cwrBpiRsTEKEncryptionNegotiated - cwr Bpi Rs TEK Encryption Negotiated - CISCO-WIRELESS-P2P-BPI-MIB

MIBs list

With IPHost Network Monitor you can run simple snmp requests against a Cisco device in your network.

cwrBpiRsTEKEncryptionNegotiated

cwr Bpi Rs TEK Encryption Negotiated
1.3.6.1.4.1.9.9.135.1.1.2.1.1

This identifies whether this TEK service is using encryption or not. Encryption may not be in use even though cwrBpiRsPrivacyEnable is provisioned. This is possible if the remote is not configured for privacy or it's not running an encryption capable image.

Back to CISCO-WIRELESS-P2P-BPI-MIB MIB page.

IPHost Network monitor allows you to monitor cwrBpiRsTEKEncryptionNegotiated on Cisco device via the SNMP protocol. Download IPHost Network Monitor (500 monitors for 30 days, 50 monitors free forever) to start monitoring Cisco switches right now.

Easy monitoring of cwrBpiRsTEKEncryptionNegotiated with IPHost tools

MIBs list