catalist Posted November 15, 2017 · Report post Добрый день! Имеется вот такая проблема: CPU Resources CPU utilization: Module 5 seconds 1 minute 5 minutes 5 RP 0% / 0% 1% 1% 5 SP 4% / 0% 5% 5% 6 RP 9% / 2% 7% 8% 6 SP 99% / 53% 99% 99% 7 26% / 3% 24% 24% 8 12% / 0% 12% 12% Видно что у активного модуля 6 switch процессор (SP) загружен на 100%, собственно вопрос как узнать чем? делаем вот такую команду: C6509V-I#remote command switch sh proc cpu sort CPU utilization for five seconds: 99%/48%; one minute: 99%; five minutes: 99% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 118 146844 8463615 17 100.00% 50.99% 47.18% 0 Heartbeat Proces 381 20186908 2133577 9461 20.69% 23.01% 23.81% 0 mls-mld Process 320 236644140 140929226 1679 13.29% 13.90% 13.82% 0 Spanning Tree 131 577422601025912522 56 1.19% 1.17% 1.16% 0 slcp process 399 3667868 1070206 3427 1.03% 0.49% 0.46% 0 Env Poll 402 1857536 14338833 129 0.39% 0.28% 0.12% 0 C6K PROCMIB SP P 374 21764924 83053796 262 0.31% 0.19% 0.16% 0 mls-gc Process 444 1436612 9013996 159 0.23% 0.22% 0.23% 0 VLAN Manager 343 7630800 27071183 281 0.23% 0.07% 0.08% 0 QoS SP Process 331 977296 76230596 12 0.23% 0.09% 0.07% 0 Mcast Hw Agent6 481 304 459 662 0.15% 0.04% 0.01% 0 RPC stp_switch_a 561 220276 2161490 101 0.15% 0.08% 0.08% 0 DiagCard9/-1 108 3570860 10232594 348 0.15% 0.15% 0.11% 0 Compute load avg 559 454660 3871450 117 0.07% 0.13% 0.13% 0 DiagCard7/-1 322 301720 83207413 3 0.07% 0.07% 0.07% 0 UDLD 555 127488 1106433 115 0.07% 0.03% 0.00% 0 DiagCard2/-1 560 451496 3876858 116 0.07% 0.13% 0.13% 0 DiagCard8/-1 150 360 931 386 0.07% 0.00% 0.00% 0 RFS server proce 540 226028 13386633 16 0.07% 0.02% 0.01% 0 SCP async: LCP#6 443 386284 94249479 4 0.07% 0.05% 0.05% 0 PM Callback 375 9712 834786 11 0.07% 0.00% 0.00% 0 MLTL Agent 554 99856 830984 120 0.07% 0.02% 0.00% 0 DiagCard1/-1 517 466344 11508940 40 0.07% 0.00% 0.00% 0 CEF: IPv4 proces 288 139517240 5587740 24968 0.07% 0.39% 0.18% 0 Vlan Statistics 549 362404 2827104 128 0.07% 0.08% 0.07% 0 LACP-T Process 261 194900 120131071 1 0.07% 0.04% 0.05% 0 EARL Intr Thrtl 156 169416 5119222 33 0.07% 0.05% 0.06% 0 Heartbeat 333 80840 5902489 13 0.07% 0.00% 0.00% 0 mls-hal Process 109 227912 1480320 153 0.07% 0.03% 0.02% 0 OIR Process 371 328232 232781569 1 0.07% 0.01% 0.00% 0 cmfib 116 6125080 45542117 134 0.07% 0.14% 0.15% 0 SCP Download Lis в чем может быть проблема ктонить знает? Заранее спасибо. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
zhenya` Posted November 16, 2017 · Report post имхо петля. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
uxcr Posted November 16, 2017 · Report post sh spann sum show controllers cpu-int Или петля, или постоянно приходят tcn, или кто-то роутится на cpu. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
kapydan Posted November 16, 2017 · Report post есть ли возможность, посмотреть кто создает наибольшую нагрузку, типа sh ip flow top-talkers? Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
catalist Posted November 16, 2017 · Report post да понятно что петля, но как узнать кто? C6509V-I#sh spann sum Switch is in pvst mode Root bridge for: none EtherChannel misconfig guard is enabled Extended system ID is enabled Portfast Default is disabled Portfast Edge BPDU Guard Default is enabled Portfast Edge BPDU Filter Default is disabled Loopguard Default is disabled Platform PVST Simulation is enabled PVST Simulation Default is enabled but inactive in pvst mode Bridge Assurance is enabled but inactive in pvst mode UplinkFast is disabled BackboneFast is disabled Pathcost method used is short Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0001 0 0 0 40 40 VLAN0002 0 0 0 16 16 VLAN0004 0 0 0 16 16 VLAN0005 0 0 0 33 33 VLAN0006 0 0 0 16 16 VLAN0007 0 0 0 16 16 VLAN0008 0 0 0 16 16 VLAN0009 0 0 0 16 16 VLAN0010 0 0 0 19 19 VLAN0011 0 0 0 15 15 VLAN0012 0 0 0 16 16 VLAN0013 0 0 0 16 16 VLAN0014 0 0 0 16 16 VLAN0015 