Cisco Nexus7000 Interfaces Config Guide 8x
Cisco Nexus7000 Interfaces Config Guide 8x
Cisco Nexus7000 Interfaces Config Guide 8x
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
CHAPTER 2 Overview 3
Information About Interfaces 3
Ethernet Interfaces 4
Access Ports 4
Trunk Ports 4
Private VLAN Hosts and Promiscuous Ports 4
Routed Ports 5
Management Interface 5
Port Channel Interfaces 5
vPCs 5
Subinterfaces 5
VLAN Network Interfaces 6
Loopback Interfaces 6
Tunnel Interfaces 6
Virtualization Interfaces 6
High Availability for Interfaces 6
Standards 285
MIBs 285
Configuration Example for Attaching an Ethernet OAM Profile to a Specific Interface 333
Configuration Example for Configuring Ethernet OAM Features on a Specific Interface 334
Configuration Example for Configuration of Ethernet OAM Features in a Profile Followed by
an Override of that Configuration on an Interface 334
Related Documents 335
Preface
This preface describes the audience, organization, and conventions of the Book Title. It also provides
information on how to obtain related documentation.
This chapter includes the following topics:
Audience
This publication is for experienced network administrators who configure and maintain Cisco NX-OS on
Cisco Nexus 7000 Series Platform switches.
Document Conventions
Note • As part of our constant endeavor to remodel our documents to meet our customers' requirements,
we have modified the manner in which we document configuration tasks. As a result of this, you
may find a deviation in the style used to describe these tasks, with the newly included sections of
the document following the new format.
• The Guidelines and Limitations section contains general guidelines and limitations that are applicable
to all the features, and the feature-specific guidelines and limitations that are applicable only to the
corresponding feature.
Convention Description
bold Bold text indicates the commands and keywords that you enter literally
as shown.
Italic Italic text indicates arguments for which the user supplies the values.
variable Indicates a variable for which you supply values, in context where italics
cannot be used.
string A nonquoted set of characters. Do not use quotation marks around the
string or the string will include the quotation marks.
Convention Description
screen font Terminal sessions and information the switch displays are in screen font.
boldface screen font Information you must enter is in boldface screen font.
italic screen font Arguments for which you supply values are in italic screen font.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment damage
or loss of data.
Related Documentation
Documentation for Cisco Nexus 7000 Series Switches is available at the following URL:
• Configuration Guides
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/
products-installation-and-configuration-guides-list.html
• Command Reference Guides
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/
products-command-reference-list.html
• Release Notes
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/
products-release-notes-list.html
• Install and Upgrade Guides
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/
products-installation-guides-list.html
• Licensing Guide
http://www.cisco.com/c/en/us/support/switches/nexus-7000-series-switches/
products-licensing-information-listing.html
Documentation for Cisco Nexus 7000 Series Switches and Cisco Nexus 2000 Series Fabric Extenders is
available at the following URL:
http://www.cisco.com/c/en/us/support/switches/nexus-2000-series-fabric-extenders/
products-installation-and-configuration-guides-list.html
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to [email protected]. We appreciate your feedback.
Port Channels Hash Added support for Port 8.0(1) Configuring Port
Distribution Channels Hash Channels, on page 145
Distribution on M3
modules.
FEC Support on Optic Added FEC support for 8.0(1) Configuring FEC on
Modules optic modules on M3 line Optic Modules, on page
cards. 337
Security Dot1X, NAC, EOU, port security Cisco Nexus 7000 Series NX-OS
Security Configuration Guide,
Release 6.x
FCoE From Cisco NX-OS Release 5.2(1), Cisco NX-OS FCoE Configuration
you can run Fibre Channel over Guide for Cisco Nexus 7000 and
Ethernet (FCoE) on the Cisco Cisco MDS 9000
Nexus 7000 Series Switches
Ethernet Interfaces
Ethernet interfaces include access ports, trunk ports, private VLAN hosts and promiscuous ports, and routed
ports.
Access Ports
An access port carries traffic for one VLAN. This type of port is a Layer 2 interface only. For more information
about access-port interfaces, see “Configuring Layer 2 Interfaces.”
Trunk Ports
A trunk port carries traffic for two or more VLANs. This type of port is a Layer 2 interface only. For more
information about trunk-port interfaces, see “Configuring Layer 2 Interfaces.”
In an isolated VLAN, PVLAN hosts communicate only with hosts in the primary VLAN. In a community
VLAN, PVLAN hosts communicate only among themselves and with hosts in the primary VLAN but not
with hosts in isolated VLANs or in other community VLANs. Community VLANs use promiscuous ports to
communicate outside the PVLAN. Regardless of the combination of isolated and community secondary
VLANs, all interfaces within the primary VLAN comprise one Layer 2 domain and require only one IP subnet.
You can configure a Layer 3 VLAN network interface, or switched virtual interface (SVI), on the PVLAN
promiscuous port, which provides routing functionality to the primary PVLAN.
For more information on configuring PVLAN host and PVLAN promiscuous ports and all other PVLAN
configurations, see the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide
Routed Ports
A routed port is a physical port that can route IP traffic to another device. A routed port is a Layer 3 interface
only and does not support Layer 2 protocols, such as the Spanning Tree Protocol (STP). For more information
on routed ports, see the “Routed Interfaces” section.
Management Interface
You can use the management Ethernet interface to connect the device to a network for remote management
using a Telnet client, the Simple Network Management Protocol (SNMP), or other management agents. The
management port (mgmt0) is autosensing and operates in full-duplex mode at a speed of 10/100/1000 Mb/s.
For more information on the management interface, see the Cisco Nexus 7000 Series NX-OS Fundamentals
Configuration Guide. You will also find information on configuring the IP address and default IP routing for
the management interface in this document.
vPCs
Virtual port channels (vPCs) allow links that are physically connected to two different Cisco Nexus 7000
series devices to appear as a single port channel by a third device. The third device can be a switch, server,
or any other networking device. You can configure a total of 748 vPCs on each device. vPCs provide Layer
2 multipathing. For more information about vPCs, see “Configuring vPCs.”
Subinterfaces
You can create virtual subinterfaces on a parent interface configured as a Layer 3 interface. A parent interface
can be a physical port or a port channel. Subinterfaces divide the parent interface into two or more virtual
interfaces on which you can assign unique Layer 3 parameters such as IP addresses and dynamic routing
protocols. For more information about subinterfaces, see the “Subinterfaces” section.
Loopback Interfaces
A virtual loopback interface is a virtual interface with a single endpoint that is always up. Any packet that is
transmitted over a virtual loopback interface is immediately received by that interface. Loopback interfaces
emulate a physical interface. For more information about subinterfaces, see the “Loopback Interfaces” section.
Tunnel Interfaces
Tunneling allows you to encapsulate arbitrary packets inside a transport protocol. This feature is implemented
as a virtual interface to provide a simple interface for configuration. The tunnel interface provides the services
necessary to implement any standard point-to-point encapsulation scheme. You can configure a separate tunnel
for each link. For more information, see “Configuring IP Tunnels.”
Virtualization Interfaces
You can create multiple virtual device contexts (VDCs). Each VDC is an independent logical device to which
you can allocate interfaces. Once an interface is allocated to a VDC, you can only configure that interface if
you are in the correct VDC. For more information on VDCs, see the Cisco Nexus 7000 Series NX-OS Virtual
Device Context Configuration Guide.
Display errors during policy 6.2(2) Added the show interface status error policy
programming. command which displays the interfaces and
VLANs that produce an error during policy
programming.
Clear SNMP counters from 6.2(2) Updated the clear counters interface
the interface command to include the snmp keyword that
provides an option to clear SNMP values from
the interface.
Enhanced show output for 6.1(1) Updated the show interface eth command
interfaces output.
You can change a Layer 3 interface into a Layer 2 interface by using the switchport command. You
can change a Layer 2 interface into a Layer 3 interface by using the no switchport command.
• When configuring flow control for a local port, consider the following:
◦To receive pause frames when you do not know how the remote port send parameter is configured,
set the local port receive parameter to desired.
◦To receive pause frames when you know that the remote port send parameter is enabled or desired,
set the local port receive parameter to enabled.
◦To ignore received pause frames, set the local port receive parameter to disabled.
◦To send pause frames when you do not know how the remote port receive parameter is configured,
set the local port send parameter to desired.
◦To send pause frames when you know that the remote port receive parameter is enabled or desired,
set the local port send parameter to enabled.
◦To prevent the sending of pause frames, set the local port send parameter to disabled.
• You usually configure Ethernet port speed and duplex mode parameters to auto to allow the system to
negotiate the speed and duplex mode between ports. If you decide to configure the port speed and duplex
modes manually for these ports, consider the following:
◦Before you configure the speed and duplex mode for an Ethernet or management interface, see
Speed Mode and Duplex Mode, on page 13 for the combinations of speeds and duplex modes
that can be configured at the same time.
◦If you set the Ethernet port speed to auto, the device automatically sets the duplex mode to auto.
◦If you enter the no speed command, the device automatically sets both the speed and duplex
parameters to auto (the no speed command produces the same results as the speed auto command).
◦If you configure an Ethernet port speed to a value other than auto (for example, 10, 100, or 1000
Mb/s), you must configure the connecting port to match. Do not configure the connecting port to
negotiate the speed.
Note The device cannot automatically negotiate the Ethernet port speed and duplex mode if
the connecting port is configured to a value other than auto.
Caution Changing the Ethernet port speed and duplex mode configuration might shut down and reenable the
interface.
Parameter Default
Description Blank
Beacon Disabled
UDLD per-port enable state for fiber-optic media Enabled on all Ethernet fiber-optic LAN ports
UDLD per-port enable state for copper media Disabled on all Ethernet 10/100 and 1000BASE-TX
LAN ports
Interface Description
For the Ethernet and management interfaces, you can configure the description parameter to provide a
recognizable name for the interface. Using a unique name for each interface allows you to quickly identify
the interface when you are looking at a listing of multiple interfaces.
For information about setting the description parameter for port-channel interfaces, see the “Configuring a
Port-Channel Description” section. For information about configuring this parameter for other interfaces, see
the “Configuring the Interface Description” section.
Beacon
The beacon mode allows you to identify a physical port by flashing its link state LED with a green light. By
default, this mode is disabled. To identify the physical port for an interface, you can activate the beacon
parameter for the interface.
For information about configuring the beacon parameter, see the “Configuring the Beacon Mode” section.
MDIX
The medium dependent interface crossover (MDIX) parameter enables or disables the detection of a crossover
connection between devices. This parameter applies only to copper interfaces. By default, this parameter is
enabled.
For information about configuring the MDIX parameter, see the “Configuring the MDIX Parameter” section.
Debounce Timer
The debounce timer delays notification of a link change, which can decrease traffic loss due to network
reconfiguration. You can configure the debounce timer separately for each Ethernet port and specify the delay
time in milliseconds. The default value for debounce timer link down is 100 milliseconds and the default value
for debounce timer link up is 0 milliseconds.
From Cisco NX-OS Release 7.3(0)D1(1), you can configure separate debounce timer values for debounce
timer link down and link up. The debounce timer for link up helps in better convergence after a system reloads
and avoids traffic blackholing.
Caution Enabling the debounce timer causes the link-down detections to be delayed, which results in a loss of
traffic during the debounce period. This situation might affect the convergence and reconvergence of some
Layer 2 and Layer 3 protocols.
For information about configuring the debounce-timer parameters, see the “Configuring the Debounce Timer”
section.
Error Disabled
A port is in the error-disabled (err-disabled) state when the port is enabled administratively (using the no
shutdown command) but disabled at runtime by any process. For example, if UDLD detects a unidirectional
link, the port is shut down at runtime. However, because the port is administratively enabled, the port status
displays as err-disable. Once a port goes into the err-disable state, you must manually reenable it or you can
configure a timeout value that provides an automatic recovery. By default, the automatic recovery is not
configured, and by default, the err-disable detection is enabled for all causes.
When an interface is in the err-disabled state, use the errdisable detect cause command to find information
about the error.
You can configure the automatic error-disabled recovery timeout for a particular error-disabled cause and
configure the recovery period. The errdisable recovery cause command provides an automatic recovery after
300 seconds.
The errdisable recovery cause command provides an automatic recovery after 300 seconds.
You can use the errdisable recovery interval command to change the recovery period within a range of 30
to 65535 seconds. You can also configure the recovery timeout for a particular err-disable cause.
If you do not enable the error-disabled recovery for the cause, the interface stays in the error-disabled state
until you enter the shutdown and no shutdown commands. If the recovery is enabled for a cause, the interface
is brought out of the error-disabled state and allowed to retry operation once all the causes have timed out.
Use the show interface status err-disabled command to display the reason behind the error.
From Cisco NX-OS Release 6.2(2), you can use the show errdisable recovery and show errdisable detect
commands to display the errdisable recovery and detection runtime information.
the same port from being brought up in the future. This process helps to avoid unnecessary disruption to the
system.
Rate Mode
On a 32-port, 10-Gigabit Ethernet module, each set of four ports can handle 10 Gb/s of bandwidth. You can
use the rate-mode parameter to dedicate that bandwidth to the first port in the set of four ports or share the
bandwidth across all four ports.
The table below identifies the ports that are grouped together to share each 10 Gb/s of bandwidth and which
port in the group can be dedicated to use the entire bandwidth.
Ports Groups that Can Share Bandwidth Ports that Can be Dedicated to Each 10-Gigabit
Ethernet of Bandwidth
1, 3, 5, 7 1
2, 4, 6, 8 2
9, 11, 13, 15 9
Note All ports in each port group must be part of the same virtual device context (VDC). For more information
on VDCs, see the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide.
Flow Control
When the receive buffer for an Ethernet port that runs 1 Gb/s or faster fills, flow control enables that port to
send an IEEE 802.3x pause frame to the transmitting port to request it to stop transmitting data for a specified
amount of time. Transmitting ports, running at any speed, can receive the pause frames to stop their transmission
of data.
To allow flow control to work between two ports, you must set the corresponding receive and send flow
control parameters for both ports as enabled or desired. When you set the parameter to enabled, the send or
receive flow-control function is activated regardless of the setting of the other port. When you set the parameter
to desired, the send or receive flow-control function is activated if you set the corresponding flow-control
state of the other port to enabled or desired. If you set one of the flow control states to disabled, flow control
is disabled for that transmission direction. To see how the different port flow-control states affect the link
flow-control state, see the table below.
For information about setting the flow-control parameters, see the “Configuring Flow Control” section.
By default, each port has an MTU of 1500 bytes, which is the IEEE 802.3 standard for Ethernet frames. Larger
MTU sizes are possible for more efficient processing of data with less overhead. The larger frames, called
jumbo frames, can be up to 9216 bytes in size, which is also the default system jumbo MTU size.
On a Layer 3 interface, you can configure an MTU size between 576 and 9216 bytes. You can configure up
to 64 MTU settings for each I/O module.
Note The global LAN port MTU size applies to the traffic through a Layer 3 Ethernet LAN port that is configured
with a nondefault MTU size.
For a Layer 2 port, you can configure an MTU size that is either the system default (1500 bytes) or the system
jumbo MTU size (initially 9216 bytes).
Note If you change the system jumbo MTU size, Layer 2 ports automatically use the system default MTU size
(1500 bytes) unless you specify the new system jumbo MTU size for some or all of those ports.
For information about setting the MTU size, see the “Configuring Interface MTU Size” section.
Bandwidth
Ethernet ports have a fixed bandwidth of 1,000,000 Kb at the physical level. Layer 3 protocols use a bandwidth
value that you can set for calculating their internal metrics. The value that you set is used for informational
purposes only by the Layer 3 protocols—it does not change the fixed bandwidth at the physical level. For
example, the Interior Gateway Routing Protocol (IGRP) uses the minimum path bandwidth to determine a
routing metric, but the bandwidth at the physical level remains at 1,000,000 Kb.
For information about configuring the bandwidth parameter for port-channel interfaces, see the “Configuring
the Bandwidth and Delay for Informational Purposes” section. For information about configuring the bandwidth
parameter for other interfaces, see the “Configuring Bandwidth for Ethernet Interfaces” section.
Throughput Delay
Specifying a value for the throughput-delay parameter provides a value used by Layer 3 protocols; it does not
change the actual throughput delay of an interface. The Layer 3 protocols can use this value to make operating
decisions. For example, the Enhanced Interior Gateway Routing Protocol (EIGRP) can use the delay setting
to set a preference for one Ethernet link over another, if other parameters such as link speed are equal. The
delay value that you set is in the tens of microseconds.
For information about configuring the bandwidth parameter for port-channel interfaces, see the “Configuring
the Bandwidth and Delay for Informational Purposes” section. For information about configuring the
throughput-delay parameter for other interfaces, see the “Configuring Throughput Delay” section.
Administrative Status
The administrative-status parameter determines whether an interface is up or down. When an interface is
administratively down, it is disabled and unable to transmit data. When an interface is administratively up, it
is enabled and able to transmit data.
For information about configuring the administrative status parameter for port-channel interfaces, see the
“Shutting Down and Restarting the Port-Channel Interface” section. For information about configuring the
administrative-status parameter for other interfaces, see the “Shutting Down and Activating an Interface”
section.
Note By default, UDLD is locally disabled on copper LAN ports to avoid sending unnecessary control traffic
on this type of media.
The figure below shows an example of a unidirectional link condition. Device B successfully receives traffic
from device A on the port. However, device A does not receive traffic from device B on the same port. UDLD
detects the problem and disables the port.
UDLD per-port enable state for fiber-optic media Enabled on all Ethernet fiber-optic LAN ports
UDLD per-port enable state for twisted-pair (copper) Disabled on all Ethernet 10/100 and 1000BASE-TX
media LAN ports
For information about configuring the UDLD for the device and its port, see the “Configuring UDLD Mode”
section.
• One side of a link has a port stuck (both transmission and receive)
• One side of a link remains up while the other side of the link is down
In these cases, the UDLD aggressive mode disables one of the ports on the link, which prevents traffic from
being discarded.
Note You enable the UDLD aggressive mode globally to enable that mode on all the fiber ports. You must
enable the UDLD aggressive mode on copper ports on specified interfaces.
Tip When a line card upgrade is being performed during an in-service software upgrade (ISSU) and some of
the ports on the line card are members of a Layer 2 port channel and are configured with UDLD aggressive
mode, if you shut down one of the remote ports, UDLD puts the corresponding port on the local device
into an error-disabled state. This behavior is correct.
To restore service after the ISSU has completed, enter the shutdown command followed by the no shutdown
command on the local port.
Carrier Delay
Note You can configure the carrier delay timer only on VLAN network interfaces. The timer cannot be configured
on physical Ethernet interfaces, port channels, and loopback interfaces. See “Configuring Layer 3 Interfaces,”
for information about configuring VLAN network interfaces.
If a link goes down and comes back up before the carrier delay timer expires, the down state is effectively
filtered, and the rest of the software on the device is not aware that a link-down event occurred. A large carrier
delay timer results in fewer link-up/link-down events being detected. When you set the carrier delay time to
0, the device detects each link-up/link-down event that occurs.
In most environments, a lower carrier delay time is better than a higher one. The exact value that you choose
depends on the nature of the link outages and how long you expect these linkages to last in your network. If
your data links are subject to short outages (especially if those outages last less time than it takes for your IP
routing to converge), you should set a long carrier delay value to prevent these short outages from causing
unnecessary problems in your routing tables. However, if your outages tend to be longer, you might want to
set a shorter carrier delay time so that the outages are detected sooner, and the IP route convergence begins
and ends sooner.
The default carrier-delay time is 100 milliseconds.
You can create a Layer 2 port channel by bundling compatible Layer 2 interfaces, or you can create Layer 3
port channels by bundling compatible Layer 3 interfaces. You cannot combine Layer 2 and Layer 3 interfaces
in the same port channel.
Any configuration changes that you apply to the port channel are applied to each interface member of that
port channel.
For information about port channels and for information about configuring port channels, see “Configuring
Port Channels.”
Port Profiles
From Cisco NX-OS Release 4.2(1) for the Cisco Nexus 7000 Series devices, you can create a port profile that
contains many interface commands and apply that port profile to a range of interfaces. Each port profile can
be applied only to a specific type of interface; the choices are as follows:
• Ethernet
• VLAN network interface
• Loopback
• Port channel
• Tunnel
When you choose Ethernet or port channel as the interface type, the port profile is in the default mode which
is Layer 3. Enter the switchport command to change the port profile to Layer 2 mode.
You inherit the port profile when you attach the port profile to an interface or range of interfaces. When you
attach, or inherit, a port profile to an interface or range of interfaces, the system applies all the commands in
that port profile to the interfaces. Additionally, you can have one port profile inherit the settings from another
port profile. Inheriting another port profile allows the initial port profile to assume all of the commands of
the second, inherited, port profile that do not conflict with the initial port profile.Four levels of inheritance
are supported. The same port profile can be inherited by any number of port profiles.
The system applies the commands inherited by the interface or range of interfaces according to the following
guidelines:
• Commands that you enter under the interface mode take precedence over the port profile’s commands
if there is a conflict. However, the port profile retains that command in the port profile.
• The port profile’s commands take precedence over the default commands on the interface, unless the
port-profile command is explicitly overridden by the default command.
• When a range of interfaces inherits a second port profile, the commands of the initial port profile override
the commands of the second port profile if there is a conflict.
• After you inherit a port profile onto an interface or range of interfaces, you can override individual
configuration values by entering the new value at the interface configuration level. If you remove the
individual configuration values at the interface configuration level, the interface uses the values in the
port profile again.
• There are no default configurations associated with a port profile.
A subset of commands are available under the port-profile configuration mode, depending on which interface
type you specify.
Note You cannot use port profiles with Session Manager. See the Cisco Nexus 7000 Series NX-OS System
Management Configuration Guide for information about Session Manager.
To apply the port-profile configurations to the interfaces, you must enable the specific port profile. You can
configure and inherit a port profile onto a range of interfaces prior to enabling the port profile. You would
then enable that port profile for the configurations to take effect on the specified interfaces.
If you inherit one or more port profiles onto an original port profile, only the last inherited port profile must
be enabled; the system assumes that the underlying port profiles are enabled.
When you remove a port profile from a range of interfaces, the system undoes the configuration from the
interfaces first and then removes the port-profile link itself. Also, when you remove a port profile, the system
checks the interface configuration and either skips the port-profile commands that have been overridden by
directly entered interface commands or returns the command to the default value.
If you want to delete a port profile that has been inherited by other port profiles, you must remove the inheritance
before you can delete the port profile.
You can also choose a subset of interfaces from which to remove a port profile from among that group of
interfaces that you originally applied the profile. For example, if you configured a port profile and configured
ten interfaces to inherit that port profile, you can remove the port profile from just some of the specified ten
interfaces. The port profile continues to operate on the remaining interfaces to which it is applied.
If you delete a specific configuration for a specified range of interfaces using the interface configuration mode,
that configuration is also deleted from the port profile for that range of interfaces only. For example, if you
have a channel group inside a port profile and you are in the interface configuration mode and you delete that
port channel, the specified port channel is also deleted from the port profile as well.
Just as in the device, you can enter a configuration for an object in port profiles without that object being
applied to interfaces yet. For example, you can configure a virtual routing and forward (VRF) instance without
it being applied to the system. If you then delete that VRF and related configurations from the port profile,
the system is unaffected.
After you inherit a port profile on an interface or range of interfaces and you delete a specific configuration
value, that port-profile configuration is not operative on the specified interfaces.
If you attempt to apply a port profile to the wrong type of interface, the system returns an error.
When you attempt to enable, inherit, or modify a port profile, the system creates a checkpoint. If the port-profile
configuration fails, the system rolls back to the prior configuration and returns an error. A port profile is never
only partially applied.
By estimating the speed of propagation of the signal in the cable and by measuring the time it takes for its
reflection to travel back to the source, it is possible to measure the distance to the reflecting point. Also, by
comparing the polarity and amplitude of the original pulse with its reflection, it is possible to distinguish
between different types of faults, such as open or shorted pairs.
Being able to remotely diagnose a cable failure, you can now identify the root cause of a problem more quickly
and more effectively, providing your users with a prompt response to connectivity issues.
The interface range configuration mode allows you to configure multiple interfaces with the same configuration
parameters. After you enter the interface range configuration mode, all command parameters you enter are
attributed to all interfaces within that range until you exit out of the interface range configuration mode.
You enter a range of interfaces using dashes (-) and commas (,). Dashes separate contiguous interfaces and
commas separate noncontiguous interfaces. When you enter noncontiguous interfaces, you must enter the
media type for each interface.
This example shows how to configure a contiguous interface range:
Note When you are in the interface configuration mode, the commands that you enter configure the interface
that you specified for this mode.
Procedure
Procedure
Step 2 switch(config)# interface interface Specifies the interface that you are configuring.
You can specify the interface type and identity. For an
Ethernet port, use “ethernet slot/port.” For the
management interface, use “mgmt0.”
Step 3 switch(config-if)# description text Specifies the description for the interface. The
description is a maximum of 254 characters.
This example shows how to set the interface description to Ethernet port 24 on module 3:
Procedure
This example shows how to enable the beacon mode for the Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# beacon
This example shows how to disable the beacon mode for the Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# no beacon
Procedure
Step 4 switch(config)# interface ethernet Specifies the first Ethernet interface in a group of
slot/port interfaces.
This example shows how to configure the dedicated mode for Ethernet port 4/17 in the group that includes
ports 4/17, 4/19, 4/21, and 4/23:
switch# configure terminal
switch(config)# interface ethernet 4/17, ethernet 4/19, ethernet 4/21, ethernet 4/23
switch(config-if)# shutdown
switch(config-if)# interface ethernet 4/17
switch(config-if)# rate-mode dedicated
switch(config-if)# no shutdown
Procedure
Step 2 switch(config)# interface ethernet Specifies the first Ethernet interface in a group
slot/port of interfaces.
This example shows how to configure the shared mode for Ethernet port 4/17 in the group that includes ports
4/17, 4/19, 4/21, and 4/23:
switch# configure terminal
switch(config)# interface ethernet 4/17
switch(config-if)# shutdown
switch(config)# interface ethernet 4/17, ethernet 4/19, ethernet 4/21, ethernet 4/23
switch(config-if)# rate-mode shared
switch(config-if)# no shutdown
Procedure
Step 2 switch(config)# errdisable detect Specifies a condition under which to place the interface
cause {acl-exception | all | link-flap | in an error-disabled state. The default is enabled.
loopback}
Step 3 switch(config)# shutdown Brings the interface down administratively. To
manually recover the interface from the error-disabled
state, enter this command first.
This example shows how to enable the error-disabled detection in all cases:
switch(config)# errdisable detect cause all
Procedure
Step 2 switch(config)# errdisable recovery cause Specifies a condition under which the interface
{all | bpduguard | link-flap | automatically recovers from the error-disabled state,
psecure-violation | security-violation | and the device retries bringing the interface up. The
storm-control | udld} device waits 300 seconds to retry. The default is
disabled.
This example shows how to enable error-disabled recovery under all conditions:
switch(config)# errdisable recovery cause all
Procedure
Step 2 switch(config)# errdisable recovery Specifies the interval for the interface to recover from
interval interval the error-disabled state. The range is from 30 to
65535 seconds, and the default is 300 seconds.
This example shows how to configure the error-disabled recovery timer to set the interval for recovery to 32
seconds:
switch(config)# errdisable recovery interval 32
Procedure
Step 3 switch(config-if)# {mdix auto | no mdix} Specifies whether to enable or disable MDIX
detection for the port.
This example shows how to enable MDIX for Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# mdix auto
This example shows how to disable MDIX for Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# no mdix
Procedure
This example shows how to enable the link down debounce timer to 1000 ms for the Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# link debounce time 1000
This example shows how to enable the debounce link-up timer and set the debounce time to 1000 ms for the
Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# link debounce link-up time 1000
This example shows how to disable the debounce timer for the Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# link debounce time 0
Note The interface speed that you specify can affect the duplex mode used for an interface, so you should set
the speed before setting the duplex mode. If you set the speed for autonegotiation, the duplex mode is
automatically set to be autonegotiated. If you specify 10- or 100-Mb/s speed, the port is automatically
configured to use half-duplex mode, but you can specify full-duplex mode instead. If you specify a speed
of 1000 Mb/s (1 Gb/s) or faster, full duplex is automatically used.
Procedure
Step 2 switch(config)# interface Specifies the interface that you are configuring. You can
interface specify the interface type and identity. For an Ethernet port,
use “ethernet slot/port.” For the management interface, use
“mgmt0.”
Step 3 switch(config-if)# speed {{10 | For Ethernet ports on the 48-port 10/100/1000 modules, sets
100 | 1000 | {auto [10 100 the speed at 10 Mb/s, 100 Mb/s, or 1000 Mb/s, or sets the
[1000]]}} | {10000 | auto}}
Step 4 switch(config-if)# duplex {full | Specifies the duplex mode as full, half, or autonegotiate.
half | auto}
Step 5 switch(config-if)# exit Exits the interface mode.
This example shows how to set the speed of Ethernet port 1 on the 48-port, 10/100/1000 module in slot 3 to
1000 Mb/s and full-duplex mode:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# speed 1000
switch(config-if)# duplex full
switch(config-if)#
Note For ports that run at 10 Gb/s, you cannot use the desired state for the send or receive parameter.
a send parameter set to on or desired. If you do not want to use flow control, you can set the remote port’s
send and receive parameters to off.
Procedure
Step 2 switch(config)# interface ethernet Specifies an Ethernet interface to configure by its slot
slot/port number and port number, and enters the interface
configuration mode.
Step 3 switch(config-if)# flowcontrol {send Specifies the flow-control setting for ports. You can
| receive} {desired | on | off} set the send setting for only the ports running at 1000
Mb/s or faster. You can set the receive setting for ports
running at any speed.
