Virtual PortChannel Quick Configuration Guide



Similar documents
Migrate from Cisco Catalyst 6500 Series Switches to Cisco Nexus 9000 Series Switches

Design and Configuration Guide: Best Practices for Virtual Port Channels (vpc) on Cisco Nexus 7000 Series Switches

Design and Implementation Guide. Data Center Design Guide: Implement McAfee Next Generation Firewall for the Perimeter

Chapter 4: Spanning Tree Design Guidelines for Cisco NX-OS Software and Virtual PortChannels

Virtual PortChannels: Building Networks without Spanning Tree Protocol

- EtherChannel - Port Aggregation

Chapter 3: Cisco NX-OS Software Virtual PortChannel: Fundamental Concepts

Using MLAG in Dell Networks

Chapter 2 Lab 2-2, Configuring EtherChannel Instructor Version

Configuring EtherChannels

Cisco Nexus 5548UP. Switch Configuration Guide for Dell PS Series SANs. A Dell Deployment and Configuration Guide

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Configuring EtherChannels

How To Configure Link Aggregation On Supermicro Switch 2 And 3 (Lan) On A Microsoft Vlan 2 And Vlan 3 (Vlan) (Lan 2) (Vlans) (Lummer) (Powerline) (

MLAG on Linux - Lessons Learned. Scott Emery, Wilson Kok Cumulus Networks Inc.

Configuring Link Aggregation

VCE VBLOCK SYSTEMS DEPLOYMENT AND IMPLEMENTATION: NETWORK EXAM

Fundamentals of Switching

Chapter 3. Enterprise Campus Network Design

Cisco FabricPath Technology and Design

RESILIENT NETWORK DESIGN

Configuring LACP (802.3ad) Between a Catalyst 6500/6000 and a Catalyst 4500/4000

Configuring DHCP Snooping

hp ProLiant network adapter teaming

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

Objectives. Explain the Role of Redundancy in a Converged Switched Network. Explain the Role of Redundancy in a Converged Switched Network

Configuring MAC ACLs

What is VLAN Routing?

AT-S60 Version Management Software for the AT-8400 Series Switch. Software Release Notes

Switching in an Enterprise Network

Juniper Networks EX Series/ Cisco Catalyst Interoperability Test Results. May 1, 2009

Implementing Cisco Data Center Unified Fabric Course DCUFI v5.0; 5 Days, Instructor-led

Configuring the Fabric Interconnects

Link Aggregation Interoperability of the Dell PowerConnect 5316M with Cisco IOS or Cisco CatOS based Switches. By Bruce Holmes

Overlay Transport Virtualization

DCUFI - Implementing Cisco Data Center Unified Fabric v5.0

Ethernet Storage Best Practices

Deploying 10 Gigabit Ethernet on VMware vsphere 4.0 with Cisco Nexus 1000V and VMware vnetwork Standard and Distributed Switches - Version 1.

16-PORT POWER OVER ETHERNET WEB SMART SWITCH

How To Balance On A Cisco Catalyst Switch With The Etherchannel On A Fast Ipv2 (Powerline) On A Microsoft Ipv1 (Powergen) On An Ipv3 (Powergadget) On Ipv4

6/8/2011. Document ID: Contents. Introduction. Prerequisites. Requirements. Components Used. Conventions. Introduction

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

LAN Baseline Architecture Branch Office Network Reference Design Guide

Multi-Chassis Trunking for Resilient and High-Performance Network Architectures

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Juniper / Cisco Interoperability Tests. August 2014

Configuring Cisco Nexus 5000 Switches Course DCNX5K v2.1; 5 Days, Instructor-led

How To Switch In Sonicos Enhanced (Sonicwall) On A 2400Mmi 2400Mm2 (Solarwall Nametra) (Soulwall 2400Mm1) (Network) (

TRILL for Service Provider Data Center and IXP. Francois Tallet, Cisco Systems

Configuring DHCP Snooping and IP Source Guard

A Dell Technical White Paper Dell Storage Engineering

Configuring IPS High Bandwidth Using EtherChannel Load Balancing

Microsoft SQL Server 2012 on Cisco UCS with iscsi-based Storage Access in VMware ESX Virtualization Environment: Performance Study

Course Contents CCNP (CISco certified network professional)

AlliedWare Plus OS How To Configure interoperation between PVST+ and RSTP or MSTP

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

VMware Virtual SAN Network Design Guide TECHNICAL WHITE PAPER

NX-OS and Cisco Nexus Switching

High Availability Failover Optimization Tuning HA Timers PAN-OS 6.0.0

CCT vs. CCENT Skill Set Comparison

VMDC 3.0 Design Overview

Securing end devices

A Principled Technologies white paper commissioned by Dell Inc.

- Virtual LANs (VLANs) and VTP -

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

How To Configure InterVLAN Routing on Layer 3 Switches

Interconnecting Cisco Networking Devices Part 2

AT-S63 and AT-S63 NE Version Management Software for the AT-9400 Series Layer 2+ Gigabit Ethernet Switches Software Release Notes

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to CHAPTER

ADVANCED NETWORK CONFIGURATION GUIDE

Configuring Local SPAN and ERSPAN

Can PowerConnect Switches Be Used in IP Multicast Networks?

Summary Report for Individual Task 113-SIG-3002 Implement Local Area Network (LAN) Redundancy Status: Approved

CORPORATE NETWORKING

- Multicast - Types of packets

48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W

BLADE PVST+ Spanning Tree and Interoperability with Cisco

TechBrief Introduction

Layer 3 Network + Dedicated Internet Connectivity

- Spanning Tree Protocol -

Port Trunking. Contents

Implementing L2 at the Data Center Access Layer on Juniper Networks Infrastructure

Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to CHAPTER

Configuring Redundancy

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch

Configuring Link Bundling on Cisco IOS XR Software

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

An Oracle White Paper October How to Connect Oracle Exadata to 10 G Networks Using Oracle s Ethernet Switches

HARTING Ha-VIS Management Software

Configuring ECMP for Host Routes

LiveAction Application Note

Implementation of High Availability

Network configuration for the IBM PureFlex System

Configuring Port Security

DCRS-5650 Dual Stack Ethernet Switch Datasheet

Expert Reference Series of White Papers. VMware vsphere Distributed Switches

Network Configuration Example

Transcription:

Virtual PortChannel Quick Configuration Guide Overview A virtual PortChannel (vpc) allows links that are physically connected to two different Cisco Nexus 5000 Series devices to appear as a single PortChannel to a third device. The third device can be a Cisco Nexus 2000 Series Fabric Extender or a switch, server, or any other networking device. A vpc can provide Layer 2 multipathing, which allows you to create redundancy by increasing bandwidth, enabling multiple parallel paths between nodes and loadbalancing traffic where alternative paths exist. After you enable the vpc function, you create a peer keepalive link, which sends heartbeat messages between the two vpc peer devices. The vpc domain includes both vpc peer devices, the vpc peer keepalive link, the vpc peer link, and all the PortChannels in the vpc domain connected to the downstream device. You can have only one vpc domain ID on each device. A vpc provides the following benefits: Allows a single device to use a PortChannel across two upstream devices Eliminates Spanning Tree Protocol blocked ports Provides a loop-free topology Uses all available uplink bandwidth Provides fast convergence if either the link or a device fails Provides link-level resiliency Helps ensure high availability The vpc not only allows you to create a PortChannel from a switch or server that is dual-homed to a pair of Cisco Nexus 5000 Series Switches, but it can also be deployed along with Cisco Nexus 2000 Series Fabric Extenders. The deployment scenario in Figure 1 creates a vpc between the two ports on each of two Cisco fabric extenders. Figure 1. vpc with Two Ports from Each of Two Fabric Extenders 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 9

The vpc deployment scenario in Figure 2 allows the Cisco Nexus 2000 Series Fabric Extenders to connect to a pair of Cisco Nexus 5000 Series Switches and make all links active. Figure 2. vpc with Each Fabric Extender Dual-Connected to Two Cisco Nexus 5000 Series Switches In addition to the two topologies in Figures 1 and 2, you can use vpc on any device that supports PortChannels, to achieve resilience and high throughput when the device is connected to a pair of Cisco Nexus 5000 Series Switches. vpc Concepts The following list defines critical vpc concepts: vpc: vpc refers to the combined PortChannel between the vpc peer devices and the downstream device. vpc peer switch: The vpc peer switch is one of a pair of switches that are connected to the special PortChannel known as the vpc peer link. One device will be selected as the primary device, and the other will be the secondary device. vpc peer link: The vpc peer link is the link used to synchronize states between the vpc peer devices. The vpc peer link carries control traffic between two vpc switches and also multicast, broadcast data traffic. In some link failure scenarios, it also carries unicast traffic. You should have at least two 10 Gigabit Ethernet interfaces for peer links. vpc domain: This domain includes both vpc peer devices, the vpc peer keepalive link, and all the PortChannels in the vpc connected to the downstream devices. It is also associated with the configuration mode that you must use to assign vpc global parameters. vpc peer keepalive link: The peer keepalive link monitors the vitality of a vpc peer switch. The peer keepalive link sends periodic keepalive messages between vpc peer devices. The vpc peer keepalive link can be a management interface or switched virtual interface (SVI). No data or synchronization traffic moves over the vpc peer keepalive link; the only traffic on this link is a message that indicates that the originating switch is operating and running vpc. vpc member port: vpc member ports are interfaces that belong to the vpcs. Figure 3 illustrates these concepts. 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 9

Figure 3. vpc Concepts vpc Configuration vpc configuration on the Cisco Nexus 5000 Series includes these steps: Enable the vpc feature. Create a vpc domain and enter vpc-domain mode. Configure the vpc peer keepalive link. (Optional) Configure system priority. (Optional) Configure vpc role priority. Create the vpc peer link. Move the PortChannel to vpc. Table 1 provides details about these steps. Table 1. vpc Configuration Steps Command Purpose Step 1 configure t Enter the global configuration mode. Step 2 Step 3 feature vpc switch(config)feature vpc vpc domain domain-id switch(config)# vpc domain 5 switch(config-vpc-domain)# Enable the vpc feature. The vpc feature must be enabled before it can be configured Create a vpc domain and assign a domain ID. Step 4 peer-keepalive destination ipaddress [hold-timeout secs interval msecs {timeout secs} {precedence {prec-value network internet critical flash-override flash immediate priority routine}} tos {tos-value maxreliability max-throughput min-delay min-monetarycost normal}} tos-byte tos-byte-value} source ipaddress vrf {management default}] Management interface for peer keepalive link: switch(config-vpc-domain)# peer-keepalive destination 172.28.230.85 switch(config-vpc-domain)# SVI for peer keepalive link: switch(config-vpc-domain)#peer-keepalive destination 172.28.1.100 source 172.28.1.120 vrf default Configure the IPv4 address for the remote end of the vpc peer keepalive link. The system does not create the vpc peer link until you configure a vpc peer keepalive link. The Cisco Nexus 5000 Series does not support creation or configuration of additional Virtual Route Forwarding (VRF) instances. Two VRF instances are created when the system boots: management and default. The management interface is in the VRF management instance, and all SVIs are in the VRF default instance. Both management interfaces and SVIs can be used for peer keepalive links. The management interface and VRF management instance are the defaults. The second example shows how to configure the SVI as the keepalive link. The source address must be specified when the VRF default instance is used for peer keepalive communication. 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 9

Step 5 Step 6 Step 7 Step 8 system-priority priority switch(config-vpc-domain)# system-priority 4000 switch(config-vpc-domain)# role priority priority switch(config-vpc-domain)# role priority 2000 switch(config-vpc-domain)# interface port-channel channel-number vpc peer-link switch(config)# interface port-channel 20 switch(config-if)# vpc peer-link interface port-channel channel-number vpc number switch(config)#interface e1/1 switch(config-if)channel-group 20 switch(config-if)# interface port-channel 20 switch(config-if)# vpc 100 (Optional) Enter the system priority that you want for the specified vpc domain. The range of values is 1 to 65535. The default value is 32667. You should manually configure the vpc system priority when you are running Link Aggregation Control Protocol (LACP) to help ensure that the vpc peer devices are the primary devices on LACP. When you manually configure the system priority, make sure that you configure the same priority value on both vpc peer devices. If these values do not match, vpc will not be activated. (Optional) Enter the role priority that you want for this vpc switch. The range of values is 1 to 65636, and the default value is 32667. The switch with lower priority will be elected as the vpc primary switch. If the peer link fails, vpc peer will detect whether the peer switch is alive through the vpc peer keepalive link. If the vpc primary switch is alive, the vpc secondary switch will suspend its vpc member ports to prevent potential looping while the vpc primary switch keeps all its vpc member ports active. Select the PortChannel that you want to use as the vpc peer link for this device, and enter the interface configuration mode. Configure the selected PortChannel as the vpc peer link. Add the interface to the PortChannel and then move the PortChannel to the vpc to connect to the downstream device. The vpc number ranges from 1 to 4096. The vpc number does not need to match the PortChannel number, but it must match the number of the vpc peer switch for that vpc bundle. A PortChannel is needed even if there is only one member interface for the PortChannel. When there is only one member for the PortChannel, the hardware PortChannel resource will not be created. vpc Configuration Examples Following are the steps to configure vpc on Cisco 5000 Series Switch 1 shown in Figure 4. Figure 4. vpc Configuration vpc with Two Ports from Two Fabric Extenders 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 9

Step 1. Configure the management interface IP address and default route. N5k-1(config)# int mgmt 0 N5k-1(config-if)# ip address 172.25.182.51/24 N5k-1(config-if)# vrf context management N5k-1(config-vrf)# ip route 0.0.0.0/0 172.25.182.1 Step 2. Enable vpc and LACP. N5k-1(config)# feature vpc N5k-1(config)# feature lacp Step 3. Create a VLAN. N5k-1(config)#vlan 101 Step 4. Create the vpc domain. N5k-1(config)# vpc domain 1 Step 5. Configure the vpc role priority (optional). N5k-1(config-vpc-domain)# role priority 1000 Step 6. Configure the peer keepalive link. The management interface IP address for Cisco Nexus 5000 Series Switch 2 is 172.25.182.52. N5k-1(config-vpc-domain)# peer-keepalive destination 172.25.182.52 Note: --------:: Management VRF will be used as the default VRF ::-------- Step 7. Configure the vpc peer link. Note that, as for a regular interswitch trunk, trunking must be turned on for the VLANs to which the vpc member port belongs. N5k-1(config-vpc-domain)# int ethernet 1/17-18 N5k-1(config-if-range)# channel-group 1 mode active N5k-1(config-if-range)# int po1 N5k-1(config-if)# vpc peer-link N5k-1(config-if)# switchport mode trunk N5k-1(config-if)# switchport trunk allowed vlan 1,101 Step 8. Configure the Cisco Nexus 2000 Series Fabric Extenders and the fabric interface. N5k-1(config)# fex 100 N5k-1(config-fex)# pinning max-links 1 Change in Max-links will cause traffic disruption. N5k-1(config-fex)# int e1/7-8 N5k-1(config-if-range)# channel-group 100 N5k-1(config-if-range)# int po100 N5k-1(config-if)# switchport mode fex-fabric N5k-1(config-if)# fex associate 100 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 9

Step 9. Move the fabric extender interface to vpc. After fabric extender 100 (fex 100) comes online, create the PortChannel for interface eth100/1/1 and move the PortChannel to the vpc. Note that the PortChannel number and vpc number can be different, but the vpc number must be the same on both Cisco Nexus 5000 Series Switches. N5k-1(config-if)# int ethernet 100/1/1 N5k-1(config-if)# channel-group 10 N5k-1(config-if)# int po10 N5k-1(config-if)# vpc 10 N5k-1(config-if)# switchport access vlan 101 The configuration steps for the second switch, Cisco Nexus 5000 Series Switch 2, are: N5k-2(config)# int mgmt 0 N5k-2(config-if)# ip address 172.25.182.52/24 N5k-2(config-if)# vrf context management N5k-2(config-vrf)# ip route 0.0.0.0/0 172.25.182.1 N5k-2(config)# feature vpc N5k-2(config)# feature lacp N5k-2(config)#vlan 101 N5k-2(config)# vpc domain 1 N5k-2(config-vpc-domain)# peer-keepalive destination 172.25.182.51 Note: --------:: Management VRF will be used as the default VRF ::-------- N5k-2(config-vpc-domain)# int ethernet 1/17-18 N5k-2(config-if-range)# channel-group 1 mode active N5k-2(config-if-range)# int po1 N5k-2(config-if)# vpc peer-link N5k-2(config-if)# switchport mode trunk N5k-2(config-if)# switchport trunk allowed vlan 1,101 N5k-2(config)# fex 100 N5k-2(config-fex)# pinning max-links 1 Change in Max-links will cause traffic disruption. N5k-2(config-fex)# int e1/9-10 N5k-2(config-if-range)# channel-group 100 N5k-2(config-if-range)# int po100 N5k-2(config-if)# switchport mode fex-fabric N5k-2(config-if)# fex associate 100 N5k-2(config-if)# int ethernet 100/1/1 N5k-2(config-if)# channel-group 10 N5k-2(config-if)# int po10 N5k-2(config-if)# vpc 10 N5k-2(config-if)# switchport access vlan 101 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 9

For the deployment scenario in Figure 5, the fabric extender is dual-connected to a pair of Cisco Nexus 5000 Series Switches. Most vpc-related configuration steps are the same as in the previous example, except that the fabric interfaces on the Cisco Nexus 5000 Series Switches will be moved to the vpc rather than to the fabric extender host interface. Figure 5. vpc Configuration Fabric Extender Dual-Connected to Cisco Nexus 5000 Series Switches N5k-1(config-fex)# int e1/7-8 N5k-1(config-if-range)# channel-group 100 N5k-1(config-if-range)# int po100 N5k-1(config-if)# vpc 100 N5k-1(config-if)# switchport mode fex-fabric N5k-1(config-if)# fex associate 100 Verifying the vpc Configuration Use the commands in Table 2 to display vpc configuration information. Table 2. Command show feature Commands for Verifying vpc Configuration Purpose Reports whether or not vpc is enabled show vpc brief show vpc consistency-parameters show running-config vpc show port channel capacity show vpc statistics show vpc peer-keepalive show vpc role Displays brief information about the vpcs Displays the status of those parameters that must be consistent across all vpc interfaces Displays running configuration information for vpcs Reports the number of PortChannels that are configured and the number that are still available on the device Displays statistics about the vpcs Displays information about the peer keepalive messages Displays the peer status, role of the local device, vpc system MAC address and system priority, and MAC address and priority for the local vpc device 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 9

vpc Configuration Compatibility Checking Many configuration and operational parameters must be identical on all interfaces in the vpc. You should configure the Layer 2 PortChannels that you use for the vpc peer link in trunk mode. After you enable the vpc feature and configure the peer link on both vpc peer devices, Cisco Fabric Services messages provide a copy of the configuration on the local vpc peer device to the remote vpc peer device. The system then determines whether any of the crucial configuration parameters differ on the two devices. Enter the show vpc consistency-parameters command to display the configured values on all interfaces in the vpc. The displayed configurations are only those configurations that would prevent the vpc peer link and vpc from operating. There are two different types of configuration parameters from a vpc compatibility perspective. The first type of parameters must be identical on both vpc switches, and any difference will prevent the vpc peer link or vpc from functioning. The configuration of the second type of parameters should be identical on both switches; any differences in these parameters will result in undesired behavior. Configuration Parameters That Must Be Identical The configuration parameters listed in this section must be configured identically on both devices of the vpc peer link or the vpc will enter suspend mode. The devices automatically check for compatibility of some of these parameters on the vpc interfaces. The per-interface parameters must be consistent per interface, and the global parameters must be consistent globally. PortChannel mode On, off, or active Link speed per PortChannel Duplex mode per PortChannel Trunk mode per PortChannel Native VLAN Spanning Tree Protocol mode Spanning Tree Protocol region configuration for Multiple Spanning Tree (MST) Protocol Enable or disable state per VLAN Spanning Tree Protocol global settings Bridge assurance setting Port type setting (you should set all vpc interfaces as network ports) Loop guard settings Spanning Tree Protocol interface settings Port type setting Loop guard Root guard Quality of service (QoS) configuration and parameters Priority flow control (PFC) Strict priority queuing and deficit weighted round robin (DWRR) Maximum transmission unit (MTU) 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 9

If any of these parameters are not enabled or defined on either device, the vpc consistency check ignores those parameters. Configuration Parameters That Should Be Identical When any of the following parameters are not configured identically on both vpc peer devices, a misconfiguration may cause undesirable behavior in the traffic flow: MAC address aging timers Static MAC address entries All access control list (ACL) configurations and parameters Spanning Tree Protocol interface settings Bridge Protocol Data Unit (BPDU) filter BPDU guard Cost Link type Priority VLANs (Rapid Per-VLAN Spanning Tree Plus [PVST+]) Internet Group Management Protocol (IGMP) snooping To ensure that all the configuration parameters are compatible, you should display the configuration information for each vpc peer device after you configure the vpc. Printed in USA C07-543563-00 07/09 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 9