PageRenderTime 88ms CodeModel.GetById 15ms RepoModel.GetById 0ms app.codeStats 0ms

/opennms-base-assembly/src/main/filtered/etc/events/Cisco.airespace.xml

https://github.com/ajakubo1/opennms
XML | 5083 lines | 4771 code | 308 blank | 4 comment | 0 complexity | abb0a33e928325c0e78eb8a45c66bdc8 MD5 | raw file
Possible License(s): GPL-2.0, Apache-2.0
  1. <!-- Start of auto generated data from MIB: AIRESPACE-WIRELESS-MIB -->
  2. <events xmlns="http://xmlns.opennms.org/xsd/eventconf">
  3. <event>
  4. <mask>
  5. <maskelement>
  6. <mename>id</mename>
  7. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  8. </maskelement>
  9. <maskelement>
  10. <mename>generic</mename>
  11. <mevalue>6</mevalue>
  12. </maskelement>
  13. <maskelement>
  14. <mename>specific</mename>
  15. <mevalue>1</mevalue>
  16. </maskelement>
  17. </mask>
  18. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationDisassociate</uei>
  19. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationDisassociate</event-label>
  20. <descr>
  21. &lt;p&gt;The disassociate notification shall be sent when the Station
  22. sends a Disassociation frame. The value of the notification
  23. shall include the MAC address of the MAC to which the
  24. Disassociation frame was sent and the reason for the
  25. disassociation&lt;/p&gt;&lt;table&gt;
  26. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  27. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  28. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  29. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  30. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  31. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  32. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  33. bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  34. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  35. unspecified(1)
  36. previousAuthNotValid(2)
  37. deauthenticationLeaving(3)
  38. disassociationDueToInactivity(4)
  39. disassociationAPBusy(5)
  40. class2FrameFromNonAuthStation(6)
  41. class2FrameFromNonAssStation(7)
  42. disassociationStaHasLeft(8)
  43. staReqAssociationWithoutAuth(9)
  44. missingReasonCode(99)
  45. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  46. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  47. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  48. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  49. </descr>
  50. <logmsg dest='logndisplay'>&lt;p&gt;
  51. bsnDot11StationDisassociate trap received
  52. bsnStationAPMacAddr=%parm[#1]%
  53. bsnStationAPIfSlotId=%parm[#2]%
  54. bsnStationReasonCode=%parm[#3]%
  55. bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  56. </logmsg>
  57. <severity>Normal</severity>
  58. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  59. </event>
  60. <event>
  61. <mask>
  62. <maskelement>
  63. <mename>id</mename>
  64. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  65. </maskelement>
  66. <maskelement>
  67. <mename>generic</mename>
  68. <mevalue>6</mevalue>
  69. </maskelement>
  70. <maskelement>
  71. <mename>specific</mename>
  72. <mevalue>2</mevalue>
  73. </maskelement>
  74. </mask>
  75. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationDeauthenticate</uei>
  76. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationDeauthenticate</event-label>
  77. <descr>
  78. &lt;p&gt;The deauthenticate notification shall be sent when the Station
  79. sends a Deauthentication frame. The value of the notification
  80. shall include the MAC address of the MAC to which the
  81. Deauthentication frame was sent and the reason for the
  82. deauthentication.&lt;/p&gt;&lt;table&gt;
  83. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  84. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  85. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  86. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  87. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  88. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  89. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  90. bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  91. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  92. unspecified(1)
  93. previousAuthNotValid(2)
  94. deauthenticationLeaving(3)
  95. disassociationDueToInactivity(4)
  96. disassociationAPBusy(5)
  97. class2FrameFromNonAuthStation(6)
  98. class2FrameFromNonAssStation(7)
  99. disassociationStaHasLeft(8)
  100. staReqAssociationWithoutAuth(9)
  101. missingReasonCode(99)
  102. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  103. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  104. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  105. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  106. </descr>
  107. <logmsg dest='logndisplay'>&lt;p&gt;
  108. bsnDot11StationDeauthenticate trap received
  109. bsnStationAPMacAddr=%parm[#1]%
  110. bsnStationAPIfSlotId=%parm[#2]%
  111. bsnStationReasonCode=%parm[#3]%
  112. bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  113. </logmsg>
  114. <severity>Normal</severity>
  115. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  116. </event>
  117. <event>
  118. <mask>
  119. <maskelement>
  120. <mename>id</mename>
  121. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  122. </maskelement>
  123. <maskelement>
  124. <mename>generic</mename>
  125. <mevalue>6</mevalue>
  126. </maskelement>
  127. <maskelement>
  128. <mename>specific</mename>
  129. <mevalue>3</mevalue>
  130. </maskelement>
  131. </mask>
  132. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationAuthenticateFail</uei>
  133. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAuthenticateFail</event-label>
  134. <descr>
  135. &lt;p&gt;The authenticate failure notification shall be sent when the
  136. Station sends an Authentication frame with a status code other
  137. than 'successful'. The value of the notification shall include
  138. the MAC address of the MAC to which the Authentication
  139. frame was sent and the reason for the authentication failure.&lt;/p&gt;&lt;table&gt;
  140. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  141. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  142. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  143. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  144. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  145. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  146. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  147. bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  148. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  149. unspecified(1)
  150. previousAuthNotValid(2)
  151. deauthenticationLeaving(3)
  152. disassociationDueToInactivity(4)
  153. disassociationAPBusy(5)
  154. class2FrameFromNonAuthStation(6)
  155. class2FrameFromNonAssStation(7)
  156. disassociationStaHasLeft(8)
  157. staReqAssociationWithoutAuth(9)
  158. missingReasonCode(99)
  159. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  160. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  161. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  162. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  163. </descr>
  164. <logmsg dest='logndisplay'>&lt;p&gt;
  165. bsnDot11StationAuthenticateFail trap received
  166. bsnStationAPMacAddr=%parm[#1]%
  167. bsnStationAPIfSlotId=%parm[#2]%
  168. bsnStationReasonCode=%parm[#3]%
  169. bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  170. </logmsg>
  171. <severity>Warning</severity>
  172. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  173. </event>
  174. <event>
  175. <mask>
  176. <maskelement>
  177. <mename>id</mename>
  178. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  179. </maskelement>
  180. <maskelement>
  181. <mename>generic</mename>
  182. <mevalue>6</mevalue>
  183. </maskelement>
  184. <maskelement>
  185. <mename>specific</mename>
  186. <mevalue>4</mevalue>
  187. </maskelement>
  188. </mask>
  189. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationAssociateFail</uei>
  190. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAssociateFail</event-label>
  191. <descr>
  192. &lt;p&gt;The associate failure notification shall be sent when the
  193. Station sends an Association frame with a status code other
  194. than 'successful'. The value of the notification
  195. shall include the MAC address of the MAC to which the
  196. Authentication frame was sent and the reason for the
  197. authentication failure.&lt;/p&gt;&lt;table&gt;
  198. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  199. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  200. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  201. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  202. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  203. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  204. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  205. bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  206. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  207. unspecified(1)
  208. previousAuthNotValid(2)
  209. deauthenticationLeaving(3)
  210. disassociationDueToInactivity(4)
  211. disassociationAPBusy(5)
  212. class2FrameFromNonAuthStation(6)
  213. class2FrameFromNonAssStation(7)
  214. disassociationStaHasLeft(8)
  215. staReqAssociationWithoutAuth(9)
  216. missingReasonCode(99)
  217. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  218. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  219. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  220. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  221. </descr>
  222. <logmsg dest='logndisplay'>&lt;p&gt;
  223. bsnDot11StationAssociateFail trap received
  224. bsnStationAPMacAddr=%parm[#1]%
  225. bsnStationAPIfSlotId=%parm[#2]%
  226. bsnStationReasonCode=%parm[#3]%
  227. bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  228. </logmsg>
  229. <severity>Warning</severity>
  230. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  231. </event>
  232. <event>
  233. <mask>
  234. <maskelement>
  235. <mename>id</mename>
  236. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  237. </maskelement>
  238. <maskelement>
  239. <mename>generic</mename>
  240. <mevalue>6</mevalue>
  241. </maskelement>
  242. <maskelement>
  243. <mename>specific</mename>
  244. <mevalue>5</mevalue>
  245. </maskelement>
  246. </mask>
  247. <uei>uei.opennms.org/vendor/cisco/bsnAPUp</uei>
  248. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPUp</event-label>
  249. <descr>
  250. &lt;p&gt;When Airespace AP operation status goes up this trap will be
  251. sent&lt;/p&gt;&lt;table&gt;
  252. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  253. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  254. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  255. </descr>
  256. <logmsg dest='logndisplay'>&lt;p&gt;
  257. bsnAPUp trap received
  258. bsnAPDot3MacAddress=%parm[#1]%&lt;/p&gt;
  259. </logmsg>
  260. <severity>Normal</severity>
  261. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPDown:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  262. </event>
  263. <event>
  264. <mask>
  265. <maskelement>
  266. <mename>id</mename>
  267. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  268. </maskelement>
  269. <maskelement>
  270. <mename>generic</mename>
  271. <mevalue>6</mevalue>
  272. </maskelement>
  273. <maskelement>
  274. <mename>specific</mename>
  275. <mevalue>6</mevalue>
  276. </maskelement>
  277. </mask>
  278. <uei>uei.opennms.org/vendor/cisco/bsnAPDown</uei>
  279. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPDown</event-label>
  280. <descr>
  281. &lt;p&gt;When Airespace AP operation status goes down this trap will be
  282. sent&lt;/p&gt;&lt;table&gt;
  283. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  284. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  285. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  286. </descr>
  287. <logmsg dest='logndisplay'>&lt;p&gt;
  288. bsnAPDown trap received
  289. bsnAPDot3MacAddress=%parm[#1]%&lt;/p&gt;
  290. </logmsg>
  291. <severity>Major</severity>
  292. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  293. </event>
  294. <event>
  295. <mask>
  296. <maskelement>
  297. <mename>id</mename>
  298. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  299. </maskelement>
  300. <maskelement>
  301. <mename>generic</mename>
  302. <mevalue>6</mevalue>
  303. </maskelement>
  304. <maskelement>
  305. <mename>specific</mename>
  306. <mevalue>7</mevalue>
  307. </maskelement>
  308. </mask>
  309. <uei>uei.opennms.org/vendor/cisco/bsnAPAssociated</uei>
  310. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPAssociated</event-label>
  311. <descr>
  312. &lt;p&gt;When Airespace AP Associates to a Airespace Switch, AP
  313. associated notification will be sent with dot3 MAC address of
  314. Airespace AP.This will help management system to discover
  315. Airespace AP and add to system.&lt;/p&gt;&lt;table&gt;
  316. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  317. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  318. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  319. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  320. bsnAPPortNumberTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  321. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  322. </descr>
  323. <logmsg dest='logndisplay'>&lt;p&gt;
  324. bsnAPAssociated trap received
  325. bsnAPMacAddrTrapVariable=%parm[#1]%
  326. bsnAPPortNumberTrapVariable=%parm[#2]%&lt;/p&gt;
  327. </logmsg>
  328. <severity>Normal</severity>
  329. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPDisassociated:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
  330. </event>
  331. <event>
  332. <mask>
  333. <maskelement>
  334. <mename>id</mename>
  335. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  336. </maskelement>
  337. <maskelement>
  338. <mename>generic</mename>
  339. <mevalue>6</mevalue>
  340. </maskelement>
  341. <maskelement>
  342. <mename>specific</mename>
  343. <mevalue>8</mevalue>
  344. </maskelement>
  345. </mask>
  346. <uei>uei.opennms.org/vendor/cisco/bsnAPDisassociated</uei>
  347. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPDisassociated</event-label>
  348. <descr>
  349. &lt;p&gt;When Airespace AP disassociates from Airespace Switch, AP
  350. disassociated notification will be sent with dot3 MAC address
  351. of Airespace AP management system to remove Airespace AP from
  352. this Airespace Switch&lt;/p&gt;&lt;table&gt;
  353. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  354. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  355. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  356. </descr>
  357. <logmsg dest='logndisplay'>&lt;p&gt;
  358. bsnAPDisassociated trap received
  359. bsnAPMacAddrTrapVariable=%parm[#1]%&lt;/p&gt;
  360. </logmsg>
  361. <severity>Warning</severity>
  362. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  363. </event>
  364. <event>
  365. <mask>
  366. <maskelement>
  367. <mename>id</mename>
  368. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  369. </maskelement>
  370. <maskelement>
  371. <mename>generic</mename>
  372. <mevalue>6</mevalue>
  373. </maskelement>
  374. <maskelement>
  375. <mename>specific</mename>
  376. <mevalue>9</mevalue>
  377. </maskelement>
  378. </mask>
  379. <uei>uei.opennms.org/vendor/cisco/bsnAPIfUp</uei>
  380. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIfUp</event-label>
  381. <descr>
  382. &lt;p&gt;When Airespace AP's interface's operation status goes up this
  383. trap will be sent&lt;/p&gt;&lt;table&gt;
  384. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  385. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  386. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  387. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  388. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  389. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  390. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  391. bsnAPPortNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  392. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  393. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  394. bsnAPIfUpDownCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  395. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  396. unknown(0)
  397. radioFailure(1)
  398. radioLowPower(2)
  399. maxRetransmission(3)
  400. echoTimeout(4)
  401. configAP(5)
  402. configRadio(6)
  403. configNetwork(7)
  404. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  405. </descr>
  406. <logmsg dest='logndisplay'>&lt;p&gt;
  407. bsnAPIfUp trap received
  408. bsnAPDot3MacAddress=%parm[#1]%
  409. bsnAPIfSlotId=%parm[#2]%
  410. bsnAPPortNumber=%parm[#3]%
  411. bsnAPIfUpDownCause=%parm[#4]%&lt;/p&gt;
  412. </logmsg>
  413. <severity>Normal</severity>
  414. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPIfDown:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
  415. </event>
  416. <event>
  417. <mask>
  418. <maskelement>
  419. <mename>id</mename>
  420. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  421. </maskelement>
  422. <maskelement>
  423. <mename>generic</mename>
  424. <mevalue>6</mevalue>
  425. </maskelement>
  426. <maskelement>
  427. <mename>specific</mename>
  428. <mevalue>10</mevalue>
  429. </maskelement>
  430. </mask>
  431. <uei>uei.opennms.org/vendor/cisco/bsnAPIfDown</uei>
  432. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIfDown</event-label>
  433. <descr>
  434. &lt;p&gt;When Airespace AP's interface's operation status goes down
  435. this trap will be sent.&lt;/p&gt;&lt;table&gt;
  436. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  437. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  438. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  439. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  440. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  441. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  442. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  443. bsnAPAdminStatus&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  444. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  445. enable(1)
  446. disable(2)
  447. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  448. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  449. bsnAPIfAdminStatus&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  450. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  451. enable(1)
  452. disable(2)
  453. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  454. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  455. bsnAPIfUpDownCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  456. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  457. unknown(0)
  458. radioFailure(1)
  459. radioLowPower(2)
  460. maxRetransmission(3)
  461. echoTimeout(4)
  462. configAP(5)
  463. configRadio(6)
  464. configNetwork(7)
  465. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  466. </descr>
  467. <logmsg dest='logndisplay'>&lt;p&gt;
  468. bsnAPIfDown trap received
  469. bsnAPDot3MacAddress=%parm[#1]%
  470. bsnAPIfSlotId=%parm[#2]%
  471. bsnAPAdminStatus=%parm[#3]%
  472. bsnAPIfAdminStatus=%parm[#4]%
  473. bsnAPIfUpDownCause=%parm[#5]%&lt;/p&gt;
  474. </logmsg>
  475. <severity>Warning</severity>
  476. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  477. </event>
  478. <event>
  479. <mask>
  480. <maskelement>
  481. <mename>id</mename>
  482. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  483. </maskelement>
  484. <maskelement>
  485. <mename>generic</mename>
  486. <mevalue>6</mevalue>
  487. </maskelement>
  488. <maskelement>
  489. <mename>specific</mename>
  490. <mevalue>11</mevalue>
  491. </maskelement>
  492. </mask>
  493. <uei>uei.opennms.org/vendor/cisco/bsnAPLoadProfileFailed</uei>
  494. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPLoadProfileFailed</event-label>
  495. <descr>
  496. &lt;p&gt;When LOAD Profile state changes from PASS to FAIL,
  497. notification will be sent with Dot3 MAC address of Airespace
  498. AP and slot ID of Airespace AP IF. This trap sending can be
  499. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  500. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  501. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  502. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  503. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  504. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  505. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  506. </descr>
  507. <logmsg dest='logndisplay'>&lt;p&gt;
  508. bsnAPLoadProfileFailed trap received
  509. bsnAPDot3MacAddress=%parm[#1]%
  510. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  511. </logmsg>
  512. <severity>Warning</severity>
  513. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  514. </event>
  515. <event>
  516. <mask>
  517. <maskelement>
  518. <mename>id</mename>
  519. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  520. </maskelement>
  521. <maskelement>
  522. <mename>generic</mename>
  523. <mevalue>6</mevalue>
  524. </maskelement>
  525. <maskelement>
  526. <mename>specific</mename>
  527. <mevalue>12</mevalue>
  528. </maskelement>
  529. </mask>
  530. <uei>uei.opennms.org/vendor/cisco/bsnAPNoiseProfileFailed</uei>
  531. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPNoiseProfileFailed</event-label>
  532. <descr>
  533. &lt;p&gt;When Noise Profile state changes from PASS to FAIL,
  534. notification will be sent with Dot3 MAC address of Airespace
  535. AP and slot ID of Airespace AP IF. This trap sending can be
  536. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  537. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  538. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  539. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  540. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  541. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  542. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  543. </descr>
  544. <logmsg dest='logndisplay'>&lt;p&gt;
  545. bsnAPNoiseProfileFailed trap received
  546. bsnAPDot3MacAddress=%parm[#1]%
  547. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  548. </logmsg>
  549. <severity>Warning</severity>
  550. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  551. </event>
  552. <event>
  553. <mask>
  554. <maskelement>
  555. <mename>id</mename>
  556. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  557. </maskelement>
  558. <maskelement>
  559. <mename>generic</mename>
  560. <mevalue>6</mevalue>
  561. </maskelement>
  562. <maskelement>
  563. <mename>specific</mename>
  564. <mevalue>13</mevalue>
  565. </maskelement>
  566. </mask>
  567. <uei>uei.opennms.org/vendor/cisco/bsnAPInterferenceProfileFailed</uei>
  568. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPInterferenceProfileFailed</event-label>
  569. <descr>
  570. &lt;p&gt;When Interference Profile state changes from PASS to FAIL,
  571. notification will be sent with Dot3 MAC address of Airespace
  572. AP and slot ID of Airespace AP IF. This trap sending can be
  573. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  574. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  575. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  576. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  577. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  578. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  579. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  580. </descr>
  581. <logmsg dest='logndisplay'>&lt;p&gt;
  582. bsnAPInterferenceProfileFailed trap received
  583. bsnAPDot3MacAddress=%parm[#1]%
  584. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  585. </logmsg>
  586. <severity>Warning</severity>
  587. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  588. </event>
  589. <event>
  590. <mask>
  591. <maskelement>
  592. <mename>id</mename>
  593. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  594. </maskelement>
  595. <maskelement>
  596. <mename>generic</mename>
  597. <mevalue>6</mevalue>
  598. </maskelement>
  599. <maskelement>
  600. <mename>specific</mename>
  601. <mevalue>14</mevalue>
  602. </maskelement>
  603. </mask>
  604. <uei>uei.opennms.org/vendor/cisco/bsnAPCoverageProfileFailed</uei>
  605. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCoverageProfileFailed</event-label>
  606. <descr>
  607. &lt;p&gt;When Coverage Profile state changes from PASS to FAIL,
  608. notification will be sent with Dot3 MAC address of Airespace
  609. AP and slot ID of Airespace AP IF. This trap sending can be
  610. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  611. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  612. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  613. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  614. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  615. bsnAPNameTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  616. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  617. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  618. bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  619. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  620. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  621. bsnAPCoverageThresholdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  622. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  623. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  624. bsnAPCoverageFailedClients&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  625. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  626. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  627. bsnAPCoverageTotalClients&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  628. %parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  629. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  630. bsnClientMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  631. %parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  632. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  633. bsnClientRssi&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  634. %parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  635. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  636. bsnClientSnr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  637. %parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  638. </descr>
  639. <logmsg dest='logndisplay'>&lt;p&gt;
  640. bsnAPCoverageProfileFailed trap received
  641. bsnAPMacAddrTrapVariable=%parm[#1]%
  642. bsnAPNameTrapVariable=%parm[#2]%
  643. bsnAPSlotIdTrapVariable=%parm[#3]%
  644. bsnAPCoverageThresholdTrapVariable=%parm[#4]%
  645. bsnAPCoverageFailedClients=%parm[#5]%
  646. bsnAPCoverageTotalClients=%parm[#6]%
  647. bsnClientMacAddr=%parm[#7]%
  648. bsnClientRssi=%parm[#8]%
  649. bsnClientSnr=%parm[#9]%&lt;/p&gt;
  650. </logmsg>
  651. <severity>Warning</severity>
  652. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  653. </event>
  654. <event>
  655. <mask>
  656. <maskelement>
  657. <mename>id</mename>
  658. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  659. </maskelement>
  660. <maskelement>
  661. <mename>generic</mename>
  662. <mevalue>6</mevalue>
  663. </maskelement>
  664. <maskelement>
  665. <mename>specific</mename>
  666. <mevalue>15</mevalue>
  667. </maskelement>
  668. </mask>
  669. <uei>uei.opennms.org/vendor/cisco/bsnAPCurrentTxPowerChanged</uei>
  670. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCurrentTxPowerChanged</event-label>
  671. <descr>
  672. &lt;p&gt;Whenever dynamic algorithms are running and
  673. bsnAPIfPhyPowerAutomaticOn is true, Airespace AP Interface's
  674. CurrentTxPower might get updated by algorithm. When
  675. this occurs notification will be sent with Dot3 MAC address of
  676. Airespace AP and slot ID of Airespace AP IF along with the
  677. currentTxPower for this Airespace AP IF&lt;/p&gt;&lt;table&gt;
  678. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  679. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  680. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  681. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  682. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  683. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  684. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  685. bsnAPIfPhyTxPowerLevel&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  686. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  687. </descr>
  688. <logmsg dest='logndisplay'>&lt;p&gt;
  689. bsnAPCurrentTxPowerChanged trap received
  690. bsnAPDot3MacAddress=%parm[#1]%
  691. bsnAPIfSlotId=%parm[#2]%
  692. bsnAPIfPhyTxPowerLevel=%parm[#3]%&lt;/p&gt;
  693. </logmsg>
  694. <severity>Normal</severity>
  695. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  696. </event>
  697. <event>
  698. <mask>
  699. <maskelement>
  700. <mename>id</mename>
  701. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  702. </maskelement>
  703. <maskelement>
  704. <mename>generic</mename>
  705. <mevalue>6</mevalue>
  706. </maskelement>
  707. <maskelement>
  708. <mename>specific</mename>
  709. <mevalue>16</mevalue>
  710. </maskelement>
  711. </mask>
  712. <uei>uei.opennms.org/vendor/cisco/bsnAPCurrentChannelChanged</uei>
  713. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCurrentChannelChanged</event-label>
  714. <descr>
  715. &lt;p&gt;Whenever dynamic algorithms are running and
  716. bsnAPIfPhyChannelAutomaticOn is true, Airespace AP
  717. Interface's CurrentChannel might get updated by algorithm.
  718. When this occurs notification will be sent with Dot3 MAC
  719. address of Airespace AP and slot ID of Airespace AP IF along
  720. with the currentChannel for this Airespace AP IF&lt;/p&gt;&lt;table&gt;
  721. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  722. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  723. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  724. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  725. bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  726. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  727. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  728. bsnAPChannelNumberTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  729. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  730. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  731. bsnInterferenceEnergyBeforeChannelUpdate&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  732. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  733. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  734. bsnInterferenceEnergyAfterChannelUpdate&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  735. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  736. </descr>
  737. <logmsg dest='logndisplay'>&lt;p&gt;
  738. bsnAPCurrentChannelChanged trap received
  739. bsnAPMacAddrTrapVariable=%parm[#1]%
  740. bsnAPSlotIdTrapVariable=%parm[#2]%
  741. bsnAPChannelNumberTrapVariable=%parm[#3]%
  742. bsnInterferenceEnergyBeforeChannelUpdate=%parm[#4]%
  743. bsnInterferenceEnergyAfterChannelUpdate=%parm[#5]%&lt;/p&gt;
  744. </logmsg>
  745. <severity>Normal</severity>
  746. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  747. </event>
  748. <event>
  749. <mask>
  750. <maskelement>
  751. <mename>id</mename>
  752. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  753. </maskelement>
  754. <maskelement>
  755. <mename>generic</mename>
  756. <mevalue>6</mevalue>
  757. </maskelement>
  758. <maskelement>
  759. <mename>specific</mename>
  760. <mevalue>21</mevalue>
  761. </maskelement>
  762. </mask>
  763. <uei>uei.opennms.org/vendor/cisco/bsnRrmDot11aGroupingDone</uei>
  764. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRrmDot11aGroupingDone</event-label>
  765. <descr>
  766. &lt;p&gt;When Grouping is done, this notification will be sent from the
  767. previous Group Leader where grouping algorithm was run. It has
  768. MAC address of the new Group Leader.&lt;/p&gt;&lt;table&gt;
  769. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  770. bsnRrmDot11aGroupLeaderMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  771. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  772. </descr>
  773. <logmsg dest='logndisplay'>&lt;p&gt;
  774. bsnRrmDot11aGroupingDone trap received
  775. bsnRrmDot11aGroupLeaderMacAddr=%parm[#1]%&lt;/p&gt;
  776. </logmsg>
  777. <severity>Normal</severity>
  778. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  779. </event>
  780. <event>
  781. <mask>
  782. <maskelement>
  783. <mename>id</mename>
  784. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  785. </maskelement>
  786. <maskelement>
  787. <mename>generic</mename>
  788. <mevalue>6</mevalue>
  789. </maskelement>
  790. <maskelement>
  791. <mename>specific</mename>
  792. <mevalue>22</mevalue>
  793. </maskelement>
  794. </mask>
  795. <uei>uei.opennms.org/vendor/cisco/bsnRrmDot11bGroupingDone</uei>
  796. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRrmDot11bGroupingDone</event-label>
  797. <descr>
  798. &lt;p&gt;When Grouping is done, this notification will be sent from the
  799. previous Group Leader where grouping algorithm was run. It has
  800. MAC address of the new Group Leader.&lt;/p&gt;&lt;table&gt;
  801. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  802. bsnRrmDot11bGroupLeaderMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  803. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  804. </descr>
  805. <logmsg dest='logndisplay'>&lt;p&gt;
  806. bsnRrmDot11bGroupingDone trap received
  807. bsnRrmDot11bGroupLeaderMacAddr=%parm[#1]%&lt;/p&gt;
  808. </logmsg>
  809. <severity>Normal</severity>
  810. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  811. </event>
  812. <event>
  813. <mask>
  814. <maskelement>
  815. <mename>id</mename>
  816. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  817. </maskelement>
  818. <maskelement>
  819. <mename>generic</mename>
  820. <mevalue>6</mevalue>
  821. </maskelement>
  822. <maskelement>
  823. <mename>specific</mename>
  824. <mevalue>23</mevalue>
  825. </maskelement>
  826. </mask>
  827. <uei>uei.opennms.org/vendor/cisco/bsnConfigSaved</uei>
  828. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnConfigSaved</event-label>
  829. <descr>
  830. &lt;p&gt;When configuration is save either from CLI or web interface
  831. This trap will be sent to inform NMS to do refresh&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
  832. </descr>
  833. <logmsg dest='logndisplay'>&lt;p&gt;
  834. bsnConfigSaved trap received&lt;/p&gt;
  835. </logmsg>
  836. <severity>Indeterminate</severity>
  837. </event>
  838. <event>
  839. <mask>
  840. <maskelement>
  841. <mename>id</mename>
  842. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  843. </maskelement>
  844. <maskelement>
  845. <mename>generic</mename>
  846. <mevalue>6</mevalue>
  847. </maskelement>
  848. <maskelement>
  849. <mename>specific</mename>
  850. <mevalue>24</mevalue>
  851. </maskelement>
  852. </mask>
  853. <uei>uei.opennms.org/vendor/cisco/bsnDot11EssCreated</uei>
  854. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11EssCreated</event-label>
  855. <descr>
  856. &lt;p&gt;Whenever a new Ess (WLAN) is created, this notification will
  857. be sent along with EssIndex&lt;/p&gt;&lt;table&gt;
  858. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  859. bsnDot11EssIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  860. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  861. </descr>
  862. <logmsg dest='logndisplay'>&lt;p&gt;
  863. bsnDot11EssCreated trap received
  864. bsnDot11EssIndex=%parm[#1]%&lt;/p&gt;
  865. </logmsg>
  866. <severity>Normal</severity>
  867. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  868. </event>
  869. <event>
  870. <mask>
  871. <maskelement>
  872. <mename>id</mename>
  873. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  874. </maskelement>
  875. <maskelement>
  876. <mename>generic</mename>
  877. <mevalue>6</mevalue>
  878. </maskelement>
  879. <maskelement>
  880. <mename>specific</mename>
  881. <mevalue>25</mevalue>
  882. </maskelement>
  883. </mask>
  884. <uei>uei.opennms.org/vendor/cisco/bsnDot11EssDeleted</uei>
  885. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11EssDeleted</event-label>
  886. <descr>
  887. &lt;p&gt;Whenever a Ess (WLAN)is deleted, this notification will be
  888. sent along with EssIndex&lt;/p&gt;&lt;table&gt;
  889. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  890. bsnDot11EssIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  891. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  892. </descr>
  893. <logmsg dest='logndisplay'>&lt;p&gt;
  894. bsnDot11EssDeleted trap received
  895. bsnDot11EssIndex=%parm[#1]%&lt;/p&gt;
  896. </logmsg>
  897. <severity>Warning</severity>
  898. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  899. </event>
  900. <event>
  901. <mask>
  902. <maskelement>
  903. <mename>id</mename>
  904. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  905. </maskelement>
  906. <maskelement>
  907. <mename>generic</mename>
  908. <mevalue>6</mevalue>
  909. </maskelement>
  910. <maskelement>
  911. <mename>specific</mename>
  912. <mevalue>26</mevalue>
  913. </maskelement>
  914. </mask>
  915. <uei>uei.opennms.org/vendor/cisco/bsnRADIUSServerNotResponding</uei>
  916. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRADIUSServerNotResponding</event-label>
  917. <descr>
  918. &lt;p&gt;This trap is to indicate that no RADIUS server(s) are responding
  919. to authentication requests sent by the RADIUS client within the
  920. MWAR device(Switch).&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
  921. </descr>
  922. <logmsg dest='logndisplay'>&lt;p&gt;
  923. bsnRADIUSServerNotResponding trap received&lt;/p&gt;
  924. </logmsg>
  925. <severity>Minor</severity>
  926. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  927. </event>
  928. <event>
  929. <mask>
  930. <maskelement>
  931. <mename>id</mename>
  932. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  933. </maskelement>
  934. <maskelement>
  935. <mename>generic</mename>
  936. <mevalue>6</mevalue>
  937. </maskelement>
  938. <maskelement>
  939. <mename>specific</mename>
  940. <mevalue>27</mevalue>
  941. </maskelement>
  942. <varbind>
  943. <vbnumber>1</vbnumber>
  944. <vbvalue>1</vbvalue>
  945. </varbind>
  946. </mask>
  947. <uei>uei.opennms.org/vendor/cisco/bsnAuthenticationFailureMgmt</uei>
  948. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAuthenticationFailure</event-label>
  949. <descr>
  950. &lt;p&gt;This trap is to inform that client authentication failure has
  951. occured at MWAR(Switch). This could be cli/web user, wlan user,
  952. or Mac Authorized user. ServiceType will indicate which type of
  953. user it is and userName will be cli/web/wlan userName or
  954. MacAddress of Mac Authorized User&lt;/p&gt;&lt;table&gt;
  955. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  956. bsnAuthFailureUserType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  957. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  958. mgmtUser(1)
  959. wlanUser(2)
  960. macFilter(3)
  961. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  962. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  963. bsnAuthFailureUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  964. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  965. </descr>
  966. <logmsg dest='logndisplay'>&lt;p&gt;
  967. bsnAuthenticationFailure trap received
  968. bsnAuthFailureUserType=%parm[#1]%
  969. bsnAuthFailureUserName=%parm[#2]%&lt;/p&gt;
  970. </logmsg>
  971. <severity>Warning</severity>
  972. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  973. </event>
  974. <event>
  975. <mask>
  976. <maskelement>
  977. <mename>id</mename>
  978. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  979. </maskelement>
  980. <maskelement>
  981. <mename>generic</mename>
  982. <mevalue>6</mevalue>
  983. </maskelement>
  984. <maskelement>
  985. <mename>specific</mename>
  986. <mevalue>27</mevalue>
  987. </maskelement>
  988. </mask>
  989. <uei>uei.opennms.org/vendor/cisco/bsnAuthenticationFailure</uei>
  990. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAuthenticationFailure</event-label>
  991. <descr>
  992. &lt;p&gt;This trap is to inform that client authentication failure has
  993. occured at MWAR(Switch). This could be cli/web user, wlan user,
  994. or Mac Authorized user. ServiceType will indicate which type of
  995. user it is and userName will be cli/web/wlan userName or
  996. MacAddress of Mac Authorized User&lt;/p&gt;&lt;table&gt;
  997. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  998. bsnAuthFailureUserType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  999. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  1000. mgmtUser(1)
  1001. wlanUser(2)
  1002. macFilter(3)
  1003. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1004. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1005. bsnAuthFailureUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1006. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1007. </descr>
  1008. <logmsg dest='logndisplay'>&lt;p&gt;
  1009. bsnAuthenticationFailure trap received
  1010. bsnAuthFailureUserType=%parm[#1]%
  1011. bsnAuthFailureUserName=%parm[#2]%&lt;/p&gt;
  1012. </logmsg>
  1013. <severity>Normal</severity>
  1014. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1015. </event>
  1016. <event>
  1017. <mask>
  1018. <maskelement>
  1019. <mename>id</mename>
  1020. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1021. </maskelement>
  1022. <maskelement>
  1023. <mename>generic</mename>
  1024. <mevalue>6</mevalue>
  1025. </maskelement>
  1026. <maskelement>
  1027. <mename>specific</mename>
  1028. <mevalue>28</mevalue>
  1029. </maskelement>
  1030. </mask>
  1031. <uei>uei.opennms.org/vendor/cisco/bsnIpsecEspAuthFailureTrap</uei>
  1032. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspAuthFailureTrap</event-label>
  1033. <descr>
  1034. &lt;p&gt;IPsec packets with invalid hashes were found in an inbound
  1035. ESP SA. The total number of authentication errors
  1036. accumulated is sent for the specific row of the
  1037. ipsecSaEspInTable table for the SA; this provides the
  1038. identity of the SA in which the error occurred.
  1039. Implementations SHOULD send one trap per SA (within a
  1040. reasonable time period), rather than sending one trap per
  1041. packet.&lt;/p&gt;&lt;table&gt;
  1042. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1043. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1044. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1045. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1046. bsnIpsecErrorCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1047. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1048. </descr>
  1049. <logmsg dest='logndisplay'>&lt;p&gt;
  1050. bsnIpsecEspAuthFailureTrap trap received
  1051. bsnRemoteIPv4Address=%parm[#1]%
  1052. bsnIpsecErrorCount=%parm[#2]%&lt;/p&gt;
  1053. </logmsg>
  1054. <severity>Normal</severity>
  1055. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1056. </event>
  1057. <event>
  1058. <mask>
  1059. <maskelement>
  1060. <mename>id</mename>
  1061. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1062. </maskelement>
  1063. <maskelement>
  1064. <mename>generic</mename>
  1065. <mevalue>6</mevalue>
  1066. </maskelement>
  1067. <maskelement>
  1068. <mename>specific</mename>
  1069. <mevalue>29</mevalue>
  1070. </maskelement>
  1071. </mask>
  1072. <uei>uei.opennms.org/vendor/cisco/bsnIpsecEspReplayFailureTrap</uei>
  1073. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspReplayFailureTrap</event-label>
  1074. <descr>
  1075. &lt;p&gt;IPsec packets with invalid sequence numbers were found in
  1076. an inbound ESP SA. The total number of replay errors
  1077. accumulated is sent for the specific row of the
  1078. ipsecSaEspInTable table for the SA; this provides the
  1079. identity of the SA in which the error occurred.
  1080. Implementations SHOULD send one trap per SA (within a
  1081. reasonable time period), rather than sending one trap per
  1082. packet.&lt;/p&gt;&lt;table&gt;
  1083. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1084. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1085. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1086. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1087. bsnIpsecErrorCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1088. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1089. </descr>
  1090. <logmsg dest='logndisplay'>&lt;p&gt;
  1091. bsnIpsecEspReplayFailureTrap trap received
  1092. bsnRemoteIPv4Address=%parm[#1]%
  1093. bsnIpsecErrorCount=%parm[#2]%&lt;/p&gt;
  1094. </logmsg>
  1095. <severity>Warning</severity>
  1096. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  1097. </event>
  1098. <event>
  1099. <mask>
  1100. <maskelement>
  1101. <mename>id</mename>
  1102. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1103. </maskelement>
  1104. <maskelement>
  1105. <mename>generic</mename>
  1106. <mevalue>6</mevalue>
  1107. </maskelement>
  1108. <maskelement>
  1109. <mename>specific</mename>
  1110. <mevalue>31</mevalue>
  1111. </maskelement>
  1112. </mask>
  1113. <uei>uei.opennms.org/vendor/cisco/bsnIpsecEspInvalidSpiTrap</uei>
  1114. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspInvalidSpiTrap</event-label>
  1115. <descr>
  1116. &lt;p&gt;A packet with an unknown SPI was detected from the
  1117. specified peer with the specified SPI using the specified
  1118. protocol. The destination address of the received packet is
  1119. specified by ipsecLocalAddress.
  1120. The value ifIndex may be 0 if this optional linkage is
  1121. unsupported.
  1122. If the object ipsecSecurityProtocol has the value for
  1123. IPcomp, then the ipsecSPI object is the CPI of the packet.
  1124. Implementations SHOULD send one trap per peer (within a
  1125. reasonable time period), rather than sending one trap per
  1126. packet.&lt;/p&gt;&lt;table&gt;
  1127. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1128. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1129. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1130. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1131. bsnIpsecSPI&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1132. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1133. </descr>
  1134. <logmsg dest='logndisplay'>&lt;p&gt;
  1135. bsnIpsecEspInvalidSpiTrap trap received
  1136. bsnRemoteIPv4Address=%parm[#1]%
  1137. bsnIpsecSPI=%parm[#2]%&lt;/p&gt;
  1138. </logmsg>
  1139. <severity>Normal</severity>
  1140. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1141. </event>
  1142. <event>
  1143. <mask>
  1144. <maskelement>
  1145. <mename>id</mename>
  1146. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1147. </maskelement>
  1148. <maskelement>
  1149. <mename>generic</mename>
  1150. <mevalue>6</mevalue>
  1151. </maskelement>
  1152. <maskelement>
  1153. <mename>specific</mename>
  1154. <mevalue>33</mevalue>
  1155. </maskelement>
  1156. </mask>
  1157. <uei>uei.opennms.org/vendor/cisco/bsnIpsecIkeNegFailure</uei>
  1158. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecIkeNegFailure</event-label>
  1159. <descr>
  1160. &lt;p&gt;An attempt to negotiate a phase 1 IKE SA failed.
  1161. The notification counts are also sent as part of the trap,
  1162. along with the current value of the total negotiation error
  1163. counters for ISAKMP.&lt;/p&gt;&lt;table&gt;
  1164. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1165. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1166. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1167. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1168. bsnRemoteUdpPort&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1169. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1170. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1171. bsnIkeAuthMethod&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1172. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1173. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1174. bsnIkeTotalInitFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1175. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1176. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1177. bsnIkeTotalInitNoResponses&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1178. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1179. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1180. bsnIkeTotalRespFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1181. %parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1182. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1183. bsnNotifiesSent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1184. %parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1185. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1186. bsnNotifiesReceived&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1187. %parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1188. </descr>
  1189. <logmsg dest='logndisplay'>&lt;p&gt;
  1190. bsnIpsecIkeNegFailure trap received
  1191. bsnRemoteIPv4Address=%parm[#1]%
  1192. bsnRemoteUdpPort=%parm[#2]%
  1193. bsnIkeAuthMethod=%parm[#3]%
  1194. bsnIkeTotalInitFailures=%parm[#4]%
  1195. bsnIkeTotalInitNoResponses=%parm[#5]%
  1196. bsnIkeTotalRespFailures=%parm[#6]%
  1197. bsnNotifiesSent=%parm[#7]%
  1198. bsnNotifiesReceived=%parm[#8]%&lt;/p&gt;
  1199. </logmsg>
  1200. <severity>Normal</severity>
  1201. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1202. </event>
  1203. <event>
  1204. <mask>
  1205. <maskelement>
  1206. <mename>id</mename>
  1207. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1208. </maskelement>
  1209. <maskelement>
  1210. <mename>generic</mename>
  1211. <mevalue>6</mevalue>
  1212. </maskelement>
  1213. <maskelement>
  1214. <mename>specific</mename>
  1215. <mevalue>34</mevalue>
  1216. </maskelement>
  1217. </mask>
  1218. <uei>uei.opennms.org/vendor/cisco/bsnIpsecSuiteNegFailure</uei>
  1219. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecSuiteNegFailure</event-label>
  1220. <descr>
  1221. &lt;p&gt;An attempt to negotiate a phase 2 SA suite for the
  1222. specified selector failed.
  1223. The current total failure counts are passed as well as the
  1224. notification type counts for the notify involved in the
  1225. failure.&lt;/p&gt;&lt;table&gt;
  1226. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1227. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1228. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1229. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1230. bsnSuiteInitFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1231. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1232. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1233. bsnSuiteRespondFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1234. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1235. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1236. bsnNotifiesSent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1237. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1238. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1239. bsnNotifiesReceived&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1240. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1241. </descr>
  1242. <logmsg dest='logndisplay'>&lt;p&gt;
  1243. bsnIpsecSuiteNegFailure trap received
  1244. bsnRemoteIPv4Address=%parm[#1]%
  1245. bsnSuiteInitFailures=%parm[#2]%
  1246. bsnSuiteRespondFailures=%parm[#3]%
  1247. bsnNotifiesSent=%parm[#4]%
  1248. bsnNotifiesReceived=%parm[#5]%&lt;/p&gt;
  1249. </logmsg>
  1250. <severity>Normal</severity>
  1251. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1252. </event>
  1253. <event>
  1254. <mask>
  1255. <maskelement>
  1256. <mename>id</mename>
  1257. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1258. </maskelement>
  1259. <maskelement>
  1260. <mename>generic</mename>
  1261. <mevalue>6</mevalue>
  1262. </maskelement>
  1263. <maskelement>
  1264. <mename>specific</mename>
  1265. <mevalue>35</mevalue>
  1266. </maskelement>
  1267. </mask>
  1268. <uei>uei.opennms.org/vendor/cisco/bsnIpsecInvalidCookieTrap</uei>
  1269. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecInvalidCookieTrap</event-label>
  1270. <descr>
  1271. &lt;p&gt;ISAKMP packets with invalid cookies were detected from the
  1272. specified source, intended for the specified destination.
  1273. The initiator and responder cookies are also sent with the
  1274. trap.
  1275. The current count is sent to allow the trap to accurately
  1276. relfect dropped and throttled traps.
  1277. Implementations SHOULD send one trap per peer (within a
  1278. reasonable time period, rather than sending one trap per
  1279. packet.&lt;/p&gt;&lt;table&gt;
  1280. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1281. bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1282. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1283. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1284. bsnRemoteUdpPort&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1285. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1286. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1287. bsnInitiatorCookie&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1288. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1289. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1290. bsnResponderCookie&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1291. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1292. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1293. bsnIsakmpInvalidCookies&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1294. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1295. </descr>
  1296. <logmsg dest='logndisplay'>&lt;p&gt;
  1297. bsnIpsecInvalidCookieTrap trap received
  1298. bsnRemoteIPv4Address=%parm[#1]%
  1299. bsnRemoteUdpPort=%parm[#2]%
  1300. bsnInitiatorCookie=%parm[#3]%
  1301. bsnResponderCookie=%parm[#4]%
  1302. bsnIsakmpInvalidCookies=%parm[#5]%&lt;/p&gt;
  1303. </logmsg>
  1304. <severity>Normal</severity>
  1305. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1306. </event>
  1307. <event>
  1308. <mask>
  1309. <maskelement>
  1310. <mename>id</mename>
  1311. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1312. </maskelement>
  1313. <maskelement>
  1314. <mename>generic</mename>
  1315. <mevalue>6</mevalue>
  1316. </maskelement>
  1317. <maskelement>
  1318. <mename>specific</mename>
  1319. <mevalue>36</mevalue>
  1320. </maskelement>
  1321. </mask>
  1322. <uei>uei.opennms.org/vendor/cisco/bsnRogueAPDetected</uei>
  1323. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPDetected</event-label>
  1324. <descr>
  1325. &lt;p&gt;When a Rogue AP is detected this Trap will be sent out along
  1326. with APMacAddress on which its detected&lt;/p&gt;&lt;table&gt;
  1327. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1328. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1329. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1330. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1331. bsnRogueAPAirespaceAPMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1332. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1333. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1334. bsnRogueAPAirespaceAPSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1335. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1336. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1337. bsnRogueAPSsid&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1338. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1339. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1340. bsnRogueAPChannelNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1341. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1342. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1343. bsnRogueAPAirespaceAPRSSI&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1344. %parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1345. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1346. bsnRogueAPAirespaceAPSNR&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1347. %parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1348. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1349. bsnRogueAPOnWiredNetwork&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1350. %parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  1351. no(0)
  1352. yes(1)
  1353. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1354. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1355. bsnRogueAdhocMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1356. %parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  1357. no(0)
  1358. yes(1)
  1359. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1360. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1361. bsnRogueAPRadioType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1362. %parm[#10]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  1363. dot11b(1)
  1364. dot11a(2)
  1365. unknown(3)
  1366. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1367. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1368. bsnRogueAPAirespaceAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1369. %parm[#11]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1370. </descr>
  1371. <logmsg dest='logndisplay'>&lt;p&gt;
  1372. bsnRogueAPDetected trap received
  1373. bsnRogueAPDot11MacAddress=%parm[#1]%
  1374. bsnRogueAPAirespaceAPMacAddress=%parm[#2]%
  1375. bsnRogueAPAirespaceAPSlotId=%parm[#3]%
  1376. bsnRogueAPSsid=%parm[#4]%
  1377. bsnRogueAPChannelNumber=%parm[#5]%
  1378. bsnRogueAPAirespaceAPRSSI=%parm[#6]%
  1379. bsnRogueAPAirespaceAPSNR=%parm[#7]%
  1380. bsnRogueAPOnWiredNetwork=%parm[#8]%
  1381. bsnRogueAdhocMode=%parm[#9]%
  1382. bsnRogueAPRadioType=%parm[#10]%
  1383. bsnRogueAPAirespaceAPName=%parm[#11]%&lt;/p&gt;
  1384. </logmsg>
  1385. <severity>Warning</severity>
  1386. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[11]%" alarm-type="1" auto-clean="false" />
  1387. </event>
  1388. <event>
  1389. <mask>
  1390. <maskelement>
  1391. <mename>id</mename>
  1392. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1393. </maskelement>
  1394. <maskelement>
  1395. <mename>generic</mename>
  1396. <mevalue>6</mevalue>
  1397. </maskelement>
  1398. <maskelement>
  1399. <mename>specific</mename>
  1400. <mevalue>37</mevalue>
  1401. </maskelement>
  1402. </mask>
  1403. <uei>uei.opennms.org/vendor/cisco/bsnAPLoadProfileUpdatedToPass</uei>
  1404. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPLoadProfileUpdatedToPass</event-label>
  1405. <descr>
  1406. &lt;p&gt;When LOAD Profile state changes from FAIL to PASSt this
  1407. notification will be sent with Dot3 MAC address of Airespace
  1408. AP and slot ID of Airespace AP IF. This trap sending can be
  1409. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  1410. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1411. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1412. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1413. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1414. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1415. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1416. </descr>
  1417. <logmsg dest='logndisplay'>&lt;p&gt;
  1418. bsnAPLoadProfileUpdatedToPass trap received
  1419. bsnAPDot3MacAddress=%parm[#1]%
  1420. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  1421. </logmsg>
  1422. <severity>Normal</severity>
  1423. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPLoadProfileFailed:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
  1424. </event>
  1425. <event>
  1426. <mask>
  1427. <maskelement>
  1428. <mename>id</mename>
  1429. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1430. </maskelement>
  1431. <maskelement>
  1432. <mename>generic</mename>
  1433. <mevalue>6</mevalue>
  1434. </maskelement>
  1435. <maskelement>
  1436. <mename>specific</mename>
  1437. <mevalue>38</mevalue>
  1438. </maskelement>
  1439. </mask>
  1440. <uei>uei.opennms.org/vendor/cisco/bsnAPNoiseProfileUpdatedToPass</uei>
  1441. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPNoiseProfileUpdatedToPass</event-label>
  1442. <descr>
  1443. &lt;p&gt;When Noise Profile state changes from FAIL tp PASS,
  1444. notification will be sent with Dot3 MAC address of Airespace
  1445. AP and slot ID of Airespace AP IF. This trap sending can be
  1446. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  1447. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1448. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1449. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1450. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1451. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1452. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1453. </descr>
  1454. <logmsg dest='logndisplay'>&lt;p&gt;
  1455. bsnAPNoiseProfileUpdatedToPass trap received
  1456. bsnAPDot3MacAddress=%parm[#1]%
  1457. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  1458. </logmsg>
  1459. <severity>Normal</severity>
  1460. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPNoiseProfileFailed:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
  1461. </event>
  1462. <event>
  1463. <mask>
  1464. <maskelement>
  1465. <mename>id</mename>
  1466. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1467. </maskelement>
  1468. <maskelement>
  1469. <mename>generic</mename>
  1470. <mevalue>6</mevalue>
  1471. </maskelement>
  1472. <maskelement>
  1473. <mename>specific</mename>
  1474. <mevalue>39</mevalue>
  1475. </maskelement>
  1476. </mask>
  1477. <uei>uei.opennms.org/vendor/cisco/bsnAPInterferenceProfileUpdatedToPass</uei>
  1478. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPInterferenceProfileUpdatedToPass</event-label>
  1479. <descr>
  1480. &lt;p&gt;When Interference Profile state changes from FAIL tp PASS,
  1481. notification will be sent with Dot3 MAC address of Airespace
  1482. AP and slot ID of Airespace AP IF. This trap sending can be
  1483. enable /disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  1484. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1485. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1486. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1487. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1488. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1489. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1490. </descr>
  1491. <logmsg dest='logndisplay'>&lt;p&gt;
  1492. bsnAPInterferenceProfileUpdatedToPass trap received
  1493. bsnAPDot3MacAddress=%parm[#1]%
  1494. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  1495. </logmsg>
  1496. <severity>Normal</severity>
  1497. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPInterferenceProfileFailed:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
  1498. </event>
  1499. <event>
  1500. <mask>
  1501. <maskelement>
  1502. <mename>id</mename>
  1503. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1504. </maskelement>
  1505. <maskelement>
  1506. <mename>generic</mename>
  1507. <mevalue>6</mevalue>
  1508. </maskelement>
  1509. <maskelement>
  1510. <mename>specific</mename>
  1511. <mevalue>40</mevalue>
  1512. </maskelement>
  1513. </mask>
  1514. <uei>uei.opennms.org/vendor/cisco/bsnAPCoverageProfileUpdatedToPass</uei>
  1515. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCoverageProfileUpdatedToPass</event-label>
  1516. <descr>
  1517. &lt;p&gt;When Coverage Profile state changes from FAIL tp PASS,
  1518. notification will be sent with Dot3 MAC address of Airespace
  1519. AP and slot ID of Airespace AP IF. This trap sending can be
  1520. enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
  1521. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1522. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1523. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1524. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1525. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1526. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1527. </descr>
  1528. <logmsg dest='logndisplay'>&lt;p&gt;
  1529. bsnAPCoverageProfileUpdatedToPass trap received
  1530. bsnAPDot3MacAddress=%parm[#1]%
  1531. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  1532. </logmsg>
  1533. <severity>Normal</severity>
  1534. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPCoverageProfileFailed:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
  1535. </event>
  1536. <event>
  1537. <mask>
  1538. <maskelement>
  1539. <mename>id</mename>
  1540. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1541. </maskelement>
  1542. <maskelement>
  1543. <mename>generic</mename>
  1544. <mevalue>6</mevalue>
  1545. </maskelement>
  1546. <maskelement>
  1547. <mename>specific</mename>
  1548. <mevalue>41</mevalue>
  1549. </maskelement>
  1550. </mask>
  1551. <uei>uei.opennms.org/vendor/cisco/bsnRogueAPRemoved</uei>
  1552. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPRemoved</event-label>
  1553. <descr>
  1554. &lt;p&gt;When a Rogue AP that was detected earlier no longer exists
  1555. this Trap will be sent out along
  1556. with APMacAddress on which its detected&lt;/p&gt;&lt;table&gt;
  1557. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1558. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1559. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1560. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1561. bsnRogueAPAirespaceAPMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1562. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1563. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1564. bsnRogueAPAirespaceAPSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1565. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1566. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1567. bsnRogueAPRadioType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1568. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  1569. dot11b(1)
  1570. dot11a(2)
  1571. unknown(3)
  1572. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1573. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1574. bsnRogueAPAirespaceAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1575. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1576. </descr>
  1577. <logmsg dest='logndisplay'>&lt;p&gt;
  1578. bsnRogueAPRemoved trap received
  1579. bsnRogueAPDot11MacAddress=%parm[#1]%
  1580. bsnRogueAPAirespaceAPMacAddress=%parm[#2]%
  1581. bsnRogueAPAirespaceAPSlotId=%parm[#3]%
  1582. bsnRogueAPRadioType=%parm[#4]%
  1583. bsnRogueAPAirespaceAPName=%parm[#5]%&lt;/p&gt;
  1584. </logmsg>
  1585. <severity>Normal</severity>
  1586. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#5]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnRogueAPDetected:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#5]%" auto-clean="false" />
  1587. </event>
  1588. <event>
  1589. <mask>
  1590. <maskelement>
  1591. <mename>id</mename>
  1592. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1593. </maskelement>
  1594. <maskelement>
  1595. <mename>generic</mename>
  1596. <mevalue>6</mevalue>
  1597. </maskelement>
  1598. <maskelement>
  1599. <mename>specific</mename>
  1600. <mevalue>42</mevalue>
  1601. </maskelement>
  1602. </mask>
  1603. <uei>uei.opennms.org/vendor/cisco/bsnRadiosExceedLicenseCount</uei>
  1604. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRadiosExceedLicenseCount</event-label>
  1605. <descr>
  1606. &lt;p&gt;Whenever the currently associated Radios exceed the License Count
  1607. This trap will be sent to annoy the Customer&lt;/p&gt;&lt;table&gt;
  1608. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1609. bsnCurrentRadiosCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1610. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1611. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1612. bsnLicenseRadioCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1613. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1614. </descr>
  1615. <logmsg dest='logndisplay'>&lt;p&gt;
  1616. bsnRadiosExceedLicenseCount trap received
  1617. bsnCurrentRadiosCount=%parm[#1]%
  1618. bsnLicenseRadioCount=%parm[#2]%&lt;/p&gt;
  1619. </logmsg>
  1620. <severity>Warning</severity>
  1621. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
  1622. </event>
  1623. <event>
  1624. <mask>
  1625. <maskelement>
  1626. <mename>id</mename>
  1627. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1628. </maskelement>
  1629. <maskelement>
  1630. <mename>generic</mename>
  1631. <mevalue>6</mevalue>
  1632. </maskelement>
  1633. <maskelement>
  1634. <mename>specific</mename>
  1635. <mevalue>43</mevalue>
  1636. </maskelement>
  1637. </mask>
  1638. <uei>uei.opennms.org/vendor/cisco/bsnSensedTemperatureOutOfRange</uei>
  1639. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnSensedTemperatureTooHigh</event-label>
  1640. <descr>
  1641. &lt;p&gt;Temperature sensor temp too High - temp is too high on the unit.
  1642. Immediate action should be taken&lt;/p&gt;&lt;table&gt;
  1643. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1644. bsnSensorTemperature&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1645. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1646. </descr>
  1647. <logmsg dest='logndisplay'>&lt;p&gt;
  1648. bsnSensedTemperatureTooHigh trap received
  1649. bsnSensorTemperature=%parm[#1]%&lt;/p&gt;
  1650. </logmsg>
  1651. <severity>Minor</severity>
  1652. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
  1653. </event>
  1654. <event>
  1655. <mask>
  1656. <maskelement>
  1657. <mename>id</mename>
  1658. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1659. </maskelement>
  1660. <maskelement>
  1661. <mename>generic</mename>
  1662. <mevalue>6</mevalue>
  1663. </maskelement>
  1664. <maskelement>
  1665. <mename>specific</mename>
  1666. <mevalue>44</mevalue>
  1667. </maskelement>
  1668. </mask>
  1669. <uei>uei.opennms.org/vendor/cisco/bsnSensedTemperatureOutOfRange</uei>
  1670. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnSensedTemperatureTooLow</event-label>
  1671. <descr>
  1672. &lt;p&gt;Temperature sensor temp too Low - temp is too low on the unit.
  1673. Immediate action should be taken&lt;/p&gt;&lt;table&gt;
  1674. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1675. bsnSensorTemperature&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1676. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1677. </descr>
  1678. <logmsg dest='logndisplay'>&lt;p&gt;
  1679. bsnSensedTemperatureTooLow trap received
  1680. bsnSensorTemperature=%parm[#1]%&lt;/p&gt;
  1681. </logmsg>
  1682. <severity>Minor</severity>
  1683. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
  1684. </event>
  1685. <event>
  1686. <mask>
  1687. <maskelement>
  1688. <mename>id</mename>
  1689. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1690. </maskelement>
  1691. <maskelement>
  1692. <mename>generic</mename>
  1693. <mevalue>6</mevalue>
  1694. </maskelement>
  1695. <maskelement>
  1696. <mename>specific</mename>
  1697. <mevalue>45</mevalue>
  1698. </maskelement>
  1699. </mask>
  1700. <uei>uei.opennms.org/vendor/cisco/bsnTemperatureSensorFailure</uei>
  1701. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTemperatureSensorFailure</event-label>
  1702. <descr>
  1703. &lt;p&gt;Temperature sensor hw failure - temp sensor has failed.
  1704. Temperature is unknown&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
  1705. </descr>
  1706. <logmsg dest='logndisplay'>&lt;p&gt;
  1707. bsnTemperatureSensorFailure trap received&lt;/p&gt;
  1708. </logmsg>
  1709. <severity>Warning</severity>
  1710. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
  1711. </event>
  1712. <event>
  1713. <mask>
  1714. <maskelement>
  1715. <mename>id</mename>
  1716. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1717. </maskelement>
  1718. <maskelement>
  1719. <mename>generic</mename>
  1720. <mevalue>6</mevalue>
  1721. </maskelement>
  1722. <maskelement>
  1723. <mename>specific</mename>
  1724. <mevalue>46</mevalue>
  1725. </maskelement>
  1726. </mask>
  1727. <uei>uei.opennms.org/vendor/cisco/bsnTemperatureSensorClear</uei>
  1728. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTemperatureSensorClear</event-label>
  1729. <descr>
  1730. &lt;p&gt;Temperature sensor clear -- temp sensor alarm condition is over.
  1731. sensor is operating within proper temp range&lt;/p&gt;&lt;table&gt;
  1732. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1733. bsnSensorTemperature&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1734. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1735. </descr>
  1736. <logmsg dest='logndisplay'>&lt;p&gt;
  1737. bsnTemperatureSensorClear trap received
  1738. bsnSensorTemperature=%parm[#1]%&lt;/p&gt;
  1739. </logmsg>
  1740. <severity>Normal</severity>
  1741. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnSensedTemperatureOutOfRange:%dpname%:%nodeid%:%interface%" auto-clean="false" />
  1742. </event>
  1743. <event>
  1744. <mask>
  1745. <maskelement>
  1746. <mename>id</mename>
  1747. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1748. </maskelement>
  1749. <maskelement>
  1750. <mename>generic</mename>
  1751. <mevalue>6</mevalue>
  1752. </maskelement>
  1753. <maskelement>
  1754. <mename>specific</mename>
  1755. <mevalue>47</mevalue>
  1756. </maskelement>
  1757. </mask>
  1758. <uei>uei.opennms.org/vendor/cisco/bsnPOEControllerFailure</uei>
  1759. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnPOEControllerFailure</event-label>
  1760. <descr>
  1761. &lt;p&gt;POE Controller has failed. Its a very critical trap.
  1762. User intervention is required.&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
  1763. </descr>
  1764. <logmsg dest='logndisplay'>&lt;p&gt;
  1765. bsnPOEControllerFailure trap received&lt;/p&gt;
  1766. </logmsg>
  1767. <severity>Major</severity>
  1768. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1769. </event>
  1770. <event>
  1771. <mask>
  1772. <maskelement>
  1773. <mename>id</mename>
  1774. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1775. </maskelement>
  1776. <maskelement>
  1777. <mename>generic</mename>
  1778. <mevalue>6</mevalue>
  1779. </maskelement>
  1780. <maskelement>
  1781. <mename>specific</mename>
  1782. <mevalue>48</mevalue>
  1783. </maskelement>
  1784. </mask>
  1785. <uei>uei.opennms.org/vendor/cisco/bsnMaxRogueCountExceeded</uei>
  1786. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnMaxRogueCountExceeded</event-label>
  1787. <descr>
  1788. &lt;p&gt;The number of rogues has exceeded the maximum Rogues allowed&lt;/p&gt;&lt;table&gt;
  1789. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1790. bsnMaxRogueCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1791. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1792. </descr>
  1793. <logmsg dest='logndisplay'>&lt;p&gt;
  1794. bsnMaxRogueCountExceeded trap received
  1795. bsnMaxRogueCount=%parm[#1]%&lt;/p&gt;
  1796. </logmsg>
  1797. <severity>Minor</severity>
  1798. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1799. </event>
  1800. <event>
  1801. <mask>
  1802. <maskelement>
  1803. <mename>id</mename>
  1804. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1805. </maskelement>
  1806. <maskelement>
  1807. <mename>generic</mename>
  1808. <mevalue>6</mevalue>
  1809. </maskelement>
  1810. <maskelement>
  1811. <mename>specific</mename>
  1812. <mevalue>49</mevalue>
  1813. </maskelement>
  1814. </mask>
  1815. <uei>uei.opennms.org/vendor/cisco/bsnMaxRogueCountClear</uei>
  1816. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnMaxRogueCountClear</event-label>
  1817. <descr>
  1818. &lt;p&gt;The number of rogues is within the maximum Rogues allowed&lt;/p&gt;&lt;table&gt;
  1819. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1820. bsnMaxRogueCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1821. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1822. </descr>
  1823. <logmsg dest='logndisplay'>&lt;p&gt;
  1824. bsnMaxRogueCountClear trap received
  1825. bsnMaxRogueCount=%parm[#1]%&lt;/p&gt;
  1826. </logmsg>
  1827. <severity>Normal</severity>
  1828. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnMaxRogueCountExceeded:%dpname%:%nodeid%:%interface%" auto-clean="false" />
  1829. </event>
  1830. <event>
  1831. <mask>
  1832. <maskelement>
  1833. <mename>id</mename>
  1834. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1835. </maskelement>
  1836. <maskelement>
  1837. <mename>generic</mename>
  1838. <mevalue>6</mevalue>
  1839. </maskelement>
  1840. <maskelement>
  1841. <mename>specific</mename>
  1842. <mevalue>50</mevalue>
  1843. </maskelement>
  1844. </mask>
  1845. <uei>uei.opennms.org/vendor/cisco/bsnApMaxRogueCountExceeded</uei>
  1846. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnApMaxRogueCountExceeded</event-label>
  1847. <descr>
  1848. &lt;p&gt;The number of rogues has exceeded the maximum Rogues allowed on
  1849. the AP&lt;/p&gt;&lt;table&gt;
  1850. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1851. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1852. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1853. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1854. bsnMaxRogueCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1855. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1856. </descr>
  1857. <logmsg dest='logndisplay'>&lt;p&gt;
  1858. bsnApMaxRogueCountExceeded trap received
  1859. bsnAPMacAddrTrapVariable=%parm[#1]%
  1860. bsnMaxRogueCount=%parm[#2]%&lt;/p&gt;
  1861. </logmsg>
  1862. <severity>Minor</severity>
  1863. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  1864. </event>
  1865. <event>
  1866. <mask>
  1867. <maskelement>
  1868. <mename>id</mename>
  1869. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1870. </maskelement>
  1871. <maskelement>
  1872. <mename>generic</mename>
  1873. <mevalue>6</mevalue>
  1874. </maskelement>
  1875. <maskelement>
  1876. <mename>specific</mename>
  1877. <mevalue>51</mevalue>
  1878. </maskelement>
  1879. </mask>
  1880. <uei>uei.opennms.org/vendor/cisco/bsnApMaxRogueCountClear</uei>
  1881. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnApMaxRogueCountClear</event-label>
  1882. <descr>
  1883. &lt;p&gt;The number of rogues is within the maximum Rogues allowed on the
  1884. AP&lt;/p&gt;&lt;table&gt;
  1885. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1886. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1887. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1888. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1889. bsnMaxRogueCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1890. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1891. </descr>
  1892. <logmsg dest='logndisplay'>&lt;p&gt;
  1893. bsnApMaxRogueCountClear trap received
  1894. bsnAPMacAddrTrapVariable=%parm[#1]%
  1895. bsnMaxRogueCount=%parm[#2]%&lt;/p&gt;
  1896. </logmsg>
  1897. <severity>Normal</severity>
  1898. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnApMaxRogueCountExceeded:%dpname%:%nodeid%:%interface%" auto-clean="false" />
  1899. </event>
  1900. <event>
  1901. <mask>
  1902. <maskelement>
  1903. <mename>id</mename>
  1904. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1905. </maskelement>
  1906. <maskelement>
  1907. <mename>generic</mename>
  1908. <mevalue>6</mevalue>
  1909. </maskelement>
  1910. <maskelement>
  1911. <mename>specific</mename>
  1912. <mevalue>52</mevalue>
  1913. </maskelement>
  1914. </mask>
  1915. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationBlacklisted</uei>
  1916. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationBlacklisted</event-label>
  1917. <descr>
  1918. &lt;p&gt;The station blacklisted notification shall be sent when the
  1919. client is blacklisted. The reason could be repeated auth or
  1920. association failures or IP Address theft.
  1921. The value of the notification shall include the MAC address
  1922. of the MAC to which the Authentication frame was sent, the
  1923. MAC and Slot Id of AP that client was associated to and the
  1924. reason for black listing.&lt;/p&gt;&lt;table&gt;
  1925. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1926. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1927. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1928. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1929. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1930. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1931. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1932. bsnStationBlacklistingReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1933. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  1934. failed80211Auth(1)
  1935. failedAssociation(2)
  1936. ipTheft(3)
  1937. failed8021xAuth(4)
  1938. failedWebAuth(5)
  1939. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1940. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1941. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1942. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1943. </descr>
  1944. <logmsg dest='logndisplay'>&lt;p&gt;
  1945. bsnDot11StationBlacklisted trap received
  1946. bsnStationAPMacAddr=%parm[#1]%
  1947. bsnStationAPIfSlotId=%parm[#2]%
  1948. bsnStationBlacklistingReasonCode=%parm[#3]%
  1949. bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  1950. </logmsg>
  1951. <severity>Warning</severity>
  1952. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  1953. </event>
  1954. <event>
  1955. <mask>
  1956. <maskelement>
  1957. <mename>id</mename>
  1958. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  1959. </maskelement>
  1960. <maskelement>
  1961. <mename>generic</mename>
  1962. <mevalue>6</mevalue>
  1963. </maskelement>
  1964. <maskelement>
  1965. <mename>specific</mename>
  1966. <mevalue>53</mevalue>
  1967. </maskelement>
  1968. </mask>
  1969. <uei>uei.opennms.org/vendor/cisco/bsnDot11StationAssociate</uei>
  1970. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAssociate</event-label>
  1971. <descr>
  1972. &lt;p&gt;The associate notification shall be sent when any of the
  1973. watchlisted clients(present on at least one watch list)
  1974. associates with an AP. The value of the notification
  1975. shall include the MAC address and the Slot ID of the radio
  1976. to which the station Associated.&lt;/p&gt;&lt;table&gt;
  1977. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1978. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1979. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1980. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1981. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1982. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1983. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1984. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1985. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  1986. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  1987. bsnStationUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  1988. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  1989. </descr>
  1990. <logmsg dest='logndisplay'>&lt;p&gt;
  1991. bsnDot11StationAssociate trap received
  1992. bsnStationAPMacAddr=%parm[#1]%
  1993. bsnStationAPIfSlotId=%parm[#2]%
  1994. bsnStationMacAddress=%parm[#3]%
  1995. bsnStationUserName=%parm[#4]%&lt;/p&gt;
  1996. </logmsg>
  1997. <severity>Major</severity>
  1998. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  1999. </event>
  2000. <event>
  2001. <mask>
  2002. <maskelement>
  2003. <mename>id</mename>
  2004. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2005. </maskelement>
  2006. <maskelement>
  2007. <mename>generic</mename>
  2008. <mevalue>6</mevalue>
  2009. </maskelement>
  2010. <maskelement>
  2011. <mename>specific</mename>
  2012. <mevalue>55</mevalue>
  2013. </maskelement>
  2014. </mask>
  2015. <uei>uei.opennms.org/vendor/cisco/bsnApBigNavDosAttack</uei>
  2016. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnApBigNavDosAttack</event-label>
  2017. <descr>
  2018. &lt;p&gt;The AP sent a string of messages with large NAV field and all
  2019. 802.11 traffic on that channel was suspended.&lt;/p&gt;&lt;table&gt;
  2020. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2021. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2022. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2023. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2024. bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2025. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2026. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2027. bsnNavDosAttackSourceMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2028. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2029. </descr>
  2030. <logmsg dest='logndisplay'>&lt;p&gt;
  2031. bsnApBigNavDosAttack trap received
  2032. bsnAPMacAddrTrapVariable=%parm[#1]%
  2033. bsnAPSlotIdTrapVariable=%parm[#2]%
  2034. bsnNavDosAttackSourceMacAddr=%parm[#3]%&lt;/p&gt;
  2035. </logmsg>
  2036. <severity>Minor</severity>
  2037. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  2038. </event>
  2039. <event>
  2040. <mask>
  2041. <maskelement>
  2042. <mename>id</mename>
  2043. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2044. </maskelement>
  2045. <maskelement>
  2046. <mename>generic</mename>
  2047. <mevalue>6</mevalue>
  2048. </maskelement>
  2049. <maskelement>
  2050. <mename>specific</mename>
  2051. <mevalue>56</mevalue>
  2052. </maskelement>
  2053. </mask>
  2054. <uei>uei.opennms.org/vendor/cisco/bsnTooManyUnsuccessLoginAttempts</uei>
  2055. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTooManyUnsuccessLoginAttempts</event-label>
  2056. <descr>
  2057. &lt;p&gt;The Management User made too many unsuccessful login attempts.&lt;/p&gt;&lt;table&gt;
  2058. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2059. bsnUserIpAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2060. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2061. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2062. bsnStationUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2063. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2064. </descr>
  2065. <logmsg dest='logndisplay'>&lt;p&gt;
  2066. bsnTooManyUnsuccessLoginAttempts trap received
  2067. bsnUserIpAddress=%parm[#1]%
  2068. bsnStationUserName=%parm[#2]%&lt;/p&gt;
  2069. </logmsg>
  2070. <severity>Warning</severity>
  2071. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  2072. </event>
  2073. <event>
  2074. <mask>
  2075. <maskelement>
  2076. <mename>id</mename>
  2077. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2078. </maskelement>
  2079. <maskelement>
  2080. <mename>generic</mename>
  2081. <mevalue>6</mevalue>
  2082. </maskelement>
  2083. <maskelement>
  2084. <mename>specific</mename>
  2085. <mevalue>57</mevalue>
  2086. </maskelement>
  2087. </mask>
  2088. <uei>uei.opennms.org/vendor/cisco/bsnWepKeyDecryptError</uei>
  2089. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnWepKeyDecryptError</event-label>
  2090. <descr>
  2091. &lt;p&gt;Issued when a decrypt error occurrs. The WEP Key configured at
  2092. the station may be wrong.&lt;/p&gt;&lt;table&gt;
  2093. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2094. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2095. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2096. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2097. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2098. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2099. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2100. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2101. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2102. </descr>
  2103. <logmsg dest='logndisplay'>&lt;p&gt;
  2104. bsnWepKeyDecryptError trap received
  2105. bsnStationMacAddress=%parm[#1]%
  2106. bsnStationAPMacAddr=%parm[#2]%
  2107. bsnStationAPIfSlotId=%parm[#3]%&lt;/p&gt;
  2108. </logmsg>
  2109. <severity>Normal</severity>
  2110. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="true" />
  2111. </event>
  2112. <event>
  2113. <mask>
  2114. <maskelement>
  2115. <mename>id</mename>
  2116. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2117. </maskelement>
  2118. <maskelement>
  2119. <mename>generic</mename>
  2120. <mevalue>6</mevalue>
  2121. </maskelement>
  2122. <maskelement>
  2123. <mename>specific</mename>
  2124. <mevalue>58</mevalue>
  2125. </maskelement>
  2126. </mask>
  2127. <uei>uei.opennms.org/vendor/cisco/bsnWpaMicErrorCounterActivated</uei>
  2128. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnWpaMicErrorCounterActivated</event-label>
  2129. <descr>
  2130. &lt;p&gt;Issued when a WPA MIC error occurs and a counter measure is
  2131. activated at the AP.&lt;/p&gt;&lt;table&gt;
  2132. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2133. bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2134. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2135. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2136. bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2137. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2138. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2139. bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2140. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2141. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2142. bsnWlanIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2143. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2144. </descr>
  2145. <logmsg dest='logndisplay'>&lt;p&gt;
  2146. bsnWpaMicErrorCounterActivated trap received
  2147. bsnStationMacAddress=%parm[#1]%
  2148. bsnStationAPMacAddr=%parm[#2]%
  2149. bsnStationAPIfSlotId=%parm[#3]%
  2150. bsnWlanIdTrapVariable=%parm[#4]%&lt;/p&gt;
  2151. </logmsg>
  2152. <severity>Minor</severity>
  2153. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%" alarm-type="1" auto-clean="true" />
  2154. </event>
  2155. <event>
  2156. <mask>
  2157. <maskelement>
  2158. <mename>id</mename>
  2159. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2160. </maskelement>
  2161. <maskelement>
  2162. <mename>generic</mename>
  2163. <mevalue>6</mevalue>
  2164. </maskelement>
  2165. <maskelement>
  2166. <mename>specific</mename>
  2167. <mevalue>59</mevalue>
  2168. </maskelement>
  2169. <varbind>
  2170. <vbnumber>2</vbnumber>
  2171. <vbvalue>0</vbvalue>
  2172. </varbind>
  2173. </mask>
  2174. <uei>uei.opennms.org/vendor/cisco/bsnRogueAPDetectedOnWiredNetworkClear</uei>
  2175. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPDetectedOnWiredNetwork</event-label>
  2176. <descr>
  2177. &lt;p&gt;When a Rogue is detected on the wired network this trap will
  2178. be sent out.
  2179. The same trap with bsnRogueAPOnWiredNetwork set to no will
  2180. clear the previous trap.&lt;/p&gt;&lt;table&gt;
  2181. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2182. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2183. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2184. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2185. bsnRogueAPOnWiredNetwork&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2186. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2187. no(0)
  2188. yes(1)
  2189. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2190. </descr>
  2191. <logmsg dest='logndisplay'>&lt;p&gt;
  2192. bsnRogueAPDetectedOnWiredNetwork trap received
  2193. bsnRogueAPDot11MacAddress=%parm[#1]%
  2194. bsnRogueAPOnWiredNetwork=%parm[#2]%&lt;/p&gt;
  2195. </logmsg>
  2196. <severity>Minor</severity>
  2197. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnRogueAPDetectedOnWiredNetwork:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  2198. </event>
  2199. <event>
  2200. <mask>
  2201. <maskelement>
  2202. <mename>id</mename>
  2203. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2204. </maskelement>
  2205. <maskelement>
  2206. <mename>generic</mename>
  2207. <mevalue>6</mevalue>
  2208. </maskelement>
  2209. <maskelement>
  2210. <mename>specific</mename>
  2211. <mevalue>59</mevalue>
  2212. </maskelement>
  2213. </mask>
  2214. <uei>uei.opennms.org/vendor/cisco/bsnRogueAPDetectedOnWiredNetwork</uei>
  2215. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPDetectedOnWiredNetwork</event-label>
  2216. <descr>
  2217. &lt;p&gt;When a Rogue is detected on the wired network this trap will
  2218. be sent out.
  2219. The same trap with bsnRogueAPOnWiredNetwork set to no will
  2220. clear the previous trap.&lt;/p&gt;&lt;table&gt;
  2221. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2222. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2223. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2224. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2225. bsnRogueAPOnWiredNetwork&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2226. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2227. no(0)
  2228. yes(1)
  2229. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2230. </descr>
  2231. <logmsg dest='logndisplay'>&lt;p&gt;
  2232. bsnRogueAPDetectedOnWiredNetwork trap received
  2233. bsnRogueAPDot11MacAddress=%parm[#1]%
  2234. bsnRogueAPOnWiredNetwork=%parm[#2]%&lt;/p&gt;
  2235. </logmsg>
  2236. <severity>Minor</severity>
  2237. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  2238. </event>
  2239. <event>
  2240. <mask>
  2241. <maskelement>
  2242. <mename>id</mename>
  2243. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2244. </maskelement>
  2245. <maskelement>
  2246. <mename>generic</mename>
  2247. <mevalue>6</mevalue>
  2248. </maskelement>
  2249. <maskelement>
  2250. <mename>specific</mename>
  2251. <mevalue>60</mevalue>
  2252. </maskelement>
  2253. </mask>
  2254. <uei>uei.opennms.org/vendor/cisco/bsnApHasNoRadioCards</uei>
  2255. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnApHasNoRadioCards</event-label>
  2256. <descr>
  2257. &lt;p&gt;When an AP has no radio cards present on it, the switch
  2258. sends this trap.&lt;/p&gt;&lt;table&gt;
  2259. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2260. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2261. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2262. </descr>
  2263. <logmsg dest='logndisplay'>&lt;p&gt;
  2264. bsnApHasNoRadioCards trap received
  2265. bsnAPMacAddrTrapVariable=%parm[#1]%&lt;/p&gt;
  2266. </logmsg>
  2267. <severity>Minor</severity>
  2268. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  2269. </event>
  2270. <event>
  2271. <mask>
  2272. <maskelement>
  2273. <mename>id</mename>
  2274. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2275. </maskelement>
  2276. <maskelement>
  2277. <mename>generic</mename>
  2278. <mevalue>6</mevalue>
  2279. </maskelement>
  2280. <maskelement>
  2281. <mename>specific</mename>
  2282. <mevalue>61</mevalue>
  2283. </maskelement>
  2284. <varbind>
  2285. <vbnumber>1</vbnumber>
  2286. <vbvalue>1</vbvalue>
  2287. </varbind>
  2288. <varbind>
  2289. <vbnumber>5</vbnumber>
  2290. <vbvalue>1</vbvalue>
  2291. </varbind>
  2292. </mask>
  2293. <uei>uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedByAPClear</uei>
  2294. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDuplicateIpAddressReported</event-label>
  2295. <descr>
  2296. &lt;p&gt;This trap is issued when the switch or an AP detects another
  2297. machine using its IP Address. The first variable has value
  2298. yes if the duplicate IP is reported by an AP. In that case,
  2299. the second attribute will carry the AP MAC Address. The third
  2300. variable is the duplicate IP address in question and the last
  2301. attribute is the MAC Address of the machine that is found to
  2302. be using the duplicate IP.&lt;/p&gt;&lt;table&gt;
  2303. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2304. bsnDuplicateIpReportedByAP&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2305. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2306. no(0)
  2307. yes(1)
  2308. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2309. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2310. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2311. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2312. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2313. bsnDuplicateIpTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2314. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2315. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2316. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2317. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2318. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2319. bsnDuplicateIpTrapClear&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2320. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2321. false(0)
  2322. true(1)
  2323. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2324. </descr>
  2325. <logmsg dest='logndisplay'>&lt;p&gt;
  2326. bsnDuplicateIpAddressReported trap received
  2327. bsnDuplicateIpReportedByAP=%parm[#1]%
  2328. bsnAPMacAddrTrapVariable=%parm[#2]%
  2329. bsnDuplicateIpTrapVariable=%parm[#3]%
  2330. bsnRogueAPDot11MacAddress=%parm[#4]%
  2331. bsnDuplicateIpTrapClear=%parm[#5]%&lt;/p&gt;
  2332. </logmsg>
  2333. <severity>Normal</severity>
  2334. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedByAP:%dpname%:%nodeid%:%interface%:%parm[#2]%" auto-clean="false" />
  2335. </event>
  2336. <event>
  2337. <mask>
  2338. <maskelement>
  2339. <mename>id</mename>
  2340. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2341. </maskelement>
  2342. <maskelement>
  2343. <mename>generic</mename>
  2344. <mevalue>6</mevalue>
  2345. </maskelement>
  2346. <maskelement>
  2347. <mename>specific</mename>
  2348. <mevalue>61</mevalue>
  2349. </maskelement>
  2350. <varbind>
  2351. <vbnumber>1</vbnumber>
  2352. <vbvalue>1</vbvalue>
  2353. </varbind>
  2354. </mask>
  2355. <uei>uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedByAP</uei>
  2356. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDuplicateIpAddressReported</event-label>
  2357. <descr>
  2358. &lt;p&gt;This trap is issued when the switch or an AP detects another
  2359. machine using its IP Address. The first variable has value
  2360. yes if the duplicate IP is reported by an AP. In that case,
  2361. the second attribute will carry the AP MAC Address. The third
  2362. variable is the duplicate IP address in question and the last
  2363. attribute is the MAC Address of the machine that is found to
  2364. be using the duplicate IP.&lt;/p&gt;&lt;table&gt;
  2365. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2366. bsnDuplicateIpReportedByAP&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2367. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2368. no(0)
  2369. yes(1)
  2370. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2371. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2372. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2373. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2374. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2375. bsnDuplicateIpTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2376. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2377. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2378. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2379. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2380. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2381. bsnDuplicateIpTrapClear&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2382. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2383. false(0)
  2384. true(1)
  2385. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2386. </descr>
  2387. <logmsg dest='logndisplay'>&lt;p&gt;
  2388. bsnDuplicateIpAddressReported trap received
  2389. bsnDuplicateIpReportedByAP=%parm[#1]%
  2390. bsnAPMacAddrTrapVariable=%parm[#2]%
  2391. bsnDuplicateIpTrapVariable=%parm[#3]%
  2392. bsnRogueAPDot11MacAddress=%parm[#4]%
  2393. bsnDuplicateIpTrapClear=%parm[#5]%&lt;/p&gt;
  2394. </logmsg>
  2395. <severity>Minor</severity>
  2396. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  2397. </event>
  2398. <event>
  2399. <mask>
  2400. <maskelement>
  2401. <mename>id</mename>
  2402. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2403. </maskelement>
  2404. <maskelement>
  2405. <mename>generic</mename>
  2406. <mevalue>6</mevalue>
  2407. </maskelement>
  2408. <maskelement>
  2409. <mename>specific</mename>
  2410. <mevalue>61</mevalue>
  2411. </maskelement>
  2412. <varbind>
  2413. <vbnumber>5</vbnumber>
  2414. <vbvalue>1</vbvalue>
  2415. </varbind>
  2416. </mask>
  2417. <uei>uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedBySwitchClear</uei>
  2418. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDuplicateIpAddressReported</event-label>
  2419. <descr>
  2420. &lt;p&gt;This trap is issued when the switch or an AP detects another
  2421. machine using its IP Address. The first variable has value
  2422. yes if the duplicate IP is reported by an AP. In that case,
  2423. the second attribute will carry the AP MAC Address. The third
  2424. variable is the duplicate IP address in question and the last
  2425. attribute is the MAC Address of the machine that is found to
  2426. be using the duplicate IP.&lt;/p&gt;&lt;table&gt;
  2427. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2428. bsnDuplicateIpReportedByAP&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2429. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2430. no(0)
  2431. yes(1)
  2432. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2433. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2434. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2435. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2436. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2437. bsnDuplicateIpTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2438. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2439. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2440. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2441. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2442. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2443. bsnDuplicateIpTrapClear&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2444. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2445. false(0)
  2446. true(1)
  2447. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2448. </descr>
  2449. <logmsg dest='logndisplay'>&lt;p&gt;
  2450. bsnDuplicateIpAddressReported trap received
  2451. bsnDuplicateIpReportedByAP=%parm[#1]%
  2452. bsnAPMacAddrTrapVariable=%parm[#2]%
  2453. bsnDuplicateIpTrapVariable=%parm[#3]%
  2454. bsnRogueAPDot11MacAddress=%parm[#4]%
  2455. bsnDuplicateIpTrapClear=%parm[#5]%&lt;/p&gt;
  2456. </logmsg>
  2457. <severity>Normal</severity>
  2458. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedBySwitch:%dpname%:%nodeid%:%interface%:%parm[#3]%" auto-clean="false" />
  2459. </event>
  2460. <event>
  2461. <mask>
  2462. <maskelement>
  2463. <mename>id</mename>
  2464. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2465. </maskelement>
  2466. <maskelement>
  2467. <mename>generic</mename>
  2468. <mevalue>6</mevalue>
  2469. </maskelement>
  2470. <maskelement>
  2471. <mename>specific</mename>
  2472. <mevalue>61</mevalue>
  2473. </maskelement>
  2474. </mask>
  2475. <uei>uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedBySwitch</uei>
  2476. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDuplicateIpAddressReported</event-label>
  2477. <descr>
  2478. &lt;p&gt;This trap is issued when the switch or an AP detects another
  2479. machine using its IP Address. The first variable has value
  2480. yes if the duplicate IP is reported by an AP. In that case,
  2481. the second attribute will carry the AP MAC Address. The third
  2482. variable is the duplicate IP address in question and the last
  2483. attribute is the MAC Address of the machine that is found to
  2484. be using the duplicate IP.&lt;/p&gt;&lt;table&gt;
  2485. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2486. bsnDuplicateIpReportedByAP&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2487. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2488. no(0)
  2489. yes(1)
  2490. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2491. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2492. bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2493. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2494. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2495. bsnDuplicateIpTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2496. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2497. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2498. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2499. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2500. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2501. bsnDuplicateIpTrapClear&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2502. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2503. false(0)
  2504. true(1)
  2505. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2506. </descr>
  2507. <logmsg dest='logndisplay'>&lt;p&gt;
  2508. bsnDuplicateIpAddressReported trap received
  2509. bsnDuplicateIpReportedByAP=%parm[#1]%
  2510. bsnAPMacAddrTrapVariable=%parm[#2]%
  2511. bsnDuplicateIpTrapVariable=%parm[#3]%
  2512. bsnRogueAPDot11MacAddress=%parm[#4]%
  2513. bsnDuplicateIpTrapClear=%parm[#5]%&lt;/p&gt;
  2514. </logmsg>
  2515. <severity>Major</severity>
  2516. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  2517. </event>
  2518. <event>
  2519. <mask>
  2520. <maskelement>
  2521. <mename>id</mename>
  2522. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2523. </maskelement>
  2524. <maskelement>
  2525. <mename>generic</mename>
  2526. <mevalue>6</mevalue>
  2527. </maskelement>
  2528. <maskelement>
  2529. <mename>specific</mename>
  2530. <mevalue>62</mevalue>
  2531. </maskelement>
  2532. <varbind>
  2533. <vbnumber>4</vbnumber>
  2534. <vbvalue>1</vbvalue>
  2535. </varbind>
  2536. </mask>
  2537. <uei>uei.opennms.org/vendor/cisco/bsnAPContainedAsARogueClear</uei>
  2538. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPContainedAsARogue</event-label>
  2539. <descr>
  2540. &lt;p&gt;When our AP detects that it is being contained by another AP,
  2541. this trap is issued. The clear flag is true if the AP is no
  2542. longer being contained.&lt;/p&gt;&lt;table&gt;
  2543. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2544. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2545. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2546. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2547. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2548. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2549. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2550. bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2551. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2552. dot11b(1)
  2553. dot11a(2)
  2554. uwb(4)
  2555. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2556. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2557. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2558. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2559. false(0)
  2560. true(1)
  2561. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2562. </descr>
  2563. <logmsg dest='logndisplay'>&lt;p&gt;
  2564. bsnAPContainedAsARogue trap received
  2565. bsnAPDot3MacAddress=%parm[#1]%
  2566. bsnAPIfSlotId=%parm[#2]%
  2567. bsnAPIfType=%parm[#3]%
  2568. bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
  2569. </logmsg>
  2570. <severity>Normal</severity>
  2571. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPContainedAsARogue:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
  2572. </event>
  2573. <event>
  2574. <mask>
  2575. <maskelement>
  2576. <mename>id</mename>
  2577. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2578. </maskelement>
  2579. <maskelement>
  2580. <mename>generic</mename>
  2581. <mevalue>6</mevalue>
  2582. </maskelement>
  2583. <maskelement>
  2584. <mename>specific</mename>
  2585. <mevalue>62</mevalue>
  2586. </maskelement>
  2587. </mask>
  2588. <uei>uei.opennms.org/vendor/cisco/bsnAPContainedAsARogue</uei>
  2589. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPContainedAsARogue</event-label>
  2590. <descr>
  2591. &lt;p&gt;When our AP detects that it is being contained by another AP,
  2592. this trap is issued. The clear flag is true if the AP is no
  2593. longer being contained.&lt;/p&gt;&lt;table&gt;
  2594. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2595. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2596. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2597. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2598. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2599. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2600. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2601. bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2602. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2603. dot11b(1)
  2604. dot11a(2)
  2605. uwb(4)
  2606. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2607. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2608. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2609. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2610. false(0)
  2611. true(1)
  2612. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2613. </descr>
  2614. <logmsg dest='logndisplay'>&lt;p&gt;
  2615. bsnAPContainedAsARogue trap received
  2616. bsnAPDot3MacAddress=%parm[#1]%
  2617. bsnAPIfSlotId=%parm[#2]%
  2618. bsnAPIfType=%parm[#3]%
  2619. bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
  2620. </logmsg>
  2621. <severity>Major</severity>
  2622. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  2623. </event>
  2624. <event>
  2625. <mask>
  2626. <maskelement>
  2627. <mename>id</mename>
  2628. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2629. </maskelement>
  2630. <maskelement>
  2631. <mename>generic</mename>
  2632. <mevalue>6</mevalue>
  2633. </maskelement>
  2634. <maskelement>
  2635. <mename>specific</mename>
  2636. <mevalue>63</mevalue>
  2637. </maskelement>
  2638. <varbind>
  2639. <vbnumber>2</vbnumber>
  2640. <vbvalue>1</vbvalue>
  2641. </varbind>
  2642. </mask>
  2643. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidSsidClear</uei>
  2644. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidSsid</event-label>
  2645. <descr>
  2646. &lt;p&gt;Issued when a Trusted Rogue AP is auto contained for advertising
  2647. invalid SSID.
  2648. If the clear variable has value true, then the trap clears the
  2649. earlier alert.&lt;/p&gt;&lt;table&gt;
  2650. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2651. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2652. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2653. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2654. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2655. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2656. false(0)
  2657. true(1)
  2658. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2659. </descr>
  2660. <logmsg dest='logndisplay'>&lt;p&gt;
  2661. bsnTrustedApHasInvalidSsid trap received
  2662. bsnRogueAPDot11MacAddress=%parm[#1]%
  2663. bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
  2664. </logmsg>
  2665. <severity>Normal</severity>
  2666. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidSsid:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  2667. </event>
  2668. <event>
  2669. <mask>
  2670. <maskelement>
  2671. <mename>id</mename>
  2672. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2673. </maskelement>
  2674. <maskelement>
  2675. <mename>generic</mename>
  2676. <mevalue>6</mevalue>
  2677. </maskelement>
  2678. <maskelement>
  2679. <mename>specific</mename>
  2680. <mevalue>63</mevalue>
  2681. </maskelement>
  2682. </mask>
  2683. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidSsid</uei>
  2684. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidSsid</event-label>
  2685. <descr>
  2686. &lt;p&gt;Issued when a Trusted Rogue AP is auto contained for advertising
  2687. invalid SSID.
  2688. If the clear variable has value true, then the trap clears the
  2689. earlier alert.&lt;/p&gt;&lt;table&gt;
  2690. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2691. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2692. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2693. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2694. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2695. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2696. false(0)
  2697. true(1)
  2698. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2699. </descr>
  2700. <logmsg dest='logndisplay'>&lt;p&gt;
  2701. bsnTrustedApHasInvalidSsid trap received
  2702. bsnRogueAPDot11MacAddress=%parm[#1]%
  2703. bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
  2704. </logmsg>
  2705. <severity>Minor</severity>
  2706. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  2707. </event>
  2708. <event>
  2709. <mask>
  2710. <maskelement>
  2711. <mename>id</mename>
  2712. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2713. </maskelement>
  2714. <maskelement>
  2715. <mename>generic</mename>
  2716. <mevalue>6</mevalue>
  2717. </maskelement>
  2718. <maskelement>
  2719. <mename>specific</mename>
  2720. <mevalue>64</mevalue>
  2721. </maskelement>
  2722. <varbind>
  2723. <vbnumber>2</vbnumber>
  2724. <vbvalue>1</vbvalue>
  2725. </varbind>
  2726. </mask>
  2727. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApIsMissingClear</uei>
  2728. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApIsMissing</event-label>
  2729. <descr>
  2730. &lt;p&gt;Issued when a Trusted Rogue AP is missing or has failed.
  2731. If the clear variable has value true, then the trap clears the
  2732. earlier alert.&lt;/p&gt;&lt;table&gt;
  2733. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2734. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2735. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2736. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2737. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2738. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2739. false(0)
  2740. true(1)
  2741. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2742. </descr>
  2743. <logmsg dest='logndisplay'>&lt;p&gt;
  2744. bsnTrustedApIsMissing trap received
  2745. bsnRogueAPDot11MacAddress=%parm[#1]%
  2746. bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
  2747. </logmsg>
  2748. <severity>Normal</severity>
  2749. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApIsMissing:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  2750. </event>
  2751. <event>
  2752. <mask>
  2753. <maskelement>
  2754. <mename>id</mename>
  2755. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2756. </maskelement>
  2757. <maskelement>
  2758. <mename>generic</mename>
  2759. <mevalue>6</mevalue>
  2760. </maskelement>
  2761. <maskelement>
  2762. <mename>specific</mename>
  2763. <mevalue>64</mevalue>
  2764. </maskelement>
  2765. </mask>
  2766. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApIsMissing</uei>
  2767. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApIsMissing</event-label>
  2768. <descr>
  2769. &lt;p&gt;Issued when a Trusted Rogue AP is missing or has failed.
  2770. If the clear variable has value true, then the trap clears the
  2771. earlier alert.&lt;/p&gt;&lt;table&gt;
  2772. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2773. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2774. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2775. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2776. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2777. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2778. false(0)
  2779. true(1)
  2780. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2781. </descr>
  2782. <logmsg dest='logndisplay'>&lt;p&gt;
  2783. bsnTrustedApIsMissing trap received
  2784. bsnRogueAPDot11MacAddress=%parm[#1]%
  2785. bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
  2786. </logmsg>
  2787. <severity>Warning</severity>
  2788. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  2789. </event>
  2790. <event>
  2791. <mask>
  2792. <maskelement>
  2793. <mename>id</mename>
  2794. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2795. </maskelement>
  2796. <maskelement>
  2797. <mename>generic</mename>
  2798. <mevalue>6</mevalue>
  2799. </maskelement>
  2800. <maskelement>
  2801. <mename>specific</mename>
  2802. <mevalue>65</mevalue>
  2803. </maskelement>
  2804. <varbind>
  2805. <vbnumber>2</vbnumber>
  2806. <vbvalue>1</vbvalue>
  2807. </varbind>
  2808. </mask>
  2809. <uei>uei.opennms.org/vendor/cisco/bsnAdhocRogueAutoContainedClear</uei>
  2810. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAdhocRogueAutoContained</event-label>
  2811. <descr>
  2812. &lt;p&gt;Issued when an Adhoc Rogue is auto contained.
  2813. If the clear variable has value true, then the trap clears the
  2814. earlier alert.&lt;/p&gt;&lt;table&gt;
  2815. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2816. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2817. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2818. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2819. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2820. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2821. false(0)
  2822. true(1)
  2823. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2824. </descr>
  2825. <logmsg dest='logndisplay'>&lt;p&gt;
  2826. bsnAdhocRogueAutoContained trap received
  2827. bsnRogueAPDot11MacAddress=%parm[#1]%
  2828. bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
  2829. </logmsg>
  2830. <severity>Normal</severity>
  2831. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAdhocRogueAutoContained:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  2832. </event>
  2833. <event>
  2834. <mask>
  2835. <maskelement>
  2836. <mename>id</mename>
  2837. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2838. </maskelement>
  2839. <maskelement>
  2840. <mename>generic</mename>
  2841. <mevalue>6</mevalue>
  2842. </maskelement>
  2843. <maskelement>
  2844. <mename>specific</mename>
  2845. <mevalue>65</mevalue>
  2846. </maskelement>
  2847. </mask>
  2848. <uei>uei.opennms.org/vendor/cisco/bsnAdhocRogueAutoContained</uei>
  2849. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAdhocRogueAutoContained</event-label>
  2850. <descr>
  2851. &lt;p&gt;Issued when an Adhoc Rogue is auto contained.
  2852. If the clear variable has value true, then the trap clears the
  2853. earlier alert.&lt;/p&gt;&lt;table&gt;
  2854. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2855. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2856. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2857. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2858. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2859. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2860. false(0)
  2861. true(1)
  2862. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2863. </descr>
  2864. <logmsg dest='logndisplay'>&lt;p&gt;
  2865. bsnAdhocRogueAutoContained trap received
  2866. bsnRogueAPDot11MacAddress=%parm[#1]%
  2867. bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
  2868. </logmsg>
  2869. <severity>Warning</severity>
  2870. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  2871. </event>
  2872. <event>
  2873. <mask>
  2874. <maskelement>
  2875. <mename>id</mename>
  2876. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2877. </maskelement>
  2878. <maskelement>
  2879. <mename>generic</mename>
  2880. <mevalue>6</mevalue>
  2881. </maskelement>
  2882. <maskelement>
  2883. <mename>specific</mename>
  2884. <mevalue>66</mevalue>
  2885. </maskelement>
  2886. <varbind>
  2887. <vbnumber>2</vbnumber>
  2888. <vbvalue>1</vbvalue>
  2889. </varbind>
  2890. </mask>
  2891. <uei>uei.opennms.org/vendor/cisco/bsnRogueApAutoContainedClear</uei>
  2892. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueApAutoContained</event-label>
  2893. <descr>
  2894. &lt;p&gt;Issued when a Rogue AP is auto contained for advertising our SSID.
  2895. If the clear variable has value true, then the trap clears the
  2896. earlier alert.&lt;/p&gt;&lt;table&gt;
  2897. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2898. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2899. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2900. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2901. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2902. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2903. false(0)
  2904. true(1)
  2905. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2906. </descr>
  2907. <logmsg dest='logndisplay'>&lt;p&gt;
  2908. bsnRogueApAutoContained trap received
  2909. bsnRogueAPDot11MacAddress=%parm[#1]%
  2910. bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
  2911. </logmsg>
  2912. <severity>Normal</severity>
  2913. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnRogueApAutoContained:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  2914. </event>
  2915. <event>
  2916. <mask>
  2917. <maskelement>
  2918. <mename>id</mename>
  2919. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2920. </maskelement>
  2921. <maskelement>
  2922. <mename>generic</mename>
  2923. <mevalue>6</mevalue>
  2924. </maskelement>
  2925. <maskelement>
  2926. <mename>specific</mename>
  2927. <mevalue>66</mevalue>
  2928. </maskelement>
  2929. </mask>
  2930. <uei>uei.opennms.org/vendor/cisco/bsnRogueApAutoContained</uei>
  2931. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueApAutoContained</event-label>
  2932. <descr>
  2933. &lt;p&gt;Issued when a Rogue AP is auto contained for advertising our SSID.
