
Chapter 17
| UniDirectional Link Detection Commands
– 484 –
Example
Console(config)#udld recovery-interval 15
Console(config)#
udld aggressive
This command sets UDLD to aggressive mode on an interface. Use the
no
form to
restore the default setting.
Syntax
[
no
]
udld aggressive
Default Setting
Disabled
Command Mode
Interface Configuration (Ethernet Port)
Command Usage
UDLD can function in two modes: normal mode and aggressive mode.
◆
In normal mode, determination of link status at the end of the detection
process is always based on information received in UDLD messages: whether
that’s information about the exchange of proper neighbor identification or the
absence of such. Hence, albeit bound by a timer, normal mode determinations
are always based on gleaned information, and as such are “event-based.” If no
such information can be obtained (e.g., because of a bidirectional loss of
connectivity), UDLD follows a conservative approach to minimize false
positives during the detection process and deems a port to be in
“undetermined” state. In other words, normal mode will shut down a port only
if it can explicitly determine that the associated link is faulty for an extended
period of time.
◆
In aggressive mode, UDLD will also shut down a port if it loses bidirectional
connectivity with the neighbor for the same extended period of time (as that
mentioned above for normal mode) and subsequently fails repeated last-resort
attempts to re-establish communication with the other end of the link. This
mode of operation assumes that loss of communication with the neighbor is a
meaningful network event in itself, and a symptom of a serious connectivity
problem. Because this type of detection can be event-less, and lack of
information cannot always be associated to an actual malfunction of the link,
this mode is recommended only in certain scenarios (typically only on point-to-
point links where no communication failure between two neighbors is
admissible).
Summary of Contents for ECS4120-28F
Page 36: ...Contents 36...
Page 38: ...Figures 38...
Page 46: ...Section I Getting Started 46...
Page 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Page 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Page 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 216: ...Chapter 7 Flow Sampling Commands 216...
Page 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Page 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Page 384: ...Chapter 10 Access Control Lists ACL Information 384...
Page 424: ...Chapter 11 Interface Commands Power Savings 424...
Page 446: ...Chapter 13 Power over Ethernet Commands 446...
Page 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Page 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Page 494: ...Chapter 18 Address Table Commands 494...
Page 554: ...Chapter 20 ERPS Commands 554...
Page 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Page 638: ...Chapter 23 Quality of Service Commands 638...
Page 772: ...Chapter 25 LLDP Commands 772...
Page 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Page 836: ...Chapter 28 Domain Name Service Commands 836...
Page 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Page 902: ...Section III Appendices 902...
Page 916: ...Glossary 916...
Page 926: ...CLI Commands 926...
Page 937: ......
Page 938: ...E092017 CS R02...