No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

switchS5300HI/S5320EI(all version)mac address flapping

Publication Date:  2018-02-01 Views:  128 Downloads:  0
Issue Description

Version information

S5300HI: V200R005C00SPC500

             Patch: V200R005SPH017

S5320EI: V200R008C00SPC500

             Patch: V200R008SPH015

networking overview

customer network MAC address flapping, we can find this flapping source device, However, this device is not a customer's device, it is a customer's customer device and can not be operated.


network topology






Alarm Information


Handling Process

see attached

Solution

The MAC address anti-flapping test results of the S5300HI and S5320EI are as follows:

1.       In Layer 2 forwarding scenarios, if loops exist on the downlinks, the MAC address of the uplink interface will be learned by the downlink interfaces, and a MAC address flapping alarm will be generated on the switch. After the mac-learning priority 1 command is configured on the uplink interface, if loops exist on the downlink, the MAC address of the uplink interface will not be learned by the downlink interfaces, and no MAC address flapping alarm is generated on the switch.

2.       In QinQ scenarios, if loops exist on the downlinks, the MAC address of the uplink interface will be learned by the downlink interfaces, and a MAC address flapping alarm will be generated on the switch. After the mac-learning priority 1 command is configured on the uplink interface, if loops exist on the downlink, the MAC address of the uplink interface will not be learned by the downlink interfaces, and no MAC address flapping alarm is generated on the switch.


END