0 0 0 16 16 VLAN0016 0 0 0 16 16 VLAN0017 0 0 0 16 16 VLAN0018 0 0 0 16 16 VLAN0019 0 0 0 16 16 VLAN0020 0 0 0 16 16 VLAN0021 0 0 0 16 16 VLAN0022 0 0 0 17 17 VLAN0023 0 0 0 16 16 VLAN0024 0 0 0 17 17 VLAN0025 0 0 0 16 16 VLAN0026 0 0 0 16 16 VLAN0027 0 0 0 16 16 VLAN0028 0 0 0 17 17 VLAN0029 0 0 0 17 17 VLAN0030 0 0 0 16 16 VLAN0031 0 0 0 17 17 VLAN0032 0 0 0 16 16 VLAN0033 0 0 0 16 16 VLAN0034 0 0 0 16 16 VLAN0035 0 0 0 17 17 VLAN0036 0 0 0 16 16 VLAN0037 0 0 0 16 16 VLAN0038 0 0 0 16 16 VLAN0039 0 0 0 17 17 VLAN0040 0 0 0 17 17 VLAN0041 0 0 0 17 17 VLAN0042 0 0 0 16 16 VLAN0043 0 0 0 18 18 VLAN0044 0 0 0 16 16 VLAN0045 0 0 0 17 17 VLAN0046 0 0 0 17 17 VLAN0047 0 0 0 17 17 VLAN0048 0 0 0 17 17 VLAN0049 0 0 0 16 16 VLAN0050 0 0 0 17 17 VLAN0051 0 0 0 16 16 VLAN0052 0 0 0 16 16 VLAN0053 0 0 0 17 17 VLAN0054 0 0 0 16 16 VLAN0055 0 0 0 16 16 VLAN0056 0 0 0 17 17 VLAN0057 0 0 0 16 16 VLAN0058 0 0 0 17 17 VLAN0059 0 0 0 16 16 VLAN0060 0 0 0 17 17 VLAN0061 0 0 0 16 16 VLAN0062 0 0 0 16 16 VLAN0063 0 0 0 16 16 VLAN0064 0 0 0 16 16 VLAN0065 0 0 0 17 17 VLAN0066 0 0 0 16 16 VLAN0067 0 0 0 16 16 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0068 0 0 0 16 16 VLAN0069 0 0 0 16 16 VLAN0070 0 0 0 17 17 VLAN0071 0 0 0 17 17 VLAN0072 0 0 0 16 16 VLAN0073 0 0 0 17 17 VLAN0074 0 0 0 16 16 VLAN0075 0 0 0 16 16 VLAN0076 0 0 0 17 17 VLAN0077 0 0 0 16 16 VLAN0078 0 0 0 16 16 VLAN0079 0 0 0 16 16 VLAN0080 0 0 0 16 16 VLAN0081 0 0 0 17 17 VLAN0082 0 0 0 16 16 VLAN0084 0 0 0 16 16 VLAN0085 0 0 0 16 16 VLAN0086 0 0 0 17 17 VLAN0087 0 0 0 16 16 VLAN0088 0 0 0 16 16 VLAN0089 0 0 0 17 17 VLAN0090 0 0 0 16 16 VLAN0091 0 0 0 16 16 VLAN0092 0 0 0 16 16 VLAN0093 0 0 0 16 16 VLAN0094 0 0 0 16 16 VLAN0095 0 0 0 16 16 VLAN0096 0 0 0 16 16 VLAN0097 0 0 0 16 16 VLAN0098 0 0 0 17 17 VLAN0099 0 0 0 17 17 VLAN0100 0 0 0 16 16 VLAN0101 0 0 0 17 17 VLAN0102 0 0 0 17 17 VLAN0103 0 0 0 16 16 VLAN0104 0 0 0 16 16 VLAN0105 0 0 0 17 17 VLAN0106 0 0 0 17 17 VLAN0107 0 0 0 16 16 VLAN0108 0 0 0 17 17 VLAN0109 0 0 0 16 16 VLAN0111 0 0 0 16 16 VLAN0112 0 0 0 16 16 VLAN0113 0 0 0 18 18 VLAN0114 0 0 0 16 16 VLAN0115 0 0 0 16 16 VLAN0116 0 0 0 16 16 VLAN0117 0 0 0 16 16 VLAN0118 0 0 0 16 16 VLAN0119 0 0 0 16 16 VLAN0120 0 0 0 18 18 VLAN0121 0 0 0 17 17 VLAN0122 0 0 0 16 16 VLAN0123 0 0 0 17 17 VLAN0124 0 0 0 16 16 VLAN0125 0 0 0 16 16 VLAN0126 0 0 0 17 17 VLAN0127 0 0 0 17 17 VLAN0128 0 0 0 16 16 VLAN0129 0 0 0 16 16 VLAN0130 0 0 0 16 16 VLAN0131 0 0 0 16 16 VLAN0132 0 0 0 16 16 VLAN0133 0 0 0 17 17 VLAN0134 0 0 0 16 16 VLAN0135 0 0 0 16 16 VLAN0136 0 0 0 16 16 VLAN0137 0 0 0 16 16 VLAN0138 0 0 0 17 17 VLAN0139 0 0 0 16 16 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0140 0 0 0 16 16 VLAN0141 0 0 0 16 16 VLAN0142 0 0 0 16 16 VLAN0143 0 0 0 17 17 VLAN0144 0 0 0 16 16 VLAN0145 0 0 0 16 16 VLAN0146 0 0 0 16 16 VLAN0147 0 0 0 17 17 VLAN0148 0 0 0 16 16 VLAN0149 0 0 0 17 17 VLAN0150 0 0 0 16 16 VLAN0151 0 0 0 16 16 VLAN0152 0 0 0 16 16 VLAN0153 0 0 0 17 17 VLAN0154 0 0 0 16 16 VLAN0155 0 0 0 16 16 VLAN0156 0 0 0 18 18 VLAN0157 0 0 0 16 16 VLAN0158 0 0 0 17 17 VLAN0159 0 0 0 16 16 VLAN0160 0 0 0 17 17 VLAN0161 0 0 0 16 16 VLAN0162 0 0 0 17 17 VLAN0163 0 0 0 17 17 VLAN0164 0 0 0 16 16 VLAN0165 0 0 0 17 17 VLAN0166 0 0 0 16 16 VLAN0167 0 0 0 16 16 VLAN0168 0 0 0 16 16 VLAN0169 0 0 0 17 17 VLAN0170 0 0 0 17 17 VLAN0171 0 0 0 16 16 VLAN0172 0 0 0 17 17 VLAN0173 0 0 0 17 17 VLAN0174 0 0 0 16 16 VLAN0175 0 0 0 17 17 VLAN0176 0 0 0 17 17 VLAN0177 0 0 0 16 16 VLAN0178 0 0 0 16 16 VLAN0179 0 0 0 16 16 VLAN0180 0 0 0 16 16 VLAN0181 0 0 0 16 16 VLAN0182 0 0 0 17 17 VLAN0183 0 0 0 17 17 VLAN0184 0 0 0 17 17 VLAN0185 0 0 0 17 17 VLAN0186 0 0 0 16 16 VLAN0187 0 0 0 17 17 VLAN0188 0 0 0 18 18 VLAN0189 0 0 0 16 16 VLAN0190 0 0 0 17 17 VLAN0191 0 0 0 17 17 VLAN0192 0 0 0 17 17 VLAN0193 0 0 0 16 16 VLAN0194 0 0 0 16 16 VLAN0195 0 0 0 17 17 VLAN0196 0 0 0 17 17 VLAN0197 0 0 0 17 17 VLAN0198 0 0 0 17 17 VLAN0199 0 0 0 16 16 VLAN0200 0 0 0 17 17 VLAN0201 0 0 0 17 17 VLAN0202 0 0 0 17 17 VLAN0203 0 0 0 16 16 VLAN0204 0 0 0 17 17 VLAN0205 0 0 0 16 16 VLAN0206 0 0 0 16 16 VLAN0207 0 0 0 16 16 VLAN0208 0 0 0 17 17 VLAN0209 0 0 0 17 17 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0210 0 0 0 18 18 VLAN0211 0 0 0 17 17 VLAN0212 0 0 0 17 17 VLAN0213 0 0 0 17 17 VLAN0214 0 0 0 16 16 VLAN0215 0 0 0 16 16 VLAN0216 0 0 0 17 17 VLAN0217 0 0 0 16 16 VLAN0218 0 0 0 16 16 VLAN0219 0 0 0 16 16 VLAN0220 0 0 0 16 16 VLAN0221 0 0 0 17 17 VLAN0222 0 0 0 16 16 VLAN0223 0 0 0 17 17 VLAN0224 0 0 0 17 17 VLAN0225 0 0 0 16 16 VLAN0226 0 0 0 17 17 VLAN0227 0 0 0 16 16 VLAN0228 0 0 0 16 16 VLAN0229 0 0 0 17 17 VLAN0230 0 0 0 17 17 VLAN0231 0 0 0 16 16 VLAN0232 0 0 0 16 16 VLAN0233 0 0 0 16 16 VLAN0234 0 0 0 16 16 VLAN0235 0 0 0 17 17 VLAN0236 0 0 0 16 16 VLAN0237 0 0 0 17 17 VLAN0238 0 0 0 16 16 VLAN0239 0 0 0 17 17 VLAN0240 0 0 0 16 16 VLAN0241 0 0 0 17 17 VLAN0242 0 0 0 16 16 VLAN0243 0 0 0 16 16 VLAN0244 0 0 0 18 18 VLAN0245 0 0 0 17 17 VLAN0246 0 0 0 16 16 VLAN0247 0 0 0 17 17 VLAN0248 0 0 0 18 18 VLAN0249 0 0 0 16 16 VLAN0250 0 0 0 16 16 VLAN0251 0 0 0 17 17 VLAN0252 0 0 0 16 16 VLAN0253 0 0 0 17 17 VLAN0254 0 0 0 16 16 VLAN0255 0 0 0 16 16 VLAN0256 0 0 0 17 17 VLAN0257 0 0 0 16 16 VLAN0258 0 0 0 16 16 VLAN0259 0 0 0 17 17 VLAN0260 0 0 0 16 16 VLAN0261 0 0 0 16 16 VLAN0262 0 0 0 16 16 VLAN0263 0 0 0 17 17 VLAN0264 0 0 0 17 17 VLAN0265 0 0 0 17 17 VLAN0266 0 0 0 16 16 VLAN0267 0 0 0 17 17 VLAN0268 0 0 0 17 17 VLAN0269 0 0 0 17 17 VLAN0270 0 0 0 16 16 VLAN0271 0 0 0 16 16 VLAN0272 0 0 0 16 16 VLAN0273 0 0 0 17 17 VLAN0274 0 0 0 16 16 VLAN0275 0 0 0 17 17 VLAN0276 0 0 0 17 17 VLAN0277 0 0 0 17 17 VLAN0278 0 0 0 17 17 VLAN0279 0 0 0 17 17 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0280 0 0 0 17 17 VLAN0281 0 0 0 17 17 VLAN0282 0 0 0 17 17 VLAN0283 0 0 0 16 16 VLAN0284 0 0 0 17 17 VLAN0285 0 0 0 16 16 VLAN0286 0 0 0 16 16 VLAN0287 0 0 0 17 17 VLAN0288 0 0 0 17 17 VLAN0289 0 0 0 16 16 VLAN0290 0 0 0 16 16 VLAN0291 0 0 0 16 16 VLAN0292 0 0 0 16 16 VLAN0293 0 0 0 17 17 VLAN0294 0 0 0 17 17 VLAN0295 0 0 0 16 16 VLAN0296 0 0 0 17 17 VLAN0297 0 0 0 16 16 VLAN0298 0 0 0 16 16 VLAN0299 0 0 0 16 16 VLAN0300 0 0 0 16 16 VLAN0301 0 0 0 17 17 VLAN0302 0 0 0 17 17 VLAN0303 0 0 0 16 16 VLAN0304 0 0 0 16 16 VLAN0305 0 0 0 16 16 VLAN0306 0 0 0 17 17 VLAN0307 0 0 0 16 16 VLAN0308 0 0 0 17 17 VLAN0309 0 0 0 16 16 VLAN0310 0 0 0 16 16 VLAN0311 0 0 0 16 16 VLAN0312 0 0 0 17 17 VLAN0313 0 0 0 18 18 VLAN0314 0 0 0 16 16 VLAN0315 0 0 0 16 16 VLAN0316 0 0 0 16 16 VLAN0317 0 0 0 16 16 VLAN0318 0 0 0 16 16 VLAN0319 0 0 0 16 16 VLAN0320 0 0 0 17 17 VLAN0321 0 0 0 17 17 VLAN0322 0 0 0 16 16 VLAN0323 0 0 0 17 17 VLAN0324 0 0 0 17 17 VLAN0325 0 0 0 17 17 VLAN0326 0 0 0 17 17 VLAN0327 0 0 0 16 16 VLAN0328 0 0 0 17 17 VLAN0329 0 0 0 16 16 VLAN0330 0 0 0 17 17 VLAN0331 0 0 0 17 17 VLAN0332 0 0 0 17 17 VLAN0333 0 0 0 17 17 VLAN0334 0 0 0 16 16 VLAN0335 0 0 0 16 16 VLAN0336 0 0 0 17 17 VLAN0337 0 0 0 16 16 VLAN0338 0 0 0 16 16 VLAN0339 0 0 0 16 16 VLAN0340 0 0 0 16 16 VLAN0341 0 0 0 17 17 VLAN0342 0 0 0 16 16 VLAN0343 0 0 0 16 16 VLAN0344 0 0 0 16 16 VLAN0345 0 0 0 18 18 VLAN0346 0 0 0 17 17 VLAN0347 0 0 0 17 17 VLAN0348 0 0 0 17 17 VLAN0349 0 0 0 17 17 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0350 0 0 0 16 16 VLAN0351 0 0 0 16 16 VLAN0352 0 0 0 17 17 VLAN0353 0 0 0 16 16 VLAN0354 0 0 0 16 16 VLAN0355 0 0 0 16 16 VLAN0356 0 0 0 17 17 VLAN0357 0 0 0 16 16 VLAN0358 0 0 0 17 17 VLAN0359 0 0 0 17 17 VLAN0360 0 0 0 16 16 VLAN0361 0 0 0 16 16 VLAN0362 0 0 0 17 17 VLAN0363 0 0 0 16 16 VLAN0364 0 0 0 16 16 VLAN0365 0 0 0 16 16 VLAN0366 0 0 0 17 17 VLAN0367 0 0 0 17 17 VLAN0368 0 0 0 17 17 VLAN0369 0 0 0 16 16 VLAN0370 0 0 0 16 16 VLAN0371 0 0 0 16 16 VLAN0372 0 0 0 16 16 VLAN0373 0 0 0 16 16 VLAN0374 0 0 0 16 16 VLAN0375 0 0 0 17 17 VLAN0376 0 0 0 17 17 VLAN0377 0 0 0 17 17 VLAN0378 0 0 