I have a 3524 switch with the default management VLAN1 configured on it. All switch ports belong to VLAN1. When sniffing traffic in promiscuous mode on my laptop, I can see unicast traffic destined for PCs and servers other than my laptop. Because all switch ports belong to the same VLAN, my switch is in effect a repeater since it is flooding all packets out all interfaces. When I called the TAC about this, I was told that the only way to cure this is to assign each switch port to its own VLAN. Does anyone have to do this? It seems a bit counter-intuitive since the purpose of a switch in the first place is to be a "smarter" device than a hub and only forward traffic out the necessary ports to save on network efficiency and bandwidth. Any thoughts?
Question We run asr9001 with XR 6.1.3, and we have a very long delay to
login w/ SSH 1 or 2 to the device compare to IOS device. After
investigation, the there is 1s delay between the client KEXDH_INIT and
the server (XR) KEXDH_REPLY. After debug ssh serv...
Introduction The purpose of this document is to demonstrate the Open
Shortest Path First (OSPF) behavior when the V-bit (Virtual-link bit) is
present in a non-backbone area. The V-bit is signaled in Type-1 LSA only
if the router is the endpoint of one or ...
Hi, I am seeing quite a few issues with patch install and wanted to
share my experience and workaround to this. Login to admin via CLI, then
access root with the “shell” command Issue “df –h” and you’ll probably
see the following directory full or nearly ...