Help Center/ Huawei Qiankun CloudService/ More Documents/ Device Alarm Handling/ V200 LSW Alarms/ ALM-3276800212 MAC address flapping occurs in a VSI
Updated on 2024-01-25 GMT+08:00

ALM-3276800212 MAC address flapping occurs in a VSI

Description

L2IFPPI/4/MFLPVSIALARM: OID [OID] MAC move detected, VSI-Name=[OCTET], [OCTET].

MAC address flapping occurs in a VSI.

Attribute

Alarm ID

Alarm Severity

Alarm Type

3276800212

Warning

Equipment alarm

Parameters

Name

Meaning

OID

Indicates the MIB object ID of the alarm.

VSI-Name

Indicates a VSI name.

OCTET

Indicates MAC address flapping information.

Impact on the System

Traffic cannot be received correctly.

Possible Causes

  • Cause1: The interfaces that form a loop are added to the same VSI.
  • Cause2: Cables are connected incorrectly.
  • Cause3: No loop prevention protocol such as STP is enabled.
  • Cause4: If protocols such as LLDP, LNP, NDP, NTDP, and LACP are enabled on blocked ports, protocol packets are forcibly transmitted through the blocked port. As a result, MAC address flapping occurs on the network connected to the blocked port.

Procedure

  1. Connect cables on the interfaces correctly and check whether the alarm persists.

    • If so, go to step 2.

    • If not, go to step 10.

  2. Check whether the two interfaces that learn the same MAC address can be added to different VSIs according to the networking.

    • If so, go to step 3.

    • If not, go to step 4.

  3. Add the two interfaces that learn the same MAC address to different VSIs. Then check whether the alarm persists.

    • If so, go to step 4.

    • If not, go to step 10.

  4. Enable a loop prevention protocol such as STP. Check whether the alarm persists.

    • If so, go to step 5.

    • If not, go to step 10.

  5. Check whether loops are caused by protocols such as LLDP, LNP, NDP, NTDP, and LACP.

    • If so, go to step 6.

    • If not, go to step 9.

  6. Check whether the packets need to be transparently transmitted.

    • If so, go to step 8.

    • If not, go to step 7.

  7. Disable the corresponding protocols on the blocked port. Then check whether the alarm persists.

    • If so, go to step 9.

    • If not, go to step 10.

  8. Apply a traffic policy that can match the destination MAC address of the protocol packets on the device where MAC address flapping occurs so that source MAC addresses of protocol packets are not learnt. Then check whether the alarm persists.

    • If so, go to step 9.

    • If not, go to step 10.

  9. Contact technical support personnel.
  10. End.

Related Information

None