Book now with code EOY2025
tiersten wrote: » Why don't you have STP enabled? :P
Dr_Atomic wrote: » If you're experiencing an ethernet loop on a switch(es), what's the troubleshooting process for this? I remember this in my CCNA studies, but it doesn't come to me. I'm researching it, also, in the meantime. Thanks.
peanutnoggin wrote: » You should disable spanning-tree on your switches, plug them up with two crossover cables, plug in a PC (to generate some broadcast packets) and have fun... you can also use a tool like yersinia to generate some STP attack packets that will essentially have the same effect on the switches (slowing them down to a crawl). That's what a home lab is for... happy "geeking"! HTH. -Peanut
Dr_Atomic wrote: » I gotten a lot of good responses, but so far it's all pretty much theory. Could someone give me some commands I could input and check to see what I should/shouldn't see from them? Like a step-by-step check of things to look for? What would be some sample commands to use to check for loop issues?
Netwurk wrote: » When a loop occurs, you have limited time to track it down. After a few minutes, you might not even be able to get to the console on your devices. Set up a syslog server so that you can troubleshoot from there if all the network equipment gets pegged. Syslog is very easy to configure. Just get syslog running on a server and use the global IOS command logging x.x.x.x on all your devices.
Dr_Atomic wrote: » I"m checking a production network, so I can't experiment with a server at the moment. I've input every conceivable command I can think of to check this problem.
mikej412 wrote: » Do you have a network diagram that accurately lists the redundant links? Shutdown the known redundant links. Find any incorrect redundant links created by an idiot randomly plugging in network cables in a wiring closet and misconfiguring switch ports using the show cdp neighbor command.
networker050184 wrote: » No offense, but it sounds like you are in WAY over your head here if you don't even know how to find redundant links. Is there not a more knowledgeable staff member you can talk to? You are probably going to make things worse if you are just winging it man.
Netwurk wrote: » I ran a layer 2 MAC flooding attack from a linux box on several of my switches while I was labbing BCMSN. It's a good way to see how necessary port security is. With no security, the only unsecured switch that could keep going against the attack was my old CatOS 2926. The reason I think was its relatively huge mac address table. It just refused to go down despite looping endless flood commands its way. My 3550's, 2950's, 3500's, and 2900's were dead in the water in less than a minute. I was going to name the tool I used but some idiot would then download it and become an instant hacker.
Dr_Atomic wrote: » So if I *do* have a redundant link, I could do a sh cdp neighbor and it would show it there? Then I could just disconnect that link to see if it helps the issue?
creamy_stew wrote: » Also, macof! There, I dun did it! Information wants to be free
Netwurk wrote: » What is making you think you have a loop?
Dr_Atomic wrote: » I was told there might be a network loop
Dr_Atomic wrote: » I"m checking a production network, so I can't experiment with a server at the moment. I've input every conceivable command I can think of to check this problem. If someone could deign to provide some commands and what to look for, it would be nice. In other words, how would one know from being logged into a switch if there *was* a loop present causing a problem? From what command would one see the problem?
chmorin wrote: » In my experiance most broadcast storms are caused on the access layer by an unmanaged switch that the staff was not aware of and some users decided to plug in the loose cables.
Use code EOY2025 to receive $250 off your 2025 certification boot camp!