ARP/4/ARP_SUPP_TRAP:OID [OID] Exceed the speed limit value configured. (Ifnet index=[INTEGER], Configured value=[COUNTER], Sampling value=[COUNTER], Speed-limit type=[OCTET], Source Ip address=[IPADDR], Destination Ip address=[IPADDR], VPN-Instance name=[OCTET]).
The trap was generated when the transmitting rate of ARP packets or ARP Miss Messages was greater than the rate limit. You can run the arp speed-limit command to set the rate limit. The default rate limit is 500 bit/s.
Alarm ID | Alarm Severity | Alarm Type |
---|---|---|
1.3.6.1.4.1.2011.5.25.123.2.1 |
Warning |
processingErrorAlarm(4) |
Name | Meaning |
---|---|
OID |
Indicates the MIB object ID of the alarm. |
Ifnet index |
Indicates the interface index. |
Configured value |
Indicates the configured rate limit. |
Sampling value |
Indicates the sampling of the number of packets received within a period. |
Speed-limit type |
Indicates the type of packets configured with timestamp suppression, for example, ARP and ARP Miss. |
Source Ip address |
Indicates source IP addresses. |
Destination Ip address |
Indicates the destination IP address. |
VPN-Instance name |
Indicates the VPN instance name. |
View the type of packets configured with timestamp suppression in trap messages.
If ARP packets are configured with timestamp suppression, some normal ARP packets are discarded. As a result, traffic cannot be forwarded normally.
If ARP Miss messages are configured with timestamp suppression, some ARP Miss messages are discarded. As a result, ARP Request messages cannot be triggered and thus traffic cannot be forwarded normally.
If this trap is cleared shortly, services will not be affected and the system will resume the normal operation.
If this trap is not cleared for a long time, the service processing capability of the system will be affected.
1:
The interval for enabling the log function and sending traps for potential attack behaviors was set to Ns. Within the period of N+1s, the number of sent ARP packets was greater than the threshold. Within the first Ns, the average number of sent ARP packets was greater than the threshold.
2:
The interval for enabling the log function and sending traps for potential attack behaviors was set to Ns. Within the period of N+1s, the number of sent ARP Miss messages was greater than the threshold. Within the first Ns, the average number of sent ARP Miss messages was greater than the threshold.