Nortel 2350 사용자 가이드
Configuring SNMP 159
Nortel WLAN—Security Switch 2300 Series Configuration Guide
•
MichaelMICFailureTraps—Generated when two Michael message integrity code (MIC) failures occur within 60
seconds, triggering Wi-Fi Protected Access (WPA) countermeasures.
seconds, triggering Wi-Fi Protected Access (WPA) countermeasures.
•
MobilityDomainJoinTraps—Generated when the WSS is initially able to contact a mobility domain seed member,
or can contact the seed member after a timeout.
or can contact the seed member after a timeout.
•
MobilityDomainTimeoutTraps—Generated when a timeout occurs after a WSS has unsuccessfully tried to
communicate with a seed member.
communicate with a seed member.
•
PoEFailTraps—Generated when a serious PoE problem, such as a short circuit, occurs.
•
RFDetectAdhocUserTraps—Generated when WSS Software detects an ad-hoc user.
•
RFDetectRogueAPTraps—Generated when MS detects a rogue access point.
•
RFDetectRogueDisappearTraps—Generated when a rogue access point is no longer being detected.
•
RFDetectClientViaRogueWireapTraps—Generated when WSS Software detects, on the wired part of the
network, the MAC address of a wireless client associated with a third-party AP.
network, the MAC address of a wireless client associated with a third-party AP.
•
RFDetectDoSPortTraps—Generated when WSS Software detects an associate request flood, reassociate request
flood, or disassociate request flood.
flood, or disassociate request flood.
•
RFDetectDoSTraps—Generated when WSS Software detects a DoS attack other than an associate request flood,
reassociate request flood, or disassociate request flood.
reassociate request flood, or disassociate request flood.
•
RFDetectInterferingRogueAPTraps—Generated when an interfering device is detected.
•
RFDetectInterferingRogueDisappearTraps—Generated when an interfering device is no longer detected.
•
RFDetectSpoofedMacAPTraps—Generated when WSS Software detects a wireless packet with the source MAC
address of a Nortel AP, but without the spoofed AP’s signature (fingerprint).
address of a Nortel AP, but without the spoofed AP’s signature (fingerprint).
•
RFDetectSpoofedSsidAPTraps—Generated when WSS Software detects beacon frames for a valid SSID, but sent
by a rogue AP.
by a rogue AP.
•
RFDetectUnAuthorizedAPTraps—Generated when WSS Software detects the MAC address of an AP that is on
the attack list.
the attack list.
•
RFDetectUnAuthorizedOuiTraps—Generated when a wireless device that is not on the list of permitted vendors
is detected.
is detected.
•
RFDetectUnAuthorizedSsidTraps—Generated when an SSID that is not on the permitted SSID list is detected.
To apply the configuration change to all notification types, specify all.
The drop or send option specifies the action that the SNMP engine takes with regard to notifications.
Command examples
The following command changes the action in the default notification profile from drop to send for all notification
types:
types:
WSS
# set snmp notify profile default send all
success: change accepted.
The following commands create notification profile snmpprof_rfdetect, and change the action to send for all RF
detection notification types:
detection notification types:
WSS
# set snmp notify profile snmpprof_rfdetect send RFDetectAdhocUserTraps
success: change accepted.