cisco loop0 cisco是什么么

用心创造滤镜
扫码下载App
汇聚2000万达人的兴趣社区下载即送20张免费照片冲印
扫码下载App
温馨提示!由于新浪微博认证机制调整,您的新浪微博帐号绑定已过期,请重新绑定!&&|&&
LOFTER精选
网易考拉推荐
用微信&&“扫一扫”
将文章分享到朋友圈。
用易信&&“扫一扫”
将文章分享到朋友圈。
阅读(892)|
用微信&&“扫一扫”
将文章分享到朋友圈。
用易信&&“扫一扫”
将文章分享到朋友圈。
历史上的今天
loftPermalink:'',
id:'fks_',
blogTitle:'关于cisco errdisable',
blogAbstract:'show inter status  show inter status err  show errdisable recovery   errdisable recovery cause ?   (config)#no errdisable detect cause all  errdisable recovery interval 300  (config-if)#no keep  交换机端口假死(err-disable)解决方法  --------------------------------------------------------------------------------   17:03:41 标签:   [推送到技术圈]',
blogTag:'',
blogUrl:'blog/static/',
isPublished:1,
istop:false,
modifyTime:0,
publishTime:1,
permalink:'blog/static/',
commentCount:0,
mainCommentCount:0,
recommendCount:0,
bsrk:-100,
publisherId:0,
recomBlogHome:false,
currentRecomBlog:false,
attachmentsFileIds:[],
groupInfo:{},
friendstatus:'none',
followstatus:'unFollow',
pubSucc:'',
visitorProvince:'',
visitorCity:'',
visitorNewUser:false,
postAddInfo:{},
mset:'000',
remindgoodnightblog:false,
isBlackVisitor:false,
isShowYodaoAd:false,
hostIntro:'',
hmcon:'1',
selfRecomBlogCount:'0',
lofter_single:''
{list a as x}
{if x.moveFrom=='wap'}
{elseif x.moveFrom=='iphone'}
{elseif x.moveFrom=='android'}
{elseif x.moveFrom=='mobile'}
${a.selfIntro|escape}{if great260}${suplement}{/if}
{list a as x}
推荐过这篇日志的人:
{list a as x}
{if !!b&&b.length>0}
他们还推荐了:
{list b as y}
转载记录:
{list d as x}
{list a as x}
{list a as x}
{list a as x}
{list a as x}
{if x_index>4}{break}{/if}
${fn2(x.publishTime,'yyyy-MM-dd HH:mm:ss')}
{list a as x}
{if !!(blogDetail.preBlogPermalink)}
{if !!(blogDetail.nextBlogPermalink)}
{list a as x}
{if defined('newslist')&&newslist.length>0}
{list newslist as x}
{if x_index>7}{break}{/if}
{list a as x}
{var first_option =}
{list x.voteDetailList as voteToOption}
{if voteToOption==1}
{if first_option==false},{/if}&&“${b[voteToOption_index]}”&&
{if (x.role!="-1") },“我是${c[x.role]}”&&{/if}
&&&&&&&&${fn1(x.voteTime)}
{if x.userName==''}{/if}
网易公司版权所有&&
{list x.l as y}
{if defined('wl')}
{list wl as x}{/list}Cisco Nexus 5000 Troubleshooting Guide - Troubleshooting Layer 2 Switching Issues [Cisco Nexus 5000 Series Switches] - Cisco
Downloads:
(PDF - 191.0 KB)
(PDF - 1.75 MB)
Troubleshooting Layer 2 Switching Issues
Layer 2 is the Data Link Layer of the Open Systems Interconnection model (OSI model) of computer networking.
This chapter describes how to identify and resolve problems that can occur with Layer 2 switching in the Cisco Nexus 5000 Series switch.
This chapter includes the following sections:
Data is not getting forwarded, instead it is being flooded to all ports of a VLAN.
Possible Cause
MAC address learning is disabled because of loop detection. A severity 2 syslog message, STM_LOOP_DETECT, should have been received.
After waiting for 180 seconds, learning is enabled automatically. A severity 2 syslog message, STM_LEARNING_RE_ENABLE, should be received.
Possible Cause
The MAC address table is full. A severity 2 syslog message, STM_LIMIT_REACHED, should have been received.
After waiting for 180 seconds, the MAC table is flushed and learning is enabled automatically.
Alternatively, wait until some MAC entries are aged out, so that the total learned entries fall below 1500, or enter the
clear mac address-table dynamic [address
] command to clear out entries. This creates free space for new MAC entries to be learned. A severity 2 syslog message, STM_LEARNING_RE_ENABLE, should be received.
Possible Cause
MAC address learning is disabled due to a learning overload (that is, too many new addresses in a short time). A severity 4 syslog message, STM_LEARNING_OVERLOAD, should have been received.
After waiting for 120 seconds, learning is enabled automatically.
MAC address is not learned by the switch. This causes the MAC address not to be listed in the MAC table.
Possible Cause
MAC address learning is disabled because of loop detection. A severity 2 syslog message, STM_LOOP_DETECT, should have been received.
After waiting for 180 seconds, learning is enabled automatically. A severity 2 syslog message, STM_LEARNING_RE_ENABLE, should be received.
Possible Cause
The MAC address table is full. A severity 2 syslog message, STM_LIMIT_REACHED, should have been received.
After waiting for 180 seconds, the MAC table is flushed and learning is enabled automatically.
Alternatively, wait until some MAC entries are aged out, so that the total learned entries fall below 1500, or enter the
clear mac address-table dynamic [address
] command to clear out entries. This creates free space for new MAC entries to be learned. A severity 2 syslog message, STM_LEARNING_RE_ENABLE, should be received.
Possible Cause
MAC address learning is disabled due to a learning overload (that is, too many new addresses in a short time). A severity 4 syslog message, STM_LEARNING_OVERLOAD, should have been received.
After waiting for 120 seconds, learning is enabled automatically.
Possible Cause
No egress path was set for the incoming data traffic. The MAC address from a data stream is not learned if there is no path for that data going out of the switch.
Configure an outgoing path for the data.
For example, the VLAN may not have been enabled on any of the interfaces other than the one on which data is coming in on. Alternatively, the outgoing interfaces may be down. If this is the case, you need to bring up those interfaces.
Data is not getting forwarded, instead it is being flooded in the presence of a VPC scenario.
Possible Cause
The MAC address is learned on one switch only. Typically, this situation would be a bug regarding the synchronization of the MAC address with the VPC peer.
Clear the MAC address from the switch where it was learned. This triggers new learning and synchronization of the MAC addresses across the VPC switches.
HIFs go down accompanied with the message, BPDUGuard errDisable.
Possible Cause
By default, the HIFs are in STP edge mode with the BPDU guard enabled. This means that the HIFs are supposed to be connected to hosts or non-switching devices. If they are connected to a non-host device/switch that is sending BPDUs, the HIFs become error-disabled upon receiving a BPDU.
Enable the BPDU filter on the HIF and on the peer connecting device. With the filter enabled, the HIFs do not send or receive any BPDUs. Use the following commands to confirm the details of the STP port state for the port:
show spanning-tree interface
show spanning-tree interface
When FWM-2-STM_LOOP_DETECT is detected on the switch, dynamic learning is disabled.
Possible Cause
MAC addresses are moving because of incorrect STP-port state convergence.
MAC addresses are moving because the source of the data being physically moved across all switches while STP states are converged and in correct states.
Use the following commands to verify the STP port state across VLANS on the switches:
show spanning-tree
show spanning-tree vlan
Check for a correct STP convergence and for STP port states across all switches in the topography. Also confirm that there are no disputes or incorrect port states.
If the source of the data frames, which are physically moving, is identified, then control the source to halt rapid and continuous moves.
By default, dynamic learning is opened after 180 seconds. At that point, any STP disputes or inconsistencies should be resolved.
A port is stuck in STP blocking state with BLK*(Type_Inc).
Possible Cause
A type inconsistency might exist on an access port when it is connected to a trunk port on the other end. The port becomes BLK*(Type_Inc) to indicate that there is an incorrect configuration on the link. Use the following commands to confirm the details of the STP port state for the port:
show spanning-tree interface
show spanning-tree interface
Check the switch port modes configured at both ends (ports) of the link. Ensure that they are in the same mode. Both should be in access or trunk mode. Once the modes are synchronized, the port moves out of the inconsistency state.
A port is stuck in STP blocking state with BLK*(PVID_Inc).
Possible Cause
A PVID inconsistency may exist when there is a native VLAN mismatch across a trunk link. When this occurs, the port state becomes BLK* (PVID_Inc). Use the following commands to confirm the details of the STP port state for the port:
show spanning-tree interface
show spanning-tree interface
Check the native VLAN configured at both ends (ports) of the link. Ensure that they have the same native VLAN. Once the native VLANs are synchronized, the port moves out of the inconsistency state.
A port is stuck in STP blocking state with BLK*(Loop_Inc).
Possible Cause
This situation occurs when the loop guard is configured on the port and the port stops receiving BPDUs. This is supposed to prevent loops when unidirectional link failures occur. However, the port is put into a BLK* (Loop_Inc) state. Use the following commands to confirm the details of the STP port state for the port:
show spanning-tree interface
show spanning-tree interface
Check the native VLAN configured at both ends (ports) of the link. Ensure that they have the same native VLAN. Once the native VLANs are synchronized, the port moves out of the inconsistency state.
The &STP port limit exceeded& error message occurs when the number of vlan-port instances exceeds the limit on trunk ports.
Possible Cause
This error signals a scalability limit for the Cisco Nexus 5000. The software calculates the number of STP VLAN port instances by multiplying the number of ports by the number of VLANs. The &STP port limit exceeded& error message occurs when the limit on trunk ports is exceeded is logged on the Cisco Nexus 5000 switch.
Note The calculation of STP VLAN port instances is not affected when either MST or RPVST+ is used.
Decrease the number of VLANs carried over trunk ports or decrease the number of active VLANs.
In this situation, the source MAC addresses of IGMP joins are learned. However, source MAC addresses of IGMP joins are usually not learned by the switch in order to conserve MAC address space.
Possible Cause
Receiving joins and performing an ISSU simultaneously might cause the situation.
The MAC addresses age out (expire) if the join stops. Alternatively, you can clear the MAC addresses specifically by using the
clear mac address-table dynamic mac
&mac& command.
Host does not receive multicast data traffic.
Possible Cause
The join is not registered.
Ensure that the host application is sending the joins.
Check if the switch port is configured for the VLAN on which the joins are being sent using the
show vlan id
&vlan& command.
Check if the relevant VLAN is active by using the
show vlan id
&vlan& command.
Check if the switch port is in STP forwarding state by using the
show spanning-tree vlan
&vlan& command.
Multicast data traffic is not received when the host is registered for the group.
Possible Cause
A bug may exist in exist in the communication between the IGMP and FWM processes.
Review the output from the following commands:
show ip igmp snooping groups vlan 1001
show mac address-table multicast vlan 1001 igmp-snooping
show platform fwm info vlan 1001 all_macgs verbose
Perform a shut/no-shut operation on the host interface and send the join again.
In a VPC setup multicast traffic is being flooded.
Possible Cause
IGMP snooping is disabled on one of the switches.
Enable IGMP snooping on both switches.
Note Groups for link local IP addresses (that is, 224.0.0.X) are not created.
VLANs for the Nexus 5000 are not the same as for the switch running the VTP server.
Possible Cause
The Nexus 5000 currently supports VTP only in transparent mode (4.2(1)N1(1) and later releases).
This situation indicates that VLANs must be configured locally. However a VTP client and server can both communicate through a Nexus 5000 by using the following commands:
switch(config)# feature vtp
switch(config)# vtp mode transparent
switch(config)# exit
switch# show vtp status
A VLAN cannot be created.
Possible Cause
An internal VLAN range is used.
Use a VLAN number that is not being reserved for internal use.
Note The VLAN range of 3968 to 4047 is reserved for internal use.
switch(config)# vlan ?
