< Home

MSTP_1.3.6.1.4.1.2011.5.25.42.4.2.15 hwMstpiTcGuarded

Description

MSTP/4/TCGUARD:OID [OID] The instance received TC message exceeded the threshold will be deferred to deal with at the end of TC protection time. (InstanceID=[INTEGER])

After the TC protection was enabled on the device that was enabled with MSTP, the TC packets, which were received after the number of TC packets received in a specified period had exceeded the threshold, were processed after the TC protection time expired.

Attribute

Alarm ID Alarm Severity Alarm Type
1.3.6.1.4.1.2011.5.25.42.4.2.15 Warning communicationsAlarm(2)

Parameters

Name Meaning

oid

Indicates the MIB object ID of the alarm.

InstanceID

Indicates the instance ID.

Impact on the System

If the number of TC packets exceeds the threshold, MAC entries and ARP entries will not be deleted immediately, and network topology will not be changed immediately, either.

Possible Causes

The TC packets, which were received after the number of TC packets received in a specified period had exceeded the threshold, were processed after the TC protection time expired.

Procedure

  1. Check whether the network topology flaps.

    • If so, go to Step 3.

    • If not, go to Step 2.

  2. Run the display stp [ process process-id ] [ instance instance-id ] [ interface interface-type interface-number | slot slot-id ] [ brief ] command to check whether the number of TC BPDUs exceeds the set threshold on the interface.

    • If the alarm is cleared, go to Step 4.

    • If the alarm is not cleared, go to Step 7.

  3. Locate the cause of the network topology flapping and rectify the fault. Then, check whether the alarm is cleared.

    • If the alarm is cleared, go to Step 8.

    • If the alarm is not cleared, go to Step 2.

  4. Run the stp tc-protection threshold threshold command in the interface view to re-set the maximum number of TC BPDUs that the device can process. Then, check whether the alarm is cleared.

    • If the alarm is cleared, go to Step 8.

    • If the alarm is not cleared, go to Step 5.

  5. Check whether malicious attacks exist.

    • If so, go to Step 6.

    • If not, go to Step 7.

  6. Locate the attack source and remove the attack. Then, check whether the alarm is cleared.

    • If the alarm is cleared, go to Step 8.

    • If the alarm is not cleared, go to Step 7.

  7. Collect alarm information and configuration information, and then contact technical support personnel.
  8. End.

Related Information

None.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >