Use a script to do a bunch of legwork is an option.
![a9f23ff951aa4e6aa9c619672f347693_RackMultipart20160204-88318-1mgvmjo-spanguard2_inline.png a9f23ff951aa4e6aa9c619672f347693_RackMultipart20160204-88318-1mgvmjo-spanguard2_inline.png](/t5/image/serverpage/image-id/3848iF0949DEF8E2C9850/image-size/large?v=v2&px=999)
Basically take the trap, and use alarm manager to pass deviceIP, and the trap message down to the script. The script would need access to the snmp creds of the device.
The trap message will have the bridge port ID. The script will need to parse the message for the bridge port
Take the bridge port number, query the ifalias mib: 1.3.6.1.2.1.31.1.1.1.18. That'll give you the port alias.
![a9f23ff951aa4e6aa9c619672f347693_RackMultipart20160204-124052-1l3t5gk-spanguard1_inline.png a9f23ff951aa4e6aa9c619672f347693_RackMultipart20160204-124052-1l3t5gk-spanguard1_inline.png](/t5/image/serverpage/image-id/5235i37BBE160A0F5072E/image-size/large?v=v2&px=999)
Use the script to mail out result.