This trap is sent by the switch when a radio card on an AP
starts transmitting again after a prior failure.
Parsed from file AIRESPACE-WIRELESS-MIB.mib
Module: AIRESPACE-WIRELESS-MIB
This trap is sent by the switch when a radio card on an AP
starts transmitting again after a prior failure.
Parsed from file AIRESPACE-WIRELESS-MIB.my.txt
Company: None
Module: AIRESPACE-WIRELESS-MIB
This trap is sent by the switch when a radio card on an AP
starts transmitting again after a prior failure.
bsnAPRadioCardTxFailureClear NOTIFICATION-TYPE OBJECTS { bsnAPDot3MacAddress, bsnAPIfSlotId, bsnAPIfType} STATUS current DESCRIPTION "This trap is sent by the switch when a radio card on an AP starts transmitting again after a prior failure." ::= { bsnTraps 72 }
Vendor: Airespace, Inc (formerly Black Storm Networks)
Module: AIRESPACE-WIRELESS-MIB
[Automatically extracted from oidview.com]
bsnAPRadioCardTxFailureClear NOTIFICATION-TYPE OBJECTS { bsnAPDot3MacAddress, bsnAPIfSlotId, bsnAPIfType, bsnAPName } STATUS current DESCRIPTION "This trap is sent by the switch when a radio card on an AP starts transmitting again after a prior failure." ::= { bsnTraps 72 }
bsnAPRadioCardTxFailureClear NOTIFICATION-TYPE OBJECTS { bsnAPDot3MacAddress, bsnAPIfSlotId, bsnAPIfType, bsnAPName } STATUS current DESCRIPTION "This trap is sent by the switch when a radio card on an AP starts transmitting again after a prior failure." ::= { bsnTraps 72 }
OID | Name | Sub children | Sub Nodes Total | Description |
---|---|---|---|---|
1.3.6.1.4.1.14179.2.6.3.1 | bsnDot11StationDisassociate | 0 | 0 | The disassociate notification shall be sent when the Station sends a Disassociation frame. The value of the notification shall in… |
1.3.6.1.4.1.14179.2.6.3.2 | bsnDot11StationDeauthenticate | 0 | 0 | The deauthenticate notification shall be sent when the Station sends a Deauthentication frame. The value of the notification shal… |
1.3.6.1.4.1.14179.2.6.3.3 | bsnDot11StationAuthenticateFail | 0 | 0 | The authenticate failure notification shall be sent when the Station sends an Authentication frame with a status code other than … |
1.3.6.1.4.1.14179.2.6.3.4 | bsnDot11StationAssociateFail | 0 | 0 | The associate failure notification shall be sent when the Station sends an Association frame with a status code other than 'succe… |
1.3.6.1.4.1.14179.2.6.3.5 | bsnAPUp | 0 | 0 | When Airespace AP operation status goes up this trap will be sent |
1.3.6.1.4.1.14179.2.6.3.6 | bsnAPDown | 0 | 0 | When Airespace AP operation status goes down this trap will be sent |
1.3.6.1.4.1.14179.2.6.3.7 | bsnAPAssociated | 0 | 0 | When Airespace AP Associates to a Airespace Switch, AP associated notification will be sent with dot3 MAC address of Airespace AP… |
1.3.6.1.4.1.14179.2.6.3.8 | bsnAPDisassociated | 0 | 0 | When Airespace AP disassociates from Airespace Switch, AP disassociated notification will be sent with dot3 MAC address of Airesp… |
1.3.6.1.4.1.14179.2.6.3.9 | bsnAPIfUp | 0 | 0 | When Airespace AP's interface's operation status goes up this trap will be sent |
1.3.6.1.4.1.14179.2.6.3.10 | bsnAPIfDown | 0 | 0 | When Airespace AP's interface's operation status goes down this trap will be sent. |
1.3.6.1.4.1.14179.2.6.3.11 | bsnAPLoadProfileFailed | 0 | 0 | When LOAD Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot ID of… |
1.3.6.1.4.1.14179.2.6.3.12 | bsnAPNoiseProfileFailed | 0 | 0 | When Noise Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot ID o… |
1.3.6.1.4.1.14179.2.6.3.13 | bsnAPInterferenceProfileFailed | 0 | 0 | When Interference Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and sl… |
1.3.6.1.4.1.14179.2.6.3.14 | bsnAPCoverageProfileFailed | 0 | 0 | When Coverage Profile state changes from PASS to FAIL, notification will be sent with Dot3 MAC address of Airespace AP and slot I… |
1.3.6.1.4.1.14179.2.6.3.15 | bsnAPCurrentTxPowerChanged | 0 | 0 | Whenever dynamic algorithms are running and bsnAPIfPhyPowerAutomaticOn is true, Airespace AP Interface's CurrentTxPower might get… |