This example shows how to set Ethernet port 3/1 to send flow control pause frames:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# flowcontrol send on
Note You can change the system jumbo MTU size, but if you change that value, the Layer 2 interfaces that use
that value automatically changes to the new system jumbo MTU value.
By default, Cisco NX-OS configures Layer 3 parameters. If you want to configure Layer 2 parameters, you
need to switch the port mode to Layer 2.
You can change the port mode by using the switchport command.
After changing the port mode to Layer 2, you can return to configuring Layer 3 interfaces by changing the
port mode again, by using the no switchport command.
Procedure
Step 2 switch(config)# interface ethernet Specifies an Ethernet interface to configure, and enters
slot/port interface configuration mode.
This example shows how to configure the Layer 2 Ethernet port 3/1 with the default MTU size (1500):
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport
switch(config-if)# mtu 1500
When you configure jumbo MTU on a port-channel subinterface you must first enable MTU 9216 on the base
interface and then configure it again on the subinterface. If you enable the jumbo MTU on the subinterface
before you enable it on the base interface then the following error will be displayed on the console:
switch(config)# int po 502.4
switch(config-subif)# mtu 9216
ERROR: Incompatible MTU values
Procedure
Step 2 switch(config)# system Specifies the system jumbo MTU size. Use an even number
jumbomtu size between 1500 and 9216.
Step 5 switch(config-if)# mtu size For a Layer 2 interface, specifies either the default MTU size
(1500) or the system jumbo MTU size that you specified earlier.
For a Layer 3 interface, specifies any even size between 576 and
9216.
Note To enable jumbo MTU for Layer 3 port-channel
subinterfaces, you must first enable the base (parent)
interface using the mtu 9216 command and then configure
the mtu 9216 command for each subinterface on which
this MTU size is to be supported. If you configure the
commands in the reverse order (subinterface first and
then the base interface), the following message is
displayed: Incompatible MTU values.
This example shows how to configure the system jumbo MTU as 8000 bytes and how to change the MTU
specification for an interface that was configured with the previous jumbo MTU size:
switch# configure terminal
switch(config)# system jumbomtu 8000
Procedure
This example shows how to configure an informational value of 1,000,000 Kb for the Ethernet slot 3, port 1
interface bandwidth parameter:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# bandwidth 1000000
Procedure
Step 3 switch(config-if)# delay value Specifies the delay time in tens of microseconds. You
can set an informational value range between 1 and
16777215 tens of microseconds.
This example shows how to configure the throughput-delay time so that one interface is preferred over another.
A lower delay value is preferred over a higher value. In this example, Ethernet 7/48 is preferred over 7/47.
The default delay for 7/48 is less than the configured value on 7/47, which is set for the highest value
(16777215):
switch# configure terminal
switch(config)# interface ethernet 7/47
switch(config-if)# delay 16777215
switch(config-if)# ip address 192.168.10.1/24
switch(config-if)# ip router eigrp 10
switch(config-if)# no shutdown
switch(config-if)# exit
switch(config)# interface ethernet 7/48
switch(config-if)# ip address 192.168.11.1/24
switch(config-if)# ip router eigrp 10
switch(config-if)# no shutdown
Note You must first ensure the EIGRP feature is enabled by running the feature eigrp command.
Procedure
Step 2 switch(config)# interface interface Specifies the interface that you are configuring. You
can specify the interface type and identity. For an
Ethernet port, use “ethernet slot/port.” For the
management interface, use “mgmt0.”
This example shows how to change the administrative status for Ethernet port 3/1 from disabled to enabled:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# shutdown
switch(config-if)# no shutdown
To use the normal UDLD mode, you must configure one of the ports for normal mode and configure the other
port for the normal or aggressive mode. To use the aggressive UDLD mode, you must configure both ports
for the aggressive mode.
By default, UDLD is disabled for the 48-port, 10/100/1000 Ethernet module ports but the normal UDLD mode
is enabled for the 32-port, 10-Gigabit Ethernet module ports.
Procedure
This example shows how to enable the UDLD for the device:
switch# configure terminal
switch(config)# feature udld
This example shows how to set the UDLD message interval to 30 seconds:
switch# configure terminal
switch(config)# feature udld
switch(config)# udld message-time 30
This example shows how to enable the aggressive UDLD mode for fiber interfaces:
switch# configure terminal
switch(config)# feature udld
switch(config)# udld aggressive
This example shows how to enable the aggressive UDLD mode for the copper interface Ethernet 3/1:
switch# configure terminal
switch(config)# feature udld
switch(config)# udld aggressive
switch(config)# interface ethernet 3/1
switch(config-if-range)# udld enable
This example shows how to disable UDLD for Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if-range)# no udld enable
switch(config-if-range)# exit
Note You can configure the carrier delay timer only on VLAN network interfaces; you cannot configure this
timer in any other interface modes.
Procedure
Step 2 switch(config)# interface vlan vlan-id Enters the VLAN interface mode.
Step 3 switch(config-if)# carrier-delay {sec | Sets the carrier delay timer. You can set the time
msec number} between 0 to 60 seconds or 0 to 1000 milliseconds.
The default is 100 milliseconds.
This example shows how to set the carrier delay timer to 20 seconds for VLAN 5:
switch# configure terminal
switch(config)# interface vlan 5
switch(config-if)# carrier-delay 20
Procedure
Step 2 switch(config)# port-profile [type Creates and names a port profile for the specified
{ethernet | interface-vlan | loopback | port type of interface and enters the port-profile
channel | tunnel}] name configuration mode.
This example shows how to create a port profile named test for tunnel interfaces:
switch# configure terminal
switch(config)# port-profile type tunnel test
switch(config-ppm)#
Procedure
Step 2 switch(config)# port-profile [type Enters the port-profile configuration mode for the
{ethernet | interface-vlan | loopback | specified port profile and allows you to add or
port channel | tunnel}] name remove configurations to the profile.
This example shows how to enter the port-profile configuration mode for the specified port profile and bring
all the interfaces administratively up:
switch# configure terminal
switch(config)# port-profile type tunnel test
switch(config-ppm)# no shutdown
switch(config-ppm)#
Procedure
This example shows how to assign the port profile named adam to Ethernet interfaces 7/3 to 7/5, 10/2, and
11/20 to 11/25:
switch# configure terminal
switch(config)# interface ethernet7/3-5, ethernet10/2, ethernet11/20-25
switch(config-if)# inherit port-profile adam
switch(config-if)#
Procedure
This example shows how to enter the port-profile configuration mode and enable the port profile:
switch# configure terminal
switch(config)# port-profile type tunnel test
switch(config-ppm)# state enabled
switch(config-ppm)#
Procedure
Step 2 switch(config)#port-profile name Enters the port-profile configuration mode for the
specified port profile.
Step 3 switch(config-ppm)# inherit Inherits another port profile onto the existing one.
port-profile name The original port profile assumes all the
configurations of the inherited port profile.
This example shows how to inherit the port profile named adam onto the port profile named test:
switch# configure terminal
switch(config)# port-profile test
switch(config-ppm)# inherit port-profile adam
switch(config-ppm)#
Procedure
This example shows how to assign the port profile named adam to Ethernet interfaces 7/3 to 7/5, 10/2, and
11/20 to 11/25:
switch# configure terminal
switch(config)# interface ethernet 7/3-5, 10/2, 11/20-25
switch(config-if)# inherit port-profile adam
switch(config-if)#
Procedure
Step 3 switch(config-ppm)# inherit port-profile Removes an inherited port profile from this port
name profile.
This example shows how to remove the inherited port profile named adam from the port profile named test:
switch# configure terminal
switch(config)# port-profile test
switch(config-ppm)# no inherit port-profile adam
switch(config-ppm)#
Procedure
This example shows how to perform a TDR test on a specific interface. In this example, ethernet 3/1 has a
missing cable, and ethernet 3/12 is a good cable and connection.
switch(config)# interface ethernet 3/1-12
switch(config-if-range)# shutdown
switch# test cable-diagnostics tdr interface ethernet 3/1
switch# test cable-diagnostics tdr interface ethernet 3/12
switch# show interface ethernet 3/1 cable-diagnostics-tdr
--------------------------------------------------------------------------------
Interface Speed Pair Cable Length Distance to fault Channel Pair Status
-------------- ----- ---- -------------- ------------------- ------- -----------
Eth3/1 auto --- N/A 1 +/- 2 m Pair A Open
auto --- N/A 1 +/- 2 m Pair B Open
auto --- N/A 1 +/- 2 m Pair C Open
auto --- N/A 1 +/- 2 m Pair D Open
Note If the rate of incoming or outgoing packets exceeds the configured rate limit, the device logs a system
message, but does not drop any packets.
Procedure
Step 2 switch(config)# [no] rate-limit cpu Configures the rate limits for packets that reach the
direction {input | output | both} pps supervisor module on a particular interface. If the rate of
packets action log incoming or outgoing packets exceeds the configured
rate limit, the device logs a system message but does not
This example shows how to configure the rate limits for packets that reach the supervisor module on a specific
interface:
switch# rate-limit cpu direction both pps 1000 action log
switch# show system internal pktmgr interface ethernet 4/9
Ethernet4/9, ordinal: 44
SUP-traffic statistics: (sent/received)
Packets: 528 / 0
Bytes: 121968 / 0
Instant packet rate: 0 pps / 0 pps
Packet rate limiter (Out/In): 1000 pps / 1000 pps
Average packet rates(1min/5min/15min/EWMA):
Packet statistics:
Tx: Unicast 0, Multicast 528
Broadcast 0
Rx: Unicast 0, Multicast 0
Broadcast 0
Note The system displays only those ports that are allocated to the VDC that you are working in.
Use the information in the below table to verify the basic interface parameters.
Command Purpose
show cdp Displays the CDP status.
show interface interface Displays the configured states of one or all interfaces.
Command Purpose
show interface switchport Displays the status of Layer 2 ports.
show interface status error policy [detail] Displays errors about interfaces and VLANs that are
inconsistent with hardware policies.
The detail command displays the details of the
interfaces that produce an error.
show udld interface Displays the UDLD status for the current interface
or all interfaces.
show udld-global Displays the UDLD status for the current device.
show system internal pktmgr internal ethernet Displays the inbound and outbound rate limit
slot/port configuration for packets that reach the supervisor
module on a specific interface.
show errdisable {recovery | detect} Displays the errdisable recovery and detection runtime
information.
For detailed information about the fields in the output from these commands, see the Cisco Nexus 7000 Series
NX-OS Interfaces Command Reference.
Note F2 Series I/O modules do not support per-VLAN statistics. Therefore, the show interface command will
not display per-VLAN Rx/Tx counters or statistics for switch virtual interfaces (SVIs).
Procedure
Step 2 switch(config)# load-interval Sets up to three sampling intervals to collect bit-rate and
counters {{1 | 2 | 3} seconds} packet-rate statistics. The default values for each counter
is as follows:
• 1—30 seconds; 60 seconds for VLAN network
interface
• 2—300 seconds
• 3—not configured
This example shows how to set the three sample intervals for the Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# load-interval counter 1 60
switch(config-if)# load-interval counter 2 135
switch(config-if)# load-interval counter 3 225
switch(config-if)#
Procedure
This example shows how to clear the Simple Network Management protocol (SNMP) counters on Ethernet
port 5/5:
switch# clear counters interface ethernet 5/5 snmp
switch#
Related Documents
Table 9: Related Documents
Related Topic
Cisco Nexus 7000 Series NX-OS Interfaces Command Reference
Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide
Cisco Nexus 2000 Series NX-OS Fabric Extender Software Configuration Guide for Cisco Nexus 7000
Series Switches, Release 6.x
Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide
VLANs, MAC address tables, private VLANs, and the Spanning Tree Protocol.
Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide
Display policy errors on 6.2(2) Added the show interface status error policy
interfaces and vlans command to display errors on interfaces and
VLANs that are inconsistent with hardware
policies.
Clear SNMP counters from 6.2(2) Updated the clear counters interface
the interface command to include the snmp keyword that
provides an option to clear SNMP values from
the interface.
SVI autostate disable 6.2(2) Added the no autostate command that allows
an SVI to be kept up even if no interface is
up in the corresponding VLAN.
Slow drain device detection 6.1(1) Added configuration for slow drain device
and congestion avoidance detection and avoiding congestion.
• If you are connecting multiple Cisco devices to a non-Cisco 802.1Q cloud, all of the connections must
be through 802.1Q trunks. You cannot connect Cisco devices to a non-Cisco 802.1Q cloud through
access ports because doing so places the access port on the Cisco device into the spanning tree “port
inconsistent” state and no traffic will pass through the port.
• You can group trunk ports into port-channel groups, but all trunks in the group must have the same
configuration. When a group is first created, all ports follow the parameters set for the first port to be
added to the group. If you change the configuration of one of these parameters, the device propagates
that setting to all ports in the group, such as the allowed VLANs and the trunk status. For example, if
one port in a port group ceases to be a trunk, all ports cease to be trunks.
• If you try to enable 802.1X on a trunk port, an error message appears, and 802.1X is not enabled. If you
try to change the mode of an 802.1X-enabled port to trunk, the port mode is not changed.
• Changing the native VLAN on an access port or trunk port will flap the interface. This behavior is
expected.
Parameter Default
Switchport mode Access
Note From Cisco NX-OS Release 5.2, the Cisco Nexus 7000 Series devices support FabricPath Layer 2 interfaces.
See the Cisco Nexus 7000 Series NX-OS FabricPath Command Reference for complete information about
the FabricPath feature and interfaces.
From Cisco NX-OS Release 5.1, a Layer 2 port can function as either one of the following:
• A trunk port
• An access port
• A private VLAN port (see the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide
for more information about private VLANs)
• A FabricPath port (see the Cisco Nexus 7000 Series NX-OS FabricPath Configuration Guide and the
Cisco DCNM FabricPath Configuration Guide for information about FabricPath)
From Cisco NX-OS Release 5.2(1), a Layer 2 port can also function as a shared interface. You cannot configure
an access interface as a shared interface. See the Cisco NX-OS FCoE Configuration Guide for Cisco Nexus
7000 and Cisco MDS 9000 for information about shared interfaces.
A Layer 2 port can function as either a trunk port, an access port, or a private VLAN port.
Note • From Cisco NX-OS Release 6.1, the slow drain device detection and congestion avoidance mechanism
is supported on F series I/O modules that carry the Fabric Channel over Ethernet (FCoE) traffic. See
the "Configuring Slow Drain Device Detection and Congestion Avoidance" section for more
information about configuring slow drain device detection and congestion avoidance on the Cisco
Nexus 7000 Series platform.
You can configure Layer 2 switching ports as access or trunk ports. Trunks carry the traffic of
multiple VLANs over a single link and allow you to extend VLANs across an entire network. All
Layer 2 switching ports maintain media access control (MAC) address tables.
• A Layer 2 port can function as either a trunk port, an access port, or a private VLAN port. See the
Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide for more information
about private VLANs.
Note Cisco NX-OS device supports only IEEE 802.1Q-type VLAN trunk encapsulation.
The figure below shows how you can use trunk ports in the network. The trunk port carries traffic for two or
more VLANs.
See the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide for information about
VLANs.
In order to correctly deliver the traffic on a trunk port with several VLANs, the device uses the IEEE 802.1Q
encapsulation, or tagging, method (see the “IEEE 802.1Q Encapsulation” section for more information).
Note See the Cisco Nexus 7000 Series NX-OS Unicast Routing Configuration Guide for information about
subinterfaces on Layer 3 interfaces.
To optimize the performance on access ports, you can configure the port as a host port. Once the port is
configured as a host port, it is automatically set as an access port, and channel grouping is disabled. Use the
host designation to decrease the time that it takes the designated port to begin to forward packets.
Only an end station can be set as a host port; you will receive an error message if you attempt to configure
other ports as hosts.
If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that
port drops the packet without learning its MAC source address.
A Layer 2 interface can function as either an access port or a trunk port; it cannot function as both port types
simultaneously.
When you change a Layer 2 interface back to a Layer 3 interface, that interface loses all the Layer 2
configuration and resumes the default VLAN configurations.
Note For information about VLANs, see the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration
Guide.
A trunk is a point-to-point link between the switch and another networking device. Trunks carry the traffic
of multiple VLANs over a single link and allow you to extend VLANs across an entire network.
To correctly deliver the traffic on a trunk port with several VLANs, the device uses the IEEE 802.1Q
encapsulation, or tagging, method that uses a tag that is inserted into the frame header (see the figure below).
This tag carries information about the specific VLAN to which the frame and packet belong. This method
allows packets that are encapsulated for several different VLANs to traverse the same port and maintain traffic
separation between the VLANs. Also, the encapsulated VLAN tag allows the trunk to move traffic end-to-end
through the network on the same VLAN.
Access VLANs
Note If you assign an access VLAN that is also a primary VLAN for a private VLAN, all access ports with that
access VLAN will also receive all the broadcast traffic for the primary VLAN in the private VLAN mode.
See the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide for complete information
on private VLANs.
When you configure a port in access mode, you can specify which VLAN will carry the traffic for that interface.
If you do not configure the VLAN for a port in access mode, or an access port, the interface carries traffic for
the default VLAN (VLAN1).
You can change the access port membership in a VLAN by specifying the new VLAN. You must create the
VLAN before you can assign it as an access VLAN for an access port. If you change the access VLAN on an
access port to a VLAN that is not yet created, the system shuts that access port down.
If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that
port drops the packet without learning its MAC source address.
Note Native VLAN ID numbers must match on both ends of the trunk.
The trunk port sends an egressing packet with a VLAN that is equal to the default port VLAN ID as untagged;
all the other egressing packets are tagged by the trunk port. If you do not configure a native VLAN ID, the
trunk port uses the default VLAN.
Note You cannot use a Fibre Channel over Ethernet (FCoE) VLAN as a native VLAN for an Ethernet trunk
switchport.
Note When a port-level configuration is applied, the global configuration for native VLAN tagging will no
longer take effect on that port. Port-level configurations take priority over global configurations.
See the Cisco Nexus 7000 Series NX-OS Interfaces Command Reference for more information on the
switchport trunk native vlan tag command.
Allowed VLANs
By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs are allowed on
each trunk. However, you can remove VLANs from this inclusive list to prevent traffic from the specified
VLANs from passing over the trunk. Later, you can add any specific VLANs that you may want the trunk to
carry traffic for back to the list.
To partition the Spanning Tree Protocol (STP) topology for the default VLAN, you can remove VLAN1 from
the list of allowed VLANs. Otherwise, VLAN1, which is enabled on all ports by default, will have a very big
STP topology, which can result in problems during STP convergence. When you remove VLAN1, all data
traffic for VLAN1 on this port is blocked, but the control traffic continues to move on the port.
See the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide for more information about
STP.
From Cisco Release 5.2, you can change the block of VLANs reserved for internal use. See the Cisco Nexus
7000 Series NX-OS Layer 2 Switching Configuration Guide for more information about changing the reserved
VLANs.
Default Interfaces
The default interface feature allows you to clear the existing configuration of multiple interfaces such as
Ethernet, loopback, VLAN network, port-channel, and tunnel interfaces. All user configuration under a
specified interface will be deleted. You can optionally create a checkpoint before clearing the interface
configuration so that you can later restore the deleted configuration. You can use the default interface feature
to clear the configured parameters for both physical and logical interfaces such as the Ethernet, loopback,
VLAN network, tunnel, and the port-channel interface.
Note The default interface feature is not supported for management interfaces because the device could go to
an unreachable state.
Note A maximum of eight ports can be selected for the default interface. The default interfaces feature is not
supported for management interfaces because the device could go to an unreachable state.
Note You can use the SVI autostate exclude feature only for switched physical Ethernet ports and port channels.
High Availability
The software supports high availability for Layer 2 ports.
Note See the Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide for complete information
about high availability features.
Virtualization Support
The device supports virtual device contexts (VDCs).
All ports in the same trunk must be in the same VDC, and trunk ports cannot carry VLANs from different
VDCs.
Note See the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide for complete
information about VDCs and assigning resources.
The VLAN must exist before you can specify that VLAN as an access VLAN. The system shuts down an
access port that is assigned to an access VLAN that does not exist.
Procedure
Step 2 switch(config)# interface {{type Specifies an interface to configure, and enters interface
slot/port} | {port-channel configuration mode.
number}}
Step 3 switch(config-if)# switchport Sets the interface as a nontrunking nontagged, single-VLAN
mode {access | trunk} Layer 2 interface. An access port can carry traffic in one
VLAN only. By default, an access port carries traffic for
VLAN1; to set the access port to carry traffic for a different
VLAN, use the switchport access vlan command.
Step 4 switch(config-if)# switchport Specifies the VLAN for which this access port will carry
access vlan vlan-id traffic. If you do not enter this command, the access port
carries traffic on VLAN1 only; use this command to change
the VLAN for which the access port carries traffic.
This example shows how to set Ethernet 3/1 as a Layer 2 access port that carries traffic for VLAN 5 only:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport mode access
switch(config-if)# switchport access vlan 5
Note You should apply the switchport host command only to interfaces that are connected to an end station.
You can optimize the performance of access ports that are connected to end stations by simultaneously setting
that port as an access port. An access host port handles the STP like an edge port and immediately moves to
the forwarding state without passing through the blocking and learning states. Configuring an interface as an
access host port also disables port channeling on that interface.
Note See “Configuring Port Channels,” and the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration
Guide for information about port-channel interfaces
Procedure
Step 2 switch(config)# interface type Specifies an interface to configure, and enters interface
slot/port configuration mode.
Step 3 switch(config-if)# switchport Sets the interface to be an access host port, which
host immediately moves to the spanning tree forwarding state and
disables port channeling on this interface.
Note Apply this command only to end
stations.
Step 4 switch(config-if)# exit Exits the interface mode.
This example shows how to set Ethernet 3/1 as a Layer 2 access port with PortFast enabled and port channel
disabled:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport host
Procedure
Step 2 switch(config)# interface {{type Specifies an interface to configure, and enters interface
slot/port} | {port-channel configuration mode.
number}}
Step 3 switch(config-if)# switchport Sets the interface as a Layer 2 trunk port. A trunk port can
mode {access | trunk} carry traffic in one or more VLANs on the same physical link
(VLANs are based on the trunk-allowed VLANs list). By
default, a trunk interface can carry traffic for all VLANs. To
This example shows how to set Ethernet 3/1 as a Layer 2 trunk port:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport mode trunk
Note You cannot configure an FCoE VLAN as a native VLAN for an Ethernet interface.
Procedure
Step 6 switch# show vlan Displays the status and information of VLANs.
This example shows how to set the native VLAN for the Ethernet 3/1, Layer 2 trunk port to VLAN 5:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport trunk native vlan 5
Procedure
Step 2 switch(config)# interface {{type Specifies an interface to configure, and enters interface
slot/port} | {port-channel configuration mode.
number}}
Step 3 switch(config-if)# switchport Sets the allowed VLANs for the trunk interface. The default is
trunk allowed vlan {vlan-list | to allow all VLANs on the trunk interface: 1 to 3967 and 4048
add vlan-list | all | except to 4094. VLANs 3968 to 4047 are the default VLANs reserved
vlan-list | none | remove for internal use by default. By default, all VLANs are allowed
vlan-list} on all trunk interfaces. From Cisco Release 5.2(1), the default
reserved VLANs are 3968 to 4094, and you can change the
block of reserved VLANs. See the Cisco Nexus 7000 Series
NX-OS Layer 2 Switching Configuration Guide for more
information.
Note You cannot add internally allocated VLANs as allowed
VLANs on trunk ports. The system returns a message
if you attempt to list an internally allocated VLAN as
an allowed VLAN.
Step 4 switch(config-if)# exit Exits the interface mode.
Step 6 switch# show vlan Displays the status and information of VLANs.
This example shows how to add VLANs 15 to 20 to the list of allowed VLANs on the Ethernet 3/1, Layer 2
trunk port:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport trunk allowed vlan 15-20
Step 2 switch(config)# default Deletes the configuration of the interface and restores the default
interface int-if [checkpoint configuration. Use the ? keyword to display the supported
name] interfaces.
Use the checkpoint keyword to store a copy of the running
configuration of the interface before clearing the configuration.
Step 4 switch# show interface Displays the interface status and information.
This example shows how to delete the configuration of an Ethernet interface while saving a checkpoint of the
running configuration for rollback purposes:
switch# configure terminal
Step 2 switch(config)# interface {{type Specifies an interface to configure, and enters interface
slot/port} | {port-channel number}} configuration mode.
Step 4 switch(config-if)# [no] switchport Excludes this port from the VLAN interface link-up
autostate exclude calculation when there are multiple ports in the VLAN.
To revert to the default settings, use the no form of this
command.
Step 5 switch(config-if)# [no] switchport Excludes a vlan or a set of vlans from the
autostate exclude vlan vlan id autostate-excluded interface. This will help to minimize
any disruption to the system.
To revert to the default settings, use the no form of this
command.
This example shows how to exclude a port from the VLAN interface link-up calculation on the Cisco NX-OS
device:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport
switch(config-if)# switchport autostate exclude
This example shows how to exclude a VLAN from the auto-excluded interface:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport
switch(config-if)# switchport autostate exclude
switch(config-if)# switchport autostate exclude vlan 10
Procedure
Step 2 switch(config)# system default Disables the default autostate behavior for the device.
interface-vlan no autostate
Step 3 switch# show interface status (Optional)
error policy [detail] Displays the interfaces and VLANs that produce errors during
policy programming to ensure that policies are consistent with
hardware policies.
Use the detail command to display the details of the interfaces
that produce an error.
This example shows how to disable the default autostate behavior on the Cisco NX-OS device:
switch# configure terminal
switch(config)# system default interface-vlan no autostate
switch(config)# show running-config
Procedure
Step 4 switch(config-if)# [no] autostate By default, enables the SVI autostate feature on specified
interface.
To disable the default settings, use the no form of this
command.
This example shows how to disable the default autostate behavior on an individual SVI:
switch# configure terminal
switch(config)# feature interface-vlan
switch(config)# interface vlan10
witch(config-if)# no autostate
Note If you enable 802.1Q tagging on one device and disable it on another device, all traffic is dropped on the
device and this feature is disabled. You must configure this feature identically on each device.
Procedure
Step 2 switch(config)# vlan dot1q Modifies the behavior of a 802.1Q trunked native VLAN ID
tag native interface. The interface maintains the taggings for all packets
that enter with a tag that matches the value of the native VLAN
ID and drops all untagged traffic. The control traffic is still
carried on the native VLAN. The default is disabled.
This example shows how to change the behavior of the native VLAN on an 802.1Q trunked interface to
maintain the tagged packets and drop all untagged traffic (except control traffic):
switch# configure terminal
switch(config)# vlan dot1q tag native
switch#
Procedure
Step 2 switch(config)# system default Sets the default port mode for all interfaces on the system to
switchport [shutdown] Layer 2 access port mode and enters interface configuration
mode. By default, all the interfaces are Layer 3.
Note When the system default switchport shutdown
command is issued, any FEX HIFs that are not
configured with no shutdown are shutdown. To avoid
the shutdown, configure the FEX HIFs with no shut.
Step 3 switch(config)# exit Exits global configuration mode.
This example shows how to set the system ports to be Layer 2 access ports by default:
switch# configure terminal
switch(config-if)# system default switchport
This example shows how to configure a Layer 2 trunk interface, assign the native VLAN and the allowed
VLANs, and configure the device to tag the native VLAN traffic on the trunk interface:
switch# configure terminal
switch(config)# interface ethernet 2/35
switch(config-if)# switchport
switch(config-if)# switchport mode trunk
switch(config-if)# switchport trunk native vlan 10
switch(config-if)# switchport trunk allowed vlan 5, 10
switch(config-if)# exit
switch(config)# vlan dot1q tag native
switch(config)#
Procedure
Step 2 switch# [no] system default interface Configures a new congestion frame timeout value in
congestion timeout milliseconds mode milliseconds and the port mode for the device.
{core | edge} The congestion timeout range is from 100 to 1000
milliseconds.
Step 3 switch# system default interface Configures the default congestion frame timeout value
congestion mode {core | edge} in milliseconds and the port mode for the device.
The congestion timeout range is from 100 to 1000
milliseconds.
Configuring a smaller timeout on the edge ports, for example 100 or 200 milliseconds, helps to reduce the
congestion on the edge ports. When congestion is observed, the packets on these ports time out sooner. Use
the no system default interface congestion timeout milliseconds mode {core | edge} command (or) system
default interface congestion mode {core | edge} to revert to the default timeout, which is 500 milliseconds.
Note • The congestion frame timeout configuration is local to a vdc and will be effective only on the ports
(edge/core) owned by the vdc.
• Use the default configuration for the core ports and configure a congestion frame timeout value for
the fabric edge ports that does not exceed 500 milliseconds. The recommended range for the
congestion frame timeout value is from 100 to 200 milliseconds.
This example shows how to display the request timeout for a source-destination pair per module with the
timestamp information for the supervisor CLI:
SUP CLI:
switch# show logging onboard flow-control request-timeout
----------------------------
Module: 2
----------------------------
-------------------------------------------------------------------------------
| Dest | Source | Events | Timestamp | Timestamp |
| Intf | Intf | Count | Earliest | Latest |
-------------------------------------------------------------------------------
|fc4/3 |eth2/1,eth2/2 | 1736|11/14/2002-00:40:07|11/14/2002-00:57:22|
-------------------------------------------------------------------------------
|fc4/3 |eth2/1,eth2/2 | 3477|11/13/2002-23:23:27|11/14/2002-00:00:48|
-------------------------------------------------------------------------------
|fc4/3 |eth2/1,eth2/2 | 4298|11/13/2002-22:31:40|11/13/2002-23:18:00|
-------------------------------------------------------------------------------
|fc4/3 |eth2/1,eth2/2 | 9690|11/13/2002-04:54:50|11/13/2002-07:31:58|
This example shows how to display the request timeout for a source-destination pair per module with the
time-stamp information for the module CLI:
Module CLI:
module--x# show logging onboard flow-control request-timeout
-------------------------------------------------------------------------------
| Dest | Source | Events | Timestamp | Timestamp |
| Intf | Intf | Count | Earliest | Latest |
-------------------------------------------------------------------------------
|fc4/3 |eth2/1,eth2/2 | 1736|11/14/2002-00:40:07|11/14/2002-00:57:22|
-------------------------------------------------------------------------------
|fc4/3 |eth2/1,eth2/2 | 3477|11/13/2002-23:23:27|11/14/2002-00:00:48|
-------------------------------------------------------------------------------
|fc4/3 |eth2/1,eth2/2 | 4298|11/13/2002-22:31:40|11/13/2002-23:18:00|
-------------------------------------------------------------------------------
|fc4/3 |eth2/1,eth2/2 | 9690|11/13/2002-04:54:50|11/13/2002-07:31:58|
Procedure
Step 2 switch# system default interface pause Configures a new pause frame timeout value in
timeout milliseconds mode {core | edge} milliseconds and the port mode for the device.