  2934. If the clear variable has value true, then the trap clears the
  2935. earlier alert.&lt;/p&gt;&lt;table&gt;
  2936. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2937. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2938. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2939. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2940. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2941. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2942. false(0)
  2943. true(1)
  2944. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  2945. </descr>
  2946. <logmsg dest='logndisplay'>&lt;p&gt;
  2947. bsnRogueApAutoContained trap received
  2948. bsnRogueAPDot11MacAddress=%parm[#1]%
  2949. bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
  2950. </logmsg>
  2951. <severity>Warning</severity>
  2952. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  2953. </event>
  2954. <event>
  2955. <mask>
  2956. <maskelement>
  2957. <mename>id</mename>
  2958. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  2959. </maskelement>
  2960. <maskelement>
  2961. <mename>generic</mename>
  2962. <mevalue>6</mevalue>
  2963. </maskelement>
  2964. <maskelement>
  2965. <mename>specific</mename>
  2966. <mevalue>67</mevalue>
  2967. </maskelement>
  2968. <varbind>
  2969. <vbnumber>4</vbnumber>
  2970. <vbvalue>1</vbvalue>
  2971. </varbind>
  2972. </mask>
  2973. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidEncryptionClear</uei>
  2974. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidEncryption</event-label>
  2975. <descr>
  2976. &lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using
  2977. invalid encryption. The second param is for the encryption used
  2978. and the third param is for encryption required.
  2979. If the clear variable has value true, then the trap clears the
  2980. earlier alert.&lt;/p&gt;&lt;table&gt;
  2981. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2982. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2983. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2984. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2985. bsnTrustedApEncryptionUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2986. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2987. none(0)
  2988. open(1)
  2989. wep(2)
  2990. wpa(3)
  2991. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  2992. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  2993. bsnTrustedApEncryptionRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  2994. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  2995. none(0)
  2996. open(1)
  2997. wep(2)
  2998. wpa(3)
  2999. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3000. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3001. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3002. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3003. false(0)
  3004. true(1)
  3005. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3006. </descr>
  3007. <logmsg dest='logndisplay'>&lt;p&gt;
  3008. bsnTrustedApHasInvalidEncryption trap received
  3009. bsnRogueAPDot11MacAddress=%parm[#1]%
  3010. bsnTrustedApEncryptionUsed=%parm[#2]%
  3011. bsnTrustedApEncryptionRequired=%parm[#3]%
  3012. bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
  3013. </logmsg>
  3014. <severity>Normal</severity>
  3015. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidEncryption:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  3016. </event>
  3017. <event>
  3018. <mask>
  3019. <maskelement>
  3020. <mename>id</mename>
  3021. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3022. </maskelement>
  3023. <maskelement>
  3024. <mename>generic</mename>
  3025. <mevalue>6</mevalue>
  3026. </maskelement>
  3027. <maskelement>
  3028. <mename>specific</mename>
  3029. <mevalue>67</mevalue>
  3030. </maskelement>
  3031. </mask>
  3032. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidEncryption</uei>
  3033. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidEncryption</event-label>
  3034. <descr>
  3035. &lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using
  3036. invalid encryption. The second param is for the encryption used
  3037. and the third param is for encryption required.
  3038. If the clear variable has value true, then the trap clears the
  3039. earlier alert.&lt;/p&gt;&lt;table&gt;
  3040. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3041. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3042. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3043. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3044. bsnTrustedApEncryptionUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3045. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3046. none(0)
  3047. open(1)
  3048. wep(2)
  3049. wpa(3)
  3050. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3051. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3052. bsnTrustedApEncryptionRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3053. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3054. none(0)
  3055. open(1)
  3056. wep(2)
  3057. wpa(3)
  3058. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3059. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3060. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3061. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3062. false(0)
  3063. true(1)
  3064. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3065. </descr>
  3066. <logmsg dest='logndisplay'>&lt;p&gt;
  3067. bsnTrustedApHasInvalidEncryption trap received
  3068. bsnRogueAPDot11MacAddress=%parm[#1]%
  3069. bsnTrustedApEncryptionUsed=%parm[#2]%
  3070. bsnTrustedApEncryptionRequired=%parm[#3]%
  3071. bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
  3072. </logmsg>
  3073. <severity>Minor</severity>
  3074. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  3075. </event>
  3076. <event>
  3077. <mask>
  3078. <maskelement>
  3079. <mename>id</mename>
  3080. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3081. </maskelement>
  3082. <maskelement>
  3083. <mename>generic</mename>
  3084. <mevalue>6</mevalue>
  3085. </maskelement>
  3086. <maskelement>
  3087. <mename>specific</mename>
  3088. <mevalue>68</mevalue>
  3089. </maskelement>
  3090. <varbind>
  3091. <vbnumber>4</vbnumber>
  3092. <vbvalue>1</vbvalue>
  3093. </varbind>
  3094. </mask>
  3095. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidRadioPolicyClear</uei>
  3096. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidRadioPolicy</event-label>
  3097. <descr>
  3098. &lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using
  3099. invalid radio policy. The second param is for the radio policy
  3100. used and the third param is for radio policy required.
  3101. If the clear variable has value true, then the trap clears the
  3102. earlier alert.&lt;/p&gt;&lt;table&gt;
  3103. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3104. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3105. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3106. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3107. bsnTrustedApRadioPolicyUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3108. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3109. none(0)
  3110. dot11b(1)
  3111. dot11a(2)
  3112. dot11bg(3)
  3113. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3114. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3115. bsnTrustedApRadioPolicyRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3116. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3117. none(0)
  3118. dot11b(1)
  3119. dot11a(2)
  3120. dot11bg(3)
  3121. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3122. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3123. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3124. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3125. false(0)
  3126. true(1)
  3127. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3128. </descr>
  3129. <logmsg dest='logndisplay'>&lt;p&gt;
  3130. bsnTrustedApHasInvalidRadioPolicy trap received
  3131. bsnRogueAPDot11MacAddress=%parm[#1]%
  3132. bsnTrustedApRadioPolicyUsed=%parm[#2]%
  3133. bsnTrustedApRadioPolicyRequired=%parm[#3]%
  3134. bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
  3135. </logmsg>
  3136. <severity>Normal</severity>
  3137. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidRadioPolicy:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  3138. </event>
  3139. <event>
  3140. <mask>
  3141. <maskelement>
  3142. <mename>id</mename>
  3143. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3144. </maskelement>
  3145. <maskelement>
  3146. <mename>generic</mename>
  3147. <mevalue>6</mevalue>
  3148. </maskelement>
  3149. <maskelement>
  3150. <mename>specific</mename>
  3151. <mevalue>68</mevalue>
  3152. </maskelement>
  3153. </mask>
  3154. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidRadioPolicy</uei>
  3155. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidRadioPolicy</event-label>
  3156. <descr>
  3157. &lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using
  3158. invalid radio policy. The second param is for the radio policy
  3159. used and the third param is for radio policy required.
  3160. If the clear variable has value true, then the trap clears the
  3161. earlier alert.&lt;/p&gt;&lt;table&gt;
  3162. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3163. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3164. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3165. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3166. bsnTrustedApRadioPolicyUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3167. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3168. none(0)
  3169. dot11b(1)
  3170. dot11a(2)
  3171. dot11bg(3)
  3172. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3173. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3174. bsnTrustedApRadioPolicyRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3175. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3176. none(0)
  3177. dot11b(1)
  3178. dot11a(2)
  3179. dot11bg(3)
  3180. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3181. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3182. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3183. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3184. false(0)
  3185. true(1)
  3186. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3187. </descr>
  3188. <logmsg dest='logndisplay'>&lt;p&gt;
  3189. bsnTrustedApHasInvalidRadioPolicy trap received
  3190. bsnRogueAPDot11MacAddress=%parm[#1]%
  3191. bsnTrustedApRadioPolicyUsed=%parm[#2]%
  3192. bsnTrustedApRadioPolicyRequired=%parm[#3]%
  3193. bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
  3194. </logmsg>
  3195. <severity>Warning</severity>
  3196. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  3197. </event>
  3198. <event>
  3199. <mask>
  3200. <maskelement>
  3201. <mename>id</mename>
  3202. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3203. </maskelement>
  3204. <maskelement>
  3205. <mename>generic</mename>
  3206. <mevalue>6</mevalue>
  3207. </maskelement>
  3208. <maskelement>
  3209. <mename>specific</mename>
  3210. <mevalue>69</mevalue>
  3211. </maskelement>
  3212. <varbind>
  3213. <vbnumber>2</vbnumber>
  3214. <vbvalue>1</vbvalue>
  3215. </varbind>
  3216. </mask>
  3217. <uei>uei.opennms.org/vendor/cisco/bsnNetworkStateChangedEnable</uei>
  3218. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnNetworkStateChanged</event-label>
  3219. <descr>
  3220. &lt;p&gt;When the 802.11a or b/g network state is changed this trap
  3221. is issued.&lt;/p&gt;&lt;table&gt;
  3222. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3223. bsnNetworkType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3224. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3225. dot11b(1)
  3226. dot11a(2)
  3227. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3228. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3229. bsnNetworkState&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3230. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3231. disable(0)
  3232. enable(1)
  3233. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3234. </descr>
  3235. <logmsg dest='logndisplay'>&lt;p&gt;
  3236. bsnNetworkStateChanged trap received
  3237. bsnNetworkType=%parm[#1]%
  3238. bsnNetworkState=%parm[#2]%&lt;/p&gt;
  3239. </logmsg>
  3240. <severity>Normal</severity>
  3241. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnNetworkStateChangedDisable:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  3242. </event>
  3243. <event>
  3244. <mask>
  3245. <maskelement>
  3246. <mename>id</mename>
  3247. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3248. </maskelement>
  3249. <maskelement>
  3250. <mename>generic</mename>
  3251. <mevalue>6</mevalue>
  3252. </maskelement>
  3253. <maskelement>
  3254. <mename>specific</mename>
  3255. <mevalue>69</mevalue>
  3256. </maskelement>
  3257. </mask>
  3258. <uei>uei.opennms.org/vendor/cisco/bsnNetworkStateChangedDisable</uei>
  3259. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnNetworkStateChanged</event-label>
  3260. <descr>
  3261. &lt;p&gt;When the 802.11a or b/g network state is changed this trap
  3262. is issued.&lt;/p&gt;&lt;table&gt;
  3263. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3264. bsnNetworkType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3265. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3266. dot11b(1)
  3267. dot11a(2)
  3268. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3269. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3270. bsnNetworkState&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3271. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3272. disable(0)
  3273. enable(1)
  3274. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3275. </descr>
  3276. <logmsg dest='logndisplay'>&lt;p&gt;
  3277. bsnNetworkStateChanged trap received
  3278. bsnNetworkType=%parm[#1]%
  3279. bsnNetworkState=%parm[#2]%&lt;/p&gt;
  3280. </logmsg>
  3281. <severity>Minor</severity>
  3282. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  3283. </event>
  3284. <event>
  3285. <mask>
  3286. <maskelement>
  3287. <mename>id</mename>
  3288. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3289. </maskelement>
  3290. <maskelement>
  3291. <mename>generic</mename>
  3292. <mevalue>6</mevalue>
  3293. </maskelement>
  3294. <maskelement>
  3295. <mename>specific</mename>
  3296. <mevalue>70</mevalue>
  3297. </maskelement>
  3298. <varbind>
  3299. <vbnumber>8</vbnumber>
  3300. <vbvalue>1</vbvalue>
  3301. </varbind>
  3302. </mask>
  3303. <uei>uei.opennms.org/vendor/cisco/bsnSignatureAttackDetectedClear</uei>
  3304. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnSignatureAttackDetected</event-label>
  3305. <descr>
  3306. &lt;p&gt;This trap is sent out when a signature attack is detected by
  3307. the switch. The standard and custom signatures are predefined
  3308. on the switch (see bsnSignatureConfig group). The signatures
  3309. also defines if its detection should be reported. The trap
  3310. variables bsnSignatureName and bsnSignatureDescription are
  3311. retrieved from the detected signature definition. Clear Trap
  3312. Variable is turned on when the signature attack stops. The
  3313. signature's quiet time configuration speicifes the time after
  3314. which the clear trap would be sent. bsnSignatureMacInfo
  3315. indicates whether the signature is used to track
  3316. pattern matches for all source MAC addresses together or
  3317. seperately for individual source MAC addresses.
  3318. bsnSignatureAttackFrequency will carry the value for a
  3319. specific MAC address or for all MAC addresses depending on
  3320. bsnSignatureMacInfo. &lt;/p&gt;&lt;table&gt;
  3321. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3322. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3323. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3324. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3325. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3326. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3327. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3328. bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3329. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3330. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3331. bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3332. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3333. dot11b(1)
  3334. dot11a(2)
  3335. uwb(4)
  3336. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3337. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3338. bsnSignatureType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3339. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3340. standard(0)
  3341. custom(1)
  3342. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3343. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3344. bsnSignatureName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3345. %parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3346. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3347. bsnSignatureDescription&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3348. %parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3349. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3350. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3351. %parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3352. false(0)
  3353. true(1)
  3354. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3355. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3356. bsnSignatureAttackPreced&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3357. %parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3358. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3359. bsnSignatureAttackFrequency&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3360. %parm[#10]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3361. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3362. bsnSignatureAttackChannel&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3363. %parm[#11]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3364. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3365. bsnSignatureAttackerMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3366. %parm[#12]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3367. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3368. bsnSignatureMacInfo&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3369. %parm[#13]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3370. bsnSignatureMacAll(0)
  3371. bsnSignatureMacIndividual(1)
  3372. bsnSignatureMacBoth(2)
  3373. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3374. </descr>
  3375. <logmsg dest='logndisplay'>&lt;p&gt;
  3376. bsnSignatureAttackDetected trap received
  3377. bsnAPDot3MacAddress=%parm[#1]%
  3378. bsnAPIfSlotId=%parm[#2]%
  3379. bsnAPName=%parm[#3]%
  3380. bsnAPIfType=%parm[#4]%
  3381. bsnSignatureType=%parm[#5]%
  3382. bsnSignatureName=%parm[#6]%
  3383. bsnSignatureDescription=%parm[#7]%
  3384. bsnClearTrapVariable=%parm[#8]%
  3385. bsnSignatureAttackPreced=%parm[#9]%
  3386. bsnSignatureAttackFrequency=%parm[#10]%
  3387. bsnSignatureAttackChannel=%parm[#11]%
  3388. bsnSignatureAttackerMacAddress=%parm[#12]%
  3389. bsnSignatureMacInfo=%parm[#13]%&lt;/p&gt;
  3390. </logmsg>
  3391. <severity>Normal</severity>
  3392. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%:%parm[#5]%:%parm[#6]%:%parm[#12]%:%parm[#13]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnSignatureAttackDetected:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%:%parm[#5]%:%parm[#6]%:%parm[#12]%:%parm[#13]%" auto-clean="false" />
  3393. </event>
  3394. <event>
  3395. <mask>
  3396. <maskelement>
  3397. <mename>id</mename>
  3398. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3399. </maskelement>
  3400. <maskelement>
  3401. <mename>generic</mename>
  3402. <mevalue>6</mevalue>
  3403. </maskelement>
  3404. <maskelement>
  3405. <mename>specific</mename>
  3406. <mevalue>70</mevalue>
  3407. </maskelement>
  3408. </mask>
  3409. <uei>uei.opennms.org/vendor/cisco/bsnSignatureAttackDetected</uei>
  3410. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnSignatureAttackDetected</event-label>
  3411. <descr>
  3412. &lt;p&gt;This trap is sent out when a signature attack is detected by
  3413. the switch. The standard and custom signatures are predefined
  3414. on the switch (see bsnSignatureConfig group). The signatures
  3415. also defines if its detection should be reported. The trap
  3416. variables bsnSignatureName and bsnSignatureDescription are
  3417. retrieved from the detected signature definition. Clear Trap
  3418. Variable is turned on when the signature attack stops. The
  3419. signature's quiet time configuration speicifes the time after
  3420. which the clear trap would be sent. bsnSignatureMacInfo
  3421. indicates whether the signature is used to track
  3422. pattern matches for all source MAC addresses together or
  3423. seperately for individual source MAC addresses.
