09-Layer 3 - IP Routing

HomeSupportRoutersCR16000-F SeriesReference GuidesMIB CompanionH3C CR16000-F Routers MIB Reference-R838x-6W10009-Layer 3 - IP Routing
02-HH3C-BGP-VPN-MIB
Title Size Download
02-HH3C-BGP-VPN-MIB 224.61 KB

HH3C-BGP-VPN-MIB

About this MIB

This document contains route and packet information about peers in the address families supported by BGP (MBGP or MP-BGP).

MIB file name

hh3c-bgp-vpn.mib

Root object

iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).hh3c(25506).hh3cCommon(2).hh3cBgpVpn(202)

Tabular objects

hh3cBgpPeerAddrFamilyTable

About this table

This table contains BGP peer address family information.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table indexes are hh3cBgpPeerInstanceId, hh3cBgpPeerVpnIndex, hh3cBgpPeerAddrFamilyId, hh3cBgpPeerSubAddrFamilyId, hh3cBgpPeerType, hh3cBgpPeerIPAddr.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpPeerInstanceId (1.3.6.1.4.1.25506.2.202.1.1.1.1.1)

not-accessible

Unsigned32

Standard MIB values.

Index of the BGP instance to which the BGP peer belongs.

As per the MIB.

hh3cBgpPeerVpnIndex (1.3.6.1.4.1.25506.2.202.1.1.1.1.2)

not-accessible

Unsigned32

Standard MIB values.

VPN instance index of the BGP peer.

As per the MIB.

hh3cBgpPeerAddrFamilyId (1.3.6.1.4.1.25506.2.202.1.1.1.1.3)

not-accessible

Hh3cBgpAfi

INTEGER{ipv4(1),ipv6(2),l2vpn(25),l2vpnDraft(196),dedicated(6000)}

Address family index of the BGP peer.

As per the MIB.

hh3cBgpPeerSubAddrFamilyId (1.3.6.1.4.1.25506.2.202.1.1.1.1.4)

not-accessible

Hh3cBgpSAfi

INTEGER{unicast(1),multicast(2),mpls(4),mcastVpn(5),l2vpn(65),mdt(66),evpn(70),vpn(128),routeTarget(132),dedicated(255)}

Subsequent address family index of the BGP peer.

As per the MIB.

hh3cBgpPeerType (1.3.6.1.4.1.25506.2.202.1.1.1.1.5)

not-accessible

InetAddressType

IPv4(1)

IPv6 (2)

Address family type of the BGP peer.

As per the MIB.

hh3cBgpPeerIPAddr (1.3.6.1.4.1.25506.2.202.1.1.1.1.6)

not-accessible

InetAddress

OCTET STRING{(0,255)}

IP address of the BGP peer.

As per the MIB.

hh3cBgpPeerVpnName (1.3.6.1.4.1.25506.2.202.1.1.1.1.7)

read-only

Hh3cMplsVpnId

OCTET STRING(0..31)

VPN instance name.

As per the MIB.

 

hh3cBgpPeerTable

About this table

This table contains BGP peer information.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table indexes are hh3cBgpPeerInstanceId, hh3cBgpPeerVpnIndex, hh3cBgpPeerAddrFamilyId, hh3cBgpPeerSubAddrFamilyId, hh3cBgpPeerType, hh3cBgpPeerIPAddr.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpPeerNegotiatedVersion (1.3.6.1.4.1.25506.2.202.1.1.2.1.1)

read-only

Unsigned32

Standard MIB values.

Negotiated BGP version number.

As per the MIB.

hh3cBgpPeerRemoteAs (1.3.6.1.4.1.25506.2.202.1.1.2.1.2)

read-only

Counter32

Standard MIB values.

AS number of the BGP peer.

As per the MIB.

hh3cBgpPeerRemoteAddr (1.3.6.1.4.1.25506.2.202.1.1.2.1.3)

read-only

OCTET STRING{(0,255)}

OCTET STRING{(0,255)}

IP address of the BGP peer.

As per the MIB.

hh3cBgpPeerState (1.3.6.1.4.1.25506.2.202.1.1.2.1.4)

read-only

INTEGER

INTEGER{(idle,1),(connect,2),(active,3),(opensent,4),(openconfirm,5),(established,6)}

BGP peer state:

Idle(1)

Connect(2)

Active(3)

Opensent(4)

Openconfirm(5)

Established(6)

As per the MIB.

hh3cBgpPeerFsmEstablishedCounter (1.3.6.1.4.1.25506.2.202.1.1.2.1.5)

read-write

Unsigned32

Standard MIB values.

Counter of successful BGP peer connections.

Each time BGP connects to the BGP peer successfully, this value increases by one. You can reset the counter.

Only read-only is supported.

hh3cBgpPeerFsmEstablishedTime (1.3.6.1.4.1.25506.2.202.1.1.2.1.6)

read-only

Gauge32

Standard MIB values.

Time when BGP connected to the BGP peer successfully.

As per the MIB.

hh3cBgpPeerGRStatus (1.3.6.1.4.1.25506.2.202.1.1.2.1.7)

accessible-for-notify

INTEGER

INTEGER{(peerNotBeingHelped,1),(peerRestarting,2),(peerFinishRestart,3),(peerHelping,4)}

GR status of the BGP peer:

peerNotBeingHelped—The peer does not need any help to restart.

peerRestarting—The peer is restarting.

peerFinishRestart—The peer has finished restarting.

peerHelping—The peer helps BGP complete GR.

As per the MIB.

hh3cBgpPeerLastError

(1.3.6.1.4.1.25506.2.202.1.1.2.1.8)

read-only

OCTET STRING

Standard MIB values.

Error code and subcode for the most recent peer connection error. The first byte represents the error code and the second one represents the subcode.

If no error code exists, this field displays 0.

As per the MIB.

hh3cBgpPeerUnAvaiReason

(1.3.6.1.4.1.25506.2.202.1.1.2.1.9)

read-only

Unsigned32

Standard MIB values.

Reason why the BGP peer went down:

Unknown ErrCode/Unknown ErrSubcode(1)

ErrSubCode Unspecified(2)

Unknown ErrSubcode(3)

Connection Not Synchronized(4)

Bad Message Length(5)

Bad Message Type(6)

Unsupported Version Number(7)

Bad Peer AS(8)

Bad BGP Identifier(9)

Unsupported Optional Parameter(10)

Authentication Failure(11)

Unacceptable Hold Time(12)

Unsupported Capability(13)

Malformed Attribute List(14)

Unrecognized Well-known Attr(15)

Missing Well-known Attribute(16)

Attribute Flags Error(17)

Attribute Length Error(18)

Invalid ORIGIN Attribute(19)

AS Routing Loop(20)

Invalid NEXT_HOP Attribute(21)

Optional Attribute Error(22)

Invalid Network Field(23)

Malformed AS_PATH(24)

Receive Unexpected Message in OpenSent(25)

Receive Unexpected Message in OpenConfirm(26)

Receive Unexpected Message in Established(27)

Maximum Number of Prefixes Reached(28)

Administrative Shutdown(29)

Peer De-configured(30)

Administrative Reset(31)

Connection Rejected(32)

Other Configuration Change(33)

Connection Collision Resolution(34)

Out of Resources(35)

As per the MIB.

hh3cBgpPeerAdminStatus

(1.3.6.1.4.1.25506.2.202.1.1.2.1.10)

read-only

INTEGER

INTEGER{(stop,1),(start,2)}

BGP peer connection state. A BGP start event will be generated if you change the state from stop to start. A BGP stop event will be generated if you change the state from start to stop.

This field is used for restarting BGP peer connections.

If you do not enable identity authentication, protect the access and write operations on this object.

As per the MIB.

 

hh3cBgpPeerRouteTable

About this table

This table contains route and packet information about BGP peers.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table indexes are hh3cBgpPeerInstanceId, hh3cBgpPeerVpnIndex, hh3cBgpPeerAddrFamilyId, hh3cBgpPeerSubAddrFamilyId, hh3cBgpPeerType, hh3cBgpPeerIPAddr.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpPeerRouteRcvCount (1.3.6.1.4.1.25506.2.202.1.1.3.1.1)

read-only

Counter32

Standard MIB values.

Number of route prefixes received from BGP peers.

As per the MIB.

hh3cBgpPeerRouteActiveCount (1.3.6.1.4.1.25506.2.202.1.1.3.1.2)

read-only

Counter32

Standard MIB values.

Number of active route prefixes received from BGP peers.

As per the MIB.

hh3cBgpPeerRouteAdvCount (1.3.6.1.4.1.25506.2.202.1.1.3.1.3)

read-only

Counter32

Standard MIB values.

Number of route prefixes sent to BGP peers.

As per the MIB.

 

hh3cBgpPeerConfigTable

About this table

This table contains BGP peer configuration information.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table indexes are hh3cBgpPeerInstanceId, hh3cBgpPeerVpnIndex, hh3cBgpPeerAddrFamilyId, hh3cBgpPeerSubAddrFamilyId, hh3cBgpPeerType, and hh3cBgpPeerIPAddr.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpPeerConfigRouteLimitNum

 (1.3.6.1.4.1.25506.2.202.1.1.4.1.1)

read-only

Unsigned32

Standard MIB values.

Maximum number of routes that can be received from BGP peers.

As per the MIB.

hh3cBgpPeerConfigRouteLimitThreshold (1.3.6.1.4.1.25506.2.202.1.1.4.1.2)

read-only

Unsigned32

Unsigned32{(0,100)}

Threshold value that triggers route number limit notifications, in percentage.

As per the MIB.

 

hh3cBgpPeerStatisticTable

About this table

This table displays BGP peer statistics. Each entry records information about a BGP peer.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table indexes are hh3cBgpProcessId, hh3cBgpPeerVrfInstanceId, and hh3cBgpPeerAddr.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpProcessId (1.3.6.1.4.1.25506.2.202.1.1.5.1.1)

not-accessible

Unsigned32

Standard MIB values.

BGP process ID.

As per the MIB.

hh3cBgpPeerVrfInstanceId (1.3.6.1.4.1.25506.2.202.1.1.5.1.2)

not-accessible

Unsigned32

Standard MIB values.

VPN instance index of the BGP peer.

As per the MIB.

hh3cBgpPeerAddr (1.3.6.1.4.1.25506.2.202.1.1.5.1.3)

not-accessible

OCTET STRING

OCTET STRING{(0,255)}

IP address of the BGP peer.

As per the MIB.

hh3cBgpPeerFsmEstablishedTransitions (1.3.6.1.4.1.25506.2.202.1.1.5.1.4)

read-only

Counter32

Standard MIB values.

Number of times that the BGP peer entered the established state.

As per the MIB.

hh3cBgpPeerDownCounts (1.3.6.1.4.1.25506.2.202.1.1.5.1.5)

read-only

Counter32

Standard MIB values.

Number of times that the BGP peer entered another state from the established state.

As per the MIB.

hh3cBgpPeerInUpdateMsgs (1.3.6.1.4.1.25506.2.202.1.1.5.1.6)

read-only

Counter32

Standard MIB values.

Number of UPDATE messages received from the BGP peer.

As per the MIB.

hh3cBgpPeerOutUpdateMsgs (1.3.6.1.4.1.25506.2.202.1.1.5.1.7)

read-only

Counter32

Standard MIB values.

Number of UPDATE messages sent to the BGP peer.

As per the MIB.

hh3cBgpPeerInTotalMsgs (1.3.6.1.4.1.25506.2.202.1.1.5.1.8)

read-only

Counter32

Standard MIB values.

Number of packets received from the BGP peer.

As per the MIB.

hh3cBgpPeerOutTotalMsgs (1.3.6.1.4.1.25506.2.202.1.1.5.1.9)

read-only

Counter32

Standard MIB values.

Number of packets sent to the BGP peer.

As per the MIB.

 

hh3cBgpPeerSessionTable

About this table

This table contains BGP peer session information.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table indexes are hh3cBgpPeerSessionVrfId, hh3cBgpPeerSessionRemoteAddrType, and hh3cBgpPeerSessionRemoteAddr.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpPeerSessionVrfId (1.3.6.1.4.1.25506.2.202.1.1.6.1.1)

not-accessible

Unsigned32

Standard MIB values.

Index of the VPN instance to which the BGP peer belongs.

As per the MIB.

hh3cBgpPeerSessionRemoteAddrType (1.3.6.1.4.1.25506.2.202.1.1.6.1.2)

not-accessible

INTEGER

INTEGER{(unknown,0),(ipv4,1),(ipv6,2),(ipv4z,3),(ipv6z,4),(dns,16)}

IP address type of the BGP peer.

As per the MIB.

hh3cBgpPeerSessionRemoteAddr (1.3.6.1.4.1.25506.2.202.1.1.6.1.3)

not-accessible

OCTET STRING

OCTET STRING{(0,255)}

IP address of the BGP peer.

As per the MIB.

hh3cbgpPeerRemotePort (1.3.6.1.4.1.25506.2.202.1.1.6.1.4)

read-only

Integer32

Integer32(0..65535)

Remote port number of the peer connection.

As per the MIB.

hh3cBgpPeerSessionLocalAddrType (1.3.6.1.4.1.25506.2.202.1.1.6.1.5)

read-only

INTEGER

INTEGER{(unknown,0),(ipv4,1),(ipv6,2),(ipv4z,3),(ipv6z,4),(dns,16)}

IP address type of the local peer.

As per the MIB.

hh3cBgpPeerSessionLocalAddr (1.3.6.1.4.1.25506.2.202.1.1.6.1.6)

read-only

OCTET STRING

OCTET STRING{(0,255)}

IP address of the local peer.