Step 3 switch# system default interface pause mode Configures the default pause frame timeout value
{core | edge} in milliseconds and the port mode for the device.
The congestion timeout range is from 100 to 500
milliseconds.
Step 4 switch# no system default interface pause Disables the pause frame timeout for the device.
timeout milliseconds mode {core | edge}
Step 5 switch# no system default interface pause Disables the default pause frame timeout for the
mode {core | edge} device.
Use the no system default interface pause timeout milliseconds mode {core | edge} command to disable
the pause frame timeout value on the edge ports. The default pause timeout value is 500 milliseconds.
This example shows how to display the total number of the pause events per module per interface for the
supervisor CLI:
SUP CLI:
switch# show logging onboard flow-control pause-event module 2
----------------------------
Module: 2
----------------------------
------------------------------------------------------------------------------
STATISTICS INFORMATION FOR DEVICE ID 137 DEVICE Orion MAC Driver
------------------------------------------------------------------------------
| | Time Stamp |In|Port
Error Stat Counter Name | Count |MM/DD/YY HH:MM:SS|st|Range
| | |Id|
------------------------------------------------------------------------------
SW PL0 pause event VL3 |0x4e45b |06/18/03 05:27:50 |00|1
SW PL0 pause event VL3 |0x4e1a0 |06/18/03 05:25:50 |00|1
SW PL0 pause event VL3 |0x4dee5 |06/18/03 05:23:50 |00|1
SW PL0 pause event VL3 |0x4dc2a |06/18/03 05:21:50 |00|1
This example shows how to display the total number of the pause events per module per interface for the
module CLI:
Module CLI:
module-2# show logging onboard flow-control pause-event
------------------------------------------------------------------------------
STATISTICS INFORMATION FOR DEVICE ID 137 DEVICE Orion MAC Driver
------------------------------------------------------------------------------
| | Time Stamp |In|Port
Error Stat Counter Name | Count |MM/DD/YY HH:MM:SS|st|Range
| | |Id|
------------------------------------------------------------------------------
SW PL0 pause event VL3 |0x4e45b |06/18/03 05:27:50|00|1
SW PL0 pause event VL3 |0x4e1a0 |06/18/03 05:25:50|00|1
SW PL0 pause event VL3 |0x4dee5 |06/18/03 05:23:50|00|1
SW PL0 pause event VL3 |0x4dc2a |06/18/03 05:21:50|00|1
SW PL0 pause event VL3 |0x4d96f |06/18/03 05:19:50|00|1
This example shows how to display the pause counters per module per interface with time-stamp information
for the supervisor CLI:
SUP CLI:
switch# show logging onboard flow-control pause-count
------------------------------------------------------------------------------
STATISTICS INFORMATION FOR DEVICE ID 137 DEVICE Orion MAC Driver
------------------------------------------------------------------------------
| | Time Stamp |In|Port
Command Purpose
show interface ethernet slot/port [brief | counters Displays the interface configuration.
| debounce | description | flowcontrol | mac-address
| status | transceiver]
show interface trunk [module module-number | vlan Displays trunk configuration information.
vlan-id]
show interface status error policy [detail] Displays errors about interfaces and VLANs that are
inconsistent with hardware policies.
The detail command displays the details of the
interfaces that produce an error.
show running-config interface ethernet slot/port Displays configuration information about the specified
interface.
show running-config interface port-channel Displays configuration information about the specified
slot/port port-channel interface.
show running-config interface vlan vlan-id Displays configuration information about the specified
VLAN interface.
For detailed information about these commands, see the Cisco Nexus 7000 Series NX-OS Layer 2 Switching
Command Reference.
Command Purpose
clear counters interface [interface] Clears the counters.
load-interval {interval seconds {1 | 2 | 3}} From Cisco NX-OS Release 4.2(1) for the Cisco
Nexus 7000 Series devices, sets three different
sampling intervals to bit-rate and packet-rate statistics.
show interface counters [module module] Displays input and output octets unicast packets,
multicast packets, and broadcast packets.
show interface counters detailed [all] Displays input packets, bytes, and multicast as well
as output packets and bytes.
show interface counters errors [module module] Displays information on the number of error packets.
See the Cisco Nexus 7000 Series NX-OS Interfaces Command Reference for information on these commands.
Related Documents
Table 14: Related Documents
Related Topic
Cisco Nexus 7000 Series NX-OS Interfaces Command Reference
Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide
Cisco Nexus 2000 Series NX-OS Fabric Extender Software Configuration Guide for Cisco Nexus 7000
Series Switches, Release 6.x
Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide
VLANs, MAC address tables, private VLANs, and the Spanning Tree Protocol.
Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide
Related Topic
Cisco Nexus 7000 Series NX-OS Release Notes
MIBs
MIBs MIBs Link
To locate and download MIBs, go to: http://
• BRIDGE-MIB
www.cisco.com/public/sw-center/netmgmt/cmtk/
• IF-MIB mibs.shtml
• CISCO-IF-EXTENSION-MIB
• ETHERLIKE-MIB
Clear SNMP counters from 6.2(2) Updated the clear counters interface
the interface command to include a keyword snmp that
provides an option to clear SNMP values from
the interface.
• You are familiar with IP addressing and basic configuration. See the Cisco Nexus 7000 Series NX-OS
Unicast Routing Configuration Guide, for more information on IP addressing.
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature
might differ from the Cisco IOS commands that you would use.
Parameter Default
Administrative state Shut
For Cisco NX-OS Release 6.2(2) and later releases, the Cisco Fabric Extenders support Layer 3 protocol
adjacencies on host interfaces (HIFs) and DSCP to queue mapping. Before Cisco NX-OS Release 6.2(2), you
can configure a Fabric Extender (FEX) port as a Layer 3 interface for host connectivity, but not for routing.
See the Configuring the Cisco Nexus 2000 Series Fabric Extender for more information about fabric extenders.
See the Cisco Nexus 2000 Series Fabric Extender Software Configuration Guide for Cisco Nexus 7000 Series
Switches, Release 8.x for more information about fabric extenders.
Routed Interfaces
You can configure a port as a Layer 2 interface or a Layer 3 interface. A routed interface is a physical port
that can route IP traffic to another device. A routed interface is a Layer 3 interface only and does not support
Layer 2 protocols, such as the Spanning Tree Protocol (STP).
All Ethernet ports are routed interfaces by default. You can change this default behavior with the CLI setup
script or through the system default switchport command.
You can assign an IP address to the port, enable routing, and assign routing protocol characteristics to this
routed interface.
From Cisco Release 4.2(1), you can assign a static MAC address to a Layer 3 interface. By default, the MAC
address for the Layer 3 interfaces is the MAC address of the virtual device context (VDC) it is assigned to.
For information on configuring MAC addresses, see the Cisco Nexus 7000 Series NX-OS Layer 2 Switching
Configuration Guide.
You can also create a Layer 3 port channel from routed interfaces. For more information about port channels,
see “Configuring Port Channels.”
Routed interfaces and subinterfaces support exponentially decayed rate counters. Cisco NX-OS tracks the
following statistics with these averaging counters:
• Input packets/sec
• Output packets/sec
• Input bytes/sec
• Output bytes/sec
Subinterfaces
You can create virtual subinterfaces on a parent interface configured as a Layer 3 interface. A parent interface
can be a physical port or a port channel.
Subinterfaces divide the parent interface into two or more virtual interfaces on which you can assign unique
Layer 3 parameters such as IP addresses and dynamic routing protocols. The IP address for each subinterface
should be in a different subnet from any other subinterface on the parent interface.
You create a subinterface with a name that consists of the parent interface name (for example, Ethernet 2/1)
followed by a period and then by a number that is unique for that subinterface. For example, you could create
a subinterface for Ethernet interface 2/1 named Ethernet 2/1.1 where .1 indicates the subinterface.
Cisco NX-OS enables subinterfaces when the parent interface is enabled. You can shut down a subinterface
independent of shutting down the parent interface. If you shut down the parent interface, Cisco NX-OS shuts
down all associated subinterfaces as well.
One use of subinterfaces is to provide unique Layer 3 interfaces to each virtual local area network (VLAN)
supported by the parent interface. In this scenario, the parent interface connects to a Layer 2 trunking port on
another device. You configure a subinterface and associate the subinterface to a VLAN ID using 802.1Q
trunking.
The figure below shows a trunking port from a switch that connects to router B on interface E 2/1. This
interface contains three subinterfaces that are associated with each of the three VLANs carried by the trunking
port.
For more information about VLANs, see the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration
Guide.
VLAN Interfaces
A VLAN interface, or switch virtual interface (SVI), is a virtual routed interface that connects a VLAN on
the device to the Layer 3 router engine on the same device. Only one VLAN interface can be associated with
a VLAN, but you need to configure a VLAN interface for a VLAN only when you want to route between
VLANs or to provide IP host connectivity to the device through a virtual routing and forwarding (VRF)
instance that is not the management VRF. When you enable VLAN interface creation, Cisco NX-OS creates
a VLAN interface for the default VLAN (VLAN 1) to permit remote switch administration.
You must enable the VLAN network interface feature before you can see configure it. Beginning in Cisco
NX-OS Release 4.2, the system automatically takes a checkpoint prior to disabling the feature, and you can
roll back to this checkpoint. See the Cisco Nexus 7000 Series NX-OS System Management Configuration
Guide for information on rollbacks and checkpoints.
You must configure the VLAN network interface in the same VDC as the VLAN.
You can route across VLAN interfaces to provide Layer 3 inter-VLAN routing by configuring a VLAN
interface for each VLAN that you want to route traffic to and assigning an IP address on the VLAN interface.
For more information about IP addresses and IP routing, see the Cisco Nexus 7000 Series NX-OS Unicast
Routing Configuration Guide.
The figure below shows two hosts connected to two VLANs on a device. You can configure VLAN interfaces
for each VLAN that allows Host 1 to communicate with Host 2 using IP routing between the VLANs. VLAN
1 communicates at Layer 3 over VLAN interface 1 and VLAN 10 communicates at Layer 3 over VLAN
interface 10.
Note You can configure VLAN interface for an inband management in the Cisco Nexus 7000 Series devices
with the F1 Series modules in the chassis.
Loopback Interfaces
A loopback interface is a virtual interface with a single endpoint that is always up. Any packet transmitted
over a loopback interface is immediately received by this interface. Loopback interfaces emulate a physical
interface. You can configure up to 1024 loopback interfaces per VDC, numbered 0 to 1023.
You can use loopback interfaces for performance analysis, testing, and local communications. Loopback
interfaces can act as a termination address for routing protocol sessions. This loopback configuration allows
routing protocol sessions to stay up even if some of the outbound interfaces are down.
Tunnel Interfaces
Cisco NX-OS supports tunnel interfaces as IP tunnels. IP tunnels can encapsulate a same-layer or higher layer
protocol and transport the result over IP through a tunnel created between two routers. See “Configuring IP
Tunnels,” for more information about IP tunnels.
Note You must assign an interface to a VRF before you configure the IP address for that interface.
Procedure
Step 4 switch(config-if)# {ip | ipv6} Configures an IP address for this interface. See the Cisco
address ip-address/length Nexus 7000 Series NX-OS Unicast Routing Configuration
Guide for more information about IP and IPv6 addresses.
Use the medium command to set the interface medium to either point to point or broadcast.
Command Purpose
medium {broadcast | p2p} Configures the interface medium as either point to
point or broadcast.
The default setting is broadcast, and this setting does not appear in any of the show commands. However, if
you do change the setting to p2p, you will see this setting when you enter the show running config command.
Use the switchport command to convert a Layer 3 interface into a Layer 2 interface.
Command Purpose
switchport Configures the interface as a Layer 2 interface and
deletes any configuration specific to Layer 3 on this
interface.
The default setting for interfaces is routed. If you want to configure an interface for Layer 2, enter the
switchport command. Then, if you change a Layer 2 interface to a routed interface, enter the no switchport
command.
Configuring a Subinterface
You can configure one or more subinterfaces on a routed interface or on a port channel made from routed
interfaces.
Procedure
This example shows the output of the show interface eth command that is enhanced for the subinterfaces
from Cisco NX-OS Release 6.1:
switch# show interface ethernet 1/2.1
Ethernet1/2.1 is down (Parent Interface Admin down)
admin state is down, Dedicated Interface, [parent interface is Ethernet1/2]
Hardware: 40000 Ethernet, address: 0023.ac67.9bc1 (bia 4055.3926.61d4)
Internet Address is 10.10.10.1/24
MTU 1500 bytes, BW 40000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation 802.1Q Virtual LAN, Vlan ID 11, medium is broadcast
Auto-mdix is turned off
EtherType is 0x8100
L3 in Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
L3 out Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
If you do not set the subinterface bandwidth or configure it to inherit the bandwidth from the parent interface,
Cisco NX-OS determines the subinterface bandwidth as follows:
• If the parent interface is up, the bandwidth of the subinterface is the same as the operational speed of
the parent interface. For ports, the subinterface bandwidth is the configured or negotiated link speed.
For port channels, the subinterface bandwidth is the aggregate of the link speeds of individual members
of the port channel.
• If the parent interface is down, the bandwidth of the subinterface depends on the type of parent interface:
◦Port-channel subinterfaces have 100-Mb/s bandwidth for subinterfaces.
◦1-Gb/s Ethernet ports have 1-Gb/s bandwidth for subinterfaces.
◦10-Gb/s Ethernet ports have 10-Gb/s bandwidth for subinterfaces.
To configure the bandwidth of an interface, use the following command in interface mode:
Command Purpose
bandwidth Configures the bandwidth parameter for a routed
interface, port channel, or subinterface.
To configure subinterfaces to inherit the bandwidth from the parent interface, use the following command in
interface mode:
Command Purpose
bandwidth inherit [value] Configures all subinterfaces of this interface to inherit
the bandwidth value configured. If you do not
configure the value, the subinterfaces inherit the
bandwidth of the parent interface. The range is from
1 to 10000000, in kilobytes.
Procedure
Step 4 switch(config-if)# {ip | ipv6} Configures an IP address for this interface. See the Cisco
address ip-address/length Nexus 7000 Series NX-OS Unicast Routing Configuration
Guide for more information about IP and IPv6 addresses.
Note We recommend that you use a dedicated VLAN for inband management on the F1 Series modules. Do
not run data traffic on the VLAN that you are using for inband management.
Procedure
Step 6 switch(config-if)# ip address Configures an IP address for this interface. See the Cisco
ip-address/length Nexus 7000 Series NX-OS Unicast Routing Configuration
Guide for more information about IP addresses.
This example shows how to create an inband management in the Cisco Nexus 7000 chassis:
switch# configure terminal
switch(config)# feature interface-vlan
switch(config)# interface vlan 5
switch(config-if)# no shutdown
switch(config-if)# management
switch(config-if)# ip address 192.0.2.1/8
switch(config-if)# copy running-config startup-config
Procedure
Step 3 switch(config-if)# {ip | ipv6} address Configures an IP address for this interface. See the
ip-address/length Cisco Nexus 7000 Series NX-OS Unicast Routing
Configuration Guide for more information about IP
and IPv6 addresses.
Procedure
Command Purpose
show interface ethernet slot/port Displays the Layer 3 interface configuration, status,
and counters (including the 5-minute exponentially
decayed moving average of inbound and outbound
packet and byte rates).
show interface ethernet slot/port brief Displays the Layer 3 interface operational status.
show interface ethernet slot/port capabilities Displays the Layer 3 interface capabilities, including
port type, speed, and duplex.
show interface ethernet slot/port description Displays the Layer 3 interface description.
show interface ethernet slot/port status Displays the Layer 3 interface administrative status,
port mode, speed, and duplex.
show interface ethernet slot/port.number Displays the subinterface configuration, status, and
counters (including the f-minute exponentially
decayed moving average of inbound and outbound
packet and byte rates).
Command Purpose
show interface loopback number Displays the loopback interface configuration, status,
and counters.
show interface loopback number brief Displays the loopback interface operational status.
show interface loopback number description Displays the loopback interface description.
show interface loopback number status Displays the loopback interface administrative status
and protocol status.
show interface vlan number Displays the VLAN interface configuration, status,
and counters.
show interface vlan number brief Displays the VLAN interface operational status.
show interface vlan number description Displays the VLAN interface description.
show interface vlan number private-vlan mapping Displays the VLAN interface private VLAN
information.
show interface vlan number status Displays the VLAN interface administrative status
and protocol status.
show interface status error policy [detail] Displays errors on interfaces and VLANs that are
inconsistent with hardware policies.
The detail command displays the details of the
interfaces and VLANs that receive an error.
Command Purpose
load- interval {interval seconds {1 | 2 | 3}} From Cisco NX-OS Release 4.2(1) for the Cisco
Nexus 7000 Series devices, sets three different
sampling intervals to bit-rate and packet-rate statistics.
The range for VLAN network interface is 60 to 300
seconds, and the range for Layer interfaces is 30 to
300 seconds.
show interface ethernet slot/port counters Displays the Layer 3 interface statistics (unicast,
multicast, and broadcast).
Command Purpose
show interface ethernet slot/port counters brief Displays the Layer 3 interface input and output
counters.
show interface ethernet slot/port counters detailed Displays the Layer 3 interface statistics. You can
[all] optionally include all 32-bit and 64-bit packet and
byte counters (including errors).
show interface ethernet slot/port counters errors Displays the Layer 3 interface input and output errors.
show interface ethernet slot/port counters snmp Displays the Layer 3 interface counters reported by
SNMP MIBs.
show interface ethernet slot/port.number counters Displays the subinterface statistics (unicast, multicast,
and broadcast).
show interface loopback number counters Displays the loopback interface input and output
counters (unicast, multicast, and broadcast).
show interface loopback number counters detailed Displays the loopback interface statistics. You can
[all] optionally include all 32-bit and 64-bit packet and
byte counters (including errors).
show interface loopback number counters errors Displays the loopback interface input and output
errors.
show interface vlan number counters Displays the VLAN interface input and output
counters (unicast, multicast, and broadcast).
show interface vlan number counters detailed [all] Displays the VLAN interface statistics. You can
optionally include all Layer 3 packet and byte
counters (unicast and multicast).
show interface vlan number counters snmp Displays the VLAN interface counters reported by
SNMP MIBs.
See the Cisco Nexus 7000 Series NX-OS Interfaces Command Reference for information on these commands.
Related Documents
Table 19: Related Documents
Related Topic
Cisco Nexus 7000 Series NX-OS Interfaces Command Reference
Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide
Cisco Nexus 2000 Series NX-OS Fabric Extender Software Configuration Guide for Cisco Nexus 7000
Series Switches, Release 6.x
Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide
VLANs, MAC address tables, private VLANs, and the Spanning Tree Protocol.
Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide
MIBs
Table 20: MIBs
BFD FSA offload on M3 7.3(0)DX(1) Added support for BFD FSA offload on the
M3 line cards.
BFD Support for HSRPv6 7.3(0)D1(1) Added support for BFD on HSRPv6.
BFD FSA offload on F3 7.2(1)D1(1) Added support for BFD ACP offload on the
F3 line card.
Support for BFD over Layer 7.2(0)D1(1) Added support for BFD over Layer 2 over a
2 over a fabricpath core fabricpath core.
Support for BFD over SVI 7.2(0)D1(1) Added support for BFD over SVI over
over Fabricbath core Fabricbath core.
BFD on IPv6 Static Routes 6.2(2a) Added support for configuring BFD on all
IPv6 static routes on an interface.
• BFD does not support BFD multihop. When configuring BFD for iBGP, ensure to configure BGP
neighbor update-source command on connected interfaces.
• Port channel configuration limitations:
◦For Layer 3 port channels used by BFD, you must enable LACP on the port channel. BFD per-link
is supported only for EIGRP, ISIS, and OSPF clients.
Note To configure BFD per-link on a port channel, you need to shut down the interface and
configure the per-link and then bring up the port-channel again.
◦For Layer 2 port channels used by SVI sessions, you must enable LACP on the port channel.
• SVI limitations:
◦An ASIC reset will cause traffic disruption for other ports. This event could possibly cause SVI
sessions on other ports to flap. Some triggers for an ASIC reset are port moves between VDCs,
reloading a VDC, or if the carrier interface is a virtual port channel (vPC), BFD is not supported
over the SVI interface.
◦When you change the topology (for example, add or delete a link into a VLAN, delete a member
from a Layer 2 port channel, and so on), the SVI session could be affected. It may go down first
and then come up after the topology discovery is finished.
Note If you do not want the SVI sessions to flap and you need to change the topology, you
can disable the BFD feature before making the changes and re-enable BFD after the
changes have been made. You can also configure the BFD timer to be a large value (for
example, 5 seconds), and change it back to a fast timer after the above events complete.
• BFD over VLAN interfaces that have member ports only on a N7K-F132XL-15 module are not supported.
You should disable BFD over any VLAN with member ports only on a N7K-F132XL-15 module.
Note If you enable BFD at the router level (for example, from OSPF), any BFD sessions over
a N7K-F132XL-15 line card will not come up. See the Cisco Nexus 7000 Series NX-OS
Unicast Routing Configuration Guide for information about OSPF and other routing
protocols.
• When you configure the BFD Echo function on the distributed Layer 3 port channels, reloading a member
module flaps the BFD session hosted on that module, which results in a packet loss.
• If you connect the BFD peers directly without a Layer 2 switch in between, you can use the BFD per-link
mode as an alternative solution.
Note Using BFD per-link mode and subinterface optimization simultaneously on a Layer 3
port channel is not supported.
• The BFD echo function is not supported when using IPv6 link-local addresses.
• HSRP on IPv4 and IPv6 is supported with BFD.
• If HSRP BFD ALL-INTERFACE is configured, all IPv4 and IPv6 HSRP groups on all interfaces
automatically support BFD.
• BFD is not supported for Anycast HSRP.
◦Supports only port-channel interfaces that are directly connected between two switches (peer
devices) running BFD sessions.
◦Supports Layer 3 port channel interfaces in both On mode and LACP mode.
◦Supports all Line cards with Layer 3 capabilities.
◦IPv6 is not supported.
◦Fabric port-channel are not supported.
◦vPC is not supported.
◦Virtual switch interface over port-channels is not supported.
◦Storage VDCs is not supported.
◦Echo functionality is not supported for micro-BFD sessions.
◦RFC 7130 links cannot be configured along with proprietary links and BFD logical links.
◦If RFC 7130 is configured on the main port-channel interface and logical BFD is configured on
subinterfaces, the logical BFD session should have lesser aggressive timers than the RFC 7130
BFD sessions.
◦Micro BFD sessions are not supported on port-channel sub interfaces.
◦FEX interfaces (HIF) ports are not supported.
◦If IEFT-BFD is enabled on a port-channel interface, the operational state of port-channel will
depend on the minimum micro-BFD session members that are able to establish a session. If the
minimum number of links required to have port-channel UP is not met, the port-channel interface
is brought down. This in turn brings down the port-channel sub interfaces and the logical BFD
sessions.
◦If a LACP port-channel has members in hot-standby state and BFD failure link is one of the active
link, then hot-standby links might not come up directly. When the active link with BFD failure
goes down, the hot-standby member becomes active. This scenario can cause port-channel to go
down before the hot-standby can come up.
◦BFD per-link is not supported for BGP. It is supported only on EIGRP, OSPF, and ISIS.
Default Settings
Table 22: Default BFD Parameters
Parameter Default
BFD feature Disabled
Detect multiplier 3
Mode Asynchronous
Asynchronous Mode
Cisco NX-OS supports the BFD asynchronous mode, which sends BFD control packets between two adjacent
devices to activate and maintain BFD neighbor sessions between the devices. You configure BFD on both
devices (or BFD neighbors). Once BFD has been enabled on the interfaces and on the appropriate protocols,
Cisco NX-OS creates a BFD session, negotiates BFD session parameters, and begins to send BFD control
packets to each BFD neighbor at the negotiated interval. The BFD session parameters include the following:
• Desired minimum transmit interval—The interval at which this device wants to send BFD hello messages.
• Required minimum receive interval—The minimum interval at which this device can accept BFD hello
messages from another BFD device.
• Detect multiplier—The number of missing BFD hello messages from another BFD device before this
local device detects a fault in the forwarding path.
The figure below shows how a BFD session is established. The figure shows a simple network with two
routers running OSPF and BFD. When OSPF discovers a neighbor (1), it sends a request to the local BFD
process to initiate a BFD neighbor session with the OSPF neighbor router (2). The BFD neighbor session with
the OSPF neighbor router is now established (3).
Detection of Failures
Once a BFD session has been established and timer negotiations are complete, BFD neighbors send BFD
control packets that act in the same manner as an IGP hello protocol to detect liveliness, except at a more
accelerated rate. BFD detects a failure, but the protocol must take action to bypass a failed peer.
BFD sends a failure detection notice to the BFD-enabled protocols when it detects a failure in the forwarding
path. The local device can then initiate the protocol recalculation process and reduce the overall network
convergence time.
The figure below shows what happens when a failure occurs in the network (1). The BFD neighbor session
with the OSPF neighbor router is torn down (2). BFD notifies the local OSPF process that the BFD neighbor
is no longer reachable (3). The local OSPF process tears down the OSPF neighbor relationship (4). If an
alternative path is available, the routers immediately start converging on it.
Note The BFD failure detection occurs in less than a second, which is much faster than OSPF Hello messages
could detect the same failure.
Distributed Operation
Cisco NX-OS can distribute the BFD operation to compatible modules that support BFD. This process offloads
the CPU load for BFD packet processing to the individual modules that connect to the BFD neighbors. All
BFD session traffic occurs on the module CPU. The module informs the supervisor when a BFD failure is
detected.
Note Unicast Reverse Path Forwarding check (uRPF) is disabled by default. If you need to enable it on an
interface functioning with BFD, the BFD echo function must be disabled.
Security
Cisco NX-OS uses the packet Time to Live (TTL) value to verify that the BFD packets came from an adjacent
BFD peer. For all asynchronous and echo request packets, the BFD neighbor sets the TTL value to 255 and
the local BFD process verifies the TTL value as 255 before processing the incoming packet. For the echo
response packet, BFD sets the TTL value to 254.
From Cisco NX-OS Release 5.2, you can configure SHA-1 authentication of BFD packets.
High Availability
BFD supports stateless restarts and in-service software upgrades (ISSUs). ISSU allows you to upgrade software
without impacting forwarding. After a reboot or supervisor switchover, Cisco NX-OS applies the running
configuration and BFD immediately sends control packets to the BFD peers.
Virtualization Support
BFD supports virtual routing and forwarding instances (VRFs). VRFs exist within virtual device contexts
(VDCs). By default, Cisco NX-OS places you in the default VDC and default VRF unless you specifically
configure another VDC and VRF. For more information, see the Cisco Nexus 7000 Series NX-OS Virtual
Device Context Configuration Guide.
BFD Interoperability
This feature enables BFD interoperability between Cisco IOS software, Cisco NX-OS software, and Cisco
IOS-XR software.
links are associated with their respective Router's MAC address. BFD is used for fast failure detection on
these links. This necessitates support for BFD over unnumbered interfaces.
You can use either OSPF or ISIS protocols to provide Layer3 connectivity between spines and leaves.
The following BFD sub features are applicable on unnumbered interfaces:
• Address Family Support
BFD clients can bootstrap BFD with either IPv4 or IPv6 address.
• Echo Support
By default, echo function is supported on both IPv4 and IPv6 BFD sessions. However, if BFD IPv6
sessions are bootstrapped with link-local addresses, echo will not be supported.
• BFD session over unnumbered port-channel
Both Logical Mode and Per-link mode sessions are supported. By default, with no configuration on the
port-channel, BFD sessions are in the logical mode.
Configuring BFD
Configuration Hierarchy
You can configure BFD at the global level and at the interface or subinterface level (for physical interfaces
and port channels). The interface or subinterface configuration overrides the global configuration. On supported
interfaces, the subinterface-level configuration overrides the interface or port channel configuration unless
subinterface optimization is enabled. See the “Optimizing BFD on Subinterfaces” section for more information.
Note Using BFD per-link mode and subinterface optimization simultaneously on a Layer 3 port channel is not
supported.
For physical ports that are members of a port channel, the member port inherits the master port channel BFD
configuration. The member port subinterfaces can override the master port channel BFD configuration, unless
subinterface optimization is enabled.
Enabling BFD
You must enable the BFD feature before you can configure BFD on an interface and protocol within a device
(VDC).
Procedure
Use the no feature bfd command to disable the BFD feature and remove all associated configuration.
Command Purpose
no feature bfd Disables the BFD feature and removes all associated
configuration.
Procedure
Step 2 switch(config)# bfd interval Configures the BFD session parameters for all BFD sessions on
mintx min_rx msec multiplier the device. This command overrides these values by configuring
value the BFD session parameters on an interface. The mintx and msec
range is from 15 to 999 milliseconds and the default is 50. The
multiplier range is from 1 to 50. The multiplier default is 3.
