No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Alarm Handling

S600-E V200R010C00

This document provides the explanations, causes, and recommended actions of alarms on the product.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
L2IFPPI_1.3.6.1.4.1.2011.5.25.315.3.2 hwPortVlanSecureMacAlarm

L2IFPPI_1.3.6.1.4.1.2011.5.25.315.3.2 hwPortVlanSecureMacAlarm

Description

L2IFPPI/4/PORTSEC_ACTION_HAVEMAC_ALARM:OID [oid] Interface [INTEGER] receive insecure MAC address. (MacAddr=[OPAQUE], VLAN=[INTEGER], VsiName=[OCTET], Portindex=[INTEGER], InterfaceName=[OCTET], the port status is : [INTEGER]. (1:restrict;2:protect;3:error-down)).

On an interface where the number of learned secure MAC addresses reached the maximum value, the interface sent an alarm when receiving invalid MAC addresses.

Attribute

Alarm ID Alarm Severity Alarm Type
1.3.6.1.4.1.2011.5.25.315.3.2 Warning environmentalAlarm(6)

Parameters

Name Meaning
oid

Indicates the ID of a MIB object.

Interface

Indicates the interface index corresponding to the invalid MAC address.

MacAddr

Indicates the invalid MAC address after the limit is reached.

VLAN

Indicates the VLAN ID.

VsiName

Indicates the name of a VSI.

Portindex

Indicates the interface index corresponding to the invalid MAC address.

InterfaceName

Indicates the interface name corresponding to the invalid MAC address.

port status

Indicates the action triggered by the invalid MAC address after the limit is reached.

Impact on the System

None

Possible Causes

After the number of dynamic secure MAC addresses or sticky MAC addresses learned by an interface reached the maximum value, the interface received packets from another MAC address.

Procedure

  1. Check whether the MAC address in the alarm is valid.

    • If the MAC address is valid, go to step 2.
    • If the MAC address is invalid, go to step 3.

  2. Run the port-security max-mac-num max-number command to increase the maximum number of MAC addresses to be learned. Check whether the alarm is cleared.

    • If the alarm is cleared, no further action is required.
    • If the alarm is not cleared, contact technical support personnel.

Related Information

None

Translation
Download
Updated: 2019-04-18

Document ID: EDOC1000141873

Views: 112857

Downloads: 14

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next