Professional Documents
Culture Documents
V900R007C02
Alarm Reference
Issue
02
Date
2009-06-30
Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any
assistance, please contact our local office or company headquarters.
Website:
http://www.huawei.com
Email:
support@huawei.com
Notice
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but the statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Contents
Contents
About This Document.....................................................................................................................1
1 ALM-0500 Physical entity is removed....................................................................................1-1
2 ALM-0501 Physical entity is unstable....................................................................................2-1
3 ALM-0502 Physical entity is restart........................................................................................3-1
4 ALM-0503 Communication channel is faulty.......................................................................4-1
5 ALM-0504 Physical entity failed.............................................................................................5-1
6 ALM-0505 Physical Entity changed to stand by...................................................................6-1
7 ALM-0506 Physical entity changed to the offline state......................................................7-1
8 ALM-0507 Physical entity temperature exceeded upper prealarm limit.........................8-1
9 ALM-0508 Physical entity temperature exceeded lower prealarm limit.........................9-1
10 ALM-0509 Physical entity humidity exceeded upper prealarm limit..........................10-1
11 ALM-0510 Physical entity humidity exceeded lower prealarm limit..........................11-1
12 ALM-0511 Physical entity voltage exceeded upper prealarm limit..............................12-1
13 ALM-0512 Physical entity voltage exceeded lower prealarm limit..............................13-1
14 ALM-0550 Physical line Down............................................................................................14-1
15 ALM-0601 License default config.......................................................................................15-1
16 ALM-0602 License overtime.................................................................................................16-1
17 ALM-0603 License will overtime.........................................................................................17-1
18 ALM-0604 License invalid....................................................................................................18-1
19 ALM-0605 License ESN invalid...........................................................................................19-1
20 ALM-0606 License config decrease.....................................................................................20-1
21 ALM-0610 Interface-Probe Fault Alarm.............................................................................21-1
22 ALM-0611 IP-Probe Fault Alarm.........................................................................................22-1
23 ALM-0618 None of the NTP servers replies......................................................................23-1
Issue 02 (2009-06-30)
Contents
Issue 02 (2009-06-30)
Contents
Issue 02 (2009-06-30)
iii
Related Versions
The following table lists the product versions related to this document.
Product Name
Version
GGSN9811
V900R007C02
Intended Audience
The intended audiences of this document are:
l
Update History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous issues.
Updates in 02 (2009-06-30)
The second commercial release has the following updates:
The mistakes are corrected.
Updates in Issue 01 (2009-05-26)
Initial commercial release.
Organization
1 ALM-0500 Physical entity is removed
2 ALM-0501 Physical entity is unstable
3 ALM-0502 Physical entity is restart
Issue 02 (2009-06-30)
Issue 02 (2009-06-30)
Conventions
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol
Description
Indicates a hazard with a high level of risk, which if not
avoided,will result in death or serious injury.
Indicates a hazard with a medium or low level of risk, which
if not avoided, could result in minor or moderate injury.
Indicates a potentially hazardous situation, which if not
avoided,could result in equipment damage, data loss,
performance degradation, or unexpected results.
Issue 02 (2009-06-30)
Symbol
Description
Indicates a tip that may help you solve a problem or save
time.
Provides additional information to emphasize or supplement
important points of the main text.
General Conventions
The general conventions that may be found in this document are defined as follows.
Convention
Description
Boldface
Italic
Courier New
Command Conventions
The command conventions that may be found in this document are defined as follows.
Convention
Description
Boldface
Italic
[]
{ x | y | ... }
[ x | y | ... ]
{ x | y | ... }*
[ x | y | ... ]*
GUI Conventions
Issue 02 (2009-06-30)
The GUI conventions that may be found in this document are defined as follows.
Convention
Description
Boldface
>
Keyboard Operations
The keyboard operations that may be found in this document are defined as follows.
Format
Description
Key
Press the key. For example, press Enter and press Tab.
Key 1+Key 2
Key 1, Key 2
Mouse Operations
The mouse operations that may be found in this document are defined as follows.
Action
Description
Click
Double-click
Drag
Press and hold the primary mouse button and move the
pointer to a certain position.
Issue 02 (2009-06-30)
Description
I. Description
This alarm occurs when the board or SPU subcard is manually removed or in poor contact with
the frame.
II. Attribute
Alarm ID
Severity level
Alarm type
0500
Critical
Fault
III. Parameters
Name
Meaning
Impact on System
l
If the active SRU is removed, the active and standby SRUs are switched over when the
standby SRU is available. During switchover, the interworking with the LMT is
diSRUpted. This alarm is not reported in real time; however, it can be displayed in the
alarm history record after the network element (NE) and the LMT can interwork.
The NE is unavailable if the active SRU is removed when the standby SRU is unavailable.
In addition, the alarm is not reported.
If the active SPU is removed, the active and standby SPUs are switched over when the
standby SPU is available. If the standby SPU has all information of the active SPU before
the switchover, the services of online users are not affected by the switchover; however,
users cannot be activated on this pair of SPUs during the interval of the switchover. If the
standby SPU does not have all information of the active SPU before the switchover, some
Issue 02 (2009-06-30)
1-1
users are offline due to the switchover. In addition, users cannot be activated on this pair
of SPUs during the interval of the switchover.
l
If the active SPU is removed and standby SPU is not exist, all services of the SPU is
interrupt.
If the LPU is removed, services on the active port of the LPU are switched over to the
standby port of another LPU when the reliable networking exists between the two LPUs.
If the LPU is removed, the communication between the devices connected to the removed
LPU and the NE is diSRUpted when the reliable networking does not exist between the
LPUs.
If the fault alarm occurs when the board is removed, after insert the same type board in the
slot. If you insert a new board to a slot without inserting any board, no alarm will occurs.
If you insert different type board (compare with the removed one), the "board type and slot
id" is not the same, the alarm cannot be cleared, it is need to cleared by the operator.
You can insert or remove the subcard of SPU when the mother board is normal.
Possible Causes
l
Handling Procedure
Step 1 Check whether the physical entity is manually removed.
l
Yes ->(3)
No ->(2)
Step 2 Remove the physical entity, and then insert it into the slot. Check whether the alarm is cleared.
l
Cleared ->(5)
Step 3 Check the reason why the board is manually removed with the operator ->(5)
Step 4 Contact Huawei Technical Support.
Step 5 End.
----End
Related Information
None.
1-2
Issue 02 (2009-06-30)
Description
I. Description
This alarm occurs when the board is not well inserted.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0501
Major
Fault
III. Parameters
Name
Meaning
Slot No.
Impact on System
l
Possible Causes
The board is not well inserted.
Handling Procedure
Step 1 Remove the board, and then insert it into the slot. Check whether the alarm is cleared.
l
Cleared ->(3)
Issue 02 (2009-06-30)
2-1
Related Information
None.
2-2
Issue 02 (2009-06-30)
Description
This alarm is generated when a board is restart or the memory mode is configured in error.
This alarm is generated when the CPU on the SPU is restart.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0502
Critical
Fault
Parameters
Name
Meaning
Cause
Board type and slot number or CPU number Specifies the type and slot number or CPU
number of the board generating the alarm.
Impact on System
l
If the active SPU is restart, the active and standby SPUs are switched over if the standby
SPU is available. If the standby SPU has all data on the active SPU before the switchover,
the ongoing services of users are not affected by the switchover; however, users cannot be
activated on this pair of SPUs during the switchover. If the standby SPU does not have all
data on the active SPU before the switchover, some users are offline due to the switchover.
In addition, users cannot be activated on this pair of SPUs during the switchover.
If the active SPU is restart, all users on the active SPU are offline if the standby SPU is
unavailable.
If the LPU is restart, services on the active port of this LPU are switched over to the standby
port of another LPU if the reliable networking is employed between these two LPUs.
If the LPU is restart, the communication between the NE and the devices connected to this
LPU is interrupted if the reliable networking is not employed between the LPUs.
If the CPU on the SPU is restart, the service processing capability is degraded.
Issue 02 (2009-06-30)
3-1
Possible Causes
l
Handling Procedure
Step 1 Check whether a board is restart manually.
l
Yes => 2
No => 3
Step 2 Contact the operator to confirm the cause of board restart => End
Step 3 Check whether the memory mode of SPU is configured correctly.
l
No, indicating that the alarm is caused by the fault of memory mode => Step 6
Step 4 Wait for the restart board to register again. Then, check whether the alarm is cleared after user
activation.
l
Step 5 Replace the faulty board. Then, check whether the alarm is cleared after user activation.
l
Cleared, indicating that the alarm is caused by board faults => End
Related Information
None
3-2
Issue 02 (2009-06-30)
Description
I. Description
This alarm occurs when the communication channel between frames is faulty.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0503
Major
Fault
III. Parameters
Name
Meaning
Board type
Issue 02 (2009-06-30)
4-1
Impact on System
l
Possible Causes
The communication of the ARQ channel is disrupted.
Handling Procedure
Step 1 Reset the faulty board manually. Then, check whether the alarm is cleared.
l
Cleared ->(4)
Step 2 Replace the faulty board. Then, check whether the alarm is cleared.
l
Cleared ->(4)
Related Information
None.
4-2
Issue 02 (2009-06-30)
Description
I. Description
This alarm occurs when the board is faulty.
II. Attribute
Alarm ID
Alarm Severity
Alarm Type
504
Critical
Fault
III. Parameters
Name
Meaning
Part
Fault type
Impact on System
If Fault type is that the number of the SFU boards is less than 3, the packet forwarding function
of the GGSN9811 is affected. If Fault type is not less than 3, services are interrupted and the
boards may be reset.
If memory board faults that cannot be corrected are detected through the ECC function, the
impacts depend on position, meaning, and related impacts of the incorrect data.
Issue 02 (2009-06-30)
5-1
Possible Causes
l
Memory board faults that cannot be corrected are detected through the ECC function.
Handling Procedure
Step 1 If the alarm is caused by a board, perform the following steps:
(1) Manually reset the faulty board. Then, check whether this alarm is cleared.
l
(2) Replace the faulty board. Then, check whether this alarm is cleared.
l
The board registers successfully and this alarm is cleared -> Step 1.4
The board fails to register and this alarm is not cleared -> Step 1.3
The board or subcard registers successfully and this alarm is cleared -> Step 2.3
The board or subcard fails to register and this alarm is not cleared -> Step 2.2
Related Information
None.
5-2
Issue 02 (2009-06-30)
Description
I. Description
This alarm is generated when the SRUs are switched with a command, the active SRU is faulty,
or the active SRU is reset abnormally. This alarm is cleared when the SRU is in the "Realtime
and routine backup" state.
II. Attribute
Alarm ID
Alarm level
Alarm type
0505
Major
Fault
III. Parameters
Name
Meaning
Reason
Impact on System
None
Possible Causes
The SRUs are switched with a command, the active SRU is faulty, or the active SRU is reset
abnormally.
Issue 02 (2009-06-30)
6-1
Handling Procedure
Step 1 Check whether the SRUs are reset with commands.
l
Related Information
None
6-2
Issue 02 (2009-06-30)
Description
I. Description
This alarm occurs when the number of reset times is greater than or equal to three due to
registration failure caused by network board faults. In addition, the network board is powered
off by the main control board.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0506
Major
Event
III. Parameters
Name
Meaning
Reason
Impact on System
The network board is faulty, and thus cannot register.
Possible Causes
The board cannot register because of board faults, which results in that the number of reset times
is greater than or equal to three.
Issue 02 (2009-06-30)
7-1
Handling Procedure
Step 1 Reset the faulty board manually. Then, check whether the alarm is cleared.
l
Cleared ->(4)
Step 2 Replace the faulty board. Then, check whether the alarm is cleared.
l
Cleared ->(4)
Related Information
None.
7-2
Issue 02 (2009-06-30)
Description
I. Description
This alarm occurs when the temperature is higher than the preset upper limit. The temperature
sensor of the board detects the temperature of the key chips on the board.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0507
Critical
Fault
III. Parameters
Name
Meaning
Monitoring address
Slot No.
Threshold level
Impact on System
l
The hardware is damaged if the part works at a temperature over the upper limit for a long
time.
When two service boards are used, the active and standby switchover may occur if the
working temperature is higher than the upper limit.
When only one service board is used, the service may be disrupted.
Issue 02 (2009-06-30)
8-1
Possible Causes
l
Handling Procedure
Step 1 Check whether the temperature of the equipment room is within the normal range.
l
No ->Notify the manager of the equipment room to check the temperature controller ->(5)
Yes ->(2)
Normally ->(3)
Step 3 Run display temperature. The temperature of the processor and the power cannot be read. Then,
replace the faulty board. Check whether the alarm is cleared.
l
Cleared ->(5)
Related Information
Board temperature: 0C to 80C
Ambient temperature: 5C to 40C for long-term running; 5C to 50C for short-term running
You can query current temperature by display temperature.
8-2
Issue 02 (2009-06-30)
Description
I. Description
This alarm occurs when the temperature is lower than the preset lower limit. The temperature
sensor of the board detects the temperature of the key chips on the board.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0508
Critical
Fault
III. Parameters
Name
Meaning
Monitoring address
Slot No.
Threshold level
Impact on System
l
The hardware is damaged if the part works at a temperature below the lower limit for a
long time.
When two service boards are used, the active and standby switchover may occur if the
working temperature is lower than the lower limit.
When only one service board is used, the service may be disrupted.
Issue 02 (2009-06-30)
9-1
Possible Causes
l
Handling Procedure
Step 1 Check whether the temperature of the equipment room is within the normal range.
l
No ->Notify the manager of the equipment room to check the temperature controller ->(5)
Yes ->(2)
Normally ->(3)
Step 3 Run display temperature. The temperature of the processor and the power cannot be read. Then,
replace the faulty board. Check whether the alarm is cleared.
l
Cleared ->(5)
Related Information
Board temperature: 0C to 80C
Ambient temperature: 5C to 40C for long-term running; 5C to 50C for short-term running
You can query current temperature by display temperature.
9-2
Issue 02 (2009-06-30)
10
Description
I. Description
This alarm occurs when the humidity is higher than the preset upper limit. The humidity sensor
of the board detects the humidity of the key chips on the board.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0509
Critical
Fault
III. Parameters
Name
Meaning
Monitoring address
Slot No.
Threshold level
Impact on System
l
When the device works for less than 48 hours, the device is not affected if the humidity is
beyond the long-term range but within the short-term range.
The faults such as system reset and packet loss may occur and the services are affected
when the humidity is beyond the long-term range for more than 48 hours or lower than the
short-term range.
Issue 02 (2009-06-30)
10-1
Possible Causes
l
Handling Procedure
Step 1 Check whether the humidity of the equipment room is within the normal range.
l
No ->(2)
Yes ->(3)
Step 2 Notify the manager of the equipment room to check the humidity controller. Then, check whether
the alarm is cleared.
l
Cleared ->(5)
Step 3 Check on the LMT whether the alarm thresholds of ambient humidity are set correctly. The
upper limit of the ambient humidity ranges from 65 to 85. The lower limit of the ambient humidity
ranges from 5 to 30. Modify the thresholds that are set incorrectly, and then check whether the
alarm is cleared.
l
Cleared ->(5)
Step 4 Replace the faulty board. Then, check whether the alarm is cleared.
l
Cleared ->(6)
Related Information
None
10-2
Issue 02 (2009-06-30)
11
Description
I. Description
This alarm occurs when the humidity is lower than the preset lower limit. The humidity sensor
of the board detects the humidity of the key chips on the board.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0510
Critical
Fault
III. Parameters
Name
Meaning
Monitoring address
Slot No.
Threshold level
Impact on System
l
When the device works for less than 48 hours, the device is not affected if the humidity is
beyond the long-term range but within the short-term range.
The faults such as system reset and packet loss may occur and the services are affected
when the humidity is beyond the long-term range for more than 48 hours or lower than the
short-term range.
Issue 02 (2009-06-30)
11-1
Possible Causes
l
Handling Procedure
Step 1 Check whether the humidity of the equipment room is within the normal range.
l
No ->(2)
Yes ->(3)
Step 2 Notify the manager of the equipment room to check the humidity controller. Then, check whether
the alarm is cleared.
l
Cleared ->(5)
Step 3 Check on the LMT whether the alarm threshold of ambient humidity is set correctly. The upper
limit of the ambient humidity ranges from 65 to 85. The lower limit of the ambient humidity
ranges from 5 to 30. Modify the thresholds that are set incorrectly, and then check whether the
alarm is cleared.
l
Cleared ->(5)
Step 4 Replace the faulty board. Then, check whether the alarm is cleared.
l
Cleared ->(6)
Related Information
None
11-2
Issue 02 (2009-06-30)
12
Description
I. Description
This alarm occurs when the voltage is higher than the preset upper limit. The voltage sensor of
the board detects the voltage of the key chips on the board.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0511
Critical
Fault
III. Parameters
Name
Meaning
Monitoring address
Slot No.
Threshold level
Impact on System
l
The hardware is damaged if the board works at a voltage over the upper limit for a long
time.
When two service boards are used, the active and standby switchover may occur if the
voltage is higher than the upper limit.
When only one service board is used, the service may be disrupted.
Issue 02 (2009-06-30)
12-1
Possible Causes
l
The voltage of the faulty board is higher than the upper limit.
Handling Procedure
Step 1 Reset the board where the alarm occurs. Check whether the alarm is cleared.
l
Cleared ->(5)
Step 2 Replace the board. Then, check whether the alarm is cleared.
l
Cleared ->(5)
Step 3 Replace the faulty power module. Then, check whether the alarm is cleared.
l
Cleared ->(5)
Related Information
None
12-2
Issue 02 (2009-06-30)
13
Description
I. Description
This alarm occurs when the voltage is lower than the preset lower limit. The voltage sensor of
the board detects the voltage of the key chips on the board.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0512
Critical
Fault
III. Parameters
Name
Meaning
Monitoring address
Slot No.
Threshold level
Impact on System
l
The hardware is damaged if the part works at a voltage below the lower limit for a long
time.
When two service boards are used, the active and standby switchover may occur if the
voltage is lower than the lower limit.
When only one service board is used, the service may be disrupted.
Issue 02 (2009-06-30)
13-1
Possible Causes
l
The voltage of the faulty board is lower than the lower limit.
Handling Procedure
Step 1 Reset the board where the alarm occurs. Check whether the alarm is cleared.
l
Cleared ->(5)
Step 2 Replace the board. Then, check whether the alarm is cleared.
l
Cleared ->(5)
Step 3 Replace the faulty power module. Then, check whether the alarm is cleared.
l
Cleared ->(5)
Related Information
None
13-2
Issue 02 (2009-06-30)
14
Description
This alarm occurs when the physical link connected to an interface on the LPU is broken.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0550
Critical
Fault
Parameters
Name
Meaning
Interface
Impact on System
l
The services at the physical interface where the alarm occurs are interrupted.
Possible Causes
l
The cable or optical fiber connected to the interface where the alarm occurs is loose.
Handling Procedure
Step 1 Check whether alarms such as the board fault alarm is reported to the LMT.
l
Yes -> Clear the generated alarms by referring to the help specific to the alarms.
No -> Step 2
14-1
Step 2 Check whether the cable or optical fiber connected to the interface where the alarm occurs is
connected properly (For example, check whether the cable or optical fiber is damaged and
whether the conversion module is loose).
l
No -> Step 3
Step 3 Reconnect the cable or optical fiber. Activate a user, and then check whether the alarm is cleared.
l
Cleared, indicating that the alarm is caused by the loose connection of the cable or optical
fiber -> End
No -> Step 5
Step 5 Replace the faulty cable or optical fiber. Activate a user, and then check whether the alarm is
cleared.
l
Cleared, indicating that the alarm is caused by the line break -> End
Check whether the operating mode and speed of the interface on the GGSN9811 are the
same as the operating mode and speed of the connected interface on the peer device.
Step 6 Run display interface [interface name] to check the status of the interface on the GGSN9811,
for example, check whether the interface is shut down, whether the duplex mode is correct, and
whether the operating mode and speed of the interface are the same as the operating mode and
speed of the connected interface on the peer device.
l
No -> Step 7
Step 7 Run duplex to set the operating mode of the interface. Run speed to set the speed of the interface.
If current state of the interface is Administratively down, run undo shutdown to enable the
interface. Then, check whether this alarm is cleared.
l
Cleared, indicating that the alarm is caused by the incorrect settings of the operating mode
and speed of the interface -> End
Related Information
None
14-2
Issue 02 (2009-06-30)
15
Description
I. Description
The alarm occurs when the available license file is not activated.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0601
Minor
Fault
III. Parameters
None
Impact on System
None
Possible Causes
The available license file is not activated.
Handling Procedure
Step 1 Apply for a valid license file.
Step 2 Download the valid license file to the GGSN.
Step 3 Activate the valid license file, and then check whether the alarm is cleared.
l
15-1
Step 5 End.
----End
Related Information
None.
15-2
Issue 02 (2009-06-30)
16
Description
I. Description
The alarm occurs when the license expires.
After the license file expires, the users are notified of the remaining trial days of the license file
by the alarm location message.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0602
Minor
Fault
III. Parameters
Name
Meaning
Impact on System
When the alarm occurs, the GGSN can be used 30 days. After 30 days, the GGSN can only
support 10 users.
Possible Causes
The license file expires.
Handling Procedure
Step 1 Apply for a new license file.
Issue 02 (2009-06-30)
16-1
Related Information
None
16-2
Issue 02 (2009-06-30)
17
Description
I. Description
The alarm occurs when the license file is about to expire. The alarm is triggered one month
earlier than "AlM-0602 License overtime". This alarm rises once every day regularly after it is
first triggered until "AlM-0602 License overtime" is triggered.
Users are notified of the remaining days of the license file by the alarm location message.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0603
Minor
Event
III. Parameters
Name
Meaning
Impact on System
None
Possible Causes
The license file is about to expire.
Handling Procedure
Step 1 Apply for a new license file to be used when the current license file expires. Then, check whether
the alarm is cleared.
Issue 02 (2009-06-30)
17-1
Related Information
None
17-2
Issue 02 (2009-06-30)
18
Description
I. Description
The alarm occurs when the license file is illegally activated.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0604
Minor
Fault
III. Parameters
Name
Meaning
Impact on System
None
Possible Causes
The license file is illegally activated.
Handling Procedure
Step 1 Apply for a valid license file.
Step 2 Download the valid license file to the GGSN.
Step 3 Activate the valid license file, and then check whether the alarm is cleared.
Issue 02 (2009-06-30)
18-1
Related Information
None
18-2
Issue 02 (2009-06-30)
19
Description
I. Description
The alarm occurs when the ESN of the license file is invalid.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0605
Minor
Fault
III. Parameters
None
Impact on System
None
Possible Causes
The ESN of the license file is invalid.
Handling Procedure
Step 1 Apply for a license file whose ESN is consistent with that of the GGSN.
Step 2 Download the new license file to the GGSN.
Step 3 Activate the new license file, and then check whether the alarm is cleared.
l
19-1
Step 5 End.
----End
Related Information
None
19-2
Issue 02 (2009-06-30)
20
Description
I. Description
The alarm occurs when the configuration of the license file degrades.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0606
Minor
Event
III. Parameters
Name
Meaning
Newcfg
Oldcfg
Impact on System
None
Possible Causes
The configuration of the license file may degrade.
Handling Procedure
Step 1 Check whether the configuration degradation of the configuration items in the license file is
valid.
Issue 02 (2009-06-30)
20-1
Related Information
None
20-2
Issue 02 (2009-06-30)
21
Description
I. Description
If the Eth-trunk interfaces work in active/standby mode, the active Eth-trunk interface sends
ARP packets to probe the peer device. The alarm occurs if the number of probe failure times
reaches the configured threshold of link failure. In such a case, the active link is considered
faulty, and the active and standby Eth-trunk interfaces are switched.
After the active and standby Eth-trunk interfaces are switched, the fault alarm about the original
active Eth-trunk interface persists if the new active link works normally. This is because the
original Eth-trunk interface used for sending ARP packets becomes the standby Eth-trunk
interface. The original active Eth-trunk interface reverts to the active state only if the new active
link is faulty and the Eth-trunk interfaces are switched again. The alarm is cleared when the peer
device is probed with ARP packets.
After this alarm occurs, manually clear this alarm after the fault of the original active link is
rectified and it reverts to the normal state.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0610
Major
Fault
III. Parameters
Issue 02 (2009-06-30)
Name
Meaning
Peer IP address
21-1
Impact on System
When the alarm occurs, the link connection between faulty interface of the GGSN and the peer
end breaks down. If the communication can be realized through another interface, the GGSN
can maintain communication with the peer end. Otherwise, the communication fails.
Possible Causes
l
The network cables of the GGSN that connect the LAN Switch are faulty.
The port of the LAN Switch that connects with the GGSN is faulty.
The port of the LAN Switch that connects with the peer device is faulty.
The network cables of the peer device that connect with the LAN Switch are faulty.
Handling Procedure
Step 1 Probe a normal peer device through a port of the GGSN. Check whether the communication is
normal. If yes, it indicates that the GGSN is normal. Probe another peer device. If the peer device
is abnormal, clear the fault. If the peer device is normal, proceed with the following step.
Step 2 Check whether the network cables are normal. If not, replace the faulty network cables. If the
network cables are normal, proceed with the following step.
Step 3 Check whether the related ports of the LAN Switch and the LAN Switch are normal. If not,
replace the faulty ports or the LAN Switch. If yes, proceed with the following step.
Step 4 Check whether the ports of the GGSN are normal. If not, replace the faulty ports or the
corresponding LPU. If yes, proceed with the following step.
Step 5 Contact Huawei Technical Support.
Step 6 End.
----End
Related Information
None
21-2
Issue 02 (2009-06-30)
22
Description
I. Description
If the number of failure times reaches the configured threshold of link failure when the GGSN
probes the peer end with ARP through an eth-trunk interface, the corresponding link is
considered to be faulty. Then, the alarm occurs. The alarm is cleared when the active and standby
eth-trunk interfaces are switched over and the communication is restored.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0611
Major
Fault
III. Parameters
Name
Meaning
Peer IP address
Impact on System
When the alarm occurs, the communication between the GGSN and the IP address of the peer
end fails.
Possible Causes
l
The network cables of the GGSN that connect the LAN Switch are faulty.
Issue 02 (2009-06-30)
22-1
The port of the LAN Switch that connects with the GGSN is faulty.
The port of the LAN Switch that connects with the peer device is faulty.
The network cables of the peer device that connect with the LAN Switch are faulty.
Handling Procedure
Step 1 Probe a normal peer device through a port of the GGSN. Check whether the communication is
normal. If yes, it indicates that the GGSN is normal. Probe another peer device. If the peer device
is abnormal, clear the fault. If the peer device is normal, proceed with the following step.
