New Trunking port Error Disabled on Nexus 5000

I configured my Nexus 5000 ports as so
Int Eth1000/1/48
switchport mode trunk
switchport trunk  allowed vlan 8
speed 1000
channel-group 7 mode active
int Po7
switchport mode trunk
switchport trunk  allowed vlan 8
vpc7
speed 1000
I configured my 3650 as so:
int Gig0/23
switchport trunk encapsulation dot1q
switchport trunk  allowed vlan 8
switchport mode trunk
speed 1000
channel-group 1 mode active
Port channel 1
switchport trunk encapsulation dot1q
switchport trunk  allowed vlan 8
switchport mode trunk
speed 1000
Both of these ports are connected Int Eth1000/1/48 and int Gig0/23. Int Eth1000/1/48 shut down and when I checked the logs on the N5K it said for the port   ErrorDisabled REASON BPDUguard. I did not configure bpdufilter or bpduguard on either side. What is causing it?
I found 3 other ports the have bpdufilter on them  would that be it?
Since the 3560 is an older switch how can I also ensure it get demoted to not be root bridge or secondary root bridge?

Hi,
1- You tried to bundle GE and E interfaces with LACP on both switch but you did not mention the other bundle members, however, it looks the etherchannel did not comes up and interfaces work separately.
As a result, STP has prevented bridging loop and put one of them in errdisable state. I think you must check your etherchannel configuration.
2- you can use "spanning-tree vlan <> priority 61400" on 3560 switch to make sure it won't be a root bridge.
HTH
Houtan

Similar Messages

  • Nexus 5500 - Fabricpath Core Port - Error disabled. Reason:DCX-No ACK in 100 PDUs

    Has anyone seen Fabricpath Core Interfaces between two Nexus 5596UP switches error-disabled because of missing DCBX Acks after 50mins?
    I do not see interface errors and the peer is another 5500.
    Both switches are running 5.1(3)N2(1) with this port config:
    int e1/3
    switchport mode fabricpath
    ! Cisco 5m Twinax cables
    Log messages
    2012 May 25 17:40:59 nexus1 %L3VM-5-FP_TPG_INTF_DOWN: Interface Ethernet1/3 down in fabricpath topology 0 - Interface down
    2012 May 25 17:40:59 nexus1 %ETHPORT-5-IF_DOWN_NONE: Interface Ethernet1/3 is down (None)
    2012 May 25 17:40:59 nexus1 %ISIS_FABRICPATH-5-ADJCHANGE:  isis_fabricpath-default [3365]  P2P adj L1 nexus5 over Ethernet1/3 - DOWN (Delete All) on MT-0
    2012 May 25 17:40:59 nexus1 %CDP-5-NEIGHBOR_REMOVED: CDP Neighbor nexus5(FOX1550GDH1) on port Ethernet1/3 has been removed
    2012 May 25 17:40:59 nexus1 %LLDP-5-SERVER_REMOVED: Server with Chassis ID 547f.ee63.fa88 Port ID Eth1/1 on local port Eth1/3 has been removed
    2012 May 25 17:40:59 nexus1 %ETHPORT-2-IF_DOWN_ERROR_DISABLED: Interface Ethernet1/3 is down (Error disabled. Reason:DCX-No ACK in 100 PDUs)
    Robert

    Can you send the output of
    show lldp interface ethernet 1/3
    show lldp dcbx interface ethernet 1/3
    a workaround may be to disable lldp on both sides on these physical interfaces

  • EEM on port error-disable due to UDLD

    I would like to ask from the EEM community for some assistance in regards to crafting an EEM script for an ME-3800X.  We have one or two appliances whereby the only uplink (TenGigabitEthernet0/1 and/or TenGigabitEthernet0/2) goes into error-disable and caused by UDLD.  What I am looking for is a script to do the following: 
    1.  If the ports TenGigabitEthernet0/1 and/or TenGigabitEthernet0/2 goes into error-disable caused by UDLD or link-flap then disable the port, wait for 5 seconds, enable the port; 
    2.  Wait for 15 seconds and send an email.  
    I only want this EEM to work on the TenGigabitEthernet interfaces and I do not want the EEM script to do this on the access ports.  
    Error-disable recovery is a global option and there's no option to limit on a per-interface level.  
    Thank you in advance. 

    Thanks for responding, Joe. 
    We were not able to take down the error messages but I believe they error messages could be:
    %UDLD-4-UDLD_PORT_DISABLED: UDLD disabled interface Te0/2, unidirectional link detected
    %PM-4-ERR_DISABLE: udld error detected on Te0/2, putting Te0/2 in err-disable state
    Could an EEM script be created when an error message or an event of "unidirectional link detected" occurs, do the following: 
    1.  In privilege mode, issue the command "udld reset".
    2.  Wait for 30 seconds and then send an email. 
    Thanks for your assistance and support, Joe.

  • FI's uplink ports Error Disabled on ENM loop

    Hi,
    I have two UCS6120XP FIs connected to a Cat2948G-GE-TX switch via port 1/3 on each FI. One port on the Cat2948G-GE-TX acts as the uplink port and is connected to the LAN. All ports of the Cat2948G-GE-TX are in VLAN 1 to allow all connected devices to reach the Gateway via the LAN uplink port.
    Now after a while both ports 1/3 on the FIs get error disabled on ENM loop.
    'show cdp neighbor' on the Cat2k shows FIs hanging off of 2/45 & 2/46. The management ports of both FIs are connected to ports 2/1 and 2/2 of the
    Cat2948G-GE-TX as well, as are some other devices.
    I'd like to keep both FI uplink ports enabled for failover scenarios - how can I achieve that w/o the ports getting error-disabled?
    Thanks,
    Matthias

    Hi,
    The reload was to test the loss of a FI prior to going into the production environment. A disassociate/reassociate of a SP made no difference.
    I plan to upgrade to V2.2(1D) and re-test again tomorrow.

  • Nexus 4k error disable

    Anyone ever seen this before? Trying to understand why the port error disabled.
    2011 Jan 18 11:53:09 MTWDAVDC1BLDB9001 %ETHPORT-2-IF_DOWN_ERROR_DISABLED: Interface Ethernet1/1 is down (Error disabled. Reason:requested by sap: MTS_SAP_DCX, req down_type: 2, req down_reason: 222 )
    MTWDAVDC1BLDB9002# sh int eth1/1
    Ethernet1/1 is down (DcxMultipleMSAPs)
      Hardware: 1000/10000 Ethernet, address: 0027.0d23.4d8d (bia 0027.0d23.4d8d)
      MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
         reliability 255/255, txload 1/255, rxload 1/255
      Encapsulation ARPA
      Port mode is trunk
      full-duplex, 10 Gb/s, media type is 10g
      Input flow-control is off, output flow-control is off
      Rate mode is dedicated
      Switchport monitor is off
      Last link flapped 1d03h
      Last clearing of "show interface" counters never
      1 minute input rate 0 bits/sec, 0 packets/sec
      1 minute output rate 0 bits/sec, 0 packets/sec
      Rx
        153349455 input packets 143221479 unicast packets 3730739 multicast packets
        6397237 broadcast packets 0 jumbo packets 0 storm suppression packets
        66448449173 bytes
      Tx
        328643307 output packets 90031378 multicast packets
        113132871 broadcast packets 12877361 jumbo packets
        62121338327 bytes
        0 input error 0 short frame 0 watchdog
        0 no buffer 0 runt 0 CRC 0 ecc
        0 overrun  0 underrun 0 ignored 0 bad etype drop
        0 bad proto drop 0 if down drop 0 input with dribble
        1416 input discard
        0 output error 0 collision 0 deferred
        0 late collision 0 lost carrier 0 no carrier
        0 babble
        0 Rx pause 0 Tx pause
      8 interface resets

    I looked into the error and would suggest opening a TAC case so our engineering team can look into this error.  You can open a case using the supportforum as well to turn the thread into a case.
    Sorry to not be able to help more, but looks like our internal team needs to look into this further.
    Chad

  • I keep getting error 3004 when i try restoring and updateing my iphone 4 to iOS 7 i did everything 1. flushed dns 2. edited hosts 3. updated itunes and downloaded new one 4. switched usb ports 5. disabled antivirus 6. enabled ports 80 and 443 7. disabled

    I keep getting error 3004 when i try restoring and updateing my iphone 4 to iOS 7 i did everything 1. flushed dns 2. edited hosts 3. updated itunes and downloaded new one 4. switched usb ports 5. disabled antivirus 6. enabled ports 80 and 443 7. disabled firewall 8. even tryed putting mobile in DFU mode to restore it not of this worked so please help me

    please replyyy i'm stuck on this like whole week

  • Vfc error disabled because of Ethernet port down?

    We are building a new datacenter and is starting to set up the SAN.
    This small DC consist of 2 Nexus 5596UP, a Compellent SAN and 2 Dell M1000e cassis with blade servers.
    naive FC part in Nexus has been easy to set up but we have problems with the FCOE setup.
    Since the blades are not installed yet none of the Ethernet ports are up. As soon as we bind an ethernet port to a vfc the vfc goes to error disable with this message:
    %PORT-2-IF_DOWN_ERROR_DISABLED: %$VSAN 1900%$ Interface vfc101 is down (Error disabled)
    Config snippets:
    vlan 1900
      fcoe vsan 1900
      name VSAN-A-FCOE
    vlan 1901
      name VSAN-B-FCOE
    vsan database
      vsan 1900 name "VSAN-A"
      vsan 1901 name "VSAN-B"
    interface vfc101
      bind interface Ethernet1/1
      no shutdown
    vsan database
      vsan 1900 interface vfc101
      vsan 1900 interface fc2/13
      vsan 1900 interface fc2/14
      vsan 1900 interface fc2/15
      vsan 1900 interface fc2/16
    interface Ethernet1/1
      switchport mode trunk
      spanning-tree port type edge trunk
    vlan 1900
      fcoe vsan 1900
      name VSAN-A-FCOE
    vlan 1901
      name VSAN-B-FCOE
    vsan database
      vsan 1900 name "VSAN-A"
      vsan 1901 name "VSAN-B"
    vsan database
      vsan 1900 interface vfc101
      vsan 1900 interface fc2/13
      vsan 1900 interface fc2/14
      vsan 1900 interface fc2/15
      vsan 1900 interface fc2/16
    interface vfc101
      bind interface Ethernet1/1
      no shutdown
    interface Ethernet1/1
      switchport mode trunk
      spanning-tree port type edge trunk
    Do the vfc go error disable because the ethernet interface being down? I was under the impression it should just go "down"

    What you are seeing is normal.. Here are outputs from my lab switch where I shut Eth1/20 which is tied to vFC 20
    24.10.5020A.1(config)# int ethernet 1/20
    24.10.5020A.1(config-if)# shut
    2011 Oct 21 10:16:01 24 %ETHPORT-5-IF_DOWN_CFG_CHANGE: Interface Ethernet1/20 is down(Config change)
    2011 Oct 21 10:16:01 24 %FLOGI-5-MSG_PORT_LOGGED_OUT: %$VSAN 100%$ [VSAN 100, Interface vfc20: mode[TF]] Nx Port 21:00:00:c0:dd:12:0e:35 logged OUT.
    2011 Oct 21 10:16:01 24 %PORT-5-IF_PORT_QUIESCE_FAILED: Interface vfc20 port quiesce failed due to failure reason: Epp Not Supported by Peer (0x19d)
    2011 Oct 21 10:16:01 24 %PORT-5-IF_DOWN_NONE: %$VSAN 100%$ Interface vfc20 is down (None)  
    2011 Oct 21 10:16:01 24 %PORT-2-IF_DOWN_ERROR_DISABLED: %$VSAN 100%$ Interface vfc20 is down (Error disabled)  
    2011 Oct 21 10:16:02 24 %ETHPORT-5-IF_DOWN_ADMIN_DOWN: Interface Ethernet1/20 is down (Administratively down)
    24.10.5020A.1(config-if)#

  • Trunking on Nexus 5000 to Catalyst 4500

    I have 2 devices on the each end of a Point to Point.  One side has a Nexus 5000 the other end a Catalyst 4500.  We want a trunk port on both sides to allow a single VLAN for the moment.  I have not worked with Nexus before.  Could someone look at the configurations of the Ports and let me know if it looks ok?
    nexus 5000
    interface Ethernet1/17
      description
      switchport mode trunk
      switchport trunk allowed vlan 141
      spanning-tree guard root
      spanning-tree bpdufilter enable
      speed 1000
    Catalyst 4500
    interface GigabitEthernet3/39
    description
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 141
    switchport mode trunk
    speed 1000
    spanning-tree bpdufilter enable
    spanning-tree guard root

    Thanks guys, we found the issue.  The Catalyst is on my side and the Nexus is on the side of the hosting center.  The hosting center moved his connection to a different Nexus 5000 and the connection came right up.  We dropped the spanning-tree guard root. 
    It was working on the previous nexus when we set the native vlan for 141.  So we thought it was the point to point dropping the tags.
    The hosting center engineer this it might have to do with the VPC Peer-Link loop prevention on the previous Nexus. 
    Anyway it is working the way we need it to.

