11-29-2022 06:56 PM
Hello everybody,
I've issues. Cisco switch can't detection loop from repeater wifi device although I turned STP, Loopback Detection, Storm Control but it not working. Someone can help me ?
11-29-2022 11:08 PM
- The network doesn't have any looping segments at first glance (and or is loop-free), how is this observed ?
M.
11-29-2022 11:35 PM
I intentionally made a loop at Repeater wifi device and cisco switch can't detection that.
11-30-2022 01:06 AM
>...and cisco switch can't detection that.
That depends , and or meaning it depends on the global switch configuration and the configuration of the port the access point is on (for instance). Also access point and repeater could have incorrect configuration directives.
M.
11-30-2022 02:26 AM
Do mean that the cisco switch does not understand the LOOP PACKAGE from the wifi device? Do I need to configure both the cisco switch and the wifi device, right?
11-30-2022 04:16 AM
- What do you mean by 'loop package' ? Can you show an example of such a package ? Also check and or show logs from the switch when the loop is observed.
M.
11-30-2022 05:28 AM
So, your "Repeater device" is what kind of device actually? Is it a wireless router/bridge with an integrated switch? And you used a network cable to bridge two ports of that integrated switch? If so, THERE needs to be the loop detection of any sort (STP/RSTP …).
11-30-2022 06:08 AM
That right!
as I said above. I used STP, Loopback Detection, Storm Control on Cisco Switch but it doesn't working. You have new idea ?
11-30-2022 09:41 AM
- Provide logs from switch , access point and repeater (if possible)
M.
11-30-2022 08:20 PM
This is cisco switch log:
File Logging: Level debug. File Messages: 53 Logged, 53 Dropped.
01-Dec-2022 11:18:22 %COPY-I-FILECPY: Files Copy - source URL flash://logging destination URL HTTP://172.16.1.106/
01-Dec-2022 11:17:53 %AAA-I-CONNECT: New http connection for user cisco, source 172.16.1.106 destination 172.16.0.215 ACCEPTED
01-Dec-2022 11:17:31 %UDLD-E-MALFORMED_TLV: UDLD message from cached with illegal tlv. UDLD parsing error: errorIllegalChecksum. mac 144d67cd49f8 , aggregated (3643)
01-Dec-2022 11:17:11 %UDLD-E-MALFORMED_TLV: UDLD message from cached with illegal tlv. UDLD parsing error: errorIllegalChecksum. mac 144d67cd49f8
01-Dec-2022 11:17:11 %AAA-I-DISCONNECT: http connection for user cisco, source 172.16.1.106 destination 172.16.0.215 TERMINATED
01-Dec-2022 11:17:11 %UDLD-E-MALFORMED_TLV: UDLD message from cached with illegal tlv. UDLD parsing error: errorIllegalChecksum. mac 144d67cd49f8 , aggregated (12618)
01-Dec-2022 11:12:49 %UDLD-E-MALFORMED_TLV: UDLD message from cached with illegal tlv. UDLD parsing error: errorIllegalChecksum. mac 144d67cd49f8
01-Dec-2022 11:12:49 %UDLD-E-MALFORMED_TLV: UDLD message from cached with illegal tlv. UDLD parsing error: errorIllegalChecksum. mac 144d67cd49f8 , aggregated (8827)
01-Dec-2022 11:07:49 %UDLD-E-MALFORMED_TLV: UDLD message from cached with illegal tlv. UDLD parsing error: errorIllegalChecksum. mac 144d67cd49f8
01-Dec-2022 11:07:09 %COPY-N-TRAP: The copy operation was completed successfully, aggregated (1)
01-Dec-2022 11:07:09 %COPY-I-FILECPY: Files Copy - source URL flash://logging destination URL HTTP://172.16.1.106/
01-Dec-2022 11:04:23 %COPY-N-TRAP: The copy operation was completed successfully
01-Dec-2022 11:04:19 %COPY-I-FILECPY: Files Copy - source URL running-config destination URL flash://startup-config
01-Dec-2022 11:04:13 %SYSLOG-N-LOGGINGFILE: configure file logging level to 7.
11-30-2022 09:10 PM
I would start by checking whether the UDLD is enabled on the AP facing ports, if yes I would disable them first. Then I would check whether the switch CPU/memory utilization is high, if yes please take an output of show tech from the switch and open a TAC case for further analysis, you may also analyze the output via Cisco CLI Analyzer application.
I would also recommend that you run the latest Cisco TAC recommended code in the switch.
Recommended Releases for Catalyst 9200/9300/9400/9500/9600 and Catalyst 3650/3850 Platforms - Cisco
You have also not mentioned how the Mesh AP facing switchports are configured (Trunk or Access) This is somewhat mandatory if you want us to provide recommendations. It would be great if you can past the switchport configuration from both sides and tell us how the mesh link is configured (to carry dot1q or no)
11-30-2022 01:00 PM
Yes, you said you enabled STP on the cisco switch (red arrow).
But if I understand you right, there's also some kind of integrated(?) switch on the repeater device (green arrow). Is that correct? If so, I'm suspecting you need to enable STP there as well.
11-30-2022 11:31 PM
Thank for your idea, but if Repeater wifi is attacker.
In my case, wifi device and repeater wifi device haven't stp or something method prevent it.
11-30-2022 01:54 PM
take a look at Cisco WGB or Cisco Mesh P2P guides for how this should be configured
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: