cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
29380
Views
11
Helpful
8
Comments
xthuijs
Cisco Employee
Cisco Employee

 

Introduction

This document builds forward on the ASR9000/XR: Troubleshooting packet drops and understanding NP drop  counters

article and provides explanations for new counters added after the initial document.

 

Core Issue

NP or network processor is the component on ASR9000 linecards that handle the feature processing of packets as they go through the system.

These NP's track the packet with many different counters that are sometimes not very intuitive and this document aims at explaining these counts to give some direction.

 

To understand the packet troubleshooting, refer to the link above.

Resolution

Typhoon counters

 

Display   nameDescription
MDF_TX_LC_CPUTotal (for this NP) of Frames   sent (punted) to linecard CPU, ingress and egress, packets and messages
MDF_TX_WIRETotal (for this NP) of Frames   transmitted from NP to the Ethernet port Traffic Manager. These frames may   still be dropped by the egress Traffic Manager due to egress port congestion.
MDF_TX_WIRE_1(Aggregated to MDF_TX_WIRE)
MDF_TX_WIRE_2(Aggregated to MDF_TX_WIRE)
MDF_TX_WIRE_3(Aggregated to MDF_TX_WIRE)
MDF_TX_FABRICTotal (for this NP) of Frames   sent to the system switch fabric - ingress frames and frames sent into the   switch fabric from the linecard CPU. This includes frames destined for other   LCs, and frames destined for the RSP, and internal messages used for communication   between NPs.
MDF_TX_FABRIC_1(Aggregated to MDF_TX_FABRIC)
MDF_TX_FABRIC_2(Aggregated to MDF_TX_FABRIC)
MDF_TX_FABRIC_3(Aggregated to MDF_TX_FABRIC)
PARSE_INTER_NP_RECEIVE_CNTFrames received from the other   NP of a 100GE port that is serviced by a pair of NPs
PARSE_INTER_NP_RECEIVE_CNT_1(Aggregated to   PARSE_INTER_NP_RECEIVE_CNT)
PARSE_INTER_NP_RECEIVE_CNT_2(Aggregated to   PARSE_INTER_NP_RECEIVE_CNT)
PARSE_INTER_NP_RECEIVE_CNT_3(Aggregated to   PARSE_INTER_NP_RECEIVE_CNT)
PARSE_FAB_RECEIVE_CNTTotal (for this NP) of Frames   received from switch fabric (egress frames)
PARSE_FAB_RECEIVE_1(Aggregated to   PARSE_FAB_RECEIVE_CNT)
PARSE_FAB_RECEIVE_2(Aggregated to   PARSE_FAB_RECEIVE_CNT)
PARSE_FAB_RECEIVE_3(Aggregated to   PARSE_FAB_RECEIVE_CNT)
PARSE_INTR_RECEIVE_CNTInterrupt frames received -   internal NP messages
PARSE_INTR_RECEIVE_1(Aggregated to   PARSE_INTR_RECEIVE_CNT)
PARSE_INTR_RECEIVE_2(Aggregated to   PARSE_INTR_RECEIVE_CNT)
PARSE_INTR_RECEIVE_3(Aggregated to   PARSE_INTR_RECEIVE_CNT)
PARSE_INJ_RECEIVE_CNTTotal (for this NP) of Frames   received by the NP that were injected by RSP or LC CPU - outgoing control   frames
PARSE_INJ_RECEIVE_1(Aggregated to   PARSE_INJ_RECEIVE_CNT)
PARSE_INJ_RECEIVE_2(Aggregated to   PARSE_INJ_RECEIVE_CNT)
PARSE_INJ_RECEIVE_3(Aggregated to   PARSE_INJ_RECEIVE_CNT)
PARSE_ENET_RECEIVE_CNTTotal (for this NP) of Frames   received from Ethernet ports by this NP
PARSE_ENET_RECEIVE_1(Aggregated to   PARSE_ENET_RECEIVE_CNT)
PARSE_ENET_RECEIVE_2(Aggregated to   PARSE_ENET_RECEIVE_CNT)
PARSE_ENET_RECEIVE_3(Aggregated to   PARSE_ENET_RECEIVE_CNT)
PARSE_TM_LOOP_RECEIVE_CNTInternal Loopback frames   received from Traffic Manager - generally used for egress multicast   replication
PARSE_TM_LOOP_RECEIVE_1(Aggregated to   PARSE_TM_LOOP_RECEIVE_CNT)
PARSE_TM_LOOP_RECEIVE_2(Aggregated to   PARSE_TM_LOOP_RECEIVE_CNT)
PARSE_TM_LOOP_RECEIVE_3(Aggregated to   PARSE_TM_LOOP_RECEIVE_CNT)
PARSE_TOP_LOOP_RECEIVE_CNTLoopback frames received from   Pipeline - generally used for packets requiring complex multi-pass processing   in the NP
PARSE_TOP_LOOP_RECEIVE_1(Aggregated to   PARSE_TOP_LOOP_RECEIVE_CNT)
PARSE_TOP_LOOP_RECEIVE_2(Aggregated to   PARSE_TOP_LOOP_RECEIVE_CNT)
PARSE_TOP_LOOP_RECEIVE_3(Aggregated to   PARSE_TOP_LOOP_RECEIVE_CNT)
PARSE_UNKNOWN_DIR_DROPFrames dropped due to input   source unknown - should not occur. Software error.
PARSE_UNKNOWN_DIR_1(Aggregated to   PARSE_UNKNOWN_DIR_DROP)
PARSE_UNKNOWN_DIR_2(Aggregated to   PARSE_UNKNOWN_DIR_DROP)
PARSE_UNKNOWN_DIR_3(Aggregated to   PARSE_UNKNOWN_DIR_DROP)
PARSE_ING_DISCARDTotal (for this NP) of Ingress   frames discarded in Parse phase. Each discard should also have a more   specific counter.
PARSE_EGR_DISCARDTotal (for this NP) of Egress   frames discarded in Parse phase. Each discard should also have a more   specific counter.
DROP_FRM_CRC_ERR_XAUI0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI3Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI3Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI4Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI4Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI5Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI5Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI6Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI6Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI7Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI7Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI8Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI8Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI9Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI9Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_ILKN0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_ILKN0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_ILKN1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_ILKN1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_ILKN2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_ILKN2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_NULL13Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_NULL13Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_NULL14Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_NULL14Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_NULL15Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_NULL15Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII0Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII1Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII2Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII3Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII3Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII4Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII4Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII5Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII5Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII6Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII6Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII7Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII7Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII8Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII8Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII9Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII9Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII10Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII10Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII11Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII11Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII12Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII12Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII13Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII13Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII14Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII14Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII15Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII15Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII16Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII16Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII17Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII17Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII18Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII18Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII19Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII19Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII20Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII20Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII21Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII21Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII22Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII22Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII23Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII23Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII24Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII24Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII25Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII25Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII26Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII26Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII27Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII27Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII28Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII28Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII29Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII29Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII30Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII30Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII31Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII31Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII32Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII32Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII33Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII33Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII34Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII34Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII35Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII35Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII36Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII36Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII37Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII37Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII38Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII38Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII39Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII39Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII40Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII40Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII41Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII41Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII42Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII42Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII43Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII43Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII44Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII44Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII45Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII45Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII46Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII46Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII47Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII47Frames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_HOST_SGMIIFrames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_HOST_SGMIIFrames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_OTHER_INTFrames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_OTHER_INTFrames dropped due to CRC error   - either because they were received with a CRC error from the wire (which   will be counted in show interface error counts), or due to input FIFO overrun (which can occur   under extreme NP packet per second overload conditions)
PARSE_FRM_ERR_CNTdescription not available yet
PRS_CTX_WAIT_TIMEOUTFrames dropped due to Software   error
RSV_CTX_WAIT_TIMEOUTFrames dropped due to Software   error
MDF_CTX_WAIT_TIMEOUTFrames dropped due to Software   error
PRS_HEALTH_MONPeriodic internal heartbeat packet used to monitor the   health of the NP
PRS_HEALTH_MON_DISCARDHealth monitoring packets that   were discarded due to CRC errors. Generally should not occur. May indicate a   buffer management software error.
INTR_FRAME_TYPE_0Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_1Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_2Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_3Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_4Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_5Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_6Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_7Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_8Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_9Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_10Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_11Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_12Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_13Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_14Interrupt frames - internal NP   messaging
INTR_FRAME_TYPE_15Interrupt frames - internal NP   messaging
DBG_PRS_EP_L_PRS_PL_PW_DISPOSEIngress packets entering   loopback for PW disposition
DBG_PRS_EP_L_PRS_VPLS_PW_IMPOSEIngress packets entering   loopback for VPLS PW imposition
DBG_PRS_EP_L_PRS_VPLS_DOT1AH_LPIngress packets entering   loopback for VPLS DOT1AH
DBG_PRS_EP_L_PRS_PL_ABFIngress packets entering   loopback for ABF processing
DBG_PRS_EP_L_PRS_PL_L2TP_DECAP_PASS2Ingress packets entering   loopback L2TP decapsulation 2nd pass
DBG_PRS_EP_L_PRS_EGR_L2TPEgress packets entering L2TP   processing
DBG_PRS_EP_L_PRS_PL_L2TP_INGIngress packets entering LAC   imposition pipeline loopback
DBG_PRS_NO_RFD_FOR_PREFETCHAttempts by the NP to allocate a   new NP buffer for some form of internal frames replication, and no buffers   were available. Should only occur rarely under very heavy NP load.
PARSE_ING_INTER_NP_THRU_TRAFFICFrames passed between a pair of   NPs that service a 100GE interface
PARSE_ING_INTER_NP_IPCMessages passed between a pair   of NPs that service a 100GE interface
PARSE_L2_EGR_INJECTL2 egress frames injected by RSP   or LC CPU
PARSE_ING_8023Ingress 802.3 frames received
PARSE_ING_8023_JUMBOIngress 802.3 frames received   with payload greater than 1500 bytes
PARSE_ING_L3_CFMIngress L3 CFM frames
PARSE_ING_L2_CFMIngress L2 CFM frames
PARSE_ING_SLOW_PROTOIngress slow protocol frames   (LACP, SYNCE, EFM)
PARSE_ING_EFM_DISABLEDIngress EFM frames discarded   because EFM is disabled
PARSE_RSP_INJ_L2_PREROUTEInjected L2 pre-routed frames   received by egress NP
PARSE_RSP_INJ_L2_INWARDInjected L2 frames from RSP   received by egress NP
PARSE_RSP_INJ_L2_EGRESSInjected L2 frames received by   egress NP
PARSE_RSP_INJ_FAB_CNTInjected frames received by   egress NP from fabric
PARSE_RSP_INJ_PORT_CNTInjected frames received by   egress NP from inject port
PARSE_RSP_INJ_DIAGS_CNTInternal diagnostics frames   received by NP from RSP
PARSE_EGR_INJ_PKT_TYP_UNKNOWNFrames received from fabric with   unknown packet types (internal error)
PARSE_EGR_INJ_PKT_TYP_IPV4IPv4 packets received from RSP   or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV6IPv6 packets received from RSP   or LC CPU
PARSE_EGR_INJ_PKT_TYP_MPLSMPLS frames received from RSP or   LC CPU
PARSE_EGR_INJ_PKT_TYP_CLNSOSI CLNS packets received from   RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV4_PREROUTEPre-routed IPv4 packets received   from RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV6_PREROUTEPre-routed IPv6 packets received   from RSP or LC CPU
PARSE_LC_INJ_L2_PREROUTEPre-routed L2 frames received   from LC CPU
PARSE_LC_INJ_L2_INWARDInjected L2 frames received from   LC CPU
PARSE_LC_INJ_L2_EGRESSInjected L2 frames received from   LC CPU by egress NP
PARSE_LC_INJ_FAB_CNTFrames received from LC CPU and   passed to fabric
PARSE_LC_INJ_PORT_CNTFrames received from LC CPU
PARSE_LC_INJ_DIAGS_CNTInternal diagnostic frames   received from LC CPU
PARSE_DROP_FAB_UNKNOWN_INJFrames received from RSP of   unknown type (internal error)
PARSE_HOST_INJ_BFD_IPV4_L3_INWARDTransmitted BFD Multihop packet   counters that are injected into the NP from host on which the bfd_session is   hosted.
PARSE_ING_L3_CFM_DROPL3 CFM frames dropped by ingress   NP
PARSE_ING_ISISIS-IS protocol packets received   from Ethernet
PARSE_ING_PIM_IFIBPIM protocol packets detected   and punted via LPTS
PARSE_EGRESS_BFD_PUNT_CNTBFD packets that have reached   the egress LC (on which the bfd session is hosted) and which have been remote   punted from a ingress LC
PARSE_DROP_IN_EFM_BLOCKIngress EFM frames discarded due   to ingress EFM block configured at ingress port
PARSE_DROP_IN_EFM_LOOPBACK_DATAIngress EFM frames looped back   in ingress NP
PARSE_DROP_IN_UIDB_TCAM_MISSFrames dropped due to TCAM miss   at ingress NP
PARSE_DROP_IN_UIDB_NO_ENTRYFrames dropped due to UIDB miss   at ingress NP
PARSE_DROP_IN_ENET_UNKNOWNFrames dropped due to unknown   ethertype at ingress NP
PARSE_DROP_IN_UIDB_DOWNFrames dropped due to   interface/subinterface in shutdown state
PARSE_DROP_INJ_IN_UIDB_NO_MATCHInjected frames dropped due to
PARSE_DROP_IPV4_DISABLEDIPv4 packets dropped on receipt   from Ethernet due to IPv4 not enabled on interface/subinterface
PARSE_DROP_IPV4_MCAST_NOT_ENABLEDIPv4 multicast packets dropped   on receipt from Ethernet due to IPv4 multicast not enabled on   interface/subinterface
PARSE_DROP_IPV4_CHECKSUM_ERRORIPv4 packets dropped on receipt   from Ethernet due to IP header checksum error
PARSE_IPV4_SANITY_ADDR_CHK_FAILURESIPv4 packets dropped on receipt   from Ethernet due to illegal IP addresses
PARSE_DROP_IPV4_LENGTH_ERRORIPv4 packets dropped on receipt   from Ethernet due to IP packet length field inconsistent with L2 frame length
PARSE_DROP_MPLS_DISABLEDMPLS frames dropped on receipt   from Ethernet due to MPLS not enabled on interface/subinterface
PARSE_DROP_ING_MPLS_LABEL_INVALIDMPLS frames dropped on receipt   from Ethernet due to invalid MPLS labeling, such as reserved MPLS label, too   many explicit NULL labels, or EOS not set on last label
PARSE_DROP_ING_MPLS_TTL_ERRORMPLS frames dropped on receipt   from Ethernet due to MPLS time-to-live expiry
PARSE_DROP_EGR_MPLS_LABEL_INVALIDEgress MPLS frames dropped due   to invalid MPLS label (tag value less than 15)
PARSE_L2MC_DROP_ROUTER_GUARDIngress IGMP frames dropped due   to router guard
PARSE_ING_DROP_DHCP_UNTRUSTEDIngress DHCP frames dropped on   untrusted interface
PARSE_EGR_DROP_DHCP_UNTRUSTEDEgress DHCP frames dropped on   untrusted interface
PARSE_L2_MSTP_DROPIngress MSTP frames dropped on   blocked ingress bridge port
PARSE_UNKNOWN_LC_CPU_INJ_DROPUnknown frames received from LC   CPU dropped
PARSE_INJECT_NATIVENative injected frames received   from LC CPU
PARSE_L2_DOT1Q_DROPIngress L2 frames dropped due to   DOT1Q protocol filtering
PARSE_L2_DOT1AD_DROPIngress L2 frames dropped due to   DOT1AD protocol filtering
PARSE_L2_DOT1Q_VTP_DROPIngress L2 frames dropped due to   DOT1Q VTP protocol filtering
PARSE_L2_DOT1AH_ISID_DROPIngress L2 frames dropped due to   DOT1AH invalid ISID
PARSE_DROP_IPV6_DISABLEDIPv6 packets dropped on receipt   from Ethernet due to IPv6 not enabled on interface/subinterface
PARSE_DROP_IPV6_LENGTHIngress or egress frames with   invalid IPv6 header length field (conflicts with L2 length)
PARSE_IPV6_SANITY_ADDR_CHK_FAILURESInvalid ipv6 address that is not   passing the basic sanities (eg rogue address)
PARSE_DROP_IPV6_MCAST_NOT_ENABLEDIPv6 multicast packets dropped   on receipt from Ethernet due to IPv6 multicast not enabled on   interface/subinterface
PARSE_DROP_IPV6_MCAST_NODE_LOCALIPv6 multicast packets dropped   on receipt from Ethernet due to invalid destination address scope
PARSE_EGR_L2_CFMCFM frames received by egress NP
PARSE_L3_TAGGED_PUNT_DROPTagged frames (BPDU, LLDP, UDLD)   received on L3 interface dropped by ingress NP
PARSE_MVRP_UIDB_PUNT_NOT_ENABLEDMVRP frames received with punt   not enabled on the port
PARSE_DOT1AD_UIDB_PUNT_NOT_ENABLEDDOT1AD frames received with punt   not enabled on the port
PARSE_DOT1D_UIDB_PUNT_NOT_ENABLEDDOT1D frames received with punt   not enabled on the port
PARSE_MSTP_DOT1DMSTP DOT1D frames received by   ingress NP
PARSE_MSTP_DOT1ADMSTP DOT1AD frames received by   ingress NP
PARSE_MVRP_DOT1DMVRP DOT1D frames received by   ingress NP
PARSE_MVRP_DOT1ADMVRP DOT1AD frames received by   ingress NP
PARSE_UNKNOWN_NPH_TYPE_DROPEgress frames dropped due to   unknown internal header type (internal error)
GRE_ING_ENCAP_P2_PRSdescription not available yet
GRE_EGR_ENCAP_P2_PRSdescription not available yet
GRE_ING_DECAP_P1_QUAL_NO_MATCHdescription not available yet
GRE_ING_DECAP_P2_PRSdescription not available yet
GRE_ING_DECAP_P2_CHKSUM_RSV1_NONZEROdescription not available yet
GRE_ING_DECAP_P2_GRE_KEY_PRESENT_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_SEQ_PRESENT_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_NONZERO_VER_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_NONZERO_RSVD0_DROPdescription not available yet
GRE_ING_DECAP_P2_PROT_UNSUPPORTEDdescription not available yet
GRE_ING_DECAP_P2_NESTED_GRE_DROPdescription not available yet
GRE_ING_DECAP_P2_CLNS_NO_ISIS_DROPdescription not available yet
GRE_ING_DECAP_P2_FRAGMENTED_GRE_DROPdescription not available yet
GRE_ING_DECAP_P2_NO_UIDB_DROPdescription not available yet
GRE_ING_DECAP_P2_UIDB_DOWNdescription not available yet
GRE_ING_DECAP_P2_KA_PROTO_DOWNdescription not available yet
GRE_ING_DECAP_P2_PUNT_DROPdescription not available yet
LISP_ING_DECAP_P2_PRSdescription not available yet
LISP_ING_DECAP_P2_PROT_UNSUPPORTEDdescription not available yet
CAP_IPV4_PRS_P1description not available yet
CAP_IPV6_PRS_P1description not available yet
CAP_PRS_P2description not available yet
PARSE_VIDMON_PKT_CNTPackets processed for Video   monitoring
VIDMON_SEM_RETRY_TIMEOUTPackets for which Vidmon failed   to acquire a semaphore
PARSE_MOFRR_INTERRUPTInterrupt frames received due to   mcast-only FRR activity or loss monitoring
PARSE_MOFRR_FRR_MSG_RECVInter-NP MoFRR switchover   notifications received
PARSE_IPIW_NON_IP_DROPL2 frames dropped due to non-IP   pacekt received on ipiw interface
PARSE_L2VPN_DEAGG_NON_VPWS_VPLS_DROPL2VPN PW frames dropped on   standby pw
PARSE_ELMIELMI frames received and punted   by ingress NP
PARSE_PVSTPVST frames received by ingress   NP
PARSE_LLDPLLDP frames received by ingress   NP
ELMI_ADDR_TYPE_ERRORELMI frames dropped due to   address type error
UNKNOWN_L2_ON_L3_DISCARDL2 frames with unknown   ether-type received on L3 interface dropped
PARSE_EGRESS_PTP_CNTInjected IPv4 PTP packets   processed by egress NP
PARSE_BFD_NOT_MY_MACBFD packets received but not to   my mac by ingress NP
PARSE_BFD_IPv4_DISABLEDReceived BFD packet and IPV4 not   enabled in L3 ingress ingress interface
PARSE_PPP_KEEPALIVE_HW_REPLYPPPoE+PPP echo request   (keepalive) packets that arrived on a PTA subscriber interface. The NP   generated the reply, instead of punting the packet.
INGRESS_L2TP_LOOKUP_MISSPackets for which, on the   ingress core-facing linecard, there is no entry in the L2TP session table   which matches the packet's tunnel id and session id. These packet are   dropped.
PARSE_INGRESS_L2TP_VRF_NOMATCHNot implemented by ucode
PARSE_INGRESS_L2TP_IP_NOMATCHNot implemented by ucode
L2TP_ING_DECAP_SIP_DROPPackets whose source IP address   does not match the entry in the L2TP session table. These packets are   dropped.
L2TP_ING_DECAP_TID_DROPFrames dropped due to L2TP   tunnel ID miss
L2TP_ING_DECAP_VER_DROPL2TP frames dropped due to   invalid version
PARSE_BFD_UIDB_DOWNReceived BFD packet for which   the ingress interface is down
PARSE_BVI_L3_INGFrames received on BVI L3   interface by ingress NP
PARSE_BVI_L3_EGRFrames to BVI L3 interface by   egress NP
PARSE_BVI_L2_INGFrames received on BVI L2   interface by ingress NP
PARSE_L3_SNF_SETUPdescription not available yet
PARSE_ING_MVPN_PIM_ALL_RTRSIngress GRE-encapped MVPN core   packets recognized as PIM packets destined to all routers. These are punted.
PARSE_UDLDUDLD frames received by ingress   NP
PARSE_SPAN_LPBKSpan frames received after   loopback (2nd pass) by ingress NP
PARSE_P2MP_MPLS_LPBKEgress P2MP/MLDP packets looped   back after replication for MPLS interfaces
PARSE_P2MP_IP_LPBKEgress P2MP/MLDP packets looped   back for IP decap processing
PARSE_P2MP_BUD_NOT_OAMIngress P2MP/MPLS packets   replicated and looped back to check for OAM/PIM packet type. If packet are   not OAM/PIM we drop these replicated copies, otherwise we process them as   needed for OAM/PIM frames.
PARSE_IPMC_GENERIC_ENCAP_FIRST_PASSEgress packets received from   fabric, for MVPN/GRE or MVPN/LSM encapsulation or P2MP, before egress   replication and possible encapsulation
PARSE_IPMC_GENERIC_ENCAP_SECOND_PASS_VRFEgress MVPN head node packets   destined to local VRF receivers, before replication to local receivers
PARSE_IPMC_GENERIC_ENCAP_SECOND_PASS_COREEgress MVPN head node packets to   be encapsulated in LSM or GRE, before replication for a given GRE tunnel or   LSM path
PARSE_MVPN_ENCAP_THIRD_PASSEgress MVPN/GRE head node   packets after encapsulation, before replication for a given GRE tunnel
PARSE_BGP_PA_LPBKPacket that recevies a loopback   (feedback/recirculation) due to the BGP Policy Accounting feature
IN_SATELLITE_DISCOVERY_DISCARDIncoming Satellite Discovery   protocol frames drops because they were received on an interface that is not   configured as a Satellite fabric link
PARSE_EGR_REMOTE_RACK_ENCAP_CNTPackets being prepared for   possible relay over nV inter-cluster link. Note that this often happens in   punt cases regardless of whether clusters are configured.
PARSE_ING_FABRIC_INTERNAL_CNTFrames received at inter rack   link from other rack in cluster
PARSE_MAC_NOTIFY_RCVDInternal notifications received   from other NPs, to learn MAC addresses on a bridge domain
PARSE_MAC_DELETE_RCVDInternal notifications received   from other NPs, to delete MAC addresses from a bridge domain's MAC table
PARSE_REV_MAC_NOTIFY_RCVDReverse MAC Notify packets   received
PARSE_ING_PL_MLDP_PEEK_CNTPipeline copy of MLDP PIM all   routers packet as received by TOPparse
PARSE_UNKNOWN_INTERRUPT_RCVDUnknown NP interrupt message   received
PARSE_DROP_PPPOE_NOT_ENABLEDIngress frames dropped on port   with PPPoE not enabled
PARSE_DROP_PPPOE_DATA_PKT_ON_DOWN_UIDBFrame discards due to a PPPoE   Data packet being received on a PPPoE enabled parent interface when the   subscriber's UIDB protocol status is “down”
PARSE_FAST_DISCARD_CLASSIFIED_DROPFrames discards due to NP   packets-per-second overload. When the NP detects that it is not able to keep   up with the incoming frame rate, and is in danger of dropping frames at the   input FIFO (in an uncontrolled manner), it will attempt to 'catch up' by doing   a fast early discard of all but the highest priority frames, in order to give   priority to protocols and other critical traffic during overload conditions.
PARSE_FAST_DISCARD_UNCLASSIFIED_DROPFrames discards due to NP   packets-per-second overload. When the NP detects that it is not able to keep   up with the incoming frame rate, and is in danger of dropping frames at the   input FIFO (in an uncontrolled manner), it will attempt to 'catch up' by doing   a fast early discard of all but the highest priority frames, in order to give   priority to protocols and other critical traffic during overload conditions.
DBG_RSV_EP_L2_INGRESS_VPWS_AC_TO_PWL2 ingress frames entering VPWS   AC to PW imposition
DBG_RSV_EP_L_RSV_ING_ISIS 
DBG_RSV_EP_L_RSV_ING_L3_IFIBIngress LPTS lookup attempts for   L3 packets
DBG_RSV_EP_L_RSV_ING_L3_IFIB_MATCHL3 packets flagged for punting   due to ingress LPTS lookup match
DBG_RSV_EP_L_RSV_ING_L3_IFIB_PUNT_LOCALL3 packets flagged for punting   to LC CPU
DBG_RSV_EP_L_RSV_ING_L3_IFIB_PUNT_LOCAL1L3 packets flagged for punting   to LC CPU
DBG_RSV_EP_L_RSV_ING_L3_RSLTS_MATCHdescription not available yet
DBG_RSV_EP_L_RSV_ING_PUNTIngress packets punted
DBG_RSV_EP_L_RSV_ING_L2MCIngress L2 multicast packets   punted
DBG_RSV_EP_L_RSV_ING_L2Ingress L2 packets received from   Ethernet
DBG_RSV_EP_L_RSV_EGR_MCSTEgress L2 multicast packets   received from fabric
DBG_RSV_EP_L_RSV_EGR_L2MCEgress L2 multicast packets   received from fabric
DBG_RSV_EP_L_RSV_EGR_FLOODL2 frames received from fabric   to be flooded to bridge domain
DBG_RSV_EP_L_RSV_EGR_MCST_LPBKEgress frames looped back after   multicast replication
DBG_RSV_EP_L_RSV_EGR_IPMC_LPBKEgress IP packets looped back   after multicast replication
DBG_RSV_EP_L_RSV_EGR_L2MC_LPBKEgress L2 frames looped back   after multicast replication (IGMP Snooping)
DBG_RSV_EP_L_RSV_PW_DISPOSEFrames entering PW disposition
DBG_RSV_EP_L_RSV_VPLS_PW_IMPOSEVPLS frames entering PW   imposition
DBG_RSV_EP_L_RSV_DOT1AH_PASS2DOT1AH frames entering 2nd pass   at ingress NP
DBG_RSV_EP_L_RSV_ABF_PASS1Access-List based forwarding   feature PASS
DBG_RSV_EP_L_RSV_ABF_PASS2Access-List based forwarding   feature PASS
DBG_RSV_EP_L_RSV_L2TP_CHECKIngress IP-for-me packets   checked for L2TP protocol
DBG_RSV_EP_L_RSV_L2TP_PASS2Ingress decapsulations of an   IP-for-me L2TP packet
DBG_RSV_EP_L_RSV_L2TP_ING_LAGIngress decapsulations of an   IP-for-me L2TP packet and is sending it to a bundle/LAG interface
DBG_RSV_EP_L_RSV_EGR_L2TPDecapsulations of L2TP packets   on egress
DBG_RSV_EP_L_RSV_ING_MPLS_TPFrames hitting ingress MPLS TP   path
DBG_RSV_ING_LEARN_LOOPMAC addresses learned in ingress   direction
DBG_RSV_EGR_LEARN_LOOPMAC addresses learned in egress   direction
ING_RSV_PW_DHCP_UNTRUSTED_DROPFrames on PW dropped due to a   DHCP untrusted host
RSV_ING_BFDIncoming BFD packet
RSV_DROP_ING_BFDIngress BFD packet was subject   to DROP acount
RSV_DROP_ING_IGMP_IFIBInternal FIB decided to drop the   incoming IGMP packet
RSV_DROP_EGR_UIDB_NO_MATCHEgress packets to be transmitted   on Ethernet
RSV_DROP_EGR_UIDB_DOWNFrames dropped due to egress   UIDB being down
RSV_DROP_IPV4_LEAF_NO_MATCHNo forwarding leaf found for the   prefix routed to
RSV_DROP_IPV6_LEAF_NO_MATCHNo forwarding leaf found for the   prefix routed to
RSV_DROP_IPV4_NRLDI_NO_MATCHNon recursive Load Distribution   index not found
RSV_DROP_IPV6_NRLDI_NO_MATCHNon recursive Load Distribution   index not found
RSV_DROP_MPLS_NRLDI_NO_MATCHNon recursive Load Distribution   index not found
RSV_DROP_IPV4_RXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_IPV6_RXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_MPLS_RXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_IPV4_TXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_IPV6_TXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_MPLS_TXADJ_NO_MATCHInvalid/unfound   receive(/transmit) adjacency
RSV_DROP_IPV4_DROP_NULL_RTEPacket dropped because of a   route to NULL0 interface (bit bucket)
RSV_DROP_IPV6_DROP_NULL_RTEPacket dropped because of a   route to NULL0 interface (bit bucket)
RSV_DROP_MPLS_DROP_NULL_RTEPacket dropped because of a   route to NULL0 interface (bit bucket)
RSV_DROP_IPV4_DROP_RP_DESTdescription not available yet
RSV_DROP_IPV6_DROP_RP_DESTdescription not available yet
RSV_DROP_IPV4_RXADJ_DROPDrop adjacency
RSV_DROP_IPV6_RXADJ_DROPDrop adjacency
RSV_DROP_MPLS_RXADJ_DROPDrop adjacency
RSV_DROP_IPV4_NRLDI_NOT_LOCALdescription not available yet
RSV_DROP_IPV6_NRLDI_NOT_LOCALdescription not available yet
RSV_DROP_MPLS_NRLDI_NOT_LOCALdescription not available yet
RSV_DROP_TE_NH_INCOMPLETEIncomplete Traffic Engineering   next hop adjacency
RSV_DROP_ING_LAG_NO_MATCHFrames dropped due to no LAG   entry found on ingress linecard
RSV_DROP_EGR_LAG_NO_MATCHFrames dropped due to no LAG   entry found on egress linecard
RSV_DROP_UNSUPPORTED_TUNNEL 
RSV_DROP_ACL_DENYIngress or Egress frames dropped   because of a deny action set in the access-list
RSV_DROP_IPV4_TXADJ_DROPDrop adjacency
RSV_DROP_IPV6_TXADJ_DROPDrop adjacency
RSV_DROP_MPLS_TXADJ_DROPDrop adjacency
RSV_DROP_IPV4_URPF_CHKUnicast Reverse path forwarding   failure
RSV_DROP_IPV6_URPF_CHKUnicast Reverse path forwarding   failure
RSV_DROP_L2MC_ING_RTE_DROPIngress L2 multicast frames   dropped due as there is no route match
RSV_DROP_L2MC_EGR_RTE_DROPEgress L2 multicast frames   dropped due as there is no route match
RSV_DROP_L2MC_NO_OLISTEgress L2 multicast frames   dropped due to having no output interfaces on this NP
RSV_DROP_L2MC_NO_UIDB(not used)
RSV_DROP_L2MC_SRCDST(not used)
RSV_DROP_IPM4_ING_RTE_DROPIngress IPv4 multicast packets   dropped due to not matching any mroute
RSV_DROP_IPM4_ING_RTE_DFLAG_DROPIngress IPv4 multicast packets   dropped due to D flag in mroute
RSV_DROP_IPM4_EGR_RTE_DROPEgress IPv4 multicast packets   dropped due to not matching any mroute
RSV_DROP_IPM4_EGR_TTL_DROPEgress IPv4 multicast packets   dropped due to IP header time-to-live expiry
RSV_DROP_IPM4_EGR_FILTER_DROPEgress IPv4 multicast packets   dropped rather than transmitting back on source port
RSV_DROP_IPM4_EGR_RPF_FAIL_DROPEgress IPv4 multicast packets   dropped due to Reverse Path Forwarding check failure
RSV_DROP_IPM4_NO_OLISTEgress IPv4 multicast packets   dropped due to not having any egress ports on this NP
RSV_DROP_IPM4_NO_UIDBEgress IPv4 multicast packets   dropped due to egress interface lookup failure
RSV_DROP_IPM4_MVPN_RTE_NOT_MASTEREgress IPv4 multicast packets   that would be punted for signalling but are dropped due to not being on the   master LC/NP
RSV_DROP_IPM4_MVPN_RPF_NOT_MASTEREgress IPv4 multicast packets   that would be punted for Reverse Path Forwarding check failure but are   dropped due to not being on the master LC/NP
RSV_DROP_IPM4_MVPN_DECAP_NO_MATCHEgress MVPN packets to be   decapsulated but dropped due to MVPN decap table lookup failure
RSV_DROP_IPM4_ING_ENCAP_INVALIDIngress MVPN/P2MP packets   dropped due to invalid encap table entry
RSV_DROP_IPM4_EGR_ENCAP_NO_MATCHEgress MVPN/P2MP packets dropped   due to encap entry lookup failure
RSV_DROP_IPM4_EGR_ENCAP_INVALIDEgress MVPN/P2MP packets dropped   due to invalid encap table entry
RSV_DROP_IPM4_ENCAP_LEAF_NO_MATCHEgress MVPN Generic Encap 2nd   pass packets dropped due to encap output list entry (tunnel entry) lookup   failure
RSV_DROP_IPM4_ENCAP_LEAF_INVALIDEgress MVPN Generic Encap 2nd   pass packets dropped due to invalid encap output list entry
RSV_DROP_IPM4_MVPN_MTUEgress MVPN packets to be   encapsulated but dropped due to exceeding tunnel MTU
RSV_DROP_IPM4_NO_ENCAP_OLISTEgress MVPN encap packets with   no encapsulation output list entries
RSV_DROP_IPM6_ING_RTE_DROPIngress IPv6 multicast packets   dropped due to not matching any mroute
RSV_DROP_IPM6_ING_RTE_DFLAG_DROPIngress IPv6 multicast packets   dropped due to D flag in mroute
RSV_DROP_IPM6_EGR_RTE_DROPEgress IPv6 multicast packets   dropped due to not matching any mroute
RSV_DROP_IPM6_EGR_TTL_DROPEgress IPv6 multicast packets   dropped due to IP header time-to-live expiry
RSV_DROP_IPM6_EGR_FILTER_DROPEgress IPv6 multicast packets   dropped rather than transmitting back on source port
RSV_DROP_IPM6_EGR_RPF_FAIL_DROPEgress IPv6 multicast packets   dropped due to Reverse Path Forwarding check failure
RSV_DROP_IPM6_NO_OLISTEgress IPv6 multicast packets   dropped due to not having any egress ports on this NP
RSV_DROP_IPM6_NO_UIDBEgress IPv6 multicast packets   dropped due to egress interface lookup failure
RSV_DROP_IPM6_MVPN_MDT_MTUEgress IPv6 MVPN packets to be   encapsulated but dropped due to exceeding tunnel MTU
RSV_DROP_IPM6_MVPN_RTE_NOT_MASTEREgress IPv6 multicast packets   that would be punted for Reverse Path Forwarding check failure but are   dropped due to not being on the master LC/NP
RSV_DROP_IPM6_MVPN_RPF_NOT_MASTEREgress IPv6 multicast packets   that would be punted for Reverse Path Forwarding check failure but are   dropped due to not being on the master LC/NP
RSV_DROP_MLDP_MDT_MTUEgress MLDP multicast packets to   be encapsulated but dropped due to exceeding tunnel MTU
RSV_DROP_MLDP_ING_NRLDI_NO_MATCHIngress MLDP NRLDI lookup failed   for the incoming label
RSV_DROP_MLDP_ING_NRLDI_INVALIDIngress MLDP packets for which   bud or tail flag is set on the label result but NRLDI type is not MLDP
RSV_DROP_MC_FLD_IGNORE_IRLEgress multicast or flooded   packets that are dropped rather than forwarded over nV cluster IRL because   another path would forward the packet to the remote rack
RSV_DROP_MPLS_LEAF_NO_MATCH 
RSV_DROP_ING_MPLS_PLUPacket forwarded over unknown   label
RSV_DROP_EGR_MPLS_PLUPacket forwarded over unknown   label
RSV_DROP_XID_NO_MATCHFrames dropped due to no XID   entry found for VPWS or MPLS
RSV_DROP_DXID_NO_MATCH_OR_UNBOUNDFrames dropped due to no XID   entry found on egress VPLS
RSV_DROP_L2VPNLDI_NO_MATCHFrames dropped due to no L2VPN   LDI found on ingress
RSV_DROP_MPLS_CSC_CHK_FAILCarrier supporting carrier mpls   label failure
RSV_DROP_BD_MEMBER_TYPE_NO_MATCHFrames dropped due to no match   for bridge domain member
RSV_DROP_BD_MEMBER_TYPE_NO_MEMBERFrames dropped due to bridge   domain member not active
RSV_DROP_IFIB_TTL_CHECKVerification of TTL in the ifib   processing (internal fib)
RSV_DROP_MPLS_TTL_EXPIREDTTL of the incoming packet   expired
RSV_DROP_MPLS_MTU_EXCEEDEDPacket is larger then the MPLS   MTU of the egress interface and therefore is dropped
RSV_DROP_PIT_MISSdescription not available yet
RSV_DROP_PRRT_UIDB_MISSdescription not available yet
RSV_DROP_IN_L3_NOT_MYMACdestination mac address is not   mine of the interfae it was received on
RSV_PUNT_PIT_MISSdescription not available yet
RSV_PUNT_IP_MTU_EXCEEDEDEgress IP packets punted due to   exceeding the interface MTU. IPv4 frames are punted to be fragmented; IPv6   frames are punted to be dropped, generating ICMP messages.
RSV_PUNT_8023_MTU_EXCEEDEDFrames punted due to MTU   exceeded
RSV_ING_PUNT_AND_FWDIngress frames that are both   forwarded to fabric and punted
RSV_EGR_PUNT_AND_FWDEgress frames that are both   forwarded to fabric and punted
RSV_ING_L2_SMAC_MISSFrames received with an unknown   source MAC
RSV_ING_L2_BD_FLUSHMAC   Entries deleted due to Bridge Domain flushMAC Entries deleted due to   Bridge Domain flush
RSV_ING_L2_PORT_FLUSHMAC   Entries deleted due to port flushMAC Entries deleted due to port   flush
RSV_ING_L2_LEARNMAC   Addresses learned on ingressMAC Addresses learned on ingress
RSV_ING_L2_MOVEMAC   Addresses that have moved locationsMAC Addresses that have moved   locations
RSV_ING_L2_FLUSHFlushed MAC addresses
RSV_ING_L2_NG_SKIP_LEARNMAC   Address egress learn attempts that have timed outMAC Address egress learn   attempts that have timed out
RSV_NO_RFD_DROPFrames dropped due to lack of   RFD buffers
RSV_ING_L2_FLOOD_BLOCKFrames dropped due to floods   being blocked on an interface
RSV_EGR_L2_DROP_FLOOD_NO_MEMBERFrames dropped due to no bridge   members on the NP
RSV_EGR_L2_FLOOD_BD_MISSFrames dropped due to no bridge   domain
RSV_ING_L2_VPLS_MAC_FILTERFrames dropped due to MAC   filtering
RSV_ING_L2_SRC_XID_MISSFrames dropped due to source XID   not found
RSV_ING_L2_SRC_XID_UNBOUNDFrames dropped due to source XID   unbound state
RSV_EGR_L2_DEST_XID_UNBOUNDFrames dropped due to   destination XID unbound state
RSV_ING_VPLS_ERR_DROPFrames dropped due to   fallthrough of normal path VPLS ingress
RSV_ING_VPWS_ERR_DROPFrames dropped due to DXID or   LAG not found on VPWS ingress
RSV_ING_L2_BD_MISSFrames dropped due to bridge   domain structure miss
RSV_ING_L2_REFLECT_FILTERFrames dropped to avoid   forwarding a flood back out the source port on ingress
RSV_EGR_L2_REFLECT_FILTERFrames dropped to avoid   forwarding a flood back out the source port on egress
RSV_EGR_L2_NOT_MEMBERFrames dropped due to bridge   member not found for multicast
RSV_EGR_L2_INACTIVE_MEMBERFrames dropped due to bridge   member inactive for multicast
RSV_EGR_L2_NG_SKIP_LEARNMAC   Address egress learn attempts that have timed outMAC Address egress learn   attempts that have timed out
RSV_L2_SHG_DROPFrames dropped due to split   horizon
RSV_L2_MSTP_DROPFrames dropped due to MSTP   blocking state
RSV_VPLS_LEARN_LIMIT_ACTION_DROP_CNTFrames dropped due to bridge   learn limit
RSV_VPLS_MCAST_SRC_MAC_DROP_CNTFrames dropped due to multicast   source MAC
RSV_VPLS_SECURE_MAC_DROP_CNTFrames dropped due to secure MAC
RSV_VPLS_SECURE_MAC_NOTIFY_CNTSecure MAC notify events
RSV_VPLS_DAI_VIOLATION_DROP_CNTFrames dropped due to DAI   violation
RSV_VPLS_DAI_NOTIFY_CNTDAI notify events
RSV_VPLS_IPSG_VIOLATION_DROP_CNTFrames dropped due to IPSG   violation
RSV_VPLS_IPSG_NOTIFY_CNTIPSG notify events
RSV_VPLS_EGR_MAC_MOVE_DENIED_CNTFrames dropped due to egress MAC   move denial
RSV_VPLS_MAC_MOVE_CNTMAC   movesMAC moves
RSV_VPLS_STATIC_MAC_MOVE_DROP_CNTFrames dropped because static   MACs cannot move
RSV_LEARN_FROM_NOTIFY_CNTMAC   learns from a MAC notifyCount of mac learn notifications   that result in newly learned macs.
RSV_VPLS_MAC_NOTIFY_ERR_DROP_CNTCount of mac learn notifications   that can't be processed by the NP due to an error. Bridge domain lookup miss,   mac entry is already there and static, or xid lookup miss and xid is global.
RSV_VPLS_MAC_DELETE_ERR_DROP_CNTCount of mac delete   notifications that can't be process by the NP due to an error. See above.
RSV_VPLS_MAC_DELETE_SECURE_DROP_CNTCount of mac delete   notifications that can't be processed by the NP due to the entry having mac   secure settings.
RSV_REFRESH_FROM_NOTIFY_CNTCount of mac learn notifications   that result in the mac entry being refreshed. This updates the timestamp so   that entry won't be aged out. For mac addresses that are actively being   forwarded.
RSV_MOVE_FROM_NOTIFY_CNTCount of mac learn notifications   that result in the mac entry being moved to a different interface (XID).
RSV_DELETE_FROM_MSG_CNTCount of mac delete   notifications that result in the mac entry being deleted.
RSV_ING_LEARN_ONLY_DROP_CNTCount of vpls frames that are   dropped due to the bridge being in learn only state. In this state, source   mac addresses are learned by not forwarded.
RSV_EGR_EFP_FILTER_TCAM_MISS_DROP_CNTCount of vpls frames that are   dropped by EFP filtering due to the vlan encapsulation on the wire not   matching any transmit interface. Can only increment if EFP filtering is   enabled.
RSV_EGR_EFP_FILTER_MISS_DROP_CNTCount of vpls frames that are   dropped by EFP filtering due to the vlan encapsulation on the wire not   matching the interface that the frame is transmitted on. Can only increment   if EFP filtering is enabled.
RSV_EGR_PREFILTER_VLAN_DROP_CNTCount of vpls frames that are   dropped by EFP filtering due to the vlan encapsulation on the fabric not   matching the interface that the frame is transmitted on. Can only increment   if EFP filtering is enabled. Can only increment if EFP filtering is enabled.
RSV_EGR_VLAN_NUM_DROP_CNTCount of vpls frames that are   dropped due to the vlan encapsulation on the fabric not having enough tags to   support the egress vlan ops. This prevents the ucode from corrupting the   frame if vlan tags are popped on egress.
RSV_ING_L2_VPLS_STORM_DROP_CNTTotal number of flood frame   drops due to vpls storm control. These are broadcast, multicast, or unknown   unicast. Only valid if vlps storm control is enabled.
RSV_ING_L2_DOT1AH_ISID_DROP_CNTTotal dot1ah vpls frame drops   due to dot1ah isid lookup miss when the provider destination mac that matches   the my-backbone-mac of the box.
RSV_ING_L2_DOT1AH_CORE_LOOP_DROP_CNTTotal dot1ah vpls frame drops   due to a provider source mac that is already programmed as the   my-backbone-mac of the box. Indicates a loop on the core side of the dot1ah   connection.
VIDMON_TCAM_LKUP_MISS_CNTVidmon policy lookup was done   and it was not successful
VIDMON_INTF_HASH_LKUP_MISS_CNTVidmon interface hash lookup was   done and it was not successful
VIDMON_RSV_FLOW_ADD_CNTVidmon flows learned
VIDMON_RSV_FLOW_UPDATE_CNTVidmon flows updated
VIDMON_FLOW_DEL_CNTVidmon flows deleted
VIDMON_FLOW_LIMIT_EXCD_CNTVidmon flows attempted to be   added but the NP is already at the limit
VIDMON_IDX_Q_EMPTY_CNTVidmon flows attempted to be   added but the NP is already at the limit
VIDMON_NG_LEARN_CNTVidmon add operations attempted   but the NP is too busy
RSV_EGR_LAG_NOT_LOCAL_DROP_CNTPacket to be forwarded over a   bundle member is not local to this NP (it means that the hash selector is not   producing the member that resides on this NP)
RSV_EGR_PW_DHCP_UNTRUSTED_DROPFrames on PW dropped due to a   DHCP untrusted host
RSV_MOFRR_INGIngress IPv4 packets received on   MoFRR mroutes
RSV_MOFRR_WD_UPDATEIngress IPv4 packets received on   MoFRR mroute from interface for which traffic is being passed, incrementing   watchdog
RSV_MOFRR_ACT_PUNTMoFRR activity watchdog   interrupt notifications received, which are then punted
RSV_MOFRR_LOSS_MSGMoFRR loss watchdog interrupt   notifications received
RSV_MOFRR_INTR_CNTMoFRR watchdog interrupt   notifications received
RSV_MOFRR_HRT_LKUP_FAIL_DROP_CNTMoFRR watchdog interrupt   notifications ignored due to watchdog entry lookup failure
RSV_MOFRR_WDT_INVALID_RES_DROP_CNTMoFRR watchdog interrupt   notifications ignored due to watchdog entry being in an invalid state   (monitoring neither activity nor loss)
RSV_MOFRR_SKIP_LRN_CNTFailed attempts to record an   MoFRR switchover, due to learn timeout
RSV_MOFRR_HRT_UPDATE_CNTMoFRR switchovers recorded
RSV_MOFRR_SEQ_NUM_FAIL_DROP_CNTMoFRR switchover notifications   ignored due to sequence number mismatch
RSV_MOFRR_SWITCH_IGNORED_CNTMoFRR switchover message heeded   but not punted because of RPF mismatch
RSV_ABF_NON_DEFAULT_RTE 
RSV_L2TP_ING_STR_MISS_DROP_CNTWhile processing a packet from a   PPPoE LAC subscriber, the ingress linecard unexpectedly did not find an entry   in the L2TP session table
RSV_L2TP_BAD_TUNNEL_ROUTE_DROP_CNTWhile processing a packet from a   PPPoE LAC subscriber, the ingress linecard unexpectedly could not route the   encapsulated packet to the LNS. The packet was about to be punted, dropped,   or routed into a GRE tunnel.
RSV_L2BC_BVICount of flooded broadcast or   multicast vpls frames that are sent to the BVI. Only increments if the BVI   interface is part of the VPLS flood group.
RSV_L2MC_BVICount of layer2 multicast routed   frames that are sent to the BVI. Only increments if the BVI interface is part   of the multicast group.
RSV_EGR_SPANCount of egress span frames   replciated by resolve.
UTURNCHECK_FRR_DROPdescription not available yet
ERP_ING_PUNTdescription not available yet
RSV_SNF_SAMPLE_PROCESSdescription not available yet
RSV_SNF_SAMPLE_PKTdescription not available yet
RSV_SNF_IPV4description not available yet
RSV_SNF_ING_PUNTdescription not available yet
RSV_SNF_EGR_PUNTdescription not available yet
RSV_MVPN_ENCAPdescription not available yet
RSV_P2MP_EGR_SEND_IP_PLEgress P2MP/MLDP packets being   replicated and prepped to loop back for IP decap processing
RSV_P2MP_EGR_SEND_TAIL_PLIngress P2MP/MLDP packets being   prepped to loop back for Tail IP decap processing
RSV_P2MP_EGR_SEND_BUD_PLIngress P2MP/MLDP packets being   replicated and prepped to loop back for other checks like OAM/PIM.
RSV_P2MP_NO_MPLS_OLEEgress P2MP/MLDP packets being   dropped as there are no MPLS interfaces on this NP for this tunnel, we still   continue to do IP decap as needed.
RSV_BGP_PA_EGR_SAPolicy Accounting (BGP)
RSV_BGP_PA_EGR_SA_DROPPolicy Accounting (BGP)
RESOLVE_INV_REMOTE_RACK_UIDB_DROP_CNTFrames destined to nV cluster   inter-rack link dropped due to egress UIDB lookup failure - software error
RESOLVE_REMOTE_RACK_PREP_CNTFrames prepared to be forwarded   on nV cluster inter-rack link. Note that punted frames are often prepared   this way even if clusters are not configured.
RESOLVE_EGR_REMOTE_RACK_ENCAP_CNTEgress frames encapsulated for   transmission on nV cluster inter-rack link
RESOLVE_ING_REMOTE_RACK_DECAP_CNTFrames received on nV cluster   inter-rack link, decapsulated, and forwarded to fabric
RSV_SEND_MAC_NOTIFY_TO_IRLMAC Notify internal messages   forwarded over nV inter-rack link
RSV_MAC_ACC_SA_MISSMac Accounting frame SMAC no   match
RSV_MAC_ACC_DA_MISSMac Accounting frame DMAC no   match
RSV_NO_REMOTE_RACK_PORTSEgress L2 flooded or multicast   packets that are dropped rather than forwarded over nV cluster inter-rack   link because the BD or mcast group has no receivers on the remote rack
RSV_GET_CTX_TMOUT_EFP_FILTERFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_IFIB_RSLTSFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_IFIB_RSLTS_GREFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_IFIB_RSLTS_LISPFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_ING_UIDB_EXTFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_QOS_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_ACL_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_PARENT_QOS_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_PARENT_QOS_IF_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_PARENT_QOS_LPBK_CTXFrames dropped due to Internal   context timeout - software error
RSV_GET_CTX_TMOUT_TM_PART2_CTXFrames dropped due to Internal   context timeout - software error
RSV_EGR_CLUSTER_SH_DROP_CNTPacket dropped due to Cluster   Split Horizon Check.
RSV_MLDP_ING_PEEK_PLMLDP packets with the inner IP   packet destined to the PIM all routers address. These packets are replicated   and one copy is sent to pipeline loopback for further processing.
RSV_DBA_FLOW_ADDdescription not available yet
RSV_DBA_FLOW_DELdescription not available yet
RSV_DBA_LEARN_LIMIT_REACHEDdescription not available yet
DBA_LRN_SCAN_MSG_CNTdescription not available yet
DBA_LRN_FLOW_ADD_REQdescription not available yet
DBA_LRN_FLOW_ADD_CNTdescription not available yet
DBA_LRN_IDX_Q_EMPTY_CNTdescription not available yet
DBA_LRN_ADD_ABORT_CNTdescription not available yet
DBA_LRN_ADD_WAIT_4_IDX_Q_CNTdescription not available yet
DBA_LRN_ADD_FAIL_CNTdescription not available yet
DBA_LRN_FLOW_DEL_REQdescription not available yet
DBA_LRN_FLOW_DEL_CNTdescription not available yet
DBA_LRN_FLOW_DEL_FAIL_CNTdescription not available yet
DBA_LRN_MSG_Q_FULL_CNTdescription not available yet
RSV_MLDP_ING_DROPIngress MLDP packets dropped due   to the ingress drop flag set on the local label; used for Make-Before-Break
RSV_MLDP_EGR_DROPEgress MLDP packets dropped due   the the egress drop flag set on the local label; used for Make-Before-Break
RSV_DBA_FLOW_DEL_dropdescription not available yet
RSV_DBA_NG_LEARN_CNTdescription not available yet
MDF_PIPE_LPBKdescription not available yet
MDF_PIPE_LPBK_EXCEPTION_DROPdescription not available yet
MDF_PIPE_LPBK_BUFFER_PREFETCHdescription not available yet
MDF_DROP_RPF_FAILIP multicast frames that failed   reverse-path-forwarding check, but not punted due to NPRF (RPF punt table)   result
MDF_MOFRR_SWITCH_IGNOREDMoFRR switchover message heeded   but not punted because NP ID mismatch. Only the NP that sends the message   punts it. Note that this value should be subtracted from the MOFRR_PUNT   counter, which is incremented prior to this test.
MDF_MOFRR_LOSS_PUNTMoFRR switchover messages punted   to LC CPU for signalling
MDF_PUNT_POLICE_DROPFrames dropped rather than   punted due to punt policing. There should be a more specific _EXCD counter   incremented, for the punt reason code.
MDF_DROP_PUNT_REASON_NO_MATCHFrames dropped rather than   punted due to invalid punt reason code
MDF_DROP_EGR_PORT_NO_MATCH 
MDF_DROP_RACK_NO_MATCHFrame dropped as Cluster Rack   table info not found
MDF_DROP_EGR_MN_PORT_NO_MATCHCount of mac notifies that are   skipped due to egress port table lookup miss. Indicates a programming error.
MODIFY_SPAN_MISS_DROPCount of span frames that are   not transmitted due to a span table lookup miss.Includes ingress and egress   span.
MDF_PUNT_RSP_VIA_HOST_PORTdescription not available yet
MODIFY_PUNT_REASON_MISS_DROPdescription not available yet
BFD_NEIGHBORdescription not available yet
BFD_NEIGHBOR_DROPdescription not available yet
BFD_LOOPdescription not available yet
BFD_LOOP_DROPdescription not available yet
BFD_MULTIHOPdescription not available yet
BFD_MULTIHOP_DROPdescription not available yet
BFD_IPv6_NEIGHBORdescription not available yet
BFD_IPv6_NEIGHBOR_DROPdescription not available yet
BFD_IPv6_LOOPdescription not available yet
BFD_IPv6_LOOP_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_0description not available yet
BFD_REMOTE_PUNT_DISC_0_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_1description not available yet
BFD_REMOTE_PUNT_DISC_1_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_2description not available yet
BFD_REMOTE_PUNT_DISC_2_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_3description not available yet
BFD_REMOTE_PUNT_DISC_3_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_4description not available yet
BFD_REMOTE_PUNT_DISC_4_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_5description not available yet
BFD_REMOTE_PUNT_DISC_5_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_6description not available yet
BFD_REMOTE_PUNT_DISC_6_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_7description not available yet
BFD_REMOTE_PUNT_DISC_7_DROPdescription not available yet
BFD_REMOTE_PUNT_DISC_8description not available yet
BFD_REMOTE_PUNT_DISC_8_DROPdescription not available yet
MODIFY_BFD_TABLE_LOOP_ERRORdescription not available yet
MODIFY_BFD_TABLE_INDEX_ERRORdescription not available yet
MODIFY_BFD_TABLE_ENTRY_ERRORdescription not available yet
MODIFY_PUNT_NF_MSGdescription not available yet
MODIFY_PUNT_NF_IPV4description not available yet
MODIFY_SEND_TO_INTER_RACK_NP_CNTIngress frames being sent to   inter-rack NP for forwarding to another rack in the nV cluster
MODIFY_NF_PUNT_RFD_PREFETCH_FAILdescription not available yet
MODIFY_SIM_ONLY_WRED_MATCH_CNTShould be unused. May indicate a   software error in which a feature counter pointer is not counting properly.
MODIFY_SIM_ONLY_Q_PRIShould be unused. May indicate a   software error in which a feature counter pointer is not counting properly.
DBG_LRN_EP_L_ON_DEMANDON-DEMAND MAC learning in Flush   and Scan modes
DBG_LRN_EP_L_BD_FL_TYPDeleted entries with BD_ID   matching pattern in Mask Register
DBG_LRN_EP_L_XID_FL_TYPDeleted or showed entries with   XID matching pattern in Mask Reg
DBG_LRN_EP_L_BD_GRP_XID_TYPDeleted entries within BD that   have XID LearnKey mismatch
DBG_LRN_EP_L_BD_GRP_ALL_TYPDeleted entries within BD that   have XID or BD LearnKey mismatch
DBG_LRN_EP_L_GRP_XID_LOCAL_FL_TYPDeleted local XID entries with   XID Learn Key mismatch
DBG_LRN_EP_L_GRP_XID_GLOBAL_FL_TYPDeleted global XID entries with   XID Learn Key mismatch
DBG_LRN_EP_L_GRP_XID_ALL_FL_TYPDeleted entries with XID Learn   Key mismatch
DBG_LRN_EP_L_GRP_BD_FL_TYPDeleted entries with BD Learn   Key mismatch
DBG_LRN_EP_L_GRP_ALL_FL_TYPDeleted entries with BD or XID   Learn Key mismatch, or showed all entries that have matching LearnKey
DBG_LRN_REFRESH_ABORT_CNTAbort refresh due to queue full
DBG_LRN_MAC_CACHE_QUEUE_FULL_CNTNumber of times Scan message   needed to wait for room on the queue
DBG_LRN_DEL_MSG_QUEUE_FULL_CNTNumber of times checking whether   the message queue is full
LRN_INVALID_ON_DEMAND_FILTER_TYPECount of unknown on-demand flush   request types. Indicates a corrupted flush request message from the host, or   a software error
LRN_ON_DEMAND_FLUSH_DELETE_ENTRYNumber of mac entries deleted by   all on-demand flush requests from the host.
LRN_PERIODIC_AGING_DELETE_ENTRYNumber of mac entries deleted by   the aging scan machine due to aging out, or due to a learn key mismatch   detected.
LRN_LEARN_REQUEST_DELETE_ENTRYNumber of mac deletes processed   by the learn engine - in response to a request from resolve - does not   include aging or on-demend flush deletes. Usually is due to a delete frame   received by the egress np from the fabric.
LRN_L2FIB_MAC_TBL_FULLCounts of missed learns due to   mac hash table full. Only possible at high scale
VIDMON_LRN_ADD_ABORT_CNTVidmon flow learn operations   aborted
VIDMON_LRN_ADD_FAIL_CNTVidmon flow learn operations   that failed
VIDMON_LRN_ADD_WAIT_4_IDXQL_CNTWaits for resources before   adding a vidmon flow
VIRTUAL_IF_LAYER2_UCAST_INPUT_CNTIngress unicast frames for   virtual interface such as BVI, MIRP inject, SPAN loopback
VIRTUAL_IF_LAYER2_MCAST_INPUT_CNTIngress multicast frames for   virtual interface such as BVI, MIRP inject, SPAN loopback
VIRTUAL_IF_LAYER2_BCAST_INPUT_CNTIngress broadcast frames for   virtual interface such as BVI, MIRP inject, SPAN loopback
VIRTUAL_IF_PROTO_IPV4_UCST_INPUT_CNTdescription not available yet
VIRTUAL_IF_PROTO_IPV4_MCST_INPUT_CNTdescription not available yet
VIRTUAL_IF_PROTO_MPLS_INPUT_CNTdescription not available yet
VIRTUAL_IF_GENERIC_INPUT_DROPdescription not available yet
VIRTUAL_IF_PROTO_IPV6_UCST_INPUT_CNTdescription not available yet
VIRTUAL_IF_PROTO_IPV6_MCST_INPUT_CNTdescription not available yet
VIRTUAL_IF_LAYER2_BCAST_EXCD_DROP_CNTVPLS broadcast frames dropped   due to storm control, instead of flooded. Only valid when vpls storm control   is enabled.
VIRTUAL_IF_LAYER2_MCAST_EXCD_DROP_CNTVPLS multicast frames dropped   due to storm control, instead of flooded. Only valid when vpls storm control   is enabled.
VIRTUAL_IF_LAYER2_UNK_UCAST_EXCD_DROP_CNTVPLS unknown unicast frames   dropped due to storm control, instead of flooded. Only valid when vpls storm   control is enabled.
VIRTUAL_IF_GENERIC_UNK_PROT_DROP_CNTDrops of unknown protocol frames   detected on L3 interface; these are dropped instead of punted.
PUNT_INVALIDInvalid Punt Reason - this   should not occur
PUNT_INVALID_DROPInvalid Punt Reason - this   should not occur
PUNT_ALLPunt All Set - not implemented   by ucode
PUNT_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CDPPunt Ingress CDP protocol frames   - layer3 interface only
CDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
ARPPunt Ingress ARP protocol frames   - layer3 interface only
ARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
RARPPunt Ingress Reverse ARP   protocol frames - layer3 interface only
RARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CGMPPunt Ingress CGMP protocol   frames - layer3 interface only
CGMP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
LOOPPunt Ingress ELOOP protocol   frames - layer3 interface only
LOOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
SAP_PUNTNot implemented by ucode
SAP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
BUNDLE_PROTO_PUNTNot implemented by ucode
BUNDLE_PROTO_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
UNKNOWN_OSINot implemented by ucode
UNKNOWN_OSI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DIAGSNot implemented by ucode
DIAGS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
SNIFFNot implemented by ucode
SNIFF_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_GLOBAL_IFHANDLE_TCAM_MISSInterface handle lookup in TCAM   didn't result anything useful. (usually a sw bug)
PUNT_GLOBAL_IFHANDLE_TCAM_MISS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DROP_PACKETNot implemented by ucode
DROP_PACKET_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_OTHERIngress NP Punt or Egress NP   Punt of CFM other packets (link trace or perf. mon.). Ingress punts can occur   on a Layer2 or Layer3 interface Egress punts occur on a Layer2 interface   only.
CFM_OTHER_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_OTHER_RSP_PUNT 
CFM_OTHER_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DHCP_SNOOP_REQIngress Punt of DHCP snoop   request frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REQ_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DHCP_SNOOP_REPLYIngress Punt of DHCP snoop reply   frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REPLY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTPIngress NP Punt or Egress NP   Punt of MSTP frames. For Layer2 VPLS or Layer3, punt is on ingress frames   only. For Layer3 VPWS, punt is on egress frames only.
MSTP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_PBIngress NP Punt or Egress NP   Punt of MSTP Provider Bridge frames. For Layer2 VPLS or Layer3, punt is on   ingress frames only. For Layer3 VPWS, punt is on egress frames only.
MSTP_PB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DAINot implemented by ucode
DAI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IGMP_SNOOPIngress punt of snooped IGMP or   PIM frames - layer2 interface only and IGMP snooping enabled
IGMP_SNOOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPSUBNot implemented by ucode
IPSUB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PPPOENot implemented by ucode
PPPOE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PPPNot implemented by ucode
PPP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
EFMIngress Punt of EFM Protocol   frames - layer3 interface only
EFM_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPv4_OPTIONSIngress Punt of IP frames with   options - layer3 interface only - IPV4, IPV6
IPv4_OPTIONS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_PLU_PUNTIngress or Egress punt of IPV4   frames with punt flag set in Leaf results or R-LDI results - layer3 interface   only
IPV4_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4MC_DO_ALLIPV4 Mcast frames punted and not   not forwarded. (The punt code is best interpreted as instructions to the LC   CPU receiving the packet.)
IPV4MC_DO_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4MC_DO_ALL_BUT_FWDIPV4 Mcast frames punted and   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV4MC_DO_ALL_BUT_FWD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_DOUBLE_TUNNELNot implemented by ucode
IPV4_DOUBLE_TUNNEL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NO_MATCHIngress or Egress IPV4 IPV6   unicast frames punted due to ICMP Unreachable (i.e., next hop down)
PUNT_NO_MATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TUNNEL_FORUSNot implemented by ucode
IPV4_TUNNEL_FORUS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_FRAG_TUNNELNot implemented by ucode
IPV4_FRAG_TUNNEL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_CANNOT_FRAGNot implemented by ucode
IPV4_CANNOT_FRAG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TTL_ERRORIngress IPV4 frames with a   punted due to TTL = 1 (TTL of 0 is dropped)
IPV4_TTL_ERROR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_FRAG_NEEDED_PUNT 
IPV4_FRAG_NEEDED_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_BFDNot implemented by ucode
IPV4_BFD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
RP_PUNTAn ingress IPV4 or MPLS has the   RP punt bit set in the NR-LDI or RX adjacency
RP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IFIBIngress IPV4 ucast or IPV6   frames has an IFIB lookup match resulting in an IFIB punt
PUNT_IFIB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ADJIngress IPV4 ucast or MPLS   frames with the adjacency punt bit set in the NR-LDI or RX adjacency. Egress   IPV4 ucast or MPLS frames with the adjacency punt bit set in the NR-LDI or TX   adjacency.
PUNT_ADJ_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNKNOWN_IFIBIngress IPV4 ucast frames with   the IFIB bit set in the LEAF or R-LDI and the IFIB lookup does not get a   match, OR ingress MPLS frames with the IFIB bit set in the LEAF or R-LDI
PUNT_UNKNOWN_IFIB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_DENYIngress or Egress frames with a   deny action set in the ACL policy and ACL punt (instead of drop) is enabled
PUNT_ACL_DENY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_LOGIngress or Egress frames with an   ACL policy match and ACL logging is enabled. Layer3 frames only.
PUNT_ACL_LOG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_LOG_L2Ingress or Egress frames with an   ACL policy match and ACL logging is enabled. Layer2 frames only.
PUNT_ACL_LOG_L2_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_LINK_LOCALIngress IPV6 frames received   that are link local packets - these are punted - layer3 interface only
IPV6_LINK_LOCAL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_HOP_BY_HOPIngress IPV6 frames received   that are hop by hop packets - these are punted - layer3 interface only
IPV6_HOP_BY_HOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_TTL_ERRORIngress IPV6 frames that have a   TTL error - these are punted - layer3 interface only
IPV6_TTL_ERROR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_PLU_PUNTIngress or Egress punt of IPV6   frames with punt flag set in Leaf results or R-LDI results - layer3 interface   only
IPV6_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_PLU_RCVNot implemented by ucode
IPV6_PLU_RCV_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_ROUT_HEADIngress IPV6 frames received   that are router header packets - these are punted - layer3 interface only
IPV6_ROUT_HEAD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_TOO_BIGEgress IPV6 frames that are too   bit - exceed MTU - these are punted - layer3 interface only
IPV6_TOO_BIG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_MISS_SRCNot implemented by ucode
IPV6_MISS_SRC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_SRC_LINK_LOCALSource address of ipv6 header is   a link local address (needs punt!)
IPV6_SRC_LINK_LOCAL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6MC_DO_ALLIPV6 Mcast frames punted and not   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV6MC_DO_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6MC_DO_ALL_BUT_FWDIPV6 Mcast frames punted and   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV6MC_DO_ALL_BUT_FWD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_PLU_PUNTIngress MPLS frames punted due   to Punt set in the Leaf or R-LDI, plus Ingress MPLS router alert frames,   which are punted
MPLS_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_FOR_USIngress MPLS frames punted due   to IFIB (for-us) set in the Leaf or R-LDI
MPLS_FOR_US_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2TP_COOKIE_MISMATCHNot implemented by ucode
PUNT_L2TP_COOKIE_MISMATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2TP_TUNNEL_DOWNNot implemented by ucode
PUNT_L2TP_TUNNEL_DOWN_EXCDFrames dropped (rather than   punted for the reason above) due to policing
GRE_BAD_FLAGSNot implemented by ucode
GRE_BAD_FLAGS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
GRE_NON_IPV4Not implemented by ucode
GRE_NON_IPV4_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TUNNEL_NOT_CONFIGDNot implemented by ucode
IPV4_TUNNEL_NOT_CONFIGD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_VCCV_PKTIngress MPLS frames that are PW   VCCV frames - must be PWtoAC de-aggregation flows
PUNT_VCCV_PKT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_QNET_PKTNot implemented by ucode
PUNT_QNET_PKT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_SERVICE_CARDNot implemented by ucode
PUNT_SERVICE_CARD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_STATISTICSStatistics gathering frames   punted to LC host - generated by statistics scanning machine
PUNT_STATISTICS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RSP_ACTNot implemented by ucode
PUNT_DIAGS_RSP_ACT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RSP_STBYNot implemented by ucode
PUNT_DIAGS_RSP_STBY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
NETIO_RP_TO_LC_CPU_PUNTPreroute egress inject frames   received from the RP that are sent to the LC host
NETIO_RP_TO_LC_CPU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MOFRR_PUNTIPV4 multicast-only fast reroute   punts. These are notices to the LC to indicate traffic activity or loss.   NOTE: Subtract MDF_MOFRR_SWITCH_IGNORED from this to find the actual number   of punts, since this counter is incremented prior to the "switch-ignored"   check.
MOFRR_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
VIDMON_PUNTVideo monitoring punt frames
VIDMON_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
VIDMON_PUNT_FLOW_ADDVideo monitoring new flow added   punt frames
VIDMON_PUNT_FLOW_ADD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DBGTRACE_PUNTDebug Trace Packets
DBGTRACE_PUNT_EXCDSee STATS_STATIC_DBGTRACE
SYNCE_PUNTSynchronous ethernet packets   punted
SYNCE_PUNT_EXCDSee STATS_STATIC_PUNT_SYNCE
CFM_CCIngress NP Punt or Egress NP   Punt of CFM CC packets (continuity check). Ingress punts can occur on a   Layer2 or Layer3 interface Egress punts occur on a Layer2 interface only.
CFM_CC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_CCM_RSP_PUNTContinuity Fault Management   Packets punted to RSP
CFM_CCM_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_RSP_PUNTSTP packets through normal   bridging
MSTP_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_PB_RSP_PUNTSTP packets through bundle   interface, punted to RSP
MSTP_PB_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PUNTMVRP 1D packets punted
MVRP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PB_PUNTMVRP 1AD packets punted
MVRP_PB_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_RSP_PUNTMVRP1D packets coming over   bundle and getting punted to RSP
MVRP_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PB_RSP_PUNTMVRP 1AD packets coming over   bundle and punted to RSP
MVRP_PB_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETFLOWnetflow packets punted.
PUNT_NETFLOW_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETFLOW_RESERVEDNot used by ucode but reserved   for netflow
PUNT_NETFLOW_RESERVED_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_FRAG_NEEDED_PUNTMPLS packet for which   fragmentation is required
MPLS_FRAG_NEEDED_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_TTL_ONE_PUNTMPLS packet for which TTL   expired
MPLS_TTL_ONE_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPV4_ADJ_NULL_RTEIPv4 packets with NULL route   adjacency
PUNT_IPV4_ADJ_NULL_RTE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPV6_ADJ_NULL_RTEIPv6 packets with NULL route   adjacency
PUNT_IPV6_ADJ_NULL_RTE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2_IPIW_ARPL2VPN IP Interworking ARP   packets
PUNT_L2_IPIW_ARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_SECURE_VIOLATIONMAC security violation packets
PUNT_MAC_SECURE_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_SECURE_VIOLATION_SHUTPackets punted as shutdown MAC   secure violations
PUNT_MAC_SECURE_VIOLATION_SHUT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DAI_VIOLATIONPackets punted for Dynamic Arp   Inspection violation
PUNT_DAI_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPSG_VIOLATIONPackets punted for IP Source   Guard violation
PUNT_IPSG_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_LLDPLink Layer Discovery   Protocol(LLDP) packets punted
PUNT_LLDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_LLDP_RSPLink Layer Discovery   Protocol(LLDP) packets over bundle punted to RSP
PUNT_LLDP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ELMIEnhanced Local Management   Interface(ELMI) packets punted
PUNT_ELMI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PVSTPacket punted for Per Vlan   Spanning Tree Protocol
PUNT_PVST_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ERP_LCEthernet Ring Protection packets   punted to LC
PUNT_ERP_LC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ERP_RSPEthernet Ring Protection packets   punted to RSP
PUNT_ERP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETIO_LC_TO_RSPpackets from netio of LC punted   to RSP
PUNT_NETIO_LC_TO_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DBADestination based netflow   packets punted
PUNT_DBA_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_LINKMONCluster link monitoring packets   punted
PUNT_CLUSTER_LINKMON_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_DSCCluster Distributed Shelf   Controller packets punted
PUNT_CLUSTER_DSC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_TESTCluster Test packets punted
PUNT_CLUSTER_TEST_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_ETHERNETPTP ethernet frames punted
PUNT_PTP_ETHERNET_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_IPV4Point-to-point IPv4 packets   punted
PUNT_PTP_IPV4_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_IPV6Point-to-point Ipv6 packets   punted
PUNT_PTP_IPV6_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RX_BUFFDiagnostic Receive Buffer   packets punted
PUNT_DIAGS_RX_BUFF_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPP_RSPOn a bundle subscriber   interface, a PPP Control packet was received on a PPPoE enabled parent   interface and punted to the RSP
PUNT_PPP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_RSPOn a bundle subscriber   interface, a PPPoE Ctrl packet was received on a PPPoE enabled parent   interface and punted to the RSP
PUNT_PPPOE_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_PACKET_CONFIG_MISMATCHOn a non-bundle subscriber   interface, a PPPoE Control or Data packet was received on a PPPoE parent   interface, met one of the following conditions and was punted to the RSP. 1.   SRC Mac did not match session’s SRC Mac, 2. VLAN ID(s) inner and/or outer did   not match session's VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSPOn a bundle subscriber   interface, a PPPoE Control or Data packet was received on a PPPoE parent   interface, met one of the following conditions and was punted to the RSP. 1.   SRC Mac did not match session’s SRC Mac, 2. VLAN ID(s) inner and/or outer did   not match session's VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_L2TPV2Layer 2 Tunneling Protocol   Version 2 packets punted
PUNT_PPPOE_L2TPV2_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_CACHE_MSGMAC cache message packets
PUNT_MAC_CACHE_MSG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UDLDUnidirectional link detection   packets punted
PUNT_UDLD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_HTTPRIPV4 HTTP redirect packets   punted
PUNT_HTTPR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_SDPSatellite Discovery Protocol   packets punted
PUNT_SDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MIRPMultiple Backbone Instance   Identifier Protocol packets punted
PUNT_MIRP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNCLASSIFIEDunclassified packets in the   pipeline (should not happen)
PUNT_UNCLASSIFIED_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNCLASSIFIED_RSPdescription not available yet
PUNT_UNCLASSIFIED_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_HTTPR_IPV6HTTP redirect (BNG) punt for   ipv6
PUNT_HTTPR_IPV6_EXCDFrames dropped (rather than   punted for the reason above) due to policing

 

 

Trident

(some overlap with typhoon)

Display   nameDescription
PARSE_ENET_RECEIVE_CNTTotal frames received from   Ethernet on an ingress NP
PARSE_FABRIC_RECEIVE_CNTTotal frames received by an   egress NP from the fabric -
PARSE_LOOPBACK_RECEIVE_CNTTotal loopback frames received   by an NP -
PARSE_INTERFLEX_RECEIVE_CNTTotal frames received by an NP   from the interflex loopback port - these are ingress loopback frames
PARSE_SVC_LPBK_RECEIVE_CNTdescription not available yet
PARSE_ABF_LPBK_RECEIVE_CNTpackets subject to ABF   recirculated/fed back
PARSE_BVI_RECEIVE_CNTreceived packets on the BVI
MODIFY_FABRIC_TRANSMIT_CNTTotal frames sent to fabric by   an ingress NP
MODIFY_ENET_TRANSMIT_CNTTotal frames sent to Ethernet by   an egress NP
PARSE_INGRESS_DROP_CNTTotal packets dropped by ingress   NP in the TOPparse engine
PARSE_EGRESS_DROP_CNTTotal packets dropped by egress   NP in the TOPparse engine
RESOLVE_INGRESS_DROP_CNTTotal packets dropped by ingress   NP in the TOPresolve engine
RESOLVE_EGRESS_DROP_CNTTotal packets dropped by egress   NP in the TOPresolve engine
RESOLVE_NF_DISABLED_DROP_CNTpackets dropped because netflow   is not enabled
MODIFY_INGRESS_DROP_CNTTotal packets dropped by ingress   NP in the TOPmodify engine
MODIFY_EGRESS_DROP_CNTTotal packets dropped by ingress   NP in the TOPmodify engine
MODIFY_MCAST_FLD_LOOPBACK_CNTTotal packets sent to TM   loopback for Multicast/L2 Flood replications.
MODIFY_SVC_LOOPBACK_CNTPacket recirculated/fed back
PARSE_INGRESS_PUNT_CNTTotal packets flagged for   punting by the ingress NP in the TOPparse engine
PARSE_EGRESS_PUNT_CNTTotal packets flagged for   punting by the egress NP in the TOPparse engine
PARSE_EGRESS_BFD_PUNT_CNTBFD packets that have reached   the egress LC (on which the bfd session is hosted) and which have been remote   punted from a ingress LC
MODIFY_PUNT_DROP_CNTTotal punt packets dropped by   ingress TOPmodify engine due to punt policing, OR due to punt reason lookup   fail.
MODIFY_LC_PUNT_CNTTotal frames punted to LC host   (all punts are handled by the TOPmodify engine)
MODIFY_RP_PUNT_CNTTotal frames punted to RP host   (all punts are handled by the TOPmodify engine)
MODIFY_LC_PUNT_EXCD_CNTPunt frames to LC dropped due to   punt policing
MODIFY_RP_PUNT_EXCD_CNTPunt frames to RP dropped due to   punt policing
MODIFY_RPF_FAIL_DROP_CNTIP multicast frames that failed   reverse-path-forwarding check, but not punted due to NPRF (RPF punt table)   result
VIDMON_PUNT_FAILED_NO_TXBUF_CNTPunt frames dropped by Video   Monitoring due to no buffer
MACN_FAILED_NO_TXBUF_CNTFailed to prefetch buffer to   store mac notify
RMODIFY_NO_BUF_CNTAttempt to allocate a new   buffer, but allocation failed.
MODIFY_RX_SPAN_CNTIngress frames sent to fabric on   a SPAN link - these frames are replicated
MODIFY_TX_SPAN_CNTEgress frames sent to Ethernet   on a SPAN link - these frames are replicated
MODIFY_TX_IFLEX_CNTIFLEX frames processed by   TOPmodify transmit
MODIFY_PW_SPAN_CNTPW SPAN frames processed by   TOPmodify
MODIFY_BFD_TABLE_LOOP_ERRORBFD packets that have been   received through the loopback path and not from the wire.
MODIFY_BFD_TABLE_INDEX_ERRORBFD LPTS discriminator table   index range is invalid for the received BFD multihop packet.
MODIFY_BFD_TABLE_ENTRY_ERRORBFD LPTS discriminator table   entry is invalid for the received BFD multihop packet.
MODIFY_FRAMES_PADDED_CNTTotal number of frames sent to   fabric that were undersized and required padding to 60 bytes.
PARSE_LC_INJECT_TO_FAB_CNTFrames injected from LC host   that are intended to go directly to fabric to an egress LC without   modification or protocol handling (inject header is stripped by microcode)
PARSE_LC_INJECT_TO_PORT_CNTFrames injected from LC host   that are intened to go directly to an Ethernet port without modification or   protocol handling (inject header is stripped by microcode)
PARSE_INJECT_DIAGS_CNTDiag packets inserted injected
PARSE_INJECT_DIAGS_RX_BUFF_CNTreceive diag packets buffered
PARSE_LPBK_DIAGS_RX_BUFF_CNTloopback for buffered diag   packets
PARSE_FAB_INJECT_IPV4_CNTTotal number of IPV4 inject   frames received by the egress NP from the fabric (sent from RP)
PARSE_FAB_INJECT_PRTE_CNTTotal number of layer 3 preroute   inject frames received by the egress NP from the fabric (sent from RP)
PARSE_FAB_INJECT_UNKN_CNTTotal number of unknown inject   frames received by the egress NP from the fabric (sent from RP). These are   punted to the LC host.
PARSE_RP_INJECT_CLUSTER_LC_PUNT_CNTnot applicable to trident since   cluster is not supported on trident.
PARSE_FAB_INJECT_SNOOP_CNTTotal number of IGMP/DHCP snoop   inject frames received by the egress NP from the fabric (sent from RP). For   DHCP, these are always re-injects from the RP. For IGMP, these can be   re-injects or originated injects from the RP.
PARSE_FAB_INJECT_MPLS_CNTTotal number of mpls inject   frames received by the egress NP from the fabric (sent from RP).
PARSE_FAB_INJECT_IPV6_CNTTotal number of IPV6 inject   frames received by the egress NP from the fabric (sent from RP)
PARSE_FAB_INJECT_IPMC_CNTTotal number of IP Multicast   inject frames received by the egress NP from the fabric (sent from RP)
GENERIC_IPV6_UNSUPPORTEDTotal number of packets dropped   due to unsupported feature on the current ucode bundle.
XAUI_TRAINING_PKT_DISCARDDiag packets sent to the egress   NP at startup from the fabric FPGA. These are ignored and dropped by ucode.
PRS_DEBUGTRACE_EVENTEvents that match a   preconfigured debug trace on an ingress or egress frame. Currently the debug   trace is only configurable for all drop events.
PARSE_MOFRR_WATCHDOG_INTR_RCVDL3 Multicast Fast Reroute   Watchdog interrupts received by nP. The count is summation of both Activity   and Loss interrupt counts.
PARSE_MOFRR_SWITCH_MSG_RCVD_FROM_FABL3 Multicast Fast Reroute Switch   (Flood) messages received by nP from Fabric.
PARSE_EGR_MVPN_ENC_PASS1Egress MVPN packets, prior to   replication on this NP
PARSE_EGR_MVPN_ENC_PASS2Egress MVPN packets, after   replication per core tunnel plus one for local receivers, prior to   replication per core mroute or local receiver mroute
PARSE_EGR_MVPN_VRF_COPYmulticast vpn packet copy
PARSE_EGR_MVPN_NO_ENCAP_DROPEgress MVPN packets for which   there are no core tunnels or local receivers on this NP
RESOLVE_INGRESS_L3_PUNT_CNTTotal Layer3 packets flagged for   punting by an ingress NP in the TOPresolve engine due to lookup results or   other cases such as ICMP unreachable
RESOLVE_INGRESS_IFIB_PUNT_CNTTotal Layer3 packets flagged for   punting due to an ingress IFIB lookup match
RESOLVE_INGRESS_L2_PUNT_CNTTotal Layer2 packets flagged for   punting by the egress NP in the TOPresolve engine due to cases such as   IGMP/DHCP snooping or punting of ingress L2 protocol such as LAG or MSTP or   CFM
RESOLVE_EGRESS_L3_PUNT_CNTTotal Layer3 packets flagged for   punting by an ingress NP in the TOPresolve engine due to lookup results or   other cases such as ICMP unreachable
RESOLVE_EGRESS_L2_PUNT_CNTTotal Layer2 packets flagged for   punting by the egress NP in the TOPresolve engine due to cases such as   IGMP/DHCP snooping or punting of ingress L2 protocol such as MSTP or CFM
RESOLVE_INGRESS_LEARN_CNTTotal number of VPLS Source MAC   learns on an ingress frame - learned locals.
RESOLVE_LEARN_FROM_NOTIFY_CNTTotal number of VPLS Source MAC   learns from mac notify received.
RESOLVE_BD_FLUSH_DELETE_CNTTotal number of learned entries   deleted due to a Bridge Domain Flush
RESOLVE_PORT_FLUSH_CNTMAC flush on a port
RESOLVE_PORT_FLUSH_DROP_CNTEgress unicast frames dropped   because the destination port has been flushed. For each a Mac Delete frame is   sent to the bridge domain to remove the destination address.
RESOLVE_PORT_FLUSH_DELETE_CNTLearned MACs deleted due to   their source port being flushed. Does not include MACs deleted due to MAC   Delete message.
RESOLVE_VPLS_SECURE_MAC_DROP_CNTNumber of frames dropped due to   MAC secure
RESOLVE_VPLS_MAC_MOVE_SKIPPED_CNTNumber of MAC-move notifications   skipped due to learn machine congestion
RESOLVE_VPLS_MAC_MOVE_CNTTotal number of source MAC moves   detected as a result of an ingress learn local or mac notify receive learn.
RESOLVE_AGE_NOMAC_DROP_CNTMAC scan aging message dropped   due to an L2FIB lookup fail for the scanned mac entry.
RESOLVE_AGE_MAC_STATIC_DROP_CNTMAC scan aging message dropped   due to static MAC address for the scanned mac entry.
RESOLVE_MOFRR_HASH_UPDATE_CNTMoFRR active flag updates in   MoFRR hash table. This counter indicates the switch message is processed   successfully, i.e. RDT/Hash/Direct table lookups are successful and MoFRR   Active flag is updated in MoFRR hash table.
RESOLVE_VIDMON_FLOWS_DELETED_BY_AGINGInactive Video Monitoring flows   deleted by hardware aging mechanism.
RESOLVE_VIDMON_CLASS_FLOW_LIMIT_REACHEDIndicates that the Video   Monitoring Maximum flows per class limit reached.
RESOLVE_VIDMON_FLOW_START_INTRVL_RESETVideo Monitoring flow start   interval reset to current Real Time Clock Tick (instead of updating with   actual next packet arrival time) because the flow has been inactive for more   than 3 interval timeouts.
RESOLVE_INVALID_VIDMON_PUNT_DROPsanity check for the punt reason
RESOLVE_MOFRR_SWITCH_MSG_INGNOREDTotal numbers of MoFRR switch   (flood) messages are filtered without being punted to LC CPU. This counter   indicates switch message is processed successfully (i.e. lookups successful   and MoFRR flag is updated in hardware hash table), but the message is not   punted to LC CPU either because the RPF Id is not primary or RPF Id is not   local to the nP.
RESOLVE_MOFRR_SWITCH_MSG_TO_FABMoFRR switch (flood) messages   generated by nP as a result of Loss Activity interrupts. This counter   indicates that the Loss Activity interrupt is processed successfully by   ingress LC and MoFRR switch message is flooded to all LCs towards fabric.
RESOLVE_EGR_RPF_FAIL_DROPIP Multicast packets dropped   because they failed Reverse Path Forwarding test: they didn't arrive on the   correct interface/subinterface
RESOLVE_ABF_NON_DEFAULT_RTE 
RESOLVE_EGR_MVPN_DECAPEgress MVPN packets to be   decapsulated for local receivers, for bud-node.
MODIFY_SEND_TO_INTER_RACK_NP_CNTNumber of frames sent to cluster   inter-rack path
IPV4_SANITY_ADDR_CHK_FAILURESIngress IPV4 address martian   check failure
DROP_IPV4_LENGTH_ERRORIngress IPV4 header length   invalid or frame length incompatible with fragment length
DROP_IPV4_HDR_LENGTH_ERRORUnused by ucode
DROP_IPV4_L4HDR_LENGTH_ERRORUnused by ucode
DROP_IPV4_CHECKSUM_ERRORIngress IPV4 checksum invalid
IPV4_EXCEEDS_MTUUnused by ucode
DROP_TCP_FLAGUnused by ucode
IPV6_SANITY_ADDR_CHK_FAILURESIngress IPV6 frame source or   destination address invalid
DROP_IPV6_LENGTH_ERRORIngress IPV6 frame length   invalid
DROP_IPV6_SANITYUnused by ucode
MPLS_TTL_ERRORIngress MPLS frame outer label   TTL is 0
MPLS_INVALID_EXPNULLUnused by ucode
MPLS_EXCEEDS_MTUMPLS TTL exceeded - punt frame   to host
ING_SLOW_PROTO_UNKNOWN_SUBTYPEIngress slow protocol frame on   an L3 interface that is not recognized (not LACP/EFM/SYNCE).
UNKNOWN_L2_ON_L3_DISCARDUnknown Layer2 frame   (non-IPV4/V6/MPLS) on a Layer3 interface. These are dropped. Known layer2   protocols are punted on a layer3 interface such as ARP/LACP/CDP/ISIS/etc.
UNKNOWN_LAYER2Unused by ucode
RESOLVE_L2_PROT_BYTE_ERROR_DROP_CNTInvalid L2 protocol action set -   this is an internal ucode programming error on an ingress or egress L2 frame   if incremented.
RESOLVE_UNUSED_REP_DROPdescription not available yet
ELMI_ADDR_TYPE_ERRORethernet LMI address error
NPH_L2SIZE_SANITY_DROPdescription not available yet
INJ_FEAT_HDR_SANITY_DROPdescription not available yet
UDLD_TAGGED_ERRORsame
RSV_DROP_IFIB_TTL_CHECKpacket dropped in internal fib   due to TTL issue
DROP_IPV4_NOT_ENABLEDIngress IPV4 frame and IPV4 not   enabled in L3 ingress uidb
DROP_IPV4_TTL_ZEROTTL of packet is zero (whoops!)
DROP_IPV4_LINE_STATUSUnused by ucode
BFD_NOT_ENABLEDBFD is not enabled on the   interface on which the BFD packet was receieved
DROP_IPV4_NEXT_HOP_DOWNDrop bit set in rx adjacency   (ingress) or tx adjacency (egress) and ICMP punt disabled in uidb   (ingress/egress) for the interface - drop bit in nr-ldi or adjacency result
IPV4_PLU_DROP_PKTDrop bit set in leaf or nr-ldi   lookup miss (ingress/egress) and ICMP punt disabled in uidb (ingress/egress)   for the interface.
IPV4_RP_DEST_DROPIPV4 RP drop bit set in nr-ldi   or adjacency result and ICMP punt disabled in uidb (ingress/egress) for the   interface
IPV4_NULL_RTE_DROP_PKTNo IPV4 route (ingress/egress)   and ICMP punt disabled in uidb (ingress/egress) for the interface - null   route set in leaf or r-ldi
MCAST_MVPN_IPV4_PIM_ALL_RTRS_DETECTEDIngress MVPN IPv4 packets that   are PIM packets destined to all routers, and therefore forwarded,   decapsulated, and punted
MCAST_MVPN_IPV6_PIM_ALL_RTRS_DETECTEDIngress MVPN IPv6 packets that   are PIM packets destined to all routers, and therefore forwarded,   decapsulated, and punted
MLDP_IPV4_PIM_ALL_RTRS_DETECTEDIngress MLDP IPv4 core packets   that are PIM packets destined to all routers, and therefore forwarded,   decapsulated, and punted
MLDP_IPV6_PIM_ALL_RTRS_DETECTEDIngress MLDP IPv6 core packets   that are PIM packets destined to all routers, and therefore forwarded,   decapsulated, and punted
PARSE_IPV4_PIM_ALL_RTRS_LOOPBK_RXIngress IPv4 core PIM   all-routers packets that were decapsulated and looped back, to be punted.
PARSE_IPV6_PIM_ALL_RTRS_LOOPBK_RXIngress IPv6 core PIM   all-routers packets that were decapsulated and looped back, to be punted.
IPV4_MCAST_MVPN_PIM_ALL_RTRS_NO_IFIB_MATCHIngress IPv4 core PIM   all-routers packets to be punted but not matching any LPTS entries
MCAST_MVPN_EGR_RPF_NON_MLC_DROPEgress RPF-fail packets that   would be punted for signalling, but this is not the master LC/NP
MCAST_MVPN_TUNNEL_MTU_DROPEgress MVPN packets encapsulated   to transmit on core route, but which are dropped due to exceeding core route   MTU
MCAST_MLDP_TUNNEL_MTU_DROPEgress MLDP packets encapsulated   to transmit on core route, but which are dropped due to exceeding core route   MTU
MLDP_LEAF_ING_DROPIngress MLDP packets dropped due   to the ingress drop flag set on the local label; used for Make-Before-Break
MLDP_LEAF_EGR_DROPEgress MLDP packets dropped due   the the egress drop flag set on the local label; used for Make-Before-Break
IPV4_MVPN_ING_DECAP_MVET_NO_MATCHIngress MVPN decap packets   dropped due to not matching any MVPN Encap Table entry (decap and encap share   the same table)
IPV4_MVPN_ING_ENCAP_MVET_NO_MATCHIngress MVPN encap packets   dropped due to not matching any MVPN Encap Table entry
IPV4_MVPN_EGR_ENCAP_MVET_NO_MATCHEgress MVPN encap packets   dropped due to not matching any MVPN Encap Table entry
MLDP_EGR_ENCAP_LABEL_NO_MATCHLookup for the head local label   failed to find a matching entry during MLDP encap 2nd pass
DROP_IPV6_NOT_ENABLEDIngress IPV6 frame and IPV6 not   enabled in L3 ingress uidb
DROP_IPV6_NEXT_HOP_DOWNDrop bit set in rx adjacency   (ingress) or tx adjacency (egress) and ICMP punt disabled in uidb   (ingress/egress) for the interface - drop bit in nr-ldi or adjacency result
PUNT_IPV6_MISS_SRC_COMPUnused by ucode
DROP_IPV6_PLUDrop bit set in leaf or nr-ldi   lookup miss (ingress/egress) and ICMP punt disabled in uidb (ingress/egress)   for the interface.
IPV6_RP_DEST_DROPRP drop bit set in nr-ldi or   adjacency result and ICMP punt disabled in uidb (ingress/egress) for the   interface
IPV6_NULL_RTE_DROP_PKTNo IPV6 route (ingress/egress)   and ICMP punt disabled in uidb (ingress/egress) for the interface - null   route set in leaf or r-ldi
MPLS_NOT_ENABLED_DROPIngress MPLS frame and MPLs not   enabled in L3 ingress uidb
MPLS_PLU_NO_MATCHIngress MPLS frame and outer   label lookup miss and not a VCCV frame associated with a pseudo-wire
MPLS_PLU_DROP_PKTIngress MPLS frame and label   lookup results return a NULL route, or have no forwarding control bits set,   OR one of the following: 1)
MPLS_PLU_ERRORIngress MPLS frame and outer   label lookup miss and not a VCCV frame associated with a pseudo-wire
MPLS_UNSUPP_PLU_LABEL_TYPEIngress MPLS frame outer label   is 15 or less and not a router alert or null tag.
DEAGG_PKT_NON_IPV4Ingress MPLS frame outer label   lookup control bits are L3VPN deagg. And the payload is not IPV4.
XID_ZERO_DISCARDIngress VPWS XC to AC frame has   a zero destination XID stored in the L2 ingress UIDB - zero XID index is   invalid.
UNKNOWN_PREROUTE_PKTUnused by ucode
IPV4_UNICAST_RPF_DROP_PKTWith RPF enabled, an ingress   IPV4 frame has a source IP address that is not permitted, or not permitted on   the ingress interface - these are dropped.
IPV6_UNICAST_RPF_DROP_PKTWith RPF enabled, an ingress   IPV6 frame has a source IP address that is not permitted, or not permitted on   the ingress interface - these are dropped.
IN_UIDB_NO_ENTRYIngress frame with a pre-parse   TCAM index that is invalid - these are dropped. This is likely due to a TCAM   setup problem
IN_UIDB_DOWNIngress frame with a uidb entry   with down status - these are dropped, with the exeception of ingress LACP   frames on a subinterface.
IN_L2_UIDB_DROPIngress Layer2 frames on a   subinterface with the L2 uidb drop bit set.
L3_NOT_MYMACA layer3 unicast IPV4/IPV6 frame   does not have the destination mac address of the router, or any mac address   defined in the VRRP table. These are dropped.
OUT_UIDB_UIDB_DOWNEgress Layer3 frame with an   egress UIDB that has line status down, and ICMP punt is disabled in the uidb.
IPV4_MCAST_NOT_ENABLEDIngress IPV4 frames dropped due   to ipv4 multicast not enabled. The ipv4 multicast enable check may be ignored   for non-routable IGMP frames. Also, the ipv4 multicast enable check does not   apply to well known multicast frames.
IN_FAST_DISCA ingress frame was dropped due   to the early discard feature. This can occur at high ingress traffic rate   based on the configuration.
IN_L2_BLOCKEDIngress L2 frames dropped and   not forwarded due to ingress interface in spanning tree blocked state.
OUT_L2_BLOCKEDEgress L2 frames dropped and not   forwarded due to egress interface in spanning tree blocked state.
IN_DOT1Q_VTP_FILTEREDIngress VTP frames dropped due   to dot1q filtering enabled.
IN_DOT1Q_DROPIngress 802.1q frames dropped   due to dot1q filtering enabled.
IN_DOT1AD_DROPIngress 802.1ad frames dropped   due to dot1ad filtering enabled.
IN_DHCP_UNTRUSTED_DROPIngress DHCP frame dropped due   to the untrusted DHCP bit set in the ingress L2 uidb.
IN_ROUTER_GUARD_DROPIngress Layer2 IGMP or PIM   dropped due to Router Guard with IGMP snooping enabled.
IPV6_MCAST_NOT_ENABLEDIPv6 multicast frames dropped   because IPv6 multicast is not enabled on the interface/subinterface. The   multicast enable check may be ignored for MLD frames. Also, the ipv4   multicast enable check does not apply to packets with link-local destination   addresses.
PARSE_SVC_LPBK_UNKNOWN_PATHdescription not available yet
RESOLVE_ABF_GRE_LPBK_UNKNOWN_PATHdescription not available yet
GRE_ING_ENCAP_P2_PUNT_DROPdescription not available yet
GRE_ING_DECAP_P1_BAD_DATAdescription not available yet
GRE_ING_DECAP_P1_QUAL_NO_MATCHdescription not available yet
GRE_ING_DECAP_P2_CHKSUM_RSV1_NONZEROdescription not available yet
GRE_ING_DECAP_P2_GRE_KEY_PRESENT_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_SEQ_PRESENT_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_NONZERO_VER_DROPdescription not available yet
GRE_ING_DECAP_P2_GRE_NONZERO_RSVD0_DROPdescription not available yet
GRE_ING_DECAP_P2_PROT_UNSUPPORTEDdescription not available yet
GRE_ING_DECAP_P2_NESTED_GRE_DROPdescription not available yet
GRE_ING_ENCAP_P2_NESTED_GRE_DROPdescription not available yet
GRE_ING_DECAP_P2_FRAGMENTED_GRE_DROPdescription not available yet
GRE_ING_DECAP_P2_IP_ADD_SANITY_DROPdescription not available yet
GRE_ING_DECAP_P2_NO_UIDB_DROPdescription not available yet
GRE_ING_DECAP_P2_UIDB_DOWNdescription not available yet
GRE_ING_DECAP_P2_KA_PROTO_DOWNdescription not available yet
GRE_ING_DECAP_P2_IP_HDR_SANITY_DROPdescription not available yet
GRE_ING_DECAP_P2_PUNT_DROPdescription not available yet
IPV6_MCAST_NODE_LOCAL_DROPdescription not available yet
CAP_PRS_P1description not available yet
CAP_PRS_P2description not available yet
CAP_RSV_P1_TBdescription not available yet
CAP_RSV_P1_REPdescription not available yet
DBA_PRS_P2description not available yet
DBA_INTR_AGING_DELdescription not available yet
DBA_LEARN_LIMIT_REACHEDdescription not available yet
DBA_LOOKUP_MATCHdescription not available yet
L2VPN_DEAGG_NON_VPWS_VPLS_DROPInvalid setting for L2VPN   deaggregation set in Label UFIB lookup result for ingress MPLS frame. This is   most likely due to a programming error in the Label UFIB entry.
XC2AC_NOMATCH_DROPEgress VPWS XC to AC frame XID   lookup fails. This is caused by an invalid XID index or missing XID entry.
L2UNIC_NOMATCH_DROPEgress VPLS AC to AC frame XID   lookup fails. This is caused by an invalid XID index or missing XID entry.   This can also occur on an IGMP snoop originated inject to an AC/PW/Bundle   with invalid XID in the inject feature header.
L2FLOOD_NOMATCH_DROPEgress VPLS flood copy lookup in   the flood member table fails. This could be caused by an invalid copy number   or missing entry in the flood member table for that copy.
L2FLOOD_SRCDST_DROPEgress VPLS flood copy is   reflection filtered - copies to the original source port are dropped.
L2FLOOD_INACTIVE_MEMBER_DROPEgress VPLS flood copy lookup in   the flood member table returns an entry thats not active (active bit in   result is cleared).
L2FLOOD_EGR_XID_NO_MATCHEgress VPLS flood copy XID   lookup fails - XID stored in the OLIST result is invalid or entry is missing.   This can occur if the copy is intended to go over a PW and the PW is down.
MPLS_EGR_PLU_NO_MATCHMPLS frame outer label lookup on   egress NP does not match - these are dropped.
MPLS_EGR_PLU_DROP_PKTMPLS frame outer label lookup on   egress NP has a result with the drop bit set.
EGR_UNKNOWN_PAK_TYPEA frame received from the fabric   by an egress NP has an unknown NPH header type - these are dropped. This is   likely a ucode implementation error.
EGR_LB_UNKNOWN_PAK_TYPEA frame received from the egress   loopback queue by an egress NP has an unknown NPH header type - these are   dropped. This is likely a ucode implementation error.
EGR_MACN_INVALID_BD_IDNumber of egress MAC notify with   invalid BD id
INJ_NO_XID_MATCH_DROPIngress CFM frame injects with   an XID lookup fail - source XID for bridged injects, and dest. XID for   pre-route injects - invalid XID index or missing entry.
INJ_UNKNOWN_TYPE_DROPUnknown ingress inject received   from the LC host - these are dropped.
EGR_AC_PW_MISMATCHEgress VPWS XC to AC XID lookup   returns a PW type. For VPWS, PW entry is always on ingress.
UNSUPPORTED_INTERRUPT_FRAMEUnsupported interrupt frame type   received on NP. Supported types are for aging and statistics only.
MPLS_VPN_SEC_CHECK_FAILAn ingress MPLS does not have   the proper VPN security code, and IPV4 is not using the global routing table.
EGR_L2MC_OLIST_NOMATCHEgress L2 multicast frame has   olist drop bit set (no copies are sent to output ports), OR egress L2   multicast frame olist lookup fails. Olist lookup failure could be due to a   bad copy number, or a missing entry for that copy.
EGR_L2MC_SRCDSTEgress L2 multicast frame copy   is reflection filtered - copies to the original source port are dropped.
EGR_L2MC_XID_NOMATCHEgress L2 multicast frame copy   XID lookup fails - XID stored in the OLIST result is invalid or entry is   missing. This can occur if the copy is intended to go over a PW and the PW is   down.
EGR_VLANOPS_DROPEgress L2 frame without the   proper number of vlans to do egress VLAN ops - the frame from the fabric   needs at least one vlan to do a pop operation or replace operation.
EGR_PREFILTER_VLAN_DROPEgress L2 frame that fails EFP   pre-filter check - only valid if EFP filtering enabled - attached VLAN   mismatch.
EGR_CFM_PW_DROPEgress CFM frame injected to a   PW - not supported.
ING_QOS_INVALID_FORMATAn ingress packet has a QOS   format value in the ingress uidb that is not valid. Only checked if QOS is   enabled in the ingress uidb. Valid formats are 20/3/2/1/0.
ING_VLAN_FILTER_DISCARDA vlan tagged packet has a uidb   index that does points to a default layer3 uidb - these are dropped. Only   untagged pkts can be setup on a default layer3 uidb.
PARSE_INGRESS_L3_CFM_DROP_CNTIngress CFM frame on a layer 3   interface dropped due to CFM not enabled.
RESOLVE_VPWS_LAG_BIT_DROP_CNTAn ingress VPWS XC to Bundle   frame with a LAG table lookup fail. This is due to programming error where   the LAG table pointer is invalid or no LAG table entry.
RESOLVE_L2_SXID_MISS_DROP_CNTAn ingress VPLS frame with a   source XID lookup fail. This can be due to an invalid source XID programmed   in the L2 ingress uidb, or a missing source XID entry.
RESOLVE_VPLS_SPLIT_HORIZON_DROP_CNTAn ingress or egress VPLS that   is dropped due to a split horizon group mismatch.
RESOLVE_VPLS_REFLECTION_FILTER_DROP_CNTAn ingress unicast VPLS frame   that has a source XID that matches its destination XID. These are dropped   since it cannot be sent back to the source port.
\0[Counter used by ucode   Simulation only]
RESOLVE_VPWS_L2VPN_LDI_MISS_DROP_CNTAn ingress VPWS or VPLS unicast   frame to a PW with an L2VPN LDI table lookup fail. This can be due to an   invalid L2VPN LDI index in the XID, or a missing entry in the L2VPN LDI   table.
RESOLVE_VPWS_RP_DROP_CNTAn ingress VPWS or VPLS unicast   frame to a PW with the RP drop bit or RP dest. bit set in the NR-LDI or   RX-ADJ lookup results. Punts are not supported for an L2 PW adjacency.
RESOLVE_VPWS_NULL_ROUTE_DROP_CNTAn ingress VPWS or VPLS unicast   frame to a PW with the Null Route bit or IFIB punt bit set in the Leaf lookup   or R-LDI lookup results. Punts are not supported for an L2 PW adjacency.
RESOLVE_VPWS_LEAF_DROP_CNTAn ingress VPWS or VPLS unicast   frame to a PW with the Drop bit or Punt bit set in the Leaf lookup or R-LDI   lookup results. Punts are not supported for an L2 PW adjacency.
RESOLVE_VPLS_FLOOD_BLOCK_DROP_CNTAn Ingress VPLS frame that is   dropped due to its associated flood block bit being set: Unknown Unicast or   Multicast.
RESOLVE_L2_ING_ACL_DENY_DROP_CNTTotal number of ingress Layer2   frames dropped due to an ACL deny policy.
RESOLVE_L2_EGR_ACL_DENY_DROP_CNTTotal number of egress Layer2   frames dropped due to an ACL deny policy.
RESOLVE_VPLS_ING_BD_STR_MISS_DROP_CNTAn ingress VPLS frame that is   dropped due to a bridge domain lookup fail.
RESOLVE_VPLS_EGR_BD_STR_MISS_DROP_CNTAn egress VPLS flood frame or   mac notify frame that is dropped due to a BD structure lookup miss.
RESOLVE_L2_EGR_UIDB_MISS_DROP_CNTAn egress VPLS unicast or flood   copy frame to an AC or Bundle that is dropped to an egress L2 UIDB lookup   miss. This is due to an invalid UIDB index in the XID or a missing egress L2   UIDB entry. This can also occur with L2 multicast forwarded frames or L2   multicast inject frames.
RESOLVE_L2_EGR_PW_UIDB_MISS_DROP_CNTAn egress VPLS unicast or flood   copy frame to a PW that is dropped to an egress L2 UIDB lookup miss. This is   due to an invalid UIDB index in the XID or a missing egress L2 UIDB entry.   This can also occur if the PW is down. . This can also occur with L2 multicast   forwarded frames or L2 multicast inject frames to a PW.
RESOLVE_VPLS_ING_ERR_DROP_CNTAn ingress VPLS frame has an   invalid processing type. This is likely an internal error in ucode.
RESOLVE_L2_DHCP_SNOOP_UNTRUSTED_DROP_CNTEgress DHCP frame dropped due to   the untrusted DHCP bit set in the egress L2 uidb.
RESOLVE_VPLS_DAI_VIOLATION_DROP_CNTDynamic ARP inspection caused a   drop
RESOLVE_VPLS_IPSG_VIOLATION_DROP_CNTIP source guard found a   violation and dropped packet
RESOLVE_VPLS_EGR_NULL_RTE_DROP_CNTAn egress VPLS flood frame copy   to a PW with the Null Route bit set in the Leaf lookup or R-LDI lookup   results. Also includes IGMP snoop injects to a PW. Due to a ucode problem,   this may also get incremented due to a BD structure lookup miss on egress flood.
RESOLVE_VPLS_EGR_LEAF_IFIB_DROP_CNTAn egress VPLS flood frame copy   to a PW with the IFIB punt bit set in the Leaf lookup or R-LDI lookup   results. Punts are not supported for an L2 PW adjacency. Also includes IGMP   snoop injects to a PW.
RESOLVE_VPLS_EGR_LEAF_PUNT_DROP_CNTAn egress VPLS flood frame copy   to a PW with the Drop bit or Punt bit or Next Hop Down bit set in the Leaf   lookup or R-LDI or NR-LDI lookup results. Punts are not supported for an L2   PW adjacency. Also includes IGMP snoop injects to a PW.
RESOLVE_VPLS_EGR_TE_LABEL_DROP_CNTAn egress VPLS flood frame copy   to a PW with the Drop bit or Punt bit or Incomplete Adjacency bit set in the   Tx adjacency or Backup Adjacency or NH Adjacency lookup results. Punts are   not supported for an L2 PW adjacency. Also includes IGMP snoop injects to a   PW.
RESOLVE_VPLS_EGR_PW_FLOOD_MTU_DROP_CNTAn egress VPLS flood frame copy   to a PW that fails L3 MTU check. Punts are not supported for an L2 PW   adjacency with MTU fail. Also includes IGMP snoop injects to a PW.
RESOLVE_VPLS_EGR_PW_FLOOD_UIDB_DOWN_DROP_CNTAn egress VPLS flood frame copy   to a PW with egress UIDB in down state. Punts are not supported for an L2 PW   adjacency with line status down. Also includes IGMP snoop injects to a PW.
RESOLVE_VPLS_EGR_STRUCT_MISS_DROP_CNTEgress VPLS frame protocol   handling falls through to an invalid case. This is likely a ucode   implementation error.
RESOLVE_VPLS_EGR_FLD_NO_MEMBERS_DROP_CNTEgress L2 flood frame has zero   members - no copies are sent to output ports.
RESOLVE_VPLS_MCAST_SRC_MAC_DROP_CNTTotal number of ingress frames   with source MACs that were not unicast. These frames are invalid and are are   dropped. Non-unicast source macs cannot be learned.
RESOLVE_VPLS_LEARN_LIMIT_ACTION_DROP_CNTIngress VPLS Frames dropped to   learned limit exceeded - port based or bridge domain based learn limits -   these frames are dropped.
RESOLVE_VPLS_STATIC_MAC_MOVE_DROP_CNTStatic MAC entries that are   deleted due to a MAC move detected - these should never move.
RESOLVE_BAD_EGR_PRS_RSV_MSG_DROP_CNTInvalid TOPparse engine to   TOPresolve engine messages received for ingress frames - this is likely a   ucode implementation error.
RESOLVE_BAD_ING_PRS_RSV_MSG_DROP_CNTInvalid TOPparse engine to   TOPresolve engine messages received for egress frames - this is likely a   ucode implementation error.
RESOLVE_MAC_NOTIFY_CTRL_DROP_CNTTotal number of processed mac   notify frames - forward or reverse mac notify - dropped after processing.
RESOLVE_MAC_DELETE_CTRL_DROP_CNTTotal number of processed mac   delete frames - forward or reverse mac notify - dropped after processing.
RESOLVE_L3_ING_ERROR_DROP_CNTL3 ingress protocol handling in   the TOPresolve engine falls through to an invalid case - these are dropped.   This would occur due to a ucode implementation error.
RESOLVE_L3_EGR_ERROR_DROP_CNTL3 egress protocol handling in   the TOPresolve engine falls through to an invalid case - these are dropped.   This would occur due to a ucode implementation error.
RESOLVE_L3_ING_ACL_DENY_DROP_CNTTotal number of ingress Layer3   frames dropped due to an ACL deny policy.
RESOLVE_L3_EGR_ACL_DENY_DROP_CNTTotal number of egress Layer3   frames dropped due to an ACL deny policy.
RESOLVE_L2L3_QOS_C_DROP_CNTTotal number of ingress/egress   frames dropped to a child policing policy.
RESOLVE_L2L3_QOS_P_DROP_CNTTotal number of ingress/egress   frames dropped to a parent policing policy.
RESOLVE_P2MP_NO_OLIST_DROP_CNTTotal number of egress P2MP/MLDP   packets dropped as there are no output interface on this NP
RESOLVE_P2MP_IP_LOOKUP_FAIL_CNTTotal number of egress P2MP/MLDP   packet that did not get a valid S,G lookup. The packet is not dropped at this   point, we will continue forwarding the core copies, but the decap packets   will not go out.
RESOLVE_P2MP_RPF_FAIL_CNTTotal number of egress P2MP/MLDP   packet that failed the RPF check. The packet is not dropped at this point, we   will continue forwarding the core copies, but the decap packets will not go   out.
RESOLVE_IPMC_NO_OLIST_DROP_CNTIP multicast packets dropped due   no output interface on this NP
RESOLVE_ENCAP_NO_OLIST_DROP_CNTEgress MVPN packets dropped due   no output interface on this NP
RESOLVE_IPMC_RTE_FGID_0_CNTPackets sent to fabric with FGID   of zero, which is the bit bucket. Note that this includes certain punted   frames, and is usually not an error.
RESOLVE_IPMC_FILTER_DROP_CNTIP multicast packets dropped   rather than sent on the interface on which they arrived
RESOLVE_IPMC_ING_DFLAG_DROP_CNTIP multicast packets dropped due   to D flag on route. For example, SSM-range packets for which there is no   matching (S,G) route.
RESOLVE_IPM4_ING_RTE_DROP_CNTIngress IPV4 multicast frames   for which route lookup fails with no match.
RESOLVE_IPM4_EGR_RTE_DROP_CNTEgress IPV4 multicast frames for   which route lookup fails with no match.
RESOLVE_IPM4_OLIST_DROP_CNTEgress IPV4 multicast frames   with olist drop bit set (no copies are sent to output ports), and egress IPV4   multicast frames for which olist lookup fails. Olist lookup failure could be   due to a bad copy number, or a missing entry for that copy.
RESOLVE_IPM4_TTL_DROP_CNTEgress IPv6 multicast copies   that exceed the multicast TTL for its output interface/subinterface
RESOLVE_IPM6_ING_RTE_DROP_CNTIngress IPv6 multicast packets   for which there is no matching mroute
RESOLVE_IPM6_EGR_RTE_DROP_CNTEgress IPv6 multicast packets   for which there is no matching mroute. This should be transient only.
RESOLVE_IPM6_OLIST_DROP_CNTEgress IPv6 multicast packets   with olist drop bit set (no copies are sent to output ports), and egress IPV4   multicast frames for which olist lookup fails. Olist lookup failure could be   due to a bad copy number, or a missing entry for that copy.
RESOLVE_IPM6_TTL_DROP_CNTEgress IPv6 multicast copies   that exceed the multicast TTL for its output interface/subinterface
RESOLVE_VPLS_MAC_FILTER_DROP_CNTAn ingress VPLS frame has a   source or destination MAC with the filter bit set in the L2FIB result - these   are dropped.
RESOLVE_EGR_LAG_NOT_LOCAL_DROP_CNTAn egress frame hash to a bundle   interface has a bundle member that is not local to the NP - these are   dropped. This can be due to a bad hash, or a bad bundle member index. It can   also occur normally for floods or multicast - non-local members are dropped   for each copy that is a bundle output.
RESOLVE_ING_LAG_NO_MATCH_DROP_CNTbundle ethernet issue ingres
RESOLVE_EGR_LAG_NO_MATCH_DROP_CNTbundle ehternet issue egress
RESOLVE_VPLS_MC_ING_RTE_DROP_CNTIngress L2 multicast frame route   lookup fails with no match.
RESOLVE_VPLS_MC_EGR_RTE_DROP_CNTEgress L2 multicast frame route   lookup fails with no match.
RESOLVE_VPLS_MC_NO_OLIST_DROP_CNTEgress L2 multicast frame has   zero olist members - no copies are sent to output ports.
RESOLVE_VPLS_STORM_DROP_CNTAn ingress VPLS frame that is   dropped due to rate exceed for its associated flood storm control - Unknown   Unicast or Multicast or Broadcast.
RESOLVE_EFP_FILTER_TCAM_MISS_DROPEgress L2 frame that fails EFP   filter TCAM - only valid if EFP filtering enabled - likely due to a TCAM   missing entry due to a programming error.
RESOLVE_EFP_FILTER_MISS_MATCH_DROPEgress L2 frame that fails EFP   filter check - only valid if EFP filtering enabled - attached VLAN mismatch.
RESOLVE_MOFRR_HRT_LKUP_FAIL_DROPWatchdog interrupts dropped   because of an error in MoFRR Hash Table lookup. This counter indicates that   the watchdog interrupt (Activity or Loss) is received but micro code failed   to process further because of MoFRR Hash look up failed. This counter indicates   an error.
RESOLVE_MOFRR_WDT_INVALID_RESULTS_DROP_CNTWatchdog interrupts dropped   because of an error in Watch Dog counter hash table lookup. This counter   indicates that the watchdog interrupt (Activity or Loss) is received but   micro code failed to process further because of lookup failed. This counter   indicates an error.
RESOLVE_MOFRR_SWITCH_MSG_HRT_LKUP_FAIL_DROPMoFRR switch messages dropped   because of an error with MoFRR Hash Table lookup failure. This counter   indicates that the switch message is received from fabric but micro code   failed to process further because of MoFRR Hash look up failed. This counter   indicates an error and could be traffic disruptive.
RESOLVE_MOFRR_SWITCH_MSG_SEQNUM_MISMATCH_DROPMoFRR switch messages dropped   because of sequence number mismatch. This counter indicates that the switch   message is received from fabric but micro code failed to process further the   sequence number received from ingress LC does not match with sequence number   for same route on egress LC. This counter indicates a programming error, race   condition or hash result corruption in micro code etc. This is not a usual   thing and could be traffic disruptive.
ABF_LPBK_NON_ROUTABLE_DROP 
RESOLVE_UTURNCHECK_FRR_DROP 
RESOLVE_MVPN_RTE_NOTMASTER_DROP_CNTEgress MVPN packets that would   be punted due to mroute flags, but not punted because this is not the master   LC/NP
L2TP_ING_ENCAP_P2_SID_DROPThere is no entry for the   subscriber in the L2TP session table.
L2TP_ING_DECAP_SIP_DROPThe source IP does not match the   entry in the L2TP session table, the packet is dropped.
L2TP_ING_DECAP_TID_DROPThe tunnel id does not match the   entry in the L2TP session table, the packet is dropped.
L2TP_ING_DECAP_DATA_PKT_DROPThis is a drop of an L2TP data   packet, that was going to be punted. Usually this follows an   L2TP_LOOKUP_MISS.
L2TP_ING_DECAP_VER_DROPIncorrect L2TP version, the   packet is dropped.
UIDB_TCAM_MISS_AGG_DROPAggregate count for packets   dropped because the TCAM could not match the vlan (combo) to a (sub)   interface
UIDB_TCAM_MISS_PORT0_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT1_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT2_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT3_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT4_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT5_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT6_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT7_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT8_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
UIDB_TCAM_MISS_PORT9_DROP_FOR_HOSTIF there are more then 1 port to   the NPU, this identifies the actual connected port
CFM_ING_PUNTIngress CFM frames punted
PARSE_HOST_INJ_BFD_IPV4_L3_INWARDTransmitted BFD Multihop packet   counters that are injected into the NP from host on which the bfd_session is   hosted.
L2_INJECT_ING_PARSE_INWARDTotal number of ingress CFM   injects received from the LC host that are intended to be sent to the fabric.   These can either be bridged or pre-routed to a specific NP.
L2_ING_PARSE_BRIDGEDdescription not available yet
L2_INJECT_ING_PARSE_PREROUTETotal number of ingress CFM   injects received from the LC host that are intended to be pre-routed to a   specific output port on an egress NP. bridged and sent to the fabric. The   bridge lookups are not done for these inject frames.
L2_INJECT_PARSE_EGRESSl2 injected packets in the   egress direction
INJECT_EGR_PARSE_PRRT_NEXT_HOPInject preroute frames received   from the fabric that are next hop type.
INJECT_EGR_PARSE_PRRT_PITInject preroute frames received   from the fabric that are PIT type .
L3_EGR_RSV_PRRT_PUNT_TO_LC_CPUInject preroute frames that have   a PIT table lookup miss. These are punted to the LC host.
CFM_EGR_PARSETotal egress Layer2 CFM frames   processed by the NP - including egress CFM inject and egress CFM forwarded   frames.
CFM_EGR_PUNTEgress CFM frames punted
ING_DHCP_PW_UNTRUSTED_DROPDHCP packet ingressing on PW   dropped due to untrusted interface check.
EGR_DHCP_PW_UNTRUSTED_DROPDHCP packet egressing on PW   dropped due to untrusted interface check.
PARSE_FAB_MACN_RECEIVE_CNTFrames received from fabric on   egress LC with NPH mac notify flood type (mac notify for ingress SA learn).
PARSE_FAB_DEST_MACN_RECEIVE_CNTMAC notify frames received from   fabric on egress LC that are reverse MAC notify type
PARSE_FAB_MAC_DELETE_RECEIVE_CNTMAC notify frames received from   fabric on egress LC that are mac delete type
PARSE_FAB_DEST_MAC_DELETE_RECEIVE_CNTNumber of MAC Delete responses   received
PARSE_FAB_MACN_DOT1ah_RECEIVE_CNTNumber of MAC Notify received   for 802.1ah traffic
PARSE_FAB_DEST_MACN_DOT1ah_RECEIVE_CNTNumber of MAC Notify response   received for 802.1ah traffic
PARSE_PORTFLUSH_CNTNumber of port flushes detected
PARSE_INTR_AGE_CNTNumber of aging interrupt frames   received
PARSE_INTR_STATS_CNTNumber of interrupt frames   received by TOPparse
PARSE_VIDMON_FLOW_AGING_SCAN_CNTTotal number of Parse Interrupt   frames associated with video monitoring flow scanning.
RESOLVE_INGRESS_SMAC_MISS_CNTTotal number of ingress frames   with source MACs that did have a learned entry. These source MACs will be   relearned if learned limits have not been exceeded, learning is enabled, and   the address is unicast.
RESOLVE_HALF_AGE_RELEARN_CNTTotal mac address from ingress   frames that were relearned due to exceeding the half age period. These   entries are refreshed to update the age timeout.
RESOLVE_HALF_AGE_RELEARN_SKIPPED_CNT 
RESOLVE_PORT_FLUSH_AGE_OUT_CNTVPLS MAC entries that have been   port flushed as detected by the MAC aging scan. These frames are dropped.   Also can occur if the frame XID lookup fails and the XID is global or learned   local - XID has been removed.
PARSE_ING_DOT1ah_ISID_DROP_CNTDiscard non-compliant ISID   frames; UCA bit and RES2 field must be zero
RESOLVE_ING_DOT1ah_LOOP_DROP_CNTDiscard non-compliant ISID   frames; UCA bit and RES2 field must be zero
RESOLVE_ING_DOT1ah_NO_CUST_BD_DROP_CNTDot1ah core to edge and ISID   match and customer BD lookup miss
RESOLVE_ING_DOT1ah_NO_ISID_DROP_CNTDot1ah core to edge and ISID   miss and provider DA is my-bmac, or edge to core and ISID miss
RESOLVE_ING_DOT1ah_PROV_DA_DROP_CNTDot1ah edge to core and provider   DA is my-bmac
RESOLVE_ING_DOT1ah_CUST_DA_DROP_CNTDot1ah core to edge and customer   DA is rmt-cmac
PARSE_ING_IP_INTWRK_IP_PUNT_CNTIP interworking MAC mapping is   not ready; punt to host
PARSE_ING_IP_INTWRK_NOT_IP_DROP_CNTIP interworking drop non-ip   frames
RESOLVE_EG_IP_INTWRK_PKT_CNTIP interworking egress frame   count
RESOLVE_ING_IP_INTWRK_PKT_CNTIP interworking ingress frame   count
INGRESS_L2TP_LOOKUP_MISSThe session lookup failed on the   ingress core facing linecard. The entry is not programmed in hardware. The   packet will be dropped (if IP-for-me) or routed.
PARSE_INGRESS_L2TP_VRF_NOMATCHThe vrf in the uidb does not   match the vrf in the L2TP session table.
PARSE_INGRESS_L2TP_IP_NOMATCHThe destination IP does not   match the entry in the L2TP session table, so this is not a “to me” packet.   The packet is forwarded normally.
PARSE_L2_INJ_TS_L2_IN_CNTCFM DMM/DMR inject side   timestamp ingress frame count
PARSE_L2_INJ_TS_L2_EGR_CNTCFM DMM/DMR inject side   timestamp egress frame count
PARSE_L2_INJ_TS_NP_PORT_CNTCFM DMM/DMR timestamp frame   inject to port count
RESOLVE_L2_INJ_TS_CNTCFM DMM/DMR inject side   timestamp frame count
RESOLVE_L2_PUNT_TS_CNTCFM DMM/DMR punt side timestamp   frame count
STATS_RESOLVE_MAC_ACC_SA_MISSMac Accounting frame SMAC no   match
STATS_RESOLVE_MAC_ACC_DA_MISSMac Accounting frame DMAC no   match
PUNT_INVALIDInvalid Punt Reason - this   should not occur
PUNT_INVALID_DROPInvalid Punt Reason - this   should not occur
PUNT_ALLPunt All Set - not implemented   by ucode
PUNT_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CDPPunt Ingress CDP protocol frames   - layer3 interface only
CDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
ARPPunt Ingress ARP protocol frames   - layer3 interface only
ARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
RARPPunt Ingress Reverse ARP   protocol frames - layer3 interface only
RARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CGMPPunt Ingress CGMP protocol   frames - layer3 interface only
CGMP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
LOOPPunt Ingress ELOOP protocol   frames - layer3 interface only
LOOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
SAP_PUNTNot implemented by ucode
SAP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
BUNDLE_PROTO_PUNTNot implemented by ucode
BUNDLE_PROTO_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
UNKNOWN_OSINot implemented by ucode
UNKNOWN_OSI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DIAGSNot implemented by ucode
DIAGS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
SNIFFNot implemented by ucode
SNIFF_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_GLOBAL_IFHANDLE_TCAM_MISS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DROP_PACKETNot implemented by ucode
DROP_PACKET_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_OTHERIngress NP Punt or Egress NP   Punt of CFM other packets (link trace or perf. mon.). Ingress punts can occur   on a Layer2 or Layer3 interface Egress punts occur on a Layer2 interface   only.
CFM_OTHER_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_OTHER_RSP_PUNTconnecitivty fault management   punts
CFM_OTHER_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DHCP_SNOOP_REQIngress Punt of DHCP snoop   request frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REQ_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DHCP_SNOOP_REPLYIngress Punt of DHCP snoop reply   frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REPLY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTPIngress NP Punt or Egress NP   Punt of MSTP frames. For Layer2 VPLS or Layer3, punt is on ingress frames   only. For Layer3 VPWS, punt is on egress frames only.
MSTP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_PBIngress NP Punt or Egress NP   Punt of MSTP Provider Bridge frames. For Layer2 VPLS or Layer3, punt is on   ingress frames only. For Layer3 VPWS, punt is on egress frames only.
MSTP_PB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DAINot implemented by ucode
DAI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IGMP_SNOOPIngress punt of snooped IGMP or   PIM frames - layer2 interface only and IGMP snooping enabled
IGMP_SNOOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPSUBNot implemented by ucode
IPSUB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PPPOENot implemented by ucode
PPPOE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PPPNot implemented by ucode
PPP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
EFMIngress Punt of EFM Protocol   frames - layer3 interface only
EFM_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPv4_OPTIONSIngress Punt of IP frames with   options - layer3 interface only - IPV4, IPV6
IPv4_OPTIONS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_PLU_PUNTIngress or Egress punt of IPV4   frames with punt flag set in Leaf results or R-LDI results - layer3 interface   only
IPV4_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4MC_DO_ALLIngress punt of IPV4 Mcast   frames due to punt only set for route, OR Egress punt of IPV4 Mcast frames   due to punt and forward bit set for mcast group member - layer3 interface   only. IPV4 Mcast punts not support for egress route.
IPV4MC_DO_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4MC_DO_ALL_BUT_FWDIPV4 Mcast frames punted and not   not forwarded. (The punt code is best interpreted as instructions to the LC   CPU receiving the packet.)
IPV4MC_DO_ALL_BUT_FWD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_DOUBLE_TUNNELIPV4 Mcast frames punted and   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV4_DOUBLE_TUNNEL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NO_MATCHIngress or Egress IPV4 IPV6   unicast frames punted due to ICMP Unreachable (i.e., next hop down)
PUNT_NO_MATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TUNNEL_FORUSNot implemented by ucode
IPV4_TUNNEL_FORUS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_FRAG_TUNNELNot implemented by ucode
IPV4_FRAG_TUNNEL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_CANNOT_FRAGNot implemented by ucode
IPV4_CANNOT_FRAG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TTL_ERRORIngress IPV4 frames with a   punted due to TTL = 1 (TTL of 0 is dropped)
IPV4_TTL_ERROR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_FRAG_NEEDED_PUNTpackets punted because they   exceed interface mtu and need fragmentation which is not done in HW   forwarding path
IPV4_FRAG_NEEDED_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_BFDNot implemented by ucode
IPV4_BFD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
RP_PUNTAn ingress IPV4 or MPLS has the   RP punt bit set in the NR-LDI or RX adjacency
RP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IFIBIngress IPV4 ucast or IPV6   frames has an IFIB lookup match resulting in an IFIB punt
PUNT_IFIB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ADJIngress IPV4 ucast or MPLS   frames with the adjacency punt bit set in the NR-LDI or RX adjacency. Egress   IPV4 ucast or MPLS frames with the adjacency punt bit set in the NR-LDI or TX   adjacency.
PUNT_ADJ_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNKNOWN_IFIBIngress IPV4 ucast frames with   the IFIB bit set in the LEAF or R-LDI and the IFIB lookup does not get a   match, OR ingress MPLS frames with the IFIB bit set in the LEAF or R-LDI
PUNT_UNKNOWN_IFIB_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_DENYIngress or Egress frames with a   deny action set in the ACL policy and ACL punt (instead of drop) is enabled
PUNT_ACL_DENY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_LOGIngress or Egress frames with an   ACL policy match and ACL logging is enabled. Layer3 frames only.
PUNT_ACL_LOG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ACL_LOG_L2Ingress or Egress frames with an   ACL policy match and ACL logging is enabled. Layer2 frames only.
PUNT_ACL_LOG_L2_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_LINK_LOCALIngress IPV6 frames received   that are link local packets - these are punted - layer3 interface only
IPV6_LINK_LOCAL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_HOP_BY_HOPIngress IPV6 frames received   that are hop by hop packets - these are punted - layer3 interface only
IPV6_HOP_BY_HOP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_TTL_ERRORIngress IPV6 frames that have a   TTL error - these are punted - layer3 interface only
IPV6_TTL_ERROR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_PLU_PUNTIngress or Egress punt of IPV6   frames with punt flag set in Leaf results or R-LDI results - layer3 interface   only
IPV6_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_PLU_RCVNot implemented by ucode
IPV6_PLU_RCV_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_ROUT_HEADIngress IPV6 frames received   that are router header packets - these are punted - layer3 interface only
IPV6_ROUT_HEAD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_TOO_BIGEgress IPV6 frames that are too   bit - exceed MTU - these are punted - layer3 interface only
IPV6_TOO_BIG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_MISS_SRCNot implemented by ucode
IPV6_MISS_SRC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6_SRC_LINK_LOCALipv6 link local address needs   punt
IPV6_SRC_LINK_LOCAL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6MC_DO_ALLIPV6 Mcast frames punted and not   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV6MC_DO_ALL_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV6MC_DO_ALL_BUT_FWDIPV6 Mcast frames punted and   forwarded. (The punt code is best interpreted as instructions to the LC CPU   receiving the packet.)
IPV6MC_DO_ALL_BUT_FWD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_PLU_PUNTIngress MPLS frames punted due   to Punt set in the Leaf or R-LDI, plus Ingress MPLS router alert frames,   which are punted
MPLS_PLU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_FOR_USIngress MPLS frames punted due   to IFIB (for-us) set in the Leaf or R-LDI
MPLS_FOR_US_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2TP_COOKIE_MISMATCHNot implemented by ucode
PUNT_L2TP_COOKIE_MISMATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2TP_TUNNEL_DOWNNot implemented by ucode
PUNT_L2TP_TUNNEL_DOWN_EXCDFrames dropped (rather than   punted for the reason above) due to policing
GRE_BAD_FLAGSNot implemented by ucode
GRE_BAD_FLAGS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
GRE_NON_IPV4Not implemented by ucode
GRE_NON_IPV4_EXCDFrames dropped (rather than   punted for the reason above) due to policing
IPV4_TUNNEL_NOT_CONFIGDNot implemented by ucode
IPV4_TUNNEL_NOT_CONFIGD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_VCCV_PKTIngress MPLS frames that are PW   VCCV frames - must be PWtoAC de-aggregation flows
PUNT_VCCV_PKT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_QNET_PKTNot implemented by ucode
PUNT_QNET_PKT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_SERVICE_CARDNot implemented by ucode
PUNT_SERVICE_CARD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_STATISTICSStatistics gathering frames   punted to LC host - generated by statistics scanning machine
PUNT_STATISTICS_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RSP_ACTNot implemented by ucode
PUNT_DIAGS_RSP_ACT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RSP_STBYNot implemented by ucode
PUNT_DIAGS_RSP_STBY_EXCDFrames dropped (rather than   punted for the reason above) due to policing
NETIO_RP_TO_LC_CPU_PUNTPreroute egress inject frames   received from the RP that are sent to the LC host
NETIO_RP_TO_LC_CPU_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MOFRR_PUNTIPV4 multicast over fast reroute   punt frames
MOFRR_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
VIDMON_PUNTVideo monitoring punt frames
VIDMON_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
VIDMON_PUNT_FLOW_ADDVideo monitoring new flow added   punt frames
VIDMON_PUNT_FLOW_ADD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
DBGTRACE_PUNTDebug Trace Packets
DBGTRACE_PUNT_EXCDSee STATS_STATIC_DBGTRACE
SYNCE_PUNTSynchronous ethernet packets   punted
SYNCE_PUNT_EXCDSee STATS_STATIC_PUNT_SYNCE
CFM_CCIngress NP Punt or Egress NP   Punt of CFM CC packets (continuity check). Ingress punts can occur on a   Layer2 or Layer3 interface Egress punts occur on a Layer2 interface only.
CFM_CC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
CFM_CCM_RSP_PUNTContinuity Fault Management   Packets punted to RSP
CFM_CCM_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_RSP_PUNTSTP packets through normal   bridging
MSTP_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MSTP_PB_RSP_PUNTSTP packets through bundle   interface, punted to RSP
MSTP_PB_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PUNTMVRP 1D packets punted
MVRP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PB_PUNTMVRP 1AD packets punted
MVRP_PB_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_RSP_PUNTMVRP1D packets coming over   bundle and getting punted to RSP
MVRP_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MVRP_PB_RSP_PUNTMVRP 1AD packets coming over   bundle and punted to RSP
MVRP_PB_RSP_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETFLOWnetflow packets punted.
PUNT_NETFLOW_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETFLOW_RESERVEDNot used by ucode but reserved   for netflow
PUNT_NETFLOW_RESERVED_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_FRAG_NEEDED_PUNTMPLS packet for which   fragmentation is required
MPLS_FRAG_NEEDED_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
MPLS_TTL_ONE_PUNTMPLS packet for which TTL   expired
MPLS_TTL_ONE_PUNT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPV4_ADJ_NULL_RTEIPv4 packets with NULL route   adjacency
PUNT_IPV4_ADJ_NULL_RTE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPV6_ADJ_NULL_RTEIPv6 packets with NULL route   adjacency
PUNT_IPV6_ADJ_NULL_RTE_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_L2_IPIW_ARPL2VPN IP Interworking ARP   packets
PUNT_L2_IPIW_ARP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_SECURE_VIOLATIONMAC security violation packets
PUNT_MAC_SECURE_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_SECURE_VIOLATION_SHUTPackets punted as shutdown MAC   secure violations
PUNT_MAC_SECURE_VIOLATION_SHUT_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DAI_VIOLATIONPackets punted for Dynamic Arp   Inspection violation
PUNT_DAI_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_IPSG_VIOLATIONPackets punted for IP Source   Guard violation
PUNT_IPSG_VIOLATION_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_LLDPLink Layer Discovery   Protocol(LLDP) packets punted
PUNT_LLDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_LLDP_RSPLink Layer Discovery   Protocol(LLDP) packets over bundle punted to RSP
PUNT_LLDP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ELMIEnhanced Local Management   Interface(ELMI) packets punted
PUNT_ELMI_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PVSTPacket punted for Per Vlan   Spanning Tree Protocol
PUNT_PVST_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ERP_LCEthernet Ring Protection packets   punted to LC
PUNT_ERP_LC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_ERP_RSPEthernet Ring Protection packets   punted to RSP
PUNT_ERP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_NETIO_LC_TO_RSPpackets from netio of LC punted   to RSP
PUNT_NETIO_LC_TO_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DBADestination based netflow   packets punted
PUNT_DBA_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_LINKMONCluster link monitoring packets   punted
PUNT_CLUSTER_LINKMON_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_DSCCluster Distributed Shelf   Controller packets punted
PUNT_CLUSTER_DSC_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_CLUSTER_TESTCluster Test packets punted
PUNT_CLUSTER_TEST_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_ETHERNETPTP ethernet frames punted
PUNT_PTP_ETHERNET_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_IPV4Point-to-point IPv4 packets   punted
PUNT_PTP_IPV4_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PTP_IPV6Point-to-point Ipv6 packets   punted
PUNT_PTP_IPV6_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_DIAGS_RX_BUFFDiagnostic Receive Buffer   packets punted
PUNT_DIAGS_RX_BUFF_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPP_RSPOn a bundle subscriber   interface, a PPP Control packet was received on a PPPoE enabled parent   interface and punted to the RSP
PUNT_PPP_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_RSPOn a bundle subscriber   interface, a PPPoE Ctrl packet was received on a PPPoE enabled parent   interface and punted to the RSP
PUNT_PPPOE_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_PACKET_CONFIG_MISMATCHOn a non-bundle subscriber   interface, a PPPoE Control or Data packet was received on a PPPoE parent   interface, met one of the following conditions and was punted to the RSP. 1.   SRC Mac did not match sessionÂ’s SRC Mac, 2. VLAN ID(s) inner and/or outer did   not match session's VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSPOn a bundle subscriber   interface, a PPPoE Control or Data packet was received on a PPPoE parent   interface, met one of the following conditions and was punted to the RSP. 1.   SRC Mac did not match sessionÂ’s SRC Mac, 2. VLAN ID(s) inner and/or outer   did not match session's VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_PPPOE_L2TPV2Layer 2 Tunneling Protocol   Version 2 packets punted
PUNT_PPPOE_L2TPV2_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MAC_CACHE_MSGMAC cache message packets
PUNT_MAC_CACHE_MSG_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UDLDUnidirectional link detection   packets punted
PUNT_UDLD_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_HTTPRIPV4 HTTP redirect packets   punted
PUNT_HTTPR_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_SDPSatellite Discovery Protocol   packets punted
PUNT_SDP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_MIRPMultiple Backbone Instance   Identifier Protocol packets punted
PUNT_MIRP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNCLASSIFIEDunclassified packets
PUNT_UNCLASSIFIED_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_UNCLASSIFIED_RSPunclassified packets
PUNT_UNCLASSIFIED_RSP_EXCDFrames dropped (rather than   punted for the reason above) due to policing
PUNT_HTTPR_IPV6ipv6 http redirect (bng   fnctionality)
PUNT_HTTPR_IPV6_EXCDFrames dropped (rather than   punted for the reason above) due to policing

