Guest

Preview Tool

Cisco Bug: CSCvt02249 - Nexus 3548: IOS devices connected via vPC error-disable port-channels after NX-OS upgrade

Last Modified

Sep 29, 2020

Products (1)

  • Cisco Nexus 3000 Series Switches

Known Affected Releases

7.0(3)I7(7)

Description (partial)

Symptom:
A Cisco Nexus 3524 or 3548 switch that was recently upgraded to NX-OS 7.0(3)I6(1) or 7.0(3)I7(1) and later that is configured in a vPC domain with the Peer Switch feature enabled will originate Spanning Tree BPDU packets sourced from a MAC address with a different OUI (0026.0bxx.xxxx) than the vPC peer running the previous NX-OS software release (OUI 0026.fxxx.xxxx). This will cause Cisco IOS-based devices (such as Cisco Catalyst switches) that are connected via a vPC to error-disable their port-channel interfaces due to EtherChannel Guard, which is enabled by default.

Conditions:
1. Cisco Nexus 3524 or 3548 switches configured in a vPC domain with the vPC Peer Switch feature enabled.
2. One of the Cisco Nexus 3524 or 3548 switches was recently upgraded to NX-OS software release 7.0(3)I6(1) or 7.0(3)I7(1) and later.
3. Cisco IOS-based devices are connected to both vPC peers via a vPC.
4. Cisco IOS-based devices error-disable their port-channel interfaces due to Etherchannel Misconfig Guard after the upgraded Cisco Nexus 3524 or 3548 comes back online.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.