BGP/2/hwRpkiSessionROAExceed_active: The number of ROAs received from the session exceeded the alarm number. (InstanceId=[InstanceId], SessionRemoteAddrType=[SessionIPAddrType], SessionRemoteAddr=[SessionIPAddr], MaxROANum=[RpkiLimitNum])
The number of ROA entries that the device received from an RPKI session exceeded the alarm upper threshold.
Parameter Name | Parameter Meaning |
---|---|
InstanceId |
Instance ID |
SessionIPAddrType |
Session address type |
SessionIPAddr |
Session address |
RpkiLimitNum |
Maximum number of ROA entries that a device is allowed to receive from an RPKI session |
The number of ROA entries that the device receives from an RPKI session exceeded the configured limit.
1. Run the display rpki session verbose command to check whether the number of ROA entries that the device receives from an RPKI session exceeds the configured limit.
2. Check whether the configured limit is too low.
3. Check logs and contact maintenance personnel of the peer device to determine whether all the data received from the peer device is necessary.
4. Ask the maintenance personnel of the peer device to delete the unnecessary ROA data and then check whether the trap is cleared. If the trap persists, go to Step 6.
5. Increase the limit on the number of ROA entries that the device is allowed to receive from an RPKI session and then check whether the trap is cleared. If the trap persists, go to Step 6.
6. Collect alarm information and configuration information, and then contact technical support personnel.