No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

Alarm Handling

AR100, AR120, AR160, AR1200, AR2200, AR3200, and AR3600 V300R003

This document provides the trap description, attributes, parameters, impact on the system, possible causes, procedures, and references. This document provides a complete set of traps, through which intended readers are kept of the running status of the device so as to locate faults.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
DHCP_1.3.6.1.4.1.2011.5.25.112.2.31 hwNomatchSnpBindTblDhcpv6PktAlarm

DHCP_1.3.6.1.4.1.2011.5.25.112.2.31 hwNomatchSnpBindTblDhcpv6PktAlarm

Description

DHCP/1/DHCPV6REQUESTTRAP:OID [OID] The number of the discarded DHCPv6 request packets that do not match the binding table exceeds the threshold on the interface. (Interface=[OCTET], VlanID=[INTEGER], LastDroppedSourceMac=[OCTET], DiscardedNumber=[INTEGER])

The number of DHCPv6 Request messages that were discarded on an interface because they did not match the binding entries exceeded the threshold.

NOTE:

V300R003C10 or later versions support this alarm.

Attribute

Alarm ID Alarm Severity Alarm Type
1.3.6.1.4.1.2011.5.25.112.2.31 Critical equipmentAlarm(5)

Parameters

Name Meaning
OID Indicates the MIB object ID of the alarm.
Interface Interface name.
VlanID VLAN ID.
LastDroppedSourceMac Source MAC address of the last discarded message.
DiscardedNumber Number of discarded messages.

Impact on the System

Invalid DHCPv6 Request messages are discarded.

Possible Causes

Attacks from bogus DHCPv6 users were received.

Procedure

  1. Run the display dhcpv6 snooping user-bind command to check information about DHCPv6 snooping binding entries on the interface and determine the interface or VLAN from which the user goes online based on the source MAC address of the last discarded message.
  2. Obtain the DHCPv6 Request messages received on the interface or in the VLAN using the port mirroring method.

    • If a user connected to the interface sends a large number of DHCPv6 Request messages that do not match the binding entries, the user is an unauthorized user and the sent messages are attack messages. The device discards the attack messages. Check the attack source based on the user's IPv6 address or MAC address.
    • If users connected to the interface do not send a large number of DHCPv6 Request messages that do not match the binding entries, the messages sent by the users are not attack messages. To ensure that the users pass the check, cancel the dhcp snooping check dhcp-request enable command configuration on the interface.

Related Information

None

Translation
Download
Updated: 2019-03-06

Document ID: EDOC1100041475

Views: 75469

Downloads: 47

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next