 

 

 

 

 

 

 

Xander Thuijs - CCIE #6775

Sr Tech Lead ASR9000

Comments
luismorales31
Level 1
Level 1

Hello Xander,

 

Thanks for the information, it's been really helpful.

 

Do you have any more information in regards to the RSV_DROP_MPLS_NRLDI_NO_MATCH counter?

 

I've experience packet loss with this and  the RSV_DROP_MPLS_TXADJ_NO_MATCH counter incrementing when I have a eBGP peering that is 3 or hops away.

 

Regards

xthuijs
Cisco Employee
Cisco Employee

hey luis,

NRLDI is a non recursive load distribution index. Basically a pointer to a leaf in the forwarding adjacency. No match means that we could not find that pointer we're looking for which is off, because if we enter the tree we should find it, otherwise that leaf would not be there! Generally this is a sw bug indicating that in this case there is no linkage/leaf for the mpls label in the forwarding table.

In other words we have a label value coming in that had no forwarding structure.

Now I know of some bugs in this area fixed in various branches and releases of code.

But without having seen detailed traces or knowing the ver you have, I would be just guessing.

I wanted to say that if you are on the latest in your release, eg 434 or 512 you shoudl be covered.

Because I always like to give some direction and starting off point, I wanted to put out  CSCuf53065 there, just because of the combination of the 2 drop counts that you are experiencing, fixed in 432 and 511.

regards

xander

luismorales31
Level 1
Level 1

Hello Xander,

 

Thanks a lot for your response. I'm not able to find information about the CSCuf53065 (the link is not working), and in the bug toolkit says that it is restricted (I have experience the same problem in version 4.2.1 and 4.2.3).

 

Regards.

xthuijs
Cisco Employee
Cisco Employee

apologies it copied an intranet link address to the ddts, I meant to provide the ddts for the bugtoolkit, which you used :)

there is no RNE to it that needs to be done, to identify that you hit it, we need to pull a lot of cef hw info from the np with a problematic label.

I would recommend either to try out the release that fixes it or work with TAC to do that investigation to confirm this one (or another).

mind you it is just a guess because I dont have your details obviously to give a confirmation.

regards

xander

luismorales31
Level 1
Level 1

Hello Xander,

 

Thanks a lot  for your help. I will continue to verify this with TAC and will try to do and update to version 4.3.4 and see if this fixes our issue.

 

Thanks,

 

Luis

fcuiller
Cisco Employee
Cisco Employee

We introduced in IOS-XR 4.3.1 and 5.1.0 a command to get counters description via the CLI.

This enhancement is tracked by CSCue18665 - NP counter descriptions.

The counter description   can be retrieved with the following command:

sh controllers np descriptions location 0/x/cpu0

For those who are running a version that doesn't include this feature, here is the list of counters currently present in IOS-XR 5.1.1:

