No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Alarm Handling

AR100, AR120, AR160, AR1200, AR2200, AR3200, and AR3600 V300R003

This document provides the trap description, attributes, parameters, impact on the system, possible causes, procedures, and references. This document provides a complete set of traps, through which intended readers are kept of the running status of the device so as to locate faults.

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
DHCP_1. hwNomatchSnpBindTblDhcpPktAlarm

DHCP_1. hwNomatchSnpBindTblDhcpPktAlarm


DHCP/1/REQUESTTRAP:OID [OID] The number of the discarded DHCP request packets that do not match the binding table exceeds the threshold on the interface. (IfIndex=[INTEGER], VlanIndex=[INTEGER], Interface=[OCTET], VlanID=[INTEGER], DiscardedNumber=[INTEGER])

The number of DHCP Request packets discarded on the interface because they do not match the binding table exceeded the threshold.


Alarm ID Alarm Severity Alarm Type Critical equipmentAlarm(5)


Name Meaning
OID Indicates the MIB object ID of the alarm.
IfIndex Indicates the interface index.
VlanIndex Indicates the VLAN index.
Interface Indicates the interface name.
VlanID Indicates the VLAN ID.
DiscardedNumber Indicates the number of discarded packets.

Impact on the System

Invalid DHCP packets are discarded.

Possible Causes

DHCP attacks occurred.


  1. Run the display dhcp snooping user-bind command to check DHCP snooping binding entries on the interface to determine users' IP addresses and MAC addresses.
  2. Configure port mirroring to obtain DHCP packets received by the interface. Check users' IP addresses and MAC addresses in DHCP Request packets that do not match the binding table.

    • If a user connected to the interface sends a large number of DHCP Request packets that do not match the binding table, the user is an unauthorized user and the DHCP Request packets are attack packets. The device discards the attack packets. Check the attack source based on the user's IP address or MAC address.
    • If users connected to the interface do not send a large number of DHCP Request packets that do not match the binding table, DHCP packets sent by the users are not attack packets. To ensure that the users pass the check, cancel the dhcp snooping check dhcp-request enable command configuration on the interface.

Related Information


Updated: 2019-03-06

Document ID: EDOC1100041475

Views: 107478

Downloads: 68

Average rating:
This Document Applies to these Products

Related Version

Related Documents

Previous Next