No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

E9000 Server V100R001 HMM Alarm Handling 19

This document describes E9000 server alarms in terms of the meaning, impact on the system, possible causes, and solutions.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
ARP

ARP

ARP_1.3.6.1.4.1.2011.5.25.123.2.1 hwEthernetARPSpeedLimitAlarm

Description

Packet speed exceeded the configured speed limit. (IfIndex=[IfIndex], Suppress Value=[SupValue], Current Value=[CurValue], Suppress Type=[SupType], Source IP=[SrcIp], Destination IP=[DstIp], Vpn instance name=[VpnName])

The transmit rate of ARP packets or ARP Miss messages exceeded the configured rate limit.

Attributes

Attribute

Description

Alarm or Event

Event

Trap Severity

Warning

Mnemonic Code

hwEthernetARPSpeedLimitAlarm

Trap OID

1.3.6.1.4.1.2011.5.25.123.2.1

Alarm ID

This is an event trap and does not involve alarm ID.

Alarm Type

This is an event trap and does not involve alarm type.

Raise or Clear

This is an event trap and does not involve alarm generation or clearance.

Match trap

This is an event trap and does not involve the match trap.

Parameters

Parameter

Description

IfIndex

Interface index

Suppress Value

Rate limit of ARP packets or ARP Miss messages

Current Value

Current transmit rate of ARP packets or ARP Miss messages

Suppress Type

Type of packets that are suppressed: ARP packets or ARP Miss messages

Source Ip

Source IP addresses of ARP packets or ARP Miss messages

Destination Ip

Destination IP addresses of ARP packets or ARP Miss messages

Vpn instance name

VPN instances that ARP packets or ARP Miss messages belong to

VB

VB OID

VB Name

VB Index

1.3.6.1.4.1.2011.5.25.123.1.4

hwEthernetARPSpeedLimitIfIndex

None

1.3.6.1.4.1.2011.5.25.123.1.5

hwEthernetARPSpeedLimitConfigured

None

1.3.6.1.4.1.2011.5.25.123.1.6

hwEthernetARPSpeedLimitCurrent

None

1.3.6.1.4.1.2011.5.25.123.1.7

hwEthernetARPSpeedLimitType

None

1.3.6.1.4.1.2011.5.25.123.1.8

hwEthernetARPSpeedLimitSrcIPAddr

None

1.3.6.1.4.1.2011.5.25.123.1.9

hwEthernetARPSpeedLimitDstIPAddr

None

1.3.6.1.4.1.2011.5.25.123.1.10

hwEthernetARPSpeedLimitVPNinstance

None

Impact on the System

If ARP packets are suppressed, the transmit rate of ARP packets exceeds the configured rate limit. As a result, some ARP packets are discarded and traffic cannot be forwarded normally.

If ARP Miss messages are suppressed, the transmit rate of ARP Miss messages exceeds the configured rate limit. As a result, some ARP Miss messages are discarded and ARP Request messages cannot be triggered. Therefore, traffic cannot be forwarded normally.

Possible Causes

Cause 1: The transmit rate of ARP packets exceeded the configured rate limit.

Cause 2: The transmit rate of ARP Miss messages exceeded the configured rate limit.

Procedure
  • Cause 1: The transmit rate of ARP packets exceeded the configured rate limit.
    1. Run the display arp anti-attack rate-limit command to check the configured rate limit of ARP packets.
    2. Run the arp anti-attack rate-limit destination-ip maximum maximum command to re-set the rate limit of ARP packets. The value must be greater than the value obtained in Step 1 but less than 65536. Then, check whether the trap is cleared.
      • If the trap is cleared, go to Step 4.
      • If the trap persists, go to Step 3.
    3. Collect trap, log, and configuration information, and contact technical support personnel.
    4. End.
  • Cause 2: The transmit rate of ARP Miss messages exceeded the configured rate limit.
    1. Run the display arp miss anti-attack rate-limit command to check the configured rate limit of ARP Miss messages.
    2. Run the arp miss anti-attack rate-limit source-ip command to re-set the rate limit of ARP Miss messages. The value must be greater than the value obtained in Step 1 but less than 65536. Then, check whether the trap is cleared.
      • If the trap is cleared, go to Step 4.
      • If the trap persists, go to Step 3.
    3. Collect trap, log, and configuration information, and contact technical support personnel.
    4. End.

ARP_1.3.6.1.4.1.2011.5.25.123.2.6 hwEthernetARPIPConflictEvent

Description

Detected an IP address collision. (IpAddress=[IpAddr], Local MacAddress=[LocalMacAddr], Local InterfaceName=[LocalIfName], Local VLAN=[LocalPVid], Local INNER-VLAN=[LocalCVid], Received MacAddress=[RcvMacAddr], Received InterfaceName=[RcvIfName], Received VLAN=[RcvPVid], Received INNER-VLAN=[RcvCVid], Collision Type=[type])

An IP address conflict is detected by ARP.

Attributes

Attribute

Description

Alarm or Event

Event

Trap Severity

Warning

Mnemonic Code

hwEthernetARPIPConflictEvent

Trap OID

1.3.6.1.4.1.2011.5.25.123.2.6

Alarm ID

0x08591021

Alarm Type

This is an event trap and does not involve alarm type.

Raise or Clear

This is an event trap and does not involve alarm generation or clearance.

Match trap

This is an event trap and does not involve the match trap.

Parameters

Parameter

Description

IpAddress

IP address

Local MacAddress

Interface recorded in the ARP entry of the IP address

Local InterfaceName

Source MAC address recorded in the ARP entry of the IP address

Local VLAN

VLAN recorded in the ARP entry of the IP address

Local INNER-VLAN

INNER-VLAN recorded in the ARP entry of the IP address

Received MacAddress

Inbound interface of the second ARP packet with the IP address

Received InterfaceName

Source MAC address of the second ARP packet with the IP address

Received VLAN

VLAN configured on the inbound interface of the second ARP packet with the IP address

Received INNER-VLAN

INNER-VLAN configured on the inbound interface of the second ARP packet with the IP address

Collision Type

IP address conflict type

VB

VB OID

VB Name

VB Index

1.3.6.1.4.1.2011.5.25.123.1.28.1

hwEthernetARPIPConflictIPAddress

None

1.3.6.1.4.1.2011.5.25.123.1.28.2

hwEthernetARPIPConflictLocalInterfaceName

None

1.3.6.1.4.1.2011.5.25.123.1.28.3

hwEthernetARPIPConflictLocalMAC

None

1.3.6.1.4.1.2011.5.25.123.1.28.4

hwEthernetARPIPConflictLocalVLAN

None

1.3.6.1.4.1.2011.5.25.123.1.28.5

hwEthernetARPIPConflictLocalCEVLAN

None

1.3.6.1.4.1.2011.5.25.123.1.28.6

hwEthernetARPIPConflictReceiveInterfaceName

None

1.3.6.1.4.1.2011.5.25.123.1.28.7

hwEthernetARPIPConflictReceiveMAC

None

1.3.6.1.4.1.2011.5.25.123.1.28.8

hwEthernetARPIPConflictReceiveVLAN

None

1.3.6.1.4.1.2011.5.25.123.1.28.9

hwEthernetARPIPConflictReceiveCEVLAN

None

1.3.6.1.4.1.2011.5.25.123.1.28.10

hwEthernetARPIPConflictType

None

Impact on the System

This alarm indicates that an IP address conflict occurred. If the IP address conflict is not eliminated timely, route flapping may occur and services may be interrupted.

Possible Causes
  • Cause 1: The source IP address in an ARP packet is the same as the IP address of the inbound interface that receives the ARP packet, but the source MAC address in the ARP packet is different than the MAC address of the inbound interface.
  • Cause 2: The source IP address in an ARP packet is the same as the IP address in an existing ARP entry, but the source MAC address is different than the MAC address in the ARP entry.
  • Cause 4: The source IP address in an ARP packet is 0 (probe ARP packet), The destination IP address is the same as the IP address of the inbound interface that receives the ARP packet, but the source MAC address in the ARP packet is different than the MAC address of the inbound interface.
Procedure
  1. Identify the devices or users that use the same IP address.
  • If the devices or users using the same IP address can be identified, go to step 2.
  • If the devices or users using the same IP address cannot be identified, go to step 3.
  1. Modify the IP address of one device or user. Then check whether there is any alarm generated for IP address conflict.

    • If there is any IP address conflict, go to step 3.
    • If there is no IP address conflict, go to step 4.

  2. Collect trap, log, and configuration information, and contact technical support personnel..
  3. End.

ARP_1.3.6.1.4.1.2011.5.25.123.2.7 hwEthernetARPMACIPConflict

Description

MAC and IP address conflict. (Conflict interface=[OCTET], Conflict MAC address=[OCTET], Conflict IP address=[IPADDR], Received packet's destination MAC address=[OCTET], Received packet's destination IP address=[IPADDR], Received packet's VLAN=[INTEGER], Received packet's CE-VLAN=[INTEGER], Input interface=[OCTET])

The source IP and MAC addresses of ARP packets received by the interface were the same as those of the interface.

