PageRenderTime 118ms CodeModel.GetById 17ms app.highlight 80ms RepoModel.GetById 1ms app.codeStats 0ms

/opennms-base-assembly/src/main/filtered/etc/events/Cisco.airespace.xml

https://github.com/ajakubo1/opennms
XML | 5083 lines | 4771 code | 308 blank | 4 comment | 0 complexity | abb0a33e928325c0e78eb8a45c66bdc8 MD5 | raw file
   1<!-- Start of auto generated data from MIB: AIRESPACE-WIRELESS-MIB -->
   2<events xmlns="http://xmlns.opennms.org/xsd/eventconf">
   3<event>
   4	<mask>
   5		<maskelement>
   6			<mename>id</mename>
   7			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
   8		</maskelement>
   9		<maskelement>
  10			<mename>generic</mename>
  11			<mevalue>6</mevalue>
  12		</maskelement>
  13		<maskelement>
  14			<mename>specific</mename>
  15			<mevalue>1</mevalue>
  16		</maskelement>
  17	</mask>
  18	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationDisassociate</uei>
  19	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationDisassociate</event-label>
  20	<descr>
  21&lt;p&gt;The disassociate notification shall be sent when the Station
  22sends a Disassociation frame. The value of the notification
  23shall include the MAC address of the MAC to which the 
  24Disassociation frame was sent and the reason for the 
  25disassociation&lt;/p&gt;&lt;table&gt;
  26	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  27
  28	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  29	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  30	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  31
  32	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  33	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  34	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  35
  36	bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  37	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  38		unspecified(1)
  39		previousAuthNotValid(2)
  40		deauthenticationLeaving(3)
  41		disassociationDueToInactivity(4)
  42		disassociationAPBusy(5)
  43		class2FrameFromNonAuthStation(6)
  44		class2FrameFromNonAssStation(7)
  45		disassociationStaHasLeft(8)
  46		staReqAssociationWithoutAuth(9)
  47		missingReasonCode(99)
  48	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  49	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  50
  51	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  52	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
  53	</descr>
  54		<logmsg dest='logndisplay'>&lt;p&gt;
  55			bsnDot11StationDisassociate trap received 
  56			bsnStationAPMacAddr=%parm[#1]% 
  57			bsnStationAPIfSlotId=%parm[#2]% 
  58			bsnStationReasonCode=%parm[#3]% 
  59			bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
  60		</logmsg>
  61	<severity>Normal</severity>
  62	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
  63</event>
  64<event>
  65	<mask>
  66		<maskelement>
  67			<mename>id</mename>
  68			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
  69		</maskelement>
  70		<maskelement>
  71			<mename>generic</mename>
  72			<mevalue>6</mevalue>
  73		</maskelement>
  74		<maskelement>
  75			<mename>specific</mename>
  76			<mevalue>2</mevalue>
  77		</maskelement>
  78	</mask>
  79	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationDeauthenticate</uei>
  80	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationDeauthenticate</event-label>
  81	<descr>
  82&lt;p&gt;The deauthenticate notification shall be sent when the Station
  83sends a Deauthentication frame. The value of the notification
  84shall include the MAC address of the MAC to which the
  85Deauthentication frame was sent and the reason for the
  86deauthentication.&lt;/p&gt;&lt;table&gt;
  87	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  88
  89	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  90	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  91	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  92
  93	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  94	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
  95	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
  96
  97	bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
  98	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
  99		unspecified(1)
 100		previousAuthNotValid(2)
 101		deauthenticationLeaving(3)
 102		disassociationDueToInactivity(4)
 103		disassociationAPBusy(5)
 104		class2FrameFromNonAuthStation(6)
 105		class2FrameFromNonAssStation(7)
 106		disassociationStaHasLeft(8)
 107		staReqAssociationWithoutAuth(9)
 108		missingReasonCode(99)
 109	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 110	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 111
 112	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 113	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 114	</descr>
 115		<logmsg dest='logndisplay'>&lt;p&gt;
 116			bsnDot11StationDeauthenticate trap received 
 117			bsnStationAPMacAddr=%parm[#1]% 
 118			bsnStationAPIfSlotId=%parm[#2]% 
 119			bsnStationReasonCode=%parm[#3]% 
 120			bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
 121		</logmsg>
 122	<severity>Normal</severity>
 123	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
 124</event>
 125<event>
 126	<mask>
 127		<maskelement>
 128			<mename>id</mename>
 129			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 130		</maskelement>
 131		<maskelement>
 132			<mename>generic</mename>
 133			<mevalue>6</mevalue>
 134		</maskelement>
 135		<maskelement>
 136			<mename>specific</mename>
 137			<mevalue>3</mevalue>
 138		</maskelement>
 139	</mask>
 140	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationAuthenticateFail</uei>
 141	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAuthenticateFail</event-label>
 142	<descr>
 143&lt;p&gt;The authenticate failure notification shall be sent when the 
 144Station sends an Authentication frame with a status code other
 145than 'successful'. The value of the notification shall include
 146the MAC address of the MAC to which the Authentication
 147frame was sent and the reason for the authentication failure.&lt;/p&gt;&lt;table&gt;
 148	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 149
 150	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 151	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 152	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 153
 154	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 155	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 156	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 157
 158	bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 159	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 160		unspecified(1)
 161		previousAuthNotValid(2)
 162		deauthenticationLeaving(3)
 163		disassociationDueToInactivity(4)
 164		disassociationAPBusy(5)
 165		class2FrameFromNonAuthStation(6)
 166		class2FrameFromNonAssStation(7)
 167		disassociationStaHasLeft(8)
 168		staReqAssociationWithoutAuth(9)
 169		missingReasonCode(99)
 170	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 171	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 172
 173	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 174	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 175	</descr>
 176		<logmsg dest='logndisplay'>&lt;p&gt;
 177			bsnDot11StationAuthenticateFail trap received 
 178			bsnStationAPMacAddr=%parm[#1]% 
 179			bsnStationAPIfSlotId=%parm[#2]% 
 180			bsnStationReasonCode=%parm[#3]% 
 181			bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
 182		</logmsg>
 183	<severity>Warning</severity>
 184	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
 185</event>
 186<event>
 187	<mask>
 188		<maskelement>
 189			<mename>id</mename>
 190			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 191		</maskelement>
 192		<maskelement>
 193			<mename>generic</mename>
 194			<mevalue>6</mevalue>
 195		</maskelement>
 196		<maskelement>
 197			<mename>specific</mename>
 198			<mevalue>4</mevalue>
 199		</maskelement>
 200	</mask>
 201	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationAssociateFail</uei>
 202	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAssociateFail</event-label>
 203	<descr>
 204&lt;p&gt;The associate failure notification shall be sent when the 
 205Station sends an Association frame with a status code other 
 206than 'successful'. The value of the notification
 207shall include the MAC address of the MAC to which the 
 208Authentication frame was sent and the reason for the 
 209authentication failure.&lt;/p&gt;&lt;table&gt;
 210	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 211
 212	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 213	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 214	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 215
 216	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 217	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 218	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 219
 220	bsnStationReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 221	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 222		unspecified(1)
 223		previousAuthNotValid(2)
 224		deauthenticationLeaving(3)
 225		disassociationDueToInactivity(4)
 226		disassociationAPBusy(5)
 227		class2FrameFromNonAuthStation(6)
 228		class2FrameFromNonAssStation(7)
 229		disassociationStaHasLeft(8)
 230		staReqAssociationWithoutAuth(9)
 231		missingReasonCode(99)
 232	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 233	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 234
 235	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 236	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 237	</descr>
 238		<logmsg dest='logndisplay'>&lt;p&gt;
 239			bsnDot11StationAssociateFail trap received 
 240			bsnStationAPMacAddr=%parm[#1]% 
 241			bsnStationAPIfSlotId=%parm[#2]% 
 242			bsnStationReasonCode=%parm[#3]% 
 243			bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
 244		</logmsg>
 245	<severity>Warning</severity>
 246	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
 247</event>
 248<event>
 249	<mask>
 250		<maskelement>
 251			<mename>id</mename>
 252			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 253		</maskelement>
 254		<maskelement>
 255			<mename>generic</mename>
 256			<mevalue>6</mevalue>
 257		</maskelement>
 258		<maskelement>
 259			<mename>specific</mename>
 260			<mevalue>5</mevalue>
 261		</maskelement>
 262	</mask>
 263	<uei>uei.opennms.org/vendor/cisco/bsnAPUp</uei>
 264	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPUp</event-label>
 265	<descr>
 266&lt;p&gt;When Airespace AP operation status goes up this trap will be 
 267sent&lt;/p&gt;&lt;table&gt;
 268	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 269
 270	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 271	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 272	</descr>
 273		<logmsg dest='logndisplay'>&lt;p&gt;
 274			bsnAPUp trap received 
 275			bsnAPDot3MacAddress=%parm[#1]%&lt;/p&gt;
 276		</logmsg>
 277	<severity>Normal</severity>
 278	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPDown:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
 279</event>
 280<event>
 281	<mask>
 282		<maskelement>
 283			<mename>id</mename>
 284			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 285		</maskelement>
 286		<maskelement>
 287			<mename>generic</mename>
 288			<mevalue>6</mevalue>
 289		</maskelement>
 290		<maskelement>
 291			<mename>specific</mename>
 292			<mevalue>6</mevalue>
 293		</maskelement>
 294	</mask>
 295	<uei>uei.opennms.org/vendor/cisco/bsnAPDown</uei>
 296	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPDown</event-label>
 297	<descr>
 298&lt;p&gt;When Airespace AP operation status goes down this trap will be
 299sent&lt;/p&gt;&lt;table&gt;
 300	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 301
 302	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 303	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 304	</descr>
 305		<logmsg dest='logndisplay'>&lt;p&gt;
 306			bsnAPDown trap received 
 307			bsnAPDot3MacAddress=%parm[#1]%&lt;/p&gt;
 308		</logmsg>
 309	<severity>Major</severity>
 310	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 311</event>
 312<event>
 313	<mask>
 314		<maskelement>
 315			<mename>id</mename>
 316			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 317		</maskelement>
 318		<maskelement>
 319			<mename>generic</mename>
 320			<mevalue>6</mevalue>
 321		</maskelement>
 322		<maskelement>
 323			<mename>specific</mename>
 324			<mevalue>7</mevalue>
 325		</maskelement>
 326	</mask>
 327	<uei>uei.opennms.org/vendor/cisco/bsnAPAssociated</uei>
 328	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPAssociated</event-label>
 329	<descr>
 330&lt;p&gt;When Airespace AP Associates to a Airespace Switch, AP 
 331associated notification will be sent with dot3 MAC address of 
 332Airespace AP.This will help management system to discover 
 333Airespace AP and add to system.&lt;/p&gt;&lt;table&gt;
 334	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 335
 336	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 337	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 338	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 339
 340	bsnAPPortNumberTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 341	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 342	</descr>
 343		<logmsg dest='logndisplay'>&lt;p&gt;
 344			bsnAPAssociated trap received 
 345			bsnAPMacAddrTrapVariable=%parm[#1]% 
 346			bsnAPPortNumberTrapVariable=%parm[#2]%&lt;/p&gt;
 347		</logmsg>
 348	<severity>Normal</severity>
 349	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPDisassociated:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
 350</event>
 351<event>
 352	<mask>
 353		<maskelement>
 354			<mename>id</mename>
 355			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 356		</maskelement>
 357		<maskelement>
 358			<mename>generic</mename>
 359			<mevalue>6</mevalue>
 360		</maskelement>
 361		<maskelement>
 362			<mename>specific</mename>
 363			<mevalue>8</mevalue>
 364		</maskelement>
 365	</mask>
 366	<uei>uei.opennms.org/vendor/cisco/bsnAPDisassociated</uei>
 367	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPDisassociated</event-label>
 368	<descr>
 369&lt;p&gt;When Airespace AP disassociates from Airespace Switch, AP 
 370disassociated notification will be sent with dot3 MAC address
 371of Airespace AP management system to remove Airespace AP from
 372this Airespace Switch&lt;/p&gt;&lt;table&gt;
 373	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 374
 375	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 376	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 377	</descr>
 378		<logmsg dest='logndisplay'>&lt;p&gt;
 379			bsnAPDisassociated trap received 
 380			bsnAPMacAddrTrapVariable=%parm[#1]%&lt;/p&gt;
 381		</logmsg>
 382	<severity>Warning</severity>
 383	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 384</event>
 385<event>
 386	<mask>
 387		<maskelement>
 388			<mename>id</mename>
 389			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 390		</maskelement>
 391		<maskelement>
 392			<mename>generic</mename>
 393			<mevalue>6</mevalue>
 394		</maskelement>
 395		<maskelement>
 396			<mename>specific</mename>
 397			<mevalue>9</mevalue>
 398		</maskelement>
 399	</mask>
 400	<uei>uei.opennms.org/vendor/cisco/bsnAPIfUp</uei>
 401	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIfUp</event-label>
 402	<descr>
 403&lt;p&gt;When Airespace AP's interface's operation status goes up this
 404trap will be sent&lt;/p&gt;&lt;table&gt;
 405	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 406
 407	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 408	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 409	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 410
 411	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 412	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 413	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 414
 415	bsnAPPortNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 416	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 417	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 418
 419	bsnAPIfUpDownCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 420	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 421		unknown(0)
 422		radioFailure(1)
 423		radioLowPower(2)
 424		maxRetransmission(3)
 425		echoTimeout(4)
 426		configAP(5)
 427		configRadio(6)
 428		configNetwork(7)
 429	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 430	</descr>
 431		<logmsg dest='logndisplay'>&lt;p&gt;
 432			bsnAPIfUp trap received 
 433			bsnAPDot3MacAddress=%parm[#1]% 
 434			bsnAPIfSlotId=%parm[#2]% 
 435			bsnAPPortNumber=%parm[#3]% 
 436			bsnAPIfUpDownCause=%parm[#4]%&lt;/p&gt;
 437		</logmsg>
 438	<severity>Normal</severity>
 439	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPIfDown:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
 440</event>
 441<event>
 442	<mask>
 443		<maskelement>
 444			<mename>id</mename>
 445			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 446		</maskelement>
 447		<maskelement>
 448			<mename>generic</mename>
 449			<mevalue>6</mevalue>
 450		</maskelement>
 451		<maskelement>
 452			<mename>specific</mename>
 453			<mevalue>10</mevalue>
 454		</maskelement>
 455	</mask>
 456	<uei>uei.opennms.org/vendor/cisco/bsnAPIfDown</uei>
 457	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIfDown</event-label>
 458	<descr>
 459&lt;p&gt;When Airespace AP's interface's operation status goes down 
 460this trap will be sent.&lt;/p&gt;&lt;table&gt;
 461	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 462
 463	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 464	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 465	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 466
 467	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 468	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 469	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 470
 471	bsnAPAdminStatus&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 472	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 473		enable(1)
 474		disable(2)
 475	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 476	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 477
 478	bsnAPIfAdminStatus&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 479	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 480		enable(1)
 481		disable(2)
 482	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 483	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 484
 485	bsnAPIfUpDownCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 486	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
 487		unknown(0)
 488		radioFailure(1)
 489		radioLowPower(2)
 490		maxRetransmission(3)
 491		echoTimeout(4)
 492		configAP(5)
 493		configRadio(6)
 494		configNetwork(7)
 495	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 496	</descr>
 497		<logmsg dest='logndisplay'>&lt;p&gt;
 498			bsnAPIfDown trap received 
 499			bsnAPDot3MacAddress=%parm[#1]% 
 500			bsnAPIfSlotId=%parm[#2]% 
 501			bsnAPAdminStatus=%parm[#3]% 
 502			bsnAPIfAdminStatus=%parm[#4]% 
 503			bsnAPIfUpDownCause=%parm[#5]%&lt;/p&gt;
 504		</logmsg>
 505	<severity>Warning</severity>
 506	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
 507</event>
 508<event>
 509	<mask>
 510		<maskelement>
 511			<mename>id</mename>
 512			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 513		</maskelement>
 514		<maskelement>
 515			<mename>generic</mename>
 516			<mevalue>6</mevalue>
 517		</maskelement>
 518		<maskelement>
 519			<mename>specific</mename>
 520			<mevalue>11</mevalue>
 521		</maskelement>
 522	</mask>
 523	<uei>uei.opennms.org/vendor/cisco/bsnAPLoadProfileFailed</uei>
 524	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPLoadProfileFailed</event-label>
 525	<descr>
 526&lt;p&gt;When LOAD Profile state changes from PASS to FAIL, 
 527notification will be sent with Dot3 MAC address of Airespace 
 528AP and slot ID of Airespace AP IF. This trap sending can be 
 529enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
 530	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 531
 532	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 533	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 534	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 535
 536	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 537	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 538	</descr>
 539		<logmsg dest='logndisplay'>&lt;p&gt;
 540			bsnAPLoadProfileFailed trap received 
 541			bsnAPDot3MacAddress=%parm[#1]% 
 542			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
 543		</logmsg>
 544	<severity>Warning</severity>
 545	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 546</event>
 547<event>
 548	<mask>
 549		<maskelement>
 550			<mename>id</mename>
 551			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 552		</maskelement>
 553		<maskelement>
 554			<mename>generic</mename>
 555			<mevalue>6</mevalue>
 556		</maskelement>
 557		<maskelement>
 558			<mename>specific</mename>
 559			<mevalue>12</mevalue>
 560		</maskelement>
 561	</mask>
 562	<uei>uei.opennms.org/vendor/cisco/bsnAPNoiseProfileFailed</uei>
 563	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPNoiseProfileFailed</event-label>
 564	<descr>
 565&lt;p&gt;When Noise Profile state changes from PASS to FAIL, 
 566notification will be sent with Dot3 MAC address of Airespace 
 567AP and slot ID of Airespace AP IF. This trap sending can be 
 568enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
 569	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 570
 571	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 572	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 573	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 574
 575	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 576	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 577	</descr>
 578		<logmsg dest='logndisplay'>&lt;p&gt;
 579			bsnAPNoiseProfileFailed trap received 
 580			bsnAPDot3MacAddress=%parm[#1]% 
 581			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
 582		</logmsg>
 583	<severity>Warning</severity>
 584	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 585</event>
 586<event>
 587	<mask>
 588		<maskelement>
 589			<mename>id</mename>
 590			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 591		</maskelement>
 592		<maskelement>
 593			<mename>generic</mename>
 594			<mevalue>6</mevalue>
 595		</maskelement>
 596		<maskelement>
 597			<mename>specific</mename>
 598			<mevalue>13</mevalue>
 599		</maskelement>
 600	</mask>
 601	<uei>uei.opennms.org/vendor/cisco/bsnAPInterferenceProfileFailed</uei>
 602	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPInterferenceProfileFailed</event-label>
 603	<descr>
 604&lt;p&gt;When Interference Profile state changes from PASS to FAIL,
 605notification will be sent with Dot3 MAC address of Airespace 
 606AP and slot ID of Airespace AP IF. This trap sending can be 
 607enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
 608	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 609
 610	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 611	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 612	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 613
 614	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 615	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 616	</descr>
 617		<logmsg dest='logndisplay'>&lt;p&gt;
 618			bsnAPInterferenceProfileFailed trap received 
 619			bsnAPDot3MacAddress=%parm[#1]% 
 620			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
 621		</logmsg>
 622	<severity>Warning</severity>
 623	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 624</event>
 625<event>
 626	<mask>
 627		<maskelement>
 628			<mename>id</mename>
 629			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 630		</maskelement>
 631		<maskelement>
 632			<mename>generic</mename>
 633			<mevalue>6</mevalue>
 634		</maskelement>
 635		<maskelement>
 636			<mename>specific</mename>
 637			<mevalue>14</mevalue>
 638		</maskelement>
 639	</mask>
 640	<uei>uei.opennms.org/vendor/cisco/bsnAPCoverageProfileFailed</uei>
 641	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCoverageProfileFailed</event-label>
 642	<descr>
 643&lt;p&gt;When Coverage Profile state changes from PASS to FAIL, 
 644notification will be sent with Dot3 MAC address of Airespace 
 645AP and slot ID of Airespace AP IF. This trap sending can be 
 646enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
 647	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 648
 649	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 650	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 651	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 652
 653	bsnAPNameTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 654	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 655	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 656
 657	bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 658	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 659	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 660
 661	bsnAPCoverageThresholdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 662	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 663	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 664
 665	bsnAPCoverageFailedClients&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 666	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 667	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 668
 669	bsnAPCoverageTotalClients&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 670	%parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 671	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 672
 673	bsnClientMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 674	%parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 675	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 676
 677	bsnClientRssi&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 678	%parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 679	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 680
 681	bsnClientSnr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 682	%parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 683	</descr>
 684		<logmsg dest='logndisplay'>&lt;p&gt;
 685			bsnAPCoverageProfileFailed trap received 
 686			bsnAPMacAddrTrapVariable=%parm[#1]% 
 687			bsnAPNameTrapVariable=%parm[#2]% 
 688			bsnAPSlotIdTrapVariable=%parm[#3]% 
 689			bsnAPCoverageThresholdTrapVariable=%parm[#4]% 
 690			bsnAPCoverageFailedClients=%parm[#5]% 
 691			bsnAPCoverageTotalClients=%parm[#6]% 
 692			bsnClientMacAddr=%parm[#7]% 
 693			bsnClientRssi=%parm[#8]% 
 694			bsnClientSnr=%parm[#9]%&lt;/p&gt;
 695		</logmsg>
 696	<severity>Warning</severity>
 697	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
 698</event>
 699<event>
 700	<mask>
 701		<maskelement>
 702			<mename>id</mename>
 703			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 704		</maskelement>
 705		<maskelement>
 706			<mename>generic</mename>
 707			<mevalue>6</mevalue>
 708		</maskelement>
 709		<maskelement>
 710			<mename>specific</mename>
 711			<mevalue>15</mevalue>
 712		</maskelement>
 713	</mask>
 714	<uei>uei.opennms.org/vendor/cisco/bsnAPCurrentTxPowerChanged</uei>
 715	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCurrentTxPowerChanged</event-label>
 716	<descr>
 717&lt;p&gt;Whenever dynamic algorithms are running and 
 718bsnAPIfPhyPowerAutomaticOn is true, Airespace AP Interface's 
 719CurrentTxPower might get updated by algorithm. When
 720this occurs notification will be sent with Dot3 MAC address of
 721Airespace AP and slot ID of Airespace AP IF along with the 
 722currentTxPower for this Airespace AP IF&lt;/p&gt;&lt;table&gt;
 723	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 724
 725	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 726	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 727	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 728
 729	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 730	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 731	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 732
 733	bsnAPIfPhyTxPowerLevel&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 734	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 735	</descr>
 736		<logmsg dest='logndisplay'>&lt;p&gt;
 737			bsnAPCurrentTxPowerChanged trap received 
 738			bsnAPDot3MacAddress=%parm[#1]% 
 739			bsnAPIfSlotId=%parm[#2]% 
 740			bsnAPIfPhyTxPowerLevel=%parm[#3]%&lt;/p&gt;
 741		</logmsg>
 742	<severity>Normal</severity>
 743	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 744</event>
 745<event>
 746	<mask>
 747		<maskelement>
 748			<mename>id</mename>
 749			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 750		</maskelement>
 751		<maskelement>
 752			<mename>generic</mename>
 753			<mevalue>6</mevalue>
 754		</maskelement>
 755		<maskelement>
 756			<mename>specific</mename>
 757			<mevalue>16</mevalue>
 758		</maskelement>
 759	</mask>
 760	<uei>uei.opennms.org/vendor/cisco/bsnAPCurrentChannelChanged</uei>
 761	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCurrentChannelChanged</event-label>
 762	<descr>
 763&lt;p&gt;Whenever dynamic algorithms are running and 
 764bsnAPIfPhyChannelAutomaticOn is true, Airespace AP 
 765Interface's CurrentChannel might get updated by algorithm. 
