Page 2
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. http://cisco.com/ Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at go/trademarks .
C H A P T E R 3 Information About Ethernet Interfaces About the Interface Command Information About Unified Ports About the Unidirectional Link Detection Parameter Default UDLD Configuration UDLD Aggressive and Nonaggressive Modes Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 4
Configuring the Description Parameter Disabling and Restarting Ethernet Interfaces Displaying Interface Information Default Physical Ethernet Settings Configuring VLANs C H A P T E R 4 Information About VLANs Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 5
Configuring a Promiscuous Trunk Port Configuring an Isolated Trunk Port Configuring the Allowed VLANs for PVLAN Trunking Ports Configuring Native 802.1Q VLANs on Private VLANs Verifying Private VLAN Configuration Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 6
LACP-Enabled and Static EtherChannels Differences Configuring Port Channels Creating an EtherChannel Adding a Port to an EtherChannel Configuring Load Balancing Using EtherChannels Configuring Hardware Hashing for Multicast Traffic Enabling LACP Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 7
Auto-Recovery vPC Peer Links vPC Peer Link Overview vPC Number vPC Interactions with Other Features vPC and LACP vPC Peer Links and STP CFSoE vPC Guidelines and Limitations Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 8
Default Settings Configuring Rapid PVST+ C H A P T E R 9 Information About Rapid PVST+ Understanding STP STP Overview Understanding How a Topology is Created Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1) viii...
Page 9
Rapid PVST+ Interoperation with 802.1s MST Configuring Rapid PVST+ Enabling Rapid PVST+ Enabling Rapid PVST+ per VLAN Configuring the Root Bridge ID Configuring a Secondary Root Bridge Configuring the Rapid PVST+ Port Priority Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 10
Specifying the MST Configuration Revision Number Specifying the Configuration on an MST Region Mapping and Unmapping VLANs to MST Instances Mapping Secondary VLANs to Same MSTI as Primary VLANs for Private VLANs Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 11
Configuring Spanning Tree Edge Ports on Specified Interfaces Configuring Spanning Tree Network Ports on Specified Interfaces Enabling BPDU Guard Globally Enabling BPDU Guard on Specified Interfaces Enabling BPDU Filtering Globally Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 12
Configuring Traffic Storm Control Verifying Traffic Storm Control Configuration Traffic Storm Control Example Configuration Default Traffic Storm Settings Configuring the Fabric Extender C H A P T E R 1 6 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 13
Disassociating a Fabric Extender From an Interface Configuring Fabric Extender Global Features Enabling the Fabric Extender Locator LED Redistributing the Links Changing the Number of Links Maintaining the Pinning Order Redistributing Host Interfaces Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1) xiii...
Page 14
Contents Verifying the Fabric Extender Configuration Verifying the Chassis Management Information Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Preface This preface describes the audience, organization, and conventions of the Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide. It also provides information on how to obtain related documentation. • Audience, page xv • Document Organization, page xv •...
Related Documentation for Nexus 5000 Series NX-OS Software Cisco NX-OS documentation is available at the following URL: http://www.cisco.com/en/US/products/ps9670/tsd_products_support_series_home.htmll The documentation set for the Cisco Nexus 5000 Series NX-OS software includes the following documents: Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 17
Configuration Guides • Cisco Nexus 5000 Series NX-OS Configuration Limits for Cisco NX-OS Release 5.0(2)N1(1) • Cisco Nexus 5000 Series NX-OS Configuration Limits for Cisco NX-OS Release 4.2(1)N1(1) and Release 4.2(1)N2(1) • Cisco Nexus 5000 Series NX-OS Multicast Configuration Guide •...
Obtaining Documentation and Submitting a Service Request For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at: http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html...
Series NX-OS Layer 2 Switching Configuration Guide. The latest version of this document is available at the following Cisco website: http://www.cisco.com/en/US/products/ps9670/products_installation_and_configuration_guides_list.html To check for additional information about Cisco NX-OS, see the Cisco Nexus 5000 Series NX-OS Release Notes available at the following Cisco website: http://www.cisco.com/en/US/products/ps9670/prod_release_notes_list.html This table summarizes the new and changed features documented in the Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N2(1), and tells you where they are documented.
Page 20
This table summarizes the new and changed features documented in the Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1), and tells you where they are documented. Table 2: New and Changed Layer 2 Switching Features for Cisco NX-OS Release 5.0(3)N1(1)
Page 21
Extenders connections. This table summarizes the new and changed features documented in the Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(2)N2(1), and tells you where they are documented. Table 3: New and Changed Layer 2 Switching Features for Cisco NX-OS Release 5.0(2)N2(1)
Page 22
Extenders Extenders. This table summarizes the new and changed features documented in the Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(2)N1(1), and tells you where they are documented. Table 4: New and Changed Layer 2 Switching Features for Cisco NX-OS Release 5.0(2)N1(1)
Page 23
Extenders Extenders. This table summarizes the new and changed features documented in the Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 4.2(1)N1(1), and tells you where they are documented. Table 6: New and Changed Layer 2 Switching Features for Cisco NX-OS Release 4.2(1)N1(1)
Part 2: LAN Switching of the Cisco Nexus 5000 Series CLI Configuration Guide. For a complete list of Nexus 5000 Series document titles, see the list of Related Documentation in the "Preface." Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
C H A P T E R Overview Cisco Nexus 5000 Series switches support the Layer 2 features that are described in this guide. • Layer 2 Ethernet Switching Overview, page 7 • VLANs, page 7 • Private VLANs, page 8 •...
Note Inter-Switch Link (ISL) trunking is not supported on the NX-OS software for the Cisco Nexus 5000 Series. Private VLANs Private VLANs provide traffic separation and security at the Layer 2 level.
Overview Rapid PVST+ Cisco NX-OS for the Cisco Nexus 5000 Series uses the extended system ID and MAC address reduction; Note you cannot disable these features. In addition, Cisco has created some proprietary features to enhance the spanning tree activities.
C H A P T E R Configuring Ethernet Interfaces This section describes the configuration of the Ethernet interfaces on a Cisco Nexus 5000 Series switch. It contains the following sections: • Information About Ethernet Interfaces, page 11 • Configuring Ethernet Interfaces, page 17 •...
Beginning in Cisco NX-OS Release 5.0(3)N1(1b), Cisco introduces unified port technology. Cisco Nexus unified ports allow you to configure a physical port on a Cisco Nexus 5500 Platform switch as a 1/10-Gigabit Ethernet, Fibre Channel over Ethernet (FCoE), or 1-, 2-, 4-, 8-Gigabit native Fibre Channel port.
Layer 1. A Cisco Nexus 5000 Series switch periodically transmits UDLD frames to neighbor devices on LAN ports with UDLD enabled. If the frames are echoed back within a specific time frame and they lack a specific acknowledgment (echo), the link is flagged as unidirectional and the LAN port is shut down.
About Interface Speed A Cisco Nexus 5000 Series switch has a number of fixed 10-Gigabit ports, each equipped with SFP+ interface adapters. The Cisco Nexus 5010 switch has 20 fixed ports, the first 8 of which are switchable 1-Gigabit and 10-Gigabit ports.
Beginning with Cisco NX-OS Release 5.0(2)N1(1), you can create a port profile that contains many interface commands and apply that port profile to a range of interfaces on the Cisco Nexus 5000 Series switch. Port profiles can be applied to the following interface types: •...
However, the port profile retains that command in the port profile. • The port profile’s commands take precedence over the default commands on the interface, unless the default command explicitly overrides the port profile command. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
About MTU Configuration The Cisco Nexus 5000 Series switch is a Layer 2 device. This means it does not fragment frames. As a result, the switch cannot have two ports in the same Layer 2 domain with different maximum transmission units (MTUs).
Configuring Unified Ports You can configure a unified port on a Cisco Nexus 5548UP switch, a Cisco Nexus 5596UP switch, or a Cisco Nexus 5548P switch with an installed Cisco N55-M16UP expansion module. Unified ports allow you to configure ports as Ethernet, native Fibre Channel, or Fibre Channel over Ethernet (FCoE) ports.
ERROR: FC range should end on last port of the module On a Cisco Nexus 5548UP switch, the 32 ports of the main slot (slot1) are unified ports. The Ethernet ports start from port 1/1 to port 1/32. The Fibre Channel ports start from port 1/32 backwards to port 1/1.
Configuring Ethernet Interfaces Configuring the UDLD Mode This example shows how to configure a unified port on a Cisco Nexus 5548UP switch or Cisco Nexus 5596UP switch: switch# configure terminal switch(config)# slot 1 switch(config-slot)# port 32 type fc switch(config-slot)# copy running-config startup-config...
Configuring Interface Speed The first 8 ports of a Cisco Nexus 5010 switch and the first 16 ports of a Cisco Nexus 5020 switch are switchable 1-Gigabit and 10-Gigabit ports. The default interface speed is 10-Gigabit. To configure these ports for 1-Gigabit Ethernet, insert a 1-Gigabit Ethernet SFP transceiver into the applicable port and then set its speed with the speed command.
10 Gigabits. Configuring the CDP Characteristics You can configure the frequency of Cisco Discovery Protocol (CDP) updates, the amount of time to hold the information before discarding it, and whether or not to send Version-2 advertisements. To configure CDP characteristics for an interface, perform this task: SUMMARY STEPS 1.
You can use this procedure to configure the err-disabled recovery timer value. The range is from 30 to 65535 seconds. The default is 300 seconds. SUMMARY STEPS 1. config t 2. errdisable recovery interval interval 3. show interface status err-disabled 4. copy running-config startup-config Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
This section includes the following topics: Creating a Port Profile You can create a port profile on the switch. Each port profile must have a unique name across interface types and the network. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
This example shows how to add the interface commands to a port profile named ppEth configured for Ethernet interfaces: switch# configure terminal switch(config)# port-profile ppEth switch(config-port-prof)# switchport mode trunk switch(config-port-prof)# switchport trunk allowed vlan 300-400 switch(config-port-prof)# flowcontrol receive on Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Step 3 state enabled name Enables the port profile. Example: switch(config-port-prof)# state enabled switch(config-port-prof)# Step 4 Exits the port profile configuration mode. exit Example: switch(config-port-prof)# exit switch(config)# Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
This example shows how to remove an inherited port profile named ppEth from an existing port profile named test: switch# configure terminal switch(config)# port-profile test Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Step 4 exit Exits the port profile configuration mode. Example: switch(config-port-prof)# exit switch(config)# Step 5 (Optional) show port-profile Displays the port profile configuration. Example: switch(config)# show port-profile name Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Enters configuration mode. Step 2 switch(config)# interface type slot/port Enters interface configuration mode for the specified interface. Step 3 switch(config-if)# description test Specifies the description for the interface. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
The following example shows how to restart an Ethernet interface: switch# configure terminal switch(config)# interface ethernet 1/4 switch(config-if)# no shutdown Displaying Interface Information To view configuration information about the defined interfaces, perform one of these tasks: Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
The following example shows how to display the link debounce status (some of the output has been removed for brevity): switch# show interface debounce -------------------------------------------------------------------------------- Port Debounce time Value(ms) -------------------------------------------------------------------------------- Eth1/1 enable Eth1/2 enable Eth1/3 enable Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
N5K-C5020P-BA Eth1/5 Note From Cisco NX-OS Release 4.0(1a)N1(1), the default value of the device ID field for CDP advertisement has been changed from the chassis serial number to the hostname and serial number, as in the example above. Default Physical Ethernet Settings...
C H A P T E R Configuring VLANs This chapter describes how to configure VLANs on the Cisco Nexus 5000 Series switch. It contains the following sections: • Information About VLANs, page 43 • Configuring a VLAN, page 47...
VLANs are not passing packets. By default, the VLANs are in the active state and pass traffic. The VLAN Trunking Protocol (VTP) mode is OFF. VTP BPDUs are dropped on all interfaces of a Cisco Note Nexus 5000 Series switch.
VLANs 3968 to 4047 and 4094 are reserved for internal use; these VLANs cannot be changed or used. Cisco NX-OS allocates a group of 80 VLAN numbers for those features, such as multicast and diagnostics, that need to use internal VLANs for their operation. By default, the system allocates VLANs numbered 3968 to 4047 for internal use.
Each switch can be in only one VTP domain. Layer 2 trunk interfaces, Layer 2 port channels, and virtual port channels (vPCs) support VTP functionality. Cisco NX-OS Release 5.0(2)N1(1) introduces the support for VTPv1 and VTP2. Beginning in Cisco NX-OS Release 5.0(2)N2(1), you can configure VTP in client or server mode.
Configuring a VLAN • If you enable VTP, you must configure either version 1 or version 2. On the Cisco Nexus 5010 and Nexus 5020 switch, 512 VLANs are supported. If these switches are in a distribution network with other switches, the limit remains the same.
{ethernet slot/port | Specifies the interface to configure, and enters the interface port-channel number} configuration mode. The interface can be a physical Ethernet port or an EtherChannel. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
5 Configuring VTP Beginning with Cisco NX-OS Release 5.0(2)N2(1), you can configure VTP in the client or server mode on Cisco Nexus 5000 Series switches. Before Cisco NX-OS Release 5.0(2)N2(1), VTP worked only in transparent mode.
Displays information about VTP advertisement statistics on the device. Example: switch# show vtp counters Step 11 (Optional) show vtp interface Displays the list of VTP enabled interfaces. Example: switch# show vtp interface Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
[vlan_id | Displays VLAN information. vlan_range] switch# show vlan [brief | id [vlan_id | vlan_range] Displays selected configuration information for the | name name | summary] defined VLAN(s). Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
The following example shows the VLAN settings summary: switch# show vlan summary Number of existing VLANs Number of existing user VLANs Number of existing extended VLANs : 0 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
C H A P T E R Configuring Private VLANs This chapter describes how to configure private VLANs on the Cisco Nexus 5000 Series switch. It contains the following sections: • Information About Private VLANs, page 55 • Guidelines and Limitations for Private VLANs, page 60 •...
VLANs or in any isolated VLANs at the Layer 2 level. Private VLAN Ports The three types of private VLAN ports are as follows: Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
VLANs in a private VLAN domain. The ports within one community can communicate, but these ports cannot communicate with ports in any other community or isolated VLAN in the private VLAN. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
To allow host ports in secondary VLANs to communicate outside the private VLAN, you associate secondary VLANs to the primary VLAN. If the association is not operational, the host ports (community and isolated ports) in the secondary VLAN are brought down. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
VLAN tag. Isolated trunk ports are intended to be connected to host servers. To support isolated private VLAN ports on a Cisco Nexus 2000 Series Fabric Extender, the Cisco Nexus 5000 Series switch must prevent communication between the isolated ports on the Fabric Extender; all forwarding occurs through the Cisco Nexus 5000 Series switch.
• Enter the private-vlan synchronize command from within the Multiple Spanning Tree (MST) region definition to map the secondary VLANs to the same MST instance as the primary VLAN. • Beginning with Cisco NX-OS Release 5.0(2)N2(1), the number of mappings on a private-vlan trunk port is limited to 16.
• Use the remove keyword with a secondary-vlan-list to clear the association between secondary VLANs and a primary VLAN. • You change the association between a secondary and primary VLAN by removing the existing association and then adding the desired association. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
VLANs. Configuring a private VLAN host port involves two steps. First, you define the port as a private VLAN host port and then you configure a host association between the primary and secondary VLANs. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
In a private VLAN domain, promiscuous ports are part of the primary VLAN. Configuring a promiscuous port involves two steps. First, you define the port as a promiscuous port and then you configure the mapping between a secondary VLAN and the primary VLAN. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
In a private VLAN domain, promiscuous trunks are part of the primary VLAN. Promiscuous trunk ports can carry multiple primary VLANs. Multiple secondary VLANs under a given primary VLAN can be mapped to a promiscuous trunk port. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
(Optional) association trunk [primary-vlan-id] Removes the private VLAN association from the port. If the primary-vlan-id is not supplied, all private VLAN associations are removed from the port. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
This example shows how to add VLANs to the list of allowed VLANs on an Ethernet private VLAN trunk port: switch# configure terminal switch(config)# interface ethernet 1/3 switch(config-if)# switchport private-vlan trunk allowed vlan 15-20 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Typically, you configure 802.1Q trunks with a native VLAN ID, which strips tagging from all packets on that VLAN. This configuration allows untagged traffic and control traffic to transit the Cisco Nexus 5000 Series switch. Secondary VLANs cannot be configured with a native VLAN ID on promiscuous trunk ports. Primary VLANs cannot be configured with a native VLAN ID on isolated trunk ports.
The following example shows how to display enabled features (some of the output has been removed for brevity): switch# show feature Feature Name Instance State -------------------- -------- -------- fcsp enabled interface-vlan enabled private-vlan enabled udld disabled Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
VLANs over a single link and allow you to extend VLANs across the network. Note Cisco NX-OS supports only IEEE 802.1Q-type VLAN trunk encapsulation. This chapter describes the configuration of access or trunk ports on Cisco Nexus 5000 Series switches. It includes the following sections: •...
An Ethernet interface can function as either an access port or a trunk port; it cannot function as both port Note types simultaneously. Related Topics Understanding IEEE 802.1Q Encapsulation, on page 73 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that port drops the packet without learning its MAC source address. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
VLAN. It is also possible for traffic to become part of the native VLAN by sending untagged packets into an 802.1Q trunk port. To address the above issues, the vlan dot1q tag native command performs the following functions: Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
VLAN ID. This feature is supported on all the directly connected Ethernet and EtherChannel interfaces of the Cisco Nexus 5000 Series switch. It is also supported on all the host interface ports of any attached Cisco Nexus 2000 Series Fabric Extender.
Sets the interface to spanning-tree port type edge, turns on bpdu filtering and bpdu guard. Apply this command only to switchports which connect to Note hosts. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
This example shows how to set an interface as an Ethernet trunk port: switch# configure terminal switch(config)# interface ethernet 1/3 switch(config-if)# switchport mode trunk Related Topics Understanding IEEE 802.1Q Encapsulation, on page 73 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Typically, you configure 802.1Q trunks with a native VLAN ID, which strips tagging from all packets on that VLAN. This configuration allows all untagged traffic and control traffic to transit the Cisco Nexus 5000 Series switch. Packets that enter the switch with 802.1Q tags that match the native VLAN ID value are similarly stripped of tagging.
Displays the interface configuration switch# show interface switchport Displays information for all Ethernet interfaces, including access and trunk interfaces. switch# show interface brief Displays interface configuration information. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
C H A P T E R Configuring EtherChannels This chapter describes how to configure EtherChannels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of EtherChannels in Cisco NX-OS. It contains the following sections: •...
The EtherChannel is operationally down when all member ports are operationally down. Compatibility Requirements When you add an interface to a channel group, Cisco NX-OS checks certain interface attributes to ensure that the interface is compatible with the channel group. Cisco NX-OS also checks a number of operational attributes for an interface before allowing that interface to participate in the port-channel aggregation.
• LACP port priority • Debounce Beginning with Cisco NX-OS Release 5.0(2)N2(1), after you enable forcing a port to be added to a channel group by entering the channel-group force command, the following two conditions occur: • When an interface joins a port channel the following parameters are removed and they are operationally replaced with the values on the port channel;...
Load Balancing Using EtherChannels Cisco NX-OS load balances traffic across all operational interfaces in an EtherChannel by reducing part of the binary pattern formed from the addresses in the frame to a numerical value that selects one of the links in the channel.
Nexus 5000 Series. The following table shows the criteria used for each configuration: Table 12: EtherChannel Load-Balancing Criteria for the Cisco Nexus 2232 and Cisco Nexus 2248 Fabric Extenders Configuration Layer 2 Criteria...
