Skip to main content

Troubleshooting 4500 Series Switches

This document will outline some basic troubleshooting steps and issues that I have found out over the years about 4500 Series Switches, specifically Supervisors 4-5, but it is mainly relevant for all models.

Additional Reading:
BRKCRS-3142 - Troubleshooting Cisco 4500 Series Switches

Scope
The scope of items that are being impacted, such as in an test environment 1 Core Switch, to two Distribution to then two Access switches per Distribution switch always keep in mind of where the issue is occurring and what is being impacted. Some of the situations below I will mention if its common for all devices to be impacted, or only certain ones. Please note that this is not necessarily Cisco's best practice, but it is how I have it setup when testing/experiences was issued.



High CPU Process Troubleshooting
Typical Causes:
a) Multicast Traffic (IGMP)
b) Spanning-Tree Traffic
c) Consecutive Port Changes (Port-Flapping)

Enabling CPU "Output" to a Wireshark Session
1. From CLI issue the following commands, these commands will take the CPU as the Source and output it to an Interface so it can be traced using Wireshark:
monitor session 1 source cpu
monitor session 1 destination interface Gi1/1

2. Once that is completed you then can simply use Wireshark to get the details on what the CPU is processing at that time.

How to Fix "Multicast Traffic"
Using the CPU output/Wireshark from above, as soon as you attach the trace to the switch, you will then be able to see all of the traffic. When Multicast Traffic is the problem, it will typically be very noticeable almost immediately as the way that the traffic path leaves from the device  (L2) causing the issue will impact all of the switches from there to the upstream gateway (L3). Which is why you should either design your network as Distribution Layer is L3, or if you require that your Access Layer/Distribution layer is all Layer 2, then you take the above as a risk.

Using the Wireshark, you will see traffic coming from a specific source going to a Multicast destination, and typically if there is an issue with it, you will be able to see that its not a small amount of traffic. As each of these packets pass through the network, your switches require direct CPU processing, and cannot be offloaded to the ASIC for quick processing. Once you find the device causing the issue, simply shut down that user's port and see the network start to recover, and then you can perform an analysis on what may have caused this.

Spanning Tree & Port Changes
In the example above, I ran into an odd issue where STP was causing problems due to constant re-convergence/notifications. This was with Rapid-PVST+ and it being the Root. Now in this situation it made sense, but basically had a problem where one of the EtherChannel ports was a one blade, and then another port was on another blade. The switch had a hardware failure causing the blade to fail outright, shutting down all of the ports that was plugged into it, including the port for the etherchannel, which caused the convergence. The switch then attempted after a period of time to bring the blade back up, causing it to re-convergence again. So best lesson learned here is if you are having STP issues where high CPU is coming into one of your switches check to make sure its not a reconvergence issue due to port flapping or hardware problems. If its also generating from two switches, verify the legs/connectivity between them.

Another common and recommended thing, is check for any associated trunk ports attached to that switch as it could have been a rogue switch plugged in. Common Commands:
show proc cpu hist
show proc cpu sorted
errdisable recovery cause
show cdp neighbors
show interface trunk 

More information will be added as things break :)

Comments

Popular posts from this blog

Fortigate to USG B2B

Building Site-to-Site B2B from Unifi USG to Fortigate (500D or other models) Fortigate Configuration 1. Build a New VPN Tunnel using Custom VPN Tunnel (No Template) 2. Under Network, point to the Public Side IP of the USG (Public IP, not WAN interface) 3. Leave everything else default (NAT-T Enabled, DPD Disabled..ect) 4. Authentication, use PSK and IKEv1 with Main 5. Phase 1 Purposal, set algorithms to AES128 and SHA1, with DH 14. 6. Phase 2 Purposal, set Local Address and Remote address to 0.0.0.0/0.0.0.0 and 0.0.0.0/0.0.0.0 respectively. 7. Set Encryption to AES128/Sha1, Replay Detection and PFS enabled, along with DH14. Enable Autokey Keep Alive, and Auto-Negotiate, and save changes. 8. Build a Static Route pointing to the Far-End Destination/Segment you want to reach. 9. Build a Policy Stating which Segments can hit the Far-End Destination/B2B USG Configuration 1. This is assuming that USG is already registered to the Unifi Controller. 2. Go t

How to setup a Host-Check for Fortigate SSL VPN

This document outlines how to setup a host-check for a Fortigate SSL VPN (Web only): config vpn ssl web portal edit "portalname" set web-mode enable set host-check custom set host-check-policy "Microsoft-Windows-Firewall" set os-check-enable set ip-pools "PoolName" set split-tunneling disable set page-layout double-column set theme orange config os-check-list "windows-7" set action check-up-to-date set latest-patch-level 1 end  config vpn ssl web host-check-software edit "Microsoft-Windows-Firewall" config check-item-list edit 1 set target "HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile:EnableFirewall==1" set type registry next edit 2 set target "HKLM\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\PublicProfile:EnableFirewall==1" set type registry next edit 3 set target "HKLM\\SYSTEM\\CurrentControlSet\\S

Implementing 802.1X - Windows 2012R2 + Cisco 4500 Switches

Implementing 802.1X Using Windows Server 2012R2 & Cisco 4500 Series Switches Overview: This document is to outline how the configuration between Windows Server 2012 R2’s NPS Services and Cisco 4500 Series switches has been implemented. High Level Diagram:   Requirements: Windows Server 2012 R2 with NPS Server installed Windows Server 2012 R2 with CA Services Windows AD Environment Cisco 4500 Series Switches Windows 7-10 Clients to connect NPS Configuration: 1. This assumes the above requirement that the NPS Service has already been installed on Windows Server 2012 R2 2. Disable all existing Policies under Connection Request Policies and Network Policies as you will be making your own, except one that states “Catch All” with the below parameters: 3. You will then need to add in a new Radius Client to have Policies built around. Friendly Name will be used going forward for the Policies for referencing the document. 4. Once completed, re