0 16 16 VLAN0379 0 0 0 17 17 VLAN0380 0 0 0 16 16 VLAN0381 0 0 0 17 17 VLAN0382 0 0 0 16 16 VLAN0383 0 0 0 16 16 VLAN0384 0 0 0 16 16 VLAN0385 0 0 0 16 16 VLAN0386 0 0 0 16 16 VLAN0387 0 0 0 16 16 VLAN0388 0 0 0 18 18 VLAN0389 0 0 0 21 21 VLAN0390 0 0 0 17 17 VLAN0391 0 0 0 16 16 VLAN0392 0 0 0 16 16 VLAN0393 0 0 0 18 18 VLAN0394 0 0 0 16 16 VLAN0395 0 0 0 17 17 VLAN0396 0 0 0 16 16 VLAN0397 0 0 0 16 16 VLAN0398 0 0 0 16 16 VLAN0399 0 0 0 17 17 VLAN0400 0 0 0 16 16 VLAN0401 0 0 0 17 17 VLAN0402 0 0 0 18 18 VLAN0403 0 0 0 16 16 VLAN0404 0 0 0 16 16 VLAN0405 0 0 0 16 16 VLAN0406 0 0 0 17 17 VLAN0407 0 0 0 17 17 VLAN0408 0 0 0 17 17 VLAN0409 0 0 0 17 17 VLAN0410 0 0 0 17 17 VLAN0411 0 0 0 16 16 VLAN0412 0 0 0 16 16 VLAN0413 0 0 0 16 16 VLAN0414 0 0 0 16 16 VLAN0415 0 0 0 16 16 VLAN0416 0 0 0 16 16 VLAN0417 0 0 0 17 17 VLAN0418 0 0 0 16 16 VLAN0419 0 0 0 17 17 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0420 0 0 0 16 16 VLAN0421 0 0 0 16 16 VLAN0422 0 0 0 16 16 VLAN0423 0 0 0 16 16 VLAN0424 0 0 0 16 16 VLAN0425 0 0 0 17 17 VLAN0426 0 0 0 16 16 VLAN0427 0 0 0 16 16 VLAN0428 0 0 0 17 17 VLAN0429 0 0 0 16 16 VLAN0430 0 0 0 17 17 VLAN0431 0 0 0 17 17 VLAN0432 0 0 0 17 17 VLAN0433 0 0 0 16 16 VLAN0434 0 0 0 17 17 VLAN0435 0 0 0 16 16 VLAN0436 0 0 0 16 16 VLAN0437 0 0 0 17 17 VLAN0438 0 0 0 16 16 VLAN0439 0 0 0 16 16 VLAN0440 0 0 0 17 17 VLAN0441 0 0 0 17 17 VLAN0442 0 0 0 16 16 VLAN0443 0 0 0 16 16 VLAN0444 0 0 0 17 17 VLAN0445 0 0 0 16 16 VLAN0446 0 0 0 16 16 VLAN0447 0 0 0 16 16 VLAN0448 0 0 0 16 16 VLAN0449 0 0 0 17 17 VLAN0450 0 0 0 17 17 VLAN0451 0 0 0 16 16 VLAN0452 0 0 0 16 16 VLAN0453 0 0 0 18 18 VLAN0454 0 0 0 16 16 VLAN0455 0 0 0 16 16 VLAN0456 0 0 0 17 17 VLAN0457 0 0 0 16 16 VLAN0458 0 0 0 16 16 VLAN0459 0 0 0 16 16 VLAN0460 0 0 0 17 17 VLAN0461 0 0 0 16 16 VLAN0462 0 0 0 16 16 VLAN0463 0 0 0 16 16 VLAN0464 0 0 0 16 16 VLAN0465 0 0 0 17 17 VLAN0466 0 0 0 16 16 VLAN0467 0 0 0 17 17 VLAN0468 0 0 0 17 17 VLAN0469 0 0 0 16 16 VLAN0470 0 0 0 16 16 VLAN0471 0 0 0 17 17 VLAN0472 0 0 0 16 16 VLAN0473 0 0 0 16 16 VLAN0474 0 0 0 17 17 VLAN0475 0 0 0 17 17 VLAN0476 0 0 0 17 17 VLAN0477 0 0 0 17 17 VLAN0478 0 0 0 17 17 VLAN0479 0 0 0 17 17 VLAN0480 0 0 0 16 16 VLAN0481 0 0 0 16 16 VLAN0482 0 0 0 16 16 VLAN0483 0 0 0 16 16 VLAN0484 0 0 0 16 16 VLAN0485 0 0 0 16 16 VLAN0486 0 0 0 16 16 VLAN0487 0 0 0 16 16 VLAN0488 0 0 0 16 16 VLAN0489 0 0 0 16 16 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0490 0 0 0 16 16 VLAN0491 0 0 0 17 17 VLAN0492 0 0 0 16 16 VLAN0493 0 0 0 17 17 VLAN0494 0 0 0 17 17 VLAN0495 0 0 0 16 16 VLAN0496 0 0 0 16 16 VLAN0497 0 0 0 16 16 VLAN0498 0 0 0 16 16 VLAN0499 0 0 0 16 16 VLAN0500 0 0 0 21 21 VLAN0501 0 0 0 17 17 VLAN0502 0 0 0 16 16 VLAN0503 0 0 0 16 16 VLAN0504 0 0 0 17 17 VLAN0505 0 0 0 17 17 VLAN0506 0 0 0 16 16 VLAN0507 0 0 0 16 16 VLAN0508 0 0 0 16 16 VLAN0509 0 0 0 17 17 VLAN0510 0 0 0 17 17 VLAN0511 0 0 0 16 16 VLAN0512 0 0 0 17 17 VLAN0513 0 0 0 16 16 VLAN0514 0 0 0 16 16 VLAN0515 0 0 0 16 16 VLAN0516 0 0 0 17 17 VLAN0517 0 0 0 16 16 VLAN0518 0 0 0 16 16 VLAN0519 0 0 0 16 16 VLAN0520 0 0 0 17 17 VLAN0521 0 0 0 16 16 VLAN0522 0 0 0 16 16 VLAN0523 0 0 0 16 16 VLAN0524 0 0 0 16 16 VLAN0525 0 0 0 16 16 VLAN0526 0 0 0 16 16 VLAN0527 0 0 0 16 16 VLAN0528 0 0 0 16 16 VLAN0529 0 0 0 17 17 VLAN0530 0 0 0 16 16 VLAN0531 0 0 0 17 17 VLAN0532 0 0 0 16 16 VLAN0533 0 0 0 17 17 VLAN0534 0 0 0 16 16 VLAN0535 0 0 0 16 16 VLAN0536 0 0 0 17 17 VLAN0537 0 0 0 16 16 VLAN0538 0 0 0 16 16 VLAN0539 0 0 0 16 16 VLAN0540 0 0 0 16 16 VLAN0541 0 0 0 17 17 VLAN0542 0 0 0 17 17 VLAN0543 0 0 0 16 16 VLAN0544 0 0 0 16 16 VLAN0545 0 0 0 16 16 VLAN0546 0 0 0 17 17 VLAN0547 0 0 0 16 16 VLAN0548 0 0 0 16 16 VLAN0549 0 0 0 17 17 VLAN0550 0 0 0 17 17 VLAN0551 0 0 0 17 17 VLAN0552 0 0 0 16 16 VLAN0553 0 0 0 16 16 VLAN0554 0 0 0 16 16 VLAN0555 0 0 0 16 16 VLAN0556 0 0 0 16 16 VLAN0557 0 0 0 16 16 VLAN0558 0 0 0 16 16 VLAN0559 0 0 0 17 17 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0560 0 0 0 17 17 VLAN0561 0 0 0 16 16 VLAN0562 0 0 0 16 16 VLAN0563 0 0 0 17 17 VLAN0564 0 0 0 17 17 VLAN0565 0 0 0 16 16 VLAN0566 0 0 0 17 17 VLAN0567 0 0 0 16 16 VLAN0568 0 0 0 16 16 VLAN0569 0 0 0 16 16 VLAN0570 0 0 0 17 17 VLAN0571 0 0 0 17 17 VLAN0572 0 0 0 16 16 VLAN0573 0 0 0 16 16 VLAN0574 0 0 0 17 17 VLAN0575 0 0 0 17 17 VLAN0576 0 0 0 18 18 VLAN0577 0 0 0 17 17 VLAN0578 0 0 0 16 16 VLAN0579 0 0 0 16 16 VLAN0580 0 0 0 16 16 VLAN0581 0 0 0 16 16 VLAN0582 0 0 0 17 17 VLAN0583 0 0 0 16 16 VLAN0584 0 0 0 16 16 VLAN0585 0 0 0 16 16 VLAN0586 0 0 0 16 16 VLAN0587 0 0 0 16 16 VLAN0588 0 0 0 16 16 VLAN0589 0 0 0 16 16 VLAN0590 0 0 0 16 16 VLAN0591 0 0 0 16 16 VLAN0592 0 0 0 16 16 VLAN0593 0 0 0 16 16 VLAN0594 0 0 0 16 16 VLAN0595 0 0 0 17 17 VLAN0596 0 0 0 17 17 VLAN0597 0 0 0 17 17 VLAN0598 0 0 0 17 17 VLAN0599 0 0 0 16 16 VLAN0600 0 0 0 16 16 VLAN0601 0 0 0 16 16 VLAN0602 0 0 0 16 16 VLAN0603 0 0 0 16 16 VLAN0604 0 0 0 16 16 VLAN0605 0 0 0 16 16 VLAN0606 0 0 0 17 17 VLAN0607 0 0 0 16 16 VLAN0608 0 0 0 17 17 VLAN0609 0 0 0 16 16 VLAN0610 0 0 0 16 16 VLAN0611 0 0 0 17 17 VLAN0612 0 0 0 17 17 VLAN0613 0 0 0 16 16 VLAN0614 0 0 0 16 16 VLAN0615 0 0 0 16 16 VLAN0616 0 0 0 16 16 VLAN0617 0 0 0 16 16 VLAN0618 0 0 0 16 16 VLAN0619 0 0 0 16 16 VLAN0620 0 0 0 16 16 VLAN0621 0 0 0 16 16 VLAN0622 0 0 0 16 16 VLAN0623 0 0 0 16 16 VLAN0624 0 0 0 16 16 VLAN0625 0 0 0 17 17 VLAN0626 0 0 0 17 17 VLAN0627 0 0 0 16 16 VLAN0628 0 0 0 16 16 VLAN0629 0 0 0 16 16 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0630 0 0 0 16 16 VLAN0631 0 0 0 16 16 VLAN0632 0 0 0 16 16 VLAN0633 0 0 0 16 16 VLAN0634 0 0 0 16 16 VLAN0635 0 0 0 16 16 VLAN0636 0 0 0 16 16 VLAN0637 0 0 0 17 17 VLAN0638 0 0 0 16 16 VLAN0639 0 0 0 16 16 VLAN0640 0 0 0 16 16 VLAN0641 0 0 0 16 16 VLAN0642 0 0 0 16 16 VLAN0643 0 0 0 17 17 VLAN0644 0 0 0 17 17 VLAN0645 0 0 0 16 16 VLAN0646 0 0 0 17 17 VLAN0647 0 0 0 17 17 VLAN0648 0 0 0 16 16 VLAN0649 0 0 0 16 16 VLAN0650 0 0 0 16 16 VLAN0651 0 0 0 16 16 VLAN0652 0 0 0 16 16 VLAN0653 0 0 0 17 17 VLAN0654 0 0 0 16 16 VLAN0655 0 0 0 17 17 VLAN0656 0 0 0 16 16 VLAN0657 0 0 0 17 17 VLAN0658 0 0 0 17 17 VLAN0659 0 0 0 16 16 VLAN0660 0 0 0 17 17 VLAN0661 0 0 0 16 16 VLAN0662 0 0 0 17 17 VLAN0663 0 0 0 17 17 VLAN0664 0 0 0 16 16 VLAN0665 0 0 0 16 16 VLAN0667 0 0 0 18 18 VLAN0668 0 0 0 17 17 VLAN0669 0 0 0 17 17 VLAN0670 0 0 0 16 16 VLAN0671 0 0 0 17 17 VLAN0672 0 0 0 16 16 VLAN0673 0 0 0 17 17 VLAN0674 0 0 0 18 18 VLAN0675 0 0 0 16 16 VLAN0676 0 0 0 17 17 VLAN0677 0 0 0 17 17 VLAN0678 0 0 0 17 17 VLAN0679 0 0 0 16 16 VLAN0680 0 0 0 17 17 VLAN0681 0 0 0 16 16 VLAN0682 0 0 0 16 16 VLAN0683 0 0 0 16 16 VLAN0684 0 0 0 16 16 VLAN0685 0 0 0 16 16 VLAN0686 0 0 0 17 17 VLAN0687 0 0 0 16 16 VLAN0688 0 0 0 17 17 VLAN0689 0 0 0 16 16 VLAN0690 0 0 0 17 17 VLAN0691 0 0 0 17 17 VLAN0692 0 0 0 16 16 VLAN0693 0 0 0 16 16 VLAN0694 0 0 0 17 17 VLAN0695 0 0 0 16 16 VLAN0696 0 0 0 16 16 VLAN0697 0 0 0 16 16 VLAN0698 0 0 0 19 19 VLAN0699 0 0 0 16 16 VLAN0700 0 0 0 16 16 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0701 0 0 0 17 17 VLAN0702 0 0 0 17 17 VLAN0703 0 0 0 17 17 VLAN0704 0 0 0 17 17 VLAN0705 0 0 0 16 16 VLAN0706 0 0 0 16 16 VLAN0707 0 0 0 16 16 VLAN0708 0 0 0 16 16 VLAN0709 0 0 0 17 17 VLAN0710 0 0 0 16 16 VLAN0711 0 0 0 16 16 VLAN0712 0 0 0 16 16 VLAN0713 0 0 0 16 16 VLAN0714 0 0 0 16 16 VLAN0715 0 0 0 16 16 VLAN0716 0 0 0 16 16 VLAN0717 0 0 0 16 16 VLAN0718 0 0 0 17 17 VLAN0719 0 0 0 16 16 VLAN0720 0 0 0 16 16 VLAN0721 0 0 0 16 16 VLAN0722 0 0 0 16 16 VLAN0723 0 0 0 17 17 VLAN0724 0 0 0 17 17 VLAN0725 0 0 0 17 17 VLAN0726 0 0 0 16 16 VLAN0727 0 0 0 16 16 VLAN0728 0 0 0 16 16 VLAN0729 0 0 0 17 17 VLAN0730 0 0 0 17 17 VLAN0731 0 0 0 17 17 VLAN0732 0 0 0 16 16 VLAN0733 0 0 0 16 16 VLAN0734 0 0 0 16 16 VLAN0735 0 0 0 16 16 VLAN0736 0 0 0 16 16 VLAN0737 0 0 0 16 16 VLAN0738 0 0 0 17 17 VLAN0739 0 0 0 16 16 VLAN0740 0 0 0 16 