
SNMP
Table 4-3 SNMP Notifications (continued)
localMacAddrAuthFail | A client station failed authentication with the local MAC address |
| database on the access point |
|
|
pppLogonFail | The access point failed to log onto the PPPoE server using the |
| configured user name and password |
|
|
iappStationRoamedFrom | A client station roamed from another access point (identified by |
| its IP address) |
|
|
iappStationRoamedTo | A client station roamed to another access point (identified by its |
| IP address) |
|
|
iappContextDataSent | A client station’s Context Data was sent to another access point |
| with which the station has associated |
|
|
dot11InterfaceGFail | The 802.11g interface failed |
|
|
•Engine‐ID is used for SNMPv3 to identify the access point in a network of multiple access points.
–Entering the Engine‐ID invalidates all engine IDs that have been previously configured.
–If the Engine‐ID is deleted or changed, all SNMP users will be cleared. You will need to reconfigure all users.
•SNMP Users allows you configure the security requirement of users access.
Note: If you are going to use Group Lists, you must set up the Groups before adding the SNMP users.
–User specifies string to identify an SNMP user. (32 characters maximum)
–Group is the name of the SNMP group to which the user is assigned (32 characters maximum). There are three pre‐defined groups: RO, RWAuth, or RWPriv.
–Auth Type specifies the authentication type used for user authentication: “md5” or “none.”
–Passphrase is the user password required when authentication, Auth Type, is used (8 to 32 characters).
–Priv Type is the encryption type used for SNMP data encryption: “des” or “none.”
–Passphrase is the user password required when data encryption, Priv Type, is used (8 to 32 characters).
–Action: Add adds a new user; Edt allows you to edit an existing user; Del deletes the user.
•Groups allow you to combine the users into groups of authorization and privileges. Users must be assigned to groups that have the same security levels. If a user who has “AuthPriv” security (uses authentication and encryption) is assigned to a read‐only (RO) group, the user will not be able to access the database. An AuthPriv user must be assigned to the RWPriv group with the AuthPriv security level.