  3424. bsnSignatureAttackFrequency will carry the value for a
  3425. specific MAC address or for all MAC addresses depending on
  3426. bsnSignatureMacInfo. &lt;/p&gt;&lt;table&gt;
  3427. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3428. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3429. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3430. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3431. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3432. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3433. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3434. bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3435. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3436. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3437. bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3438. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3439. dot11b(1)
  3440. dot11a(2)
  3441. uwb(4)
  3442. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3443. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3444. bsnSignatureType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3445. %parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3446. standard(0)
  3447. custom(1)
  3448. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3449. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3450. bsnSignatureName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3451. %parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3452. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3453. bsnSignatureDescription&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3454. %parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3455. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3456. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3457. %parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3458. false(0)
  3459. true(1)
  3460. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3461. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3462. bsnSignatureAttackPreced&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3463. %parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3464. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3465. bsnSignatureAttackFrequency&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3466. %parm[#10]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3467. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3468. bsnSignatureAttackChannel&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3469. %parm[#11]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3470. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3471. bsnSignatureAttackerMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3472. %parm[#12]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3473. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3474. bsnSignatureMacInfo&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3475. %parm[#13]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3476. bsnSignatureMacAll(0)
  3477. bsnSignatureMacIndividual(1)
  3478. bsnSignatureMacBoth(2)
  3479. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3480. </descr>
  3481. <logmsg dest='logndisplay'>&lt;p&gt;
  3482. bsnSignatureAttackDetected trap received
  3483. bsnAPDot3MacAddress=%parm[#1]%
  3484. bsnAPIfSlotId=%parm[#2]%
  3485. bsnAPName=%parm[#3]%
  3486. bsnAPIfType=%parm[#4]%
  3487. bsnSignatureType=%parm[#5]%
  3488. bsnSignatureName=%parm[#6]%
  3489. bsnSignatureDescription=%parm[#7]%
  3490. bsnClearTrapVariable=%parm[#8]%
  3491. bsnSignatureAttackPreced=%parm[#9]%
  3492. bsnSignatureAttackFrequency=%parm[#10]%
  3493. bsnSignatureAttackChannel=%parm[#11]%
  3494. bsnSignatureAttackerMacAddress=%parm[#12]%
  3495. bsnSignatureMacInfo=%parm[#13]%&lt;/p&gt;
  3496. </logmsg>
  3497. <severity>Minor</severity>
  3498. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%:%parm[#5]%:%parm[#6]%:%parm[#12]%:%parm[#13]%" alarm-type="1" auto-clean="false" />
  3499. </event>
  3500. <event>
  3501. <mask>
  3502. <maskelement>
  3503. <mename>id</mename>
  3504. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3505. </maskelement>
  3506. <maskelement>
  3507. <mename>generic</mename>
  3508. <mevalue>6</mevalue>
  3509. </maskelement>
  3510. <maskelement>
  3511. <mename>specific</mename>
  3512. <mevalue>71</mevalue>
  3513. </maskelement>
  3514. </mask>
  3515. <uei>uei.opennms.org/vendor/cisco/bsnAPRadioCardTxFailure</uei>
  3516. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRadioCardTxFailure</event-label>
  3517. <descr>
  3518. &lt;p&gt;This trap is sent by the switch when a radio card on an AP
  3519. stops transmitting.&lt;/p&gt;&lt;table&gt;
  3520. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3521. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3522. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3523. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3524. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3525. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3526. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3527. bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3528. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3529. dot11b(1)
  3530. dot11a(2)
  3531. uwb(4)
  3532. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3533. </descr>
  3534. <logmsg dest='logndisplay'>&lt;p&gt;
  3535. bsnAPRadioCardTxFailure trap received
  3536. bsnAPDot3MacAddress=%parm[#1]%
  3537. bsnAPIfSlotId=%parm[#2]%
  3538. bsnAPIfType=%parm[#3]%&lt;/p&gt;
  3539. </logmsg>
  3540. <severity>Minor</severity>
  3541. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  3542. </event>
  3543. <event>
  3544. <mask>
  3545. <maskelement>
  3546. <mename>id</mename>
  3547. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3548. </maskelement>
  3549. <maskelement>
  3550. <mename>generic</mename>
  3551. <mevalue>6</mevalue>
  3552. </maskelement>
  3553. <maskelement>
  3554. <mename>specific</mename>
  3555. <mevalue>72</mevalue>
  3556. </maskelement>
  3557. </mask>
  3558. <uei>uei.opennms.org/vendor/cisco/bsnAPRadioCardTxFailureClear</uei>
  3559. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRadioCardTxFailureClear</event-label>
  3560. <descr>
  3561. &lt;p&gt;This trap is sent by the switch when a radio card on an AP
  3562. starts transmitting again after a prior failure.&lt;/p&gt;&lt;table&gt;
  3563. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3564. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3565. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3566. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3567. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3568. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3569. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3570. bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3571. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3572. dot11b(1)
  3573. dot11a(2)
  3574. uwb(4)
  3575. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3576. </descr>
  3577. <logmsg dest='logndisplay'>&lt;p&gt;
  3578. bsnAPRadioCardTxFailureClear trap received
  3579. bsnAPDot3MacAddress=%parm[#1]%
  3580. bsnAPIfSlotId=%parm[#2]%
  3581. bsnAPIfType=%parm[#3]%&lt;/p&gt;
  3582. </logmsg>
  3583. <severity>Normal</severity>
  3584. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPRadioCardTxFailure:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
  3585. </event>
  3586. <event>
  3587. <mask>
  3588. <maskelement>
  3589. <mename>id</mename>
  3590. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3591. </maskelement>
  3592. <maskelement>
  3593. <mename>generic</mename>
  3594. <mevalue>6</mevalue>
  3595. </maskelement>
  3596. <maskelement>
  3597. <mename>specific</mename>
  3598. <mevalue>73</mevalue>
  3599. </maskelement>
  3600. </mask>
  3601. <uei>uei.opennms.org/vendor/cisco/bsnAPRadioCardRxFailure</uei>
  3602. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRadioCardRxFailure</event-label>
  3603. <descr>
  3604. &lt;p&gt;This trap is sent by the switch when a radio card on an AP
  3605. stops receiving.&lt;/p&gt;&lt;table&gt;
  3606. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3607. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3608. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3609. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3610. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3611. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3612. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3613. bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3614. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3615. dot11b(1)
  3616. dot11a(2)
  3617. uwb(4)
  3618. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3619. </descr>
  3620. <logmsg dest='logndisplay'>&lt;p&gt;
  3621. bsnAPRadioCardRxFailure trap received
  3622. bsnAPDot3MacAddress=%parm[#1]%
  3623. bsnAPIfSlotId=%parm[#2]%
  3624. bsnAPIfType=%parm[#3]%&lt;/p&gt;
  3625. </logmsg>
  3626. <severity>Minor</severity>
  3627. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  3628. </event>
  3629. <event>
  3630. <mask>
  3631. <maskelement>
  3632. <mename>id</mename>
  3633. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3634. </maskelement>
  3635. <maskelement>
  3636. <mename>generic</mename>
  3637. <mevalue>6</mevalue>
  3638. </maskelement>
  3639. <maskelement>
  3640. <mename>specific</mename>
  3641. <mevalue>74</mevalue>
  3642. </maskelement>
  3643. </mask>
  3644. <uei>uei.opennms.org/vendor/cisco/bsnAPRadioCardRxFailureClear</uei>
  3645. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRadioCardRxFailureClear</event-label>
  3646. <descr>
  3647. &lt;p&gt;This trap is sent by the switch when a radio card on an AP
  3648. starts receiving again after a prior failure.&lt;/p&gt;&lt;table&gt;
  3649. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3650. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3651. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3652. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3653. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3654. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3655. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3656. bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3657. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3658. dot11b(1)
  3659. dot11a(2)
  3660. uwb(4)
  3661. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3662. </descr>
  3663. <logmsg dest='logndisplay'>&lt;p&gt;
  3664. bsnAPRadioCardRxFailureClear trap received
  3665. bsnAPDot3MacAddress=%parm[#1]%
  3666. bsnAPIfSlotId=%parm[#2]%
  3667. bsnAPIfType=%parm[#3]%&lt;/p&gt;
  3668. </logmsg>
  3669. <severity>Normal</severity>
  3670. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPRadioCardRxFailure:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
  3671. </event>
  3672. <event>
  3673. <mask>
  3674. <maskelement>
  3675. <mename>id</mename>
  3676. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3677. </maskelement>
  3678. <maskelement>
  3679. <mename>generic</mename>
  3680. <mevalue>6</mevalue>
  3681. </maskelement>
  3682. <maskelement>
  3683. <mename>specific</mename>
  3684. <mevalue>75</mevalue>
  3685. </maskelement>
  3686. </mask>
  3687. <uei>uei.opennms.org/vendor/cisco/bsnAPImpersonationDetected</uei>
  3688. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPImpersonationDetected</event-label>
  3689. <descr>
  3690. &lt;p&gt;This trap is sent by the switch when a radio of an
  3691. authenticated AP hears from another AP whose MAC Address
  3692. neither matches that of a rogue's and nor is it an
  3693. authenticated neighbor of the detecting AP.&lt;/p&gt;&lt;table&gt;
  3694. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3695. bsnImpersonatedAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3696. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3697. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3698. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3699. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3700. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3701. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3702. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3703. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3704. bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3705. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3706. dot11b(1)
  3707. dot11a(2)
  3708. uwb(4)
  3709. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3710. </descr>
  3711. <logmsg dest='logndisplay'>&lt;p&gt;
  3712. bsnAPImpersonationDetected trap received
  3713. bsnImpersonatedAPMacAddr=%parm[#1]%
  3714. bsnAPDot3MacAddress=%parm[#2]%
  3715. bsnAPIfSlotId=%parm[#3]%
  3716. bsnAPIfType=%parm[#4]%&lt;/p&gt;
  3717. </logmsg>
  3718. <severity>Warning</severity>
  3719. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  3720. </event>
  3721. <event>
  3722. <mask>
  3723. <maskelement>
  3724. <mename>id</mename>
  3725. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3726. </maskelement>
  3727. <maskelement>
  3728. <mename>generic</mename>
  3729. <mevalue>6</mevalue>
  3730. </maskelement>
  3731. <maskelement>
  3732. <mename>specific</mename>
  3733. <mevalue>76</mevalue>
  3734. </maskelement>
  3735. <varbind>
  3736. <vbnumber>4</vbnumber>
  3737. <vbvalue>1</vbvalue>
  3738. </varbind>
  3739. </mask>
  3740. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidPreambleClear</uei>
  3741. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidPreamble</event-label>
  3742. <descr>
  3743. &lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using invalid
  3744. preamble. The second param is for the preamble used and the third
  3745. param is for preamble required. If the clear variable has value
  3746. true, then the trap clears the earlier alert.&lt;/p&gt;&lt;table&gt;
  3747. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3748. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3749. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3750. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3751. bsnTrustedApPreambleUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3752. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3753. none(0)
  3754. short(1)
  3755. long(2)
  3756. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3757. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3758. bsnTrustedApPreambleRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3759. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3760. none(0)
  3761. short(1)
  3762. long(2)
  3763. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3764. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3765. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3766. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3767. false(0)
  3768. true(1)
  3769. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3770. </descr>
  3771. <logmsg dest='logndisplay'>&lt;p&gt;
  3772. bsnTrustedApHasInvalidPreamble trap received
  3773. bsnRogueAPDot11MacAddress=%parm[#1]%
  3774. bsnTrustedApPreambleUsed=%parm[#2]%
  3775. bsnTrustedApPreambleRequired=%parm[#3]%
  3776. bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
  3777. </logmsg>
  3778. <severity>Normal</severity>
  3779. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidPreamble:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
  3780. </event>
  3781. <event>
  3782. <mask>
  3783. <maskelement>
  3784. <mename>id</mename>
  3785. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3786. </maskelement>
  3787. <maskelement>
  3788. <mename>generic</mename>
  3789. <mevalue>6</mevalue>
  3790. </maskelement>
  3791. <maskelement>
  3792. <mename>specific</mename>
  3793. <mevalue>76</mevalue>
  3794. </maskelement>
  3795. </mask>
  3796. <uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidPreamble</uei>
  3797. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidPreamble</event-label>
  3798. <descr>
  3799. &lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using invalid
  3800. preamble. The second param is for the preamble used and the third
  3801. param is for preamble required. If the clear variable has value
  3802. true, then the trap clears the earlier alert.&lt;/p&gt;&lt;table&gt;
  3803. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3804. bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3805. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3806. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3807. bsnTrustedApPreambleUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3808. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3809. none(0)
  3810. short(1)
  3811. long(2)
  3812. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3813. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3814. bsnTrustedApPreambleRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3815. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3816. none(0)
  3817. short(1)
  3818. long(2)
  3819. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3820. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3821. bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3822. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3823. false(0)
  3824. true(1)
  3825. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3826. </descr>
  3827. <logmsg dest='logndisplay'>&lt;p&gt;
  3828. bsnTrustedApHasInvalidPreamble trap received
  3829. bsnRogueAPDot11MacAddress=%parm[#1]%
  3830. bsnTrustedApPreambleUsed=%parm[#2]%
  3831. bsnTrustedApPreambleRequired=%parm[#3]%
  3832. bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
  3833. </logmsg>
  3834. <severity>Warning</severity>
  3835. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  3836. </event>
  3837. <event>
  3838. <mask>
  3839. <maskelement>
  3840. <mename>id</mename>
  3841. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3842. </maskelement>
  3843. <maskelement>
  3844. <mename>generic</mename>
  3845. <mevalue>6</mevalue>
  3846. </maskelement>
  3847. <maskelement>
  3848. <mename>specific</mename>
  3849. <mevalue>77</mevalue>
  3850. </maskelement>
  3851. </mask>
  3852. <uei>uei.opennms.org/vendor/cisco/bsnAPIPAddressFallback</uei>
  3853. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIPAddressFallback</event-label>
  3854. <descr>
  3855. &lt;p&gt;This trap is sent out when an AP, with the configured static
  3856. ip-address, fails to establish connection with outside world
  3857. and starts using DHCP as a fallback option.&lt;/p&gt;&lt;table&gt;
  3858. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3859. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3860. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3861. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3862. bsnApIpAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3863. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3864. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3865. bsnAPStaticIPAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3866. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3867. </descr>
  3868. <logmsg dest='logndisplay'>&lt;p&gt;
  3869. bsnAPIPAddressFallback trap received
  3870. bsnAPDot3MacAddress=%parm[#1]%
  3871. bsnApIpAddress=%parm[#2]%
  3872. bsnAPStaticIPAddress=%parm[#3]%&lt;/p&gt;
  3873. </logmsg>
  3874. <severity>Warning</severity>
  3875. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
  3876. </event>
  3877. <event>
  3878. <mask>
  3879. <maskelement>
  3880. <mename>id</mename>
  3881. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3882. </maskelement>
  3883. <maskelement>
  3884. <mename>generic</mename>
  3885. <mevalue>6</mevalue>
  3886. </maskelement>
  3887. <maskelement>
  3888. <mename>specific</mename>
  3889. <mevalue>78</mevalue>
  3890. </maskelement>
  3891. </mask>
  3892. <uei>uei.opennms.org/vendor/cisco/bsnAPFunctionalityDisabled</uei>
  3893. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPFunctionalityDisabled</event-label>
  3894. <descr>
  3895. &lt;p&gt;This trap is sent out when AP functionality on the switch is
  3896. disabled because the License key has expired
  3897. or has been deleted or doesn't match the switch image.&lt;/p&gt;&lt;table&gt;
  3898. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3899. bsnApFunctionalityDisableReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3900. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3901. unknown(0)
  3902. licenseKeyExpired(1)
  3903. licenseKeyDeleted(2)
  3904. licenseKeyFeatureMismatch(3)
  3905. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3906. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3907. bsnLicenseKeyTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3908. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3909. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3910. bsnLicenseKeyFeatureSetTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3911. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3912. wps(1)
  3913. all(2)
  3914. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  3915. </descr>
  3916. <logmsg dest='logndisplay'>&lt;p&gt;
  3917. bsnAPFunctionalityDisabled trap received
  3918. bsnApFunctionalityDisableReasonCode=%parm[#1]%
  3919. bsnLicenseKeyTrapVariable=%parm[#2]%
  3920. bsnLicenseKeyFeatureSetTrapVariable=%parm[#3]%&lt;/p&gt;
  3921. </logmsg>
  3922. <severity>Major</severity>
  3923. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  3924. </event>
  3925. <event>
  3926. <mask>
  3927. <maskelement>
  3928. <mename>id</mename>
  3929. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  3930. </maskelement>
  3931. <maskelement>
  3932. <mename>generic</mename>
  3933. <mevalue>6</mevalue>
  3934. </maskelement>
  3935. <maskelement>
  3936. <mename>specific</mename>
  3937. <mevalue>79</mevalue>
  3938. </maskelement>
  3939. </mask>
  3940. <uei>uei.opennms.org/vendor/cisco/bsnAPRegulatoryDomainMismatch</uei>
  3941. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRegulatoryDomainMismatch</event-label>
  3942. <descr>
  3943. &lt;p&gt;This trap is generated if an AP's regulatory domain doesn't
  3944. match the country the switch is configured for. Due to the
  3945. mismatch, the AP will fail to associate with the Switch.&lt;/p&gt;&lt;table&gt;
  3946. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3947. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3948. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3949. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3950. bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3951. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3952. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3953. bsnApRegulatoryDomain&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3954. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3955. a(0)
  3956. e(1)
  3957. i(6)
  3958. j(9)
  3959. c(16)
  3960. n(21)
  3961. k(32)
  3962. p(33)
  3963. s(34)
  3964. t(35)
  3965. r(48)
  3966. notavailable(65535)
  3967. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  3968. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  3969. bsnGlobalDot11CountryIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  3970. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  3971. usa(1)
  3972. canada(2)
  3973. france(3)
  3974. japan(4)
  3975. mexico(5)
  3976. spain(6)
  3977. usalegacy(7)
  3978. korearepublic(8)
  3979. australia(9)
  3980. austria(10)
  3981. belgium(11)
  3982. denmark(12)
  3983. finland(13)
  3984. germany(14)
  3985. greece(15)
  3986. ireland(16)
  3987. italy(17)
  3988. luxembourg(18)
  3989. netherlands(19)
  3990. portugal(20)
  3991. sweden(21)
  3992. unitedkingdom(22)
  3993. none(23)
  3994. india(24)
  3995. hongkong(25)
  3996. switzerland(26)
  3997. iceland(27)
  3998. norway(28)
  3999. singapore(29)
  4000. thailand(30)
  4001. taiwan(31)
  4002. cyprus(33)
  4003. czechrepublic(34)
  4004. estonia(35)
  4005. hungary(36)
  4006. lithuania(37)
  4007. latvia(38)
  4008. malaysia(39)
  4009. newzealand(40)
  4010. poland(41)
  4011. slovenia(42)
  4012. slovakrepublic(43)
  4013. southafrica(44)
  4014. usachan165(45)
  4015. israel(46)
  4016. israelOutdoor(47)
  4017. argentina(48)
  4018. brazil(49)
  4019. saudiArabia(51)
  4020. turkey(52)
  4021. indonesia(53)
  4022. china(54)
  4023. koreaExtended(55)
  4024. japan2(56)
  4025. gibraltar(57)
  4026. liechtenstein(58)
  4027. malta(59)
  4028. monaco(60)
  4029. romania(61)
  4030. russianfederation(62)
  4031. chile(63)
  4032. colombia(64)
  4033. panama(65)
  4034. peru(66)
  4035. venezuela(67)
  4036. philippines(68)
  4037. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4038. </descr>
  4039. <logmsg dest='logndisplay'>&lt;p&gt;
  4040. bsnAPRegulatoryDomainMismatch trap received
  4041. bsnAPDot3MacAddress=%parm[#1]%
  4042. bsnAPName=%parm[#2]%
  4043. bsnApRegulatoryDomain=%parm[#3]%
  4044. bsnGlobalDot11CountryIndex=%parm[#4]%&lt;/p&gt;
  4045. </logmsg>
  4046. <severity>Major</severity>
  4047. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  4048. </event>
  4049. <event>
  4050. <mask>
  4051. <maskelement>
  4052. <mename>id</mename>
  4053. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4054. </maskelement>
  4055. <maskelement>
  4056. <mename>generic</mename>
  4057. <mevalue>6</mevalue>
  4058. </maskelement>
  4059. <maskelement>
  4060. <mename>specific</mename>
  4061. <mevalue>80</mevalue>
  4062. </maskelement>
  4063. </mask>
  4064. <uei>uei.opennms.org/vendor/cisco/bsnRxMulticastQueueFull</uei>
  4065. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRxMulticastQueueFull</event-label>
  4066. <descr>
  4067. &lt;p&gt;This trap indicates that the CPU's Receive Multicast Queue is
  4068. Full.&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
  4069. </descr>
  4070. <logmsg dest='logndisplay'>&lt;p&gt;
  4071. bsnRxMulticastQueueFull trap received&lt;/p&gt;
  4072. </logmsg>
  4073. <severity>Warning</severity>
  4074. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  4075. </event>
  4076. <event>
  4077. <mask>
  4078. <maskelement>
  4079. <mename>id</mename>
  4080. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4081. </maskelement>
  4082. <maskelement>
  4083. <mename>generic</mename>
  4084. <mevalue>6</mevalue>
  4085. </maskelement>
  4086. <maskelement>
  4087. <mename>specific</mename>
  4088. <mevalue>81</mevalue>
  4089. </maskelement>
  4090. </mask>
  4091. <uei>uei.opennms.org/vendor/cisco/bsnRadarChannelDetected</uei>
  4092. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRadarChannelDetected</event-label>
  4093. <descr>
  4094. &lt;p&gt;This trap is sent when radar signals are detected on the
  4095. current channel&lt;/p&gt;&lt;table&gt;
  4096. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4097. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4098. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4099. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4100. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4101. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4102. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4103. bsnAPIfPhyChannelNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4104. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4105. ch1(1)
  4106. ch2(2)
  4107. ch3(3)
  4108. ch4(4)
  4109. ch5(5)
  4110. ch6(6)
  4111. ch7(7)
  4112. ch8(8)
  4113. ch9(9)
  4114. ch10(10)
  4115. ch11(11)
  4116. ch12(12)
  4117. ch13(13)
  4118. ch14(14)
  4119. ch34(34)
  4120. ch36(36)
  4121. ch38(38)
  4122. ch40(40)
  4123. ch42(42)
  4124. ch44(44)
  4125. ch46(46)
  4126. ch48(48)
  4127. ch52(52)
  4128. ch56(56)
  4129. ch60(60)
  4130. ch64(64)
  4131. ch100(100)
  4132. ch104(104)
  4133. ch108(108)
  4134. ch112(112)
  4135. ch116(116)
  4136. ch120(120)
  4137. ch124(124)
  4138. ch128(128)
  4139. ch132(132)
  4140. ch136(136)
  4141. ch140(140)
  4142. ch149(149)
  4143. ch153(153)
  4144. ch157(157)
  4145. ch161(161)
  4146. ch165(165)
  4147. ch169(169)
  4148. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4149. </descr>
  4150. <logmsg dest='logndisplay'>&lt;p&gt;
  4151. bsnRadarChannelDetected trap received
  4152. bsnAPDot3MacAddress=%parm[#1]%
  4153. bsnAPIfSlotId=%parm[#2]%
  4154. bsnAPIfPhyChannelNumber=%parm[#3]%&lt;/p&gt;
  4155. </logmsg>
  4156. <severity>Warning</severity>
  4157. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
  4158. </event>
  4159. <event>
  4160. <mask>
  4161. <maskelement>
  4162. <mename>id</mename>
  4163. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4164. </maskelement>
  4165. <maskelement>
  4166. <mename>generic</mename>
  4167. <mevalue>6</mevalue>
  4168. </maskelement>
  4169. <maskelement>
  4170. <mename>specific</mename>
  4171. <mevalue>82</mevalue>
  4172. </maskelement>
  4173. </mask>
  4174. <uei>uei.opennms.org/vendor/cisco/bsnRadarChannelCleared</uei>
  4175. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRadarChannelCleared</event-label>
  4176. <descr>
  4177. &lt;p&gt;This trap will be generated, if a radar trap has been
  4178. generated earlier, after the expiry of Non-Occupancy Period.&lt;/p&gt;&lt;table&gt;
  4179. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4180. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4181. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4182. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4183. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4184. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4185. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4186. bsnAPIfPhyChannelNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4187. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4188. ch1(1)
  4189. ch2(2)
  4190. ch3(3)
  4191. ch4(4)
  4192. ch5(5)
  4193. ch6(6)
  4194. ch7(7)
  4195. ch8(8)
  4196. ch9(9)
  4197. ch10(10)
  4198. ch11(11)
  4199. ch12(12)
  4200. ch13(13)
  4201. ch14(14)
  4202. ch34(34)
  4203. ch36(36)
  4204. ch38(38)
  4205. ch40(40)
  4206. ch42(42)
  4207. ch44(44)
  4208. ch46(46)
  4209. ch48(48)
  4210. ch52(52)
  4211. ch56(56)
  4212. ch60(60)
  4213. ch64(64)
  4214. ch100(100)
  4215. ch104(104)
  4216. ch108(108)
  4217. ch112(112)
  4218. ch116(116)
  4219. ch120(120)
  4220. ch124(124)
  4221. ch128(128)
  4222. ch132(132)
  4223. ch136(136)
  4224. ch140(140)
  4225. ch149(149)
  4226. ch153(153)
  4227. ch157(157)
  4228. ch161(161)
  4229. ch165(165)
  4230. ch169(169)
  4231. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4232. </descr>
  4233. <logmsg dest='logndisplay'>&lt;p&gt;
  4234. bsnRadarChannelCleared trap received
  4235. bsnAPDot3MacAddress=%parm[#1]%
  4236. bsnAPIfSlotId=%parm[#2]%
  4237. bsnAPIfPhyChannelNumber=%parm[#3]%&lt;/p&gt;
  4238. </logmsg>
  4239. <severity>Normal</severity>
  4240. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnRadarChannelDetected:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
  4241. </event>
  4242. <event>
  4243. <mask>
  4244. <maskelement>
  4245. <mename>id</mename>
  4246. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4247. </maskelement>
  4248. <maskelement>
  4249. <mename>generic</mename>
  4250. <mevalue>6</mevalue>
  4251. </maskelement>
  4252. <maskelement>
  4253. <mename>specific</mename>
  4254. <mevalue>83</mevalue>
  4255. </maskelement>
  4256. </mask>
  4257. <uei>uei.opennms.org/vendor/cisco/bsnAPAuthorizationFailure</uei>
  4258. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPAuthorizationFailure</event-label>
  4259. <descr>
  4260. &lt;p&gt;This trap is sent out in case of authorization failure while
  4261. attempting to associate the AP to the controller.
