MAC and IP address conflict. (Conflict interface=[LogicIfName], Conflict MAC address=[ConflictMAC], Conflict IP address=[ConflictIP], Received packet's destination MAC address=[DstMAC], Received packet's destination IP address=[DstIP], Received packet's VLAN=[Vlan], Received packet's CE-VLAN=[Cevlan], Input interface=[PhyIfName])
The source IP and MAC addresses of ARP packets received by the interface were the same as those of the interface.
Trap Attribute | Description |
---|---|
Alarm or Event |
Alarm |
Trap Severity |
Critical |
Mnemonic Code |
hwEthernetARPMACIPConflict |
Trap OID |
1.3.6.1.4.1.2011.5.25.123.2.7 |
MIB |
HUAWEI-ETHARP-MIB |
Alarm ID |
0x08590002 |
Alarm Name |
hwEthernetARPMACIPConflict |
Alarm Type |
environmentalAlarm |
Raise or Clear |
Raise |
Match trap |
ARP_1.3.6.1.4.1.2011.5.25.123.2.8 hwEthernetARPMACIPConflictResolved |
Parameter | Description |
---|---|
LogicIfName |
Name of the conflict interface where the conflict is detected |
ConflictMAC |
Source MAC addresses of the received ARP packets |
ConflictIP |
Source IP addresses of the received ARP packets |
DstMAC |
Destination MAC addresses of the received ARP packets |
DstIP |
Destination IP addresses of the received ARP packets |
Vlan |
Outer vlan tag of the received ARP packets |
Cevlan |
Inner vlan tag of the received ARP packets |
PhyIfName |
Interface that receives ARP packets |
VB OID | VB Name | VB Index |
---|---|---|
1.3.6.1.4.1.2011.5.25.123.1.28.2 |
hwEthernetARPIPConflictLocalInterfaceName |
- |
1.3.6.1.4.1.2011.5.25.123.1.28.7 |
hwEthernetARPIPConflictReceiveMAC |
- |
1.3.6.1.4.1.2011.5.25.123.1.28.1 |
hwEthernetARPIPConflictIPAddress |
- |
1.3.6.1.4.1.2011.5.25.123.1.28.12 |
hwEthernetARPReceiveDstMAC |
- |
1.3.6.1.4.1.2011.5.25.123.1.28.11 |
hwEthernetARPReceiveDstIPAddr |
- |
1.3.6.1.4.1.2011.5.25.123.1.28.8 |
hwEthernetARPIPConflictReceiveVLAN |
- |
1.3.6.1.4.1.2011.5.25.123.1.28.9 |
hwEthernetARPIPConflictReceiveCEVLAN |
- |
1.3.6.1.4.1.2011.5.25.123.1.28.6 |
hwEthernetARPIPConflictReceiveInterfaceName |
- |
1. Check the network topology to determine whether there are loops on the network.
2. Remove loops and check whether the trap is cleared.
3. Collect alarm information and configuration information, and then contact technical support personnel.
4. End.