Counter                                              Drop Feature  Description
-------------------------------------------------------------------------------
NULL_STAT_0                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_1                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_2                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_3                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_4                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_5                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_6                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_7                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_8                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_9                                               Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_10                                              Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_11                                              Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_12                                              Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_13                                              Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_14                                              Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
NULL_STAT_15                                              Infra    Invalid counter was incremented due to inconsistent software state. This should not occur but may be harmless
MDF_TX_LC_CPU                                             Infra    Frames sent (punted) to linecard CPU. Includes packets and some messages between NPs.
MDF_TX_WIRE                                               Infra    Frames transmitted from NP to the Ethernet port Traffic Manager. These frames are destined for egress output on the Ethernet wire(s) but may be dropped by the egress Traffic Manager due to egress port congestion or link down.
MDF_TX_WIRE 1                                             Infra    See BASE counter - replicated for performance
MDF_TX_WIRE 2                                             Infra    See BASE counter - replicated for performance
MDF_TX_WIRE 3                                             Infra    See BASE counter - replicated for performance
MDF_TX_FABRIC                                             Infra    Frames sent into the system central switch fabric - ingress frames and frames sent into the switch fabric from the linecard CPU. These may go to other LCs or the RSP and includes some messages between NPs.
MDF_TX_FABRIC 1                                           Infra    See BASE counter - replicated for performance
MDF_TX_FABRIC 2                                           Infra    See BASE counter - replicated for performance
MDF_TX_FABRIC 3                                           Infra    See BASE counter - replicated for performance
PARSE_ENET_SAT_RECEIVE_CNT                                Infra    Frames received from Ethernet Satellite ports by this NP
PARSE_ENET_SAT_RECEIVE_1                                  Infra    See BASE counter - replicated for performance
PARSE_ENET_SAT_RECEIVE_2                                  Infra    See BASE counter - replicated for performance
PARSE_ENET_SAT_RECEIVE_3                                  Infra    See BASE counter - replicated for performance
PARSE_INTER_NP_RECEIVE_CNT                                Infra    Frames received on the special connection between paired NPs of a 100GE port.
PARSE_INTER_NP_RECEIVE_CNT_1                              Infra    See BASE counter - replicated for performance
PARSE_INTER_NP_RECEIVE_CNT_2                              Infra    See BASE counter - replicated for performance
PARSE_INTER_NP_RECEIVE_CNT_3                              Infra    See BASE counter - replicated for performance
PARSE_FAB_RECEIVE_CNT                                     Infra    Frames received from the system central switch fabric. These may go to ethernet or the linecard CPU and includes some messages between NPs.
PARSE_FAB_RECEIVE_1                                       Infra    See BASE counter - replicated for performance
PARSE_FAB_RECEIVE_2                                       Infra    See BASE counter - replicated for performance
PARSE_FAB_RECEIVE_3                                       Infra    See BASE counter - replicated for performance
PARSE_INTR_RECEIVE_CNT                                    Infra    Interrupt frames received - internal NP messages
PARSE_INTR_RECEIVE_1                                      Infra    See BASE counter - replicated for performance
PARSE_INTR_RECEIVE_2                                      Infra    See BASE counter - replicated for performance
PARSE_INTR_RECEIVE_3                                      Infra    See BASE counter - replicated for performance
PARSE_INJ_RECEIVE_CNT                                     Infra    Frames from the LC CPU. May go to Ethernet link or system fabric
PARSE_INJ_RECEIVE_1                                       Infra    See BASE counter - replicated for performance
PARSE_INJ_RECEIVE_2                                       Infra    See BASE counter - replicated for performance
PARSE_INJ_RECEIVE_3                                       Infra    See BASE counter - replicated for performance
PARSE_ENET_RECEIVE_CNT                                    Infra    Frames received from Ethernet ports by this NP
PARSE_ENET_RECEIVE_1                                      Infra    See BASE counter - replicated for performance
PARSE_ENET_RECEIVE_2                                      Infra    See BASE counter - replicated for performance
PARSE_ENET_RECEIVE_3                                      Infra    See BASE counter - replicated for performance
PARSE_TM_LOOP_RECEIVE_CNT                                 Infra    Internal NP Loopback frames received from Traffic Manager - generally used for egress multicast replication
PARSE_TM_LOOP_RECEIVE_1                                   Infra    See BASE counter - replicated for performance
PARSE_TM_LOOP_RECEIVE_2                                   Infra    See BASE counter - replicated for performance
PARSE_TM_LOOP_RECEIVE_3                                   Infra    See BASE counter - replicated for performance
PARSE_TOP_LOOP_RECEIVE_CNT                                Infra    Internal NP Loopback frames received from Pipeline - generally used for packets requiring complex multi-pass processing in the NP
PARSE_TOP_LOOP_RECEIVE_1                                  Infra    See BASE counter - replicated for performance
PARSE_TOP_LOOP_RECEIVE_2                                  Infra    See BASE counter - replicated for performance
PARSE_TOP_LOOP_RECEIVE_3                                  Infra    See BASE counter - replicated for performance
PARSE_UNKNOWN_DIR_DROP                               Drop Infra    Frames dropped due to input source unknown - should not occur. Software error.
PARSE_UNKNOWN_DIR_1                                  Drop Infra    See BASE counter - replicated for performance
PARSE_UNKNOWN_DIR_2                                  Drop Infra    See BASE counter - replicated for performance
PARSE_UNKNOWN_DIR_3                                  Drop Infra    See BASE counter - replicated for performance
PRS_ING_LINK_PROTOCOL_DISABLED                       Drop Infra    Ingress NP discards Slow protocol packets on L2 VPLS when the protocol is not configured.
PARSE_ING_DISCARD                                    Drop Infra    Ingress frames discarded by NP (during Parse phase).  Each discard should also be included in a more specific discard reason count.
PARSE_EGR_DISCARD                                    Drop Infra    Egress frames discarded by NP (during Parse phase).  Each discard should also be included in a more specific discard reason count.
PARSE_FRM_ERR_CNT                                    Drop Infra    Sum of all DROP_FRM_* counters above.
PRS_CTX_WAIT_TIMEOUT                                 Drop Infra    Frames dropped due to Software error
RSV_CTX_WAIT_TIMEOUT                                 Drop Infra    Frames dropped due to Software error
MDF_CTX_WAIT_TIMEOUT                                 Drop Infra    Frames dropped due to Software error
PRS_HEALTH_MON                                            Infra    Periodic internal heartbeat packet used to monitor NP health
PRS_HEALTH_MON_DISCARD                               Drop Infra    Health monitoring packets that were discarded due to CRC errors. Should never occur. Indicates NP buffer corruption
INTR_FRAME_TYPE_0                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_1                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_2                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_3                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_4                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_5                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_6                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_7                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_8                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_9                                         Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_10                                        Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_11                                        Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_12                                        Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_13                                        Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_14                                        Infra    Interrupt frames - internal NP messaging
INTR_FRAME_TYPE_15                                        Infra    Interrupt frames - internal NP messaging
DBG_PRS_EP_L_PRS_PL_PW_DISPOSE                            L2       Ingress packets entering loopback for PW disposition
DBG_PRS_EP_L_PRS_VPLS_PW_IMPOSE                           L2       Ingress packets entering loopback for VPLS PW imposition
DBG_PRS_EP_L_PRS_VPLS_DOT1AH_LP                           L2       Ingress packets entering loopback for VPLS DOT1AH
DBG_PRS_EP_L_PRS_PL_ABF                                   L3       Ingress packets entering loopback for ABF processing
DBG_PRS_EP_L_PRS_PL_L2TP_DECAP_PASS2                      L2TP     Ingress packets entering loopback L2TP decapsulation 2nd pass
DBG_PRS_EP_L_PRS_EGR_L2TP                                 L2TP     Egress packets entering L2TP processing
DBG_PRS_EP_L_PRS_PL_L2TP_ING                              L2TP     Ingress packets entering LAC imposition pipeline loopback
DBG_PRS_NO_RFD_FOR_PREFETCH                               Infra    Attempts by the NP to allocate a new NP buffer for some form of internal frames replication and no buffers were available. Should only occur rarely under very heavy NP load.
PARSE_ING_INTER_NP_THRU_TRAFFIC                           Infra    Frames passed between a pair of NPs that service a 100GE interface
PARSE_ING_INTER_NP_IPC                                    Infra    Messages passed between a pair of NPs that service a 100GE interface
PARSE_L2_EGR_INJECT                                       Infra    L2 egress frames injected by RSP or LC CPU
PARSE_ING_8023                                            L2       Ingress 802.3 frames received
PARSE_ING_8023_JUMBO                                      L2       Ingress 802.3 frames received with payload greater than 1500 bytes
PARSE_ING_L3_CFM                                          EOAM     Ingress L3 CFM frames
PARSE_ING_L2_CFM                                          EOAM     Ingress L2 CFM frames
PARSE_ING_SLOW_PROTO                                      EOAM     Ingress IEEE slow protocol frames (LACP / SYNCE / EFM)
PARSE_ING_IPV6_LINK_LOCAL                                 L3       Ingress ipv6 Link Local frames
PARSE_RSP_INJ_L2_PREROUTE                                 Infra    Injected L2 pre-routed frames received by egress NP
PARSE_RSP_INJ_L2_INWARD                                   Infra    Injected L2 frames from RSP received by egress NP
PARSE_RSP_INJ_L2_EGRESS                                   Infra    Injected L2 frames received by egress NP
PARSE_RSP_INJ_FAB_CNT                                     Infra    Injected frames received by egress NP from fabric
PARSE_RSP_INJ_PORT_CNT                                    Infra    Injected frames received by egress NP from inject port
PARSE_RSP_INJ_DIAGS_CNT                                   Infra    Internal diagnostics frames received by NP from RSP
PARSE_EGR_INJ_PKT_TYP_UNKNOWN                             Infra    Frames received from RSP of unknown type (internal error)
PARSE_EGR_INJ_PKT_TYP_IPV4                                Infra    IPv4 packets received from RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV6                                Infra    IPv6 packets received from RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_MPLS                                Infra    MPLS frames received from RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_CLNS                                Infra    OSI CLNS packets received from RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV4_PREROUTE                       Infra    Pre-routed IPv4 packets received from RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV6_PREROUTE                       Infra    Pre-routed IPv6 packets received from RSP or LC CPU
PARSE_EGR_INJ_PKT_TYP_IPV6_LINK_LOCAL                     L3       IPv6 Link Local frames injected from control plane to network
PARSE_LC_INJ_L2_PREROUTE                                  Infra    Pre-routed L2 frames received from LC CPU
PARSE_LC_INJ_L2_INWARD                                    Infra    Injected L2 frames received from LC CPU
PARSE_LC_INJ_L2_EGRESS                                    Infra    Injected L2 frames received from LC CPU by egress NP
PARSE_LC_INJ_FAB_CNT                                      Infra    Frames received from LC CPU and passed to fabric
PARSE_LC_INJ_PORT_CNT                                     Infra    Frames received from LC CPU
PARSE_LC_INJ_DIAGS_CNT                                    Infra    Internal diagnostic frames received from LC CPU
PARSE_DROP_FAB_UNKNOWN_INJ                           Drop Infra    Frames received from RSP of unknown type (internal error)
PARSE_DROP_UNKNOWN_TIMER_FEAT                        Drop Infra    Frames received from TM Loopback has unknown feature mask
PARSE_HOST_INJ_BFD_IPV4_L3_INWARD                         BFD      Transmitted BFD Multihop packet counters that are injected into the NP from host on which the bfd_session is hosted.
PARSE_HOST_INJ_BFD_IPV6_L3_INWARD                         L3       IPv6 BFD frames from control plane
PARSE_HOST_INJ_BFD_MPLS_L3_INWARD                         L3       BFD MPLS frames from control plane
PARSE_ING_L3_CFM_DROP                                Drop EOAM     L3 CFM frames dropped by ingress NP
PARSE_ING_ISIS                                            L3       IS-IS protocol packets received from Ethernet
PARSE_ING_PIM_IFIB                                        MCAST    PIM protocol packets detected and punted via LPTS
PARSE_EGRESS_BFD_PUNT_CNT                                 BFD      BFD packets that have reached the egress LC (on which the bfd session is hosted) and which have been remote punted from a ingress LC
PARSE_DROP_IN_EFM_BLOCK                              Drop EOAM     Ingress EFM frames discarded due to ingress EFM block configured at ingress port
PARSE_DROP_IN_EFM_LOOPBACK_DATA                           EOAM     Ingress EFM frames looped back in ingress NP
PARSE_DROP_IN_UIDB_TCAM_MISS                         Drop Infra    Ingress frames dropped because they did not match to a configured interface encap (etype/vlan)
PARSE_DROP_IN_UIDB_NO_ENTRY                          Drop Infra    Frames dropped due to inconsistent software state which may occur during reprogramming
PARSE_DROP_IN_ENET_UNKNOWN                           Drop Infra    Frames dropped due to unknown ethertype at ingress NP
PARSE_DROP_IN_UIDB_DOWN                              Drop Infra    Frames dropped due to interface/subinterface in shutdown state
PARSE_DROP_INJ_IN_UIDB_NO_MATCH                      Drop Infra    Frames dropped due to inconsistent software state which may occur during reprogramming
PARSE_DROP_IPV4_DISABLED                             Drop L3       IPv4 packets dropped on receipt from Ethernet due to IPv4 not enabled on interface/subinterface
PARSE_DROP_IPV4_MCAST_NOT_ENABLED                    Drop MCAST    IPv4 multicast packets dropped on receipt from Ethernet due to IPv4 multicast not enabled on interface/subinterface
PARSE_DROP_IPV4_CHECKSUM_ERROR                       Drop L3       IPv4 packets dropped on receipt from Ethernet due to IP header checksum error
PARSE_IPV4_SANITY_ADDR_CHK_FAILURES                  Drop L3       IPv4 packets dropped on receipt from Ethernet due to illegal IP addresses
PARSE_DROP_IPV4_LENGTH_ERROR                         Drop L3       IPv4 packets dropped on receipt from Ethernet due to IP packet length field inconsistent with L2 frame length
PARSE_DROP_MPLS_DISABLED                             Drop L3       MPLS frames dropped on receipt from Ethernet due to MPLS not enabled on interface/subinterface
PARSE_DROP_ING_MPLS_LABEL_INVALID                    Drop L3       MPLS frames dropped on receipt from Ethernet due to invalid MPLS labelingsuch as reserved MPLS label; too many explicit NULL labels; or EOS not set on last label
PARSE_DROP_ING_MPLS_TTL_ERROR                        Drop L3       MPLS frames dropped on receipt from Ethernet due to MPLS time-to-live expiry
PARSE_DROP_EGR_MPLS_LABEL_INVALID                    Drop L3       Egress MPLS frames dropped due to invalid MPLS label (tag value less than 15)
PARSE_L2MC_DROP_ROUTER_GUARD                         Drop L2       Ingress IGMP frames dropped due to router guard
PARSE_ING_DROP_DHCP_UNTRUSTED                        Drop L2       Ingress DHCP frames dropped on untrusted interface
PARSE_EGR_DROP_DHCP_UNTRUSTED                        Drop L2       Egress DHCP frames dropped on untrusted interface
PARSE_ING_L2_MSTP_DROP                               Drop L2       Ingress MSTP frames dropped on blocked ingress bridge port
PARSE_UNKNOWN_LC_CPU_INJ_DROP                        Drop Infra    Unknown frames received from LC CPU dropped
PARSE_INJECT_NATIVE                                       Infra    Native injected frames received from LC CPU
PARSE_L2_DOT1Q_DROP                                  Drop L2       Ingress L2 frames dropped due to DOT1Q protocol filtering
PARSE_L2_DOT1AD_DROP                                 Drop L2       Ingress L2 frames dropped due to DOT1AD protocol filtering
PARSE_L2_DOT1Q_VTP_DROP                              Drop L2       Ingress L2 frames dropped due to DOT1Q VTP protocol filtering
PARSE_L2_DOT1AH_ISID_DROP                            Drop L2       Ingress L2 frames dropped due to DOT1AH invalid ISID
PARSE_DROP_IPV6_DISABLED                             Drop L3       IPv6 packets dropped on receipt from Ethernet due to IPv6 not enabled on interface/subinterface
PARSE_DROP_IPV6_LENGTH                               Drop L3       Ingress or egress frames with invalid IPv6 header length field (conflicts with L2 length)
PARSE_IPV6_SANITY_ADDR_CHK_FAILURES                  Drop L3       IPv6 packet dropped on receipt from Ethernet due to invalid IPv6 SA
PARSE_DROP_IPV6_MCAST_NOT_ENABLED                    Drop MCAST    IPv6 multicast packets dropped on receipt from Ethernet due to IPv6 multicast not enabled on interface/subinterface
PARSE_DROP_IPV6_MCAST_NODE_LOCAL                     Drop MCAST    IPv6 multicast packets dropped on receipt from Ethernet due to invalid destination address scope
PARSE_EGR_L2_CFM                                          EOAM     CFM frames received by egress NP
PARSE_L3_TAGGED_PUNT_DROP                            Drop L3       Dropped L2 link level protocol received at L3 interface with vlan tag (LLDP, MSTP, UDLD, CDP)
PARSE_MSTP_DOT1D                                          L2       MSTP DOT1D frames received by ingress NP
PARSE_MSTP_DOT1AD                                         L2       MSTP DOT1AD frames received by ingress NP
PARSE_MVRP_DOT1D                                          L2       MVRP DOT1D frames received by ingress NP
PARSE_MVRP_DOT1AD                                         L2       MVRP DOT1AD frames received by ingress NP
PARSE_UNKNOWN_NPH_TYPE_DROP                          Drop Infra    Egress frames dropped due to unknown internal header type (internal error)
PARSE_OPEN_NETWORK_SERVICE_WRONG_INSTRUCTION         Drop Service  frames dropped due to Inline Service Internal error
PARSE_OPEN_NETWORK_SERVICE_MESSAGE_SANITY_FAIL       Drop Service  frames dropped due to Inline Service Internal error
PARSE_OPEN_NETWORK_SERVICE_KEY_ACTION_UNKNOWN        Drop Service  frames dropped due to Inline Service Internal error
PARSE_OPEN_NETWORK_SERVICE_SVC_LKUP                       Service  Inline Service event
PARSE_OPEN_NETWORK_SERVICE_FWD_V4_LKUP                    Service  Inline Service event
PARSE_OPEN_NETWORK_SERVICE_FWD_V6_LKUP                    Service  Inline Service event
GRE_ING_ENCAP_P2_PRS                                      GRE      Frames entering GRE encapsulation 2nd pass processing on ingress NP
GRE_EGR_ENCAP_P2_PRS                                      GRE      Frames entering GRE encapsulation 2nd pass processing on egress NP
GRE_ING_DECAP_P1_QUAL_NO_MATCH                            GRE      Frames entering GRE decapsulation processing but dropped because it did not match any configured GRE tunnel
GRE_ING_DECAP_P2_PRS                                      GRE      Frames entering GRE decapsulation 2nd pass processing on ingress NP
GRE_ING_DECAP_P2_CHKSUM_RSV1_NONZERO                 Drop GRE      GRE decapsulation frames which has GRE header with checksum field but the 2 bytes after that was non-zero. This is not supported and the frame is dropped
GRE_ING_DECAP_P2_DECAP_P2_GRE_INVALID_KEY            Drop GRE      GRE decapsulation frames which has GRE header with 1:1 key did not match or is not present. Hence the frame is dropped
GRE_ING_DECAP_P2_GRE_KEY_PRESENT_DROP                Drop GRE      GRE decapsulation frames which has GRE header with key field present. This is not supported and the frame is dropped
GRE_ING_DECAP_P2_GRE_SEQ_PRESENT_DROP                Drop GRE      GRE decapsulation frames which has GRE header with sequence number field present. This is not supported and the frame is dropped.
GRE_ING_DECAP_P2_GRE_NONZERO_VER_DROP                Drop GRE      GRE decapsulation frames which has GRE header with non-zero value in version field. This is not supported and the frame is dropped.
GRE_ING_DECAP_P2_GRE_NONZERO_RSVD0_DROP              Drop GRE      GRE decapsulation frames which has GRE header with any of bits 1 or 4-12 set. This is not supported and the frame is dropped.
GRE_ING_DECAP_P2_PROT_UNSUPPORTED                    Drop GRE      GRE decapsulation frame which has GRE header with protocol value which is not supported. The frame is dropped.
GRE_ING_DECAP_P2_NESTED_GRE_DROP                     Drop GRE      GRE decapsulation frame which has another GRE encapsulated frames after decapsulation of the outer IP and GRE header. This is not supported and the frame is dropped.
GRE_ING_DECAP_P2_CLNS_NO_ISIS_DROP                   Drop GRE      GRE decapsulation frame which has GRE header with protocol field value for CLNS but there is no ISIS frame following the header. This is error condition and the frame is dropped.
GRE_ING_DECAP_P2_NO_UIDB_DROP                        Drop GRE      GRE decapsulation frame for which the tunnel UIDB was not found. This is an internal error and the frame is dropped.
GRE_ING_DECAP_P2_UIDB_DOWN                           Drop GRE      GRE decapsulation frame received on a tunnel interface which is protocol down. The frame is dropped
GRE_ING_DECAP_P2_KA_PROTO_DOWN                       Drop GRE      GRE keepalive frames received on a tunnel interface which is protocol down. The frame is processed even though the interface is down.
LISP_ING_DECAP_P2_PRS                                     LISP     LISP Decap event
LISP_ING_DECAP_P2_UNSUPPORTED
LISP_ING_DECAP_P2_NO_UIDB_DROP
CAP_IPV4_PRS_P1                                           LI       IPv4 Frames being matchedfor Lawful Intercept processing.
CAP_IPV6_PRS_P1                                           LI       IPv6 Frames being matched for Lawful Intercept processing.
CAP_PRS_P2                                                LI       IP frames entering Lawful Intercept 2nd pass processing after replication.
PARSE_VIDMON_PKT_CNT                                      Vidmon   Packets processed for Video monitoring
VIDMON_SEM_RETRY_TIMEOUT                                  Vidmon   Packets for which Vidmon failed to acquire a semaphore
VIDMON_FLOW_UPDATE_CNT                                    Vidmon   Vidmon flows updated
PARSE_MOFRR_INTERRUPT                                     MCAST    Interrupt frames received due to mcast-only FRR activity or loss monitoring
PARSE_MOFRR_FRR_MSG_RECV                                  MCAST    Inter-NP MoFRR switchover notifications received
PARSE_IPIW_NON_IP_DROP                               Drop IPIW     L2 frames dropped due to non-IP pacekt received on ipiw interface
PARSE_ELMI                                                L2       ELMI frames received and punted by ingress NP
PARSE_PVST                                                L2       PVST frames received by ingress NP
PARSE_LLDP                                                L2       LLDP frames received by ingress NP
ELMI_ADDR_TYPE_ERROR                                 Drop L2       ELMI frames dropped due to address type error
UNKNOWN_L2_ON_L3_DISCARD                             Drop L2       L2 frames with unknown ether-type received on L3 interface dropped
PARSE_EGRESS_PTP_CNT                                      IEEE1588 Injected IPv4 PTP packets processed by egress NP
PARSE_BFD_NOT_MY_MAC                                 Drop BFD      BFD packets received but not to my mac by ingress NP
PARSE_BFD_IPv4_DISABLED                              Drop BFD      Received BFD packet and IPV4 not enabled in L3 ingress ingress interface
PARSE_PPP_KEEPALIVE_HW_REPLY                              PPPoE    PPPoE+PPP echo request (keepalive) packets that arrived on a PTA subscriber interface. The NP generated the reply  instead of punting the packet.
INGRESS_L2TP_LOOKUP_MISS                             Drop L2TP     Packets for which the ingress core-facing linecard has no entry in the L2TP session table that matches the packets tunnel id and session id. These packet are dropped.
PARSE_INGRESS_L2TP_VRF_NOMATCH                       Drop L2TP     [not used]
PARSE_INGRESS_L2TP_IP_NOMATCH                        Drop L2TP     [not used]
L2TP_ING_DECAP_SIP_DROP                              Drop L2TP     Packets whose source IP address does not match the entry in the L2TP session table. These packets are dropped.
L2TP_ING_DECAP_TID_DROP                              Drop L2TP     Frames dropped due to L2TP tunnel ID miss
L2TP_ING_DECAP_VER_DROP                              Drop L2TP     L2TP frames dropped due to invalid version
PARSE_BFD_UIDB_DOWN                                  Drop BFD      Received BFD packet for which the ingress interface is down
PARSE_BVI_L3_ING                                          L3       Frames received on BVI L3 interface by ingress NP
PARSE_BVI_L3_EGR                                          L3       Frames to BVI L3 interface by egress NP
PARSE_BVI_L2_ING                                          L3       Frames received on BVI L2 interface by ingress NP
PARSE_L3_SNF_SETUP                                        Netflow  Internal debug count
PARSE_ING_MVPN_PIM_ALL_RTRS                               MCAST    Ingress GRE-encapped MVPN core packets recognized as PIM packets destined to all routers.  These are punted.
PARSE_UDLD                                                EOAM     UDLD frames received by ingress NP
PARSE_SPAN_LPBK                                           SPAN     Span frames received after loopback (2nd pass) by ingress NP
PARSE_P2MP_MPLS_LPBK                                      P2MP     Egress P2MP/MLDP packets looped back after replication for MPLS interfaces
PARSE_P2MP_IP_LPBK                                        P2MP     Egress P2MP/MLDP packets looped back for IP decap processing
PARSE_P2MP_BUD_NOT_OAM                               Drop P2MP     Ingress P2MP/MPLS packets replicated and looped back to check for OAM/PIM packet type. If packet are not OAM/PIM we drop these replicated copies; otherwise we process them as needed for OAM/PIM frames.
PARSE_IPMC_GENERIC_ENCAP_FIRST_PASS                       MCAST    Internal debug event
PARSE_IPMC_GENERIC_ENCAP_SECOND_PASS_VRF                  MCAST    Internal debug event
PARSE_IPMC_GENERIC_ENCAP_SECOND_PASS_CORE                 MCAST    Internal debug event
PARSE_MVPN_ENCAP_THIRD_PASS                               MCAST    Egress MVPN/GRE head node packets after encapsulation and before replication for a given GRE tunnel
PARSE_BGP_PA_LPBK                                         BGPPA    FYI. Internal debug. BGP-Policy Accounting loopbacks
IN_SATELLITE_DISCOVERY_DISCARD
EGR_SATELLITE_NOT_LOCAL_DROP
EGR_SATELLITE_PORT_DISABLE_DROP
PARSE_EGR_REMOTE_RACK_ENCAP_CNT                           Infra    Internal debug event
PARSE_ING_FABRIC_INTERNAL_CNT                             Infra    Internal debug event
PARSE_MAC_NOTIFY_RCVD                                     L2       Internal event. Message received from other NPs to learn MAC addresses on a bridge domain
PARSE_MAC_DELETE_RCVD                                     L2       Internal event. Message received from other NPs to delete MAC addresses from a bridge domains MAC table
PARSE_REV_MAC_NOTIFY_RCVD                                 L2       Internal event. Reverse MAC Notify message received
PARSE_ING_PL_MLDP_PEEK_CNT                                Infra    Internal debug event
PARSE_ING_PIM_DROP_CNT
PARSE_UNKNOWN_INTERRUPT_RCVD                              Infra    Internal event. Unknown NP interrupt message received
PARSE_DROP_PPPOE_NOT_ENABLED                         Drop PPPoE    Ingress frames dropped on port with PPPoE not enabled
PARSE_DROP_PPPOE_DATA_PKT_ON_DOWN_UIDB               Drop PPPoE    Frame discards due to a PPPoE Data packet being received on a PPPoE enabled parent interface when the subscribers UIDB protocol status is down
PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_0
PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_1
PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_2
PARSE_FAST_DISCARD_LOW_PRIORITY_DROP_3
VIDMON_RTP_FLOW_UPDATE_CNT                                Vidmon   Internal debug event
VIDMON_RTP_RESYNC_CNT                                     Vidmon   Internal debug event
PARSE_VIDMON_RTP_INVALID_CNT
VIDMON_RTP_LEFT_PROBATION_CNT                             Vidmon   Internal debug event
PARSE_PWHE_ING_UIDB_MISS_DROP
PARSE_PWHE_VPORT_MISS_DROP
PARSE_PWHE_ING_NUM_VLAN_MISMATCH_DROP
PARSE_PWHE_DECAP_ING_EP                                   pwhe     Internal debug event
PARSE_PWHE_ENCAP_EGR_EP                                   pwhe     Internal debug event
PARSE_MVPN_MLDP_TURNAROUND_RX                             MCAST    Internal debug event
PARSE_VIDMON_INVALID_CNT
PARSE_EOS0_DROP
PARSE_BFD_HWOFF_PASS_2
PARSE_VPLS_LSM_PW_DSP_ING_CNT
PARSE_L2_VPLS_LSM_EGR_LPBK_CNT
PARSE_L2_VPLS_LSM_EGR_CNT
PARSE_L_PRS_EGR_CGN_SERVICE
PARSE_SAT_EXACT_DROP                                      SAT      Internal debug event
PARSE_SAT_PORT_DISABLE_DROP                               SAT      Internal debug event
PARSE_L_PRS_ING_MiM_SAT_DATA
PARSE_L_PRS_ING_MiM_SAT_CTRL
DBG_PRS_EP_L_PRS_PL_FLOWQOS                               FLOWQOS  Packets entering loopback for Flow QoS learning
PARSE_EGR_GRE_KEY_PROCESS                                 BNG      GRE egress encap with GRE KEY
PARSE_DROP_ROUTED_SUB_SECURITY_DROP                  Drop BNG      Ingress frames inner VLAN doesnt match that in Session Table
PARSE_ROUTED_SUB_LOOKUP_MISS                              BNG      Ingress frames src ip didnt match session table so forwarding on parent
PARSE_ROUTED_SUB_PARENT_UIDB_LOOKUP_DROP             Drop BNG      ip session table failure and parent uidb lookup miss
DBG_RSV_EP_L2_INGRESS_VPWS_PW_IMPOSE                      L2       Internal debug event
DBG_RSV_EP_L_RSV_ING_ISIS                                 Punt     FYI. Internal debug. Count of ingress ISIS frames
DBG_RSV_EP_L_RSV_ING_L3_IFIB                              Punt     Ingress LPTS lookup attempts for L3 packets
DBG_RSV_EP_L_RSV_ING_L3_IFIB_MATCH                        Punt     L3 packets flagged for punting due to ingress LPTS lookup match
DBG_RSV_EP_L_RSV_ING_L3_IFIB_PUNT_LOCAL                   Punt     L3 packets flagged for punting to LC CPU
DBG_RSV_EP_L_RSV_ING_L3_IFIB_PUNT_LOCAL1                  Punt     L3 packets flagged for punting to LC CPU
DBG_RSV_EP_L_RSV_ING_L3_RSLTS_MATCH                       Punt     FYI. Internal debug count
DBG_RSV_EP_L_RSV_ING_PUNT                                 Punt     Ingress packets punted
RSV_OPEN_NETWORK_SERVICE_TRIGGER_SVC                      Service  Internal debug event
DBG_RSV_EP_L_RSV_ING_L2MC                                 MCAST    Ingress L2 multicast packets received from Ethernet
DBG_RSV_EP_L_RSV_ING_L2                                   L2       Ingress L2 packets received from Ethernet
DBG_RSV_EP_L_RSV_EGR_MCST                                 MCAST    Egress L3 Multicast packets received from fabric
DBG_RSV_EP_L_RSV_EGR_L2MC                                 MCAST    Egress L2 multicast packets received from fabric
DBG_RSV_EP_L_RSV_EGR_L2                                   L2       [not used]
DBG_RSV_EP_L_RSV_EGR_L2_FLD_LPBK                          L2       [not used]
DBG_RSV_EP_L_RSV_EGR_FLOOD                                L2       L2 frames received from fabric to be flooded to bridge domain
DBG_RSV_EP_L_RSV_EGR_MCST_LPBK                            MCAST    Egress frames looped back after multicast replication
DBG_RSV_EP_L_RSV_EGR_IPMC_COPY                            MCAST    Internal debug event
DBG_RSV_EP_L_RSV_EGR_L2MC_LPBK                            MCAST    Egress L2 frames looped back after multicast replication (IGMP Snooping)
DBG_RSV_EP_L_RSV_PW_DISPOSE                               L2       Frames entering PW disposition
DBG_RSV_EP_L_RSV_VPLS_PW_IMPOSE                           L2       VPLS frames entering PW imposition
DBG_RSV_EP_L_RSV_DOT1AH_PASS2                             L2       DOT1AH frames entering 2nd pass at ingress NP
DBG_RSV_EP_L_RSV_ABF_PASS1                                L3       Ingress frames being sent to 2nd pass ABF - Acl Based Forwarding
DBG_RSV_EP_L_RSV_ABF_PASS2                                L3       Ingress frames finishing up 2nd pass Acl Based Forward
DBG_RSV_EP_L_RSV_L2TP_CHECK                               L2TP     Ingress IP-for-me packets checked for L2TP protocol
DBG_RSV_EP_L_RSV_L2TP_PASS2                               L2TP     Ingress decapsulations of an IP-for-me L2TP packet
DBG_RSV_EP_L_RSV_L2TP_ING_LAG                             L2TP     Ingress decapsulations of an IP-for-me L2TP packet and is sending it to a bundle/LAG interface
DBG_RSV_EP_L_RSV_EGR_L2TP                                 L2TP     Decapsulations of L2TP packets on egress
DBG_RSV_EP_L_RSV_ING_MPLS_TP                              MPLS-TP  Frames hitting ingress MPLS TP path
DBG_RSV_ING_LEARN_LOOP                                    L2       MAC addresses learned in ingress direction
DBG_RSV_EGR_LEARN_LOOP                                    L2       MAC addresses learned in egress direction
ING_RSV_PW_DHCP_UNTRUSTED_DROP                       Drop L2       Frames on PW dropped due to a DHCP untrusted host
RSV_ING_BFD                                               BFD      Ingress BFD frames (for this router)
RSV_OPEN_NETWORK_SERVICE_PHASE                            Service  Internal debug event
RSV_DROP_ING_BFD                                     Drop BFD      BFD frames dropped because BFD is not enabled on the receiving interface
RSV_DROP_ING_IFIB_OPT
RSV_DROP_EGR_UIDB_NO_MATCH                           Drop Infra    Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_EGR_UIDB_DOWN                               Drop Infra    Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_EGR_HWOFF_NO_MATCH                          Drop Infra    Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_EGR_HWOFF_UIDB_DOWN                         Drop Infra    Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPV4_LEAF_NO_MATCH                          Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPV6_LEAF_NO_MATCH                          Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPV4_NRLDI_NO_MATCH                         Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPV6_NRLDI_NO_MATCH                         Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_MPLS_NRLDI_NO_MATCH                         Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPV4_RXADJ_NO_MATCH                         Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPV6_RXADJ_NO_MATCH                         Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_MPLS_RXADJ_NO_MATCH                         Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPV4_TXADJ_NO_MATCH                         Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPV6_TXADJ_NO_MATCH                         Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_MPLS_TXADJ_NO_MATCH                         Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPV4_DROP_NULL_RTE                          Drop L3       dropped due to Tx-Adjacency linked to a null route. (TBD: why would this happen?)
RSV_DROP_IPV6_DROP_NULL_RTE                          Drop L3       dropped due to Tx-Adjacency linked to a null route. (TBD: why would this happen?)
RSV_DROP_MPLS_DROP_NULL_RTE                          Drop L3       dropped due to Tx-Adjacency linked to a null route. (TBD: why would this happen?)
RSV_DROP_IPV4_DROP_RP_DEST                           Drop L3       dropped because packet at Linecard interface attempted to route to the RSP management interface
RSV_DROP_IPV6_DROP_RP_DEST                           Drop L3       dropped because packet at Linecard interface attempted to route to the RSP management interface
RSV_DROP_IPV4_RXADJ_DROP                             Drop L3       dropped due to Rx-Adjacency set to drop all packets for this route. (TBD: why would this happen?)
RSV_DROP_IPV6_RXADJ_DROP                             Drop L3       dropped due to Rx-Adjacency set to drop all packets for this route. (TBD: why would this happen?)
RSV_DROP_MPLS_RXADJ_DROP                             Drop L3       dropped due to Rx-Adjacency set to drop all packets for this route. (TBD: why would this happen?)
RSV_DROP_IPV4_NRLDI_NOT_LOCAL                        Drop L3       Frames dropped due to mismatch of Ingress linecard vs Egress linecase forwarding information base. Should be a very rare event during route updates only
RSV_DROP_IPV6_NRLDI_NOT_LOCAL                        Drop L3       Frames dropped due to mismatch of Ingress linecard vs Egress linecase forwarding information base. Should be a very rare event during route updates only
RSV_DROP_MPLS_NRLDI_NOT_LOCAL                        Drop L3       Frames dropped due to mismatch of Ingress linecard vs Egress linecase forwarding information base. Should be a very rare event during route updates only
RSV_DROP_TE_NH_INCOMPLETE                            Drop L3       dropped due to incomplete Adjacency of a TE-tunnel Nexthop (TBD: Could this be do to mis-config or network error? Or is this a software bug? Could it happen briefly during transitions?)
RSV_DROP_ING_LAG_NO_MATCH                            Drop LAG      Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_EGR_LAG_NO_MATCH                            Drop LAG      Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_UNSUPPORTED_TUNNEL                          Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_ACL_DENY                                    Drop ACL      Ingress or Egress frames dropped because of a deny action set in the access-list
