No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

E9000 Server V100R001 HMM Alarm Handling 19

This document describes E9000 server alarms in terms of the meaning, impact on the system, possible causes, and solutions.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
ARP

ARP

ARP 1.3.6.1.4.1.2011.5.25.123.2.1 hwEthernetARPSpeedLimitAlarm

Description

Packet speed exceed the configured speed-limit value. (IfIndex=[IfIndex], Suppress Value=[SupValue], Current Value=[CurValue], Suppress Type=[SupType], Source IP=[SrcIp], Destination IP=[DstIp], Vpn instance name=[VpnName])

The transmit rate of ARP packets or ARP Miss messages exceeded the configured rate limit.

Attributes

Attribute

Description

Trap OID

1.3.6.1.4.1.2011.5.25.123.2.1

Trap severity

Warning

Parameters

Parameter

Description

IfIndex

Interface index

Suppress Value

Rate limit of ARP packets or ARP Miss messages

Current Value

Current transmit rate of ARP packets or ARP Miss messages

Suppress Type

Type of packets that are suppressed: ARP packets or ARP Miss messages

Source Ip

Source IP addresses of ARP packets or ARP Miss messages

Destination Ip

Destination IP addresses of ARP packets or ARP Miss messages

Vpn instance name

VPN instances that ARP packets or ARP Miss messages belong to

Impact on the System

If ARP packets are suppressed, the transmit rate of ARP packets exceeds the configured rate limit. As a result, some ARP packets are discarded and traffic cannot be forwarded normally.

If ARP Miss messages are suppressed, the transmit rate of ARP Miss messages exceeds the configured rate limit. As a result, some ARP Miss messages are discarded and ARP Request messages cannot be triggered. Therefore, traffic cannot be forwarded normally.

Possible Causes

Cause 1: The transmit rate of ARP packets exceeded the configured rate limit.

Cause 2: The transmit rate of ARP Miss messages exceeded the configured rate limit.

Procedure
  • Cause 1: The transmit rate of ARP packets exceeded the configured rate limit.
    1. Run the display arp anti-attack rate-limit command to check the configured rate limit of ARP packets.
    2. Run the arp anti-attack rate-limit destination-ip maximum maximum command to re-set the rate limit of ARP packets. The value must be greater than the value obtained in Step 1 but less than 65536. Then, check whether the trap is cleared.
      • If the trap is cleared, go to Step 4.
      • If the trap persists, go to Step 3.
    3. Collect trap, log, and configuration information, and contact Huawei technical support personnel.
    4. End.
  • Cause 2: The transmit rate of ARP Miss messages exceeded the configured rate limit.
    1. Run the display arp miss anti-attack rate-limit command to check the configured rate limit of ARP Miss messages.
    2. Run the arp miss anti-attack rate-limit source-ip command to re-set the rate limit of ARP Miss messages. The value must be greater than the value obtained in Step 1 but less than 65536. Then, check whether the trap is cleared.
      • If the trap is cleared, go to Step 4.
      • If the trap persists, go to Step 3.
    3. Collect trap, log, and configuration information, and contact Huawei technical support personnel.
    4. End.

ARP_1.3.6.1.4.1.2011.5.25.123.2.7 hwEthernetARPMACIPConflict

Description

MAC and IP address conflict. (Conflict interface=[OCTET], Conflict MAC address=[OCTET], Conflict IP address=[IPADDR], Received packet's destination MAC address=[OCTET], Received packet's destination IP address=[IPADDR], Received packet's VLAN=[INTEGER], Received packet's CE-VLAN=[INTEGER], Input interface=[OCTET])

The source IP and MAC addresses of ARP packets received by the interface were the same as those of the interface.

Attributes

Attribute

Description

Trap OID

1.3.6.1.4.1.2011.5.25.123.2.7

Trap severity

Major

Match trap

ARP_1.3.6.1.4.1.2011.5.25.123.2.8 hwEthernetARPMACIPConflictResolved

Parameters

Parameter

Description

Conflict interface

Name of the conflict interface where the conflict is detected

Conflict MAC address

Source MAC addresses of the received ARP packets

Conflict IP address

Source IP addresses of the received ARP packets

Received packet's destination MAC address

Destination MAC addresses of the received ARP packets

Received packet's destination IP address

Destination IP addresses of the received ARP packets

Received packet's VLAN

Outer vlan tag of the received ARP packets

Received packet's CE-VLAN

Inner vlan tag of the received ARP packets

Input interface

Interface that receives ARP packets

Impact on the System

If the trap is generated, there are loops on the network. As a result, user's services may be interrupted.

Possible Causes

The source IP and MAC addresses of ARP packets received by the interface were the same as those of the interface.

Procedure
  • The source IP and MAC addresses of ARP packets received by the interface were the same as those of the interface.
    1. Check the network topology to determine whether there are loops on the network.
      • If a loop is detected go to Step 2.
      • If no loop is detected, go to Step 3.
    2. Remove loops and check whether the trap is cleared.
      • If the trap is cleared, go to Step 4.
      • If the trap persists, go to Step 3.
    3. Collect trap, log, and configuration information, and contact Huawei technical support personnel.
    4. End.

ARP_1.3.6.1.4.1.2011.5.25.123.2.8 hwEthernetARPMACIPConflictResolved

Description

MAC and IP address confliction resolved. (Conflict interface=[OCTET], Conflict MAC address=[OCTET], Conflict IP address=[IPADDR])

A resume alarm is generated when the interface cannot receive a packet with source IP and MAC addresses that are the same as those of the interface.

Attributes

Attribute

Description

Trap OID

1.3.6.1.4.1.2011.5.25.123.2.8

Trap severity

Major

Match trap

ARP_1.3.6.1.4.1.2011.5.25.123.2.7 hwEthernetARPMACIPConflict

Parameters

Parameter

Description

Conflict interface

Name of the conflict interface where the conflict is detected

Conflict MAC address

Source MAC addresses of the received ARP packets

Conflict IP address

Source IP addresses of the received ARP packets

Impact on the System

If the trap is generated, the loops on the network were deleted. As a result, user's services may resume.

Possible Causes

The interface cannot receive a packet with source IP and MAC addresses that are the same as those of the interface in 30 minutes.

Procedure
  • This alarm message is informational only, and no action is required.
Translation
Download
Updated: 2018-08-16

Document ID: EDOC1000015902

Views: 208265

Downloads: 1590

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next