
CUSTOMER RELEASE NOTES
1/21/09 P/N: 9038177-27 Subject to Change Without Notice Page: 27 of 28
F0615-O
Generated when a client experiences an 802.1X failure.
Generated when a client roams.
Generated when MSS begins countermeasures against a rogue
access point.
Generated when MSS stops countermeasures against a rogue
access point.
Generated when an AP whose fingerprint has not been
configured in MSS establishes a management session with the
switch.
Generated when an event with an Alert severity occurs.
Generated when a device returns to its normal state.
Generated when the link is lost on a port.
Generated when the link is detected on a port.
Generated when two Michael message integrity code (MIC)
failures occur within 60 seconds, triggering Wi-Fi Protected
Access (WPA) countermeasures.
Generated when the RoamAbout Switch is initially able to contact
a mobility domain seed member, or can contact the seed member
after a timeout.
MobilityDomainTimeoutTraps
Generated when a timeout occurs after a RoamAbout Switch has
unsuccessfully tried to communicate with a seed member.
Generated when a serious PoE problem, such as a short circuit,
occurs.
Generated when MSS detects an ad-hoc user.
Generated when MSS detects a rogue access point.
RFDetectRogueDisappearTraps
Generated when a rogue access point is no longer being
detected.
RFDetectClientViaRogueWiredAPTraps
Generated when MSS detects, on the wired part of the network,
the MAC address of a wireless client associated with a third-party
AP.
Generated when MSS detects an associate request flood,
reassociate request flood, or disassociate request flood.
Generated when MSS detects a DoS attack other than an
associate request flood, reassociate request flood, or
disassociate request flood.
RFDetectInterferingRogueAPTraps
Generated when an interfering device is detected.
RFDetectInterferingRogueDisappearTraps
Generated when an interfering device is no longer detected.
RFDetectSpoofedMacAPTraps
Generated when MSS detects a wireless packet with the source
MAC address of an Enterasys AP, but without the spoofed AP‘s
signature (fingerprint).
RFDetectSpoofedSsidAPTraps
Generated when MSS detects beacon frames for a valid SSID,
but sent by a rogue AP.
RFDetectUnAuthorizedAPTraps
Generated when MSS detects the MAC address of an AP that is
on the attack list.
RFDetectUnAuthorizedOuiTraps
Generated when a wireless device that is not on the list of
permitted vendors is detected.
Komentarze do niniejszej Instrukcji