System Configuration 4-29
3. Configure the SNMP Traps field to generate traps when SNMP capable MUs are denied
authentication privileges or are subject of an ACL violation. When a trap is enabled, a trap
is sent every 5 seconds until the condition no longer exists.
4. Configure the Network Traps field to generate traps when the AP-5131’s link status
changes or when the AP’s firewall detects a DOS attack.
5. Configure the System Traps field to generate traps when the AP-5131 re-initializes during
transmission, saves its configuration file. When a trap is enabled, a trap is sent every 5
seconds until the condition no longer exists.
MU denied
association
Generates a trap when an MU is denied association to a AP-5131
WLAN. Can be caused when the maximum number of MUs for a
WLAN is exceeded or when an MU violates the AP-5131’s Access
Control List (ACL).
MU denied
authentication
Generates a trap when an MU is denied authentication on one of
the AP’s WLANs. Can be caused by the MU being set for the wrong
authentication type for the WLAN or by an incorrect key or
password.
SNMP authentication
failures
Generates a trap when an SNMP-capable client is denied access
to the AP-5131’s SNMP management functions or data. This can
result from an incorrect login, or missing/incorrect user credentials.
SNMP ACL violation Generates a trap when an SNMP client cannot access SNMP
management functions or data due to an Access Control List (ACL)
violation. This can result from a missing/incorrect IP address
entered within the SNMP Access Control screen.
Physical port status
change
Generates a trap whenever the status changes on the AP-5131.
The physical port status changes when a link is lost between the
AP-5131 and a connected device.
Denial of service
(DOS) attempts
Generates a trap whenever a Denial of Service (DOS) attack is
detected by the AP-5131 firewall. A new trap is sent at the
specified interval until the attack has stopped.
Send trap every Defines the interval in seconds the AP-5131 uses to generate a
trap until the Denial of Service attack is stopped. Default is 10
seconds.