TRM N55K L2only-Config Tshoot Jdinkin2 2hr 20120208
TRM N55K L2only-Config Tshoot Jdinkin2 2hr 20120208
TRM N55K L2only-Config Tshoot Jdinkin2 2hr 20120208
Cisco Confidential
Agenda
Nexus 5500 Series Hardware and Architecture
Device Management
In-Service Software Upgrade (ISSU)
Layer 2 Switching
Virtual Port Channel (vPC)
Multicast
Quality of Service (QoS)
Troubleshooting
Cisco Confidential
Cisco Confidential
Nexus 5548UP
Nexus 5596UP
Cisco Confidential
Console
Fan Module
Expansion Module
USB Flash
Fan Module
Power Entry
N + N Redundant FANs
2008 Cisco Systems, Inc. All rights reserved.
Power Entry
N + N Power Supplies
Cisco Confidential
3 Expansion Modules
Power Supply
N + N Power Supplies
Fan Module
Console
Fan Module
Fan Module
USB Flash
Fan Module
N + N Redundant FANs
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
16 x 1/10GE
8 x 1/10GE +
8 x 1/2/4/8G FC
16 unified ports
individually
configurable as 1/10GE
or 1/2/4/8G FC
L3 module for
160G of L3 I/O
bandwidth
Cisco Confidential
CLI to configure 1G
switch(config)# interface Ethernet1/1
switch(config-if)# speed 1000
5.0(3)N1(1)
Required for
1Gbps Support!
Cisco Confidential
$5,000
Nexus
Nexus5548P
5548P
Nexus
5548UP
Nexus 5548UP
Nexus
Nexus 5596UP
5596UP
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Hardware
Availability
Front-to-Back Airflow, AC
Power
Nexus
5548P/5548UP/5596UP
Today
Back-to-Front Airflow, AC
Power
Nexus 5548UP/5596UP
Nexus 5548UP
Nexus 5596UP (Future)
Front-to-Back Airflow, DC
Power
Nexus 5548UP/5596UP
Nexus 5548UP
Nexus 5596UP (Future)
Back-to-Front Airflow, DC
Power
N/A
N/A
Cisco Confidential
10
Fan
Airflow
Speed(%)
Speed(RPM)
Direction
--------------------------------------------------1
Front-to-Back
40
6733
Front-to-Back
40
6609
Front-to-Back
40
6835
Front-to-Back
40
6792
Front-to-Back
40
6683
Front-to-Back
40
6683
Front-to-Back
40
6758
Front-to-Back
40
6861
Cisco Confidential
11
10 Gig
Gen 2 UPC
Gen 2 UPC
Gen 2 UPC
DRAM
DDR3
CPU Intel
Jasper
Forest
South
Bridge
Flash
12 Gig
Memory
PCIe x8
NVRAM
Serial
PEX 8525
4 port PCIE
Switch
Console
PCIe x4
Gen 2 UPC
...
Gen 2 UPC
PCIE
Dual Gig
0 1
PCIE
Dual Gig
0 1
PCIE
Dual Gig
0 1
L2
L1
Mgmt 0
Cisco Confidential
12
Unified Port
Controller 2
Cisco Confidential
MMAC + Buffer +
Forwarding
MMAC + Buffer +
Forwarding
MMAC + Buffer +
Forwarding
MMAC + Buffer +
Forwarding
MMAC + Buffer +
Forwarding
MMAC + Buffer +
Forwarding
Forwarding controller
MMAC + Buffer +
Forwarding
14
Memory
PCIe x8
Management Interfaces
10/100/1000BASE-T: mgmt0 partitioned
from inbound-hi VLANs
NVRAM
Serial
PEX 8525
4 port PCIE
Switch
PCIe x4
PCIE
Dual Gig
0 1
South
Bridge
Flash
DRAM
DDR3
CPU Intel
Jasper
Forest
Console
PCIE
Dual Gig
0 1
PCIE
Dual Gig
0 1
Mgmt 0
inbound-hi Data Path
to CPU
Cisco Confidential
15
CPU Intel
Jasper
Forest
PEX 8525
4 port PCIE
Switch
NIC
0 1
SDP
ICMP
Cisco Confidential
16
CPU Intel
Jasper
Forest
PEX 8525
4 port PCIE
Switch
NIC
0 1
SDP
ICMP
Cisco Confidential
17
CPU Intel
Jasper
Forest
PEX 8525
4 port PCIE
Switch
NIC
0 1
LACP: 1 Mbps
DCX: 2 Mbps
Satellite Discovery protocol: 2 Mbps
IGMP: 1 Mbps
DHCP: 1 Mbps
Egress
Policiers
...
BPDU
SDP
ICMP
Cisco Confidential
18
NX-OS
Etheranalyzer
Process
PEX 8525
4 port PCIE
Switch
NIC
0 1
NIC
0 1
Mgmt 0
Metric:1
Unified Port
Controller 2
Cisco Confidential
19
1/1
1/2
1/3
1/4
1/5
1/6
1/7
1/8
...
0 1 2 3 4 5 6 7
UPC #0
UPC #7
...
Cisco Confidential
20
1G Ethernet Copper/Fibre
10G DCB/FCoE Copper/Fibre
1/2/4/8G Fibre Channel
5548P
5548UP, 5596UP
& N55-M16UP
Unified Port
Controller 2
Ethernet
PHY
SFP+
Cage
Unified Port
Controller 2
Ethernet PHY
1/10G on all ports
SFP+
Cage
2008 Cisco Systems, Inc. All rights reserved.
21
Eth Ports
Slot 1
Slot 3 GEM
Eth
FC
Slot 4 GEM
Eth
FC
FC Ports
Eth Ports
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
22
Nexus 5500
Station (MAC) Table allocation
Nexus 5500 has a 32K Station table entries
4k reserved for multicast (Multicast MAC addresses)
3k assumed for hashing conflicts (very conservative)
Nexus 5500
UPC
Station Table
32k entries
4k entries for
IGMP
3k entries for potential hash collision space
Cisco Confidential
23
Forwarding
Packet is serialized
across Fabric once
forwarding decision
is made
Unified Crossbar
Fabric
Forwarding
Egress Queue is
only used if
Pause Frame
Received while
packet in-flight
Cisco Confidential
24
Ingress
10G
Ingress
10G
Ingress
1G
Ingress
1G
Unified Crossbar
Fabric
Unified Crossbar
Fabric
Unified Crossbar
Fabric
Unified Crossbar
Fabric
Egress
10G
Egress
1G
Egress
10G
Egress
1G
Cut-Through
Mode
Cut-Through
Mode
Cisco Confidential
25
For Your
Reference
Destination Interface
Switching Mode
10 GigabitEthernet
10 GigabitEthernet
Cut-Through
10 GigabitEthernet
1 GigabitEthernet
Cut-Through
1 GigabitEthernet
1 GigabitEthernet
Store-and-Forward
1 GigabitEthernet
10 GigabitEthernet
Store-and-Forward
FCoE
Fibre Channel
Cut-Through
Fibre Channel
FCoE
Store-and-Forward
Fibre Channel
Fibre Channel
Store-and-Forward
FCoE
FCoE
Cut-Through
Cisco Confidential
26
Bad Fibre
Corrupt Frame
with original
CRC
Ingress
UPC
Corrupt
Frame with
Stomped
CRC
Unified Crossbar
Fabric
Egress
UPC
Corrupt Frame
with Stomped
CRC
Cisco Confidential
27
Eth
1/39
0 1
dc11-5548-4# sh int eth 1/39
<snip>
RX
576 unicast packets 4813153 multicast packets 55273 broadcast packets
4869002 input packets 313150983 bytes
31 jumbo packets 0 storm suppression packets
0 runts 0 giants 0 CRC 0 no buffer
0 input error 0 short frame 0 overrun
0 underrun 0 ignored
0 watchdog 0 bad etype drop 0 bad proto drop 0 if down drop
0 input with dribble 0 input discard
0 Rx pause
Ingress
UPC
Unified Crossbar
Fabric
Egress
UPC
Eth
2/4
Cisco Confidential
28
Ingress
UPC
Unified Crossbar
Fabric
Egress
UPC
Cisco Confidential
29
Egress Queue
0 is full, link
congested
Cisco Confidential
30
Packet is able to
be sent to the
fabric for Eth 1/8
Packets
Queued for
Eth 1/20
Egress
Queue 0
is free
Egress
Queue 0
is full
Unified Crossbar
Fabric
Eth 1/8
Cisco Confidential
31
Cisco Confidential
32
For Your
Reference
Reference
Nexus
5010
Nexus
5020
Nexus
5548P
Nexus
5548UP
Nexus
5596UP
520Gbps
1.04Tbps
960Gbps
960Gbps
1.92Tbps
1RU
2RU
1RU
1RU
2RU
16
48
48
96
26
52
48
48
96
12
16
48
96
~ 3.2us
~ 3.2us
~2.0us
~1.8us
~ 1.8us
512
512
4096
4096
4096
Port-to-Port Latency
No. of VLANs
Layer 3 Capability
576
576
1152
1152
1152
384
384
768
768
768
Cisco Confidential
33
Device Management
Cisco Confidential
34
Cisco Confidential
35
Fundamentals
Important Cisco NX-OS and Cisco IOS Differences
In Cisco NX-OS:
When you first log into the NX-OS, you go directly into EXEC mode.
Cisco Confidential
36
Fundamentals (contd)
Important Cisco NX-OS and Cisco IOS Differences
In Cisco NX-OS:
The Cisco NX-OS has the ability to enable and disable features such as OSPF,
BGP, etc using the feature configuration command. Configuration and
verification commands are not available until you enable the specific feature.
Interfaces are labeled in the configuration as Ethernet. There arent any speed
designations.
The Cisco NX-OS has two preconfigured VRF instances by default
(management, default). The management VRF is applied to the supervisor
module out-of-band Ethernet port (mgmt0), and the default VRF instance is
applied to all other I/O module Ethernet ports. The mgmt0 port is the only port
permitted in the management VRF instance and cannot be assigned to another
VRF instance.
SSHv2 server/client functionality is enabled by default. TELNET server
functionality is disabled by default. (The TELNET client is enabled by default and
cannot be disabled.)
VTY and Auxiliary port configurations do not show up in the default
configuration unless a parameter is modified (The Console port is included in
the default configuration). The VTY port supports 32 simultaneous sessions and
the timeout is disabled by default for all three port types
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
37
Fundamentals (contd)
Important Cisco NX-OS and Cisco IOS Differences
In Cisco NX-OS:
The Console and VTY ports always prompt the user for a username/password
pair for authentication before granting access to the CLI. The Cisco IOS applies
the login command to the Console and VTY ports by default to enable password
authentication (If the no login command is applied, a user can gain access
without a password.).
A user can execute show commands in configuration mode without using the
do command as in Cisco IOS Software.
When executing a show command, a user has several more options when
using the pipe (|) option such as grep for parsing the output, perl for activating a
script, and xml to format the output for network management applications.
Cisco Confidential
38
Fundamentals
Things You Should Know
The default administer user is predefined as admin. An admin user password
has to be specified when the system is powered up for the first time, or if the
running configuration is erased with the write erase command and system is
repowered.
The license grace-period can be disabled without any impact if the proper
license is installed for a feature within the 120 day grace period.
If you remove a feature with the global no feature configuration command, all
relevant commands related to that feature are removed from the running
configuration. Some features such as LaCP and vPC will not allow you to disable
the feature if they are configured.
The NX-OS uses a kickstart image and a system image. Both images are
identified in the configuration file as the kickstart and system boot variables. The
boot variables determine what version of NX-OS is loaded when the system is
powered on. (The kickstart and system boot variables have to be configured for
the same NX-OS version.)
The show running-config command accepts several options, such as OSPF,
BGP, etc that will display the runtime configuration for a specific feature.
The show tech command accepts several options that will display information
for a specific feature.
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
39
Fundamentals
Things You Should Know
The NX-OS has a configuration checkpoint/rollback feature that should be
used when making changes to a production network. A checkpoint configuration
can be saved in EXEC mode with the global checkpoint command and the
rollback procedure can be executed with the rollback command.
Cisco Confidential
40
Fundamentals
Command Comparison: NX-OS vs IOS
Cisco IOS CLI
n5000#
Cisco Confidential
41
Fundamentals
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
Installing a License
Cisco IOS Software does not require a
license file installation.
Cisco Confidential
42
Fundamentals
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
Enabling Features
Cisco IOS Software does not have the
functionality to enable or disable features.
feature ospf
feature telnet
Cisco Confidential
43
Fundamentals
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
line console
exec-timeout 15 (minutes only)
line vty
session-limit 10
exec-timeout 15 (minutes only)
Cisco Confidential
44
Fundamentals
Troubleshooting and Verification Commands
Cisco NX-OS
Interface
show running-config
show running-config
show startup-config
show startup-config
show interface
show interface
show interface ethernet
show interface <int type>
<x/x>
show interface mgmt 0 show boot
show boot
show clock
show clock
Command Description
Displays the running configuration
Displays the startup configuration
Displays the status for all of the interfaces
Displays the status for a specific interface
Cisco Confidential
45
Fundamentals
Troubleshooting and Verification Commands (contd)
Cisco NX-OS
show environment
clock
show environment fan
show environment
power
show environment
temperature
-
Cisco IOS
Software
show environment
status clock
show environment
cooling fan-tray
show power
show environment
temperature
-
show feature
show log
show module
show module
Command Description
Displays clock status for A/B and active clock
Displays fan status
Displays power budget
Displays environment data
Cisco Confidential
46
Fundamentals
Troubleshooting and Verification Commands (contd)
Cisco NX-OS
show process cpu
show process cpu
history
show process cpu
sorted
show system cores
show system
exception-info
show system
resources
Cisco IOS
Software
Command Description
show exception
show tech-support
show tech-support
show tech-support
<name>
show tech-support
<name>
Cisco Confidential
47
Fundamentals
Troubleshooting and Verification Commands (contd)
Cisco NX-OS
Cisco IOS
Software
show version
show version
show line
show line com1
show line console
show line console
connected
show terminal
show users
show line
show line console 0
show terminal
show users
Command Description
Cisco Confidential
48
Fundamentals
Troubleshooting and Verification Commands (contd)
Cisco NX-OS
show vrf
show vrf <name>
show vrf <name>
detail
show vrf <name>
interface
show vrf default
show vrf detail
show vrf interface
show vrf
management
Cisco IOS
Software
Command Description
show ip vrf
show ip vrf <name>
Cisco Confidential
49
Fundamentals
Troubleshooting and Verification Commands (contd)
Cisco NX-OS
Cisco IOS
Command Description
Software
show license
show license brief
Cisco Confidential
50
Cisco Confidential
51
Interfaces
Important Cisco NX-OS and Cisco IOS Differences
In Cisco NX-OS:
SVI command-line interface (CLI) configuration and verification commands are
not available until you enable the SVI feature with the feature interface-vlan
command.
Only 802.1q trunks are supported, so the encapsulation command isn't
necessary when configuring a layer-2 switched trunk interface. (Cisco ISL is not
supported)
An IP subnet mask can be applied using /xx or xxx.xxx.xxx.xxx notation when
configuring an IP address on a layer-3 interface. The IP subnet mask is displayed
as /xx in the configuration and show interface command output regardless
which configuration method is used.
The CLI syntax for specifying multiple interfaces is different in Cisco NX-OS
Software. The range keyword has been omitted from the syntax (IE: interface
ethernet 1/1-2)
When monitoring interface statistics with the show interface CLI command, a
configurable load-interval can be configured per interface with the load-interval
counters command to specify sampling rates for bit-rate and packet-rate
statistics. The Cisco IOS Software supports the load-interval interface command,
but doesn't support multiple sampling rates.
A locator-LED (beacon) that allows remote-hands-support personnel to easily
identify a specific port. The beacon light can be enabled per interface in interface
configuration mode with the beacon CLI command.
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
52
Interfaces (contd)
Important Cisco NX-OS and Cisco IOS Differences
In Cisco NX-OS:
An administrator can configure port profiles as templates that can be applied
to a large number of interfaces to simplify the CLI configuration process. Port
profiles are "live" configuration templates, so modifications to a port profile are
automatically applied to the associated interfaces. Cisco IOS uses port macros
to simplify the CLI configuration process, but unlike Port Profiles they are
applied one time.
The out-of-band management ethernet port is configured with the interface
mgmt 0 CLI command.
Proxy ARP is disabled on all interfaces by default.
Cisco Confidential
53
Interfaces
Things You Should Know
The default port type is configurable for L3 routed or L2 switched in
the setup startup script. (L3 is the default port type prior to running the
script)
A layer-2 switched trunk port sends and receives traffic for all VLANs
by default (This is the same as Cisco IOS Software). Use the switchport
trunk allowed vlan interface CLI command to specify the VLANs allowed
on the trunk.
The clear counters interface ethernet <x/x> CLI command resets the
counters for a specific interface.
An interface configuration can be reset to its default values with the
default interface <x/x> global configuration command.
Cisco Confidential
54
Interfaces
Command Comparison: NX-OS vs IOS
Cisco IOS CLI
ip address 192.168.1.1/24
no shutdown
no shutdown
vlan 10
switchport
switchport
no shutdown
no shutdown
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
55
Interfaces
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
feature interface-vlan
interface vlan 10
interface vlan 10
ip address 192.168.1.1./24
no shutdown
no shutdown
Cisco Confidential
56
Interfaces
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
no shutdown
no shutdown
Cisco Confidential
57
Interfaces
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
no switchport
no switchport
no shutdown
no shutdown
interface gigabitethernet1/1.10
encapsulation dot1Q 10
encapsulation dot1q 10
ip address 192.168.1.1/24
no shutdown
no shutdown
Cisco Confidential
58
Interfaces
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
Cisco Confidential
59
Interfaces
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
no shutdown
description Email Server Port
state enabled
interface ethernet 2/1-48
inherit port-profile Email-Template
Cisco Confidential
60
Interfaces
Troubleshooting and Verification Commands
Cisco NX-OS
Interface
show interface
show interface
Command Description
Cisco Confidential
61
Interfaces
Troubleshooting and Verification Commands (contd)
Cisco NX-OS Interface
show interface
flowcontrol
Cisco Confidential
62
Interfaces
Troubleshooting and Verification Commands (contd)
Cisco NX-OS Interface
Command Description
Cisco Confidential
63
Interfaces
Troubleshooting and Verification Commands (contd)
Cisco IOS
Software
Interface
Command Description
show port-profile
Cisco Confidential
64
CLI Overview
The Cisco NX-OX CLI shares a lot of concepts as Cisco IOS software, so initial
configuration is very simple. The commands can be abbreviated, the ? provides
online help, and the <TAB> key auto-fills command options.
User Exec Mode:
n5500#
Attaching to a Module:
n5500# attach module 1
Attaching to module 1 ...
module-1#
Cisco Confidential
65
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Enable/Disable
Cisco Confidential
66
NX-OS software
NX-OS versions
File locations
plugin
Core Plugin, Ethernet Plugin
`<truncated>
Cisco Confidential
67
Cisco Confidential
68
inter mgmt0
ip access-group xx in/out
line vty
Ip access-class xx in/out
Presentation_ID
Cisco Confidential
Cisco Confidential
70
N5K# configure
N5K(config)# username admin password cae123rtp role network-admin
N5K(config)# username operator password oper1234 role network-operator
user:operator is reserved
N5K(config)# username paul password oper1234 role network-operator
N5K(config)# sh run | incl username
username admin password 5 $1$6KdEue0H$vexPxI/qjJNZrRmg8nsIo. role networkadmin
username paul password 5 $1$PvSqwWxh$gxL46OnByOVe8ZC5zOj0b. role networkoperator
N5K(config)# sh run | incl snmp-server
snmp-server user paul network-operator auth md5
0x72fffc91ff1de08468c5b1c3c0acd1
11 priv 0x72fffc91ff1de08468c5b1c3c0acd111 localizedkey
snmp-server user admin network-admin auth md5
0x25bb8f4349b3217abb2672edc84981ac
priv 0x25bb8f4349b3217abb2672edc84981ac localizedkey
Cisco Confidential
71
Cisco Confidential
72
User Description
Role Description
Note: a user is assigned to the network-operator role if a role isnt specified when the user is created.
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
73
Create a Role:
n5500(config)# role name ospf-admin
n5500(config-role)# rule 1 permit command show interface *
n5500(config-role)# rule 2 permit command show running-config
n5500(config-role)# rule 3 permit read-write feature router-ospf
n5500(config-role)# rule 4 permit command config t ; interface *
n5500(config-role)# rule 5 permit command copy running-config startup-config
Allow a user to
configure OSPF, verify
the configuration and
save the runningconfiguration
If a users role is modified, the changes do not take effect until that user logs
out and back into the system.
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
74
Clears the
logfile
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
75
Configured Host
V1 is the default
Cisco Confidential
76
Verification:
n5500# show snmp community
Community
--------cisco123
Group / Access
context acl_filter
-------------------- ---------network-operator
snmp-ro
Cisco Confidential
77
Cisco Confidential
78
Cisco Confidential
79
Cisco Confidential
80
The aaa accounting default command enables accounting for start and stop records as
well as command accounting (Exec mode and configuration mode). Cisco IOS Software
requires additional aaa accounting commands to enable both types of accounting.
Cisco Confidential
81
RADIUS and TACACS+ server keys can be specified for a group of servers or
per individual server.
Cisco Confidential
82
Directed server requests are enabled by default for RADIUS and TACACS+.
The local option can be used with AAA authorization to fallback to local
privilege-levels or RBAC in the event a AAA server is not available for command
authorization.
RADIUS and TACACS+ support global server test monitoring (Per server
monitoring takes precedence over global monitoring).
Use the show running-config command with the AAA, radius or tacacs+
option to display the running configuration for a specific feature.
Cisco Confidential
83
radius-server timeout 10
Cisco Confidential
84
Enabling TACACS+
Cisco IOS Software does not have the ability to
feature tacacs+
enable or disable TACACS+.
tacacs-server timeout 10
Cisco Confidential
85
Cisco Confidential
86
Cisco Confidential
87
aaa authorization
config-commands default group AAA-Servers
aaa authorization commands default group AAAServers
Cisco Confidential
88
Cisco IOS
Command Description
Software Interface
Cisco Confidential
89
Cisco Confidential
90
show tacacs-server
show tacacs
show tacacs-server
<x.x.x.x>
show tacacs-server
directed-request
show tacacs-server groups show tacacs-server sorted show tacacs-server
statistics <x.x.x.x>
show user-account
show users
show users
Cisco Confidential
91
NTP Configuration:
n5500(config)# ntp server 10.20.8.129 prefer use-vrf management
n5500(config)# ntp server 10.20.8.130 use-vrf management
n5500(config)# ntp source 10.205.225.43
Timezone Configuration:
n5500(config)# clock ?
summer-time Configure summer (daylight savings) time
timezone Configure time zone
Cisco Confidential
92
Cisco Confidential
93
Cisco Confidential
94
During this time, control plane functions of the switch undergoing ISSU are temporarily
suspended, and configuration changes disallowed. The control plane will be brought
online again within 80 seconds to allow protocol communications again.
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
95
Cisco Confidential
96
FEX Active-Active
FEX Straight-Through
Throughout the ISSU process, VPC roles will remain intact. It is the peer switchs responsibility to hold
onto its state until ISSU process is complete
Cisco Confidential
97
The Nexus 5500/2000 switch undergoing ISSU must be a leaf on the spanning tree.
The switch should not be a root switch or have any designated non-edge ports in the
STP topology
Bridge Assurance must be disabled for non-disruptive ISSU
STP Primary Root
Non-Disruptive ISSU
OK Here
STP Edge Ports
Cisco Confidential
98
The Telnet/SSH daemons rely on the startup configs of the switch. As the device is
restarted, all Telnet/SSH sessions will be disconnected and need to be re-established
after ISSU completes
AAA/RADIUS
Applications that leverage the AAA Service (such as Login) will be disabled during ISSU
process. Since all Network Management services are disabled during this time, this
behavior is consistent.
HTTP
The HTTP sessions to the Switch will be disconnected during ISSU reboot. After ISSU
reboot, the HTTPd will be restarted and switch will accept HTTP sessions after ISSU
reboot.
NTP
The ntp sessions to and from the switch are disrupted during ISSU reboot. After ISSU
reboot, ntp session will be re-established based on the saved startup configuration.
99
ISSU Requirements
Ensure the system and kickstart images are compatible with each
other.
If the fabric extenders are not compatible with the software image
you install on the Nexus 5500 switch, some traffic disruption may
occur depending on the configuration. The install all command
output identifies these commands.
Cisco Confidential
100
Pre-ISSU Check #1
DCN-N5K1# show spanning issu-impact
For ISSU to Proceed, Check the Following Criteria :
1. No Topology change must be active in any STP instance
2. Bridge assurance(BA) should not be active on any port
(except vPC peer-link)
3. There should not be any Non Edge Designated
Forwarding port (except vPC peer-link)
4. ISSU criteria must be met on the VPC Peer Switch as well
Following are the statistics on this switch
No Active Topology change Found!
Criteria 1 PASSED !!
No Ports with BA Enabled Found!
Criteria 2 PASSED!!
Cisco Confidential
101
Pre-ISSU Check #2
show install all impact kickstart <image> system <image>
Displays information describing the impact of the upgrade on
each fabric extender including details such as upgrade image
versions.
This command will also display if the upgrade is
disruptive/non-disruptive and the reason why.
Compatibility check is done:
Module bootable
Impact
------ -------- -------------1
yes non-disruptive
100
yes non-disruptive
FEX
Install-type
-----------reset
rolling
Reason
------
rolling upgrade
means each FEX
updated one at a time
Cisco Confidential
102
Layer 2 Switching
Cisco Confidential
103
VLAN Scalability
The Cisco Nexus 5500 Series
Hardware supports 4096
VLANs
Cisco Confidential
104
Cisco Confidential
105
VLAN Configuration
VLANs provide layer-2 separation boundaries for unicast, multicast, and broadcast packets.
The Cisco Nexus 5500 Series Hardware supports 4096 VLANs.
Configuration:
n5500(config)# vlan 10
n5500(config-vlan)# ?
ip
Configure IP features
media
Media type of the VLAN
name
Ascii name of the VLAN
no
Negate a command or set its defaults
remote-span Enable remote span VLAN
service-policy Configure service policy for an interface
shutdown
Shutdown VLAN switching
state
Operational state of the VLAN
Created VLAN 10
Verification:
n5500# show vlan
VLAN Name
Status Ports
---- -------------------------------- --------- --------1 default
active
10 email-vlan
active Eth2/1
11 VLAN0011
active
12 VLAN0012
active
<Text Omitted>
Cisco Confidential
106
VTP (*)
NXOS 5.0(2)N1(1) introduced
VTP client/server
Feature vtp
Inconsistent VTP
configurations are a Type 2
misconfiguration (so it is not
disruptive to vPC)
VTP v1 and v2
Cisco Confidential
107
Verification:
n5500# show vtp status
VTP Version
Configuration Revision
Maximum VLANs supported locally
VTP Operating Mode
VTP Domain Name
VTP Pruning Mode
VTP V2 Mode
VTP Traps Generation
:2
:0
: 1005
: Transparent
: cisco.com
: Disabled
: Enabled
: Disabled
Cisco Confidential
108
Spanning Tree
NX-OS - Spanning Tree Design
NX-OS STP modes
Rapid-PVST+ (Default mode)
MST (Supported)
NR
N R
Network Ports
All Send BPDUs
Access
Edge Ports
No BPDUs
Root port
Alternate port
Designated port
E
N
R
Edge port
Network port
Root Guard
Cisco Confidential
109
Edge *
Network
Normal (Default)
* Note: Trunk ports for L3 hosts can be configured with the edge trunk option
Port Configuration:
n5500(config-if-range)# spanning-tree port type ?
edge
Consider the interface as edge port (enable portfast)
network Consider the interface as inter-switch link
normal Consider the interface as normal spanning tree port
Port Verification:
n5500# show spanning-tree vlan 10
VLAN0010
Spanning tree enabled protocol rstp
<Text Omitted>
Interface
Role Sts Cost
Prio.Nbr Type
---------------- ---- --- --------- -------- ----------------------Eth2/3
Desg FWD 4
128.259 P2p
Eth2/4
Desg FWD 4
128.260 Edge P2p
Eth2/5
Desg FWD 4
128.261 Network P2p
Normal (Default)
Edge
Network
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
111
Stopped receiving
BPDUS!
BPDUs
Root
Protects against
unidirectional links and peer
switch software issues
Malfunctioning
switch
Network
Network
BA Inconsistent
Network
Network
BPDUs
BPDUs
BA Inconsistent
Blocked
Network
Network
Stopped receiving
BPDUS!
Edge
Edge
interface port-channel200
switchport mode trunk
switchport trunk allowed vlan 200-202
spanning-tree port type network
Cisco Confidential
112
Malfunctioning
switch
BPDUs
BPDUs
BPDUs
Blocked
Loop!
Cisco Confidential
113
Malfunctioning
switch
BPDUs
Root
Network
Network
BA Inconsistent
Network
Network
BPDUs
BPDUs
BA Inconsistent
Blocked
Network
Network
Stopped receiving
BPDUS!
Edge
Edge
Cisco Confidential
114
Enabled by default
Note: Both ends of the link must have Bridge Assurance enabled
Verification:
n5500# show spanning-tree summary
Switch is in mst mode (IEEE Standard)
Root bridge for: MST0002
Port Type Default
Edge Port [PortFast] BPDU Guard Default
Edge Port [PortFast] BPDU Filter Default
Bridge Assurance
Loopguard Default
Pathcost method used
PVST Simulation
is disabled
is disabled
is disabled
is enabled
is disabled
is long
is enabled
<Text Omitted>
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
115
-OR-
Presentation_ID
Cisco Confidential
Root Port
---------------This bridge is root
Ethernet1/13
Interface
Role Sts Cost
Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------Eth1/13
Desg FWD 4
128.141 P2p
Eth1/14
Desg FWD 4
128.142 P2p
VLAN0030
Spanning tree enabled protocol rstp
Root ID Priority 24606
Address 0018.bad8.5825
Cost
4
Port
141 (Ethernet1/13)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Cisco Confidential
117
Enable MST:
Cisco Confidential
118
Interface
Role Sts Cost
Prio.Nbr Type
---------------- ---- --- --------- -------- -------------------------------Eth1/25
Root FWD 20000 128.153 P2p
Cisco Confidential
119
3/2
3/1
3/2
3/1
Switch 1
Switch 2
DST MAC 0000.0000.4444
Cisco Confidential
120
BPDU Filtering
Loop Guard
Cisco Confidential
121
BPDU Guard
Prevents a switch from being plugged in on an Edge port
Port will move to STP BKN (show spanning-tree vlan x)
Recommended on access layer Edge or Edge Trunk ports
Two options for deployment in NX-OS:
Option 1: Enable on an interface:
DCN-N5K1(config-if)# spanning-tree bpduguard enable
Cisco Confidential
122
1. X-Connected
patch cable
2. BPDU Sent on
Link-Up
3. BPDU Guard
err-disables
edge port and
prevents loop
4. BPDU are not
sent once link is
up and active
Cisco Confidential
123
Loop Guard
Prevents a port from moving to forwarding upon loss of
BPDUs
Puts the port into loop_inconsistent state until BPDUs
are received again
Minimal benefit and not recommended for switches
running vPC
Deploy on access layer switches that are NOT
connected to the Agg layer using vPC
Global Configuration
n5K-1(config)#spanning-tree loopguard default
Interface Configuration
n5k-1(config-if)#spanning-tree guard loop
Cisco Confidential
126
Root Guard
Prevents Unwanted Changes to
STP Topology
Enable Root Guard on links
connecting to access layer to
protect from edge switches
becoming root and causing suboptimal traffic flow
Forces Layer 2 LAN interface to
be a designated port. If port
receives a superior BPDU, Root
Guard puts the interface into the
root-inconsistent (blocked) state
Channel the trunk between
Distribution Switches so failure
doesnt break topology
Secondary Root
Bridge
Root Bridge
Should never
receive a superior
BPDU
N R
Should never
receive a superior
BPDU
Root port
Alternate port
Designated port
Edge port
Network port
Root Guard
interface Ethernet1/32
description dc10-5548-4
switchport mode trunk
switchport trunk allowed vlan 15,98,180-183
spanning-tree port type network
spanning-tree guard root
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
128
Primary
vPC
vPC
Domain
Primary
Root
-
Network port
Edge Trunk
BPDU Guard
Rootguard
Loopguard
Secondary
vPC
HSRP
ACTIVE
Aggregation
HSRP
STANDBY
Layer 3
Secondary
Root
-
Access
-
E
B
E
B
E
B
E
B
Nexus
1000v
is disable
is disabled
is disabled
is disabled
is disabled
is short
Name
Blocking Listening Learning Forwarding STP Active
--------------------------------------------- -------- --------- -------- ---------- ---------VLAN0001
0
0
0
2
2
VLAN0213
0
0
0
3
3
--------------------------------------------- -------- --------- -------- ---------- ---------2 vlans
0
0
0
5
5
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
130
interface port-channel200
switchport mode trunk
switchport trunk allowed vlan 200-202
spanning-tree port type network
interface Ethernet1/33
switchport mode trunk
switchport trunk allowed vlan 200-202
udld enable
channel-group 200 mode active
interface Ethernet1/37
switchport mode trunk
switchport trunk allowed vlan 200-202
udld enable
channel-group 200 mode active
Nexus5500(config)# spanning-tree port type edge bpdufilter default
Cisco Confidential
131
Cisco Confidential
132
Cisco Confidential
133
Cisco Confidential
134
Port-channel Count
UPC/Carmel supports 48
hardware port-channels
In Summary Every port can be
a port-channel with either 5548
or 5596
You can bundle up to 16 ports
in a single port-channel
Portchannels configured
on FEX do not take any
resource from the Nexus
5500 switch
More details in the
following slides
Cisco Confidential
135
LACP
Turn on LACP globally first
switch(config)# feature lacp
Switch 2 mode
active
passive
Yes
passive
active
Yes
active
active
Yes
passive
passive
No
active or passive
on
No
on
active or passive
No
on
on
Cisco Confidential
136
Creating EtherChannel
Three channel group modes: active , passive and on.
Switch(conf)#interface e1/1
switch(config-if)# channel-group 1 mode ?
active
on
passive
Channel mode
Description
active
passive
on
Cisco Confidential
137
Static EtherChannel
Adds port to EtherChannel without negotiataion
channel-group 1 is same as channel-group 1 mode on
switch(config)# int ethernet 1/1
switch(config-if)# channel-group 1
Ethernet1/1 added to port-channel1
switch(config-if)# exit
switch(config)# int ethernet 1/2
switch(config-if)# channel-group 1 mode on
Ethernet1/2: already part of port-channel1
switch(config-if)#
Cisco Confidential
138
Cisco Confidential
139
Traffic Distribution:
n5500# show port-channel traffic
ChanId
Port
Rx-Ucst
------ -------------1
Eth1/13
100.00%
1
Eth1/14
0.0%
with 2 members
Usage:
n5500# show port-channel usage
Totally 1 port-channel numbers used
====================================
Used :
1
Unused:
2 - 4096
Presentation_ID
Cisco Confidential
140
Partner
Oper Key
0x0
Partner's information
Partner
Partner
Port
System ID
Port Number
Eth1/14
32768,0-18-ba-d8-58-250x10e
LACP Partner
Port Priority
32768
Partner
Oper Key
0x0
Neighboring device is
configured for Active mode
and sending Slow PDUs
Partner
Port State
0x3d
Age
284
Partner
Flags
SA
Partner
Port State
0x3d
Successful PDUs
Presentation_ID
Cisco Confidential
141
Cisco Confidential
142
Example:
DCN-N5k2# show port-channel load-balance forwarding-path interface po20 src-interface e1/1 vlan 49 src-ip 10.122.49.10 dst-ip
172.18.84.183
Missing params will be substituted by 0's.
Load-balance Algorithm on switch: source-dest-ip
crc8_hash: 148 Outgoing port id: Ethernet1/17
Param(s) used to calculate load-balance:
dst-ip: 172.18.84.183
src-ip: 10.122.49.10
dst-mac: 0000.0000.0000
src-mac: 0000.0000.0000
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
143
cae-n5k(config)# conf t
cae-n5k(config)# interface ethernet 1/3, ethernet 1/11
cae-n5k(config-if)# channel-group 5 force mode active
Ethernet1/3 Ethernet1/11 added to port channel 5
cae-n5k(config-if)#
cae-n5k(config-if)#
cae-n5k(config-if)#
cae-n5k(config-if)#
interface port-channel 5
switchport mode trunk
switchport trunk allowed vlan except 4093
no shut
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
144
Cisco Confidential
145
Virtual Port-Channel
Feature Overview
Allow a single device to use a
port channel across two
upstream switches
Eliminate STP blocked ports
Uses all available uplink
bandwidth
Dual-homed server operate in
active-active mode
Provide fast convergence upon
link/device failure
Physical Topology
Logical Topology
Si
Non-vPC
vPC
Cisco Confidential
146
Feature Overview
How does vPC help with STP?
Primary
Root
Before vPC
Secondary
Root
Protocol Failure
With vPC
No blocked uplinks
Lower oversubscription
EtherChannel load balancing (hash)
Cisco Confidential
147
vPC Terminology on
N5K-N2K
vPC peer
keepalive link
vPC peer
vPC
vPC
member
port
Cisco Confidential
148
Cisco Confidential
149
Cisco Confidential
150
Cisco Confidential
151
Cisco Confidential
152
For the destination address, use the mgmt0 IP address of the other N5K.
Cisco Confidential
153
Cisco Confidential
154
Cisco Confidential
155
Configuring vPC
The following example enables vPC with LaCP on one side of the vPC
Domain. The same config is required on the other vPC Domain member.
Enable the LaCP and vPC features first!
N5K(config)# feature lacp
N5K(config)# feature vpc
Configure the
vPC domain and
keep-alive link
Cisco Confidential
156
vPC Domains
vPC Domain defines the grouping of
switches participating in the vPC
Provides for definition of global vPC
system parameters
vPC Domain 20
Cisco Confidential
157
Virtual Port-Channel
Domain ID
vPC System MAC is used for both LACP System Identifier and STP bridge
ID. Uses IETF assigned range of 00:23:04:ee:be:00 -> 00:23:04:ee:c1:ff.
vPC Domain ID is encoded in the vPC System MAC within the last octet
and the trailing 2 bits of the previous octet
10 bits
vPC Domain ID
vPC Domain 10
vPC Domain 20
Cisco Confidential
158
LACP neighbour needs to see the same System ID from both vPC peers
The vPC system-mac is used by both vPC peers
dc11-5548-1# sh vpc role
<snip>
vPC system-mac
vPC system-priority
vPC local system-mac
vPC local role-priority
:
:
:
:
00:23:04:ee:be:14
1024
00:0d:ec:a4:53:3c
1024
:
:
:
:
00:23:04:ee:be:14
1024
00:0d:ec:a4:5f:7c
32667
dc11-5548-2
dc11-5548-1
1/33
1/34
dc11-4948-1
dc11-4948-1#sh lacp neighbor
<snip>
LACP port
Port
Flags
Priority Dev ID
Gi1/33
SA
32768
0023.04ee.be14
Gi1/34
SA
32768
0023.04ee.be14
Age
9s
21s
Admin
key
0x0
0x0
Oper
Key
0x801E
0x801E
Port
Number
0x4104
0x104
Port
State
0x3D
0x3D
Cisco Confidential
159
:
:
:
:
00:23:04:ee:be:14
1024
00:0d:ec:a4:53:3c
1024
dc11-5548-2
dc11-5548-1
MCEC (vPC)
Etherchannel
1/5
dc11-4948-1
dc11-4948-2
dc11-4948-2#sh lacp neighbor
<snip>
LACP port
Port
Flags
Priority Dev ID
Gi1/4
SA
32768
000d.eca4.533c
Gi1/5
SA
32768
000d.eca4.533c
Age
8s
8s
Admin
key
0x0
0x0
Oper
Key
0x1D
0x1D
Port
Number
0x108
0x108
Port
State
0x3D
0x3D
Cisco Confidential
160
Virtual Port-Channel
Peer Keepalive Link
Peer Keepalive provides an out-of-band
heartbeat between vPC peers
Purpose is to detect and resolve roles if
a Split Brain (Dual Active) occurs
Messages sent on 1 second interval with
5 second timeout
Peer Keepalive
carried over the
OOB management
network
int mgmt 0
Cisco Confidential
161
Virtual Port-Channel
vPC Peer Link
Peer Link carries both vPC data and
control traffic between peer switches
Carries any flooded and/or
orphan port traffic
Carries STP BPDUs, HSRP
Hellos, IGMP updates, etc.
vPC Peer
Link
Cisco Confidential
162
Secondary
(but may be
Operational
Primary)
Cisco Confidential
163
Virtual Port-Channel
vPC status
Highly Reliable - Inherited from MDS
CFS messages are encapsulated in
standard Ethernet frames (with CoS 6)
dc11-5548-2# show CFS status
Distribution : Enabled
Distribution over IP : Disabled
IPv4 multicast address : 239.255.70.83
IPv6 multicast address : ff15::efff:4653
Distribution over Ethernet : Enabled
Cisco Confidential
164
Virtual Port-Channel
dca-n7k2-vdc2
dc11-5548-2
interface port-channel201
switchport mode trunk
switchport trunk native vlan 100
switchport trunk allowed vlan 100-105
vpc 201
spanning-tree port type network
interface port-channel201
switchport mode trunk
switchport trunk native vlan 100
switchport trunk allowed vlan 100-105
vpc 201
spanning-tree port type network
Cisco Confidential
165
166
interface port-channel201
switchport mode trunk
switchport trunk native vlan 100
switchport trunk allowed vlan 100-105
vpc 201
spanning-tree port type network
interface port-channel201
switchport mode trunk
switchport trunk native vlan 100
switchport trunk allowed vlan 100-105
vpc 201
spanning-tree port type network
spanning-tree guard root
167
interface port-channel201
switchport mode trunk
switchport trunk native vlan 100
switchport trunk allowed vlan 100-105
vpc 201
spanning-tree port type network
interface port-channel201
switchport mode trunk
switchport trunk native vlan 105
switchport trunk allowed vlan 100-104
vpc 201
spanning-tree port type network
168
mst region
vlans 1-5, 12
vPC
mst region
vlans 1-5, 10
vPC
vPC
169
Global QoS
Parameters
need to be
consistent
Global
Spanning
Tree
Parameters
need to be
consistent
170
Name
------------STP Port Type
STP Port Guard
STP MST Simulate PVST
lag-id
Type
---1
1
1
1
mode
Speed
Duplex
Port Mode
Native Vlan
Allowed VLANs
1
1
1
1
1
-
Local Value
---------------------Default
None
Default
[(7f9b,
0-23-4-ee-be-64, 80c8,
0, 0), (8000,
0-1e-13-15-7-40, 1, 0,
0)]
active
10 Gb/s
full
trunk
1
1-999,1001-3967,4048-4093
Peer Value
----------------------Default
None
Default
[(7f9b,
0-23-4-ee-be-64, 80c8,
0, 0), (8000,
0-1e-13-15-7-40, 1, 0,
0)]
active
Type 2 consistency
10 Gb/s
check parameter
full
trunk
1
1-3967,4048-4093
n5k-1#
171
vPC Forwarding
172
dca-n7k2-vdc2
dc11-5548-1
dc11-5548-2
interface port-channel201
switchport mode trunk
switchport trunk native vlan 100
switchport trunk allowed vlan 100-105
vpc 201
spanning-tree port type network
interface port-channel201
switchport mode trunk
switchport trunk native vlan 100
switchport trunk allowed vlan 100-105
vpc 201
spanning-tree port type network
173
MAC_C
N5K-1
CFS
N5K-2
1
MAC_A
Double Sided
vPC
2008 Cisco Systems, Inc. All rights reserved.
174
MAC_C
N5K-1
N5K-2
3
MAC_A
175
MAC_C
2
N5K-1
N5K-2
3
MAC_A
176
Cisco Confidential
177
vPC
Primary
vPC
Secondry
Po1
MAC_A
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
178
vPC
Primary
vPC
Secondry
vPCmember port
is suspended
Cisco Confidential
179
vPC
Primary
vPC
Secondry
Cisco Confidential
180
vPC
Primary
Cisco Confidential
181
vPC
Primary
vPC
Secondry
Cisco Confidential
182
vPC
Primary
vPC
Secondry
Cisco Confidential
183
vPC
Primary
vPC
Secondry
Cisco Confidential
184
vPC Enhancements
Cisco Confidential
185
NX-OS 5.0(2)N1(1)
Several features have the misconfiguration type lowered from Type 1 to Type 2
Configurations can be synched between vPC member ports by using the Config-sync
feature
Type
Local Value
-------------
----
---------------------- -----------------------
QoS
[])
[])
(1538, 2240, 0, 0, 0,
(1538, 2240, 0, 0, 0,
0)
0)
Peer Value
(F, T, F, F, F, F)
(F, T, F, F, F, F)
(50, 50, 0, 0, 0, 0)
(50, 50, 0, 0, 0, 0)
(F, F, F, F, F, F)
(F, F, F, F, F, F)
(50, 50, 0, 0, 0, 0)
(50, 50, 0, 0, 0, 0)
(F, F, F, F, F, F)
(F, F, F, F, F, F)
Priority)
Cisco Confidential
186
NX-OS 5.0(2)N2(1)
Keepalive
S1 -Primary
S2-Secondary
vPC peer-link
Type-1
Inconsistency
vPC 1
po1
CE-1
S1(config-vpc-domain)# graceful
consistency-check
S2(config-vpc-domain)# graceful
consistency-check
Graceful Type-1 check enabled by
default.
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
187
vPC Auto-Recovery
Peer Keepalive Link
vPC
Primary
Switch
1
Switch3
Switch4
Cisco Confidential
188
vPC Auto-Recovery
If enabled (default is disabled)
On switch reload, vPC listens
to switch online notification
(indicates all LCs are up)
Secondary
S1
S2
vPC peer-link
S4
Primary
vPC 2
vPC 1
po1
po2
Cisco Confidential
189
vPC Auto-Recovery
If enabled
C
S4
Primary
S1
S2
vPC peer-link
Reinitialize vPCs
vPC 2
vPC 1
po2
Cisco Confidential
190
NX-OS 5.0(2)N2(1)
Keepalive
S1 -Primary
vPC auto-recovery
S2-Secondary
vPC peer-link
Keepalive
S1 -Primary
S2-Secondary
vPC peer-link
vPC 1
po1
vPC 1
po1
S1 -Primary
CE-1
Keepalive S2-Operational
Primary
CE-1
vPC peer-link
vPC 1
po1
S1(config-vpc-domain)# auto-recovery
S2(config-vpc-domain)# auto-recovery
2008 Cisco Systems, Inc. All rights reserved.
CE-1
Cisco Confidential
191
Primary
Secondary
Cisco Confidential
192
Cisco Confidential
193
NX-OS 5.0(3)N2(1)
Primary
Secondary
Cisco Confidential
194
vPC Troubleshooting
Cisco Confidential
195
vPC troubleshooting
Basic checks
Nexus# sh vpc
...
vPC domain id
: 111
Peer status
: peer adjacency formed ok
vPC keep-alive status
: peer is alive
Configuration consistency status: success
vPC role
: primary
Cisco Confidential
196
vPC troubleshooting
Config check (vPC default parameters not shown)
Nexus# sh run vpc
version 4.1(5)
feature vpc
vpc domain 111
peer-keepalive destination 7.7.7.77
source 7.7.7.7 vrf v1
interface port-channel1
vpc 1
interface port-channel1
vpc 1
interface port-channel100
vpc peer-link
interface port-channel100
vpc peer-link
Cisco Confidential
197
vPC troubleshooting
vPC peer-keepalive check
vPC timers check
Nexus# show vpc peer-keepalive
vPC keep-alive status
--Send status
--Last send at
--Sent on interface
--Receive status
--Last receive at
--Received on interface
--Last update from peer
:
:
:
:
:
:
:
:
peer is alive
Success
2009.06.19 00:41:15 589 ms
Eth2/35
Success
2009.06.19 00:41:14 580 ms
Eth2/35
(1) seconds, (9) msec
:
:
:
:
:
:
:
7.7.7.77
1000 msec
5 seconds
3 seconds
v1
3200
192
Cisco Confidential
198
vPC troubleshooting
vPC peer-keepalive statistics
Nexus# show vpc statistics peer-keepalive
vPC keep-alive status
: peer is alive
vPC keep-alive statistics
---------------------------------------------------peer-keepalive tx count:
9773
peer-keepalive rx count:
8985
average interval for peer rx:
991
Count of peer state changes:
159
Cisco Confidential
199
vPC troubleshooting
vPC role (primary / secondary) and system-mac
Nexus# show vpc role
vPC Role status
---------------------------------------------------vPC role
: primary
Dual Active Detection Status
: 0
vPC system-mac
: 00:23:04:ee:be:6f
vPC system-priority
: 32667
vPC local system-mac
: 00:1b:54:c2:42:41
vPC local role-priority
: 32667
Cisco Confidential
200
vPC troubleshooting
Global consistency parameters
Nexus# show vpc consistency-parameters global
Legend:
Type 1 : vPC will be suspended in case of mismatch
Name
------------STP Mode
STP Disabled
STP MST Region Name
STP MST Region Revision
STP MST Region Instance to
VLAN Mapping
STP Loopguard
STP Bridge Assurance
STP Port Type
STP MST Simulate PVST
Allowed VLANs
Type
---1
1
1
1
1
Local Value
---------------------Rapid-PVST
None
""
0
Peer Value
----------------------Rapid-PVST
None
""
0
1
1
1
1
-
Disabled
Enabled
Normal
Enabled
1,34-35,51,69-70,99,20
Disabled
Enabled
Normal
Enabled
1-2,34-35
Cisco Confidential
201
vPC troubleshooting
Interface consistency parameters
Nexus# show vpc consistency-parameters interface port-channel 1
Legend:
Type 1 : vPC will be suspended in case of mismatch
Name
------------STP Port Type
STP Port Guard
STP MST Simulate PVST
lag-id
Type
---1
1
1
1
mode
Speed
Duplex
Port Mode
Native Vlan
MTU
Allowed VLANs
1
1
1
1
1
1
-
Local Value
---------------------Default
None
Default
[(7f9b,
0-23-4-ee-be-6f, 8001,
0, 0), (8000,
0-12-da-65-9e-c0, 1,
0, 0)]
active
1000 Mb/s
full
trunk
2
1500
34-35
Peer Value
----------------------Default
None
Default
[(7f9b,
0-23-4-ee-be-6f, 8001,
0, 0), (8000,
0-12-da-65-9e-c0, 1,
0, 0)]
active
1000 Mb/s
full
trunk
2
1500
34-35
Cisco Confidential
202
N5K-2
PK
int po20
switchport trunk allowed
vlan 1,10-11,100,176,208209,3001
int po20
switchport trunk allowed
vlan 1,10-11,176,208209,3001
PL
PO10
PO20
Status
Po20
Native
Vlan
1
Port
Po20
Port
Po20
trunking
VL100 is missing on
vPC Peer Link
Port
Channel
--
Cisco Confidential
203
N5K-2
PK
PL
PO10
PO20
All vPC
Member Ports
are taken
down!
N5K-1# show port-channel sum int p20
Flags: D - Down
P - Up in port-channel (members)
I - Individual H - Hot-standby (LACP only)
s - Suspended r - Module-removed
S - Switched R - Routed
U - Up (port-channel)
M - Not in use. Min-links not met
-------------------------------------------------------------------------------Group PortType Protocol Member Ports
Channel
-------------------------------------------------------------------------------20 Po20(SD) Eth
LACP
Eth2/17(D)
vPC domain id
:3
Peer status
: peer adjacency formed ok
vPC keep-alive status
: peer is alive
Configuration consistency status: failed
Configuration consistency reason: vPC type-1 configuration
incompatible - STP global loop guard inconsistent
Type-2 consistency status
: failed
Type-2 consistency reason
: SVI type-2 configuration incompatible
vPC role
: secondary
Number of vPCs configured
:4
Peer Gateway
: Enabled
Peer gateway excluded VLANs : Dual-active excluded VLANs
:vPC Peer-link status
--------------------------------------------------------------------id Port Status Active vlans
-- ---- ------ -------------------------------------------------1 Po10 up vPC status
---------------------------------------------------------------------id Port Status Consistency Reason
Active vlans
-- ---- ------ ----------- ----------------20 Po20 down* failed
Global compat check failed -
Cisco Confidential
204
Cisco Confidential
205
N5K-2
PK
PL
PO10
PO20
vPC domain id
:3
Peer status
: peer adjacency formed ok
vPC keep-alive status
: peer is alive
Configuration consistency status: success
Type-2 consistency status
: failed
Type-2 consistency reason
: SVI type-2 configuration incompatible
vPC role
: primary
Number of vPCs configured
:4
Peer Gateway
: Enabled
Peer gateway excluded VLANs : Dual-active excluded VLANs
:vPC Peer-link status
--------------------------------------------------------------------id Port Status Active vlans
-- ---- ------ -------------------------------------------------1 Po10 up 1,10-11,176,208-209,3001
vPC status
---------------------------------------------------------------------id Port Status Consistency Reason
Active vlans
-- ---- ------ ----------- ----------------20 Po20 up failed
vPC type-1 configuration incompatible - STP
interface port guard Root or loop guard
inconsistent
Cisco Confidential
206
N5K-2
PK
PL
PO10
PO20
vPC domain id
:3
Peer status
: peer adjacency formed ok
vPC keep-alive status
: peer is alive
Configuration consistency status: failed
Configuration consistency reason: vPC type-1 configuration
incompatible - STP global loop guard inconsistent
Type-2 consistency status
: failed
Type-2 consistency reason
: SVI type-2 configuration incompatible
vPC role
: secondary
Number of vPCs configured
:4
Peer Gateway
: Enabled
Peer gateway excluded VLANs : Dual-active excluded VLANs
:vPC Peer-link status
--------------------------------------------------------------------id Port Status Active vlans
-- ---- ------ -------------------------------------------------1 Po10 up vPC status
---------------------------------------------------------------------id Port Status Consistency Reason
Active vlans
-- ---- ------ ----------- ----------------20 Po20 down* failed
Global compat check failed -
Cisco Confidential
207
Common Causes:
Cisco Confidential
208
What Happened?
N5K-1g)# show logging level vpc
Facility
Severity
-------vpc
Default Severity
---------------2
0(emergencies)
3(errors)
6(information)
Current Session
-----------------------3
1(alerts)
2(critical)
4(warnings) 5(notifications)
7(debugging)
Cisco Confidential
209
Priority
Address
Hello Time
Interface
---------------Po1
Po20
Po27
Po28
Role
---Root
Root
Desg
Desg
Sts
--FWD
FWD
FWD
FWD
Cost
--------1
1
1
1
Prio.Nbr
-------128.4096
128.4115
128.4122
128.4123
Type
-------------------------------(vPC peer-link) Network P2p
(vPC) P2p
(vPC) Edge P2p
(vPC) Edge P2p
Cisco Confidential
210
sh tech-support vpc
Collect for TAC/engineering to look at the issue
Collects the following
`show version`
`show module`
`show vpc brief`
`show vpc role`
`show running-config vpc`
`show system internal vpcm event-history global`
`show system internal vpcm event-history errors`
`show system internal vpcm event-history msgs`
`show system internal vpcm event-history interactions`
`show system internal vpcm mem-stats detail`
`show system internal vpcm info all`
`show system internal vpcm info global`
`show CFS internal ethernet-peer database`
`show spanning-tree`
Most often information about other components would be needed as well, so best is
to start with sh tech detail this includes in it sh tech vpc and most other
relevant outputs
Cisco Confidential
211
Cisco Confidential
212
NX-OS 5.0(2)N2(1)
Starting from NX-OS 5.0.2 release, the Nexus 5500 introduces the config-sync feature for
vPC. Config-sync allows administrators to make configuration changes on one switch and
have the system automatically synchronize to its peers. This eliminates any user prone
errors & reduces the administrative overhead of having to configure both vPC members
simultaneously.
interface Ethernet1/47
fex associate 100
switchport mode fex-fabric
channel-group 5
Presentation_ID
PO5
Cisco Confidential
interface Ethernet1/47
fex associate 100
switchport mode fex-fabric
channel-group 5
Peer Link
interface mgmt0
ip address 10.29.170.7
interface mgmt0
ip address 10.29.170.8
vpc domain 10
peer-keepalive destination 10.29.170.8
PO5
vpc domain 10
peer-keepalive destination 10.29.170.7
It is recommended to configure the vPC peer-keepalive link to run in mgmt VRF using the mgmt
interface
Presentation_ID
Cisco Confidential
Cisco Confidential
Switch-profile
Peer Configuration
Step 1:
Step 2:
Step 3:
N5500-1# config t
N5500-1(config)# CFS ippv4 distribute
N5500-2# config t
N5500-2(config)# CFS ippv4 distribute
Cisco Confidential
N5500-1# config t
N5500-1(config)# CFS ippv4 distribute
N5500-2# config t
N5500-2(config)# CFS ippv4 distribute
Configure identical
switch-profile on each
switch
Configure peer
relationship under
switch-profile
Cisco Confidential
217
N5K-1(config-sync-sp)# verify
Verify Successful
N5K-1(config-sync-sp)# commit
Commit Successful
Verify the
configuration was
merged sucessfully
N5K-1# sh running-config
N5K-2# sh running-config
Repeat as needed
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
218
Command is denied on
physical interface. Config
must be applied under
switch-profile
version 5.0(3)N1(1b)
version 5.0(3)N1(1b)
interface Ethernet199/1/2
switchport mode trunk
switchport trunk allowed vlan 176,200
interface Ethernet199/1/2
switchport mode trunk
switchport trunk allowed vlan 176,200
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
219
Outside of Profile
Cisco Confidential
220
Peer becomes unreachable due to a network outage, config sync will not occur across mgmt0.
vPC peer link is up, but vPC PKL is down due to mgm0 not reachable
Local changes on N5K-1 and N5K-2 are possible
N5500-1(config-if)# config sync
N5500-1(config-sync)# switch-profile Apple
N5500-1(config-sync-sp)# int ethernet
100/1/3
N5500-1(config-sync-sp-if)# switch mode
trunk
N5500-1(config-sync-sp-if)# commit
Commit Successful
N5500-1#sh run switch-profile
interface ethernet 1/10
switchport mode trunk
Cisco Confidential
221
Mismatch both
ethernet1/10 interfaces
results in a failure in a
merge check
To resolve this, user
needs to manually
remove the configuration
outside/inside profile
Cisco Confidential
222
N5500-1# config t
N5500-1(config)# CFS ippv4 distribute
N5500-2# config t
N5500-1(config)# CFS ippv4 distribute
Configure identical
switch-profile on each
switch
Configure peer
relationship under
switch-profile
Cisco Confidential
223
We recommend to copy smaller chunks of the profile to ensure each sync is smooth
N5K-1(config-sync-sp)# interface Ethernet1/10
<snip>
interface Ethernet100/1/2
switchport mode trunk
switchport access vlan 5
switchport trunk allowed vlan 5
<snip>
Verify the
configuration was
merged sucessfully
N5K-1(config-sync-sp)# commit
Commit Successful
N5K-1# sh running-config
N5K-2# sh running-config
Repeat as needed
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
224
N5500-1# config t
N5500-1(config)# CFS ippv4 distribute
N5500-1# config t
N5500-1(config)# CFS ippv4 distribute
Configure identical
switch-profile on each
switch
Option1:
N5K-1(config-sync-sp)# import running-config
We recommend to copy smaller chunks of the profile to ensure each sync is smooth
Option2:
N5K-1(config-sync-sp)# interface Ethernet1/10
<snip>
interface Ethernet100/1/2
switchport mode trunk
switchport access vlan 5
switchport trunk allowed vlan 5
<snip>
Cisco Confidential
225
N5K-1(config-sync-sp)# commit
Commit Successful
N5K-2(config-sync-sp)# commit
Commit Successful
Verify the
configuration was
merged successfully
N5K-1# sh running-config
N5K-2# sh running-config
Repeat as needed
In this example, the peers are defined only after the configurations are put under a profile. The
reason is to eliminate any sync from occurring before user is able to review the configuration
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
226
Reaction
Switch reload
Merge failure
Cisco Confidential
227
If a commit is issued from other peer, that shall fail only if the peer
undergoing ISSU was still reachable but can't accept configuration due to
ISSU, otherwise the 'commit' will become a local-operation by default
behavior.
Cisco Confidential
228
Ensure that the specific feature is enabled on each switch (i.e. feature vpc, feature vlan,
etc
When migrating to config-sync (vPC is running with configurations already synced),
ensure you add smaller sections under the profile and commit versus doing everything
in one chunk
vPC and config sync are independent features. If peer-link is down, config-sync will still
work
Config sync is ONLY transported across mgmt0 interface
Cisco Confidential
229
Config Rollback
Cisco Confidential
230
Todays
configuration
-------------------
-------------------
Checkpoint
running-config
Current
running-config
-------------------
-------------------
Prior to 5.0(2), the system required a reload to run another configuration file
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
231
Configuration
Checkpoints
-------------------
-------------------------------------------------------------------------------------------
-------------------
Checkpoint_1
running-config
Checkpoint
Checkpoint
Checkpoint
Checkpoint_10
Checkpoint
running-config
running-config
running-config
running-config
running-config
Current
running-config
-------------------
-------------------------------------------------------------------------------------------
-------------------
Cisco Confidential
232
Cisco Confidential
233
Cisco Confidential
234
Cisco Confidential
235
Cisco Confidential
236
Cisco Confidential
237
Multicast
Cisco Confidential
238
Multicast Frames
are Queued in
dedicated
multicast queues
on Ingress
MCAST packet is
replicated in the
Fabric
Unified Crossbar
Fabric
Eth 1/8
Multicast
Scheduler
Eth 1/20
Cisco Confidential
239
Nexus 5500
Multicast Fabric Replication (Animated)
Ingress Interface
Switch
Fabric
Unicast VOQ
Egress
Interface
Packet
Buffer
Mcast
Ucast
Mcast
A
B
Mcast
Multicast VOQ
Mcast
Cisco Confidential
240
Multicast
Scheduler
4 Fabric
Crosspoints
per port (10K
X-Bar buffer)
Reliable mode
Presentation_ID
...
Packets are sent to switch fabric when all OIF ports are
ready, ie, have fabric buffer and egress buffer to accept
the multicast packets
Cisco Confidential
8 Dedicated
Egress MCAST
Queues per Port
8 Dedicated
Egress UCAST
Queues per Port
Without multicast
optimization
Multicast VOQ
Multicast VOQ
Class 1
Class 1
Class 2
Class 3
Q1
Q2
Class 2
Q3
Class 3
Class 8
Class 8
Q8
Q8
class with
multicast
optimization
Q127
Q128
Q128
2009 Cisco Systems, Inc. All rights reserved.
Q3
Q9
Q127
Presentation_ID
Q1
Q2
Cisco Confidential
Broadcast traffic
L2 multicast traffic
User can choose to turn on multicast optimization for selected multidestination traffic, such as, IP multicast traffic
Multicast optimization can only be turned on for one system class.
8 multicast VOQ reserved for QoS queuing. The rest of 120 queues for
multicast optimization
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
...
Multicast
Scheduler
Hashing calculation
Choose 1/10 for Po10
Seed number
for eth1/1
1/10
VOQ # 20
Request to central scheduler
with OIF 1/2, 1/3 and 1/10
1/10
Source
Po10
Receivers
1/11
1/2
1/1
Switch fabric replicates
packets to 1/2 , 1/3 and 1/10
1/3
Cisco Confidential
249
Nexus 5500
Station (MAC) Table allocation
Nexus 5500 has a 32K Station table entries
4k reserved for multicast (Multicast MAC addresses)
3k assumed for hashing conflicts (very conservative)
Nexus 5500
UPC
Station Table
32k entries
4k entries for
IGMP
3k entries for potential hash collision space
Cisco Confidential
250
IGMP snooping
As a Layer 2 switch the N5k performs IGMP snooping
IGMP snooping constrains multicast traffic only to the
ports that need to receive it.
32k entries
MAC table
Cisco Confidential
251
Cisco Confidential
252
Multicast
Important Cisco NX-OS and Cisco IOS Differences
In Cisco NX-OS:
The global ip multicast-routing command does not exist in NXOS and is not required to
enable multicast forwarding/routing. (It is required in Cisco IOS Software to enable multicast
forwarding/routing)
PIM command-line interface (CLI) configuration and verification commands are not available
until you enable the PIM feature with the feature pim command.
MSDP CLI configuration and verification commands are not available until you enable the
MSDP feature with the feature msdp command.
IGMP versions 2 and 3 are supported. IGMP version 1 and Version 3 Lite are not supported.
An IGMP Snooping Querier is configured under the layer-2 VLAN with the ip igmp snooping
querier CLI command (Physical L3 interfaces cannot be configured as IGMP Snooping
Queriers). In Cisco IOS Software, an IGMP Snooping Querier is configured under the layer-3
interface.
PIM version 2 Sparse Mode is supported. Cisco NX-OS does not support PIM version 1
Sparse Mode or Dense Mode. The NX-OS cannot fallback to Dense Mode operation.
When configuring a PIM Auto-RP Candidate or BSR RP-Candidate the NX-OS requires a
configured group-list (i.e. x.x.x.x/x), whereas Cisco IOS Software defaults to 224.0.0.0/4. An
optional standard ACL can be configured to specify multicast groups in Cisco IOS Software.
Cisco Confidential
253
Multicast
Important Cisco NX-OS and Cisco IOS Differences
In Cisco NX-OS:
When configuring PIM Auto-RP, Cisco NX-OS multicast devices must be enabled to listen
and/or forward RP advertisements with the ip pim auto-rp forward listen global CLI
configuration command. Cisco IOS Software has to be configured for Sparse-Dense Mode or
Sparse Mode with the global ip pim autorp listener CLI configuration command.
When configuring PIM BSR, Cisco NX-OS multicast devices must be enabled to listen
and/or forward RP advertisements with the ip pim bsr forward listen global CLI configuration
command. Cisco IOS Software doesnt require additional configuration, but does not have
the ability to enable/disable RP forwarding and listening capabilities.
BSR-Candidate routers have a default priority of 64. Cisco IOS Software defaults to 0. The
priority value can be configured between 0 255 in both operating systems using the priority
option. A higher numeric value is preferred when comparing priorities.
BSR RP-Candidate routers have a default priority of 192. Cisco IOS Software defaults to
0. The priority value can be configured between 0 255 in both operating systems using the
priority option. The lower numeric value is preferred when comparing priorities.
When configuring a Static-RP, the NX-OS does not have an override option like Cisco IOS
Software that forces the Static-RP to be elected for its specified multicast group list. Cisco
IOS Software prefers dynamically learned RPs over Static RPs if the override option is not
configured.
When comparing PIM Static-RPs to dynamically learned RPs (Auto-RP and BSR) during
the election process: The RP with the most specific multicast group-list is elected. If the
group-lists are identical, the router with the highest RP IP address is elected.
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
254
Multicast
Important Cisco NX-OS and Cisco IOS Differences
In Cisco NX-OS:
When configuring a PIM domain border, the ip pim border interface CLI command
prevents BSR and Auto-RP packets from being sent or received on an interface. The
Cisco IOS Software command equivalent (ip pim bsr-border) only prevents BSR
packets. Cisco IOS Software requires the ip multicast boundary interface command to
prevent Auto-RP packets.
PIM neighbor authentication (IPSec ah-md5) can be enabled to authenticate directly
connected neighbors to increase security. Cisco IOS Software does not support this
functionality.
PIM neighbor logging can be enabled with the global ip pim log-neighbor-changes
CLI command. (Cisco IOS Software enables PIM neighbor logging by default)
The data in the MSDP Source-Active (SA) messages are cached by default,
whereas Cisco IOS Software requires the global ip msdp cache-sa-state and ip msdp
cache-rejected-sa CLI commands.
PIM is configured with the Source Specific Multicast (SSM) group range 232.0.0.0/8
by default (ip pim ssm range 232.0.0.0/8).
PIM does not support Bidirectional Forwarding Detection (BFD) for rapid failure
detection on the Nexus 5500 series yet, but it is being targeted for the Goldcoast
release. However, on the Nexus 7000 series, beginning with NX-OS 5.0(2a), PIM
supports BFD.
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
255
Multicast
Things You Should Know
If you remove the feature pim command, all relevant PIM configuration
information is also removed.
If you remove the feature msdp command, all relevant MSDP configuration
information is also removed.
IGMP Snooping is enabled globally by default. It can be disabled globally, or
per layer-2 VLAN with the no igmp snooping command.
IGMP version 2 is enabled by default when PIM Sparse Mode is configured on
an interface.
PIM configuration is supported under IP Tunnel (GRE) interfaces in Cisco NXOS 5.2(1) and onward (PIM was previously not supported in IP Tunnels).
PIM supports three modes of operation: Any Source Multicast (ASM), Single
Source Multicast (SSM), Bidirectional Shared Tree (Bidir). The default mode is
ASM. Bidir can be configured with the bidir option when configuring a RP.
The Cisco NX-OS supports four types of PIM Rendezvous Points: Static,
Bootstrap router (BSR), Auto-RP and Anycast-RP. (Do not configure Auto-RP and
BSR in the same network)
Cisco Confidential
256
Multicast
Things You Should Know
When configuring a PIM Static-RP, the group-list defaults to 224.0.0.0/4 if one
is not specified.
The Cisco NX-OS has two different CLI syntax options when configuring BSR
and Auto RP's (New Cisco NX-OS syntax, and backwards compatible Cisco IOS
Software syntax).
The Cisco NX-OS supports multicast routing per layer-3 Virtual Routing and
Forwarding (VRF) instance.
PIM SSM and Bidir are not supported on Virtual Port-Channels (vPCs).
A topology that has a PIM router connected to a pair of Cisco Nexus 5500
Platform switches through vPC is not supported.
Cisco Confidential
257
Multicast
Command Comparison: NX-OS vs IOS
Cisco IOS CLI
feature pim
interface Ethernet1/1
ip address 192.168.10.1/24
ip pim sparse-mode
Cisco Confidential
258
Multicast
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
interface Loopback10 I
p address 172.16.1.1 255.255.255.255
ip pim sparse-mode
ip pim send-rp-announce Loopback10
scope 32
ip pim send-rp-discovery Loopback10
scope 32
ip pim autorp listener
interface loopback10
ip address 172.16.1.1/32
ip pim sparse-mode
ip pim auto-rp rp-candidate loopback10
group-list 224.0.0.0/4
ip pim auto-rp mapping-agent loopback10
ip pim auto-rp forward listen
or
ip pim send-rp-announce loopback10
group-list 224.0.0.0/4
ip pim send-rp-discovery loopback10
ip pim auto-rp forward listen
Cisco Confidential
259
Multicast
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
Cisco Confidential
260
Multicast
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
interface loopback10
description Anycast-RP-Address
ip address 172.16.1.1/32
ip pim sparse-mode
ip pim bsr bsr-candidate loopback0
ip pim bsr rp-candidate loopback10 grouplist 224.0.0.0/4
ip pim anycast-rp 172.16.1.1 192.168.10.1
ip pim anycast-rp 172.16.1.1 192.168.10.2
ip pim bsr forward listen
Cisco Confidential
261
Multicast
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
Cisco Confidential
262
Multicast
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
interface Ethernet1/1
ip address 192.168.10.1/24
ip pim sparse-mode
ip pim border
Cisco Confidential
263
Multicast
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
Cisco Confidential
264
Multicast
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
interface Ethernet1/1
ip address 192.168.10.1/24
ip pim sparse-mode
ip igmp version 3
vlan 10
ip igmp snooping querier 192.168.10.1
Note: there is no subnet mask on the IP address of the nexus querier config
command.
Cisco Confidential
265
Multicast
Command Comparison: NX-OS vs IOS (contd)
Cisco IOS CLI
interface loopback0
description MSDP Peer Address
ip address 192.168.1.1/32
interface Loopback10
description PIM RP Address
ip address 1.1.1.1 255.255.255.255
interface loopback10
description PIM RP Address
ip address 1.1.1.1/32
Cisco Confidential
266
Multicast
Troubleshooting and Verification Commands
Cisco NX-OS Interface
Cisco Confidential
267
Multicast
Troubleshooting and Verification Commands (contd)
Cisco NX-OS Interface
Cisco Confidential
268
Multicast
Troubleshooting and Verification Commands (contd)
Cisco NX-OS Interface
Command Description
Displays MSDP SA cache counters
Displays MSDP Mesh-Group members
Displays all MSDP peers
Displays a specific MSDP peer
Displays MSDP peers related to a
specific VRF instance
Displays the MSDP peer policies
Displays the MSDP route-cache
Displays the MSDP SA route-cache
Displays the MSDP learned sources
and associated statistics
Displays the MSDP peer
Cisco Confidential
269
Multicast
Troubleshooting and Verification Commands (contd)
Cisco NX-OS Interface
show ip pim df
show ip pim df x.x.x.x
show ip pim df vrf name
show ip pim group-range
show ip pim group-range
x.x.x.x
show ip pim group-range vrf
name
show ip pim interface
show ip pim interface brief
x.x.x.x
Cisco IOS
Command Description
Software Interface
show ip pim interface df Displays Bidir designated forwarders
show ip pim interface df Displays Bidir designated forwarders for
x.x.x.x
a specific RP or group
Displays Bidir designated forwarders for
a specific VRF instance
Displays the PIM group-ranges
-
Cisco Confidential
270
Multicast
Troubleshooting and Verification Commands (contd)
Cisco NX-OS Interface
show ip pim neighbor
show ip pim neighbor x.x.x.x
show ip pim neighbor
interface int-type
show ip pim neighbor vrf
name
show ip pim oif-list x.x.x.x
show ip pim policy statistics
show ip pim route
show ip pim route x.x.x.x
show ip pim route vrf name
show ip pim rp
show ip pim rp x.x.x.x
Cisco IOS
Command Description
Software Interface
show ip pim neighbor
show ip pim neighbor
x.x.x.x
show ip pim neighbor
int-type
Cisco Confidential
271
Multicast
Troubleshooting and Verification Commands (contd)
Cisco NX-OS Interface
Cisco IOS
Command Description
Software Interface
Cisco Confidential
272
Multicast
Troubleshooting and Verification Commands (contd)
Cisco NX-OS Interface
Command Description
Cisco Confidential
273
QoS
Cisco Confidential
274
Cisco Confidential
275
Cisco Confidential
276
DSCP Marking
Only available with Nexus 5500 platform
Configured with policy-map type qos
Independent of CoS marking
ip access-list High-ACL
10 permit ip 30.30.1.0/24 any
class-map type qos match-all High-ACL
match access-group name High-ACL
policy-map type qos Policy-Classify
class High-ACL
set qos-group 2
set dscp 46
Cisco Confidential
277
Ingress UPC
Unified Crossbar
Fabric
Ingress interface
Egress UPC
Egress interface
Policy Type
Function
Attach Point
qos
system qos
ingress Interface
queuing
system qos
egress Interface
ingress Interface
network-qos
system qos
Cisco Confidential
278
Gen 2 UPC
Unified Crossbar
Fabric
Gen 2 UPC
Cisco Confidential
279
Classify
CoS/DSCP
L2/L3/L4 ACL
MAC
Traffic
Classification
Ingress
Cos/DSCP
Marking
Ingress
Policing*
MTU
checking
Per-class
Buffer usage
Monitoring
Central
Scheduler
Proxy Queues
Egress Queues
unicast
MAC
Egress
COS/DCSP
Marking
UPC Gen 2
ECN
Marking*
Egress
Policing*
Crossbar
Fabric
Truncate or drop
packets if MTU is violated
Egress
scheduling
multicast
Strict priority +
DWRR scheduling
Cisco Confidential
280
Matching Criteria
CoS MAC
IP, UDP/TCP port, DSCP, IP Precedence
Protocol Type
Cisco Confidential
281
N
Is control traffic
SP queue empty
N
Y
Is user
SP queue empty
Cisco Confidential
282
Buffer size of ingress queues for drop class can be adjusted using
network-qos policy
Class of Service
Ingress Buffer(KB)
Egress Buffer(KB)
78
18.0 & 18.0
19
9.6 & 9.6
78
19
88
19
22
19
29
19
19
Class-fcoe
Sup-Hi & Sup-Lo
Default
Classes
Cisco Confidential
283
Cisco Confidential
284
1. Congestion
or Flow
Control on
Egress Port
Egress
UPC
2. Egress
UPC does not
allow Fabric
Grants
Unified
Crossbar
Fabric
3. Traffic is
Queued on
Ingress
ingress
UPC
4. If queue is
marked as nodrop or flow
control then
Pause is sent
Cisco Confidential
285
Support for 3 km no
drop switch to
switch links
Inter Building DCB
FCoE links
Configs for
3000m no-drop
class
Buffer size
N5020
N5548
Pause Threshold
(XOFF)
Resume
Threshold (XON)
143680 bytes
58860 bytes
38400 bytes
152000 bytes
103360 bytes
83520 bytes
Unified Crossbar
Fabric
Gen 2 UPC
Cisco Confidential
286
Cisco Confidential
287
Cisco Confidential
288
Policy Types
Policy Type
Function
Attach Point
qos
System qos
Ingress Interface
queuing
System qos
Egress Interface
Ingress Interface*
network-qos
System qos
*Queuing policy applied under ingress interface is advertised to server using DCBX protocol
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
289
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
match cos 4
match dscp 34
match access-group
match cos 2
match dscp 18
match access-group
Presentation_ID
Cisco Confidential
class cfy-video
set qos-group 4
set dscp 34
class cfy-transact
set qos-group 3
set dscp 18
queue-limit <Bytes>
mtu 9216
set cos 2
match qos-group 2
match qos-group 4
Presentation_ID
Cisco Confidential
match qos-group 4
match qos-group 2
Priority scheduling
Presentation_ID
Cisco Confidential
bandwidth percent 40
bandwidth percent 10
priority
Ingress Interface
Egress Interface
Cisco Confidential
295
Cisco Confidential
296
Cisco Confidential
297
Cisco Confidential
298
Cisco Confidential
299
Cisco Confidential
300
N5k(config-sys-qos)#interface e1/1
N5k(config-if)# no service-policy type qos input policy-qos
Cisco Confidential
301
: 283558
Cisco Confidential
302
Troubleshooting
Cisco Confidential
303
SPAN
Cisco Confidential
304
Cisco Confidential
305
data
12Gbps
span
Multicast VOQ
span
Unicast VOQ
12Gbps
SPAN
Destination
12Gbps
Cisco Confidential
306
Egress Interface
(tx SPAN source)
Ingress Interface
Packet
Buffer
12Gbps
data
Multicast VOQ
Unicast VOQ
data
12Gbps
data
span
Unicast VOQ
12Gbps
span
SPAN
Destination
Cisco Confidential
307
Ingress Interface
(rx SPAN source)
Packet Buffer
data
Traffic meter
12Gbps
span
SPAN Policing
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
308
Egress Interface
(tx SPAN source)
SPAN Policing
span
12Gbps
Ingress Interface
TX data
TX data
12Gbps
RX data
RX data
Traffic meter
span
12Gbps
SPAN
Destination
Cisco Confidential
309
10
8
Received traffic rate
6
Data throughput
SPAN throughput per source
0
1
10
This charts assume the SPAN policing kicks in at 5.5Gbps traffic and policing
rate for SPAN traffic is set to 0.75Gbps per SPAN source interface.
Cisco Confidential
310
SPAN Performance
Scenario 1: No oversubscription
5Gbps
eth1/1
Monitor session 1
source interface eth1/1 rx
source interface eth1/2 rx
destination interface eth1/12
5Gbps
Eth1/2
5Gbps
Eth1/11
5Gbps
Eth1/12
10Gbps
Sniffer
Cisco Confidential
311
SPAN Performance
Scenario 2: SPAN Destination Oversubscription
4Gbps
eth1/1
4Gbps
Eth1/2
Monitor session 1
source interface eth1/1 rx
source interface eth1/2 rx
source interface eth1/3 rx
destination interface eth1/12
4Gbps
Eth1/3
4Gbps
Eth1/11
Eth1/12
8Gbps 10Gbps
Sniffer
Cisco Confidential
312
SPAN Performance
Scenario 3-Fabric Link Oversubscription
8Gbps
eth1/1
Monitor session 1
source interface eth1/1 rx
source interface eth1/2 rx
destination interface eth1/12
8Gbps
Eth1/2
8Gbps
Eth1/11
Eth1/12
8Gbps 1.5Gbps
Sniffer
Cisco Confidential
313
SPAN Configuration
A SPAN destination port needs to be configured as a switchport monitor port for
the session to become active.
Configure the Destination SPAN Port:
n5000(config)# interface ethernet 2/14
n5000(config-if)# switchport
n5000(config-if)# switchport monitor
session 1
description Inbound(rx) SPAN on Eth 2/13
source interface ethernet 2/13 rx
destination interface ethernet 2/14
no shut
Presentation_ID
Cisco Confidential
SPAN Verification
Verifying the Destination Port Type:
n5500# show interface ethernet 2/14
Ethernet2/14 is up
Hardware is 10/100/1000 Ethernet, address is 001b.54c0.fedd (bia 001b.54c0.fedd)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA
Port mode is access
full-duplex, 1000 Mb/s
Beacon is turned off
Auto-Negotiation is turned on
Input flow-control is off, output flow-control is off
Auto-mdix is turned on
Switchport mode
Switchport monitor is on
Last clearing of "show interface" counters never
Cisco Confidential
Destination interface
315
Ethanalyzer
Presentation_ID
Cisco Confidential
316
The packets can be viewed using the CLI or exported to a Wireshark protocol
analyzer on an external host for GUI analysis.
Ethanalyzer Guidelines:
Configured in user-exec mode
Presentation_ID
Cisco Confidential
317
Presentation_ID
CPU
Intel LV Xeon
1.66 GHz
South
Bridge
NIC
eth3
eth4
Unified Port
Controller
Cisco Confidential
318
Ethanalyzer Configuration
Create a Capture:
n5500# ethanalyzer local interface
inbound-hi
inbound-hi/Outband interface
mgmt
Management interface
Real-Time counter
interface inbound-hi ?
Redirect it to a file
Redirect it to a file in append mode
Filter on ethanalyzer capture
Include internal system header decoding
Display detailed protocol information
Display filter on frames captured
Hex/Ascii dump the packet with possibly one line summary
Maximum number of frames to be captured (default is 10)
Capture only a subset of a frame
Filename to save capture to
Cisco Confidential
ethanalyzer
ethanalyzer
ethanalyzer
ethanalyzer
local
local
local
local
interface
interface
interface
interface
inbound-hi
inbound-hi
inbound-hi
inbound-hi
capture-filter
capture-filter
capture-filter
capture-filter
"tcp
"tcp
"udp
"udp
dst
src
dst
src
port
port
port
port
23"
23"
23"
23"
n5500# ethanalyzer local interface inbound-hi capture-filter "src net 10.20.0.190 and tcp dst port 23"
n5500# ethanalyzer local interface inbound-hi capture-filter "dst net 224.0.0.2 and udp dst port 1985"
Presentation_ID
Cisco Confidential
320
192.168.20.1
192.168.20.2
192.168.20.2
192.168.20.2
192.168.20.2
192.168.20.2
192.168.20.2
192.168.20.2
192.168.10.1
192.168.10.2
->
->
->
->
->
->
->
->
->
->
224.0.0.5
OSPF Hello Packet
207.68.169.104 DNS Standard query
207.68.169.104 DNS Standard query
65.54.238.85 DNS Standard query A
65.54.238.85 DNS Standard query A
207.68.169.104 DNS Standard query
207.68.169.104 DNS Standard query
65.54.238.85 DNS Standard query A
224.0.0.5
OSPF Hello Packet
224.0.0.5
OSPF Hello Packet
A print.cisco.com
A print.cisco.com
print.cisco.com
print.cisco.com
A print.cisco.com
A print.cisco.com
print.cisco.com
The output can also be copied to a local flash (i.e. bootflash, logflash, usb1, usb2)
Presentation_ID
Cisco Confidential
321
Presentation_ID
Cisco Confidential
322
Ethernet1/40
Port = 0x9009
Port = 0x9009
Port = 0x9009
Detailed:
Cisco Confidential
323
Presentation_ID
Cisco Confidential
324
System Crash
Determine the reset reason and how long since last
reset:
DCN-N5K1# show system reset-reason
----- reset reason for Supervisor-module 1 (from Supervisor
in slot 1) --1) At 574259 usecs after Thu Jul 21 18:59:24 2011
Reason: Reset Requested by CLI command reload
Service:
Version: 5.0(3)N1(1b)
2) At 605182 usecs after Tue Apr 19 20:53:24 2011
Reason: Disruptive upgrade
Service:
Version: 4.2(1)N2(1a)
3) At 465315 usecs after Tue Apr 19 20:33:43 2011
Reason: Reset by installer
Service:
Version: 4.1(3)N2(1)
4) At 370523 usecs after Tue Apr 19 20:02:18 2011
Reason: Reset Requested by CLI command reload
Service:
Version: 4.1(3)N2(1)
Cisco Confidential
325
Process Crash
Investigate syslog file for errors:
switch# show log logfile | include error
Cisco Confidential
326
Process-name
PID
Core-create-time
----------
------------
---
----------------
fwm
2834
Aug 13 16:3
OBFL Logging:
N5K-S003-LAB# sh logg onboard exception-log
---------------------------OBFL Data for
Module:
----------------------------
Cisco Confidential
327
show_tech_out.gz
Cisco Confidential
328
Cisco Confidential
329
Logging
Often Overlooked, but very Important
show logging logfile
Basis for tracing events chronologically
Try using start-time or last
N5k-1# show logging logfile start-time 2011 Mar 9 20:00:00
2011 Mar 9 20:17:18 esc-n5548-1 %ETHPORT-5-IF_DOWN_NONE: Interface Ethernet1/1 is down (None)
2011 Mar 9 20:17:18 esc-n5548-1 %ETHPORT-5-IF_DOWN_NONE: Interface Ethernet1/3 is down (None)
N5k-1# show logging last ?
<1-9999> Enter number of lines to display
Cisco Confidential
330
obfl-logs
obfl-history
exception log
kernel-trace
Cisco Confidential
331
Hardware Issues
Cisco Confidential
332
Types of Reaction
System comes all the way up. Syslog, OBFL and callhome
initiated to indicate failure. Example of such failure: OBFL flash,
CTS keystore.
System comes all the way up. Syslog, OBFL and callhome
initiated to indicate failure. Example of such failure: ASIC ECC
error found during POST or OHMS
Cisco Confidential
333
Cisco Confidential
334
Environmental Monitoring
switch# show environment
Displays following status:
Fan
Temperature
Power Supply
Power Usage Summary
Cisco Confidential
335
Diagnostic Result
switch# show diagnostic result module 1
Current bootup diagnostic level: complete
Module 1: 40x10GE/Supervisor
15) TestFabricPort :
SerialNo : JAB1208005T
Eth
9 10 11 12 13 14 15 16 17 18 19 20
Port ------------------------------------------------------------
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Port ------------------------------------------------------------
U = Untested, A = Abort)
9 10 11 12 13 14 15 16 17 18 19 20
1) TestUSBFlash ------------------------> .
2) TestSPROM ---------------------------> .
16) TestForwardingEngine :
3) TestPCIe ----------------------------> .
4) TestLED -----------------------------> .
Eth
5) TestOBFL ----------------------------> .
Port ------------------------------------------------------------
6) TestNVRAM ---------------------------> .
7) TestPowerSupply ---------------------> F
8) TestTemperatureSensor ---------------> .
Eth
9) TestFan -----------------------------> .
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Port ------------------------------------------------------------
17) TestForwardingEnginePort :
14) TestFabricEngine :
Eth
9 10 11 12 13 14 15 16 17 18 19 20
Port -----------------------------------------------------------.
Eth
Port -----------------------------------------------------------.
9 10 11 12 13 14 15 16 17 18 19 20
Port -----------------------------------------------------------.
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
.
Eth
Eth
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Port -----------------------------------------------------------.
Cisco Confidential
336
Show tech
Capture to terminal emulator buffer or log file:
switch# terminal length 0
switch# show tech-support details
`show switchname`
switch
`show system uptime`
System start time:
System uptime:
.
.
.
Or
Capture
to file in volatile:
switch# tac-pac
Cisco Confidential
337
Port Issues
Cisco Confidential
338
Cisco Confidential
339
rxHCTotalPkts = 475168
1.
txHCTotalPks = 3445907
2.
rxHCUnicastPkts = 1390
3.
txHCUnicastPkts = 2053
4.
rxHCMulticastPkts = 191780
5.
txHCMulticastPkts = 473324
6.
rxHCBroadcastPkts = 281998
7.
txHCBroadcastPkts = 2970530
14.
rxTxHCpkts512to1023Octets = 195759
15.
rxTxHCpkts1024to1518Octets = 191804
16.
rxTxHCpkts1519to1548Octets = 0
InPackets = 475168
27.
ShortFrames = 0
28.
Collisions = 0
29.
SingleCol = 0
30.
MultiCol = 0
31.
LateCol = 0
32.
ExcessiveCol = 0
33.
LostCarrier = 0
34.
NoCarrier = 0
35.
Runts = 0
36.
Giants = 0
Cisco Confidential
340
Auto Off
Cisco Confidential
341
QoS Counters
d14-switch-1# show policy-map interface ethernet 3/1
Ethernet3/1
Service-policy system: global
class-map: class-fcoe
Statistics:
Pkts received over the port
: 0
: 0
: 0
: 0
: 0
Per-priority-pause status
: Rx (Inactive), Tx (Inactive)
class-map: class-default
Statistics:
Pkts received over the port
: 761951066
: 429740044
: 3127717414
: 3308485758
: 9038
Per-priority-pause status
: Rx (Inactive), Tx (Inactive)
: 140042101
: 357560270
Cisco Confidential
342
QoS Counters
DCN-N5K1(config-if)# show queuing interface e1/1
Ethernet1/1 queuing information:
TX Queuing
qos-group sched-type oper-bandwidth
0
WRR
50
1
WRR
50
RX Queuing
qos-group 0
q-size: 243200, HW MTU: 1600 (1500 configured)
drop-type: drop, xon: 0, xoff: 1520
Statistics:
Pkts received over the port
: 6330629
Ucast pkts sent to the cross-bar
: 5580600
Mcast pkts sent to the cross-bar
: 750029
Ucast pkts received from the cross-bar : 7695639
Pkts sent to the port
: 10598898
Pkts discarded on ingress
:0
Per-priority-pause status
: Rx (Inactive), Tx (Inactive)
qos-group 1
q-size: 76800, HW MTU: 2240 (2158 configured)
drop-type: no-drop, xon: 128, xoff: 240
Statistics:
Pkts received over the port
:0
Ucast pkts sent to the cross-bar
:0
Mcast pkts sent to the cross-bar
:0
Ucast pkts received from the cross-bar : 1
Pkts sent to the port
:1
Pkts discarded on ingress
:0
Per-priority-pause status
: Rx (Inactive), Tx (Inactive)
Total Multicast crossbar statistics:
Mcast pkts received from the cross-bar
: 2905930
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
343
TxPPP
-------------------------------------------------------------------------------
Eth1/5
auto on
2967222
Send FlowControl
Receive FlowControl
admin
admin
oper
RxPause TxPause
oper
------------------------------------------------------------------------------Eth1/5
off
off
off
off
3127212 0
Cisco Confidential
344
Cisco Confidential
345
0x0
[102] Ifindex (Ethernet1/7)0x2006000, SFP security check: CRC failed, rcvd CRC
calculated CRC 0xe9777080
Cisco Confidential
346
Cisco Confidential
347
Cisco Confidential
348
Interface Ethernet1/18 is up
Channel group is 20 port channel is Po20
PDUs sent: 94993
PDUs rcvd: 95702
Are PDUs being received? If not, LACP
Markers sent: 0
configured on neighbor?
Markers rcvd: 0
Marker response sent: 0
Marker response rcvd: 0
Unknown packets rcvd: 0
Illegal packets rcvd: 0
Are there any Unknown or Illegal packets
Lag Id: [ [(7f9b, 0-23-4-ee-be-1, 8014, 8000, 204), (7f9b, 0-23received? If so, get a sniffer capture of the
4-ee-be-2, 8014,
packets on the wire and open a TAC case.
8000, 112)] ]
Operational as aggregated link since Wed Jul 27 17:47:49
2011
Cisco Confidential
349
Cisco Confidential
350
Feature Comparisons
Cisco Confidential
351
Nexus 5000
4K (flexible allocation)
480 KB
640 KB
416
128
COS marking
Ingress
DSCP marking
NO
ECN marking
NO
YES
YES
YES
16K
32K
VLAN Table
1K
4K
512
4K
4K
8K
1K
4K
The items marked in RED will NOT be available in Eagle Hawk release
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
352
Nexus 5000
Nexus 5500
NO
YES (up to 4)
NO
YES
NO
YES
ERSPAN
YES
YES
ERSPAN v3
NO
YES
NO
YES
3.2 us
2 us
IEEE 1518
No
Yes
16
48
16
16
L2/L3/L4 SA/DA
NO
YES
LID multipathing
NO
YES
Superframing
YES
YES
NO
YES
NO
YES
Latency
353
Nexus 5000
Nexus 5500
TCAM size
2K
4K
FC Forwarding
YES
YES
FCoE Forwarding
YES
YES
4K
8K
DCE Forwarding
NO
YES
N/A
8K
TRILL Forwarding
NO
YES
N/A
8K
L3 binding table
2K
4K
FC zoning table
2K
4K
RBAC table
2K
2K
Policers
256
512
NO
YES
YES
YES
The items marked in RED will NOT be available in Eagle Hawk release
2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
354
Routing Protocols
IPv6
For Management
L3 Segmentation
High Availability
Fast Convergence
No
Monitoring
ERSPAN**
L2 over L3
No
Traffic Steering
No
Tunneling / Mobility
No
Cisco Confidential
355
L3 Interfaces
4K
4K
1M
8K*
M1/XL: 32K
4K
L3 ECMP
16 Way
16 Way
ARP
50K
8K
Routing Adjacency
128K
8K
FHRP
4K HSRP Groups
1K HSRP Groups
L3 ACLs
128K
Ingress: 2K
Egress: 1K
Segmentation
1K VRFs
1K VRFs
Cisco Confidential
356
Redundant Route
Processors
Yes
No
Distributed Processing
No for L3
Yes
No
FEX Scale L3
32
ISSU
Yes L2 or L3
Edge L2 Only
No
L3 over VPC
No
No
Cisco Confidential
357
Cisco Confidential
358