Smarts 10.1.x
VSSSwitches exposing Virtual MACs when discovered in Smarts topology can form connection during post processing phase.
As a workaround these MAC's need to be excluded in the tpmgr-param.conf using ExcludeVSSMACRange flag.
Follow the below steps to perform the same:
<BASEDIR>/IP/smarts/bin/sm_edit ../conf/discovery/tpmgr-param.conf
# ExcludeVSSMACRange
# ExcludeVSSMACRange This flag decides whether to exclude this VSS MAC Range during STP Post processing
# If this flag is set to TRUE, then the MAC address specified in VSSMACRange will be excluded
# during STP post processing.
# By default this value is set to FALSE
ExcludeVSSMACRange FALSE
ExcludeVSSMACRange TRUE
If we set this flag to TRUE, the "VSSMACRange" attribute present in the tpmgr-param.conf will be picked up and checked with the STPnodes BridgedMAC address and if there is match to any of the Identified virtualMAC patterns, then the connection creation will be avoided.
Below is the list of such identified virtualMAC patterns, it can be found in tpmgr-param.conf:
# VSSMACRange
# VSSMACRange is the MAC address range reserved for VSSSwitch. This range of MAC address would be
# excluded during STP post processing
VSSMACRange 00-08-E3-FF-FC-*|00-08-E3-FF-FD-*|00-08-E3-FF-FE-*|00-08-E3-FF-FF-*|5C-45-27-1A-*
<BASEDIR>/IP/smarts/bin/sm_tpmgr -s <IP domain name> --load-conf=tpmgr-param.conf