Received a [PktType] packet with a duplicate IP address [TgtIpv6Address] from the interface [TgtInterfaceName]. (ReceiveIfName=[LocInterfaceName], SourceMacAddress=[SrcMacAddress], DestinationMACAddress=[DstMacAddress], SourceAddress=[SrcIpv6Address], DestinationAddress=[DstIpv6Address], PE-VLAN=[PeVLAN], CE-VLAN=[CeVLAN], SelfMacRecv=[SelfLoop], Attempted=[DadAttempts])
This alarm occurred in the system if the IPv6 address on the interface of the local device was same with that of the peer direct device (devices on a same link).
Trap Attribute | Description |
---|---|
Alarm or Event |
Alarm |
Trap Severity |
Critical |
Mnemonic Code |
ND_DUPLICATE_IPV6ADDR |
Trap OID |
1.3.6.1.4.1.2011.5.25.332.2.7 |
MIB |
HUAWEI-ND-MIB |
Alarm ID |
0x00F10304 |
Alarm Name |
ND_DUPLICATE_IPV6ADDR |
Alarm Type |
communicationsAlarm |
Raise or Clear |
Raise |
Match trap |
Parameter | Description |
---|---|
PktType |
Indicate the packet type in the received ND message. |
TgtIpv6Address |
Indicates the IPv6 address generating the alarm. |
TgtInterfaceName |
Indicates the name of the interface receiving the alarm. |
LocInterfaceName |
Indicates the name of the local interface receiving the alarm. |
SrcMacAddress |
Indicates the source MAC address in the received ND message. |
DstMacAddress |
Indicate the destination MAC address in the received ND message. |
SrcIpv6Address |
Indicate the source IPv6 address in the received ND message. |
DstIpv6Address |
Indicates the destination IPv6 address in the received ND message. |
PeVLAN |
Indicates the outer VLAN ID carried in the received ND message. |
CeVLAN |
InIndicates the inner VLAN ID carried in the received ND message. |
SelfLoop |
Indicate the self-loop flag in the received ND message. |
DadAttempts |
Indicate the attempted times in the received message. |
VB OID | VB Name | VB Index |
---|---|---|
1.3.6.1.4.1.2011.5.25.332.1.4.1.1 |
hwNDDulicatePktType |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.2 |
hwNDDulicateTgtIPv6Addr |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.3 |
hwNDDulicateTgtIf |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.4 |
hwNDDulicateLocalIf |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.5 |
hwNDDulicateSrcMAC |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.6 |
hwNDDulicateDstMAC |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.7 |
hwNDDulicateSrcIPv6Addr |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.8 |
hwNDDulicateDstIPv6Addr |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.9 |
hwNDDulicatePeVLAN |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.10 |
hwNDDulicateCeVLAN |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.11 |
hwNDDulicateSelfLoop |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.3.6.1.4.1.2011.5.25.332.1.4.1.12 |
hwNDDulicateDadAttempts |
hwNDDulicatePktType hwNDDulicateTgtIPv6Addr hwNDDulicateTgtIf |
1.According to network planning and service deployment, query the peer directly-connected device based on the MAC address in the alarm. Then, run the display this ipv6 interface command to query the IPv6 address of the interface.
2.According to network planning and service deployment, modify the IPv6 address of the local interface and check whether the alarm is cleared.
3.According to network planning and service deployment, check whether the IPv6 address of the local interface can be modified.
4.If the conflicting IPv6 address of the local interface is still required, run the undo shutdown command to change the administrative status of the local interface from Down to Up. Alternatively, run the undo ipv6 address command to delete the IPv6 address and then the ipv6 address command to add this address again. Trigger DAD and check whether an IPv6 address conflict exists.
5.Collect alarm information and configuration information, and then contact technical support personnel.