4500X VSS - Dual Active Detection with ePAgP

Hello,
I am interesting if 3560x supports ePAgP. I have VSS which is formed by two 4500x switches. Can I use 3560x, which is connected two both VSS members via 10Gb optics for Dual Active detection ?

Hi,
As PagP is not supported accross differents 3750(-X) units of a stack (but LACP yes), ePagp is not supported also. The MEC has to be formed from the same 3750(-X) unit / Standalone 35xx and 37xx do support PAgPand thus ePAgP.
Page 17 and 20 of http://www.cisco.com/web/DK/assets/docs/presentations/VSS_0109.pdf =>
"Since cross-stack EtherChannel does not support PAgP, it can not use enhanced PAgP for dual ACTIVE detection.
Hence the only alternative for cross-stack EtherChannel configuration is to use BFD as a dual ACTIVE detection method"
Hope it helps.
Regards;
Inayath

Similar Messages

  • 6880-X VSS dual-active detection with Enhanced PAgP

    Hello,
    I plan to use Enhanced PAgP for dual-active detection for a VSS consisting of 6880-X.
    Has anybody tested it?
    What about the 6800IA switch - does it have a similar feature that can help the active switch in the VSS to find out if the former standby has become also active?
    Thanks, kind regards,
    Eduard Gheorghiu

    hey, i ran this up in the lab, the FEX itself runs dual active detection without the need for PAGP.
    see below info:
    switch#show fex dual-active 
    FEX dual-active detection enabled: Yes
    Channel Group 101 (FEX 101)
      Splitbrain detection capable: Yes
        switch 1 member port state:
          Te1/5/2    - Interface Up.      state: bound       
          Te1/5/3    - Interface Up.      state: bound       
        switch 2 member port state:
          Te2/5/2    - Interface Up.      state: bound       
          Te2/5/3    - Interface Up.      state: bound       
    Channel Group 102 (FEX 102)
      Splitbrain detection capable: Yes
        switch 1 member port state:
          Te1/5/4    - Interface Up.      state: bound       
        switch 2 member port state:
          Te2/5/4    - Interface Up.      state: bound       
    switch#show switch virtual dual-active summary 
    Pagp dual-active detection enabled: Yes
    Fast-hello dual-active detection enabled: Yes
    FEX dual-active detection enabled: Yes
    No interfaces excluded from shutdown in recovery mode
    In dual-active recovery mode: No
    switch#
    switch#show fex
    FEX       FEX              FEX                        FEX                  
    Number    Description      State            Model              Serial      
    101       FEX0101          online           C6800IA-48FPD      FOC1740Y33Y 
    102       FEX0102          online           C6800IA-48FPD      FOC1741S58T 

  • Stackwise 3850 for VSS dual active detection

    Hello
    by means of 3750 or 2960-S stacks, it was impossibile to perform VSS dual active detction
    using ePAgP trough a MEC towards different members of a stack.
    Here the QA docs for 3850 state it is now supported:
    http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3850-series-switches/qa_c67-722110.html
    Though, I'd like to read some confirmation from someone already using it in production or maybe
    from some up to date Cisco representative.
    I'd like to use lots of 3850 stacks as access switches linked to a 6500 VSS pair. In order to keep
    everything redundant i would like to couple VSLP Fast Hellos and ePAgP trough the Stackwise 3850s
    but not before making myself sure it's actually supported.
    Thanks
    francesco

    Francesco,
    I have deployed stacks of up to five 3850 switches with stackwise and powerstack cables, there are no issues running active/active on redundant links.  I recommend using LACP.

  • 4500x Dual Active Detection with LACP

    Hi Guys
    I have configured 2 4500x switches as a vss pair and vss is working fine. These will be connected to 2 stacks of 3750x switches with each stack having 2 switches.
                                     4500x 
             3750x Stack1                 3750xStack2
    From Switch
    Port No
    Channel Group
    To Switch
    Port No
    Channel Group
    Media Type
    Comment
    3750X Stack1
    Ten 1/1/1
    1
    4500X 
    Ten 1/1/1
    1
    10Gb SPF+
    3750X TO 4500X Interlinks
    3750X Stack1
    Ten 2/1/1
    1
    4500X 
    Ten 2/1/1
    1
    10Gb SPF+
    3750X TO 4500X Interlinks
    3750X Stack2
    Ten 1/1/1
    2
    4500X 
    Ten 1/1/2
    2
    10Gb SPF+
    3750X TO 4500X Interlinks
    3750X Stack2
    Ten 2/1/1
    2
    4500X 
    Ten 2/1/2
    2
    10Gb SPF+
    3750X TO 4500X Interlinks
    4500x
    Ten1/1/14
    4500x
    Ten1/1/14
    10Gb SFP+
    Dual-Active-Detection
    4500x
    Ten1/1/15
    4500x
    Ten1/1/15
    10Gb SPF+
    VSL Link
    4500x
    Ten1/1/16
    4500x
    Ten1/1/16
    10Gb SPF+
    VSL Link
    The ports will be connected as above. From each stack there are 2 uplinks, 1 to each of the 4500x but virtually to the same 4500x as they are a virtual pair.
    I have't configured the uplinks yet as im trying to get the dual active detection done first, in the config on the 4500x it does not give me the option for fast-hellos, it only list pagp
    Switch(config-vs-domain)#dual-active detection ?
      pagp  Dual-active detection using PAgP
    Anyone know why this may be
    Thanks

    Hi,
    As per configuration guide for this platform we do have enhanced pagp only as dual active detection mechanism;
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/15-1-2/XE_340/configuration/guide/config/vss.html#wp1063718
    Thanks,
    Parminder

  • VSS Dual active detection

    Does the PAgP mode working with Nortel as access switches.
    (The symptom is that when the VSL link is down both switches working as a active , when the vsl came back the switches recognize dual active and the backup switch disable all non vsl ports)

    You mean one VSS member switch in one datacenter, and the other member switch in the second datacenter?
    I wouldn't recommend doing VSS across WAN/MAN.
    Remember the dual active detection using enhanced PAgP is done through downstream switches that have MEC to the VSS chassis'.
    This means one link goes to the local VSS member switch, and the other link would go through the WAN, onto the other VSS member switch.
    Also, the main benefit of doing VSS is to cut down your spanning-tree domain.
    To really take advantage of that you'd have uplinks from downstream switches to both VSS member switches across WAN/MAN, which just isn't an efficient way to mesh your switches.

  • 4500-X VSS and Dual-Active detection PAgP, using 2960-X access stacks

    Hi.
    I think this may have been asked before but its not clear to me.
    I have 2 4500-X configured as a VSS pair, so a VSL link of 2 x 10Gig between them.
    I have a number of Access stacks, built from 2600-X's
    I have tried to configure dual active detection, which from what I read it is to use ePAgP or Dual-Active Fast hello Packets.
    I do not have any additional SFP's to connect the 4500's together using Fast Hello, so ePAgP appears my only option
    When I try and configure the access stack with an Etherchannel across 2 switches using PAgP I get the error -
    command rejected by the 2960-x stack
    %With PAgP enabled, all ports in the Channel should belong to the same switch
    Command rejected (Port-channel11, Te1/0/1): Invalid etherchnl mode
    From what I have read, PAgP cannot be configured across a stack, and people are recommending LACP as the method to configure the Etherchannnel, but How does that work with Dual-Active detection PAgP?
    When I configuring Dual-Active detection PAgP, and made a couple of the MEC's trusted and configure using LACP active, then tried failing the VSL between the 4500's, each stack went into err disable on the trunk connections.
    Question is! Does dual active detection PAgP work over an Etherchannel configured as LACP? or what's my options
    Thanks for any help.

    Hi,
    Question is! Does dual active detection PAgP work over an Etherchannel configured as LACP? or what's my options
    No, you can't use LACP for ePAGP detection.  One option is to break one of the stacks in your access layer and use the switch you want to use for dual active detection individually (not part of a stack) and uplink it to both 4500X switches. This way, you know that the single switch is used for ePAgP detection.
    HTH

  • Cisco VSS Dual-active PAgP detection via Nexus and vPC

    Hi!
    We will soon implement Cisco nexus 5595 in our Datacenter.
    However we will still be using a pair of C6500 in a VSS in some part of the network.
    Today we are running dual-active detection via a PAgP Port-channel, but those Port-channels will be removed and the only Port-channel we will have is to a pair of Nexus 5596.
    Does anyone know if we can run PAgP dual-active detection via this MEC/vPC?
    Thank you for your time!
    //Olle

    Hi,
    The easies way is to connect both links from the 6500s to only one of the Nexus switches. Than create a portchannel on both the 6500 and the Nexus.
    The other option would be to connect the 6500s directly together via a gig link and use fast hello instead of epagp.
    I would use fast hello since it is supported on the 6500s.
    HTH

  • VSS using Pagp+ Dual Active Detection

    I am going to use VSS with a C3750 'Access' switch running 12.2(46)SE that supports Pagp+ for dual active detection. Regarding this topology, i have some questions:
    1) Does my Etherchannel towards the C3750 stack need to be a Pagp Etherchannel ? Or can it be a fixed Etherchannel (mode on) ?
    2) If the Etherchannel needs to be a Pagp Etherchannel before VSS can use the Pagp+ packets, does this imply that i can't use a cross-stack Etherchannel on the C3750, because cross-stack etherchannel did not support Pagp before ? Is it supported on 12.2(46)SE ?

    It is -very- easy to configure.
    Just connect two interfaces back-to-back together, of course, following a different path as your VSL links, then:
    interface GigabitEthernet2/4/14
    no switchport
    no ip address
    dual-active fast-hello
    end
    interface GigabitEthernet1/4/14
    no switchport
    no ip address
    dual-active fast-hello
    end
    And that's all.
    VSS_SWITCH#sh switch virtual dual-active fast-hello
    Fast-hello dual-active detection enabled: Yes
    Fast-hello dual-active interfaces:
    Port Local State Peer Port Remote State
    Gi1/4/14 Link up Gi2/4/14 Link up

  • Dual-active detection for VSS via enhanced PAGP

    Hello,
    What is the configuration needed on an etherchannel PAGP trunk to enable dual active detection for VSS on 4500X ?
    I have enabled it on my vss in global mode but I don't know which vlan to allow on the trunk towards my switch in PAGP.
    Is it the native vlan that I should allow on the trunk ?
    Thanks for the help
    Jeremy

    Hi Jeremy,
    You can allow all the vlans of specific vlans under the portchannel that connects to the access switches.  Usually, best practice is to allow only the vlans you are using on that specific access switch.
    Dual-active detection command is applied under the VSS domain for the specific portchannel connecting to your access switches.  It is not per vlan.
    Have a look
    http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/15.1.2/XE_340/configuration/guide/vss.html#wp1063913
    HTH

  • Cisco VSS dual-active fast-hello not supported

    Hi,
    I have Cisco WS-C4510R+E with sup WS-X45-SUP7-E. IOS version on this switch is cat4500e-universal.SPA.03.04.05.SG.151-2.SG5.bin . Enterprises license is permanently installed on switch. I have configured VSS on this but i am not able to configure dual-active fast-hello on L2 link. only dual-active detection using PagP is supported. since we don't have neighboring devices support PagP. I want to use dual-active fast-hello using L2 links between two VSS switches.
    I believe dual-active fast-hello on L2 link is supported on Release 3.6.1E. Please confirm whether i will have to change current IOS release from 3.4.5SG to Release 3.6.1E to support dual-active fast-hello link.
    I also want to know what will be major features change if I upgrade current IOS release from 3.4.5SG to Release 3.6.1E    
    Regards

    Hi,
    dual-active fast-hello is supported from release 3.5.0  
    (reference link: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_29985-01.html )
    so is also supported in release 3.6.1 . 
    You can see all feature changes in release notes for version 3.6.X
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_32143-01.html#pgfId-2657932
    Best Regards,
    Alessandro

  • 4500X with VSS and Dual-Active Fast-Hello

    Hello,
    ich have two pairs of 4500X-32, with other word two vss-systems in a test environment. IOS running version is 03.05.02.E.152-1.E2, dual-active detection with a fast-hello link is running. When i pull the VSL connectors to simulate a failure the active switch go into recovery-mode. After the vsl is restored the switch in recovery-mode start a reboot as desired. The configuration is saved and if i repeat the procedure, all is working fine. But when i start the systems the next day and begin to test the dual-active detection again, the vsl port stucks in " waiting to be aggregated" after restoring it. No reboot happens, the only solution is to reboot the switch manually. After that this misbehavior is repeating. Only setting the dual-active detection interfaces to its default, and reconfiguring them for fast-hello dual active detection again brings the feature back to normal operation:
    interface TenGigabitEthernet1/1/12
     switchport mode access
     switchport nonegotiate
     dual-active fast-hello
    Both vss systems shows the same behavior from time to time, i have no explanation, can somebody help?
    Regards, Stephan

    Fast hello is not supported for the 4500 series unless you are running the latest version of the IOS (3.5E)
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-5-0E/15-21E/configuration/guide/config/vss.html#87652
    HTH

  • Pagp dual-active for VSS on 3750

    Hi all,
    Do I need to be connected to VSS switch to see if my switch supports dual-active pagp?
    Should I be able to use this 3750 for dual-active detection?
    thank you.
    INFO:
    Switch Ports Model              SW Version            SW Image                
    *    1 52    WS-C3750-48TS      12.2(46)SE            C3750-IPSERVICES-M     
    Switch#        sh pagp dual-active
    PAgP dual-active detection enabled: Yes
    PAgP dual-active version: 1.1
    Channel group 3
              Dual-Active     Partner              Partner   Partner
    Port      Detect Capable  Name                 Port      Version
    Gi1/0/1   No              None                 None      N/A
    Gi1/0/3   No              None                 None      N/A
    Switch#
    From what I can read here this 3750 should support dual-active detection
    http://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ios-software-releases-12-2-special-early-deployments/product_bulletin_c25-493554.html

    Yes, that is correct.  You can use the 3750 for dual active detection.
    HTH

  • Cisco 4500x vss issue

    i configure vss on 4500x ,with one switch is active and the other switch go into recovery mode,with all port except the vsl links in the amber orange,shutdown,
    i want to make two switch into active state,some one could help in this.
    the configuration which i used is below
    itch virtual domain 100 
    switch 1
    exit
    switch virtual domain 100
    switch 2
    exit
    interface port-channel 10
    switchport
    switch virtual link 1
    no shut
    exit
    interface port-channel 20
    switchport
    switch virtual link 2
    no shut
    exit
    int range tengigabitethernet 1/15 - 16
    switchport
    switchport mode trunk
    switchport nonegotiate
    no shut
    channel-group 10 mode on
    int range tengigabitethernet 1/15 - 16
    switchport
    switchport mode trunk
    switchport nonegotiate
    no shut
    channel-group 20 mode on
    switch convert mode virtual 
    switch convert mode virtual 

