CPUDEFEND_1.3.6.1.4.1.2011.5.25.32.4.1.11.3 hwXQoSCpDefendDiscardedPacketAlarm

Trap Buffer Description

Security cpu-defend drop packets alarmed. (ChassisID=[ChassisID], SlotID=[SlotID], ObjectIndex=[ObjectIndex], DiscardedPackets=[DiscardedPackets], DiscardedThreshold=[DiscardedThreshold], ProtocolDescription=[ProtocolDescription], Reason=[ReasonDesc])

Packets sent to the CPU were discarded by the attack defense function. The number of discarded packets exceeded the alarm threshold.

In VS mode, this trap is supported only by the admin VS.

Trap Attributes

Trap Attribute Description

Alarm or Event

Alarm

Trap Severity

Warning

Mnemonic Code

hwXQoSCpDefendDiscardedPacketAlarm

Trap OID

1.3.6.1.4.1.2011.5.25.32.4.1.11.3

MIB

HUAWEI-XQoS-MIB

Alarm ID

0x0c150009

Alarm Name

hwXQoSCpDefendDiscardedPacketAlarm

Alarm Type

processingErrorAlarm

Raise or Clear

Raise

Match trap

CPUDEFEND_1.3.6.1.4.1.2011.5.25.32.4.1.11.4 hwXQoSCpDefendDiscardedPacketAlarmClear

Trap Buffer Parameters

Parameter Description

ChassisID

Indicates the chassis number.

SlotID

Indicates the slot number.

ObjectIndex

Indicates the index of service traffic. The value 159 indicates the alarm that is generated when the number of packets dropped by Total CAR exceeds the threshold. You can run the display cpu-defend car information command to query meanings of other values.

DiscardedPackets

Indicates the number of discarded packets.

DiscardedThreshold

Indicates the number of discarded packets.

ProtocolDescription

Indicates the description of protocol.

ReasonDesc

Indicates the cause of the alarm.

VB Parameters

VB OID VB Name VB Index

1.3.6.1.4.1.2011.5.25.32.4.1.6.1.1.1

hwXQoSCpDefendSlotId

hwXQoSCpDefendChassisID

hwXQoSCpDefendSlotId

hwXQoSCpDefendObjectIndex

1.3.6.1.4.1.2011.5.25.32.4.1.6.1.1.2

hwXQoSCpDefendObjectIndex

hwXQoSCpDefendChassisID

hwXQoSCpDefendSlotId

hwXQoSCpDefendObjectIndex

1.3.6.1.4.1.2011.5.25.32.4.1.6.1.1.15

hwXQoSCpDefendDiscardedPackets

hwXQoSCpDefendChassisID

hwXQoSCpDefendSlotId

hwXQoSCpDefendObjectIndex

1.3.6.1.4.1.2011.5.25.32.4.1.6.1.1.19

hwXQoSCpDefendDiscardedThreshold

hwXQoSCpDefendChassisID

hwXQoSCpDefendSlotId

hwXQoSCpDefendObjectIndex

1.3.6.1.4.1.2011.5.25.32.4.1.6.1.1.20

hwXQoSCpDefendChassisID

hwXQoSCpDefendChassisID

hwXQoSCpDefendSlotId

hwXQoSCpDefendObjectIndex

1.3.6.1.4.1.2011.5.25.32.4.1.6.1.1.21

hwXQoSCpDefendProtocolDescirption

hwXQoSCpDefendChassisID

hwXQoSCpDefendSlotId

hwXQoSCpDefendObjectIndex

Impact on the System

The bandwidth for protocol packet sending may be preempted, which may cause protocol interruption or packet loss.

Possible Causes

The number of discarded attack packets exceeded the configured alarm threshold.

Procedure

1.Run the display cpu-defend car { blacklist | index index | user-defined-flow flow-id | whitelist } statistics slot slot-id command to check the information about the line processing unite protocol CIR and CBS. Check the values of Actual CIR in NP and Actual CBS in NP.

  • If the configured protocol rate is too low to meet the requirements for service operation, run the car command to increase the rate. After 60 seconds, check whether the alarm is cleared. If the alarm is not cleared, go to Step 2.
  • If the configured protocol rate meets the requirements for service operation but the alarm is still not cleared, go to Step 2.

2.Run the display cpu-defend policy policy-number command to check the alarm configuration of Application apperceive Configuration. Check whether the protocol configurations of alarm threshold or alarm interval are reasonable.

  • If the alarm threshold is too low, run the alarm drop-rate command to increase the threshold value according to the traffic volume. Check whether the alarm is cleared. If the alarm is not cleared, go to Step 3.
  • If the alarm interval is too short, run the alarm drop-rate command to increase the interval. Check whether the alarm is cleared. If the alarm is not cleared, go to step 3.

3.Run the display attack-source-trace slot slot-id original-information command to check the Attack Source Data. Check the header information cached in the attack source tracing module.

  • If the packet source IP address or the target IP address does not fall within the service scope, configure attack defense policies to filter the traffic. For specific configurations, see "Configuration of Local Attack Defense". Check whether the alarm is cleared. If the alarm is not cleared, go to Step 4.
  • If the source IP address and the target IP address of the packet meet the service requirements but the alarm is still not cleared, go to Step 4.

4.Collect the alarm information, log information, and configuration information, and then contact technical support personnel.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
Next topic >