Nortel 2350 用户指南

下载
页码 758
Configuring SNMP 159
Nortel WLAN—Security Switch 2300 Series Configuration Guide
MichaelMICFailureTraps—Generated when two Michael message integrity code (MIC) failures occur within 60 
seconds, triggering Wi-Fi Protected Access (WPA) countermeasures. 
MobilityDomainJoinTraps—Generated when the WSS is initially able to contact a mobility domain seed member, 
or can contact the seed member after a timeout.
MobilityDomainTimeoutTraps—Generated when a timeout occurs after a WSS has unsuccessfully tried to 
communicate with a seed member.
PoEFailTraps—Generated when a serious PoE problem, such as a short circuit, occurs.
RFDetectAdhocUserTraps—Generated when WSS Software detects an ad-hoc user.
RFDetectRogueAPTraps—Generated when MS detects a rogue access point.
RFDetectRogueDisappearTraps—Generated when a rogue access point is no longer being detected.
RFDetectClientViaRogueWireapTraps—Generated when WSS Software detects, on the wired part of the 
network, the MAC address of a wireless client associated with a third-party AP.
RFDetectDoSPortTraps—Generated when WSS Software detects an associate request flood, reassociate request 
flood, or disassociate request flood.
RFDetectDoSTraps—Generated when WSS Software detects a DoS attack other than an associate request flood, 
reassociate request flood, or disassociate request flood.
RFDetectInterferingRogueAPTraps—Generated when an interfering device is detected. 
RFDetectInterferingRogueDisappearTraps—Generated when an interfering device is no longer detected. 
RFDetectSpoofedMacAPTraps—Generated when WSS Software detects a wireless packet with the source MAC 
address of a Nortel AP, but without the spoofed AP’s signature (fingerprint). 
RFDetectSpoofedSsidAPTraps—Generated when WSS Software detects beacon frames for a valid SSID, but sent 
by a rogue AP. 
RFDetectUnAuthorizedAPTraps—Generated when WSS Software detects the MAC address of an AP that is on 
the attack list. 
RFDetectUnAuthorizedOuiTraps—Generated when a wireless device that is not on the list of permitted vendors 
is detected.
RFDetectUnAuthorizedSsidTraps—Generated when an SSID that is not on the permitted SSID list is detected. 
To apply the configuration change to all notification types, specify all.
The drop or send option specifies the action that the SNMP engine takes with regard to notifications. 
Command examples
The following command changes the action in the default notification profile from drop to send for all notification 
types:
WSS
# set snmp notify profile default send all
success: change accepted.
The following commands create notification profile snmpprof_rfdetect, and change the action to send for all RF 
detection notification types: 
WSS
# set snmp notify profile snmpprof_rfdetect send RFDetectAdhocUserTraps
success: change accepted.