Specifications
7-54 WS2000 Wireless Switch System Reference Guide
IPS Event An Intrusion Prevention System event is detected by the switch’s firewall.
IPS Event traps are sent until the attack stops. These traps are internally
rate-limited to prevent flooding of traps in case of heavy attack traffic on
the network.
SNMP
Traps
SNMP
authentication
failures
An SNMP-capable client is denied access to the switch’s SNMP
management functions or data. This may result from incorrect login
SNMP ACL violation An SNMP client cannot access SNMP management functions or data due
to an Access Control List (ACL) violation
MU Traps MU associated An MU becomes associated with one of the switch’s Wireless Local Area
Networks (WLANs)
MU unassociated An MU becomes unassociated with (or gets dropped from) one of the
switch’s WLANs
MU denied
association
An MU cannot associate with the switch-managed network, for example
due to an absent or incorrectly specified MAC address on a WLAN Security
screen.
MU denied
authentication
An MU is denied authentication on one of the switch’s WLANs, which can
be caused by the MU being set for the wrong authentication type for the
WLAN or by an incorrect key or password.
AP Traps
AP adopted Any of the switch’s Wireless Local Area Networks (WLANs) adopts an AP.
AP unadopted Any of the switch’s WLANs unadopts (or drops) an AP.
AP denied adoption Any of the switch’s WLANs deny the adoption of an AP.
AP detected radar
(802.11a only)
An 802.11a AP300 Access Port detects radar during its startup or ongoing
radar scans. This trap only applies to the 802.11a radio of an AP300 Access
Port operating with Dynamic Frequency Selection and Transmit Power
Control (DFS/TPC).
Rogue AP A rogue (unauthorized) access port (AP) is detected. Several methods for
rogue AP detection are employed by the switch. The detection process is
non-disruptive and will not affect the performance of the switch. The
detection functionality is greatly enhanced when the Approved AP list is
filled out on the AP List screen under Rogue AP Detection.
Wireless
Traps
Hotspot MU State
Change
An MU using the switch’s Hotspot feature is authenticated,
unauthenticated or dropped.
WIDS MU Event A WIDS violation event is generated by a MU. For a list of WIDS violations,
see <CROSS REFERENCE HERE>
WIDS Radio Event A WIDS violation event is generated by a radio. For a list of WIDS
violations, see <CROSS REFERENCE HERE>
WIDS Switch Event A WIDS violation event is generated by the switch. For a list of WIDS
violations, see <CROSS REFERENCE HERE>
Trap
Category
Trap Name Generates a Trap whenever…