Cisco Bug: CSCvt02249 - Nexus 3548: IOS devices connected via vPC error-disable port-channels after NX-OS upgrade
Sep 29, 2020
- Cisco Nexus 3000 Series Switches
Known Affected Releases
Symptom: A Cisco Nexus 3524 or 3548 switch that was recently upgraded to NX-OS 7.0(3)I6(1) or 7.0(3)I7(1) and later that is configured in a vPC domain with the Peer Switch feature enabled will originate Spanning Tree BPDU packets sourced from a MAC address with a different OUI (0026.0bxx.xxxx) than the vPC peer running the previous NX-OS software release (OUI 0026.fxxx.xxxx). This will cause Cisco IOS-based devices (such as Cisco Catalyst switches) that are connected via a vPC to error-disable their port-channel interfaces due to EtherChannel Guard, which is enabled by default. Conditions: 1. Cisco Nexus 3524 or 3548 switches configured in a vPC domain with the vPC Peer Switch feature enabled. 2. One of the Cisco Nexus 3524 or 3548 switches was recently upgraded to NX-OS software release 7.0(3)I6(1) or 7.0(3)I7(1) and later. 3. Cisco IOS-based devices are connected to both vPC peers via a vPC. 4. Cisco IOS-based devices error-disable their port-channel interfaces due to Etherchannel Misconfig Guard after the upgraded Cisco Nexus 3524 or 3548 comes back online.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases