Reference record for OID 1.3.6.1.4.1.9.9.512


parent
1.3.6.1.4.1.9.9 (ciscoMgmt)
node code
512
node name
ciscoLwappWlanMIB
dot oid
1.3.6.1.4.1.9.9.512
type
OBJECT IDENTIFIER
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoLwappWlanMIB(512)}
  • {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoLwappWlanMIB(512)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoLwappWlanMIB(512)}
  • {iso(1) org(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoLwappWlanMIB(512)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprise(1) cisco(9) ciscoMgmt(9) ciscoLwappWlanMIB(512)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) private(4) enterprises(1) cisco(9) ciscoMgmt(9) ciscoLwappWlanMIB(512)}
  • iri oid
  • /iso/identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoLwappWlanMIB
  • /iso/identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoLwappWlanMIB
  • /iso/org/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoLwappWlanMIB
  • /iso/org/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoLwappWlanMIB
  • /iso/iso-identified-organization/dod/internet/private/enterprise/cisco/ciscoMgmt/ciscoLwappWlanMIB
  • /iso/iso-identified-organization/dod/internet/private/enterprises/cisco/ciscoMgmt/ciscoLwappWlanMIB
  • iri by oid_info
    /ISO/Identified-Organization/6/1/4/1/9/9/512

    Description by circitor

    This MIB is intended to be implemented on all those
    devices operating as Central Controllers (CC) that
    terminate the Light Weight Access Point Protocol
    tunnel from Cisco Light-weight LWAPP Access Points.

    This MIB helps to manage the WLANs on the controller.

    The relationship between CC and the LWAPP APs
    can be depicted as follows:

    +......+ +......+ +......+ +......+
    + + + + + + + +
    + CC + + CC + + CC + + CC +
    + + + + + + + +
    +......+ +......+ +......+ +......+
    .. . . .
    .. . . .
    . . . . .
    . . . . .
    . . . . .
    . . . . .
    +......+ +......+ +......+ +......+ +......+
    + + + + + + + + + +
    + AP + + AP + + AP + + AP + + AP +
    + + + + + + + + + +
    +......+ +......+ +......+ +......+ +......+
    . . . .
    . . . . .
    . . . . .
    . . . . .
    . . . . .
    +......+ +......+ +......+ +......+ +......+
    + + + + + + + + + +
    + MN + + MN + + MN + + MN + + MN +
    + + + + + + + + + +
    +......+ +......+ +......+ +......+ +......+

    The LWAPP tunnel exists between the controller and
    the APs. The MNs communicate with the APs through
    the protocol defined by the 802.11 standard.

    LWAPP APs, upon bootup, discover and join one of the
    controllers and the controller pushes the configuration,
    that includes the WLAN parameters, to the LWAPP APs.
    The APs then encapsulate all the 802.11 frames from
    wireless clients inside LWAPP frames and forward
    the LWAPP frames to the controller.

    GLOSSARY

    Access Point ( AP )

    An entity that contains an 802.11 medium access
    control ( MAC ) and physical layer ( PHY ) interface
    and provides access to the distribution services via
    the wireless medium for associated clients.

    LWAPP APs encapsulate all the 802.11 frames in
    LWAPP frames and sends it to the controller to which
    it is logically connected to.

    Central Controller ( CC )

    The central entity that terminates the LWAPP protocol
    tunnel from the LWAPP APs. Throughout this MIB,
    this entity also referred to as 'controller'.

    Light Weight Access Point Protocol ( LWAPP )

    This is a generic protocol that defines the
    communication between the Access Points and the
    controllers.

    Mobile Node ( MN )

    A roaming 802.11 wireless device in a wireless
    network associated with an access point.

    Access Control List ( ACL )

    A list of rules used to restrict the traffic reaching
    an interface or the CPU or WLAN. Each ACL is an ordered
    set of rules and actions. If a rule matches then the
    action for that rule is applied to the packet.

    802.1x

    The IEEE ratified standard for enforcing port based
    access control. This was originally intended for
    use on wired LANs and later extended for use in
    802.11 WLAN environments. This defines an
    architecture with three main parts - a supplicant
    (Ex. an 802.11 wireless client), an authenticator
    (the AP) and an authentication server(a Radius
    server). The authenticator passes messages back
    and forth between the supplicant and the
    authentication server to enable the supplicant
    get authenticated to the network.

    Temporal Key Integrity Protocol ( TKIP )

    A security protocol defined to enhance the limitations
    of WEP. Message Integrity Check and per-packet keying
    on all WEP-encrypted frames are two significant
    enhancements provided by TKIP to WEP.


    Cisco Key Integrity Protocol ( CKIP )

    A proprietary implementation similar to TKIP. CKIP
    implements key permutation for protecting the CKIP
    key against attacks. Other features of CKIP include
    expansion of encryption key to 16 bytes of length for
    key protection and MIC to ensure data integrity.


    Wired Equivalent Privacy ( WEP )

    A security method defined by 802.11. WEP uses a
    symmetric key stream cipher called RC4 to encrypt the
    data packets.

    Wi-Fi Protected Access ( WPA )

    Wi-Fi Protected Access (WPA and WPA2) are security
    systems created in response to several serious
    weaknesses found in Wired Equivalent Privacy (WEP).
    WPA implements the majority of the IEEE 802.11i
    standard, and was intended as an intermediate
    measure to take the place of WEP while 802.11i was
    prepared. WPA is designed to work with all wireless
    network interface cards, but not necessarily with
    first generation wireless access points.

    WLAN Layer 2 Security

    WLAN layer 2 (MAC) security defines the encryption and
    authentication approaches such as 802.1x, WPA,
    WPA2, CKIP and WEP.

    REFERENCE

    [1] Wireless LAN Medium Access Control ( MAC ) and
    Physical Layer ( PHY ) Specifications.

    [2] Draft-obara-capwap-lwapp-00.txt, IETF Light
    Weight Access Point Protocol

    [3] IEEE 802.11 - The original 1 Mbit/s and 2 Mbit/s,
    2.4 GHz RF and IR standard.

    Parsed from file CISCO-LWAPP-WLAN-MIB.mib
    Module: CISCO-LWAPP-WLAN-MIB

    Description by mibdepot

    This MIB is intended to be implemented on all those
    devices operating as Central Controllers (CC) that
    terminate the Light Weight Access Point Protocol
    tunnel from Cisco Light-weight LWAPP Access Points.

    This MIB helps to manage the WLANs on the controller.

    The relationship between CC and the LWAPP APs
    can be depicted as follows:

    +......+ +......+ +......+ +......+
    + + + + + + + +
    + CC + + CC + + CC + + CC +
    + + + + + + + +
    +......+ +......+ +......+ +......+
    .. . . .
    .. . . .
    . . . . .
    . . . . .
    . . . . .
    . . . . .
    +......+ +......+ +......+ +......+ +......+
    + + + + + + + + + +
    + AP + + AP + + AP + + AP + + AP +
    + + + + + + + + + +
    +......+ +......+ +......+ +......+ +......+
    . . . .
    . . . . .
    . . . . .
    . . . . .
    . . . . .
    +......+ +......+ +......+ +......+ +......+
    + + + + + + + + + +
    + MN + + MN + + MN + + MN + + MN +
    + + + + + + + + + +
    +......+ +......+ +......+ +......+ +......+

    The LWAPP tunnel exists between the controller and
    the APs. The MNs communicate with the APs through
    the protocol defined by the 802.11 standard.

    LWAPP APs, upon bootup, discover and join one of the
    controllers and the controller pushes the configuration,
    that includes the WLAN parameters, to the LWAPP APs.
    The APs then encapsulate all the 802.11 frames from
    wireless clients inside LWAPP frames and forward
    the LWAPP frames to the controller.

    GLOSSARY

    Access Point ( AP )

    An entity that contains an 802.11 medium access
    control ( MAC ) and physical layer ( PHY ) interface
    and provides access to the distribution services via
    the wireless medium for associated clients.

    LWAPP APs encapsulate all the 802.11 frames in
    LWAPP frames and sends it to the controller to which
    it is logically connected to.

    Central Controller ( CC )

    The central entity that terminates the LWAPP protocol
    tunnel from the LWAPP APs. Throughout this MIB,
    this entity also referred to as 'controller'.

    Light Weight Access Point Protocol ( LWAPP )

    This is a generic protocol that defines the
    communication between the Access Points and the
    controllers.

    Mobile Node ( MN )

    A roaming 802.11 wireless device in a wireless
    network associated with an access point.

    Access Control List ( ACL )

    A list of rules used to restrict the traffic reaching
    an interface or the CPU or WLAN. Each ACL is an ordered
    set of rules and actions. If a rule matches then the
    action for that rule is applied to the packet.

    802.1x

    The IEEE ratified standard for enforcing port based
    access control. This was originally intended for
    use on wired LANs and later extended for use in
    802.11 WLAN environments. This defines an
    architecture with three main parts - a supplicant
    (Ex. an 802.11 wireless client), an authenticator
    (the AP) and an authentication server(a Radius
    server). The authenticator passes messages back
    and forth between the supplicant and the
    authentication server to enable the supplicant
    get authenticated to the network.

    Temporal Key Integrity Protocol ( TKIP )

    A security protocol defined to enhance the limitations
    of WEP. Message Integrity Check and per-packet keying
    on all WEP-encrypted frames are two significant
    enhancements provided by TKIP to WEP.


    Cisco Key Integrity Protocol ( CKIP )

    A proprietary implementation similar to TKIP. CKIP
    implements key permutation for protecting the CKIP
    key against attacks. Other features of CKIP include
    expansion of encryption key to 16 bytes of length for
    key protection and MIC to ensure data integrity.


    Wired Equivalent Privacy ( WEP )

    A security method defined by 802.11. WEP uses a
    symmetric key stream cipher called RC4 to encrypt the
    data packets.

    Wi-Fi Protected Access ( WPA )

    Wi-Fi Protected Access (WPA and WPA2) are security
    systems created in response to several serious
    weaknesses found in Wired Equivalent Privacy (WEP).
    WPA implements the majority of the IEEE 802.11i
    standard, and was intended as an intermediate
    measure to take the place of WEP while 802.11i was
    prepared. WPA is designed to work with all wireless
    network interface cards, but not necessarily with
    first generation wireless access points.

    WLAN Layer 2 Security

    WLAN layer 2 (MAC) security defines the encryption and
    authentication approaches such as 802.1x, WPA,
    WPA2, CKIP and WEP.

    REFERENCE

    [1] Wireless LAN Medium Access Control ( MAC ) and
    Physical Layer ( PHY ) Specifications.

    [2] Draft-obara-capwap-lwapp-00.txt, IETF Light
    Weight Access Point Protocol

    [3] IEEE 802.11 - The original 1 Mbit/s and 2 Mbit/s,
    2.4 GHz RF and IR standard.

    Parsed from file CISCO-LWAPP-WLAN-MIB.my.txt
    Company: None
    Module: CISCO-LWAPP-WLAN-MIB

    Description by cisco

    This MIB is intended to be implemented on all those
    devices operating as Central Controllers (CC) that
    terminate the Light Weight Access Point Protocol
    tunnel from Cisco Light-weight LWAPP Access Points.

    This MIB helps to manage the WLANs on the controller.

    The relationship between CC and the LWAPP APs
    can be depicted as follows:

    +......+ +......+ +......+ +......+
    + + + + + + + +
    + CC + + CC + + CC + + CC +
    + + + + + + + +
    +......+ +......+ +......+ +......+
    .. . . .
    .. . . .
    . . . . .
    . . . . .
    . . . . .
    . . . . .
    +......+ +......+ +......+ +......+ +......+
    + + + + + + + + + +
    + AP + + AP + + AP + + AP + + AP +
    + + + + + + + + + +
    +......+ +......+ +......+ +......+ +......+
    . . . .
    . . . . .
    . . . . .
    . . . . .
    . . . . .
    +......+ +......+ +......+ +......+ +......+
    + + + + + + + + + +
    + MN + + MN + + MN + + MN + + MN +
    + + + + + + + + + +
    +......+ +......+ +......+ +......+ +......+

    The LWAPP tunnel exists between the controller and
    the APs. The MNs communicate with the APs through
    the protocol defined by the 802.11 standard.

    LWAPP APs, upon bootup, discover and join one of the
    controllers and the controller pushes the configuration,
    that includes the WLAN parameters, to the LWAPP APs.
    The APs then encapsulate all the 802.11 frames from
    wireless clients inside LWAPP frames and forward
    the LWAPP frames to the controller.

    GLOSSARY

    Access Point ( AP )

    An entity that contains an 802.11 medium access
    control ( MAC ) and physical layer ( PHY ) interface
    and provides access to the distribution services via
    the wireless medium for associated clients.

    LWAPP APs encapsulate all the 802.11 frames in
    LWAPP frames and sends it to the controller to which
    it is logically connected to.

    Central Controller ( CC )

    The central entity that terminates the LWAPP protocol
    tunnel from the LWAPP APs. Throughout this MIB,
    this entity also referred to as 'controller'.

    Light Weight Access Point Protocol ( LWAPP )

    This is a generic protocol that defines the
    communication between the Access Points and the
    controllers.

    Mobile Node ( MN )

    A roaming 802.11 wireless device in a wireless
    network associated with an access point.

    Access Control List ( ACL )

    A list of rules used to restrict the traffic reaching
    an interface or the CPU or WLAN. Each ACL is an ordered
    set of rules and actions. If a rule matches then the
    action for that rule is applied to the packet.

    802.1x

    The IEEE ratified standard for enforcing port based
    access control. This was originally intended for
    use on wired LANs and later extended for use in
    802.11 WLAN environments. This defines an
    architecture with three main parts - a supplicant
    (Ex. an 802.11 wireless client), an authenticator
    (the AP) and an authentication server(a Radius
    server). The authenticator passes messages back
    and forth between the supplicant and the
    authentication server to enable the supplicant
    get authenticated to the network.

    Temporal Key Integrity Protocol ( TKIP )

    A security protocol defined to enhance the limitations
    of WEP. Message Integrity Check and per-packet keying
    on all WEP-encrypted frames are two significant
    enhancements provided by TKIP to WEP.

    Cisco Key Integrity Protocol ( CKIP )

    A proprietary implementation similar to TKIP. CKIP
    implements key permutation for protecting the CKIP
    key against attacks. Other features of CKIP include
    expansion of encryption key to 16 bytes of length for
    key protection and MIC to ensure data integrity.

    Wired Equivalent Privacy ( WEP )

    A security method defined by 802.11. WEP uses a
    symmetric key stream cipher called RC4 to encrypt the
    data packets.

    Wi-Fi Protected Access ( WPA )

    Wi-Fi Protected Access (WPA and WPA2) are security
    systems created in response to several serious
    weaknesses found in Wired Equivalent Privacy (WEP).
    WPA implements the majority of the IEEE 802.11i
    standard, and was intended as an intermediate
    measure to take the place of WEP while 802.11i was
    prepared. WPA is designed to work with all wireless
    network interface cards, but not necessarily with
    first generation wireless access points.

    WLAN Layer 2 Security

    WLAN layer 2 (MAC) security defines the encryption and
    authentication approaches such as 802.1x, WPA,
    WPA2, CKIP and WEP.

    Delivery Traffic Indication Map ( DTIM )

    DTIM is measured in beacon intervals and is the time
    period during which multicast/broadcast packets are
    sent to clients. This helps client to go in Power Saving
    mode and helps to save battery power.

    Network Admission Control (NAC)

    Cisco NAC uses the network infrastructure to enforce security
    policy compliance on all devices that seek to access network
    computing resources. With the Cisco NAC appliance, network
    administrators can authenticate, authorize, evaluate, and
    remediate wired, wireless, and remote users and their machines
    prior to network access. The Cisco NAC appliance identifies
    whether networked devices such as laptops, IP phones, or game
    consoles are compliant with network security policies, and
    repairs any vulnerabilities before it permits access to the
    network.

    Out of Band (OOB)

    Out-of-band deployments require user traffic to traverse through
    the NAC appliance only within authentication, posture
    assessment, and remediation. When a user is authenticated and
    passes all policy checks, the traffic is switched normally
    through the network and bypasses the NAC server.

    Band Select

    The 2.4 GHz band is congested and clients have to contend with
    numerous performance challenges. These consist of interference
    from Bluetooth, microwave ovens, cordless phones, etc.;
    protection mechanisms from 802.11b legacy clients; and
    co-channel interference from other access points due to
    802.11bg?s limit of three non-overlapping channels. Allowing
    client Wi-Fi radios capable of dual band (2.4 and 5 GHz)
    operation move to the less congested 5 GHz radios would improve
    the overall performance of the network.
    The Band Select algorithm is based on probe response suppression
    on clients 2.4G radio. The feature is OFF by default and has to
    be manually switched ON globally for a WLC. It can be optionally
    over-ridden per-SSID to disallow it.

    Network Access Identifier ( NAI )

    In order to provide roaming services, it is necessary
    to have a standardized method for identifying users.
    NAI is actually the user identity submitted by the client
    during network authentication.

    KTS (Key Telephone System)

    Key Telephone System is an alternative to a
    private branch exchange (PBX)phone system.
    A KTS is equipped with several buttons that allow
    a caller to directly select outgoing lines or
    incoming calls, and use intercom and
    conference facilities.

    HALO (Hyperlocation)

    Hyperlocation is a technique of calculating location using
    Angle of Arrival(AoA) tracks 802.11 OFDM clients
    (meaning 802.11a/g/n/ac clients) that are associated(connected)
    on the network and is able to do so with much higher accuracy
    than conventional Real Time Location Systems(RTLS) that rely
    on only RSSI (RF Signal Strength).

    PakRSSI (Packet Received Signal Strength Indicator)

    PakRSSI is a measurement of the power present in a received radio signal.

    POE (Power Over Ethernet)

    Power over Ethernet or PoE describes any of several standardized
    or ad-hoc systems which pass electrical power along with data on
    Ethernet cabling. This allows a single cable to provide both data
    connection and electrical power to devices such as wireless
    access points or IP cameras.
    REFERENCE

    [1] Wireless LAN Medium Access Control ( MAC ) and
    Physical Layer ( PHY ) Specifications.

    [2] Draft-obara-capwap-lwapp-00.txt, IETF Light
    Weight Access Point Protocol

    [3] IEEE 802.11 - The original 1 Mbit/s and 2 Mbit/s,
    2.4 GHz RF and IR standard.