 766When this occurs notification will be sent with Dot3 MAC 
 767address of Airespace AP and slot ID of Airespace AP IF along 
 768with the currentChannel for this Airespace AP IF&lt;/p&gt;&lt;table&gt;
 769	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 770
 771	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 772	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 773	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 774
 775	bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 776	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 777	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 778
 779	bsnAPChannelNumberTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 780	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 781	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 782
 783	bsnInterferenceEnergyBeforeChannelUpdate&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 784	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
 785	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 786
 787	bsnInterferenceEnergyAfterChannelUpdate&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 788	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 789	</descr>
 790		<logmsg dest='logndisplay'>&lt;p&gt;
 791			bsnAPCurrentChannelChanged trap received 
 792			bsnAPMacAddrTrapVariable=%parm[#1]% 
 793			bsnAPSlotIdTrapVariable=%parm[#2]% 
 794			bsnAPChannelNumberTrapVariable=%parm[#3]% 
 795			bsnInterferenceEnergyBeforeChannelUpdate=%parm[#4]% 
 796			bsnInterferenceEnergyAfterChannelUpdate=%parm[#5]%&lt;/p&gt;
 797		</logmsg>
 798	<severity>Normal</severity>
 799	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
 800</event>
 801<event>
 802	<mask>
 803		<maskelement>
 804			<mename>id</mename>
 805			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 806		</maskelement>
 807		<maskelement>
 808			<mename>generic</mename>
 809			<mevalue>6</mevalue>
 810		</maskelement>
 811		<maskelement>
 812			<mename>specific</mename>
 813			<mevalue>21</mevalue>
 814		</maskelement>
 815	</mask>
 816	<uei>uei.opennms.org/vendor/cisco/bsnRrmDot11aGroupingDone</uei>
 817	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRrmDot11aGroupingDone</event-label>
 818	<descr>
 819&lt;p&gt;When Grouping is done, this notification will be sent from the
 820previous Group Leader where grouping algorithm was run. It has
 821MAC address of the new Group Leader.&lt;/p&gt;&lt;table&gt;
 822	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 823
 824	bsnRrmDot11aGroupLeaderMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 825	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 826	</descr>
 827		<logmsg dest='logndisplay'>&lt;p&gt;
 828			bsnRrmDot11aGroupingDone trap received 
 829			bsnRrmDot11aGroupLeaderMacAddr=%parm[#1]%&lt;/p&gt;
 830		</logmsg>
 831	<severity>Normal</severity>
 832	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 833</event>
 834<event>
 835	<mask>
 836		<maskelement>
 837			<mename>id</mename>
 838			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 839		</maskelement>
 840		<maskelement>
 841			<mename>generic</mename>
 842			<mevalue>6</mevalue>
 843		</maskelement>
 844		<maskelement>
 845			<mename>specific</mename>
 846			<mevalue>22</mevalue>
 847		</maskelement>
 848	</mask>
 849	<uei>uei.opennms.org/vendor/cisco/bsnRrmDot11bGroupingDone</uei>
 850	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRrmDot11bGroupingDone</event-label>
 851	<descr>
 852&lt;p&gt;When Grouping is done, this notification will be sent from the
 853previous Group Leader where grouping algorithm was run. It has
 854MAC address of the new Group Leader.&lt;/p&gt;&lt;table&gt;
 855	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 856
 857	bsnRrmDot11bGroupLeaderMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 858	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 859	</descr>
 860		<logmsg dest='logndisplay'>&lt;p&gt;
 861			bsnRrmDot11bGroupingDone trap received 
 862			bsnRrmDot11bGroupLeaderMacAddr=%parm[#1]%&lt;/p&gt;
 863		</logmsg>
 864	<severity>Normal</severity>
 865	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 866</event>
 867<event>
 868	<mask>
 869		<maskelement>
 870			<mename>id</mename>
 871			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 872		</maskelement>
 873		<maskelement>
 874			<mename>generic</mename>
 875			<mevalue>6</mevalue>
 876		</maskelement>
 877		<maskelement>
 878			<mename>specific</mename>
 879			<mevalue>23</mevalue>
 880		</maskelement>
 881	</mask>
 882	<uei>uei.opennms.org/vendor/cisco/bsnConfigSaved</uei>
 883	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnConfigSaved</event-label>
 884	<descr>
 885&lt;p&gt;When configuration is save either from CLI or web interface
 886This trap will be sent to inform NMS to do refresh&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
 887	</descr>
 888		<logmsg dest='logndisplay'>&lt;p&gt;
 889			bsnConfigSaved trap received&lt;/p&gt;
 890		</logmsg>
 891	<severity>Indeterminate</severity>
 892</event>
 893<event>
 894	<mask>
 895		<maskelement>
 896			<mename>id</mename>
 897			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 898		</maskelement>
 899		<maskelement>
 900			<mename>generic</mename>
 901			<mevalue>6</mevalue>
 902		</maskelement>
 903		<maskelement>
 904			<mename>specific</mename>
 905			<mevalue>24</mevalue>
 906		</maskelement>
 907	</mask>
 908	<uei>uei.opennms.org/vendor/cisco/bsnDot11EssCreated</uei>
 909	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11EssCreated</event-label>
 910	<descr>
 911&lt;p&gt;Whenever a new Ess (WLAN) is created, this notification will 
 912be sent along with EssIndex&lt;/p&gt;&lt;table&gt;
 913	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 914
 915	bsnDot11EssIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 916	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 917	</descr>
 918		<logmsg dest='logndisplay'>&lt;p&gt;
 919			bsnDot11EssCreated trap received 
 920			bsnDot11EssIndex=%parm[#1]%&lt;/p&gt;
 921		</logmsg>
 922	<severity>Normal</severity>
 923	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 924</event>
 925<event>
 926	<mask>
 927		<maskelement>
 928			<mename>id</mename>
 929			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 930		</maskelement>
 931		<maskelement>
 932			<mename>generic</mename>
 933			<mevalue>6</mevalue>
 934		</maskelement>
 935		<maskelement>
 936			<mename>specific</mename>
 937			<mevalue>25</mevalue>
 938		</maskelement>
 939	</mask>
 940	<uei>uei.opennms.org/vendor/cisco/bsnDot11EssDeleted</uei>
 941	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11EssDeleted</event-label>
 942	<descr>
 943&lt;p&gt;Whenever a Ess (WLAN)is deleted, this notification will be 
 944sent along with EssIndex&lt;/p&gt;&lt;table&gt;
 945	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
 946
 947	bsnDot11EssIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
 948	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
 949	</descr>
 950		<logmsg dest='logndisplay'>&lt;p&gt;
 951			bsnDot11EssDeleted trap received 
 952			bsnDot11EssIndex=%parm[#1]%&lt;/p&gt;
 953		</logmsg>
 954	<severity>Warning</severity>
 955	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
 956</event>
 957<event>
 958	<mask>
 959		<maskelement>
 960			<mename>id</mename>
 961			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 962		</maskelement>
 963		<maskelement>
 964			<mename>generic</mename>
 965			<mevalue>6</mevalue>
 966		</maskelement>
 967		<maskelement>
 968			<mename>specific</mename>
 969			<mevalue>26</mevalue>
 970		</maskelement>
 971	</mask>
 972	<uei>uei.opennms.org/vendor/cisco/bsnRADIUSServerNotResponding</uei>
 973	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRADIUSServerNotResponding</event-label>
 974	<descr>
 975&lt;p&gt;This trap is to indicate that no RADIUS server(s) are responding
 976to authentication requests sent by the RADIUS client within the
 977MWAR device(Switch).&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
 978	</descr>
 979		<logmsg dest='logndisplay'>&lt;p&gt;
 980			bsnRADIUSServerNotResponding trap received&lt;/p&gt;
 981		</logmsg>
 982	<severity>Minor</severity>
 983	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
 984</event>
 985<event>
 986	<mask>
 987		<maskelement>
 988			<mename>id</mename>
 989			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
 990		</maskelement>
 991		<maskelement>
 992			<mename>generic</mename>
 993			<mevalue>6</mevalue>
 994		</maskelement>
 995		<maskelement>
 996			<mename>specific</mename>
 997			<mevalue>27</mevalue>
 998		</maskelement>
 999		<varbind>
1000			<vbnumber>1</vbnumber>
1001			<vbvalue>1</vbvalue>
1002		</varbind>
1003	</mask>
1004	<uei>uei.opennms.org/vendor/cisco/bsnAuthenticationFailureMgmt</uei>
1005	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAuthenticationFailure</event-label>
1006	<descr>
1007&lt;p&gt;This trap is to inform that client authentication failure has
1008occured at MWAR(Switch). This could be cli/web user, wlan user, 
1009or Mac Authorized user. ServiceType will indicate which type of 
1010user it is and userName will be cli/web/wlan userName or 
1011MacAddress of Mac Authorized User&lt;/p&gt;&lt;table&gt;
1012	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1013
1014	bsnAuthFailureUserType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1015	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
1016		mgmtUser(1)
1017		wlanUser(2)
1018		macFilter(3)
1019	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1020	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1021
1022	bsnAuthFailureUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1023	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1024	</descr>
1025		<logmsg dest='logndisplay'>&lt;p&gt;
1026			bsnAuthenticationFailure trap received 
1027			bsnAuthFailureUserType=%parm[#1]% 
1028			bsnAuthFailureUserName=%parm[#2]%&lt;/p&gt;
1029		</logmsg>
1030	<severity>Warning</severity>
1031	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="1" auto-clean="false" />
1032</event>
1033<event>
1034	<mask>
1035		<maskelement>
1036			<mename>id</mename>
1037			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1038		</maskelement>
1039		<maskelement>
1040			<mename>generic</mename>
1041			<mevalue>6</mevalue>
1042		</maskelement>
1043		<maskelement>
1044			<mename>specific</mename>
1045			<mevalue>27</mevalue>
1046		</maskelement>
1047	</mask>
1048	<uei>uei.opennms.org/vendor/cisco/bsnAuthenticationFailure</uei>
1049	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAuthenticationFailure</event-label>
1050	<descr>
1051&lt;p&gt;This trap is to inform that client authentication failure has
1052occured at MWAR(Switch). This could be cli/web user, wlan user, 
1053or Mac Authorized user. ServiceType will indicate which type of 
1054user it is and userName will be cli/web/wlan userName or 
1055MacAddress of Mac Authorized User&lt;/p&gt;&lt;table&gt;
1056	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1057
1058	bsnAuthFailureUserType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1059	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
1060		mgmtUser(1)
1061		wlanUser(2)
1062		macFilter(3)
1063	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1064	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1065
1066	bsnAuthFailureUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1067	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1068	</descr>
1069		<logmsg dest='logndisplay'>&lt;p&gt;
1070			bsnAuthenticationFailure trap received 
1071			bsnAuthFailureUserType=%parm[#1]% 
1072			bsnAuthFailureUserName=%parm[#2]%&lt;/p&gt;
1073		</logmsg>
1074	<severity>Normal</severity>
1075	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1076</event>
1077<event>
1078	<mask>
1079		<maskelement>
1080			<mename>id</mename>
1081			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1082		</maskelement>
1083		<maskelement>
1084			<mename>generic</mename>
1085			<mevalue>6</mevalue>
1086		</maskelement>
1087		<maskelement>
1088			<mename>specific</mename>
1089			<mevalue>28</mevalue>
1090		</maskelement>
1091	</mask>
1092	<uei>uei.opennms.org/vendor/cisco/bsnIpsecEspAuthFailureTrap</uei>
1093	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspAuthFailureTrap</event-label>
1094	<descr>
1095&lt;p&gt;IPsec packets with invalid hashes were found in an inbound
1096ESP SA. The total number of authentication errors
1097accumulated is sent for the specific row of the
1098ipsecSaEspInTable table for the SA; this provides the
1099identity of the SA in which the error occurred.
1100
1101Implementations SHOULD send one trap per SA (within a
1102reasonable time period), rather than sending one trap per
1103packet.&lt;/p&gt;&lt;table&gt;
1104	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1105
1106	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1107	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1108	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1109
1110	bsnIpsecErrorCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1111	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1112	</descr>
1113		<logmsg dest='logndisplay'>&lt;p&gt;
1114			bsnIpsecEspAuthFailureTrap trap received 
1115			bsnRemoteIPv4Address=%parm[#1]% 
1116			bsnIpsecErrorCount=%parm[#2]%&lt;/p&gt;
1117		</logmsg>
1118	<severity>Normal</severity>
1119	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1120</event>
1121<event>
1122	<mask>
1123		<maskelement>
1124			<mename>id</mename>
1125			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1126		</maskelement>
1127		<maskelement>
1128			<mename>generic</mename>
1129			<mevalue>6</mevalue>
1130		</maskelement>
1131		<maskelement>
1132			<mename>specific</mename>
1133			<mevalue>29</mevalue>
1134		</maskelement>
1135	</mask>
1136	<uei>uei.opennms.org/vendor/cisco/bsnIpsecEspReplayFailureTrap</uei>
1137	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspReplayFailureTrap</event-label>
1138	<descr>
1139&lt;p&gt;IPsec packets with invalid sequence numbers were found in
1140an inbound ESP SA. The total number of replay errors
1141accumulated is sent for the specific row of the
1142ipsecSaEspInTable table for the SA; this provides the
1143identity of the SA in which the error occurred.
1144
1145Implementations SHOULD send one trap per SA (within a
1146reasonable time period), rather than sending one trap per
1147packet.&lt;/p&gt;&lt;table&gt;
1148	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1149
1150	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1151	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1152	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1153
1154	bsnIpsecErrorCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1155	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1156	</descr>
1157		<logmsg dest='logndisplay'>&lt;p&gt;
1158			bsnIpsecEspReplayFailureTrap trap received 
1159			bsnRemoteIPv4Address=%parm[#1]% 
1160			bsnIpsecErrorCount=%parm[#2]%&lt;/p&gt;
1161		</logmsg>
1162	<severity>Warning</severity>
1163	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
1164</event>
1165<event>
1166	<mask>
1167		<maskelement>
1168			<mename>id</mename>
1169			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1170		</maskelement>
1171		<maskelement>
1172			<mename>generic</mename>
1173			<mevalue>6</mevalue>
1174		</maskelement>
1175		<maskelement>
1176			<mename>specific</mename>
1177			<mevalue>31</mevalue>
1178		</maskelement>
1179	</mask>
1180	<uei>uei.opennms.org/vendor/cisco/bsnIpsecEspInvalidSpiTrap</uei>
1181	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecEspInvalidSpiTrap</event-label>
1182	<descr>
1183&lt;p&gt;A packet with an unknown SPI was detected from the
1184specified peer with the specified SPI using the specified
1185protocol. The destination address of the received packet is
1186specified by ipsecLocalAddress.
1187
1188The value ifIndex may be 0 if this optional linkage is
1189unsupported.
1190
1191If the object ipsecSecurityProtocol has the value for
1192IPcomp, then the ipsecSPI object is the CPI of the packet.
1193
1194Implementations SHOULD send one trap per peer (within a
1195reasonable time period), rather than sending one trap per
1196packet.&lt;/p&gt;&lt;table&gt;
1197	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1198
1199	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1200	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1201	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1202
1203	bsnIpsecSPI&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1204	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1205	</descr>
1206		<logmsg dest='logndisplay'>&lt;p&gt;
1207			bsnIpsecEspInvalidSpiTrap trap received 
1208			bsnRemoteIPv4Address=%parm[#1]% 
1209			bsnIpsecSPI=%parm[#2]%&lt;/p&gt;
1210		</logmsg>
1211	<severity>Normal</severity>
1212	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1213</event>
1214<event>
1215	<mask>
1216		<maskelement>
1217			<mename>id</mename>
1218			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1219		</maskelement>
1220		<maskelement>
1221			<mename>generic</mename>
1222			<mevalue>6</mevalue>
1223		</maskelement>
1224		<maskelement>
1225			<mename>specific</mename>
1226			<mevalue>33</mevalue>
1227		</maskelement>
1228	</mask>
1229	<uei>uei.opennms.org/vendor/cisco/bsnIpsecIkeNegFailure</uei>
1230	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecIkeNegFailure</event-label>
1231	<descr>
1232&lt;p&gt;An attempt to negotiate a phase 1 IKE SA failed.
1233The notification counts are also sent as part of the trap,
1234along with the current value of the total negotiation error
1235counters for ISAKMP.&lt;/p&gt;&lt;table&gt;
1236	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1237
1238	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1239	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1240	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1241
1242	bsnRemoteUdpPort&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1243	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1244	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1245
1246	bsnIkeAuthMethod&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1247	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1248	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1249
1250	bsnIkeTotalInitFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1251	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1252	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1253
1254	bsnIkeTotalInitNoResponses&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1255	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1256	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1257
1258	bsnIkeTotalRespFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1259	%parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1260	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1261
1262	bsnNotifiesSent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1263	%parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1264	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1265
1266	bsnNotifiesReceived&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1267	%parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1268	</descr>
1269		<logmsg dest='logndisplay'>&lt;p&gt;
1270			bsnIpsecIkeNegFailure trap received 
1271			bsnRemoteIPv4Address=%parm[#1]% 
1272			bsnRemoteUdpPort=%parm[#2]% 
1273			bsnIkeAuthMethod=%parm[#3]% 
1274			bsnIkeTotalInitFailures=%parm[#4]% 
1275			bsnIkeTotalInitNoResponses=%parm[#5]% 
1276			bsnIkeTotalRespFailures=%parm[#6]% 
1277			bsnNotifiesSent=%parm[#7]% 
1278			bsnNotifiesReceived=%parm[#8]%&lt;/p&gt;
1279		</logmsg>
1280	<severity>Normal</severity>
1281	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1282</event>
1283<event>
1284	<mask>
1285		<maskelement>
1286			<mename>id</mename>
1287			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1288		</maskelement>
1289		<maskelement>
1290			<mename>generic</mename>
1291			<mevalue>6</mevalue>
1292		</maskelement>
1293		<maskelement>
1294			<mename>specific</mename>
1295			<mevalue>34</mevalue>
1296		</maskelement>
1297	</mask>
1298	<uei>uei.opennms.org/vendor/cisco/bsnIpsecSuiteNegFailure</uei>
1299	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecSuiteNegFailure</event-label>
1300	<descr>
1301&lt;p&gt;An attempt to negotiate a phase 2 SA suite for the
1302specified selector failed.
1303The current total failure counts are passed as well as the
1304notification type counts for the notify involved in the
1305failure.&lt;/p&gt;&lt;table&gt;
1306	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1307
1308	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1309	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1310	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1311
1312	bsnSuiteInitFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1313	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1314	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1315
1316	bsnSuiteRespondFailures&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1317	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1318	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1319
1320	bsnNotifiesSent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1321	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1322	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1323
1324	bsnNotifiesReceived&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1325	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1326	</descr>
1327		<logmsg dest='logndisplay'>&lt;p&gt;
1328			bsnIpsecSuiteNegFailure trap received 
1329			bsnRemoteIPv4Address=%parm[#1]% 
1330			bsnSuiteInitFailures=%parm[#2]% 
1331			bsnSuiteRespondFailures=%parm[#3]% 
1332			bsnNotifiesSent=%parm[#4]% 
1333			bsnNotifiesReceived=%parm[#5]%&lt;/p&gt;
1334		</logmsg>
1335	<severity>Normal</severity>
1336	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1337</event>
1338<event>
1339	<mask>
1340		<maskelement>
1341			<mename>id</mename>
1342			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1343		</maskelement>
1344		<maskelement>
1345			<mename>generic</mename>
1346			<mevalue>6</mevalue>
1347		</maskelement>
1348		<maskelement>
1349			<mename>specific</mename>
1350			<mevalue>35</mevalue>
1351		</maskelement>
1352	</mask>
1353	<uei>uei.opennms.org/vendor/cisco/bsnIpsecInvalidCookieTrap</uei>
1354	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnIpsecInvalidCookieTrap</event-label>
1355	<descr>
1356&lt;p&gt;ISAKMP packets with invalid cookies were detected from the
1357specified source, intended for the specified destination.
1358
1359The initiator and responder cookies are also sent with the
1360trap.
1361
1362The current count is sent to allow the trap to accurately
1363relfect dropped and throttled traps.
1364
1365Implementations SHOULD send one trap per peer (within a
1366reasonable time period, rather than sending one trap per
1367packet.&lt;/p&gt;&lt;table&gt;
1368	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1369
1370	bsnRemoteIPv4Address&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1371	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1372	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1373
1374	bsnRemoteUdpPort&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1375	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1376	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1377
1378	bsnInitiatorCookie&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1379	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1380	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1381
1382	bsnResponderCookie&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1383	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1384	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1385
1386	bsnIsakmpInvalidCookies&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1387	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1388	</descr>
1389		<logmsg dest='logndisplay'>&lt;p&gt;
1390			bsnIpsecInvalidCookieTrap trap received 
1391			bsnRemoteIPv4Address=%parm[#1]% 
1392			bsnRemoteUdpPort=%parm[#2]% 
1393			bsnInitiatorCookie=%parm[#3]% 
1394			bsnResponderCookie=%parm[#4]% 
1395			bsnIsakmpInvalidCookies=%parm[#5]%&lt;/p&gt;
1396		</logmsg>
1397	<severity>Normal</severity>
1398	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1399</event>
1400<event>
1401	<mask>
1402		<maskelement>
1403			<mename>id</mename>
1404			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1405		</maskelement>
1406		<maskelement>
1407			<mename>generic</mename>
1408			<mevalue>6</mevalue>
1409		</maskelement>
1410		<maskelement>
1411			<mename>specific</mename>
1412			<mevalue>36</mevalue>
1413		</maskelement>
1414	</mask>
1415	<uei>uei.opennms.org/vendor/cisco/bsnRogueAPDetected</uei>
1416	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPDetected</event-label>
1417	<descr>
1418&lt;p&gt;When a Rogue AP is detected this Trap will be sent out along
1419with APMacAddress on which its detected&lt;/p&gt;&lt;table&gt;
1420	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1421
1422	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1423	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1424	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1425
1426	bsnRogueAPAirespaceAPMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1427	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1428	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1429
1430	bsnRogueAPAirespaceAPSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1431	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1432	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1433
1434	bsnRogueAPSsid&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1435	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1436	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1437
1438	bsnRogueAPChannelNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1439	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1440	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1441
1442	bsnRogueAPAirespaceAPRSSI&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1443	%parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1444	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1445
1446	bsnRogueAPAirespaceAPSNR&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1447	%parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1448	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1449
1450	bsnRogueAPOnWiredNetwork&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1451	%parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
1452		no(0)
1453		yes(1)
1454	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1455	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1456
1457	bsnRogueAdhocMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1458	%parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
1459		no(0)
1460		yes(1)
1461	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1462	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1463
1464	bsnRogueAPRadioType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1465	%parm[#10]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
1466		dot11b(1)
1467		dot11a(2)
1468		unknown(3)
1469	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1470	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1471
1472	bsnRogueAPAirespaceAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1473	%parm[#11]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1474	</descr>
1475		<logmsg dest='logndisplay'>&lt;p&gt;
1476			bsnRogueAPDetected trap received 
1477			bsnRogueAPDot11MacAddress=%parm[#1]% 
1478			bsnRogueAPAirespaceAPMacAddress=%parm[#2]% 
1479			bsnRogueAPAirespaceAPSlotId=%parm[#3]% 
1480			bsnRogueAPSsid=%parm[#4]% 
1481			bsnRogueAPChannelNumber=%parm[#5]% 
1482			bsnRogueAPAirespaceAPRSSI=%parm[#6]% 
1483			bsnRogueAPAirespaceAPSNR=%parm[#7]% 
1484			bsnRogueAPOnWiredNetwork=%parm[#8]% 
1485			bsnRogueAdhocMode=%parm[#9]% 
1486			bsnRogueAPRadioType=%parm[#10]% 
1487			bsnRogueAPAirespaceAPName=%parm[#11]%&lt;/p&gt;
1488		</logmsg>
1489	<severity>Warning</severity>
1490	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[11]%" alarm-type="1" auto-clean="false" />
1491</event>
1492<event>
1493	<mask>
1494		<maskelement>
1495			<mename>id</mename>
1496			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1497		</maskelement>
1498		<maskelement>
1499			<mename>generic</mename>
1500			<mevalue>6</mevalue>
1501		</maskelement>
1502		<maskelement>
1503			<mename>specific</mename>
1504			<mevalue>37</mevalue>
1505		</maskelement>
1506	</mask>
1507	<uei>uei.opennms.org/vendor/cisco/bsnAPLoadProfileUpdatedToPass</uei>
1508	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPLoadProfileUpdatedToPass</event-label>
1509	<descr>
1510&lt;p&gt;When LOAD Profile state changes from FAIL to PASSt this 
1511notification will be sent with Dot3 MAC address of Airespace 
1512AP and slot ID of Airespace AP IF. This trap sending can be 
1513enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
1514	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1515
1516	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1517	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1518	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1519
1520	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1521	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1522	</descr>
1523		<logmsg dest='logndisplay'>&lt;p&gt;
1524			bsnAPLoadProfileUpdatedToPass trap received 
1525			bsnAPDot3MacAddress=%parm[#1]% 
1526			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
1527		</logmsg>
1528	<severity>Normal</severity>
1529	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPLoadProfileFailed:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
1530</event>
1531<event>
1532	<mask>
1533		<maskelement>
1534			<mename>id</mename>
1535			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1536		</maskelement>
1537		<maskelement>
1538			<mename>generic</mename>
1539			<mevalue>6</mevalue>
1540		</maskelement>
1541		<maskelement>
1542			<mename>specific</mename>
1543			<mevalue>38</mevalue>
1544		</maskelement>
1545	</mask>
1546	<uei>uei.opennms.org/vendor/cisco/bsnAPNoiseProfileUpdatedToPass</uei>
1547	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPNoiseProfileUpdatedToPass</event-label>
1548	<descr>
1549&lt;p&gt;When Noise Profile state changes from FAIL tp PASS, 
1550notification will be sent with Dot3 MAC address of Airespace 
1551AP and slot ID of Airespace AP IF. This trap sending can be 
1552enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
1553	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1554
1555	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1556	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1557	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1558
1559	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1560	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1561	</descr>
1562		<logmsg dest='logndisplay'>&lt;p&gt;
1563			bsnAPNoiseProfileUpdatedToPass trap received 
1564			bsnAPDot3MacAddress=%parm[#1]% 
1565			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
1566		</logmsg>
1567	<severity>Normal</severity>
1568	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPNoiseProfileFailed:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
1569</event>
1570<event>
1571	<mask>
1572		<maskelement>
1573			<mename>id</mename>
1574			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1575		</maskelement>
1576		<maskelement>
1577			<mename>generic</mename>
1578			<mevalue>6</mevalue>
1579		</maskelement>
1580		<maskelement>
1581			<mename>specific</mename>
1582			<mevalue>39</mevalue>
1583		</maskelement>
1584	</mask>
1585	<uei>uei.opennms.org/vendor/cisco/bsnAPInterferenceProfileUpdatedToPass</uei>
1586	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPInterferenceProfileUpdatedToPass</event-label>
1587	<descr>
1588&lt;p&gt;When Interference Profile state changes from FAIL tp PASS,
1589notification will be sent with Dot3 MAC address of Airespace 
1590AP and slot ID of Airespace AP IF. This trap sending can be 
1591enable /disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
1592	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1593
1594	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1595	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1596	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1597
1598	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1599	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1600	</descr>
1601		<logmsg dest='logndisplay'>&lt;p&gt;
1602			bsnAPInterferenceProfileUpdatedToPass trap received 
1603			bsnAPDot3MacAddress=%parm[#1]% 
1604			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
1605		</logmsg>
1606	<severity>Normal</severity>
1607	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPInterferenceProfileFailed:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" auto-clean="false" />
1608</event>
1609<event>
1610	<mask>
1611		<maskelement>
1612			<mename>id</mename>
1613			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1614		</maskelement>
1615		<maskelement>
1616			<mename>generic</mename>
1617			<mevalue>6</mevalue>
1618		</maskelement>
1619		<maskelement>
1620			<mename>specific</mename>
1621			<mevalue>40</mevalue>
1622		</maskelement>
1623	</mask>
1624	<uei>uei.opennms.org/vendor/cisco/bsnAPCoverageProfileUpdatedToPass</uei>
1625	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPCoverageProfileUpdatedToPass</event-label>
1626	<descr>
1627&lt;p&gt;When Coverage Profile state changes from FAIL tp PASS, 
1628notification will be sent with Dot3 MAC address of Airespace 
1629AP and slot ID of Airespace AP IF. This trap sending can be 
1630enable/disable using bsnRrmProfileTrapControlFlag &lt;/p&gt;&lt;table&gt;
1631	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1632
1633	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1634	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1635	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1636
1637	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1638	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1639	</descr>
1640		<logmsg dest='logndisplay'>&lt;p&gt;
1641			bsnAPCoverageProfileUpdatedToPass trap received 
1642			bsnAPDot3MacAddress=%parm[#1]% 
1643			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
1644		</logmsg>
1645	<severity>Normal</severity>
1646	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPCoverageProfileFailed:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
1647</event>
1648<event>
1649	<mask>
1650		<maskelement>
1651			<mename>id</mename>
1652			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1653		</maskelement>
1654		<maskelement>
1655			<mename>generic</mename>
1656			<mevalue>6</mevalue>
1657		</maskelement>
1658		<maskelement>
1659			<mename>specific</mename>
1660			<mevalue>41</mevalue>
1661		</maskelement>
1662	</mask>
1663	<uei>uei.opennms.org/vendor/cisco/bsnRogueAPRemoved</uei>
1664	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPRemoved</event-label>
1665	<descr>
1666&lt;p&gt;When a Rogue AP that was detected earlier no longer exists
1667this Trap will be sent out along
1668with APMacAddress on which its detected&lt;/p&gt;&lt;table&gt;
1669	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1670
1671	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1672	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1673	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1674
1675	bsnRogueAPAirespaceAPMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1676	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1677	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1678
1679	bsnRogueAPAirespaceAPSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1680	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1681	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1682
1683	bsnRogueAPRadioType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1684	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
1685		dot11b(1)
1686		dot11a(2)
1687		unknown(3)
1688	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1689	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1690
1691	bsnRogueAPAirespaceAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1692	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1693	</descr>
1694		<logmsg dest='logndisplay'>&lt;p&gt;
1695			bsnRogueAPRemoved trap received 
1696			bsnRogueAPDot11MacAddress=%parm[#1]% 
1697			bsnRogueAPAirespaceAPMacAddress=%parm[#2]% 
1698			bsnRogueAPAirespaceAPSlotId=%parm[#3]% 
1699			bsnRogueAPRadioType=%parm[#4]% 
1700			bsnRogueAPAirespaceAPName=%parm[#5]%&lt;/p&gt;
1701		</logmsg>
1702	<severity>Normal</severity>
1703	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#5]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnRogueAPDetected:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#5]%" auto-clean="false" />
1704</event>
1705<event>
1706	<mask>
1707		<maskelement>
1708			<mename>id</mename>
1709			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1710		</maskelement>
1711		<maskelement>
1712			<mename>generic</mename>
1713			<mevalue>6</mevalue>
1714		</maskelement>
1715		<maskelement>
1716			<mename>specific</mename>
1717			<mevalue>42</mevalue>
1718		</maskelement>
1719	</mask>
1720	<uei>uei.opennms.org/vendor/cisco/bsnRadiosExceedLicenseCount</uei>
1721	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRadiosExceedLicenseCount</event-label>
1722	<descr>
1723&lt;p&gt;Whenever the currently associated Radios exceed the License Count
1724This trap will be sent to annoy the Customer&lt;/p&gt;&lt;table&gt;
1725	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1726
1727	bsnCurrentRadiosCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1728	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1729	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1730
1731	bsnLicenseRadioCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1732	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1733	</descr>
1734		<logmsg dest='logndisplay'>&lt;p&gt;
1735			bsnRadiosExceedLicenseCount trap received 
1736			bsnCurrentRadiosCount=%parm[#1]% 
1737			bsnLicenseRadioCount=%parm[#2]%&lt;/p&gt;
1738		</logmsg>
1739	<severity>Warning</severity>
1740	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
1741</event>
1742<event>
1743	<mask>
1744		<maskelement>
1745			<mename>id</mename>
1746			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1747		</maskelement>
1748		<maskelement>
1749			<mename>generic</mename>
1750			<mevalue>6</mevalue>
1751		</maskelement>
1752		<maskelement>
1753			<mename>specific</mename>
1754			<mevalue>43</mevalue>
1755		</maskelement>
1756	</mask>
1757	<uei>uei.opennms.org/vendor/cisco/bsnSensedTemperatureOutOfRange</uei>
1758	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnSensedTemperatureTooHigh</event-label>
1759	<descr>
1760&lt;p&gt;Temperature sensor temp too High - temp is too high on the unit.  
1761Immediate action should be taken&lt;/p&gt;&lt;table&gt;
1762	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1763
1764	bsnSensorTemperature&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1765	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1766	</descr>
1767		<logmsg dest='logndisplay'>&lt;p&gt;
1768			bsnSensedTemperatureTooHigh trap received 
1769			bsnSensorTemperature=%parm[#1]%&lt;/p&gt;
1770		</logmsg>
1771	<severity>Minor</severity>
1772	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
1773</event>
1774<event>
1775	<mask>
1776		<maskelement>
1777			<mename>id</mename>
1778			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1779		</maskelement>
1780		<maskelement>
1781			<mename>generic</mename>
1782			<mevalue>6</mevalue>
1783		</maskelement>
1784		<maskelement>
1785			<mename>specific</mename>
1786			<mevalue>44</mevalue>
1787		</maskelement>
1788	</mask>
1789	<uei>uei.opennms.org/vendor/cisco/bsnSensedTemperatureOutOfRange</uei>
1790	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnSensedTemperatureTooLow</event-label>
1791	<descr>
1792&lt;p&gt;Temperature sensor temp too Low  - temp is too low on the unit. 
1793Immediate action should be taken&lt;/p&gt;&lt;table&gt;
1794	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1795
1796	bsnSensorTemperature&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1797	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1798	</descr>
1799		<logmsg dest='logndisplay'>&lt;p&gt;
1800			bsnSensedTemperatureTooLow trap received 
1801			bsnSensorTemperature=%parm[#1]%&lt;/p&gt;
1802		</logmsg>
1803	<severity>Minor</severity>
1804	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
1805</event>
1806<event>
1807	<mask>
1808		<maskelement>
1809			<mename>id</mename>
1810			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1811		</maskelement>
1812		<maskelement>
1813			<mename>generic</mename>
1814			<mevalue>6</mevalue>
1815		</maskelement>
1816		<maskelement>
1817			<mename>specific</mename>
1818			<mevalue>45</mevalue>
1819		</maskelement>
1820	</mask>
1821	<uei>uei.opennms.org/vendor/cisco/bsnTemperatureSensorFailure</uei>
1822	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTemperatureSensorFailure</event-label>
1823	<descr>
1824&lt;p&gt;Temperature sensor hw failure - temp sensor has failed.  
1825Temperature is unknown&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
1826	</descr>
1827		<logmsg dest='logndisplay'>&lt;p&gt;
1828			bsnTemperatureSensorFailure trap received&lt;/p&gt;
1829		</logmsg>
1830	<severity>Warning</severity>
1831	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
1832</event>
1833<event>
1834	<mask>
1835		<maskelement>
1836			<mename>id</mename>
1837			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1838		</maskelement>
1839		<maskelement>
1840			<mename>generic</mename>
1841			<mevalue>6</mevalue>
1842		</maskelement>
1843		<maskelement>
1844			<mename>specific</mename>
1845			<mevalue>46</mevalue>
1846		</maskelement>
1847	</mask>
1848	<uei>uei.opennms.org/vendor/cisco/bsnTemperatureSensorClear</uei>
1849	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTemperatureSensorClear</event-label>
1850	<descr>
1851&lt;p&gt;Temperature sensor clear -- temp sensor alarm condition is over.  
1852sensor is operating within proper temp range&lt;/p&gt;&lt;table&gt;
1853	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1854
1855	bsnSensorTemperature&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1856	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1857	</descr>
1858		<logmsg dest='logndisplay'>&lt;p&gt;
1859			bsnTemperatureSensorClear trap received 
1860			bsnSensorTemperature=%parm[#1]%&lt;/p&gt;
1861		</logmsg>
1862	<severity>Normal</severity>
1863	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnSensedTemperatureOutOfRange:%dpname%:%nodeid%:%interface%" auto-clean="false" />
1864</event>
1865<event>
1866	<mask>
1867		<maskelement>
1868			<mename>id</mename>
1869			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1870		</maskelement>
1871		<maskelement>
1872			<mename>generic</mename>
1873			<mevalue>6</mevalue>
1874		</maskelement>
1875		<maskelement>
1876			<mename>specific</mename>
1877			<mevalue>47</mevalue>
1878		</maskelement>
1879	</mask>
1880	<uei>uei.opennms.org/vendor/cisco/bsnPOEControllerFailure</uei>
1881	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnPOEControllerFailure</event-label>
1882	<descr>
1883&lt;p&gt;POE Controller has failed. Its a very critical trap.
1884User intervention is required.&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
1885	</descr>
1886		<logmsg dest='logndisplay'>&lt;p&gt;
1887			bsnPOEControllerFailure trap received&lt;/p&gt;
1888		</logmsg>
1889	<severity>Major</severity>
1890	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1891</event>
1892<event>
1893	<mask>
1894		<maskelement>
1895			<mename>id</mename>
1896			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1897		</maskelement>
1898		<maskelement>
1899			<mename>generic</mename>
1900			<mevalue>6</mevalue>
1901		</maskelement>
1902		<maskelement>
1903			<mename>specific</mename>
1904			<mevalue>48</mevalue>
1905		</maskelement>
1906	</mask>
1907	<uei>uei.opennms.org/vendor/cisco/bsnMaxRogueCountExceeded</uei>
1908	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnMaxRogueCountExceeded</event-label>
1909	<descr>
1910&lt;p&gt;The number of rogues has exceeded the maximum Rogues allowed&lt;/p&gt;&lt;table&gt;
1911	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1912
1913	bsnMaxRogueCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1914	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1915	</descr>
1916		<logmsg dest='logndisplay'>&lt;p&gt;
1917			bsnMaxRogueCountExceeded trap received 
1918			bsnMaxRogueCount=%parm[#1]%&lt;/p&gt;
1919		</logmsg>
1920	<severity>Minor</severity>
1921	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1922</event>
1923<event>
1924	<mask>
1925		<maskelement>
1926			<mename>id</mename>
1927			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1928		</maskelement>
1929		<maskelement>
1930			<mename>generic</mename>
1931			<mevalue>6</mevalue>
1932		</maskelement>
1933		<maskelement>
1934			<mename>specific</mename>
1935			<mevalue>49</mevalue>
1936		</maskelement>
1937	</mask>
1938	<uei>uei.opennms.org/vendor/cisco/bsnMaxRogueCountClear</uei>
1939	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnMaxRogueCountClear</event-label>
1940	<descr>
1941&lt;p&gt;The number of rogues is within the maximum Rogues allowed&lt;/p&gt;&lt;table&gt;
1942	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1943
1944	bsnMaxRogueCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1945	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1946	</descr>
1947		<logmsg dest='logndisplay'>&lt;p&gt;
1948			bsnMaxRogueCountClear trap received 
1949			bsnMaxRogueCount=%parm[#1]%&lt;/p&gt;
1950		</logmsg>
1951	<severity>Normal</severity>
1952	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnMaxRogueCountExceeded:%dpname%:%nodeid%:%interface%" auto-clean="false" />
1953</event>
1954<event>
1955	<mask>
1956		<maskelement>
1957			<mename>id</mename>
1958			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1959		</maskelement>
1960		<maskelement>
1961			<mename>generic</mename>
1962			<mevalue>6</mevalue>
1963		</maskelement>
1964		<maskelement>
1965			<mename>specific</mename>
1966			<mevalue>50</mevalue>
1967		</maskelement>
1968	</mask>
1969	<uei>uei.opennms.org/vendor/cisco/bsnApMaxRogueCountExceeded</uei>
1970	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnApMaxRogueCountExceeded</event-label>
1971	<descr>
1972&lt;p&gt;The number of rogues has exceeded the maximum Rogues allowed on 
1973the AP&lt;/p&gt;&lt;table&gt;
1974	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1975
1976	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1977	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
1978	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
1979
1980	bsnMaxRogueCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
1981	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
1982	</descr>
1983		<logmsg dest='logndisplay'>&lt;p&gt;
1984			bsnApMaxRogueCountExceeded trap received 
1985			bsnAPMacAddrTrapVariable=%parm[#1]% 
1986			bsnMaxRogueCount=%parm[#2]%&lt;/p&gt;
1987		</logmsg>
1988	<severity>Minor</severity>
1989	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
1990</event>
1991<event>
1992	<mask>
1993		<maskelement>
1994			<mename>id</mename>
1995			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
1996		</maskelement>
1997		<maskelement>
1998			<mename>generic</mename>
1999			<mevalue>6</mevalue>
2000		</maskelement>
2001		<maskelement>
2002			<mename>specific</mename>
2003			<mevalue>51</mevalue>
2004		</maskelement>
2005	</mask>
2006	<uei>uei.opennms.org/vendor/cisco/bsnApMaxRogueCountClear</uei>
2007	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnApMaxRogueCountClear</event-label>
2008	<descr>
2009&lt;p&gt;The number of rogues is within the maximum Rogues allowed on the 
2010AP&lt;/p&gt;&lt;table&gt;
2011	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2012
2013	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2014	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2015	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2016
2017	bsnMaxRogueCount&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2018	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2019	</descr>
2020		<logmsg dest='logndisplay'>&lt;p&gt;
2021			bsnApMaxRogueCountClear trap received 
2022			bsnAPMacAddrTrapVariable=%parm[#1]% 
2023			bsnMaxRogueCount=%parm[#2]%&lt;/p&gt;
2024		</logmsg>
2025	<severity>Normal</severity>
2026	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnApMaxRogueCountExceeded:%dpname%:%nodeid%:%interface%" auto-clean="false" />
2027</event>
2028<event>
2029	<mask>
2030		<maskelement>
2031			<mename>id</mename>
2032			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2033		</maskelement>
2034		<maskelement>
2035			<mename>generic</mename>
2036			<mevalue>6</mevalue>
2037		</maskelement>
2038		<maskelement>
2039			<mename>specific</mename>
2040			<mevalue>52</mevalue>
2041		</maskelement>
2042	</mask>
2043	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationBlacklisted</uei>
2044	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationBlacklisted</event-label>
2045	<descr>
2046&lt;p&gt;The station blacklisted notification shall be sent when the 
2047client is blacklisted.  The reason could be repeated auth or 
2048association failures or IP Address theft.
2049The value of the notification shall include the MAC address 
2050of the MAC to which the Authentication frame was sent, the 
2051MAC and Slot Id of AP that client was associated to and the 
2052reason for black listing.&lt;/p&gt;&lt;table&gt;
2053	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2054
2055	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2056	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2057	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2058
2059	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2060	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2061	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2062
2063	bsnStationBlacklistingReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2064	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2065		failed80211Auth(1)
2066		failedAssociation(2)
2067		ipTheft(3)
2068		failed8021xAuth(4)
2069		failedWebAuth(5)
2070	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2071	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2072
2073	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2074	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2075	</descr>
2076		<logmsg dest='logndisplay'>&lt;p&gt;
2077			bsnDot11StationBlacklisted trap received 
2078			bsnStationAPMacAddr=%parm[#1]% 
2079			bsnStationAPIfSlotId=%parm[#2]% 
2080			bsnStationBlacklistingReasonCode=%parm[#3]% 
2081			bsnStationMacAddress=%parm[#4]%&lt;/p&gt;
2082		</logmsg>
2083	<severity>Warning</severity>
2084	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
2085</event>
2086<event>
2087	<mask>
2088		<maskelement>
2089			<mename>id</mename>
2090			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2091		</maskelement>
2092		<maskelement>
2093			<mename>generic</mename>
2094			<mevalue>6</mevalue>
2095		</maskelement>
2096		<maskelement>
2097			<mename>specific</mename>
2098			<mevalue>53</mevalue>
2099		</maskelement>
2100	</mask>
2101	<uei>uei.opennms.org/vendor/cisco/bsnDot11StationAssociate</uei>
2102	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDot11StationAssociate</event-label>
2103	<descr>
2104&lt;p&gt;The associate notification shall be sent when any of the 
2105watchlisted clients(present on at least one watch list)
2106associates with an AP. The value of the notification
2107shall include the MAC address and the Slot ID of the radio 
2108to which the station Associated.&lt;/p&gt;&lt;table&gt;
2109	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2110
2111	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2112	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2113	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2114
2115	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2116	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2117	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2118
2119	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2120	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2121	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2122
2123	bsnStationUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2124	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2125	</descr>
2126		<logmsg dest='logndisplay'>&lt;p&gt;
2127			bsnDot11StationAssociate trap received 
2128			bsnStationAPMacAddr=%parm[#1]% 
2129			bsnStationAPIfSlotId=%parm[#2]% 
2130			bsnStationMacAddress=%parm[#3]% 
2131			bsnStationUserName=%parm[#4]%&lt;/p&gt;
2132		</logmsg>
2133	<severity>Major</severity>
2134	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
2135</event>
2136<event>
2137	<mask>
2138		<maskelement>
2139			<mename>id</mename>
2140			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2141		</maskelement>
2142		<maskelement>
2143			<mename>generic</mename>
2144			<mevalue>6</mevalue>
2145		</maskelement>
2146		<maskelement>
2147			<mename>specific</mename>
2148			<mevalue>55</mevalue>
2149		</maskelement>
2150	</mask>
2151	<uei>uei.opennms.org/vendor/cisco/bsnApBigNavDosAttack</uei>
2152	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnApBigNavDosAttack</event-label>
2153	<descr>
2154&lt;p&gt;The AP sent a string of messages with large NAV field and all 
2155802.11 traffic on that channel was suspended.&lt;/p&gt;&lt;table&gt;
2156	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2157
2158	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2159	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2160	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2161
2162	bsnAPSlotIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2163	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2164	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2165
2166	bsnNavDosAttackSourceMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2167	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2168	</descr>
2169		<logmsg dest='logndisplay'>&lt;p&gt;
2170			bsnApBigNavDosAttack trap received 
2171			bsnAPMacAddrTrapVariable=%parm[#1]% 
2172			bsnAPSlotIdTrapVariable=%parm[#2]% 
2173			bsnNavDosAttackSourceMacAddr=%parm[#3]%&lt;/p&gt;
2174		</logmsg>
2175	<severity>Minor</severity>
2176	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
2177</event>
2178<event>
2179	<mask>
2180		<maskelement>
2181			<mename>id</mename>
2182			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2183		</maskelement>
2184		<maskelement>
2185			<mename>generic</mename>
2186			<mevalue>6</mevalue>
2187		</maskelement>
2188		<maskelement>
2189			<mename>specific</mename>
2190			<mevalue>56</mevalue>
2191		</maskelement>
2192	</mask>
2193	<uei>uei.opennms.org/vendor/cisco/bsnTooManyUnsuccessLoginAttempts</uei>
2194	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTooManyUnsuccessLoginAttempts</event-label>
2195	<descr>
2196&lt;p&gt;The Management User made too many unsuccessful login attempts.&lt;/p&gt;&lt;table&gt;
2197	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2198
2199	bsnUserIpAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2200	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2201	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2202
2203	bsnStationUserName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2204	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2205	</descr>
2206		<logmsg dest='logndisplay'>&lt;p&gt;
2207			bsnTooManyUnsuccessLoginAttempts trap received 
2208			bsnUserIpAddress=%parm[#1]% 
2209			bsnStationUserName=%parm[#2]%&lt;/p&gt;
2210		</logmsg>
2211	<severity>Warning</severity>
2212	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
2213</event>
2214<event>
2215	<mask>
2216		<maskelement>
2217			<mename>id</mename>
2218			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2219		</maskelement>
2220		<maskelement>
2221			<mename>generic</mename>
2222			<mevalue>6</mevalue>
2223		</maskelement>
2224		<maskelement>
2225			<mename>specific</mename>
2226			<mevalue>57</mevalue>
2227		</maskelement>
2228	</mask>
2229	<uei>uei.opennms.org/vendor/cisco/bsnWepKeyDecryptError</uei>
2230	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnWepKeyDecryptError</event-label>
2231	<descr>
2232&lt;p&gt;Issued when a decrypt error occurrs. The WEP Key configured at 
2233the station may be wrong.&lt;/p&gt;&lt;table&gt;
2234	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2235
2236	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2237	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2238	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2239
2240	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2241	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2242	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2243
2244	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2245	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2246	</descr>
2247		<logmsg dest='logndisplay'>&lt;p&gt;
2248			bsnWepKeyDecryptError trap received 
2249			bsnStationMacAddress=%parm[#1]% 
2250			bsnStationAPMacAddr=%parm[#2]% 
2251			bsnStationAPIfSlotId=%parm[#3]%&lt;/p&gt;
2252		</logmsg>
2253	<severity>Normal</severity>
2254	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="true" />
2255</event>
2256<event>
2257	<mask>
2258		<maskelement>
2259			<mename>id</mename>
2260			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2261		</maskelement>
2262		<maskelement>
2263			<mename>generic</mename>
2264			<mevalue>6</mevalue>
2265		</maskelement>
2266		<maskelement>
2267			<mename>specific</mename>
2268			<mevalue>58</mevalue>
2269		</maskelement>
2270	</mask>
2271	<uei>uei.opennms.org/vendor/cisco/bsnWpaMicErrorCounterActivated</uei>
2272	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnWpaMicErrorCounterActivated</event-label>
2273	<descr>
2274&lt;p&gt;Issued when a WPA MIC error occurs and a counter measure is 
2275activated at the AP.&lt;/p&gt;&lt;table&gt;
2276	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2277
2278	bsnStationMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2279	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2280	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2281
2282	bsnStationAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2283	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2284	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2285
2286	bsnStationAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2287	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2288	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2289
2290	bsnWlanIdTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2291	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2292	</descr>
2293		<logmsg dest='logndisplay'>&lt;p&gt;
2294			bsnWpaMicErrorCounterActivated trap received 
2295			bsnStationMacAddress=%parm[#1]% 
2296			bsnStationAPMacAddr=%parm[#2]% 
2297			bsnStationAPIfSlotId=%parm[#3]% 
2298			bsnWlanIdTrapVariable=%parm[#4]%&lt;/p&gt;
2299		</logmsg>
2300	<severity>Minor</severity>
2301	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%" alarm-type="1" auto-clean="true" />
2302</event>
2303<event>
2304	<mask>
2305		<maskelement>
2306			<mename>id</mename>
2307			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2308		</maskelement>
2309		<maskelement>
2310			<mename>generic</mename>
2311			<mevalue>6</mevalue>
2312		</maskelement>
2313		<maskelement>
2314			<mename>specific</mename>
2315			<mevalue>59</mevalue>
2316		</maskelement>
2317		<varbind>
2318			<vbnumber>2</vbnumber>
2319			<vbvalue>0</vbvalue>
2320		</varbind>
2321	</mask>
2322	<uei>uei.opennms.org/vendor/cisco/bsnRogueAPDetectedOnWiredNetworkClear</uei>
2323	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPDetectedOnWiredNetwork</event-label>
2324	<descr>
2325&lt;p&gt;When a Rogue is detected on the wired network this trap will 
2326be sent out.
2327The same trap with bsnRogueAPOnWiredNetwork set to no will 
2328clear the previous trap.&lt;/p&gt;&lt;table&gt;
2329	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2330
2331	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2332	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2333	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2334
2335	bsnRogueAPOnWiredNetwork&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2336	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2337		no(0)
2338		yes(1)
2339	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2340	</descr>
2341		<logmsg dest='logndisplay'>&lt;p&gt;
2342			bsnRogueAPDetectedOnWiredNetwork trap received 
2343			bsnRogueAPDot11MacAddress=%parm[#1]% 
2344			bsnRogueAPOnWiredNetwork=%parm[#2]%&lt;/p&gt;
2345		</logmsg>
2346	<severity>Minor</severity>
2347	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnRogueAPDetectedOnWiredNetwork:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
2348</event>
2349<event>
2350	<mask>
2351		<maskelement>
2352			<mename>id</mename>
2353			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2354		</maskelement>
2355		<maskelement>
2356			<mename>generic</mename>
2357			<mevalue>6</mevalue>
2358		</maskelement>
2359		<maskelement>
2360			<mename>specific</mename>
2361			<mevalue>59</mevalue>
2362		</maskelement>
2363	</mask>
2364	<uei>uei.opennms.org/vendor/cisco/bsnRogueAPDetectedOnWiredNetwork</uei>
2365	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueAPDetectedOnWiredNetwork</event-label>
2366	<descr>
2367&lt;p&gt;When a Rogue is detected on the wired network this trap will 
2368be sent out.