Step 2 Check whether the network cables are normal. If not, replace the faulty network cables. If the
network cables are normal, proceed with the following step.
Step 3 Check whether the related ports of the LAN Switch and the LAN Switch are normal. If not,
replace the ports or the LAN Switch. If yes, proceed with the following step.
Step 4 Check whether the ports of the GGSN are normal. If not, replace the faulty ports or the
corresponding LPU. If yes, proceed with the following step.
Step 5 Contact Huawei Technical Support.
Step 6 End.
----End
Related Information
None
22-2
Issue 02 (2009-06-30)
23
Description
I. Description
When the GGSN connects with all the configured NTP servers and requests network time
synchronization, it cannot receive any response from the NTP servers. Then, the alarm occurs.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0618
Minor
Fault
III. Parameters
None
Impact on System
When no NTP server responds, the system time of the GGSN cannot synchronize with the
network time of the NTP servers. Thus, the time precision of the GGSN cannot be guaranteed.
Possible Causes
l
Handling Procedure
Step 1 Run display ntp-service sessions to check whether any NTP server is configured.
l
No -> (2)
Issue 02 (2009-06-30)
23-1
Step 2 Run ntp-service unicast-server to configured an NTP server. Then, check whether the alarm
is cleared.
l
Step 3 Run display ntp-service status to check the clock status of the NTP server.
l
Step 4 Ping the IP address of the configured NTP server on the GGSN.
Step 5 Check whether the configured NTP server is consistent with that actually used.
l
Step 6 Check whether another configurable NTP server is available for network time synchronization
of the GGSN.
l
No -> (8)
Step 7 Run ntp-service unicast-server to modify the configurations of the NTP server. Then, check
whether the alarm is cleared.
l
Related Information
None
23-2
Issue 02 (2009-06-30)
24
Description
I. Description
The input voltage of the rack is -48 V of two channels. The alarm occurs when the voltage of
one channel exceeds the preset upper limit or is lower than the preset lower limit. If the voltages
of two channels both exceed the range of the preset upper and lower limits, two alarms are
generated.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0630
Critical
Fault
III. Parameters
Name
Meaning
Slot No.
Impact on System
l
The system adopts a two-channel power module. The subrack can continue working even
if one channel is faulty. In this case, the reliability of the system is affected but the services
are not.
If two alarms are generated at the same time for both channels, the GGSN may be restarted
and the services may thus be interrupted.
Possible Causes
l
Issue 02 (2009-06-30)
The -48V feeder cables of the path to the power distribution box are loose.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
24-1
The voltage of the -48 V power circuit on the power distribution box is lower than the preset
lower limit.
The voltage of the -48 V power circuit on the power distribution box is higher than the
preset upper limit.
Handling Procedure
Step 1 Check whether the connection of the -48 V feeder cables of the path to the power distribution
box is normal.
l
Step 2 Check whether the voltage of the power circuit on the power distribution box exceeds the range
of the preset lower and upper limits by using a voltmeter.
l
No -> (3)
Step 3 Replace the monitoring board of the power distribution box. Then, check whether the alarm is
cleared.
l
Step 4 Connect the -48 V feeder cables properly, and then check whether the alarm is cleared.
l
Step 5 Contact the management personnel of the equipment room to clear the fault of the power supply
network. Then, check whether the alarm is cleared.
l
Step 6 Query whether the threshold of the maximum input voltage is between 55 V and 59 V, and
whether the threshold of the minimum input voltage is between 41 V and 45 V. If not, adjust
the thresholds.
l
Related Information
None
24-2
Issue 02 (2009-06-30)
25
Description
I. Description
The alarm occurs when any switch is off.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0631
Critical
Fault
III. Parameters
Name
Meaning
Slot No.
Impact on System
Some devices cannot be powered on or the power supply status is abnormal. This may damage
the devices and affect the services.
Possible Causes
l
The Boolean value output sensor of the power distribution box is faulty.
Handling Procedure
Step 1 According to the operation documents, check whether the switches of the power distribution
box are correctly set.
l
Issue 02 (2009-06-30)
25-1
Step 2 Set the switches correctly, and then check whether the alarm is cleared.
l
Step 3 Replace the monitoring board of the power distribution box. Then, check whether the alarm is
cleared.
l
Related Information
None
25-2
Issue 02 (2009-06-30)
26
Description
I. Description
This alarm is generated when the hard disk utilization reaches the threshold set with running the
alarm threshold hardware-alarm command in the operation and maintenance view.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0632
Major
Fault
III. Parameters
Name
Meaning
Slot No.
Disk type
Alarm threshold
Impact on System
l
Issue 02 (2009-06-30)
2.
The CDRs may not be normally stored, operation logs may be lost, or performance
statistics files may be lost.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
26-1
1.
The log files including performance result files may not be created.
2.
Possible Causes
For the CDR hard disk:
1.
The GGSN and the CG are disconnected, which causes that numerous CDR files are
stored on the hard disk.
2.
Handling Procedure
Step 1 Run display cg to check whether the CG works normally.
l
Abnormal ->(6)
Normal ->(2)
Step 2 Run the ping command to check whether the connection between the GGSN and the CG is
normal.
l
Abnormal ->(3)
Normal ->(4)
Step 3 Check whether the physical link between the GGSN and the CG, firewall policy, and routing
configurations are normal.
l
Abnormal ->(2)
Normal ->(4)
Cleared ->(7)
Related Information
None
26-2
Issue 02 (2009-06-30)
27
Description
I. Description
This alarm is generated when the system detects hard disk errors.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0633
Critical
Fault
III. Parameters
Name
Meaning
Slot No.
Disk type
Impact on System
l
Data such as performance statistics and system logs may be lost when this alarm occurs.
After the system detects hard disk errors, if two SRUs are available and they work in active/
standby mode, active/standby switchover of SRUs is triggered when this alarm occurs on
the active SRU.
Possible Causes
The lifetime of the hard disk expires.
Issue 02 (2009-06-30)
27-1
Handling Procedure
Step 1 Replace the faulty SRU with a new SRU.
l
Cleared ->(3)
Related Information
None
27-2
Issue 02 (2009-06-30)
28
Description
I. Description
This alarm is generated when the CPU utilization is greater than the threshold for five consecutive
minutes.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0634
Major
Fault
III. Parameters
Name
Meaning
Slot No.
CPU No.
Alarm threshold
Impact on System
l
The service modules run abnormally. For example, user accesses are restricted.
When the CPU utilization of the SPU is equal to or greater than 80%, the system rejects
any new user access.
Issue 02 (2009-06-30)
28-1
When the CPU utilization of the SRU is equal to or greater than 80%, the link between the
GGSN and the maintenance console may be torn down.
Possible Causes
l
The M2000 downloads data from the GGSN hard disk through the FTP server.
Handling Procedure
Step 1 Stop the FTP service to the M2000, and then check whether the alarm is cleared.
l
Cleared ->(4)
Step 2 Set the CPU overload threshold to a higher value by running the alarm threshold cpu-alarm
command in the operation and maintenance view , and then check whether the alarm is cleared.
l
Cleared ->(4)
Related Information
None
28-2
Issue 02 (2009-06-30)
29
Description
I. Description
When the IPSec tunnel is used and the SA is generated through IKE negotiation, you can check
whether the peer device works normally through the IKE DPD function. After the number of
times that the peer device is not detected through IKE DPD reaches the alarm threshold, the peer
end of the IPSec tunnel is considered faulty. The DPD failure alarm is then generated. The alarm
is cleared after the faulty peer device recovers and IKE negotiation packets are received from
the peer device.
II. Attribute
Alarm ID
Alarm level
Alarm type
0635
Major
Fault
III. Parameters
Name
Meaning
Impact on System
When this alarm is generated, the communication link failure of the IPSec tunnel occurs between
the GGSN9811 and the devices at the peer end of the IPSec tunnel. If the peer end of the IPSec
tunnel is configured with only one device, data transmission through this tunnel is interrupted.
If the peer end of the IPSec tunnel is configured with more than one devices, data is automatically
switched over to another device.
Issue 02 (2009-06-30)
29-1
Possible Causes
l
Handling Procedure
Step 1 Check whether the network cables are normal.
l
No -> (2)
Step 2 Replace the faulty network cables. Then, check whether the alarm is cleared.
l
Step 3 Test whether relevant ports on the LAN Switch and the LAN Switch work normally.
l
No -> (4)
Step 4 Replace the faulty port on the LAN Switch or replace the LAN Switch. Then, check whether
the alarm is cleared.
l
No -> (6)
Step 6 Clear faults of the peer device. Then, check whether the alarm is cleared.
l
Related Information
None.
29-2
Issue 02 (2009-06-30)
30
Description
Description
The alarm occurs when configuration commands fail to be executed during the configuration
restoration process. The system fails to automatically re-run such commands that fail to be
executed. In such a case, you need to run them on the LMT and then clear the alarm.
Attribute
Alarm ID
Severity level
Alarm type
636
Major
Fault
Impact on System
Configurations fail to be restored, and services are interrupted.
Possible Causes
l
The system fails to issue configuration commands after the LPU is restarted or after the
SPU is restarted or switched.
Handling Procedure
Step 1 Check the log file, cfmresult.txt, that stores configurations.
Download the cfmresult.txt file in the /soft/temp directory, and then check whether some
configuration commands fail to be executed.
l
No=> (6)
Issue 02 (2009-06-30)
30-1
Yes =>(3)
No =>(4)
Step 3 Check whether you can successfully run the configuration commands that fail to be executed.
l
No=> (6)
Step 4 Enter the configuration commands correctly, and then check whether they can be executed
successfully.
l
No=> (6)
Step 5 On the LMT, right-click an alarm and select Manually Recover Alarm. Then, check whether the
alarm is cleared.
l
No => (6)
NOTE
The alarm can not be cleared automatically and only can be cleared manually. If the alarm is not cleared
manually, it keeps existing and new alarm is not reported.
Related Information
None
30-2
Issue 02 (2009-06-30)
31
Description
Description
The alarm occurs when the configurations on the active and standby SRUs are checked to be
inconsistent.
Attribute
Alarm ID
Severity level
Alarm type
0637
Major
Fault
Impact on System
When the active and standby SRUs are switched, the restored configurations are inconsistent,
thus resulting in configuration loss. The severity level of configuration loss depends on the
importance of lost configurations.
Possible Causes
During the batch backup process, abnormalities occur, which results in inconsistency of
configurations on the active and standby SRUs.
Handling Procedure
Step 1 On the LMT, run the command that is used to check the consistency of configurations on the
active and standby SRUs.
Run check master-slave-sru current-configuration to check whether the configurations on
the active and standby SRUs are consistent.
l
No =>Step 2
Issue 02 (2009-06-30)
31-1
No =>Step 4
Related Information
None
31-2
Issue 02 (2009-06-30)
32
Description
I. Description
This alarm is generated when the GGSN considers the negotiated tunnel abnormal. The
negotiated tunnel is abnormal if the IKE negotiation fails, if the renegotiation fails after SA
expiration, or if the detection of the IPSec tunnel through the KeepAlive packet fails. This alarm
is cleared after the fault in the tunnel is rectified, the GGSN receives the IKE negotiation packet
from the peer of the IPSec tunnel, and the IKE negotiation succeeds.
II. Attribute
Alarm ID
Severity Level
Alarm Type
638
Major
Fault
III. Parameters
Name
Meaning
Impact on System
If the alarm is generated, the communication link is broken between the GGSN and the peer of
the IPSec tunnel corresponding to the IKE peer generating the alarm. If only one peer is
configured for the IPSec tunnel, data transmission over the tunnel is interrupted. If multiple peers
are configured, the GGSN uses another peer for data transmission.
Issue 02 (2009-06-30)
32-1
Possible Causes
l
Handling Procedure
Step 1 Check whether network cables are normal.
l
No -> Step 2
Step 2 Replace the network cables and then check whether the alarm is cleared.
l
No -> Step 3
Step 3 Check whether the interface connecting the LAN Switch to the GGSN is normal and whether
the LAN Switch is normal.
l
No -> Step 4
Step 4 Use another interface to connect the LAN Switch to the GGSN or replace the LAN Switch. Then,
check whether the alarm is cleared.
l
No -> Step 5
No -> Step 6
Step 6 Rectify the faults on the peer device and then check whether the alarm is cleared.
l
No -> Step 7
Related Information
None
32-2
Issue 02 (2009-06-30)
33
Description
I. Description
This alarm occurs when the subcard is configured in the configuration file, but not installed.
II. Attribute
Alarm ID
Alarm Severity
Alarm Type
639
Minor
Fault
III. Parameters
Name
Meaning
Impact on System
Deep packet inspection (DPI) feature can not be realized. Layer 7 service, such as service
resolution and control and service report, can not be handled.
Possible Causes
The subcard is not installed.
Handling Procedure
Step 1 Manually insert the subbcard. Then, run display device and specify the slot number to check
whether the subcard registers successfully. Then, check whether this alarm is cleared.
l
Issue 02 (2009-06-30)
The subcard registers successfully and this alarm is cleared -> Step 3
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
33-1
The subcard registers successfully but this alarm is not cleared -> Step 2
The subcard fails to register and this alarm is not cleared -> Step 2
Related Information
None.
33-2
Issue 02 (2009-06-30)
34
Description
I. Description
The alarm occurs when the usage of fragment resource exceeds alarm threshold.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
650
Major
Fault
III. Parameters
Name
Meaning
Slot.No
Infomaition
Impact on System
With the alarm ALM-0650,the GTP fragment may be blocked, and the user fragment may not
be charge.
Possible Causes
There are too many fragments.
Handling Procedure
Step 1 Operate the software parameter No.60, No.61.
Issue 02 (2009-06-30)
34-1
Step 2 Waiting for ten minutes, check whether the alarm restore.
l
no => End.
NOTE
Related Information
Software parameter operation reference: Software Parameter Operation Guide.chm
34-2
Issue 02 (2009-06-30)
35
Description
I. Description
The alarm occurs when the invalid operator login on to the NE and the alarm security-alarm
command is enable.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
701
Minor
Fault
III. Parameters
Name
Meaning
Operator
IP address
Impact on System
None
Possible Causes
There is not the operator on the NE.
Handling Procedure
Step 1 Check whether the name of the operator is wrong.
l
Issue 02 (2009-06-30)
35-1
No => (2)
Step 2 Contact the manager, confirm whether need to add this operator.
Step 3 Clear the alarm manually and check whether the alarm occurs again.
l
No => End
NOTE
The alarm can not be cleared automatically and only can be cleared manually. If the alarm is not cleared
manually, it keeps existing and new alarm is not reported.
Related Information
alarm security-alarm
35-2
Issue 02 (2009-06-30)
36
Description
I. Description
This alarm occurs when the operator enter the wrong password for five times when the operator
logs on to the NE and the alarm security-alarm command is enable.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
702
Minor
Fault
III. Parameters
Name
Meaning
Operator
IP address
Times of log on
Impact on System
None
Issue 02 (2009-06-30)
36-1
Possible Causes
The password of the operator is wrong.
Handling Procedure
Step 1 Operator is locked currently. Wait until the locked time is over or contact administrator to unlock
the operator manually.
Step 2 Check whether the password of the operator is wrong.
l
No => Step 3
Step 3 Clear the alarm manually and check whether the alarm occurs again after the operator is
unlocked.
l
No => End
NOTE
The alarm can not be cleared automatically and only can be cleared manually. If the alarm is not cleared
manually, it keeps existing and new alarm is not reported.
Related Information
alarm security-alarm
36-2
Issue 02 (2009-06-30)
37
Description
I. Description
This alarm occurs when operator adds, modifies and deletes the account and the alarm securityalarm command is enable.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
703
Minor
Fault
III. Parameters
Issue 02 (2009-06-30)
Name
Meaning
Operator
IP Address
Change Type
Change Object
37-1
Impact on System
The operator is changed.
Possible Causes
l
Handling Procedure
Step 1 Check whether the specified operator's name that has been added, modified or deleted is right.
l
No => (3)
Step 2 Clear the alarm manually and check whether the alarm occurs again.
l
No => End
Step 3 Modify the name of the operator again. Clear the alarm manually and check whether the alarm
occurs again.
l
No => End
NOTE
The alarm can not be cleared automatically and only can be cleared manually. If the alarm is not cleared
manually, it keeps existing and new alarm is not reported.
If you want to clear the alarm after a long time when the alarm occurs, check the operation log and know
which operations has been done before. Ensure the clear of alarm influences nothing and then clear it.
Related Information
alarm security-alarm
37-2
Issue 02 (2009-06-30)
38
Description
I. Description
This alarm occurs when operator queries, upload or download the operation log and security log
and the alarm security-alarm command is enable.
II. Attribute
Alarm ID
Severity level
Alarm type
704
Minor
Fault
III. Parameters
Name
Meaning
Operator
IP Address
Impact on System
None
Issue 02 (2009-06-30)
38-1
Possible Causes
Query, upload or download the operation log and security log.
Handling Procedure
Step 1 Check whether the operator do the operation of log correctly.
l
No => (3)
Step 2 Clear the alarm manually and check whether the alarm occurs again.
l
No => End
NOTE
The alarm can not be cleared automatically and only can be cleared manually. If the alarm is not cleared
manually, it keeps existing and new alarm is not reported.
Step 3 Do the operation of log again. Clear the alarm manually and check whether the alarm occurs
again.
l
No => End
Related Information
alarm security-alarm
38-2
Issue 02 (2009-06-30)
39
Description
I. Description
This alarm occurs when operator executes commands exceeding his authority and the alarm
security-alarm command is enable.
II. Attribute
Alarm ID
Severity level
Alarm type
705
Minor
Fault
III. Parameters
Name
Meaning
Operator
IP Address
Impact on System
None
Issue 02 (2009-06-30)
39-1
Possible Causes
Executes commands exceeding authority.
Handling Procedure
Step 1 Check whether the operator executes the unauthorized commands by mistake.
l
No => (3)
Step 2 Clear the alarm manually and check whether the alarm occurs again.
l
No => End
NOTE
The alarm can not be cleared automatically and only can be cleared manually. If the alarm is not cleared
manually, it keeps existing and new alarm is not reported.
Step 3 Provide the operator with higher level of control authority. Clear the alarm manually and check
whether the alarm occurs again.
l
No => End
Related Information
alarm security-alarm
39-2
Issue 02 (2009-06-30)
40
Description
The alarm occurs when the number of activated PDP contexts specific to a license resource
control item is equal to or greater than 90% of the number supported by the license resource
control item. The alarm is cleared when the number of activated PDP contexts decreases to 80%
of the number supported by the license resource control item.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0801
Major
Fault
Parameters
Name
Meaning
Feature name
Impact on System
l
If new license resources are unavailable, all new PDP context activation requests are
rejected after the number of activated PDP contexts specific to a license resource control
item increases to the number supported by the license resource control item.
Possible Causes
l
The number of activated PDP contexts specific to a license resource control item is about
to increase to the number supported by the license resource control item.
Handling Procedure
Step 1 Contact Huawei Technical Support to obtain a new license.
----End
Issue 02 (2009-06-30)
40-1
Related Information
None
40-2
Issue 02 (2009-06-30)
41
Description
The alarm occurs when the number of activated PDP contexts specific to a license resource
control item increases to the number supported by the license resource control item. The alarm
is cleared when the number of activated PDP contexts decreases to 90% of the number supported
by the license resource control item.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0802
Critical
Fault
Parameters
Name
Meaning
Feature name
Impact on System
l
All new PDP context activation requests are rejected after the number of activated PDP
contexts specific to a license resource control item increases to the number supported by
the license resource control item.
Possible Causes
l
The number of activated PDP contexts specific to a license resource control item increases
to the number supported by the license resource control item.
Handling Procedure
Step 1 Contact Huawei Technical Support to obtain a new license.
----End
Issue 02 (2009-06-30)
41-1
Related Information
None
41-2
Issue 02 (2009-06-30)
42
Description
The alarm occurs when the GTP-C path between the GGSN9811 and the SGSN is disconnected.
The GTP-C path is considered as disconnected if the following occurs: After sending or
resending an Echo Request message at a certain interval, the GGSN9811 does not receive an
Echo Response message or receives an incorrect Echo Response message from the SGSN within
the specific number of times. The interval and number of times for resending Echo Request
messages can be set.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0803
Critical
Fault
Name
Meaning
Slot No.
Specifies the number of the slot where the board generating the alarm
is located.
CPU No.
Specifies the number of the CPU where the disconnected GTP-C path
is processed.
Parameters
Signalling path local IP Specifies the local IP address of the faulty GTP-C path.
Signalling path peer IP Specifies the peer IP address of the faulty GTP-C path.
Protocol version
Specifies the protocol version that the faulty GTP-C path complies
with.
l
0: GTPv0
1: GTPv1
Impact on System
l
Issue 02 (2009-06-30)
42-1
If both the function of sending GTP-C Echo Request messages and the function of
deactivating contexts are enabled, contexts are deactivated after the duration for which the
GTP-C path is disconnected exceeds the set duration.
Possible Causes
l
The transmission line that connects the GGSN9811 and the SGSN is disconnected.
After sending Echo Request messages, the GGSN9811 discards Echo Response messages
returned by the SGSN if they are incorrect.
After sending Echo Request messages, the SGSN fails to send Echo Response messages
to the GGSN9811.
Handling Procedure
Step 1 Check whether alarms such as the board fault alarm, physical line down alarm, CPU overload
alarm, interface-probe fault alarm, or IP-probe fault alarm are reported to the LMT.
l
Yes -> Clear the generated alarms by referring to the help specific to the alarms.
No -> Step 2
CAUTION
l
In the case that the GGSN9811 is connected with multiple SGSNs, proceed to the fault
location if only the GTP-C path under one APN is disconnected; go to Step 7 if more than
one GTP-C paths are disconnected.
Step 2 Run ping [-vpn-instance vpn-instance-name] [-a IP address of the Gn interface] host (IP
address of the SGSN). Check whether all response messages are received after ping request
messages are sent.
CAUTION
l
The IP address of the SGSN can be obtained from the alarm information.
If firewalls or routers are deployed between the GGSN9811 and the SGSN, check whether
the interworking between them is normal and whether the firewalls or routers function
properly.
Check whether the IP address of the Gn interface on the GGSN9811 is set correctly.
Step 3 Run display interface to check whether the IP address of Gn interface is set correctly.
42-2
Issue 02 (2009-06-30)
No -> Step 4
Step 4 Run interface gnif to set the IP address for the Gn interface. Activate a user, and then check
whether the alarm is cleared.
l
Cleared, indicating that the alarm is caused by the incorrect IP address setting for the Gn
interface on the GGSN9811 -> End
No -> Step 5
Check whether the routes to the SGSN are configured correctly on the GGSN9811.
Step 5 Run display ip routing-table [vpn-instance vpn-instance-name] to check whether the routes
to the SGSN are configured correctly on the GGSN9811. Ensure that the entered VPN instance
name is correct.
l
No -> Step 6
Step 6 Run undo ip route-static and ip route-static to modify the routing table on the GGSN9811.
Activate a user, and then check whether this alarm is cleared.
l
Cleared, indicating that the alarm is caused by the routes between the GGSN9811 and the
SGSN -> End
Check whether the operating mode and speed of the interface on the LPU of the GGSN9811
for interworking the SGSN are the same as the operating mode and speed of the connected
interface on the peer switch.
Step 7 Run display interface (physical interface on the LPU of the GGSN9811 for interworking the
SGSN) to check whether the operating mode and speed of the physical interface on the LPU of
the GGSN9811 are the same as the operating mode and speed of the connected interface on the
peer switch.
l
No -> Step 8
Step 8 Run duplex and speed on the GGSN9811 to set the operating mode and speed of the interface
on the LPU of the GGSN9811. Activate a user, and then check whether this alarm is cleared.
l
Cleared, indicating that the alarm is caused by the incorrect settings of the operating mode
and speed for the physical interface -> End
Check whether the physical interface on the LPU of the GGSN9811 for interworking the
SGSN is normal.
Step 9 Run display interface (physical interface on the LPU of the GGSN9811 for interworking the
SGSN) to check whether the interface is normal.
Check whether both current state and Line protocol current state of the interface are UP. If
yes, it indicates that the interface is normal. If either current state or Line protocol current
state of the interface is DOWN, it indicates that the interface is abnormal.
Issue 02 (2009-06-30)
42-3
CAUTION
If current state of the interface is Administratively down, run undo shutdown to enable the
interface.
l
No -> Step 10
Cleared, indicating that the alarm is caused by the loose connection of the network cable
or optical fiber -> End
Step 11 Replace the network cable or optical fiber. Activate a user, and then check whether the alarm is
cleared.
l
Cleared, indicating that the alarm is caused by network cable or optical fiber faults -> End
Check whether the transmission channel between the GGSN9811 and the SGSN is normal.
Step 12 Contact the technical support engineers of the SGSN to capture packets on the SGSN. Through
the captured packets, check whether the GTP-C Echo Request messages sent by the GGSN9811
can reach the SGSN.
l
No, indicating that the alarm is caused by the transmission failure between the GGSN9811
and the SGSN -> Step 18
Step 13 Contact the technical support engineers of the SGSN to capture packets on the SGSN. Through
the captured packets, check whether the SGSN replies with an Echo Response message each
time receiving a GTP-C Echo Request message from the GGSN9811.
l
No -> Step 15
Check whether the communication between the GGSN9811 and the SGSN is stable.
Step 14 On the LMT, capture packets transferred over the Gn interface to check whether an Echo
Response message is received each time a GTP-C Echo Request message is sent by the
GGSN9811.
l
Yes, indicating that the alarm is caused by packet loss due to network congestion between
the GGSN9811 and the SGSN -> Step 18
No, indicating that the alarm is caused by packet loss due to incorrect policy settings for
the firewalls or routers in the network between the GGSN9811 and the SGSN -> Step 18
Issue 02 (2009-06-30)
No, indicating that the alarm is caused by the SGSN -> Step 17
Related Information
Run t3-timer to set the interval for and number of times for resending Echo Request messages.
The parameter t3-timer indicates the interval for resending Echo Request messages if the
GGSN9811 does not receive Echo Response messages from the SGSN. The value of this
parameter is expressed in seconds. The parameter n3-times indicates the maximum number of
times that the GGSN9811 resends Echo Request messages if the GGSN9811 does not receive
Echo Response messages from the SGSN.
Issue 02 (2009-06-30)
42-5
43
Description
The alarm occurs when the GTP-U path between the GGSN9811 and the SGSN is disconnected.
The GTP-U path is considered as disconnected if the following occurs: After sending or
resending an Echo Request message at a certain interval, the GGSN9811 does not receive an
Echo Response message or receives an incorrect Echo Response message from the SGSN within
the specific number of times. The interval and number of times for resending Echo Request
messages can be set.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0804
Critical
Fault
Name
Meaning
Slot No.
Specifies the number of the slot where the board generating the alarm
is located.
CPU No.
Parameters
Data path local address Specifies the local IP address of the faulty GTP-U path.
Data path peer address Specifies the peer IP address of the faulty GTP-U path.
Protocol version
Specifies the protocol version that the faulty GTP-U path complies
with.
l
0: GTPv0
1: GTPv1
Impact on System
l
Issue 02 (2009-06-30)
43-1
If both the function of sending GTP-U Echo Request messages and the function of
deactivating contexts are enabled, contexts are deactivated after the duration for which the
GTP-U path is disconnected exceeds the set duration (30 minutes, by default).
Possible Causes
l
The transmission line that connects the GGSN9811 and the SGSN is disconnected.
After sending Echo Request messages, the GGSN9811 discards Echo Response messages
returned by the SGSN if they are incorrect.
After sending Echo Request messages, the SGSN fails to send Echo Response messages
to the GGSN9811.
Handling Procedure
Step 1 Check whether alarm such as the board fault alarm, physical line down alarm, CPU overload
alarm, interface-probe fault alarm, and IP-probe fault alarm is generated on the LMT.
l
Yes -> Clear the generated alarms by referring to the help specific to the alarms.
No -> Step 2
CAUTION
l
In the case that the GGSN9811 is connected with multiple SGSNs, proceed to the fault
location if only the GTP-U path under one APN is disconnected; go to Step 7 if more than
one GTP-U paths are disconnected.
Step 2 Run ping [-vpn-instance vpn-instance-name] [-a IP address of the Gn interface] host (IP
address of the SGSN) . Check whether all response messages are received after ping request
messages are sent.
CAUTION
l
The IP address of the SGSN can be obtained from the alarm information.
If firewalls or routers are deployed between the GGSN9811 and the SGSN, check whether
the interworking between them is normal and whether the firewalls or routers function
properly.
Check whether the IP address of the Gn interface on the GGSN9811 is set correctly.
Step 3 Run display interface gnif to check whether the IP address of Gn interface is set correctly.
43-2
Issue 02 (2009-06-30)
No -> Step 4
Step 4 Run interface gnif to set the IP address for the Gn interface. Activate a user, and then check
whether the alarm is cleared.
l
Cleared, indicating that the alarm is caused by the incorrect IP address setting for the Gn
interface on the GGSN9811 -> End
Check whether the routes to the SGSN are configured correctly on the GGSN9811.
Step 5 Run display ip routing-table [vpn-instance vpn-instance-name] to check whether the routes
to the SGSN are configured correctly on the GGSN9811. Ensure that the entered VPN instance
name is correct.
l
No -> Step 6
Step 6 Run undo ip route-static and ip route-static to modify the routing table on the GGSN9811.
Activate a user, and then check whether the alarm is cleared.
l
Cleared, indicating that the alarm is caused by the routes between the GGSN9811 and the
SGSN -> End
Check whether the operating mode and speed of the interface on the LPU of the GGSN9811
for interworking the SGSN are the same as the operating mode and speed of the connected
interface on the peer switch.
Step 7 Run display interface (physical interface on the LPU of the GGSN9811 for interworking the
SGSN) to check whether the operating mode and speed of the physical interface on the LPU of
the GGSN9811 are the same as the operating mode and speed of the connected interface on the
peer switch.
l
No -> Step 8
Step 8 Run duplex and speed on the GGSN9811 to set the operating mode and speed for the physical
interface on the LPU of the GGSN9811. Activate a user, and then check whether the alarm is
cleared.
l
Cleared, indicating that the alarm is caused by the incorrect settings of the operating mode
and speed for the physical interface -> End
Check whether the physical interface on the LPU of the GGSN9811 for interworking the
SGSN is normal.
Step 9 Run display interface (physical interface on the LPU of the GGSN9811 for interworking the
SGSN) to check whether the interface is normal.
Check whether both current state and Line protocol current state of the interface are UP. If
yes, it indicates that the interface is normal. If either current state or Line protocol current
state of the interface is DOWN, it indicates that the interface is abnormal.
Issue 02 (2009-06-30)
43-3
CAUTION
If current state of the interface is Administratively down, run undo shutdown to enable the
interface.
l
No -> Step 10
Cleared, indicating that the alarm is caused by the loose connection of the network cable
or optical fiber -> End
Step 11 Replace the network cable or optical fiber. Activate a user, and then check whether the alarm is
cleared.
l
Cleared, indicating that the alarm is caused by network cable or optical fiber faults -> End
Check whether the transmission channel between the GGSN9811 and the SGSN is normal.
Step 12 Contact the technical support engineers of the SGSN to capture packets on the SGSN. Through
the captured packets, check whether the GTP-U Echo Request messages sent by the GGSN9811
can reach the SGSN.
l
No, indicating that the alarm is caused by the transmission failure between the GGSN9811
and the SGSN -> Step 18
Step 13 Contact the technical support engineers of the SGSN to capture packets on the SGSN. Through
the captured packets, check whether the SGSN replies with an Echo Response message each
time receiving a GTP-U Echo Request message from the GGSN9811.
l
No -> Step 15
Check whether the communication between the GGSN9811 and the SGSN is stable.
Step 14 On the LMT, capture packets transferred over the Gn interface to check whether an Echo
Response message is received each time a GTP-U Echo Request message is sent by the
GGSN9811.
l
Yes, indicating that the alarm is caused by packet loss due to network congestion between
the GGSN9811 and the SGSN -> Step 18
No, indicating that the alarm is caused by packet loss due to incorrect policy settings for
the firewalls or routers in the network between the GGSN9811 and the SGSN -> Step 18
Issue 02 (2009-06-30)
No, indicating that the alarm is caused by the SGSN -> Step 17
Related Information
Run t3-timer to set the interval for and number of times for resending Echo Request messages.
The parameter t3-timer indicates the interval for resending Echo Request messages if the
GGSN9811 does not receive Echo Response messages from the SGSN. The value of this
parameter is expressed in seconds. The parameter n3-times indicates the maximum number of
times that the GGSN9811 resends Echo Request messages if the GGSN9811 does not receive
Echo Response messages from the SGSN.
Issue 02 (2009-06-30)
43-5
44
Description
I. Description
The alarm occurs when the utilization of the local address pool bound to an APN exceeds the
specific threshold.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0805
Major
Fault
III. Parameters
Name
Meaning
The APN
Alarm threshold
Impact on System
When the utilization of the local address pool bound to an APN reaches 100%, new users under
this APN cannot be activated.
Possible Causes
l
Issue 02 (2009-06-30)
The number of addresses configured in the address pool bound to this APN is small.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
44-1
Handling Procedure
Step 1 Run display alarm-threshold pool to check whether the alarm threshold is lower than 80%.
l
No -> (2)
Step 2 Run display address-pool to check the usage of the address pool bound to the APN.
l
If the utilization of the address pool is higher than the alarm threshold -> (3)
Step 3 Run ip pool to configure the address pool, and then run address-pool under the APN to bind
this address pool to the APN.
l
The configuration fails and the address segments are exhausted -> (5)
Step 4 Run the set alarm pool command in the access viewto re-set the alarm threshold of the capacity
of the address pool.
l
Step 5 Run display user-number to check whether users exist under some APNs.
l
No -> (6)
Step 6 Run undo address-pool to release the binding relations between the APNs with no users and
the bound address pools. Check whether the operation succeeds.
l
No -> (7)
No -> (8)
Related Information
None
44-2
Issue 02 (2009-06-30)
45
Description
The alarm occurs when the communication path between the GGSN9811 and the RADIUS
authentication server is disconnected. The communication path is considered as disconnected if
the following occurs: After sending or resending an authentication request message at a certain
interval, the GGSN9811 does not receive an authentication response message from the RADIUS
authentication server within the specific number of times. The interval and number of times for
resending authentication request messages can be set.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0806
Major
Fault
Parameters
Name
Meaning
Slot No.
Specifies the number of the slot where the board generating the alarm is
located.
CPU No.
RADIUS Server IP Specifies the IP address of the RADIUS authentication server generating
the alarm.
VPN
Impact on System
l
Issue 02 (2009-06-30)
If a user is configured with only one RADIUS authentication server, the user cannot be
authenticated or access services when the alarm is generated.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
45-1
Possible Causes
l
The parameters related to the RADIUS authentication server, such as the IP address, port
number, key, and bound VPN, are set incorrectly on the GGSN9811.
The parameters for interworking with the GGSN9811 are set incorrectly on the RADIUS
authentication server.
The transmission between the GGSN9811 and the RADIUS authentication server is
interrupted.
Routes to the RADIUS authentication server are configured incorrectly on the GGSN9811.
Congestion occurs in the network between the GGSN9811 and the RADIUS authentication
server.
Handling Procedure
Step 1 Check whether alarms such as the board fault alarm, physical line down alarm, CPU overload
alarm, interface-probe fault alarm, or IP-probe fault alarm are reported to the LMT.
l
Yes -> Clear the generated alarms by referring to the help specific to the alarms.
No -> Step 2
Check whether the GGSN9811 communicates with the RADIUS authentication server
normally.
CAUTION
l
In the case that the GGSN9811 is connected with multiple RADIUS authentication servers,
proceed to the fault location if only the RADIUS authentication server under one APN does
not respond; go to Step 7 if more than one RADIUS authentication servers do not respond.
CAUTION
l
The IP address of the RADIUS authentication server can be obtained from the alarm
information.
If firewalls or routers are deployed between the GGSN9811 and the RADIUS authentication
server, check whether the interworking between them is normal and whether the firewalls or
routers function properly.
l
45-2
Issue 02 (2009-06-30)
Check whether the parameters related to the RADIUS authentication server are set
correctly on the GGSN9811.
Step 3 Run display radius-server group to check whether the IP address, port number, key, and bound
VPN of the RADIUS authentication server are set correctly on the GGSN9811.
l
No -> Step 4
Step 4 Run radius-server authentication to set the IP address, port number, key, and bound VPN for
the RADIUS authentication server. Activate a user, and then check whether the alarm is cleared.
l
Cleared, indicating that the alarm is generated because the parameters related to the
RADIUS authentication server are set incorrectly on the GGSN9811 -> End
Check whether the routes to the RADIUS authentication server are configured correctly
on the GGSN9811.
Step 5 Run display ip routing-tablevpn-instancevpn-instance-name to check whether the routes to
the RADIUS authentication server are configured correctly on the GGSN9811. Ensure that the
entered VPN instance name is correct.
l
No -> Step 6
Step 6 Run undo ip route-static and ip route-static to modify the routing table on the GGSN9811.
Activate a user, and then check whether the alarm is cleared.
l
Cleared, indicating that the alarm is caused by the routes between the GGSN9811 and the
RADIUS authentication server -> End
Check whether the operating mode and speed of the interface on the LPU of the GGSN9811
for interworking with the RADIUS authentication server are the same as the operating
mode and speed of the connected interface on the peer switch.
Step 7 Run display interface to check whether the operating mode and speed of the physical interface
on the LPU of the GGSN9811 for interworking the RADIUS authentication server are the same
as the operating mode and speed of the connected interface on the peer switch.
l
No -> Step 8
Step 8 Run duplex and speed on the GGSN9811 to set the operating mode and speed of the interface
on the LPU of the GGSN9811. Activate a user, and then check whether the alarm is cleared.
l
Cleared, indicating that the alarm is caused by the incorrect settings of the operating mode
and speed for the physical interface -> End
Check whether the physical interface on the LPU of the GGSN9811 for interworking the
RADIUS authentication server is normal.
Step 9 Run display interfacephysical interface on the LPU of the GGSN9811 for interworking the
RADIUS authentication server to check whether the interface is normal.
Check whether both current state and Line protocol current state of the interface are UP. If
yes, it indicates that the interface is normal. If either current state or Line protocol current
state of the interface is DOWN, it indicates that the interface is abnormal.
Issue 02 (2009-06-30)
45-3
CAUTION
If current state of the interface is Administratively down, run undo shutdown to enable the
interface.
l
No -> Step 10
Cleared, indicating that the alarm is caused by the loose connection of the network cable
or optical fiber -> End
Step 11 Replace the network cable or optical fiber. Activate a user, and then check whether the alarm is
cleared.
l
Cleared, indicating that the alarm is caused by network cable or optical fiber faults -> End
Check whether the transmission channel between the GGSN9811 and the RADIUS
authentication server is normal.
Step 12 Contact the technical support engineers of the RADIUS authentication server to capture packets
on the RADIUS authentication server. Through the captured packets, check whether the
RADIUS authentication request packets sent by the GGSN9811 can reach the RADIUS
authentication server.
l
No, indicating that the alarm is caused by the transmission failure between the GGSN9811
and the RADIUS authentication server -> Step 18
Step 13 Contact the technical support engineers of the RADIUS authentication server to capture packets
on the RADIUS authentication server. Through the captured packets, check whether the
RADIUS authentication server replies with an authentication response message each time
receiving an authentication request message from the GGSN9811.
l
No -> Step 15
Check whether the communication between the GGSN9811 and the RADIUS
authentication server is stable.
