Nortel Networks 2300 manual Command Examples, 23x0# set snmp notify profile default send all

Models: 2300

1 658
Download 658 pages 6.46 Kb
Page 163
Image 163

Configuring SNMP 163

MobilityDomainTimeoutTraps—Generated when a timeout occurs after an WSS switch has unsuccessfully tried to communicate with a seed member.

APBootTraps—Generated when an AP access point boots.

APTimeoutTraps—Generated when an AP access point fails to respond to the WSS switch.

PoEFailTraps—Generated when a serious PoE problem, such as a short circuit, occurs.

RFDetectAdhocUserTraps—Generated when WSS Software detects an ad-hoc user.

RFDetectRogueAPTraps—Generated when MS detects a rogue access port.

RFDetectRogueDisappearTraps—Generated when a rogue access point is no longer being detected.

RFDetectClientViaRogueWiredAPTraps—Generated when WSS Software detects, on the wired part of the network, the MAC address of a wireless client associated with a third-party AP.

RFDetectDoSPortTraps—Generated when WSS Software detects an associate request flood, reassociate request flood, or disassociate request flood.

RFDetectDoSTraps—Generated when WSS Software detects a DoS attack other than an associate request flood, reassociate request flood, or disassociate request flood.

RFDetectInterferingRogueAPTraps—Generated when an interfering device is detected.

RFDetectInterferingRogueDisappearTraps—Generated when an interfering device is no longer detected.

RFDetectSpoofedMacAPTraps—Generated when WSS Software detects a wireless packet with the source MAC address of a Nortel AP, but without the spoofed AP’s signature (fingerprint).

RFDetectSpoofedSsidAPTraps—Generated when WSS Software detects beacon frames for a valid SSID, but sent by a rogue AP.

RFDetectUnAuthorizedAPTraps—Generated when WSS Software detects the MAC address of an AP that is on the attack list.

RFDetectUnAuthorizedOuiTraps—Generated when a wireless device that is not on the list of permitted vendors is detected.

RFDetectUnAuthorizedSsidTraps—Generated when an SSID that is not on the permitted SSID list is detected. To apply the configuration change to all notification types, specify all.

The drop or send option specifies the action that the SNMP engine takes with regard to notifications.

Command Examples

The following command changes the action in the default notification profile from drop to send for all notification types:

23x0# set snmp notify profile default send all

success: change accepted.

The following commands create notification profile snmpprof_rfdetect, and change the action to send for all RF detection notification types:

23x0# set snmp notify profile snmpprof_rfdetect send RFDetectAdhocUserTraps

success: change accepted.

Nortel WLAN Security Switch 2300 Series Configuration Guide

Page 163
Image 163
Nortel Networks 2300 manual Command Examples, 23x0# set snmp notify profile default send all