SECE/4/STRACK_DENY: OID [oid] Some packets are dropped because an attack is detected. (Interface=[OCTET], SourceMAC=[OCTET], SourceIP=[OCTET], InnerVlan=[INTEGER], OuterVlan=[INTEGER])
The system detected an attack source and dropped packets sent from the attack source.
Indicates the packets are not traced based on source VLAN if the values of InnerVlan and OuterVlan are 2147483647.
Indicates the packets are not traced based on source MAC if the value of SourceMAC is NA.
Indicates the packets are not traced based on source IP if the value of SourceIP is NA.
Alarm ID | Alarm Severity | Alarm Type |
---|---|---|
1.3.6.1.4.1.2011.5.25.165.2.2.1.3 |
Warning |
securityServiceOrMechanismViolation(10) |
Name | Meaning |
---|---|
OID |
Indicates the MIB object ID of the alarm. |
Interface |
Indicates the access interface of the attacker. |
SourceMAC |
Indicates the Source MAC address of packets sent from the attacker. |
SourceIP |
Indicates the Source IP address of packets sent from the attacker. |
InnerVlan |
Indicates the inner VLAN ID of packets sent from the attacker. NOTE:
The value of inner VLAN ID 2147483647 indicates the vlan does not exist. |
OuterVlan |
Indicates the outer VLAN ID of packets sent from the attacker. NOTE:
The value of outer VLAN ID 2147483647 indicates the vlan does not exist. |
The device detected an attack to the CPU and dropped packets sent from the attack source to the CPU.
A user sent a large number of packets to the user, and the number of packets exceeded the threshold for identifying an attack.