2369The same trap with bsnRogueAPOnWiredNetwork set to no will 
2370clear the previous trap.&lt;/p&gt;&lt;table&gt;
2371	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2372
2373	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2374	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2375	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2376
2377	bsnRogueAPOnWiredNetwork&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2378	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2379		no(0)
2380		yes(1)
2381	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2382	</descr>
2383		<logmsg dest='logndisplay'>&lt;p&gt;
2384			bsnRogueAPDetectedOnWiredNetwork trap received 
2385			bsnRogueAPDot11MacAddress=%parm[#1]% 
2386			bsnRogueAPOnWiredNetwork=%parm[#2]%&lt;/p&gt;
2387		</logmsg>
2388	<severity>Minor</severity>
2389	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
2390</event>
2391<event>
2392	<mask>
2393		<maskelement>
2394			<mename>id</mename>
2395			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2396		</maskelement>
2397		<maskelement>
2398			<mename>generic</mename>
2399			<mevalue>6</mevalue>
2400		</maskelement>
2401		<maskelement>
2402			<mename>specific</mename>
2403			<mevalue>60</mevalue>
2404		</maskelement>
2405	</mask>
2406	<uei>uei.opennms.org/vendor/cisco/bsnApHasNoRadioCards</uei>
2407	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnApHasNoRadioCards</event-label>
2408	<descr>
2409&lt;p&gt;When an AP has no radio cards present on it, the switch 
2410sends this trap.&lt;/p&gt;&lt;table&gt;
2411	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2412
2413	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2414	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2415	</descr>
2416		<logmsg dest='logndisplay'>&lt;p&gt;
2417			bsnApHasNoRadioCards trap received 
2418			bsnAPMacAddrTrapVariable=%parm[#1]%&lt;/p&gt;
2419		</logmsg>
2420	<severity>Minor</severity>
2421	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
2422</event>
2423<event>
2424	<mask>
2425		<maskelement>
2426			<mename>id</mename>
2427			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2428		</maskelement>
2429		<maskelement>
2430			<mename>generic</mename>
2431			<mevalue>6</mevalue>
2432		</maskelement>
2433		<maskelement>
2434			<mename>specific</mename>
2435			<mevalue>61</mevalue>
2436		</maskelement>
2437		<varbind>
2438			<vbnumber>1</vbnumber>
2439			<vbvalue>1</vbvalue>
2440		</varbind>
2441		<varbind>
2442			<vbnumber>5</vbnumber>
2443			<vbvalue>1</vbvalue>
2444		</varbind>
2445	</mask>
2446	<uei>uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedByAPClear</uei>
2447	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDuplicateIpAddressReported</event-label>
2448	<descr>
2449&lt;p&gt;This trap is issued when the switch or an AP detects another 
2450machine using its IP Address. The first variable has value 
2451yes if the duplicate IP is reported by an AP. In that case, 
2452the second attribute will carry the AP MAC Address. The third
2453variable is the duplicate IP address in question and the last 
2454attribute is the MAC Address of the machine that is found to
2455be using the duplicate IP.&lt;/p&gt;&lt;table&gt;
2456	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2457
2458	bsnDuplicateIpReportedByAP&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2459	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2460		no(0)
2461		yes(1)
2462	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2463	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2464
2465	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2466	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2467	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2468
2469	bsnDuplicateIpTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2470	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2471	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2472
2473	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2474	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2475	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2476
2477	bsnDuplicateIpTrapClear&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2478	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2479		false(0)
2480		true(1)
2481	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2482	</descr>
2483		<logmsg dest='logndisplay'>&lt;p&gt;
2484			bsnDuplicateIpAddressReported trap received 
2485			bsnDuplicateIpReportedByAP=%parm[#1]% 
2486			bsnAPMacAddrTrapVariable=%parm[#2]% 
2487			bsnDuplicateIpTrapVariable=%parm[#3]% 
2488			bsnRogueAPDot11MacAddress=%parm[#4]% 
2489			bsnDuplicateIpTrapClear=%parm[#5]%&lt;/p&gt;
2490		</logmsg>
2491	<severity>Normal</severity>
2492	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedByAP:%dpname%:%nodeid%:%interface%:%parm[#2]%" auto-clean="false" />
2493</event>
2494<event>
2495	<mask>
2496		<maskelement>
2497			<mename>id</mename>
2498			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2499		</maskelement>
2500		<maskelement>
2501			<mename>generic</mename>
2502			<mevalue>6</mevalue>
2503		</maskelement>
2504		<maskelement>
2505			<mename>specific</mename>
2506			<mevalue>61</mevalue>
2507		</maskelement>
2508		<varbind>
2509			<vbnumber>1</vbnumber>
2510			<vbvalue>1</vbvalue>
2511		</varbind>
2512	</mask>
2513	<uei>uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedByAP</uei>
2514	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDuplicateIpAddressReported</event-label>
2515	<descr>
2516&lt;p&gt;This trap is issued when the switch or an AP detects another 
2517machine using its IP Address. The first variable has value 
2518yes if the duplicate IP is reported by an AP. In that case, 
2519the second attribute will carry the AP MAC Address. The third
2520variable is the duplicate IP address in question and the last 
2521attribute is the MAC Address of the machine that is found to
2522be using the duplicate IP.&lt;/p&gt;&lt;table&gt;
2523	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2524
2525	bsnDuplicateIpReportedByAP&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2526	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2527		no(0)
2528		yes(1)
2529	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2530	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2531
2532	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2533	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2534	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2535
2536	bsnDuplicateIpTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2537	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2538	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2539
2540	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2541	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2542	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2543
2544	bsnDuplicateIpTrapClear&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2545	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2546		false(0)
2547		true(1)
2548	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2549	</descr>
2550		<logmsg dest='logndisplay'>&lt;p&gt;
2551			bsnDuplicateIpAddressReported trap received 
2552			bsnDuplicateIpReportedByAP=%parm[#1]% 
2553			bsnAPMacAddrTrapVariable=%parm[#2]% 
2554			bsnDuplicateIpTrapVariable=%parm[#3]% 
2555			bsnRogueAPDot11MacAddress=%parm[#4]% 
2556			bsnDuplicateIpTrapClear=%parm[#5]%&lt;/p&gt;
2557		</logmsg>
2558	<severity>Minor</severity>
2559	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="1" auto-clean="false" />
2560</event>
2561<event>
2562	<mask>
2563		<maskelement>
2564			<mename>id</mename>
2565			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2566		</maskelement>
2567		<maskelement>
2568			<mename>generic</mename>
2569			<mevalue>6</mevalue>
2570		</maskelement>
2571		<maskelement>
2572			<mename>specific</mename>
2573			<mevalue>61</mevalue>
2574		</maskelement>
2575		<varbind>
2576			<vbnumber>5</vbnumber>
2577			<vbvalue>1</vbvalue>
2578		</varbind>
2579	</mask>
2580	<uei>uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedBySwitchClear</uei>
2581	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDuplicateIpAddressReported</event-label>
2582	<descr>
2583&lt;p&gt;This trap is issued when the switch or an AP detects another 
2584machine using its IP Address. The first variable has value 
2585yes if the duplicate IP is reported by an AP. In that case, 
2586the second attribute will carry the AP MAC Address. The third
2587variable is the duplicate IP address in question and the last 
2588attribute is the MAC Address of the machine that is found to
2589be using the duplicate IP.&lt;/p&gt;&lt;table&gt;
2590	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2591
2592	bsnDuplicateIpReportedByAP&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2593	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2594		no(0)
2595		yes(1)
2596	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2597	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2598
2599	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2600	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2601	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2602
2603	bsnDuplicateIpTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2604	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2605	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2606
2607	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2608	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2609	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2610
2611	bsnDuplicateIpTrapClear&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2612	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2613		false(0)
2614		true(1)
2615	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2616	</descr>
2617		<logmsg dest='logndisplay'>&lt;p&gt;
2618			bsnDuplicateIpAddressReported trap received 
2619			bsnDuplicateIpReportedByAP=%parm[#1]% 
2620			bsnAPMacAddrTrapVariable=%parm[#2]% 
2621			bsnDuplicateIpTrapVariable=%parm[#3]% 
2622			bsnRogueAPDot11MacAddress=%parm[#4]% 
2623			bsnDuplicateIpTrapClear=%parm[#5]%&lt;/p&gt;
2624		</logmsg>
2625	<severity>Normal</severity>
2626	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedBySwitch:%dpname%:%nodeid%:%interface%:%parm[#3]%" auto-clean="false" />
2627</event>
2628<event>
2629	<mask>
2630		<maskelement>
2631			<mename>id</mename>
2632			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2633		</maskelement>
2634		<maskelement>
2635			<mename>generic</mename>
2636			<mevalue>6</mevalue>
2637		</maskelement>
2638		<maskelement>
2639			<mename>specific</mename>
2640			<mevalue>61</mevalue>
2641		</maskelement>
2642	</mask>
2643	<uei>uei.opennms.org/vendor/cisco/bsnDuplicateIpAddressReportedBySwitch</uei>
2644	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnDuplicateIpAddressReported</event-label>
2645	<descr>
2646&lt;p&gt;This trap is issued when the switch or an AP detects another 
2647machine using its IP Address. The first variable has value 
2648yes if the duplicate IP is reported by an AP. In that case, 
2649the second attribute will carry the AP MAC Address. The third
2650variable is the duplicate IP address in question and the last 
2651attribute is the MAC Address of the machine that is found to
2652be using the duplicate IP.&lt;/p&gt;&lt;table&gt;
2653	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2654
2655	bsnDuplicateIpReportedByAP&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2656	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2657		no(0)
2658		yes(1)
2659	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2660	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2661
2662	bsnAPMacAddrTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2663	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2664	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2665
2666	bsnDuplicateIpTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2667	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2668	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2669
2670	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2671	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2672	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2673
2674	bsnDuplicateIpTrapClear&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2675	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2676		false(0)
2677		true(1)
2678	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2679	</descr>
2680		<logmsg dest='logndisplay'>&lt;p&gt;
2681			bsnDuplicateIpAddressReported trap received 
2682			bsnDuplicateIpReportedByAP=%parm[#1]% 
2683			bsnAPMacAddrTrapVariable=%parm[#2]% 
2684			bsnDuplicateIpTrapVariable=%parm[#3]% 
2685			bsnRogueAPDot11MacAddress=%parm[#4]% 
2686			bsnDuplicateIpTrapClear=%parm[#5]%&lt;/p&gt;
2687		</logmsg>
2688	<severity>Major</severity>
2689	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#3]%" alarm-type="1" auto-clean="false" />
2690</event>
2691<event>
2692	<mask>
2693		<maskelement>
2694			<mename>id</mename>
2695			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2696		</maskelement>
2697		<maskelement>
2698			<mename>generic</mename>
2699			<mevalue>6</mevalue>
2700		</maskelement>
2701		<maskelement>
2702			<mename>specific</mename>
2703			<mevalue>62</mevalue>
2704		</maskelement>
2705		<varbind>
2706			<vbnumber>4</vbnumber>
2707			<vbvalue>1</vbvalue>
2708		</varbind>
2709	</mask>
2710	<uei>uei.opennms.org/vendor/cisco/bsnAPContainedAsARogueClear</uei>
2711	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPContainedAsARogue</event-label>
2712	<descr>
2713&lt;p&gt;When our AP detects that it is being contained by another AP,
2714this trap is issued. The clear flag is true if the AP is no 
2715longer being contained.&lt;/p&gt;&lt;table&gt;
2716	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2717
2718	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2719	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2720	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2721
2722	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2723	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2724	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2725
2726	bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2727	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2728		dot11b(1)
2729		dot11a(2)
2730		uwb(4)
2731	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2732	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2733
2734	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2735	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2736		false(0)
2737		true(1)
2738	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2739	</descr>
2740		<logmsg dest='logndisplay'>&lt;p&gt;
2741			bsnAPContainedAsARogue trap received 
2742			bsnAPDot3MacAddress=%parm[#1]% 
2743			bsnAPIfSlotId=%parm[#2]% 
2744			bsnAPIfType=%parm[#3]% 
2745			bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
2746		</logmsg>
2747	<severity>Normal</severity>
2748	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPContainedAsARogue:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
2749</event>
2750<event>
2751	<mask>
2752		<maskelement>
2753			<mename>id</mename>
2754			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2755		</maskelement>
2756		<maskelement>
2757			<mename>generic</mename>
2758			<mevalue>6</mevalue>
2759		</maskelement>
2760		<maskelement>
2761			<mename>specific</mename>
2762			<mevalue>62</mevalue>
2763		</maskelement>
2764	</mask>
2765	<uei>uei.opennms.org/vendor/cisco/bsnAPContainedAsARogue</uei>
2766	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPContainedAsARogue</event-label>
2767	<descr>
2768&lt;p&gt;When our AP detects that it is being contained by another AP,
2769this trap is issued. The clear flag is true if the AP is no 
2770longer being contained.&lt;/p&gt;&lt;table&gt;
2771	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2772
2773	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2774	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2775	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2776
2777	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2778	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2779	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2780
2781	bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2782	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2783		dot11b(1)
2784		dot11a(2)
2785		uwb(4)
2786	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2787	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2788
2789	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2790	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2791		false(0)
2792		true(1)
2793	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2794	</descr>
2795		<logmsg dest='logndisplay'>&lt;p&gt;
2796			bsnAPContainedAsARogue trap received 
2797			bsnAPDot3MacAddress=%parm[#1]% 
2798			bsnAPIfSlotId=%parm[#2]% 
2799			bsnAPIfType=%parm[#3]% 
2800			bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
2801		</logmsg>
2802	<severity>Major</severity>
2803	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
2804</event>
2805<event>
2806	<mask>
2807		<maskelement>
2808			<mename>id</mename>
2809			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2810		</maskelement>
2811		<maskelement>
2812			<mename>generic</mename>
2813			<mevalue>6</mevalue>
2814		</maskelement>
2815		<maskelement>
2816			<mename>specific</mename>
2817			<mevalue>63</mevalue>
2818		</maskelement>
2819		<varbind>
2820			<vbnumber>2</vbnumber>
2821			<vbvalue>1</vbvalue>
2822		</varbind>
2823	</mask>
2824	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidSsidClear</uei>
2825	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidSsid</event-label>
2826	<descr>
2827&lt;p&gt;Issued when a Trusted Rogue AP is auto contained for advertising 
2828invalid SSID.
2829If the clear variable has value true, then the trap clears the 
2830earlier alert.&lt;/p&gt;&lt;table&gt;
2831	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2832
2833	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2834	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2835	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2836
2837	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2838	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2839		false(0)
2840		true(1)
2841	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2842	</descr>
2843		<logmsg dest='logndisplay'>&lt;p&gt;
2844			bsnTrustedApHasInvalidSsid trap received 
2845			bsnRogueAPDot11MacAddress=%parm[#1]% 
2846			bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
2847		</logmsg>
2848	<severity>Normal</severity>
2849	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidSsid:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
2850</event>
2851<event>
2852	<mask>
2853		<maskelement>
2854			<mename>id</mename>
2855			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2856		</maskelement>
2857		<maskelement>
2858			<mename>generic</mename>
2859			<mevalue>6</mevalue>
2860		</maskelement>
2861		<maskelement>
2862			<mename>specific</mename>
2863			<mevalue>63</mevalue>
2864		</maskelement>
2865	</mask>
2866	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidSsid</uei>
2867	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidSsid</event-label>
2868	<descr>
2869&lt;p&gt;Issued when a Trusted Rogue AP is auto contained for advertising 
2870invalid SSID.
2871If the clear variable has value true, then the trap clears the 
2872earlier alert.&lt;/p&gt;&lt;table&gt;
2873	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2874
2875	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2876	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2877	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2878
2879	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2880	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2881		false(0)
2882		true(1)
2883	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2884	</descr>
2885		<logmsg dest='logndisplay'>&lt;p&gt;
2886			bsnTrustedApHasInvalidSsid trap received 
2887			bsnRogueAPDot11MacAddress=%parm[#1]% 
2888			bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
2889		</logmsg>
2890	<severity>Minor</severity>
2891	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
2892</event>
2893<event>
2894	<mask>
2895		<maskelement>
2896			<mename>id</mename>
2897			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2898		</maskelement>
2899		<maskelement>
2900			<mename>generic</mename>
2901			<mevalue>6</mevalue>
2902		</maskelement>
2903		<maskelement>
2904			<mename>specific</mename>
2905			<mevalue>64</mevalue>
2906		</maskelement>
2907		<varbind>
2908			<vbnumber>2</vbnumber>
2909			<vbvalue>1</vbvalue>
2910		</varbind>
2911	</mask>
2912	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApIsMissingClear</uei>
2913	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApIsMissing</event-label>
2914	<descr>
2915&lt;p&gt;Issued when a Trusted Rogue AP is missing or has failed.
2916If the clear variable has value true, then the trap clears the 
2917earlier alert.&lt;/p&gt;&lt;table&gt;
2918	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2919
2920	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2921	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2922	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2923
2924	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2925	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2926		false(0)
2927		true(1)
2928	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2929	</descr>
2930		<logmsg dest='logndisplay'>&lt;p&gt;
2931			bsnTrustedApIsMissing trap received 
2932			bsnRogueAPDot11MacAddress=%parm[#1]% 
2933			bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
2934		</logmsg>
2935	<severity>Normal</severity>
2936	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApIsMissing:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
2937</event>
2938<event>
2939	<mask>
2940		<maskelement>
2941			<mename>id</mename>
2942			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2943		</maskelement>
2944		<maskelement>
2945			<mename>generic</mename>
2946			<mevalue>6</mevalue>
2947		</maskelement>
2948		<maskelement>
2949			<mename>specific</mename>
2950			<mevalue>64</mevalue>
2951		</maskelement>
2952	</mask>
2953	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApIsMissing</uei>
2954	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApIsMissing</event-label>
2955	<descr>
2956&lt;p&gt;Issued when a Trusted Rogue AP is missing or has failed.
2957If the clear variable has value true, then the trap clears the 
2958earlier alert.&lt;/p&gt;&lt;table&gt;
2959	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2960
2961	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2962	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
2963	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
2964
2965	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
2966	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
2967		false(0)
2968		true(1)
2969	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
2970	</descr>
2971		<logmsg dest='logndisplay'>&lt;p&gt;
2972			bsnTrustedApIsMissing trap received 
2973			bsnRogueAPDot11MacAddress=%parm[#1]% 
2974			bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
2975		</logmsg>
2976	<severity>Warning</severity>
2977	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
2978</event>
2979<event>
2980	<mask>
2981		<maskelement>
2982			<mename>id</mename>
2983			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
2984		</maskelement>
2985		<maskelement>
2986			<mename>generic</mename>
2987			<mevalue>6</mevalue>
2988		</maskelement>
2989		<maskelement>
2990			<mename>specific</mename>
2991			<mevalue>65</mevalue>
2992		</maskelement>
2993		<varbind>
2994			<vbnumber>2</vbnumber>
2995			<vbvalue>1</vbvalue>
2996		</varbind>
2997	</mask>
2998	<uei>uei.opennms.org/vendor/cisco/bsnAdhocRogueAutoContainedClear</uei>
2999	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAdhocRogueAutoContained</event-label>
3000	<descr>
3001&lt;p&gt;Issued when an Adhoc Rogue is auto contained.
3002If the clear variable has value true, then the trap clears the 
3003earlier alert.&lt;/p&gt;&lt;table&gt;
3004	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3005
3006	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3007	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3008	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3009
3010	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3011	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3012		false(0)
3013		true(1)
3014	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3015	</descr>
3016		<logmsg dest='logndisplay'>&lt;p&gt;
3017			bsnAdhocRogueAutoContained trap received 
3018			bsnRogueAPDot11MacAddress=%parm[#1]% 
3019			bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
3020		</logmsg>
3021	<severity>Normal</severity>
3022	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAdhocRogueAutoContained:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
3023</event>
3024<event>
3025	<mask>
3026		<maskelement>
3027			<mename>id</mename>
3028			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3029		</maskelement>
3030		<maskelement>
3031			<mename>generic</mename>
3032			<mevalue>6</mevalue>
3033		</maskelement>
3034		<maskelement>
3035			<mename>specific</mename>
3036			<mevalue>65</mevalue>
3037		</maskelement>
3038	</mask>
3039	<uei>uei.opennms.org/vendor/cisco/bsnAdhocRogueAutoContained</uei>
3040	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAdhocRogueAutoContained</event-label>
3041	<descr>
3042&lt;p&gt;Issued when an Adhoc Rogue is auto contained.
3043If the clear variable has value true, then the trap clears the 
3044earlier alert.&lt;/p&gt;&lt;table&gt;
3045	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3046
3047	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3048	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3049	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3050
3051	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3052	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3053		false(0)
3054		true(1)
3055	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3056	</descr>
3057		<logmsg dest='logndisplay'>&lt;p&gt;
3058			bsnAdhocRogueAutoContained trap received 
3059			bsnRogueAPDot11MacAddress=%parm[#1]% 
3060			bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
3061		</logmsg>
3062	<severity>Warning</severity>
3063	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
3064</event>
3065<event>
3066	<mask>
3067		<maskelement>
3068			<mename>id</mename>
3069			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3070		</maskelement>
3071		<maskelement>
3072			<mename>generic</mename>
3073			<mevalue>6</mevalue>
3074		</maskelement>
3075		<maskelement>
3076			<mename>specific</mename>
3077			<mevalue>66</mevalue>
3078		</maskelement>
3079		<varbind>
3080			<vbnumber>2</vbnumber>
3081			<vbvalue>1</vbvalue>
3082		</varbind>
3083	</mask>
3084	<uei>uei.opennms.org/vendor/cisco/bsnRogueApAutoContainedClear</uei>
3085	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueApAutoContained</event-label>
3086	<descr>
3087&lt;p&gt;Issued when a Rogue AP is auto contained for advertising our SSID.
3088If the clear variable has value true, then the trap clears the 
3089earlier alert.&lt;/p&gt;&lt;table&gt;
3090	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3091
3092	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3093	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3094	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3095
3096	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3097	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3098		false(0)
3099		true(1)
3100	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3101	</descr>
3102		<logmsg dest='logndisplay'>&lt;p&gt;
3103			bsnRogueApAutoContained trap received 
3104			bsnRogueAPDot11MacAddress=%parm[#1]% 
3105			bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
3106		</logmsg>
3107	<severity>Normal</severity>
3108	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnRogueApAutoContained:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
3109</event>
3110<event>
3111	<mask>
3112		<maskelement>
3113			<mename>id</mename>
3114			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3115		</maskelement>
3116		<maskelement>
3117			<mename>generic</mename>
3118			<mevalue>6</mevalue>
3119		</maskelement>
3120		<maskelement>
3121			<mename>specific</mename>
3122			<mevalue>66</mevalue>
3123		</maskelement>
3124	</mask>
3125	<uei>uei.opennms.org/vendor/cisco/bsnRogueApAutoContained</uei>
3126	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRogueApAutoContained</event-label>
3127	<descr>
3128&lt;p&gt;Issued when a Rogue AP is auto contained for advertising our SSID.
3129If the clear variable has value true, then the trap clears the 
3130earlier alert.&lt;/p&gt;&lt;table&gt;
3131	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3132
3133	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3134	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3135	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3136
3137	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3138	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3139		false(0)
3140		true(1)
3141	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3142	</descr>
3143		<logmsg dest='logndisplay'>&lt;p&gt;
3144			bsnRogueApAutoContained trap received 
3145			bsnRogueAPDot11MacAddress=%parm[#1]% 
3146			bsnClearTrapVariable=%parm[#2]%&lt;/p&gt;
3147		</logmsg>
3148	<severity>Warning</severity>
3149	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
3150</event>
3151<event>
3152	<mask>
3153		<maskelement>
3154			<mename>id</mename>
3155			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3156		</maskelement>
3157		<maskelement>
3158			<mename>generic</mename>
3159			<mevalue>6</mevalue>
3160		</maskelement>
3161		<maskelement>
3162			<mename>specific</mename>
3163			<mevalue>67</mevalue>
3164		</maskelement>
3165		<varbind>
3166			<vbnumber>4</vbnumber>
3167			<vbvalue>1</vbvalue>
3168		</varbind>
3169	</mask>
3170	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidEncryptionClear</uei>
3171	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidEncryption</event-label>
3172	<descr>
3173&lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using 
3174invalid encryption. The second param is for the encryption used 
3175and the third param is for encryption required.
3176If the clear variable has value true, then the trap clears the 
3177earlier alert.&lt;/p&gt;&lt;table&gt;
3178	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3179
3180	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3181	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3182	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3183
3184	bsnTrustedApEncryptionUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3185	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3186		none(0)
3187		open(1)
3188		wep(2)
3189		wpa(3)
3190	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3191	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3192
3193	bsnTrustedApEncryptionRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3194	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3195		none(0)
3196		open(1)
3197		wep(2)
3198		wpa(3)
3199	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3200	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3201
3202	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3203	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3204		false(0)
3205		true(1)
3206	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3207	</descr>
3208		<logmsg dest='logndisplay'>&lt;p&gt;
3209			bsnTrustedApHasInvalidEncryption trap received 
3210			bsnRogueAPDot11MacAddress=%parm[#1]% 
3211			bsnTrustedApEncryptionUsed=%parm[#2]% 
3212			bsnTrustedApEncryptionRequired=%parm[#3]% 
3213			bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
3214		</logmsg>
3215	<severity>Normal</severity>
3216	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidEncryption:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
3217</event>
3218<event>
3219	<mask>
3220		<maskelement>
3221			<mename>id</mename>
3222			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3223		</maskelement>
3224		<maskelement>
3225			<mename>generic</mename>
3226			<mevalue>6</mevalue>
3227		</maskelement>
3228		<maskelement>
3229			<mename>specific</mename>
3230			<mevalue>67</mevalue>
3231		</maskelement>
3232	</mask>
3233	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidEncryption</uei>
3234	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidEncryption</event-label>
3235	<descr>
3236&lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using 
3237invalid encryption. The second param is for the encryption used 
3238and the third param is for encryption required.
3239If the clear variable has value true, then the trap clears the 
3240earlier alert.&lt;/p&gt;&lt;table&gt;
3241	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3242
3243	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3244	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3245	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3246
3247	bsnTrustedApEncryptionUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3248	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3249		none(0)
3250		open(1)
3251		wep(2)
3252		wpa(3)
3253	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3254	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3255
3256	bsnTrustedApEncryptionRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3257	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3258		none(0)
3259		open(1)
3260		wep(2)
3261		wpa(3)
3262	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3263	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3264
3265	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3266	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3267		false(0)
3268		true(1)
3269	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3270	</descr>
3271		<logmsg dest='logndisplay'>&lt;p&gt;
3272			bsnTrustedApHasInvalidEncryption trap received 
3273			bsnRogueAPDot11MacAddress=%parm[#1]% 
3274			bsnTrustedApEncryptionUsed=%parm[#2]% 
3275			bsnTrustedApEncryptionRequired=%parm[#3]% 
3276			bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
3277		</logmsg>
3278	<severity>Minor</severity>
3279	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
3280</event>
3281<event>
3282	<mask>
3283		<maskelement>
3284			<mename>id</mename>
3285			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3286		</maskelement>
3287		<maskelement>
3288			<mename>generic</mename>
3289			<mevalue>6</mevalue>
3290		</maskelement>
3291		<maskelement>
3292			<mename>specific</mename>
3293			<mevalue>68</mevalue>
3294		</maskelement>
3295		<varbind>
3296			<vbnumber>4</vbnumber>
3297			<vbvalue>1</vbvalue>
3298		</varbind>
3299	</mask>
3300	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidRadioPolicyClear</uei>
3301	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidRadioPolicy</event-label>
3302	<descr>
3303&lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using 
3304invalid radio policy.  The second param is for the radio policy 
3305used and the third param is for radio policy required.
3306If the clear variable has value true, then the trap clears the 
3307earlier alert.&lt;/p&gt;&lt;table&gt;
3308	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3309
3310	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3311	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3312	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3313
3314	bsnTrustedApRadioPolicyUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3315	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3316		none(0)
3317		dot11b(1)
3318		dot11a(2)
3319		dot11bg(3)
3320	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3321	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3322
3323	bsnTrustedApRadioPolicyRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3324	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3325		none(0)
3326		dot11b(1)
3327		dot11a(2)
3328		dot11bg(3)
3329	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3330	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3331
3332	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3333	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3334		false(0)
3335		true(1)
3336	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3337	</descr>
3338		<logmsg dest='logndisplay'>&lt;p&gt;
3339			bsnTrustedApHasInvalidRadioPolicy trap received 
3340			bsnRogueAPDot11MacAddress=%parm[#1]% 
3341			bsnTrustedApRadioPolicyUsed=%parm[#2]% 
3342			bsnTrustedApRadioPolicyRequired=%parm[#3]% 
3343			bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
3344		</logmsg>
3345	<severity>Normal</severity>
3346	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidRadioPolicy:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
3347</event>
3348<event>
3349	<mask>
3350		<maskelement>
3351			<mename>id</mename>
3352			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3353		</maskelement>
3354		<maskelement>
3355			<mename>generic</mename>
3356			<mevalue>6</mevalue>
3357		</maskelement>
3358		<maskelement>
3359			<mename>specific</mename>
3360			<mevalue>68</mevalue>
3361		</maskelement>
3362	</mask>
3363	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidRadioPolicy</uei>
3364	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidRadioPolicy</event-label>
3365	<descr>
3366&lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using 
3367invalid radio policy.  The second param is for the radio policy 
3368used and the third param is for radio policy required.
3369If the clear variable has value true, then the trap clears the 
3370earlier alert.&lt;/p&gt;&lt;table&gt;
3371	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3372
3373	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3374	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3375	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3376
3377	bsnTrustedApRadioPolicyUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3378	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3379		none(0)
3380		dot11b(1)
3381		dot11a(2)
3382		dot11bg(3)
3383	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3384	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3385
3386	bsnTrustedApRadioPolicyRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3387	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3388		none(0)
3389		dot11b(1)
3390		dot11a(2)
3391		dot11bg(3)
3392	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3393	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3394
3395	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3396	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3397		false(0)
3398		true(1)
3399	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3400	</descr>
3401		<logmsg dest='logndisplay'>&lt;p&gt;
3402			bsnTrustedApHasInvalidRadioPolicy trap received 
3403			bsnRogueAPDot11MacAddress=%parm[#1]% 
3404			bsnTrustedApRadioPolicyUsed=%parm[#2]% 
3405			bsnTrustedApRadioPolicyRequired=%parm[#3]% 
3406			bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
3407		</logmsg>
3408	<severity>Warning</severity>
3409	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
3410</event>
3411<event>
3412	<mask>
3413		<maskelement>
3414			<mename>id</mename>
3415			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3416		</maskelement>
3417		<maskelement>
3418			<mename>generic</mename>
3419			<mevalue>6</mevalue>
3420		</maskelement>
3421		<maskelement>
3422			<mename>specific</mename>
3423			<mevalue>69</mevalue>
3424		</maskelement>
3425		<varbind>
3426			<vbnumber>2</vbnumber>
3427			<vbvalue>1</vbvalue>
3428		</varbind>
3429	</mask>
3430	<uei>uei.opennms.org/vendor/cisco/bsnNetworkStateChangedEnable</uei>
3431	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnNetworkStateChanged</event-label>
3432	<descr>
3433&lt;p&gt;When the 802.11a or b/g network state is changed this trap 
3434is issued.&lt;/p&gt;&lt;table&gt;
3435	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3436
3437	bsnNetworkType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3438	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3439		dot11b(1)
3440		dot11a(2)
3441	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3442	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3443
3444	bsnNetworkState&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3445	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3446		disable(0)
3447		enable(1)
3448	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3449	</descr>
3450		<logmsg dest='logndisplay'>&lt;p&gt;
3451			bsnNetworkStateChanged trap received 
3452			bsnNetworkType=%parm[#1]% 
3453			bsnNetworkState=%parm[#2]%&lt;/p&gt;
3454		</logmsg>
3455	<severity>Normal</severity>
3456	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnNetworkStateChangedDisable:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
3457</event>
3458<event>
3459	<mask>
3460		<maskelement>
3461			<mename>id</mename>
3462			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3463		</maskelement>
3464		<maskelement>
3465			<mename>generic</mename>
3466			<mevalue>6</mevalue>
3467		</maskelement>
3468		<maskelement>
3469			<mename>specific</mename>
3470			<mevalue>69</mevalue>
3471		</maskelement>
3472	</mask>
3473	<uei>uei.opennms.org/vendor/cisco/bsnNetworkStateChangedDisable</uei>
3474	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnNetworkStateChanged</event-label>
3475	<descr>
3476&lt;p&gt;When the 802.11a or b/g network state is changed this trap 
3477is issued.&lt;/p&gt;&lt;table&gt;
3478	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3479
3480	bsnNetworkType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3481	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3482		dot11b(1)
3483		dot11a(2)
3484	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3485	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3486
3487	bsnNetworkState&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3488	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3489		disable(0)
3490		enable(1)
3491	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3492	</descr>
3493		<logmsg dest='logndisplay'>&lt;p&gt;
3494			bsnNetworkStateChanged trap received 
3495			bsnNetworkType=%parm[#1]% 
3496			bsnNetworkState=%parm[#2]%&lt;/p&gt;
3497		</logmsg>
3498	<severity>Minor</severity>
3499	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
3500</event>
3501<event>
3502	<mask>
3503		<maskelement>
3504			<mename>id</mename>
3505			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3506		</maskelement>
3507		<maskelement>
3508			<mename>generic</mename>
3509			<mevalue>6</mevalue>
3510		</maskelement>
3511		<maskelement>
3512			<mename>specific</mename>
3513			<mevalue>70</mevalue>
3514		</maskelement>
3515		<varbind>
3516			<vbnumber>8</vbnumber>
3517			<vbvalue>1</vbvalue>
3518		</varbind>
3519	</mask>
3520	<uei>uei.opennms.org/vendor/cisco/bsnSignatureAttackDetectedClear</uei>
3521	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnSignatureAttackDetected</event-label>
3522	<descr>
3523&lt;p&gt;This trap is sent out when a signature attack is detected by 
3524the switch. The standard and custom signatures are predefined
3525on the switch (see bsnSignatureConfig group). The signatures 
3526also defines if its detection should be reported. The trap 
3527variables bsnSignatureName and bsnSignatureDescription are 
3528retrieved from the detected signature definition. Clear Trap 
3529Variable is turned on when the signature attack stops. The 
3530signature's quiet time configuration speicifes the time after
3531which the clear trap would be sent. bsnSignatureMacInfo 
3532indicates whether the signature is used to track 
3533pattern matches for all source MAC addresses together or 
3534seperately for individual source MAC addresses.  
3535bsnSignatureAttackFrequency will carry the value for a 
3536specific MAC address or for all MAC addresses depending on 
3537bsnSignatureMacInfo. &lt;/p&gt;&lt;table&gt;
3538	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3539
3540	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3541	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3542	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3543
3544	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3545	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3546	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3547
3548	bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3549	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3550	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3551
3552	bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3553	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3554		dot11b(1)
3555		dot11a(2)
3556		uwb(4)
3557	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3558	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3559
3560	bsnSignatureType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3561	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3562		standard(0)
3563		custom(1)
3564	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3565	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3566
3567	bsnSignatureName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3568	%parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3569	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3570
3571	bsnSignatureDescription&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3572	%parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3573	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3574
3575	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3576	%parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3577		false(0)
3578		true(1)
3579	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3580	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3581
3582	bsnSignatureAttackPreced&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3583	%parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3584	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3585
3586	bsnSignatureAttackFrequency&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3587	%parm[#10]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3588	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3589
3590	bsnSignatureAttackChannel&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3591	%parm[#11]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3592	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3593
3594	bsnSignatureAttackerMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3595	%parm[#12]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3596	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3597
3598	bsnSignatureMacInfo&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3599	%parm[#13]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3600		bsnSignatureMacAll(0)
3601		bsnSignatureMacIndividual(1)
3602		bsnSignatureMacBoth(2)
3603	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3604	</descr>
3605		<logmsg dest='logndisplay'>&lt;p&gt;
3606			bsnSignatureAttackDetected trap received 
3607			bsnAPDot3MacAddress=%parm[#1]% 
3608			bsnAPIfSlotId=%parm[#2]% 
3609			bsnAPName=%parm[#3]% 
3610			bsnAPIfType=%parm[#4]% 
3611			bsnSignatureType=%parm[#5]% 
3612			bsnSignatureName=%parm[#6]% 
3613			bsnSignatureDescription=%parm[#7]% 
3614			bsnClearTrapVariable=%parm[#8]% 
3615			bsnSignatureAttackPreced=%parm[#9]% 
3616			bsnSignatureAttackFrequency=%parm[#10]% 
3617			bsnSignatureAttackChannel=%parm[#11]% 
3618			bsnSignatureAttackerMacAddress=%parm[#12]% 
3619			bsnSignatureMacInfo=%parm[#13]%&lt;/p&gt;
3620		</logmsg>
3621	<severity>Normal</severity>
3622	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%:%parm[#5]%:%parm[#6]%:%parm[#12]%:%parm[#13]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnSignatureAttackDetected:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%:%parm[#5]%:%parm[#6]%:%parm[#12]%:%parm[#13]%" auto-clean="false" />
3623</event>
3624<event>
3625	<mask>
3626		<maskelement>
3627			<mename>id</mename>
3628			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3629		</maskelement>
3630		<maskelement>
3631			<mename>generic</mename>
3632			<mevalue>6</mevalue>
3633		</maskelement>
3634		<maskelement>
3635			<mename>specific</mename>
3636			<mevalue>70</mevalue>
3637		</maskelement>
3638	</mask>
3639	<uei>uei.opennms.org/vendor/cisco/bsnSignatureAttackDetected</uei>
3640	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnSignatureAttackDetected</event-label>
3641	<descr>
3642&lt;p&gt;This trap is sent out when a signature attack is detected by 
3643the switch. The standard and custom signatures are predefined
3644on the switch (see bsnSignatureConfig group). The signatures 
3645also defines if its detection should be reported. The trap 
3646variables bsnSignatureName and bsnSignatureDescription are 
3647retrieved from the detected signature definition. Clear Trap 
3648Variable is turned on when the signature attack stops. The 
3649signature's quiet time configuration speicifes the time after
3650which the clear trap would be sent. bsnSignatureMacInfo 
3651indicates whether the signature is used to track 
3652pattern matches for all source MAC addresses together or 
3653seperately for individual source MAC addresses.  
