Mac address learning based on PW reached the limit. (MacLimitVsiName=[MacLimitVsiName], MacLimitPwName=[MacLimitPwName], TrapSeverity=[TrapSeverity], TrapProbableCause=[TrapProbableCause], TrapEventType=[TrapEventType], MacDynAddressLearnNum=[MacDynAddressLearnNum], MacLimitMaxMac=[MacLimitMaxMac])
PW MAC limit and its alarm function are enabled. An alarm is generated when the number of dynamically learned MAC addresses reaches the specified upper limit.
In VS mode, this trap is supported only by the admin VS.
Trap Attribute | Description |
---|---|
Alarm or Event |
Alarm |
Trap Severity |
Warning |
Mnemonic Code |
hwPwMacLimitNumRaisingThreshold |
Trap OID |
1.3.6.1.4.1.2011.5.25.42.2.1.7.7 |
MIB |
HUAWEI-L2MAM-MIB |
Alarm ID |
0x09340001 |
Alarm Name |
hwPwMacLimitNumRaisingThreshold |
Alarm Type |
qualityOfServiceAlarm |
Raise or Clear |
Raise |
Match trap |
L2VPN_1.3.6.1.4.1.2011.5.25.42.2.1.7.8 hwPwMacLimitNumFallingThreshold |
Parameter | Description |
---|---|
MacLimitVsiName |
Vsi Name. |
MacLimitPwName |
Pw Name. |
TrapSeverity |
Alarm Severity. |
TrapProbableCause |
Alarm Cause. |
TrapEventType |
Alarm Event Type |
MacDynAddressLearnNum |
Number of currently learned MAC addresses. |
MacLimitMaxMac |
Maximum number of MAC address limit. |
VB OID | VB Name | VB Index |
---|---|---|
1.3.6.1.4.1.2011.5.25.129.1.1 |
hwBaseTrapSeverity |
- |
1.3.6.1.4.1.2011.5.25.129.1.2 |
hwBaseTrapProbableCause |
- |
1.3.6.1.4.1.2011.5.25.129.1.3 |
hwBaseTrapEventType |
- |
1.3.6.1.4.1.2011.5.25.42.2.1.19.1.9 |
hwPwMacDynAddressLearnNum |
hwPwMacLimitVsiName hwPwMacLimitPwName |
1.3.6.1.4.1.2011.5.25.42.2.1.19.1.3 |
hwPwMacLimitMaxMac |
hwPwMacLimitVsiName hwPwMacLimitPwName |
1. If you configure the action to be taken to discard, packets will be discarded after the number of learned MAC addresses exceeds the upper limit.
2. If you configure the action to be taken to forward, packets will be forwarded after the number of learned dynamic MAC addresses exceeds the upper limit.
1.Run the mac-limit command to modify the number of MAC addresses that can be learned.
2.Collect alarm information, log information and configuration information, and then contact technical support personnel.