16 VLAN0741 0 0 0 16 16 VLAN0742 0 0 0 17 17 VLAN0743 0 0 0 16 16 VLAN0744 0 0 0 17 17 VLAN0745 0 0 0 16 16 VLAN0746 0 0 0 17 17 VLAN0747 0 0 0 16 16 VLAN0748 0 0 0 16 16 VLAN0749 0 0 0 17 17 VLAN0750 0 0 0 16 16 VLAN0751 0 0 0 16 16 VLAN0752 0 0 0 17 17 VLAN0753 0 0 0 16 16 VLAN0754 0 0 0 17 17 VLAN0755 0 0 0 16 16 VLAN0756 0 0 0 16 16 VLAN0757 0 0 0 16 16 VLAN0758 0 0 0 16 16 VLAN0759 0 0 0 16 16 VLAN0760 0 0 0 16 16 VLAN0761 0 0 0 16 16 VLAN0762 0 0 0 16 16 VLAN0763 0 0 0 16 16 VLAN0764 0 0 0 16 16 VLAN0765 0 0 0 17 17 VLAN0766 0 0 0 17 17 VLAN0767 0 0 0 16 16 VLAN0768 0 0 0 16 16 VLAN0769 0 0 0 16 16 VLAN0770 0 0 0 17 17 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0771 0 0 0 17 17 VLAN0772 0 0 0 17 17 VLAN0773 0 0 0 16 16 VLAN0774 0 0 0 16 16 VLAN0775 0 0 0 16 16 VLAN0776 0 0 0 16 16 VLAN0777 0 0 0 16 16 VLAN0778 0 0 0 16 16 VLAN0779 0 0 0 16 16 VLAN0780 0 0 0 16 16 VLAN0781 0 0 0 16 16 VLAN0782 0 0 0 16 16 VLAN0783 0 0 0 16 16 VLAN0784 0 0 0 16 16 VLAN0785 0 0 0 16 16 VLAN0786 0 0 0 16 16 VLAN0787 0 0 0 16 16 VLAN0788 0 0 0 16 16 VLAN0789 0 0 0 16 16 VLAN0790 0 0 0 16 16 VLAN0791 0 0 0 16 16 VLAN0792 0 0 0 16 16 VLAN0793 0 0 0 16 16 VLAN0794 0 0 0 16 16 VLAN0795 0 0 0 16 16 VLAN0796 0 0 0 16 16 VLAN0797 0 0 0 16 16 VLAN0798 0 0 0 16 16 VLAN0799 0 0 0 16 16 VLAN0801 0 0 0 16 16 VLAN0802 0 0 0 16 16 VLAN0803 0 0 0 17 17 VLAN0804 0 0 0 16 16 VLAN0805 0 0 0 16 16 VLAN0806 0 0 0 17 17 VLAN0807 0 0 0 17 17 VLAN0808 0 0 0 16 16 VLAN0809 0 0 0 16 16 VLAN0810 0 0 0 17 17 VLAN0811 0 0 0 17 17 VLAN0812 0 0 0 16 16 VLAN0813 0 0 0 16 16 VLAN0814 0 0 0 16 16 VLAN0815 0 0 0 16 16 VLAN0816 0 0 0 17 17 VLAN0817 0 0 0 17 17 VLAN0818 0 0 0 17 17 VLAN0819 0 0 0 16 16 VLAN0820 0 0 0 17 17 VLAN0821 0 0 0 17 17 VLAN0822 0 0 0 17 17 VLAN0823 0 0 0 17 17 VLAN0824 0 0 0 17 17 VLAN0825 0 0 0 16 16 VLAN0826 0 0 0 16 16 VLAN0827 0 0 0 17 17 VLAN0828 0 0 0 17 17 VLAN0829 0 0 0 17 17 VLAN0830 0 0 0 16 16 VLAN0831 0 0 0 16 16 VLAN0832 0 0 0 16 16 VLAN0834 0 0 0 16 16 VLAN0835 0 0 0 16 16 VLAN0836 0 0 0 17 17 VLAN0837 0 0 0 17 17 VLAN0838 0 0 0 16 16 VLAN0839 0 0 0 17 17 VLAN0840 0 0 0 17 17 VLAN0841 0 0 0 17 17 VLAN0842 0 0 0 17 17 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0843 0 0 0 17 17 VLAN0844 0 0 0 17 17 VLAN0845 0 0 0 17 17 VLAN0846 0 0 0 17 17 VLAN0847 0 0 0 17 17 VLAN0848 0 0 0 17 17 VLAN0849 0 0 0 17 17 VLAN0850 0 0 0 17 17 VLAN0851 0 0 0 16 16 VLAN0852 0 0 0 16 16 VLAN0853 0 0 0 16 16 VLAN0854 0 0 0 16 16 VLAN0855 0 0 0 16 16 VLAN0856 0 0 0 16 16 VLAN0857 0 0 0 16 16 VLAN0858 0 0 0 16 16 VLAN0859 0 0 0 16 16 VLAN0860 0 0 0 16 16 VLAN0861 0 0 0 16 16 VLAN0862 0 0 0 16 16 VLAN0863 0 0 0 16 16 VLAN0864 0 0 0 16 16 VLAN0865 0 0 0 16 16 VLAN0866 0 0 0 16 16 VLAN0867 0 0 0 16 16 VLAN0868 0 0 0 16 16 VLAN0869 0 0 0 16 16 VLAN0870 0 0 0 16 16 VLAN0871 0 0 0 16 16 VLAN0872 0 0 0 16 16 VLAN0873 0 0 0 16 16 VLAN0874 0 0 0 16 16 VLAN0875 0 0 0 16 16 VLAN0876 0 0 0 16 16 VLAN0877 0 0 0 16 16 VLAN0878 0 0 0 16 16 VLAN0879 0 0 0 16 16 VLAN0880 0 0 0 16 16 VLAN0881 0 0 0 16 16 VLAN0882 0 0 0 16 16 VLAN0883 0 0 0 16 16 VLAN0884 0 0 0 16 16 VLAN0885 0 0 0 16 16 VLAN0886 0 0 0 16 16 VLAN0887 0 0 0 16 16 VLAN0889 0 0 0 16 16 VLAN0890 0 0 0 17 17 VLAN0891 0 0 0 16 16 VLAN0892 0 0 0 17 17 VLAN0893 0 0 0 16 16 VLAN0894 0 0 0 16 16 VLAN0895 0 0 0 16 16 VLAN0896 0 0 0 17 17 VLAN0897 0 0 0 16 16 VLAN0898 0 0 0 16 16 VLAN0899 0 0 0 16 16 VLAN0900 0 0 0 16 16 VLAN0901 0 0 0 16 16 VLAN0902 0 0 0 17 17 VLAN0903 0 0 0 17 17 VLAN0904 0 0 0 16 16 VLAN0905 0 0 0 16 16 VLAN0906 0 0 0 16 16 VLAN0907 0 0 0 16 16 VLAN0908 0 0 0 16 16 VLAN0909 0 0 0 16 16 VLAN0910 0 0 0 17 17 VLAN0911 0 0 0 16 16 VLAN0912 0 0 0 16 16 VLAN0913 0 0 0 16 16 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0914 0 0 0 16 16 VLAN0915 0 0 0 17 17 VLAN0916 0 0 0 17 17 VLAN0917 0 0 0 17 17 VLAN0918 0 0 0 16 16 VLAN0919 0 0 0 16 16 VLAN0920 0 0 0 16 16 VLAN0921 0 0 0 16 16 VLAN0922 0 0 0 16 16 VLAN0923 