot … |
1.3.6.1.4.1.14179.2.6.3.38 | bsnAPNoiseProfileUpdatedToPass | 0 | 0 | When Noise Profile state changes from FAIL tp PASS, notification will be sent with Dot3 MAC address of Airespace AP and slot ID o… |
1.3.6.1.4.1.14179.2.6.3.39 | bsnAPInterferenceProfileUpdatedToPass | 0 | 0 | When Interference Profile state changes from FAIL tp PASS, notification will be sent with Dot3 MAC address of Airespace AP and sl… |
1.3.6.1.4.1.14179.2.6.3.40 | bsnAPCoverageProfileUpdatedToPass | 0 | 0 | When Coverage Profile state changes from FAIL tp PASS, notification will be sent with Dot3 MAC address of Airespace AP and slot I… |
1.3.6.1.4.1.14179.2.6.3.41 | bsnRogueAPRemoved | 0 | 0 | When a Rogue AP that was detected earlier no longer exists this Trap will be sent out along with APMacAddress on which its detect… |
1.3.6.1.4.1.14179.2.6.3.42 | bsnRadiosExceedLicenseCount | 0 | 0 | Whenever the currently associated Radios exceed the License Count This trap will be sent to annoy the Customer |
1.3.6.1.4.1.14179.2.6.3.43 | bsnSensedTemperatureTooHigh | 0 | 0 | Temperature sensor temp too High - temp is too high on the unit. Immediate action should be taken |
1.3.6.1.4.1.14179.2.6.3.44 | bsnSensedTemperatureTooLow | 0 | 0 | Temperature sensor temp too Low - temp is too high on the unit. Immediate action should be taken |
1.3.6.1.4.1.14179.2.6.3.45 | bsnTemperatureSensorFailure | 0 | 0 | Temperature sensor hw failure - temp sensor has failed. Temperature is unknown |
1.3.6.1.4.1.14179.2.6.3.46 | bsnTemperatureSensorClear | 0 | 0 | Temperature sensor clear sensor is operating within proper temp range |
1.3.6.1.4.1.14179.2.6.3.47 | bsnPOEControllerFailure | 0 | 0 | POE Controller has failed. Its a very critical trap. User intervention is required. |
1.3.6.1.4.1.14179.2.6.3.48 | bsnMaxRogueCountExceeded | 0 | 0 | The number of rogues has exceeded the maximum Rogues allowed |
1.3.6.1.4.1.14179.2.6.3.49 | bsnMaxRogueCountClear | 0 | 0 | The number of rogues is within the maximum Rogues allowed |
1.3.6.1.4.1.14179.2.6.3.50 | bsnApMaxRogueCountExceeded | 0 | 0 | The number of rogues has exceeded the maximum Rogues allowed on the AP |
1.3.6.1.4.1.14179.2.6.3.51 | bsnApMaxRogueCountClear | 0 | 0 | The number of rogues is within the maximum Rogues allowed on the AP |
1.3.6.1.4.1.14179.2.6.3.52 | bsnDot11StationBlacklisted | 0 | 0 | The station blacklisted notification shall be sent when the client is blacklisted. The reason could be repeated auth or associat… |
1.3.6.1.4.1.14179.2.6.3.53 | bsnDot11StationAssociate | 0 | 0 | The associate notification shall be sent when any of the watchlisted clients(present on at least one watch list) associates with … |
1.3.6.1.4.1.14179.2.6.3.55 | bsnApBigNavDosAttack | 0 | 0 | The AP sent a string of messages with large NAV field and all 802.11 traffic on that channel was suspended. |
1.3.6.1.4.1.14179.2.6.3.56 | bsnTooManyUnsuccessLoginAttempts | 0 | 0 | The Management User made too many unsuccessful login attempts. |
1.3.6.1.4.1.14179.2.6.3.57 | bsnWepKeyDecryptError | 0 | 0 | Issued when a decrypt error occurrs. The WEP Key configured at the station may be wrong. |
1.3.6.1.4.1.14179.2.6.3.58 | bsnWpaMicErrorCounterActivated | 0 | 0 | Issued when a WPA MIC error occurs and a counter measure is activated at the AP. |
1.3.6.1.4.1.14179.2.6.3.59 | bsnRogueAPDetectedOnWiredNetwork | 0 | 0 | When a Rogue is detected on the wired network this trap will be sent out. The same trap with bsnRogueAPOnWiredNetwork set to no w… |
1.3.6.1.4.1.14179.2.6.3.60 | bsnApHasNoRadioCards | 0 | 0 | When an AP has no radio cards present on it, the switch sends this trap. |
1.3.6.1.4.1.14179.2.6.3.61 | bsnDuplicateIpAddressReported | 0 | 0 | This trap is issued when the switch or an AP detects another machine using its IP Address. The first variable has value yes if th… |
1.3.6.1.4.1.14179.2.6.3.62 | bsnAPContainedAsARogue | 0 | 0 | When our AP detects that it is being contained by another AP, this trap is issued. The clear flag is true if the AP is no longer … |
1.3.6.1.4.1.14179.2.6.3.63 | bsnTrustedApHasInvalidSsid | 0 | 0 | Issued when a Trusted Rogue AP is auto contained for advertising invalid SSID. If the clear variable has value true, then the tra… |
1.3.6.1.4.1.14179.2.6.3.64 | bsnTrustedApIsMissing | 0 | 0 | Issued when a Trusted Rogue AP is missing or has failed. If the clear variable has value true, then the trap clears the earlier a… |