Step 14 On the LMT, capture packets transferred over the Gi interface to check whether an authentication
response message is received each time an authentication request message is sent by the
GGSN9811.
l
Yes, indicating that the alarm is caused by packet loss due to network congestion between
the GGSN9811 and the RADIUS authentication server -> Step 18
No, indicating that the alarm is caused by packet loss due to incorrect policy setting for the
firewalls or routers between the GGSN9811 and the RADIUS authentication server -> Step
18
Issue 02 (2009-06-30)
Step 15 Contact the technical support engineers of the RADIUS authentication server to check whether
the parameters for interworking with the GGSN9811 are set correctly and whether the
performance of the RADIUS authentication server meets actual requirements.
l
No, indicating that the alarm is caused by the RADIUS authentication server -> Step 17
Related Information
Run radius-server retransmit timeout to set the interval for and number of times for resending
authentication request messages. The parameter retransmit indicates the maximum number of
times that the GGSN9811 resends authentication request messages if the GGSN9811 does not
receive an authentication response message from the RADIUS authentication server. The
parameter timeout indicates the interval for resending authentication request messages if the
GGSN9811 does not receive an authentication response message from the RADIUS
authentication server. The value of this parameter is expressed in seconds.
Issue 02 (2009-06-30)
45-5
46
Description
I. Description
The alarm occurs in the following cases:
l
When the ratio of the number of PDP contexts under an APN to the total number of users
under this APN reaches the PDP access rejection threshold configured in the system, the
alarm occurs and users of a certain level or a certain service level cannot access the network.
The threshold is set through bandwidth-arp.
When the ratio of the bandwidth occupied by the users under an APN to the bandwidth of
this APN reaches the bandwidth rejection threshold configured in the system, users of a
certain level or a certain service level cannot access the network and the alarm occurs. The
threshold is set through pdpnumber-arp.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0807
Major
Fault
III. Parameters
Issue 02 (2009-06-30)
Name
Meaning
Threshold type
The APN
46-1
Name
Meaning
User level
Normal users
Service level
Conversation
Background service
Impact on System
The differentiated service function is not enabled, the PDP rejection threshold or bandwidth
rejection threshold is configured under the APN, and the ratio of the PDP number or occupied
bandwidth of an APN reaches the configured threshold. Then, the alarm occurs, it indicates that
the users of a certain level or a certain service level are rejected to access the network because
of the following reasons. Thus, resources are reserved for high level users. There is no other
impact on the system.
Possible Causes
l
The ratio of the number of PDP contexts under an APN to that of the maximum number of
PDP contexts under the APN is equal to or more than the PDP rejection threshold configured
based on the APN.
The ratio of the occupied bandwidth of an APN to the maximum bandwidth of the APN is
equal to or more than the bandwidth rejection threshold configured based on the APN.
Handling Procedure
Step 1 Run display gtp-support to check whether the differentiated service function is enabled.
46-2
Issue 02 (2009-06-30)
Step 2 Run display bandwidth-arp and display pdpnumber-arp to check the rejection thresholds
configured in the system.
l
Step 3 If the differentiated service function is not used, run gtp-support to disable this function. No
new alarm occurs. The alarm can be automatically cleared based on the service process.
Step 4 If the thresholds are configured based on an APN, run display max-bandwidth and display
max-pdpnumber to check the maximum bandwidth and maximum number of PDP contexts of
the APN.
Step 5 If the configured thresholds are unreasonable,
l
To increase the number used for threshold computing based on an APN -> (6)
Step 6 Run max-bandwidth and max-pdpnumber to check the maximum bandwidth and maximum
number of PDP contexts of the APN respectively. If the modified value is smaller than the
threshold, check whether the alarm is cleared.
l
Step 7 Run bandwidth-arp and pdpnumber-arp to increase the rejection thresholds, and then check
whether the alarm is cleared.
l
Step 8 Generation of the alarm is a normal condition. You do not need to clear the alarm. When the
number of PDP contexts or occupied bandwidth of the APN decreases to the clearance threshold,
users can normally access the network and the alarm is cleared.
Step 9 Contact Huawei Technical Support.
Step 10 End.
----End
Related Information
None
Issue 02 (2009-06-30)
46-3
47
Description
I. Description
The alarm occurs in the following cases:
l
The alarm occurs when the threshold set for the differentiated services is reached.
When the ratio of the number of PDP contexts to the total number of users in the system
reaches the PDP access rejection threshold configured, users of a certain level or a certain
service level cannot access the network. The threshold is set through pdpnumber-arp.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0808
Major
Fault
III. Parameters
Issue 02 (2009-06-30)
Name
Meaning
User level
Normal users
47-1
Name
Meaning
Service level
Conversation
Background service
Impact on System
l
The ratio of the number of PDP contexts to the total number of users reaches the configured
threshold.
The users of a certain level or a certain service level are rejected to access the network.
Thus, resources are reserved for high level users.
Possible Causes
When the alarm is generated, users of the specific levels may not be able to access the network.
When the ratio of the PDP contexts decreases to the clearance threshold, users can normally
access the network.
Handling Procedure
Step 1 Run display gtp-support to check whether the differentiated service function is enabled.
l
Step 2 Run display pdpnumber-arp to check the rejection threshold configured in the system.
l
If only the threshold based on the user level or service level is configured on the GGSN ->
(3)
Step 3 Run display license config to check the number of PDP contexts that can be supported by the
basic functions.
Step 4 Generation of the alarm is a normal condition. You do not need to clear the alarm. When the
ratio of the number of PDP contexts decreases to the clearance threshold, users can normally
access the network and the alarm is cleared.
47-2
Issue 02 (2009-06-30)
Related Information
None
Issue 02 (2009-06-30)
47-3
48
Description
I. Description
The alarm occurs when the GGSN is disconnected from the BMSC due to communication failure.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0810
Major
Fault
III. Parameters
Name
Meaning
Slot No.
CPU No.
Host name
BMSC IP
Impact on System
When the GGSN and the BMSC are disconnected, the MBMS service cannot proceed. The alarm
is not reported when the BMSC initiates the disconnection.
Possible Causes
The connection between the GGSN and the BMSC fails.
Issue 02 (2009-06-30)
48-1
Handling Procedure
Step 1 Check whether the communication cables between the BMSC and the GGSN are normally
connected.
l
Step 2 Connect the cables properly or replace the faulty cables, and then check whether the alarm is
cleared.
l
Related Information
None
48-2
Issue 02 (2009-06-30)
49
Description
I. Description
This alarm is generated when no downlink data flow of a multicast MBMS session is reported
for a certain consecutive period.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0811
Major
Fault
III. Parameters
Name
Meaning
Slot No.
CPU No.
TMGI
BMSC IP
Group
Impact on System
Multicast data flows are interrupted, and broadcast services stop.
Issue 02 (2009-06-30)
49-1
Possible Causes
l
Abnormalities occur on the link of the BM-SC, for example, the link is torn down or a large
number of packets are lost.
The interfaces of the GGSN are abnormal, which causes receipt failure of downlink
multicast data packets.
Handling Procedure
Step 1 Observe the alarm subsystem to check whether alarms related to the Gi interface are generated.
l
No ->(2)
Yes ->(4)
Step 2 Run the display ip interface command to check the status of the outbound Gi interface.
l
Unavailable ->(3)
Available ->(4)
Step 3 Check whether the network cables are connected to the physical interfaces properly, and check
whether the other ends of the network cables are properly connected to the available NEs such
as routers, switches, and BM-SCs.
Step 4 Run the ping command to check whether the peer BM-SC can be pinged through.
l
No ->(5)
Yes ->(6)
Step 5 If the peer BM-SC cannot be pinged through, perform the following operations:
l
If firewalls are used between the GGSN and the BM-SC, check whether the firewalls are
configured to intercept packets.
Capture packets on each interface on the entire link, and then run the ping command to specify
the NEs that lose packets.
Step 6 Check whether the BM-SC already stops forwarding MBMS multicast data.
l
No ->(8)
Yes ->(7)
Step 7 Consult the personnel from the office or personnel of the BM-SC.
Step 8 Capture packets on the Gi interfaces of the GGSN and BM-SC, as well as on the interfaces of
the intermediate NEs. Specify the NEs that lose packets. Then, consult technical support
personnel of related NEs.
Step 9 Contact Huawei Technical Support.
Step 10 End.
----End
49-2
Issue 02 (2009-06-30)
Related Information
None
Issue 02 (2009-06-30)
49-3
50
Description
The alarm occurs when the communication path between the GGSN9811 and the RADIUS
accounting server is disconnected. The communication path is considered as disconnected if the
following occurs: After sending or resending an accounting request message at a certain interval,
the GGSN9811 does not receive an accounting response message from the RADIUS accounting
server within the specific number of times. The interval and number of times for resending
accounting request messages can be set.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0812
Major
Fault
Parameters
Name
Meaning
Slot No.
Specifies the number of the slot where the board generating the alarm is
located.
CPU No.
Impact on System
l
Issue 02 (2009-06-30)
After the communication path to the RADIUS accounting server is disconnected, the
GGSN9811 cannot send CDRs to the RADIUS accounting server, but the GGSN9811 can
send the CDRs to an available CG.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
50-1
For new access users, the GGSN9811 cannot receive an Accounting Start Response
message after sending an Accounting Start message so that the GGSN9811 deactivates the
contexts of users under the APN by default. To modify the action of the GGSN9811, run
radius acctctrl to set response-timeout to continue. Then, the GGSN9811 does not
deactivate the contexts of the users even if Accounting Start Response messages are not
received.
Possible Causes
l
The RADIUS accounting server is faulty or the performance of the RADIUS accounting
server does not meet actual requirements.
The parameters related to the RADIUS accounting server, such as the IP address, port
number, key, and bound VPN, are set incorrectly on the GGSN9811.
The parameters for interworking with the GGSN9811 are set incorrectly on the RADIUS
accounting server.
The transmission between the GGSN9811 and the RADIUS accounting server is
interrupted.
Congestion occurs in the network between the GGSN9811 and the RADIUS accounting
server.
Routes to the RADIUS accounting server are configured incorrectly on the GGSN9811.
Handling Procedure
Step 1 Check whether alarms such as the board fault alarm, physical line down alarm, CPU overload
alarm, interface-probe fault alarm, or IP-probe fault alarm are reported to the LMT.
l
Yes -> Clear the generated alarms by referring to the help specific to the alarms.
No -> Step 2
Check whether the GGSN9811 communicates with the RADIUS accounting server
normally.
CAUTION
l
In the case that the GGSN9811 is connected with multiple RADIUS accounting servers,
proceed to the fault location if only the RADIUS accounting server under one APN does not
respond; go to Step 7 if more than one RADIUS accounting servers do not respond.
50-2
Issue 02 (2009-06-30)
CAUTION
l
The IP address of the RADIUS accounting server can be obtained from the alarm information.
If firewalls or routers are deployed between the GGSN9811 and the RADIUS accounting
server, check whether the interworking between them is normal and whether the firewalls or
routers function properly.
Check whether the parameters related to the RADIUS accounting server are set correctly
on the GGSN9811.
Step 3 Run display radius-server group to check whether the IP address, port number, key, and bound
VPN of the RADIUS accounting server are set correctly on the GGSN9811.
l
No -> Step 4
Step 4 Run radius-server accounting to set the IP address, port number, key, and bound VPN for the
RADIUS accounting server. Activate a user, and then check whether the alarm is cleared.
l
Cleared, indicating that the alarm is generated because the parameters related to the
RADIUS accounting server are set incorrectly on the GGSN9811 -> End
Check whether the routes to the RADIUS accounting server are configured correctly on
the GGSN9811.
Step 5 Run display ip routing-tablevpn-instancevpn-instance-name to check whether the routes to
the RADIUS accounting server are configured correctly on the GGSN9811. Ensure that the
entered VPN instance name is correct.
l
No -> Step 6
Step 6 Run undo ip route-static and ip route-staticto modify the routing table on the GGSN9811.
Activate a user, and then check whether the alarm is cleared.
l
Cleared, indicating that the alarm is caused by the routes between the GGSN9811 and the
RADIUS accounting server -> End
Check whether the operating mode and speed of the interface on the LPU of the GGSN9811
for interworking the RADIUS accounting server are the same as the operating mode and
speed of the connected interface on the peer switch.
Step 7 Run display interface to check whether the operating mode and speed of the physical interface
on the LPU of the GGSN9811 for interworking the RADIUS accounting server are the same as
the operating mode and speed of the connected interface on the peer switch.
l
No -> Step 8
Issue 02 (2009-06-30)
50-3
Step 8 Run duplex and speed on the GGSN9811 to set the operating mode and speed of the interface
on the LPU of the GGSN9811. Activate a user, and then check whether the alarm is cleared.
l
Cleared, indicating that the alarm is caused by the incorrect settings of the operating mode
and speed for the physical interface -> End
Check whether the physical interface on LPU of the GGSN9811 for interworking the
RADIUS accounting server is normal.
Step 9 Run display interfacephysical interface on the LPU of the GGSN9811 for interworking the
RADIUS accounting server to check whether the interface is normal.
Check whether both current state and Line protocol current state of the interface are UP. If
yes, it indicates that the interface is normal. If either current state or Line protocol current
state of the interface is DOWN, it indicates that the interface is abnormal.
CAUTION
If current state of the interface is Administratively down, run undo shutdown to enable the
interface.
l
No -> Step 10
Cleared, indicating that the alarm is caused by the loose connection of the network cable
or optical fiber -> End
Step 11 Replace the network cable or optical fiber. Activate a user, and then check whether the alarm is
cleared.
l
Cleared, indicating that the alarm is caused by network cable or optical fiber faults -> End
Check whether the transmission channel between the GGSN9811 and the RADIUS
accounting server is normal.
