< Home

LSPM_1.3.6.1.4.1.2011.5.25.121.2.1.67 hwMplsDynamicLabelThresholdExceed

Description

LSPM/4/LABEL_THRESHOLD_EXCEED:OID [oid] The dynamic label usage exceeds the threshold. BGP, LDP, RSVP TE, or MPLS VPN creation will be affected. ( hwMplsDynamicLabelTotalCount=[INTEGER], hwMplsDynamicLabelCurrentCount=[INTEGER], hwMplsDynamicLabelThresholdUpperLimit=[INTEGER], hwMplsDynamicLabelThresholdLowerLimit=[INTEGER])

Dynamic label usage reached the upper limit, which adversely affected the creation of BGP/LDP/RSVP-TE/MPLS VPNs.

Attribute

Alarm ID Alarm Severity Alarm Type

1.3.6.1.4.1.2011.5.25.121.2.1.67

Warning

qualityOfServiceAlarm(3)

Parameters

Name Meaning

oid

Indicates the MIB object ID of the alarm.

hwMplsDynamicLabelTotalCount

Total number of dynamic labels

hwMplsDynamicLabelCurrentCount

Number of dynamic labels used

hwMplsDynamicLabelThresholdUpperLimit

Upper limit of dynamic label usage

hwMplsDynamicLabelThresholdLowerLimit

Lower limit of dynamic label usage

Impact on the System

If dynamic label usage reaches a specific threshold, subsequent LSPs may fail to be established because all dynamic labels will be used.

Possible Causes

A great number of LSPs are established, and dynamic label usage reaches the upper limit.

Procedure

  1. Run the display mpls lsp statistics command to view statistics about LDP LSPs, RSVP-TE CR-LSPs, and BGP LSPs. Re-plan the services and delete unwanted LSPs that use dynamic labels.

    • For LDP LSPs, run the lsp-trigger command to modify a policy used by LDP to establish LSPs to reduce unwanted LSPs.
    • For RSVP LSPs, run the undo interface tunnel command to delete unwanted RSVP-TE tunnels.
    • For static LSPs, run the undo static-lsp ingress, undo static-lsp transit, and undo static-lsp static-lsp egress commands to delete unwanted static LSPs.

    Then check whether LSPM_1.3.6.1.4.1.2011.5.25.121.2.1.68 hwMplsDynamicLabelThresholdExceedClear is generated.

    • If this clear alarm is generated, go to step 3.
    • If this clear alarm is not generated, go to step 2.
  2. Collect trap, log, and configuration information, and Collect alarm information and configuration information, and then contact technical support personnel.
  3. End.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >