SECE/4/ARPMISS_GLOBAL_SPEEDLIMIT_ALARM: OID [oid] The global arp-miss packet speed exceed the speed-limit value configured [INTEGER].
The rate of ARP Miss messages for a device exceeds the upper limit, and the number of discarded ARP Miss messages exceeds the configured alarm threshold.
Alarm ID | Alarm Severity | Alarm Type |
---|---|---|
1.3.6.1.4.1.2011.5.25.165.2.2.2.8 |
Warning |
equipmentAlarm(5) |
Name | Meaning |
---|---|
oid |
Indicates the MIB object ID of the alarm. |
INTEGER |
Indicates the alarm threshold. |
If the alarm is generated, the rate of ARP Miss messages triggered by user traffic exceeds the upper limit. The device discards excess traffic. As a result, user traffic may be interrupted intermittently.
If a host sends a large number of IP packets with unresolvable destination IP addresses to attack a device (the device has a route to the destination IP address of a packet but has no ARP entry matching the next hop of the route), the device generates a large number of ARP Miss messages. When the rate of ARP Miss messages for the device exceeds the upper limit and the number of discarded ARP Miss messages exceeds the alarm threshold, the device generates the alarm.
Check whether a large number of packets are discarded:
If so, go to step 3.
If not, verify that the network is secure and use either of the following methods to prevent generation of this alarm:
Run the undo arp-miss anti-attack rate-limit alarm enable command to globally disable the alarm function for the ARP Miss messages discarded when the rate of ARP Miss messages exceeds the upper limit.
After the alarm function is disabled, the device will not report an alarm when the number of discarded ARP Miss messages exceeds the alarm threshold.
Run the info-center source SECE channel 4 log state off command to disable the device from sending SECE alarm information.
If the MAC address field in an ARP entry displays Incomplete, the device fails to learn this ARP entry.
Check whether the attacker is infected with viruses.
If so, you are advised to remove viruses from the user host. You can also add the address of the user to the blacklist or configure a blackhole MAC address entry to discard ARP request packets sent by the attacker.
If not, go to step 5.