1.3.6.1.4.1.14179.2.6.3.16 | bsnAPCurrentChannelChanged | 0 | 0 | Whenever dynamic algorithms are running and bsnAPIfPhyChannelAutomaticOn is true, Airespace AP Interface's CurrentChannel might g… |
1.3.6.1.4.1.14179.2.6.3.21 | bsnRrmDot11aGroupingDone | 0 | 0 | When Grouping is done, this notification will be sent from the previous Group Leader where grouping algorithm was run. It has MAC… |
1.3.6.1.4.1.14179.2.6.3.22 | bsnRrmDot11bGroupingDone | 0 | 0 | When Grouping is done, this notification will be sent from the previous Group Leader where grouping algorithm was run. It has MAC… |
1.3.6.1.4.1.14179.2.6.3.23 | bsnConfigSaved | 0 | 0 | When configuration is save either from CLI or web interface This trap will be sent to inform NMS to do refresh |
1.3.6.1.4.1.14179.2.6.3.24 | bsnDot11EssCreated | 0 | 0 | Whenever a new Ess (WLAN) is created, this notification will be sent along with EssIndex |
1.3.6.1.4.1.14179.2.6.3.25 | bsnDot11EssDeleted | 0 | 0 | Whenever a Ess (WLAN)is deleted, this notification will be sent along with EssIndex |
1.3.6.1.4.1.14179.2.6.3.26 | bsnRADIUSServerNotResponding | 0 | 0 | This trap is to indicate that no RADIUS server(s) are responding to authentication requests sent by the RADIUS client within the… |
1.3.6.1.4.1.14179.2.6.3.27 | bsnAuthenticationFailure | 0 | 0 | This trap is to inform that client authentication failure has occured at MWAR(Switch). This could be cli/web user, wlan user, or … |
1.3.6.1.4.1.14179.2.6.3.28 | bsnIpsecEspAuthFailureTrap | 0 | 0 | IPsec packets with invalid hashes were found in an inbound ESP SA. The total number of authentication errors accumulated is sent … |
1.3.6.1.4.1.14179.2.6.3.29 | bsnIpsecEspReplayFailureTrap | 0 | 0 | IPsec packets with invalid sequence numbers were found in an inbound ESP SA. The total number of replay errors accumulated is sen… |
1.3.6.1.4.1.14179.2.6.3.31 | bsnIpsecEspInvalidSpiTrap | 0 | 0 | A packet with an unknown SPI was detected from the specified peer with the specified SPI using the specified protocol. The destin… |
1.3.6.1.4.1.14179.2.6.3.33 | bsnIpsecIkeNegFailure | 0 | 0 | An attempt to negotiate a phase 1 IKE SA failed. The notification counts are also sent as part of the trap, along with the curren… |
1.3.6.1.4.1.14179.2.6.3.34 | bsnIpsecSuiteNegFailure | 0 | 0 | An attempt to negotiate a phase 2 SA suite for the specified selector failed. The current total failure counts are passed as well… |
1.3.6.1.4.1.14179.2.6.3.35 | bsnIpsecInvalidCookieTrap | 0 | 0 | ISAKMP packets with invalid cookies were detected from the specified source, intended for the specified destination. The initiato… |
1.3.6.1.4.1.14179.2.6.3.36 | bsnRogueAPDetected | 0 | 0 | When a Rogue AP is detected this Trap will be sent out along with APMacAddress on which its detected |
1.3.6.1.4.1.14179.2.6.3.37 | bsnAPLoadProfileUpdatedToPass | 0 | 0 | When LOAD Profile state changes from FAIL to PASSt this notification will be sent with Dot3 MAC address of Airespace AP and slot … |
1.3.6.1.4.1.14179.2.6.3.38 | bsnAPNoiseProfileUpdatedToPass | 0 | 0 | When Noise Profile state changes from FAIL tp PASS, notification will be sent with Dot3 MAC address of Airespace AP and slot ID o… |
1.3.6.1.4.1.14179.2.6.3.39 | bsnAPInterferenceProfileUpdatedToPass | 0 | 0 | When Interference Profile state changes from FAIL tp PASS, notification will be sent with Dot3 MAC address of Airespace AP and sl… |
1.3.6.1.4.1.14179.2.6.3.40 | bsnAPCoverageProfileUpdatedToPass | 0 | 0 | When Coverage Profile state changes from FAIL tp PASS, notification will be sent with Dot3 MAC address of Airespace AP and slot I… |
1.3.6.1.4.1.14179.2.6.3.41 | bsnRogueAPRemoved | 0 | 0 | When a Rogue AP that was detected earlier no longer exists this Trap will be sent out along with APMacAddress on which its detect… |