    Information by circitor

    ciscoLwappWlanMIB MODULE-IDENTITY LAST-UPDATED "2007020300Z" ORGANIZATION "Cisco Systems Inc." CONTACT-INFO "Cisco Systems, Customer Service Postal: 170 West Tasman Drive San Jose, CA 95134 USA Tel: +1 800 553-NETS Email: [email protected]" DESCRIPTION "This MIB is intended to be implemented on all those devices operating as Central Controllers (CC) that terminate the Light Weight Access Point Protocol tunnel from Cisco Light-weight LWAPP Access Points. This MIB helps to manage the WLANs on the controller. The relationship between CC and the LWAPP APs can be depicted as follows: +......+ +......+ +......+ +......+ + + + + + + + + + CC + + CC + + CC + + CC + + + + + + + + + +......+ +......+ +......+ +......+ .. . . . .. . . . . . . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ +......+ + + + + + + + + + + + AP + + AP + + AP + + AP + + AP + + + + + + + + + + + +......+ +......+ +......+ +......+ +......+ . . . . . . . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ +......+ + + + + + + + + + + + MN + + MN + + MN + + MN + + MN + + + + + + + + + + + +......+ +......+ +......+ +......+ +......+ The LWAPP tunnel exists between the controller and the APs. The MNs communicate with the APs through the protocol defined by the 802.11 standard. LWAPP APs, upon bootup, discover and join one of the controllers and the controller pushes the configuration, that includes the WLAN parameters, to the LWAPP APs. The APs then encapsulate all the 802.11 frames from wireless clients inside LWAPP frames and forward the LWAPP frames to the controller. GLOSSARY Access Point ( AP ) An entity that contains an 802.11 medium access control ( MAC ) and physical layer ( PHY ) interface and provides access to the distribution services via the wireless medium for associated clients. LWAPP APs encapsulate all the 802.11 frames in LWAPP frames and sends it to the controller to which it is logically connected to. Central Controller ( CC ) The central entity that terminates the LWAPP protocol tunnel from the LWAPP APs. Throughout this MIB, this entity also referred to as 'controller'. Light Weight Access Point Protocol ( LWAPP ) This is a generic protocol that defines the communication between the Access Points and the controllers. Mobile Node ( MN ) A roaming 802.11 wireless device in a wireless network associated with an access point. Access Control List ( ACL ) A list of rules used to restrict the traffic reaching an interface or the CPU or WLAN. Each ACL is an ordered set of rules and actions. If a rule matches then the action for that rule is applied to the packet. 802.1x The IEEE ratified standard for enforcing port based access control. This was originally intended for use on wired LANs and later extended for use in 802.11 WLAN environments. This defines an architecture with three main parts - a supplicant (Ex. an 802.11 wireless client), an authenticator (the AP) and an authentication server(a Radius server). The authenticator passes messages back and forth between the supplicant and the authentication server to enable the supplicant get authenticated to the network. Temporal Key Integrity Protocol ( TKIP ) A security protocol defined to enhance the limitations of WEP. Message Integrity Check and per-packet keying on all WEP-encrypted frames are two significant enhancements provided by TKIP to WEP. Cisco Key Integrity Protocol ( CKIP ) A proprietary implementation similar to TKIP. CKIP implements key permutation for protecting the CKIP key against attacks. Other features of CKIP include expansion of encryption key to 16 bytes of length for key protection and MIC to ensure data integrity. Wired Equivalent Privacy ( WEP ) A security method defined by 802.11. WEP uses a symmetric key stream cipher called RC4 to encrypt the data packets. Wi-Fi Protected Access ( WPA ) Wi-Fi Protected Access (WPA and WPA2) are security systems created in response to several serious weaknesses found in Wired Equivalent Privacy (WEP). WPA implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. WPA is designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points. WLAN Layer 2 Security WLAN layer 2 (MAC) security defines the encryption and authentication approaches such as 802.1x, WPA, WPA2, CKIP and WEP. REFERENCE [1] Wireless LAN Medium Access Control ( MAC ) and Physical Layer ( PHY ) Specifications. [2] Draft-obara-capwap-lwapp-00.txt, IETF Light Weight Access Point Protocol [3] IEEE 802.11 - The original 1 Mbit/s and 2 Mbit/s, 2.4 GHz RF and IR standard." REVISION "200702030000Z" DESCRIPTION "Added following objects in cLWlanConfigTable: cLWlanProfileName cLWlanSsid cLWlanDiagChan cLWlanStorageType Added following table: cLWlanConfigClientTable Added the following OBJECT-GROUPs: ciscoLwappWlanConfigGroupSup1 ciscoLwappWlanConfigClientGroup Added ciscoLwappWlanMIBComplianceRev1 MODULE-COMPLIANCE." REVISION "200603210000Z" DESCRIPTION "Initial version of this MIB module." ::= { ciscoMgmt 512 }

    Information by cisco_v1

    ciscoLwappWlanMIB OBJECT IDENTIFIER ::= { ciscoMgmt 512 }

    Information by oid_info

    Vendor: Cisco
    Module: CISCO-LWAPP-WLAN-MIB

    [Automatically extracted from oidview.com]

    Information by mibdepot

    ciscoLwappWlanMIB MODULE-IDENTITY LAST-UPDATED "2007020300Z" ORGANIZATION "Cisco Systems Inc." CONTACT-INFO "Cisco Systems, Customer Service Postal: 170 West Tasman Drive San Jose, CA 95134 USA Tel: +1 800 553-NETS Email: [email protected]" DESCRIPTION "This MIB is intended to be implemented on all those devices operating as Central Controllers (CC) that terminate the Light Weight Access Point Protocol tunnel from Cisco Light-weight LWAPP Access Points. This MIB helps to manage the WLANs on the controller. The relationship between CC and the LWAPP APs can be depicted as follows: +......+ +......+ +......+ +......+ + + + + + + + + + CC + + CC + + CC + + CC + + + + + + + + + +......+ +......+ +......+ +......+ .. . . . .. . . . . . . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ +......+ + + + + + + + + + + + AP + + AP + + AP + + AP + + AP + + + + + + + + + + + +......+ +......+ +......+ +......+ +......+ . . . . . . . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ +......+ + + + + + + + + + + + MN + + MN + + MN + + MN + + MN + + + + + + + + + + + +......+ +......+ +......+ +......+ +......+ The LWAPP tunnel exists between the controller and the APs. The MNs communicate with the APs through the protocol defined by the 802.11 standard. LWAPP APs, upon bootup, discover and join one of the controllers and the controller pushes the configuration, that includes the WLAN parameters, to the LWAPP APs. The APs then encapsulate all the 802.11 frames from wireless clients inside LWAPP frames and forward the LWAPP frames to the controller. GLOSSARY Access Point ( AP ) An entity that contains an 802.11 medium access control ( MAC ) and physical layer ( PHY ) interface and provides access to the distribution services via the wireless medium for associated clients. LWAPP APs encapsulate all the 802.11 frames in LWAPP frames and sends it to the controller to which it is logically connected to. Central Controller ( CC ) The central entity that terminates the LWAPP protocol tunnel from the LWAPP APs. Throughout this MIB, this entity also referred to as 'controller'. Light Weight Access Point Protocol ( LWAPP ) This is a generic protocol that defines the communication between the Access Points and the controllers. Mobile Node ( MN ) A roaming 802.11 wireless device in a wireless network associated with an access point. Access Control List ( ACL ) A list of rules used to restrict the traffic reaching an interface or the CPU or WLAN. Each ACL is an ordered set of rules and actions. If a rule matches then the action for that rule is applied to the packet. 802.1x The IEEE ratified standard for enforcing port based access control. This was originally intended for use on wired LANs and later extended for use in 802.11 WLAN environments. This defines an architecture with three main parts - a supplicant (Ex. an 802.11 wireless client), an authenticator (the AP) and an authentication server(a Radius server). The authenticator passes messages back and forth between the supplicant and the authentication server to enable the supplicant get authenticated to the network. Temporal Key Integrity Protocol ( TKIP ) A security protocol defined to enhance the limitations of WEP. Message Integrity Check and per-packet keying on all WEP-encrypted frames are two significant enhancements provided by TKIP to WEP. Cisco Key Integrity Protocol ( CKIP ) A proprietary implementation similar to TKIP. CKIP implements key permutation for protecting the CKIP key against attacks. Other features of CKIP include expansion of encryption key to 16 bytes of length for key protection and MIC to ensure data integrity. Wired Equivalent Privacy ( WEP ) A security method defined by 802.11. WEP uses a symmetric key stream cipher called RC4 to encrypt the data packets. Wi-Fi Protected Access ( WPA ) Wi-Fi Protected Access (WPA and WPA2) are security systems created in response to several serious weaknesses found in Wired Equivalent Privacy (WEP). WPA implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. WPA is designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points. WLAN Layer 2 Security WLAN layer 2 (MAC) security defines the encryption and authentication approaches such as 802.1x, WPA, WPA2, CKIP and WEP. REFERENCE [1] Wireless LAN Medium Access Control ( MAC ) and Physical Layer ( PHY ) Specifications. [2] Draft-obara-capwap-lwapp-00.txt, IETF Light Weight Access Point Protocol [3] IEEE 802.11 - The original 1 Mbit/s and 2 Mbit/s, 2.4 GHz RF and IR standard." REVISION "200702030000Z" DESCRIPTION "Added following objects in cLWlanConfigTable: cLWlanProfileName cLWlanSsid cLWlanDiagChan cLWlanStorageType Added following table: cLWlanConfigClientTable Added the following OBJECT-GROUPs: ciscoLwappWlanConfigGroupSup1 ciscoLwappWlanConfigClientGroup Added ciscoLwappWlanMIBComplianceRev1 MODULE-COMPLIANCE." REVISION "200603210000Z" DESCRIPTION "Initial version of this MIB module." ::= { ciscoMgmt 512 }

    Information by cisco

    ciscoLwappWlanMIB MODULE-IDENTITY LAST-UPDATED "201504230000Z" ORGANIZATION "Cisco Systems Inc." CONTACT-INFO "Cisco Systems, Customer Service Postal: 170 West Tasman Drive San Jose, CA 95134 USA Tel: +1 800 553-NETS Email: [email protected]" DESCRIPTION "This MIB is intended to be implemented on all those devices operating as Central Controllers (CC) that terminate the Light Weight Access Point Protocol tunnel from Cisco Light-weight LWAPP Access Points. This MIB helps to manage the WLANs on the controller. The relationship between CC and the LWAPP APs can be depicted as follows: +......+ +......+ +......+ +......+ + + + + + + + + + CC + + CC + + CC + + CC + + + + + + + + + +......+ +......+ +......+ +......+ .. . . . .. . . . . . . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ +......+ + + + + + + + + + + + AP + + AP + + AP + + AP + + AP + + + + + + + + + + + +......+ +......+ +......+ +......+ +......+ . . . . . . . . . . . . . . . . . . . . . . . . +......+ +......+ +......+ +......+ +......+ + + + + + + + + + + + MN + + MN + + MN + + MN + + MN + + + + + + + + + + + +......+ +......+ +......+ +......+ +......+ The LWAPP tunnel exists between the controller and the APs. The MNs communicate with the APs through the protocol defined by the 802.11 standard. LWAPP APs, upon bootup, discover and join one of the controllers and the controller pushes the configuration, that includes the WLAN parameters, to the LWAPP APs. The APs then encapsulate all the 802.11 frames from wireless clients inside LWAPP frames and forward the LWAPP frames to the controller. GLOSSARY Access Point ( AP ) An entity that contains an 802.11 medium access control ( MAC ) and physical layer ( PHY ) interface and provides access to the distribution services via the wireless medium for associated clients. LWAPP APs encapsulate all the 802.11 frames in LWAPP frames and sends it to the controller to which it is logically connected to. Central Controller ( CC ) The central entity that terminates the LWAPP protocol tunnel from the LWAPP APs. Throughout this MIB, this entity also referred to as 'controller'. Light Weight Access Point Protocol ( LWAPP ) This is a generic protocol that defines the communication between the Access Points and the controllers. Mobile Node ( MN ) A roaming 802.11 wireless device in a wireless network associated with an access point. Access Control List ( ACL ) A list of rules used to restrict the traffic reaching an interface or the CPU or WLAN. Each ACL is an ordered set of rules and actions. If a rule matches then the action for that rule is applied to the packet. 802.1x The IEEE ratified standard for enforcing port based access control. This was originally intended for use on wired LANs and later extended for use in 802.11 WLAN environments. This defines an architecture with three main parts - a supplicant (Ex. an 802.11 wireless client), an authenticator (the AP) and an authentication server(a Radius server). The authenticator passes messages back and forth between the supplicant and the authentication server to enable the supplicant get authenticated to the network. Temporal Key Integrity Protocol ( TKIP ) A security protocol defined to enhance the limitations of WEP. Message Integrity Check and per-packet keying on all WEP-encrypted frames are two significant enhancements provided by TKIP to WEP. Cisco Key Integrity Protocol ( CKIP ) A proprietary implementation similar to TKIP. CKIP implements key permutation for protecting the CKIP key against attacks. Other features of CKIP include expansion of encryption key to 16 bytes of length for key protection and MIC to ensure data integrity. Wired Equivalent Privacy ( WEP ) A security method defined by 802.11. WEP uses a symmetric key stream cipher called RC4 to encrypt the data packets. Wi-Fi Protected Access ( WPA ) Wi-Fi Protected Access (WPA and WPA2) are security systems created in response to several serious weaknesses found in Wired Equivalent Privacy (WEP). WPA implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. WPA is designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points. WLAN Layer 2 Security WLAN layer 2 (MAC) security defines the encryption and authentication approaches such as 802.1x, WPA, WPA2, CKIP and WEP. Delivery Traffic Indication Map ( DTIM ) DTIM is measured in beacon intervals and is the time period during which multicast/broadcast packets are sent to clients. This helps client to go in Power Saving mode and helps to save battery power. Network Admission Control (NAC) Cisco NAC uses the network infrastructure to enforce security policy compliance on all devices that seek to access network computing resources. With the Cisco NAC appliance, network administrators can authenticate, authorize, evaluate, and remediate wired, wireless, and remote users and their machines prior to network access. The Cisco NAC appliance identifies whether networked devices such as laptops, IP phones, or game consoles are compliant with network security policies, and repairs any vulnerabilities before it permits access to the network. Out of Band (OOB) Out-of-band deployments require user traffic to traverse through the NAC appliance only within authentication, posture assessment, and remediation. When a user is authenticated and passes all policy checks, the traffic is switched normally through the network and bypasses the NAC server. Band Select The 2.4 GHz band is congested and clients have to contend with numerous performance challenges. These consist of interference from Bluetooth, microwave ovens, cordless phones, etc.; protection mechanisms from 802.11b legacy clients; and co-channel interference from other access points due to 802.11bg?s limit of three non-overlapping channels. Allowing client Wi-Fi radios capable of dual band (2.4 and 5 GHz) operation move to the less congested 5 GHz radios would improve the overall performance of the network. The Band Select algorithm is based on probe response suppression on clients 2.4G radio. The feature is OFF by default and has to be manually switched ON globally for a WLC. It can be optionally over-ridden per-SSID to disallow it. Network Access Identifier ( NAI ) In order to provide roaming services, it is necessary to have a standardized method for identifying users. NAI is actually the user identity submitted by the client during network authentication. KTS (Key Telephone System) Key Telephone System is an alternative to a private branch exchange (PBX)phone system. A KTS is equipped with several buttons that allow a caller to directly select outgoing lines or incoming calls, and use intercom and conference facilities. HALO (Hyperlocation) Hyperlocation is a technique of calculating location using Angle of Arrival(AoA) tracks 802.11 OFDM clients (meaning 802.11a/g/n/ac clients) that are associated(connected) on the network and is able to do so with much higher accuracy than conventional Real Time Location Systems(RTLS) that rely on only RSSI (RF Signal Strength). PakRSSI (Packet Received Signal Strength Indicator) PakRSSI is a measurement of the power present in a received radio signal. POE (Power Over Ethernet) Power over Ethernet or PoE describes any of several standardized or ad-hoc systems which pass electrical power along with data on Ethernet cabling. This allows a single cable to provide both data connection and electrical power to devices such as wireless access points or IP cameras. REFERENCE [1] Wireless LAN Medium Access Control ( MAC ) and Physical Layer ( PHY ) Specifications. [2] Draft-obara-capwap-lwapp-00.txt, IETF Light Weight Access Point Protocol [3] IEEE 802.11 - The original 1 Mbit/s and 2 Mbit/s, 2.4 GHz RF and IR standard." REVISION "201604070000Z" DESCRIPTION "Added new tables ciscoLwappAPGroupsHyperlocationConfig to support Hyperlocation feature and ciscoLwappAPGroupsPortConfig to support AP Group LAN port configurations. Added new groups ciscoLwappWlanConfigGroupSup8, ciscoLwappWlanConfigGroupSup9. Added new compliance ciscoLwappWlanMIBComplianceRev8 which deprecates ciscoLwappWlanMIBComplianceRev7." REVISION "201504230000Z" DESCRIPTION "Added Default value to the cLWlanMulticastInterface object." REVISION "201504170000Z" DESCRIPTION "Added cLWlan11acMuMimoEnabled object to cLWlanConfigEntry. ciscoLwappWlanMIBComplianceRev6 is superceded by ciscoLwappWlanMIBComplianceRev7 Added new group ciscoLwappWlanConfigGroupSup6." REVISION "201411050000Z" DESCRIPTION "Added the cLWlanSelfAnchorEnabled to support the mobility self anchor. cLAPGroupsVlanMappingInterfaceName is superceded by cLAPGroupsVlanMappingInterfaceNameRev1. ciscoLwappAPGroupsVlanConfigGroup is superceded by ciscoLwappAPGroupsVlanConfigGroupSup2. ciscoLwappWlanMIBComplianceRev5 is superceded by ciscoLwappWlanMIBComplianceRev6 Added cLWlanUniversalAdmin object to cLWlanConfigEntry. Added new group ciscoLwappWlanConfigGroupSup5." REVISION "201303300000Z" DESCRIPTION "Added cLWlanFlexibleNetflowTable to support AVC feature. Added new object group CiscoLwappWlanConfigFlexibleNetflowGroup. Added new compliance ciscoLwappWlanMIBComplianceRev5 which deprecates ciscoLwappWlanMIBComplianceRev4." REVISION "201206210000Z" DESCRIPTION "Added the following objects WLAN QoS Config table, AP group Venue Table, ciscoLwappWlanQosConfigGroup ciscoLwappWlanConfigGroupSup4 ciscoLwappWlan11uConfigGroupsup2 ciscoLwappWlanHotSpot2ConfigGroupSup1 ciscoLwappAPGroupsVlanConfigGroupSup1 cLAPGroupsVenueConfigGroup cLAPGroupsMultipleVenueGroup ciscoLwappWlanConfigClientGroupSup2 WLAN IOS objects. - Added the following objects to cLWlan11uTable. cLWlan11uHessid, cLWlan11uNetworkAuthType, cLWlan11uOui, cLWlan11uOuiIsBeacon, cWlan11uOuiRowStatus, cLWlan11uOuiStorageType, cLWlan11uRealmName, cLWlan11uRealmRowStatus, cLWlan11uRealmEapMethod, cLWlan11uRealmEapRowStatus, cLWlan11uRealmEapAuthMethod, cLWlan11uRealmEapAuthParam, cLWlan11uRealmEapAuthRowStatus, cLWlan11uDomainName, cLWlan11uDomainRowStatus, cLWlan11u3gppCountryCode, cLWlan11u3gppNetworkCode, cLWlan11u3gppRowStatus, cLWlan11uIpAddressAvailIpv4, cLWlan11uIpAddressAvailIpv6 - Added the following OBJECT-GROUPs: ciscoLwappWlan11uConfigGroupsup1 ciscoLwappWlanServiceAdvertisementConfigGroup, ciscoLwappWlanHotSpot2ConfigGroup - Added new compliance ciscoLwappWlanMIBComplianceRev4 which deprecates ciscoLwappWlanMIBComplianceRev3." REVISION "201103100000Z" DESCRIPTION "Added the following objects to cLWlanConfigTable. cLWlanReAnchorRoamedVoiceClientsEnable, cLWlanMulticastInterfaceEnable, cLWlanMulticastInterface, cLWlanMulticastDirectEnable, cLWlanNACPostureSupport, cLWlanMaxClientsAccepted, cLWlanScanDeferPriority, cLWlanScanDeferTime, cLWlanLanSubType, cLWlanWebAuthOnMacFilterFailureEnabled, cLWlanStaticIpTunnelingEnabled. - Added new group ciscoLwappWlanConfigGroupSup3. - Added new compliance ciscoLwappWlanMIBComplianceRev3 which deprecates ciscoLwappWlanMIBComplianceRev2." REVISION "201003030000Z" DESCRIPTION "Added the following OBJECT-GROUPs: ciscoLwappWlan11uConfigGroup ciscoLwappAPGroupsVlanConfigGroup ciscoLwappWlanConfigGroupSup2 ciscoLwappWlanConfigClientGroupSup1" REVISION "200704020000Z" DESCRIPTION "Added following object in cLWlanConfigClientTable cLWlanP2PBlocking" REVISION "200702030000Z" DESCRIPTION "Added following objects in cLWlanConfigTable: cLWlanProfileName cLWlanSsid cLWlanDiagChan cLWlanStorageType Added following table: cLWlanConfigClientTable Added the following OBJECT-GROUPs: ciscoLwappWlanConfigGroupSup1 ciscoLwappWlanConfigClientGroup Added ciscoLwappWlanMIBComplianceRev1 MODULE-COMPLIANCE." REVISION "200603210000Z" DESCRIPTION "Initial version of this MIB module." ::= { ciscoMgmt 512 }

