< Home

L2IFPPI_1.3.6.1.4.1.2011.5.25.160.3.8 hwMflpVsiAlarm

Description

L2IFPPI/4/MFLPVSIALARM: OID [OID] MAC move detected, VSI-Name=[OCTET], [OCTET].

MAC address flapping occurs in a VSI.

Attribute

Alarm ID Alarm Severity Alarm Type

1.3.6.1.4.1.2011.5.25.160.3.8

Warning

equipmentAlarm(5)

Parameters

Name Meaning

oid

Indicates the MIB object ID of the alarm.

VSI-Name

Indicates a VSI name.

OCTET

Indicates MAC address flapping information.

Impact on the System

Traffic cannot be received correctly.

Possible Causes

1:

The interfaces that form a loop are added to the same VSI.

2:

Cables are connected incorrectly.

3:

No loop prevention protocol such as STP is enabled.

4:

If protocols such as LLDP, LNP, NDP, NTDP, and LACP are enabled on blocked ports, protocol packets are forcibly transmitted through the blocked port. As a result, MAC address flapping occurs on the network connected to the blocked port.

Procedure

  1. Connect cables on the interfaces correctly and check whether the alarm persists.

    • If so, go to step 2.
    • If not, go to step 10.

  2. Check whether the two interfaces that learn the same MAC address can be added to different VSIs according to the networking.

    • If so, go to step 3.
    • If not, go to step 4.

  3. Add the two interfaces that learn the same MAC address to different VSIs. Then check whether the alarm persists.

    • If so, go to step 4.
    • If not, go to step 10.

  4. Enable a loop prevention protocol such as STP. Check whether the alarm persists.

    • If so, go to step 5.
    • If not, go to step 10.

  5. Check whether loops are caused by protocols such as LLDP, LNP, NDP, NTDP, and LACP.

    • If so, go to step 6.
    • If not, go to step 9.

  6. Check whether the packets need to be transparently transmitted.

    • If so, go to step 8.
    • If not, go to step 7.

  7. Disable the corresponding protocols on the blocked port. Then check whether the alarm persists.

    • If so, go to step 9.
    • If not, go to step 10.

  8. Apply a traffic policy that can match the destination MAC address of the protocol packets on the device where MAC address flapping occurs so that source MAC addresses of protocol packets are not learnt. Then check whether the alarm persists.

    • If so, go to step 9.
    • If not, go to step 10.

  9. Contact technical support personnel.
  10. End.

Related Information

None.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >