Nexus 5K Config-Sync : Things to look out for

I've looked through the Cisco config guides for setting up Config sync and have successfully used it to configure dual-homed FEX's ports.
Is there anything I should be aware of that can cause issues?
I enabled config sync on an existing pair of 5Ks.  In other words, the 5Ks already have existing configurations on them before I enabled config sync.

Hi,
According to the this link, you still have to configure the single port in switch profile. Config sync is used when your devices are connected to both 5ks, so you don't have configure the same thing twice.  If your device is going to be singly attached, there is no need for config sync.
Guidelines and Limitations
The guidelines for configuration synchronization are as follows:
•You must configure the following interfaces in a switch profile:
–Port-channel interfaces
–Ports that are not channel-group members
•You must configure all port-channel members outside the switch profile in configuration terminal mode.
•You must follow configurations in a specified order.
•Depending on the type of vPC topology (active/active or straight-through) and the type of configuration that is needed (port channel, nonport channel, FEX, QoS, and so on), you must use the switch profile mode or the configuration terminal mode. See the "At-A-Glance Configuration Modes" section to identify what mode is used for different types of configurations.
Configuration synchronization has the following configuration limitations:
•FCoE in vPC Topologies—FCoE configurations are not supported in switch profiles because configurations are typically different on peer switches. If you enable FCoE on a vPC peer switch, you must not configure the port channel in the switch profile.
• Feature Commands—The feature feature name commands that enable a conditional feature are not supported in switch profiles. You should independently configure these commands on each peer switch in configuration terminal mode.
•Configuration Rollback and Conditional Features—With configuration synchronization, when a conditional feature is present in a checkpoint and not in the running configuration, a configuration rollback to that checkpoint fails. The workaround is to reconfigure the conditional feature ("feature xyz") before the configuration rollback is executed. This workaround also applies to the vpc domain command and the peer-keepalive command in vpc-domain mode.
link:
http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/operations/n5k_config_sync_ops.html#wp1035414
HTH

Similar Messages

  • Buying a used iMac G5, tips and things to look out for?

    What tips could you guys give me on when looking for a used iMac G5? I like the 20" models specifically and it seems the models are all over 1.6GHz so the speeds are fine.
    I currently own a G4 1.67 PowerBook and did a bit of reading up on that before I bought it, seeing what things to look out for what things turned faulty after a while and such. Such as the logic board and the 1 RAM slot going faulty on a few models, recalled batteries, which helped a lot in buying a used one.
    I'm looking for a new desktop but can't afford to fork out over 1 grand for the new iMac's and the speed of my PowerBook is enough for my usual browsing and processing and few photos. So please don't bother telling me to buy a new one cos new is always best, I don't mind spending reasonably less and having a decent machine still - 1.67 15" PowerBook has proved well :P

    Don't buy a new intel. buy a refurbished one from Apple. The PPC architecture is on its way out, few programs are being written for it, and most new applications are only for intel. I realize that even a refurb might cost a bit more than you planned to spend, but it will be worth it down the road.
    Look in the [Apple Store|http://store.apple.com/us/browse/home/specialdeals/mac?mco=MTE3NjY], the choice changes daily, so just keep you eye open for the one you want and snap it up. And get Apple Care as well.
    Let us know what you ended up with please,

  • Purchacing a s/h early 2008 MP - things to look out for?

    Hi guys, Ive been offered a early 2008 MP at what i would consider to be a reasonable price. It is the 2 x 2.8 quad core model. Currently it has 6gb (not apple) ram & I'll be getting it with the original HD.
    Not sure about any other options at this stage.
    Just wondering if there are any specific things I need to be aware of with this model & to look out for. I have the serial number of the machine if that's relevant.
    This would be my first MP - i have had macs for years but never MPs.
    Any advice would be appreciated
    cheers

    http://store.apple.com/us/browse/home/specialdeals/mac/mac_pro
    2009 4-core 2.66 showed up @ $2119
    2008 2.8 8-core @ ~ $2495?

  • Buying a used Mac - what to look out for

    I'm not really sure this should be in the MacBook Pro forum, but I had to put it somewhere.
    I'm considering buying a used Mac for my son. My daughter is using an old Aluminum PowerBook and when she gets older, I'll upgrade her as well. For my son the unit will be for mostly at home, so it doesn't need to be a laptop, but since laptops can basically be used as desktops as well, I'm posting here.
    What I want to know are any "gotcha's" that might not occur to me. For example, such and such types don't have particularly good battery life, the hard drive on this one is easy to change but not on that one. This one is known to have video problems but that one is great, etc.etc. Things to look out for or be aware of.
    I'm not adverse to buying old PPC based systems. Some of the old PowerMacs with G5 processors can be had for really, really low prices, but they're obviously limited to Leopard.
    This is a 10 year old boy, so I'm not going to spend a fortune on it. Kids will be kids, you know.
    Thoughts anyone?

    I assume you're ruling out completely all iBook G3's, right?
    If you got a butt kickin' PowerMac it might be quite a machine at quite a price. I've seen some G5 quad core's selling for as little as $100. With something that old, though, how long will it be before there's something like a power supply failure.
    Watch out for 17" iMac's from the 2006-2007 era. The displays have a tendency to develop vertical lines, and once they start doing it, it spreads like a disease across the display. WIth a unit like that you would have to use an external display and hide the original.
    Some of the earlier MacBooks had some battery issues and charging issues.
    I know for a fact that if you get a 2009 MacBook and put 4G of RAM into it you can comfortably run Mavericks. Of course if you read the posts of some of the people on this site they will claim you can ***never*** run Mavericks comfortably on anything. I'm not really sure what their problems are. You can pick one of these up for less than $200 for one in moderate shape to slightly over $200 for one in good shape.
    As with any laptop, check the battery out. On all systems check the HD and OD, especially the latter, to see if their working. I had to do a refurbishment/resell program on some of our older stuff and the ODs were bad in almost all of them. Thoroughly check the HD if the unit is a laptop or it's over 3 years old (just my advice).
    As far as PowerBooks, they're going to be too slow to handle any online video, but probably suitable enough for anything else. You can (I'm not joking) pick up a decent 12" model (1.33GHz, for example) for less than $70. You could also look at the 15" models but be wary of a problem some of them developed over time with RAM chips in a certain bank not being recognized.
    For reasons known only to God, old Titaniums are selling for more than Aluminum PowerBooks. I really wonder if people on eBay see the black Titanium keyboard on the metal base and think they're getting a new unit. Titaniums in good shape are a rarity because the hinges in the back liked to bust. They also ran hot enough to burn your legs. I'd steer clear of them.
    Most of the G4 iBooks we had and tested seemed OK. Some of the iMac G5s seem to be remarably solid. With the 2009 Intel iMac's (and maybe 2010 as well) you may need to be careful about the drive you install do to an unusual thermal monitoring setup.
    Well. That's if for me now.
    Later.

  • An app everyone should look out for

    Hello apple users,
    Today I am here to warn you all for one of the many app's that scam you, this one is named "panorama backgrounds & parallax wallpapers & dynamic livepapers for ios 7, whatsapp, hangouts, viber"
    Like the name and description promises it that you get many panorama, parallax, dynamic, whatsapp, hangout and viber backgrounds/wallpapers/livepapers. It only costed 1,79 (Euro) so I thought, why the heck not
    When I launched the app, all I got was this:
    About 30 backgrounds for whatsapp, easily found on google.
    And also, it has fake reviews (at the bottom you can see the real ones of people saying the truth)
    Any apps you know of other people should look out for?

    Hi,
    To migrate from Exchange 2010 to Exchange 2013, you can refer to the articles provided by Amit Tank.
    For one thing about public folders, Exchange 2013 users can access public folders on Exchange 2010, but Exchange 2010 users can't access public folders on Exchange 2013. If you still use public folders, you need to migrate mailboxes before moving public
    folders to Exchange 2013.
    Best regards,
    If you have feedback for TechNet Subscriber Support, contact
    [email protected]
    Belinda Ma
    TechNet Community Support

  • Hackers - What to look out for and prevention!?