Attributes

Attribute

Description

Alarm or Event

Alarm

Trap Severity

Critical

Mnemonic Code

hwEthernetARPMACIPConflict

Trap OID

1.3.6.1.4.1.2011.5.25.123.2.7

Alarm ID

0x08590002

Alarm Type

environmentalAlarm

Raise or Clear

Raise

Match trap

ARP_1.3.6.1.4.1.2011.5.25.123.2.8 hwEthernetARPMACIPConflictResolved

Parameters

Parameter

Description

Conflict interface

Name of the conflict interface where the conflict is detected

Conflict MAC address

Source MAC addresses of the received ARP packets

Conflict IP address

Source IP addresses of the received ARP packets

Received packet's destination MAC address

Destination MAC addresses of the received ARP packets

Received packet's destination IP address

Destination IP addresses of the received ARP packets

Received packet's VLAN

Outer vlan tag of the received ARP packets

Received packet's CE-VLAN

Inner vlan tag of the received ARP packets

Input interface

Interface that receives ARP packets

VB

VB OID

VB Name

VB Index

1.3.6.1.4.1.2011.5.25.123.1.28.2

hwEthernetARPIPConflictLocalInterfaceName

None

1.3.6.1.4.1.2011.5.25.123.1.28.7

hwEthernetARPIPConflictReceiveMAC

None

1.3.6.1.4.1.2011.5.25.123.1.28.1

hwEthernetARPIPConflictIPAddress

None

1.3.6.1.4.1.2011.5.25.123.1.28.12

hwEthernetARPReceiveDstMAC

None

1.3.6.1.4.1.2011.5.25.123.1.28.11

hwEthernetARPReceiveDstIPAddr

None

1.3.6.1.4.1.2011.5.25.123.1.28.8

hwEthernetARPIPConflictReceiveVLAN

None

1.3.6.1.4.1.2011.5.25.123.1.28.9

hwEthernetARPIPConflictReceiveCEVLAN

None

1.3.6.1.4.1.2011.5.25.123.1.28.6

hwEthernetARPIPConflictReceiveInterfaceName

None

Impact on the System

If the trap is generated, there are loops on the network. As a result, user's services may be interrupted.

Possible Causes

The source IP and MAC addresses of ARP packets received by the interface were the same as those of the interface.

Procedure
  • The source IP and MAC addresses of ARP packets received by the interface were the same as those of the interface.
    1. Check the network topology to determine whether there are loops on the network.
      • If a loop is detected go to Step 2.
      • If no loop is detected, go to Step 3.
    2. Remove loops and check whether the trap is cleared.
      • If the trap is cleared, go to Step 4.
      • If the trap persists, go to Step 3.
    3. Collect trap, log, and configuration information, and contact technical support personnel.
    4. End.

ARP_1.3.6.1.4.1.2011.5.25.123.2.8 hwEthernetARPMACIPConflictResolved

Description

MAC and IP address confliction resolved. (Conflict interface=[OCTET], Conflict MAC address=[OCTET], Conflict IP address=[IPADDR])

A resume alarm is generated when the interface cannot receive a packet with source IP and MAC addresses that are the same as those of the interface.

Attributes

Attribute

Description

Alarm or Event

Alarm

Trap Severity

Critical

Mnemonic Code

hwEthernetARPMACIPConflictResolved

Trap OID

1.3.6.1.4.1.2011.5.25.123.2.8

Alarm ID

0x08590002

Alarm Type

environmentalAlarm

Raise or Clear

Clear

Match trap

ARP_1.3.6.1.4.1.2011.5.25.123.2.7 hwEthernetARPMACIPConflict

Parameters

Parameter

Description

Conflict interface

Name of the conflict interface where the conflict is detected

Conflict MAC address

Source MAC addresses of the received ARP packets

Conflict IP address

Source IP addresses of the received ARP packets

VB

VB OID

VB Name

VB Index

1.3.6.1.4.1.2011.5.25.123.1.28.2

hwEthernetARPIPConflictLocalInterfaceName

None

1.3.6.1.4.1.2011.5.25.123.1.28.7

hwEthernetARPIPConflictReceiveMAC

None

1.3.6.1.4.1.2011.5.25.123.1.28.1

hwEthernetARPIPConflictIPAddress

None

Impact on the System

If the trap is generated, the loops on the network were deleted. As a result, user's services may resume.

Possible Causes

The interface cannot receive a packet with source IP and MAC addresses that are the same as those of the interface in 30 minutes.

Procedure
  • This alarm message is informational only, and no action is required.
Translation
Download
Updated: 2018-08-16

Document ID: EDOC1000015902

Views: 193388

Downloads: 1567

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next