    i can share two core switch configuration which is there 
    please suggest if something which i misconfigured and need to be corrected.
    TAKAFUL-CORE-01#show run
    Building configuration...
    Current configuration : 7510 bytes
    ! Last configuration change at 01:57:12 UTC Sun Aug 10 2014
    version 15.2
    service nagle
    no service pad
    service timestamps debug datetime msec localtime show-timezone
    service timestamps log datetime msec localtime show-timezone
    service password-encryption
    service compress-config
    service sequence-numbers
    no service dhcp
    hostname TAKAFUL-CORE-01
    boot-start-marker
    boot system flash bootflash:cat4500e-universalk9.SPA.03.05.00.E.152-1.E.bin
    boot-end-marker
    vrf definition mgmtVrf
     address-family ipv4
     exit-address-family
     address-family ipv6
     exit-address-family
    username admin privilege 15 password 7 104F0D140C19
    no aaa new-model
    switch virtual domain 100
     switch mode virtual
     mac-address use-virtual
    no dual-active detection pagp
    no ip source-route
    ip vrf Liin-vrf
    no ip domain-lookup
    ip dhcp pool management
     network 10.2.20.0 255.255.255.0
     default-router 10.2.20.2
     option 43 ascii "10.2.20.1"
    ip dhcp pool Data
     network 10.3.30.0 255.255.255.0
     default-router 10.3.30.2
     dns-server 4.2.2.2 8.8.8.8
    ip dhcp pool Voice
     network 10.1.10.0 255.255.255.0
     default-router 10.1.10.2
    ip dhcp pool wireless
     network 10.4.40.0 255.255.255.0
     default-router 10.4.40.2
     dns-server 4.2.2.2 8.8.8.8
    no ip bootp server
    ip device tracking
    power redundancy-mode redundant
    mac access-list extended VSL-BPDU
     permit any 0180.c200.0000 0000.0000.0003
    mac access-list extended VSL-CDP
     permit any host 0100.0ccc.cccc
    mac access-list extended VSL-DOT1x
     permit any any 0x888E
    mac access-list extended VSL-GARP
     permit any host 0180.c200.0020
    mac access-list extended VSL-LLDP
     permit any host 0180.c200.000e
    mac access-list extended VSL-SSTP
     permit any host 0100.0ccc.cccd
    spanning-tree mode rapid-pvst
    spanning-tree portfast bpduguard default
    spanning-tree extend system-id
    spanning-tree vlan 1-4094 priority 24576
    redundancy
     mode sso
    vlan internal allocation policy ascending
    class-map match-any VSL-MGMT-PACKETS
     match access-group name VSL-MGMT
    class-map match-any VSL-DATA-PACKETS
     match any
    class-map match-any VSL-L2-CONTROL-PACKETS
     match access-group name VSL-DOT1x
     match access-group name VSL-BPDU
     match access-group name VSL-CDP
     match access-group name VSL-LLDP
     match access-group name VSL-SSTP
     match access-group name VSL-GARP
    class-map match-any VSL-L3-CONTROL-PACKETS
     match access-group name VSL-IPV4-ROUTING
     match access-group name VSL-BFD
     match access-group name VSL-DHCP-CLIENT-TO-SERVER
     match access-group name VSL-DHCP-SERVER-TO-CLIENT
     match access-group name VSL-DHCP-SERVER-TO-SERVER
     match access-group name VSL-IPV6-ROUTING
    class-map match-any VSL-MULTIMEDIA-TRAFFIC
     match dscp af41
     match dscp af42
     match dscp af43
     match dscp af31
     match dscp af32
     match dscp af33
     match dscp af21
     match dscp af22
     match dscp af23
    class-map match-any VSL-VOICE-VIDEO-TRAFFIC
     match dscp ef
     match dscp cs4
     match dscp cs5
    class-map match-any VSL-SIGNALING-NETWORK-MGMT
     match dscp cs2
     match dscp cs3
     match dscp cs6
     match dscp cs7
    policy-map VSL-Queuing-Policy
     class VSL-MGMT-PACKETS
      bandwidth percent 5
     class VSL-L2-CONTROL-PACKETS
      bandwidth percent 5
     class VSL-L3-CONTROL-PACKETS
      bandwidth percent 5
     class VSL-VOICE-VIDEO-TRAFFIC
      bandwidth percent 30
     class VSL-SIGNALING-NETWORK-MGMT
      bandwidth percent 10
     class VSL-MULTIMEDIA-TRAFFIC
      bandwidth percent 20
     class VSL-DATA-PACKETS
      bandwidth percent 20
     class class-default
      bandwidth percent 5
    interface Port-channel10
     switchport
     switchport mode trunk
     switchport nonegotiate
     switch virtual link 1
    interface FastEthernet1
     vrf forwarding mgmtVrf
     no ip address
     speed auto
     duplex auto
    interface TenGigabitEthernet1/1/1
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/2
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/3
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/4
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/5
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/6
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/7
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/8
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/9
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/10
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/11
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/12
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/13
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/14
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet1/1/15
     switchport mode trunk
     switchport nonegotiate
     no lldp transmit
     no lldp receive
     no cdp enable
     channel-group 10 mode on
     service-policy output VSL-Queuing-Policy
    interface TenGigabitEthernet1/1/16
     switchport mode trunk
     switchport nonegotiate
     no lldp transmit
     no lldp receive
     no cdp enable
     channel-group 10 mode on
     service-policy output VSL-Queuing-Policy
    interface Vlan1
     no ip address
     shutdown
    interface Vlan10
     description IP Telephony VLAN
     ip address 10.1.10.2 255.255.255.0
     no ip redirects
    interface Vlan20
     description Automation & Management VLAN
     ip address 10.2.20.2 255.255.255.0
     no ip redirects
    interface Vlan30
     description Data VLAN
     ip address 10.3.30.2 255.255.255.0
     no ip redirects
    interface Vlan40
     description Wireless Users VLAN
     ip address 10.4.40.2 255.255.255.0
     no ip redirects
    ip forward-protocol nd
    no ip forward-protocol udp netbios-ns
    no ip forward-protocol udp netbios-dgm
    no ip http server
    no ip http secure-server
    ip access-list extended VSL-BFD
     permit udp any any eq 3784
    ip access-list extended VSL-DHCP-CLIENT-TO-SERVER
     permit udp any eq bootpc any eq bootps
    ip access-list extended VSL-DHCP-SERVER-TO-CLIENT
     permit udp any eq bootps any eq bootpc
    ip access-list extended VSL-DHCP-SERVER-TO-SERVER
     permit udp any eq bootps any eq bootps
    ip access-list extended VSL-IPV4-ROUTING
     permit ip any 224.0.0.0 0.0.0.255
    snmp-server community ro RO
    ipv6 access-list VSL-IPV6-ROUTING
     permit ipv6 any FF02::/124
    banner login ^CC
    #### Login for authorized Takaful IT Personnel ONLY ####
                          TAKAFUL
    #### Login for authorized Takaful IT Personnel ONLY ####
    ^C
    banner motd ^CC
    WARNING, unauthorised access to this network is prohibited.
    Authorized access only
    This system is the property of Takaful Company.^C
    line con 0
     privilege level 15
     login local
     stopbits 1
    line vty 0 4
     privilege level 15
     login local
    line vty 5 15
     privilege level 15
     login local
    module provision switch 1
     chassis-type 70 base-mac F40F.1B56.31D8
     slot 1 slot-type 401 base-mac F40F.1B56.31D8
    module provision switch 2
    end
    TAKAFUL-CORE-01#
    TAKAFUL-CORE-02(recovery-mode)#show run
    Building configuration...
    Current configuration : 5641 bytes
    ! Last configuration change at 02:05:27 UTC Sun Aug 10 2014
    version 15.2
    service nagle
    no service pad
    service timestamps debug datetime msec localtime show-timezone
    service timestamps log datetime msec localtime show-timezone
    service password-encryption
    service compress-config
    service sequence-numbers
    no service dhcp
    hostname TAKAFUL-CORE-02
    boot-start-marker
    boot system flash bootflash:cat4500e-universalk9.SPA.03.05.00.E.152-1.E.bin
    boot-end-marker
    vrf definition mgmtVrf
     address-family ipv4
     exit-address-family
     address-family ipv6
     exit-address-family
    no aaa new-model
    switch virtual domain 100
     switch mode virtual
     mac-address use-virtual
    no dual-active detection pagp
    no ip source-route
    ip vrf Liin-vrf
    no ip domain-lookup
    no ip bootp server
    ip device tracking
    vtp mode transparent
    power redundancy-mode redundant
    mac access-list extended VSL-BPDU
     permit any 0180.c200.0000 0000.0000.0003
    mac access-list extended VSL-CDP
     permit any host 0100.0ccc.cccc
    mac access-list extended VSL-DOT1x
     permit any any 0x888E
    mac access-list extended VSL-GARP
     permit any host 0180.c200.0020
    mac access-list extended VSL-LLDP
     permit any host 0180.c200.000e
    mac access-list extended VSL-SSTP
     permit any host 0100.0ccc.cccd
    spanning-tree mode pvst
    spanning-tree extend system-id
    redundancy
     mode sso
    vlan internal allocation policy ascending
    class-map match-any VSL-MGMT-PACKETS
     match access-group name VSL-MGMT
    class-map match-any VSL-DATA-PACKETS
     match any
    class-map match-any VSL-L2-CONTROL-PACKETS
     match access-group name VSL-DOT1x
     match access-group name VSL-BPDU
     match access-group name VSL-CDP
     match access-group name VSL-LLDP
     match access-group name VSL-SSTP
     match access-group name VSL-GARP
    class-map match-any VSL-L3-CONTROL-PACKETS
     match access-group name VSL-IPV4-ROUTING
     match access-group name VSL-BFD
     match access-group name VSL-DHCP-CLIENT-TO-SERVER
     match access-group name VSL-DHCP-SERVER-TO-CLIENT
     match access-group name VSL-DHCP-SERVER-TO-SERVER
     match access-group name VSL-IPV6-ROUTING
    class-map match-any VSL-MULTIMEDIA-TRAFFIC
     match dscp af41
     match dscp af42
     match dscp af43
     match dscp af31
     match dscp af32
     match dscp af33
     match dscp af21
     match dscp af22
     match dscp af23
    class-map match-any VSL-VOICE-VIDEO-TRAFFIC
     match dscp ef
     match dscp cs4
     match dscp cs5
    class-map match-any VSL-SIGNALING-NETWORK-MGMT
     match dscp cs2
     match dscp cs3
     match dscp cs6
     match dscp cs7
    policy-map VSL-Queuing-Policy
     class VSL-MGMT-PACKETS
      bandwidth percent 5
     class VSL-L2-CONTROL-PACKETS
      bandwidth percent 5
     class VSL-L3-CONTROL-PACKETS
      bandwidth percent 5
     class VSL-VOICE-VIDEO-TRAFFIC
      bandwidth percent 30
     class VSL-SIGNALING-NETWORK-MGMT
      bandwidth percent 10
     class VSL-MULTIMEDIA-TRAFFIC
      bandwidth percent 20
     class VSL-DATA-PACKETS
      bandwidth percent 20
     class class-default
      bandwidth percent 5
    interface Port-channel20
     switchport
     switchport mode trunk
     switchport nonegotiate
     switch virtual link 2
    interface FastEthernet1
     vrf forwarding mgmtVrf
     speed auto
     duplex auto
    interface TenGigabitEthernet2/1/1
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/2
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/3
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/4
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/5
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/6
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/7
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/8
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/9
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/10
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/11
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/12
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/13
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/14
     switchport trunk native vlan 20
     switchport mode trunk
    interface TenGigabitEthernet2/1/15
     switchport mode trunk
     switchport nonegotiate
     no lldp transmit
     no lldp receive
     no cdp enable
     channel-group 20 mode on
     service-policy output VSL-Queuing-Policy
    interface TenGigabitEthernet2/1/16
     switchport mode trunk
     switchport nonegotiate
     no lldp transmit
     no lldp receive
     no cdp enable
     channel-group 20 mode on
     service-policy output VSL-Queuing-Policy
    interface Vlan1
     no ip address
    ip forward-protocol nd
    no ip http server
    no ip http secure-server
    ip access-list extended VSL-BFD
     permit udp any any eq 3784
    ip access-list extended VSL-DHCP-CLIENT-TO-SERVER
     permit udp any eq bootpc any eq bootps
    ip access-list extended VSL-DHCP-SERVER-TO-CLIENT
     permit udp any eq bootps any eq bootpc
    ip access-list extended VSL-DHCP-SERVER-TO-SERVER
     permit udp any eq bootps any eq bootps
    ip access-list extended VSL-IPV4-ROUTING
     permit ip any 224.0.0.0 0.0.0.255
    ipv6 access-list VSL-IPV6-ROUTING
     permit ipv6 any FF02::/124
    line con 0
     stopbits 1
    line vty 0 4
     login
     length 0
    module provision switch 1
    module provision switch 2
     chassis-type 70 base-mac 88F0.3104.0058
     slot 1 slot-type 401 base-mac 88F0.3104.0058
    end

