Could you tell us more about your topology and configuration? With the information you have given, we can only guess.
I would be looking at whether this is a trunk, and the native VLAN is different at each end of the link. Or whether it is receiving BPDUs for a VLAN that is not configured on the switch. (Normally it would drop thise silently.)
Or whether this is a private VLAN that has not been declared on this switch.
There are a couple of points that disturb me here. One is that according to your original posting, the port getting blocked is F0/1, and not F0/19 we have here.
The second is that 2924-F0/19 is an access port on VLAN 14, while 2950-F0/17 is an access port on VLAN 1. If you are using PVST, that seems to a recipe for an inconsistent Spanning-Tree, especially if these switches are joined by some other path as well (perhaps via F0/1 ?). The risk is compounded by the portfast.
Perhaps we could have a glimpse of your overall topology.
let me clarify more we have wireless link between two switches and getting two ethernets from wireless, at Side A we have 2950, Eth0 of wireless is terminated on fa0/19, Eth1 of wireless is on Fa0/17, fa0/19 is in trunk mode whereas fa0/17 is access on vlan 1 and at Side B we have two switches 2950 and 2924, trunck port(fa0/19) of side A is terminated on 2950 at side B on fa0/21 with mode trunck, and access port (fa0/17) of Side A is terminated on 2924 at side B on fa0/19 with access port on vlan 14. we do not have any connectivity between 2950 and 2924 at side B, which may causes inconsistency..
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...