106
Northbound SNMP Traps
Trap
No.
Trap Name
Description
28
Rogue AP lost
Available only when Rogue AP Detection is
enabled. This trap indicates that a previously
discovered rogue network has stopped
transmitting. The trap details if the rogue network
was an AP or ad-hoc, the relevant BSSID and
ESSID, what channel the rogue was transmitting
on, which Extricom Series AP on the switch was
closest to the rogue AP, and approximately how
far the rogue AP was from the Extricom Series
AP.
29
Rogue AP
found
Available only when Rogue AP Detection is
enabled. This trap indicates that a rogue network
has been detected. The trap details if the rogue
network is an AP or ad-hoc, the relevant BSSID
and ESSID, what channel the rogue is
transmitting on, which Extricom Series AP is
closest to the rogue AP, and approximately how
far the rogue AP is from the Extricom Series AP.
30
Rogue AP
update
Available only when Rogue AP Detection is
enabled. This trap indicates that the status of a
rogue AP has been updated. This trap always
comes after trap 29. This trap details if the rogue
network is an AP or ad-hoc, the relevant BSSID
and ESSID, what channel the rogue is
transmitting on, which Extricom Series AP is
closest to the rogue AP, and approximately how
far the rogue AP is from the Extricom Series AP.
43
Intrusion
detection
Duration attack
Available only when Intrusion Detection is
enabled. Indicates that the switch has detected a
Duration attack. The trap details the duration
length, as well as the transmitting MAC address.
44
Intrusion
detection
Association
Flood attack
Available only when Intrusion Detection is
enabled. Indicates that the switch has detected
an Association Flood attack. The trap details how
many associations were received and within what
time interval.
45
Intrusion
detection
Disassociation
Flood attack
Available only when Intrusion Detection is
enabled. Indicates that the switch has detected a
Disassociation Flood attack. The trap details how
many disassociations were received and within
what time interval. If the event was triggered from
a per-station limitation, the trap also includes the
client MAC address.