  • SAN Port-Channel between Nexus 5000 and Brocade 5100

    I have a Nexus 5000 running in NPV mode connected to a Brocade 5100 FC switch using two FC ports on a native FC module in the Nexus 5000. I would like to configure these two physical links as one logical link using a SAN Port-Channel/ISL-Trunk. An ISL trunking license is already installed on the Brocade 5100. The Nexus 5000 is running NX-OS 4.2(1), the Brocade 5100 Fabric OS 6.20. Does anybody know if this is a supported configuration? If so, how can this be configured on the Nexus 5000 and the Brocade 5100? Thank you in advance for any comments.
    Best regards,
    Florian

    I tried that and I could see the status light on the ports come on but it still showed not connected.
    I configured another switch (a 3560) with the same config and the same layout with the fiber and I got the connection up on it. I just cant seem to get it on the 4506, would it be something with the supervisor? Could it be wanting to use the 10gb port instead of the 1gb ports?

  • CFS : how to disable application ? nexus 5000

    1. Could you please help me out here. I am setting up syslog on Nexus switches and running into problems (error messages at bottom)
    On Nexus 5000, I am trying to disable CFS distribution for application SYSLOGD, but do not find a command to do that.
    Why I want to do that ?
    With CFS enabled for syslogd, 'use-vrf' option is not allowed in the command 'logging server 167.54.254.23 6 ' and by default syslogd uses vrf management whereas I want it to use vrf default.
    2. Also, any idea why this message pops up ?
    CLIC-6-EXIT_CONFIG: Configured from 1 by systest
    2010 Feb 12 10:40:13.308 ked1.dcacc.n01 LOG-3-SYSTEM_MSG: Syslog could not be send to serv
    er(167.54.254.23) : No route to host
    2010 Feb 12 10:40:46.162 ked1.dcacc.n01 %VSHD-5-VSHD_SYSLOG_CONFIG_I: Configured from vty ....
    2010 Feb 12 10:40:46.170 ked1.dcacc.n01 LOG-3-SYSTEM_MSG: Syslog could not be send to serv..) : No route to host
    2010 Feb 12 10:40:46.170 ked1.dcacc.n01 11244]: CLIC-6-EXIT_CONFIG: Configured from 1 by systest
    2010 Feb 12 10:40:46.181 ked1.dcacc.n01 snmpd: snmpd: send_trap: Failure in sendto (No route to host)
    2010 Feb 12 10:40:46.183 ked1.dcacc.n01 last message repeated 2 times
    2010 Feb 12 10:40:46.183 ked1.dcacc.n01 snmpd: NETWORK- UNREACHABLE

    Learned the command  is:
      no logging distribute

  • Campus Manager report - Ports in error Disabled state

    Hi,
    I have LMS 3.2 and I wonder how Campus Manager collects information from the switch to generate a report of discrepancies, namely a report of "Ports in Error Disabled state"??
    I find that I have ports in errDisabled state but Campus Manger doesn´t show this information in "Ports in Error Dissabled state" report. What could be the problem?
    Thanks.

    Hi,
    Campus Manager do snmpwalk on the ciscoErrDisableMIB to get the status of the error disabled ports.
    Thanks,
    Gaganjeet Singh

  • Error disabled ports

    I have a 3550 switch that gets a error-disabled copper ports. There is no errors ont the port. What else would cause it to be disabled?

    Although there is no error on the port , there should be an error message in the log that should tell you the reason why the port got error disabled like port security violation , loopback detection , etherchannel misconfig etc.
    You can enable errordisable recovery for all different causes by setting a timer. What happens is once this timer expires , the port is brough out of error dsiabled state.
    Here are some of the useful commands.
    D-C3550-2A(config)#errdisable ?
    detect Error disable detection
    recovery Error disable recovery
    D-C3550-2A(config)#errdisable recovery ?
    cause Enable error disable recovery for application
    interval Error disable recovery timer value
    Hope this helps.
    Salman Z.

  • FCoE capable Storage Array connected directly to Nexus 5000 FCoE port

    hi,
    can someone help me verify if it is possible to connect an FCoE capable SAN storage to a Nexus 5000 FCoE port? thanks!

    yes, i have connected both EMC VNX and NetApp to N5Ks FCoE. EMC requires active mode twinax or fiber.

  • Automatic errordisable on trunk ports with errors

    Hi
    What's the best way, in CatOS, to set a trunk port to become errordisabled if there is excessive number of errors on the port (faulty sfp/gbic/cable)?
    "udld aggresive mode" seems to be able to errordisable port when it can't re-establish link with the remote side, however it doesn't work when errors come in bursts and not constant.
    Thanks

    You can use the command "set errordetecion link-errors action errdisable" to errdisbale the linke based on the number of rx or tx crc errors due to the link being bad. This command was introduced in 8.4 release.
    You can set several parameters of the command like setting up a thresold , recovery action , timers etc.
    For more details , take a look here.
    http://www.cisco.com/en/US/products/hw/switches/ps708/products_command_reference_chapter09186a008022f4a3.html#wp1063837
    Thanks
    salman Z.

  • PFC configuration on Nexus 5000

    Hi,
    I have a CNA in my server connected to cisco nexus 5000 interfcae. I Want to genearate pause frames for FCOE class of traffic using the default class class-fcoe and cos value 3, the firmware version running is 5.0(3) N1 (1b). Can anyone tell me how can i configure it ?
    Thanks,
    Manju

    Sorry for the delayed response, Here is what you asked
    Cisco-5020# sh mod
    Mod Ports  Module-Type                      Model                  Status
    1    40     40x10GE/Supervisor               N5K-C5020P-BF-SUP      active *
    2    8      4x10GE + 4x1/2/4G FC Module      N5K-M1404              ok
    Mod  Sw              Hw      World-Wide-Name(s) (WWN)
    1    5.0(3)N1(1b)    1.2     --
    2    5.0(3)N1(1b)    1.0     20:41:00:0d:ec:b2:15:40 to 20:44:00:0d:ec:b2:15:40
    Mod  MAC-Address(es)                         Serial-Num
    1    000d.ecb2.1548 to 000d.ecb2.156f         JAF1303ACES
    2    000d.ecb2.1570 to 000d.ecb2.1577         JAF1245AJLF
    Cisco-5020#
    Cisco-5020#
    Cisco-5020# sh run
    !Command: show running-config
    !Time: Fri Oct 28 17:40:02 2005
    version 5.0(3)N1(1b)
    feature fcoe
    feature npiv
    feature telnet
    feature lldp
    username admin password 5 $1$v9Tm8Y77$ZSdbOfBxe1.Z9Oz1V9V2B0  role network-admin
    no password strength-check
    ip domain-lookup
    hostname Cisco-5020
    logging event link-status default
    service unsupported-transceiver
    class-map type qos class-fcoe
    class-map type queuing class-all-flood
      match qos-group 2
    class-map type queuing class-ip-multicast
      match qos-group 2
    class-map type network-qos class-all-flood
      match qos-group 2
    class-map type network-qos class-ip-multicast
      match qos-group 2
    policy-map type network-qos jumbo
      class type network-qos class-fcoe
        pause no-drop
        mtu 2158
      class type network-qos class-default
        mtu 9216
    system qos
      service-policy type network-qos jumbo
    snmp-server user admin network-admin auth md5 0x2694501fdfbe5abed9e85d51e4e31038 priv 0x2694501fdfbe5abed9e85d51e4e31038 localizedkey
    snmp-server host 138.239.198.184 traps version 2c public  udp-port 1163
    snmp-server host 138.239.198.184 traps version 2c public  udp-port 1164
    snmp-server host 138.239.198.200 traps version 2c public  udp-port 1163
    snmp-server host 138.239.198.200 traps version 2c public  udp-port 1164
    snmp-server host 138.239.200.118 traps version 2c public  udp-port 1163
    snmp-server host 138.239.198.200 traps version 2c public  udp-port 1163
    snmp-server enable traps entity fru
    snmp-server community snmpv3 group network-operator
    vrf context management
      ip route 0.0.0.0/0 10.192.207.254
    vlan 1-2,8
    vlan 10
      fcoe vsan 10
    vlan 20
      fcoe vsan 20
    vlan 30
    vlan 35
      fcoe vsan 35
    vlan 40,50
    vlan 52
      fcoe vsan 52
    vsan database
      vsan 20
      vsan 52
    fcdomain fcid database
      vsan 52 wwn 10:00:00:00:c9:b1:e5:3d fcid 0x180000 dynamic
      vsan 52 wwn 10:00:00:00:c9:b1:e5:3b fcid 0x180001 dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:4d:e3 fcid 0x180002 dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:ab:ad fcid 0x180003 dynamic
      vsan 52 wwn 10:00:00:00:c9:ad:ac:41 fcid 0x180004 dynamic
      vsan 52 wwn 10:00:00:00:c9:ad:ac:b9 fcid 0x180005 dynamic
      vsan 52 wwn 10:00:00:00:c9:ad:ac:b5 fcid 0x180006 dynamic
      vsan 52 wwn 10:00:00:00:c9:f2:73:d1 fcid 0x180007 dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:4d:e1 fcid 0x180008 dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:ab:a9 fcid 0x180009 dynamic
      vsan 52 wwn 10:00:00:00:c9:f2:73:d5 fcid 0x18000a dynamic
      vsan 52 wwn 10:00:00:00:c9:b1:e5:5d fcid 0x18000b dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:ab:9b fcid 0x18000c dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:ab:99 fcid 0x18000d dynamic
      vsan 52 wwn 10:00:00:00:c9:b1:e5:5b fcid 0x18000e dynamic
      vsan 1 wwn 10:00:00:00:c9:f2:73:b3 fcid 0x050000 dynamic
      vsan 52 wwn 10:00:00:00:c9:ad:ac:47 fcid 0x18000f dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:a7:93 fcid 0x180010 dynamic
      vsan 52 wwn 10:00:00:00:c9:91:f8:19 fcid 0x180011 dynamic
      vsan 52 wwn 10:00:00:00:c9:9c:e0:77 fcid 0x180012 dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:a7:d3 fcid 0x180013 dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:a3:bb fcid 0x180014 dynamic
      vsan 52 wwn 10:00:00:00:c9:97:3b:c5 fcid 0x180015 dynamic
      vsan 52 wwn 10:00:00:00:c9:f2:73:91 fcid 0x180016 dynamic
      vsan 52 wwn 10:00:00:00:c9:a4:00:91 fcid 0x180017 dynamic
      vsan 52 wwn 10:00:00:00:c9:f2:73:8d fcid 0x180018 dynamic
      vsan 52 wwn 20:0f:00:11:0d:7f:a8:00 fcid 0x180019 dynamic
      vsan 52 wwn 20:0f:00:11:0d:7f:a8:01 fcid 0x18001a dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:a3:b7 fcid 0x18001b dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:a5:27 fcid 0x18001c dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:a3:53 fcid 0x18001d dynamic
      vsan 52 wwn 10:00:00:00:c9:bb:c8:37 fcid 0x18001e dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:76:e5 fcid 0x18001f dynamic
      vsan 20 wwn 10:00:00:00:c9:5b:a3:83 fcid 0xd30000 dynamic
      vsan 52 wwn 10:00:00:00:c9:91:00:00 fcid 0x180020 dynamic
      vsan 52 wwn 10:00:00:00:00:91:f7:f1 fcid 0x180021 dynamic
      vsan 1 wwn 10:00:00:00:c9:5b:4d:e3 fcid 0x050001 dynamic
      vsan 52 wwn 10:00:00:00:c9:97:3b:0f fcid 0x180022 dynamic
      vsan 52 wwn 10:00:00:00:c9:3c:8e:21 fcid 0x180023 dynamic
      vsan 52 wwn 10:00:00:00:c9:97:3b:11 fcid 0x180024 dynamic
      vsan 20 wwn 10:00:00:00:c9:b1:e6:b7 fcid 0xd30001 dynamic
      vsan 52 wwn 10:00:f8:19:00:91:f8:19 fcid 0x180025 dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:a3:8b fcid 0x180026 dynamic
      vsan 52 wwn 10:00:00:00:c9:b1:e4:ff fcid 0x180027 dynamic
      vsan 52 wwn 10:00:00:00:c9:3c:8e:25 fcid 0x180028 dynamic
      vsan 52 wwn 50:06:01:61:44:60:23:4f fcid 0x1800ef dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:d6:b9 fcid 0x180029 dynamic
      vsan 52 wwn 10:00:00:00:c9:ad:ac:43 fcid 0x18002a dynamic
      vsan 52 wwn 20:01:00:00:c9:5b:ab:99 fcid 0x18002b dynamic
      vsan 52 wwn 20:02:00:00:c9:5b:ab:99 fcid 0x18002c dynamic
      vsan 52 wwn 50:06:01:60:44:60:23:4f fcid 0x1801ef dynamic
      vsan 52 wwn 10:00:00:00:c9:9d:1f:bf fcid 0x18002d dynamic
      vsan 52 wwn 10:00:00:00:c9:9d:1f:c1 fcid 0x18002e dynamic
      vsan 52 wwn 10:00:00:00:c9:f2:73:d3 fcid 0x18002f dynamic
      vsan 20 wwn 10:00:00:00:c9:bb:c8:37 fcid 0xd30002 dynamic
      vsan 52 wwn 10:00:00:00:c9:12:34:56 fcid 0x180030 dynamic
      vsan 52 wwn 10:00:00:00:c9:12:34:57 fcid 0x180031 dynamic
      vsan 52 wwn 10:00:00:00:c9:b1:ea:81 fcid 0x180032 dynamic
      vsan 52 wwn 10:00:00:00:c9:b1:ea:7f fcid 0x180033 dynamic
      vsan 20 wwn 10:00:00:00:c9:12:34:56 fcid 0xd30003 dynamic
      vsan 52 wwn 10:00:00:00:c9:b1:e5:1b fcid 0x180034 dynamic
      vsan 52 wwn 10:00:00:00:c9:b1:e5:1d fcid 0x180035 dynamic
      vsan 52 wwn 10:00:00:00:c9:bb:c7:8f fcid 0x180036 dynamic
      vsan 52 wwn 10:00:00:00:c9:bb:cb:8f fcid 0x180037 dynamic
      vsan 52 wwn 10:00:00:00:c9:bb:cb:93 fcid 0x180038 dynamic
      vsan 52 wwn 10:00:00:00:c9:bb:c7:93 fcid 0x180039 dynamic
      vsan 20 wwn 10:00:00:00:c9:12:34:57 fcid 0xd30004 dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:ab:c4 fcid 0x18003a dynamic
      vsan 52 wwn 10:00:00:00:c9:bb:17:b7 fcid 0x18003b dynamic
      vsan 52 wwn 10:00:00:00:c9:a0:ce:2d fcid 0x18003c dynamic
      vsan 52 wwn 10:00:00:00:c9:91:f7:f1 fcid 0x18003d dynamic
      vsan 52 wwn 10:00:00:00:c9:5b:ab:c0 fcid 0x18003e dynamic
      vsan 52 wwn 10:00:00:00:c9:b1:e5:5f fcid 0x18003f dynamic
      vsan 52 wwn 10:00:00:00:c9:e3:06:89 fcid 0x180040 dynamic
      vsan 52 wwn 50:06:01:68:44:60:23:4f fcid 0x1802ef dynamic
      vsan 1 wwn 50:06:01:61:44:60:23:4f fcid 0x0500ef dynamic
      vsan 52 wwn 10:00:00:00:c9:d1:16:24 fcid 0x180041 dynamic
      vsan 52 wwn 10:00:00:00:c9:d1:16:25 fcid 0x180042 dynamic
      vsan 52 wwn 10:00:00:00:c9:d1:0a:6d fcid 0x180043 dynamic
      vsan 20 wwn 10:00:00:00:c9:d1:16:25 fcid 0xd30005 dynamic
      vsan 20 wwn 10:00:00:00:c9:d1:16:24 fcid 0xd30006 dynamic
      vsan 20 wwn ff:f2:00:00:c9:12:34:78 fcid 0xd30007 dynamic
      vsan 20 wwn ff:f2:00:00:c9:d1:16:46 fcid 0xd30008 dynamic
      vsan 52 wwn ff:f2:00:00:c9:d1:0a:8c fcid 0x180044 dynamic
      vsan 20 wwn ff:f3:00:00:c9:d1:16:46 fcid 0xd30009 dynamic
      vsan 52 wwn ff:f0:00:00:c9:d1:0a:8c fcid 0x180045 dynamic
      vsan 52 wwn 10:00:00:00:c9:d1:0a:6c fcid 0x180046 dynamic
      vsan 20 wwn ff:f2:00:00:c9:d1:0a:8c fcid 0xd3000a dynamic
      vsan 20 wwn 10:00:00:00:c9:d1:0a:6d fcid 0xd3000b dynamic
      vsan 52 wwn ff:f2:00:00:c9:d1:16:46 fcid 0x180047 dynamic
      vsan 20 wwn ff:f3:00:00:c9:12:34:78 fcid 0xd3000c dynamic
      vsan 52 wwn ff:f3:00:00:c9:12:34:78 fcid 0x180048 dynamic
      vsan 52 wwn 50:06:01:69:44:60:23:4f fcid 0x1803ef dynamic
      vsan 52 wwn ff:f3:00:00:c9:d1:16:46 fcid 0x180049 dynamic
      vsan 52 wwn 10:00:00:00:c9:12:34:5b fcid 0x18004a dynamic
      vsan 52 wwn 10:00:00:00:c9:12:34:5a fcid 0x18004b dynamic
      vsan 52 wwn ff:f2:00:00:c9:12:34:78 fcid 0x18004c dynamic
      vsan 52 wwn 10:00:00:00:c9:a5:ac:f3 fcid 0x18004d dynamic
      vsan 52 wwn 10:00:00:00:c9:a5:ad:15 fcid 0x18004e dynamic
      vsan 52 wwn 10:00:00:00:c9:a5:ac:f5 fcid 0x18004f dynamic
      vsan 52 wwn 20:01:00:00:c9:a5:ac:f3 fcid 0x180050 dynamic
      vsan 52 wwn 20:02:00:00:c9:a5:ac:f3 fcid 0x180051 dynamic
      vsan 52 wwn ff:f3:00:00:c9:12:34:85 fcid 0x180052 dynamic
      vsan 52 wwn 20:00:00:11:0d:77:9c:00 fcid 0x180053 dynamic
      vsan 52 wwn 20:01:00:11:0d:77:9d:00 fcid 0x180054 dynamic
    interface port-channel3
    interface vfc1
      no shutdown
    interface vfc4
    interface vfc9
      bind interface Ethernet1/9
      no shutdown
    interface vfc10
    interface vfc11
      bind interface Ethernet1/11
      no shutdown
    interface vfc19
      bind interface Ethernet1/19
      no shutdown
    interface vfc21
      bind interface Ethernet1/21
      no shutdown
    interface vfc22
      bind interface Ethernet1/22
      switchport trunk allowed vsan 52
      no shutdown
    interface vfc24
      bind interface Ethernet1/24
      switchport trunk allowed vsan 52
      no shutdown
    interface vfc25
      bind interface Ethernet1/25
      switchport trunk allowed vsan 52
      no shutdown
    interface vfc26
      bind interface Ethernet1/26
      switchport trunk allowed vsan 52
      no shutdown
    interface vfc27
      bind interface Ethernet1/27
      no shutdown
    interface vfc28
      bind interface Ethernet1/28
      no shutdown
    interface vfc29
      bind interface Ethernet1/29