&1-93& VLAN ID 1-4094 or range(s): 1-5, 10 or 2-5,7-19
The interface VLAN is down.
Possible Cause
The VLAN was not created.
Although VLAN &###& is not yet created, the NX-OS allows the configuration of the
interface vlan
&###&. As a result, the
interface vlan
&###& does not come up. Use the
show vlan command to determine if VLAN &###& exists. If it does not exist, use the
&###& command to create the VLAN. After the VLAN is created, you must bounce the interface VLAN to have it come up.
switch(config)# interface vlan 600
switch(config-if)# no shutdown
switch(config-if)# show interface vlan 600 brief
-------------------------------------------------------------------------------
Interface Secondary VLAN(Type) Status Reason
-------------------------------------------------------------------------------
Vlan600 -- down other
switch(config)# show vlan id 600
VLAN 600 not found in current VLAN database
switch(config-if)# vlan 600
switch(config)# show vlan id 600
VLAN Name Status Ports
---- -------------------------------- --------- -------------------------------
600 VLAN0600 active Po1, Po11, Po30, Po31
switch(config-if)# interface vlan 600
switch(config-if)# shut
switch(config-if)# no shutdown
switch(config-if)# show interface vlan 600 brief
-------------------------------------------------------------------------------
Interface Secondary VLAN(Type) Status Reason
-------------------------------------------------------------------------------
Vlan600 -- up --
Possible Cause
VLAN was suspended by the vPC configuration on the Nexus 5000 pair.
Show that the vPC consistency parameters are global and make sure that the VLAN was not suspended. Otherwise, fix the configuration mismatch on the Nexus 5000 pair:
switch# sh vpc consistency-parameters global
Type 1 : vPC will be suspended in case of mismatch
Name Type Local Value Peer Value
------------- ---- ---------------------- -----------------------
QoS 1 ([], [3], [], [], [], ([], [3], [], [], [],
Network QoS (MTU) 1 (, 0, 0, 0, (, 0, 0, 0,
Network Qos (Pause) 1 (F, T, F, F, F, F) (F, T, F, F, F, F)
Input Queuing (Bandwidth) 1 (50, 50, 0, 0, 0, 0) (50, 50, 0, 0, 0, 0)
Input Queuing (Absolute 1 (F, F, F, F, F, F) (F, F, F, F, F, F)
Output Queuing (Bandwidth) 1 (50, 50, 0, 0, 0, 0) (50, 50, 0, 0, 0, 0)
Output Queuing (Absolute 1 (F, F, F, F, F, F) (F, F, F, F, F, F)
STP Mode 1 Rapid-PVST Rapid-PVST
STP Disabled 1 None None
STP MST Region Name 1 && &&
STP MST Region Revision 1 0 0
STP MST Region Instance to 1
VLAN Mapping
STP Loopguard 1 Disabled Disabled
STP Bridge Assurance 1 Enabled Enabled
STP Port Type, Edge 1 Normal, Disabled, Normal, Disabled,
BPDUFilter, Edge BPDUGuard Disabled Disabled
STP MST Simulate PVST 1 Enabled Enabled
Allowed VLANs - 1-2 1-2
Local suspended VLANs 2 -
After configuring an interface to access a port for allowing VLAN &###&, the VLAN &###& does not go through.
Possible Cause
The VLAN was not created.
In NX-OS, configuring with the
switchport access vlan
&###& command on an interface does not automatically create VLAN &###&. You must specifically create VLAN &###& using the
&###& command. Use the
show vlan command to determine if VLAN &###& exists. If it does not exist, then use the
&###& command to create the VLAN.
The VLAN cannot be created.
Possible Cause
All VLAN resources are exhausted.
For the Nexus 5000, the maximum number of active VLANs and VSANs per switch is 512 (31 reserved for VSAN; remainder reserved for VLAN). Use the
show resource vlan command to determine the number of available VLANs.
switch(config)# show resource vlan
Resource Min Max Used Unused Avail
----------- ----- ----- ------ -------- -------
vlan 16 512 25 0 487
The SVI cannot be created.
Possible Cause
The interface-vlan feature is not enabled.