EtherChannel; using source addresses or IP addresses might result in better load balancing. Understanding LACP LACP Overview Note You must enable the LACP feature before you can configure and use LACP functions. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Figure 7: Individual Links Combined into an EtherChannel With LACP, just like with static port-channels, you can bundle up to 16 interfaces in a channel group. When you delete the EtherChannel, Cisco NX-OS automatically deletes the associated channel group. All Note member interfaces revert to their previous configuration.
EtherChannel, based on criteria such as the port speed and the trunking state. The passive mode is useful when you do not know whether the remote system, or partner, supports LACP. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Maximum number of links in channel Configuring Port Channels Creating an EtherChannel You can create an EtherChannel before creating a channel group. Cisco NX-OS automatically creates the associated channel group. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Adding a Port to an EtherChannel You can add a port to a new channel group or to a channel group that already contains ports. Cisco NX-OS creates the EtherChannel associated with this channel group if the EtherChannel does not already exist.
(config)# port-channel load-balance ethernet source-ip Before Release 4.0(1a)N1 of Cisco NX-OS, the source-dest-ip, source-dest-mac, and source-dest-port Note keywords were source-destination-ip, source-destination-mac, and source-destination-port, respectively. Related Topics Enabling LACP, on page 93 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
LACP learns the capabilities of LAN port groups dynamically and informs the other LAN ports. Once LACP identifies correctly matched Ethernet links, it facilitates grouping the links into an EtherChannel. The EtherChannel is then added to the spanning tree as a single bridge port. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
(30 seconds) to the fast rate (1 second). This command is supported only on LACP-enabled interfaces. Before You Begin Ensure that you have enabled the LACP feature. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Before You Begin Ensure that you have enabled the LACP feature. SUMMARY STEPS 1. switch# configure terminal 2. switch(config)# lacp system-priority priority 3. (Optional) switch# show lacp system-identifier Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Configures the port priority for use with LACP. Valid values are 1 through 65535, and higher numbers have lower priority. The default value is 32768. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Administratively shuts down the port channel. shutdown Example: switch(config-if)# shutdown switch(config-if) # Step 4 no lacp graceful-convergence Disables LACP graceful convergence on the specified port channel. Example: switch(config-if)# no lacp graceful-convergence switch(config-if) # Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
• Ensure that you are in the correct VDC. To switch to the correct VDC, enter the switchto vdc command. SUMMARY STEPS 1. configure terminal 2. interface port-channel number 3. shutdown 4. lacp graceful-convergence 5. no shutdown 6. (Optional) copy running-config startup-config Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Certain traffic flows are not subject to hashing, for example when there is a single port in a port-channel. Note To display the load-balancing outgoing port ID, perform one of the tasks listed in the table below. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
A virtual port channel (vPC) allows links that are physically connected to two different Cisco Nexus 5000 Series switches or Cisco Nexus 2000 Series Fabric Extenders to appear as a single port channel by a third device (see the following figure). The third device can be a switch, server, or any other networking device.
To create a vPC peer link you configure an EtherChannel on one Cisco Nexus 5000 Series switch by using two or more Ethernet ports. On the other switch, you configure another EtherChannel again using two or more Ethernet ports.
The vPC domain ID must be the same on both switches. • vPC peer-keepalive link—The peer-keepalive link monitors the vitality of a vPC peer Cisco Nexus 5000 Series device. The peer-keepalive link sends configurable, periodic keepalive messages between vPC peer devices.
Nexus 5000 series switches or a pair of Nexus 5500 Series switches but you cannot connect a Nexus 5000 Series switch to a Nexus 5500 Series switch in a vPC topology.
Depending on the FEX model, you may be able to connect one or more network adapter interfaces to each fabric extender. As an example, Figure 10 refers to a topology built with the Cisco Nexus 2148T fabric extender, where a server has one link only to each fabric extender. A topology with Cisco Nexus 2248TP or with Cisco Nexus 2232PP fabric extender could consist of more links from the server to a single fabric extender.
Figure 11: Dual Homed Fabric Extender vPC Topology The Cisco Nexus 5000 Series switch can support up to 12 configured dual homed Fabric Extenders with this topology. A maximum of 576 single homed servers can be connected to this configuration.
The peer-keepalive status is checked only when the peer-link goes down. The vPC peer-keepalive can be carried either in the management or default VRF on the Cisco Nexus 5000 Series switch. When you configure the switches to use the management VRF, the source and destination for the keepalive messages are the mgmt 0 interface IP addresses.
• Fabric Extender FEX number configured on an EtherChannel fabric interface; for the Fabric Extender vPC toplogy. If any of these parameters are not enabled or defined on either switch, the vPC consistency check ignores those parameters. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Graceful Type-1 Check Beginning with Cisco NX--OS Release 5.0(2)N2(1), when a consistency check fails, vPCs are brought down only on the secondary vPC switch. The VLANs remain up on the primary switch and Type-1 configurations can be performed without traffic disruption.
VLANs are not affected. vPC Auto-Recovery Beginning with Cisco NX-OS Release 5.0(2)N2(1), the vPC auto-recovery feature re-enables vPC links in the following scenarios: When both vPC peer switches reload and only one switch reboots, auto-recovery allows that switch to assume the role of the primary switch and the vPC links will be allowed to come up after a predetermined period of time.
When you configure the vPC peer link, the vPC peer switches negotiate that one of the connected switches is the primary switch and the other connected switch is the secondary switch. By default, the Cisco NX-OS software uses the lowest MAC address to elect the primary switch. The software takes different actions on each switch—that is, the primary and secondary—only in certain failover conditions.
STP process for the vPC interfaces on the secondary vPC peer switch. The primary vPC switch synchronizes the STP state on the vPC secondary peer switch using Cisco Fabric Services over Ethernet (CFSoE).
• You must configure the peer-keepalive link before the system can form the vPC peer link. • You can connect a pair of Cisco Nexus 5000 Series switches or a pair of Cisco Nexus 5500 Series switches in a vPC directly to another switch or to a server. vPC peer switches must be of the same type,...
Disabling vPCs You can disable the vPC feature. Note When you disable the vPC feature, the Cisco Nexus 5000 Series switch clears all the vPC configurations. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
You must configure both switches on either side of the vPC peer link with the following procedure. SUMMARY STEPS 1. switch# configure terminal 2. switch(config)# vpc domain domain-id 3. (Optional) switch# show vpc brief 4. (Optional) switch# copy running-config startup-config Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
VRF management and VRF default. The mgmt0 interface and all SVI interfaces reside in VRF management and default. The Cisco NX-OS software uses the peer-keepalive link between the vPC peers to transmit periodic, configurable keepalive messages. You must have Layer 3 connectivity between the peer devices to transmit these messages.
(Optional) Displays information about the configuration for the keepalive messages. Step 6 switch# copy running-config startup-config (Optional) Copies the running configuration to the startup configuration. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Copies the running configuration to the startup configuration. This example shows how to configure a vPC peer link: switch# configure terminal switch(config)# interface port-channel 20 switch(config-if)# vpc peer-link Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
After you have configured the vPC peer link on both vPC peer switches, check that the configurations are consistent on all vPC interfaces. Note Beginning with Cisco NX-OS Release 5.0(2)N1(1), the following QoS parameters support Type 2 consistency checks: • Network QoS—MTU and Pause •...
This examples shows how to view the status of the auto-recovery feature in vPC domain 10. switch(config-vpc-domain)# show running-config vpc !Command: show running-config vpc !Time: Tue Dec 7 02:38:44 2010 version 5.0(2)N2(1) feature vpc vpc domain 10 peer-keepalive destination 10.193.51.170 auto-recovery Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Configuring the Restore Time Delay Beginning with Cisco NX-OS Release 5.0(3)N1(1), you can configure a restore timer that delays the vPC from coming back up until after the peer adjacency forms and the VLAN interfaces are back up. This feature avoids packet drops when the routing tables may not be converged before the vPC is once again passing traffic.
Configuring the VRF Name The services provided by a Cisco Nexus 5000 Series switch, such as ping, ssh, telnet, radius, are VRF aware. The VRF name must be configured in order for the correct routing table to be used.
The VLAN ID range is from 1 to 3967, and 4049 to 4093. This example shows how to bind a vPC to the default VRF using VLAN 2: switch(config)# vpc bind-vrf default vlan vlan2 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Enabling Layer 3 Forwarding to the Gateway MAC Address of the vPC Beginning with Cisco NX-OS Release 5.0(3)N1(1), this feature applies to Cisco Nexus 5500 Plaform switches. The vPC peer-gateway feature allows a vPC switch to act as the active gateway for packets that are addressed to the router MAC address of the vPC peer.
14 Po600 Creating an EtherChannel Host Interface To connect to a downstream server from a Cisco Nexus 2000 Series Fabric Extender you can create a EtherChannel host interface. An EtherChannel host interface can have only one host interface as a member depending on the fabric extender model.
The range is from 1 to 4096. The vPC number that you assign to the EtherChannel connecting to the downstream switch from the vPC peer switch must be identical on both vPC peer switches. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Selects an existing vPC domain on the switch, or creates a new vPC domain, and enters the vpc-domain configuration mode. There is no default domain-id ; the range is from 1 to 1000. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Selects an existing vPC domain on the switch, or creates a new vPC domain, and enters the vpc-domain configuration mode. There is no default domain-id ; the range is from 1 to 1000. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Manually Configuring a vPC Peer Switch Role By default, the Cisco NX-OS software elects a primary and secondary vPC peer switch after you configure the vPC domain and both sides of the vPC peer link. However, you may want to elect a specific vPC peer switch as the primary switch for the vPC.
Displays the status of those parameters that must be consistent across all vPC interfaces. switch# show vpc peer-keepalive Displays information on the peer-keepalive messages. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Note only for the vPC peer device that you are working on. For detailed information about the fields in the output from these commands, see the Cisco Nexus 5000 Series Command Reference. Viewing The Graceful Type-1 Check Status To view the current status of the graceful Type-1 consistency check, enter the show vpc brief command.
Enter the show vpc brief command on the secondary switch to view the status of the suspended vPC VLAN: switch(config-if)# show vpc brief Legend: (*) - local vPC is down, forwarding via vPC peer-link vPC domain id : 10 Peer status : peer adjacency formed ok Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
This example shows the status of the VLAN in a consistent state before an inconsistency occurs. then, the no spanning-tree vlan 5 command is entered which triggers the inconsistency between the primary and secondary switch. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
The show vpc brief command on the primary switch also shows the per-VLAN consistency status as Failed. switch(config)# show vpc brief Legend: (*) - local vPC is down, forwarding via vPC peer-link Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
4. Create a Fabric Extender identifier (for example, "100"). 5. Configure the fabric EtherChannel links for the Fabric Extender 100. 6. Configure each host interface port on the Fabric Extender 100 on both Nexus 5000 Series switch as for all the other steps.
NX-5000-1(config-if)# vpc 100 NX-5000-1(config-if)# fex associate 100 NX-5000-1(config-if)# exit Step 6 Configure each host interface port on the Fabric Extender 100 on both Nexus 5000 Series switch as for all the other steps. NX-5000-1(config)# interface ethernet 100/1/1-48 NX-5000-1(config-if)# switchport mode access...
Extender NX-2000-100. You must repeat these steps on its vPC peer, NX-5000-2, which is connected to the Fabric Extender NX-2000-101. Before You Begin Ensure that the Cisco Nexus 2000 Series Fabric Extenders NX-2000-100 and NX-2000-101 are attached and online. SUMMARY STEPS 1.
Spanning tree is used to refer to IEEE 802.1w and IEEE 802.1s. If the text is discussing the IEEE 802.1D Note Spanning Tree Protocol, 802.1D is stated specifically. This chapter describes the configuration of Rapid PVST+ on Cisco Nexus 5000 Series switches. It includes the following sections: •...
Each VLAN on each switch has a unique 64-bit bridge ID consisting of a bridge priority value, an extended system ID (IEEE 802.1t), and an STP MAC address allocation. Bridge Priority Value The bridge priority is a 4-bit value when the extended system ID is enabled. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Configuring Rapid PVST+ Understanding STP In Cisco NX-OS, the extended system ID is always enabled; you cannot be disable the extended system Note Extended System ID A 12-bit extended system ID field is part of the bridge ID. Figure 14: Bridge ID with Extended System ID The switches always use the 12-bit extended system ID.
A BPDU exchange results in the following: • One switch is elected as the root bridge. • The shortest distance to the root bridge is calculated for each switch based on the path cost. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
• Edge ports—When you configure a port as an edge port on an RSTP switch, the edge port immediately transitions to the forwarding state. (This immediate transition was previously a Cisco-proprietary feature named PortFast.) You should only configure on ports that connect to a single end station as edge ports.