    Hi, I was just looking through my logs and such and saw some alot of gobbly gook. It made me nervous. so I was wondering what are the main tips on detecting a Hacker, spotting Hacking attempts and prevention of Hackers?
    I understand that I depends on what kit you have and such and that your computer has to make connections with others to use the internet but what do I and every other average Apple user need to look out for in logs on modems, firewalls and applications.
    I personaly have looked at my logs on my Netgear Modem and logs on my System Profiler application. I see connections to various things but i'm no good at networking. All I know is to have my firewall on!
    Also...I am always nervous when using Bit Torrent, do I have any need to be?
    Thanks all ~ Joe
    p.s - I have also read in other posts that posting log information is a dumb idea so have played safe and kept them to myself. So there's my tip! :)
    PowerBook G4 15" - Sept 04- 1.5 GHz   Mac OS X (10.4.2)   Power Mac G4 1GHz DP - Airport Extreme - 2MBPS Broadband

    It's not always true that an invalid access is an attack. For example, if your firewall application reports that the misused source port is a high port number, it might be a trigger packet. Some ISP may configure the servers system incorrectly or insufficiently. Some organization or a group of companies may send scanning packets to P2P users in a special way in order to improve heavy WAN traffics caused by P2P software users. You might mis-configure your modem or router firewall system or a built-in firewall has a bug, etc.
    If a source port number is in the rage between 49152 and 65535, it is normally either dynamic or private ports. Dynamic ports are randomly assigned, and private ports are used by OS software or applications. By seeing any high ports with other logs events, you may guess whether someone attacks your node, about his/her skills/ability and the time zone. You may see one of high ports displaying on Netstat program for Network Utility application when pressing "Display the state of all current socket connections"-- udp4 0 0 localhost.xxxxx. Netstat may help to know who is on networks but not in real time. You need to refresh the button manually.
    Here are two basic points:
    * It is important to know yourself and think of your computer configurations before you start thinking who is there or your enemy.
    * The most important matter in computer security is to be aware, and watch the systems carefully something most people do not do. For example, check if asl.log facility status with the level integer value displays differently from regular bases. If system.log or console.log reports that your computer name and the host name are changed, you may be facing to a serious security situation.
    If you want to see whether your ISP blocks ports or you have opened ports, security scan service such as grc.com (Shields UP), dshield.org or seifried.org are available on the Internet.
    Mac OS X Tiger built-in firewall (ipfw) has basic features. You can add rule-sets if you want. See for example here. Normally, you do not need to change the default rule-sets that blocks unwanted incoming packets.
    Here is how to read about a log example for Mac OS X built-in firewall:
    ipfw: 64000 Deny TCP 123.456.78.900:4990 444.555.66.777:1433 in via en1
    The ipfw rule-set 64000 denies a Transmission Control Protocol IP packet sent by the source address 123.456.78.900 via the port number 4990 to attempt an invalid access to the destination address 444.555.66.777 targeting to the port 1433 in via your interface "AirPort." The destination address in this case is your local IP address, but not a remote IP address assigned for your ISP (for instance) node. The BSD device name for Built-in Ethernet interface is "en0." "en1" is used for AirPort or the first PCI Ethernet card if you install one.
    You see the Mac OS X built-in firewall do not tell you the service name of a misused port number and the host name of the source IP address in real time. Therefore, it may be uncomfortable to analyze the background in details-- especially, if events of the firewall log would be flooded by access attempted every minute or more frequently. You may not even be able to send an e-mail to abuse team who is responsible for the source IP address net block to ask for the investigation if you want to do so. To send an enquiry has two meaning-- suggesting their server vulnerability or insufficient configuration and making a good use of their reply to your analysis.
    In this case, an unassigned port number 4990 is misused by someone directly or indirectly (e.g. bot, botarmy, etc.) from the server 123.456.78.900, and the port 1433 for sniffing if a Microsoft SQL Server (Windows related) is running on your machine. There is also known history that some viruses try to exploit vulnerabilities in Microsoft SQL Server. The most known ports being misused in recent days are 8 (ICMP ping) 135, 139, 445 and ports for Trojan Horses and P2P technology driven software such as BitTorrent-- See also this world map, http://isc.sans.org/.
    You may think about why bad IP packets pass through your ISP servers especially if servers are configured with a firewall system.
    If you want to know more about Transmission Control Protocol specification, find "RFC 793" documentation on the Internet. All assigned port numbers document is available at www.iana.org.
    If you are interested in third-party firewall, DoorStop X and Who's There are very good applications. You'll see it when you use their trial version with the full features.
    Good firewall applications may protect your computer from various invalid access attempts but not for the real solution. Good packet analyzing (Sniffers) applications may help to inform you a result of analysis but not for the real solution. End-users, ISPs and the authorities need to run to the same direction together.

  • What to look out for when upgrading from 10.4.5 to 10.4.6

    I'm thinking about upgrading our server from 10.4.5 to 10.4.6 (I've delayed it because I remember hearing a few things were broken in the process on some setups). So, being the novice that I am, what should I look out for?

    The best thing you can do is to take a full backup of your system and then apply the latest update.
    Also, it is safer to apply the combo update.
    If you do not hear problems in here, there are probably not any problems
    Mihalis.

  • Is there anything we need to look out for when running Forte 3.0.N.1 and iDS5.0 SP1 on WindowsXP?

    We are in the process of migrating to Windows XP and during the transition period from 95 to XP we will need to run the uncertified for XP products Forte 3.0.N.1 client runtime and the iDS5.0 SP1 admin console on XP for a time.
    We were just wondering if there were any gotchas or problems we need to look out for?

    Hi Kelsey,
    Forte 3.0.N.1 is not certified to run on Windows XP. UDS 5.0.1 is the only certified ti run on Windows XP but just as client and is not certified to be a Server.
    Anyway, let me know what your problems were when running Forte on Windows XP.
    Cheers!!!

  • What defects should I look out for on a new C2D MacBook?

    Hi all,
    So, here's my Mac story. I've had macs for the past 4 years, I just like working on them when I have the option. When the new MacBook came out last Spring I immediately bought one, and then 3 returns laters, I got one that wasn't falling apart and was happy. Then the C2D came out, and I was antsy to upgrade. I know it was foolish but I talked myself into a MBP C2D. I got that, about 2 weeks ago and was very dissapointed in the display, grainy and all. So I talked to apple and they're taking it back. But here I am with no laptop again. SO I purchased a new C2D MacBook, and it arrives today.
    So back to the question ... what defects with the new one should be on the look out for? It's difficult to figure out which MacBook people are talking about when they talk about their problems.
    Thanks for the help

    To be honest, you shouldn't be looking for any defects. There were some problems with a small percentage of the original MacBooks which have since been resolved and should not appear on the new Core 2 models. Get your MacBook and enjoy it. If you discover something is not working the way you feel it should, address it then. To be on the look out for problems that you may have heard others having is only going to make you worry and probably think you have found a problem where none may exist.

  • 2-3 things to watch out for when SAP is the source for a Data Warehouse

    Hello
    What are 2-3 things to watch out for when SAP is the source for a Data Warehouse (Informatica for ETL and Cognos for reporting)?
    Thanks
    G. Vijay

    Going through some or all of this might help:
    Empty Safari's cache (from the Safari menu), then close Safari.
    Go to Home/Library/Safari and delete the following files:
    form values
    download.plist
    Then go to Home/Library/Preferences and delete
    com.apple.Safari.plist
    Repair permissions (in Disk Utility).
    Start up Safari again, and things should have improved.
    If not, MacFixit have published a very detailed (very!) article on speeding up a slow Safari, here:
    http://www.macfixit.com/article.php?story=20070416000657464
    Many, including me, have also followed the advice given by others here to add DNS codes to their Network Settings, with good results in terms of speed-up:
    Open System Preferences/Network. Double click on your connection type, or select it in the drop-down menu. Click on TCP/IP and in the box marked 'DNS Servers' enter the following two numbers:
    208.67.222.220
    208.67.220.222
    Click on Apply Now and close the window.
    Restart Safari, and repair permissions.

  • How to look out for oss notes

    how to look out for oss notes

    OSS Note
    http://www.sappoint.com/basis/.pdf
    http://www.sap-img.com/basis/oss-notes.htm
    http://www.sap-img.com/basis/manually-applying-the-oss-note.htm
    REgards,
    Santosh

  • 10.4.2 upgrade to 10.4.8... web/ftp server.. what to look out for?

    Anything I should be aware of.
    I backed up all of my data, including configs httpd, and other shared apps like squirrelmail, roundcube, phpicalendar.(just in case the update decides it wants to wipe the dir completely)
    I have heard about issues with mysql SOCK, but have not kept up to date on what the updates may or may not effect.
    Curious what people's issues have been throughout the updates to 10.4.8.
    I suppose I could read through all of the threads, but I would kind of like a rundown of things to checkout, before I commit to this update.
    P.S. I ASR'ed the booted OS onto another drive, just in case I have to revert while figuring out the solution's to the problems.

