Configuring SNMP
147
RFDetectInterferingRogueDisappearTraps
—Generated when an
interfering device is no longer detected.
RFDetectSpoofedMacAPTraps
—Generated when MSS detects a
wireless packet with the source MAC address of a 3Com MAP, but
without the spoofed MAP’s signature (fingerprint).
RFDetectSpoofedSsidAPTraps
—Generated when MSS detects
beacon frames for a valid SSID, but sent by a rogue AP.
RFDetectUnAuthorizedAPTraps
—Generated when MSS detects the
MAC address of an AP that is on the attack list.
RFDetectUnAuthorizedOuiTraps
—Generated when a wireless
device that is not on the list of permitted vendors is detected.
RFDetectUnAuthorizedSsidTraps
—Generated when an SSID that is
not on the permitted SSID list is detected.
To apply the configuration change to all notification types, specify
all
.
The
drop
or
send
option specifies the action that the SNMP engine takes
with regard to notifications.
Command Examples
The following command changes the action in the default notification
profile from
drop
to
send
for all notification types:
WX1200#
set snmp notify profile default send all
success: change accepted.
The following commands create notification profile
snmpprof_rfdetect
,
and change the action to
send
for all RF detection notification types:
WX1200#
set snmp notify profile snmpprof_rfdetect send
RFDetectAdhocUserTraps
success: change accepted.
WX1200#
set snmp notify profile snmpprof_rfdetect send
RFDetectClientViaRogueWiredAPTraps
success: change accepted.
WX1200#
set snmp notify profile snmpprof_rfdetect send
RFDetectDoSTraps
success: change accepted.
WX1200#
set snmp notify profile snmpprof_rfdetect send
RFDetectAdhocUserTraps
success: change accepted.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...