RSV_DROP_QOS_DENY                                    Drop ACL      Ingress or Egress frames dropped because of a qos action set in the config
RSV_DROP_IPV4_TXADJ_DROP                             Drop L3       dropped due to Tx-Adjacency set to drop all packets for this route. (TBD: why would this happen?)
RSV_DROP_IPV6_TXADJ_DROP                             Drop L3       dropped due to Tx-Adjacency set to drop all packets for this route. (TBD: why would this happen?)
RSV_DROP_MPLS_TXADJ_DROP                             Drop L3       dropped due to Tx-Adjacency set to drop all packets for this route. (TBD: why would this happen?)
RSV_DROP_IPV4_URPF_CHK                               Drop L3       dropped due to Unicast RPF check. Also counted as a URPF protocol drop at the interface level
RSV_DROP_IPV6_URPF_CHK                               Drop L3       dropped due to Unicast RPF check. Also counted as a URPF protocol drop at the interface level
RSV_DROP_L2MC_ING_RTE_DROP                           Drop MCAST    Ingress L2 multicast frames dropped due as there is no route match
RSV_DROP_L2MC_EGR_RTE_DROP                           Drop MCAST    Egress L2 multicast frames dropped due as there is no route match
RSV_DROP_L2MC_NO_OLIST                               Drop MCAST    Egress L2 multicast frames dropped due to having no output interfaces on this NP
RSV_DROP_IPM4_ING_RTE_DROP                           Drop MCAST    Ingress IPv4 multicast packets dropped due to not matching any mroute
RSV_DROP_IPM4_ING_RTE_DFLAG_DROP                     Drop MCAST    Ingress IPv4 multicast packets dropped due to D flag in mroute
RSV_DROP_IPM4_EGR_RTE_DROP                           Drop MCAST    Egress IPv4 multicast packets dropped due to not matching any mroute
RSV_DROP_IPM4_EGR_TTL_DROP                           Drop MCAST    Egress IPv4 multicast packets dropped due to IP header time-to-live expiry
RSV_DROP_IPM4_EGR_FILTER_DROP                        Drop MCAST    Egress IPv4 multicast packets dropped rather than transmitting back on source port
RSV_DROP_IPM4_EGR_RPF_FAIL_DROP                      Drop MCAST    Egress IPv4 multicast packets dropped due to Reverse Path Forwarding check failure
RSV_DROP_IPM4_NO_OLIST                               Drop MCAST    Egress IPv4 multicast packets dropped due to not having any egress ports on this NP - should be a very rare event only during removal of the multicast group.
RSV_DROP_IPM4_NO_UIDB                                Drop MCAST    Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IPM4_MVPN_RTE_NOT_MASTER                    Drop MCAST    Egress IPv4 multicast packets that would be punted for signalling but are dropped due to not being on the master LC/NP
RSV_DROP_IPM4_MVPN_RPF_NOT_MASTER                    Drop MCAST    Egress IPv4 multicast packets that would be punted for Reverse Path Forwarding check failure but are dropped due to not being on the master LC/NP
RSV_DROP_IPM4_MVPN_DECAP_NO_MATCH                    Drop MCAST    Egress MVPN packets to be decapsulated but dropped due to MVPN decap table lookup failure
RSV_DROP_IPM4_ING_ENCAP_INVALID                      Drop MCAST    Ingress MVPN/P2MP/MLDP packets dropped due to invalid encap table entry
RSV_DROP_IPM4_EGR_ENCAP_NO_MATCH                     Drop MCAST    Egress MVPN/P2MP/MLDP packets dropped due to encap entry lookup failure
RSV_DROP_IPM4_EGR_ENCAP_INVALID                      Drop MCAST    Egress MVPN/P2MP/MLDP packets dropped due to invalid encap table entry
RSV_DROP_IPM4_ENCAP_LEAF_NO_MATCH                    Drop MCAST    Egress MVPN Generic Encap 2nd pass packets dropped due to encap output list entry (tunnel entry) lookup failure
RSV_DROP_IPM4_ENCAP_LEAF_INVALID                     Drop MCAST    Egress MVPN Generic Encap 2nd pass packets dropped due to invalid encap output list entry
RSV_DROP_IPM4_MVPN_MTU                               Drop MCAST    Egress MVPN packets to be encapsulated but dropped due to exceeding tunnel MTU
RSV_DROP_IPM4_NO_ENCAP_OLIST                         Drop MCAST    Egress MVPN encap packets with no encapsulation output list entries
RSV_DROP_IPM4_PIT_MISS
RSV_IPM4_GRE_OLE                                          GRE      Internal debug event
RSV_DROP_IPM6_ING_RTE_DROP                           Drop MCAST    Ingress IPv6 multicast packets dropped due to not matching any mroute
RSV_DROP_IPM6_ING_RTE_DFLAG_DROP                     Drop MCAST    Ingress IPv6 multicast packets dropped due to D flag in mroute
RSV_DROP_IPM6_EGR_RTE_DROP                           Drop MCAST    Egress IPv6 multicast packets dropped due to not matching any mroute
RSV_DROP_IPM6_EGR_TTL_DROP                           Drop MCAST    Egress IPv6 multicast packets dropped due to IP header time-to-live expiry
RSV_DROP_IPM6_EGR_FILTER_DROP                        Drop MCAST    Egress IPv6 multicast packets dropped rather than transmitting back on source port
RSV_DROP_IPM6_EGR_RPF_FAIL_DROP                      Drop MCAST    Egress IPv6 multicast packets dropped due to Reverse Path Forwarding check failure
RSV_DROP_IPM6_NO_OLIST                               Drop MCAST    Egress IPv6 multicast packets dropped due to not having any egress ports on this NP
RSV_DROP_IPM6_NO_UIDB                                Drop MCAST    Egress IPv6 multicast packets dropped due to egress interface lookup failure
RSV_DROP_IPM6_MVPN_MDT_MTU
RSV_DROP_IPM6_MVPN_RTE_NOT_MASTER
RSV_DROP_IPM6_MVPN_RPF_NOT_MASTER
RSV_DROP_MLDP_MDT_MTU
RSV_DROP_MLDP_ING_NRLDI_NO_MATCH
RSV_DROP_MLDP_ING_NRLDI_INVALID
RSV_DROP_MC_FLD_IGNORE_IRL                                MCAST    Packet not forwarded on IRL to avoid traffic duplication
RSV_DROP_IPMC_PWHE_MTU_EXCEED
RSV_DROP_MPLS_LEAF_NO_MATCH                          Drop L3       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_ING_MPLS_PLU                                Drop L3       generic MPLS drop count
RSV_DROP_EGR_MPLS_PLU                                Drop L3       generic MPLS drop count
RSV_DROP_XID_NO_MATCH                                Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_DXID_NO_MATCH_OR_UNBOUND                    Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_L2VPNLDI_NO_MATCH                           Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_MPLS_CSC_CHK_FAIL                           Drop L3       dropped due to MPLS Carrier-supporting-Carrier VPN security check. VPN of the allocated MPLS label did not match the VPN of the incoming interface.
RSV_DROP_NHINDEX                                     Drop L3
RSV_DROP_BD_MEMBER_TYPE_NO_MATCH                     Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_BD_MEMBER_TYPE_NO_MEMBER                    Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IFIB_TTL_CHECK                              Drop Punt     Dropped due to control plane filtering. Packet TTL was less than the minimum TTL required by the control plane to punt this protocol for processing. (There are no protocol counts or captured information to know which protocol is being dropped).
RSV_DROP_IP_TOS_CHECK
RSV_DROP_MPLS_TTL_EXPIRED                            Drop L3       dropped due to MPLS TTL
RSV_DROP_MPLS_MTU_EXCEEDED                           Drop L3       dropped due to MPLS frame size - MTU exceeded
RSV_DROP_PRRT_UIDB_MISS                              Drop Punt     Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_DROP_IN_L3_NOT_MYMAC                             Drop L3       Unicast frames dropped on layer3 ingress interface because they do not match the interface MAC address (packet not destined for this next-hop).
RSV_PUNT_PIT_MISS                                    Drop Punt     Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_PUNT_IP_MTU_EXCEEDED                                  L3       Egress IP packets that exceed the interface MTU.  IPv4 frames are punted to LC CPU to be fragmented. IPv6 frames are punted to LC CPU be dropped and generate ICMP response.Punt rate limit is very low to protect LC CPU
RSV_PUNT_8023_MTU_EXCEEDED                                L3       Frames punted due to MTU exceeded
RSV_ING_PUNT_AND_FWD                                      Infra    Summary count of Ingress frames that are both forwarded to fabric and punted
RSV_EGR_PUNT_AND_FWD                                      Infra    Summary count of Egress frames that are both forwarded to fabric and punted
RSV_ING_L2_SMAC_MISS                                      L2       Frames received with a previously un-Learned source MAC
RSV_ING_L2_BD_FLUSH                                       L2       FYI. MAC Entries deleted due to Bridge Domain flush
RSV_ING_L2_PORT_FLUSH                                     L2       FYI. MAC Entries deleted due to port flush
RSV_ING_L2_LEARN                                          L2       FYI. MAC Addresses learned on ingress
RSV_ING_L2_MOVE                                           L2       L2 Mac learn - mac move detected
RSV_ING_L2_FLUSH                                          L2       L2 Mac table flushed entry
RSV_ING_L2_NG_SKIP_LEARN                                  L2       FYI. MAC Address egress learn attempts that have timed out
RSV_NO_RFD_DROP                                      Drop Infra    Frames dropped due to lack of Internal NP buffering resource
RSV_ING_L2_FLOOD_BLOCK                               Drop L2       Frames dropped due to floods being blocked on an interface
RSV_EGR_L2_DROP_FLOOD_NO_MEMBER                      Drop L2       dropped due to no bridge members on the NP. May occur in some cases where packet replication in the system fabric sends a copy of the traffic to an egress NP that does not need it.
RSV_EGR_L2_FLOOD_BD_MISS                             Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_ING_L2_VPLS_MAC_FILTER                           Drop L2       dropped due to MAC filtering
RSV_ING_L2_SRC_XID_MISS                              Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_ING_L2_DST_XID_MISS
RSV_ING_L2_SRC_XID_UNBOUND                           Drop L2       dropped due to L2 interface down
RSV_EGR_L2_DEST_XID_UNBOUND                          Drop L2       dropped due to L2 interface down
RSV_ING_VPLS_ERR_DROP                                Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_ING_VPWS_ERR_DROP                                Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_ING_VPWS_INVALID_XID_DROP                        Drop L2       Frames dropped due to Ingress VPWS with undefined destination XID
RSV_ING_L2_BD_MISS                                   Drop L2       Frames dropped due to inconsistent software state which may occur during reprogramming
RSV_ING_L2_REFLECT_FILTER                            Drop L2       Frames dropped to avoid forwarding a flood back out the source port on ingress
RSV_EGR_L2_REFLECT_FILTER                            Drop L2       Frames dropped to avoid forwarding a flood back out the source port on egress
RSV_EGR_L2_NOT_MEMBER                                Drop L2       Frames dropped due to bridge member not found for multicast
RSV_EGR_L2_INACTIVE_MEMBER                           Drop L2       Frames dropped due to bridge member inactive for multicast
RSV_EGR_L2_NG_SKIP_LEARN                                  L2       FYI. MAC Address learning not done due to NP busy but will try again next time address seen
RSV_L2_ING_SHG_DROP                                  Drop L2       Ingress Frames dropped due to split horizon
RSV_L2_EGR_SHG_DROP                                  Drop L2       Egress Frames dropped due to split horizon
RSV_EGR_L2_MSTP_DROP                                 Drop L2       Frames dropped due to MSTP blocking state
RSV_VPLS_LEARN_LIMIT_ACTION_DROP_CNT                 Drop L2       Frames dropped due to bridge learn limit
RSV_VPLS_MCAST_SRC_MAC_DROP_CNT                      Drop L2       Frames dropped due to multicast source MAC
RSV_VPLS_SECURE_MAC_DROP_CNT                         Drop L2       Frames dropped due to secure MAC
RSV_VPLS_SECURE_MAC_NOTIFY_CNT                            L2       Secure MAC notify events
RSV_VPLS_DAI_VIOLATION_DROP_CNT                      Drop L2       Frames dropped due to DAI violation
RSV_VPLS_DAI_NOTIFY_CNT                              Drop L2       DAI notify events
RSV_VPLS_IPSG_VIOLATION_DROP_CNT                          L2       Frames dropped due to IPSG violation
RSV_VPLS_IPSG_NOTIFY_CNT                                  L2       IPSG notify events
RSV_VPLS_EGR_MAC_MOVE_DENIED_CNT                     Drop L2       Frames dropped due to egress MAC move denial
RSV_VPLS_MAC_MOVE_CNT                                     L2       MAC moves
RSV_VPLS_STATIC_MAC_MOVE_DROP_CNT                    Drop L2       Frames dropped because static MACs cannot move
RSV_LEARN_FROM_NOTIFY_CNT                                 L2       Count of mac learn notifications that result in newly learned macs.
RSV_VPLS_MAC_NOTIFY_LOCAL_DROP_CNT                   Drop L2       [not used]
RSV_VPLS_MAC_NOTIFY_ERR_DROP_CNT                     Drop L2       Count of mac learn notifications that cant be processed by the NP due to an error. Bridge domain lookup miss; mac entry is already there and static; or xid lookup miss and xid is global.
RSV_VPLS_MAC_DELETE_ERR_DROP_CNT                     Drop L2       Count of mac delete notifications that cant be process by the NP due to an error. See above.
RSV_VPLS_MAC_DELETE_SECURE_DROP_CNT                  Drop L2       Count of mac delete notifications that cant be processed by the NP due to the entry having mac secure settings.
RSV_FLUSH_FROM_NOTIFY_CNT                                 L2       Mac table entry flushed
RSV_REFRESH_FROM_NOTIFY_CNT                               L2       Count of mac learn notifications that result in the mac entry being refreshed. This updates the timestamp so that entry wont be aged out. For mac addresses that are actively being forwarded.
RSV_MOVE_FROM_NOTIFY_CNT                                  L2       Count of mac learn notifications that result in the mac entry being moved to a different interface (XID).
RSV_DELETE_FROM_NOTIFY_CNT                                L2       [not used]
RSV_DELETE_FROM_MSG_CNT                                   L2       Count of mac delete notifications that result in the mac entry being deleted.
RSV_ING_LEARN_ONLY_DROP_CNT                          Drop L2       Count of vpls frames that are dropped due to the bridge being in learn only state.  In this state source mac addresses are learned by not forwarded.
RSV_EGR_EFP_FILTER_TCAM_MISS_DROP_CNT                Drop L2       Count of vpls frames that are dropped by EFP filtering due to the vlan encapsulation on the wire not matching any transmit interface.  Can only increment if EFP filtering is enabled.
RSV_EGR_EFP_FILTER_MISS_DROP_CNT                     Drop L2       Count of vpls frames that are dropped by EFP filtering due to the vlan encapsulation on the wire not matching the interface that the frame is transmitted on.  Can only increment if EFP filtering is enabled.
RSV_EGR_PREFILTER_VLAN_DROP_CNT                      Drop L2       Count of vpls frames that are dropped by EFP filtering due to the vlan encapsulation on the fabric not matching the interface that the frame is transmitted on. Can only increment if EFP filtering is enabled. Can only increment if EFP filtering is enabled.
RSV_EGR_VLAN_NUM_DROP_CNT                            Drop L2       Count of vpls frames that are dropped due to the vlan encapsulation on the fabric not having enough tags to support the egress vlan ops. This prevents the ucode from corrupting the frame if vlan tags are popped on egress.
RSV_ING_L2_VPLS_STORM_DROP_CNT                       Drop L2       Total number of flood frame drops due to vpls storm control. These are broadcast or multicast or unknown unicast.   Only valid if vlps storm control is enabled.
RSV_ING_L2_DOT1AH_ISID_DROP_CNT                      Drop L2       Total dot1ah vpls frame drops due to dot1ah isid lookup miss when the provider destination mac that matches the my-backbone-mac of the box.
RSV_ING_L2_DOT1AH_CORE_LOOP_DROP_CNT                 Drop L2       Total dot1ah vpls frame drops due to a provider source mac that is already programmed as the my-backbone-mac of the box.  Indicates a loop on the core side of the dot1ah connection.
VIDMON_TCAM_LKUP_MISS_CNT                                 Vidmon   Vidmon policy lookup was done and it was not successful
VIDMON_INTF_HASH_LKUP_MISS_CNT                            Vidmon   Vidmon interface hash lookup was done and it was not successful
VIDMON_RSV_FLOW_ADD_CNT                                   Vidmon   Vidmon flows learned
VIDMON_RSV_MDI_FLOW_ADD_CNT                               Vidmon   Vidmon flows learned
VIDMON_FLOW_DEL_ABORT_CNT
VIDMON_OD_SCAN_CNT                                        Vidmon   Vidmon scan event
VIDMON_PROBATION_DELETE_CNT
VIDMON_FLOW_LIMIT_EXCD_CNT                                Vidmon   Vidmon flows attempted to be added but the NP is already at the limit
VIDMON_IDX_Q_EMPTY_CNT                                    Vidmon   Vidmon flows attempted to be added but the NP is already at the limit
VIDMON_MDI_IDX_Q_EMPTY_CNT
VIDMON_NG_LEARN_ABORT_CNT
VIDMON_AGE_DELETE_CNT
RSV_EGR_LAG_NOT_LOCAL_DROP_CNT                       Drop LAG      Normal egress discard after multicast/broadcast packet replication to an NP that did not need a copy of the packet; or during transition of link-bundle output. This egress filtering ensures that flood/multicast packets go out only one bundle link
RSV_EGR_PW_DHCP_UNTRUSTED_DROP                       Drop L2       Frames on PW dropped due to a DHCP untrusted host
RSV_MOFRR_ING                                             MCAST    Ingress IPv4 packets received on MoFRR mroutes
RSV_MOFRR_WD_UPDATE                                       MCAST    Ingress IPv4 packets received on MoFRR mroute from interface for which traffic is being passed - incrementing watchdog
RSV_MOFRR_ACT_PUNT                                        MCAST    MoFRR activity watchdog interrupt notifications received - punted
RSV_MOFRR_LOSS_MSG
RSV_MOFRR_INTR_CNT                                        MCAST    MoFRR watchdog interrupt notifications received
RSV_MOFRR_HRT_LKUP_FAIL_DROP_CNT                     Drop MCAST    MoFRR watchdog interrupt notifications ignored due to watchdog entry lookup failure
RSV_MOFRR_FWD_IRL                                         MCAST    MoFRR FRR notification forwarded on cluster IRL
RSV_MOFRR_WDT_INVALID_RES_DROP_CNT                   Drop MCAST    MoFRR watchdog interrupt notifications ignored due to watchdog entry being in an invalid state (monitoring neither activity nor loss)
RSV_MOFRR_SKIP_LRN_CNT                                    MCAST    Failed attempts to record an MoFRR switchover due to learn timeout
RSV_MOFRR_HRT_UPDATE_CNT                                  MCAST    MoFRR switchovers recorded
RSV_MOFRR_SEQ_NUM_FAIL_DROP_CNT                      Drop MCAST    MoFRR switchover notifications ignored due to sequence number mismatch
RSV_MOFRR_RPF_FAIL                                        MCAST    MoFRR switchover message heeded but not punted because of RPF mismatch
RSV_TIMOFRR_EGR_SRC_REPLACE
RSV_TIMOFRR_ING_STANDBY
RSV_ABF_NON_DEFAULT_RTE                                   L3       Frames which matched ABF rule which had default-route check enabled but the frame had a non-default route. ABF is not applied to the frame.
RSV_L2TP_ING_STR_MISS_DROP_CNT                       Drop L2TP     While processing a packet from a PPPoE LAC subscriber the ingress linecard unexpectedly did not find an entry in the L2TP session table
RSV_L2TP_BAD_TUNNEL_ROUTE_DROP_CNT                   Drop L2TP     While processing a packet from a PPPoE LAC subscriber the ingress linecard unexpectedly could not route the encapsulated packet to the LNS. The packet was about to be punted or dropped or routed into a GRE tunnel.
RSV_L2BC_BVI                                              L2       Count of flooded broadcast or multicast vpls frames that are sent to the BVI. Only increments if the BVI interface is part of the VPLS flood group.
RSV_L2MC_BVI                                              MCAST    Count of layer2 multicast routed frames that are sent to the BVI. Only increments if the BVI interface is part of the multicast group.
RSV_ING_SPAN                                              SPAN     [not used]
RSV_EGR_SPAN                                              SPAN     Count of egress span frames replciated by resolve.
ACL_CAPTURE_NO_SPAN                                       SPAN     Matched ACL capture entry but no span session configured
UTURNCHECK_FRR_DROP                                  Drop L3       [not used]
ERP_ING_PUNT                                              EOAM     Ethernet Ring Protection Switching protocol (G.8032 ERPS). Generic path count. Should also be counted as PUNT_ERP_*
RSV_SNF_SAMPLE_PROCESS                                    Netflow  [not used]
RSV_SNF_SAMPLE_PKT                                        Netflow  Frames which are sampled by Netflow processing and punted to local LC CPU
RSV_SNF_IPV4                                              Netflow  Frames which are sampled by Netflow processing and send to 2nd pass processing for Source IP lookup.
RSV_SNF_ING_PUNT                                          Netflow  Ingress frames which are sampled by Netflow processing
RSV_SNF_EGR_PUNT                                          Netflow  Egress frames which are sampled by Netflow processing
RSV_MVPN_ENCAP                                            MCAST    FYI. Debug. MVPN Encap operation
RSV_P2MP_EGR_SEND_IP_PL                                   P2MP     Egress P2MP/MLDP packets being replicated and prepped to loop back for IP decap processing
RSV_P2MP_EGR_SEND_TAIL_PL                                 P2MP     Ingress P2MP/MLDP packets being prepped to loop back for Tail IP decap processing
RSV_P2MP_EGR_SEND_BUD_PL                                  P2MP     Ingress P2MP/MLDP packets being replicated and prepped to loop back for other checks like OAM/PIM.
RSV_P2MP_NO_OLE                                      Drop P2MP     Egress P2MP packets being dropped as there are no interfaces on this NP for this tunnel or the IP Legs.
RSV_P2MP_IP_LOOKUP_FAIL                              Drop P2MP     Egress P2MP/MLDP packets needing IP lookup, but the lookup failed.We continue to forward on MPLS tunnel.
RSV_P2MP_RPF_FAIL                                    Drop P2MP     Egress P2MP packets needing IP lookup, but the RPF check failed.We continue to forward on MPLS tunnel.
RSV_BGP_PA_EGR_DROP                                  Drop L3       FYI. BGP-Policy Accounting failed for SA - packet NOT dropped
RESOLVE_INV_REMOTE_RACK_UIDB_DROP_CNT
RESOLVE_EGR_REMOTE_RACK_ENCAP_CNT                         Infra    Internal debug event
RESOLVE_ING_REMOTE_RACK_DECAP_CNT                         Infra    Internal debug event
RSV_SEND_MAC_NOTIFY_TO_IRL                                Infra    Internal debug event
RSV_MAC_ACC_SA_MISS                                       L2       Mac Accounting frame SMAC no match
RSV_MAC_ACC_DA_MISS                                       L2       Mac Accounting frame DMAC no match
RSV_NO_REMOTE_RACK_PORTS
RSV_GET_CTX_TMOUT_EFP_FILTER                         Drop L2       Frames dropped due to Internal context timeout - software error
RSV_GET_CTX_TMOUT_IFIB_RSLTS                         Drop L3       Frames dropped due to Internal context timeout - software error
RSV_GET_CTX_TMOUT_IFIB_RSLTS_GRE                     Drop GRE      Frames dropped due to Internal context timeout - software error
RSV_GET_CTX_TMOUT_IFIB_RSLTS_LISP                    Drop LISP     Frames dropped due to Internal context timeout - software error
RSV_GET_CTX_TMOUT_ING_UIDB_EXT                       Drop Infra    Frames dropped due to Internal context timeout - software error
RSV_GET_CTX_TMOUT_FLOWQOS_CTX                        Drop QOS      CAC Redirect frames dropped - Internal context timeout - software error
RSV_GET_CTX_TMOUT_ACL_CTX                            Drop ACL      Frames dropped due to Internal context timeout - software error
RSV_GET_CTX_TMOUT_PARENT_QOS_CTX                     Drop QOS      Frames dropped due to Internal context timeout - software error
RSV_GET_CTX_TMOUT_PARENT_QOS_IF_CTX                  Drop QOS      Frames dropped due to Internal context timeout - software error
RSV_GET_CTX_TMOUT_PARENT_QOS_LPBK_CTX                Drop QOS      Frames dropped due to Internal context timeout - software error
RSV_GET_CTX_TMOUT_TM_PART2_CTX                       Drop Infra    Frames dropped due to Internal context timeout - software error
RSV_EGR_CLUSTER_SH_DROP_CNT
RSV_MLDP_ING_PEEK_PL                                      Infra    Internal debug event
RSV_DBA_FLOW_ADD                                          DBA      Internal debug event - Dest based accounting flow added
RSV_DBA_FLOW_DEL                                          DBA      Internal debug event - Dest based accounting flow removed
RSV_DBA_LEARN_LIMIT_REACHED                               DBA      Destination based accounting - learn limit reached
DBA_LRN_SCAN_MSG_CNT                                      DBA      Destination based accounting - learn scan event
DBA_LRN_IDX_Q_EMPTY_CNT                                   DBA      Destination based accounting - not able to learn due to resource limits
DBA_LRN_ADD_ABORT_CNT                                     DBA      Destination based accounting - learn failed
DBA_LRN_ADD_FAIL_CNT                                      DBA      Destination based accounting - learn failed
DBA_LRN_FLOW_DEL_FAIL_CNT                                 DBA      Destination based accounting - learn failed
LRN_MSG_Q_FULL_CNT                                        Infra    Learn machine event - update failed due to np resource limits - will retry
RSV_MLDP_ING_DROP
RSV_MLDP_EGR_DROP
RSV_DBA_FLOW_DEL_drop                                     DBA      Destination based accounting - learn event
RSV_DBA_NG_LEARN_CNT                                      DBA      Destination based accounting - learn event
RSV_PWHE_DECAP_ING_CNT                                    PWHE     internal debug event
RSV_PWHE_ENCAP_ING_UNSUPP
RSV_PWHE_ENCAP_ING_2ND_CNT                                PWHE     internal debug event
VIDMON_RTP_PT_LKUP_MISS_CNT
RSV_TUNNEL_RPF_FAILED
RSV_EGR_BNG_V6_LINK_LOCAL                                 BNG      IPv6 Link local rx on BNG
RSV_EGR_IPV6_LINK_LOCAL                                   L3       IPv6 Link local rx
VIDMON_RTP_INVALID_CNT                               Drop Vidmon
MPLS_RPF_DROP                                        Drop L3
RSV_ING_L2_EVPN_DF_BLOCK                             Drop
RSV_EGR_L2_EVPN_DF_BLOCK                             Drop
RSV_EGR_L2_EVPN_ESI_DROP                             Drop
RSV_ING_L2_EVPN_NO_PROV_BD_DROP                      Drop
RSV_ING_L2_EVPN_NO_SMAC_DROP                         Drop
RSV_ING_L2_EVPN_NO_DMAC_DROP                         Drop
RSV_ING_L2_EVPN_SAME_ESI_DROP                        Drop
RSV_ING_L2_EVPN_REFLECT_FILTER                       Drop
RSV_L2TPV3OV6_ENCAP_LKP_FAIL                         Drop
RSV_L2TPV3OV6_DECAP_LKP_FAIL                         Drop
RSV_L2TPV3OV6_COOKIE_MISS                            Drop
RSV_Y1731_LMMR_DROP                                  Drop
RSV_L2_VPLS_LSM_ING
RSV_L2_VPLS_LSM_EGR
RSV_L2MC_VPLS_LSM_HEAD_ING_CNT
RSV_L2MC_VPLS_LSM_BUD_ING_CNT
RSV_L2MC_VPLS_LSM_EGR_CNT
RSV_EGR_CGN_PROC_RTN
RSV_ING_ETHERNET_LOOPBACK                                 EDPL     Frames looped back by the Ethernet Dataplane Loopback feature
DBG_L_RSV_FLOWQOS_LRN_CNT                                 FLOWQOS  Count of frames identified as new flow and being considered for learning into the Flow QoS entry table per NP
RSV_FLOWQOS_FLOW_CNT_EXCEED                               FLOWQOS  Flow QoS entry table per NP (UBRL) or per class (CAC) is fullNo more flow entries can be learnt until older entries age out / get deleted
DBG_L_RSV_FLOWQOS_PASS2_ADD_CNT                           FLOWQOS  Replica frames finishing up 2nd pass Flow QoS learningThese are copies of original frames just for learn and discard
RSV_DROP_CAC_REJECT                                  Drop FLOWQOS  Ingress or Egress frames dropped because of per-class Flow aware CAC flow count exceed
LRN_FLOWQOS_CAC_CNT_EXCEED                                FLOWQOS  Per class h/w entry table for Flow aware CAC is fullNo more flow entries can be learnt until older entries age out / get deleted
LRN_FLOWQOS_TBL_INDEXQ_EMPTY                              FLOWQOS  H/w programming inconsistency - Per flow hardware resourcequeue is empty. No more flow entries can be learnt and allocatedper-flow resource until queue is replenished with flow age/delete
PUNT_INVALID                                              Punt     software error in punt path
PUNT_INVALID_DROP                                         Punt     software error in punt path
PUNT_ALL                                                  Punt     software error in punt path
PUNT_ALL_EXCD                                             Punt     software error in punt path
CDP                                                       Punt     Punt Ingress CDP protocol frames - layer3 interface only
CDP_EXCD                                                  Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
ARP                                                       Punt     Punt Ingress ARP protocol frames - layer3 interface only
ARP_EXCD                                                  Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
RARP                                                      Punt     Punt Ingress Reverse ARP protocol frames - layer3 interface only
RARP_EXCD                                                 Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
CGMP                                                      Punt     Punt Ingress CGMP protocol frames - layer3 interface only
CGMP_EXCD                                                 Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
LOOP                                                      Punt     Punt Ingress ELOOP protocol frames - layer3 interface only
LOOP_EXCD                                                 Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
SAP_PUNT                                                  Punt     unused
SAP_PUNT_EXCD                                             Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BUNDLE_PROTO_PUNT                                         Punt     LACP protocol - punted to CPU for processing
BUNDLE_PROTO_PUNT_EXCD                                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
UNKNOWN_OSI                                               Punt     Unknown OSI frame - punted to CPU for processing
UNKNOWN_OSI_EXCD                                          Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
DIAGS                                                     Punt     unused
DIAGS_EXCD                                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
SNIFF                                                     Punt     unused
SNIFF_EXCD                                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_GLOBAL_IFHANDLE_TCAM_MISS                            Punt     unused
PUNT_GLOBAL_IFHANDLE_TCAM_MISS_EXCD                       Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
DROP_PACKET                                               Punt     unused
DROP_PACKET_EXCD                                          Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
CFM_OTHER                                                 Punt     Ingress NP Punt or Egress NP Punt of CFM other packets (link trace or perf. mon.).   Ingress punts can occur on a Layer2 or Layer3 interface Egress punts occur on a Layer2 interface only.
CFM_OTHER_EXCD                                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
CFM_OTHER_RSP_PUNT                                        Punt     Ingress NP Punt or Egress NP Punt of CFM other packets (link trace or perf. mon.).   Ingress punts can occur on a Layer2 or Layer3 interface Egress punts occur on a Layer2 interface only. - Received on a virtual/bundle interface, so punting to RSP CPU for processing
CFM_OTHER_RSP_PUNT_EXCD                                   Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
DHCP_SNOOP_REQ                                            Punt     Ingress Punt of DHCP snoop request frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REQ_EXCD                                       Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
DHCP_SNOOP_REPLY                                          Punt     Ingress Punt of DHCP snoop reply frames - layer2 interface only and DHCP snooping enabled
DHCP_SNOOP_REPLY_EXCD                                     Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MSTP                                                      Punt     Ingress NP Punt or Egress NP Punt of MSTP frames.  For Layer2 VPLS or Layer3, punt is on ingress frames only.  For Layer3 VPWS, punt is on egress frames only.
MSTP_EXCD                                                 Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MSTP_PB                                                   Punt     Ingress NP Punt or Egress NP Punt of MSTP Provider Bridge frames.  For Layer2 VPLS or Layer3, punt is on ingress frames only.  For Layer3 VPWS, punt is on egress frames only.
MSTP_PB_EXCD                                              Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
DAI                                                       Punt     ARP packet punted from L2 interface for Dynamic Arp Inspection
DAI_EXCD                                                  Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IGMP_SNOOP                                                Punt     Ingress punt of snooped IGMP or PIM frames - layer2 interface only and IGMP snooping enabled
IGMP_SNOOP_EXCD                                           Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPSUB                                                     Punt     Punted to CPU to establish IP-Subscriber session
IPSUB_EXCD                                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PPPOE                                                     Punt     Punted to CPU to establish PPPoE session
PPPOE_EXCD                                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PPP                                                       Punt     PPP Control frame - punted to CPU for processing
PPP_EXCD                                                  Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
EFM                                                       Punt     EFM (Ethernet First Mile) OAM Protocol frames - punted to CPU for processing
EFM_EXCD                                                  Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPv4_OPTIONS                                              Punt     Ingress Punt of IP frames with options - layer3 interface only - IPV4, IPV6
IPv4_OPTIONS_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4_PLU_PUNT                                             Punt     Ingress or Egress punt of IPV4 frames to CPU for routes needing CPU processing
IPV4_PLU_PUNT_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4MC_DO_ALL                                             Punt     IPV4 Mcast control frames punted to CPU      (not forwarded by NP, may be forwarded by CPU)
IPV4MC_DO_ALL_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4MC_DO_ALL_BUT_FWD                                     Punt     IPV4 Mcast control frames punted to CPU and forwarded in the NP.
IPV4MC_DO_ALL_BUT_FWD_EXCD                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4_DOUBLE_TUNNEL                                        Punt     Not implemented by ucode
IPV4_DOUBLE_TUNNEL_EXCD                                   Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_NO_MATCH                                             Punt     IP Unreachable - punted to CPU for ICMP Unreachable response
PUNT_NO_MATCH_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4_TUNNEL_FORUS                                         Punt     Not implemented by ucode
IPV4_TUNNEL_FORUS_EXCD                                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4_FRAG_TUNNEL                                          Punt     Not implemented by ucode
IPV4_FRAG_TUNNEL_EXCD                                     Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4_CANNOT_FRAG                                          Punt     Not implemented by ucode
IPV4_CANNOT_FRAG_EXCD                                     Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4_TTL_ERROR                                            Punt     Ingress IPV4 frames with TTL = 1, punted to CPU for ICMP response. (TTL of 0 is dropped in NP)
IPV4_TTL_ERROR_EXCD                                       Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4_FRAG_NEEDED_PUNT                                     Punt     IP MTU Exceeded. Punted to CPU for fragmentation
IPV4_FRAG_NEEDED_PUNT_EXCD                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4_BFD                                                  Punt     BFD - punted to CPU for processing
IPV4_BFD_EXCD                                             Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
RP_PUNT                                                   Punt     punted to RSP for additional processing of packets to a specific Adjacency
RP_PUNT_EXCD                                              Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_IFIB                                                 Punt     Generic count of IP packets punted to the layer3 control plane for processing after CoPP/IFIB filtering.
PUNT_IFIB_EXCD                                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_ADJ                                                  Punt     Ingress IPV4 ucast or MPLS frames with the adjacency punt bit set in the NR-LDI or RX adjacency.  Egress IPV4 ucast or MPLS frames with the adjacency punt bit set in the NR-LDI or TX adjacency.
PUNT_ADJ_EXCD                                             Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_UNKNOWN_IFIB                                         Punt     Ingress IPV4 ucast frames with the IFIB bit set in the LEAF or R-LDI and the IFIB lookup does not get a match, OR ingress MPLS frames with the IFIB bit set in the LEAF or R-LDI
PUNT_UNKNOWN_IFIB_EXCD                                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_ACL_DENY                                             Punt     Ingress or Egress frames with a deny action set in the ACL policy and ACL punt (instead of drop) is enabled
PUNT_ACL_DENY_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_ACL_LOG                                              Punt     Ingress or Egress frames with an ACL policy match and ACL logging is enabled.        Layer3 frames only.
PUNT_ACL_LOG_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_ACL_LOG_L2                                           Punt     Ingress or Egress frames with an ACL policy match and ACL logging is enabled.        Layer2 frames only.
PUNT_ACL_LOG_L2_EXCD                                      Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6_LINK_LOCAL                                           Punt     Ingress IPV6 frames received that are link local packets - these are punted - layer3 interface only
IPV6_LINK_LOCAL_EXCD                                      Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6_HOP_BY_HOP                                           Punt     Ingress IPV6 frames received that are hop by hop packets  - these are punted - layer3 interface only
IPV6_HOP_BY_HOP_EXCD                                      Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6_TTL_ERROR                                            Punt     Ingress IPV6 frames that have a TTL error - these are punted - layer3 interface only
