[index] エクストリコム無線LANシリーズ ユーザーガイド v4.6.18.10
無線LANスイッチは下記のSNMPトラップを送信します。
SNMPトラップはSNMPトラップ設定が有効時のみ送信されます。
SNMPトラップによっては特定の機能を有効にしたときのみ送信されます(例:トラップ番号28-30はRogue APが設定されたときのみ送信)。
すべてのSNMPトラップはRFC1157 SNMPv1に準拠しております。
1 | Client Association | This trap is sent whenever a client successfully associates with the switch. The trap includes the client MAC address and AID as well as the BSSID and ESSID that the client is associated to. |
2 | Client Disassociation | This trap is sent whenever a client disassociates from the switch. The trap includes the client MAC address and AID as well as the BSSID and ESSID that the client disassociated from. The disassociation reason code is also sent. |
4 | EAPOL Key Error | A client attempted to associate using WPA but there was an error with the EAPOL key. The trap will detail which of the following errors occurred |
13 | AP Connected | One or more APs has been connected to the switch (AP has been physically connected via Ethernet cable, or it was already connected and PoE has been enabled). The AP number corresponds to the port number on the switch that the AP is connected to. Upon switch startup or reconfigure, this trap will be sent listing all the APs connected. |
14 | AP Off | One of more APs has been disabled. The AP Ethernet cable has either been physically disconnected from the switch or PoE has been turned off. The AP number corresponds to the port number on the switch that the AP is connected to. |
19 | Redundancy peer connection up | When using "Normal" (not "Cascade") redundancy, this switch has regained connectivity with the peer switch. |
20 | Redundancy peer connection down | When using "Normal" (not "Cascade") redundancy, this switch has lost connectivity with the peer switch. |
21 | Redundancy keepalive connection up | When using "Normal" (not "Cascade") redundancy, the switch regained connectivity to the Reference IP. |
22 | Redundancy keepalive connection down | When using "Normal" (not "Cascade") redundancy, the switch lost connectivity to the Reference IP. |
25 | Redundancy status up | When using "Normal" (not "Cascade") redundancy, this switch has taken over the wireless responsibility. If the secondary switch is issuing this trap it will have done so because it detected a failure in the primary switch. If the primary switch is issuing this trap it means it has recovered from an error and is now resuming wireless responsibility. |
26 | Redundancy status down | When using "Normal" (not "Cascade") redundancy, this switch has relinquished wireless responsibility. If the primary switch is issuing this trap it means it discovered an error (for example connectivity to Reference IP is lost) in which case the trap will specify what the error is. If the secondary switch is issuing this trap it means that the primary has recovered from an error and the secondary is transferring wireless responsibility back to it. |
28 | Rogue AP lost | Available only when Rogue AP Detection is enabled. This trap indicates that a previously discovered rogue network has stopped transmitting. The trap will detail if the rogue network was an AP or ad-hoc, the relevant BSSID and ESSID, what channel the rogue was transmitting on, which Extricom AP on the switch was closest to the rogue AP, and approximately how far the rogue AP was, from the Extricom AP. |
29 | Rogue AP found | Available only when Rogue AP Detection is enabled. This trap indicates that a rogue network has been detected. The trap will detail if the rogue network is an AP or ad-hoc, the relevant BSSID and ESSID, what channel the rogue is transmitting on, which Extricom AP is closest to the rogue AP, and approximately how far the rogue AP is from the Extricom AP. |
30 | Rogue AP update | Available only when Rogue AP Detection is enabled. This trap indicates that the status of a rogue AP has been updated. This trap will always come after trap 29. This trap will detail if the rogue network is an AP or ad-hoc, the relevant BSSID and ESSID, what channel the rogue is transmitting on, which Extricom AP is closest to the rogue AP, and approximately how far the rogue AP is from the Extricom AP. |
43 | Intrusion detection Duration attack | Available only when Intrusion Detection is enabled. Indicates that the switch has detected a Duration attack. The trap will detail the duration length as well as the transmitting MAC address. |
44 | Intrusion detection Association Flood attack | Available only when Intrusion Detection is enabled. Indicates that the switch has detected an Association Flood attack. The trap will detail how many associations were received and within what time interval. |
45 | Intrusion detection Disassociation Flood attack | Available only when Intrusion Detection is enabled. Indicates that the switch has detected a Disassociation Flood attack. The trap will detail how many disassociations were received and within what time interval. If the event was triggered from a per station limitation, the trap will also include the client MAC address. |
46 | Intrusion detection Authentication Failure attack | Available only when Intrusion Detection is enabled. Indicates that the switch has detected an Authentication Flood attack. The trap will detail how many associations were received and in what time interval. |
48 | Intrusion detection Authentication Flood attack | Available only when Intrusion Detection is enabled. Indicates that the switch has detected an Authentication Flood attack. The trap will detail how many authentications were received and in what time interval. |
