Hi WDNJSQ,
For the 01DEFD/6/CPCAR_DROP_MPU(l)[3]: Rate of packets to CPU exceeded the CPCAR limit on the MPU. (Protocol=snmp, CIR/CBS=128/24064, ExceededPacketCount=3), control the rate of packets delivered to the CPU within the CPCAR limit, or run the car packet-type packet-type cir cir-value [ cbs cbs-value ] command to configure a proper CPCAR limit.
You will find more details about the command here.
https://support.huawei.com/hedex/hdx.do?docid=EDOC1100126530&id=EN-US_CLIREF_0177117962&lang=en
For the 01DEFD/6/CPCAR_DROP_LPU(l)[2]: Rate of packets to cpu exceeded the CPCAR limit on the LPU in slot 0. (Protocol=snmp, CIR/CBS=128/24064, ExceededPacketCount=12):
1. Run the auto-defend enable command to configure attack source tracing. If a possible attack source is detected, check on the network to determine whether it is a real attack source.
2. If a real attack source exists, run the blacklist command to add the attack source to the blacklist or run the auto-defend action command to configure a punish action for the attack source. If no attack source exists, run the car command to increase the CPCAR value properly.
I hope it helps!