No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Alarm Handling

S600-E V200R010C00

This document provides the explanations, causes, and recommended actions of alarms on the product.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
MSTP_1.3.6.1.4.1.2011.5.25.42.4.2.15 hwMstpiTcGuarded

MSTP_1.3.6.1.4.1.2011.5.25.42.4.2.15 hwMstpiTcGuarded

Description

MSTP/4/TCGUARD:OID [OID] The instance received TC message exceeded the threshold will be deferred to deal with at the end of TC protection time. (InstanceID=[INTEGER])

After the TC protection was enabled on the device that was enabled with MSTP, the TC packets, which were received after the number of TC packets received in a specified period had exceeded the threshold, were processed after the TC protection time expired.

Attribute

Alarm ID Alarm Severity Alarm Type
1.3.6.1.4.1.2011.5.25.42.4.2.15 Warning communicationsAlarm(2)

Parameters

Name Meaning

oid

Indicates the MIB object ID of the alarm.

InstanceID

Indicates the instance ID.

Impact on the System

If the number of TC packets exceeds the threshold, MAC entries and ARP entries will not be deleted immediately, and network topology will not be changed immediately, either.

Possible Causes

The TC packets, which were received after the number of TC packets received in a specified period had exceeded the threshold, were processed after the TC protection time expired.

Procedure

  1. Check whether the network topology flaps.

    • If so, go to Step 3.

    • If not, go to Step 2.

  2. Run the display stp [ instance instance-id ] [ interface interface-type interface-number | slot slot-id ] [ brief ] command to check whether the number of TC BPDUs exceeds the set threshold on the interface.

    • If the alarm is cleared, go to Step 4.

    • If the alarm is not cleared, go to Step 7.

  3. Locate the cause of the network topology flapping and rectify the fault. Then, check whether the alarm is cleared.

    • If the alarm is cleared, go to Step 8.

    • If the alarm is not cleared, go to Step 2.

  4. Run the stp tc-protection threshold threshold command in the interface view to re-set the maximum number of TC BPDUs that the device can process. Then, check whether the alarm is cleared.

    • If the alarm is cleared, go to Step 8.

    • If the alarm is not cleared, go to Step 5.

  5. Check whether malicious attacks exist.

    • If so, go to Step 6.

    • If not, go to Step 7.

  6. Locate the attack source and remove the attack. Then, check whether the alarm is cleared.

    • If the alarm is cleared, go to Step 8.

    • If the alarm is not cleared, go to Step 7.

  7. Collect alarm information and configuration information, and then contact technical support personnel.
  8. End.

Related Information

None.

Translation
Download
Updated: 2019-09-24

Document ID: EDOC1000141873

Views: 155915

Downloads: 15

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next