03-12-2019 04:11 AM
hi all,
keep on getting this error when i plug in a cable into my cisco 4510 to another cisco 3850 switch
i have untagged it ie made it into an access on both switch ends on vlan 250
*Mar 12 10:51:17.586: %SPANTREE-7-RECV_1Q_NON_TRUNK: Received 802.1Q BPDU on non trunk GigabitEthernet1/1 VLAN250.
*Mar 12 10:51:17.586: %SPANTREE-7-BLOCK_PORT_TYPE: Blocking GigabitEthernet1/1 on VLAN0250. Inconsistent port type.
Switch#
cheers,
rob
Solved! Go to Solution.
03-12-2019 08:49 AM - edited 03-12-2019 08:53 AM
Hello,
try it:
remove this: switchport port-security mac-address sticky
add this command on both switches: spanning-tree bpdufilter disable
and shutdown and no shutdown on these interfaces that link these switches.
03-12-2019 08:54 AM
03-12-2019 04:28 AM
03-12-2019 04:39 AM
BPDUGuard is likely enabled on at least one of these ports. Try manually disabling on both and test again.
"Show spanning-tree int XXXX detail" should show if this is enabled or not.
03-12-2019 05:28 AM
Hello,
When you input port as access, it sounds like a end devices like desktop, laptop and etc. When you plugg a switch on this port, news bpud are generated to looking for a root bridge on the topology. If you need use it as access mode, you need disable the BPUD Guard on this port.
spanning-tree bpduguard disable
check it, i hope that you will understand better: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3560/software/release/12-2_55_se/configuration/guide/3560_scg/swstpopt.html
Regards
03-12-2019 06:09 AM
thanks all
what about portfast, do i need to disable that aswell?
03-12-2019 06:15 AM - edited 03-12-2019 06:16 AM
Portfast shouldnt used on a switch to switch link.
As it effectively brings up a port as soon as an end device is detected it allows loops to form if used on a switch to switch link and makes STP redundant.
So to answer your question, yes disable portfast.
03-12-2019 06:26 AM
03-12-2019 07:41 AM
do i need to do this aswell
spanning-tree link-type point-to-point
03-12-2019 07:52 AM
03-12-2019 08:33 AM
ok this config is the 4510
vlan 10,110,130,170,240,250
interface GigabitEthernet1/1
switchport access vlan 250
switchport mode access
spanning-tree portfast disable
spanning-tree bpduguard disable
spanning-tree link-type point-to-point
interface Vlan250
ip address 10.110.250.19 255.255.255.0
!
ip default-gateway 10.110.250.1
ip forward-protocol nd
no ip http server
no ip http secure-server
exactly the same on the other switch apart from the ip of the other switch is 10.110.250.1 ie its the other switch as the other switch is every vlans gateway for all the vlans we have here
03-12-2019 08:38 AM
03-12-2019 08:45 AM - edited 03-12-2019 08:49 AM
this is the other switches port config -
interface GigabitEthernet1/0/1
switchport access vlan 250
switchport mode access
switchport nonegotiate
switchport voice vlan 35
switchport port-security mac-address sticky
trust device cisco-phone
auto qos voip cisco-phone
spanning-tree portfast disable
spanning-tree bpduguard disable
spanning-tree link-type point-to-point
service-policy input AutoQos-4.0-CiscoPhone-Input-Policy
service-policy output AutoQos-4.0-Output-Policy
im thinking of doing a #default interface G1/0/1
as its still not working
03-12-2019 08:49 AM - edited 03-12-2019 08:53 AM
Hello,
try it:
remove this: switchport port-security mac-address sticky
add this command on both switches: spanning-tree bpdufilter disable
and shutdown and no shutdown on these interfaces that link these switches.
03-12-2019 09:03 AM
sorted it -
i did a #default int g1/0/1
and started to configure the port again
03-12-2019 08:54 AM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide