5 Replies Latest reply on Nov 19, 2010 9:12 AM by Sol

    Wireless traps


        We have a Cisco Wireless controller that is sending its traps to NPM. When I view the taps in NPM, the information I really need seems to have been encoded and is basically unusable.

      Here's an example with a Rogue Detected message:


      bsnRogueAPAirespaceAPName = (removed)
      bsnRogueAPRadioType =  dot11b(1) 
      bsnRogueAdhocMode = no(0) 
      bsnRogueAPOnWiredNetwork =  no(0) 
      bsnRogueAPAirespaceAPSNR = 22 
      bsnRogueAPAirespaceAPRSSI =  -77 
      bsnRogueAPChannelNumber = 6 
      bsnRogueAPSsid =   
      bsnRogueAPAirespaceAPSlotId = 0 
      bsnRogueAPAirespaceAPMacAddress =  ACMzf1+Q 
      bsnRogueAPDot11MacAddress = AA7XToxg 
      snmpTrapOID =  AIRESPACE-WIRELESS-MIB:bsnRogueAPDetected 
      sysUpTime = 145 days 19 hours  58 minutes 19.00 seconds 


         How does one read that MAC address? When the Syslog is sent to Kiwi Syslog, the MAC address is intact. When I view the message on the controller, the MAC address is intact.