As per the MIB.

hh3cbgpPeerLocalPort (1.3.6.1.4.1.25506.2.202.1.1.6.1.7)

read-only

Integer32

Integer32(0..65535)

Local port number of the peer connection.

As per the MIB.

hh3cBgpPeerSessionUnavailableType (1.3.6.1.4.1.25506.2.202.1.1.6.1.8)

read-only

INTEGER

INTEGER{(uptodown,1),(alwaysdown,2)}

Peer unavailability type:

1: Up To Down(1)

2: Always Down(2)

As per the MIB.

hh3cBgpPeerSessionLocalIfName (1.3.6.1.4.1.25506.2.202.1.1.6.1.9)

read-only

OCTET STRING

Standard MIB values.

Local interface name of the peer connection.

As per the MIB.

hh3cBgpPeerSessionReason (1.3.6.1.4.1.25506.2.202.1.1.6.1.10)

read-only

INTEGER

INTEGER{(configurationLeadPeerDown,1),(receiveNotification,2),(receiveErrorPacket,3),(holdTimerExpire,4),(remotePeerNotReachable,5),(directConnectInterfaceDown,6),(routeLimit,7),(peerIsNotUpForASpecifiedPeriodOfTime,8),(unknown,90),(alarmClear,100)}

Reason why the peer went down:

1: Configuration lead peer down(1)

2: Receive notification(2)

3: Receive error packet(3)

4: Hold timer expire(4)

5: Remote peer not reachable(5)

6: Direct connect-interface down(6)

7: Route limit(7)

8: Peer is not up for a specified long time(8)

90: unknown(90)

100: Alarm clear(100)

As per the MIB.

hh3cBgpPeerSessionVrfName (1.3.6.1.4.1.25506.2.202.1.1.6.1.11)

read-only

OCTET STRING

Standard MIB values.

VPN instance name.

As per the MIB.

 

hh3cBgpPeerMessageTable

About this table

This table contains statistics of packets sent to or received from BGP peers.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table indexes are hh3cBgpPeerInstanceId, hh3cBgpPeerVpnIndex, hh3cBgpPeerAddrFamilyId, hh3cBgpPeerSubAddrFamilyId, hh3cBgpPeerType, and hh3cBgpPeerIPAddr.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpPeerInTotalMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.1)

read-only

INTEGER

INTEGER (0..4294967295)

Number of packets received from BGP peers.

As per the MIB.

hh3cBgpPeerOutTotalMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.2)

read-only

INTEGER

INTEGER (0..4294967295)

Number of packets sent to BGP peers.

As per the MIB.

hh3cBgpPeerInOpenMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.3)

read-only

INTEGER

INTEGER (0..4294967295)

Number of OPEN messages received from BGP peers.

As per the MIB.

hh3cBgpPeerInUpdateMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.4)

read-only

INTEGER

INTEGER (0..4294967295)

Number of UPDATE messages received from BGP peers.

As per the MIB.

hh3cBgpPeerInNotificationMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.5)

accessible-for-notify

INTEGER

INTEGER (0..4294967295)

Number of messages received from BGP peers.

As per the MIB.

hh3cBgpPeerInKeepAliveMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.6)

read-only

INTEGER

INTEGER (0..4294967295)

Number of KEEPALIVE messages received from BGP peers.

As per the MIB.

hh3cBgpPeerInRouteFreshMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.7)

read-only

INTEGER

INTEGER (0..4294967295)

Number of ROUTE-REFRESH messages received from BGP peers.

As per the MIB.

hh3cBgpPeerOutOpenMsgCounter (1.3.6.1.4.1.25506.2.204.1.1.7.1.8)

read-only

INTEGER

INTEGER (0..4294967295)

Number of OPEN messages sent to BGP peers.

As per the MIB.

hh3cBgpPeerOutUpdateMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.9)

read-only

INTEGER

INTEGER (0..4294967295)

Number of UPDATE messages sent to BGP peers.

As per the MIB.

hh3cBgpPeerOutNotificationMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.10)

read-only

INTEGER

INTEGER (0..4294967295)

Number of NOTIFICATION messages sent to BGP peers.

As per the MIB.

hh3cBgpPeerOutKeepAliveMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.11)

read-only

INTEGER

INTEGER (0..4294967295)

Number of KEEPALIVE messages sent to BGP peers.

As per the MIB.

hh3cBgpPeerOutRouteFreshMsgCounter (1.3.6.1.4.1.25506.2.202.1.1.7.1.12)

read-only

INTEGER

INTEGER (0..4294967295)

Number of ROUTE-REFRESH messages sent to BGP peers.

As per the MIB.

 

hh3cBgpVpnRouteTable

About this table

This table contains BGP VPN route information.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table indexes are hh3cBgpVpnRouteType, hh3cBgpVpnInstName, and hh3cBgpVpnAddressFamily.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpVpnRouteType (1.3.6.1.4.1.25506.2.202.1.2.1.1.1)

accessible-for-notify

Unsigned32

Standard MIB values.

VPN route type.

As per the MIB.

hh3cBgpVpnInstName (1.3.6.1.4.1.25506.2.202.1.2.1.1.2)

accessible-for-notify

OCTET STRING

OCTET STRING{(0,31)}

VPN instance name.

As per the MIB.

hh3cBgpVpnAddressFamily (1.3.6.1.4.1.25506.2.202.1.2.1.1.3)

accessible-for-notify

Unsigned32

Standard MIB values.

Address family.

As per the MIB.

hh3cBgpVpnCurrRouteNum (1.3.6.1.4.1.25506.2.202.1.2.1.1.4)

read-only

Unsigned32

Standard MIB values.

Number of VPN routes.

As per the MIB.

hh3cBgpVpnThresholdValue (1.3.6.1.4.1.25506.2.202.1.2.1.1.5)

read-only

Unsigned32

Standard MIB values.

Threshold for route count notifications.

As per the MIB.

 

hh3cBgpVpnScalars

About this table

This table contains L3VPN configuration information.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table has no indexes. All address families supported in a VPN instance are added.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpConfiguredVrfs (1.3.6.1.4.1.25506.2.202.1.3.1)

read-only

INTEGER

INTEGER (0..4294967295)

Number of VPN instances.

As per the MIB.

hh3cBgpConfiguredIpv4Vrfs (1.3.6.1.4.1.25506.2.202.1.3.2)

read-only

INTEGER

INTEGER (0..4294967295)

Number of IPv4 VPN instances.

As per the MIB.

hh3cBgpConfiguredIpv6Vrfs (1.3.6.1.4.1.25506.2.202.1.3.3)

read-only

INTEGER

INTEGER (0..4294967295)

Number of IPv6 VPN instances.

As per the MIB.

hh3cBgpConfiguredIpv4FlowspecVrfs (1.3.6.1.4.1.25506.2.202.1.3.4)

read-only

INTEGER

INTEGER (0..4294967295)

Number of IPv4 flowspec VPN instances.

As per the MIB.

hh3cBgpConfiguredIpv6FlowspecVrfs (1.3.6.1.4.1.25506.2.202.1.3.5)

read-only

INTEGER

INTEGER (0..4294967295)

Number of IPv6 flowspec VPN instances.

As per the MIB.

hh3cBgpConfiguredIEvpnVrf (1.3.6.1.4.1.25506.2.202.1.3.6)

read-only

INTEGER

INTEGER (0..4294967295)

Number of EVPN instances.

As per the MIB.

 

hh3cBgpInstanceCommTable

About this table

This table contains BGP instance information.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

The table index is hh3cBgpInstanceName.

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpInstanceName (1.3.6.1.4.1.25506.2.202.2.1.1.1.1)

read-only

OCTET STRING

{(1,31)}

BGP instance name.

As per the MIB.

hh3cBgpInstanceId (1.3.6.1.4.1.25506.2.202.2.1.1.1.2)

read-only

Unsigned32

Unsigned32{(0,100)}

BGP instance ID.

As per the MIB.

 

hh3cBgpVpnRpkiSessions

About this table

This table contains RPKI session information.

Support for operations

CreateNot supported

Edit/ModifyNot supported

DeleteNot supported

ReadNot supported

Columns

Object (OID)

Object (OID)

Access

Syntax

Value range

Description

Implementation

hh3cBgpVpnRpkiSessionVrfName (1.3.6.1.4.1.25506.2.202.3.1.1)

read-only

OCTET STRING

{(1,31)}

VPN instance index of the session.

The actual access permission is accessible-for-notify.

This object is used only as a VB-bound object of the notification module.

hh3cBgpVpnRpkiSessionType (1.3.6.1.4.1.25506.2.202.3.1.2)

read-only

INTEGER

INTEGER{(unknown,0),(ipv4,1),(ipv6,2),(ipv4z,3),(ipv6z,4),(dns,16)}

Address family type.

The actual access permission is accessible-for-notify.

This object is used only as a VB-bound object of the notification module.

hh3cBgpVpnRpkiSessionIPAddr (1.3.6.1.4.1.25506.2.202.3.1.3)

read-only

OCTET STRING

OCTET STRING{(0,255)}

IP address of the RPKI session.

The actual access permission is accessible-for-notify.

This object is used only as a VB-bound object of the notification module.

hh3cBgpVpnRpkiSessionRoaLimitNum (1.3.6.1.4.1.25506.2.202.3.1.4)

read-only

Unsigned32

Standard MIB values.

Limit on the number of ROAs.

The actual access permission is accessible-for-notify.

This object is used only as a VB-bound object of the notification module.

 

Notifications

hh3cBgpPeerRouteNumThresholdExceed

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.1

The number of routes received from a peer has exceeded the alarm threshold.

Error

Major

1.3.6.1.4.1.25506.2.202.4.0.2 (hh3cBgpPeerRouteNumThresholdClear)

ON

 

Notification triggers

This notification is generated when the number of routes received from a peer has reached the alarm threshold. The alarm threshold refers to the value specified for the percentage-value argument when you execute the peer route-limit command for the peer. The device generates an alarm message when the ratio of M to N exceeds the alarm threshold:

The M argument represents the number of routes received from the peer.

The N argument represents the maximum number of routes that can be received from the peer.

System impact

The impact on the system varies by the alarm threshold configuration of the peer route-limit command:

If the alarm threshold is set to 100% for the peer, the device will be disconnected from the peer or cannot receive new routes from the peer.

If the alarm threshold is set to a value other than 100% for the peer, this issue has no negative impact on the system. This alarm message aims at informing users of the potential impact, that is, the number of routes received from the peer is reaching the upper limit.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-routethreshold-exceed ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-routethreshold-exceed ] command.

Object

OID (object name)

Description

Index

Type

Value range

 (1.3.6.1.4.1.25506.2.202.1.1.4.1.1 (hh3cBgpPeerConfigRouteLimitNum)

Limit on the number of routes that can be received from a peer or peer group.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.2 (hh3cBgpPeerConfigRouteLimitThreshold)

Threshold value for the device to generate an alarm notification.

The device generates an alarm notification when the ratio of the number of received routes to the limit on the number of received routes exceeds the threshold.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Unsigned32{(0,100)}

 

Recommended action

To resolve the issue:

1.Execute the display bgp peer verbose command and view the NLRI statistics and Message statistics fields in the command output to check whether the number of routes received from the peer has reached the alarm threshold:

  - If the number of routes received from the peer has reached the alarm threshold, proceed to step 2.

  - If the number of routes received from the peer has not reached the alarm threshold, proceed to step 10.

2.Identify whether the overflowing received routes are necessary for forwarding services.

  - If the overflowing received routes are necessary, proceed to step 8.

  - If the overflowing received routes are not necessary, proceed to step 3.

3.Execute the display current-configuration configuration bgp command to view the current BGP configurations. Check for configurations that cause the local device to receive too many unnecessary routes. Such configurations include peer prefix-list, peer filter-policy, peer as-path-acl, filter-policy, and peer route-policy.

  - If the local device has some configurations that affect the route reception policy, proceed to step 4.

  - If the local device does not have configurations that affect the route reception policy, proceed to step 5.

4.Edit those configurations to reduce the number of routes received by the local device, and then proceed to step 9.

5.Contact the administrator of the peer to check whether the number of BGP routes sent to the local device is appropriate:

  - If the number of BGP routes sent to the local device is appropriate, proceed to step 6.

  - If the number of BGP routes sent to the local device is not appropriate, proceed to step 7.

6.Notify the administrator of the BGP peer to reduce the number of BGP routes sent to the local device, and then proceed to step 9. To reduce the number of BGP routes sent to the local device, the administrator can use the following methods:

  - Summarize the routes sent to the local device.

  - Suppress the advertisement of summaried routes.

7.Notify the administrator of the BGP peer to edit the policy of route distribution to the local device, which prevents the local device from receiving unnecessary routes. Then, proceed to step 9.

8.Use the peer route-limit command to increase the maximum number of BGP routes that can be received from the peer or increase the alarm threshold. Then, proceed to step 9.

9.Check whether the hh3cBgpPeerRouteNumThresholdCleard message is generated on the device.

  - If the message is generated, the issue is cleared and the troubleshooting completes.

  - If the message is not generated, proceed to step 10.

10.If the issue persists, collect alarm information and configuration data, and then contact H3C Support for help.

hh3cBgpPeerRouteNumThresholdCleard

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.2

The number of routes received from a peer has dropped below the alarm threshold.

Recovery

Major

N/A (N/A)

ON

 

Notification triggers

This notification is generated when the number of routes received from a peer has dropped below the alarm threshold. The alarm threshold refers to the value specified for the percentage-value argument when you execute the peer route-limit command for the peer. The device generates an alarm message when the ratio of M to N exceeds the alarm threshold:

The M argument represents the number of routes received from the peer.

