06-Layer 3 - IP Services

HomeSupportRoutersCR16000-M SeriesDiagnose & MaintainAlarms ReferencesH3C CR16000-M Routers Alarm Reference-R838x-6W10006-Layer 3 - IP Services
03-HH3C-DHCP-SNOOP2-MIB
Title Size Download
03-HH3C-DHCP-SNOOP2-MIB 77.76 KB

HH3C-DHCP-SNOOP2-MIB

About this MIB

Use HH3C-DHCP-SNOOP2-MIB to configure DHCP snooping, retrieve DHCP snooping entries, and control DHCP snooping alarms.

MIB file name

hh3c-dhcp-snoop2.mib

Notifications

hh3cDhcpSnoop2BindTblExh

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.124.3.0.1

DHCP snooping entry resources are exhausted.

Error

Warning

1.3.6.1.4.1.25506.2.124.3.0.2 (hh3cDhcpSnoop2BindTblExhRecov)

OFF

 

Notification triggers

This notification is generated when DHCP snooping entry resources are exhausted.

System impact

The system will not generate new DHCP snooping entries until DHCP snooping entry resources become available. DHCP snooping security features might not be available for new users.

Status control

ON

CLI: Use the snmp-agent trap enable dhcp snooping binding-exhaust command.

OFF

CLI: Use the undo snmp-agent trap enable dhcp snooping binding-exhaust command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.2.2.1.1 (IfIndex)

Interface index.

ifindex

Unsigned32

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Use the display this command in interface view to view the maximum number of dynamic DHCP snooping entries that the current interface can learn:

  - If the value is too small, use the dhcp snooping max-learning-num command in interface view to increase the maximum number of dynamic DHCP snooping entries that the current interface can learn. If the notification recurs, proceed to the next step.

  - If the value is appropriate, proceed to the next step.

2.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

hh3cDhcpSnoop2BindTblExhRecov

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.124.3.0.2

DHCP snooping entry resources recover from the exhaustion condition.

Recovery

Warning

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when DHCP snooping entry resources recover from the exhaustion condition.

System impact

No negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable dhcp snooping binding-exhaust command.

OFF

CLI: Use the undo snmp-agent trap enable dhcp snooping binding-exhaust command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.2.2.1.1 (IfIndex)

Interface index.

ifindex

Unsigned32

Standard MIB values.

 

Recommended action

No action is required.

hh3cDhcpSnoop2BindTblThresh

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.124.3.0.3

The usage of DHCP snooping entry resources reaches or exceeds the alarm threshold.

Error

Warning

1.3.6.1.4.1.25506.2.124.3.0.4 (hh3cDhcpSnoop2BindTblThreshRecov)

OFF

 

Notification triggers

This notification is generated when the usage of DHCP snooping entry resources reaches or exceeds the alarm threshold.

System impact

DHCP snooping entry resources will be exhausted if the system continues to generate DHCP snooping entries. After DHCP snooping entry resources are exhausted, DHCP snooping security features might not be available for new users.

Status control

ON

CLI: Use the snmp-agent trap enable dhcp snooping binding-threshold command.

OFF

CLI: Use the undo snmp-agent trap enable dhcp snooping binding-threshold command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.2.2.1.1 (IfIndex)

Interface index.

ifindex

Unsigned32

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Use the dhcp snooping learning-num-threshold command to increase the alarm threshold on the number of dynamic DHCP snooping entries learned by the current interface.

Alternatively, use the dhcp snooping max-learning-num command to increase the maximum number of dynamic DHCP snooping entries that the current interface can learn.

2.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

hh3cDhcpSnoop2BindTblThreshRecov

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.124.3.0.4

The usage of DHCP snooping entry resources drops below the alarm threshold.

Recovery

Warning

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the usage of DHCP snooping entry resources drops below the alarm threshold.

System impact

No negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable dhcp snooping binding-threshold command.

OFF

CLI: Use the undo snmp-agent trap enable dhcp snooping binding-threshold command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.2.2.1.1 (IfIndex)

Interface index.

ifindex

Unsigned32

Standard MIB values.

 

Recommended action

No action is required.

hh3cDhcpSnoop2NomatchBindAlm

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.124.3.0.5

The number of DHCP requests dropped due to DHCP snooping entry mismatch reaches the alarm threshold.

Informational

Warning

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the number of DHCP requests dropped due to DHCP snooping entry mismatch reaches the alarm threshold.

System impact

No negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable dhcp snooping binding-mismatch command.

OFF

CLI: Use the undo snmp-agent trap enable dhcp snooping binding-mismatch command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.2.2.1.1 (IfIndex)

Interface index.

ifindex

Unsigned32

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Use the display dhcp snooping binding command in any view to view DHCP snooping entries, and then use port mirroring to obtain replicas of the DHCP requests received on the current interface or VLAN.

  - If a large number of these DHCP requests have a DHCP snooping entry mismatch, the interface is under attack and you need to locate the source of this attack.

  - If DHCP snooping entry mismatch occurs but only to a few of these DHCP requests, the interface is not under attack. In this situation, use the dhcp snooping trap binding-mismatch threshold command to set a higher alarm threshold.

