This bridge changed to be the root bridge.
Specify that the switch is selected to be the root bridge after topology calculation
Trap Attribute | Description |
---|---|
Alarm or Event |
Event |
Trap Severity |
Critical |
Mnemonic Code |
NEW_ROOT |
Trap OID |
1.3.6.1.2.1.17.0.1 |
MIB |
BRIDGE-MIB |
Alarm ID |
This is an event trap and does not involve alarm ID. |
Alarm Name |
This is an event trap and does not involve alarm name. |
Alarm Type |
This is an event trap and does not involve alarm type. |
Raise or Clear |
This is an event trap and does not involve alarm generation or clearance. |
Match trap |
- |
None
None
1. Run the display stp command to check whether the priority of the local bridge is the lowest on the network.
2. Check whether the local bridge is specified as the root bridge in the Layer 2 network topology.
3. Run the stp [ instance instance-id ] priority priority command to reset the priority of the local bridge as required. Alternatively, run the undo stp [ instance instance-id ] priority command to restore the default priority of the local bridge.
1. Run the display stp command to check whether the priority of the local bridge is the lowest on the network.
2. Check whether the local bridge is specified as the root bridge in the Layer 2 network topology.
3. Run the stp [ instance instance-id ] priority priority command in the system view to reset the priority of the local bridge as required. Alternatively, run the undo stp [ instance instance-id ] priority command to restore the default priority of the local bridge.
1. Rectify the fault in the original network topology. Then, check whether the alarm is cleared.
2. Collect alarm information and configuration information, and then contact technical support personnel.
1. Run the stp [ instance instance-id ] priority priority command or the stp [ instance instance-id ] root primary command on the original root bridge to re-specify the original root bridge as the root bridge. Then, check whether the alarm is cleared. If the alarm persists, go to Step 2.
2. Collect alarm information and configuration information, and then contact technical support personnel.