Solved

loop Guard /UDLD

Posted on 2016-08-26
5
56 Views
Last Modified: 2016-09-02
I need to verify if this is Correct:
 If L2 link (Trunk) exists between 2 switches. Loopguard /UDLP should be configured on every port on both  switches including on the ports linking the  switches (Trunk ports)

Thank you
0
Comment
Question by:jskfan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 29

Assisted Solution

by:Predrag Jovic
Predrag Jovic earned 400 total points
ID: 41772132
Yes, on ports between switches. Typically only one of those, since they are pretty similar.
0
 

Author Comment

by:jskfan
ID: 41772199
Yes, on ports between switches. Typically only one of those, since they are pretty similar.
On Trunk ports Only  ?
0
 

Assisted Solution

by:Vincent Zheng
Vincent Zheng earned 100 total points
ID: 41772257
0
 
LVL 29

Accepted Solution

by:
Predrag Jovic earned 400 total points
ID: 41772330
Yes, on trunk ports only since mechanism both enchansments are using is BPDU. If there is no BPDU on port link will be err-disabled (ports to any device that is not sending BPDU will be error disabled (UDLD will err-disable port only if aggressive mode is configured)).
0
 

Author Closing Comment

by:jskfan
ID: 41781998
Thank you Guys!
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco VOIP Question 1 66
Configuring NAT in ASA ver. 9.1 4 44
Ping issue with M.M.M.M 13 37
wifi security 11 37
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question