IPV6_TTL_ERROR_EXCD                                       Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6_PLU_PUNT                                             Punt     Ingress or Egress punt of IPV6 frames with punt flag set in Leaf results or R-LDI results - layer3 interface only
IPV6_PLU_PUNT_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6_PLU_RCV                                              Punt     Not implemented by ucode
IPV6_PLU_RCV_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6_ROUT_HEAD                                            Punt     Ingress IPV6 frames received that are router header packets - these are punted - layer3 interface only
IPV6_ROUT_HEAD_EXCD                                       Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6_TOO_BIG                                              Punt     Egress IPV6 frames that are too bit - exceed MTU - these are punted - layer3 interface only
IPV6_TOO_BIG_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6_MISS_SRC                                             Punt     Not implemented by ucode
IPV6_MISS_SRC_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6_SRC_LINK_LOCAL                                       Punt     IPv6 source address is link-local - punted to CPU for processing
IPV6_SRC_LINK_LOCAL_EXCD                                  Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6MC_DO_ALL                                             Punt     IPV6 Mcast control frames punted to CPU      (not forwarded by NP, may be forwarded by CPU)
IPV6MC_DO_ALL_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV6MC_DO_ALL_BUT_FWD                                     Punt     IPV6 Mcast control frames punted to CPU and forwarded by NP
IPV6MC_DO_ALL_BUT_FWD_EXCD                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MPLS_PLU_PUNT                                             Punt     Ingress MPLS frames punted due to Punt set in the Leaf or R-LDI, plus Ingress MPLS router alert frames, which are punted
MPLS_PLU_PUNT_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MPLS_FOR_US                                               Punt     MPLS received with a label allocated to a local router address - punted to CPU for processing
MPLS_FOR_US_EXCD                                          Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_L2TP_COOKIE_MISMATCH                                 Punt     Not implemented by ucode
PUNT_L2TP_COOKIE_MISMATCH_EXCD                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_L2TP_TUNNEL_DOWN                                     Punt     Not implemented by ucode
PUNT_L2TP_TUNNEL_DOWN_EXCD                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
GRE_BAD_FLAGS                                             Punt     Not implemented by ucode
GRE_BAD_FLAGS_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
GRE_NON_IPV4                                              Punt     Not implemented by ucode
GRE_NON_IPV4_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
IPV4_TUNNEL_NOT_CONFIGD                                   Punt     Not implemented by ucode
IPV4_TUNNEL_NOT_CONFIGD_EXCD                              Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_VCCV_PKT                                             Punt     Ingress MPLS frames that are PW VCCV frames - must be PWtoAC de-aggregation flows
PUNT_VCCV_PKT_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_QNET_PKT                                             Punt     Not implemented by ucode
PUNT_QNET_PKT_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_SERVICE_CARD                                         Punt     Not implemented by ucode
PUNT_SERVICE_CARD_EXCD                                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_STATISTICS                                           Punt     Statistics gathering frames punted to LC host - generated by statistics scanning machine
PUNT_STATISTICS_EXCD                                      Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_DIAGS_RSP_ACT                                        Punt     Not implemented by ucode
PUNT_DIAGS_RSP_ACT_EXCD                                   Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_DIAGS_RSP_STBY                                       Punt     Not implemented by ucode
PUNT_DIAGS_RSP_STBY_EXCD                                  Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
NETIO_RP_TO_LC_CPU_PUNT                                   Punt     Preroute egress inject frames received from the RP that are sent to the LC host
NETIO_RP_TO_LC_CPU_PUNT_EXCD                              Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MOFRR_PUNT                                                Punt     IPV4 multicast-only fast reroute punts.      These are notices to the LC to indicate traffic activity or loss.  NOTE: Subtract MDF_MOFRR_SWITCH_IGNORED from this to find the actual number of punts, since this counter is incremented prior to the switch-ignored check.
MOFRR_PUNT_EXCD                                           Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
VIDMON_PUNT                                               Punt     Video monitoring punt frames
VIDMON_PUNT_EXCD                                          Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
VIDMON_PUNT_FLOW_ADD                                      Punt     Video monitoring new flow added punt frames
VIDMON_PUNT_FLOW_ADD_EXCD                                 Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
DBGTRACE_PUNT                                             Punt     Debug Trace Packets
DBGTRACE_PUNT_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
SYNCE_PUNT                                                Punt     Synchronous ethernet packets punted
SYNCE_PUNT_EXCD                                           Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
CFM_CC                                                    Punt     Continuity Fault Management
CFM_CC_EXCD                                               Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
CFM_CCM_RSP_PUNT                                          Punt     Continuity Fault Management Packets punted to RSP
CFM_CCM_RSP_PUNT_EXCD                                     Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MSTP_RSP_PUNT                                             Punt     STP packets through normal bridging
MSTP_RSP_PUNT_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MSTP_PB_RSP_PUNT                                          Punt     STP packets through bundle interface, punted to RSP
MSTP_PB_RSP_PUNT_EXCD                                     Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MVRP_PUNT                                                 Punt     MVRP 1D packets punted
MVRP_PUNT_EXCD                                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MVRP_PB_PUNT                                              Punt     MVRP 1AD packets punted
MVRP_PB_PUNT_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MVRP_RSP_PUNT                                             Punt     MVRP1D packets coming over bundle and getting punted to RSP
MVRP_RSP_PUNT_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MVRP_PB_RSP_PUNT                                          Punt     MVRP 1AD packets coming over bundle and punted to RSP
MVRP_PB_RSP_PUNT_EXCD                                     Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_NETFLOW                                              Punt     frames copied for Netflow accounting - punted to CPU for processing
PUNT_NETFLOW_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_OF_FSOL                                              Punt     Punt OF FSOL packets
PUNT_OF_FSOL_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MPLS_FRAG_NEEDED_PUNT                                     Punt     MPLS packet for which fragmentation is required
MPLS_FRAG_NEEDED_PUNT_EXCD                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MPLS_TTL_ONE_PUNT                                         Punt     MPLS packet for which TTL expired
MPLS_TTL_ONE_PUNT_EXCD                                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_IPV4_ADJ_NULL_RTE                                    Punt     IPv4 packets with NULL route adjacency
PUNT_IPV4_ADJ_NULL_RTE_EXCD                               Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_IPV6_ADJ_NULL_RTE                                    Punt     IPv6 packets with NULL route adjacency
PUNT_IPV6_ADJ_NULL_RTE_EXCD                               Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_L2_IPIW_ARP                                          Punt     L2VPN IP Interworking ARP packets
PUNT_L2_IPIW_ARP_EXCD                                     Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_MAC_SECURE_VIOLATION                                 Punt     MAC security violation packets
PUNT_MAC_SECURE_VIOLATION_EXCD                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_MAC_SECURE_VIOLATION_SHUT                            Punt     Packets punted as shutdown MAC secure violations
PUNT_MAC_SECURE_VIOLATION_SHUT_EXCD                       Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_DAI_VIOLATION                                        Punt     Packets punted for Dynamic Arp Inspection violation
PUNT_DAI_VIOLATION_EXCD                                   Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_IPSG_VIOLATION                                       Punt     Packets punted for IP Source Guard violation
PUNT_IPSG_VIOLATION_EXCD                                  Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_LLDP                                                 Punt     Link Layer Discovery Protocol(LLDP) packets punted
PUNT_LLDP_EXCD                                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_LLDP_RSP                                             Punt     Link Layer Discovery Protocol(LLDP) packets over bundle punted to RSP
PUNT_LLDP_RSP_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_ELMI                                                 Punt     Enhanced Local Management Interface(ELMI) packets punted
PUNT_ELMI_EXCD                                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PVST                                                 Punt     Packet punted for Per Vlan Spanning Tree Protocol
PUNT_PVST_EXCD                                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_ERP_LC                                               Punt     Ethernet Ring Protection Switching protocol (G.8032 ERPS) - punted to LC CPU for processing
PUNT_ERP_LC_EXCD                                          Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_ERP_RSP                                              Punt     Ethernet Ring Protection Switching protocol (G.8032 ERPS) - punted to RSP CPU for processing
PUNT_ERP_RSP_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_NETIO_LC_TO_RSP                                      Punt     packets from netio of LC punted to RSP
PUNT_NETIO_LC_TO_RSP_EXCD                                 Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_DBA                                                  Punt     Destination based netflow packets punted
PUNT_DBA_EXCD                                             Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_CLUSTER_LINKMON                                      Punt     Cluster link monitoring packets punted
PUNT_CLUSTER_LINKMON_EXCD                                 Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_CLUSTER_DSC                                          Punt     Cluster Distributed Shelf Controller packets punted
PUNT_CLUSTER_DSC_EXCD                                     Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_CLUSTER_TEST                                         Punt     Cluster Test packets punted
PUNT_CLUSTER_TEST_EXCD                                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PTP_ETHERNET                                         Punt     PTP ethernet frames punted
PUNT_PTP_ETHERNET_EXCD                                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PTP_IPV4                                             Punt     Point-to-point IPv4 packets punted
PUNT_PTP_IPV4_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PTP_IPV6                                             Punt     Point-to-point Ipv6 packets punted
PUNT_PTP_IPV6_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_DIAGS_RX_BUFF                                        Punt     Diagnostic Receive Buffer packets punted
PUNT_DIAGS_RX_BUFF_EXCD                                   Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PPP_RSP                                              Punt     On a bundle subscriber interface, a PPP Control packet was received on a PPPoE enabled parent interface and punted to the RSP
PUNT_PPP_RSP_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PPPOE_RSP                                            Punt     On a bundle subscriber interface, a PPPoE Ctrl packet was received on a PPPoE enabled parent interface and punted to the RSP
PUNT_PPPOE_RSP_EXCD                                       Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PPPOE_PACKET_CONFIG_MISMATCH                         Punt     On a non-bundle subscriber interface, a PPPoE Control or Data packet was received on a PPPoE parent interface, met one of the following conditions and was punted to the RSP. 1. SRC Mac did not match sessions SRC Mac, 2. VLAN ID(s) inner and/or outer did not match sessions VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_EXCD                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSP                     Punt     On a bundle subscriber interface, a PPPoE Control or Data packet was received on a PPPoE parent interface, met one of the following conditions and was punted to the RSP. 1. SRC Mac did not match sessions SRC Mac, 2. VLAN ID(s) inner and/or outer did not match sessions VLAN IDs, 3. Session ID was invalid.
PUNT_PPPOE_PACKET_CONFIG_MISMATCH_RSP_EXCD                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PPPOE_L2TPV2                                         Punt     Layer 2 Tunneling Protocol Version 2 packets punted
PUNT_PPPOE_L2TPV2_EXCD                                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_MAC_CACHE_MSG                                        Punt     MAC cache message packets
PUNT_MAC_CACHE_MSG_EXCD                                   Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_UDLD                                                 Punt     Unidirectional link detection packets punted
PUNT_UDLD_EXCD                                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_HTTPR                                                Punt     Policy Based HTTP Redirect punt
PUNT_HTTPR_EXCD                                           Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_SDP                                                  Punt     Cisco Nv Network Virtualization Satellite Discovery Protocol
PUNT_SDP_EXCD                                             Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_MIRP                                                 Punt     Punt MIRP - 802.1ah bridge multiple i-tag registration protocol
PUNT_MIRP_EXCD                                            Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_UNCLASSIFIED                                         Punt     Punt BNG subscriber first sign of life packet
PUNT_UNCLASSIFIED_EXCD                                    Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_UNCLASSIFIED_RSP                                     Punt     Punt BNG subscriber first sign of life packet
PUNT_UNCLASSIFIED_RSP_EXCD                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PVST_RSP                                             Punt     Packet punted for Per Vlan Spanning Tree Protocol
PUNT_PVST_RSP_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_LISP_ADJ                                             Punt     Lawful Intercept Support Platform
PUNT_LISP_ADJ_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_MLD_SNOOP                                            Punt     Punt IPv6 MLD - multicast listener discovery protocol
PUNT_MLD_SNOOP_EXCD                                       Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_INLINE_SERVICE                                       Punt     Generic Inline Service punt
PUNT_INLINE_SERVICE_EXCD                                  Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PTP_LAG                                              Punt     PTP on link bundle
PUNT_PTP_LAG_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_MPLS_TP_BFD                                          Punt     Punt BFD protocol over MPLS-TP
PUNT_MPLS_TP_BFD_EXCD                                     Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_CDP_RSP                                              Punt     Punt CDP packets to RSP
PUNT_CDP_RSP_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_NETFLOW_RESERVED                                     Punt     Punt Netflow reaserved
PUNT_NETFLOW_RESERVED_EXCD                                Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PAGENT1                                              Punt     Punt Pagent1
PUNT_PAGENT1_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_PAGENT2                                              Punt     Punt Pagent2
PUNT_PAGENT2_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_EFM_RSP                                              Punt     Punt EFM to RSP
PUNT_EFM_RSP_EXCD                                         Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
CFM_HWO_OTHER                                             Punt     Offloaded Packets(3.3 and 10ms)for which rx table lookup fails or whose mac mis-matches. These packets have to be rate limited since these can cause actual offloaded packets to get dropped
CFM_HWO_OTHER_EXCD                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_IFIB_OPT_MISS                                        Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
PUNT_IFIB_OPT_MISS_EXCD                                   Punt     Frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
DROP_FRM_CRC_ERR_XAUI0                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI0                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI1                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI1                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI2                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI2                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI3                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI3                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI4                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI4                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI5                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI5                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI6                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI6                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI7                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI7                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI8                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI8                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_XAUI9                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_XAUI9                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_ILKN0                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_ILKN0                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_ILKN1                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_ILKN1                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_ILKN2                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_ILKN2                               Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_NULL13                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_NULL13                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_NULL14                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_NULL14                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_NULL15                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_NULL15                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII0                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII0                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII1                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII1                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII2                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII2                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII3                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII3                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII4                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII4                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII5                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII5                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII6                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII6                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII7                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII7                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII8                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII8                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII9                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII9                              Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII10                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII10                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII11                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII11                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII12                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII12                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII13                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII13                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII14                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII14                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII15                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII15                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII16                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII16                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII17                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII17                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII18                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII18                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII19                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII19                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII20                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII20                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII21                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII21                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII22                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII22                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII23                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII23                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII24                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII24                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII25                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII25                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII26                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII26                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII27                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII27                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII28                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII28                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII29                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII29                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII30                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII30                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII31                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII31                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII32                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII32                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII33                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII33                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII34                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII34                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII35                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII35                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII36                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII36                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII37                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII37                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII38                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII38                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII39                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII39                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII40                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII40                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII41                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII41                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII42                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII42                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII43                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII43                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII44                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII44                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII45                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII45                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII46                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII46                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_SGMII47                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_FRM_ERR_SGMII47                             Drop Infra    Ingress Frames dropped due to Ethernet CRC or input overrun error - either because they were received with a CRC error from the wire (which will be counted in show interface error counts), or due to input FIFO overrun (which can occur under extreme NP packet per second overload conditions)
DROP_FRM_CRC_ERR_HOST_SGMII                          Drop Infra    Frames from linecard CPU dropped due to CRC or overrun error. Either due to an NP FIFO overrun (which can occur under extreme NP packet per second overload conditions); or NP software in a bad state; or errors on the internal link.
DROP_FRM_FRM_ERR_HOST_SGMII                          Drop Infra    Frames from linecard CPU dropped due to CRC or overrun error. Either due to an NP FIFO overrun (which can occur under extreme NP packet per second overload conditions); or NP software in a bad state; or errors on the internal link.
DROP_FRM_CRC_ERR_OTHER_INT                           Drop Infra    Frames from linecard CPU dropped due to CRC or overrun error. Either due to an NP FIFO overrun (which can occur under extreme NP packet per second overload conditions); or NP software in a bad state; or errors on the internal link.
DROP_FRM_FRM_ERR_OTHER_INT                           Drop Infra    Frames from linecard CPU dropped due to CRC or overrun error. Either due to an NP FIFO overrun (which can occur under extreme NP packet per second overload conditions); or NP software in a bad state; or errors on the internal link.
RSV_BFD_HWOFF_TIMEOUT_PUNT
RSV_HWOFF_EGR_FWD
RSV_BFD_HWOFF_LPBK_RX_DISC
RSV_BFD_HWOFF_LPBK_RX_V6_CRC_DROP
RSV_BFD_HWOFF_LPBK_RX_PKT_CNT
RSV_BFD_HWOFF_LPBK_RX_ECHO_CNTR
RSV_BFD_HWOFF_LPBK_RX_PUNT
MDF_PIPE_LPBK                                             Infra    FYI. Internal Debug. NP internal loopback for further processing
MDF_PIPE_LPBK_EXCEPTION_DROP                         Drop Infra    dropped due to not enough NP buffer resources. This drop occurs during NP internal loopback processing and may be dropping a copy of the frame rather than the original. This error could also possibly indicate a software error if drop is occurs when the NP is not under extreme load.
MDF_PIPE_LPBK_BUFFER_PREFETCH                             Infra    FYI. Debug. NP extra buffer allocation during internal loopback.
MDF_DROP_RPF_FAIL                                    Drop MCAST    IP multicast frames that failed reverse-path-forwarding check but not punted due to NPRF (RPF punt table) result
MDF_OPEN_NETWORK_SERVICE_MODULE_ENTER                     Service  internal debug event
MDF_OPEN_NETWORK_SERVICE_SEND_TO_CONTROLLER               Service  internal debug event
MDF_OPEN_NETWORK_SERVICE_PICK UNKNOWN ACTION         Drop Service  inline service - internal error - frames dropped
MDF_OPEN_NETWORK_SERVICE_DONE_WTIH_SVC                    Service  inline service - internal event
MDF_OPEN_NETWORK_SERVICE_TRGR_FWD_LKUP                    Service  inline service - internal event
MDF_OPEN_NETWORK_SERVICE_TRGR_SVC_LKUP                    Service  inline service - internal event
MDF_OPEN_NETWORK_SERVICE_ACTION_DROP
MDF_OPEN_NETWORK_SERVICE_SANITY_CHECK_FAIL
MDF_OPEN_NETWORK_SERVICE_WRG_KEY_BUILDER
MDF_MOFRR_SWITCH_IGNORED                                  MCAST    MoFRR switchover message heeded but not punted because NP ID mismatch.  Only the NP that sends the message punts it.  Note that this value should be subtracted from the MOFRR_PUNT counter (incremented prior to this one).
MDF_HWOFF_UNIDIR_NP_REDUN_DROP                       Drop          HW Offload redundant drop - timeout (in unidir egress NP) OR TX frame (in unidir ingress NP).
MDF_MOFRR_LOSS_PUNT                                       MCAST    MoFRR switchover messages punted to LC CPU for signalling
MDF_PUNT_POLICE_DROP                                 Drop Infra    Aggregate drop count for Control Plane punt policing. There should be a more specific _EXCD counter incremented for the punt reason code.
MDF_DROP_PUNT_REASON_NO_MATCH                        Drop Infra    dropped due to software error while attempting to punt a frame to CPU
MDF_DROP_EGR_PORT_NO_MATCH                           Drop Infra    Frames dropped due to inconsistent software state which may occur during reprogramming
MDF_DROP_RACK_NO_MATCH
MDF_DROP_EGR_MN_PORT_NO_MATCH                        Drop Infra    Count of mac notifies that are skipped due to egress port table lookup miss. Indicates a programming error.
MODIFY_SPAN_MISS_DROP                                Drop SPAN     Frames dropped due to inconsistent software state which may occur during reprogramming
MDF_PUNT_RSP_VIA_HOST_PORT                                Infra    FYI. Debug. Special Punt handling
MODIFY_PUNT_REASON_MISS_DROP                         Drop Infra    Frames dropped due to inconsistent software state which may occur during reprogramming
BFD_NEIGHBOR                                              BFD      BFD ASYNC received - punting to CPU for processing
BFD_NEIGHBOR_DROP                                    Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_LOOP                                                  BFD      BFD ECHO received - punting to CPU for processing
BFD_MULTIHOP                                              BFD      BFD MULTIHOP received - punting to CPU for processing
BFD_MULTIHOP_DROP                                    Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_IPv6_NEIGHBOR                                         BFD      BFD ASYNC received - punting to CPU for processing
BFD_IPv6_NEIGHBOR_DROP                               Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_IPv6_LOOP                                             BFD      BFD ECHO received - punting to CPU for processing
BFD_IPv6_LOOP_DROP                                   Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_REMOTE_PUNT_DISC_0                                    BFD      BFD received for session that must be synchronized with all LC CPUS - multicasting punt to all LC CPUs
BFD_REMOTE_PUNT_DISC_0_DROP                          Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_REMOTE_PUNT_DISC_1                                    BFD      BFD received for session that is running on another LC - punting to CPU on other LC
BFD_REMOTE_PUNT_DISC_1_DROP                          Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_REMOTE_PUNT_DISC_2                                    BFD      BFD received for session that is running on another LC - punting to CPU on other LC
BFD_REMOTE_PUNT_DISC_2_DROP                          Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_REMOTE_PUNT_DISC_3                                    BFD      BFD received for session that is running on another LC - punting to CPU on other LC
BFD_REMOTE_PUNT_DISC_3_DROP                          Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_REMOTE_PUNT_DISC_4                                    BFD      BFD received for session that is running on another LC - punting to CPU on other LC
BFD_REMOTE_PUNT_DISC_4_DROP                          Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_REMOTE_PUNT_DISC_5                                    BFD      BFD received for session that is running on another LC - punting to CPU on other LC
BFD_REMOTE_PUNT_DISC_5_DROP                          Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_REMOTE_PUNT_DISC_6                                    BFD      BFD received for session that is running on another LC - punting to CPU on other LC
BFD_REMOTE_PUNT_DISC_6_DROP                          Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_REMOTE_PUNT_DISC_7                                    BFD      BFD received for session that is running on another LC - punting to CPU on other LC
BFD_REMOTE_PUNT_DISC_7_DROP                          Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
BFD_REMOTE_PUNT_DISC_8                                    BFD      BFD received for session that is running on another LC - punting to CPU on other LC
BFD_REMOTE_PUNT_DISC_8_DROP                          Drop BFD      BFD frames that would normally be punted to CPU but were dropped due to Control Plane Policing. The pps policed limit is aggregated across the NP for all punts of this reason/protocol. (See description of counter without _EXCD for details of the frame being punted)
MODIFY_BFD_TABLE_LOOP_ERROR                          Drop BFD      dropped unexpected BFD packet received over virtual interface or software error
MODIFY_BFD_TABLE_INDEX_ERROR                         Drop BFD      dropped unexpected BFD response - Discriminator does not match what we sent
MODIFY_BFD_TABLE_ENTRY_ERROR                         Drop BFD      dropped unexpected BFD response - Discriminator does not match what we sent
MODIFY_PUNT_NF_MSG                                        Netflow  FYI. Internal Debug. Special handling of buffers for PUNT_NETFLOW
MODIFY_PUNT_NF_IPV4                                       Netflow  FYI. Internal Debug. Special handling of buffers for PUNT_NETFLOW
MODIFY_SEND_TO_INTER_RACK_NP_CNT                          Infra    Internal debug event
MODIFY_NF_PUNT_RFD_PREFETCH_FAIL                          Netflow  FYI. Internal Debug. Special handling of buffers for PUNT_NETFLOW
MODIFY_SIM_ONLY_WRED_MATCH_CNT                            Infra    Internal debug event
MODIFY_SIM_ONLY_Q_PRI                                     Infra    Internal debug event
MODIFY_EFM_PORT_EGR_BLOCK                            Drop EOAM     Ethernet OAM dropped egress frame because port is in blocked/loopback oam mode
MDF_EGR_MiM_SAT_DATA
DBG_LRN_EP_L_ON_DEMAND                                    Infra    Learn machine event - ON-DEMAND MAC learn in Flush and Scan modes
DBG_LRN_REFRESH_ABORT_CNT                                 Infra    Learn machine event - Abort refresh due to queue full
DBG_LRN_ADD_CNT                                           Infra    Learn machine event - added entry
DBG_LRN_DELETE_CNT                                        Infra    Learn machine event - removed entry
DBG_LRN_MAC_CACHE_QUEUE_FULL_CNT                          Infra    Learn machine event - Number of times Scan message needed to wait for room on the queue
DBG_LRN_DEL_MSG_QUEUE_FULL_CNT                            Infra    Learn machine event - Number of times checking whether the message queue is full
LRN_ON_DEMAND_FLUSH_DELETE_ENTRY                          Infra    Learn machine event - Number of mac entries deleted by all on-demand flush requests from the host.
LRN_PERIODIC_AGING_DELETE_ENTRY                           Infra    Learn machine event - Number of mac entries deleted by the aging scan machine due to aging out, or due to a learn key mismatch detected.
LRN_L2FIB_MAC_TBL_FULL                                    Infra    Learn machine event - Counts of missed learns due to mac hash table full.  Only possible at high scale.
VIDMON_LRN_ADD_ABORT_CNT                                  Infra    Learn machine event - Vidmon flow learn operations aborted
VIDMON_LRN_ADD_FAIL_CNT                                   Infra    Learn machine event - Vidmon flow learn operations that failed
VIDMON_MDI_LRN_ADD_FAIL_CNT                               Vidmon   Learn machine event - Vidmon learn
VIDMON_RSV_TIMEOUT                                        Vidmon   Learn machine event - Vidmon learn timeout
VIRTUAL_IF_LAYER2_UCAST_INPUT_CNT                         Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_LAYER2_MCAST_INPUT_CNT                         Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_LAYER2_BCAST_INPUT_CNT                         Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_PROTO_IPV4_MCST_INPUT_CNT                      Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_GENERIC_INPUT_DROP                        Drop Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_PROTO_IPV6_MCST_INPUT_CNT                      Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_PROTO_MPLS_INPUT_CNT                           Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_PROTO_IPV4_UCST_INPUT_CNT                      Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_PROTO_IPV6_UCST_INPUT_CNT                      Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_LAYER2_BCAST_EXCD_DROP_CNT                Drop Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_LAYER2_MCAST_EXCD_DROP_CNT                Drop Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_LAYER2_UNK_UCAST_EXCD_DROP_CNT            Drop Infra    Dummy interface accounting for certain internal loopback servicing of frames
VIRTUAL_IF_GENERIC_UNK_PROT_DROP_CNT                 Drop Infra    Dummy interface accounting for certain internal loopback servicing of frames