      no shutdown
    interface vfc30
      bind interface Ethernet1/30
      switchport trunk allowed vsan 52
      no shutdown
    interface vfc31
      bind interface Ethernet1/31
      shutdown
    interface vfc32
      bind interface Ethernet1/32
      no shutdown
    interface vfc33
      bind interface Ethernet1/33
      no shutdown
    interface vfc34
      bind interface Ethernet1/34
      no shutdown
    interface vfc35
      bind interface Ethernet1/35
      no shutdown
    interface vfc36
      bind interface Ethernet1/36
      no shutdown
    interface vfc37
      bind interface Ethernet1/37
      no shutdown
    interface vfc38
      bind interface Ethernet1/38
      no shutdown
    interface vfc39
      bind interface Ethernet1/39
      no shutdown
    interface vfc40
      bind interface Ethernet1/40
      no shutdown
    vsan database
      vsan 52 interface vfc1
      vsan 52 interface vfc9
      vsan 52 interface vfc11
      vsan 52 interface vfc19
      vsan 52 interface vfc21
      vsan 52 interface vfc22
      vsan 52 interface vfc24
      vsan 52 interface vfc26
      vsan 52 interface vfc27
      vsan 52 interface vfc28
      vsan 52 interface vfc29
      vsan 52 interface vfc30
      vsan 52 interface vfc31
      vsan 52 interface vfc32
      vsan 52 interface vfc33
      vsan 52 interface vfc34
      vsan 20 interface vfc35
      vsan 52 interface vfc36
      vsan 52 interface vfc37
      vsan 52 interface vfc38
      vsan 52 interface vfc39
      vsan 52 interface vfc40
      vsan 52 interface fc2/1
      vsan 52 interface fc2/2
      vsan 52 interface fc2/3
      vsan 52 interface fc2/4
    interface fc2/1
      switchport trunk allowed vsan 1
      switchport trunk allowed vsan add 52
      switchport trunk mode auto
      no shutdown
    interface fc2/2
      switchport trunk mode auto
      no shutdown
    interface fc2/3
      no shutdown
    interface fc2/4
      no shutdown
    interface Ethernet1/1
    interface Ethernet1/2
      speed 1000
    interface Ethernet1/3
    interface Ethernet1/4
    interface Ethernet1/5
    interface Ethernet1/6
    interface Ethernet1/7
      switchport mode trunk
    interface Ethernet1/8
    interface Ethernet1/9
      switchport mode trunk
      switchport trunk allowed vlan 1,10,20,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/10
    interface Ethernet1/11
      priority-flow-control mode on
      switchport mode trunk
      switchport trunk allowed vlan 1,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/12
      switchport mode trunk
    interface Ethernet1/13
      switchport mode trunk
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/14
      switchport mode trunk
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/15
      switchport mode trunk
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/16
      switchport mode trunk
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/17
    interface Ethernet1/18
      switchport mode trunk
      switchport trunk allowed vlan 1,30
    interface Ethernet1/19
      switchport mode trunk
      switchport access vlan 10
      switchport trunk allowed vlan 1,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/20
      switchport mode trunk
      switchport access vlan 52
      switchport trunk allowed vlan 1,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/21
      switchport mode trunk
      switchport trunk allowed vlan 1,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/22
    interface Ethernet1/23
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/24
      switchport mode trunk
      switchport access vlan 52
      switchport trunk allowed vlan 1,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/25
      switchport mode trunk
      switchport trunk allowed vlan 1,8,30,52
    interface Ethernet1/26
      switchport mode trunk
      switchport access vlan 52
      switchport trunk allowed vlan 1,8,30,52
    interface Ethernet1/27
      switchport mode trunk
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/28
      switchport mode trunk
      switchport trunk allowed vlan 1,8,30,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/29
      switchport mode trunk
      switchport trunk allowed vlan 1,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/30
      description line
      switchport mode trunk
      switchport access vlan 52
      switchport trunk allowed vlan 1,8,30,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/31
      switchport mode trunk
      switchport trunk allowed vlan 1,10,20,52
    interface Ethernet1/32
      switchport mode trunk
      switchport trunk allowed vlan 1,10,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/33
      switchport mode trunk
      switchport trunk allowed vlan 1,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/34
      switchport mode trunk
      switchport trunk allowed vlan 1,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/35
      switchport mode trunk
      switchport access vlan 10
      switchport trunk allowed vlan 1,10,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/36
      switchport mode trunk
      switchport trunk allowed vlan 1,30,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/37
      switchport mode trunk
      switchport trunk allowed vlan 1,30,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/38
      switchport mode trunk
      switchport trunk allowed vlan 1,10,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/39
