< Home

OSPF_1.3.6.1.2.1.14.16.2.7 ospfVirtIfAuthFailure

Description

OSPF/3/VIFAUTFAIL:OID [oid]: A packet is received on a virtual interface from a router whose authentication key or authentication type conflicts with the local authentication key or authentication type. (VirtIfAreaId=[area-id], VirtIfNeighbor=[neighbor-router-id], ProcessId=[process-id], RouterId=[router-id], ConfigErrorType=[error-type], PacketType=[packet-type], InstanceName=[instance-name])

The virtual-link interface authentication failed. The possible cause was that the configuration of the virtual-link interface authentication was incorrect.

Attribute

Alarm ID Alarm Severity Alarm Type
1.3.6.1.2.1.14.16.2.7 Minor environmentalAlarm (6)

Parameters

Name Meaning

oid

Indicates the MIB object ID of the alarm.

VirtIfAreaId

Indicates the area ID.

VirtIfNeighbor

Indicates the router ID of the neighbor on the virtual link.

ProcessId

Indicates the process ID.

RouterId

Indicates the ID of the local switch.

ConfigErrorType

Indicates the error type.
  • 5: Auth type Mismatch
  • 6: Auth Failure

PacketType

Indicates the type of the packet.
  • 1: Hello packet
  • 2: DD packet
  • 3: Request packet
  • 4: Update packet
  • 5: Acknowledgement packet
  • 6: Update packet Retrans
  • 7: Update packet flood

InstanceName

Indicates the instance name.

Impact on the System

This trap message is generated after the virtual link interface receives a packet indicating authentication parameters are incorrectly configured.

Possible Causes

The configuration of authentication of the virtual link interface was incorrect.

Procedure

  1. Run the display current-configuration configuration ospf command to check whether the interface authentication configurations on the two ends of the virtual link are consistent.

    • If so, go to Step 3.

    • If not, go to Step 2.

  2. Perform the following operations according to the networking:

    • If it is allowed to modify the configurations on the two ends to be consistent, go to Step 3.

    • If it is not allowed to modify the configurations on the two interfaces to be consistent, go to Step 4.

  3. If the authentication is in plain text, modify the authentication password. If the authentication is in cipher text, run the following command to reconfigure the authentication on the two interfaces as required.

    vlink-peer router-id [ dead dead-interval | hello hello-interval | retransmit retransmit-interval | smart-discover | trans-delay trans-delay-interval | [ simple [ plain plain-text | [ cipher ] cipher-text ] | { md5 | hmac-md5 | hmac-sha256 } [ key-id { plain plain-text | [ cipher ] cipher-text } ] | authentication-null | keychain keychain-name ] ] *

    Check whether the trap is cleared.

    • If so, go to Step 5.

    • If not, go to Step 4.

    To ensure high security, it is recommended that the simple, md5, hmac-md5, and null authentication modes be not used.

  4. Collect alarm information and configuration information, and then contact technical support personnel.
  5. End.

Related Information

None

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >