Configuring SNMP 203

Nortel WLAN—Security Switch 2300 Series Configuration Guide
MichaelMICFailureTraps—Generated when two Michael message integrity code (MIC) failures occur within 60
seconds, triggering Wi-Fi Protected Access (WPA) countermeasures.
MobilityDomainJoinTraps—Generated when the WSS is initially able to contact a mobility domain seed member,
or can contact the seed member after a timeout.
MobilityDomainTimeoutTraps—Generated when a timeout occurs after a WSS has unsuccessfully tried to
communicate with a seed member.
PoEFailTraps—Generated when a serious PoE problem, such as a short circuit, occurs.
RFDetectAdhocUserTraps—Generated when WSS Software detects an ad-hoc user.
RFDetectRogueAPTraps—Generated when MS detects a rogue access point.
RFDetectRogueDisappearTraps—Generated when a rogue access point is no longer being detected.
RFDetectClientViaRogueWireapTraps—Generated when WSS Software detects, on the wired part of the
network, the MAC address of a wireless client associated with a third-party AP.
RFDetectDoSPortTraps—Generated when WSS Software detects an associate request flood, reassociate request
flood, or disassociate request flood.
RFDetectDoSTraps—Generated when WSS Software detects a DoS attack other than an associate request flood,
reassociate request flood, or disassociate request flood.
RFDetectInterferingRogueAPTraps—Generated when an interfering device is detected.
RFDetectInterferingRogueDisappearTraps—Generated when an interfering device is no longer detected.
RFDetectSpoofedMacAPTraps—Generated when WSS Software detects a wireless packet with the source MAC
address of a Nortel AP, but without the spoofed AP’s signature (fingerprint).
RFDetectSpoofedSsidAPTraps—Generated when WSS Software detects beacon frames for a valid SSID, but sent
by a rogue AP.
RFDetectUnAuthorizedAPTraps—Generated when WSS Software detects the MAC address of an AP that is on
the attack list.
RFDetectUnAuthorizedOuiTraps—Generated when a wireless device that is not on the list of permitted vendors
is detected.
RFDetectUnAuthorizedSsidTraps—Generated when an SSID that is not on the permitted SSID list is detected.
To apply the configuration change to all notification types, specify all.
The drop or send option specifies the action that the SNMP engine takes with regard to notifications.
Command examples
The following command changes the action in the default notification profile from drop to send for all notification
types:

WSS# set snmp notify profile default send all

success: change accepted.
The following commands create notification profile snmpprof_rfdetect, and change the action to send for all RF
detection notification types:

WSS# set snmp notify profile snmpprof_rfdetect send RFDetectAdhocUserTraps

success: change accepted.