  • Dual-active fast-hello

    Hi,
    Anyone aware if Cisco supports dual-active fast-hello on Sup7L-E or will they support it any time soon on the 4500-E platform.
    (config-vs-domain)#dual-active detection ?
      pagp  Dual-active detection using PAgP
    Thanks

    Hi,
    Have not seen it in any release notes. It is probably on the road map for later, if there are enough requests for it.
    HTH

  • How to avoid Dual Active VSS switches in the network...

    Hi Team,
    We have 2 nos of VSS switches in the network those are connected with 2 nos 10 Gbps uplink, all access switches are connected to both VSS chassis with dual uplinks, When we removed VSL link between these two vss switches both became active. We have completely Layer-2 network, is that any feature which we can use and avoid dual active scenario in VSS and make any one of the switch in standby mode and all Layer link on that switch will be available in case of VSL link goes down.
    I have 3750X series switches are connected to both VSS Core switch It's world be much appreciated if some one provide well document on this and their suggestion.
    Your reply will be much appreciated.
    Thanks,
    Vishal

    Thanks for the reply Reza,
    Please let me know if we go with Epagp then when VSL link goes down then what would be the result?
    1st My there won't be any effect in the network, standby chassis remain in Standby Mode and active in Active Mode?
    2nd Active chassis will reboot and became standby and my standby chassis will be Active?
    3rd Standby chassis will be shutdown all port except VSL? and only Active chassis will work?
    4th Active chassis will restart and shutdown all port except VSL? and standby chassis will be active?
    5th ???
    Reza it would be much helpful if you please guide how to configured EPagp on 6500 and 3750X switch with "c3750e-universalk9-mz.122-55.SE8.bin (ipservices)" image.
    Thanks,
    Vishal

Maybe you are looking for