< Home

SECE_1.3.6.1.4.1.2011.5.25.165.2.2.3.2 hwIPSGVlanDropALarm

Description

SECE/4/IPSG_VLANDROP_ALARM:OID [oid] The packet dropped by IPSG exceeds the alarm threshold. (DroppedNum=[INTEGER], Threshold=[INTEGER], VLAN=[INTEGER], PacketInfo=[OCTET])

The number of packets in a VLAN discarded by IPSG exceeded the alarm threshold.

Attribute

Alarm ID Alarm Severity Alarm Type

1.3.6.1.4.1.2011.5.25.165.2.2.3.2

Warning

equipmentAlarm(5)

Parameters

Name Meaning

OID

Indicates the MIB object ID of the alarm.

DroppedNum

Indicates the number of discarded packets.

Threshold

Indicates the alarm threshold.

VLAN

Indicates the VLAN ID of discarded packets.

PacketInfo

Indicates the source interface, source MAC address, and source IP address of packets.

Impact on the System

If this alarm is generated, the device may be attacked. If the attack traffic volume is heavy, the device is busy processing attack packets. As a result, services of authorized users are interrupted.

Possible Causes

The number of packets discarded by IPSG exceeded the alarm threshold. This threshold can be configured using the ip source check user-bind alarm threshold command. The default alarm threshold is 100.

Procedure

  1. Find the VLAN where attacks occur according to VLAN in the alarm message.
  2. Run the display dhcp snooping user-bind command to check whether users who are not in the DHCP snooping binding table range are connected.
  3. If new users are connected, run related DHCP snooping commands to generate the DHCP snooping binding table.

Related Information

None

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >