01-19-2018 04:07 AM - edited 03-08-2019 01:28 PM
Hi,
We have a Nexus 7000
Software
BIOS: version 3.1.0
kickstart: version 6.2(16)
system: version 6.2(16)
BIOS compile time: 02/27/2013
kickstart image file is: bootflash:///n7700_s2_kickstart.6.2.16.bin
kickstart compile time: 1/27/2016 9:00:00 [04/05/2016 21:11:19]
system image file is: bootflash:///n7700_s2_dk9.6.2.16.bin
system compile time: 1/27/2016 9:00:00 [04/05/2016 22:15:44]
Hardware
cisco Nexus7700 C7706 (6 Slot) Chassis ("Supervisor Module-2")
Intel(R) Xeon(R) CPU with 32745060 kB of memory.
Processor Board ID JAE184403VZ
We recently connected a switch to port e1/48. The uplink is set as a trunk at both ends, all devices on the switch are in vlan 10, however the config on the nexus was as follows:
interface Ethernet1/48
description link-id-10
switchport
switchport mode trunk
no shutdown
so no specific switchport trunk allowed vlan.... command.
The link came up and we were able to ping devices on the switch. Then 5 minutes later we noticed the pings dropping 100%. #show cdp neighbor showed the switch at the other end but #show int trunk showed that there were no vlans allowed for int e1/48. I then did a #show run int e1/48:
interface Ethernet1/48
description link-id-10
switchport
switchport mode trunk
switchport trunk allowed vlan none
no shutdown
I then specifically added vlan 10 to the interface trunk, shut, no shut, but the layer 2 link wouldnt come back up and we had to back out of the change (this is a live environment). There were no logs for this either. I know it is best practice to specifically state what vlans are allowed, normally we do, but what would cause the link to come up and work only for it to then stop working a few minutes later?
Many thanks,
P
01-19-2018 04:24 AM
Hi,
To my best knowledge, there is no automatic component of NX-OS that would, based on its own decision or whims, add the switchport trunk allowed vlan none to an interface.
Is it possible to revisit the show accounting log output? Personally, I would check very carefully whether the switchport trunk allowed vlan none is mentioned there, and if so, what was the user ID with which this command was added.
Also, have there been any logs, no matter how apparently insignificant, recorded in show logging log around the time of configuring the interface, and the unexpected addition of that command?
Best regards,
Peter
01-19-2018 04:50 AM
Thank you, the last config changes that were made to that port (before we patched into it today) was a month ago and were
Fri Dec 15 14:28:32 2017 interface Ethernet1/48 ; no switchport (REDIRECT)
Fri Dec 15 14:28:32 2017 interface Ethernet1/48 ; no switchport (SUCCESS)
Fri Dec 15 14:28:43 2017 interface Ethernet1/48 ; switchport (REDIRECT)
Fri Dec 15 14:28:43 2017 interface Ethernet1/48 ; switchport (SUCCESS)
Fri Dec 15 14:28:47 2017 interface Ethernet1/48 ; switchport mode trunk (REDIRECT)
Fri Dec 15 14:28:47 2017 interface Ethernet1/48 ; switchport mode trunk (SUCCESS)
Fri Dec 15 14:28:57 2017 interface Ethernet1/48 ; switchport trunk allowed vlan add 10 (REDIRECT)
Fri Dec 15 14:28:57 2017 interface Ethernet1/48 ; switchport trunk allowed vlan add 10 (SUCCESS)
So when we patched into it there was actually a command saying allow vlan add 10 (although the running config didnt show it). No one has added a command switchport trunk allowed vlan none at any point. It seems the Nexus has added it between us patching the fibre in and the pings then dropping (the only two people who can log into the Nexus are myself and a colleague who was sat next to me, both scratching our heads).
If a trunk is being set up from scratch, like above, should the command initially be switchport trunk allowed vlan 10 and not switchport trunk allowed vlan add 10? Possibly it hasnt liked that? Although I cant believe Cisco would have not fixed that years ago.
Many thanks,
P
01-19-2018 05:07 AM
Hello,
Thank you for the clarification!
The effect of configuring switchport trunk allowed vlan add 10 on a trunk that already has all VLANs allowed is that the configuration does not change at all: You only allow a VLAN that is already allowed, so effectively there is no change at all. Configuring it would not cause any harm, and it is also expected that under the circumstances, this command would not show in the interface configuration as it implicitly (by means of all VLANs allowed) already there.
This is getting interesting. By any chance, do you have a config-sync configured between this switch and a peer N7K?
Also, you said that after you noticed the "allowed vlan none" command added, you tried to "specifically added vlan 10 to the interface trunk, shut, no shut, but the layer 2 link wouldnt come back up ". What does this mean exactly? Can you elaborate on this?
Thank you!
Best regards,
Peter
01-19-2018 06:45 AM
Hi Peter,
Excitement over I think, you were right about checking what config had been entered.
Am I right?
I can then see that after reconfiguring the port to allow vlan 10, I bounced the interface for good measure, between me re-enabling the interface and us backing out of the change was 38 seconds. That should have been long enough for a 1Gbps link to start passing traffic again(?) but pings were still dropping, downtime had been 8 minutes so we couldnt really hold on any longer. I wonder if we had left it for 60sec it would have sorted itself out.
01-19-2018 08:17 AM
Hello,
You're spot on: Under NX-OS for N7K, removing the whole switchport trunk allowed vlan vlan-list command using the no keyword will result in the switch disabling ALL VLANs on the trunk, and understandably placing the switchport trunk allowed vlan none into the port's configuration. This is different from IOS behavior on Catalyst switches, and also from other Nexus platforms, such as N9K.
Then a few minutes later my colleague tried to tidy up the trunk with [switchport trunk allowed vlan 10]. Firstly this wasnt needed, secondly it had the effect that the link stopped working - that I cant explain, should adding vlan 10 to a trunk that already has vlan 10 added cause an issue?
To VLAN 10, there should have been no perceptible change whatsoever. Understandably, however, all other VLANs would become blackholed on this trunk. Was the connectivity truly provided in VLAN10 - could that have been a different VLAN that got pruned off this trunk as a result of the added command?
I also wonder if STP could have had anything to do with this. What kind of STP are you running - is it Rapid-PVST+, or is it MST?
With devices now not pingable he has tried to back out with no switchport trunk allowed vlan 10
Right - and that would have caused the switch to take the unexpected action and disable all VLANs on the trunk. I have just now tested the behavior on a N7K running 7.2(2)D1(2) and I can 100% confirm the behavior: Removing the whole switchport trunk allowed vlan vlan-list command with the no keyword is equivalent to configuring switchport trunk allowed vlan none. I can also confirm that a N9K NX-OS 7.0(3)I7(1) behaves in the expected way - it reverts back to allowing all VLANs. Definitely a quirk of the N7K NX-OS in particular.
I can then see that after reconfiguring the port to allow vlan 10, I bounced the interface for good measure, between me re-enabling the interface and us backing out of the change was 38 seconds. That should have been long enough for a 1Gbps link to start passing traffic again(?) but pings were still dropping, downtime had been 8 minutes so we couldnt really hold on any longer. I wonder if we had left it for 60sec it would have sorted itself out.
There seems to be something else going on. 38 seconds would be enough for the link to become forwarding in STP even if STP had to go through the full Discarding->Learning->Forwarding sequence (that would take 30 seconds if you are running on default STP timers). I wonder if the logs on the device attached to e1/48 could shed some more light to this mystery.
Let me ask a set of questions:
Thank you!
Best regards,
Peter
01-19-2018 08:59 AM
Hi Peter,
Finally there are no logs on the remote switch for this work and no logs on the nexus for any vlan issues.
I appreciate your help with this,
Paddy
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: