[c-nsp] protecting router MAC addresses
lee.e.rian at census.gov
lee.e.rian at census.gov
Wed Oct 13 07:04:12 EDT 2004
> > We've had a couple of times recently where Cisco IP phones
daisy-chained
> > together get into a state where they echo frames back to the switch.
Once
> > that happens the switch learns the router MAC address on the user port
&
> > traffic meant for the router is black-holed. It finally happened on a
> > switch running 5.x code & we got a lot of these syslog messages
>
> Isn't this is sort of a problem that spanning tree is designed to
solve?
> Enabling spanning tree or bpduguard on your access ports should solve the
> problem I think... if I understood well what you meant by "daisy chained"
IP
> phones...
We do have spanning tree enabled on all vlans. We don't have bpduguard
enabled & that sounds like something worth doing. But I don't know if
enabling bpduguard would prevent the problem or not - we haven't been able
to recreate the problem. By "daisy chained" I mean
switch == phone == phone == phone
so spanning tree shouldn't make any difference since there's no loop
Thanks,
Lee
More information about the cisco-nsp
mailing list