Role Priority in VCP

i want to ask why we use role priority in vcp. do we achive load balancing for access layers switches in below scenario? or  have to configure HSRP or GLPB?

As far as I know, therre is no such feature.
Please rate all useful posts
"opportunity is a haughty goddess who waste no time with those who are unprepared"

Similar Messages

  • Influence the sequence of Roles in IllumLoginRoles

    Hi all,
    is there a possibility to influence the sequence in which MII orders the roles which are assigned to a user?
    For example, user A has roles IllumLoginRoles="'SAP_JAVA_NWADMIN_LOCAL','XMII Administrators','XMII Users', 'My new Role' ". How can I manage to get the role 'My new Role' to be the first role in the list?
    This is important, because the Content Display Tabs on the MII Portal are displayed in the sequence of the roles in the IllumLoginRoles list. And the first Content Display Tab is loaded on login. So if I want the Content Tab of role 'My new Role' to be loaded when user A logs in, it must be the first role in the list.
    I think it doesn't matter when the role was created, and surely the roles are not ordered by name.
    Michael
    Edited by: Michael Otto on Nov 4, 2008 9:15 AM

    Michael,
    The order of your role names has no bearing on how it is showed in the Content Display Tabs or Navigation Items.  Under System Management -> Custom Attribute Mapping -> Roles Tab, there is an option for priority.  The lowest number has the highest priority so most likely XMII_Administrators would have a priority of '0' and XMII_Users would have one of '100'.
    Content tabs are added, modified, and deleted in a similar manner to the navigation tree items. The tab item hierarchy is one dimensional. Tabs may be ordered within a user or role. Tabs are inherited from the user level first and then the role level. The order of inherited roles is determined by the role priority. The user's first tab, whether it be from the user or role level becomes the default home page in the main content area.  The target window radio buttons behave the same way as the navigation tree items.
    When the attributes are read, roles are added lowest priority to highest priority.  Profile properties can be created at the role or the user level.  A user will inherit properties from the roles that they are a member of.  If more than one role has the same property name, the role with the highest priority will pass its property value to the user.  If the user has the same property name defined in their profile, the user value always takes precedence.

  • 1)     When call center Team creates Service Request/Service Order/  Complaints it should be set as High Priority by default.

    Hello team ,this is my requirement ..   Through customizing..
    When call center Team creates Service Request/Service Order/  Complaints it should be set as High Priority by default...we need to set only interaction agent bussiness role priority only HIGH..only for this bussiness role.through customizing how to do it..what are the steps..through customizing only please.. help

    By customizing, you can set a default priority to a given transaction type.
    But this does not depend on the business role.
    But as you are talking about IC agents, maybe you can check IDI for this purpose, because there are actions like "Set Problem Priority", "Set Service Request Priority" or "Set Service Order Priority".
    Best regards,
    Sylvain AGUETTAZ

  • Nexus 4001i and MST tons of log errors

    Went looking through my Nexus 4001i logs today, and started noticing a bunch of STP role and port change messages:
    2013 Jul  5 14:40:31 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/1 instance MST0000 role changed to designated
    2013 Jul  5 14:40:31 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port port-channel2 instance MST0000 role changed to alternate
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port port-channel1 instance MST0000 role changed to root
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/14 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/14 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/13 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/13 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/12 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/12 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/11 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/11 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/10 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/10 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/9 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/9 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/8 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/8 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/7 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/7 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/6 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/6 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/5 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/5 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/4 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/4 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/3 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/3 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/2 removed as MST Boundary port
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-PORT_ROLE: Port Ethernet1/2 instance MST0000 role changed to designated
    2013 Jul  5 14:40:32 N4k-SLOT7-SW1 %STP-6-MST_PORT_BOUNDARY: Port Ethernet1/1 removed as MST Boundary port
    After going through a variety of configuration validations, spanning-tree root and priority validations as well as making sure the instances and revisions between the various MST speaking switches (all of the Nexus gear including Nexus 5596 which are vPC peers, 4001i's which connect via vPC's to the 5596's, and Catalyst 3110X's which also use MST, but only have one uplink at this time to the 5596's not in a vPC setup).
    None of the other devices appear to be experiencing this problem.
    I am quite confused as to what is going on, and cannot figure out why the 4001i is wigging out like this.
    A quick output of MST::
    N4k-SLOT7-SW1# show spanning-tree mst
    ##### MST0    vlans mapped:   801-3109,3111-4094
    Bridge        address 6073.5c8d.7e82  priority      24576 (24576 sysid 0)
    Root          address 0023.04ee.be03  priority      16384 (16384 sysid 0)
                  port    Po1             path cost     0       
    Regional Root address 0023.04ee.be03  priority      16384 (16384 sysid 0)
                                          internal cost 500       rem hops 19
    Operational   hello time 2 , forward delay 15, max age 20, txholdcount 6
    Configured    hello time 2 , forward delay 15, max age 20, max hops    20
    Interface        Role Sts Cost      Prio.Nbr Type
    Po1              Root FWD 500        32.4096 P2p
    Po2              Altn BLK 1000       64.4097 P2p
    Eth1/1           Desg FWD 2000      128.129  Edge P2p
    Eth1/2           Desg FWD 2000      128.130  Edge P2p
    Eth1/3           Desg FWD 2000      128.131  Edge P2p
    Eth1/4           Desg FWD 2000      128.132  Edge P2p
    Eth1/5           Desg FWD 2000      128.133  Edge P2p
    Eth1/6           Desg FWD 2000      128.134  Edge P2p
    Eth1/7           Desg FWD 2000      128.135  Edge P2p
    Eth1/8           Desg FWD 2000      128.136  Edge P2p
    Eth1/9           Desg FWD 2000      128.137  Edge P2p
    Eth1/10          Desg FWD 2000      128.138  Edge P2p
    Eth1/11          Desg FWD 2000      128.139  Edge P2p
    Eth1/12          Desg FWD 2000      128.140  Edge P2p
    Eth1/13          Desg FWD 2000      128.141  Edge P2p
    Eth1/14          Desg FWD 2000      128.142  Edge P2p
    ##### MST1    vlans mapped:   2-499,600-800,3110
    Bridge        address 6073.5c8d.7e82  priority      24577 (24576 sysid 1)
    Root          address 0023.04ee.be03  priority      16385 (16384 sysid 1)
                  port    Po1             cost          500       rem hops 19
    Interface        Role Sts Cost      Prio.Nbr Type
    Po1              Root FWD 500       128.4096 P2p
    Eth1/1           Desg FWD 2000      128.129  Edge P2p
    Eth1/2           Desg FWD 2000      128.130  Edge P2p
    Eth1/3           Desg FWD 2000      128.131  Edge P2p
    Eth1/4           Desg FWD 2000      128.132  Edge P2p
    Eth1/5           Desg FWD 2000      128.133  Edge P2p
    Eth1/6           Desg FWD 2000      128.134  Edge P2p
    Eth1/7           Desg FWD 2000      128.135  Edge P2p
    Eth1/8           Desg FWD 2000      128.136  Edge P2p
    Eth1/9           Desg FWD 2000      128.137  Edge P2p
    Eth1/10          Desg FWD 2000      128.138  Edge P2p
    Eth1/11          Desg FWD 2000      128.139  Edge P2p
    Eth1/12          Desg FWD 2000      128.140  Edge P2p
    Eth1/13          Desg FWD 2000      128.141  Edge P2p
    Eth1/14          Desg FWD 2000      128.142  Edge P2p
    ##### MST2    vlans mapped:   1,500-599
    Bridge        address 6073.5c8d.7e82  priority      24578 (24576 sysid 2)
    Root          address 0023.04ee.be03  priority      16386 (16384 sysid 2)
                  port    Po2             cost          1000      rem hops 19
    Interface        Role Sts Cost      Prio.Nbr Type
    Po2              Root FWD 1000      128.4097 P2p
    Eth1/1           Desg FWD 2000      128.129  Edge P2p
    Eth1/2           Desg FWD 2000      128.130  Edge P2p
    Eth1/3           Desg FWD 2000      128.131  Edge P2p
    Eth1/4           Desg FWD 2000      128.132  Edge P2p
    Eth1/5           Desg FWD 2000      128.133  Edge P2p
    Eth1/6           Desg FWD 2000      128.134  Edge P2p
    Eth1/7           Desg FWD 2000      128.135  Edge P2p
    Eth1/8           Desg FWD 2000      128.136  Edge P2p
    Eth1/9           Desg FWD 2000      128.137  Edge P2p
    Eth1/10          Desg FWD 2000      128.138  Edge P2p
    Eth1/11          Desg FWD 2000      128.139  Edge P2p
    Eth1/12          Desg FWD 2000      128.140  Edge P2p
    Eth1/13          Desg FWD 2000      128.141  Edge P2p
    Eth1/14          Desg FWD 2000      128.142  Edge P2p
    N4k-SLOT7-SW1# show spanning-tree detail | i occur|from|exec
    MST0000 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 1 last change occurred 3:48:09 ago
              from port-channel1
    MST0001 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 1 last change occurred 3:48:07 ago
              from port-channel1
    MST0002 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 1 last change occurred 3:48:07 ago
              from port-channel2
    (topology change was due to testing rapid-PVST for this switch, and then putting it back, the previous change occured 555 hours ago).
    N4k-SLOT9-SW2# show spanning-tree
    MST0000
      Spanning tree enabled protocol mstp
      Root ID    Priority    16384
                 Address     0023.04ee.be03
                 Cost        0
                 Port        4096 (port-channel1)
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
      Bridge ID  Priority    24576  (priority 24576 sys-id-ext 0)
                 Address     2c54.2ded.b704
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    Interface        Role Sts Cost      Prio.Nbr Type
    Po1              Root FWD 500       128.4096 P2p
    Po2              Altn BLK 1000      128.4097 P2p
    Eth1/1           Desg FWD 2000      128.129  Edge P2p
    Eth1/2           Desg FWD 2000      128.130  Edge P2p
    Eth1/3           Desg FWD 2000      128.131  Edge P2p
    Eth1/4           Desg FWD 2000      128.132  Edge P2p
    Eth1/5           Desg FWD 2000      128.133  Edge P2p
    Eth1/6           Desg FWD 2000      128.134  Edge P2p
    Eth1/7           Desg FWD 2000      128.135  Edge P2p
    Eth1/8           Desg FWD 2000      128.136  Edge P2p
    Eth1/9           Desg FWD 2000      128.137  Edge P2p
    Eth1/10          Desg FWD 2000      128.138  Edge P2p
    Eth1/11          Desg FWD 2000      128.139  Edge P2p
    Eth1/12          Desg FWD 2000      128.140  Edge P2p
    Eth1/13          Desg FWD 2000      128.141  Edge P2p
    Eth1/14          Desg FWD 2000      128.142  Edge P2p
    MST0001
      Spanning tree enabled protocol mstp
      Root ID    Priority    16385
                 Address     0023.04ee.be03
                 Cost        500
                 Port        4096 (port-channel1)
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
      Bridge ID  Priority    24577  (priority 24576 sys-id-ext 1)
                 Address     2c54.2ded.b704
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    Interface        Role Sts Cost      Prio.Nbr Type
    Po1              Root FWD 500       128.4096 P2p
    Eth1/1           Desg FWD 2000      128.129  Edge P2p
    Eth1/2           Desg FWD 2000      128.130  Edge P2p
    Eth1/3           Desg FWD 2000      128.131  Edge P2p
    Eth1/4           Desg FWD 2000      128.132  Edge P2p
    Eth1/5           Desg FWD 2000      128.133  Edge P2p
    Eth1/6           Desg FWD 2000      128.134  Edge P2p
    Eth1/7           Desg FWD 2000      128.135  Edge P2p
    Eth1/8           Desg FWD 2000      128.136  Edge P2p
    Eth1/9           Desg FWD 2000      128.137  Edge P2p
    Eth1/10          Desg FWD 2000      128.138  Edge P2p
    Eth1/11          Desg FWD 2000      128.139  Edge P2p
    Eth1/12          Desg FWD 2000      128.140  Edge P2p
    Eth1/13          Desg FWD 2000      128.141  Edge P2p
    Eth1/14          Desg FWD 2000      128.142  Edge P2p
    MST0002
      Spanning tree enabled protocol mstp
      Root ID    Priority    16386
                 Address     0023.04ee.be03
                 Cost        1000
                 Port        4097 (port-channel2)
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
      Bridge ID  Priority    24578  (priority 24576 sys-id-ext 2)
                 Address     2c54.2ded.b704
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    Interface        Role Sts Cost      Prio.Nbr Type
    Po2              Root FWD 1000      128.4097 P2p
    Eth1/1           Desg FWD 2000      128.129  Edge P2p
    Eth1/2           Desg FWD 2000      128.130  Edge P2p
    Eth1/3           Desg FWD 2000      128.131  Edge P2p
    Eth1/4           Desg FWD 2000      128.132  Edge P2p
    Eth1/5           Desg FWD 2000      128.133  Edge P2p
    Eth1/6           Desg FWD 2000      128.134  Edge P2p
    Eth1/7           Desg FWD 2000      128.135  Edge P2p
    Eth1/8           Desg FWD 2000      128.136  Edge P2p
    Eth1/9           Desg FWD 2000      128.137  Edge P2p
    Eth1/10          Desg FWD 2000      128.138  Edge P2p
    Eth1/11          Desg FWD 2000      128.139  Edge P2p
    Eth1/12          Desg FWD 2000      128.140  Edge P2p
    Eth1/13          Desg FWD 2000      128.141  Edge P2p
    Eth1/14          Desg FWD 2000      128.142  Edge P2p
    N4k-SLOT9-SW2#  show spanning-tree detail | i occur|from|exec
    MST0000 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 18758 last change occurred 4:01:03 ago
              from port-channel1
    MST0001 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 45742 last change occurred 4:01:02 ago
              from port-channel1
    MST0002 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 21007 last change occurred 599:47:47 ago
              from port-channel2
    N4k-SLOT9-SW2#
    N5596-DC-SW1# show spanning-tree
    MST0000
      Spanning tree enabled protocol mstp
      Root ID    Priority    16384
                 Address     0023.04ee.be03
                 This bridge is the root
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
      Bridge ID  Priority    16384  (priority 16384 sys-id-ext 0)
                 Address     0023.04ee.be03
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    Interface        Role Sts Cost      Prio.Nbr Type
    Po1              Desg FWD 1000      128.4096 P2p
    Po2              Desg FWD 200       128.4097 (vPC) P2p
    Po3              Desg FWD 200       128.4098 (vPC) P2p
    Po57             Desg FWD 200       128.4152 (vPC) P2p
    Po100            Desg FWD 1000      128.4195 (vPC peer-link) Network P2p
    Eth1/15          Desg FWD 2000      128.143  Edge P2p
    Eth1/16          Desg FWD 2000      128.144  Edge P2p
    MST0001
      Spanning tree enabled protocol mstp
      Root ID    Priority    16385
                 Address     0023.04ee.be03
                 This bridge is the root
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
      Bridge ID  Priority    16385  (priority 16384 sys-id-ext 1)
                 Address     0023.04ee.be03
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    Interface        Role Sts Cost      Prio.Nbr Type
    Po2              Desg FWD 200       128.4097 (vPC) P2p
    Po3              Desg FWD 200       128.4098 (vPC) P2p
    Po57             Desg FWD 200       128.4152 (vPC) P2p
    Po100            Desg FWD 1000      128.4195 (vPC peer-link) Network P2p
    MST0002
      Spanning tree enabled protocol mstp
      Root ID    Priority    16386
                 Address     0023.04ee.be03
                 This bridge is the root
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
      Bridge ID  Priority    16386  (priority 16384 sys-id-ext 2)
                 Address     0023.04ee.be03
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    Interface        Role Sts Cost      Prio.Nbr Type
    Po1              Desg FWD 1000      128.4096 P2p
    Eth1/15          Desg FWD 2000      128.143  Edge P2p
    Eth1/16          Desg FWD 2000      128.144  Edge P2p
    N5596-DC-SW1# show spanning-tree detail | i occur|from|exec
    MST0000 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 44578 last change occurred 4:11:57 ago
              from port-channel2
    MST0001 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 98707 last change occurred 4:11:55 ago
              from port-channel2
    MST0002 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 4 last change occurred 4:11:55 ago
              from port-channel1
    N5596-DC-SW2# show spanning-tree
    MST0000
      Spanning tree enabled protocol mstp
      Root ID    Priority    16384
                 Address     0023.04ee.be03
                 This bridge is the root
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
      Bridge ID  Priority    16384  (priority 16384 sys-id-ext 0)
                 Address     0023.04ee.be03
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    Interface        Role Sts Cost      Prio.Nbr Type
    Po1              Desg FWD 1000      128.4096 P2p
    Po2              Desg FWD 200       128.4097 (vPC) P2p
    Po3              Desg FWD 200       128.4098 (vPC) P2p
    Po57             Desg FWD 200       128.4152 (vPC) P2p
    Po100            Root FWD 1000      128.4195 (vPC peer-link) Network P2p
    Eth1/9           Desg FWD 20000     128.137  P2p
    Eth1/15          Desg FWD 2000      128.143  Edge P2p
    Eth1/16          Desg FWD 2000      128.144  Edge P2p
    MST0001
      Spanning tree enabled protocol mstp
      Root ID    Priority    16385
                 Address     0023.04ee.be03
                 This bridge is the root
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
      Bridge ID  Priority    16385  (priority 16384 sys-id-ext 1)
                 Address     0023.04ee.be03
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    Interface        Role Sts Cost      Prio.Nbr Type
    Po2              Desg FWD 200       128.4097 (vPC) P2p
    Po3              Desg FWD 200       128.4098 (vPC) P2p
    Po57             Desg FWD 200       128.4152 (vPC) P2p
    Po100            Root FWD 1000      128.4195 (vPC peer-link) Network P2p
    Eth1/9           Desg FWD 20000     128.137  P2p
    MST0002
      Spanning tree enabled protocol mstp
      Root ID    Priority    16386
                 Address     0023.04ee.be03
                 This bridge is the root
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
      Bridge ID  Priority    16386  (priority 16384 sys-id-ext 2)
                 Address     0023.04ee.be03
                 Hello Time  2  sec  Max Age 20 sec  Forward Delay 15 sec
    Interface        Role Sts Cost      Prio.Nbr Type
    Po1              Desg FWD 1000      128.4096 P2p
    Eth1/9           Desg FWD 20000     128.137  P2p
    Eth1/15          Desg FWD 2000      128.143  Edge P2p
    Eth1/16          Desg FWD 2000      128.144  Edge P2p
    N5596-DC-SW2# show spanning-tree | i occur|from|exec
    N5596-DC-SW2# show spanning-tree detail | i occur|from|exec
    MST0000 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 44234 last change occurred 4:12:45 ago
              from port-channel100
    MST0001 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 97804 last change occurred 4:12:43 ago
              from port-channel100
    MST0002 is executing the mstp compatible Spanning Tree protocol
      Number of topology changes 49801 last change occurred 599:58:06 ago
              from Ethernet1/9
    Except from MST configs:
    Nexus 4001i switches:
    vlan 1,301-499
    vlan 500
      fip-snooping enable
    vlan 600-800
    spanning-tree mode mst
    spanning-tree pathcost method long
    spanning-tree mst 0-2 priority 24576
    spanning-tree mst configuration
      revision 1
      instance 1 vlan 2-499,600-800,3110
      instance 2 vlan 1,500-599
    Nexus 5596 switches:
    N5596-DC-SW1
    spanning-tree mode mst
    spanning-tree pathcost method long
    spanning-tree mst 0-2 priority 16384
    spanning-tree pseudo-information
      mst 0-2 root priority 16384
      mst 0-2 designated priority 16384
    spanning-tree mst configuration
      revision 1
      instance 1 vlan 2-499,600-800,3110
      instance 2 vlan 1,500-599
    N5596-DC-SW2
    spanning-tree mode mst
    spanning-tree pathcost method long
    spanning-tree mst 0-2 priority 16384
    spanning-tree vlan 3110 priority 24576
    spanning-tree pseudo-information
      mst 0-1 designated priority 20480
      mst 2 designated priority 16384
      vlan 1-499,501,600-800 designated priority 20480
    spanning-tree mst configuration
      revision 1
      instance 1 vlan 2-499,600-800,3110
      instance 2 vlan 1,500-599
    5596's vPC configs
    N5596-DC-SW1
    vpc domain 3
      peer-switch
      role priority 100
      peer-keepalive destination 192.168.92.223 source 192.168.92.222
      auto-recovery
    N5596-DC-SW2
    vpc domain 3
      peer-switch
      role priority 200
      peer-keepalive destination 192.168.92.222 source 192.168.92.223
      auto-recovery
    Quick rundown of connections between devices:
    Nexus 4001's connect to Nexus 5596's for ethernet data via twinax cables in a four port vPC between both Nexus 5596's.
    Nexus 4001's connect to one Nexus 5596 a piece for FCoE two port LACP port channel. (hence the two instances, and vlan 1,500-599 in the same instance)
    Catalyst 3110X connects via one Fiber-Optic connection to the N5596-DC-SW2, eventually will have two in a port-channel
    Also keep in mind I corrected a priority conflict between the 3110X and Nexus 5596's earlier last month, which would explain all of the topology changes.
    I can provide any other information if it is useful. I am just confused!

    I identified the problem.
    Refer to
    http://www.cisco.com/en/US/docs/switches/datacenter/sw/4_2/nx-os/interfaces/configuration/guide/if_vPC.html
    for more information.
    The problem I encountered was self-inflicted.
    Using the spanning-tree pseudo-information command creates a psuedo priority setup that if implemented after the global spanning-tree commands sits alongside the spanning-tree priority and vlan definitions. This is intended to allow for non-vPC VLANs to have their own spanning-tree definitions separate of the spanning-tree environment for the vPC vlans. I am not sure the best way to describe it, but if you are not running a hybrid vPC setup (where you have vPC member VLANs and non-vPC VLANS with a separate link between the 5596's for the non-vPC VLANs) this setup would help you ensure you have a stable spanning-tree and prevent unnecessary blocking.
    When I enabled this command, I applied it to the vPC VLAN's as well, and that caused the Nexus 4001i's vPC links to constantly change port role, and update all of the edge ports subsequently. While I didn't see a performance impact to end hosts (not much traffic is on the Nexus DataCenter environment yet), I did get a torrent of logs as shown above.
    Once I removed the spanning-tree pseudo-information, the switches quieted down and spanning-tree stabilized on the Nexus 4001i's.
    I will revisit the configuration though for trunks not using vPC if it is needed.

  • How to replace Nexus5596 with dual-homing N2K

    What is the correct process to replace a FEX parent switch with dual-homing fex?
    Traffic should not be interrupted.        

    Hi
    Do you have VPC between Parent Switches & are you running VPC on dual homed FEX fabric ports. ?
    If yes Below is the procedure,
    1)  boot the replacement switch without VPC, peer-links & FEX ports connected to it.
    2)  Make sure it has same Software version matches with the peer switch.
    3)  enable Pre-Provisioning for slots with appropriate FEX model.
    , here find the guide:
    http://www.cisco.com/en/US/partner/docs/switches/datacenter/nexus5000/sw/system_management/521_n1_1/b_5k_System_Mgmt_Config_521N11_chapter_0100.html#task_05BB53AD7AFB49CF9A8E4A5C6C37CB38
    So, on the replacement switch you will pre-provision the Fabric Extender and configure the ports so it will be ready when you add the module to the RMA SW.
    Please make sure you put the appropriate FEX model on the provision slot, otherwise, when connected it will not come Online
    Example, FEX 110:
    N5K(config)# slot 110
    N5K(config-slot)#provision model N2K-C2248T
    4) Now  keep all ports at Shut down state Then Configure Entire switch that includes FEX host ports, FEX Fabric Ports & VPC peer-link, VPC Domain Configuration.
    keep FEX host ports in shut state.
    5)  keep VPC Role priority on existing switch lower than , new switch
    6) Connect Peer-link ports to Peer switch & wait till VPC Comes up-
    7) Then connect Fabric ports from FEX to the pre-configured ports on replacement switch
    After it comes online Unshut FEX host ports.
    I got similar steps here as well
    http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/operations/n5k_vpc_ops.html#wp425197
    NOTE: I followed same process however, few ping drops were seen....arnd ( 5- 6 ping loss) only on few hosts...
    Mazhar

  • Nexus 6004 EIGRP Relationship between the two switches

    Hi All,
    I will try to explain this as best as I can. In our current TEST LAB we have a Pair of Cisco ASA5585x running in Active/Passive mode. We use a VRF transit to connect the 10 GB interface to a Pair of Cisco Nexus 6004 (L3) switches running vPC between them. Downstream we also have a pair of Cisco 9372 switches (L2) also running vPC between the two.
    As of right now we have EIGRP neighbor relationship formed between the two N6K's and the ASA.
    ASA
    ciscoasa# sh eigrp neighbors
    EIGRP-IPv4 neighbors for process 100
    H Address Interface Hold Uptime SRTT RTO Q Seq
    (sec) (ms) Cnt Num
    1 172.16.230.9 Te0/8.451 12 01:30:25 1 200 0 52
    0 172.16.230.10 Te0/8.451 12 01:30:25 1 200 0 48
    The ASA formed relationship with both N6K's
    SWITCH1
    Nexus6-1# sh ip eigrp neighbors vrf inside
    IP-EIGRP neighbors for process 100 VRF Inside
    H Address Interface Hold Uptime SRTT RTO Q Seq
    (sec) (ms) Cnt Num
    0 172.16.8.3 Vlan680 11 01:28:28 1 50 0 45
    1 172.16.230.10 Vlan451 13 01:28:28 1 50 0 46
    2 172.16.230.11 Vlan451 10 01:28:00 4 50 0 13
    Nexus6-1#
    SWITCH2
    Nexus6-2# sh ip eigrp neighbors vrf Inside
    IP-EIGRP neighbors for process 100 VRF Inside
    H Address Interface Hold Uptime SRTT RTO Q Seq
    (sec) (ms) Cnt Num
    2 172.16.8.2 Vlan680 14 01:30:11 23 138 0 48
    0 172.16.230.9 Vlan451 13 01:30:11 480 2880 0 50
    1 172.16.230.11 Vlan451 13 01:29:48 1598 5000 0 13
    Nexus6-2#
    Both Nexus Switches formed EIGRP neighbors using the vPC Peer-Link. There is enough documentation out there that strongly suggest not to use vPC Peer-Links for EIGRP anything.
    We do have additional interfaces available on the 6K's that we can use as a cross connect for EIGRP. What we are having trouble understanding how we can force EIGRP traffic over those ports?
    Here is a complete Switch config:
    Switch1
    Nexus6-1# sh run
    feature telnet
    cfs eth distribute
    feature eigrp
    feature interface-vlan
    feature lacp
    feature vpc
    feature lldp
    vlan 1
    vlan 451
    name P2P_VRF_SVI
    vlan 652
    name Management
    vlan 680
    name Inside
    vrf context Inside
    vrf context management
    ip route 0.0.0.0/0 172.16.52.1
    vrf context peer-keepalive
    vpc domain 99
    role priority 1
    peer-keepalive destination 10.200.50.2 source 10.200.50.1 vrf peer-keepalive
    delay restore 120
    interface Vlan1
    interface Vlan451
    description Inside p2p to ASA
    no shutdown
    vrf member Inside
    ip address 172.16.230.9/29
    ip router eigrp 100
    no ip passive-interface eigrp 100
    interface Vlan651
    interface Vlan680
    description Inside Network
    no shutdown
    vrf member Inside
    ip address 172.16.8.2/22
    ip router eigrp 100
    interface port-channel99
    switchport mode trunk
    spanning-tree port type network
    vpc peer-link
    interface port-channel102
    switchport mode trunk
    vpc 102
    interface Ethernet1/1
    description vPC Peer Link 1.1
    switchport mode trunk
    speed auto
    channel-group 99
    interface Ethernet1/6
    interface Ethernet1/7
    description vPC Peer Link 1.7 to Nexus 9372 PRI
    switchport mode trunk
    speed auto
    channel-group 102 mode active
    interface Ethernet1/8
    interface Ethernet1/9
    interface Ethernet2/1
    description vPC Peer Link 2.1
    switchport mode trunk
    speed auto
    channel-group 99
    interface Ethernet2/2
    interface Ethernet2/7
    description vPC Peer Link 2.1 to Nexus SEC
    switchport mode trunk
    speed auto
    channel-group 102 mode active
    interface Ethernet2/8
    interface Ethernet8/1
    description keep-alive peer-link to ALNSWI02
    no switchport
    vrf member peer-keepalive
    ip address 10.200.50.1/30
    interface Ethernet8/2
    description Uplink to ASA
    switchport mode trunk
    interface Ethernet8/3
    interface mgmt0
    vrf member management
    ip address 172.16.52.3/23
    line console
    line vty
    boot kickstart bootflash:/n6000-uk9-kickstart.7.0.1.N1.1.bin
    boot system bootflash:/n6000-uk9.7.0.1.N1.1.bin
    router eigrp 100
    passive-interface default
    default-information originate
    vrf Inside
    autonomous-system 100
    default-information originate
    poap transit
    Nexus6-1#
    Nexus6-1# sh ip eigrp neighbors vrf inside
    IP-EIGRP neighbors for process 100 VRF Inside
    H Address Interface Hold Uptime SRTT RTO Q Seq
    (sec) (ms) Cnt Num
    0 172.16.8.3 Vlan680 11 01:28:28 1 50 0 45
    1 172.16.230.10 Vlan451 13 01:28:28 1 50 0 46
    2 172.16.230.11 Vlan451 10 01:28:00 4 50 0 13
    Nexus6-1#
    Nexus6-1# sh ip eigrp topology vrf Inside
    IP-EIGRP Topology Table for AS(100)/ID(172.16.8.2) VRF Inside
    Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply,
    r - reply Status, s - sia Status
    P 172.16.8.0/22, 1 successors, FD is 2816
    via Connected, Vlan680
    P 172.16.230.8/29, 1 successors, FD is 2816
    via Connected, Vlan451
    Nexus6-1# sh vpc
    Legend:
    (*) - local vPC is down, forwarding via vPC peer-link
    vPC domain id : 99
    Peer status : peer adjacency formed ok
    vPC keep-alive status : peer is alive
    Configuration consistency status : success
    Per-vlan consistency status : success
    Type-2 consistency status : success
    vPC role : primary
    Number of vPCs configured : 1
    Peer Gateway : Disabled
    Dual-active excluded VLANs : -
    Graceful Consistency Check : Enabled
    Auto-recovery status : Disabled
    vPC Peer-link status
    id Port Status Active vlans
    1 Po99 up 1,451,652,680
    vPC status
    id Port Status Consistency Reason Active vlans
    102 Po102 up success success 1,451,652,6
    80
    Nexus6-1# sh spanning-tree
    VLAN0001
    Spanning tree enabled protocol rstp
    Root ID Priority 32769
    Address 1005.caf5.88ff
    Cost 2
    Port 4197 (port-channel102)
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
    Address 8c60.4f2d.2ffc
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Interface Role Sts Cost Prio.Nbr Type
    Po99 Desg FWD 1 128.4194 (vPC peer-link) Network P2p
    Po102 Root FWD 1 128.4197 (vPC) P2p
    Eth8/2 Desg FWD 2 128.1026 P2p
    Eth8/3 Desg FWD 2 128.1027 P2p
    VLAN0451
    Spanning tree enabled protocol rstp
    Root ID Priority 33219
    Address 8c60.4f2d.2ffc
    This bridge is the root
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Bridge ID Priority 33219 (priority 32768 sys-id-ext 451)
    Address 8c60.4f2d.2ffc
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Interface Role Sts Cost Prio.Nbr Type
    Po99 Desg FWD 1 128.4194 (vPC peer-link) Network P2p
    Po102 Desg FWD 1 128.4197 (vPC) P2p
    Eth8/2 Desg FWD 2 128.1026 P2p
    VLAN0652
    Spanning tree enabled protocol rstp
    Root ID Priority 33420
    Address 1005.caf5.88ff
    Cost 2
    Port 4197 (port-channel102)
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Bridge ID Priority 33420 (priority 32768 sys-id-ext 652)
    Address 8c60.4f2d.2ffc
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Interface Role Sts Cost Prio.Nbr Type
    Po99 Desg FWD 1 128.4194 (vPC peer-link) Network P2p
    Po102 Root FWD 1 128.4197 (vPC) P2p
    Eth8/2 Desg FWD 2 128.1026 P2p
    VLAN0680
    Spanning tree enabled protocol rstp
    Root ID Priority 33448
    Address 1005.caf5.88ff
    Cost 2
    Port 4197 (port-channel102)
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Bridge ID Priority 33448 (priority 32768 sys-id-ext 680)
    Address 8c60.4f2d.2ffc
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Interface Role Sts Cost Prio.Nbr Type
    Po99 Desg FWD 1 128.4194 (vPC peer-link) Network P2p
    Po102 Root FWD 1 128.4197 (vPC) P2p
    Eth8/2 Desg FWD 2 128.1026 P2p
    Nexus6-1#
    Switch2
    Nexus6-2# sh run
    !Command: show running-config
    !Time: Sat Feb 12 19:02:44 2011
    version 7.0(1)N1(1)
    hostname Nexus6-2
    feature telnet
    cfs eth distribute
    feature eigrp
    feature interface-vlan
    feature lacp
    feature vpc
    feature lldp
    vlan 1
    vlan 451
    name P2P_VRF_SVI
    vlan 652
    name Management
    vlan 680
    name Inside
    vrf context Inside
    vrf context P2P_Inside_VRF
    vrf context management
    ip route 0.0.0.0/0 172.16.52.1
    vrf context peer-keepalive
    vpc domain 99
    role priority 2
    peer-keepalive destination 10.200.50.1 source 10.200.50.2 vrf peer-keepalive
    delay restore 120
    interface Vlan1
    interface Vlan451
    description Inside p2p to ASA
    no shutdown
    vrf member Inside
    ip address 172.16.230.10/29
    ip router eigrp 100
    no ip passive-interface eigrp 100
    interface Vlan680
    description Inside Network
    no shutdown
    vrf member Inside
    ip address 172.16.8.3/22
    ip router eigrp 100
    interface port-channel99
    switchport mode trunk
    spanning-tree port type network
    vpc peer-link
    interface port-channel102
    switchport mode trunk
    vpc 102
    interface Ethernet1/1
    description vPC Peer Link 1.1
    switchport mode trunk
    speed auto
    channel-group 99
    interface Ethernet1/2
    interface Ethernet1/6
    interface Ethernet1/7
    description vPC Link 1.7 to Nexus 9372 SEC
    switchport mode trunk
    speed auto
    channel-group 102 mode active
    interface Ethernet1/8
    interface Ethernet1/12
    interface Ethernet2/1
    description vPC Peer Link 2.1
    switchport mode trunk
    speed auto
    channel-group 99
    interface Ethernet2/2
    interface Ethernet2/6
    interface Ethernet2/7
    description vPC Link 2.1 to Nexus PRI
    switchport mode trunk
    speed auto
    channel-group 102 mode active
    interface Ethernet2/8
    interface Ethernet2/12
    interface Ethernet8/1
    description keep-alive peer-link to ALNSWI01
    no switchport
    vrf member peer-keepalive
    ip address 10.200.50.2/30
    interface Ethernet8/2
    description Uplink to ASA
    switchport mode trunk
    switchport trunk allowed vlan 1,451,652,680
    interface Ethernet8/3
    interface Ethernet8/20
    interface mgmt0
    vrf member management
    ip address 172.16.52.4/23
    line console
    line vty
    boot kickstart bootflash:/n6000-uk9-kickstart.7.0.1.N1.1.bin
    boot system bootflash:/n6000-uk9.7.0.1.N1.1.bin
    router eigrp 100
    vrf Inside
    autonomous-system 100
    default-information originate
    poap transit
    logging logfile messages 6
    Nexus6-2#
    Nexus6-2#
    Nexus6-2# sh ip eigrp neighbors vrf Inside
    IP-EIGRP neighbors for process 100 VRF Inside
    H Address Interface Hold Uptime SRTT RTO Q Seq
    (sec) (ms) Cnt Num
    2 172.16.8.2 Vlan680 14 01:30:11 23 138 0 48
    0 172.16.230.9 Vlan451 13 01:30:11 480 2880 0 50
    1 172.16.230.11 Vlan451 13 01:29:48 1598 5000 0 13
    Nexus6-2#
    Nexus6-2# sh ip eigrp topology vrf Inside
    IP-EIGRP Topology Table for AS(100)/ID(172.16.8.3) VRF Inside
    Codes: P - Passive, A - Active, U - Update, Q - Query, R - Reply,
    r - reply Status, s - sia Status
    P 172.16.8.0/22, 1 successors, FD is 2816
    via Connected, Vlan680
    P 172.16.230.8/29, 1 successors, FD is 2816
    via Connected, Vlan451
    Nexus6-2#
    Nexus6-2#
    Nexus6-2# sh vpc
    Legend:
    (*) - local vPC is down, forwarding via vPC peer-link
    vPC domain id : 99
    Peer status : peer adjacency formed ok
    vPC keep-alive status : peer is alive
    Configuration consistency status : success
    Per-vlan consistency status : success
    Type-2 consistency status : success
    vPC role : secondary
    Number of vPCs configured : 1
    Peer Gateway : Disabled
    Dual-active excluded VLANs : -
    Graceful Consistency Check : Enabled
    Auto-recovery status : Disabled
    vPC Peer-link status
    id Port Status Active vlans
    1 Po99 up 1,451,652,680
    vPC status
    id Port Status Consistency Reason Active vlans
    102 Po102 up success success 1,451,652,6
    80
    Nexus6-2#
    Nexus6-2#
    Nexus6-2# sh spanning-tree
    VLAN0001
    Spanning tree enabled protocol rstp
    Root ID Priority 32769
    Address 1005.caf5.88ff
    Cost 3
    Port 4194 (port-channel99)
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Bridge ID Priority 32769 (priority 32768 sys-id-ext 1)
    Address 8c60.4f2d.777c
    Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
    Interface Role Sts Cost Prio.Nbr Type
    Po99 Root FWD 1 128.4194 (vPC peer-link) Network P2p
    Po102 Root FWD 1 128.4197 (vPC) P2p
    Eth8/2 Desg FWD 2 128.1026 P2p
    Eth8/3 Desg FWD 2 128.1027 P2p
    VLAN0451
    Spanning tree enabled protocol rstp
    Root ID Priority 33219
    Address 8c

    Jon,
    Are you ready for the mass confusion?
    when Looking at the ASA EIGRP neighbors output here is what I see.
    ASA# sh eigrp neighbors
    EIGRP-IPv4 neighbors for process 100
    H   Address                 Interface       Hold Uptime   SRTT   RTO  Q  Seq
                                                (sec)         (ms)       Cnt Num
    3   172.16.230.1            Te0/8.450        13  16:45:14 1    200   0   64
    2   172.16.230.2            Te0/8.450        11  16:45:14 1    200   0   84
    1   172.16.230.10           Te0/8.451        11  16:45:20 1    200   0   178
    0   172.16.230.9            Te0/8.451        13  16:45:20 1    200   0   148
    For simplicity sake lets just concetrate on Interface TenGigabit0/8.451 which is the SVI on the Nexus switch that is VLAN451
    From the Nexus Switch 6004 that is directly connected to the ASA here is what I see
    SWI01# sh ip eigrp neighbors vrf Inside
    IP-EIGRP neighbors for process 100 VRF Inside
    H   Address                 Interface       Hold  Uptime  SRTT   RTO  Q  Seq
                                                (sec)         (ms)       Cnt Num
    0   172.16.8.3              Vlan680         10   17:04:30  54   324   0   177
    1   172.16.230.10           Vlan451         11   16:59:10  819  4914  0   178
    2   172.16.230.11           Vlan451         14   16:53:48  24   144   0   20
    The Inside VRF that is tied to both SVI's on the Switch vlans 451 and 680 is in EIGRP 100 on the switch
    SWI01# sh run int vlan 451
    interface Vlan451
      description Inside p2p to ASA
      no shutdown
      vrf member Inside
      ip address 172.16.230.9/29
      ip router eigrp 100
      no ip passive-interface eigrp 100
    SWI01# sh run int vlan 680
    interface Vlan680
      description Inside Network
      no shutdown
      vrf member Inside
      ip address 172.16.8.2/22
      ip router eigrp 100
      hsrp 1
        authentication text test
        preempt
        priority 250
        ip 172.16.8.1
    so you with me so far?
    If you are you have noticed that on the ASA neighbors the ASA sees 172.16.230.11 as a neighbor which is the Secondary Nexus SW. That is becauise they all share the same subnet.
    172.16.230.8/29
    Brakedown:
    PRI Nexus 6004 - 172.16.230.9
    SEC NEXUS 6004 - 172.16.230.10
    PRI ASA 5585x  - 172.16.230.11
    SEC ASA 5585x  - 172.16.230.12
    Because the ASA EIGRP network is a /29 it learns the Secondary Nexus via the Primary Nexus.
    I am not sure that the link we created between the two Nexus Switches is doing anything but consuming ports right now.
    SWI01# sh run int ethernet 8/9
    interface Ethernet8/9
      description EIGRP PORT to Secondary Nexus
      switchport mode trunk
      switchport trunk allowed vlan 450-451
    SWI02# sh run int ethernet 8/9
    interface Ethernet8/9
      description EIGRP PORT to Primary Nexus
      switchport mode trunk
      switchport trunk allowed vlan 450-451
    So the SVI's that go up to the ASA for inspection are 450 and 451. The network SVI's are 600 and 680 all of them live on the switch, and 680, and 600 are extended over the peer links down to the 9372's.
    I think that we are breaking the golden rule of vPC BUT.. I am not 100% sure. Some of the documents read that we should not be allowing network vlans over peer links, but then how do you extend the vlans down to the leaf switch?
    This is giving me nightmares at the moment…
    does this make sense? 

  • MST / vPC / peer-switch

    Hello,
    There are two N7Ks connected with peer-link (Po1). There will be some other L2 switches connected to those N7Ks with vPC. Also, there is a separate, dedicated L2 link (Po9) between N7Ks to carry VLANs for orphan ports connected on both N7Ks. Here is configuration:
    N7K-1:
    spanning-tree mst configuration
    name test
    revision 3
    instance 1 vlan 1-9,12-14,16-1005
    instance 2 vlan 10,11,15
    spanning-tree mode mst
    spanning-tree mst 0-2 priority 4096
    spanning-tree pseudo-information
    mst 0-2 designated priority 4096
    mst 0-2 root priority 4096
    vpc domain 1
    peer-keepalive destination 1.1.1.2 source 1.1.1.1 vrf peer-keepalive
    system-priority 1000
    role priority 1
    auto-recovery reload-delay 240
    peer-gateway
    peer-switch
    graceful consistency-check
    ip arp synchronize
    delay restore 30
    delay restore interface-vlan 40
    interface port-channel 1
    vpc peer-link
    switchport trunk allowed vlan remove 10,11,15
    interface port-channel 9
    switchport trunk allowed vlan 10,11,15
    spanning-tree mst 2 cost 100
    N7K-2:
    spanning-tree mst configuration
    name test
    revision 3
    instance 1 vlan 1-9,12-14,16-1005
    instance 2 vlan 10,11,15
    spanning-tree mode mst
    spanning-tree mst 0-2 priority 4096
    spanning-tree pseudo-information
    mst 0-2 designated priority 8192
    mst 0-2 root priority 8192
    vpc domain 1
    peer-keepalive destination 1.1.1.1 source 1.1.1.2 vrf peer-keepalive
    system-priority 1000
    role priority 1
    auto-recovery reload-delay 240
    peer-gateway
    peer-switch
    graceful consistency-check
    ip arp synchronize
    delay restore 30
    delay restore interface-vlan 40
    interface port-channel 1
    vpc peer-link
    switchport trunk allowed vlan remove 10,11,15
    interface port-channel 9
    switchport trunk allowed vlan 10,11,15
    spanning-tree mst 2 cost 100
    In theory, for vPC VLANs, that is those carried over peer-link, global STP configuration should be used. And, because peer-switch is used, both N7Ks will generate the same BPDU (the same Bridge ID with priority 4096), both becomming root. And, for other VLANs, carried over dedicated L2 link, the pseudo-information should be used. That is, N7K-1 should become root, and Po9 should be Designated. The N7K-2 should be backup root and Po9 should be Root port.
    Unfortunately, it's not how it works. Maybe I am missing something, but BPDUs sent over dedicated L2 Po9 are exactly the same as for VPC VLANs. N7K-1 becomes root and its Po9 becomes Designated. But, N7K-2 is also a root, and since it sees the same BPDU as it generates by itself, it treats Po9 as an alternate way to itself and places that port in Alternate/Blocking state.
    So, am I doing something wrong, or dedicated L2 link cannot co-exist with peer-link? I had no chance to test it, but it may work if I remove peer-switch feature (although it is recommended to have it)
    Best regards,
    Krzysztof

    We have filed
    CSCuc41076
    vPC Peer Switch Hybrid Topology MST blocking in non vPC Peer Link

  • Nexus 7000 - unexpected shutdown of vPC-Ports during reload of the primary vPC Switch

    Dear Community,
    We experienced an unusual behavior of two Nexus 7000 switches within a vPC domain.
    According to the attached sketch, we have four N7Ks in two data centers - two Nexus 7Ks are in a vPC domain for each data center.
    Both data centers are connected via a Multilayer-vPC.
    We had to reload one of these switches and I expected the other N7K in this vPC domain to continue forwarding over its vPC-Member-ports.
    Actually, all vPC ports have been disabled on the secondary switch until the reload of the first N7K (vPC-Role: primary) finished.
    Logging on Switch B:
    20:11:51 <Switch B> %VPC-2-VPC_SUSP_ALL_VPC: Peer-link going down, suspending all vPCs on secondary
    20:12:01 <Switch B> %VPC-2-PEER_KEEP_ALIVE_RECV_FAIL: In domain 1, VPC peer keep-alive receive has failed
    In case of a Peer-link failure, I would expect this behavior if the other switch is still reachable via the Peer-Keepalive-Link (via the Mgmt-Port), but since we reloaded the whole switch, the vPCs should continue forwarding. 
    Could this be a bug or are there any timers to be tuned?
    All N7K switches are running on NX-OS 6.2(8)
    Switch A:
    vpc domain 1
      peer-switch
      role priority 2048
      system-priority 1024
      peer-keepalive destination <Mgmt-IP-Switch-B>
      delay restore 360
      peer-gateway
      auto-recovery reload-delay 360
      ip arp synchronize
    interface port-channel1
      switchport mode trunk
      switchport trunk allowed vlan <x-y>
      spanning-tree port type network
      vpc peer-link
    Switch B:
    vpc domain 1
      peer-switch
      role priority 1024
      system-priority 1024
      peer-keepalive destination <Mgmt-IP-Switch-A>
      delay restore 360
      peer-gateway
      auto-recovery reload-delay 360
      ip arp synchronize
    interface port-channel1
      switchport mode trunk
      switchport trunk allowed vlan <x-y>
      spanning-tree port type network
      vpc peer-link
    Best regards

    Problem solved:
    During the reload of the Nexus 7K, the linecards were powerd off a short time earlier than the Mgmt-Interface. As a result of this behavior, the secondary Nexus 7K received at least one vPC-Peer-Keepalive Message while its peer-link was already powerd off. To avoid a split brain scenario, the VPC-member-ports have been shut down.
    Now we are using dedicated interfaces on the linecards for the VPC-Peer-Keepalive-Link and a reload of one N7K won't result in a total network outage any more.

  • VPC on Nexus 5000 with Catalyst 6500 (no VSS)

    Hi, I'm pretty new on the Nexus and UCS world so I have some many questions I hope you can help on getting some answers.
    The diagram below is the configuration we are looking to deploy, that way because we do not have VSS on the 6500 switches so we can not create only one  Etherchannel to the 6500s.
    Our blades inserted on the UCS chassis  have INTEL dual port cards, so they do not support full failover.
    Questions I have are.
    - Is this my best deployment choice?
    - vPC highly depend on the management interface on the Nexus 5000 for the keep alive peer monitoring, so what is going to happen if the vPC brakes due to:
         - one of the 6500 goes down
              - STP?
              - What is going to happend with the Etherchannels on the remaining  6500?
         - the Management interface goes down for any other reason
              - which one is going to be the primary NEXUS?
    Below is the list of devices involved and the configuration for the Nexus 5000 and 65000.
    Any help is appreciated.
    Devices
    ·         2  Cisco Catalyst with two WS-SUP720-3B each (no VSS)
    ·         2 Cisco Nexus 5010
    ·         2 Cisco UCS 6120xp
    ·         2 UCS Chassis
         -    4  Cisco  B200-M1 blades (2 each chassis)
              - Dual 10Gb Intel card (1 per blade)
    vPC Configuration on Nexus 5000
    TACSWN01
    TACSWN02
    feature vpc
    vpc domain 5
    reload restore
    reload restore   delay 300
    Peer-keepalive   destination 10.11.3.10
    role priority 10
    !--- Enables vPC, define vPC domain and peer   for keep alive
    int ethernet 1/9-10
    channel-group 50   mode active
    !--- Put Interfaces on Po50
    int port-channel 50
    switchport mode   trunk
    spanning-tree port   type network
    vpc peer-link
    !--- Po50 configured as Peer-Link for vPC
    inter ethernet 1/17-18
    description   UCS6120-A
    switchport mode   trunk
    channel-group 51   mode active
    !--- Associates interfaces to Po51 connected   to UCS6120xp-A  
    int port-channel 51
    swithport mode   trunk
    vpc 51
    spannig-tree port   type edge trunk
    !--- Associates vPC 51 to Po51
    inter ethernet 1/19-20
    description   UCS6120-B
    switchport mode   trunk
    channel-group 52   mode active
    !--- Associates interfaces to Po51 connected   to UCS6120xp-B  
    int port-channel 52
    swithport mode   trunk
    vpc 52
    spannig-tree port   type edge trunk
    !--- Associates vPC 52 to Po52
    !----- CONFIGURATION for Connection to   Catalyst 6506
    Int ethernet 1/1-3
    description   Cat6506-01
    switchport mode   trunk
    channel-group 61   mode active
    !--- Associate interfaces to Po61 connected   to Cat6506-01
    Int port-channel 61
    switchport mode   trunk
    vpc 61
    !--- Associates vPC 61 to Po61
    Int ethernet 1/4-6
    description   Cat6506-02
    switchport mode   trunk
    channel-group 62   mode active
    !--- Associate interfaces to Po62 connected   to Cat6506-02
    Int port-channel 62
    switchport mode   trunk
    vpc 62
    !--- Associates vPC 62 to Po62
    feature vpc
    vpc domain 5
    reload restore
    reload restore   delay 300
    Peer-keepalive   destination 10.11.3.9
    role priority 20
    !--- Enables vPC, define vPC domain and peer   for keep alive
    int ethernet 1/9-10
    channel-group 50   mode active
    !--- Put Interfaces on Po50
    int port-channel 50
    switchport mode   trunk
    spanning-tree port   type network
    vpc peer-link
    !--- Po50 configured as Peer-Link for vPC
    inter ethernet 1/17-18
    description   UCS6120-A
    switchport mode   trunk
    channel-group 51   mode active
    !--- Associates interfaces to Po51 connected   to UCS6120xp-A  
    int port-channel 51
    swithport mode   trunk
    vpc 51
    spannig-tree port   type edge trunk
    !--- Associates vPC 51 to Po51
    inter ethernet 1/19-20
    description   UCS6120-B
    switchport mode   trunk
    channel-group 52   mode active
    !--- Associates interfaces to Po51 connected   to UCS6120xp-B  
    int port-channel 52
    swithport mode   trunk
    vpc 52
    spannig-tree port   type edge trunk
    !--- Associates vPC 52 to Po52
    !----- CONFIGURATION for Connection to   Catalyst 6506
    Int ethernet 1/1-3
    description   Cat6506-01
    switchport mode   trunk
    channel-group 61   mode active
    !--- Associate interfaces to Po61 connected   to Cat6506-01
    Int port-channel 61
    switchport mode   trunk
    vpc 61
    !--- Associates vPC 61 to Po61
    Int ethernet 1/4-6
    description   Cat6506-02
    switchport mode   trunk
    channel-group 62   mode active
    !--- Associate interfaces to Po62 connected   to Cat6506-02
    Int port-channel 62
    switchport mode   trunk
    vpc 62
    !--- Associates vPC 62 to Po62
    vPC Verification
    show vpc consistency-parameters
    !--- show compatibility parameters
    Show feature
    !--- Use it to verify that vpc and lacp features are enabled.
    show vpc brief
    !--- Displays information about vPC Domain
    Etherchannel configuration on TAC 6500s
    TACSWC01
    TACSWC02
    interface range GigabitEthernet2/38 - 43
    description   TACSWN01 (Po61 vPC61)
    switchport
    switchport trunk   encapsulation dot1q
    switchport mode   trunk
    no ip address
    channel-group 61   mode active
    interface range GigabitEthernet2/38 - 43
    description   TACSWN02 (Po62 vPC62)
    switchport
    switchport trunk   encapsulation dot1q
    switchport mode   trunk
    no ip address
    channel-group 62   mode active

    ihernandez81,
    Between the c1-r1 & c1-r2 there are no L2 links, ditto with d6-s1 & d6-s2.  We did have a routed link just to allow orphan traffic.
    All the c1r1 & c1-r2 HSRP communications ( we use GLBP as well ) go from c1-r1 to c1-r2 via the hosp-n5k-s1 & hosp-n5k-s2.  Port channels 203 & 204 carry the exact same vlans.
    The same is the case on the d6-s1 & d6-s2 sides except we converted them to a VSS cluster so we only have po203 with  4 *10 Gb links going to the 5Ks ( 2 from each VSS member to each 5K).
    As you can tell what we were doing was extending VM vlans between 2 data centers prior to arrivals of 7010s and UCS chassis - which  worked quite well.
    If you got on any 5K you would see 2 port channels - 203 & 204  - going to each 6500, again when one pair went to VSS po204 went away.
    I know, I know they are not the same things .... but if you view the 5Ks like a 3750 stack .... how would you hook up a 3750 stack from 2 6500s and if you did why would you run an L2 link between the 6500s ?
    For us using 4 10G ports between 6509s took ports that were too expensive - we had 6704s - so use the 5Ks.
    Our blocking link was on one of the links between site1 & site2.  If we did not have wan connectivty there would have been no blocking or loops.
    Caution .... if you go with 7Ks beware of the inability to do L2/L3 via VPCs.
    better ?
    one of the nice things about working with some of this stuff is as long as you maintain l2 connectivity if you are migrating things they tend to work, unless they really break

  • N7K Peer-switch Konfiguration

    Hi I have a question regarding peer-switch konfiguration on a vPC/vPC+ pair of N7K with vPC and non vPC attached switches
    If I understood correctly with following configuration
    for vPC attached switches (assuming the have default STP-prio) the vPC-bundle acts as one Switch with the priority of 4096
    for STP non-VPC attached switches for VLAN1-1960 the N7K-A is the root-bridge and for VLAN 1961-3920 the N7K-B is the root-bridge,
    N7K-A
    vpc domain 20
      peer-switch
      role priority 1
    spanning-tree pseudo-information
    vlan 1-3920 root priority 4096                 
      vlan 1-1960 designated priority 4096
      vlan 1961-3920 designated priority 8192
    N7K-B
    vpc domain 20
    peer-switch
    role priority 2
    spanning-tree pseudo-information
      vlan 1-3920 root priority 4096
      vlan 1-1960 designated priority 8192
      vlan 1961-3920 designated priority 4096
    Is that coorect so far ?
    If yes then I have one outstandig question.
    Do we need the global configuration for spanning-tree priority in this case?
    spanning-tree vlan 1-3920 priority 4096
    as we configure it in a pure vPC environment
    N7K-A
    spanning-tree vlan 1-3920 priority 4096
    vpc domain 20
    peer-switch
    role priority 1
    N7K-B
    spanning-tree vlan 1-3920 priority 4096
    vpc domain 20
    peer-switch
    role priority 2
    Thanks
    Hubert

    Here is a description of the use of the Spanning-tree Pseudo-information and the Peer switch command on the Nexus 7000. Maybe this will help clarify some misunderstanding:
    SETUP:
    7K1 and 7K2 are vPC peers and have a higher priority      than 7K3. So 7K1 and 7K2s ports to 7K3 will all be DESIGNATED.
    7K3 is connected to both 7K1 and 7K2 using individual      STP links.
    7K4 is connected to both 7K1 and 7K2 in a vPC.
    Common Points for all Scenarios:
    If vPC fails for whatever reason; all links will revert      to regular spanning-tree.
    The root priority on 7K1 and 7K2 will be the vPC System-MAC (same on both) and the Designated priority will use the respective non-vPC System-MACs of 7k1 and 7K2
    Even if the STP Priority is configured globally and lower, the Pseudo Root Priority and Designated Priorities are still used for STP calculations.
    The STP Pseudo-information HACK:
    Allows you to set a different root priority and different designated priority. To satisfy the requirement for the Peer switch command and still be able to perform VLAN load balancing for non-vPC dual connected links.
    Root Priority: Used in Root Bridge Election
    Designated Priority: Used in Designated Bridge Election
    SCENARIO 1: Same STP Priority configured Globally with the Peer switch Enabled (Individual STP links)
    The Root priority and Designated priority on 7K1 and 7K2 will be the same as the globally configured or default STP priority
    One of the links to 7K1 and 7K2 becomes the "Root Port" and the other becomes "ALTN BLK"
    Since they have the same Root Priority and the same vPC system MAC, the lower port will be selected as the root port.
    SCENARIO 2: BOTH STP Pseudo-information Root and Designated Priorities Configured with Peer Switch Enabled (Individual STP links)
    The Root priority may be different from the Designated Priority based on the STP Pseudo-information configuration.
    VLAN traffic from 7K3 is load balanced between 7K1 and 7K2 based on the configured Pseudo-Designated Priority. So the Root port for a VLAN from 7K3 will be to the device with a lower Pseudo-Designated priority.
    SCENARIO 3: ONLY STP Pseudo-information Root Priority Configured with Peer Switch Enabled (Individual STP links)
    The Root priority and Designated Priority are the same as the Pseudo Root Priority.
    No VLAN load balancing occurs
    The Root port is the link to the vPC primary switch. The Link to the vPC Secondary is “ALTN BLK”.
    SCENARIO 4: ONLY STP Pseudo-information Designated Priority Configured with Peer Switch Enabled (Individual STP links)
    The Root priority will be the Globally configured or default STP Priority
    The Designated priority will still be the Pseudo-Designated priority
    VLAN load balancing will still occur.
    SCENARIO 5: Same STP Priority configured Globally with the Peer switch Enabled (vPC links on 7K4)
    The Root priority and Designated priority on 7K1 and 7K2 will be the same as the globally configured or default STP priority.
    If the vPC Peer-link fails, the interface going to the secondary vPC device (7K2) will be shut DOWN.
    SCENARIO 6: BOTH STP Pseudo-information Root and Designated Priorities Configured with Peer Switch Enabled (vPC links on 7K4)
    The Root priority and Designated Priority are the same as the configured Pseudo-Root Priority.
    If the vPC Peer-link fails, the interface going to the secondary vPC device (7K2) will be shut DOWN.
    SCENARIO 7: ONLY STP Pseudo-information Root Priority Configured with Peer Switch Enabled (vPC links on 7K4)
    The Root priority and Designated Priority are the same as the configured Pseudo-Root Priority.
    If the vPC Peer-link fails, the interface going to the secondary vPC device (7K2) will be shut DOWN.
    SCENARIO 8: ONLY STP Pseudo-information Designated Priority Configured with Peer Switch Enabled (vPC links on 7K4)
    The Root priority and Designated priority on 7K1 and 7K2 will be the same as the globally configured or default STP priority.
    If the vPC Peer-link fails, the interface going to the secondary vPC device (7K2) will be shut DOWN

  • VPC + SVI problem

    Hello,
    We have the topology in Attachement. and we have problem with SVI and VPC
    The configuration:
    N5K1:
    vpc domain 100
      peer-switch
      role priority 100
      system-priority 1024
      peer-keepalive destination 192.168.21.1
      peer-config-check-bypass
      delay restore 150
      peer-gateway
      auto-recovery
      ip arp synchronize
    vlan 801
      name DEV_WAN
    interface Vlan801
      description IP DEV
      no shutdown
      no ip redirects
    interface Vlan1000
      no shutdown
      no ip redirects
      ip address 192.168.22.5/30
    interface port-channel1000
      switchport mode trunk
      spanning-tree port type network
      spanning-tree guard loop
      vpc peer-link
    interface port-channel401
      description LACP-SRV1
      switchport mode trunk
      speed 1000
      duplex full
      vpc 401
    interface Ethernet1/1
      description "TRUNK VPC"
      no cdp enable
      switchport mode trunk
      spanning-tree port type network
      spanning-tree bpdufilter enable
      channel-group 1000 mode active
    interface Ethernet1/2
      description "TRUNK VPC"
      switchport mode trunk
      spanning-tree port type network
      channel-group 1000 mode active
    interface Ethernet1/5
      description SRV1_GB2
      switchport mode trunk
      speed 1000
      duplex full
      channel-group 401 mode active
    interface Ethernet1/29
      description Uplink N5K3
      switchport mode trunk
    N5K2:
    vpc domain 100
      peer-switch
      role priority 110
      system-priority 1024
      peer-keepalive destination 192.168.21.2
      peer-config-check-bypass
      delay restore 150
      peer-gateway
      auto-recovery
      ip arp synchronize
    vlan 801
      name DEV_WAN
    interface Vlan801
      no shutdown
      ip address 202.168.72.1/29
    interface Vlan1000
      description VPC-N5K
      no shutdown
      no ip redirects
      ip address 192.168.22.6/30
    interface port-channel1000
      switchport mode trunk
      spanning-tree port type network
      spanning-tree guard loop
      vpc peer-link
    interface port-channel401
      description LACP-SRV1
      switchport mode trunk
      speed 1000
      duplex full
      vpc 401
    interface Ethernet1/1
      description "TRUNK VPC"
      switchport mode trunk
      spanning-tree port type network
      channel-group 1000 mode active
    interface Ethernet1/2
      description "TRUNK VPC"
      switchport mode trunk
      spanning-tree port type network
      channel-group 1000 mode active
    interface Ethernet1/5
      description SRV1_GB4
      switchport mode trunk
      speed 1000
      duplex full
      channel-group 401 mode active
    SRV1 IP: 202.168.72.2/29
    When i plug the cable from SRV1 to N5K1 and N5K2 i can't ping SRV1 from ADM
    when i unplug the cable from SRV1 to N5K2 i can't ping SRV1 from ADM
    when i unplug the cable from SRV1 to N5K1 i CAN ping SRV1 from ADM
    between N5K1, N5K2 and N5K3 we have OSPF
    Thks !

    n5k01# sh vpc brief
    Legend:
                    (*) - local vPC is down, forwarding via vPC peer-link
    vPC domain id                     : 100
    Peer status                       : peer adjacency formed ok
    vPC keep-alive status             : peer is alive
    Configuration consistency status  : success
    Per-vlan consistency status       : success
    Type-2 consistency status         : success
    vPC role                          : primary
    Number of vPCs configured         : 8
    Peer Gateway                      : Enabled
    Peer gateway excluded VLANs     : -
    Dual-active excluded VLANs        : -
    Graceful Consistency Check        : Enabled
    Auto-recovery status              : Enabled (timeout = 240 seconds)
    vPC Peer-link status
    id   Port   Status Active vlans
    1    Po1000 up     1-3,101-102,110,700-703,705,710,730,801,803,1000,3
                       001-3008,3400-3401
    vPC status
    id     Port        Status Consistency Reason                     Active vlans
    1      Po1         up     success     success                    1-3,101-102
                                                                     ,110,700-70
                                                                     3,705,710,7
                                                                     30,801,803,
                                                                     1000,300....
    401    Po401       down*  success     success                    -
    (The cable is unplug)
    n5K02# sh vpc brief
    Legend:
                    (*) - local vPC is down, forwarding via vPC peer-link
    vPC domain id                     : 100
    Peer status                       : peer adjacency formed ok
    vPC keep-alive status             : peer is alive
    Configuration consistency status  : success
    Per-vlan consistency status       : success
    Type-2 consistency status         : success
    vPC role                          : secondary
    Number of vPCs configured         : 8
    Peer Gateway                      : Enabled
    Peer gateway excluded VLANs     : -
    Dual-active excluded VLANs        : -
    Graceful Consistency Check        : Enabled
    Auto-recovery status              : Enabled (timeout = 240 seconds)
    vPC Peer-link status
    id   Port   Status Active vlans
    1    Po1000 up     1-3,101-102,110,700-703,705,710,730,801,803,1000,3
                       001-3008,3400-3401
    vPC status
    id     Port        Status Consistency Reason                     Active vlans
    1      Po1         up     success     success                    1-3,101-102
                                                                     ,110,700-70
                                                                     3,705,710,7
                                                                     30,801,803,
                                                                     1000,300....
    401    Po401       up     success     success                    1-3,101-102
                                                                     ,110,700-70
                                                                     3,705,710,7
                                                                     30,801,803,
                                                                     1000,300....

  • VPC N5k Switch Failure causes connectivity disruption

    Hello,
    I have configured enhanced vPC on 2 n5k and B22 FEXs (vPC from 5k to B22, and vPC from B22 to blade servers).
    Everything is running smoothly, except when I power off one of the 5k, the connectivity to the blade servers is lost, comes back up for a short while, loses connectivity again, and after a few minutes comes back up for good.
    From the logs I can see that all the port-channels (peer-link, to the FEXs and port-channels to other switches in network) get in down state, then fizical interfaces start coming backup in fabric mode, then port-channels, see FEXs starting to get online then all the port-channels go down again and then whole thing starts again.(all of this is hapenig with one of the 5k powerd off, same thing hapens with promary and secondary vpc).
    Connectivity is lost in the same way when the 5k is started again, but just once.
    I am running NX OS version 5.2.1N1.3.
    I have no idea what could cause this behavior.
    Any help would be appreciated.
    Regards,
    Bogdan

    Hi Reza,
    Below you can find my run-config.
    version 5.2(1)N1(3)
    feature fcoe
    install feature-set virtualization
    feature-set virtualization
    logging level feature-mgr 0
    hostname N5k_1
    feature npiv
    feature telnet
    cfs eth distribute
    feature udld
    feature interface-vlan
    feature lacp
    feature vpc
    feature lldp
    feature vtp
    feature fex
    fex 107
      pinning max-links 1
      description "FEX0107"
      fcoe
    fex 108
      pinning max-links 1
      description "FEX0108"
    slot 1
      port 31-32 type fc
    vpc domain 1
      role priority 1000
      peer-keepalive destination 1.1.1.2
      auto-recovery
    vsan database
      vsan 50 name "VSAN_A"
    fcdomain fcid database
    interface port-channel100
      description Po Synch N5k
      switchport mode trunk
      spanning-tree port type network
      logging event port link-status
      logging event port trunk-status
      speed 10000
      vpc peer-link
    interface port-channel107
      switchport mode fex-fabric
      fex associate 107
      vpc 107
    interface port-channel108
      switchport mode fex-fabric
      fex associate 108
      vpc 108
    interface port-channel111
      switchport mode trunk
    interface vfc111
      bind interface Ethernet107/1/1
      no shutdown
    vsan database
      vsan 50 interface vfc111
      vsan 50 interface fc1/31
      vsan 50 interface fc1/32
    interface fc1/31
      no shutdown
    interface fc1/32
      no shutdown
    interface Ethernet1/1
      description Synch N5k
      switchport mode trunk
      logging event port link-status
      logging event port trunk-status
      udld aggressive
      channel-group 100 mode active
    interface Ethernet1/2
      description Synch N5k
      switchport mode trunk
      logging event port link-status
      logging event port trunk-status
      udld aggressive
      channel-group 100 mode active
    interface Ethernet1/3
      description Synch N5k
      switchport mode trunk
      logging event port link-status
      logging event port trunk-status
      udld aggressive
      channel-group 100 mode active
    interface Ethernet1/4
      description Synch N5k
      switchport mode trunk
      logging event port link-status
      logging event port trunk-status
      udld aggressive
      channel-group 100 mode active
    interface Ethernet1/5
      switchport mode fex-fabric
      fex associate 107
      channel-group 107
    interface Ethernet1/6
      switchport mode fex-fabric
      fex associate 107
      channel-group 107
    interface Ethernet1/7
      switchport mode fex-fabric
      fex associate 108
      channel-group 108
    interface Ethernet1/8
      switchport mode fex-fabric
      fex associate 108
      channel-group 108
    interface Ethernet107/1/1
      switchport mode trunk
      channel-group 111 mode active
    interface Ethernet108/1/1
      switchport mode trunk
      channel-group 111 mode active
    version 5.2(1)N1(3)
    feature fcoe
    install feature-set virtualization
    feature-set virtualization
    logging level feature-mgr 0
    hostname N5k_2
    feature npiv
    feature telnet
    cfs eth distribute
    feature udld
    feature interface-vlan
    feature lacp
    feature vpc
    feature lldp
    feature vtp
    feature fex
    fex 107
      pinning max-links 1
      description "FEX0107"
    fex 108
      pinning max-links 1
      description "FEX0108"
      fcoe
    slot 1
      port 31-32 type fc
    vpc domain 1
      role priority 1000
      peer-keepalive destination 1.1.1.1
      auto-recovery
    vsan database
      vsan 51 name "VSAN_B"
    fcdomain fcid database
    interface port-channel100
      description Po Synch N5k
      switchport mode trunk
      spanning-tree port type network
      logging event port link-status
      logging event port trunk-status
      speed 10000
      vpc peer-link
    interface port-channel107
      switchport mode fex-fabric
      fex associate 107
      vpc 107
    interface port-channel108
      switchport mode fex-fabric
      fex associate 108
      vpc 108
    interface port-channel111
      switchport mode trunk
    interface vfc111
      bind interface Ethernet108/1/1
      no shutdown
    vsan database
      vsan 51 interface vfc111
      vsan 51 interface fc1/31
      vsan 51 interface fc1/32
    interface fc1/31
      no shutdown
    interface fc1/32
      no shutdown
    interface Ethernet1/1
      description Synch N5k
      switchport mode trunk
      logging event port link-status
      logging event port trunk-status
      udld aggressive
      channel-group 100 mode active
    interface Ethernet1/2
      description Synch N5k
      switchport mode trunk
      logging event port link-status
      logging event port trunk-status
      udld aggressive
      channel-group 100 mode active
    interface Ethernet1/3
      description Synch N5k
      switchport mode trunk
      logging event port link-status
      logging event port trunk-status
      udld aggressive
      channel-group 100 mode active
    interface Ethernet1/4
      description Synch N5k
      switchport mode trunk
      logging event port link-status
      logging event port trunk-status
      udld aggressive
      channel-group 100 mode active
    interface Ethernet1/5
      switchport mode fex-fabric
      fex associate 107
      channel-group 107
    interface Ethernet1/6
      switchport mode fex-fabric
      fex associate 107
      channel-group 107
    interface Ethernet1/7
      switchport mode fex-fabric
      fex associate 108
      channel-group 108
    interface Ethernet1/8
      switchport mode fex-fabric
      fex associate 108
      channel-group 108
    interface Ethernet107/1/1
      switchport mode trunk
      channel-group 111 mode active
    interface Ethernet108/1/1
      switchport mode trunk
      channel-group 111 mode active

  • VPC failover

    We have 2 nexus 5548UP running Layer 2.  I have setup vPC between both nexus switches and have a few questions on how vPC failover works.  Below is partial snippets of what I have configured for vPC,etc. During testing, I reload nx-1 and what I am seeing is that the vPC peer-link goes down as expected but all vpc port-channels are in a failed state on nx-2 until nx-1 is back online once vPC is formed and functioning everything looks good. I then reload nx-2 and the vPC port-channels go into fail state, etc. Am I missing something in my configuration?
    NX-1
    feature tacacs+
    feature udld
    feature lacp
    feature vpc
    feature fex
    feature vtp
    cfs eth distribute
    no ip domain-lookup
    vtp mode transparent
    vpc domain 300
    role priority 200
    peer-keepalive destination 10.100.5.12 source 10.100.5.11
    int po12
    description NETAPPA
    switchport mode trunk
    vpc 12
    switchport trunk allowed vlan 5,6,7,8
    spanning-tree port type edge trunk
    int po13
    description NETAPPB
    switchport mode trunk
    vpc 13
    switchport trunk allowed vlan 5,6,7,8
    spanning-tree port type edge trunk
    int po250
    description nx-2
    switchport mode trunk
    vpc peer-link
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    spanning-tree port type network
    int e1/27
    description vpc peer link
    switchport mode trunk
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    channel-group 250 mode active
    int e1/28
    description vpc peer link
    switchport mode trunk
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    channel-group 250 mode active
    int e1/1
    description netappa:e1a
    switchport mode trunk
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    channel-group 12 mode active
    int e1/2
    description netappb:e1a
    switchport mode trunk
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    channel-group 13 mode active
    NX-2
    feature tacacs+
    feature udld
    feature lacp
    feature vpc
    feature fex
    feature vtp
    cfs eth distribute
    no ip domain-lookup
    vtp mode transparent
    vpc domain 300
    role priority 300
    peer-keepalive destination 10.100.5.11 source 10.100.5.12
    int po12
    description NETAPPA
    switchport mode trunk
    vpc 12
    switchport trunk allowed vlan 5,6,7,8
    spanning-tree port type edge trunk
    int po13
    description NETAPPB
    switchport mode trunk
    vpc 13
    switchport trunk allowed vlan 5,6,7,8
    spanning-tree port type edge trunk
    int po250
    description nx-1
    switchport mode trunk
    vpc peer-link
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    spanning-tree port type network
    int e1/27
    description vpc peer link
    switchport mode trunk
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    channel-group 250 mode active
    int e1/28
    description vpc peer link
    switchport mode trunk
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    channel-group 250 mode active
    int e1/1
    description netappa:e1b
    switchport mode trunk
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    channel-group 12 mode active
    int e1/2
    description netappb:e1b
    switchport mode trunk
    switchport trunk native vlan 999
    switchport trunk allowed vlan 5,6,7,8
    channel-group 13 mode active

    What Nexus OS are you running.. You could be seeing this bug
    http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId=CSCtw76636

  • N5k96UP connected to 6509 no VSS over 1GB

    Hi there,
    i have the advantage to connect 2 N5k Switches on 2 6500 without VSS over 1GB Ports (Portchannel)
    I configured LACP on the port-channel interfaces, and all interfaces on the 5ks facing down to the 65 in one Port-Channel and one vPC.
    Is this the right way for this issue, ore dose i need to configure different port-channels and different vPCs on the 5ks?
    Now, all Ports facing to 6500b are Suspended on N5ka and N5kb. 
    N5ka# sh port-channel summ
    Flags:  D - Down        P - Up in port-channel (members)
            I - Individual  H - Hot-standby (LACP only)
            s - Suspended   r - Module-removed
            S - Switched    R - Routed
            U - Up (port-channel)
    Group Port-       Type     Protocol  Member Ports
          Channel
    10    Po10(SU)    Eth      LACP      Eth1/43(s)   Eth1/44(s)   Eth1/45(P)
                                         Eth1/46(P)   Eth2/13(s)   Eth2/14(s)
                                         Eth2/15(P)   Eth2/16(P)
    N5kb# sh port-channel summ
    Flags:  D - Down        P - Up in port-channel (members)
            I - Individual  H - Hot-standby (LACP only)
            s - Suspended   r - Module-removed
            S - Switched    R - Routed
            U - Up (port-channel)
    Group Port-       Type     Protocol  Member Ports
          Channel
    10    Po10(SU)    Eth      LACP      Eth1/43(P)   Eth1/44(P)   Eth1/45(s)
                                         Eth1/46(s)   Eth2/13(P)   Eth2/14(P)
                                         Eth2/15(s)   Eth2/16(s)  
    6500a#
    interface GigabitEthernet2/17
    description to N5ka
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/18
    description to N5ka
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/19
    description to N5ka
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/20
    description to N5ka
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/21
    description N5kb
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/22
    description N5kb
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/23
    description N5Kb
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/24
    descriptionN5kb
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface Port-channel10
    description Po10 N5ka and N5kb
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    6500b#
    interface GigabitEthernet2/17
    description to N5kb
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/18
    description to N5kb
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/19
    description to N5kb
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/20
    description to N5kb
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/21
    description N5ka
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/22
    description N5ka
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/23
    description N5Ka
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface GigabitEthernet2/24
    descriptionN5ka
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    channel-group 10 mode active
    interface Port-channel10
    description Po10 N5kb and N5ka
    no ip address
    switchport
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 64
    switchport mode trunk
    switchport nonegotiate
    N5ka:
    vpc domain 99
      role priority 1000
      peer-keepalive destination xxxxx
    interface port-channel10
      description i=po10 Eth1/43 - 46, Eth2/13 - 16 6500a, 6500b Uplink VLAN64 vPC10
      switchport mode trunk
      vpc 10
      switchport trunk allowed vlan 64
      spanning-tree port type network
    interface Ethernet1/43
      description i=Eth1/43 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/44
      description i=Eth1/44 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/45
      description i=Eth1/45 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/46
      description i=Eth1/46 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/47
      description i=e1/47 vPCpeerLink-Domain99
      switchport mode trunk
      udld aggressive
      channel-group 99
    interface Ethernet1/48
      description i=e1/48 vPCpeerLink-Domain99
      switchport mode trunk
      udld aggressive
      channel-group 99
    interface Ethernet2/13
      description i=Eth2/13 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet2/14
      description i=Eth2/14 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet2/15
      description i=Eth2/15 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet2/16
      description i=Eth2/16 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    N5kb
    interface Ethernet1/43
      description i=Eth1/43 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/44
      description i=Eth1/44 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/45
      description i=Eth1/45 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/46
      description i=Eth1/46 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/47
      description i=e1/47 u=e1/47 t=vPCpeerLink-Domain99
      switchport mode trunk
      channel-group 99
    interface Ethernet1/48
      description i=e1/48  u=e1/48 t=vPCpeerLink-Domain99
      switchport mode trunk
      udld aggressive
      channel-group 99
    interface Ethernet2/13
      description i=Eth2/13 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet2/14
      description i=Eth2/14 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet2/15
      description i=Eth2/15 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet2/16
      description i=Eth2/16 6500
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active

    !Command: show running-config
    !Time: Thu Nov 17 15:31:23 2011
    version 5.0(3)N2(2)
    no feature telnet
    no telnet server enable
    cfs eth distribute
    feature udld
    feature lacp
    feature vpc
    feature lldp
    feature fex
    username xxx password 5 xxx role network-admin
    username xxx password 5 xxx role network-admin
    ip domain-lookup
    radius-server key 7 xxxx
    radius-server timeout 3
    radius-server retransmit 2
    radius-server host 10.10.8.53 auth-port 1645 acct-port 1646 authentication accounting
    aaa group server radius RADAuth
        server 10.10.8.53
        use-vrf management
        source-interface mgmt0
    hostname g6-nex
    logging event link-status default
    ip access-list SNMP
      10 permit ip 10.10.3.0/24 any
      20 permit ip 10.10.8.0/24 any
      30 deny ip any any
    ip access-list SSHlogin
      10 permit ip 10.10.3.0/24 any
      20 permit ip 10.10.8.0/24 any
      30 deny ip any any
    class-map type qos class-fcoe
    class-map type queuing class-fcoe
      match qos-group 1
    class-map type queuing class-all-flood
      match qos-group 2
    class-map type queuing class-ip-multicast
      match qos-group 2
    class-map type network-qos class-fcoe
      match qos-group 1
    class-map type network-qos class-all-flood
      match qos-group 2
    class-map type network-qos class-ip-multicast
      match qos-group 2
    fex 104
      pinning max-links 8
      description "FEX0104"
    fex 105
      pinning max-links 8
      description "FEX0105"
    fex 106
      pinning max-links 4
      description "FEX0106"
    fex 107
      pinning max-links 4
      description "FEX0107"
    snmp-server location  xxx
    snmp-server host 10.10.8.14 traps version 2c g6-nex
    snmp-server host 10.10.8.14 use-vrf management
    snmp-server host 10.10.8.13 traps version 2c z6-nex
    snmp-server host 10.10.8.13 use-vrf management
    snmp-server enable traps callhome event-notify
    snmp-server enable traps callhome smtp-send-fail
    snmp-server enable traps cfs state-change-notif
    snmp-server enable traps cfs merge-failure
    snmp-server enable traps aaa server-state-change
    snmp-server enable traps zone unsupp-mem
    snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion
    snmp-server enable traps upgrade UpgradeJobStatusNotify
    snmp-server enable traps feature-control FeatureOpStatusChange
    snmp-server enable traps sysmgr cseFailSwCoreNotifyExtended
    snmp-server enable traps config ccmCLIRunningConfigChanged
    snmp-server enable traps snmp authentication
    snmp-server enable traps vtp notifs
    snmp-server enable traps vtp vlancreate
    snmp-server enable traps vtp vlandelete
    snmp-server enable traps poe portonoff
    snmp-server enable traps poe pwrusageon
    snmp-server enable traps poe pwrusageoff
    snmp-server enable traps poe police
    snmp-server community xxx group network-operator
    snmp-server community xxx group network-admin
    snmp-server community xxx use-acl SNMP
    snmp-server community xxx use-acl SNMP
    ntp server 10.10.8.53 use-vrf management
    aaa authentication login default group RADAuth
    aaa authentication login console group RADAuth
    aaa accounting default group RADAuth
    vrf context management
      ip route 0.0.0.0/0 10.10.3.202
    vlan 1
    vlan 64
      name BDRLAN_064_Server
    vlan 1950
      name BDRLAN_1950_VMKERNEL
    vlan 1972
      name BDRLAN_1972_SMN-Srv
    vpc domain 99
      peer-keepalive destination 10.10.3.130
    interface port-channel10
      description i=po10 Eth1/43 - 46, Eth2/13 - 16 s=z6-c65, g6-c65 t=Uplink VLAN64 vPC10
      switchport mode trunk
      vpc 10
      switchport trunk allowed vlan 64
      spanning-tree port type network
    interface port-channel11
      switchport mode trunk
      vpc 11
      switchport trunk allowed vlan 64
      spanning-tree port type network
    interface port-channel99
      description i=po99 e1/47 e1/48 s=z6-nex u=po99 t=vPCpeerLink
      switchport mode trunk
      vpc peer-link
      spanning-tree port type network
    interface port-channel1001
      description i=po1001 Eth104/1/1 - Eth100/1/1 t=Port-Channel
      vpc 1001
      switchport access vlan 64
    interface port-channel1002
      description i=po1002 Eth104/1/2 - Eth100/1/2 t=Port-Channel
      vpc 1002
      switchport access vlan 64
    interface port-channel1003
      description i=po1003 Eth104/1/3 - Eth100/1/3 t=Port-Channel
      vpc 1003
      switchport access vlan 64
    interface port-channel1004
      description i=po1004 Eth104/1/4 - Eth100/1/4 t=Port-Channel
      vpc 1004
      switchport access vlan 64
    interface port-channel1005
      description i=po1005 Eth104/1/5 - Eth100/1/5 t=Port-Channel
      vpc 1005
      switchport access vlan 64
    interface port-channel1006
      description i=po1006 Eth104/1/6 - Eth100/1/6 t=Port-Channel
      vpc 1006
      switchport access vlan 64
    interface port-channel1007
      description i=po1007 Eth104/1/7 - Eth100/1/7 t=Port-Channel
      vpc 1007
      switchport access vlan 64
    interface port-channel1008
      description i=po1008 Eth104/1/8 - Eth100/1/8 t=Port-Channel
      vpc 1008
      switchport access vlan 64
    interface port-channel1009
      description i=po1009 Eth104/1/9 - Eth100/1/9 t=Port-Channel
      vpc 1009
      switchport access vlan 64
    interface port-channel1010
      description i=po1010 Eth104/1/10 - Eth100/1/10 t=Port-Channel
      vpc 1010
      switchport access vlan 64
    interface port-channel1011
      description i=po1011 Eth104/1/11 - Eth100/1/11 t=Port-Channel
      vpc 1011
      switchport access vlan 64
    interface port-channel1012
      description i=po1012 Eth104/1/12 - Eth100/1/12 t=Port-Channel
      vpc 1012
      switchport access vlan 64
    interface port-channel1013
      description i=po1013 Eth104/1/13 - Eth100/1/13 t=Port-Channel
      vpc 1013
      switchport access vlan 64
    interface port-channel1014
      description i=po1014 Eth104/1/14 - Eth100/1/14 t=Port-Channel
      vpc 1014
      switchport access vlan 64
    interface port-channel1015
      description i=po1015 Eth104/1/15 - Eth100/1/15 t=Port-Channel
      vpc 1015
      switchport access vlan 64
    interface port-channel1016
      description i=po1016 Eth104/1/16 - Eth100/1/16 t=Port-Channel
      vpc 1016
      switchport access vlan 64
    interface port-channel1101
      description i=po1101 Eth105/1/1 - Eth101/1/1 t=Port-Channel
      vpc 1101
      switchport access vlan 64
    interface port-channel1102
      description i=po1102 Eth105/1/2 - Eth101/1/2 t=Port-Channel
      vpc 1102
      switchport access vlan 64
    interface port-channel1103
      description i=po1103 Eth105/1/3 - Eth101/1/3 t=Port-Channel
      vpc 1103
      switchport access vlan 64
    interface port-channel1104
      description i=po1104 Eth105/1/4 - Eth101/1/4 t=Port-Channel
      vpc 1104
      switchport access vlan 64
    interface port-channel1105
      description i=po1105 Eth105/1/5 - Eth101/1/5 t=Port-Channel
      vpc 1105
      switchport access vlan 64
    interface port-channel1106
      description i=po1106 Eth105/1/6 - Eth101/1/6 t=Port-Channel
      vpc 1106
      switchport access vlan 64
    interface port-channel1107
      description i=po1107 Eth105/1/7 - Eth101/1/7 t=Port-Channel
      vpc 1107
      switchport access vlan 64
    interface port-channel1108
      description i=po1108 Eth105/1/8 - Eth101/1/8 t=Port-Channel
      vpc 1108
      switchport access vlan 64
    interface port-channel1109
      description i=po1109 Eth105/1/9 - Eth101/1/9 t=Port-Channel
      vpc 1109
      switchport access vlan 64
    interface port-channel1110
      description i=po1110 Eth105/1/10 - Eth101/1/10 t=Port-Channel
      vpc 1110
      switchport access vlan 64
    interface port-channel1111
      description i=po1111 Eth105/1/11 - Eth101/1/11 t=Port-Channel
      vpc 1111
      switchport access vlan 64
    interface port-channel1112
      description i=po1112 Eth105/1/12 - Eth101/1/12 t=Port-Channel
      vpc 1112
      switchport access vlan 64
    interface port-channel1113
      description i=po1113 Eth105/1/13 - Eth101/1/13 t=Port-Channel
      vpc 1113
      switchport access vlan 64
    interface port-channel1114
      description i=po1114 Eth105/1/14 - Eth101/1/14 t=Port-Channel
      vpc 1114
      switchport access vlan 64
    interface port-channel1115
      description i=po1115 Eth105/1/15 - Eth101/1/15 t=Port-Channel
      vpc 1115
      switchport access vlan 64
    interface port-channel1116
      description i=po1116 Eth105/1/16 - Eth101/1/16 t=Port-Channel
      vpc 1116
      switchport access vlan 64
    interface port-channel1201
      description i=po1201 Eth106/1/1 - Eth102/1/1 t=Port-Channel
      vpc 1201
      switchport access vlan 1972
    interface port-channel1202
      description i=po1202 Eth106/1/2 - Eth102/1/2 t=Port-Channel
      vpc 1202
      switchport access vlan 1972
    interface port-channel1203
      description i=po1203 Eth106/1/3 - Eth102/1/3 t=Port-Channel
      vpc 1203
      switchport access vlan 1972
    interface port-channel1204
      description i=po1204 Eth106/1/4 - Eth102/1/4 t=Port-Channel
      vpc 1204
      switchport access vlan 1972
    interface port-channel1205
      description i=po1205 Eth106/1/5 - Eth102/1/5 t=Port-Channel
      vpc 1205
      switchport access vlan 1972
    interface port-channel1206
      description i=po1206 Eth106/1/6 - Eth102/1/6 t=Port-Channel
      vpc 1206
      switchport access vlan 1972
    interface port-channel1207
      description i=po1207 Eth106/1/7 - Eth102/1/7 t=Port-Channel
      vpc 1207
      switchport access vlan 1972
    interface port-channel1208
      description i=po1208 Eth106/1/8 - Eth102/1/8 t=Port-Channel
      vpc 1208
      switchport access vlan 1972
    interface port-channel1209
      description i=po1209 Eth106/1/9 - Eth102/1/9 t=Port-Channel
      vpc 1209
      switchport access vlan 1972
    interface port-channel1210
      description i=po1210 Eth106/1/10 - Eth102/1/10 t=Port-Channel
      vpc 1210
      switchport access vlan 1972
    interface port-channel1211
      description i=po1211 Eth106/1/11 - Eth102/1/11 t=Port-Channel
      vpc 1211
      switchport access vlan 1972
    interface port-channel1212
      description i=po1212 Eth106/1/12 - Eth102/1/12 t=Port-Channel
      vpc 1212
      switchport access vlan 1972
    interface port-channel1213
      description i=po1213 Eth106/1/13 - Eth102/1/13 t=Port-Channel
      vpc 1213
      switchport access vlan 1972
    interface port-channel1214
      description i=po1214 Eth106/1/14 - Eth102/1/14 t=Port-Channel
      vpc 1214
      switchport access vlan 1972
    interface port-channel1215
      description i=po1215 Eth106/1/15 - Eth102/1/15 t=Port-Channel
      vpc 1215
      switchport access vlan 1972
    interface port-channel1216
      description i=po1216 Eth106/1/16 - Eth102/1/16 t=Port-Channel
      vpc 1216
      switchport access vlan 1972
    interface port-channel1217
      description i=po1217 Eth106/1/17 - Eth102/1/17 t=Port-Channel
      vpc 1217
      switchport access vlan 1950
    interface port-channel1218
      description i=po1218 Eth106/1/18 - Eth102/1/18 t=Port-Channel
      vpc 1218
      switchport access vlan 1950
    interface port-channel1219
      description i=po1219 Eth106/1/19 - Eth102/1/19 t=Port-Channel
      vpc 1219
      switchport access vlan 1950
    interface port-channel1220
      description i=po1220 Eth106/1/20 - Eth102/1/20 t=Port-Channel
      vpc 1220
      switchport access vlan 1950
    interface port-channel1221
      description i=po1221 Eth106/1/21 - Eth102/1/21 t=Port-Channel
      vpc 1221
      switchport access vlan 1950
    interface port-channel1222
      description i=po1222 Eth106/1/22 - Eth102/1/22 t=Port-Channel
      vpc 1222
      switchport access vlan 1950
    interface port-channel1223
      description i=po1223 Eth106/1/23 - Eth102/1/23 t=Port-Channel
      vpc 1223
      switchport access vlan 1950
    interface port-channel1224
      description i=po1224 Eth106/1/24 - Eth102/1/24 t=Port-Channel
      vpc 1224
      switchport access vlan 1950
    interface port-channel1225
      description i=po1225 Eth106/1/25 - Eth102/1/25 t=Port-Channel
      vpc 1225
      switchport access vlan 1950
    interface port-channel1226
      description i=po1226 Eth106/1/26 - Eth102/1/26 t=Port-Channel
      vpc 1226
      switchport access vlan 1950
    interface port-channel1227
      description i=po1227 Eth106/1/27 - Eth102/1/27 t=Port-Channel
      vpc 1227
      switchport access vlan 1950
    [K
    interface port-channel1228
      description i=po1228 Eth106/1/28 - Eth102/1/28 t=Port-Channel
      vpc 1228
      switchport access vlan 1950
    interface port-channel1229
      description i=po1229 Eth106/1/29 - Eth102/1/29 t=Port-Channel
      vpc 1229
      switchport access vlan 1950
    interface port-channel1230
      description i=po1230 Eth106/1/30 - Eth102/1/30 t=Port-Channel
      vpc 1230
      switchport access vlan 1950
    interface port-channel1231
      description i=po1231 Eth106/1/31 - Eth102/1/31 t=Port-Channel
      vpc 1231
      switchport access vlan 1950
    interface port-channel1232
      description i=po1232 Eth106/1/32 - Eth102/1/32 t=Port-Channel
      vpc 1232
      switchport access vlan 1950
    interface port-channel1301
      description i=po1301 Eth107/1/1 - Eth103/1/1 t=Port-Channel
      vpc 1301
      switchport access vlan 1972
    interface port-channel1302
      description i=po1302 Eth107/1/2 - Eth103/1/2 t=Port-Channel
      vpc 1302
      switchport access vlan 1972
    interface port-channel1303
      description i=po1303 Eth107/1/3 - Eth103/1/3 t=Port-Channel
      vpc 1303
      switchport access vlan 1972
    interface port-channel1304
      description i=po1304 Eth107/1/4 - Eth103/1/4 t=Port-Channel
      vpc 1304
      switchport access vlan 1972
    interface port-channel1305
      description i=po1305 Eth107/1/5 - Eth103/1/5 t=Port-Channel
      vpc 1305
      switchport access vlan 1972
    interface port-channel1306
      description i=po1306 Eth107/1/6 - Eth103/1/6 t=Port-Channel
      vpc 1306
      switchport access vlan 1972
    interface port-channel1307
      description i=po1307 Eth107/1/7 - Eth103/1/7 t=Port-Channel
      vpc 1307
      switchport access vlan 1972
    interface port-channel1308
      description i=po1308 Eth107/1/8 - Eth103/1/8 t=Port-Channel
      vpc 1308
      switchport access vlan 1972
    interface port-channel1309
      description i=po1309 Eth107/1/9 - Eth103/1/9 t=Port-Channel
      vpc 1309
      switchport access vlan 1972
    interface port-channel1310
      description i=po1310 Eth107/1/10 - Eth103/1/10 t=Port-Channel
      vpc 1310
      switchport access vlan 1972
    interface port-channel1311
      description i=po1311 Eth107/1/11 - Eth103/1/11 t=Port-Channel
      vpc 1311
      switchport access vlan 1972
    interface port-channel1312
      description i=po1312 Eth107/1/12 - Eth103/1/12 t=Port-Channel
      vpc 1312
      switchport access vlan 1972
    interface port-channel1313
      description i=po1313 Eth107/1/13 - Eth103/1/13 t=Port-Channel
      vpc 1313
      switchport access vlan 1972
    interface port-channel1314
      description i=po1314 Eth107/1/14 - Eth103/1/14 t=Port-Channel
      vpc 1314
      switchport access vlan 1972
    interface port-channel1315
      description i=po1315 Eth107/1/15 - Eth103/1/15 t=Port-Channel
      vpc 1315
      switchport access vlan 1972
    interface port-channel1316
      description i=po1316 Eth107/1/16 - Eth103/1/16 t=Port-Channel
      vpc 1316
      switchport access vlan 1972
    interface port-channel1317
      description i=po1317 Eth107/1/17 - Eth103/1/17 t=Port-Channel
      vpc 1317
      switchport access vlan 1950
    interface port-channel1318
      description i=po1318 Eth107/1/18 - Eth103/1/18 t=Port-Channel
      vpc 1318
      switchport access vlan 1950
    interface port-channel1319
      description i=po1319 Eth107/1/19 - Eth103/1/19 t=Port-Channel
      vpc 1319
      switchport access vlan 1950
    interface port-channel1320
      description i=po1320 Eth107/1/20 - Eth103/1/20 t=Port-Channel
      vpc 1320
      switchport access vlan 1950
    interface port-channel1321
      description i=po1321 Eth107/1/21 - Eth103/1/21 t=Port-Channel
      vpc 1321
      switchport access vlan 1950
    interface port-channel1322
      description i=po1322 Eth107/1/22 - Eth103/1/22 t=Port-Channel
      vpc 1322
      switchport access vlan 1950
    interface port-channel1323
      description i=po1323 Eth107/1/23 - Eth103/1/23 t=Port-Channel
      vpc 1323
      switchport access vlan 1950
    interface port-channel1324
      description i=po1324 Eth107/1/24 - Eth103/1/24 t=Port-Channel
      vpc 1324
      switchport access vlan 1950
    interface port-channel1325
      description i=po1325 Eth107/1/25 - Eth103/1/25 t=Port-Channel
      vpc 1325
      switchport access vlan 1950
    interface port-channel1326
      description i=po1326 Eth107/1/26 - Eth103/1/26 t=Port-Channel
      vpc 1326
      switchport access vlan 1950
    interface port-channel1327
      description i=po1327 Eth107/1/27 - Eth103/1/27 t=Port-Channel
      vpc 1327
      switchport access vlan 1950
    interface port-channel1328
      description i=po1328 Eth107/1/28 - Eth103/1/28 t=Port-Channel
      vpc 1328
      switchport access vlan 1950
    interface port-channel1329
      description i=po1329 Eth107/1/29 - Eth103/1/29 t=Port-Channel
      vpc 1329
      switchport access vlan 1950
    interface port-channel1330
      description i=po1330 Eth107/1/30 - Eth103/1/30 t=Port-Channel
      vpc 1330
      switchport access vlan 1950
    interface port-channel1331
      description i=po1331 Eth107/1/31 - Eth103/1/31 t=Port-Channel
      vpc 1331
      switchport access vlan 1950
    interface port-channel1332
      description i=po1332 Eth107/1/32 - Eth103/1/32 t=Port-Channel
      vpc 1332
      switchport access vlan 1950
    interface Ethernet1/1
      description i=e1/01 s=FEX104-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 104
    interface Ethernet1/2
      description i=e1/02 s=FEX104-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 104
    interface Ethernet1/3
      description i=e1/03 s=FEX104-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 104
    interface Ethernet1/4
      description i=e1/04 s=FEX104-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 104
    interface Ethernet1/5
      description i=e1/05 s=FEX104-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 104
    interface Ethernet1/6
      description i=e1/06 s=FEX104-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 104
    interface Ethernet1/7
      description i=e1/07 s=FEX104-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 104
    interface Ethernet1/8
      description i=e1/08 s=FEX104-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 104
    interface Ethernet1/9
      description i=e1/09 s=FEX105-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 105
    interface Ethernet1/10
      description i=e1/10 s=FEX105-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 105
    interface Ethernet1/11
      description i=e1/11 s=FEX105-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 105
    interface Ethernet1/12
      description i=e1/12 s=FEX105-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 105
    interface Ethernet1/13
      description i=e1/13 s=FEX105-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 105
    interface Ethernet1/14
      description i=e1/14 s=FEX105-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 105
    interface Ethernet1/15
      description i=e1/15 s=FEX105-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 105
    interface Ethernet1/16
      description i=e1/16 s=FEX105-10GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 105
    interface Ethernet1/17
      description i=e1/17 s=FEX106-1GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 106
    interface Ethernet1/18
      description i=e1/18 s=FEX106-1GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 106
    interface Ethernet1/19
      description i=e1/19 s=FEX106-1GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 106
    interface Ethernet1/20
      description i=e1/20 s=FEX106-1GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 106
    interface Ethernet1/21
      description i=e1/21 s=FEX107-1GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 107
    interface Ethernet1/22
      description i=e1/22 s=FEX107-1GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 107
    interface Ethernet1/23
      description i=e1/23 s=FEX107-1GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 107
    interface Ethernet1/24
      description i=e1/24 s=FEX107-1GB t=FEX-Uplink
      switchport mode fex-fabric
      fex associate 107
    interface Ethernet1/25
    interface Ethernet1/26
    interface Ethernet1/27
    interface Ethernet1/28
    interface Ethernet1/29
    interface Ethernet1/30
    interface Ethernet1/31
    interface Ethernet1/32
    interface Ethernet1/33
    interface Ethernet1/34
    interface Ethernet1/35
    interface Ethernet1/36
    interface Ethernet1/37
    interface Ethernet1/38
    interface Ethernet1/39
    interface Ethernet1/40
    interface Ethernet1/41
      description i=e1/41 s=s6-4-smn1 gi1/0/52 v=1950,1972
      switchport mode trunk
      switchport trunk allowed vlan 1950,1972
      speed 1000
    interface Ethernet1/42
    interface Ethernet1/43
      description i=Eth1/43 s=z6-c65 gi2/23 t=trunk v=64
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/44
      description i=Eth1/44 s=z6-c65 gi2/24 t=trunk v=64
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/45
      description i=Eth1/45 s=g6-c65 gi2/19 t=trunk v=64
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/46
      description i=Eth1/46 s=g6-c65 gi2/20 t=trunk v=64
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet1/47
      description i=e1/47 s=z6-nex u=e1/47 t=vPCpeerLink-Domain99
      switchport mode trunk
      channel-group 99
    interface Ethernet1/48
      description i=e1/48 s=z6-nex u=e1/48 t=vPCpeerLink-Domain99
      switchport mode trunk
      udld aggressive
      channel-group 99
    interface Ethernet2/1
    interface Ethernet2/2
    interface Ethernet2/3
    interface Ethernet2/4
    interface Ethernet2/5
    interface Ethernet2/6
    interface Ethernet2/7
    interface Ethernet2/8
    interface Ethernet2/9
    interface Ethernet2/10
    interface Ethernet2/11
    interface Ethernet2/12
    interface Ethernet2/13
      description i=Eth2/13 s=z6-c65 gi2/21 t=trunk v=64
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet2/14
      description i=Eth2/14 s=z6-c65 gi2/22 t=trunk v=64
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet2/15
      description i=Eth2/15 s=g6-c65 gi2/17 t=trunk v=64
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface Ethernet2/16
      description i=Eth2/16 s=g6-c65 gi2/18 t=trunk v=64
      switchport mode trunk
      switchport trunk allowed vlan 64
      spanning-tree port type network
      speed 1000
      udld aggressive
      channel-group 10 mode active
    interface mgmt0
      ip address 10.10.3.131/24
    interface Ethernet104/1/1
      description i=Eth104/1/1 h=ESX01a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1001
    interface Ethernet104/1/2
      description i=Eth104/1/2 h=ESX02a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1002
    interface Ethernet104/1/3
      description i=Eth104/1/3 h=ESX03a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1003
    interface Ethernet104/1/4
      description i=Eth104/1/4 h=ESX04a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1004
    interface Ethernet104/1/5
      description i=Eth104/1/5 h=ESX05a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1005
    interface Ethernet104/1/6
      description i=Eth104/1/6 h=ESX06a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1006
    interface Ethernet104/1/7
      description i=Eth104/1/7 h=ESX06a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1007
    interface Ethernet104/1/8
      description i=Eth104/1/8 h=ESX09a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1008
    interface Ethernet104/1/9
      description i=Eth104/1/9 h=ESX10a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1009
    interface Ethernet104/1/10
      description i=Eth104/1/10 h=ESX11a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1010
    interface Ethernet104/1/11
      description i=Eth104/1/11 h=ESX12a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1011
    interface Ethernet104/1/12
      description i=Eth104/1/12 h=ESX13a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1012
    interface Ethernet104/1/13
      description i=Eth104/1/13 h=ESX14a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1013
    interface Ethernet104/1/14
      description i=Eth104/1/14 h=ESX15a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1014
    interface Ethernet104/1/15
      description i=Eth104/1/15 h=ESX15a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1015
    interface Ethernet104/1/16
      description i=Eth104/1/16 h=ESX16a t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1016
    interface Ethernet104/1/17
      shutdown
    interface Ethernet104/1/18
      shutdown
    interface Ethernet104/1/19
      shutdown
    interface Ethernet104/1/20
      shutdown
    interface Ethernet104/1/21
      shutdown
    interface Ethernet104/1/22
      shutdown
    interface Ethernet104/1/23
      shutdown
    interface Ethernet104/1/24
      shutdown
    interface Ethernet104/1/25
      shutdown
    interface Ethernet104/1/26
      shutdown
    interface Ethernet104/1/27
      shutdown
    interface Ethernet104/1/28
      shutdown
    interface Ethernet104/1/29
      shutdown
    interface Ethernet104/1/30
      shutdown
    interface Ethernet104/1/31
      shutdown
    interface Ethernet104/1/32
      shutdown
    interface Ethernet105/1/1
      description i=Eth105/1/1 h=ESX01b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1101
    interface Ethernet105/1/2
      description i=Eth105/1/2 h=ESX02b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1102
    interface Ethernet105/1/3
      description i=Eth105/1/3 h=ESX03b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1103
    interface Ethernet105/1/4
      description i=Eth105/1/4 h=ESX04b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1104
    interface Ethernet105/1/5
      description i=Eth105/1/5 h=ESX05b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1105
    interface Ethernet105/1/6
      description i=Eth105/1/6 h=ESX06b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1106
    interface Ethernet105/1/7
      description i=Eth105/1/7 h=ESX07b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1107
    interface Ethernet105/1/8
      description i=Eth105/1/8 h=ESX08b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1108
    interface Ethernet105/1/9
      description i=Eth105/1/9 h=ESX09b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1109
    interface Ethernet105/1/10
      description i=Eth105/1/10 h=ESX10b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1110
    interface Ethernet105/1/11
      description i=Eth105/1/11 h=ESX11b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1111
    interface Ethernet105/1/12
      description i=Eth105/1/12 h=ESX12b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1112
    interface Ethernet105/1/13
      description i=Eth105/1/13 h=ESX13b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1113
    interface Ethernet105/1/14
      description i=Eth105/1/14 h=ESX14b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1114
    interface Ethernet105/1/15
      description i=Eth105/1/15 h=ESX15b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1115
    interface Ethernet105/1/16
      description i=Eth105/1/16 h=ESX16b t=Port-Channel
      switchport access vlan 64
      spanning-tree port type edge
      channel-group 1116
    interface Ethernet105/1/17
      shutdown
    interface Ethernet105/1/18
      shutdown
    interface Ethernet105/1/19
      shutdown
    interface Ethernet105/1/20
      shutdown
    interface Ethernet105/1/21
      shutdown
    interface Ethernet105/1/22
      shutdown
    interface Ethernet105/1/23
      shutdown
    interface Ethernet105/1/24
      shutdown
    interface Ethernet105/1/25
      shutdown
    interface Ethernet105/1/26
      shutdown
    interface Ethernet105/1/27
      shutdown
    interface Ethernet105/1/28
      shutdown
    interface Ethernet105/1/29
      shutdown
    interface Ethernet105/1/30
      shutdown
    interface Ethernet105/1/31
      shutdown
    interface Ethernet105/1/32
      shutdown
    interface Ethernet106/1/1
      description i=Eth106/1/1 h=ESX01a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1201
    interface Ethernet106/1/2
      description i=Eth106/1/2 h=ESX02a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1202
    interface Ethernet106/1/3
      description i=Eth106/1/3 h=ESX03a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1203
    interface Ethernet106/1/4
      description i=Eth106/1/4 h=ESX04a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1204
    interface Ethernet106/1/5
      description i=Eth106/1/6 h=ESX05a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1205
    interface Ethernet106/1/6
      description i=Eth106/1/6 h=ESX06a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1206
    interface Ethernet106/1/7
      description i=Eth106/1/7 h=ESX07a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1207
    interface Ethernet106/1/8
      description i=Eth106/1/8 h=ESX08a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1208
    interface Ethernet106/1/9
      description i=Eth106/1/9 h=ESX09a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1209
    interface Ethernet106/1/10
      description i=Eth106/1/10 h=ESX10a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1210
    interface Ethernet106/1/11
      description i=Eth106/1/11 h=ESX11a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1211
    interface Ethernet106/1/12
      description i=Eth106/1/12 h=ESX12a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1212
    interface Ethernet106/1/13
      description i=Eth106/1/13 h=ESX13a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1213
    interface Ethernet106/1/14
      description i=Eth106/1/14 h=ESX14a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1214
    interface Ethernet106/1/15
      description i=Eth106/1/15 h=ESX15a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1215
    interface Ethernet106/1/16
      description i=Eth106/1/16 h=ESX16a t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1216
    interface Ethernet106/1/17
      description i=Eth106/1/17 h=ESX1a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1217
    interface Ethernet106/1/18
      description i=Eth106/1/18 h=ESX2a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1218
    interface Ethernet106/1/19
      description i=Eth106/1/19 h=ESX3a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1219
    interface Ethernet106/1/20
      description i=Eth106/1/20 h=ESX4a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1220
    interface Ethernet106/1/21
      description i=Eth106/1/20 h=ESX5a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1221
    interface Ethernet106/1/22
      description i=Eth106/1/22 h=ESX6a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1222
    interface Ethernet106/1/23
      description i=Eth106/1/23 h=ESX7a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1223
    interface Ethernet106/1/24
      description i=Eth106/1/24 h=ESX8a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1224
    interface Ethernet106/1/25
      description i=Eth106/1/25 h=ESX9a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1225
    interface Ethernet106/1/26
      description i=Eth106/1/26 h=ESX10a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1226
    interface Ethernet106/1/27
      description i=Eth106/1/27 h=ESX11a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1227
    interface Ethernet106/1/28
      description i=Eth106/1/28 h=ESX12a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1228
    interface Ethernet106/1/29
      description i=Eth106/1/29 h=ESX13a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1229
    interface Ethernet106/1/30
      description i=Eth106/1/30 h=ESX14a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1230
    interface Ethernet106/1/31
      description i=Eth106/1/31 h=ESX15a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1231
    interface Ethernet106/1/32
      description i=Eth106/1/32 h=ESX16a t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1232
    interface Ethernet106/1/33
      shutdown
    interface Ethernet106/1/34
      shutdown
    interface Ethernet106/1/35
      shutdown
    interface Ethernet106/1/36
      shutdown
    interface Ethernet106/1/37
      shutdown
    interface Ethernet106/1/38
      shutdown
    interface Ethernet106/1/39
      shutdown
    interface Ethernet106/1/40
      shutdown
    interface Ethernet106/1/41
      shutdown
    interface Ethernet106/1/42
      shutdown
    interface Ethernet106/1/43
      shutdown
    interface Ethernet106/1/44
      shutdown
    interface Ethernet106/1/45
      shutdown
    interface Ethernet106/1/46
      shutdown
    interface Ethernet106/1/47
      shutdown
    interface Ethernet106/1/48
      shutdown
    interface Ethernet107/1/1
      description i=Eth107/1/1 h=ESX1b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1301
    interface Ethernet107/1/2
      description i=Eth107/1/2 h=ESX2b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1302
    interface Ethernet107/1/3
      description i=Eth107/1/3 h=ESX3b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1303
    interface Ethernet107/1/4
      description i=Eth107/1/4 h=ESX4b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1304
    interface Ethernet107/1/5
      description i=Eth107/1/5 h=ESX5b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1305
    interface Ethernet107/1/6
      description i=Eth107/1/6 h=ESX6b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1306
    interface Ethernet107/1/7
      description i=Eth107/1/7 h=ESX7b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1307
    interface Ethernet107/1/8
      description i=Eth107/1/8 h=ESX8b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1308
    interface Ethernet107/1/9
      description i=Eth107/1/9 h=ESX9b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1309
    interface Ethernet107/1/10
      description i=Eth107/1/10 h=ESX10b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1310
    interface Ethernet107/1/11
      description i=Eth107/1/11 h=ESX11b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1311
    interface Ethernet107/1/12
      description i=Eth107/1/12 h=ESX12b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1312
    interface Ethernet107/1/13
      description i=Eth107/1/13 h=ESX13b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1313
    interface Ethernet107/1/14
      description i=Eth107/1/14 h=ESX14b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1314
    interface Ethernet107/1/15
      description i=Eth107/1/15 h=ESX15b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1315
    interface Ethernet107/1/16
      description i=Eth107/1/16 h=ESX16b t=Port-Channel
      switchport access vlan 1972
      spanning-tree port type edge
      channel-group 1316
    interface Ethernet107/1/17
      description i=Eth107/1/17 h=ESX01b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1317
    interface Ethernet107/1/18
      description i=Eth107/1/18 h=ESX02b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1318
    interface Ethernet107/1/19
      description i=Eth107/1/19 h=ESX03b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1319
    interface Ethernet107/1/20
      description i=Eth107/1/20 h=ESX04b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1320
    interface Ethernet107/1/21
      description i=Eth107/1/21 h=ESX05b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1321
    interface Ethernet107/1/22
      description i=Eth107/1/22 h=ESX06b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1322
    interface Ethernet107/1/23
      description i=Eth107/1/23 h=ESX07b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1323
    interface Ethernet107/1/24
      description i=Eth107/1/24 h=ESX08b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1324
    interface Ethernet107/1/25
      description i=Eth107/1/25 h=ESX09b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1325
    interface Ethernet107/1/26
      description i=Eth107/1/26 h=ESX10b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1326
    interface Ethernet107/1/27
      description i=Eth107/1/27 h=ESX11b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1327
    interface Ethernet107/1/28
      description i=Eth107/1/28 h=ESX12b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1328
    interface Ethernet107/1/29
      description i=Eth107/1/29 h=ESX13b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1329
    interface Ethernet107/1/30
      description i=Eth107/1/30 h=ESX14b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1330
    interface Ethernet107/1/31
      description i=Eth107/1/31 h=ESX15b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1331
    interface Ethernet107/1/32
      description i=Eth107/1/32 h=ESX16b t=Port-Channel
      switchport access vlan 1950
      spanning-tree port type edge
      channel-group 1332
    interface Ethernet107/1/33
      shutdown
    interface Ethernet107/1/34
      shutdown
    interface Ethernet107/1/35
      shutdown
    interface Ethernet107/1/36
      shutdown
    interface Ethernet107/1/37
      shutdown
    interface Ethernet107/1/38
      shutdown
    interface Ethernet107/1/39
      shutdown
    interface Ethernet107/1/40
      shutdown
    interface Ethernet107/1/41
      shutdown
    interface Ethernet107/1/42
      shutdown
    interface Ethernet107/1/43
      shutdown
    interface Ethernet107/1/44
      shutdown
    interface Ethernet107/1/45
      shutdown
    interface Ethernet107/1/46
      shutdown
    interface Ethernet107/1/47
      shutdown
    interface Ethernet107/1/48
      shutdown
    clock timezone CET 1 0
    clock summer-time CEST 5 sunday march 02:00 5 sunday october 03:00 60
    cli alias name wr copy run start
    line console
    line vty
      access-class SSHlogin in
    boot kickstart bootflash:/n5000-uk9-kickstart.5.0.3.N2.2.bin
    boot system bootflash:/n5000-uk9.5.0.3.N2.2.bin
    ip radius source-interface mgmt0
    logging server 10.10.8.30 6
    logging server 10.10.8.13 6
    logging monitor 6
    logging monitor 6
    z6-nex# sh run
    Communication could not be established with the process
    !Command: show running-config
    !Time: Thu Nov 17 15:40:15 2011
    version 5.0(3)N2(2)
    no feature telnet
    no telnet server enable
    cfs eth distribute
    feature udld
    feature lacp
    feature vpc
    feature lldp
    feature fex
    username xxx password 5 xxx role network-admin
    username xxx password 5 xxx  role network-admin
    ip domain-lookup
    radius-server key 7 xxx
    radius-server timeout 3
    radius-server retransmit 2
    radius-server host 10.10.8.53 auth-port 1645 acct-port 1646 authentication accounting
    aaa group server radius RADAuth
        server 10.10.8.53
        use-vrf management
        source-interface mgmt0
    hostname z6-nex
    logging event link-status default
    ip access-list SNMP
      10 permit ip 10.10.3.0/24 any
      20 permit ip 10.10.8.0/24 any
      30 deny ip any any
    ip access-list SSHlogin
      10 permit ip 10.10.3.0/24 any
      20 permit ip 10.10.8.0/24 any
      30 deny ip any any
    class-map type qos class-fcoe
    class-map type queuing class-fcoe
      match qos-group 1
    class-map type queuing class-all-flood
      match qos-group 2
    class-map type queuing class-ip-multicast
      match qos-group 2
    class-map type network-qos class-fcoe
      match qos-group 1
    class-map type network-qos class-all-flood
      match qos-group 2
    class-map type network-qos class-ip-multicast
      match qos-group 2
    fex 100
      pinning max-links 8
      description "FEX0100"
    fex 101
      pinning max-links 8
      description "FEX0101"
    fex 102
      pinning max-links 4
      description "FEX0102"
    fex 103
      pinning max-links 4
      description "FEX0103"
    snmp-server location
    snmp-server host 10.10.8.14 traps version 2c z6-nex
    snmp-server host 10.10.8.14 use-vrf management
    snmp-server host 10.10.8.13 traps version 2c z6-nex
    snmp-server host 10.10.8.13 use-vrf management
    snmp-server enable traps entity fru
    snmp-server enable traps callhome event-notify
    snmp-server enable traps callhome smtp-send-fail
    snmp-server enable traps cfs state-change-notif
    snmp-server enable traps cfs merge-failure
    snmp-server enable traps aaa server-state-change
    snmp-server enable traps zone unsupp-mem
    snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion
    snmp-server enable traps upgrade UpgradeJobStatusNotify
    snmp-server enable traps feature-control FeatureOpStatusChange
    snmp-server enable traps sysmgr cseFailSwCoreNotifyExtended
    snmp-server enable traps config ccmCLIRunningConfigChanged
    snmp-server enable traps snmp authentication
    snmp-server enable traps vtp notifs
    snmp-server enable traps vtp vlancreate
    snmp-server enable traps vtp vlandelete
    snmp-server enable traps poe portonoff
    snmp-server enable traps poe pwrusageon
    snmp-server enable traps poe pwrusageoff
    snmp-server enable traps poe police
    snmp-server community xxx group network-operator
    snmp-server community xxx group network-admin
    snmp-server community xxx use-acl SNMP
    snmp-server community xxx use-acl SNMP
    ntp server 10.10.8.53 use-vrf management
    aaa authentication login default group RADAuth
    aaa authentication login console group RADAuth
    aaa accounting default group RADAuth
    vrf context management
      ip route 0.0.0.0/0 10.10.3.202
    vlan 1
    vlan 64
      name BDRLAN_064_Server
    vlan 1950
      name BDRLAN_1950_VMKERNEL
    vlan 1972
      name BDRLAN_1972_SMN-Srv
    vpc domain 99
      role priority 1000
      peer-keepalive destination 10.10.3.131
    interface port-channel10
      description i=po10 Eth1/43 - 46, Eth2/13 - 16 s=z6-c65, g6-c65 t=Uplink VLAN64 vPC10
      switchport mode trunk
      vpc 10
      switchport trunk allowed vlan 64
      spanning-tree port type network
    interface port-channel11
      switchport mode trunk
      vpc 11
      switchport trunk allowed vlan 64
      spanning-tree port type network
    interface port-channel99
      description i=po99 e1/47 e1/48 s=g6-nex u=po99 t=vPCpeerLink
      switchport mode trunk
      vpc peer-link
      spanning-tree port type network
    interface port-channel1001
      description i=po1001 Eth100/1/1 - Eth104/1/1 t=Port-Channel
      vpc 1001
      switchport access vlan 64
    interface port-channel1002
      description i=po1002 Eth100/1/2 - Eth104/1/2 t=Port-Channel
      vpc 1002
      switchport access vlan 64
    interface port-channel1003
      description i=po1003 Eth100/1/3 - Eth104/1/3 t=Port-Channel
      vpc 1003
      switchport access vlan 64
    interface port-channel1004
      description i=po1004 Eth100/1/4 - Eth104/1/4 t=Port-Channel
      vpc 1004
      switchport access vlan 64
    interface port-channel1005
      description i=po1005 Eth100/1/5 - Eth104/1/5 t=Port-Channel
      vpc 1005
      switchport access vlan 64
    interface port-channel1006
      description i=po1006 Eth100/1/6 - Eth104/1/6 t=Port-Channel
      vpc 1006
      switchport access vlan 64
    interface port-channel1007
      description i=po1007 Eth100/1/7 - Eth104/1/7 t=Port-Channel
      vpc 1007
      switchport access vlan 64
    interface port-channel1008
      description i=po1008 Eth100/1/8 - Eth104/1/8 t=Port-Channel
      vpc 1008
      switchport access vlan 64
    [K
    interface port-channel1009
      description i=po1009 Eth100/1/9 - Eth104/1/9 t=Port-Channel
      vpc 1009
      switchport access vlan 64
    interface port-channel1010
      description i=po1010 Eth100/1/10 - Eth104/1/10 t=Port-Channel
      vpc 1010
      switchport access vlan 64
    interface port-channel1011
      description i=po1011 Eth100/1/11 - Eth104/1/11 t=Port-Channel
      vpc 1011
      switchport access vlan 64
    interface port-channel1012
      description i=po1012 Eth100/1/12 - Eth104/1/12 t=Port-Channel
      vpc 1012
      switchport access vlan 64
    interface port-channel1013
      description i=po1013 Eth100/1/13 - Eth104/1/13 t=Port-Channel
      vpc 1013
      switchport access vlan 64
    interface port-channel1014
      description i=po1014 Eth100/1/14 - Eth104/1/14 t=Port-Channel
      vpc 1014
      switchport access vlan 64
    interface port-channel1015
      description i=po1015 Eth100/1/15 - Eth104/1/15 t=Port-Channel
      vpc 1015
      switchport access vlan 64
    interface port-channel1016
      description i=po1016 Eth100/1/16 - Eth104/1/16 t=Port-Channel
      vpc 1016
      switchport access vlan 64
    interface port-channel1101
      description i=po1101 Eth101/1/1 - Eth105/1/1 t=Port-Channel
      vpc 1101
      switchport access vlan 64
    interface port-channel1102
      description i=po1102 Eth101/1/2 - Eth105/1/2 t=Port-Channel
      vpc 1102
      switchport access vlan 64
    interface port-channel1103
      description i=po1103 Eth101/1/3 - Eth105/1/3 t=Port-Channel
      vpc 1103
      switchport access vlan 64
    interface port-channel1104
      description i=po1104 Eth101/1/4 - Eth105/1/4 t=Port-Channel
      vpc 1104
      switchport access vlan 64
    interface port-channel1105
      description i=po1105 Eth101/1/5 - Eth105/1/5 t=Port-Channel
      vpc 1105
      switchport access vlan 64
    interface port-channel1106
      description i=po1106 Eth101/1/6 - Eth105/1/6 t=Port-Channel
      vpc 1106
      switchport access vlan 64
    interface port-channel1107
      description i=po1107 Eth101/1/7 - Eth105/1/7 t=Port-Channel
      vpc 1107
      switchport access vlan 64
    interface port-channel1108
      description i=po1108 Eth101/1/8 - Eth105/1/8 t=Port-Channel
      vpc 1108
      switchport access vlan 64
    interface port-channel1109
      description i=po1109 Eth101/1/9 - Eth105/1/9 t=Port-Channel
      vpc 1109
      switchport access vlan 64

  • N5K FabricPath/vPC+

    Hello,
    I have problem with vPC`+ in N5K. I think that all my setup it's ok but my peers are not reachables in fabricpath in the vpc domain.
    n5k-del-1(config)# show vpc
    Legend:
                    (*) - local vPC is down, forwarding via vPC peer-link
    vPC domain id                     : 21
    vPC+ switch id                    : 121
    Peer status                       : peer adjacency formed ok
    vPC keep-alive status             : peer is alive
    vPC fabricpath status             : peer is not reachable through fabricpath
    Configuration consistency status  : success
    Per-vlan consistency status       : success
    Type-2 consistency status         : success
    vPC role                          : primary
    Number of vPCs configured         : 0
    Peer Gateway                      : Disabled
    Dual-active excluded VLANs        : -
    Graceful Consistency Check        : Enabled
    Auto-recovery status              : Enabled (timeout = 240 seconds)
    vPC Peer-link status
    id   Port   Status Active vlans
    1    Po1    up     -
    n5k-del-2(config)# show vpc
    Legend:
                    (*) - local vPC is down, forwarding via vPC peer-link
    vPC domain id                     : 21
    vPC+ switch id                    : 121
    Peer status                       : peer adjacency formed ok
    vPC keep-alive status             : peer is alive
    vPC fabricpath status             : peer is not reachable through fabricpath
    Configuration consistency status  : success
    Per-vlan consistency status       : success
    Type-2 consistency status         : success
    vPC role                          : secondary
    Number of vPCs configured         : 0
    Peer Gateway                      : Disabled
    Dual-active excluded VLANs        : -
    Graceful Consistency Check        : Enabled
    Auto-recovery status              : Enabled (timeout = 240 seconds)
    vPC Peer-link status
    id   Port   Status Active vlans
    1    Po1    up     -
    n5k-del-1(config)# show run int port-channel 1
    !Command: show running-config interface port-channel1
    !Time: Tue Mar  3 12:31:16 2009
    version 6.0(2)N2(3)
    interface port-channel1
      switchport mode fabricpath
      spanning-tree port type network
      vpc peer-link
    n5k-del-1(config)# show port-channel summary
    Flags:  D - Down        P - Up in port-channel (members)
            I - Individual  H - Hot-standby (LACP only)
            s - Suspended   r - Module-removed
            S - Switched    R - Routed
            U - Up (port-channel)
            M - Not in use. Min-links not met
    Group Port-       Type     Protocol  Member Ports
          Channel
    1     Po1(SU)     Eth      LACP      Eth1/1(P)    Eth1/2(P)    Eth1/17(P)
                                         Eth1/18(P)
    n5k-del-2(config)# show run int port-channel 1
    !Command: show running-config interface port-channel1
    !Time: Tue Mar  3 12:33:57 2009
    version 6.0(2)N2(3)
    interface port-channel1
      switchport mode fabricpath
      spanning-tree port type network
      vpc peer-link
    n5k-del-2(config)# show port-channel summary
    Flags:  D - Down        P - Up in port-channel (members)
            I - Individual  H - Hot-standby (LACP only)
            s - Suspended   r - Module-removed
            S - Switched    R - Routed
            U - Up (port-channel)
            M - Not in use. Min-links not met
    Group Port-       Type     Protocol  Member Ports
          Channel
    1     Po1(SU)     Eth      LACP      Eth1/1(P)    Eth1/2(P)    Eth1/17(P)
                                         Eth1/18(P)
    n5k-del-1(config)# show run fabricpath
    !Command: show running-config fabricpath
    !Time: Tue Mar  3 12:32:02 2009
    version 6.0(2)N2(3)
    install feature-set fabricpath
    feature-set fabricpath
    vpc domain 21
      fabricpath switch-id 121
    interface port-channel1
      switchport mode fabricpath
    interface Ethernet1/1
      switchport mode fabricpath
    interface Ethernet1/2
      switchport mode fabricpath
    interface Ethernet1/17
      switchport mode fabricpath
    interface Ethernet1/18
      switchport mode fabricpath
    fabricpath domain default
    fabricpath switch-id 21
    n5k-del-2(config)# show run fabricpath
    !Command: show running-config fabricpath
    !Time: Tue Mar  3 12:31:17 2009
    version 6.0(2)N2(3)
    install feature-set fabricpath
    feature-set fabricpath
    vpc domain 21
      fabricpath switch-id 121
    interface port-channel1
      switchport mode fabricpath
    interface Ethernet1/1
      switchport mode fabricpath
    interface Ethernet1/2
      switchport mode fabricpath
    interface Ethernet1/17
      switchport mode fabricpath
    interface Ethernet1/18
      switchport mode fabricpath
    fabricpath domain default
    fabricpath switch-id 22
    n5k-del-1(config)# show run vpc
    !Command: show running-config vpc
    !Time: Tue Mar  3 12:36:23 2009
    version 6.0(2)N2(3)
    feature vpc
    vpc domain 21
      role priority 100
      peer-keepalive destination 10.0.0.22 source 10.0.0.21
      auto-recovery
      fabricpath switch-id 121
      ip arp synchronize
    interface port-channel1
      vpc peer-link
    n5k-del-2(config)# show run vpc
    !Command: show running-config vpc
    !Time: Tue Mar  3 12:36:01 2009
    version 6.0(2)N2(3)
    feature vpc
    vpc domain 21
      role priority 110
      peer-keepalive destination 10.0.0.21 source 10.0.0.22
      auto-recovery
      fabricpath switch-id 121
      ip arp synchronize
    interface port-channel1
      vpc peer-link
    any idea?
    Best Regards

    Hi,
    The issue you have is that you don't have any VLANs configured and operating in FabricPath mode i.e.,
    !vlan 100  mode fabricpath!
    I just set this up using your configuration and see exactly the same behavior until a VLAN is created that then has mode fabricpath configured.
    If you look at the peer-link state in the FabricPath topology and active the VLANs I think you'll see the forwarding state of the interface is DOWN and there are no active VLANs.
    N5K-p10-1# sh fabricpath isis interface port-channel 101Fabricpath IS-IS domain: defaultInterface: port-channel101  Status: protocol-up/link-up/admin-up  Index: 0x0001, Local Circuit ID: 0x01, Circuit Type: L1  No authentication type/keychain configured  Authentication check specified  Extended Local Circuit ID: 0x16000064, P2P Circuit ID: 0000.0000.0000.00  Retx interval: 5, Retx throttle interval: 66 ms  LSP interval: 33 ms, MTU: 1500  P2P Adjs: 1, AdjsUp: 1, Priority 64  Hello Interval: 10, Multi: 3, Next IIH: 00:00:03  Level   Adjs   AdjsUp  Metric   CSNP  Next CSNP  Last LSP ID  1          1        1      20     60  00:00:35   ffff.ffff.ffff.ff-ff  Topologies enabled:    Topology Metric  MetricConfig Forwarding    0        20      no           DOWNN5K-p10-1# sh fabricpath topology interface port-channel 101Interface           Topo-Description                 Topo-ID    Topo-IF-State------------------- -------------------------------- ---------- -------------port-channel101     0                                0               DownN5K-p10-1# sh fabricpath topology vlan activeTopo-Description                 Topo-ID   Active VLAN List-------------------------------- --------- -------------------------------------0                                0         --
    If you then change the VLAN mode from mode ce to mode fabricpath (note that you need to exit the vlan configuration mode for the change to take effect), you should see the following SYSLOG message:
    2014 Feb  3 12:50:23 N5K-p10-1 %ETHPORT-3-IF_ERROR_VLANS_REMOVED: VLANs 99-100 on Interface port-channel101 are removed from suspended state.2014 Feb  3 12:50:23 N5K-p10-1 %L3VM-5-FP_TPG_INTF_UP: Interface port-channel101 up in fabricpath topology 0
    And then show vpc will indicate that the vPC fabricpath status as "peer is reachable through fabricpath"
    N5K-p10-1# sh vpcLegend:                (*) - local vPC is down, forwarding via vPC peer-linkvPC domain id                   : 21vPC+ switch id                  : 121Peer status                     : peer adjacency formed okvPC keep-alive status           : peer is alivevPC fabricpath status           : peer is reachable through fabricpath[snip]N5K-p10-1# show fabricpath isis interface port-channel 101
    Fabricpath IS-IS domain: default
    Interface: port-channel101
      Status: protocol-up/link-up/admin-up
      Index: 0x0001, Local Circuit ID: 0x01, Circuit Type: L1
      No authentication type/keychain configured
      Authentication check specified
      Extended Local Circuit ID: 0x16000064, P2P Circuit ID: 0000.0000.0000.00
      Retx interval: 5, Retx throttle interval: 66 ms
      LSP interval: 33 ms, MTU: 1500
      P2P Adjs: 1, AdjsUp: 1, Priority 64
      Hello Interval: 10, Multi: 3, Next IIH: 00:00:01
      Level   Adjs   AdjsUp  Metric   CSNP  Next CSNP  Last LSP ID
      1          1        1      20     60  00:00:47   ffff.ffff.ffff.ff-ff
      Topologies enabled:
        Topology Metric  MetricConfig Forwarding
        0        20      no           UP
    TN5K-p10-1# show fabricpath topology vlan active
    Topo-Description                 Topo-ID   Active VLAN List
    0                                0         99-100
    Regards

Maybe you are looking for