3654bsnSignatureAttackFrequency will carry the value for a 
3655specific MAC address or for all MAC addresses depending on 
3656bsnSignatureMacInfo. &lt;/p&gt;&lt;table&gt;
3657	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3658
3659	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3660	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3661	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3662
3663	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3664	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3665	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3666
3667	bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3668	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3669	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3670
3671	bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3672	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3673		dot11b(1)
3674		dot11a(2)
3675		uwb(4)
3676	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3677	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3678
3679	bsnSignatureType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3680	%parm[#5]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3681		standard(0)
3682		custom(1)
3683	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3684	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3685
3686	bsnSignatureName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3687	%parm[#6]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3688	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3689
3690	bsnSignatureDescription&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3691	%parm[#7]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3692	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3693
3694	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3695	%parm[#8]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3696		false(0)
3697		true(1)
3698	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3699	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3700
3701	bsnSignatureAttackPreced&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3702	%parm[#9]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3703	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3704
3705	bsnSignatureAttackFrequency&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3706	%parm[#10]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3707	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3708
3709	bsnSignatureAttackChannel&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3710	%parm[#11]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3711	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3712
3713	bsnSignatureAttackerMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3714	%parm[#12]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3715	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3716
3717	bsnSignatureMacInfo&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3718	%parm[#13]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3719		bsnSignatureMacAll(0)
3720		bsnSignatureMacIndividual(1)
3721		bsnSignatureMacBoth(2)
3722	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3723	</descr>
3724		<logmsg dest='logndisplay'>&lt;p&gt;
3725			bsnSignatureAttackDetected trap received 
3726			bsnAPDot3MacAddress=%parm[#1]% 
3727			bsnAPIfSlotId=%parm[#2]% 
3728			bsnAPName=%parm[#3]% 
3729			bsnAPIfType=%parm[#4]% 
3730			bsnSignatureType=%parm[#5]% 
3731			bsnSignatureName=%parm[#6]% 
3732			bsnSignatureDescription=%parm[#7]% 
3733			bsnClearTrapVariable=%parm[#8]% 
3734			bsnSignatureAttackPreced=%parm[#9]% 
3735			bsnSignatureAttackFrequency=%parm[#10]% 
3736			bsnSignatureAttackChannel=%parm[#11]% 
3737			bsnSignatureAttackerMacAddress=%parm[#12]% 
3738			bsnSignatureMacInfo=%parm[#13]%&lt;/p&gt;
3739		</logmsg>
3740	<severity>Minor</severity>
3741	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%:%parm[#5]%:%parm[#6]%:%parm[#12]%:%parm[#13]%" alarm-type="1" auto-clean="false" />
3742</event>
3743<event>
3744	<mask>
3745		<maskelement>
3746			<mename>id</mename>
3747			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3748		</maskelement>
3749		<maskelement>
3750			<mename>generic</mename>
3751			<mevalue>6</mevalue>
3752		</maskelement>
3753		<maskelement>
3754			<mename>specific</mename>
3755			<mevalue>71</mevalue>
3756		</maskelement>
3757	</mask>
3758	<uei>uei.opennms.org/vendor/cisco/bsnAPRadioCardTxFailure</uei>
3759	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRadioCardTxFailure</event-label>
3760	<descr>
3761&lt;p&gt;This trap is sent by the switch when a radio card on an AP 
3762stops transmitting.&lt;/p&gt;&lt;table&gt;
3763	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3764
3765	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3766	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3767	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3768
3769	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3770	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3771	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3772
3773	bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3774	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3775		dot11b(1)
3776		dot11a(2)
3777		uwb(4)
3778	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3779	</descr>
3780		<logmsg dest='logndisplay'>&lt;p&gt;
3781			bsnAPRadioCardTxFailure trap received 
3782			bsnAPDot3MacAddress=%parm[#1]% 
3783			bsnAPIfSlotId=%parm[#2]% 
3784			bsnAPIfType=%parm[#3]%&lt;/p&gt;
3785		</logmsg>
3786	<severity>Minor</severity>
3787	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
3788</event>
3789<event>
3790	<mask>
3791		<maskelement>
3792			<mename>id</mename>
3793			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3794		</maskelement>
3795		<maskelement>
3796			<mename>generic</mename>
3797			<mevalue>6</mevalue>
3798		</maskelement>
3799		<maskelement>
3800			<mename>specific</mename>
3801			<mevalue>72</mevalue>
3802		</maskelement>
3803	</mask>
3804	<uei>uei.opennms.org/vendor/cisco/bsnAPRadioCardTxFailureClear</uei>
3805	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRadioCardTxFailureClear</event-label>
3806	<descr>
3807&lt;p&gt;This trap is sent by the switch when a radio card on an AP 
3808starts transmitting again after a prior failure.&lt;/p&gt;&lt;table&gt;
3809	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3810
3811	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3812	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3813	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3814
3815	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3816	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3817	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3818
3819	bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3820	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3821		dot11b(1)
3822		dot11a(2)
3823		uwb(4)
3824	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3825	</descr>
3826		<logmsg dest='logndisplay'>&lt;p&gt;
3827			bsnAPRadioCardTxFailureClear trap received 
3828			bsnAPDot3MacAddress=%parm[#1]% 
3829			bsnAPIfSlotId=%parm[#2]% 
3830			bsnAPIfType=%parm[#3]%&lt;/p&gt;
3831		</logmsg>
3832	<severity>Normal</severity>
3833	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPRadioCardTxFailure:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
3834</event>
3835<event>
3836	<mask>
3837		<maskelement>
3838			<mename>id</mename>
3839			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3840		</maskelement>
3841		<maskelement>
3842			<mename>generic</mename>
3843			<mevalue>6</mevalue>
3844		</maskelement>
3845		<maskelement>
3846			<mename>specific</mename>
3847			<mevalue>73</mevalue>
3848		</maskelement>
3849	</mask>
3850	<uei>uei.opennms.org/vendor/cisco/bsnAPRadioCardRxFailure</uei>
3851	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRadioCardRxFailure</event-label>
3852	<descr>
3853&lt;p&gt;This trap is sent by the switch when a radio card on an AP 
3854stops receiving.&lt;/p&gt;&lt;table&gt;
3855	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3856
3857	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3858	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3859	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3860
3861	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3862	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3863	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3864
3865	bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3866	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3867		dot11b(1)
3868		dot11a(2)
3869		uwb(4)
3870	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3871	</descr>
3872		<logmsg dest='logndisplay'>&lt;p&gt;
3873			bsnAPRadioCardRxFailure trap received 
3874			bsnAPDot3MacAddress=%parm[#1]% 
3875			bsnAPIfSlotId=%parm[#2]% 
3876			bsnAPIfType=%parm[#3]%&lt;/p&gt;
3877		</logmsg>
3878	<severity>Minor</severity>
3879	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
3880</event>
3881<event>
3882	<mask>
3883		<maskelement>
3884			<mename>id</mename>
3885			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3886		</maskelement>
3887		<maskelement>
3888			<mename>generic</mename>
3889			<mevalue>6</mevalue>
3890		</maskelement>
3891		<maskelement>
3892			<mename>specific</mename>
3893			<mevalue>74</mevalue>
3894		</maskelement>
3895	</mask>
3896	<uei>uei.opennms.org/vendor/cisco/bsnAPRadioCardRxFailureClear</uei>
3897	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRadioCardRxFailureClear</event-label>
3898	<descr>
3899&lt;p&gt;This trap is sent by the switch when a radio card on an AP 
3900starts receiving again after a prior failure.&lt;/p&gt;&lt;table&gt;
3901	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3902
3903	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3904	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3905	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3906
3907	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3908	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3909	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3910
3911	bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3912	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3913		dot11b(1)
3914		dot11a(2)
3915		uwb(4)
3916	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3917	</descr>
3918		<logmsg dest='logndisplay'>&lt;p&gt;
3919			bsnAPRadioCardRxFailureClear trap received 
3920			bsnAPDot3MacAddress=%parm[#1]% 
3921			bsnAPIfSlotId=%parm[#2]% 
3922			bsnAPIfType=%parm[#3]%&lt;/p&gt;
3923		</logmsg>
3924	<severity>Normal</severity>
3925	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnAPRadioCardRxFailure:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
3926</event>
3927<event>
3928	<mask>
3929		<maskelement>
3930			<mename>id</mename>
3931			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3932		</maskelement>
3933		<maskelement>
3934			<mename>generic</mename>
3935			<mevalue>6</mevalue>
3936		</maskelement>
3937		<maskelement>
3938			<mename>specific</mename>
3939			<mevalue>75</mevalue>
3940		</maskelement>
3941	</mask>
3942	<uei>uei.opennms.org/vendor/cisco/bsnAPImpersonationDetected</uei>
3943	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPImpersonationDetected</event-label>
3944	<descr>
3945&lt;p&gt;This trap is sent by the switch when a radio of an 
3946authenticated AP hears from another AP whose MAC Address
3947neither matches that of a rogue's and nor is it an 
3948authenticated neighbor of the detecting AP.&lt;/p&gt;&lt;table&gt;
3949	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3950
3951	bsnImpersonatedAPMacAddr&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3952	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3953	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3954
3955	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3956	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3957	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3958
3959	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3960	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
3961	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
3962
3963	bsnAPIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
3964	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
3965		dot11b(1)
3966		dot11a(2)
3967		uwb(4)
3968	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
3969	</descr>
3970		<logmsg dest='logndisplay'>&lt;p&gt;
3971			bsnAPImpersonationDetected trap received 
3972			bsnImpersonatedAPMacAddr=%parm[#1]% 
3973			bsnAPDot3MacAddress=%parm[#2]% 
3974			bsnAPIfSlotId=%parm[#3]% 
3975			bsnAPIfType=%parm[#4]%&lt;/p&gt;
3976		</logmsg>
3977	<severity>Warning</severity>
3978	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%:%parm[#4]%" alarm-type="1" auto-clean="false" />
3979</event>
3980<event>
3981	<mask>
3982		<maskelement>
3983			<mename>id</mename>
3984			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
3985		</maskelement>
3986		<maskelement>
3987			<mename>generic</mename>
3988			<mevalue>6</mevalue>
3989		</maskelement>
3990		<maskelement>
3991			<mename>specific</mename>
3992			<mevalue>76</mevalue>
3993		</maskelement>
3994		<varbind>
3995			<vbnumber>4</vbnumber>
3996			<vbvalue>1</vbvalue>
3997		</varbind>
3998	</mask>
3999	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidPreambleClear</uei>
4000	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidPreamble</event-label>
4001	<descr>
4002&lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using invalid
4003preamble. The second param is for the preamble used and the third
4004param is for preamble required. If the clear variable has value 
4005true, then the trap clears the earlier alert.&lt;/p&gt;&lt;table&gt;
4006	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4007
4008	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4009	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4010	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4011
4012	bsnTrustedApPreambleUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4013	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4014		none(0)
4015		short(1)
4016		long(2)
4017	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4018	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4019
4020	bsnTrustedApPreambleRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4021	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4022		none(0)
4023		short(1)
4024		long(2)
4025	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4026	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4027
4028	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4029	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4030		false(0)
4031		true(1)
4032	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4033	</descr>
4034		<logmsg dest='logndisplay'>&lt;p&gt;
4035			bsnTrustedApHasInvalidPreamble trap received 
4036			bsnRogueAPDot11MacAddress=%parm[#1]% 
4037			bsnTrustedApPreambleUsed=%parm[#2]% 
4038			bsnTrustedApPreambleRequired=%parm[#3]% 
4039			bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
4040		</logmsg>
4041	<severity>Normal</severity>
4042	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidPreamble:%dpname%:%nodeid%:%interface%:%parm[#1]%" auto-clean="false" />
4043</event>
4044<event>
4045	<mask>
4046		<maskelement>
4047			<mename>id</mename>
4048			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4049		</maskelement>
4050		<maskelement>
4051			<mename>generic</mename>
4052			<mevalue>6</mevalue>
4053		</maskelement>
4054		<maskelement>
4055			<mename>specific</mename>
4056			<mevalue>76</mevalue>
4057		</maskelement>
4058	</mask>
4059	<uei>uei.opennms.org/vendor/cisco/bsnTrustedApHasInvalidPreamble</uei>
4060	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnTrustedApHasInvalidPreamble</event-label>
4061	<descr>
4062&lt;p&gt;Issued when a Trusted Rogue AP is auto contained for using invalid
4063preamble. The second param is for the preamble used and the third
4064param is for preamble required. If the clear variable has value 
4065true, then the trap clears the earlier alert.&lt;/p&gt;&lt;table&gt;
4066	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4067
4068	bsnRogueAPDot11MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4069	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4070	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4071
4072	bsnTrustedApPreambleUsed&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4073	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4074		none(0)
4075		short(1)
4076		long(2)
4077	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4078	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4079
4080	bsnTrustedApPreambleRequired&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4081	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4082		none(0)
4083		short(1)
4084		long(2)
4085	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4086	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4087
4088	bsnClearTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4089	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4090		false(0)
4091		true(1)
4092	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4093	</descr>
4094		<logmsg dest='logndisplay'>&lt;p&gt;
4095			bsnTrustedApHasInvalidPreamble trap received 
4096			bsnRogueAPDot11MacAddress=%parm[#1]% 
4097			bsnTrustedApPreambleUsed=%parm[#2]% 
4098			bsnTrustedApPreambleRequired=%parm[#3]% 
4099			bsnClearTrapVariable=%parm[#4]%&lt;/p&gt;
4100		</logmsg>
4101	<severity>Warning</severity>
4102	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
4103</event>
4104<event>
4105	<mask>
4106		<maskelement>
4107			<mename>id</mename>
4108			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4109		</maskelement>
4110		<maskelement>
4111			<mename>generic</mename>
4112			<mevalue>6</mevalue>
4113		</maskelement>
4114		<maskelement>
4115			<mename>specific</mename>
4116			<mevalue>77</mevalue>
4117		</maskelement>
4118	</mask>
4119	<uei>uei.opennms.org/vendor/cisco/bsnAPIPAddressFallback</uei>
4120	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPIPAddressFallback</event-label>
4121	<descr>
4122&lt;p&gt;This trap is sent out when an AP, with the configured static 
4123ip-address, fails to establish connection with outside world 
4124and starts using DHCP as a fallback option.&lt;/p&gt;&lt;table&gt;
4125	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4126
4127	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4128	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4129	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4130
4131	bsnApIpAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4132	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4133	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4134
4135	bsnAPStaticIPAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4136	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4137	</descr>
4138		<logmsg dest='logndisplay'>&lt;p&gt;
4139			bsnAPIPAddressFallback trap received 
4140			bsnAPDot3MacAddress=%parm[#1]% 
4141			bsnApIpAddress=%parm[#2]% 
4142			bsnAPStaticIPAddress=%parm[#3]%&lt;/p&gt;
4143		</logmsg>
4144	<severity>Warning</severity>
4145	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%" alarm-type="1" auto-clean="false" />
4146</event>
4147<event>
4148	<mask>
4149		<maskelement>
4150			<mename>id</mename>
4151			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4152		</maskelement>
4153		<maskelement>
4154			<mename>generic</mename>
4155			<mevalue>6</mevalue>
4156		</maskelement>
4157		<maskelement>
4158			<mename>specific</mename>
4159			<mevalue>78</mevalue>
4160		</maskelement>
4161	</mask>
4162	<uei>uei.opennms.org/vendor/cisco/bsnAPFunctionalityDisabled</uei>
4163	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPFunctionalityDisabled</event-label>
4164	<descr>
4165&lt;p&gt;This trap is sent out when AP functionality on the switch is 
4166disabled because the License key has expired
4167or has been deleted or doesn't match the switch image.&lt;/p&gt;&lt;table&gt;
4168	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4169
4170	bsnApFunctionalityDisableReasonCode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4171	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4172		unknown(0)
4173		licenseKeyExpired(1)
4174		licenseKeyDeleted(2)
4175		licenseKeyFeatureMismatch(3)
4176	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4177	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4178
4179	bsnLicenseKeyTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4180	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4181	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4182
4183	bsnLicenseKeyFeatureSetTrapVariable&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4184	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4185		wps(1)
4186		all(2)
4187	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4188	</descr>
4189		<logmsg dest='logndisplay'>&lt;p&gt;
4190			bsnAPFunctionalityDisabled trap received 
4191			bsnApFunctionalityDisableReasonCode=%parm[#1]% 
4192			bsnLicenseKeyTrapVariable=%parm[#2]% 
4193			bsnLicenseKeyFeatureSetTrapVariable=%parm[#3]%&lt;/p&gt;
4194		</logmsg>
4195	<severity>Major</severity>
4196	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#2]%" alarm-type="1" auto-clean="false" />
4197</event>
4198<event>
4199	<mask>
4200		<maskelement>
4201			<mename>id</mename>
4202			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4203		</maskelement>
4204		<maskelement>
4205			<mename>generic</mename>
4206			<mevalue>6</mevalue>
4207		</maskelement>
4208		<maskelement>
4209			<mename>specific</mename>
4210			<mevalue>79</mevalue>
4211		</maskelement>
4212	</mask>
4213	<uei>uei.opennms.org/vendor/cisco/bsnAPRegulatoryDomainMismatch</uei>
4214	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPRegulatoryDomainMismatch</event-label>
4215	<descr>
4216&lt;p&gt;This trap is generated if an AP's regulatory domain doesn't 
4217match the country the switch is configured for.  Due to the 
4218mismatch, the AP will fail to associate with the Switch.&lt;/p&gt;&lt;table&gt;
4219	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4220
4221	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4222	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4223	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4224
4225	bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4226	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4227	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4228
4229	bsnApRegulatoryDomain&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4230	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4231		a(0)
4232		e(1)
4233		i(6)
4234		j(9)
4235		c(16)
4236		n(21)
4237		k(32)
4238		p(33)
4239		s(34)
4240		t(35)
4241		r(48)
4242		notavailable(65535)
4243	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4244	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4245
4246	bsnGlobalDot11CountryIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4247	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4248		usa(1)
4249		canada(2)
4250		france(3)
4251		japan(4)
4252		mexico(5)
4253		spain(6)
4254		usalegacy(7)
4255		korearepublic(8)
4256		australia(9)
4257		austria(10)
4258		belgium(11)
4259		denmark(12)
4260		finland(13)
4261		germany(14)
4262		greece(15)
4263		ireland(16)
4264		italy(17)
4265		luxembourg(18)
4266		netherlands(19)
4267		portugal(20)
4268		sweden(21)
4269		unitedkingdom(22)
4270		none(23)
4271		india(24)
4272		hongkong(25)
4273		switzerland(26)
4274		iceland(27)
4275		norway(28)
4276		singapore(29)
4277		thailand(30)
4278		taiwan(31)
4279		cyprus(33)
4280		czechrepublic(34)
4281		estonia(35)
4282		hungary(36)
4283		lithuania(37)
4284		latvia(38)
4285		malaysia(39)
4286		newzealand(40)
4287		poland(41)
4288		slovenia(42)
4289		slovakrepublic(43)
4290		southafrica(44)
4291		usachan165(45)
4292		israel(46)
4293		israelOutdoor(47)
4294		argentina(48)
4295		brazil(49)
4296		saudiArabia(51)
4297		turkey(52)
4298		indonesia(53)
4299		china(54)
4300		koreaExtended(55)
4301		japan2(56)
4302		gibraltar(57)
4303		liechtenstein(58)
4304		malta(59)
4305		monaco(60)
4306		romania(61)
4307		russianfederation(62)
4308		chile(63)
4309		colombia(64)
4310		panama(65)
4311		peru(66)
4312		venezuela(67)
4313		philippines(68)
4314	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4315	</descr>
4316		<logmsg dest='logndisplay'>&lt;p&gt;
4317			bsnAPRegulatoryDomainMismatch trap received 
4318			bsnAPDot3MacAddress=%parm[#1]% 
4319			bsnAPName=%parm[#2]% 
4320			bsnApRegulatoryDomain=%parm[#3]% 
4321			bsnGlobalDot11CountryIndex=%parm[#4]%&lt;/p&gt;
4322		</logmsg>
4323	<severity>Major</severity>
4324	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
4325</event>
4326<event>
4327	<mask>
4328		<maskelement>
4329			<mename>id</mename>
4330			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4331		</maskelement>
4332		<maskelement>
4333			<mename>generic</mename>
4334			<mevalue>6</mevalue>
4335		</maskelement>
4336		<maskelement>
4337			<mename>specific</mename>
4338			<mevalue>80</mevalue>
4339		</maskelement>
4340	</mask>
4341	<uei>uei.opennms.org/vendor/cisco/bsnRxMulticastQueueFull</uei>
4342	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRxMulticastQueueFull</event-label>
4343	<descr>
4344&lt;p&gt;This trap indicates that the CPU's Receive Multicast Queue is
4345Full.&lt;/p&gt;&lt;table&gt;&lt;/table&gt;
4346	</descr>
4347		<logmsg dest='logndisplay'>&lt;p&gt;
4348			bsnRxMulticastQueueFull trap received&lt;/p&gt;
4349		</logmsg>
4350	<severity>Warning</severity>
4351	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
4352</event>
4353<event>
4354	<mask>
4355		<maskelement>
4356			<mename>id</mename>
4357			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4358		</maskelement>
4359		<maskelement>
4360			<mename>generic</mename>
4361			<mevalue>6</mevalue>
4362		</maskelement>
4363		<maskelement>
4364			<mename>specific</mename>
4365			<mevalue>81</mevalue>
4366		</maskelement>
4367	</mask>
4368	<uei>uei.opennms.org/vendor/cisco/bsnRadarChannelDetected</uei>
4369	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRadarChannelDetected</event-label>
4370	<descr>
4371&lt;p&gt;This trap is sent when radar signals are detected on the 
4372current channel&lt;/p&gt;&lt;table&gt;
4373	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4374
4375	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4376	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4377	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4378
4379	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4380	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4381	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4382
4383	bsnAPIfPhyChannelNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4384	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4385		ch1(1)
4386		ch2(2)
4387		ch3(3)
4388		ch4(4)
4389		ch5(5)
4390		ch6(6)
4391		ch7(7)
4392		ch8(8)
4393		ch9(9)
4394		ch10(10)
4395		ch11(11)
4396		ch12(12)
4397		ch13(13)
4398		ch14(14)
4399		ch34(34)
4400		ch36(36)
4401		ch38(38)
4402		ch40(40)
4403		ch42(42)
4404		ch44(44)
4405		ch46(46)
4406		ch48(48)
4407		ch52(52)
4408		ch56(56)
4409		ch60(60)
4410		ch64(64)
4411		ch100(100)
4412		ch104(104)
4413		ch108(108)
4414		ch112(112)
4415		ch116(116)
4416		ch120(120)
4417		ch124(124)
4418		ch128(128)
4419		ch132(132)
4420		ch136(136)
4421		ch140(140)
4422		ch149(149)
4423		ch153(153)
4424		ch157(157)
4425		ch161(161)
4426		ch165(165)
4427		ch169(169)
4428	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4429	</descr>
4430		<logmsg dest='logndisplay'>&lt;p&gt;
4431			bsnRadarChannelDetected trap received 
4432			bsnAPDot3MacAddress=%parm[#1]% 
4433			bsnAPIfSlotId=%parm[#2]% 
4434			bsnAPIfPhyChannelNumber=%parm[#3]%&lt;/p&gt;
4435		</logmsg>
4436	<severity>Warning</severity>
4437	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="1" auto-clean="false" />
4438</event>
4439<event>
4440	<mask>
4441		<maskelement>
4442			<mename>id</mename>
4443			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4444		</maskelement>
4445		<maskelement>
4446			<mename>generic</mename>
4447			<mevalue>6</mevalue>
4448		</maskelement>
4449		<maskelement>
4450			<mename>specific</mename>
4451			<mevalue>82</mevalue>
4452		</maskelement>
4453	</mask>
4454	<uei>uei.opennms.org/vendor/cisco/bsnRadarChannelCleared</uei>
4455	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnRadarChannelCleared</event-label>
4456	<descr>
4457&lt;p&gt;This trap will be generated, if a radar trap has been 
4458generated earlier, after the expiry of Non-Occupancy Period.&lt;/p&gt;&lt;table&gt;
4459	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4460
4461	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4462	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4463	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4464
4465	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4466	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4467	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4468
4469	bsnAPIfPhyChannelNumber&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4470	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4471		ch1(1)
4472		ch2(2)
4473		ch3(3)
4474		ch4(4)
4475		ch5(5)
4476		ch6(6)
4477		ch7(7)
4478		ch8(8)
4479		ch9(9)
4480		ch10(10)
4481		ch11(11)
4482		ch12(12)
4483		ch13(13)
4484		ch14(14)
4485		ch34(34)
4486		ch36(36)
4487		ch38(38)
4488		ch40(40)
4489		ch42(42)
4490		ch44(44)
4491		ch46(46)
4492		ch48(48)
4493		ch52(52)
4494		ch56(56)
4495		ch60(60)
4496		ch64(64)
4497		ch100(100)
4498		ch104(104)
4499		ch108(108)
4500		ch112(112)
4501		ch116(116)
4502		ch120(120)
4503		ch124(124)
4504		ch128(128)
4505		ch132(132)
4506		ch136(136)
4507		ch140(140)
4508		ch149(149)
4509		ch153(153)
4510		ch157(157)
4511		ch161(161)
4512		ch165(165)
4513		ch169(169)
4514	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4515	</descr>
4516		<logmsg dest='logndisplay'>&lt;p&gt;
4517			bsnRadarChannelCleared trap received 
4518			bsnAPDot3MacAddress=%parm[#1]% 
4519			bsnAPIfSlotId=%parm[#2]% 
4520			bsnAPIfPhyChannelNumber=%parm[#3]%&lt;/p&gt;
4521		</logmsg>
4522	<severity>Normal</severity>
4523	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" alarm-type="2" clear-key="uei.opennms.org/vendor/cisco/bsnRadarChannelDetected:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%:%parm[#3]%" auto-clean="false" />
4524</event>
4525<event>
4526	<mask>
4527		<maskelement>
4528			<mename>id</mename>
4529			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4530		</maskelement>
4531		<maskelement>
4532			<mename>generic</mename>
4533			<mevalue>6</mevalue>
4534		</maskelement>
4535		<maskelement>
4536			<mename>specific</mename>
4537			<mevalue>83</mevalue>
4538		</maskelement>
4539	</mask>
4540	<uei>uei.opennms.org/vendor/cisco/bsnAPAuthorizationFailure</uei>
4541	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: bsnAPAuthorizationFailure</event-label>
4542	<descr>
4543&lt;p&gt;This trap is sent out in case of authorization failure while 
4544attempting to associate the AP to the controller.