The interface-vlan feature must be enabled before configuring the SVI. Use the
show feature command to determine which features are enabled.
switch(config)# feature interface-vlan
switch(config)# show feature
Feature Name Instance State
-------------------- -------- --------
tacacs 1 disabled
lacp 1 enabled
interface-vlan 1 enabled
private-vlan 1 enabled
udld 1 enabled
vpc 1 enabled
fcoe 1 disabled
fex 1 enabled
The private VLAN (PVLAN) cannot be created.
Possible Cause
The private-vlan feature is not enabled.
The private-vlan feature must be enabled prior to PVLAN configuration, which makes the PVLAN command available. Use the
show feature command to determine which features are enabled.
switch(config)# feature private-vlan
switch(config)# show feature
Feature Name Instance State
-------------------- -------- --------
tacacs 1 disabled
lacp 1 enabled
interface-vlan 1 enabled
private-vlan 1 enabled
udld 1 enabled
vpc 1 enabled
fcoe 1 disabled
fex 1 enabled
The “SFP validation failed” error message occurs.
Possible Cause
This error message might occur when a 1-Gigabit SFP transceiver is inserted into a port without configuring the interface speed to 1000 mb.
By default, all ports of a Cisco Nexus 5000 switch have an interface speed of 10 Gigabits.
Set the interface speed to 1000 mb.
Possible Cause
This error message might occur when a Fabric Extender Transceiver (FET) SFP is inserted into a non-fex-fabric mode port.
FETs are only supported on fex-fabric port connections when connecting a Cisco Nexus 2000 FEX to it's parent Cisco Nexus 5000 switch. The switch port on the parent switch must be enabled for fex-fabric mode with the
switchport mode fex-fabric command.
There are logical and physical causes for the Nexus 5000 to drop a frame. There are also situations when a frame cannot be dropped because of the cut-through nature of the switch architecture. If a drop is necessary, but the frame is being switched in a cut-through path, then the only option is to stomp the Ethernet frame check sequence (FCS). Stomping a frame involves setting the FCS to a known value that does not pass a CRC check. This causes subsequent CRC checks to fail later in the path for this frame. A downstream store-and-forward device, or a host, will be able to drop this frame.
Note When a frame is received on a 10 Gb/s interface, it is considered to be in the cut-through path.
The following example output shows all discards and drops seen on a given interface, except for queuing drops. The queuing drops may be expected or resulting from errors. (Drops are more common than discards.)
switch# show platform fwm info pif ethernet 1/1...
Eth1/1 pd: tx stats: bytes
frames 213263 discard 0 drop 0
Eth1/1 pd: rx stats: bytes 388957 frames 4232 discard 0 drop 126
For some commands, you need to know on which chip your port resides.
In the following example, the chip is called Gatos. The example shows which Gatos and which Gatos port is associated with ethernet 1/1.
switch# show hardware internal gatos port ethernet 1/1 | include
instance|mac
gatos instance : 7 &- Gatos 7
mac port : 2 &- Port 2
fw_instance : 2
During normal operation, the Nexus 5000 encounters frames that cannot be forwarded based on logical conclusions.
For example, if you learn a MAC address on a given interface and receive traffic on that interface with a destination MAC address on the source interface, then you cannot forward the frame. Because it is a known address and cannot be flooded, you can never send traffic out from where it came. This is a requirement to avoid looping Layer 2 topologies.
The error counter, shown in the following example, increments when the ingress port is the only port in the VLAN.
Example (same Gatos instance as in earlier example):
switch# show platform fwm info gatos-errors 7
Printing non zero Gatos error registers:
DROP_SRC_MASK_TO_NULL 9
Note The show platform fwm info gatos-errors command increments 3 times for a given drop.
Other expected drops
VLAN_MASK_TO_NULL
Traffic destined for the CPU
not actually a VLAN.
DROP_NO_FABRIC_SELECTED
Increments with VLAN_MASK_TO_NULL.
DROP_INGRESS_ACL
Increments for an access list matching the frame.
If an ACL is not applied, this will increment if a large amount of CPU-bound traffic is being received, and the rate limit in the hardware is enabled to protect NX-OS from Denial of Service.
When a queue is full, you need to increment discards in the respective queue on the ingress interface.
switch# show queuing interface ethernet 1/1
Ethernet1/1 queuing information:
TX Queuing
qos-group sched-type oper-bandwidth
RX Queuing
qos-group 0
q-size: 243200, HW MTU:
configured)
drop-type: drop, xon: 0, xoff: 1520
Statistics:
Pkts received over the port : 0
Ucast pkts sent to the cross-bar : 0
Mcast pkts sent to the cross-bar : 0
Ucast pkts received from the cross-bar : 0
Pkts sent to the port : 0
&b& Pkts discarded on ingress : 0 &/b&
Per-priority-pause status : Rx (Inactive), Tx
(Inactive)
qos-group 1
q-size: 76800, HW MTU:
configured)
drop-type: no-drop, xon: 128, xoff: 240
Statistics:
Pkts received over the port : 0
Ucast pkts sent to the cross-bar : 0
Mcast pkts sent to the cross-bar : 0
Ucast pkts received from the cross-bar : 0
Pkts sent to the port : 0
&b& Pkts discarded on ingress : 0 &/b&
Per-priority-pause status : Rx (Inactive), Tx
(Inactive)
Total Multicast crossbar statistics:
Mcast pkts received from the cross-bar : 0
The Nexus 5000 is a cut-through switch at 10 Gb/s. This means that an MTU can be checked, but the frame will already be transmitting before the length is known. Therefore, the frame cannot be dropped. The frame is truncated after the MTU is reached and the CRC value is stomped. The ingress interface increments an Rx Jumbo and the egress interface will increment a Tx CRC and a Tx Jumbo.
If jumbo frames are seen with the
show interface or the
show hardware internal gatos port ethernet 1/1 counters rx commands, this is not an indication that the frames are being dropped. A jumbo frame is just an Ethernet frame, greater than 1500 bytes, that was received or transmitted.
show queuing interface
&/i&&/b& command shows the current configured MTU (per class).
A drop due to an MTU violation can be seen with the
show hardware internal gatos counters interrupt match mtu* command.
A counter that matches the Gatos number and fw_instance from the
show hardware internal gatos port ethernet 1/1 | include instance|mac command is the indicator that an MTU violation has taken place and that the frame has been stomped.
When a CRC error is seen in the FCS on a cut-through port, the Rx CRC counter of the
show interface command is incremented. However, the frame cannot be dropped because the FCS is at the end of the Ethernet frame on the wire.
The egress interface increments a Tx CRC error and it propagates through to the next device in the path.
You can use the
show hardware internal gatos counters interrupt match stomp command to determine if the Nexus 5000 is propagating CRCs or generating them.
If stomp values exist, they should have matching CRC values on that interface.
If Rx CRC values exist, then you know it entered the switchport with the error already. You can move on to the connected device to trace it back.
During normal operation, a Nexus 5000 encounters frames that cannot be forwarded.
Frames are characterized as good frames or bad frames.
A good frame is a frame that does not have a CRC error or other kind of error
A bad frame is a frame that has a CRC error or other kind of error
All counters include MAC Control frames where applicable.
MAC TX Statistics
TX_PKT_LT64
Number of frames (good and bad frames) with transmit packet size less than 64 bytes.
Number of frames (good and bad frames) with transmit packet size equal to 64 bytes.
Number of frames (good and bad frames) with transmit packet size between 65 and 127 bytes.
TX_PKT_128
Number of frames (good and bad frames) with transmit packet size between 128 and 255 bytes.
TX_PKT_256
Number of frames (good and bad frames) with transmit packet size between 256 and 511 bytes.
TX_PKT_512
Number of frames (good and bad frames) with transmit packet size between 512 and 1023 bytes.
TX_PKT_1024
Number of frames (good and bad frames) with transmit packet size between 1024 and 1518 bytes.
TX_PKT_1519
Number of frames (good and bad frames) with transmit packet size between 1519 and 2047 bytes.
TX_PKT_2048
Number of frames (good and bad frames) with transmit packet size between 2048 and 4095 bytes.