    First Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Greg Satz

    Current Registration Authority (recovered by parent 1.3.6.1.4.1.9)

    Cisco Systems, Inc.

    Children (3)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.4.1.9.9.512.0 ciscoLwappWlanMIBNotifs 0 0 None
    1.3.6.1.4.1.9.9.512.1 ciscoLwappWlanMIBObjects 7 209 None
    1.3.6.1.4.1.9.9.512.2 ciscoLwappWlanMIBConform 2 37 None

    Brothers (645)

    To many brothers! Only 100 nearest brothers are shown.

    OIDNameSub childrenSub Nodes TotalDescription
    ...
    1.3.6.1.4.1.9.9.463 ciscoSanTapMIB 3 30 MIB module to provide information about the SanTap
    service configuration.

    SanTap is a fibre channel switch based capability that
    p…
    1.3.6.1.4.1.9.9.466 ciscoEthernetAccessMIB 2 20 The tables defined by this MIB module contain a collection
    of managed objects that are general in nature and apply to
    an edge dev…
    1.3.6.1.4.1.9.9.467 ciscoCryptoAcceleratorMIB 3 107 The MIB module for monitoring the identity, status,
    activity and faults of crypto accelerator (CA) modules
    used in devices implem…
    1.3.6.1.4.1.9.9.468 ciscoContextMappingMIB 2 35 A single SNMP agent sometimes needs to support multiple
    instances of the same MIB module, and does so through the
    use of multiple…
    1.3.6.1.4.1.9.9.470 ciscoEnhancedSlbMIB 3 106 The MIB for managing Server Load Balancing
    Manager(s), and products supporting Server
    Load Balancing(SLB) features.

    This MIB exten…
    1.3.6.1.4.1.9.9.471 ciscoFlexLinksMIB 3 36 This MIB module is for configuration and status query
    of Flex Links feature on the Cisco device.

    Flex Links are a pair of Layer 2…
    1.3.6.1.4.1.9.9.472 ciscoModuleVirtualizationMIB 3 35 This MIB provides a way to create virtual contexts,
    and managing them. A virtual context is logical
    partition of a physical devi…
    1.3.6.1.4.1.9.9.473 ciscoCcaMIB 3 200 The Cisco Contact Center Applications (CCCA) Management
    Information Base (MIB) module defines management
    instrumentation for appl…
    1.3.6.1.4.1.9.9.474 ciscoFilterGroupMIB 3 55 The MIB module is for creating and configuring
    object groups to support packet filtering and
    access control on IP and other proto…
    1.3.6.1.4.1.9.9.479 ciscoCableWidebandMIB 3 77 This is the MIB module for the support of Channel Bonding
    Protocol for the Cable Modem Termination System (CMTS).

    Wideband DOCSIS…
    1.3.6.1.4.1.9.9.480 ciscoL4L7moduleResourceLimitMIB 4 100 The MIB module for managing resource classes
    and configuring limits(max/min) to different
    resources. The resource referenced in …
    1.3.6.1.4.1.9.9.482 ciscoInterfaceTopNExtMIB 3 16 This MIB module is an extension to INTERFACETOPN-MIB.
    It provides additional management information for
    sorting device interfaces.
    1.3.6.1.4.1.9.9.483 ciscoIpRanBackHaulMIB 3 248 This MIB provides information on the IP-RAN traffic
    from cell site to aggregation site in the following
    situations. In an GSM en…
    1.3.6.1.4.1.9.9.484 ciscoNacNadMIB 3 157 This MIB module is for the configuration of a Network
    Access Device (NAD) on the Cisco Network Admission
    Control (NAC) system.

    End…
    1.3.6.1.4.1.9.9.485 ciscoRttMonTCMIB 0 0 This MIB contains textual conventions used by
    CISCO-RTTMON-MIB, CISCO-RTTMON-RTP-MIB and
    CISCO-RTTMON-ICMP-MIB, but they are not …
    1.3.6.1.4.1.9.9.486 ciscoRttMonIcmpMIB 3 7 An extension to the CISCO-RTTMON-MIB for ICMP
    operations. The ICMP Jitter operation provides capability
    to measure metrics such a…
    1.3.6.1.4.1.9.9.487 ciscoRttMonRtpMIB 3 8 An extension to the CISCO-RTTMON-MIB for Cisco IP SLA
    RTP operation, Real-Time Transport Protocol(RFC 1889). This
    operation provi…
    1.3.6.1.4.1.9.9.488 ciscoFirewallTc 0 0 This MIB module defines textual conventions that
    are commonly used in modeling management information
    pertaining to configuration…
    1.3.6.1.4.1.9.9.490 ciscoNetintMIB 3 11 This MIB module is for Network Interrupt information
    on Cisco device.
    1.3.6.1.4.1.9.9.491 ciscoUnifiedFirewallMIB 3 235 Overview of Cisco Firewall MIB
    ==============================
    This MIB Module models status and performance
    statistics pertaining …
    1.3.6.1.4.1.9.9.492 ciscoCefMIB 3 192 Cisco Express Forwarding (CEF) describes a high speed
    switching mechanism that a router uses to forward packets
    from the inbound …
    1.3.6.1.4.1.9.9.493 ciscoCefTextualConventions 0 0 ciscoCeftextualConventions
    1.3.6.1.4.1.9.9.494 ciscoEntityRedunTcMIB 0 0 This module defines the textual conventions used within
    Cisco Entity Redundancy MIBs.
    1.3.6.1.4.1.9.9.495 ciscoPsdClientMIB 3 44 This MIB module manages the client side
    functionality of the Persistent Storage Device(PSD).

    This MIB instrumentation is for conf…
    1.3.6.1.4.1.9.9.497 cGgsnSAMIB 3 247 This MIB module manages the service-aware feature of
    Gateway GPRS Support Node (GGSN).

    This MIB is an enhancement of the CISCO-GG…
    1.3.6.1.4.1.9.9.498 ciscoEntityRedunMIB 3 93 This management information module supports
    configuration, control and monitoring of redundancy
    protection for various kinds of c…
    1.3.6.1.4.1.9.9.500 ciscoStackWiseMIB 3 111 This MIB module contain a collection of managed objects
    that apply to network devices supporting the Cisco
    StackWise(TM) technolo…
    1.3.6.1.4.1.9.9.504 ciscoSwitchMulticastMIB 3 108 This MIB module defines management objects for the
    Multicast Switching features on Cisco Layer 2/3
    devices.

    Definition of some of …
    1.3.6.1.4.1.9.9.505 cpkiMIB 3 44 A networking device may provide several security services
    and protocols like SSL, SSH, IPSec/IKE etc. which need
    identities …
    1.3.6.1.4.1.9.9.507 ciscoPolicyGroupMIB 3 35 The MIB module is for configuration of policy and
    policy group. A policy group can be described as a set
    of entities identified b…
    1.3.6.1.4.1.9.9.508 ciscoSlbHealthMonMIB 3 62 An extension to the CISCO-SLB-EXT-MIB for SLB
    health monitoring probes.

    SLB: Server Load Balancing. Server load balancing
    provides…
    1.3.6.1.4.1.9.9.509 ciscoWdsInfoMIB 3 141 This MIB is intended to be implemented on all Cisco
    network entities that provide Wireless Domain Services
    (WDS). The WDS provide…
    1.3.6.1.4.1.9.9.510 ciscoErmMIB, ciscoVoiceLmrMIB 3 176 This MIB module provides management of voice tone
    signal as static injected tone for Land Mobile Radio
    The tone signal includes …
    1.3.6.1.4.1.9.9.511 ciscoCbpTargetTCMIB 0 0 This MIB module defines Textual Conventions for
    representing targets which have class based policy
    mappings. A target can be any …
    1.3.6.1.4.1.9.9.513 ciscoLwappApMIB 4 386 This MIB is intended to be implemented on all those
    devices operating as Central Controllers (CC) that
    terminate the Light Weight…
    1.3.6.1.4.1.9.9.514 ciscoLwappTextualConventions 0 0 This module defines textual conventions used
    throughout the Cisco enterprise MIBs
    designed for implementation on Central
    Controlle…
    1.3.6.1.4.1.9.9.515 ciscoLwappWebAuthMIB 4 43 This MIB is intended to be implemented on all those
    devices operating as Central controllers, that
    terminate the Light Weight Acc…
    1.3.6.1.4.1.9.9.516 ciscoLwappLinkTestMIB 3 57 This MIB is intended to be implemented on all those
    devices operating as Central controllers, that
    terminate the Light Weight Acc…
    1.3.6.1.4.1.9.9.517 ciscoLwappReapMIB 3 63 This MIB is intended to be implemented on all those
    devices operating as Central Controllers (CC) that
    terminate the Light Weight…
    1.3.6.1.4.1.9.9.518 ciscoLwappMfpMIB 4 64 This MIB is intended to be implemented on all those
    devices operating as Central Controllers (CC) that
    terminate the Light Weight…
    1.3.6.1.4.1.9.9.519 ciscoLwappIdsMIB 3 28 This MIB is intended to be implemented on all those
    devices operating as Central Controllers (CC) that
    terminate the Light Weight…
    1.3.6.1.4.1.9.9.520 ciscoLwappCcxRmMIB 3 45 This MIB is intended to be implemented on all those
    devices operating as Central controllers, that
    terminate the Light Weight Acc…
    1.3.6.1.4.1.9.9.521 ciscoLwappWlanSecurityMIB 3 51 This MIB is intended to be implemented on all those
    devices operating as Central controllers, that
    terminate the Light Weight Acc…
    1.3.6.1.4.1.9.9.522 ciscoLwappDot11ClientCalibMIB 3 50 This MIB is intended to be implemented on all those
    devices operating as Central controllers, that
    terminate the Light Weight Acc…
    1.3.6.1.4.1.9.9.523 ciscoLwappClRoamMIB 3 61 This MIB is intended to be implemented on all those
    devices operating as Central controllers, that
    terminate the Light Weight Acc…
    1.3.6.1.4.1.9.9.524 ciscoLwappQosMIB 3 119 This MIB is intended to be implemented on all those
    devices operating as Central controllers, that
    terminate the Light Weight Acc…
    1.3.6.1.4.1.9.9.525 ciscoLwappTsmMIB 3 57 This MIB is intended to be implemented on all those
    devices operating as Central controllers, that
    terminate the Light Weight Acc…
    1.3.6.1.4.1.9.9.529 ciscoItpMsuRatesMIB 3 61 This MIB provides information used to manage the number
    of MTP3 MSUs transmitted and received per processor. Many
    of the higher …
    1.3.6.1.4.1.9.9.530 ciscoNacTcMIB 0 0 This module defines the textual conventions for
    Cisco Network Admission Control(NAC) system.

    The Cisco Network Admission Control …
    1.3.6.1.4.1.9.9.532 ciscoNATExtMIB 3 13 This MIB is an extension to the NAT-MIB.
    This MIB module includes objects for
    providing the NAT related statistics.

    Acronyms:

    NAT…
    1.3.6.1.4.1.9.9.533 ciscoCbpTargetMIB 3 25 This MIB module defines the managed objects for
    representing targets which have class-based policy
    mappings. A target can be any…
    1.3.6.1.4.1.9.9.543 ciscoLicenseMgmtMIB 3 131 The MIB module for managing licenses on the system.
    The licensing mechanism provides flexibility to
    enforce licensing for various…
    1.3.6.1.4.1.9.9.548 ciscoErrDisableMIB 3 43 This MIB module provides the ability for a Network
    Management Station (NMS) to configure and monitor the
    error-disable feature vi…
    ...