ERS 86/8800: mac not learned due to bad SFP


Doc ID    SOLN223632
Version:    3.0
Status:    Published
Published date:    11 May 2015
Created Date:    17 Mar 2013
Author:   
Ahmed Pasha Syed
 

Details

During the issue it was found switch was not learning the MAC address on specific port on 8600 which was connected to Server on fiber media.

Problem Clarification

 

During the issue it was found switch was not learning the MAC address on specific port on 8600 which was connected to Server on fiber media.
Verified all below data:
#config Ethernet 2/45 state disable
#config Ethernet 2/45 state enable
#config Ethernet 2/45 and then type info
show port info show-all
show port error all
 
Flow-Control, Interface was shown as full duplex, speed 1 gig. No port errors, no FCS errors.

Cause

Faulty SFP on the other device (server in this setup).

Solution

 

After replacing the SFP on the server MAC learning issue got resolved.

Restricted Solutions Elements

Below commands can be used to troubleshoot such issue:

For dumpPortState command:

 

For slot 1 64 ( port 1 is 0 through thro port 48 which 47) you need to add 64+0 for port 1 64+47 for port 48 assuming it is a 48port GTRS.

For slot 2 128

For slot 3 192

For Slot 4 256

For Slot 7 448

For Slot 8 512

For Slot 9 576

For Slot 10 640

 

An example from my lab run for an 8648 gtrs port 1/1:

 

-> dumpPortState(64)

Up         : 1

plsbPort: 0

 size of port_state table = 1272

value = 34 = 0x22 = '"'

->

 

-              From the CLI prompt enter priv and then shell mode : 

o             Priv  (enter priv password)

o             Shell (enter shell password)

-              Once in CP shell, enter the following commands to dump port info for the affected ports:

-> psDump(port_number)   where port_number = (slot * 64)  + (relative_port_number - 1) 

 

For example, for port 3/5 port_number = (3*64)+(5-1) = 196

 

->psDump(196)

**** PortState Generic Info ****

 

Configurable :     1

Present      :     1

AdminStatus  :     1

AutoNegotiate:     1                  Auto-neg enabled

AutoNegoAd   :     0

AdminDuplex  :     1

AdminSpeed   :     1

Qos          :     1

Up           :     1              This port operational state  is up

cplimit_shut :     0

HighSecure   :     0

BackupUp     :     0

RightIsActive:     0

FullDuplex   :     1                         Full duplex

OperSpeed    :     2              100 MB

IsTesting    :     0

Type         :     35

NumofLinkups :     0

AdminRouting :     1

OperRouting  :     0

CleanUpInProgress: 0

IPv4InPortAclId:   4096

IPv4OutPortAclId:  4096

IPv6InPortAclId:   4096

IPv6OutPortAclId:  4096

mcast rate limit:  ffffffff

bcast rate limit:  ffffffff

egress rate limit: ffffffff

802-1p override:   0

rsvd:              0

flow-control:      0

fc-pause-time:     ffff

fc-pause0:         1

Sffd:     0

loopdet_shut :  0

ExtCplmit    :  1

Util Rate    :  50

ExtCplimitShutDown :  0

SlppShutDown :  0

BrouterVrf   :     0

Wan-Mode     :  0

Framing      :  0

ClockSource  :  0

smlt_down    :  0

admin_disable: 0

card_reset   : 0

ManchesErr   : 0

OperStatus   : 0

DdmStatus    : 0

PosStatus    : 0

SkipSlppChecking: 0

AdminIp6Routing:         1

OperIp6Routing:          0

NeedProtoCleanup:        0

Reason:                  0

Port Time:               01/25/12 22:15:45

Pcap:                    0

Mode:                    2

MrouteStrLimit:          1984

MrouteStrLimitTmrCheck:  10

MrouteStrCount:          0

MrouteStrTimerCount:     10

MrouteStrLimitEnable:    2

IngressRateLimit:        16777215

HashPloynomial coeff     1997

HashPloynomial seed      0

hashKeyId:               1

flushFlags:              0

ipfixPortState:          2

samplingRate:            1

value = 27 = 0x1b

 

You can also dump the port operational state only using the following command:

->dumpPortState 196

Up         : 1

plsbPort: 0

size of port_state table = 1272

value = 34 = 0x22 = '"'

->

 

 

-              From the CLI prompt enter priv and then shell mode : 

o             Priv  (enter priv password)

o             Shell (enter shell password)

-              Once in CP shell, enter the following commands to dump port info for the affected ports:

-> psDump(port_number)   where port_number = (slot * 64)  + (relative_port_number - 1) 

 

For example, for port 3/5 port_number = (3*64)+(5-1) = 196

 

 


Avaya -- Proprietary. Use pursuant to the terms of your signed agreement or Avaya policy