This discussion has been locked. The information referenced herein may be inaccurate due to age, software updates, or external references.
You can no longer post new replies to this discussion. If you have a similar question you can start a new discussion in this forum.

Wireless traps

  We have a Cisco Wireless controller that is sending its traps to NPM. When I view the taps in NPM, the information I really need seems to have been encoded and is basically unusable.


Here's an example with a Rogue Detected message:

 

bsnRogueAPAirespaceAPName = (removed)
bsnRogueAPRadioType = dot11b(1) 
bsnRogueAdhocMode = no(0) 
bsnRogueAPOnWiredNetwork = no(0) 
bsnRogueAPAirespaceAPSNR = 22 
bsnRogueAPAirespaceAPRSSI = -77 
bsnRogueAPChannelNumber = 6 
bsnRogueAPSsid =  
bsnRogueAPAirespaceAPSlotId = 0 
bsnRogueAPAirespaceAPMacAddress = ACMzf1+Q 
bsnRogueAPDot11MacAddress = AA7XToxg 
snmpTrapOID = AIRESPACE-​WIRELESS-M​IB:bsnRogu​eAPDetecte​d 
sysUpTime = 145 days 19 hours 58 minutes 19.00 seconds 

 

   How does one read that MAC address? When the Syslog is sent to Kiwi Syslog, the MAC address is intact. When I view the message on the controller, the MAC address is intact.