The N argument represents the maximum number of routes that can be received from the peer.

System impact

No negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-routethreshold-clear ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-routethreshold-clear ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.1.4.1.1 (hh3cBgpPeerConfigRouteLimitNum)

Limit on the number of routes that can be received from a peer or peer group.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.2 (hh3cBgpPeerConfigRouteLimitThreshold)

Threshold value for the device to generate an alarm notification.

The device generates an alarm notification when the ratio of the number of received routes to the limit on the number of received routes exceeds the threshold.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Unsigned32{(0,100)}

 

Recommended action

No action is required.

hh3cBgpPeerRouteExceed

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.3

The number of routes received from a peer has exceeded the upper limit.

Error

Major

1.3.6.1.4.1.25506.2.202.4.0.4 (hh3cBgpPeerRouteExceedClear)

ON

 

Notification triggers

This notification is generated when the number of routes received from a peer has exceeded the upper limit. The upper limit refers to the value specified for the prefix-number argument when you execute the peer route-limit command for the peer.

System impact

The device will be disconnected from the peer or cannot receive new routes from the peer.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-routeexceed ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-routeexceed ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.1.4.1.1 (hh3cBgpPeerConfigRouteLimitNum)

Limit on the number of routes that can be received from a peer or peer group.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.2 (hh3cBgpPeerConfigRouteLimitThreshold)

Threshold value for the device to generate an alarm notification.

The device generates an alarm notification when the ratio of the number of received routes to the limit on the number of received routes exceeds the threshold.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Unsigned32{(0,100)}

 

Recommended action

To resolve this issue:

1.Identify whether the overflowing received routes are necessary for forwarding services.

  - If the overflowing received routes are necessary, proceed to step 7.

  - If the overflowing received routes are not necessary, proceed to step 2.

2.Execute the display current-configuration configuration bgp command to view the current BGP configurations. Check for configurations that cause the local device to receive too many unnecessary routes. Such configurations include peer prefix-list, peer filter-policy, peer as-path-acl, filter-policy, and peer route-policy.

  - If the local device has some configurations that affect the route reception policy, proceed to step 3.

  - If the local device does not have configurations that affect the route reception policy, proceed to step 4.

3.Edit those configurations to reduce the number of routes received by the local device, and then proceed to step 8.

4.Contact the administrator of the peer to check whether the number of BGP routes sent to the local device is appropriate:

  - If the number of BGP routes sent to the local device is appropriate, proceed to step 5.

  - If the number of BGP routes sent to the local device is not appropriate, proceed to step 6.

5.Notify the administrator of the BGP peer to reduce the number of BGP routes sent to the local device, and then proceed to step 8. To reduce the number of BGP routes sent to the local device, the administrator can use the following methods:

  - Summarize the routes sent to the local device.

  - Suppress the advertisement of summaried routes.

6.Notify the administrator of the BGP peer to edit the policy of route distribution to the local device, which prevents the local device from receiving unnecessary routes. Then, proceed to step 8.

7.Use the peer route-limit command to increase the maximum number of BGP routes that can be received from the peer. Then, proceed to step 8.

8.Check whether the hh3cBgpPeerRouteExceedClear message is generated on the device.

  - If the message is generated, the issue is cleared and the troubleshooting completes.

  - If the message is not generated, proceed to step 9.

9.If the issue persists, collect alarm information and configuration data, and then contact H3C Support for help.

hh3cBgpPeerRouteExceedClear

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.4

The number of routes received from a peer has dropped below the upper limit.

Recovery

Major

N/A (N/A)

ON

 

Notification triggers

This notification is generated when the number of routes received from a peer has dropped below the upper limit. The upper limit refers to the value specified for the prefix-number argument when you execute the peer route-limit command for the peer.

System impact

No negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-routeexceed-clear ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-routeexceed-clear ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.1.4.1.1 (hh3cBgpPeerConfigRouteLimitNum)

Limit on the number of routes that can be received from a peer or peer group.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.2 (hh3cBgpPeerConfigRouteLimitThreshold)

Threshold value for the device to generate an alarm notification.

The device generates an alarm notification when the ratio of the number of received routes to the limit on the number of received routes exceeds the threshold.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Unsigned32{(0,100)}

 

Recommended action

No action is required.

hh3cBgpPeerEstablished

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.5

A peer session enters Established state

Recovery

Major

N/A (N/A)

ON

 

Notification triggers

This notification is generated when the BGP session to a BGP peer is successfully established.

System impact

The BGP session is correctly established.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-established ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-established ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.1.2.1.8 (hh3cBgpPeerLastError)

Error code and subcode for the most recent peer connection error.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

DisplayString

OCTET STRING (2)

1.3.6.1.4.1.25506.2.202.1.1.2.1.4 (hh3cBgpPeerState)

Peer state.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

INTEGER

idle(1), connect(2), active(3), opensent(4), openconfirm(5), established(6)

 

Recommended action

No action is required.

hh3cBgpPeerBackwardTransition

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.6

A peer session enters a lower-level state.

Error

Major

1.3.6.1.4.1.25506.2.202.4.0.5 (hh3cBgpPeerEstablished)

ON

 

Notification triggers

This notification is generated when the state of a BGP peer session transitions from an upper level (for example, Established) to a lower level (for example, OpenConfirm). A typical example is that the BFD session is disconnected. Possible reasons for generating this notification are as follows:

Incorrect BGP configuration.

BGP receives a notification because an error event occurs.

BGP message receiving or sending times out.

The BGP peer IP address is unreachable.

An incorrect BGP packet is received.

The directly connected BGP interface goes down.

The number of BGP routes exceeds the maximum number of BGP routes that can be received.

System impact

The device might not have the associated BGP route to guide traffic forwarding, resulting in service interruption.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-backward-transition ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-backward-transition ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.1.2.1.8 (hh3cBgpPeerLastError)

Error code and subcode for the most recent peer connection error.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

DisplayString

OCTET STRING (2)

1.3.6.1.4.1.25506.2.202.1.1.2.1.4 (hh3cBgpPeerState)

Peer state.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

INTEGER

idle(1), connect(2), active(3), opensent(4), openconfirm(5), established(6)

1.3.6.1.4.1.25506.2.202.1.1.2.1.9 (hh3cBgpPeerUnAvaiReason)

Reason why the peer went down.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Execute the display current-configuration configuration bgp command to identify the settings that affect BGP session state.

  - If a setting that causes BGP session disconnection exists, execute the relevant command to cancel the setting.

  - If BGP uses a loopback interface as the source interface of TCP connections, execute the peer connect-interface or peer source-address command to specify the loopback interface as the source interface for establishing TCP connections.

  - To establish an EBGP session to an indirectly connected peer, make sure the peer ebgp-max-hop command is executed on both ends of the session.

  - If the peer ttl-security command is configured to enable BGP GTSM on the device, the device receives the BGP packets with a TTL in the range from 255 – the configured hop count + 1 to 255.

