Locating the fault when the MSTP status of a WLAN device is abnormal

4

When the MSTP status of a WLAN device is abnormal, perform the following operations to locate the fault:
1. Check whether configurations on each interface of the device are correct. The configurations of interfaces in the same MST domain must be the same.
2. Run the debugging stp [ interface interface-type interface-number ] packet { all | send | receive } command to check whether each interface properly sends and receives STP packets.
3. If the fault persists, collect log, alarm, and debugging information, and contact Huawei technical personnel.

Other related questions:
Is the MSTP status of interfaces affected when the MSTP status of a member interface in the MST region changes
Yes. When the MSTP status of a member interface in the MST region changes, the device recalculates the MSTP status of all member interfaces in the MST region.

STP abnormal status locating method on an AR router
If the STP status on an AR router is abnormal, follow the procedure below for fault locating: 1. Check configuration of different interfaces. 2. Run the debug stp packet command to check STP packet receiving/transmission status on different interfaces. 3. If the fault cannot be located, collect logs, alarms, and debug information that are generated when the fault occurred, and contact Huawei engineers.

Problem and solution when the OSPF status is abnormal
To solve the problem that the OSPF status between the firewall and the peer device cannot reach the Full state, perform the following steps: 1. Check the OSPF status. Check whether the OSPF neighboring relationship can be established between the firewall and the peer device. 2. If no, check the security policy configuration. Check whether the security policy control function for unicast packets is enabled. That is, check whether the firewall packet-filter basic-protocol enable command is configured. If yes, run the undo firewall packet-filter basic-protocol enable command to disable the function. To establish an OSPF neighboring relationship, devices need to exchange DD packets. DD packets are OSPF unicast packets. By default, the forwarding of OSPF unicast packets is not controlled by security policies. However, if you run the firewall packet-filter basic-protocol enable command to enable the security policy control function for OSPF unicast packets, you need also to configure the corresponding security policy to allow the packets to be forwarded. For details, see OSPF can not step into full state caused by security policy deny.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top