1.3.6.1.4.1.14179.2.6.3.65 | bsnAdhocRogueAutoContained | 0 | 0 | Issued when an Adhoc Rogue is auto contained. If the clear variable has value true, then the trap clears the earlier alert. |
1.3.6.1.4.1.14179.2.6.3.66 | bsnRogueApAutoContained | 0 | 0 | Issued when a Rogue AP is auto contained for advertising our SSID. If the clear variable has value true, then the trap clears th… |
1.3.6.1.4.1.14179.2.6.3.67 | bsnTrustedApHasInvalidEncryption | 0 | 0 | Issued when a Trusted Rogue AP is auto contained for using invalid encryption. The second param is for the encryption used and th… |
1.3.6.1.4.1.14179.2.6.3.68 | bsnTrustedApHasInvalidRadioPolicy | 0 | 0 | Issued when a Trusted Rogue AP is auto contained for using invalid radio policy. The second param is for the radio policy used a… |
1.3.6.1.4.1.14179.2.6.3.69 | bsnNetworkStateChanged | 0 | 0 | When the 802.11a or b/g network state is changed this trap is issued. |
1.3.6.1.4.1.14179.2.6.3.70 | bsnSignatureAttackDetected | 0 | 0 | This trap is sent out when a signature attack is detected by the switch. The standard and custom signatures are predefined on the… |
1.3.6.1.4.1.14179.2.6.3.71 | bsnAPRadioCardTxFailure | 0 | 0 | This trap is sent by the switch when a radio card on an AP stops transmitting. |
1.3.6.1.4.1.14179.2.6.3.72 | bsnAPRadioCardTxFailureClear | 0 | 0 | This trap is sent by the switch when a radio card on an AP starts transmitting again after a prior failure. |
1.3.6.1.4.1.14179.2.6.3.73 | bsnAPRadioCardRxFailure | 0 | 0 | This trap is sent by the switch when a radio card on an AP stops receiving. |
1.3.6.1.4.1.14179.2.6.3.74 | bsnAPRadioCardRxFailureClear | 0 | 0 | This trap is sent by the switch when a radio card on an AP starts receiving again after a prior failure. |
1.3.6.1.4.1.14179.2.6.3.75 | bsnAPImpersonationDetected | 0 | 0 | This trap is sent by the switch when a radio of an authenticated AP hears from another AP whose MAC Address neither matches that … |
1.3.6.1.4.1.14179.2.6.3.76 | bsnTrustedApHasInvalidPreamble | 0 | 0 | Issued when a Trusted Rogue AP is auto contained for using invalid preamble. The second param is for the preamble used and the t… |
1.3.6.1.4.1.14179.2.6.3.77 | bsnAPIPAddressFallback | 0 | 0 | This trap is sent out when an AP, with the configured static ip-address, fails to establish connection with outside world and sta… |
1.3.6.1.4.1.14179.2.6.3.78 | bsnAPFunctionalityDisabled | 0 | 0 | This trap is sent out when AP functionality on the switch is disabled because the License key has expired or has been deleted or … |
1.3.6.1.4.1.14179.2.6.3.79 | bsnAPRegulatoryDomainMismatch | 0 | 0 | This trap is generated if an AP's regulatory domain doesn't match the country the switch is configured for. Due to the mismatch,… |
1.3.6.1.4.1.14179.2.6.3.80 | bsnRxMulticastQueueFull | 0 | 0 | This trap indicates that the CPU's Receive Multicast Queue is Full. |
1.3.6.1.4.1.14179.2.6.3.81 | bsnRadarChannelDetected | 0 | 0 | This trap is sent when radar signals are detected on the current channel |
1.3.6.1.4.1.14179.2.6.3.82 | bsnRadarChannelCleared | 0 | 0 | This trap will be generated, if a radar trap has been generated earlier, after the expiry of Non-Occupancy Period. |
1.3.6.1.4.1.14179.2.6.3.83 | bsnAPAuthorizationFailure | 0 | 0 | This trap is sent out in case of authorization failure while attempting to associate the AP to the controller. bsnAPDot3MacAddres… |
1.3.6.1.4.1.14179.2.6.3.84 | radioCoreDumpTrap | 0 | 0 | When radio module in AP dumps core, it informs controller and controller generates this trap. The core file can be retrieved on d… |
1.3.6.1.4.1.14179.2.6.3.85 | invalidRadioTrap | 0 | 0 | This trap will be generated when an AP has joined is using unsupported radio or a radio slot not currently not being used. |
1.3.6.1.4.1.14179.2.6.3.86 | countryChangeTrap | 0 | 0 | This trap will be generated when an operator changes the country of operation. New country code will be sent in trap. |
1.3.6.1.4.1.14179.2.6.3.87 | unsupportedAPTrap | 0 | 0 | This trap will be generated when unsupported AP try to join 40xx/410x or 3500 with 64MB flash. |
1.3.6.1.4.1.14179.2.6.3.88 | heartbeatLossTrap | 0 | 0 | This trap will be generated when controller loses connection with the Supervisor Switch in which it is physically embedded and do… |
1.3.6.1.4.1.14179.2.6.3.89 | locationNotifyTrap | 0 | 0 | This trap will be generated by the location server for notifications of location events. |