  - If no settings affect BGP session state, proceed to step 2.

2.Wait for a short period of time to exclude the cause of disconnection by BGP session reset. If the BGP session fails to restore to the Established state within a long period of time, proceed to step 3.

3.Execute the display current-configuration configuration bgp command to check for the configuration of the peer route-limit command, and the BGP/4/BGP_EXCEED_ROUTE_LIMIT log printed by the device.

  - If both the configuration and the log exist, the BGP session is disconnected because excessive BGP routes are received. In this case, verify that the maximum number of routes that can be received configured with the peer route-limit command is appropriate:

If the setting is appropriate, notify the administrator of the BGP peer to reduce the number of BGP routes sent to the local end.

If the setting is inappropriate, increase the maximum number of BGP routes that can be received on the local end.

  - If the configuration or the log does not exist, or neither of them exists, receiving excessive BGP routes is not the cause for the BGP session disconnection. In this case, proceed to step 4.

4.Execute the display bgp peer log-info command. From the command output, identify the BGP session disconnection cause based on the error code or subcode printed in the Notification Error/SubError field.

  - If the error code (Error) is 4, the local end fails to receive any keepalive or update messages from the peer end within the BGP session hold time. This results in BGP session disconnection. If the error code is 5 or 6, the BGP session is disconnected because the TCP connection has an error or the connection is actively disconnected. You can perform troubleshooting by using the following methods:

On the local end, ping the source address used for establishing TCP connections on the BGP peer. If the ping operation fails, execute the display ip routing-table command to identify whether a route is available to the BGP peer. If no routes are available to the BGP peer, troubleshoot IGP route, static route, or direct route settings.

Execute the display memory-threshold command to identify whether the device has reached the memory usage threshold. If the memory usage threshold is reached, proceed to step 5.

Execute the display cpu-usage command to identify whether the CPU usage is too high. If the CPU usage is too high, proceed to step 5.

Execute the display acl all command to identify whether a rule exists that denies port bgp or 179. If such an ACL exists, delete the ACL.

Execute the display interface command to identify whether the output interface associated with the next hop of the route to the BGP peer is up. If the output interface is down, execute the undo shutdown command to bring up the interface in the view of the interface. If the interface fails to be brought up, or the interface is up but the notification persists, proceed to step 5.

  - If the error code (Error) is 1 or 3, the device has received wrong BGP packets. Proceed to step 5.

5.If the issue persists, collect alarm information, configuration data, and the output information from the previous commands, and then contact H3C Support for help.

hh3cBgpVrfRouteNumReachThreshold

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.7

The number of VPN routes received from peers has exceeded the alarm threshold.

Error

Major

1.3.6.1.4.1.25506.2.202.4.0.8 (hh3cBgpVrfRouteNumReachThresholdClear)

ON

 

Notification triggers

This notification is generated when the number of routes received from peers in an address family of a VPN instance has exceeded the alarm threshold.

System impact

The number of routes received by the VPN instance has exceeded the alarm threshold and the VPN instance stops receiving new routes.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ vrfroutenum-threshold ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ vrfroutenum-threshold ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.2.1.1.1 (hh3cBgpVpnRouteType)

Route type.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.2.1.1.2 (hh3cBgpVpnInstName)

VPN instance name.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

OCTET STRING

0..31

1.3.6.1.4.1.25506.2.202.1.2.1.1.3 (hh3cBgpVpnAddressFamily)

Address family.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.2.1.1.4 (hh3cBgpVpnCurrRouteNum)

Number of VPN routes in the BGP routing table.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.2.1.1.5 (hh3cBgpVpnThresholdValue)

Threshold value for the device to generate an alarm notification.

The device generates an alarm notification when the ratio of the number of VPN routes to the maximum number of VPN routes exceeds the threshold.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Use the display bgp routing-table { ipv4 | ipv6 } vpn-instace command to check whether the number of routes received from peers in the VPN instance has reached the alarm threshold.

  - If the alarm threshold is reached, proceed to step 2.

  - If the alarm threshold is not reached, proceed to step 10.

2.Identify whether the overflowing received routes are necessary for forwarding services.

  - If the overflowing received routes are necessary, proceed to step 8.

  - If the overflowing received routes are not necessary, proceed to step 3.

3.Execute the display current-configuration configuration bgp command to view the current BGP configurations. Check for configurations that cause the local device to receive too many unnecessary routes. Such configurations include peer prefix-list, peer filter-policy, peer as-path-acl, filter-policy, and peer route-policy.

  - If the local device has some configurations that affect the route reception policy, proceed to step 4.

  - If the local device does not have configurations that affect the route reception policy, proceed to step 5.

4.Edit those configurations to reduce the number of routes received by the local device, and then proceed to step 9.

5.Contact the administrator of the peer to check whether the number of BGP routes sent to the local device is appropriate:

  - If the number of BGP routes sent to the local device is appropriate, proceed to step 6.

  - If the number of BGP routes sent to the local device is not appropriate, proceed to step 7.

6.Notify the administrator of the BGP peer to reduce the number of BGP routes sent to the local device, and then proceed to step 9. To reduce the number of BGP routes sent to the local device, the administrator can use the following methods:

  - Summarize the routes sent to the local device.

  - Suppress the advertisement of summaried routes.

7.Notify the administrator of the BGP peer to edit the policy of route distribution to the local device, which prevents the local device from receiving unnecessary routes. Then, proceed to step 9.

8.In the corresponding address family view, increase the maximum number of BGP routes that can be received from peers or increase the alarm threshold. Then, proceed to step 9.

9.Check whether the hh3cBgpVrfRouteNumReachThresholdClear message is generated on the device.

  - If the message is generated, the issue is cleared and the troubleshooting completes.

  - If the message is not generated, proceed to step 10.

10.If the issue persists, collect alarm information and configuration data, and then contact H3C Support for help.

hh3cBgpVrfRouteNumReachThresholdClear

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.8

The number of VPN routes received from peers has dropped below the alarm threshold.

Recovery

Major

N/A (N/A)

ON

 

Notification triggers

This notification is generated when the number of routes received from peers in an address family of a VPN instance has dropped below the alarm threshold.

System impact

No negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ vrfroutenum-threshold-clear ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ vrfroutenum-threshold-clear ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.2.1.1.1 (hh3cBgpVpnRouteType)

Route type.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.2.1.1.2 (hh3cBgpVpnInstName)

VPN instance name.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

OCTET STRING

0..31

1.3.6.1.4.1.25506.2.202.1.2.1.1.3 (hh3cBgpVpnAddressFamily)

Address family.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.2.1.1.4 (hh3cBgpVpnCurrRouteNum)

Number of VPN routes in the BGP routing table.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.2.1.1.5 (hh3cBgpVpnThresholdValue)

Threshold value for the device to generate an alarm notification.

The device generates an alarm notification when the ratio of the number of VPN routes to the maximum number of VPN routes exceeds the threshold.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

 

Recommended action

No action is required.

hh3cBgpPeerAFRouteThresholdExceed

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.9

The number of routes received from a peer in an address family has exceeded the alarm threshold.

Error

Major

1.3.6.1.4.1.25506.2.202.4.0.10 (hh3cBgpPeerAFRouteThresholdClear)

ON

 

Notification triggers

This notification is generated when the number of routes received from a peer in an address family has reached the alarm threshold. The alarm threshold refers to the value specified for the percentage-value argument when you execute the peer route-limit command for the peer. The device generates an alarm message when the ratio of M to N exceeds the alarm threshold:

The M argument represents the number of routes received from the peer.

The N argument represents the maximum number of routes that can be received from the peer.

System impact

The impact on the system varies by the alarm threshold configuration of the peer route-limit command:

If the alarm threshold is set to 100% for the peer, the device will be disconnected from the peer or cannot receive new routes from the peer.

If the alarm threshold is set to a value other than 100% for the peer, this issue has no negative impact on the system. This alarm message aims at informing users of the potential impact, that is, the number of routes received from the peer is reaching the upper limit.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-addrfamily-routethreshold-exceed ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-addrfamily-routethreshold-exceed ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.2.1.1.3 (hh3cBgpVpnAddressFamily)

Address family.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.1 (hh3cBgpPeerConfigRouteLimitNum)

Limit on the number of routes that can be received from a peer or peer group.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.2 (hh3cBgpPeerConfigRouteLimitThreshold)

Threshold value for the device to generate an alarm notification.

The device generates an alarm notification when the ratio of the number of received routes to the limit on the number of received routes exceeds the threshold.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.2.1.1.1.1 (hh3cBgpInstanceName)

BGP process name.

hh3cBgpInstanceName

{(1,31)}

Standard MIB values.

 

Recommended action

To resolve the issue:

1.Execute the display bgp peer verbose command and view the NLRI statistics and Message statistics fields in the command output to check whether the number of routes received from the peer has reached the alarm threshold:

  - If the number of routes received from the peer has reached the alarm threshold, proceed to step 2.

  - If the number of routes received from the peer has not reached the alarm threshold, proceed to step 10.

2.Identify whether the overflowing received routes are necessary for forwarding services.

  - If the overflowing received routes are necessary, proceed to step 8.

  - If the overflowing received routes are not necessary, proceed to step 3.

3.Execute the display current-configuration configuration bgp command to view the current BGP configurations. Check for configurations that cause the local device to receive too many unnecessary routes. Such configurations include peer prefix-list, peer filter-policy, peer as-path-acl, filter-policy, and peer route-policy.

  - If the local device has some configurations that affect the route reception policy, proceed to step 4.

  - If the local device does not have configurations that affect the route reception policy, proceed to step 5.

4.Edit those configurations to reduce the number of routes received by the local device, and then proceed to step 9.

5.Contact the administrator of the peer to check whether the number of BGP routes sent to the local device is appropriate:

  - If the number of BGP routes sent to the local device is appropriate, proceed to step 6.

  - If the number of BGP routes sent to the local device is not appropriate, proceed to step 7.

6.Notify the administrator of the BGP peer to reduce the number of BGP routes sent to the local device, and then proceed to step 9. To reduce the number of BGP routes sent to the local device, the administrator can use the following methods:

  - Summarize the routes sent to the local device.

  - Suppress the advertisement of summaried routes.

7.Notify the administrator of the BGP peer to edit the policy of route distribution to the local device, which prevents the local device from receiving unnecessary routes. Then, proceed to step 9.

8.In the corresponding address family view, use the peer route-limit command to increase the maximum number of BGP routes that can be received from the peer or increase the alarm threshold. Then, proceed to step 9.

9.Check whether the hh3cBgpPeerAFRouteThresholdClear message is generated on the device.

  - If the message is generated, the issue is cleared and the troubleshooting completes.

  - If the message is not generated, proceed to step 10.

10.If the issue persists, collect alarm information and configuration data, and then contact H3C Support for help.

hh3cBgpPeerAFRouteThresholdClear

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.10

The number of routes received from a peer in an address family has dropped below the alarm threshold.

Recovery

Major

N/A (N/A)

ON

 

Notification triggers

This notification is generated when the number of routes received from a peer in an address family has dropped below the alarm threshold. The alarm threshold refers to the value specified for the percentage-value argument when you execute the peer route-limit command for the peer. The device generates an alarm message when the ratio of M to N exceeds the alarm threshold:

The M argument represents the number of routes received from the peer.

The N argument represents the maximum number of routes that can be received from the peer.

System impact

No negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-addrfamily-routethreshold-clear ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-addrfamily-routethreshold-clear ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.2.1.1.3 (hh3cBgpVpnAddressFamily)

Address family.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.1 (hh3cBgpPeerConfigRouteLimitNum)

Limit on the number of routes that can be received from a peer or peer group.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.2 (hh3cBgpPeerConfigRouteLimitThreshold)

Threshold value for the device to generate an alarm notification.

The device generates an alarm notification when the ratio of the number of received routes to the limit on the number of received routes exceeds the threshold.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.2.1.1.1.1 (hh3cBgpInstanceName)

BGP process name.

hh3cBgpInstanceName

{(1,31)}

Standard MIB values.

 

Recommended action

No action is required.

hh3cBgpPeerAFRouteExceed

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.11

The number of routes received from a peer in an address family has exceeded the upper limit.

Error

Major

1.3.6.1.4.1.25506.2.202.4.0.12 (hh3cBgpPeerAFRouteExceedClear)

ON

 

Notification triggers

This notification is generated when the number of routes received from a peer in an address family has exceeded the upper limit. The upper limit refers to the value specified for the prefix-number argument when you execute the peer route-limit command for the peer.

System impact

The device will be disconnected from the peer or cannot receive new routes from the peer.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-addrfamily-routeexceed ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-addrfamily-routeexceed ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.2.1.1.3 (hh3cBgpVpnAddressFamily)

Address family.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.1 (hh3cBgpPeerConfigRouteLimitNum)

Limit on the number of routes that can be received from a peer or peer group.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.2.1.1.1.1 (hh3cBgpInstanceName)

BGP process name.

hh3cBgpInstanceName

{(1,31)}

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Identify whether the overflowing received routes are necessary for forwarding services.

  - If the overflowing received routes are necessary, proceed to step 7.

  - If the overflowing received routes are not necessary, proceed to step 2.

2.Execute the display current-configuration configuration bgp command to view the current BGP configurations. Check for configurations that cause the local device to receive too many unnecessary routes. Such configurations include peer prefix-list, peer filter-policy, peer as-path-acl, filter-policy, and peer route-policy.

  - If the local device has some configurations that affect the route reception policy, proceed to step 3.

  - If the local device does not have configurations that affect the route reception policy, proceed to step 4.

3.Edit those configurations to reduce the number of routes received by the local device, and then proceed to step 8.