  4262. bsnAPDot3MacAddress represents the mac-address of that AP.
  4263. bsnAPName is name of AP&lt;/p&gt;&lt;table&gt;
  4264. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4265. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4266. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4267. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4268. bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4269. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4270. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4271. bsnAPAuthCertificateType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4272. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4273. unknown(0)
  4274. mic(1)
  4275. ssc(2)
  4276. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4277. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4278. bsnAPAuthorizationFailureCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4279. %parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4280. unknown(0)
  4281. keymismatch(1)
  4282. entrydoesnotexist(2)
  4283. invalidCertifcate(3)
  4284. entryIsMIC(4)
  4285. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4286. </descr>
  4287. <logmsg dest='logndisplay'>&lt;p&gt;
  4288. bsnAPAuthorizationFailure trap received
  4289. bsnAPDot3MacAddress=%parm[#1]%
  4290. bsnAPName=%parm[#2]%
  4291. bsnAPAuthCertificateType=%parm[#3]%
  4292. bsnAPAuthorizationFailureCause=%parm[#4]%&lt;/p&gt;
  4293. </logmsg>
  4294. <severity>Indeterminate</severity>
  4295. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  4296. </event>
  4297. <event>
  4298. <mask>
  4299. <maskelement>
  4300. <mename>id</mename>
  4301. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4302. </maskelement>
  4303. <maskelement>
  4304. <mename>generic</mename>
  4305. <mevalue>6</mevalue>
  4306. </maskelement>
  4307. <maskelement>
  4308. <mename>specific</mename>
  4309. <mevalue>84</mevalue>
  4310. </maskelement>
  4311. </mask>
  4312. <uei>uei.opennms.org/vendor/cisco/radioCoreDumpTrap</uei>
  4313. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: radioCoreDumpTrap</event-label>
  4314. <descr>
  4315. &lt;p&gt;When radio module in AP dumps core, it informs controller and
  4316. controller generates this trap. The core file can be retrieved
  4317. on demand.&lt;/p&gt;&lt;table&gt;
  4318. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4319. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4320. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4321. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4322. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4323. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4324. </descr>
  4325. <logmsg dest='logndisplay'>&lt;p&gt;
  4326. radioCoreDumpTrap trap received
  4327. bsnAPDot3MacAddress=%parm[#1]%
  4328. bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
  4329. </logmsg>
  4330. <severity>Minor</severity>
  4331. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  4332. </event>
  4333. <event>
  4334. <mask>
  4335. <maskelement>
  4336. <mename>id</mename>
  4337. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4338. </maskelement>
  4339. <maskelement>
  4340. <mename>generic</mename>
  4341. <mevalue>6</mevalue>
  4342. </maskelement>
  4343. <maskelement>
  4344. <mename>specific</mename>
  4345. <mevalue>85</mevalue>
  4346. </maskelement>
  4347. </mask>
  4348. <uei>uei.opennms.org/vendor/cisco/invalidRadioTrap</uei>
  4349. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: invalidRadioTrap</event-label>
  4350. <descr>
  4351. &lt;p&gt;This trap will be generated when an AP has joined is using
  4352. unsupported radio or a radio slot not currently not being
  4353. used.&lt;/p&gt;&lt;table&gt;
  4354. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4355. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4356. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4357. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4358. bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4359. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4360. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4361. bsnAPInvalidRadioType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4362. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4363. unsupportedRadio(0)
  4364. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4365. </descr>
  4366. <logmsg dest='logndisplay'>&lt;p&gt;
  4367. invalidRadioTrap trap received
  4368. bsnAPDot3MacAddress=%parm[#1]%
  4369. bsnAPIfSlotId=%parm[#2]%
  4370. bsnAPInvalidRadioType=%parm[#3]%&lt;/p&gt;
  4371. </logmsg>
  4372. <severity>Minor</severity>
  4373. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  4374. </event>
  4375. <event>
  4376. <mask>
  4377. <maskelement>
  4378. <mename>id</mename>
  4379. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4380. </maskelement>
  4381. <maskelement>
  4382. <mename>generic</mename>
  4383. <mevalue>6</mevalue>
  4384. </maskelement>
  4385. <maskelement>
  4386. <mename>specific</mename>
  4387. <mevalue>86</mevalue>
  4388. </maskelement>
  4389. </mask>
  4390. <uei>uei.opennms.org/vendor/cisco/countryChangeTrap</uei>
  4391. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: countryChangeTrap</event-label>
  4392. <descr>
  4393. &lt;p&gt;This trap will be generated when an operator changes the
  4394. country of operation. New country code will be sent in trap.&lt;/p&gt;&lt;table&gt;
  4395. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4396. bsnGlobalDot11CountryIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4397. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4398. usa(1)
  4399. canada(2)
  4400. france(3)
  4401. japan(4)
  4402. mexico(5)
  4403. spain(6)
  4404. usalegacy(7)
  4405. korearepublic(8)
  4406. australia(9)
  4407. austria(10)
  4408. belgium(11)
  4409. denmark(12)
  4410. finland(13)
  4411. germany(14)
  4412. greece(15)
  4413. ireland(16)
  4414. italy(17)
  4415. luxembourg(18)
  4416. netherlands(19)
  4417. portugal(20)
  4418. sweden(21)
  4419. unitedkingdom(22)
  4420. none(23)
  4421. india(24)
  4422. hongkong(25)
  4423. switzerland(26)
  4424. iceland(27)
  4425. norway(28)
  4426. singapore(29)
  4427. thailand(30)
  4428. taiwan(31)
  4429. cyprus(33)
  4430. czechrepublic(34)
  4431. estonia(35)
  4432. hungary(36)
  4433. lithuania(37)
  4434. latvia(38)
  4435. malaysia(39)
  4436. newzealand(40)
  4437. poland(41)
  4438. slovenia(42)
  4439. slovakrepublic(43)
  4440. southafrica(44)
  4441. usachan165(45)
  4442. israel(46)
  4443. israelOutdoor(47)
  4444. argentina(48)
  4445. brazil(49)
  4446. saudiArabia(51)
  4447. turkey(52)
  4448. indonesia(53)
  4449. china(54)
  4450. koreaExtended(55)
  4451. japan2(56)
  4452. gibraltar(57)
  4453. liechtenstein(58)
  4454. malta(59)
  4455. monaco(60)
  4456. romania(61)
  4457. russianfederation(62)
  4458. chile(63)
  4459. colombia(64)
  4460. panama(65)
  4461. peru(66)
  4462. venezuela(67)
  4463. philippines(68)
  4464. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4465. </descr>
  4466. <logmsg dest='logndisplay'>&lt;p&gt;
  4467. countryChangeTrap trap received
  4468. bsnGlobalDot11CountryIndex=%parm[#1]%&lt;/p&gt;
  4469. </logmsg>
  4470. <severity>Warning</severity>
  4471. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  4472. </event>
  4473. <event>
  4474. <mask>
  4475. <maskelement>
  4476. <mename>id</mename>
  4477. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4478. </maskelement>
  4479. <maskelement>
  4480. <mename>generic</mename>
  4481. <mevalue>6</mevalue>
  4482. </maskelement>
  4483. <maskelement>
  4484. <mename>specific</mename>
  4485. <mevalue>87</mevalue>
  4486. </maskelement>
  4487. </mask>
  4488. <uei>uei.opennms.org/vendor/cisco/unsupportedAPTrap</uei>
  4489. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: unsupportedAPTrap</event-label>
  4490. <descr>
  4491. &lt;p&gt;This trap will be generated when unsupported AP try to join
  4492. 40xx/410x or 3500 with 64MB flash.&lt;/p&gt;&lt;table&gt;
  4493. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4494. bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4495. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4496. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4497. bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4498. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4499. </descr>
  4500. <logmsg dest='logndisplay'>&lt;p&gt;
  4501. unsupportedAPTrap trap received
  4502. bsnAPDot3MacAddress=%parm[#1]%
  4503. bsnAPName=%parm[#2]%&lt;/p&gt;
  4504. </logmsg>
  4505. <severity>Minor</severity>
  4506. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
  4507. </event>
  4508. <event>
  4509. <mask>
  4510. <maskelement>
  4511. <mename>id</mename>
  4512. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4513. </maskelement>
  4514. <maskelement>
  4515. <mename>generic</mename>
  4516. <mevalue>6</mevalue>
  4517. </maskelement>
  4518. <maskelement>
  4519. <mename>specific</mename>
  4520. <mevalue>88</mevalue>
  4521. </maskelement>
  4522. </mask>
  4523. <uei>uei.opennms.org/vendor/cisco/heartbeatLossTrap</uei>
  4524. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: heartbeatLossTrap</event-label>
  4525. <descr>
  4526. &lt;p&gt;This trap will be generated when controller loses
  4527. connection with the Supervisor Switch in which it
  4528. is physically embedded and doesn't hear the
  4529. heartbeat keepalives from the Supervisor. &lt;/p&gt;&lt;table&gt;&lt;/table&gt;
  4530. </descr>
  4531. <logmsg dest='logndisplay'>&lt;p&gt;
  4532. heartbeatLossTrap trap received&lt;/p&gt;
  4533. </logmsg>
  4534. <severity>Warning</severity>
  4535. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  4536. </event>
  4537. <event>
  4538. <mask>
  4539. <maskelement>
  4540. <mename>id</mename>
  4541. <mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  4542. </maskelement>
  4543. <maskelement>
  4544. <mename>generic</mename>
  4545. <mevalue>6</mevalue>
  4546. </maskelement>
  4547. <maskelement>
  4548. <mename>specific</mename>
  4549. <mevalue>89</mevalue>
  4550. </maskelement>
  4551. </mask>
  4552. <uei>uei.opennms.org/vendor/cisco/locationNotifyTrap</uei>
  4553. <event-label>AIRESPACE-WIRELESS-MIB defined trap event: locationNotifyTrap</event-label>
  4554. <descr>
  4555. &lt;p&gt;This trap will be generated by the location server
  4556. for notifications of location events.&lt;/p&gt;&lt;table&gt;
  4557. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4558. locationNotifyContent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4559. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4560. </descr>
  4561. <logmsg dest='logndisplay'>&lt;p&gt;
  4562. locationNotifyTrap trap received
  4563. locationNotifyContent=%parm[#1]%&lt;/p&gt;
  4564. </logmsg>
  4565. <severity>Normal</severity>
  4566. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
  4567. </event>
  4568. <!-- End of auto generated data from MIB: AIRESPACE-WIRELESS-MIB -->
  4569. <!-- Start of auto generated data from MIB: CISCO-LWAPP-DOT11-CLIENT-MIB -->
  4570. <event>
  4571. <mask>
  4572. <maskelement>
  4573. <mename>id</mename>
  4574. <mevalue>.1.3.6.1.4.1.9.9.599</mevalue>
  4575. </maskelement>
  4576. <maskelement>
  4577. <mename>generic</mename>
  4578. <mevalue>6</mevalue>
  4579. </maskelement>
  4580. <maskelement>
  4581. <mename>specific</mename>
  4582. <mevalue>1</mevalue>
  4583. </maskelement>
  4584. <varbind>
  4585. <vbnumber>1</vbnumber>
  4586. <vbvalue>2</vbvalue>
  4587. </varbind>
  4588. </mask>
  4589. <uei>uei.opennms.org/vendor/cisco/traps/ciscoLwappDot11ClientKeyDecryptErrorWEP</uei>
  4590. <event-label>CISCO-LWAPP-DOT11-CLIENT-MIB defined trap event: ciscoLwappDot11ClientKeyDecryptError</event-label>
  4591. <descr>
  4592. &lt;p&gt;Issued when a decrypt error occurs. The WEP WPA or WPA2 Key
  4593. configured at the station may be wrong.&lt;/p&gt;&lt;table&gt;
  4594. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4595. cldcAssociationMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4596. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4597. unknown(1)
  4598. wep(2)
  4599. wpa(3)
  4600. wpa2(4)
  4601. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4602. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4603. cldcApMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4604. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4605. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4606. cldcIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4607. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4608. dot11bg(1)
  4609. dot11a(2)
  4610. uwb(3)
  4611. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4612. </descr>
  4613. <logmsg dest='logndisplay'>&lt;p&gt;
  4614. ciscoLwappDot11ClientKeyDecryptError trap received
  4615. cldcAssociationMode=%parm[#1]%
  4616. cldcApMacAddress=%parm[#2]%
  4617. cldcIfType=%parm[#3]%&lt;/p&gt;
  4618. </logmsg>
  4619. <severity>Warning</severity>
  4620. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
  4621. </event>
  4622. <event>
  4623. <mask>
  4624. <maskelement>
  4625. <mename>id</mename>
  4626. <mevalue>.1.3.6.1.4.1.9.9.599</mevalue>
  4627. </maskelement>
  4628. <maskelement>
  4629. <mename>generic</mename>
  4630. <mevalue>6</mevalue>
  4631. </maskelement>
  4632. <maskelement>
  4633. <mename>specific</mename>
  4634. <mevalue>1</mevalue>
  4635. </maskelement>
  4636. <varbind>
  4637. <vbnumber>1</vbnumber>
  4638. <vbvalue>3</vbvalue>
  4639. </varbind>
  4640. </mask>
  4641. <uei>uei.opennms.org/vendor/cisco/traps/ciscoLwappDot11ClientKeyDecryptErrorWPA</uei>
  4642. <event-label>CISCO-LWAPP-DOT11-CLIENT-MIB defined trap event: ciscoLwappDot11ClientKeyDecryptError</event-label>
  4643. <descr>
  4644. &lt;p&gt;Issued when a decrypt error occurs. The WEP WPA or WPA2 Key
  4645. configured at the station may be wrong.&lt;/p&gt;&lt;table&gt;
  4646. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4647. cldcAssociationMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4648. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4649. unknown(1)
  4650. wep(2)
  4651. wpa(3)
  4652. wpa2(4)
  4653. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4654. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4655. cldcApMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4656. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4657. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4658. cldcIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4659. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4660. dot11bg(1)
  4661. dot11a(2)
  4662. uwb(3)
  4663. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4664. </descr>
  4665. <logmsg dest='logndisplay'>&lt;p&gt;
  4666. ciscoLwappDot11ClientKeyDecryptError trap received
  4667. cldcAssociationMode=%parm[#1]%
  4668. cldcApMacAddress=%parm[#2]%
  4669. cldcIfType=%parm[#3]%&lt;/p&gt;
  4670. </logmsg>
  4671. <severity>Warning</severity>
  4672. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
  4673. </event>
  4674. <event>
  4675. <mask>
  4676. <maskelement>
  4677. <mename>id</mename>
  4678. <mevalue>.1.3.6.1.4.1.9.9.599</mevalue>
  4679. </maskelement>
  4680. <maskelement>
  4681. <mename>generic</mename>
  4682. <mevalue>6</mevalue>
  4683. </maskelement>
  4684. <maskelement>
  4685. <mename>specific</mename>
  4686. <mevalue>1</mevalue>
  4687. </maskelement>
  4688. <varbind>
  4689. <vbnumber>1</vbnumber>
  4690. <vbvalue>4</vbvalue>
  4691. </varbind>
  4692. </mask>
  4693. <uei>uei.opennms.org/vendor/cisco/traps/ciscoLwappDot11ClientKeyDecryptErrorWPA2</uei>
  4694. <event-label>CISCO-LWAPP-DOT11-CLIENT-MIB defined trap event: ciscoLwappDot11ClientKeyDecryptError</event-label>
  4695. <descr>
  4696. &lt;p&gt;Issued when a decrypt error occurs. The WEP WPA or WPA2 Key
  4697. configured at the station may be wrong.&lt;/p&gt;&lt;table&gt;
  4698. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4699. cldcAssociationMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4700. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4701. unknown(1)
  4702. wep(2)
  4703. wpa(3)
  4704. wpa2(4)
  4705. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4706. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4707. cldcApMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4708. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4709. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4710. cldcIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4711. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4712. dot11bg(1)
  4713. dot11a(2)
  4714. uwb(3)
  4715. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4716. </descr>
  4717. <logmsg dest='logndisplay'>&lt;p&gt;
  4718. ciscoLwappDot11ClientKeyDecryptError trap received
  4719. cldcAssociationMode=%parm[#1]%
  4720. cldcApMacAddress=%parm[#2]%
  4721. cldcIfType=%parm[#3]%&lt;/p&gt;
  4722. </logmsg>
  4723. <severity>Warning</severity>
  4724. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
  4725. </event>
  4726. <event>
  4727. <mask>
  4728. <maskelement>
  4729. <mename>id</mename>
  4730. <mevalue>.1.3.6.1.4.1.9.9.599</mevalue>
  4731. </maskelement>
  4732. <maskelement>
  4733. <mename>generic</mename>
  4734. <mevalue>6</mevalue>
  4735. </maskelement>
  4736. <maskelement>
  4737. <mename>specific</mename>
  4738. <mevalue>1</mevalue>
  4739. </maskelement>
  4740. </mask>
  4741. <uei>uei.opennms.org/vendor/cisco/traps/ciscoLwappDot11ClientKeyDecryptErrorUnknown</uei>
  4742. <event-label>CISCO-LWAPP-DOT11-CLIENT-MIB defined trap event: ciscoLwappDot11ClientKeyDecryptError</event-label>
  4743. <descr>
  4744. &lt;p&gt;Issued when a decrypt error occurs. The WEP WPA or WPA2 Key
  4745. configured at the station may be wrong.&lt;/p&gt;&lt;table&gt;
  4746. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4747. cldcAssociationMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4748. %parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4749. unknown(1)
  4750. wep(2)
  4751. wpa(3)
  4752. wpa2(4)
  4753. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4754. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4755. cldcApMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4756. %parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  4757. &lt;tr&gt;&lt;td&gt;&lt;b&gt;
  4758. cldcIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  4759. %parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  4760. dot11bg(1)
  4761. dot11a(2)
  4762. uwb(3)
  4763. &lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  4764. </descr>
  4765. <logmsg dest='logndisplay'>&lt;p&gt;
  4766. ciscoLwappDot11ClientKeyDecryptError trap received
  4767. cldcAssociationMode=%parm[#1]%
  4768. cldcApMacAddress=%parm[#2]%
  4769. cldcIfType=%parm[#3]%&lt;/p&gt;
  4770. </logmsg>
  4771. <severity>Indeterminate</severity>
  4772. <alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
  4773. </event>
  4774. <!-- End of auto generated data from MIB: CISCO-LWAPP-DOT11-CLIENT-MIB -->
  4775. </events>