SECE_1.3.6.1.4.1.2011.5.25.165.2.2.3.1 hwIPSGDropALarm
Description
SECE/4/IPSG_DROP_ALARM:OID [oid] The packet number dropped by IPSG reaches [INTEGER1], exceed the alarm threshold [INTEGER2], interface [OCTET].
The number of packets discarded by IPSG exceeded the alarm threshold.
Attribute
Alarm ID | Alarm Severity | Alarm Type |
---|---|---|
1.3.6.1.4.1.2011.5.25.165.2.2.3.1 | Warning | equipmentAlarm(5) |
Parameters
Name | Meaning |
---|---|
oid | Indicates the ID of the MIB object. |
INTEGER1 | Indicates the number of discarded packets. |
INTEGER2 | Indicates the alarm threshold. |
OCTET | Indicates the source interface, VLAN, source MAC address, and source IP address of packets. |
Impact on the System
If this alarm is generated, the device may be attacked. If the attack traffic volume is heavy, the device is busy processing attack packets. As a result, services of authorized users are interrupted.
Procedure
- Find the interface where attacks occur according to the value of Interface in the alarm message.
- Check whether users who are not in the DHCP snooping binding table range are connected.
- If new users are connected, run related DHCP snooping commands to generate the DHCP snooping binding table.