4.Contact the administrator of the peer to check whether the number of BGP routes sent to the local device is appropriate:

  - If the number of BGP routes sent to the local device is appropriate, proceed to step 5.

  - If the number of BGP routes sent to the local device is not appropriate, proceed to step 6.

5.Notify the administrator of the BGP peer to reduce the number of BGP routes sent to the local device, and then proceed to step 8. To reduce the number of BGP routes sent to the local device, the administrator can use the following methods:

  - Summarize the routes sent to the local device.

  - Suppress the advertisement of summaried routes.

6.Notify the administrator of the BGP peer to edit the policy of route distribution to the local device, which prevents the local device from receiving unnecessary routes. Then, proceed to step 8.

7.In the corresponding address family view, use the peer route-limit command to increase the maximum number of BGP routes that can be received from the peer. Then, proceed to step 8.

8.Check whether the hh3cBgpPeerAFRouteExceedClear message is generated on the device.

  - If the message is generated, the issue is cleared and the troubleshooting completes.

  - If the message is not generated, proceed to step 9.

9.If the issue persists, collect alarm information and configuration data, and then contact H3C Support for help.

hh3cBgpPeerAFRouteExceedClear

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.12

The number of routes received from a peer in an address family has dropped below the upper limit.

Recovery

Major

N/A (N/A)

ON

 

Notification triggers

This notification is generated when the number of routes received from a peer or peer group in an address family has dropped below the upper limit. The upper limit refers to the value specified for the prefix-number argument when you execute the peer route-limit command for the peer.

System impact

No negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-addrfamily-routeexceed-clear ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-addrfamily-routeexceed-clear ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.2.1.1.3 (hh3cBgpVpnAddressFamily)

Address family.

hh3cBgpVpnRouteType

hh3cBgpVpnInstName

hh3cBgpVpnAddressFamily

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.1.1.4.1.1 (hh3cBgpPeerConfigRouteLimitNum)

Limit on the number of routes that can be received from a peer or peer group.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

Unsigned32

Standard MIB values.

1.3.6.1.4.1.25506.2.202.2.1.1.1.1 (hh3cBgpInstanceName)

BGP process name.

hh3cBgpInstanceName

{(1,31)}

Standard MIB values.

 

Recommended action

No action is required.

hh3cBgpPeerGRStatusChange

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.4.0.13

The GR state of a BGP peer has changed.

Informational

Major

N/A (N/A)

ON

 

Notification triggers

This notification is generated when the GR state of a BGP peer in a GR-capable BGP session has changed.

System impact

This alarm message notifies that the device starts the BGP GR process or exits from the BGP GR process. If the device unexpectedly exits from the BGP GR process when the alarm message is generated, the device must recreate the BGP peer session and performs route convergence, which might cause service interruption.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-gr-status-change ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-gr-status-change ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.1.1.2.1.7 (hh3cBgpPeerGRStatus)

GR state of a remote BGP peer.

hh3cBgpPeerInstanceId

hh3cBgpPeerVpnIndex

hh3cBgpPeerAddrFamilyId

hh3cBgpPeerSubAddrFamilyId

hh3cBgpPeerType

hh3cBgpPeerIPAddr

INTEGER

peerNotBeingHelped(1),, peerRestarting(2),, peerFinishRestart(3),, peerHelping(4)

 

Recommended action

To resolve this issue:

1.View the alarm message and determine whether this alarm message is a normal message generated during the GR process.

  - If the alarm message is a normal message, no action is required.

  - If the alarm message is not a normal message, proceed to step 2.

2.If the issue persists, collect alarm information and configuration data, and then contact H3C Support for help.

hh3cBgpVpnRpkiSessionRoaExceed

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.3.2.0.1

The number of ROAs received from an RPKI server has exceeded the upper limit.

Error

Major

1.3.6.1.4.1.25506.2.202.3.2.0.2 (hh3cBgpVpnRpkiSessionRoaExceedClear)

ON

 

Notification triggers

This notification is generated when the number of ROAs received from an RPKI server has exceeded the upper limit. The upper limit refers to the value specified for the limit argument when you execute the rpki-limit command for the RPKI server.

System impact

The impact on the system varies by the configuration of the rpki-limit command:

If the alert-only keyword is not specified, the TCP connection between the device and the RPKI server will be terminated.

If the alert-only keyword is specified, this issue has no negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-rpkisession-roaexceed ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-rpkisession-roaexceed ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.3.1.4 (hh3cBgpVpnRpkiSessionRoaLimitNum)

Maximum number of ROAs that can be received from an RPKI server.

N/A

Unsigned32

Standard MIB values.

 

Recommended action

To resolve this issue:

1.Execute the display bgp rpki server command and view the ROAs(IPv4/IPv6) field in the command output to check whether the number of ROAs received from the RPKI server has reached the upper limit.

  - If the number of ROAs received from the RPKI server has reached the upper limit, proceed to step 2.

  - If the number of ROAs received from the RPKI server has not reached the upper limit, proceed to step 6.

2.Identify whether the overflowing received ROAs are necessary for current services.

  - If the overflowing received ROAs are necessary, proceed to step 5.

  - If the overflowing received ROAs are not necessary, proceed to step 3.

3.Contact the administrator of the RPKI server to check whether the ROAs advertised to the device are all necessary.

  - If the ROAs advertised to the device are all necessary, proceed to step 5.

  - If some of the ROAs advertised to the device are not necessary, proceed to step 4.

4.Notify the administrator of the RPKI server to withdraw unnecessary ROAs. If this issue persists, proceed to step 6.

5.Use the rpki-limit command on the device to increase the maximum number of ROAs that can be received from the RPKI server. If this issue persists, proceed to step 6.

6.If the issue persists, collect alarm information and configuration data, and then contact H3C Support for help.

hh3cBgpVpnRpkiSessionRoaExceedClear

Basic information

OID

Event

Type

Severity

Recovery notification

Default status

1.3.6.1.4.1.25506.2.202.3.2.0.2

The number of ROAs received from an RPKI server has dropped below the upper limit.

Recovery

Major

N/A (N/A)

ON

 

Notification triggers

This notification is generated when the number of ROAs received from an RPKI server has dropped below the upper limit. The upper limit refers to the value specified for the prefix-number argument when you execute the peer route-limit command for the peer.

System impact

No negative impact on the system.

Status control

ON

CLI: Use the snmp-agent trap enable bgp [ peer-rpkisession-roaexceed-clear ] command.

OFF

CLI: Use the undo snmp-agent trap enable bgp [ peer-rpkisession-roaexceed-clear ] command.

Object

OID (object name)

Description

Index

Type

Value range

1.3.6.1.4.1.25506.2.202.3.1.4 (hh3cBgpVpnRpkiSessionRoaLimitNum)

Maximum number of ROAs that can be received from an RPKI server.

N/A

Unsigned32

Standard MIB values.

 

Recommended action

No action is required.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网