No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Log Reference

CloudEngine 8800, 7800, 6800, and 5800 V200R005C00

This document provides the explanations, causes, and recommended actions of logs on the product.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
BGP/2/bgpBackwardTransition_active

BGP/2/bgpBackwardTransition_active

Message

BGP/2/bgpBackwardTransition_active: The BGP FSM moves from a higher numbered state to a lower numbered state. (BgpPeerRemoteAddr=[BgpPeerRemoteAddr], BgpPeerLastError=[BgpPeerLastError], BgpPeerState=[BgpPeerState], LocalIfName=[LocalIfName], Reason=[Reason])

Description

The BGP FSM moved from a higher numbered state, namely, Openconfirm or Established, to a lower numbered state.

Parameters

Parameter Name Parameter Meaning

BgpPeerRemoteAddr

Peer address

BgpPeerLastError

Value of the Error Code field in the Notification packet generated when the peer relationship is interrupted last time

BgpPeerState

Status of the BGP peer relationship
  • idle(1): indicates that BGP denies any connection request. This is the initial status of BGP.
  • connect(2): indicates that BGP is waiting for the establishment of the TCP connection before performing further actions.
  • active(3): indicates that BGP tries to establish a TCP connection. This is the intermediate status of BGP.
  • opensent(4): indicates that BGP is waiting for an Open packet from the peer.
  • openconfirm(5): indicates BGP waits for a Notification packet or a Keepalive packet.
  • established(6): indicates that BGP peers can exchange Update, Notification, and Keepalive packets.

LocalIfName

Local interface name

Reason

Reason why the peer relationship is interrupted

Possible Causes

Cause 1: Configuration lead peer down.

Cause 2: Receive notification.

Cause 3: Receive error packet.

Cause 4: Hold timer expire.

Cause 5: Remote peer not reachable.

Cause 6: Direct connect-interface down.

Cause 7: Route limit.

Procedure

  • Cause 1: Configuration lead peer down.
    1. Check whether the BGP peer relationship is interrupted because of the improper configurations of the local device.

      • If the configurations of the local device are improper, go to Step 2.
      • If the configurations of the local device are proper, go to Step 3.

    2. Delete the configurations that cause the interruption of the peer relationship.
    3. Check whether the BGP connection is reset. If the BGP connection is reset, wait for a while and then check whether the BGP connection is re-established.
    4. Collect the alarm information, log information, and configuration information, and then contact technical support personnel technical support personnel.
  • Cause 2: Receive notification.
    1. Run the display bgp peer ip-address log-info command to check the Notification packet sent by the local device when the BGP peer relationship is interrupted.

      • If the value of the Error Code field in the Notification packet is 4, no Keepalive packet is received after the BGP hold timer expires. Then, go to Step 3.
      • If the value of the Error Code field in the Notification packet is 5, the BGP FSM is incorrect. Then, go to Step 17.
      • If the value of the Error Code field in the Notification packet is 6, the local device initiatively closes the BGP connection. Then, go to Step 2.

    2. Run the display bgp peer ip-address log-info command to check whether the Notification packet is sent by the device that generates the alarm.

      • If the Notification packet is sent by the device that generates the alarm, go to Step 3.
      • If the Notification packet is not sent by the device that generates the alarm, go to Step 4.

    3. Run the ping command to check whether the local device can successfully ping its peer.

      • If the local device pings its peer successfully, go to Step 4.
      • If the local device fails to ping its peer, go to Step 5.

    4. Run the display cpu command to check whether the CPU usage is too high.

      • If the CPU usage is too high, go to Step 17.
      • If the CPU usage is within the normal range, go to Step 6.

    5. Run the display ip routing-table command to check whether the route from the local device to its peer exists in the routing table.

      • If the route from the local device to its peer exists in the routing table, go to Step 7.
      • If the route from the local device to its peer does exist in the routing table, go to Step 8.

    6. Run the display acl command to check whether the device is configured with an ACL used to disable TCP port 179.

      • If the device is configured with such an ACL, delete the ACL.
      • If the device is not configured with such an ACL, go to Step 9.

    7. Run the display interface command to check whether the outbound interface of the route is Up.

      • If the outbound interface of the route is Up, go to Step 17.
      • If the outbound interface of the route is not Up, go to Step 10.

    8. Check the configuration of the local device and the origin of the route from the local device to its peer.

      • If the route is imported from OSPF, go to Step 11.
      • If the route is imported from IS-IS, go to Step 12.

    9. View the BGP configuration of the local device to check whether a loopback interface is used to establish the BGP connection.

      • If a loopback interface is used to establish the BGP connection, go to Step 13.
      • If no loopback interface is used to establish the BGP connection, go to Step 14.

    10. Check whether the shutdown command is run on the directly connected interface.

      • If the shutdown command is run on the interface, run the undo shutdown command is run on the interface. If the alarm is not cleared, go to Step 13.
      • If the shutdown command is not run on the interface. go to Step 17.

    11. Run the display ospf peercommand to check whether the OSPF peer relationship is established.

      • If the OSPF peer relationship is established, go to Step 17.
      • If no OSPF peer relationship is established, see the precessing steps in OSPF_1.3.6.1.2.1.14.16.2.2 ospfNbrStateChange.

    12. Run the display isis peer command to check whether the IS-IS peer relationship is established.

      • If the IS-IS peer relationship is established, go to Step 17.
      • If no IS-IS peer relationship is established, see the precessing steps in ISIS_1.3.6.1.3.37.2.0.17 isisAdjacencyChange.

    13. Check whether the source address used for initiating the BGP connection is specified.

      • If the source address is specified, go to Step 14.
      • If no source address is specified, run the peer connect-interface command to configure a source address used for initiating the BGP connection.

    14. If the BGP peer relationship is a multi-hop EBGP peer relationship, check whether the peer ebgp-max-hop command is run.

      • If the peer ebgp-max-hop command is run, go to Step 15.
      • If the peer ebgp-max-hop command is not run, run the peer ebgp-max-hop command.

    15. If the peer valid-ttl-hops hops command is run, check whether the TTL of the packet received from the remote end is within the range [255-hops+1, 255].

      • If the TTL of the packet is within the range, go to Step 14.
      • If the TTL of the packet is beyond the range, run the peer valid-ttl-hops hops command to ensure that the TTL of the packet sent to the remote peer is within the range.

    16. Contact the maintenance engineer responsible for the peer device to check whether BGP is reset on the peer device, whether the peer enable command is run in the view of another address family view on the local device, and whether BGP connection parameters are set. If any of the operations is performed, wait for a period of time, and then check whether the alarm is cleared.
    17. Collect the alarm information, log information, and configuration information, and then contact technical support personnel technical support personnel.
  • Cause 3: Receive error packet.
    1. Run the display bgp peer ip-address log-info command to check the Notification packet sent by the local device when the BGP peer relationship is interrupted.

      • If the value of the Error Code field in the Notification packet is 1, a packet with an error header has been received.
      • If the value of the Error Code field in the Notification packet is 2, an error Open packet has been received.
      • If the value of the Error Code field in the Notification packet is 3, an error Update packet has been received.

    2. Collect the alarm information, log information, and configuration information, and then contact technical support personnel technical support personnel.
  • Cause 4: Hold timer expire.
    1. Run the ping command to check whether the local device can successfully ping its peer.

      • If the local device pings its peer successfully, go to Step 2.
      • If the local device fails to ping its peer, go to Step 3.

    2. Run the display cpu command to check whether the CPU usage is too high.

      • If the CPU usage is too high, go to Step 15.
      • If the CPU usage is within the normal range, go to Step 4.

    3. Run the display ip routing-table command to check whether the route from the local device to its peer exists in the routing table.

      • If the route from the local device to its peer exists in the routing table, go to Step 5.
      • If the route from the local device to its peer does not exist in the routing table, go to Step 6.

    4. Run the display acl command to check whether the device is configured with an ACL used to disable TCP port 179.

      • If the device is configured with such an ACL, delete the ACL.
      • If the device is not configured with such an ACL, go to Step 7.

    5. Run the display interface command to check whether the outbound interface of the route is Up.

      • If the outbound interface of the route is Up, go to Step 15.
      • If the outbound interface of the route is not Up, go to Step 8.

    6. Check the configuration of the local device and the origin of the route from the local device to its peer.

      • If the route is imported from OSPF, go to Step 9.
      • If the route is imported from IS-IS, go to Step 10.

    7. Check the BGP configuration of the local device to check whether a loopback interface is used to establish the BGP connection.

      • If a loopback interface is used to establish the BGP connection, go to Step 11.
      • If no loopback interface is used to establish the BGP connection, go to Step 12.

    8. Check whether the shutdown command is run on the directly connected interface.

      • If the shutdown command is run on the interface, run the undo shutdown command is run on the interface. If the alarm is not cleared, go to Step 11.
      • If the shutdown command is not run on the interface, go to Step 15.

    9. Run the display ospf peercommand to check whether the OSPF peer relationship is established.

      • If the OSPF peer relationship is established, go to Step 15.
      • If no OSPF peer relationship is established, see the precessing steps in OSPF_1.3.6.1.2.1.14.16.2.2 ospfNbrStateChange.

    10. Run the display isis peer command to check whether the IS-IS peer relationship is established.

      • If the IS-IS peer relationship is established, go to Step 15.
      • If no IS-IS peer relationship is established, see the precessing steps in ISIS_1.3.6.1.3.37.2.0.17 isisAdjacencyChange.

    11. Check whether the source address used for initiating the BGP connection is specified.

      • If the source address is specified, go to Step 12.
      • If no source address is specified, run the peer connect-interface command to configure a source address used for initiating the BGP connection.

    12. If the BGP peer relationship is a multi-hop EBGP peer relationship, check whether the peer ebgp-max-hop command is run.

      • If the peer ebgp-max-hop command is run, go to Step 13.
      • If the peer ebgp-max-hop command is not run, run the peer ebgp-max-hop command.

    13. If the peer valid-ttl-hops hops command is run, check whether the TTL of the packet received from the remote end is within the range [255-hops+1, 255].

