<summary>Network-level EAP authentication is disabled </summary>
<description><![CDATA[ <p>EAP authentication is disabled for this Access Point. It is advisable to use EAP-based authentication. EAP has several advantages than the conventional WEP encryption. Moreover, with AccessPoints that don't use EAP or other powerful authentication mechanisms, rogue clients can easily get access to the network.</p> ]]></description>
<action><![CDATA[Enable EAP or other powerful authentication mechanisms in the AccessPoint]]></action>
<!-- RF Port Status Poller id=7004:Port Reachability for Switch -->
<expert>
<id>7304</id>
<severity>1</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<name>RF Port Status for AccessPoint</name>
<class>Availability</class>
<summary>RF Port Status Poller for AccessPoint</summary>
<description><![CDATA[ <p>This alert reports the RF Port's Status of the AccessPoint</p>]]></description>
<action></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<!-- RF Port Status Poller ends here -->
<!--Ethernet Port Status for AP id 7305 -->
<expert>
<id>7305</id>
<severity>1</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<name>Ethernet Port Status for AccessPoint</name>
<class>Availability</class>
<summary>Ethernet Port Status for AccessPoint </summary>
<description><![CDATA[ <p>This alert reports the Ethernet Port's Status of the AccessPoint </p>]]></description>
<action></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<!--Ethernet Port Status for AP ends here -->
<!-- In Bandwidth Utilization start from id=7700 to id=7703
id 7700 : In Bandwidth Utilization for AP, 7701:In Bandwidth Utilization for Switch, 7702:In Bandwidth Utilization for Router, 7703:In Bandwidth Utilization for Server,
-->
<expert>
<id>7701</id>
<severity>1</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<name>Rx Traffic Utilization for Switch</name>
<class>Performance</class>
<summary>In-Bandwidth Utilization for Switch </summary>
<description><![CDATA[ <p>This alert is generated when the Rx Utilization exceeds the specified threshold limit.</p>]]></description>
<!-- Out Bandwidth Utilization start from id=7710 to id=7713
id 7710 : Out Bandwidth Utilization for AP, 7711:Out Bandwidth Utilization for Switch, 7712:Out Bandwidth Utilization for Router, 7713:Out Bandwidth Utilization for Server,
-->
<expert>
<id>7711</id>
<severity>1</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<name>Tx Traffic Utilization for Switch</name>
<class>Performance</class>
<summary>Out-Bandwidth Utilization for Switch </summary>
<description><![CDATA[ <p>This alert is generated when the Tx Utilization exceeds the specified threshold limit.</p>]]></description>
<summary>RF Port WEP Undecryptable Errors </summary>
<description><![CDATA[ <p>This alert is generated when the number of undecryptable WEP packets exceeds the specified threshold limit.</p>]]></description>
<summary>AccessPoint Max Frame Retry Count </summary>
<description><![CDATA[ <p>This alert is generated when the number of frame retries exceeds the specified threshold limit.</p>]]></description>
<message>Frame Retries Exceeded.</message>
<action><![CDATA[ <p>Check for nearby AccessPoints operating in same channel.</p>]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>1</alarmsbypoll>
<pollingname>P802_11APFRRate</pollingname>
<isthreshold>1</isthreshold>
<thresholdtype>INTEGER</thresholdtype>
<thresholdvalue>400</thresholdvalue>
<thresholdname>P802_11APFRRate</thresholdname>
<clearmsg>Frame Retries Receded.</clearmsg>
</expert>
<!-- Max Retry Count ends here -->
<!-- TRAP related alarms-->
<expert>
<id>8001</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Traps</groupName>
<name>802.11 Authentication Failure</name>
<class>Vulnerability</class>
<summary>802.11 Authentication Failure </summary>
<description><![CDATA[ <p>This alarm indicates that 802.11 authentication failed for an access point. This might be due to a rogue client attack or an authentication flood attack. </p>]]></description>
<action><![CDATA[Check whether the mobile client is genuine.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8002</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Traps</groupName>
<name>Symbol 4131 ACL Violation</name>
<class>Vulnerability</class>
<summary> Symbol 4131 ACL Violation </summary>
<description><![CDATA[ <p>This alarm indicates that a mobile client which is not in the Access Control List of the AccessPoint is trying to associate with it. This might be a rogue client or it might be an authentication storm attack.</p>]]></description>
