HPN-ICF-DOT11-WIDS-MIB

File: HPN-ICF-DOT11-WIDS-MIB.mib (90313 bytes)

Imported modules

SNMPv2-TC SNMPv2-SMI HPN-ICF-DOT11-REF-MIB

Imported symbols

TruthValue MacAddress RowStatus
DateAndTime TEXTUAL-CONVENTION MODULE-IDENTITY
OBJECT-TYPE NOTIFICATION-TYPE Integer32
Unsigned32 TimeTicks hpnicfDot11
HpnicfDot11SSIDStringType HpnicfDot11ChannelScopeType HpnicfDot11RadioScopeType
HpnicfDot11ObjectIDType HpnicfDot11RadioType

Defined Types

HpnicfDot11WIDSDevType  
The type of device detected.
TEXTUAL-CONVENTION    
  INTEGER client(1), ap(2), adhoc(3), wirelessBridge(4), unknown(5)  

HpnicfDot11WIDSDevPermitType  
Represents whether the detected device is permitted or a rogue.
TEXTUAL-CONVENTION    
  INTEGER permit(1), rogue(2)  

HpnicfDot11WIDSAtkType  
The type of attack. This object has following defined values: 'act': Action Frame 'asr': Association Request 'aur': Authentication Request 'daf': Deauthentication Frame 'dar': Disassociation Request 'ndf': Null Data Frame 'pbr': Probe Request 'rar': Reassociation Request 'saf': Spoofed Disassociation Frame 'sdf': Spoofed Deauthentication Frame 'wiv': Weak IV Detected
TEXTUAL-CONVENTION    
  INTEGER act(1), asr(2), aur(3), daf(4), dar(5), ndf(6), pbr(7), rar(8), saf(9), sdf(10), wiv(11), unknown(12)  

HpnicfDot11WIDSPermitVendorEntry  
SEQUENCE    
  hpnicfDot11VendorOUI OCTET STRING
  hpnicfDot11PermitVendorRowStatus RowStatus
  hpnicfDot11VendorName OCTET STRING

HpnicfDot11WIDSPermitSSIDEntry  
SEQUENCE    
  hpnicfDot11PermitSSID HpnicfDot11SSIDStringType
  hpnicfDot11PermitSSIDRowStatus RowStatus
  hpnicfDot11PermitSSIDDetected TruthValue

HpnicfDot11WIDSIgnoreListEntry  
SEQUENCE    
  hpnicfDot11IgnoreMAC MacAddress
  hpnicfDot11IgnoreListRowStatus RowStatus
  hpnicfDot11IgnoreMACDetected TruthValue
  hpnicfDot11IgnoreDevType HpnicfDot11WIDSDevType

HpnicfDot11WIDSAttackListEntry  
SEQUENCE    
  hpnicfDot11AttackDeviceMac MacAddress
  hpnicfDot11AttackListRowStatus RowStatus
  hpnicfDot11AttackDevDetected TruthValue
  hpnicfDot11AttackDevType HpnicfDot11WIDSDevType

HpnicfDot11StaticWhiteListEntry  
SEQUENCE    
  hpnicfDot11StaticWhiteListMAC MacAddress
  hpnicfDot11StaticWhiteListRowStatus RowStatus

HpnicfDot11StaticBlackListEntry  
SEQUENCE    
  hpnicfDot11StaticBlackListMAC MacAddress
  hpnicfDot11StaticBlackListRowStatus RowStatus

HpnicfDot11WIDSPermitBSSIDEntry  
SEQUENCE    
  hpnicfDot11PermitBSSID MacAddress
  hpnicfDot11PermitBSSIDDetected TruthValue
  hpnicfDot11PermitBSSIDRowStatus RowStatus

HpnicfDot11WIDSRogueAPEntry  
SEQUENCE    
  hpnicfDot11RogueAPBSSMAC MacAddress
  hpnicfDot11RogueAPVendorName OCTET STRING
  hpnicfDot11RogueAPMonitorNum Integer32
  hpnicfDot11RogueAPFirstDetectTm TimeTicks
  hpnicfDot11RogueAPLastDetectTm TimeTicks
  hpnicfDot11RogueAPSSID HpnicfDot11SSIDStringType
  hpnicfDot11RogueAPMaxSigStrength Integer32
  hpnicfDot11RogueAPChannel HpnicfDot11ChannelScopeType
  hpnicfDot11RogueAPBeaconInterval Integer32
  hpnicfDot11RogueAPAttackedStatus TruthValue
  hpnicfDot11RogueAPToIgnore TruthValue
  hpnicfDot11RogueAPEncryptStatus TruthValue
  hpnicfDot11RogueAPReset TruthValue
  hpnicfDot11RogueAPFirstDetectTmStr OCTET STRING
  hpnicfDot11RogueAPLastDetectTmStr OCTET STRING

HpnicfDot11WIDSRogueAPExtEntry  
SEQUENCE    
  hpnicfDot11WIDSAPID HpnicfDot11ObjectIDType
  hpnicfDot11DetectCurAPSigStrength Integer32
  hpnicfDot11DetectAPByChannel HpnicfDot11ChannelScopeType
  hpnicfDot11DetectAPByRadioID HpnicfDot11RadioScopeType
  hpnicfDot11AttackAPStatus TruthValue
  hpnicfDot11DetectAPFirstTm TimeTicks
  hpnicfDot11DetectAPLastTm TimeTicks

HpnicfDot11WIDSRogueStaEntry  
SEQUENCE    
  hpnicfDot11RogueStaMAC MacAddress
  hpnicfDot11RogueStaVendorName OCTET STRING
  hpnicfDot11RogueStaMonitorNum Integer32
  hpnicfDot11RogueStaFirstDetectTm TimeTicks
  hpnicfDot11RogueStaLastDetectTm TimeTicks
  hpnicfDot11RogueStaAccessBSSID MacAddress
  hpnicfDot11RogueStaMaxSigStrength Integer32
  hpnicfDot11RogueStaChannel HpnicfDot11ChannelScopeType
  hpnicfDot11RogueStaAttackedStatus TruthValue
  hpnicfDot11RogueStaToIgnore TruthValue
  hpnicfDot11RogueStaAdHocStatus TruthValue
  hpnicfDot11RogueStaReset TruthValue
  hpnicfDot11RogueStaFirstDetectTmStr OCTET STRING
  hpnicfDot11RogueStaLastDetectTmStr OCTET STRING

HpnicfDot11WIDSRogueStaExtEntry  
SEQUENCE    
  hpnicfDot11DetectCurStaSigStrength Integer32
  hpnicfDot11DetectStaByChannel HpnicfDot11ChannelScopeType
  hpnicfDot11DetectStaByRadioID HpnicfDot11RadioScopeType
  hpnicfDot11AttackStaStatus TruthValue
  hpnicfDot11DetectStaFirstTm TimeTicks
  hpnicfDot11DetectStaLastTm TimeTicks

HpnicfDot11WIDSDetectedDevEntry  
SEQUENCE    
  hpnicfDot11WIDSDevMAC MacAddress
  hpnicfDot11WIDSDevType HpnicfDot11WIDSDevType
  hpnicfDot11WIDSDevPermitType HpnicfDot11WIDSDevPermitType
  hpnicfDot11WIDSDevVendor OCTET STRING
  hpnicfDot11WIDSDevMonitorNum Integer32
  hpnicfDot11WIDSDevSSID OCTET STRING
  hpnicfDot11WIDSDevBSSID MacAddress
  hpnicfDot11WIDSDevChannel HpnicfDot11ChannelScopeType
  hpnicfDot11WIDSDevMaxRSSI Integer32
  hpnicfDot11WIDSDevBeaconIntvl Integer32
  hpnicfDot11WIDSDevFstDctTime DateAndTime
  hpnicfDot11WIDSDevLstDctTime DateAndTime
  hpnicfDot11WIDSDevReset TruthValue
  hpnicfDot11WIDSDevSnr Integer32

HpnicfDot11WIDSRptAPEntry  
SEQUENCE    
  hpnicfDot11WIDSRptAPMAC MacAddress
  hpnicfDot11WIDSRptAPName OCTET STRING
  hpnicfDot11WIDSRptAPRadioID HpnicfDot11RadioScopeType
  hpnicfDot11WIDSRptAPMaxRSSI Integer32
  hpnicfDot11WIDSRptAPFstDctTime DateAndTime
  hpnicfDot11WIDSRptAPLstDctTime DateAndTime

HpnicfDot11DynBlackListEntry  
SEQUENCE    
  hpnicfDot11DynBlackListMAC MacAddress
  hpnicfDot11DynBlackListTime Unsigned32
  hpnicfDot11DynBlackListReason OCTET STRING
  hpnicfDot11DynBlackListReset TruthValue
  hpnicfDot11DynBlackListTimeTicks TimeTicks

HpnicfDot11WIDSRogueHistoryEntry  
SEQUENCE    
  hpnicfDot11WIDSRogueHisIndex Integer32
  hpnicfDot11WIDSRogueHisMAC MacAddress
  hpnicfDot11WIDSRogueHisVendor OCTET STRING
  hpnicfDot11WIDSRogueHisType HpnicfDot11WIDSDevType
  hpnicfDot11WIDSRogueHisChl HpnicfDot11ChannelScopeType
  hpnicfDot11WIDSRogueHisSSID OCTET STRING
  hpnicfDot11WIDSRogueHisLastDctTime DateAndTime

HpnicfDot11WIDSAtkHistroyEntry  
SEQUENCE    
  hpnicfDot11WIDSAtkHisIndex Integer32
  hpnicfDot11WIDSAtkHisMAC MacAddress
  hpnicfDot11WIDSAtkHisType HpnicfDot11WIDSAtkType
  hpnicfDot11WIDSAtkHisChl HpnicfDot11ChannelScopeType
  hpnicfDot11WIDSAtkHisRSSI Integer32
  hpnicfDot11WIDSAtkHisDctTime DateAndTime
  hpnicfDot11WIDSAtkHisAPName OCTET STRING

HpnicfDot11WIDSAtkStasEntry  
SEQUENCE    
  hpnicfDot11WIDSAtkStasType HpnicfDot11WIDSAtkType
  hpnicfDot11WIDSAtkStasCurCnt Unsigned32
  hpnicfDot11WIDSAtkStasTotalCnt Unsigned32

HpnicfDot11BlackListEntry  
SEQUENCE    
  hpnicfDot11BlackListMAC MacAddress
  hpnicfDot11BlackListTime Unsigned32
  hpnicfDot11BlackListReason OCTET STRING
  hpnicfDot11BlackListRowStatus RowStatus
  hpnicfDot11BlackListTimeTicks TimeTicks

