- Table of Contents
- Related Documents
-
Title | Size | Download |
---|---|---|
02-HH3C-IPSG-MIB | 43.58 KB |
Contents
HH3C-IPSG-MIB
About this MIB
Use this MIB to report notifications generated by the IP source guard (IPSG) module.
MIB file name
hh3c-ipsg.mib
Notifications
hh3cIpsgDropAlarm
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.246.1.0.1 |
The number of packets dropped by an interface reached the threshold. |
Error |
Warning |
1.3.6.1.4.1.25506.2.246.1.0.2 (hh3cIpsgDropAlarmResume) |
ON |
Notification triggers
This notification is generated when the number of packets dropped because of packet mismatching with IPSG bindings reaches the threshold.
System impact
The system might be under attacks. A large amount of attack traffic consumes system resources, and might cause service interruption.
Status control
ON
CLI: Use the snmp-agent trap enable ipsg [ drop-threshold ] command.
OFF
CLI: Use the undo snmp-agent trap enable ipsg [ drop-threshold ] command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.4.1.25506.2.246.1.1.1 (hh3cIpsgDropFamily) |
Protocol family. |
N/A |
InetAddressType |
ipv4(1), ipv6(2) |
1.3.6.1.4.1.25506.2.246.1.1.2 (hh3cIpsgDropIfName) |
Interface name. |
N/A |
OCTET STRING |
OCTET STRING (0..255) |
1.3.6.1.4.1.25506.2.246.1.1.3 (hh3cIpsgDropThreshold) |
Packet dropping rate threshold. |
N/A |
Unsigned32 |
Unsigned32(1..2147483647) |
Recommended action
To resolve the issue:
1.Use the display ip source binding or display ipv6 source binding command in any view to view the IPSG bindings, and use port mirroring to capture packets received on the interface.
- If a large number of mismatching packets are received on the interface, it can be determined that the interface is under attack. Identify the attack source and identify whether the source user is valid. If the source user is valid, configure static IPSG bindings to allow the valid packets to pass.
- If the device does not receive a large number of mismatching packets from the interface, it can be determined that the interface is not under attack. Use the ip verify source alarm or ipv6 verify source alarm command to adjust the alarm threshold.
2.If the issue persists, collect alarm, log, and configuration information, and then contact H3C Support for help.
hh3cIpsgDropAlarmResume
Basic information
OID |
Event |
Type |
Severity |
Recovery notification |
Default status |
1.3.6.1.4.1.25506.2.246.1.0.2 |
The number of packets dropped by an interface dropped below the threshold. |
Recovery |
Warning |
N/A (N/A) |
ON |
Notification triggers
This notification is generated when the number of packets dropped because of packet mismatching with IPSG bindings drops below the threshold.
System impact
No negative impact on services.
Status control
ON
CLI: Use the snmp-agent trap enable ipsg [ drop-threshold ] command.
OFF
CLI: Use the undo snmp-agent trap enable ipsg [ drop-threshold ] command.
Object
OID (object name) |
Description |
Index |
Type |
Value range |
1.3.6.1.4.1.25506.2.246.1.1.1 (hh3cIpsgDropFamily) |
Protocol family. |
N/A |
InetAddressType |
ipv4(1), ipv6(2) |
1.3.6.1.4.1.25506.2.246.1.1.2 (hh3cIpsgDropIfName) |
Interface name. |
N/A |
OCTET STRING |
OCTET STRING (0..255) |
1.3.6.1.4.1.25506.2.246.1.1.3 (hh3cIpsgDropThreshold) |
Packet dropping rate threshold. |
N/A |
Unsigned32 |
Unsigned32(1..2147483647) |
Recommended action
No action is required.