Version information:
S5300HI: V200R005C00SPC500 Patch: V200R005SPH017
S5320EI: V200R008C00SPC500 Patch: V200R008SPH015
Networking Overview:
Customer network’s MAC Address flapping, we can find this flapping source device. However, this device is not from customer's device. It is a customer's customer device and cannot be operated.
Network Topology:
Alarm Information:
Solution:
The MAC address anti-flapping test results of the S5300HI and S5320EI are as follows:
1.In Layer 2 forwarding scenarios, if loops exist on the downlinks, the MAC address of the uplink interface will be learned by the downlink interfaces, and a MAC address flapping alarm will be generated on the switch. After the mac-learning priority 1 command is configured on the uplink interface, if loops exist on the downlink, the MAC address of the uplink interface will not be learned by the downlink interfaces, and no MAC address flapping alarm is generated on the switch.
2.In QinQ scenarios, if loops exist on the downlinks, the MAC address of the uplink interface will be learned by the downlink interfaces, and a MAC address flapping alarm will be generated on the switch. After the mac-learning priority 1 command is configured on the uplink interface, if loops exist on the downlink, the MAC address of the uplink interface will not be learned by the downlink interfaces, and no MAC address flapping alarm is generated on the switch.