The bytes of error packets reach the upper threshold. (hwIfMonitorIndex=[hwIfMonitorIndex], hwIfMonitorBadBytesErrorStatistics=[hwIfMonitorBadBytesErrorStatistics], hwIfMonitorBadBytesErrorThreshold=[hwIfMonitorBadBytesErrorThreshold], hwIfMonitorBadBytesErrorInterval=[hwIfMonitorBadBytesErrorInterval], hwIfMonitorName=[hwIfMonitorName])
The number of bytes of received error packets exceeded the alarm threshold within a specified period.
In VS mode, this trap is supported only by the admin VS.
Trap Attribute | Description |
---|---|
Alarm or Event |
Alarm |
Trap Severity |
Critical |
Mnemonic Code |
hwIfMonitorBadBytesErrorRising |
Trap OID |
1.3.6.1.4.1.2011.5.25.41.4.40 |
MIB |
HUAWEI-IF-EXT-MIB |
Alarm ID |
0x08132141 |
Alarm Name |
hwIfMonitorBadBytesErrorRising |
Alarm Type |
communicationsAlarm |
Raise or Clear |
Raise |
Match trap |
PORT_1.3.6.1.4.1.2011.5.25.41.4.41 hwIfMonitorBadBytesErrorResume |
Parameter | Description |
---|---|
hwIfMonitorIndex |
Index of physical port. |
hwIfMonitorBadBytesErrorStatistics |
Statistics about bytes of error packets. |
hwIfMonitorBadBytesErrorThreshold |
Maximum number of bytes of error packets. |
hwIfMonitorBadBytesErrorInterval |
Period within which the number of bytes of received error packets is counted. |
hwIfMonitorName |
Name of physical port. |
VB OID | VB Name | VB Index |
---|---|---|
1.3.6.1.4.1.2011.5.25.41.1.7.1.1.40 |
hwIfMonitorBadBytesErrorStatistics |
hwIfMonitorIndex |
1.3.6.1.4.1.2011.5.25.41.1.7.1.1.41 |
hwIfMonitorBadBytesErrorThreshold |
hwIfMonitorIndex |
1.3.6.1.4.1.2011.5.25.41.1.7.1.1.42 |
hwIfMonitorBadBytesErrorInterval |
hwIfMonitorIndex |
1.3.6.1.4.1.2011.5.25.41.1.7.1.1.19 |
hwIfMonitorName |
hwIfMonitorIndex |
1.When link attenuation is too high, replace the optical fiber and check whether the alarm is cleared.
2.Check the transmit optical power of the remote end in the NMS. If the transmit optical power of the remote end is abnormal, replace the LPU at the remote end, and check whether the alarm is cleared.
3.Replace the LPU at the local end for which the alarm is generated, and check whether the alarm is cleared.
4.Collect the alarm information, log information, and configuration information, and then contact technical support personnel.