WESM zl Management and Configuration Guide WT.01.03 and greater

12-61
Wireless Network Management
Configuring Station Intrusion Detection
Figure 12-43.Enabling Intrusion Detection Traps
3. Select Intrusion Detection and click the Enable all sub-items button. (Alter-
natively, select one of the sub-items and click the Enable button.)
4. Make sure that the Allow Traps to be generated box is checked.
5. Click the Apply button.
The module will log the alarm, as well as forward it to a trap receiver (if one
has been specified). (For instructions on configuring the trap receiver, see
“SNMP Traps” on page 2-112 of Chapter 2: “Configuring the ProCurve Wireless
Edge Services zl Module.”)