HP 6125G HP 6125G & 6125G/XG Blade Switches Layer 2 - LAN Switching Co - Page 33

loopback-detection enable

Page 33 highlights

loopback-detection enable Syntax loopback-detection enable View undo loopback-detection enable System view, Ethernet interface view Default level 2: System level Parameters None Description Use loopback-detection enable to enable loopback detection globally in system view or on interfaces in Ethernet interface. To use loopback detection on an Ethernet interface, you must enable the function both globally and on the port. Use undo loopback-detection enable to disable loopback detection globally or on Ethernet interfaces. The undo loopback-detection enable command in system view disables loopback detection on all interfaces. By default, loopback detection is disabled on all Ethernet interfaces. If an interface receives a packet that it sent out, a loop has occurred. Loops may cause broadcast storms, which degrade network performance. You can enable loopback detection to detect loops on an interface and, if the interface supports the loopback-detection action command, configure the protective action (shut down the port, for example) to take on the interface when a loop is detected. In addition to the configured protective action, the switch also performs other actions to alleviate the impact of the loop condition. For more information, see Table 10. Table 10 Actions to take upon detection of a loop condition Port type Access port Hybrid or trunk port Actions No protective action is configured • Place the interface in controlled mode. The interface does not receive or send packets. • Generate traps. • Delete all MAC address entries of the interface. • Generate traps. • If loopback detection control is enabled, set the interface in controlled mode. The interface does not receive or send packets. • Delete all MAC address entries of the interface. A protective action is configured • Perform the configured protective action. • Generate traps and log messages. • Delete all MAC address entries of the interface. • Generate traps and log messages. • If loopback detection control is enabled, take the configured protective action on the interface. • Delete all MAC address entries of the interface. Related commands: loopback-detection control enable. 25

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245

25
loopback-detection enable
Syntax
loopback-detection enable
undo loopback-detection enable
View
System view, Ethernet interface view
Default level
2: System level
Parameters
None
Description
Use
loopback-detection enable
to enable loopback detection globally in system view or on interfaces in
Ethernet interface. To use loopback detection on an Ethernet interface, you must enable the function both
globally and on the port.
Use
undo loopback-detection enable
to disable loopback detection globally or on Ethernet interfaces.
The
undo loopback-detection enable
command in system view disables loopback detection on all
interfaces.
By default, loopback detection is disabled on all Ethernet interfaces.
If an interface receives a packet that it sent out, a loop has occurred. Loops may cause broadcast storms,
which degrade network performance. You can enable loopback detection to detect loops on an
interface and, if the interface supports the
loopback-detection action
command, configure the protective
action (shut down the port, for example) to take on the interface when a loop is detected.
In addition to the configured protective action, the switch also performs other actions to alleviate the
impact of the loop condition. For more information, see
Table 10
.
Table 10
Actions to take upon detection of a loop condition
Port type
Actions
No protective action is configured
A protective action is configured
Access port
Place the interface in controlled mode. The
interface does not receive or send packets.
Generate traps.
Delete all MAC address entries of the
interface.
Perform the configured protective
action.
Generate traps and log messages.
Delete all MAC address entries of the
interface.
Hybrid or trunk
port
Generate traps.
If loopback detection control is enabled, set
the interface in controlled mode. The
interface does not receive or send packets.
Delete all MAC address entries of the
interface.
Generate traps and log messages.
If loopback detection control is
enabled, take the configured
protective action on the interface.
Delete all MAC address entries of the
interface.
Related commands:
loopback-detection control enable
.