OSPF_1.3.6.1.2.1.14.16.2.6 ospfIfAuthFailure

Trap Buffer Description

A packet is received on a non-virtual interface from a router whose authentication key or authentication type conflicts with the local authentication key or authentication type. (RouterId=[RouterId], IfIpAddress=[IfIpAddress], AddressLessIf=[AddressLessIf], PacketSrc=[PacketSrc], ConfigErrorType=[ConfigErrorType], PacketType=[PacketType], AreaId=[AreaId])

The authentication on the non-virtual interface failed. The possible cause is that the configuration on the non-virtual interface of the peer end conflicted with the configuration of the local end.

Trap Attributes

Trap Attribute Description

Alarm or Event

Event

Trap Severity

Warning

Mnemonic Code

OSPF_IF_AUTH_FAILURE

Trap OID

1.3.6.1.2.1.14.16.2.6

MIB

OSPF-TRAP-MIB

Alarm ID

This is an event trap and does not involve alarm ID.

Alarm Name

This is an event trap and does not involve alarm name.

Alarm Type

This is an event trap and does not involve alarm type.

Raise or Clear

This is an event trap and does not involve alarm generation or clearance.

Match trap

-

Trap Buffer Parameters

Parameter Description

RouterId

Router ID of the local device.

IfIpAddress

IP address of the non-virtual interface.

AddressLessIf

Interface index.

PacketSrc

Source IP address of packets.

ConfigErrorType

Error type.

PacketType

Packet type ID.

AreaId

OSPF area ID.

VB Parameters

VB OID VB Name VB Index

1.3.6.1.2.1.14.1.1

ospfRouterId

-

1.3.6.1.2.1.14.7.1.1

ospfIfIpAddress

ospfIfIpAddress

ospfAddressLessIf

1.3.6.1.2.1.14.7.1.2

ospfAddressLessIf

ospfIfIpAddress

ospfAddressLessIf

1.3.6.1.2.1.14.16.1.4

ospfPacketSrc

-

1.3.6.1.2.1.14.16.1.2

ospfConfigErrorType

-

1.3.6.1.2.1.14.16.1.3

ospfPacketType

-

Impact on the System

You can modify parameters on the two devices to be consistent to solve this problem. Services are not affected in most cases.

Possible Causes

The authentication mode configured on the non-virtual interface was incorrect.

Procedure

1. Run the display current-configuration command to check whether the authentication information on both ends is consistent.

  • If they are consistent, go to Step 3.
  • If they are inconsistent, go to Step 2.

2. Perform either of the following operations based on the networking condition:

  • If the configurations on both ends can be changed to be the same, go to Step 3.
  • If the configurations on both ends cannot be changed to be the same, go to Step 4.

3. If cleartext authentication is used, change the authentication passwords to be the same. If ciphertext authentication is used, reconfigure the authentication passwords on both ends as required. Then check whether the alarm is cleared.

  • If the alarm is cleared, go to Step 5.
  • If the alarm persists, go to Step 4.

4. Contact technical support.

5. End.

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >