


Loop detection packets interval: 10 (unit 0.1 sec) ICX6450-48 Switch# sh loop-detection status This is what I see when there is no loop on the unmanaged switch: In my lab, I have a cable modem with a switch on the LAN side (thats the only unmanaged switch I have), connected to port 1/1/22 on my ICX6450. Notice the command under the interface 1/1/22. Ill be utilizing port 1/1/22 in this lab. You will have to depend on RSTP for the managed switch loops (RSTP being faster than STP). I created a loop in the downstream ICX and did not see the same results as what I have gotten below. I did test this with two ICXs, all ports in Vlan 1. Port down for 5 days 23 hours 24 minutes 25 seconds Hardware is 40GigabitEthernet, address is cc4e.2417.69bb (bia cc4e.2417. Loop-detection is a good solution for just this scenario.įirst, lets note that this command is for detecting loops in a downstream UNmanaged switches. This creates CPU havoc on the core and company downtime (for equipment, phones, server access, etc). I have seen on more than one occasion where someone creates a loop on one of these unmanaged switches, and literally brings down the whole network. This particular customer still has a lot of unmanaged switches in the network, and loop-protection would be a perfect solution for them. Git - Survival Commands - Become zero to Hero - gi.I know of a Brocade customer that really needs loop-detection implemented in the network.SAN Switch - Disabling the Telnet service on Broca.> ipfilter -delrule Block_telnet_23 -rule 2 -sip any -dp 23 -protp tcp -act deny > ipfilter -delrule Block_telnet_23 -rule 2 > ipfilter -clone Block_telnet_23 -from default_ipv4 > ipfilter -addrule Block_Telnet_ipv6 -tule 2 -sip any -dp 23 -proto tecp -act deny > ipfilter -addrule Block_Telnet_ipv4 -rule 2 -sip any -dp 23 -proto tcp -act deny Now, add rule to deny inbound connectivity to the fabric switch on tcp service port 23 > ipfilter -delrule Block_Telnet_ipv6 -rule 2Ĥ.
BROCADE SAN SWITCH DISABLED PORTS SERIES
> ipfilter -delrule Block_Telnet_ipv4 -rule 2 BROCADE CAMPUS FEATURE EXPLAINER SERIESThis series includes short videos on how to configure new and common features on the Brocade campus product lines. Run ipfilter-show to find out the current rile number which permits the connectivity. Now, you have to remove the existing rule to permit connectivity on tcp service port 23. > ipfilter -clone Block_Telnet_ipv6 -from default_ipv6ģ. > ipfilter -clone Block_Telnet_ipv4 -from default_ipv4 By default, IP filter policy can not be changed, so first clone the default policy. In order to implement the change, you have to modify IP Filter policy to disable inbound connectivity to tcp port.Ģ. As part of security hardening of the devices it need to be disabled. Disabling the Telnet protocol on Brocade SAN switchesīy default, telnet is enabled on Brocade SAN switches.