The TCA flag is used only when the switch is interacting with switches that are running legacy 802.1D STP. The proposal and agreement sequence then quickly propagates toward the edge of the network and quickly restores connectivity after a topology change. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Another important change is that the Rapid PVST+ BPDU is type 2, version 2, which makes it possible for the switch to detect connected legacy (802.1D) bridges. The BPDU for 802.1D is version 0. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
This proposal/agreement handshake is initiated only when a non-edge port moves from the blocking to the forwarding state. The handshaking process then proliferates step-by-step throughout the topology. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
LAN segment. A backup port provides another path in the topology to the switch. • Disabled port—Has no role within the operation of the spanning tree. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Each LAN port on a software using Rapid PVST+ or MST exists in one of the following four states: • Blocking—The LAN port does not participate in frame forwarding. • Learning—The LAN port prepares to participate in frame forwarding. • Forwarding—The LAN port forwards frames. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
• Receives BPDUs and directs them to the system module. • Receives, processes, and transmits BPDUs received from the system module. • Receives and responds to network management messages. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Table 18: Port State Active Topology Operational Status Port State Is Port Included in the Active Topology? Enabled Blocking Enabled Learning Enabled Forwarding Disabled Disabled Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
If a port receives a superior BPDU, Rapid PVST+ triggers a reconfiguration. If the port is proposed and is selected as the new root port, Rapid PVST+ forces all the other ports to synchronize. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
The STP port path-cost default value is determined from the media speed and path-cost calculation method of a LAN interface. If a loop occurs, STP considers the port cost when selecting a LAN interface to put into the forwarding state. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
When you connect a Cisco switch to a non-Cisco switch through an 802.1Q trunk, the Cisco switch combines the STP instance of the 802.1Q VLAN of the trunk with the STP instance of the non-Cisco 802.1Q switch. However, all per-VLAN STP information that is maintained by Cisco switches is separated by a cloud of non-Cisco 802.1Q switches.
Configuring Rapid PVST+ Rapid PVST+, which has the 802.1w standard applied to the Rapid PVST+ protocol, is the default STP setting in the software. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Rapid PVST+. Enabling Rapid PVST+ per VLAN You can enable or disable Rapid PVST+ on each VLAN. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
VLAN. The switch sets the bridge priority for the specified VLANs to 24576 if this value will cause the switch to become the root for the specified VLANs. If any root bridge for the Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
2 seconds. This example shows how to configure the switch as the root bridge for a VLAN: switch# configure terminal switch(config)# spanning-tree vlan 5 root primary diameter 4 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
You can assign lower priority values to LAN ports that you want Rapid PVST+ to select first and higher priority values to LAN ports that you want Rapid PVST+ to select last. If all LAN ports have the same priority Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
In Rapid PVST+ mode, you can use either the short or long pathcost method, and you can configure the Note method in either the interface or configuration submode.The default pathcost method is short. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
You can configure the Rapid PVST+ bridge priority of a VLAN. Note Be careful when using this configuration. For most situations, we recommend that you configure the primary root and secondary root to modify the bridge priority. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Configures the hello time of a VLAN. The hello time value hello-time hello-time can be from 1 to 10 seconds. The default is 2 seconds. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
You can configure the maximum age time per VLAN when using Rapid PVST+. SUMMARY STEPS 1. switch# configure terminal 2. switch(config)# spanning-tree vlan vlan-range max-age max-age DETAILED STEPS Command or Action Purpose Step 1 switch# configure terminal Enters configuration mode. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
If the link type is shared, the STP reverts to 802.1D. The default is auto, which sets the link type based on the duplex setting of the interface. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Spanning tree is used to refer to IEEE 802.1w and IEEE 802.1s. If the text is discussing the IEEE 802.1D Note Spanning Tree Protocol, 802.1D is stated specifically. This chapter describes how to configure MST on Cisco Nexus 5000 Series switches. It contains the following sections: •...
Each region has only one MST BPDU, and that BPDU carries an M-record for each MSTI within the region (see the following figure). Only the IST sends BPDUs for the MST region; all M-records are encapsulated in Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
MST BPDUs contain these three configuration parameters. An MST bridge accepts an MST BPDU into its own region only if these three configuration parameters match exactly. If one configuration attribute differs, the MST bridge considers the BPDU to be from another MST region. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
During initialization, an MST region might have many subregions, each with its own CIST regional root. As switches receive superior IST information from a neighbor in the same region, they leave their old subregions Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
BPDU transmission (for example, hello time, forward time, max-age, and max-hops) are configured only on the CST instance but affect all MSTIs. You can configure Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
STP bridge or receives an agreement proposal from an MST bridge with a different configuration or a Rapid PVST+ bridge. This definition allows two ports that are internal to a region to share a segment Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
A blocks (or keeps blocking) its port, which prevents the bridging loop. The block is shown as an STP dispute. Figure 24: Detecting a Unidirectional Link Failure Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
MST configuration. MST interoperates with the Cisco prestandard MSTP whenever it receives prestandard MSTP on an MST Note port; no explicit configuration is necessary.
Changing the spanning tree mode disrupts traffic because all spanning tree instances are stopped for the Caution previous mode and started for the new mode. Also, having two different spanning-tree modes on vPC peer switches is an inconsistency, hence this operation is disruptive. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
When you are working in MST configuration mode, note the difference between the exit and abort commands. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
You configure a region name on the bridge. For two or more bridges to be in the same MST region, they must have the identical MST name, VLAN-to-instance mapping, and MST revision number. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Enters MST configuration submode. Step 3 switch(config-mst)# revision version Specifies the revision number for the MST region. The range is from 0 to 65535, and the default value is 0. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
To specify a VLAN series, enter a comma; for example, enter the instance 1 vlan 10, 20, 30 command to map VLANs 10, 20, and 30 to MST instance Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
You cannot disable an MSTI. For two or more bridges to be in the same MST region, they must have the identical MST name, VLAN-to-instance mapping, and MST revision number. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
When you are working with private VLANs on the system, all secondary VLANs must be in the same MSTI and their associated primary VLAN. SUMMARY STEPS 1. switch# configure terminal 2. switch(config)# spanning-tree mst configuration 3. switch(config-mst)# private-vlan synchronize Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
• For instance-id, you can specify a single instance, a range of instances separated by a hyphen, or a series of instances separated by a comma. The range is from 1 to 4094. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
These messages mean that the switch is alive. For seconds, the range is from 1 to 10, and the default is 2 seconds. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
You set the maximum-aging timer for all MST instances on the switch with one command (the maximum age time only applies to the IST). SUMMARY STEPS 1. switch# configure terminal 2. switch(config)# spanning-tree mst max-age seconds Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
1 to 255, and the default value is 20 hops. This example shows how to set the maximum hops to 40: switch# configure terminal switch(config)# spanning-tree mst max-hops 40 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
If you set the link to shared, STP reverts to 802.1D. SUMMARY STEPS 1. switch# configure terminal 2. switch(config)# interface type slot/port 3. switch(config-if)# spanning-tree link-type {auto | point-to-point | shared} Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Restarts MST on entire switch or specified [interface-num | port-channel]] interfaces. This example shows how to restart MST on the Ethernet interface on slot 2, port 8: switch# clear spanning-tree detected-protocol interface ethernet 2/8 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
The following example shows how to display current MST configuration: switch# show spanning-tree mst configuration % Switch is not in mst mode Name [mist-attempt] Revision Instances configured 2 Instance Vlans mapped -------- --------------------------------------------------------------------- 1-12,14-41,43-4094 13,42 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
About STP Extensions, page 201 About STP Extensions Cisco has added extensions to STP that make convergence more efficient. In some cases, even though similar functionality may be incorporated into the IEEE 802.1w Rapid Spanning Tree Protocol (RSTP) standard, we recommend using these extensions.
When you configure BPDU Guard globally, it is effective only on operational spanning tree edge ports. In a valid configuration, LAN edge interfaces do not receive BPDUs. A BPDU that is received by an edge LAN Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
BPDUs, the port returns to the spanning tree normal port state and BPDU Filtering is disabled. Default Enable Disable Disable Default Disable Enabled/Disabled Disable Disable Enabled/Disabled Enabled/Disabled Disable Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
When you enable Root Guard on a port, Root Guard does not allow that port to become a root port. If a received BPDU triggers an STP convergence that makes that designated port become a root port, that port is Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Before You Begin Ensure that STP is configured. Ensure that you are configuring the ports correctly for the type of device to which the interface is connected. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
• spanning-tree port type edge—This command explicitly enables edge behavior on the access port. • spanning-tree port type edge trunk—This command explicitly enables edge behavior on the trunk port. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Configuring Spanning Tree Network Ports on Specified Interfaces You can configure spanning tree network ports on specified interfaces. Bridge Assurance runs only on spanning tree network ports. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
This example shows how to configure the Ethernet interface 1/4 to be a spanning tree network port: switch# configure terminal switch(config)# interface ethernet 1/4 switch(config-if)# spanning-tree port type network Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
• no spanning-tree bpduguard—Enables BPDU Guard on the interface if it is an operational edge port and if the spanning-tree port type edge bpduguard default command is configured. Before You Begin Ensure that STP is configured. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
BPDUs at linkup before they effectively filter outbound BPDUs. If a BPDU is received on an edge port, it immediately loses its operational edge port status and BPDU Filtering is disabled. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
• no spanning-tree bpdufilter—Enables BPDU Filtering on the interface if the interface is in operational edge port and if you configure the spanning-tree port type edge bpdufilter default command. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Loop Guard provides additional security in the bridge network. Loop Guard prevents alternate or root ports from becoming the designated port because of a failure that could lead to a unidirectional link. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Entering the Loop Guard command for the specified interface overrides the global Loop Guard command. Before You Begin Ensure that STP is configured. Ensure that you are configuring Loop Guard on spanning tree normal or network ports. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
[all] Displays the current status of spanning tree on the switch switch# show spanning-tree [options] Displays selected detailed information for the current spanning tree configuration. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
DCBXP parameters are packaged into a specific DCBXP TLV. This TLV is designed to provide an acknowledgement to the received LLDP packet. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 234
Use the system-capabilities option to specify the system capabilities TLV messages. Use the system-description option to specify the system description TLV messages. Use the system-name option to specify the system name TLV messages. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Step 4 (Optional)switch#show lldp Displays LLDP configurations. This example shows how to set an interface to transmit LLDP packets: switch# configure terminal switch(config)# interface ethernet 1/2 switch(config-if)# lldp transmit Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 236
LLDP Timers holdtime 120 seconds reinit 2 seconds msg_tx_interval 30 seconds This example shows how to display LLDP counters: switch# show lldp traffic LLDP traffic statistics: Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 237
Configuring Interface LLDP Commands Total frames out: 8464 Total Entries aged: 6 Total frames in: 6342 Total frames received in error: 2 Total frames discarded: 2 Total TLVs unrecognized: 0 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
C H A P T E R Configuring the MAC Address Table All Ethernet interfaces on Cisco Nexus 5000 Series switches maintain media access control (MAC) address tables. This chapter describes the configuration of the MAC address tables. It includes the following sections: •...
Configuring the Aging Time for the MAC Table You can configure the amount of time that an entry (the packet source MAC address and port that packet ingresses) remain in the MAC table. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
This example shows how to clear the dynamic entries in the MAC address table: switch# clear mac-address-table dynamic Verifying the MAC Address Configuration To display MAC address configuration information, perform one of these tasks: Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 242
Eth1/3 001c.b05a.5380 dynamic 200 Eth1/3 Total MAC Addresses: 2 This example shows how to display the current aging time: switch# show mac-address-table aging-time Vlan Aging Time ----- ---------- Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
By examining (snooping), Internet Group Management Protocol (IGMP) membership report messages from interested hosts, multicast traffic is limited to the subset of VLAN interfaces on which the hosts reside. This chapter describes the configuration of IGMP snooping on Cisco Nexus 5000 Series switches. It includes the following sections: •...
IGMPv1 does not provide an explicit IGMP leave message, so the software must rely on the membership message timeout to indicate that no hosts remain that want to receive multicast data for a particular group. Cisco NX-OS ignores the configuration of last member query interval when you enable the fast leave Note feature because it does not check for remaining hosts.
IGMP Forwarding The control plane of the Cisco Nexus 5000 Series switch is able to detect IP addresses but forwarding occurs using the MAC address only. When a host connected to the switch wants to join an IP multicast group, it sends an unsolicited IGMP join message, specifying the IP multicast group to join.
The interface to the router must be in the selected VLAN. Static group Configures an interface belonging to a VLAN as a static member of a multicast group. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 247
Configures a snooping querier when you do not enable PIM because querier IP-address multicast traffic does not need to be routed. The IP address is used as the source in messages. The default is disabled. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
[[vlan] Displays IGMP snooping queriers by VLAN. vlan-id] switch# show ip igmp snooping mrouter [[vlan] Displays multicast router ports by VLAN. vlan-id] Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 249
Switch-querier enabled, address 172.16.24.1, currently running Explicit tracking enabled Fast leave enabled Report suppression enabled Router port detection using PIM Hellos, IGMP Queries Number of router-ports: 1 Number of groups: 1 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
C H A P T E R Configuring Traffic Storm Control This chapter describes how to configure traffic storm control on Cisco Nexus 5000 Series switches. It contains the following sections: • Information About Traffic Storm Control, page 233 •...
For example, a higher threshold allows more packets to pass through. Traffic storm control on the Cisco Nexus 5000 Series switch is implemented in the hardware. The traffic storm control circuitry monitors packets that pass from an Ethernet interface to the switching bus. Using the...
The default state is disabled. This example shows how to configure unicast traffic storm control for Ethernet interface 1/4: switch# configure terminal switch(config)# interface ethernet 1/4 switch(config-if)# storm-control unicast level 40 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
C H A P T E R Configuring the Fabric Extender This chapter describes how to configure a Cisco Nexus 2000 Series Fabric Extender using the Cisco Nexus 5000 Series device and includes the following sections: • Information About the Cisco Nexus 2000 Series Fabric Extender, page 237 •...