Defined Values

hpnicfDot11WIDS 1.3.6.1.4.1.11.2.14.11.15.2.75.5
This MIB provides information about WIDS feature. GLOSSARY Wireless Intrusion Detection Sensor (WIDS) WIDS is designed to be employed in an area that is serviced by an existing wireless network. It aids in the early detection of malicious outsider attacks and intrusions via wireless networks. Rogue AP A rogue access point is any Wi-Fi access point connected to the network without authorization. As it is not authorized, if there is any weakness in the AP, the hacker will have chance to compromise the network. Rogue Station It is similiar to Rogue AP, while it is a station. Monitor AP An AP will scan or listen to the air, and try to detect wireless attack in the network. Some AP products will work only in monitor role, while some AP products could switch between normal AP role (only provide wireless access service)and monitor AP role. Ad Hoc Mode Station could work under Ad hoc mode, then they could directly do peer-to-peer communication without other device support.
MODULE-IDENTITY    

hpnicfDot11WIDSConfigGroup 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1
OBJECT IDENTIFIER    

hpnicfDot11WIDSGlobalConfigGroup 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1
OBJECT IDENTIFIER    

hpnicfDot11WIDSDetectGroup 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2
OBJECT IDENTIFIER    

hpnicfDot11WIDSNotifyGroup 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3
OBJECT IDENTIFIER    

hpnicfDot11WIDSScanMode 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.1
Represents the scope of channels to be scanned. The following value are supported all(1) - Do scan on all the channels. auto(2) - Do scan for the channels that automatically selected by WIDS.
OBJECT-TYPE    
  INTEGER all(1), auto(2)  

hpnicfDot11WIDSScanChannelList 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.2
Represents the channel scope to be scanned when hpnicfDot11WIDSScanMode is configurated as channelSpec mode. Each channel value will be separated by comma character.
OBJECT-TYPE    
  OCTET STRING Size(0..128)  

hpnicfDot11CntMsrMode 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.3
Represents the countermeasures mode.
OBJECT-TYPE    
  BITS rogue(0), adhoc(1), config(2)  

hpnicfDot11DevAgingTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.4
Represents the age time for entries in the detected device table. If an entry is not detected within the interval, it is deleted from the detected device table. If the deleted entry is that of a rogue, it is added into the rogue history table.
OBJECT-TYPE    
  Integer32 300..1800  

hpnicfDot11DynBlkListEnable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.5
Represents whether the dynamic blacklist feature is enabled or not. 'true' : Enable the dynamic blacklist feature to filter out unwanted clients, which will not get associated. 'false' : Disable the dynamic blacklist feature.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11DynBlkListLifeTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.6
Represents the lifetime for dynamic blacklist entries. If a dynamic blacklist entry is not detected within the lifetime, the entry will be removed from the dynamic blacklist. The lifetime becomes active only if dynamic blacklist feature is enabled.
OBJECT-TYPE    
  Integer32 60..3600  

hpnicfDot11FloodAtkDctEnable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.7
Represents whether detection of flood attack is enabled or not. 'true' : Enable the detection of flood attack. 'false' : Disable the detection of flood attack.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11SpoofAtkDctEnable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.8
Represents whether detection of Spoof attack is enabled or not. 'true' : Enable the detection of Spoof attack. 'false' : Disable the detection of Spoof attack.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11WeakIVAtkDctEnable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.9
Represents whether detection of weak-iv attack is enabled or not. 'true' : Enable the detection of weak-iv attack. 'false' : Disable the detection of weak-iv attack.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetWIDSRogueHistory 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.10
This object is used to clear all entries from the rogue history table. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetWIDSHistroy 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.11
This object is used to clear the history information of attacks detected in the WLAN system. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetWIDSStatistics 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.12
This object is used to clear the statistics of attacks detected in the WLAN system. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetAllDynBlkList 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.13
This object is used to remove all entries from the dynamic blacklist. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetAllStcBlkList 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.14
This object is used to remove all entries from the static blacklist. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetAllWhtBlkList 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.15
This object is used to remove all entries from the static whitelist. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetAllDctRogueAP 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.16
This object is used to clear the information of all detected rogue APs. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetAllDctRogueSta 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.17
This object is used to clear the information of all detected rogue clients. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetAllDctAdhoc 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.18
This object is used to clear the information of all detected ad hoc devices. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetAllDctDevice 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.19
This object is used to clear the information of all detected devices. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11ResetAllDctSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.20
This object is used to clear the information of all detected SSIDs. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11WidsFloodInterval 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.21
The interval of WIDS flood detection.
OBJECT-TYPE    
  Unsigned32  

hpnicfDot11WidsBlackListThreshold 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.22
When flood attack exceeds the value of this node, the MAC address will be added into black list.
OBJECT-TYPE    
  Unsigned32  

hpnicfDot11SSIDFilterOnOff 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.23
Represents whether the SSID permit feature is enabled or not.
OBJECT-TYPE    
  INTEGER on(1), off(2)  

hpnicfDot11BSSIDFilterOnOff 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.1.24
Represents whether the BSSID permit feature is enabled or not.
OBJECT-TYPE    
  INTEGER on(1), off(2)  

hpnicfDot11WIDSPermitVendorTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2
The table provides the permitted vendor list, and each vendor will be identified by OUI. The legal device should be made by the permitted vendors.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSPermitVendorEntry

hpnicfDot11WIDSPermitVendorEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1
Each entry provides the information of permitted vendor.
OBJECT-TYPE    
  HpnicfDot11WIDSPermitVendorEntry  

hpnicfDot11VendorOUI 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1.1
Represents the vendor OUI information of the wireless device.
OBJECT-TYPE    
  OCTET STRING Size(3)  

hpnicfDot11PermitVendorRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1.2
The status of this table entry.
OBJECT-TYPE    
  RowStatus  

hpnicfDot11VendorName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.2.1.3
Represents the vendor name of the wireless device.
OBJECT-TYPE    
  OCTET STRING Size(0..127)  

hpnicfDot11WIDSPermitSSIDTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3
The table represents the list of SSID could be permitted in the wireless network.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSPermitSSIDEntry

hpnicfDot11WIDSPermitSSIDEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1
Each entry provides the information of permitted SSID.
OBJECT-TYPE    
  HpnicfDot11WIDSPermitSSIDEntry  

hpnicfDot11PermitSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1.1
Represents the permitted SSID in the wireless network.
OBJECT-TYPE    
  HpnicfDot11SSIDStringType Size(0..127)  

hpnicfDot11PermitSSIDRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1.2
The status of this table entry.
OBJECT-TYPE    
  RowStatus  

hpnicfDot11PermitSSIDDetected 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.3.1.3
Represents whether the permitted SSID is detected or not.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11WIDSIgnoreListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4
The table provides the MAC address list of stations or APs, and WIDS always take them as legal stations or APs.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSIgnoreListEntry

hpnicfDot11WIDSIgnoreListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1
Each entry contains the MAC address of station or AP, and WIDS always take it as legal station or AP.
OBJECT-TYPE    
  HpnicfDot11WIDSIgnoreListEntry  

hpnicfDot11IgnoreMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.1
Represents the MAC address of station or AP, and WIDS always take it as legal station or AP.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11IgnoreListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.2
The status of this table entry.
OBJECT-TYPE    
  RowStatus  

hpnicfDot11IgnoreMACDetected 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.3
Represents whether the MAC address detected or not.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11IgnoreDevType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.4.1.4
Represents the type of the MAC address detected. The value of this object always is unknown if the MAC address is not detected.
OBJECT-TYPE    
  HpnicfDot11WIDSDevType  

hpnicfDot11WIDSAttackListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5
The table provides the MAC address list of rogue APs or rogue stations, the WIDS will take countermeasure as per the MAC address list.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSAttackListEntry

hpnicfDot11WIDSAttackListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1
Each entry contains the MAC address of rogue AP or rogue station, and the countermeasure will be taken for it.
OBJECT-TYPE    
  HpnicfDot11WIDSAttackListEntry  

hpnicfDot11AttackDeviceMac 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.1
Represents the MAC address of rogue AP or rogue station, and the countermeasure will be taken for it.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11AttackListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.2
The status of this table entry.
OBJECT-TYPE    
  RowStatus  

hpnicfDot11AttackDevDetected 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.3
Represents whether the assigned MAC address in attack list is detected or not.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11AttackDevType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.5.1.4
Represents the type of detected MAC address in attack list. If the MAC address is not detected, it will return unknown(5) for get operation.
OBJECT-TYPE    
  HpnicfDot11WIDSDevType  

hpnicfDot11StaticWhiteListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6
The table provides the information of whitelist.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11StaticWhiteListEntry

hpnicfDot11StaticWhiteListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6.1
Each entry contains the information of whitelist.
OBJECT-TYPE    
  HpnicfDot11StaticWhiteListEntry  

hpnicfDot11StaticWhiteListMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6.1.1
Represents the MAC addresses in whitelist.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11StaticWhiteListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.6.1.2
The status of this table entry.
OBJECT-TYPE    
  RowStatus  

hpnicfDot11StaticBlackListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7
The table provides the information of static blacklist.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11StaticBlackListEntry

hpnicfDot11StaticBlackListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7.1
Each entry contains the information of static blacklist.
OBJECT-TYPE    
  HpnicfDot11StaticBlackListEntry  

hpnicfDot11StaticBlackListMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7.1.1
Represents the MAC addresses in static blacklist.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11StaticBlackListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.7.1.2
The status of this table entry.
OBJECT-TYPE    
  RowStatus  

hpnicfDot11WIDSPermitBSSIDTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8
The table represents the list of BSSID could be permitted in the wireless network.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSPermitBSSIDEntry

hpnicfDot11WIDSPermitBSSIDEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1
Each entry provides the information of permitted BSSID.
OBJECT-TYPE    
  HpnicfDot11WIDSPermitBSSIDEntry  

hpnicfDot11PermitBSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1.1
Represents the permitted BSSID in the wireless network.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11PermitBSSIDDetected 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1.2
Represents whether the permitted BSSID is detected or not.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11PermitBSSIDRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.1.8.1.3
Represents the row status of permit BSSID table.
OBJECT-TYPE    
  RowStatus  

hpnicfDot11WIDSRogueAPTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1
The table represents the list of possible BSS information for rogue APs detected by the WIDS.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSRogueAPEntry

hpnicfDot11WIDSRogueAPEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1
Each entry contains possible BSS information of each rogue AP detected by WIDS.
OBJECT-TYPE    
  HpnicfDot11WIDSRogueAPEntry  

hpnicfDot11RogueAPBSSMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.1
Represents the BSS MAC address of rogue AP.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11RogueAPVendorName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.2
Represents the vendor name of rogue AP.
OBJECT-TYPE    
  OCTET STRING Size(0..127)  

hpnicfDot11RogueAPMonitorNum 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.3
Represents the number of monitor APs which detected the rogue AP.
OBJECT-TYPE    
  Integer32  

hpnicfDot11RogueAPFirstDetectTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.4
Represents the time that AP was detected as a rogue AP for the first time.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11RogueAPLastDetectTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.5
Represents the time that AP was detected as a rogue AP for the last time.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11RogueAPSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.6
Represents the SSID broadcasted by rogue AP.
OBJECT-TYPE    
  HpnicfDot11SSIDStringType  

hpnicfDot11RogueAPMaxSigStrength 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.7
Represents the maximal value of signal strength that WIDS received from the rogue AP.
OBJECT-TYPE    
  Integer32  

hpnicfDot11RogueAPChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.8
Represents on which radio channel of the rogue AP the maximal signal strength was received.
OBJECT-TYPE    
  HpnicfDot11ChannelScopeType  

hpnicfDot11RogueAPBeaconInterval 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.9
Represents the interval for Beacon management frame of rogue AP.
OBJECT-TYPE    
  Integer32  

hpnicfDot11RogueAPAttackedStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.10
Represents whether the countermeasure have taken for the rogue AP.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11RogueAPToIgnore 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.11
Represents whether the rogue AP will be taken as a rogue AP. If the value is true, NMS should not display the rogue AP as NMS display rogue AP list, and the MAC address will be automatically added into hpnicfDot11WIDSIgnoreListTable. If the value is false, NMS will take it as a rogue AP.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11RogueAPEncryptStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.12
Represents whether the rogue AP encrypt the frame or not.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11RogueAPReset 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.13
This object is used to clear information of assigned AP. The information of AP which detect assigned rogue AP will be cleared together. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11RogueAPFirstDetectTmStr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.14
Represents the time that AP was detected as a rogue AP for the first time.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11RogueAPLastDetectTmStr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.1.1.15
Represents the time that AP was detected as a rogue AP for the last time.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSRogueAPExtTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2
As each rogue AP could be detected by multiple monitor APs, each monitor AP could have some kind of detailed information about a specific rogue AP. In the hpnicfDot11WIDSRogueAPTable table, the detailed information for a specific rogue AP will be summarized from information in the hpnicfDot11WIDSRogueAPExtTable table. For example, multiple monitor APs could receive RF signal of one rogue AP, and each monitor AP has its maximum signal strength by itself. The information will be kept as hpnicfDot11DetectMaxAPSigStrength in the hpnicfDot11WIDSRogueAPExtTable table. While only the maximum value among all the hpnicfDot11DetectMaxAPSigStrength for each monitor AP will be kept in the hpnicfDot11WIDSRogueAPTable as hpnicfDot11RogueAPMaxSigStrength.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSRogueAPExtEntry

hpnicfDot11WIDSRogueAPExtEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1
Each entry contains information of the rogue AP detected by each monitor AP.
OBJECT-TYPE    
  HpnicfDot11WIDSRogueAPExtEntry  

hpnicfDot11WIDSAPID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.1
To uniquely identify each AP, and relation-ship between hpnicfDot11WIDSAPID and AP device will be static.
OBJECT-TYPE    
  HpnicfDot11ObjectIDType  

hpnicfDot11DetectCurAPSigStrength 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.2
Represents the current value of signal strength that WIDS monitor AP received from the rogue AP.
OBJECT-TYPE    
  Integer32  

hpnicfDot11DetectAPByChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.3
Represents on which radio channel that WIDS monitor AP detected the rogue AP.
OBJECT-TYPE    
  HpnicfDot11ChannelScopeType  

hpnicfDot11DetectAPByRadioID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.4
Represents on which radio the monitor AP has detected the rogue AP.
OBJECT-TYPE    
  HpnicfDot11RadioScopeType  

hpnicfDot11AttackAPStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.5
Represents whether monitor AP have taken countermeasure on the rogue AP.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11DetectAPFirstTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.6
Represents the time that monitor AP detected the rogue AP for the first time.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11DetectAPLastTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.2.1.7
Represents the time that monitor AP detected the rogue AP for the last time.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11WIDSRogueStaTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3
The table represents the list of rogue stations detected by the WIDS.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSRogueStaEntry

hpnicfDot11WIDSRogueStaEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1
Each entry contains information of each rogue station.
OBJECT-TYPE    
  HpnicfDot11WIDSRogueStaEntry  

hpnicfDot11RogueStaMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.1
Represents the MAC address of rogue station.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11RogueStaVendorName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.2
Represents the vendor name of rogue station.
OBJECT-TYPE    
  OCTET STRING Size(0..127)  

hpnicfDot11RogueStaMonitorNum 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.3
Represents the number of monitor APs which detected the rogue station.
OBJECT-TYPE    
  Integer32  

hpnicfDot11RogueStaFirstDetectTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.4
Represents the time that station was detected as a rogue station for the first time.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11RogueStaLastDetectTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.5
Represents the time that station was detected as a rogue station for the last time.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11RogueStaAccessBSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.6
Represents BSS MAC address that rogue station try to access.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11RogueStaMaxSigStrength 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.7
Represents the maximal value of signal strength that WIDS received from the rogue station.
OBJECT-TYPE    
  Integer32  

hpnicfDot11RogueStaChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.8
Represents on which radio channel the maximal signal strength was received.
OBJECT-TYPE    
  HpnicfDot11ChannelScopeType  

hpnicfDot11RogueStaAttackedStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.9
Represents whether the countermeasure have taken for the rogue station.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11RogueStaToIgnore 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.10
Represents whether the rogue AP will be taken as a rogue station. If the value is true, NMS should not display the rogue station as NMS display rogue station list, and the MAC address will be automatically added into hpnicfDot11WIDSIgnoreListTable. If the value is false, NMS will take it as a rogue station.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11RogueStaAdHocStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.11
Represents whether the rogue station work on the Ad Hoc mode or not.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11RogueStaReset 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.12
This object is used to clear information of assigned station. The information of AP which detects assigned rogue station will be cleared together. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11RogueStaFirstDetectTmStr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.13
Represents the time that station was detected as a rogue station for the first time.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11RogueStaLastDetectTmStr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.3.1.14
Represents the time that station was detected as a rogue station for the last time.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSRogueStaExtTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4
As each rogue station could be detected by multiple monitor APs, each monitor AP could have some kind of detailed information about a specific rogue station. In the hpnicfDot11WIDSRogueStaTable table, the detailed information for a specific rogue station will be summarized from information in the hpnicfDot11WIDSRogueStaExtTable table. For example, multiple monitor APs could receive RF signal of one rogue station, and each monitor AP has its maximum signal strength by itself. The information will be kept as hpnicfDot11DetectMaxStaSigStrength in the hpnicfDot11WIDSRogueStaExtTable table. While only the maximum value among all the hpnicfDot11DetectMaxStaSigStrength for each monitor AP will be kept in the hpnicfDot11WIDSRogueStaTable as hpnicfDot11RogueStaMaxSigStrength.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSRogueStaExtEntry

hpnicfDot11WIDSRogueStaExtEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1
Each entry contains information of rogue station detected by each monitor AP.
OBJECT-TYPE    
  HpnicfDot11WIDSRogueStaExtEntry  

hpnicfDot11DetectCurStaSigStrength 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.1
Represents the current value of signal strength that WIDS monitor AP received from the rogue station.
OBJECT-TYPE    
  Integer32  

hpnicfDot11DetectStaByChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.2
Represents on which radio channel the maximal signal strength was received.
OBJECT-TYPE    
  HpnicfDot11ChannelScopeType  

hpnicfDot11DetectStaByRadioID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.3
Represents which radio on the monitor AP has detected the rogue station.
OBJECT-TYPE    
  HpnicfDot11RadioScopeType  

hpnicfDot11AttackStaStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.4
Represents whether monitor AP have taken countermeasure for the rogue station.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11DetectStaFirstTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.5
Represents the time that monitor AP detected the rogue station for the first time.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11DetectStaLastTm 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.4.1.6
Represents the time that monitor AP detected the rogue station for the last time.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11WIDSDetectedDevTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5
This Table contains information of detected devices.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSDetectedDevEntry

hpnicfDot11WIDSDetectedDevEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1
Each entry contains information of detected devices.
OBJECT-TYPE    
  HpnicfDot11WIDSDetectedDevEntry  

hpnicfDot11WIDSDevMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.1
Represents MAC address of the device detected.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11WIDSDevType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.2
Represents type of the device detected.
OBJECT-TYPE    
  HpnicfDot11WIDSDevType  

hpnicfDot11WIDSDevPermitType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.3
Represents whether the device detected is a rogue device or not.
OBJECT-TYPE    
  HpnicfDot11WIDSDevPermitType  

hpnicfDot11WIDSDevVendor 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.4
Represents Vendor of the detected device.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSDevMonitorNum 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.5
Represents the number of active APs that detect the device.
OBJECT-TYPE    
  Integer32  

hpnicfDot11WIDSDevSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.6
Represents the service set identifier for the ESS of the device.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSDevBSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.7
Represents the basic service set identifier of the detected device.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11WIDSDevChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.8
Represents the channel in which the device was last detected.
OBJECT-TYPE    
  HpnicfDot11ChannelScopeType  

hpnicfDot11WIDSDevMaxRSSI 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.9
Represents the maximum detected RSSI of the device.
OBJECT-TYPE    
  Integer32  

hpnicfDot11WIDSDevBeaconIntvl 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.10
Represents the beacon interval for the detected AP.
OBJECT-TYPE    
  Integer32  

hpnicfDot11WIDSDevFstDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.11
Represents the time at which the device was first detected.
OBJECT-TYPE    
  DateAndTime  

hpnicfDot11WIDSDevLstDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.12
Represents the time at which the rogue AP was detected last time.
OBJECT-TYPE    
  DateAndTime  

hpnicfDot11WIDSDevReset 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.13
This object is used to clears the information of the device detected in the WLAN. It will return false for get operation.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11WIDSDevSnr 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.5.1.14
Represents SNR of the device detected.
OBJECT-TYPE    
  Integer32  