1.3.6.1.4.1.14179.2.6.3.42 | bsnRadiosExceedLicenseCount | 0 | 0 | Whenever the currently associated Radios exceed the License Count This trap will be sent to annoy the Customer |
1.3.6.1.4.1.14179.2.6.3.43 | bsnSensedTemperatureTooHigh | 0 | 0 | Temperature sensor temp too High - temp is too high on the unit. Immediate action should be taken |
1.3.6.1.4.1.14179.2.6.3.44 | bsnSensedTemperatureTooLow | 0 | 0 | Temperature sensor temp too Low - temp is too high on the unit. Immediate action should be taken |
1.3.6.1.4.1.14179.2.6.3.45 | bsnTemperatureSensorFailure | 0 | 0 | Temperature sensor hw failure - temp sensor has failed. Temperature is unknown |
1.3.6.1.4.1.14179.2.6.3.46 | bsnTemperatureSensorClear | 0 | 0 | Temperature sensor clear sensor is operating within proper temp range |
1.3.6.1.4.1.14179.2.6.3.47 | bsnPOEControllerFailure | 0 | 0 | POE Controller has failed. Its a very critical trap. User intervention is required. |
1.3.6.1.4.1.14179.2.6.3.48 | bsnMaxRogueCountExceeded | 0 | 0 | The number of rogues has exceeded the maximum Rogues allowed |
1.3.6.1.4.1.14179.2.6.3.49 | bsnMaxRogueCountClear | 0 | 0 | The number of rogues is within the maximum Rogues allowed |
1.3.6.1.4.1.14179.2.6.3.50 | bsnApMaxRogueCountExceeded | 0 | 0 | The number of rogues has exceeded the maximum Rogues allowed on the AP |
1.3.6.1.4.1.14179.2.6.3.51 | bsnApMaxRogueCountClear | 0 | 0 | The number of rogues is within the maximum Rogues allowed on the AP |
1.3.6.1.4.1.14179.2.6.3.52 | bsnDot11StationBlacklisted | 0 | 0 | The station blacklisted notification shall be sent when the client is blacklisted. The reason could be repeated auth or associat… |
1.3.6.1.4.1.14179.2.6.3.53 | bsnDot11StationAssociate | 0 | 0 | The associate notification shall be sent when any of the watchlisted clients(present on at least one watch list) associates with … |
1.3.6.1.4.1.14179.2.6.3.55 | bsnApBigNavDosAttack | 0 | 0 | The AP sent a string of messages with large NAV field and all 802.11 traffic on that channel was suspended. |
1.3.6.1.4.1.14179.2.6.3.56 | bsnTooManyUnsuccessLoginAttempts | 0 | 0 | The Management User made too many unsuccessful login attempts. |
1.3.6.1.4.1.14179.2.6.3.57 | bsnWepKeyDecryptError | 0 | 0 | Issued when a decrypt error occurrs. The WEP Key configured at the station may be wrong. |
1.3.6.1.4.1.14179.2.6.3.58 | bsnWpaMicErrorCounterActivated | 0 | 0 | Issued when a WPA MIC error occurs and a counter measure is activated at the AP. |
1.3.6.1.4.1.14179.2.6.3.59 | bsnRogueAPDetectedOnWiredNetwork | 0 | 0 | When a Rogue is detected on the wired network this trap will be sent out. The same trap with bsnRogueAPOnWiredNetwork set to no w… |
1.3.6.1.4.1.14179.2.6.3.60 | bsnApHasNoRadioCards | 0 | 0 | When an AP has no radio cards present on it, the switch sends this trap. |
1.3.6.1.4.1.14179.2.6.3.61 | bsnDuplicateIpAddressReported | 0 | 0 | This trap is issued when the switch or an AP detects another machine using its IP Address. The first variable has value yes if th… |
1.3.6.1.4.1.14179.2.6.3.62 | bsnAPContainedAsARogue | 0 | 0 | When our AP detects that it is being contained by another AP, this trap is issued. The clear flag is true if the AP is no longer … |
1.3.6.1.4.1.14179.2.6.3.63 | bsnTrustedApHasInvalidSsid | 0 | 0 | Issued when a Trusted Rogue AP is auto contained for advertising invalid SSID. If the clear variable has value true, then the tra… |
1.3.6.1.4.1.14179.2.6.3.64 | bsnTrustedApIsMissing | 0 | 0 | Issued when a Trusted Rogue AP is missing or has failed. If the clear variable has value true, then the trap clears the earlier a… |
1.3.6.1.4.1.14179.2.6.3.65 | bsnAdhocRogueAutoContained | 0 | 0 | Issued when an Adhoc Rogue is auto contained. If the clear variable has value true, then the trap clears the earlier alert. |
1.3.6.1.4.1.14179.2.6.3.66 | bsnRogueApAutoContained | 0 | 0 | Issued when a Rogue AP is auto contained for advertising our SSID. If the clear variable has value true, then the trap clears th… |