      shutdown
      switchport mode trunk
      switchport trunk allowed vlan 1,10,20,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet1/40
      switchport mode trunk
      switchport trunk allowed vlan 1,52
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet2/1
      switchport mode trunk
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet2/2
      switchport mode trunk
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet2/3
      switchport mode trunk
      flowcontrol receive on
      flowcontrol send on
    interface Ethernet2/4
      switchport mode trunk
      flowcontrol receive on
      flowcontrol send on
    interface mgmt0
      ip address 10.192.194.111/20
    system default zone default-zone permit
    system default zone distribute full
    line console
    line vty
    boot kickstart bootflash:/n5000-uk9-kickstart.5.0.3.N1.1b.bin
    boot system bootflash:/n5000-uk9.5.0.3.N1.1b.bin
    interface fc2/1
    interface fc2/2
    interface fc2/3
    interface fc2/4
    zone default-zone permit vsan 20
    zone default-zone permit vsan 52
    zoneset distribute full vsan 1
    zoneset distribute full vsan 20
    zoneset distribute full vsan 52
    !Full Zone Database Section for vsan 1
    zone name bg-qa vsan 1
        member pwwn 10:00:00:00:c9:5b:ab:ca
        member pwwn 21:00:00:0c:50:c3:70:23
        member pwwn 21:00:00:0c:50:c3:70:22
        member pwwn 21:00:00:0c:50:c3:70:16
        member pwwn 21:00:00:0c:50:c3:70:1e
        member pwwn 22:00:00:0c:50:c3:70:26
        member pwwn 22:00:00:18:62:06:76:8a
        member pwwn 22:00:00:11:c6:17:68:c3
        member pwwn 22:00:00:0c:50:c3:70:1d
        member pwwn 22:00:00:0c:50:c3:6f:c2
        member pwwn 22:00:00:11:c6:17:68:dc
        member pwwn 21:00:00:0c:50:c3:6a:d0
        member pwwn 21:00:00:0c:50:79:92:90
        member pwwn 21:00:00:11:c6:17:69:a0
        member pwwn 21:00:00:0c:50:79:93:af
        member pwwn 22:00:00:0c:50:48:10:80
        member pwwn 22:00:00:11:c6:18:46:c6
        member pwwn 22:00:00:0c:50:32:2e:0f
        member pwwn 22:00:00:0c:50:48:10:74
        member pwwn 22:00:00:11:c6:18:46:f2
        member pwwn 21:00:00:00:87:13:cb:d1
        member pwwn 21:00:00:0c:50:79:91:0f
        member pwwn 10:00:00:00:c9:3c:8e:49
        member pwwn 10:00:00:00:c9:5b:ab:c2
        member pwwn 10:00:00:00:c9:5b:af:f3
    zone name sf_RAM vsan 1
        member pwwn 10:00:00:00:c9:5b:af:c9
        member pwwn 21:00:00:0c:50:b4:8e:20
    zone name anand vsan 1
        member pwwn 10:00:00:00:c9:65:69:31
        member pwwn 22:00:00:18:62:06:7f:f6
    zone name syedzone vsan 1
        member fwwn 20:11:00:0d:ec:56:7b:40
        member pwwn 50:06:01:60:44:60:23:4f
    zone name bg_qa vsan 1
    zoneset name TOM vsan 1
        member bg-qa
    zoneset name bg_dvt vsan 1
        member sf_RAM
    zoneset name lancer vsan 1
        member anand
    zoneset name bg-qa vsan 1
    zoneset name syed vsan 1
        member syedzone
    zoneset activate name lancer vsan 1
    !Full Zone Database Section for vsan 20
    zone name amrita_zone1 vsan 20
        member pwwn 10:00:00:00:c9:5b:a3:83
        member pwwn 22:00:00:04:cf:89:19:67
        member pwwn 22:00:00:0c:50:48:10:80
        member pwwn 22:00:00:11:c6:18:46:f2
        member pwwn 22:00:00:0c:50:79:93:ae
    zone name amr_zset vsan 20
    zoneset name amr_zset vsan 20
        member amrita_zone1
    zoneset activate name amr_zset vsan 20
    !Full Zone Database Section for vsan 52
    zone name vinod vsan 52
        member pwwn 50:06:01:69:44:60:23:4f
        member pwwn ff:f3:00:00:c9:12:34:78
        member pwwn 10:00:00:00:c9:12:34:5b
        member pwwn 10:00:00:00:c9:12:34:57
    zone name neha vsan 52
    zone name siv1 vsan 52
        member pwwn 10:00:00:00:c9:ad:ac:43
        member pwwn 50:06:01:61:44:60:23:4f
        member pwwn 10:00:00:00:c9:ad:ac:47
    zone name neha1 vsan 52
        member pwwn 10:00:00:00:c9:5b:ab:ad
        member pwwn 50:06:01:60:44:60:23:4f
    zone name neha2 vsan 52
        member pwwn 50:06:01:60:44:60:23:4f
        member pwwn 10:00:00:00:c9:5b:ab:a9
    zone name neha3 vsan 52
        member pwwn 10:00:00:00:c9:9d:1f:bf
        member pwwn 50:06:01:60:44:60:23:4f
    zone name neha4 vsan 52
        member pwwn 50:06:01:60:44:60:23:4f
        member pwwn 10:00:00:00:c9:9d:1f:c1
    zone name chetan vsan 52
        member pwwn 10:00:00:00:c9:f2:73:d3
        member pwwn 50:06:01:60:44:60:23:4f
        member pwwn 10:00:00:00:c9:ad:ac:47
    zone name siv2 vsan 52
        member pwwn 10:00:00:00:c9:d1:0a:6d
        member pwwn ff:f2:00:00:c9:d1:0a:8c
        member pwwn 22:00:00:0c:50:79:93:af
        member pwwn 22:00:00:0c:50:79:92:90
        member pwwn 22:00:00:0c:50:79:91:0f
        member pwwn 20:01:00:11:0d:77:9d:00
    zone name sroy vsan 52
        member pwwn 10:00:00:00:c9:b1:ea:7f
        member pwwn 50:06:01:60:44:60:23:4f
        member pwwn 10:00:00:00:c9:5b:ab:99
        member pwwn 10:00:00:00:c9:bb:cb:8f
        member pwwn 10:00:00:00:c9:5b:ab:c4
        member pwwn 10:00:00:00:c9:d1:16:25
        member pwwn 50:06:01:61:44:60:23:4f
        member pwwn 10:00:00:00:c9:a5:ac:f3
    zone name manju vsan 52
        member pwwn 10:00:00:00:c9:bb:c7:8f
        member pwwn 50:06:01:61:44:60:23:4f
    zone name ram vsan 52
        member pwwn 50:06:01:60:44:60:23:4f
        member pwwn 10:00:00:00:c9:a0:ce:2d
        member pwwn 10:00:00:00:c9:bb:17:b7
        member pwwn 10:00:00:00:c9:5b:a5:27
