BFD_1.3.6.1.4.1.2011.5.25.38.3.1 hwBfdSessDown

Trap Buffer Description

Session changes to DOWN. (Index=[Index], ConfigurationName=[ConfigurationName], PeerIp=[PeerIp], BindIfIndex=[BindIfIndex], BindIfName=[BindIfName], Diagnosis=[Diagnosis], BindVrfIndex=[BindVrfIndex], BindVpnName=[BindVpnName], SessionType=[SessionType], DefaultIp=[DefaultIp], BindType=[BindType], StaticLspName=[StaticLspName], PwSecondary=[PwSecondary], NextHop=[NextHop], VcId=[VcId], VsiName=[VsiName], VsiPeerAddress=[VsiPeerAddress], DiscrAuto=[DiscrAuto], PeerIpv6=[PeerIpv6], Ipv6NextHop=[Ipv6NextHop])

The BFD session went Down.

Trap Attributes

Trap Attribute Description

Alarm or Event

Event

Trap Severity

Warning

Mnemonic Code

hwBfdSessDown

Trap OID

1.3.6.1.4.1.2011.5.25.38.3.1

MIB

HUAWEI-BFD-MIB

Alarm ID

This is an event trap and does not involve alarm ID.

Alarm Name

This is an event trap and does not involve alarm name.

Alarm Type

This is an event trap and does not involve alarm type.

Raise or Clear

This is an event trap and does not involve alarm generation or clearance.

Match trap

-

Trap Buffer Parameters

Parameter Description

Index

Indicates the index of the BFD session.

ConfigurationName

Indicates the configuration name of the BFD session.

PeerIp

Indicates the bound destination IP address.

BindIfIndex

Indicates the index of the bound interface.

BindIfName

Indicates the name of the bound interface.

Diagnosis

Indicates information about session diagnostic characters.

  • 0: No diagnostic word
  • 1: Detection time Down
  • 2: Echo detection Down
  • 3: Neighbor advertisement Down
  • 4: Forwarding plane reset
  • 5: Path Down
  • 6: Cascading path Down
  • 7: Administratively Down
  • 8: Reverse cascading path Down
  • 9: Peer administratively Down
  • 25: IP error code stop
  • 26: IP error code start
  • 27: Section error code stop
  • 28: Section error code start
  • 29: LSP error code stop
  • 30: LSP ingress error code start
  • 31: LSP transit error code start.

BindVrfIndex

Indicates the index of the bound VPN.

BindVpnName

Indicates the name of the bound VPN.

SessionType

  • 1: static, which indicates that the BFD session is statically configured.
  • 2: Dynamic, which indicates that the BFD session is dynamically triggered.
  • 3: Entire_Dynamic: indicates that a BFD session is dynamically triggered. After the function of passively creating a BFD session is enabled on the egress of the LSP, the BFD session is created.
  • 4: Static_Auto: indicates a static BFD session with automatically negotiated discriminators.

DefaultIp

Indicates the default multicast IP address.

BindType

  • 2 or 3: Peer IP address (multi-hop IP link detection).
  • 1 or 4: Interface (single-hop IP link detection).
  • 5: FEC (detection of a specified FEC link).
  • 6: TUNNELIF (detection of a specified tunnel interface link).
  • 7: OSPF (OSPF neighbor link detection).
  • 8: ISIS (ISIS neighbor link detection).
  • 9: LDP_LSP (LDP LSP detection).
  • 10: STATIC_LSP (static LSP detection).
  • 11: TE_LSP (detection of the LSP bound to a TE tunnel).
  • 12: TE_TUNNEL (TE tunnel detection).
  • 13: PW (PW link detection).
  • 14: LSP_PASSIVE (reversed LSP link detection).
  • 15: VSI_PW (VSI PW link detection).
  • 16: LDP_TUNNEL (LDP tunnel detection).
  • 17: VXLAN (VXLAN link detection).

StaticLspName

Indicates the name of the static LSP. This parameter is always displayed as "-".

PwSecondary

Secondary PW flag.

  • 1: primary PW.
  • 2: secondary PW.
  • 3: non-PW link.

NextHop

Indicates the IP address of the next hop.

VcId

Indicates the ID of the VC.

VsiName

Indicates the name of the VSI.

VsiPeerAddress

Indicates the destination address of the VSI.

DiscrAuto

Indicates the static auto-negotiation discriminator.

PeerIpv6

Indicates the bound destination IPv6 address.

Ipv6NextHop

Indicates the next-hop IPv6 address.

VB Parameters

VB OID VB Name VB Index

1.3.6.1.4.1.2011.5.25.38.2.3.1.4

hwBfdSessCfgName

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.5

hwBfdSessPeerAddr

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.6

hwBfdSessBindIfIndex

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.7

hwBfdSessBindIfName

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.18

hwBfdSessDiag

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.20

hwBfdSessVrfIndex

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.21

hwBfdSessVPNName

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.22

hwBfdSessType

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.24

hwBfdSessDefaultIp

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.26

hwBfdSessBindType

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.28

hwBfdSessStaticLspName

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.30

hwBfdSessPWSecondaryFlag

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.27

hwBfdSessNextHop

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.32

hwBfdSessVcId

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.33

hwBfdSessVsiName

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.34

hwBfdSessVsiPeerAddr

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.35

hwBfdSessDiscrAuto

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.36

hwBfdSessPeerIpv6Addr

hwBfdSessIndex

1.3.6.1.4.1.2011.5.25.38.2.3.1.38

hwBfdSessIpv6NextHop

hwBfdSessIndex

Impact on the System

After the alarm function is enabled, if a large number of sessions flap, the CPU usage is high. In normal cases, there is no impact.

Possible Causes

Cause 1: The session-bound interface goes down.

Cause 2: The peer BFD session is deleted or shut down.

Cause 3: The link went Down or was congested. Consequently, it failed to forward packets.

Procedure

1. Run the display interface command to check whether the physical status of the interface where the session resides is Up.

  • If yes, go to Step 2.
  • If no, go to Step 6.

2. Check whether the session status is automatically restored.

  • If yes, go to Step 6.
  • If no, go to Step 3.

3. Run the display bfd session all command to check whether the BFD sessions on both ends are deleted.

  • If yes, go to Step 6.
  • If no, go to Step 5.

4. Run the ping ip-address command to check whether the link detected by the BFD session fails to forward packets.

  • If yes, go to Step 6.
  • If no, go to Step 5.

5. Collect log and configuration information, and contact technical support personnel.

6. End.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
Next topic >