Spanning Tree Protocol (STP). Figure 27: Single Management Domain The Cisco Nexus 2000 Series Fabric Extender forwards all traffic to its parent Cisco Nexus 5000 Series switch over 10-Gigabit Ethernet fabric uplinks, allowing all traffic to be inspected by policies established on the Cisco Nexus 5000 Series switch.
• Port channel host interface—A port channel host interface for connection to a server or host system. Fabric Extender Features The Cisco Nexus 2000 Series Fabric Extender allows a single switch—and a single consistent set of switch features—to be supported across a large number of hosts and servers. By supporting a large server-domain under a single management entity, policies can be enforced more efficiently.
Configuring the Fabric Extender Host Port Channel Ingress and egress packet counters are provided on each host interface. For more information about BPDU Guard and CDP, see the Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide. Host Port Channel...
See the Cisco Nexus 5000 Series NX-OS Fibre Channel over Ethernet Configuration Guide for configuration details. Protocol Offload To reduce the load on the control plane of the Cisco Nexus 5000 Series device, Cisco NX-OS provides the ability to offload link-level protocol processing to the Fabric Extender CPU. The following protocols are supported: •...
MTU of all drop classes and the MTU on the no-drop queue is set to the maximum MTU of all no-drop classes. For more information about LLC and quality-of-service, see the Cisco Nexus 5000 Series NX-OS Quality of Service Configuration Guide.
In the case of the Cisco Nexus 2000 Series Fabric Extender, oversubscription, which is a function of the available fabric interfaces to active host interfaces, provides cost-effective scalability and flexibility for Ethernet environments.
100/1000BASE-T (100-Mb/1-Gigabit) Ethernet host interfaces. It offers similar configurations to the Cisco Nexus 2148T when its host interfaces are running in Gigabit Ethernet mode. The Cisco Nexus 2248TP can easily be run with no oversubscription when its host interfaces are running in 100-Mb mode.
Connection Model Two methods (the static pinning fabric interface connection and the EtherChannel fabric interface connection) allow the traffic from an end host to the parent switch to be distributed when going through the Cisco Nexus 2000 Series Fabric Extender.
To guarantee a deterministic and sticky association across a reboot, you can manually redistribute the pinning. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
FEX are set to the down state. Port Numbering Convention The following port numbering convention is used for the Fabric Extender: Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Fabric Extender. When you enter the install all command, it upgrades the software on the parent Cisco Nexus 5000 Series switch and also upgrades the software on any attached Fabric Extender. To minimize downtime as much as possible, the Fabric Extender remains online while the installation process loads its new software image.
4 10-Gigabit Ethernet fabric interfaces with SFP+ interface adapters for its uplink connection to the parent switch. The Cisco Nexus 2248TP-E has all the features of the Cisco Nexus 2248TP with these additional features: ◦ A larger buffer to absorb large bursts.
This example shows how to associate the Fabric Extender to an Ethernet interface on the parent device: switch# configure terminal switch(config)# interface ethernet 1/40 switch(config-if)# switchport mode fex-fabric Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 270
This example shows how to display the association of the Fabric Extender and the parent device: switch# show interface port-channel 4 fex-intf Fabric Interface Interfaces --------------------------------------------------- Eth101/1/48 Eth101/1/47 Eth101/1/46 Eth101/1/45 Eth101/1/44 Eth101/1/43 Eth101/1/42 Eth101/1/41 Eth101/1/40 Eth101/1/39 Eth101/1/38 Eth101/1/37 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Disassociates the Fabric Extender unit attached to the no fex associate interface. Example: switch(config-if)# no fex associate Configuring Fabric Extender Global Features You can configure global features for a Fabric Extender. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
• N2232TT—32 10-Gigabit Base-T Ethernet host interfaces and 8 10-Gigabit Base-T Ethernet fabric interfaces module The parent Cisco Nexus 5000 Series switch remembers the type of the Fabric Extender in its binary configuration. When this feature is configured, the Fabric Extender is only allowed to come online if its type matches the configured FEX-type.
Configuring the Fabric Extender Redistributing the Links Prior to Cisco NX-OS Release 4.1(3)N1(1), the locator beacon LED was enabled with the beacon FEX Note submode command. SUMMARY STEPS 1. switch# locator-led fex FEX-number 2. (Optional) switch# no locator-led fex FEX-number...
The fex pinning redistribute command disrupts all the host interface ports of the Fabric Extender. Caution Verifying the Fabric Extender Configuration To display configuration information about the defined interfaces on a Fabric Extender, perform one of the following tasks: Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Configuration Examples for Chassis Management This example shows how to display the module information about all connected Fabric Extender units: switch# show module fex FEX Mod Ports Card Type Model Status. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 280
: 160 Block Checksum : 0x1a1e EEPROM Size : 65535 Block Count FRU Major Type : 0x6002 FRU Minor Type : 0x0 OEM String : Cisco Systems, Inc. Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 281
Block Checksum : 0x2cf Feature Bits : 0x0 HW Changes Bits : 0x0 Stackmib OID MAC Addresses : 00-0d-ec-e3-28-00 Number of MACs : 64 OEM Enterprise OEM MIB Offset Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 282
: 12336.12336.12336.12336.12336.12336.12374.12336 H/W Version : 43777.2 Current : 36 RMA Code : 200-32-32-32 Power supply specific block: Block Signature : 0x0 Block Version Block Length Block Checksum : 0x0 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 283
Configuring the Fabric Extender Verifying the Chassis Management Information Feature Bits : 0x0 Current 110v : 36 Current 220v : 36 Stackmib OID Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 284
Configuring the Fabric Extender Verifying the Chassis Management Information Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1)
Page 285
98, 99 community ports LACP 98, 99 community VLANs 56, 57 port channels 98, 99 configuration data LACP 98, 99 configuring LACP graceful convergence 98, 99 Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1) IN-1...
Page 286
Layer 2 switching Ethernet switching LED beacon Link Aggregation Control Protocol oversubscription See also LACP oversubscription ratio Link Failure 159, 178 detecting unidirectional Link Layer Discovery Protocol, See LLDP Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1) IN-2...
Page 287
STP root guard RSTP switchport fex-fabric mode 150, 154, 158, 173 active topology switchport saved configuration BPDU processing designated port, defined designated switch, defined proposal-agreement handshake process type Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1) IN-3...
Page 288
Index UDLD version compatibility 12, 14 aggressive mode VLANs defined extended range nonaggressive mode reserved range unicast storms vPC topology Unidirectional Link Detection transparent mode Cisco Nexus 5000 Series NX-OS Layer 2 Switching Configuration Guide, Release 5.0(3)N1(1) IN-4...