H3C S6520X-HI Series Troubleshooting Manual page 44

Hide thumbs Also See for S6520X-HI Series:
Table of Contents

Advertisement

a. If the statistics are not zero, the following issues might have occurred:
− Inconsistent configuration—Verify that the local and peer ports have the same
configuration (including speed and duplex mode). If they are not the same, modify the
configuration of the local port.
− Interface hardware failure—To test such a failure, connect the cable that is connected
to the local port to a correctly operating port (for example, Port A) with the same
configurations as the local port. If Port A forwards traffic correctly, you can determine
that the hardware of the local port fails. In this event, you must replace the local port with
a correctly operating port.
− Transceiver module, fiber, or twisted pair failure—To test and resolve such a failure,
replace the transceiver module, fiber, or twisted pair with a good one.
b. If the issue persists, contact H3C Support.
When you contact H3C Support, provide the following diagnostic information if packet loss
occurs on the chip port with which the interface is associated:
2.
Verify that packets are not mistakenly filtered out by ACLs:
a. Examine the ACL and QoS policy configurations for packet filtering on the port, on the VLAN
of the port, or globally. If packets are mistakenly filtered out, modify the ACL or QoS policy
configuration.
− To display the ACL configuration on the port for packet filtering, execute the display
packet-filter command.
− To display the QoS policy configuration on the port, execute the display qos policy
command.
− To display the QoS policy configuration on the VLAN of the port, execute the display
qos vlan-policy command.
− To display the global QoS policy configuration, execute the display qos policy
global command.
b. Verify that packets are not filtered out by ACLs automatically created by some features.
− Execute the display this command in Ethernet interface view to verify that the ip
source binding or ip verify source command is configured on the port. To
display source guard binding entries, execute the display ip source binding or
display ipv6 source binding command. If IP source guard is configured but the
packets match no entry, further troubleshoot the issue based on the way the binding
entries are created.
− Determine whether the port is configured with the portal authentication. If portal
authentication is configured, packets of users that fail to pass the portal authentication
will be dropped by the port. Use the display portal interface command to display
the portal configuration information of the specified VLAN interface. Determine whether
the portal authentication can be disabled based on the network conditions. To disable
the portal authentication, use the undo portal server server-name command in
VLAN interface view of the VLAN to which the port belongs.
− Use the display dot1x command to check whether 802.1X EAD assistant is enabled
on the interface.
If 802.1X EAD assistant is enabled on the interface, packets will be discarded for
unauthenticated users who access the network segments other than the Free IP.
− Determine whether MFF is configured on the VLAN to which the port belongs. Use the
display mac-forced-forwarding vlan command to display the MFF information
of the specified VLAN. If no gateway information is displayed in the output, verify that
ARP snooping is correctly configured based on the MFF operation mode.
41

Advertisement

Table of Contents
loading

Table of Contents