Troubleshooting LACP Sub-Interfaces Communication Issues with Core Switches
Use this when LACP sub-interfaces cannot communicate through the core switch. Validate bundle membership, VLAN tagging, native VLAN behavior, and switch-side LACP state.
Quick Read
- Symptom: Use this when LACP sub-interfaces cannot communicate through the core switch. Validate bundle membership, VLAN tagging, native VLAN behavior, and switch-side LACP state.
- Check first: Capture the affected source, destination, protocol, port, DNS name, VLAN or subnet, and exact error before changing policy.
- Risk: Review before running
Symptoms
LACP sub-interfaces are unable to communicate with the core switch, resulting in network connectivity issues.
Environment
Cisco IOS-based network environment with LACP configured on multiple sub-interfaces connected to a core switch.
Most Likely Causes
Misconfiguration of LACP settings, VLAN mismatches, or issues with physical connectivity can prevent sub-interfaces from communicating with the core switch.
What to Check First
- Capture the affected source, destination, protocol, port, DNS name, VLAN or subnet, and exact error before changing policy.
- Verify path, name resolution, authentication, and firewall policy separately so one symptom does not hide multiple failures.
- Check whether the issue is isolated to one client, one subnet, one VPN profile, or every path.
Fix Steps
- Verify LACP Configuration on Sub-Interfaces
Check the LACP configuration on the sub-interfaces to ensure they are correctly set up.
Example pattern only. Adjust for your environment before running.
show running-config interface <sub-interface> show etherchannel summary
- Check VLAN Configuration
Ensure that the VLANs assigned to the sub-interfaces match the VLANs configured on the core switch.
Example pattern only. Adjust for your environment before running.
show vlan brief show interface <sub-interface> switchport
- Inspect Physical Connectivity
Examine the physical connections between the sub-interfaces and the core switch for any issues.
Example pattern only. Adjust for your environment before running.
show interfaces status show cdp neighbors
- Monitor LACP Status
Check the status of the LACP protocol to ensure it is operational.
Example pattern only. Adjust for your environment before running.
show lacp neighbor show lacp statistics
- Test Connectivity
Perform a ping test from the sub-interface to the core switch to verify connectivity.
Example pattern only. Adjust for your environment before running.
ping <core-switch-ip>
- Review Logs for Errors
Check the logs for any error messages related to LACP or interface issues.
Example pattern only. Adjust for your environment before running.
show logging | include LACP show logging | include error
Validation
- The same client and network path can reach the target after the change.
- Firewall, VPN, DHCP, DNS, or switch logs show allowed traffic or successful negotiation instead of the prior failure.
- A second path check confirms that the fix did not open unintended access or break another subnet.
Logs to Check
- Firewall, VPN, DNS, DHCP, or switch logs for the failing timestamp.
- Client resolver, route table, VPN client, or browser/network diagnostics.
- Packet capture or flow logs when policy and routing disagree.
Rollback and Escalation
- Export or screenshot the original policy, route, resolver, or interface configuration before changing it.
- Remove temporary allow rules, test DNS records, or route changes after validation.
- Restore the previous VPN profile, firewall rule, or switch configuration if reachability worsens.
Escalate When
- Escalate if the same error persists after rollback and a clean retry from the original failing path.
- Escalate if logs show authorization, data loss, certificate, replication, or production availability risk outside the local service owner scope.
Edge Cases
- If LACP is not enabled on the core switch, enable it and configure the corresponding settings.
- If VLANs are mismatched, reconfigure the VLAN settings on either the sub-interfaces or the core switch.
Notes from the Field
- Most network incidents need source and destination evidence. A successful test from an admin laptop does not prove the affected client path is fixed.
- For VPN and firewall changes, keep the blast radius narrow and time-box any temporary allow rule.