Step 12 Contact the technical support engineers of the RADIUS accounting server to capture packets on
the RADIUS accounting server. Through the captured packets, check whether the RADIUS
accounting request packets sent by the GGSN9811 can reach the RADIUS accounting server.
l
No, indicating that the alarm is caused by the transmission failure between the GGSN9811
and the RADIUS accounting server -> Step 18
Step 13 Contact the technical support engineers of the RADIUS accounting server to capture packets on
the RADIUS accounting server. Through the captured packets, check whether the RADIUS
accounting server replies with an accounting response message each time receiving an
accounting request message from the GGSN9811.
50-4
Issue 02 (2009-06-30)
No -> Step 15
Check whether the communication between the GGSN9811 and the RADIUS accounting
server is stable.
Step 14 On the LMT, capture packets transferred over the Gi interface to check whether an accounting
response message is received each time an accounting request message is sent by the GGSN9811.
l
Yes, indicating that the alarm is caused by packet loss due to network congestion between
the GGSN9811 and the RADIUS accounting server -> Step 18
No, indicating that the alarm is caused by packet loss due to incorrect policy setting for the
firewalls or routers between the GGSN9811 and the RADIUS accounting server -> Step
18
No, indicating that the alarm is caused by the RADIUS accounting server -> Step 17
Related Information
Run radius-server retransmit timeout to set the interval for and number of times for resending
accounting request messages. The parameter retransmit indicates the maximum number of
times that the GGSN9811 resends accounting request messages if the GGSN9811 does not
receive an accounting response message from the RADIUS accounting server. The parameter
timeout indicates the interval for resending accounting request messages if the GGSN9811 does
not receive an accounting response message response from the RADIUS accounting server. The
value of this parameter is expressed in seconds.
Issue 02 (2009-06-30)
50-5
51
Description
I. Description
The alarm occurs when the capacity of the CDR pool exceeds the configured alarm threshold.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0813
Major
Fault
III. Parameters
Name
Meaning
Slot No.
CPU No.
Alarm threshold
Impact on System
l
When a large number of users are actthresholdd, if the threshold for CDR generation is
low, the CDRs generated cannot be reported to the CG in time.
Issue 02 (2009-06-30)
51-1
Possible Causes
l
The configured alarm threshold for the capacity of the CDR pool is low.
Handling Procedure
Step 1 Check whether the CG is normal.
l
Step 2 Check whether the physical links between the GGSN and the CG are normal.
l
Step 3 Recover the physical links. Run display cg-status to check whether the working status of the
CG is normal.
l
Step 5 Run display ip routing-table to check whether the route of the GGSN to the CG is correct.
l
Step 6 Run ip route-static to configure a correct route, and then check whether the alarm is cleared.
l
Step 8 Configure the correct route on the CG to the GGSN, and then check whether the alarm is cleared.
l
Step 9 Run display charge-general-property to check the threshold for CDR generation.
Step 10 Run charge-general-property to increase the threshold for CDR generation, and then check
whether the alarm is cleared.
l
Issue 02 (2009-06-30)
Related Information
None
Issue 02 (2009-06-30)
51-3
52
Description
The alarm occurs when the communication path between the GGSN9811 and the CG is
disconnected. The communication path is considered as disconnected if the following occurs:
After sending or resending an Echo Request message at a certain interval, the GGSN9811 does
not receive an Echo Response message from the CG within the specific number of times. The
interval and number of times for resending Echo Request messages can be set.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0814
Minor
Fault
Parameters
Name
Meaning
Slot No. Specifies the number of the slot where the board generating the alarm is located.
CPU ID Specifies the number of the CPU where the failure of CG charging processing occurs.
CG
Port
Impact on System
l
If another CG of the same type as the faulty CG is available and its communication with
the GGSN9811 is normal, the GGSN9811 redirects CDRs to the CG when the alarm is
generated.
Issue 02 (2009-06-30)
52-1
If the communication paths between the GGSN9811 and all CGs of the same type as the
faulty CG are disconnected, the GGSN9811 cannot send CDRs to a CG in time; instead
the GGSN9811 stores the CDRs in the hard disk of the GGSN9811. If the available capacity
of the hard disk is insufficient, the GGSN9811 discards new CDRs and generates 26
ALM-0632 Insufficient Hard Disk Space.
Possible Causes
l
The CG fails to reply with Echo Response messages within the specific number of resending
times due to fault or performance degradation of the CG.
Congestion occurs in the network between the GGSN9811 and the CG.
Handling Procedure
Step 1 Check whether alarms such as the board fault alarm, physical line down alarm, CPU overload
alarm, interface-probe fault alarm, or IP-probe fault alarm are reported to the LMT.
l
Yes -> Clear the generated alarms by referring to the help specific to the alarms.
No -> Step 2
CAUTION
l
In the case that the GGSN9811 is connected with multiple CGs, proceed to the fault location
if only one CG does not respond; go to Step 7 if more than one CGs do not respond.
CAUTION
l
If firewalls or routers are deployed between the GGSN9811 and the CG, check whether the
interworking between them is normal and whether the firewalls or routers function properly.
Check whether the parameters related to the CG are set correctly on the GGSN9811.
Step 3 Run display cg to check whether the IP address, priority, CG type, and port number of the CG
are set correctly on the GGSN9811.
52-2
Issue 02 (2009-06-30)
No -> Step 4
Step 4 Run cg to set the IP address, priority, CG type, and port number for the CG. Activate a user, and
then check whether the alarm is cleared.
l
Cleared, indicating that the alarm is generated because the parameters related to the CG
are set incorrectly on the GGSN9811 -> End
Check whether the routes to the CG are configured correctly on the GGSN9811.
Step 5 Run display ip routing-tablevpn-instancevpn-instance-name to check whether the routes to
the CG are configured correctly on the GGSN9811. Ensure that the entered VPN instance name
is correct.
l
No -> Step 6
Step 6 Run undo ip route-static and ip route-static to modify the routing table on the GGSN9811.
Activate a user, and then check whether this alarm is cleared.
l
Cleared, indicating that the alarm is caused by the routes between the GGSN9811 and the
CG -> End
Check whether the operating mode and speed of the interface on the LPU of the GGSN9811
for interworking the CG are the same as the operating mode and speed of the connected
interface on the peer switch.
Step 7 Run display interfacephysical interface on the LPU of the GGSN9811 for interworking the
CG to check whether the operating mode and speed of the physical interface on the LPU of the
GGSN9811 for interworking the CG are the same as the operating mode and speed of the
connected interface on the peer switch.
l
No -> Step 8
Step 8 Run duplex and speed on the GGSN9811 to set the operating mode and speed of the interface
on the LPU of the GGSN9811. Activate a user, and then check whether this alarm is cleared.
l
Cleared, indicating that the alarm is caused by the incorrect settings of the operating mode
and speed for the physical interface -> End
Check whether the physical interface on the GGSN9811 for interworking the CG is normal.
Step 9 Run display interfacephysical interface on the LPU of the GGSN9811 for interworking the
CG to check whether the interface is normal.
Check whether both current state and Line protocol current state of the interface are UP. If
yes, it indicates that the interface is normal. If either current state or Line protocol current
state of the interface is DOWN, it indicates that the interface is abnormal.
CAUTION
If current state of the interface is Administratively down, run undo shutdown to enable the
interface.
Issue 02 (2009-06-30)
52-3
No -> Step 10
Cleared, indicating that the alarm is caused by the loose connection of the network cable
or optical fiber -> End
Step 11 Replace the network cable or optical fiber. Activate a user, and then check whether the alarm is
cleared.
l
Cleared, indicating that the alarm is caused by network cable or optical fiber faults -> End
Check whether the transmission channel between the GGSN9811 and the CG is normal.
Step 12 Contact the technical support engineers of the CG to capture packets on the CG. Through the
captured packets, check whether the Echo Request messages sent by the GGSN9811 every
minute can reach the CG.
NOTE
If services are being processed, contact the technical support engineers of the CG to capture packets on the
CG. Through the captured packets, check whether accounting request messages can reach the CG.
No, indicating that the alarm is caused by the transmission failure between the GGSN9811
and the CG -> Step 18
Step 13 Contact the technical support engineers of the CG to capture packets on the CG. Through the
captured packets, check whether the CG replies with an Echo Response message each time
receiving an Echo Request message from the GGSN9811.
NOTE
No -> Step 15
Check whether the communication between the GGSN9811 and the CG is stable.
Step 14 On the LMT, capture packets transferred over the Ga interface to check whether an Echo
Response message is received each time an Echo Request message is sent by the GGSN9811.
Note that the CG may not respond to all accounting request messages.
l
Yes, indicating that the alarm is caused by packet loss due to network congestion between
the GGSN9811 and the CG -> Step 18
No, indicating that the alarm is caused by packet loss due to incorrect policy setting for the
firewalls or routers between the GGSN9811 and the CG -> Step 18
Issue 02 (2009-06-30)
Related Information
Run cg-resend-times to set the number of times for resending GTP' Echo Request messages
and accounting request messages and set the interval for resending accounting request messages.
Set the interval for sending Echo Request messages to 1 minute.
The parameter retransmit indicates the number of times that the GGSN9811 resends GTP' Echo
Request messages and accounting request messages.
NOTE
For Echo Request messages, the parameter retransmit indicates the number of times that the
GGSN9811 resends the GTP' Echo Request message. If the CG does not respond within the set value
of retransmit, the CG is considered as abnormal.
For accounting request messages, the parameter retransmit indicates the maximum number of times
that the GGSN9811 resends the accounting request message to the CG if the CG does not respond.
The parameter timeout indicates the interval for resending accounting request messages if the
GGSN9811 does not receive an accounting response message. The value of this parameter is
expressed in seconds.
Issue 02 (2009-06-30)
52-5
53
Description
I. Description
The alarm occurs when the GGSN receives the GTP' signaling of an incorrect version. The alarm
does not occur again when the interconnection between the GGSN and the CG succeeds.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0815
Minor
Event
III. Parameters
Name
Meaning
Slot No.
CPU No.
CG IP
CG Port
Impact on System
The GGSN does not process the GTP' signaling of an incorrect version.
Issue 02 (2009-06-30)
53-1
Possible Causes
The GGSN receives a GTP' signaling message and the protocol version in the GTP' header is
not V0, V1, or V2.
Handling Procedure
Step 1 Check whether the protocol version of GTP' used by the CG that is connected with the GGSN
is V0, V1, or V2.
l
No -> (2)
Step 2 Run the proper configuration commands on the CG to change the version of GTP' to V0, V1, or
V2. Then, check whether the alarm is cleared.
l
Related Information
None
53-2
Issue 02 (2009-06-30)
54
Description
I. Description
The alarm occurs when the GGSN receives the redirection request sent by the source CG and
the redirection fails. The source CG refers to the CG that sends redirection requests to the GGSN.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0816
Minor
Event
III. Parameters
Name
Meaning
Slot No.
CPU No.
CG IP
CG Port
Impact on System
l
When the CG redirection fails, if no CG whose type is the same as that of the source CG
exists among the CGs that are normally connected with the GGSN, the GGSN stores the
CDRs that are to be directed to such CGs to the hard disk. If the number of stored CDRs
reaches the maximum value, the GGSN discards the CDRs that are newly generated.
When CG redirection fails, the GGSN searches for the CG whose type is the same as that
of the source CG among the CGs that are normally connected with the GGSN. If such a
CG is found, the GGSN redirects the CDRs to the CG. If the GGSN cannot find this CG,
Issue 02 (2009-06-30)
54-1
the GGSN stores the CDRs in the hard disk. If the number of the stored CDRs reaches the
maximum value, the GGSN discards the CDRs that are newly generated.
l
If the communication between the GGSN and the source CG fails, "ALM-0814 The
communications path to CG is down alarm" is generated.
Possible Causes
l
The communication link between the GGSN and the redirection CG is faulty.
The data configuration on the source CG and the corresponding configuration on the GGSN
are not consistent and the AAA authentication server is faulty.
Handling Procedure
Step 1 Run display cg to check whether the redirection CG is configured on the GGSN and the type
of the CG.
l
If the redirection CG is configured and the type of the CG is the same as that of the source
CG -> (2)
If the redirection CG is not configured or if the type of the CG is different from that of the
source CG -> (6)
Step 2 Run display cg-status to check whether the communication between the redirection CG and the
GGSN is normal.
l
Step 3 Check whether the communication cables between the redirection CG and the GGSN are
normally connected.
l
Step 4 Connect the cables properly or replace the faulty cables, and then check whether the alarm is
cleared.
l
Step 6 Run cg to configure a redirection CG on the GGSN. The type of the CG must be the same as
that of the source CG. Then, based on the networking condition, determine whether a route to
the redirection CG needs to be configured through ip route-static.
l
Configuration fails and the CGs are fully configured -> Locate the CGs that can be deleted,
and then run undo cg to delete the CGs -> (6)
54-2
Issue 02 (2009-06-30)
Related Information
None
Issue 02 (2009-06-30)
54-3
55
Description
I. Description
The alarm occurs when the GGSN is disconnected from the OCS, the alarm reason is Connection
lay failure and is cleared when the connection is restored.
The alarm also occurs when the GGSN waiting for CCA from the OCS time out and the amount
of CCA time out has reached the threshold.The alarm reason is Application lay failure. If the
amount of continuously received CCA afterward reaches the threshold, the alarm is cleared.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0817
Critical
Fault
III. Parameters
Issue 02 (2009-06-30)
Name
Meaning
Slot No.
CPU No.
OCS Name
Alarm Reason
55-1
Impact on System
l
The links between the GGSN and the OCSs of the same type are all disconnected.
Connection lay alarm of the OCS will occur and the alarm reason is Connection lay
failure.When the link between the OCS and the GGSN is restored, the alarm is cleared.