0 0 0 17 17 VLAN0926 0 0 0 16 16 VLAN0927 0 0 0 16 16 VLAN0928 0 0 0 16 16 VLAN0929 0 0 0 16 16 VLAN0930 0 0 0 16 16 VLAN0931 0 0 0 16 16 VLAN0932 0 0 0 16 16 VLAN0933 0 0 0 17 17 VLAN0934 0 0 0 17 17 VLAN0935 0 0 0 17 17 VLAN0936 0 0 0 17 17 VLAN0937 0 0 0 16 16 VLAN0938 0 0 0 16 16 VLAN0939 0 0 0 17 17 VLAN0940 0 0 0 16 16 VLAN0941 0 0 0 16 16 VLAN0942 0 0 0 16 16 VLAN0943 0 0 0 17 17 VLAN0944 0 0 0 16 16 VLAN0945 0 0 0 16 16 VLAN0946 0 0 0 16 16 VLAN0947 0 0 0 16 16 VLAN0948 0 0 0 16 16 VLAN0949 0 0 0 17 17 VLAN0950 0 0 0 16 16 VLAN0951 0 0 0 17 17 VLAN0952 0 0 0 16 16 VLAN0953 0 0 0 16 16 VLAN0954 0 0 0 17 17 VLAN0955 0 0 0 17 17 VLAN0956 0 0 0 17 17 VLAN0957 0 0 0 16 16 VLAN0958 0 0 0 16 16 VLAN0959 0 0 0 16 16 VLAN0960 0 0 0 17 17 VLAN0961 0 0 0 17 17 VLAN0962 0 0 0 16 16 VLAN0963 0 0 0 16 16 VLAN0964 0 0 0 16 16 VLAN0965 0 0 0 16 16 VLAN0966 0 0 0 16 16 VLAN0967 0 0 0 17 17 VLAN0968 0 0 0 17 17 VLAN0969 0 0 0 16 16 VLAN0970 0 0 0 17 17 VLAN0971 0 0 0 17 17 VLAN0972 0 0 0 17 17 VLAN0973 0 0 0 17 17 VLAN0974 0 0 0 17 17 VLAN0975 0 0 0 17 17 VLAN0976 0 0 0 16 16 VLAN0977 0 0 0 16 16 VLAN0978 0 0 0 16 16 VLAN0979 0 0 0 17 17 VLAN0980 0 0 0 16 16 VLAN0981 0 0 0 16 16 VLAN0982 0 0 0 16 16 VLAN0983 0 0 0 16 16 VLAN0984 0 0 0 16 16 VLAN0985 0 0 0 16 16 Name Blocking Listening Learning Forwarding STP Active ---------------------- -------- --------- -------- ---------- ---------- VLAN0986 0 0 0 16 16 VLAN0987 0 0 0 16 16 VLAN0988 0 0 0 16 16 VLAN0989 0 0 0 17 17 VLAN0990 0 0 0 17 17 VLAN0991 0 0 0 16 16 VLAN0992 0 0 0 16 16 VLAN0993 0 0 0 16 16 VLAN0994 0 0 0 16 16 VLAN0995 0 0 0 16 16 VLAN0996 0 0 0 16 16 VLAN0997 0 0 0 16 16 VLAN0998 0 0 0 16 16 VLAN0999 0 0 0 16 16 VLAN1000 0 0 0 16 16 VLAN1001 0 0 0 16 16 VLAN1234 0 0 0 16 16 ---------------------- -------- --------- -------- ---------- ---------- 993 vlans 0 0 0 16316 16316 Тока не понятно что тут смотреть? Вторая ком*** вообще поддерживается: C6509V-I#show controllers cpu-int ^ % Invalid input detected at '^' marker. C6509V-I#show controllers ? E1 E1 controller internal state SDCC Show SDCC parameters T1 T1 controller internal state pos POS framer state srp SRP controller information | Output modifiers <cr> C6509V-I#sh ip flow top-talkers % Netflow isn't enabled. По нетфлоу нельзя это же не роутер а коммутатор, нетфлоу отключен, клиенты терменятся в другом месте. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
v_r Posted November 16, 2017 · Report post 24 минуты назад, catalist сказал: да понятно что петля, но как узнать кто? Приведите транковый интерфейс на любой линукс и запустите wireshark/tcpdump. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
vurd Posted November 16, 2017 · Report post Господи, а под спойлер нельзя было убрать? Сделайте миррор с cpu на какой-нибудь порт и посмотрите снифером, что там летает. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
catalist Posted November 17, 2017 · Report post Спойлер не знаю как сделать :( Про миррор, да понял. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
NikAlexAn Posted November 17, 2017 · Report post А без pvst то точно не обойтись? Что это за топология где в каждом экземпляре stp аж по 16 портов? sh span det - и там смотреть Number of transitions to forwarding state каждого порта каждого экземпляра. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
pppoetest Posted November 17, 2017 · Report post 5 часов назад, catalist сказал: Спойлер не знаю как сделать :( Даладна, щяс почти на любом форуме конструкция "[ spoiler][/spoiler ]" (без пробелов) работает Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
catalist Posted November 17, 2017 · Report post 3 часа назад, NikAlexAn сказал: А без pvst то точно не обойтись? Что это за топология где в каждом экземпляре stp аж по 16 портов? sh span det - и там смотреть Number of transitions to forwarding state каждого порта каждого экземпляра. Мы честно говоря вообще стп не юзаем, и колец стп у нас нету Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
zhenya` Posted November 17, 2017 · Report post No spanning-tree vlan 1-4094 Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
YuryD Posted November 17, 2017 · Report post 1 час назад, zhenya` сказал: No spanning-tree vlan 1-4094 И фильтры на клиентских портах-вланах про спан-бпду. Вообще-то петля в логах коммутаторов видна. И всякие pvst и прочие - выключать. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
catalist Posted November 17, 2017 · Report post Шеститонник про петлю в логах ничего не пишет.... 3 часа назад, YuryD сказал: портах-вланах про спан-бпду слово про тут не понял. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
YuryD Posted November 18, 2017 · Report post Если это просто коммутатор, то вроде должно быть что-то типа no spanning-tree vlan 1-305 - глобально spanning-tree bpdufilter enable - на порту Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
vurd Posted November 18, 2017 · Report post А как отключение стп поможет не быть процессору загруженному в сотку? Чо там в дампе? show ibc brief еще покажите Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
YuryD Posted November 18, 2017 · Report post 6 минут назад, vurd сказал: А как отключение стп поможет не быть процессору загруженному в сотку? Чо там в дампе? show ibc brief еще покажите Мне кажется, что стр не обрабатывается на цпу, только во время перестройки кольца. Надо искать , что в конфиге коммутатора ложится на цпу. Ацли ? Или то, что на l3 попытались сделать из коммутатора l2 Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
vurd Posted November 18, 2017 · Report post 5 минут назад, YuryD сказал: Мне кажется, что стр не обрабатывается на цпу, только во время перестройки кольца. Надо искать , что в конфиге коммутатора ложится на цпу. Ацли ? Или то, что на l3 попытались сделать из коммутатора l2 Не надо искать в конфиге. Надо делать дамп трафика с цпу. Там может быть что угодно, например, мультикаст, немогущий найти свой S, или какой-нибудь роут-мап без сета. Автор уже давно бы снял, было бы желание. Дело минут 10, если площадка доступна. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
zhenya` Posted November 18, 2017 · Report post 39 минут назад, YuryD сказал: Мне кажется, что стр не обрабатывается на цпу, только во время перестройки кольца. Надо искать , что в конфиге коммутатора ложится на цпу. Ацли ? Или то, что на l3 попытались сделать из коммутатора l2 Когда 65 стала л2 свитчем? стп как и любой другой протокол реализуется на цпу. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
YuryD Posted November 18, 2017 · Report post 11 минут назад, zhenya` сказал: Когда 65 стала л2 свитчем? стп как и любой другой протокол реализуется на цпу. Это да, стп на цпу, но жрёт только во время построения-перестроения. А в л3 много чего может цпу съесть. те-же ацл, полиси и роутмапы, и даже маршрутизация динамическая. Но я привык логи читать, и отладки включать. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
zhenya` Posted November 18, 2017 · Report post 43 минуты назад, YuryD сказал: Это да, стп на цпу, но жрёт только во время построения-перестроения. А в л3 много чего может цпу съесть. те-же ацл, полиси и роутмапы, и даже маршрутизация динамическая. Но я привык логи читать, и отладки включать. Протоколы постоянно жрут проц. В момент перестроек поток бпду больше, но это все ерунда. Трафик через проц из-за ацл, роутмапов и прочего попадает в % прерываний. Причём это все будет в RP процессоре, а в топике речь про SP. в очередной теме начали оффтопик. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...
catalist Posted November 19, 2017 · Report post щас проблема ушла, как опять проявится (а она проявится обязательно) сделаю все что тут нарекомендовали. Вставить ник Quote Ответить с цитированием Share this post Link to post Share on other sites More sharing options...