    Looks like everything went fine.
    I decided to do a target disk mode install of the combo update. The problem I ran into is that my MacBook Pro was unable to install the PPC combo update, since it is not a PPC. So I had to use my old powerbook.
    Some of my squirrelmail configs were off, but easy to re-implement. Even some of my hacked passwd plugins and seive plugins were fine.

  • Looking Out for Oracle BPEL Developers for Various Positions @ Bangalore

    Currently we are looking for ‘Oracle BPEL Professionals’ , Bangalore,India @ client
    Job Location: Bangalore
    Job Type: Permanent
    Job Position:Opened
    Total Exp: 4-12Yrs
    Skills Required:
    Technical Lead in Oracle SOA platform
    • Implementation experience of minimum 2years in Oracle BPEL Process Manager, Oracle ESB
    • Good to have Aqualogic ESB, Aqualogic BPM expertise
    • Minimum 4+ years experience out of which 2 years in Oracle BPEL Process Manager
    If you are interested Please forward your Updated CV at [email protected]
    Edited by: 785398 on Jul 30, 2010 12:54 AM

    To me, and from what I've seen on most forums, bumping means to put a short reply against a particular thread so that it temporarily goes to the top of the active threads.
    To tell people to 'forget the whole thing' you could just let the thread go or reply with 'Nevermind'. However, replying to the thread at all raises it to the top again so people are more likely to read it than ignore it, which goes counter to what you're trying to acheive.
    Earl

  • Custom screen layouts - things to watch out for?

    Hi guys (Willam ),
    We've had a designer customise a screen layout for us. We started with Desktop_Layout. The designer doesn't know Robohelp, and the documentation is sparse, to say the least.
    I'm wondering what issues we may run in to and if there is anything we absolutely, definitely shouldn't do.
    For example,
    @charset "utf-8", and * and html definitions have been added to the stylesheet
    instead of embedding the toc book images in the Topic.slp, the images are coded in the css.
    additional divs have been added (such as left-column, right-column, wrapper, content-wrapper)
    some divs have been removed
    Anything for which there was not an obvious use has been removed, e.g. wTOCNodeCloseBook, div.wTopic
    additional css has been added to style the content of the "topic holder" section. e.g. content p, content h1, content h2.
    The Search results page is called "Topic", although it seems to have the correct icon in the Project Setup Pod.
    There are regular html tags inside the search results layout, e.g. <h2><?rh-msp-search-result-title class="wSearchResultTitle" ?></h2>, <p><?rh-msp-search-result-url class="wSearchURL" ?> </p>
    That's just what I've been able to determine from a quick look. I'm really not sure what else may have been done.
    I suppose I just want to know if we are setting ourselves up for a disaster somewhere.
    Thanks,
    Amber

    Thanks very much Wi.Es
    The ToC bug you mention doesn't seem to be a problem for us - we're on 11.0.0 still. 
    Removed divs breaking the editor isn't a problem as I couldn't figure out how to use the editor anyway.
    Currently we only support IE9 on desktop, so whether mobile or other browsers work isn't a consideration. I've mentioned it as a future concern, though and pointed out we'd probably have to redo the design from scratch.
    I've asked for anything styling the topic content to be backed out and sent to me to put in the regular stylesheet. (I wanted to do that anyway.)
    The 'Search results' layout being called 'Topic' - the designer is on 11.0.1. The generated output seems to work okay, so I'm planning to ignore it for now.
    RoboWizard - not me. I'll be handballing to the opposition.
    Handball (Australian rules football) - Wikipedia, the free encyclopedia

  • Presentations To Look Out For At The User Conference....

    Product Spotlight - Primavera Contract Management
    Krista Lambert – Senior Product Manager: Contract Management, Oracle Primavera
    Oracle Primavera Premier Support - Creating Customer Value
    Understand the available support tools, support resources and much more!
    Tony Banks - Director, Oracle Primavera
    Book Now:
    http://www.ukoug.org/calendar/show_event.jsp?id=4902

    My opinion would be that the main problem to look for is buying the Time Capsule for the wrong reason, like attempting to use it as a regular hard drive when it was designed for Time Machine backups.

Maybe you are looking for