<action><![CDATA[Check whether the mobile client is genuine.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8003</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Performance Traps</groupName>
<name>Symbol 4131 RF Interference</name>
<class>Performance</class>
<summary>Symbol 4131 RF Interference</summary>
<description><![CDATA[ <p>This alarm indicates that the AccessPoint experiences RF interference. This might be due to channel collision between neighboring AccessPoints.</p>]]></description>
<action><![CDATA[Move neighboring AccessPoints to different channels.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8004</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Performance Traps</groupName>
<name>Symbol 4131 Max Associations</name>
<class>Performance</class>
<summary>Symbol 4131 Max Associations</summary>
<description><![CDATA[ <p>This alarm indicates that the access point has reached the maximum number of associations. Any new association beyond this limit will be dropped the AccessPoint.</p>]]></description>
<action><![CDATA[Add more access points if this place is thickly populated by mobile clients.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8005</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Traps</groupName>
<name>Symbol 4121 ACL Violation</name>
<class>Vulnerability</class>
<summary>Symbol 4121 ACL Violation</summary>
<description><![CDATA[ <p>This alarm indicates that a mobile client which is not in the Access Control List of the AccessPoint is trying to associate with it. This might be a rogue client or it might be an authentication storm attack.</p>]]></description>
<action><![CDATA[Check whether the mobile client is genuine.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8006</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Performance Traps</groupName>
<name>Symbol 4121 RF Interference</name>
<class>Performance</class>
<summary>Symbol 4121 RF Interference</summary>
<description><![CDATA[ <p>This alarm indicates that the AccessPoint experiences RF interference. This might be due to channel collision between neighboring AccessPoints.</p>]]></description>
<action><![CDATA[Move neighboring AccessPoints to different channels.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8007</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Performance Traps</groupName>
<name>Symbol 4121 Max Associations</name>
<class>Performance</class>
<summary>Symbol 4121 Max Associations</summary>
<description><![CDATA[ <p>This alarm indicates that the access point has reached the maximum number of associations. Any new association beyond this limit will be dropped the AccessPoint.</p>]]></description>
<action><![CDATA[Add more access points if this place is thickly populated by mobile clients.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8008</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Traps</groupName>
<name>Symbol 3021 ACL Violation</name>
<class>Vulnerability</class>
<summary>Symbol 3021 ACL Violation</summary>
<description><![CDATA[ <p>This alarm indicates that a mobile client which is not in the Access Control List of the AccessPoint is trying to associate with it. This might be a rogue client or it might be an authentication storm attack.</p>]]></description>
<action><![CDATA[Check whether the mobile client is genuine.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8009</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Performance Traps</groupName>
<name>Symbol 3021 RF Interference</name>
<class>Performance</class>
<summary>Symbol 3021 RF Interference</summary>
<description><![CDATA[ <p>This alarm indicates that the AccessPoint experiences RF interference. This might be due to channel collision between neighboring AccessPoints.</p>]]></description>
<action><![CDATA[Move neighboring AccessPoints to different channels.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8010</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Traps</groupName>
<name>Symbol 3021 Max Associations</name>
<class>Vulnerability</class>
<summary>Symbol 3021 Max Associations</summary>
<description><![CDATA[ <p>This alarm indicates that the access point has reached the maximum number of associations. Any new association beyond this limit will be dropped the AccessPoint.</p>]]></description>
<action><![CDATA[Add more access points if this place is thickly populated by mobile clients.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8011</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Performance Traps</groupName>
<name>Proxim RF Interference</name>
<class>Performance</class>
<summary>Proxim RF Interference</summary>
<description><![CDATA[ <p>This alarm indicates that the AccessPoint experiences RF interference. This might be due to channel collision between neighboring AccessPoints.</p>]]></description>