1.3.6.1.4.1.14179.2.6.3.67 | bsnTrustedApHasInvalidEncryption | 0 | 0 | Issued when a Trusted Rogue AP is auto contained for using invalid encryption. The second param is for the encryption used and th… |
1.3.6.1.4.1.14179.2.6.3.68 | bsnTrustedApHasInvalidRadioPolicy | 0 | 0 | Issued when a Trusted Rogue AP is auto contained for using invalid radio policy. The second param is for the radio policy used a… |
1.3.6.1.4.1.14179.2.6.3.69 | bsnNetworkStateChanged | 0 | 0 | When the 802.11a or b/g network state is changed this trap is issued. |
1.3.6.1.4.1.14179.2.6.3.70 | bsnSignatureAttackDetected | 0 | 0 | This trap is sent out when a signature attack is detected by the switch. The standard and custom signatures are predefined on the… |
1.3.6.1.4.1.14179.2.6.3.71 | bsnAPRadioCardTxFailure | 0 | 0 | This trap is sent by the switch when a radio card on an AP stops transmitting. |
1.3.6.1.4.1.14179.2.6.3.73 | bsnAPRadioCardRxFailure | 0 | 0 | This trap is sent by the switch when a radio card on an AP stops receiving. |
1.3.6.1.4.1.14179.2.6.3.74 | bsnAPRadioCardRxFailureClear | 0 | 0 | This trap is sent by the switch when a radio card on an AP starts receiving again after a prior failure. |
1.3.6.1.4.1.14179.2.6.3.75 | bsnAPImpersonationDetected | 0 | 0 | This trap is sent by the switch when a radio of an authenticated AP hears from another AP whose MAC Address neither matches that … |
1.3.6.1.4.1.14179.2.6.3.76 | bsnTrustedApHasInvalidPreamble | 0 | 0 | Issued when a Trusted Rogue AP is auto contained for using invalid preamble. The second param is for the preamble used and the t… |
1.3.6.1.4.1.14179.2.6.3.77 | bsnAPIPAddressFallback | 0 | 0 | This trap is sent out when an AP, with the configured static ip-address, fails to establish connection with outside world and sta… |
1.3.6.1.4.1.14179.2.6.3.78 | bsnAPFunctionalityDisabled | 0 | 0 | This trap is sent out when AP functionality on the switch is disabled because the License key has expired or has been deleted or … |
1.3.6.1.4.1.14179.2.6.3.79 | bsnAPRegulatoryDomainMismatch | 0 | 0 | This trap is generated if an AP's regulatory domain doesn't match the country the switch is configured for. Due to the mismatch,… |
1.3.6.1.4.1.14179.2.6.3.80 | bsnRxMulticastQueueFull | 0 | 0 | This trap indicates that the CPU's Receive Multicast Queue is Full. |
1.3.6.1.4.1.14179.2.6.3.81 | bsnRadarChannelDetected | 0 | 0 | This trap is sent when radar signals are detected on the current channel |
1.3.6.1.4.1.14179.2.6.3.82 | bsnRadarChannelCleared | 0 | 0 | This trap will be generated, if a radar trap has been generated earlier, after the expiry of Non-Occupancy Period. |
1.3.6.1.4.1.14179.2.6.3.83 | bsnAPAuthorizationFailure | 0 | 0 | This trap is sent out in case of authorization failure while attempting to associate the AP to the controller. bsnAPDot3MacAddres… |
1.3.6.1.4.1.14179.2.6.3.84 | radioCoreDumpTrap | 0 | 0 | When radio module in AP dumps core, it informs controller and controller generates this trap. The core file can be retrieved on d… |
1.3.6.1.4.1.14179.2.6.3.85 | invalidRadioTrap | 0 | 0 | This trap will be generated when an AP has joined is using unsupported radio or a radio slot not currently not being used. |
1.3.6.1.4.1.14179.2.6.3.86 | countryChangeTrap | 0 | 0 | This trap will be generated when an operator changes the country of operation. New country code will be sent in trap. |
1.3.6.1.4.1.14179.2.6.3.87 | unsupportedAPTrap | 0 | 0 | This trap will be generated when unsupported AP try to join 40xx/410x or 3500 with 64MB flash. |
1.3.6.1.4.1.14179.2.6.3.88 | heartbeatLossTrap | 0 | 0 | This trap will be generated when controller loses connection with the Supervisor Switch in which it is physically embedded and do… |
1.3.6.1.4.1.14179.2.6.3.89 | locationNotifyTrap | 0 | 0 | This trap will be generated by the location server for notifications of location events. |