TX_PKT_4096
Number of frames (good and bad frames) with transmit packet size between 4096 and 8191 bytes.
TX_PKT_8192
Number of frames (good and bad frames) with transmit packet size between 8192 and 9216 bytes.
TX_PKT_GT9216
Number of frames (good and bad frames) with transmit packet size greater than 9216 bytes.
TX_PKTTOTAL
Total number of frames (good and bad frames) transmitted.
This number is the sum of all transmitted packets regardless of frame length.
Total byte count of packet octets (good and bad frames) transmitted.
Number of good frames transmitted.
Number of good unicast frames transmitted.
Number of good multicast frames transmitted.
Number of good broadcast frames transmitted.
Number of good 802.1Q tagged VLAN frames transmitted.
Number of 802.3x PAUSE frames transmitted.
TX_USER_PAUSE
Number of transmitted priority flow control frames.
TX_FRM_ERROR
Number of frames with
cl_im_tx_err set to 1 at EOP.
TX_OCTETSOK
Total byte count of good frames.
MAC RX Statistics
RX_PKT_LT64
Number of frames (good and bad frames) with receive packet size less than 64 bytes.
Number of frames (good and bad frames) with receive packet size equal to 64 bytes.
Number of frames (good and bad frames) with receive packet size between 65 and 127 bytes.
RX_PKT_128
Number of frames (good and bad frames) with receive packet size between 128 and 255 bytes.
RX_PKT_256
Number of frames (good and bad frames) with receive packet size between 256 and 511 bytes.
RX_PKT_512
Number of frames (good and bad frames) with receive packet size between 512 and 1023 bytes.
RX_PKT_1024
Number of frames (good and bad frames) with receive packet size between 1024 and 1518 bytes.
RX_PKT_1519
Number of frames (good and bad frames) with receive packet size between 1519 and 2047 bytes.
RX_PKT_2048
Number of frames (good and bad frames) with receive packet size between 2048 and 4095 bytes.
RX_PKT_4096
Number of frames (good and bad frames) with receive packet size between 4096 and 8191 bytes.
RX_PKT_8192
Number of frames (good and bad frames) with receive packet size between 8192 and 9216 bytes.
RX_PKT_GT9216
Number of frames (good and bad frames) with receive packet size greater than 9216 bytes.
RX_PKTTOTAL
Total number of frames (good and bad frames) received.
This number is the sum of all received packets regardless of frame length.
Total byte count of packet octets (good and bad frames) received.
Number of good frames received.
Number of good unicast frames received.
Number of good multicast frames received.
Number of good broadcast frames received.
Number of good 802.1Q tagged VLAN frames received.
RX_OVERSIZE
Number of good frames received that are greater than CFG_xg_rx_stats_max_frame_len.
RX_TOOLONG
Number of frames (good and bad frames) received that are greater than CFG_xg_rx_stats_max_frame_len.
RX_DISCARD
The value of this counter is always 0.
RX_UNDERSIZE
Number of good frames received that are less than CFG_xg_rx_stats_min_frame_len.
RX_FRAGMENT
Number of bad frames received that are less than CFG_xg_rx_stats_min_frame_len.
RX_CRCERR_NOT_STOMPED
Number of bad frames received that are not stomped.
RX_CRCERR_STOMPED
Number of bad frames received that are stomped.
RX_INRANGEERR
Number of frames with a length field check error, but no CRC error. Note Frame length is based on the contents of the ethertype/length field. When the ethertype/length field is less than 0x600, the contents of the field is treated as the length of the frame. This length is compared with the actual frame length. An error is raised when the lengths do not match.
Number of bad frames received with frame length greater than CFG_xg_rx_stats_max_frame_len.
Number of good 802.3x MAC control frames received.
RX_USER_PAUSE
Number of good priority flow control frames received.
RX_OCTETSOK
Total byte count of good frames.}

我要回帖

更多关于 cisco ios xe 是什么 的文章

更多推荐

版权声明:文章内容来源于网络,版权归原作者所有,如有侵权请点击这里与我们联系,我们将及时删除。

点击添加站长微信