We have four Nexus 7Ks connected as a core network with vPC redundancy between all four. Two of the 7Ks are connected to a 6513. The 6513 was the spanning-tree root for the network. Power to the 6513 was cut. Approximately 8 ports between the 7Ks went UDLD err-disabled. I found information on a Nexus 7K best practices guide which states:
UDLD is processed directly by the NEXUS 7000 SUPERVISOR CPU. It is not hardware off-loaded down to individual line cards. In case the CPU gets overloaded, UDLD messages may not be processed or sent, which can lead to an error-disable situation if UDLD is set to aggressive mode. To prevent such false positive situation, recommendation is to use UDLD in normal mode.
I was wondering if this would be the explanation for the UDLD err-disabled state of the ports in this example?
If UDLD was enabled in aggressive mode on the ports then going into err-disabled would be expected behavior. The Nexus did not receive UDLD packets from the neighbor and determined that something is wrong with the link.
Just shut and no-shut the ports to bring them back up after the 6513s are back online.
Symptom: High cpu on pktmgr process (mts-data thread) and consequently drop of ARP packet and slow or no responses for ARP request. This affecting data path traffic as well as remote ARP entries will start time out on local devices, hence traffic will not be sent due to incomplete ARP.
Conditions: This can happen when OTV unicast mode is used and there is constant rate or constant burst rate of broadcast ARP traffic send from remote sites to ADJ server (approx 1000 arp request per second)
Workaround: Disable arp suppression by configuring in overlay interface "no otv suppress-arp-nd"
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...