Motorola WS2000 - Wireless Switch - Network Management Device System Reference Manual page 167

Wireless switch
Hide thumbs Also See for WS2000 - Wireless Switch - Network Management Device:
Table of Contents

Advertisement

Trap
Trap Name
Category
Configuration
Changes
User Login Failure
Admin Password
Change
Low Compact Flash
Memory
Network
Physical port status
Traps
change
Interface Status
Change
DynDNS Update
Denial of service
(DOS) attempts
SNMP
SNMP
Traps
authentication
failures
SNMP ACL violation
MU Traps
MU associated
MU unassociated
MU denied
association
MU denied
authentication
AP Traps
AP adopted
AP unadopted
AP denied adoption
AP detected radar
(802.11a only)
Generates a Trap whenever...
SNMP access or management functions are reconfigured.
A user fails to successfully login from the CLI or Applet.
A change is made to the Admin user password.
The memory in the Compact Flash card in the system falls below the
amount specified.
The status changes for one of the ports on the front of the WS2000, such
as if a device is plugged into or unplugged from the switch, or if the link is
lost between the switch and the connected device.
An interface on the switches status changes from its configured state.
If Dynamic DNS services are configured on the WAN a new trap is set
when there is a Dynamic DNS update.
A Denial of Service attack is detected by the switch's firewall. A new trap
will be sent at the interval specified until the attack has stopped.
An SNMP-capable client is denied access to the switch's SNMP
management functions or data. This may result from incorrect login
An SNMP client cannot access SNMP management functions or data due
to an Access Control List (ACL) violation
An MU becomes associated with one of the switch's Wireless Local Area
Networks (WLANs)
An MU becomes unassociated with (or gets dropped from) one of the
switch's WLANs
An MU cannot associate with the switch-managed network, for example
due to an absent or incorrectly specified MAC address on a WLAN Security
screen.
An MU is denied authentication on one of the switch's WLANs, which can
be caused by the MU being set for the wrong authentication type for the
WLAN or by an incorrect key or password.
Any of the switch's Wireless Local Area Networks (WLANs) adopts an AP.
Any of the switch's WLANs unadopts (or drops) an AP.
Any of the switch's WLANs deny the adoption of an AP.
An 802.11a AP 300 Access Port detects radar during its startup or ongoing
radar scans. This trap only applies to the 802.11a radio of an AP 300 Access
Port operating with Dynamic Frequency Selection and Transmit Power
Control (DFS/TPC).
7-25
Switch Administration

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents