< Home

SECE_1.3.6.1.4.1.2011.5.25.165.2.2.3.1 hwIPSGDropALarm

Description

SECE/4/IPSG_DROP_ALARM: OID [oid] The packet number dropped by IPSG reaches [INTEGER1], exceed the alarm threshold [INTEGER2], interface [OCTET].

The number of packets in a interface discarded by IPSG exceeded the alarm threshold.

Attribute

Alarm ID Alarm Severity Alarm Type

1.3.6.1.4.1.2011.5.25.165.2.2.3.1

Warning

equipmentAlarm(5)

Parameters

Name Meaning

oid

Indicates the MIB object ID of the alarm.

INTEGER1

Indicates the number of discarded packets.

INTEGER2

Indicates the alarm threshold.

OCTET

Indicates the source interface, VLAN, source MAC address, and source IP address of packets.

Impact on the System

If this alarm is generated, the device may be attacked. If the attack traffic volume is heavy, the device is busy processing attack packets. As a result, services of authorized users are interrupted.

Possible Causes

The number of packets discarded by IPSG exceeded the alarm threshold. This threshold can be configured using the ip source check user-bind alarm threshold command. The default alarm threshold is 100.

Procedure

  1. Find the interface where attacks occur according to Interface in the alarm message.
  2. Check whether users who are not in the DHCP snooping binding table range are connected.
  3. If new users are connected, run related DHCP snooping commands to generate the DHCP snooping binding table.

Related Information

None

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >