Support Support Downloads Knowledge Base Case Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

Syslog message "/kernel: vlan MAC filter: .* from port .* rejected"

0

0

Article ID: KB16531 KB Last Updated: 22 Oct 2015Version: 4.0
Summary:

This article provides information about the /kernel: vlan MAC filter: .* from port .* rejected syslog message, which is seen on the EX-series switches. These are informational/debug messages. They are not harmful and do not impact the performance of the switch or network.


Symptoms:

SYMPTOMS:

When a 'vlan MAC filter' event occurs, a message similar to the following is reported:

/kernel: vlan MAC filter: 01:00:5e:00:00:05 from port ge-0/1/0 rejected

Cause:

POSSIBLE CAUSES:

If control packets are received on the switch for a multicast MAC, for which there is no configuration on the EX-switch, you may see this log message in the /var/log/messages file.

For example:

If OSPF is not configured on the EX-switch, but it receives OSPF packets with the 01:00:5e:00:00:0d Multicast MAC destination, all the packets will be dropped in the kernel with message as:
/kernel: vlan MAC filter: 01:00:5e:00:00:0d rejected

CONFIRM CAUSES:

Examine the following output to help determine the cause of this message:

show log messages
show interfaces vlan extensive


Look for any related events that occurred at or just before the /kernel: vlan MAC filter: .* from port .* rejected message.  Dropped packets can be confirmed in the interfaces vlan output statistics.

Solution:
From Junos 10.1 onwards, these messages are logged in /var/log and will be displayed only when #set interface vlan traceoption <all> is enabled. In Junos 10.0 and 9.x releases ( both major and service releases), these messages are logged in /var/tmp/ to display the port from which the packet originated.

The following workarounds can be used to ensure that these log messages do not fill up the log files:

  1. The following command is used to filter the event message being sent to syslog server:
    set system syslog host 10.1.104.25 match "!(.*vlan MAC filter.*)"

  2. To filter the requested message from getting into the logs of the switch, use the following command:
    set system syslog file messages match "!(.*vlan MAC filter.*)"

Related Links

Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search