Still fighting this loop warning.
Is there a combination of log settings that may help shed more light on what the Mikrotik is seeing as a loop?
To date, I have reviewed the bridge Hosts list where 12 entries relating/connecting to port vpls250 are labeled. Going to each router and interface that attach to this tunnel, I see no duplicate MAC that may be finding its way back.
I have ran the packet sniffer on the interface and reviewed in wireshark the output for the interface using eth.src==MAC with no success. The result is null. Nothing is displayed indicating that nothing in that capture was sourced from the offending MAC. I even coordinated the error time stamp with the capture.
Regarding my setup. I am using split horizon bridging but have RSTP disabled (just disabled RSTP within the last 48 hours to test result).
Perhaps a temporary work around would be to use a bridge filter on the forward chain that blocks the offending MAC as a source address to the VPLS interface.
Thoughts from the forum appreciated. Thanks in advance.
vplserrorBS.png
You do not have the required permissions to view the files attached to this post.