      • If the TTL of the packet is within the range, go to Step 14.
      • If the TTL of the packet is beyond the range, run the peer valid-ttl-hops hops command to ensure that the TTL of the packet sent to the remote peer is within the range.

    14. Contact the maintenance engineer responsible for the peer device to check whether BGP is reset on the peer device, whether the peer enable command is run in the view of another address family view on the local device, and whether BGP connection parameters are set. If any of the operations is performed, wait for a period of time, and then check whether the alarm is cleared.
    15. Collect the alarm information, log information, and configuration information, and then contact technical support personnel technical support personnel.
  • Cause 5: Remote peer not reachable.
    1. Run the ping command to check whether the local device can successfully ping its peer.

      • If the local device pings its peer successfully, go to Step 2.
      • If the local device fails to ping its peer, go to Step 3.

    2. Run the display cpu command to check whether the CPU usage is too high.

      • If the CPU usage is too high, go to Step 15.
      • If the CPU usage is within the normal range, go to Step 4.

    3. Run the display ip routing-table command to check whether the route from the local device to its peer exists in the routing table.

      • If the route from the local device to its peer exists in the routing table, go to Step 5.
      • If the route from the local device to its peer does not exist in the routing table, go to Step 6.

    4. Run the display acl command to check whether the device is configured with an ACL used to disable TCP port 179.

      • If the device is configured with such an ACL, delete the ACL.
      • If the device is not configured with such an ACL, go to Step 7.

    5. Run the display interface command to check whether the outbound interface of the route is Up.

      • If the outbound interface of the route is Up, go to Step 15.
      • If the outbound interface of the route is not Up, go to Step 8.

    6. Check the configuration of the local device and the origin of the route from the local device to its peer.

      • If the route is imported from OSPF, go to Step 9.
      • If the route is imported from IS-IS, go to Step 10.

    7. Check the BGP configuration of the local device to check whether a loopback interface is used to establish the BGP connection.

      • If a loopback interface is used to establish the BGP connection, go to Step 11.
      • If no loopback interface is used to establish the BGP connection, go to Step 12.

    8. Check whether the shutdown command is run on the directly connected interface.

      • If the shutdown command is run on the interface, run the undo shutdown command is run on the interface. If the alarm is not cleared, go to Step 11.
      • If the shutdown command is not run on the interface, go to Step 15.

    9. Run the display ospf peercommand to check whether the OSPF peer relationship is established.

      • If the OSPF peer relationship is established, go to Step 15.
      • If no OSPF peer relationship is established, see the precessing steps in OSPF_1.3.6.1.2.1.14.16.2.2 ospfNbrStateChange.

    10. Run the display isis peer command to check whether the IS-IS peer relationship is established.

      • If the IS-IS peer relationship is established, go to Step 15.
      • If no IS-IS peer relationship is established, see the precessing steps in ISIS_1.3.6.1.3.37.2.0.17 isisAdjacencyChange.

    11. Check whether the source address used for initiating the BGP connection is specified.

      • If the source address is specified, go to Step 12.
      • If no source address is specified, run the peer connect-interface command to configure a source address used for initiating the BGP connection.

    12. If the BGP peer relationship is a multi-hop EBGP peer relationship, check whether the peer ebgp-max-hop command is run.

      • If the peer ebgp-max-hop command is run, go to Step 13.
      • If the peer ebgp-max-hop command is not run, run the peer ebgp-max-hop command.

    13. If the peer valid-ttl-hops hops command is run, check whether the TTL of the packet received from the remote end is within the range [255-hops+1, 255].

      • If the TTL of the packet is within the range, go to Step 14.
      • If the TTL of the packet is beyond the range, run the peer valid-ttl-hops hops command to ensure that the TTL of the packet sent to the remote peer is within the range.

    14. Contact the maintenance engineer responsible for the peer device to check whether BGP is reset on the peer device, whether the peer enable command is run in the view of another address family view on the local device, and whether BGP connection parameters are set. If any of the operations is performed, wait for a period of time, and then check whether the alarm is cleared.
    15. Collect the alarm information, log information, and configuration information, and then contact technical support personnel technical support personnel.
  • Cause 6: Direct connect-interface down.
    1. Check whether the shutdown command is run on the directly connected interface.
    2. Collect the alarm information, log information, and configuration information, and then contact technical support personnel technical support personnel.
  • Cause 7: Route limit.
    1. Check whether the peer route-limit command is run and whether the number of routes exceeds the upper threshold.

      • If the command is run and the number of received routes exceeds the upper threshold, go to Step 2.
      • If the command is not run or the command is run but the number of received routes does not exceed the upper threshold, go to Step 3.

    2. Check whether the peer route-limit command is necessary. If the command is necessary, reduce routes to ensure that the number of routes is smaller than the upper threshold.
    3. Collect the alarm information, log information, and configuration information, and then contact technical support personnel technical support personnel.
Translation
Download
Updated: 2019-04-20

Document ID: EDOC1100039602

Views: 115121

Downloads: 85

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next