%ACLMGR-4-UNLOADING: Unloading PACL input label 18 Gi0/1 IPv6 feature
platform assert failure: !label_info->ipsg_vmrs: ../src-hulc/src-common/hacl_pacl.c: 803: hacl_pacl_add_ipsg_to_portlabel
-Traceback= 6F4874z 32902B0z 306C9F4z 3078900z 3078B74z 3079BF0z 3270890z 3270B58z 370C1E8z 3708568z
Gi0/1 Port config:
interface GigabitEthernet0/1
description WIRELESS AP
switchport trunk allowed vlan 8-15
switchport trunk encapsulation dot1q
switchport trunk native vlan 1000
switchport mode trunk
switchport nonegotiate
switchport port-security maximum 100
switchport port-security violation restrict
switchport port-security aging time 5
switchport port-security aging type inactivity
switchport port-security
ip device tracking maximum 100
ip arp inspection limit rate 2000
load-interval 30
ipv6 source-guard
storm-control broadcast level pps 10k
storm-control multicast level pps 10k
no vtp
spanning-tree portfast edge trunk
spanning-tree bpduguard enable
ip verify source
end
I'm thinking that the ipv6 source-guard without an explicit policy may have caused this.