cwrBpiRmTEKEncryptionNegotiated - cwr Bpi Rm TEK Encryption Negotiated - CISCO-WIRELESS-P2P-BPI-MIB

MIBs list

With IPHost Network Monitor you can run simple snmp requests against a Cisco device in your network.

cwrBpiRmTEKEncryptionNegotiated

cwr Bpi Rm TEK Encryption Negotiated
1.3.6.1.4.1.9.9.135.1.2.2.1.1

This identifies whether this TEK service is using encryption or not. Encryption may not be in use even though cwrBpiRmAuthPrivacyEnable is provisioned. This is possible if the master is not configured for privacy or it's not running an encryption capable image.

Back to CISCO-WIRELESS-P2P-BPI-MIB MIB page.

IPHost Network monitor allows you to monitor cwrBpiRmTEKEncryptionNegotiated on Cisco device via the SNMP protocol. Download IPHost Network Monitor (500 monitors for 30 days, 50 monitors free forever) to start monitoring Cisco wireless switches right now.

Easy monitoring of cwrBpiRmTEKEncryptionNegotiated with IPHost tools

MIBs list