I have several vlans, lets call them isolated vlans, that are assigned to switchports over several switches. The switches are tied together with 1Q trunks. The isolated vlans do not have router interfaces (SVIs) associated with them.
I also have several "regular vlans" complete with router interfaces.
It appears that some traffic is leaking from the regular vlans to the isolated vlans. It appears to be mainly broadcast traffic.
Should there be *ANY* way that traffic from another vlan can leak into an isolated vlan?
I agree with Ankur - the most likely explanation is that someone has cross-connected two ports. Or joined them with a bridge, e.g. an XP PC with two NICs and bridging enabled.
It is the "mostly broadcasts" that gives us a clue here. If you silently monitor a switchport, what do you normally see? Mostly broadcasts, and perhaps a few rare flooded unicasts.
One way you can prevent this is to enable bpdu-guard on all your access ports. Then if someone cross-connects two switch ports they will get disabled and you will see the trace on the syslog. It might not catch the XP bridge case though ... can anyone confirm that?
Easy way to track what is happening would be by sniffing out the traffic, and looking at the source MAC address. Then you can use "show mac-address-table address aaaa.bbbb.cccc" command to trace where the source is located. This would give you a clue where the interconnect might be.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...