2.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

hh3cDhcpSnoop2ChaddrAlm

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.124.3.0.6

The number of DHCP packets dropped due to MAC address mismatch reaches the alarm threshold.

Informational

Warning

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the number of DHCP packets dropped due to MAC address mismatch reaches the alarm threshold. A MAC address mismatch occurs when the chaddr field of a received DHCP packet is different from the source MAC address field in the frame header.

System impact

The system is probably being attacked by DHCP packets whose chaddr field was tampered with. However, this event does not interrupt other services, because DHCP snooping drops those DHCP packets.

Status control

ON

CLI: Use the snmp-agent trap enable dhcp snooping chaddr-mismatch command.

OFF

CLI: Use the undo snmp-agent trap enable dhcp snooping chaddr-mismatch command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.2.2.1.1 (IfIndex)

Interface index.

ifindex

Unsigned32

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Locate the interface for which this notification is generated, and then use port mirroring to obtain replicas of the DHCP packets received on the interface.

  - If a large number of these DHCP packets have a MAC address mismatch, the interface is under attack and you need to locate the source of this attack.

  - If MAC address mismatch occurs but only to a few of these DHCP packets, the interface is not attacked. In this situation, use the dhcp snooping trap chaddr-mismatch threshold command to set a higher alarm threshold.

2.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

hh3cDhcpSnoop2UntrustRelpyAlm

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.124.3.0.7

The number of DHCP server replies dropped on an untrusted interface reaches the alarm threshold.

Informational

Warning

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the number of DHCP server replies dropped on an untrusted interface reaches the alarm threshold.

System impact

DHCP snooping drops illegal DHCP packets.

Status control

ON

CLI: Use the snmp-agent trap enable dhcp snooping untrust-reply command.

OFF

CLI: Use the undo snmp-agent trap enable dhcp snooping untrust-reply command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.31.1.1.1.1

 (ifName)

Interface name.

ifindex

DisplayString

Standard MIB values.

1.3.6.1.4.1.25506.2.124.1.2.4

 (hh3cDhcpSnoop2TrapDropNum)

Number of DHCP server replies dropped by DHCP snooping.

N/A

Counter64

Standard MIB values.

1.3.6.1.4.1.25506.2.124.1.2.5 (hh3cDhcpSnoop2PktVlanID)

VLAN ID of the DHCP packets dropped by DHCP snooping.

N/A

Unsigned32(1..4094)

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Locate the interface for which this notification is generated, and then use port mirroring to obtain replicas of the DHCP server replies received on the interface.

2.Verify that the DHCP server address carried in each reply is legitimate.

  - If the DHCP server address in a reply is illegitimate, the reply is an attack packet, and no action is required.

  - If the DHCP server address in a reply is legitimate, execute the dhcp snooping trust command to specify the interface as a trusted interface. If the notification recurs, proceed to the next step.

3.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

hh3cDhcpSnoop2RateLimitAlm

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.124.3.0.8

The number of DHCP requests dropped due to rate limiting reaches the alarm threshold.

Informational

Warning

N/A (N/A)

OFF

 

Notification triggers

This notification is generated when the number of DHCP requests dropped due to rate limiting reaches the alarm threshold. DHCP snooping drops DHCP requests when the rate of incoming DHCP requests exceeds the limit.

System impact

DHCP snooping drops the DHCP requests that exceed the rate limit. DHCP requests from some legitimate users might be discarded.

Status control

ON

CLI: Use the snmp-agent trap enable dhcp snooping rate-limit command.

OFF

CLI: Use the undo snmp-agent trap enable dhcp snooping rate-limit command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.2.1.31.1.1.1.1

 (ifName)

Interface name.

ifindex

DisplayString

Standard MIB values.

1.3.6.1.4.1.25506.2.124.1.2.4

 (hh3cDhcpSnoop2TrapDropNum)

Number of DHCP packets dropped by DHCP snooping.

This value is recorded in the notification.

N/A

Counter64

Standard MIB values.

1.3.6.1.4.1.25506.2.124.1.2.5 (hh3cDhcpSnoop2PktVlanID)

VLAN ID of the DHCP packets dropped by DHCP snooping.

N/A

Unsigned32(1..4094)

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Locate the interface for which this notification is generated, use port mirroring to obtain replicas of the DHCP requests received on the interface, and then identify whether these DHCP requests are malicious.

  - If the interface receives a large number of DHCP requests from a user, the user might be launching an attack. In this situation, locate the source of the attack by using source address information in the received DHCP requests.

  - If no users send a large number of DHCP requests to the interface, you can determine that the DHCP requests received on the interface are all legitimate. In this situation, perform the following tasks:

Use the dhcp snooping rate-limit command in interface view to set a higher rate limit.

(Optional.) Use the dhcp snooping trap rate-limit threshold command in interface view or system view to set a higher alarm threshold.

If the notification recurs after you perform these tasks, proceed to the next step.

2.If the issue persists, collect alarm information, log messages, and configuration data, and then contact H3C Support for help.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网