Hello, We have multiple N320's connected to a managed 100Gbps switch. Each switch port has a QSFP -- so 4 10Gbps connections per port. We're connecting and using both 10Gbps SFP interfaces on each N320 radio to the switch. Basically, one 100Gbps port on the switch will handle 2 N320's via the QSFP. This has been working reliably for over a year using UHD 4.1.0.5.
Recently, we updated to UHD 4.4.0.0. Now, everything seems to work fine for a finite amount of time (hours/days), but then port security on our switch gets tripped for one of the ports. That radio's corresponding SFP interface is then unusable until that port gets reset on our managed switch. What seems to be happening is that our switch is configured to only allow 1 MAC address per "interface". If a different MAC address ever shows up, port security trips. Due to security constaints, we're required to run with this MAC limitation. To debug this issue, our network administrators temporarily increased the number of allowed MAC addresses per 10Gbps interface to be set to 3 instead of 1. They were able to see in switch logs that eventually a MAC other than that programmed in the N320s EEPROM showed up on that port. The offending MAC (not the proper MAC for that SFP N320 SFP interface) was "00:00:b8:ce:f6:22". We can't figure out where this is coming from, and haven't been able to determine if this happens when rebooting a radio, loading the FPGA, bringing up the SFP interfaces, randomly during streaming, or what. A thought is that at some point (when the FPGA is programmed and or the SFP interface comes up) some garbage bits come out of the interface -- maybe the switch interprets this as some sort of malformed packet? I've been running tests at my desk with an N320 connected directly to a 10Gbps interface on my desk PC trying to somewhat reproduce the issue. I've been running loops that reboot the N320, stream samples from the N320, reboot while streaming, try to start streaming before the SFP interface is up, etc, etc. With wireshark I've been watching and have not seen any packets with MACs other than the proper MAC that the N320 should assign to that interface. However we're wondering if maybe we wouldn't see a malformed packet on wireshark (might get blocked by the interface and not get passed up the stack?). However, maybe in our normal setup the CISCO switch might see it? We haven't been able to get logs from the switch that show anything beyond the fact that another MAC showed up on that port at some point. Sorry for all the words, but this has been a tough one to debug/reproduce. We've had these issues with all 5 N320s we have connected to the switch. Again, we never saw this before updating to UHD 4.4.0.0. So either this is related to N320 behavior that changed when updating UHD 4.4.0.0 or something else coincidentally happened at/around the same time as the update. If anyone has any ideas it would be appreciated. Thanks, Jim
_______________________________________________ USRP-users mailing list -- usrp-users@lists.ettus.com To unsubscribe send an email to usrp-users-le...@lists.ettus.com