hpnicfDot11WIDSRptAPTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6
This Table contains information of the AP which detected device in the WLAN.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSRptAPEntry

hpnicfDot11WIDSRptAPEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1
Each entry contains information of the AP which detected device in the WLAN.
OBJECT-TYPE    
  HpnicfDot11WIDSRptAPEntry  

hpnicfDot11WIDSRptAPMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.1
Represents the MAC address of the AP that detected the device.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11WIDSRptAPName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.2
Represents the name of the AP that detected the device.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSRptAPRadioID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.3
Represents the radio index of the AP that detected the device.
OBJECT-TYPE    
  HpnicfDot11RadioScopeType  

hpnicfDot11WIDSRptAPMaxRSSI 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.4
Represents the maximum detected RSSI of the device.
OBJECT-TYPE    
  Integer32  

hpnicfDot11WIDSRptAPFstDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.5
Represents the time at which the rogue AP was detected first time.
OBJECT-TYPE    
  DateAndTime  

hpnicfDot11WIDSRptAPLstDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.6.1.6
Represents the time at which the rogue AP was detected last time.
OBJECT-TYPE    
  DateAndTime  

hpnicfDot11DynBlackListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7
This table contains information of dynamic blacklist entries.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11DynBlackListEntry

hpnicfDot11DynBlackListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1
Each entry contains information of dynamic blacklist.
OBJECT-TYPE    
  HpnicfDot11DynBlackListEntry  

hpnicfDot11DynBlackListMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.1
Represents the MAC address of the device inserted into the dynamic blacklist.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11DynBlackListTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.2
Represents the time elapsed since the entry was last updated.
OBJECT-TYPE    
  Unsigned32  

hpnicfDot11DynBlackListReason 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.3
Represents the reason why the entry was added into the dynamic blacklist.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11DynBlackListReset 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.4
This object is used to remove designated entry from the dynamic blacklist. The value which read from this object always is false.
OBJECT-TYPE    
  TruthValue  

hpnicfDot11DynBlackListTimeTicks 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.7.1.5
Represents the time elapsed since the entry was last updated in units TimeTicks.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11WIDSRogueHistoryTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8
This table contains information of all expired rogue devices which have been deleted from the list of detected rogue devices because they could not be detected within the device aging duration.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSRogueHistoryEntry

hpnicfDot11WIDSRogueHistoryEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1
Each entry contains information of an expired rogue device which has been deleted from the list of detected rogue devices because they could not be detected within the device aging duration.
OBJECT-TYPE    
  HpnicfDot11WIDSRogueHistoryEntry  

hpnicfDot11WIDSRogueHisIndex 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.1
Represents index of this entry.
OBJECT-TYPE    
  Integer32  

hpnicfDot11WIDSRogueHisMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.2
Represents the MAC address of the device.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11WIDSRogueHisVendor 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.3
Represents the vendor for the device.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSRogueHisType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.4
Represents the type of the device.
OBJECT-TYPE    
  HpnicfDot11WIDSDevType  

hpnicfDot11WIDSRogueHisChl 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.5
Represents the channel in which the device was last detected.
OBJECT-TYPE    
  HpnicfDot11ChannelScopeType  

hpnicfDot11WIDSRogueHisSSID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.6
Represents the service set identifier for the ESS of the device.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSRogueHisLastDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.8.1.7
Represents the time at which the device was last detected.
OBJECT-TYPE    
  DateAndTime  

hpnicfDot11WIDSAtkHistroyTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9
This table contains information of the history of attacks detected in the WLAN system.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSAtkHistroyEntry

hpnicfDot11WIDSAtkHistroyEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1
Each entry contains information of the history of attacks detected in the WLAN system.
OBJECT-TYPE    
  HpnicfDot11WIDSAtkHistroyEntry  

hpnicfDot11WIDSAtkHisIndex 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.1
Represents index of this entry.
OBJECT-TYPE    
  Integer32  

hpnicfDot11WIDSAtkHisMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.2
Represents the Mac address. In case of spoof attacks, this field provides the BSSID which was spoofed. In case of other attacks, this field provides the MAC address of the device which initiated the attack.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11WIDSAtkHisType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.3
Represents the type of attack.
OBJECT-TYPE    
  HpnicfDot11WIDSAtkType  

hpnicfDot11WIDSAtkHisChl 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.4
Represents the channel in which the attack was detected.
OBJECT-TYPE    
  HpnicfDot11ChannelScopeType  

hpnicfDot11WIDSAtkHisRSSI 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.5
Represents the average RSSI of the designated attack.
OBJECT-TYPE    
  Integer32  

hpnicfDot11WIDSAtkHisDctTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.6
Represents the time at which this attack was detected.
OBJECT-TYPE    
  DateAndTime  

hpnicfDot11WIDSAtkHisAPName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.9.1.7
Represents the name of the AP which detected this attack.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSAtkStatis 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10
OBJECT IDENTIFIER    

hpnicfDot11WIDSAtkStasStartTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.1
Represents current attack tracking time. It is started at the system startup and is refreshed each hour subsequently.
OBJECT-TYPE    
  DateAndTime  

hpnicfDot11WIDSAtkStasTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2
This table contains information of the counts of attacks detected.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11WIDSAtkStasEntry

hpnicfDot11WIDSAtkStasEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1
Each entry contains information of the counts of attacks detected.
OBJECT-TYPE    
  HpnicfDot11WIDSAtkStasEntry  

