We are trying to setup 2 Nokia FWs in a High Availibility setup. Active/standby is are setup. When the active fails we are hoping for a stateful failover to the standby FW. Instead we are getting the following messages on the switch.
2006 Nov 26 11:44:36 %SYS-4-P2_WARN: 1/Host 00:00:5e:00:01:65 is flapping betwee
n port 5/36 and port 5/37.
Do I need to do anything to the port configuration to get this to work?
This message indicates that your Catalyst 4000 switch has learned a MAC address 00:00:5e:00:01:65 that already exists in its CAM table on a port other than the original one, which means that this host is dually attached to the switch.
What you can to track down how this MAC address was learned from both ports.
Step 1: Consider port the first port. Issue the show cam dynamic [port] command. If you see the MAC address 00:00:5e:00:01:65 coming
out in the list of the MAC addresses learned on this port, try to see if this is a single host that is connected or if there are multiple hosts registered on that port.
Step 2: If it is a single host that is connected, check the other port that is registered and see if the host is dually attached to the switch. If however, the host has connections to other devices that can eventually lead back into this switch, try to track down the intermediate devices that are in between.
The best way to achieve this (assuming that they are Cisco devices) is to use the
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...