No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Alarm Handling

AR100, AR120, AR160, AR1200, AR2200, AR3200, and AR3600 V300R003

This document provides the trap description, attributes, parameters, impact on the system, possible causes, procedures, and references. This document provides a complete set of traps, through which intended readers are kept of the running status of the device so as to locate faults.

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
DHCP_1. hwDhcpPktRateAlarm

DHCP_1. hwDhcpPktRateAlarm


DHCP/1/RATETRAP:OID [OID] The rate of DHCP packets exceeds the speed limit. (IfIndex=[INTEGER], VlanIndex=[INTEGER], Interface=[OCTET], VlanID=[INTEGER], DiscardedNumber=[INTEGER]).

The number of discarded DHCP packets reached the threshold after the DHCP message rate exceeded the upper limit.


Alarm ID Alarm Severity Alarm Type Critical equipmentAlarm(5)


Name Meaning
OID Indicates the MIB object ID of the alarm.
IfIndex Indicates the interface index.
VlanIndex Indicates the VLAN index.
Interface Indicates the interface name.
VlanID Indicates the VLAN ID.
DiscardedNumber Indicates the number of discarded packets.

Impact on the System

The DHCP packets of which the rate exceeds the upper limit are discarded.

Possible Causes

A large number of DHCP packets were received.


  • Configure port mirroring to obtain DHCP packets received by the interface. Check whether DHCP packets are attack packets.

    • If a user connected to the interface sends a large number of DHCP packets, the DHCP packets are attack packets. The device discards the attack packets. Check the attack source based on the source address.
    • If users connected to the interface do not send a large number of DHCP packets, the DHCP packets are not attack packets. Determine whether to run the dhcp snooping check dhcp-rate rate or dhcp snooping check dhcpv6-rate rate command to adjust the upper rate limit of DHCPv4 or DHCPv6 packets or run the dhcp snooping alarm dhcp-rate threshold threshold or dhcp snooping alarm dhcpv6-rate threshold threshold command to adjust the alarm threshold of discarded DHCPv4 or DHCPv6 packets according to the actual situation and user requirements.

Related Information


Updated: 2019-03-06

Document ID: EDOC1100041475

Views: 101780

Downloads: 61

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next