Chapter 16 Remote Management Screens

Table 59 SNMP Traps

TRAP NAME

OBJECT IDENTIFIER #

DESCRIPTION

(OID)

 

 

authenticationFailure

1.3.6.1.6.3.1.1.5.5

The device sends this trap when it

(defined in RFC-1215)

 

receives any SNMP get or set

 

 

requirements with the wrong community

 

 

(password).

 

 

Note: snmpEnableAuthenTraps, OID

 

 

1.3.6.1.2.1.11.30 (defined in RFC 1214

 

 

and RFC 1907) must be enabled on in

 

 

order for the device to send

 

 

authenticationFailure traps. Use a MIB

 

 

browser to enable or disable

 

 

snmpEnableAuthenTraps.

 

 

 

Traps defined in the ZyXEL Private MIB.

 

 

 

 

whyReboot

1.3.6.1.4.1.890.1.5.1

This trap is sent with the reason for

 

3.0.1

restarting before the system reboots

 

 

(warm start).

 

 

"System reboot by user!" is added for an

 

 

intentional reboot (for example,

 

 

download new files, CI command "sys

 

 

reboot").

 

 

If the system reboots because of fatal

 

 

errors, a code for the error is listed.

 

 

 

pwTFTPStatus

1.3.6.1.4.1.890.1.9.2.

This trap is sent to indicate the status

 

3.3.1

and result of a TFTP client session that

 

 

has ended.

 

 

 

Some traps include an SNMP interface index. The following table maps the SNMP interface indexes to the NWA’s physical and virtual ports.

Table 60 SNMP Interface Index to Physical and Virtual Port Mapping

TYPE

INTERFACE

PORT

Physical

enet0

Wireless LAN adaptor

 

 

WLAN1

 

 

 

 

enet1

Ethernet port (LAN)

 

 

 

 

enet2

Wireless LAN adaptor

 

 

WLAN2

 

 

 

Virtual

enet3 ~ enet9

WLAN1 in MBSSID mode

 

 

 

 

enet10 ~ enet16

WLAN2 in MBSSID mode

 

 

 

 

enet17 ~ enet21

WLAN1 in WDS mode

 

 

 

 

enet22 ~ enet26

WLAN2 in WDS mode

 

 

 

208

 

NWA-3500/NWA-3550 User’s Guide