With the TC protection enabled, if TC BPDUs were received after the number of TC BPDUs received by an instance exceeded the threshold, these TC BPDUs were processed after the TC protection time expires. (InstanceID=[InstanceID], bridgePriority=[bridgePriority])
Specify that the instance received TC message exceeded the threshold when TC protection is enabled
Trap Attribute | Description |
---|---|
Alarm or Event |
Event |
Trap Severity |
Warning |
Mnemonic Code |
TC_GUARDED |
Trap OID |
1.3.6.1.4.1.2011.5.25.42.4.2.15 |
MIB |
HUAWEI-MSTP-MIB |
Alarm ID |
This is an event trap and does not involve alarm ID. |
Alarm Name |
This is an event trap and does not involve alarm name. |
Alarm Type |
This is an event trap and does not involve alarm type. |
Raise or Clear |
This is an event trap and does not involve alarm generation or clearance. |
Match trap |
- |
Parameter | Description |
---|---|
InstanceID |
Indicates the instance ID. |
bridgePriority |
Indicates the bridge priority. |
VB OID | VB Name | VB Index |
---|---|---|
1.3.6.1.4.1.2011.5.25.42.4.1.19.1.3 |
hwMstpiBridgePriority |
hwMstpInstanceID |
1. Check whether the network topology flapping occurs.
2. Run the display stp command to check whether the number of TC BPDUs exceeds the set threshold on the interface.
3. Locate the cause of the network topology flapping and rectify the fault. Then, check whether the alarm is cleared. If the alarm persists, go to Step 2.
4. Run the stp tc-protection threshold threshold command in the system view to reset the maximum number of TC BPDUs that the device can process. Then, check whether the alarm is cleared. If the alarm persists, go to Step 5.
5. Check whether the malicious attack exists.
6. Locate the attack source and remove the attack. Then, check whether the alarm is cleared. If the alarm persists, go to Step 7.
7. Collect alarm information and configuration information, and then contact technical support personnel.