• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 3006
  • Last Modified:

Cisco ESW-520 Port Suspension Issue

Just got a new Cisco ESW-520 24 port switch for one of my remote sites.  This remote site has 2 buildings that are connected via Cisco Aironet Wireless bridges.  The Aironet in the main building is plugged into this new switch on port 1.  I've had the switch installed for about 3 weeks and about once a week I'm having a problem where the switch will 'suspend' the port that the aironet is plugged into.  It esentially turns off the port so that the status LEDs are not even on.  I have to unplug the aironet, go into the switch GUI, tick the box that says reactivate port, then plug the aironet back in and it starts working.  Besides setting up a static IPv4 address and some other basic stuff the switch is using factory defaults.  Any idea why the switch keeps shutting the port off?  All the other ports have stuff in them and it hasn't done it on any of them, just the aironet one.
0
gedruspax
Asked:
gedruspax
  • 4
  • 3
  • 2
  • +1
2 Solutions
 
Jody LemoineNetwork ArchitectCommented:
A number of Smart Port profiles have the BPDU Guard setting turned on by default.  The BPDU Guard will disable the port if it receives BPDUs from a bridge.  I would check the Smart Port role assigned to that port and make sure that it is set to one that doesn't have BPDU Guard enabled...  or just disable the BPDU Guard setting manually if you can.
0
 
gedruspaxAuthor Commented:
I can't find anything in the web interface about bpdu guard settings but i did find something about Storm control and it is turned on for every port by default.  do you think that disabling storm control for that specific port might help?
0
 
Jody LemoineNetwork ArchitectCommented:
I don't think storm control is going to make a difference in this case.  What Smart Port role is assigned to the port?  Also, what specific model of ESW-520 are you using and what port do you have the wireless bridge plugged into?
0
Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

 
gedruspaxAuthor Commented:
nevermind i just found where to manually disable bpdu guard on a per port basis.  i'll give that a shot.  thanks!
0
 
dylan_leggattCommented:
when the port is disabled do a

show interfaces status err-disabled

this should tell you why the port was shut down
0
 
Jody LemoineNetwork ArchitectCommented:
Did disabling the BPDU guard do the trick?
0
 
gedruspaxAuthor Commented:
yes since disabling the bpdu guard the problem has not reoccured in 9 days.  i think that did the trick.

thanks again!
0
 
Infinite_ITCommented:
Hello All,

How did you get in to a usable CLI to do that? In the GUI and or Telnet menu i cant find any refrence to port security and or bpdu guard?


0
 
Jody LemoineNetwork ArchitectCommented:
The ESW-520, which is essentially an evolution of the Linksys switches, does not have any sort of CLI beyond the ability to set very basic network information for access to the switch.  The "show interfaces status err-disabled" command mentioned in an earlier comment will work fine on an IOS-based switch, but won't give you anything here.

If you're using CCA, the BPDU guard setting is enabled on all smartport roles except cisco-switch.  If you're configuring using the built-in web GUI, you can find the BPDU guard setting under the individual interfaces in the "Spanning Tree (STP) / Interface Settings" menu.
0
 
Infinite_ITCommented:
Thanks for the quick responce.

Found in the GUI menu
Security -> Traffic Control - > Storm Control
and to trun off port security  -> Port Security

0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

  • 4
  • 3
  • 2
  • +1
Tackle projects and never again get stuck behind a technical roadblock.
Join Now