Preview Tool

Cisco Bug: CSCvi25663 - RSTP topology change is not propagated between vPC peers if peer-switch is configured

Last Modified

Oct 09, 2019

Products (5)

  • Cisco Nexus 3000 Series Switches
  • Cisco Nexus 3548 Switch
  • Cisco Nexus 3548-X Switch
  • Cisco Nexus 3524 Switch
  • Cisco Nexus 3524-X Switch

Known Affected Releases


Description (partial)

When RSTP topology change event is detected on a vPC domain member switch and vPC domain members (vPC peers) are configured with the "peer-switch", the information about the topology change is not propagated between the vPC peers. As a result, the MAC address tables of the vPC peer switches are not properly flushed, and the topology change information is not correctly propagated via RSTP through the vPC members to other switches. Consequently, the stale entries in MAC address tables can lead to traffic blackholing and loss of connectivity.

In particular, on the vPC domain member switch that has detected the RSTP topology change, the MAC address table entries pointing out the peer-link will not be flushed. Additionally, its vPC peer will not be informed about the topology change via RSTP, and will not propagate this topology change information via RSTP to other switches.

1.) The vPC peers are configured with "peer-switch"
2.) The vPC peers are running Rapid-PVST
3.) A vPC domain member detects an RSTP topology change
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.