<action><![CDATA[Move neighboring AccessPoints to different channels.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8012</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Traps</groupName>
<name>Proxim No Authentication</name>
<class>Vulnerability</class>
<summary>Proxim No Authentication</summary>
<description><![CDATA[ <p>This alarm indicates that the AccessPoint serves Mobile Clients without authenticating them. This is a serious security threat.</p>]]></description>
<action><![CDATA[Enable Authentication in the AccessPoint]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8013</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Traps</groupName>
<name>Proxim Invalid Encryption</name>
<class>Vulnerability</class>
<summary>Proxim Invalid Encryption</summary>
<description><![CDATA[ <p>This alarm indicates that a mobile client tried to connect to this AccessPoint using an invalid encryption key. This might be an attack.</p>]]></description>
<action><![CDATA[Check whether the mobile client is genuine.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<expert>
<id>8014</id>
<severity>3</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<groupName>Traps</groupName>
<name>Proxim Authentication Failure</name>
<class>Vulnerability</class>
<summary>Proxim Authentication Failure</summary>
<description><![CDATA[ <p>This alarm indicates that a mobile client failed to authenticate with the access point. This might be a rogue client or an attack.</p>]]></description>
<action><![CDATA[Check whether the mobile client is genuine.]]></action>
<customprotect>1</customprotect>
<alarmsbypoll>0</alarmsbypoll>
<pollingname></pollingname>
<isthreshold>0</isthreshold>
</expert>
<!-- Associated Clients id=7124 -->
<expert>
<id>7124</id>
<severity>1</severity>
<enabled>1</enabled>
<frequency>0</frequency>
<name>Associated Clients</name>
<class>Operational</class>
<summary>Associated Clients</summary>
<description><![CDATA[ <p>This alert is generated when the number of associated mobile users on an access point exceeds the specified threshold limit </p>]]></description>
<message>Number of associated Mobile Users Exceeded.</message>
<action><![CDATA[ <p>Check whether clients connected to the AccessPoint are genuine. If yes, add more AccessPoints to serve clients.</p>]]></action>
<summary>Mobile Unit with unauthorized MacAddress/Vendor detected</summary>
<alerttemplate></alerttemplate>
<description><![CDATA[<p>Client with unauthorized MAC address/Vendor detected. WLAN Administrators can import the list of authorized MAC Address or vendors into WiFi Manager, if the MAC address of the discovered client is not in the authorized MAC list, or if the client device is from a vendor not authorized by the WLAN Administrator, the client is marked as rogue. Sometimes this client device could also be a new device the MAC Address of which is still not updated in the authorized MAC list. </p>]]></description>
<action><![CDATA[<p>Add the MAC to authorized MAC list if the client is legitimate. Marking the client as trusted, from WiFi Manager inventory page, will automatically add the (MAC Address,Vendor) to the authorized list. If it is not a legitimate client, remove it physically or block it from the network by adding its MAC to the blocked list of all the AccessPoint's Access Control List.
</p>]]></action>
<clearmsg>Mobile Client added to the trusted list.</clearmsg>
</expert>
<expert>
<id>4011</id>
<enabled>1</enabled>
<name>Rogue AccessPoint Detected</name>
<severity>2</severity>
<class>Intrusion</class>
<frequency>1</frequency>
<summary>AccessPoint with unauthorized MAC address/SSID/Channel/Vendor detected</summary>
<alerttemplate></alerttemplate>
<description><![CDATA[<p>A new access point with unauthorized MAC Address/SSID/Channel/Vendor detected. Possible reasons for this alarm are -
<ul>
<li>Installation of a new, legitimate access point, which doesn't satisfy the criteria defined by WLAN Administrator to qualify as trusted."</li>
<li>Detection of an AccessPoint in neighboring premises that is not connected to your WLAN.</li>
<li>Accidental or intentional connection of a new rogue AccessPointi by an employee.</li>
<li>An AccessPoint run by an attacker masquerading as a real AccessPoint.</li>
</ul></p>]]></description>
<action><![CDATA[<p>Add the MAC to authorized MAC list if the AP is legitimate. Marking the AccessPoint as trusted will automatically add the MAC to the authorized list.Remove AccessPoint from the network using the block switch port option, if the AccessPoint is truly a rogue AccessPoint.