        member pwwn 10:00:00:00:c9:91:f7:f1
        member pwwn 10:00:00:00:c9:b1:e5:5f
    zone name jana vsan 52
        member pwwn 10:00:00:00:c9:91:f7:f1
        member pwwn 50:06:01:60:44:60:23:4f
    zone name priya vsan 52
        member pwwn 10:00:00:00:c9:e3:06:89
        member pwwn 50:06:01:60:44:60:23:4f
    zoneset name IBMraptor vsan 52
        member vinod
        member siv1
        member neha1
        member neha2
        member neha3
        member neha4
        member chetan
        member siv2
        member sroy
        member manju
        member ram
        member priya
    zoneset name ananda vsan 52
    zoneset name vinod vsan 52
    zoneset activate name IBMraptor vsan 52
    no system default switchport shutdown san
    Cisco-5020# sh system internal dcbx info interface ethernet 1/38
    Interface info for if_index: 0x1a025000(Eth1/38)
    tx_enabled: TRUE
    rx_enabled: TRUE
    dcbx_enabled: TRUE
    DCX Protocol: CIN
    Port MAC address:  00:0d:ec:b2:15:6d
    DCX Control FSM Variables: seq_no: 0x1, ack_no: 0x0,my_ack_no: 0x0, peer_seq_no:
    0x0 oper_version: 0x0,  max_version: 0x0 fast_retries 0x0
    Lock Status: UNLOCKED
    PORT STATE: UP
    LLDP Neighbors
    No DCX tlvs from the remote peer
    6 Features on this intf for Protocol CIN(0)
    3 Features on this intf for Protocol CEE(1)
    6 Features on this intf for Protocol CIN(0)
    Feature type LLS (6)sub_type FCoE Logical Link Status (0)
    feature type 6(LLS)sub_type 0
    Feature State Variables: oper_version 0 error 0 local error 0 oper_mode 0
         feature_seq_no 0 remote_feature_tlv_present 0 remote_tlv_aged_out 0
         remote_tlv_not_present_notification_sent 0
    Feature Register Params: max_version 0, enable 1, willing 0 advertise 1
         disruptive_error 0 mts_addr_node 0x101 mts_addr_sap 0x1d9
    Desired config cfg length: 1 data bytes:00
    Operating config cfg length: 0 data bytes:
    Peer config cfg length: 0 data bytes:
    Feature type PFC (3)
    feature type 3(PFC)sub_type 0
    Feature State Variables: oper_version 0 error 0 local error 0 oper_mode 0
         feature_seq_no 0 remote_feature_tlv_present 0 remote_tlv_aged_out 1
         remote_tlv_not_present_notification_sent 0
    Feature Register Params: max_version 0, enable 1, willing 0 advertise 1
         disruptive_error 0 mts_addr_node 0x101 mts_addr_sap 0x179
    Desired config cfg length: 1 data bytes:08
    Operating config cfg length: 0 data bytes:
    Peer config cfg length: 0 data bytes:
    Feature type App(Fcoe) (5)sub_type FCoE (0)
    feature type 5(App(Fcoe))sub_type 0
    Feature State Variables: oper_version 0 error 0 local error 0 oper_mode 0
         feature_seq_no 0 remote_feature_tlv_present 0 remote_tlv_aged_out 1
         remote_tlv_not_present_notification_sent 0
    Feature Register Params: max_version 0, enable 1, willing 0 advertise 1
         disruptive_error 0 mts_addr_node 0x101 mts_addr_sap 0x179
    Desired config cfg length: 1 data bytes:08
    Operating config cfg length: 0 data bytes:
    Peer config cfg length: 0 data bytes:
    Feature type PriMtu (8)
    feature type 8(PriMtu)sub_type 0
    Feature State Variables: oper_version 0 error 0 local error 0 oper_mode 0
         feature_seq_no 0 remote_feature_tlv_present 0 remote_tlv_aged_out 1
         remote_tlv_not_present_notification_sent 0
    Feature Register Params: max_version 0, enable 1, willing 0 advertise 1
         disruptive_error 0 mts_addr_node 0x101 mts_addr_sap 0x179
    Desired config cfg length: 16 data bytes:24    00    24    00    24    00    08    6e    24    00    24    00    24    00    24    00
    Operating config cfg length: 0 data bytes:
    Peer config cfg length: 0 data bytes:
    Feature type PriGrp (2)
    feature type 2(PriGrp)sub_type 0
    Feature State Variables: oper_version 0 error 0 local error 0 oper_mode 0
         feature_seq_no 0 remote_feature_tlv_present 0 remote_tlv_aged_out 1
         remote_tlv_not_present_notification_sent 0
    Feature Register Params: max_version 0, enable 1, willing 0 advertise 1
         disruptive_error 0 mts_addr_node 0x101 mts_addr_sap 0x179
    Desired config cfg length: 24 data bytes:32    32    00    00    00    00    00    00    00    0f    00    0f    00    0e    20    64    00    0e    00    0e
       00    0e    00    0e
    Operating config cfg length: 0 data bytes:
    Peer config cfg length: 0 data bytes:
    Feature type LLS (6)sub_type LAN Logical Link Status (1)
    feature type 6(LLS)sub_type 1
    Feature State Variables: oper_version 0 error 0 local error 0 oper_mode 0
         feature_seq_no 0 remote_feature_tlv_present 0 remote_tlv_aged_out 1
         remote_tlv_not_present_notification_sent 0
    Feature Register Params: max_version 0, enable 1, willing 0 advertise 1
         disruptive_error 0 mts_addr_node 0x101 mts_addr_sap 0xaf
    Desired config cfg length: 1 data bytes:80
    Operating config cfg length: 0 data bytes:
    Peer config cfg length: 0 data bytes:
    Traffic Counters
    DCBX pkt stats:
        Total frames out: 20296
        Total Entries aged: 27
        Total frames in: 0
        DCBX frames in: 0
        Total frames received in error: 0
        Total frames discarded: 0
        Total TLVs unrecognized: 0
    Cisco-5020#
    Cisco-5020#
    Cisco-5020#
    I am new to this PFC, and first time trying to configure so you can see nothing being configured.

Maybe you are looking for