No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

E9000 Server V100R001 HMM Alarm Handling 19

This document describes E9000 server alarms in terms of the meaning, impact on the system, possible causes, and solutions.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
IPSG

IPSG

IPSG_1.3.6.1.4.1.2011.5.25.165.2.2.3.1 hwIpsgDropALarm

Description

The number of packets discarded by IPSG exceeds the threshold. (number of discarded packets = [PktCnt], threshold = [Threshold], interface = [IfName])

The number of packets discarded by IPSG exceeds the alarm threshold.

Attributes

Attributes

Description

Alarm or Event

Event

Trap Severity

Critical

Mnemonic Code

hwIpsgDropALarm

Trap OID

1.3.6.1.4.1.2011.5.25.165.2.2.3.1

Alarm ID

This is an event trap and does not involve alarm ID.

Alarm Type

This is an event trap and does not involve alarm type.

Raise or Clear

This is an event trap and does not involve alarm generation or clearance.

Match trap

This is an event trap and does not involve the match trap.

Parameters

Parameter

Description

PktCnt

Indicates the number of discarded packets.

Threshold

Indicates the alarm threshold.

IfName

Indicates the interface.

VB

VB OID

VB Name

VB Index

1.3.6.1.4.1.2011.5.25.165.2.1.3.1

hwIpsgPacketDropNum

N/A

1.3.6.1.4.1.2011.5.25.165.2.1.3.2

hwIpsgAlarmThreshold

N/A

1.3.6.1.4.1.2011.5.25.165.2.1.3.3

hwIpsgSourceInterface

N/A

Impact on the System

If this alarm is generated, the switch may be attacked. If the attack traffic volume is heavy, the switch is busy processing attack packets, and services of authorized users are interrupted.

Possible Causes

The number of packets discarded by IPSG exceeds the alarm threshold.

Procedure
  • Collect information about configurations, trap messages, and log messages, and then contact technical support personnel.
Translation
Download
Updated: 2018-08-16

Document ID: EDOC1000015902

Views: 192245

Downloads: 1565

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next