Strange behavior on CE500 when port changes to forwarding
The attachment illustrates a example network topology that can be used to demonstrate an issue that we have noticed with the CE500 switch. In this example PC1 and PC2 are exchanging data using a proprietary protocol riding on 802.3. PC3 is just monitoring network traffic, which consists of spanning tree packets and a intermittent broadcast that is sent out by PC1. All ports are set to Smartport Role=Other.
A loop is added between 2 ports. In this example there is no reason to have a loop here, but in our real network this loop represents a chain of devices with a redundant path for data in the event of a link failure. Immediately after this loop is formed both port lights are Orange while the spanning tree state is figured out. Eventually, one of these ports transitions from orange to green (spanning tree state Learning->Forwarding). It is at this moment that the network exhibits strange behavior lasting for approximately 1 second.
It appears that during this time the mac address table of the switch is getting cleared (or ignored). The traffic that would normally exist between PC1 and PC2 can be seen at PC3. An even more interesting observation is that sometimes packets sent from PC2 to PC1 end up back a PC2 during this time.
We have tried other brands of switches and do not see this specific behavior.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...