Fred Cuiller

Network Consulting Engineer @ Cisco

Carlos A. Silva
Level 3
Level 3

Hi, Xander:

 

Hope you're doing well. I'm hoping you can help me with the following, I have a router that's showing this output constantly:

show drops all ongoing location 0/3/CPU0

[np:NP0] RSV_DROP_IPM4_NO_OLIST_REP: +3556646
[np:NP0] RSV_DROP_IPM4_MVPN_RPF_NOT_MASTER: +362961

 

I'm aware of this:

RSV_DROP_L2MC_NO_OLIST_REP Drop MCAST Egress L2 multicast frames dropped due to having no output interfaces on this NP
RSV_DROP_L2MC_NO_OLIST Drop MCAST Egress L2 multicast frames dropped as there is no OLE matach
RSV_DROP_IPM4_NO_OLIST_REP Drop MCAST Egress IPv4 multicast packets dropped due to not having any output interfaces on this NP
RSV_DROP_IPM4_NO_OLIST Drop MCAST Egress IPv4 multicast packets dropped as there is no OLE match
RSV_DROP_IPM4_NO_ENCAP_OLIST Drop MCAST Egress MVPN encap packets with no encapsulation output list entries
RSV_DROP_IPM6_NO_OLIST_REP Drop MCAST Egress IPv6 multicast packets dropped due to not having any output interfaces on this NP
RSV_DROP_IPM6_NO_OLIST Drop MCAST Egress IPv6 multicast packets dropped as there is no OLE match

 

But, it's really had for me to interpret. 

Since my customer, apparently, has no alarms, I'm assuming that these counters, while not ideal, are "normal". Can you please explain these two counters a little more?

 

Thanks!

c.

 

 

Johnson Li
Cisco Employee
Cisco Employee

Hi, Xander

 

Our customer's A9K-24X10GE-TR had a reset issue due to parity error, after reset, they found there are some NP drop counters observed.

One of the counter is RSV_DROP_NHINDEX

I found there is no explanation about this count, may I know what is it mean with RSV? It is not likely to be received...

 

Thanks for taking the time.

Johnson.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Quick Links