When the GGSN waiting for CCA from the OCS time out and the amount of CCA time
out has reached the threshold. Application lay alarm of the OCS will occur and the alarm
reason is Application lay failure. If the amount of continuously received CCA afterward
reaches the threshold, the alarm is cleared.
Possible Causes
l
The communication link between the GGSN and the OCS is faulty. For example, the
interface connection is loose or the cables are damaged.
The link status between the GGSN and the OCS is normal, but the capability of process
the CCR messages is not enough
Handling Procedure
Step 1 Check whether the GGSN and the OCS are normally connected.
l
Step 2 Connect the cables properly or replace the faulty cables, and then check whether the alarm is
cleared.
l
Related Information
None
55-2
Issue 02 (2009-06-30)
56
Description
I. Description
This alarm is generated when the GGSN and the FTP server for CDR audit are disconnected.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0818
Major
Fault
III. Parameters
Name
Meaning
FTP address
Impact on System
The CDR audit files cannot be uploaded to the FTP server.
Possible Causes
l
Routes between the GGSN and the FTP server are unavailable.
The user name and password configured on the GGSN for logging in to the FTP server are
wrong.
Issue 02 (2009-06-30)
56-1
Handling Procedure
Step 1 Run the ping command to check whether the FTP server can be pinged through.
l
No ->(2)
Yes ->(3)
Step 2 Check the routes between the GGSN and the FTP server.
Step 3 Run the ftp command to check whether you can log in to the FTP server.
l
The "user name okay, need password" message is displayed by the GGSN ->(4)
Step 4 Check whether the user name and password configured on the GGSN are the same as those
configured on the FTP server. If different, modify the user name and password configured on
the GGSN. Check whether the alarm is cleared.
l
Cleared ->(6)
Related Information
None
56-2
Issue 02 (2009-06-30)
57
Description
I. Description
This alarm is generated when the utilization of the local service node resources exceeds the alarm
threshold. The resources consist of fiveitem nodes and tariff nodes corresponding to service
flows.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0819
Major
Fault
III. Parameters
Name
Meaning
Slot No.
CPU No.
Resource type
Impact on System
l
When service node resources are insufficient, activation requests of new users are rejected
because their services and charging cannot be controlled.
When this alarm is generated, the currently activated users can continue to apply for service
node resources. If activated users fail to apply for node resources due to exhaustion of
service node resources, based on the configuration of the software parameter No. 57, the
Issue 02 (2009-06-30)
57-1
After this alarm is generated, the system continues to check the unitization of service node
resources. When the utilization of service node resources is lower than the threshold, this
alarm is cleared.
Possible Causes
l
Handling Procedure
Step 1 Check the performance statistics item of service node resources to obtain the overall utilization
of service node resources and utilizations of different protocol types of service node resources.
Step 2 Check the aging times of different protocol types of service node resources.
Step 3 Shorten the aging times of service node resources.
Step 4 It is recommended to cut over partial user services to another CPU of the SPU.
Step 5 Contact Huawei Technical Support.
Step 6 End.
----End
Related Information
None
57-2
Issue 02 (2009-06-30)
58
Description
I. Description
This alarm is generated when no server for the redirection IP farm (hereinafter referred to as
farm) configured on the GGSN is available.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0820
Critical
Fault
III. Parameters
Name
Meaning
Farm name
Impact on System
All redirection services bound to this farm cannot be processed normally, and user packets to
be redirected are blocked.
Possible Causes
l
Issue 02 (2009-06-30)
The server-farm that corresponds to the virtual IP address configured in the captivation/
web-proxy action is not in the same VPN with the user.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
58-1
No server is configured for the server-farm that corresponds to the virtual IP address
configured in the captivation/web-proxy action.
All the servers configured for the server-farm that corresponds to the virtual IP address
configured in the captivation/web-proxy action are down.
No heartbeat detection interface is configured and the interface attributes are modified for
the server-farm that corresponds to the virtual IP address configured in the captivation/webproxy action.
This alarm is cleared when the redirection rule is removed or an available server can be obtained
based on the virtual IP address in the rule.
Handling Procedure
Step 1 Contact Huawei Technical Support.
Step 2 End.
----End
Related Information
None
58-2
Issue 02 (2009-06-30)
59
Description
I. Description
This alarm occurs when the GGSN and the LNS are disconnected due to communication failure.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0821
Major
Fault
III. Parameters
Name
Meaning
Slot No.
CPU No.
LNS1 address
IP address of LNS 1
LNS2 address
IP address of LNS 2
VPN
Impact on System
The L2TP service cannot be performed after the GGSN and the LNS are disconnected.
Possible Causes
The communication link between the GGSN and the LNS is broken.
This alarm can be cleared if the redirection rule is deleted or a server is available based on the
virtual IP address in the rule.
Issue 02 (2009-06-30)
59-1
Handling Procedure
Step 1 Run display ip routing-table to check whether the route from the GGSN to the LNS is normal.
Check whether the router from the LNS to the GGSN is normal on the LNS.
l
No -> (3)
No -> (4)
Step 3 Run undo ip route-static and ip_route-static to modify the routing table on the GGSN. Modify
the routing table on the LNS by following the help of the LNS. Then, check whether the alarm
is cleared.
l
Related Information
None.
59-2
Issue 02 (2009-06-30)
60
Description
I. Description
This alarm occurs, when the number of the PDP contexts under IP spoofing attacks reaches a
predefined threshold.
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0822
Major
Fault
III. Parameters
Name
Meaning
Slot No.
CPU No.
Impact on System
The IP spoofing packets are discarded.
Possible Causes
The PDP contexts of the GGSN are under IP spoofing attacks.
Handling Procedure
Step 1 Contact Huawei Technical Support.
Step 2 End.
----End
Issue 02 (2009-06-30)
60-1
Related Information
None.
60-2
Issue 02 (2009-06-30)
61
Description
I. Description
The alarm occurs when the correct health checking and the redirection server, but there is no
response when checking the redirection server
II. Attribute
Alarm ID
Alarm Severity
Alarm type
0826
Major
Fault
III. Parameters
Name
Meaning
Ip-Farm name
Server IP
Impact on System
The web proxy or captive portal service is disrupted.
Possible Causes
l
The routes between the GGSN and the redirection server are incorrect.
Health check interface fails, the interface is not used to send or receive health check
messages.
Issue 02 (2009-06-30)
61-1
Handling Procedure
Step 1 Enter system-view, run ping -i interface to check the status of the redirection server. The interface
means health check interface.
l
Normal =>(9)
Abnormal =>(2)
Step 2 Enter system-view, run display interface to check the status of the health check interface.
l
UP =>(4)
DOWN =>(3)
Step 3 Check the status of physical link between the GGSN and the redirection server.
l
Normal =>(4)
Abnormal =>(6)
Step 4 Enter system-view, run display ip routing-table to check whether the route of the GGSN to the
redirection server is correct. On the redirection server, check whether the route of the redirection
server to the GGSN is correct
l
Correct =>(5)
Incorrect =>(7)
Normal =>(9)
Abnormal =>(8)
Step 6 Replace the faulty network cable, and then check whether the alarm is cleared.
l
Cleared =>(10)
Step 7 Clear the fault of route configurations. Run ip route-static andundo ip route-static to modify
the routing table of the GGSN. Modify the routing table of the redirection server according to
the online help of the redirection server. Then, check whether the alarm is cleared.
l
Cleared =>(10)
Related Information
None
61-2
Issue 02 (2009-06-30)
62
Description
The alarm occurs when the path between GGSN and PCRF is disconnected, it is cleared after
the path between GGSN and PCRF is connected.
Parameters
Name
Meaning
Slot No.
CPU No.
IP
Impact on System
l
There is not effective on the IP-CAN session of the PCRF related, but the authentication
request will be failed,
If there is any other valid PCRF in this PCRF group, the created IP-CAN session can access
normally; Or the accessing of the IP-CAN will be denied.
Possible Causes
l
Handling Procedure
Step 1 Check whether the PCRF is normal.
l
Issue 02 (2009-06-30)
62-1
No -> (2)
Step 2 Check whether the path between the GGSN and PCRF is connected.
l
No -> (3)
Step 3 Check whether the configuration of the PCRF is right using the display pcrf command.
l
No -> (4)
Step 4 Delete the PCRF using the undo pcrf command, configure the PCRF using the pcrf, then check
whether the alarm is recovered.
l
No -> (6)
Step 5 Check whether the path between the GGNS and the PCRF is disconnected after replacing the
network cable.
l
No -> (3)
NO -> (3)
No -> (8)
Related Information
None
62-2
Issue 02 (2009-06-30)
63
Description
The alarm occurs when the path between the one of the CPUs on the GGSN and reporting server
is disconnected.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0828
Major
Fault
Parameters
Name
Meaning
Subrack No. Specifies the number of the subrack where the board generating the alarm is
located.
Slot No.
Specifies the number of the slot where the board generating the alarm is located.
CPU No.
Specifies the number of the CPU that manages the reporting server.
Impact on System
l
This alarm is stand for that the reporting server is disconnected with the GGSN, the GGSN
can not reporting and lose the report.
Possible Causes
l
The path between the Gi interface on the GGSN and the reporting server is disconnected.
Issue 02 (2009-06-30)
63-1
Handling Procedure
Step 1 Check whether the IP address of the reporting server configured on the GGSN is right.
l
No -> (3)
Step 2 Check whether the alarm is recovered after configuring the IP address of the reporting server on
the GGSN.
l
No -> (3)
Step 3 Check whether the path between the Gi interface on the GGSN and the reporting server is
connected using the ping command.
l
No -> (2)
Step 4 Check whether the alarm is recovered after configuring the routing from Gi interface to the
reporting server.
l
No -> (3)
No -> (6)
Step 6 Check whether the alarm is recovered after enable the reporting server.
l
No -> (7)
Related Information
None
63-2
Issue 02 (2009-06-30)
64
Description
The alarm occurs when the updating the rule-library of SIG-CBB is failed.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0829
Major
Event
Parameters
Name
Meaning
Slot No.
Specifies the number of the slot where the DMPU card is located.
CPU No.
Abnormal Type
Impact on System
l
After the updating the rule-library of SIG-CBB is failed, the GGSN will run the lasted
version succeed upload. It is not effective on the identifying of the GGSN.
The protocol and the matching rule defined in the new rule-library are invalid.
If the updating is failed result on the engine of the SIG is failed to upload, the identifying
function of the SIG-CBB is invalid.
Possible Causes
l
The version remarked on the file is not consistent with the version in the file.
Issue 02 (2009-06-30)
64-1
The engine of the SIG is failed to upload when the board is restarted.
Handling Procedure
Step 1 Check whether both the "Sam-1.0.0.***.rul" and the "Sam-1.0.0.***.xml" files is existed in the
path:hd1:/service/ (*** is the version number of the rule-library need to update)
l
No -> (2)
Step 2 Upload the "Sam-1.0.0.***.rul" and the "Sam-1.0.0.***.xml" files in the path: hd1:/service/ on
the GGSN -> (3)
Step 3 Check whether the alarm is recovered using the update_signature-database command.
l
No -> (4)
Step 4 Query the current version information using the display signature-database command, and
Contact Huawei Technical Support
Step 5 End.
Step 6 Contact Huawei Technical Support.
Step 7 End.
----End
Related Information
None
64-2
Issue 02 (2009-06-30)
65
Description
The alarm occurs when all the L7 parse is failed because on the DMPU cards configured on the
SPU are invalid.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0830
Critical
Fault
Parameters
Name
Meaning
Slot No.
Specifies the number of the slot where the board generating the alarm is located.
CPU No. Specifies the number of the CPU where the charging is abnormal.
Impact on System
l
L7 parse is failed, the matching rules are is disable. All the service controlling and the
charging is based on the L3/L4 layer, the content-based charging on the l7 is error.
It is effect on that the reporting server can not report the protocol information.
Possible Causes
l
Handling Procedure
Step 1 Check whether the work mode is subboard mode using the display subboard command.
Issue 02 (2009-06-30)
65-1
No -> (7)
Step 2 Check whether the subboard mode is configured on the SPU using the display subboard
command.
l
No -> Delete the subboard mode using the undo subboard command, and then restart the
SPU where the alarm occurred.
Step 3 Check whether the CPU2 and the CPU3 are present using the display device slotnum command.
l
No -> The subboard is not in its position. Insert the subboard again to keep the connection
is normal.
Step 4 Check whether the status of the CPU2 and CPU3 is Registered using the display device slotnum
command.
l
No -> (6)
Step 6 Check whether there is any valid subboard on the SPU using the display device slotnum
command.
l
Yes -> Switch over the active/standby SPU to ensure the L7 parse is enable.
No -> (7)
Related Information
None
65-2
Issue 02 (2009-06-30)
66
Description
The alarm occurs when system reaches volume threshold.
Attribute
Alarm ID
Alarm Severity
Alarm Type
0835
Major
Fault
Parameters
Name
Meaning
Slot No. Specifies the number of the slot where the board generating the alarm is located.
Impact on System
l
When the SPU reaches volume threshold, the system will discards the data packets in some
probability
Possible Causes
l
The M2000 downloads data from GGSN hard disk by FTP server.
Handling Procedure
Step 1 Check whether the alarm is cleared after stopping the FTP service for M2000.
l
Yes=>(4)
No=>(2)
Step 2 Check whether the alarm is cleared using the alarm threshold command to enhance the alarm
threshold of the CPU over load.
Issue 02 (2009-06-30)
66-1
Yes=>(4)
No=>(3)
Related Information
None
66-2
Issue 02 (2009-06-30)