hpnicfDot11WIDSAtkStasType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1.1
Represents the type of attack.
OBJECT-TYPE    
  HpnicfDot11WIDSAtkType  

hpnicfDot11WIDSAtkStasCurCnt 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1.2
Represents the count of attacks detected since the time specified by the current attack tracking time. The current attack tracking time is started at the system startup and is refreshed each hour subsequently.
OBJECT-TYPE    
  Unsigned32  

hpnicfDot11WIDSAtkStasTotalCnt 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.10.2.1.3
Represents the total count of the attacks detected since the system startup.
OBJECT-TYPE    
  Unsigned32  

hpnicfDot11BlackListTable 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11
This table contains information of blacklist entries, including dynamic and static.
OBJECT-TYPE    
  SEQUENCE OF  
    HpnicfDot11BlackListEntry

hpnicfDot11BlackListEntry 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1
Each entry contains information of blacklist.
OBJECT-TYPE    
  HpnicfDot11BlackListEntry  

hpnicfDot11BlackListMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.1
This object represents the MAC address of the device inserted into the table.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11BlackListTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.2
Represents the time elapsed since the entry was last updated. If it is static blacklist, the value is always 0.
OBJECT-TYPE    
  Unsigned32  

hpnicfDot11BlackListReason 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.3
Represents the reason why the entry was added into the blacklist.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11BlackListRowStatus 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.4
This object represents the status of this table entry.
OBJECT-TYPE    
  RowStatus  

hpnicfDot11BlackListTimeTicks 1.3.6.1.4.1.11.2.14.11.15.2.75.5.2.11.1.5
Represents the time elapsed since the entry was last updated in timetick. If it is static blacklist, the value is always 0.
OBJECT-TYPE    
  TimeTicks  

hpnicfDot11WIDSTraps 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1
OBJECT IDENTIFIER    

hpnicfDot11WIDSDetectRogueTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.1
The notification represents that a rogue AP or a station was detected by WIDS. The NMS would refer to MIB table under hpnicfDot11WIDSDetectGroup group to get more detailed information.
NOTIFICATION-TYPE    

hpnicfDot11WIDSAdHocTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.2
The notification represents a rogue Ad hoc station was detected.
NOTIFICATION-TYPE    

hpnicfDot11WIDSUnauthorSSIDTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.3
The notification represents which unauthorized SSID are accessed in the network. The notification will be sent to NMS when an unauthorized SSID is detected on the network for the first time.
NOTIFICATION-TYPE    

hpnicfDot11WIDSDisappearRogueTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.4
The notification represents that a rogue device has aged out and moved to history table or the device type has been changed to friendly. The notification will be sent to NMS whenever a rogue disappears.
NOTIFICATION-TYPE    

hpnicfDot11WIDSDetectAttack 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.5
This notification occurs when some type of attack is detected.
NOTIFICATION-TYPE    

hpnicfDot11WIDSDetectWBridge 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.6
This notification occurs whenever a detected device is classified as rogue wireless-bridge.
NOTIFICATION-TYPE    

hpnicfDot11WIDSFloodTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.7
This notification occurs when flood attack is detected.
NOTIFICATION-TYPE    

hpnicfDot11WIDSSpoofTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.8
This notification occurs when spoof attack is detected.
NOTIFICATION-TYPE    

hpnicfDot11WIDSWeakIVTrap 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.1.9
This notification occurs when weak IV attack is detected.
NOTIFICATION-TYPE    

hpnicfDot11WIDSTrapVarObjects 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2
OBJECT IDENTIFIER    

hpnicfDot11WIDSRogueMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.1
Represents which rogue AP or station.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11WIDSRogueType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.2
Represents the rogue type. The following value are supported rogueAp(1) - A rogue AP rogueStation(2) - A rogue Station
OBJECT-TYPE    
  INTEGER rogueAp(1), rogueStation(2)  

hpnicfDot11WIDSMonitorMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.3
Represents which monitor detected the rogue AP or station.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11WIDSAdHocMAC 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.4
Represents the MAC address of Ad hoc station.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11UnauthorSSIDName 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.5
Represents an unauthorized SSID.
OBJECT-TYPE    
  HpnicfDot11SSIDStringType  

hpnicfDot11MonitorAPID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.6
Represents monitor AP's APID.
OBJECT-TYPE    
  HpnicfDot11ObjectIDType  

hpnicfDot11MonitorApRadioID 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.7
Represents monitor AP's radio ID
OBJECT-TYPE    
  HpnicfDot11RadioScopeType  

hpnicfDot11WIDSAtkMac 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.8
Represents mac address of attack source.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11WIDSAtkFrameType 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.9
Represents attack frame type.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSAtkChannel 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.10
Represents attack channel.
OBJECT-TYPE    
  HpnicfDot11ChannelScopeType  

hpnicfDot11WIDSAtkTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.11
Represents when attacking happened.
OBJECT-TYPE    
  OCTET STRING  

hpnicfDot11WIDSAtkDestMac 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.12
Represents mac address of attack destination.
OBJECT-TYPE    
  MacAddress  

hpnicfDot11WIDSFirstTrapTime 1.3.6.1.4.1.11.2.14.11.15.2.75.5.3.2.13
Represents the first trap time.
OBJECT-TYPE    
  TimeTicks