49 | Intrusion detection De-Authentication Flood attack | Available only when Intrusion Detection is enabled. Indicates that the switch has detected a De-Authentication Flood attack. The trap will detail how many de-authentications were received and in what time interval. If the event was triggered from a per station limitation the trap will also include the client MAC address. |
50 | Intrusion detection RF Jamming attack | Available only when Intrusion Detection is enabled. Indicates that the switch has detected an RF Jamming attack. |
51 | Intrusion detection EAPOL Start attack | Available only when Intrusion Detection is enabled. Indicates that the switch has detected an EAPOL Start Flood attack. The trap will detail how many EAPOL Start packets were received and in what time interval. If the event was triggered from a per station limitation, the trap will also include the client MAC address. |
52 | Intrusion detection EAPOL Logoff attack | Available only when Intrusion Detection is enabled. Indicates that the switch has detected an EAPOL Logoff Flood attack. The trap will detail how many EAPOL Logoff packets were received and in what time interval. If the event was triggered from a per station limitation, the trap will also include the client MAC address. |
53 | Intrusion detection De-Authentication Broadcast | Available only when Intrusion Detection is enabled. Indicates that the switch has detected a De-Authentication Broadcast. |
54 | Radius Timeout | A client attempted to associate to an ESSID using 802.1X authentication. A timeout was reached when attempting to contact the RADIUS server. If the ESSID has a secondary RADIUS server configured, the switch will attempt to authenticate the client using this server. The trap details which ESSID the authentication attempt occurred on. |
55 | Radius Changed selection | This trap will occur after trap 54, if the ESSID has multiple RADIUS servers configured. The trap will detail which RADIUS server it is changing from and to which server it is changing to. |
56 | Last Radius Failed | This trap will occur after traps 54 and 55. If the switch was unable to contact all RADIUS servers, it will try again from the beginning of the RADIUS server list. |
57 | RF localization failed | The switch localization lock is missing or corrupt. Contact an Extricom representative. |
59 | Firmware upgrade startup | Switch firmware upgrade has started. |
60 | Firmware upgrade done | Switch firmware upgrade has ended. |
61 | Firmware upgrade progress | This trap is sent with a progress update during the switch firmware upgrade. |
62 | Firmware upgrade failed | Switch firmware upgrade has failed. |
63 | Reconfigure ended | Switch reconfigure has ended. |
65 | Radio is not functioning in access points | One or more of the radios in a channel blanket is not functioning. The trap will detail which radio in which AP is not functioning. |
66 | Radio is functioning normally in all access points | All radios in a channel blanket are now functioning normally. Will be sent after all of the errors causing trap number 65 have been fixed. |
67 | Client Ignore MTU | The client has been sending packets that are larger than the Switch MTU, even though the Switch has sent several adjust MTU packets to the client. |
68 | Edge Mode Switchover | The secondary switch in a switch cascade is changing to standalone mode. This trap will be sent from the secondary switch. The trap will detail the reason for the switchover. |
69 | Reconfigure started | Switch reconfigure has started. |
70 | Edge Connected | A secondary switch of a switch cascade has connected and synchronized with the primary switch. This trap will be sent from the primary switch. |
71 | Edge Disconnected | A secondary switch of a cascade has been disconnected from the primary switch. This trap will be sent from the primary switch. This trap will be sent if the link between the primary switch and the secondary is down or if the secondary switch is non-responsive. |
72 | Set Client IP | The Client now has an IP address set. The trap details the client MAC address, AID and the IP address it is set to use. The IP address was either received via DHCP or statically set and is being used by the client. |
73 | Start.sh Started | Start.sh is being run on the switch. |
74 | Start.sh ended | Start.sh has finished running on the switch. |
75 | Starting Boot | the Switch is being rebooted. |
76 | Changed Wireless Status (On/Off) | The wireless has been enabled or disabled on the switch. The trap will say if the wireless has been turned "ON" of "OFF" and will include the reason for the change. In case the wireless was turned "OFF", all radio LEDs on the APs will be constant RED. The wireless on a switch can be turned "OFF" or "ON" manually or automatically in case of a switch cascade redundancy event. |
77 | Radio reset | A problem at the radio required a warm reset. The trap details which radio in which AP required the warm reset. |
78 | AP reset | A radio required multiple warm resets and was still not working properly, so the whole AP was reset. The trap details which AP was reset. |
79 | POE reset | An AP was reset but is still not working properly. The AP was power booted via PoE. The trap details which AP was PoE reset. |
(C) 2016 アライドテレシスホールディングス株式会社
PN: 613-002288 Rev.B