4545bsnAPDot3MacAddress represents the mac-address of that AP.
4546bsnAPName is name of AP&lt;/p&gt;&lt;table&gt;
4547	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4548
4549	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4550	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4551	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4552
4553	bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4554	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4555	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4556
4557	bsnAPAuthCertificateType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4558	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4559		unknown(0)
4560		mic(1)
4561		ssc(2)
4562	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4563	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4564
4565	bsnAPAuthorizationFailureCause&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4566	%parm[#4]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4567		unknown(0)
4568		keymismatch(1)
4569		entrydoesnotexist(2)
4570		invalidCertifcate(3)
4571		entryIsMIC(4)
4572	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4573	</descr>
4574		<logmsg dest='logndisplay'>&lt;p&gt;
4575			bsnAPAuthorizationFailure trap received 
4576			bsnAPDot3MacAddress=%parm[#1]% 
4577			bsnAPName=%parm[#2]% 
4578			bsnAPAuthCertificateType=%parm[#3]% 
4579			bsnAPAuthorizationFailureCause=%parm[#4]%&lt;/p&gt;
4580		</logmsg>
4581	<severity>Indeterminate</severity>
4582	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
4583</event>
4584<event>
4585	<mask>
4586		<maskelement>
4587			<mename>id</mename>
4588			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4589		</maskelement>
4590		<maskelement>
4591			<mename>generic</mename>
4592			<mevalue>6</mevalue>
4593		</maskelement>
4594		<maskelement>
4595			<mename>specific</mename>
4596			<mevalue>84</mevalue>
4597		</maskelement>
4598	</mask>
4599	<uei>uei.opennms.org/vendor/cisco/radioCoreDumpTrap</uei>
4600	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: radioCoreDumpTrap</event-label>
4601	<descr>
4602&lt;p&gt;When radio module in AP dumps core, it informs controller and 
4603controller generates this trap. The core file can be retrieved
4604on demand.&lt;/p&gt;&lt;table&gt;
4605	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4606
4607	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4608	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4609	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4610
4611	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4612	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4613	</descr>
4614		<logmsg dest='logndisplay'>&lt;p&gt;
4615			radioCoreDumpTrap trap received 
4616			bsnAPDot3MacAddress=%parm[#1]% 
4617			bsnAPIfSlotId=%parm[#2]%&lt;/p&gt;
4618		</logmsg>
4619	<severity>Minor</severity>
4620	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
4621</event>
4622<event>
4623	<mask>
4624		<maskelement>
4625			<mename>id</mename>
4626			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4627		</maskelement>
4628		<maskelement>
4629			<mename>generic</mename>
4630			<mevalue>6</mevalue>
4631		</maskelement>
4632		<maskelement>
4633			<mename>specific</mename>
4634			<mevalue>85</mevalue>
4635		</maskelement>
4636	</mask>
4637	<uei>uei.opennms.org/vendor/cisco/invalidRadioTrap</uei>
4638	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: invalidRadioTrap</event-label>
4639	<descr>
4640&lt;p&gt;This trap will be generated when an AP has joined is using 
4641unsupported radio or a radio slot not currently not being 
4642used.&lt;/p&gt;&lt;table&gt;
4643	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4644
4645	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4646	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4647	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4648
4649	bsnAPIfSlotId&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4650	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4651	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4652
4653	bsnAPInvalidRadioType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4654	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4655		unsupportedRadio(0)
4656	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4657	</descr>
4658		<logmsg dest='logndisplay'>&lt;p&gt;
4659			invalidRadioTrap trap received 
4660			bsnAPDot3MacAddress=%parm[#1]% 
4661			bsnAPIfSlotId=%parm[#2]% 
4662			bsnAPInvalidRadioType=%parm[#3]%&lt;/p&gt;
4663		</logmsg>
4664	<severity>Minor</severity>
4665	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
4666</event>
4667<event>
4668	<mask>
4669		<maskelement>
4670			<mename>id</mename>
4671			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4672		</maskelement>
4673		<maskelement>
4674			<mename>generic</mename>
4675			<mevalue>6</mevalue>
4676		</maskelement>
4677		<maskelement>
4678			<mename>specific</mename>
4679			<mevalue>86</mevalue>
4680		</maskelement>
4681	</mask>
4682	<uei>uei.opennms.org/vendor/cisco/countryChangeTrap</uei>
4683	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: countryChangeTrap</event-label>
4684	<descr>
4685&lt;p&gt;This trap will be generated when an operator changes the
4686country of operation. New country code will be sent in trap.&lt;/p&gt;&lt;table&gt;
4687	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4688
4689	bsnGlobalDot11CountryIndex&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4690	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4691		usa(1)
4692		canada(2)
4693		france(3)
4694		japan(4)
4695		mexico(5)
4696		spain(6)
4697		usalegacy(7)
4698		korearepublic(8)
4699		australia(9)
4700		austria(10)
4701		belgium(11)
4702		denmark(12)
4703		finland(13)
4704		germany(14)
4705		greece(15)
4706		ireland(16)
4707		italy(17)
4708		luxembourg(18)
4709		netherlands(19)
4710		portugal(20)
4711		sweden(21)
4712		unitedkingdom(22)
4713		none(23)
4714		india(24)
4715		hongkong(25)
4716		switzerland(26)
4717		iceland(27)
4718		norway(28)
4719		singapore(29)
4720		thailand(30)
4721		taiwan(31)
4722		cyprus(33)
4723		czechrepublic(34)
4724		estonia(35)
4725		hungary(36)
4726		lithuania(37)
4727		latvia(38)
4728		malaysia(39)
4729		newzealand(40)
4730		poland(41)
4731		slovenia(42)
4732		slovakrepublic(43)
4733		southafrica(44)
4734		usachan165(45)
4735		israel(46)
4736		israelOutdoor(47)
4737		argentina(48)
4738		brazil(49)
4739		saudiArabia(51)
4740		turkey(52)
4741		indonesia(53)
4742		china(54)
4743		koreaExtended(55)
4744		japan2(56)
4745		gibraltar(57)
4746		liechtenstein(58)
4747		malta(59)
4748		monaco(60)
4749		romania(61)
4750		russianfederation(62)
4751		chile(63)
4752		colombia(64)
4753		panama(65)
4754		peru(66)
4755		venezuela(67)
4756		philippines(68)
4757	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4758	</descr>
4759		<logmsg dest='logndisplay'>&lt;p&gt;
4760			countryChangeTrap trap received 
4761			bsnGlobalDot11CountryIndex=%parm[#1]%&lt;/p&gt;
4762		</logmsg>
4763	<severity>Warning</severity>
4764	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
4765</event>
4766<event>
4767	<mask>
4768		<maskelement>
4769			<mename>id</mename>
4770			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4771		</maskelement>
4772		<maskelement>
4773			<mename>generic</mename>
4774			<mevalue>6</mevalue>
4775		</maskelement>
4776		<maskelement>
4777			<mename>specific</mename>
4778			<mevalue>87</mevalue>
4779		</maskelement>
4780	</mask>
4781	<uei>uei.opennms.org/vendor/cisco/unsupportedAPTrap</uei>
4782	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: unsupportedAPTrap</event-label>
4783	<descr>
4784&lt;p&gt;This trap will be generated when unsupported AP try to join
478540xx/410x or 3500 with 64MB flash.&lt;/p&gt;&lt;table&gt;
4786	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4787
4788	bsnAPDot3MacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4789	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4790	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4791
4792	bsnAPName&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4793	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4794	</descr>
4795		<logmsg dest='logndisplay'>&lt;p&gt;
4796			unsupportedAPTrap trap received 
4797			bsnAPDot3MacAddress=%parm[#1]% 
4798			bsnAPName=%parm[#2]%&lt;/p&gt;
4799		</logmsg>
4800	<severity>Minor</severity>
4801	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%:%parm[#1]%:%parm[#2]%" alarm-type="1" auto-clean="false" />
4802</event>
4803<event>
4804	<mask>
4805		<maskelement>
4806			<mename>id</mename>
4807			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4808		</maskelement>
4809		<maskelement>
4810			<mename>generic</mename>
4811			<mevalue>6</mevalue>
4812		</maskelement>
4813		<maskelement>
4814			<mename>specific</mename>
4815			<mevalue>88</mevalue>
4816		</maskelement>
4817	</mask>
4818	<uei>uei.opennms.org/vendor/cisco/heartbeatLossTrap</uei>
4819	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: heartbeatLossTrap</event-label>
4820	<descr>
4821&lt;p&gt;This trap will be generated when controller loses 
4822connection with the Supervisor Switch in which it
4823is physically embedded and doesn't hear the
4824heartbeat keepalives from the Supervisor. &lt;/p&gt;&lt;table&gt;&lt;/table&gt;
4825	</descr>
4826		<logmsg dest='logndisplay'>&lt;p&gt;
4827			heartbeatLossTrap trap received&lt;/p&gt;
4828		</logmsg>
4829	<severity>Warning</severity>
4830	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
4831</event>
4832<event>
4833	<mask>
4834		<maskelement>
4835			<mename>id</mename>
4836			<mevalue>.1.3.6.1.4.1.14179.2.6.3</mevalue>
4837		</maskelement>
4838		<maskelement>
4839			<mename>generic</mename>
4840			<mevalue>6</mevalue>
4841		</maskelement>
4842		<maskelement>
4843			<mename>specific</mename>
4844			<mevalue>89</mevalue>
4845		</maskelement>
4846	</mask>
4847	<uei>uei.opennms.org/vendor/cisco/locationNotifyTrap</uei>
4848	<event-label>AIRESPACE-WIRELESS-MIB defined trap event: locationNotifyTrap</event-label>
4849	<descr>
4850&lt;p&gt;This trap will be generated by the location server 
4851for notifications of location events.&lt;/p&gt;&lt;table&gt;
4852	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4853
4854	locationNotifyContent&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4855	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4856	</descr>
4857		<logmsg dest='logndisplay'>&lt;p&gt;
4858			locationNotifyTrap trap received 
4859			locationNotifyContent=%parm[#1]%&lt;/p&gt;
4860		</logmsg>
4861	<severity>Normal</severity>
4862	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="false" />
4863</event>
4864<!-- End of auto generated data from MIB: AIRESPACE-WIRELESS-MIB -->
4865<!-- Start of auto generated data from MIB: CISCO-LWAPP-DOT11-CLIENT-MIB -->
4866<event>
4867	<mask>
4868		<maskelement>
4869			<mename>id</mename>
4870			<mevalue>.1.3.6.1.4.1.9.9.599</mevalue>
4871		</maskelement>
4872		<maskelement>
4873			<mename>generic</mename>
4874			<mevalue>6</mevalue>
4875		</maskelement>
4876		<maskelement>
4877			<mename>specific</mename>
4878			<mevalue>1</mevalue>
4879		</maskelement>
4880		<varbind>
4881			<vbnumber>1</vbnumber>
4882			<vbvalue>2</vbvalue>
4883		</varbind>
4884	</mask>
4885	<uei>uei.opennms.org/vendor/cisco/traps/ciscoLwappDot11ClientKeyDecryptErrorWEP</uei>
4886	<event-label>CISCO-LWAPP-DOT11-CLIENT-MIB defined trap event: ciscoLwappDot11ClientKeyDecryptError</event-label>
4887	<descr>
4888&lt;p&gt;Issued when a decrypt error occurs. The WEP WPA or WPA2 Key
4889configured at the station may be wrong.&lt;/p&gt;&lt;table&gt;
4890	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4891
4892	cldcAssociationMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4893	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4894		unknown(1)
4895		wep(2)
4896		wpa(3)
4897		wpa2(4)
4898	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4899	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4900
4901	cldcApMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4902	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4903	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4904
4905	cldcIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4906	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4907		dot11bg(1)
4908		dot11a(2)
4909		uwb(3)
4910	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4911	</descr>
4912		<logmsg dest='logndisplay'>&lt;p&gt;
4913			ciscoLwappDot11ClientKeyDecryptError trap received 
4914			cldcAssociationMode=%parm[#1]% 
4915			cldcApMacAddress=%parm[#2]% 
4916			cldcIfType=%parm[#3]%&lt;/p&gt;
4917		</logmsg>
4918	<severity>Warning</severity>
4919	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
4920</event>
4921<event>
4922	<mask>
4923		<maskelement>
4924			<mename>id</mename>
4925			<mevalue>.1.3.6.1.4.1.9.9.599</mevalue>
4926		</maskelement>
4927		<maskelement>
4928			<mename>generic</mename>
4929			<mevalue>6</mevalue>
4930		</maskelement>
4931		<maskelement>
4932			<mename>specific</mename>
4933			<mevalue>1</mevalue>
4934		</maskelement>
4935		<varbind>
4936			<vbnumber>1</vbnumber>
4937			<vbvalue>3</vbvalue>
4938		</varbind>
4939	</mask>
4940	<uei>uei.opennms.org/vendor/cisco/traps/ciscoLwappDot11ClientKeyDecryptErrorWPA</uei>
4941	<event-label>CISCO-LWAPP-DOT11-CLIENT-MIB defined trap event: ciscoLwappDot11ClientKeyDecryptError</event-label>
4942	<descr>
4943&lt;p&gt;Issued when a decrypt error occurs. The WEP WPA or WPA2 Key
4944configured at the station may be wrong.&lt;/p&gt;&lt;table&gt;
4945	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4946
4947	cldcAssociationMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4948	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4949		unknown(1)
4950		wep(2)
4951		wpa(3)
4952		wpa2(4)
4953	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4954	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4955
4956	cldcApMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4957	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
4958	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
4959
4960	cldcIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
4961	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
4962		dot11bg(1)
4963		dot11a(2)
4964		uwb(3)
4965	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
4966	</descr>
4967		<logmsg dest='logndisplay'>&lt;p&gt;
4968			ciscoLwappDot11ClientKeyDecryptError trap received 
4969			cldcAssociationMode=%parm[#1]% 
4970			cldcApMacAddress=%parm[#2]% 
4971			cldcIfType=%parm[#3]%&lt;/p&gt;
4972		</logmsg>
4973	<severity>Warning</severity>
4974	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
4975</event>
4976<event>
4977	<mask>
4978		<maskelement>
4979			<mename>id</mename>
4980			<mevalue>.1.3.6.1.4.1.9.9.599</mevalue>
4981		</maskelement>
4982		<maskelement>
4983			<mename>generic</mename>
4984			<mevalue>6</mevalue>
4985		</maskelement>
4986		<maskelement>
4987			<mename>specific</mename>
4988			<mevalue>1</mevalue>
4989		</maskelement>
4990		<varbind>
4991			<vbnumber>1</vbnumber>
4992			<vbvalue>4</vbvalue>
4993		</varbind>
4994	</mask>
4995	<uei>uei.opennms.org/vendor/cisco/traps/ciscoLwappDot11ClientKeyDecryptErrorWPA2</uei>
4996	<event-label>CISCO-LWAPP-DOT11-CLIENT-MIB defined trap event: ciscoLwappDot11ClientKeyDecryptError</event-label>
4997	<descr>
4998&lt;p&gt;Issued when a decrypt error occurs. The WEP WPA or WPA2 Key
4999configured at the station may be wrong.&lt;/p&gt;&lt;table&gt;
5000	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
5001
5002	cldcAssociationMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
5003	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
5004		unknown(1)
5005		wep(2)
5006		wpa(3)
5007		wpa2(4)
5008	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
5009	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
5010
5011	cldcApMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
5012	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
5013	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
5014
5015	cldcIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
5016	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
5017		dot11bg(1)
5018		dot11a(2)
5019		uwb(3)
5020	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
5021	</descr>
5022		<logmsg dest='logndisplay'>&lt;p&gt;
5023			ciscoLwappDot11ClientKeyDecryptError trap received 
5024			cldcAssociationMode=%parm[#1]% 
5025			cldcApMacAddress=%parm[#2]% 
5026			cldcIfType=%parm[#3]%&lt;/p&gt;
5027		</logmsg>
5028	<severity>Warning</severity>
5029	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
5030</event>
5031<event>
5032	<mask>
5033		<maskelement>
5034			<mename>id</mename>
5035			<mevalue>.1.3.6.1.4.1.9.9.599</mevalue>
5036		</maskelement>
5037		<maskelement>
5038			<mename>generic</mename>
5039			<mevalue>6</mevalue>
5040		</maskelement>
5041		<maskelement>
5042			<mename>specific</mename>
5043			<mevalue>1</mevalue>
5044		</maskelement>
5045	</mask>
5046	<uei>uei.opennms.org/vendor/cisco/traps/ciscoLwappDot11ClientKeyDecryptErrorUnknown</uei>
5047	<event-label>CISCO-LWAPP-DOT11-CLIENT-MIB defined trap event: ciscoLwappDot11ClientKeyDecryptError</event-label>
5048	<descr>
5049&lt;p&gt;Issued when a decrypt error occurs. The WEP WPA or WPA2 Key
5050configured at the station may be wrong.&lt;/p&gt;&lt;table&gt;
5051	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
5052
5053	cldcAssociationMode&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
5054	%parm[#1]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
5055		unknown(1)
5056		wep(2)
5057		wpa(3)
5058		wpa2(4)
5059	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
5060	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
5061
5062	cldcApMacAddress&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
5063	%parm[#2]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;
5064	&lt;tr&gt;&lt;td&gt;&lt;b&gt;
5065
5066	cldcIfType&lt;/b&gt;&lt;/td&gt;&lt;td&gt;
5067	%parm[#3]%;&lt;/td&gt;&lt;td&gt;&lt;p&gt;
5068		dot11bg(1)
5069		dot11a(2)
5070		uwb(3)
5071	&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/table&gt;
5072	</descr>
5073		<logmsg dest='logndisplay'>&lt;p&gt;
5074			ciscoLwappDot11ClientKeyDecryptError trap received 
5075			cldcAssociationMode=%parm[#1]% 
5076			cldcApMacAddress=%parm[#2]% 
5077			cldcIfType=%parm[#3]%&lt;/p&gt;
5078		</logmsg>
5079	<severity>Indeterminate</severity>
5080	<alarm-data reduction-key="%uei%:%dpname%:%nodeid%:%interface%" alarm-type="1" auto-clean="true" />
5081</event>
5082<!-- End of auto generated data from MIB: CISCO-LWAPP-DOT11-CLIENT-MIB -->
5083</events>