146
C
HAPTER
7: C
ONFIGURING
SNMP
DAPConnectWarningTraps
—generated when a Distributed MAP
whose fingerprint has not been configured in MSS establishes a
management session with the switch.
DeviceFailTraps—
Generated when an event with an Alert severity
occurs.
DeviceOkayTraps—
Generated when a device returns to its normal
state.
LinkDownTraps—
Generated when the link is lost on a port.
LinkUpTraps—
Generated when the link is detected on a port.
MichaelMICFailureTraps—
Generated when two Michael message
integrity code (MIC) failures occur within 60 seconds, triggering Wi-Fi
Protected Access (WPA) countermeasures.
MobilityDomainJoinTraps—
Generated when the WX switch is
initially able to contact a mobility domain seed member, or can
contact the seed member after a timeout.
MobilityDomainTimeoutTraps—
Generated when a timeout occurs
after a WX switch has unsuccessfully tried to communicate with a
seed member.
PoEFailTraps—
Generated when a serious PoE problem, such as a
short circuit, occurs.
RFDetectAdhocUserTraps
—Generated when MSS detects an ad-hoc
user.
RFDetectRogueAPTraps
—Generated when MS detects a rogue
access point.
RFDetectRogueDisappearTraps
—Generated when a rogue access
point is no longer being detected.
RFDetectClientViaRogueWiredAPTraps
—Generated when MSS
detects, on the wired part of the network, the MAC address of a
wireless client associated with a third-party AP.
RFDetectDoSPortTraps
—Generated when MSS detects an associate
request flood, reassociate request flood, or disassociate request flood.
RFDetectDoSTraps
—Generated when MSS detects a DoS attack
other than an associate request flood, reassociate request flood, or
disassociate request flood.
RFDetectInterferingRogueAPTraps
—Generated when an
interfering device is detected.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...