SNMP traps for DHCP Snooping, Dynamic ARP Inspection,
and IP Source Guard
From Release 5.3 onward, the switch generates SNMP traps for the following:
• DHCP Snooping
• IP Source Guard
• Dynamic ARP Inspection
From Release 5.3 onward, the switch generates the following additional trap notifications:
•
send_bsaiArpPacketDroppedOnUntrustedPort_trap
- generated when there is an invalid IP/MAC binding
•
send_bsSourceGuardReachedMaxIpEntries_trap
- generated when the maximum number of IP entries on a port has been reached
•
send_bsSourceGuardCannotEnablePort_trap
- generated when there are insufficient resources available to enable IP source guard
checking on a port
•
send_bsDhcpSnoopingBindingTableFull_trap
- generated when an attempt is made to add a new DHCP binding entry when the binding
table is full
•
send_bsDhcpSnoopingTrap_trap
- generated when a DHCP packet is dropped. The following are events which cause a
DHCP packet to be dropped:
- DHCP REQUEST dropped on untrusted port due to Source MAC address not
matching DHCP client MAC address.
- DHCP RELEASE/DECLINE dropped on untrusted port because MAC address is
associated to port in DHCP binding table.
- DHCP REPLY packet dropped with MAC address and IP lease because no
corresponding DHCP request was received.
- DHCP OFFER dropped on untrusted port.
- DHCP ACK dropped on untrusted port.
- DHCP NAK dropped on untrusted port.
- DHCP RELEASEQUERY dropped on untrusted port.
Troubleshooting tools
40 Troubleshooting Avaya ERS 4000 Series April 2014
Comments? infodev@avaya.com