Note Even if the value of the mintx argument is configured as
15 ms, if the bfd hw-offload-module command is not
enabled on the session, the configuration is not applied
and the session functions at the default timer value, which
is 50 ms.
Step 3 switch(config)# bfd Configures the slow timer used in the echo function. This value
slow-timer [interval] determines how fast BFD starts up a new session and at what speed
the asynchronous sessions use for BFD control packets when the
echo function is enabled. The slow-timer value is used as the new
control packet interval, while the echo packets use the configured
BFD intervals. The echo packets are used for link failure detection,
while the control packets at the slower rate maintain the BFD
session. The range is from 1000 to 30000 milliseconds. The default
is 2000.
Step 4 switch(config-if)# bfd Configures the interface used for Bidirectional Forwarding
echo-interface loopback Detection (BFD) echo frames. This command changes the source
interface number address for the echo packets to the one configured on the specified
loopback interface. The interface number range is from 0 to 1023.
This example shows the peer-configured Control Plane Independent bit setting for outgoing BFD packets:
show bfd neighbors dest-ip 10.1.2.2 details
OurAddr NeighAddr LD/RD RH/RS Holdown(mult)
State Int Vrf Type
10.1.2.1 10.1.2.2 1090519041/1107296257 Up 8598(5) Up
Eth9/21 default SH
Procedure
Step 2 switch(config)# interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Step 3 switch(config)# bfd interval Configures the BFD session parameters for all BFD sessions on
mintx min_rx msec multiplier the device. This command overrides these values by configuring
value the BFD session parameters on an interface. The mintx and msec
range is from 15 to 999 milliseconds and the default is 50. The
multiplier range is from 1 to 50. The multiplier default is 3.
Note Even if the value of the mintx argument is configured
as 15 ms, if the bfd hw-offload-modulecommand is
not enabled on the session, the configuration is not
applied and the session functions at the default timer
value, which is 50 ms.
Step 4 switch(config-if)# bfd (Optional)
authentication keyed-sha1 Configures SHA-1 authentication for all BFD sessions on the
keyid id key ascii_key interface. The ascii_key string is a secret key shared among BFD
peers. The id value, a number between 0 and 255, is assigned to
this particular ascii_key. BFD packets specify the key by id,
allowing the use of multiple active keys.
To disable SHA-1 authentication on the interface, use the no
form of the command.
This configuration overrides the global session parameters for the configured port channel. The member ports
of the port channel inherit the port channel BFD session parameters, unless you configure subinterface-level
BFD parameters on a member port. In that case, the member port subinterface uses the subinterface BFD
configuration if subinterface optimization is not enabled. See the “Optimizing BFD on Subinterfaces” section
for more information.
Procedure
Step 2 switch(config)# interface Enters port channel configuration mode. Use the ? keyword to
port-channel number display the supported number range.
Step 3 switch(config-if)# bfd per-link Configures the BFD sessions for each link in the port channel.
Step 4 switch(config-if)# bfd interval Configures the BFD session parameters for all BFD sessions
mintx min_rx msec multiplier on the device. This command overrides these values by
value configuring the BFD session parameters on an interface. The
mintx and msec range is from 15 to 999 milliseconds and the
default is 50. The multiplier range is from 1 to 50. The
multiplier default is 3.
Note Even if the value of the mintx argument is configured
as 15 ms, if the bfd hw-offload-module command is
not enabled on the session, the configuration is not
applied and the session functions at the default timer
value, which is 50 ms.
Step 5 switch(config-if)# bfd (Optional)
authentication keyed-sha1 Configures SHA-1 authentication for all BFD sessions on the
keyid id key ascii_key interface. The ascii_key string is a secret key shared among
BFD peers. The id value, a number between 0 and 255, is
assigned to this particular ascii_key. BFD packets specify the
key by id, allowing the use of multiple active keys.
To disable SHA-1 authentication on the interface, use the no
form of the command.
Procedure
Step 2 switch(config)# bfd slow-timer Configures the slow timer used in the echo function. This
echo-interval value determines how fast BFD starts up a new session and
is used to slow down the asynchronous sessions when the
BFD echo function is enabled. This value overwrites the
required minimum receive interval when the echo function
is enabled. The range is from 1000 to 30000 milliseconds.
The default is 2000.
Step 3 switch(config)# interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Step 4 switch(config-if)# bfd echo Enables the echo function. The default is enabled.
Note If the hardware offload feature is enabled, then configure the bfd optimize subinterface command only
if the number of sub-interfaces is less than 750, otherwise BFD sessions will not come up.
Procedure
Step 2 switch(config)# interface int-if Enters interface configuration mode. Use the ?
keyword to display the supported interfaces.
Procedure
Step 2 switch(config)# bfd [ipv4 | ipv6] interval Configures the BFD session parameters, in
[interval min_rx interval multiplier milliseconds, for all BFD session on the device.
interval-multiplier
Procedure
Step 2 switch(config)# interface type number Enters interface configuration mode. Use the ?
keyword to display the supported interfaces.
Step 3 switch(config-if)# bfd [ipv4 | ipv6] interval Configures the BFD session parameters, in
[interval min_rx interval multiplier milliseconds, for all BFD session on the device.
interval-multiplier
Step 4 switch(config-if)# bfd [ipv4 | ipv6] (Optional)
authentication keyed-sha1 keyid id key Configures Secure Hash Algorithm 1 (SHA-1)
ascii_key authentication for all BFD sessions on the specified
address family.
Procedure
Step 2 switch(config)# vrf context vrf-name Enters VRF configuration mode to configure BFD on
an IPv6 static route.
• Specify the VRF in which the route is to BFD
tracked.
Step 4 switch(config-vrf)# ipv6 route static Enables BFD for all IPv6 static routes on this interface
bfd network-interface {nh-address | and next hop combination.
nh-prefix}
• Use the ? keyword to display the supported
interfaces.
• Specify the next hop (nh) address or prefix for this
static route.
This example shows how to configure BFD on an IPv6 static route between two BFD neighbors:
switch(config)# vrf context red
switch(config-vrf)# ipv6 route 1::5/64 ethernet 3/1 2::2
switch(config-vrf)# ipv6 route static bfd ethernet 3/1 2::2 <===Enables BFD on static
routes for the interface/next hop combination.
Procedure
Step 2 switch(config)# interface int-if Enters interface configuration mode. Use the ? keyword
to display the supported interfaces.
Step 3 switch(config-if)# bfd [ipv4 | ipv6] Enables the echo function for the specified address. The
echo default is enabled.
To disable the echo function for the specified address
family, use the no form of the command.
Procedure
Step 2 switch(config)# interface loopback number Creates a loopback interface and enters
interface configuration mode.
Step 3 switch(config-if)# ip address ip-address mask Configures the IP address for the interface.
Step 4 switch(config-if)# ipv6 address {ipv6-address Configures the IPv6 address as the source
/ prefix-length | prefix-name sub-bits / address for all echo frames.
prefix-length}
Procedure
Step 3 switch(config-if)# bfd [ipv4 | ipv6] Configures the slow timer, in milliseconds, used in
slow-timer [interval] the echo function for the specified address family.
Procedure
Step 2 switch(config)# router bgp as-number Enables BGP and assigns the AS number to the local
BGP speaker. The AS number can be a 16-bit integer
or a 32-bit integer in the form of a higher 16-bit
decimal number and a lower 16-bit decimal number
in xx.xx format.
Step 3 switch(config-router)# neighbor Configures the IPv4 or IPv6 address and AS number
{ip-address | ipv6-address} remote-as for a remote BGP peer. The ip-address format is
as-number x.x.x.x. The ipv6-address format is A:B::C:D.
Procedure
Step 2 switch(config)# router eigrp Creates a new EIGRP process with the configured instance
instance-tag tag. The instance tag can be any case-sensitive, alphanumeric
string up to 20 characters.
If you configure an instance-tag that does not qualify as an
AS number, you must use the autonomous-system command
to configure the AS number explicitly or this EIGRP
instance will remain in the shutdown state.
Procedure
Step 2 switch(config)# router ospf Creates a new OSPFv2 instance with the configured
instance-tag instance tag. The instance tag can be any case-sensitive,
alphanumeric string up to 20 characters.
Step 4 switch(config-router)# interface int-if Enters interface configuration mode. Use the ? keyword
to display the supported interfaces.
• You can enable BFD for all of the interfaces for which OSPFv3 is routing by entering the bfd command
in router configuration mode. You can disable BFD support on individual interfaces by entering the
ospfv3 bfd disable command in interface configuration mode.
• You can enable BFD for a subset of the interfaces for which OSPFv3 is routing by entering the ospfv3
bfd command in interface configuration mode.
Note OSPF will only initiate BFD sessions for OSPF neighbors that are in the FULL state.
Procedure
Step 2 switch(config)# interface Enters interface configuration mode. Use the ? keyword to display
int-if the supported interfaces.
Step 3 switch(config-if)# bfd Configures the BFD session parameters for all BFD sessions on
interval mintx min_rx msec the device. This command overrides these values by configuring
multiplier value the BFD session parameters on an interface. The mintx and msec
range is from 15 to 999 milliseconds and the default is 50. The
multiplier range is from 1 to 50. The multiplier default is 3.
Note Even if the value of the mintx argument is configured as
15 ms, if the bfd hw-offload-module command is not
enabled on the session, the configuration is not applied
and the session functions at the default timer value, which
is 50 ms.
Step 4 switch(config-if)# end Exits interface configuration mode and returns to global
configuration mode.
Procedure
Step 4 switch(config-router)# exit Enter this command twice to return to EXEC mode.
Step 5 switch# show bfd neighbors [details] Displays a line-by-line listing of existing BFD
adjacencies.
Step 6 switch# show ospfv3 [process-id] Displays general information about OSPFv3
routing processes.
Procedure
Step 2 switch(config)# interface int-if Enters interface configuration mode. Use the ?
keyword to display the supported interfaces.
Step 3 switch(config-if)# ospfv3 bfd Enables BFD on a per-interface basis for one or more
[disable] interfaces associated with the OSPFv3 routing process.
Step 4 switch(config-if)# exit Enter this command twice to return to EXEC mode.
Step 5 switch# show bfd neighbors [details] Displays a line-by-line listing of existing BFD
adjacencies.
Step 6 switch# show ospfv3 [process-id] Displays general information about OSPFv3 routing
processes.
Procedure
Step 2 switch(config)# router isis Creates a new IS-IS instance with the configured
instance-tag instance tag.
Step 4 switch(config-router)# interface int-if Enters interface configuration mode. Use the ?
keyword to display the supported interfaces.
Procedure
Step 2 switch(config)# interface int-if Enters interface configuration mode. Use the ?
keyword to display the supported interfaces.
Step 3 switch(config-if)# isis ipv6 bfd Enables IPv6 BFD on a specific interface that is
configured for IS-IS.
Step 5 switch(config)# show isis interface (Optional) Displays interface information about
type number IS-IS.
Procedure
Step 2 switch(config)# router isis process-id Enables the IS-IS routing protocol and enters router
configuration mode.
Step 5 switch(config-router-af)# bfd Enables BFD for all interfaces that are participating in
the routing process.
Step 6 switch(config-router-af)# end Exits address family configuration mode and returns to
global configuration mode.
Procedure
Step 2 switch(config)# [no] bfd Enables the user to choose an encapsulation mode for the
fabricpath encap-ce L2BFD frames on a per-session basis. On enabling the
command, it sends out the frames without Fabricpath
encapsulation. The default mode is to send frames with
Fabricpath encapsulation.
Step 3 switch(config-if)# fabricpath isis Enables the FabricPath BFD on the interface.
bfd
Procedure
Step 2 switch(config)# fabricpath domain Enters the global FabricPath Layer 2 Intermediate
default System, to Intermediate System (IS-IS)
configuration mode.
Step 3 switch(config-fabricpath-isis)# bfd Enables FabricPath BFD on all IS-IS interfaces.
This example show how to configure FabricPath BFD on all IS-IS interfaces:
switch# configure terminal
switch(config)# fabricpath domain default
switch(config-fabricpath-isis)# bfd
Procedure
Step 3 switch(config)# interface int-if Enters interface configuration mode. Use the ?
keyword to display the supported interfaces.
Procedure
Step 2 switch(config)# interface int-if Enters interface configuration mode. Use the ?
keyword to display the supported interfaces.
Step 4 switch(config-if)# vrrp bfd address Enables or disables BFD on an VRRP interface.
The default is disabled.
Procedure
Step 4 switch(config-if)# ip pim bfd-instance Enables or disables BFD on a PIM interface. The
[disable] default is disabled.
Procedure
Step 3 switch(config-vrf)# ip route route interface Creates a static route Use the ? keyword to
{nh-address | nh-prefix} display the supported interfaces.
Step 4 switch(config-vrf)# ip route static bfd Enables BFD for all static routes on an interface.
interface {nh-address | nh-prefix} Use the ? keyword to display the supported
interfaces.
Command Purpose
ip eigrp instance-tag bfd disable Disables BFD on an EIGRP interface. The instance
tag can be any case-sensitive, alphanumeric string up
to 20 characters.
Procedure
Step 1 The following are the steps to configure ISIS on the Ethernet interface that is unnumbered:
a) Enter the global configuration mode:
switch# configure terminal
b) Enter the interface config mode:
switch(config)# interface ethernet slot / port
c) Configure the interface medium as point to point:
switch(config-if)# medium p2p
d) Enable IP processing on loopback interface:
Step 2 The following are the steps to configure the loopback interface from which the IP address for the unnumbered
interface is derived:
a) Create a loopback interface and enter the interface config mode:
switch(config)# interface loopback instance
b) Configure an IP address for this loopback interface:
switch(config-if)#ip address address
c) Configure an IS-IS routing process for the IP on the configured interface and attach an area designator to
the routing process:
switch(config-if)#ip router isis area-tag
This example shows how to configure BFD on unnumbered ethernet interface with ISIS protocol:
interface Ethernet1/2
medium p2p
ip unnumbered loopback1
isis metric 10 level-1
isis circuit-type level-1
ip router isis 100
isis bfd
no shutdown
router isis 100
net 49.0001.0000.0000.000a.00
is-type level-1
address-family ipv6 unicast
This example shows how to configure BFD over unnumbered interface with OSPF and VRF:
vrf context vrf3
interface Ethernet1/14
medium p2p
vrf member vrf3
ip unnumbered loopback1
ip router ospf 10 area 0.0.0.0
no shutdown
interface loopback1
vrf member vrf3
ip address 10.1.1.2/32
line vty
router ospf 10
bfd
vrf vrf3
bfd
Procedure
Step 2 switch(config)# interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Step 3 switch(config-if)# ip ospf bfd Enables BFD on an OSPFv2 interface. The default is disabled.
You can enable BFD of any of the supported protocols.
Procedure
Step 2 switch(config)# interface int-if Creates a dynamic Switch Virtual Interface (SVI).
Step 3 switch(config-if)# bfd interval Configures the BFD session parameters for all BFD
mintx min_rx msec multiplier value sessions on the device. This command overrides these
values by configuring the BFD session parameters on an
interface. The mintx and msec range is from 15 to 999
milliseconds and the default is 50. The multiplier range
is from 1 to 50. The multiplier default is 3.
Note Even if the value of the mintx argument is
configured as 15 ms, if the bfd
hw-offload-module command is not enabled on
the session, the configuration is not applied and
the session functions at the default timer value,
which is 50 ms.
Step 4 switch(config-if)# no ip redirect Prevents the device from sending redirects.
Step 7 switch(config-if)# exit Exits interface configuration mode and returns to EXEC
mode.
Step 8 switch(config)# interface int-if Configures the port connected to another switch
configured as described in the steps above.
Step 9 Do one of the following: The interface is configured as a classic ethernet trunk port
or a fabric path port.
• switch(config-if)# switchport
mode trunk
• switch(config-if)# switchport
mode fabricpath
Procedure
Step 2 switch(config)# interface type Enters port channel configuration mode. Use the ? keyword
number.subinterface-id to display the supported number range.
Step 3 switch(config-if)# bfd interval Configures the BFD session parameters for all BFD sessions
mintx min_rx msec multiplier on the device. This command overrides these values by
value configuring the BFD session parameters on an interface. The
mintx and msec range is from 15 to 999 milliseconds and the
default is 50. The multiplier range is from 1 to 50. The
multiplier default is 3.
Note Even if the value of the mintx argument is configured
as 15 ms, if the bfd hw-offload-module command
is not enabled on the session, the configuration is not
applied and the session functions at the default timer
value, which is 50 ms.
Step 4 switch(config-if)# no ip redirect Prevents the device from sending redirects.
Step 5 switch(config-if)# ip ospf bfd Enables BFD on an OSPFv2 interface. The default is disabled.
Step 6 switch(config-if)# exit Exits interface configuration mode and returns to EXEC mode.
Command Purpose
These examples show how to verify BFD interoperability in a Cisco Nexus 7000 Series device:
switch# show bfd neighbors details
OurAddr NeighAddr LD/RD RH/RS Holdown(mult) State Int
Vrf
10.1.1.1 10.1.1.2 1140850707/2147418093 Up 6393(4) Up Vlan2121
default
Session state is Up and using echo function with 50 ms interval
Local Diag: 0, Demand mode: 0, Poll bit: 0, Authentication: None
MinTxInt: 50000 us, MinRxInt: 2000000 us, Multiplier: 3
Received MinRxInt: 2000000 us, Received Multiplier: 4
Holdown (hits): 8000 ms (0), Hello (hits): 2000 ms (108)
Command Purpose
show running-config bfd Displays the running BFD configuration.
show startup-config bfd Displays the BFD configuration that will be applied
on the next system startup.
show bfd neighbors neighbors Displays information about BFD neighbor details.
This example shows how to verify BFD ACP Offload on F3 and M3 line cards feature. The output contains
an asterisk (‘*’) symbol displayed beside the offloaded sessions.
switch# show bfd neighbors
This example shows how to verify BFD ACP Offload on a F3 and M3 line cards. The output has a field
indicating that a particular session is offloaded.
For detailed information about the fields in the output from these commands, see the Cisco Nexus 7000 Series
NX-OS Interfaces Command Reference.
Procedure
Procedure
Procedure
Procedure
Related Documents
Table 26: Related Documents
Related Topic
Cisco Nexus 7000 Series NX-OS Interfaces Command Reference
Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide
Cisco Nexus 2000 Series NX-OS Fabric Extender Software Configuration Guide for Cisco Nexus 7000
Series Switches, Release 6.x
Related Topic
Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide
VLANs, MAC address tables, private VLANs, and the Spanning Tree Protocol.
Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide
RFCs
Table 27: RFCs
RFCs Title
RFC 5880 Configuring Bidirectional Forwarding Detection
Command Purpose
show running-config bfd Displays the running BFD configuration.
show startup-config bfd Displays the BFD configuration that will be applied
on the next system startup.
To verify micro BFD session configurations, use one of the following commands:
Command Purpose
show bfd neighbors detail Display BFD session for a port channel interface, and
the associated micro-BFD sessions on members.
show tech-support lacp all Display the technical support information for Ethernet
Port Manager, Ethernet Port-channel Manager and
LACP.
For detailed information about the fields in the output from these commands, see the Cisco Nexus 7000 Series
NX-OS Interfaces Command Reference.
Monitoring BFD
To display BFD monitoring, use the following commands :
Command Purpose
show bfd neighbors [application name] [details] Displays information about BFD for a supported
application, such as BGP or OSPFv2.
show bfd neighbors [interface int-if] [details] Displays information about BGP sessions on an
interface.
show bfd neighbors [dest-ip ip-address] [src-ip Displays information about the specified BGP session
ip-address][details] on an interface.
show bfd neighbors [vrf vrf-name] [details] Displays information about BFD for a VRF.
For detailed information about the fields in the output from these commands, see the Cisco Nexus 7000 Series
NX-OS Interfaces Command Reference.
feature bfd
feature ospf
router ospf Test1
interface ethernet 2/1
ip ospf bfd
no shutdown
This example shows how to configure BFD for all EIGRP interfaces, using the default BFD session parameters:
The fields shown below are self-explanatory.
feature bfd
feature eigrp
bfd interval 100 min_rx 100 multiplier 4
router eigrp Test2
bfd
The following example shows how to configure micro BFD sessions :
The following topology is used in the example that follows:
feature bfd
configure terminal
interface port-channel 10
port-channel bfd track-member-link
port-channel bfd destination 10.1.1.2
port-channel bfd start 60
ip address 10.1.1.1/24
feature bfd
configure terminal
interface port-channel 10
port-channel bfd track-member-link
port-channel bfd destination 10.1.1.1
port-channel bfd start 60
ip address 10.1.1.2/24
This example displays the show output of the show port-channel summary command.
The fields shown below are self-explanatory.
switch(config-if-range)# show port-channel summary
This example displays the show output of the show bfd neighbors detail command.
The fields shown below are self-explanatory.
switch(config-if-range)# show bfd neighbors detail
Random Load Balance (Port 7.3(0)D1(1) Added support for Random Load Balancing
Channel) on port channels. Added the random keyword
to port-channel load-balance command to
improve load balancing across port channels.
DisplayPpolicy Errors on 6.2(2) Added the show interface status error policy
Interfaces and VLANs command.
Result Bundle Hash Load 6.1(3) Support for the RBH modulo mode to
Balancing improve load balancing across port channels.
Port Channels Hash 6.1(1) Support for port channel hash distribution
Distribution fixed and adaptive mode.
IP tunnels require an Enterprise Services license. For a complete explanation of the Cisco NX-OS licensing
scheme and how to obtain and apply licenses, see the Cisco NX-OS Licensing Guide.
All other interfaces do not require a license.
• You cannot configure the ports from an F1- and an M1-series module in the same port channel because
the ports will fail to meet the compatibility requirements.
• You cannot configure the ports from an M1- and M2-series module in the same port channel.
• You cannot configure the ports from an F2e- and an F3-series module in the same port channel because
the ports will fail to meet the compatibility requirements.
• From Cisco NX-OS Release 5.1, you can bundle up to 16 active links into a port channel on the F1-series
module.
• F1-series modules do not support load balancing of non-IP traffic based on a MAC address. If ports on
an F1-series module are used in a port channel and non-IP traffic is sent over the port channel, Layer 2
traffic might get out of order.
• Only F series and the XL type of M-series modules support the RBH modulo mode.
• Random load balance on port channel is supported only on F3-series modules. Ensure both sides of the
port channel are F3 modules only.
Default Settings
Table 31: Default Port-Channel Parameters
Parameter Default
Port channel Admin up
Load-balancing method for Layer 2 interfaces Source and destination MAC address
LACP Disabled
Channel mode on
Maxbundle 16
Note From Cisco NX-OS Release 5.1, you can bundle up to 16 active links into a port channel on the F-series
module.
You cannot configure a shared interface to be part of a port channel. See the Cisco NX-OS FCoE Configuration
Guide for Cisco Nexus 7000 and Cisco MDS 9000 for more information about shared interfaces.
You can bundle up to 8 ports into a static port channel without using any aggregation protocol. On the M-series
module, you can bundle up to 8 active and 8 standby on the M-series module and up to 16 ports on the F
Series module.
However, you can enable the LACP to use port channels more flexibly. Configuring port channels with LACP
and static port channels require a slightly different procedure.
Note This device does not support Port Aggregation Protocol (PAgP) for port channels.
Each port can be in only one port channel. All the ports in a port channel must be compatible; they must use
the same speed and duplex mode (see the “Compatibility Requirements” section). When you run static port
channels with no aggregation protocol, the physical links are all in the on channel mode; you cannot change
this mode without enabling LACP (see the “Port-Channel Modes” section).
You can create port channels directly by creating the port-channel interface, or you can create a channel group
that acts to aggregate individual ports into a bundle. When you associate an interface with a channel group,
the software creates a matching port channel automatically if the port channel does not already exist. In this
instance, the port channel assumes the Layer 2 or Layer 3 configuration of the first interface. You can also
create the port channel first. In this instance, the Cisco NX-OS software creates an empty channel group with
the same channel number as the port channel and takes the default Layer 2 or Layer 3 configuration, as well
as the compatibility configuration (see the “Compatibility Requirements” section). See “Configuring Layer 2
Interfaces,” for more information about creating and deleting port-channel subinterfaces.
Note The port channel is operationally up when at least one of the member ports is up and that port’s status is
channeling. The port channel is operationally down when all member ports are operationally down.
You can create a Layer 2 port channel by bundling compatible Layer 2 interfaces, or you can create Layer 3
port channels by bundling compatible Layer 3 interfaces. After you create a Layer 3 port channel, you can
add an IP address to the port-channel interface and create subinterfaces on the Layer 3 port channel. You
cannot combine Layer 2 and Layer 3 interfaces in the same port channel.
From Cisco NX-OS Release 4.2, you can apply port security to port channels. See the Cisco Nexus 7000
Series NX-OS Security Configuration Guide for information about port security. All ports in the port channel
must be in the same virtual device context (VDC); you cannot configure port channels across VDCs.
You can also change the port channel from Layer 3 to Layer 2. See “Configuring Layer 2 Interfaces,” for
information about creating Layer 2 interfaces.
Any configuration changes that you apply to the port channel are applied to each member interface of that
port channel. For example, if you configure Spanning Tree Protocol (STP) parameters on the port channel,
the Cisco NX-OS software applies those parameters to each interface in the port channel.
Note After a Layer 2 port becomes part of a port channel, all switchport configurations must be done on the
port channel; you can no longer apply switchport configurations to individual port-channel members. You
cannot apply Layer 3 configurations to an individual port-channel member either; you must apply the
configuration to the entire port channel.
You can create subinterfaces on a Layer 3 port channel, even though a subinterface is part of the logical
port-channel interface. See the “Subinterfaces” section for more information about port-channel subinterfaces.
You can use static port channels, with no associated aggregation protocol, for a simplified configuration. For
more flexibility, you can use the Link Aggregation Control Protocol (LACP), which is defined in IEEE
802.3ad. When you use LACP, the link passes protocol packets. You cannot configure LACP on shared
interfaces.
See the “LACP” section for information about LACP.
Port-Channel Interfaces
The figure below shows port-channel interfaces.
You can classify port-channel interfaces as Layer 2 or Layer 3 interfaces. In addition, you can configure Layer
2 port channels in either access or trunk mode. Layer 3 port-channel interfaces have routed ports as channel
members and might have subinterfaces.
From Cisco NX-OS Release 4.2(1), you can configure a Layer 3 port channel with a static MAC address. If
you do not configure this value, the Layer 3 port channel uses the router MAC of the first channel member
to come up. See the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide for information
about configuring static MAC addresses on Layer 3 port channels.
See “Configuring Layer 2 Interfaces,” for information about configuring Layer 2 ports in access or trunk mode
and “Configuring Layer 3 Interfaces,” for information about configuring Layer 3 interfaces and subinterfaces
.
Basic Settings
You can configure the following basic settings for a port-channel interface:
• Bandwidth—Use this setting for informational purposes only; this setting is to be used by higher-level
protocols.
• Delay—Use this setting for informational purposes only; this setting is to be used by higher-level
protocols.
• Interface Description—Use this setting to provide a unique name for each interface so that you can
quickly identify the interface when you are looking at a listing of multiple interfaces.
• Duplex—By default, each interface autonegotiates its duplex mode with the other interface, but you can
change these settings. If you change the settings, be sure to use the same duplex mode setting on both
interfaces, or use autonegotiation for at least one of the interfaces.
• Flow control—Use this setting to allow flow control to work between two ports. You must set the
corresponding receive and send flow control parameters for both ports as enabled or desired.
• IP addresses—Both IPv4 and IPv6
• Maximum Transmission Unit (MTU)—Use this setting to specify the maximum frame size that an
Ethernet port can process.
• Shutdown—Use this setting to bring down or up an interface.
• Speed—By default, each interface autonegotiates its speed mode with the other interface, but you can
change these settings. If you change the settings, be sure to use the same speed mode setting on both
interfaces, or use autonegotiation for at least one of the interfaces.
Compatibility Requirements
When you add an interface to a channel group, the software checks certain interface attributes to ensure that
the interface is compatible with the channel group. For example, you cannot add a Layer 3 interface to a Layer
2 channel group. The Cisco NX-OS software also checks a number of operational attributes for an interface
before allowing that interface to participate in the port-channel aggregation.
The compatibility check includes the following operational attributes:
• (Link) speed capability
• Access VLAN
• Allowed VLAN list
• Check rate mode
• Duplex capability
• Duplex configuration
• Flow-control capability
• Flow-control configuration
• Layer 3 ports—(Cannot have subinterfaces)
• MTU size
• Media type, either copper or fiber
• Module Type
• Network layer
• Port mode
• SPAN—(Cannot be a SPAN source or a destination port)
• Speed configuration
• Storm control
• Tagged or untagged
• Trunk native VLAN
Use the show port-channel compatibility-parameters command to see the full list of compatibility checks
that the Cisco NX-OS uses.
You can only add interfaces configured with the channel mode set to on to static port channels, and you can
only add interfaces configured with the channel mode as active or passive to port channels that are running
LACP. You can configure these attributes on an individual member port. If you configure a member port with
an incompatible attribute, the software suspends that port in the port channel.
Alternatively, you can force ports with incompatible parameters to join the port channel if the following
parameters are the same:
• (Link) Speed capability
• Speed configuration
• Duplex capability
• Duplex configuration
• Flow-control capability
• Flow-control configuration
When the interface joins a port channel, some of its individual parameters are removed and replaced with the
values on the port channel as follows:
• Bandwidth
• Delay
• Extended Authentication Protocol over UDP
• VRF
• IP address (v4 and v6)
• MAC address
• Spanning Tree Protocol
• NAC
• Service policy
• Access control lists (ACLs)
Many interface parameters remain unaffected when the interface joins or leaves a port channel as follows:
• Beacon
• Description
• CDP
• LACP port priority
• Debounce
• UDLD
• MDIX
• Rate mode
• Shutdown
• SNMP trap
If you configure subinterfaces for the port-channel interface and remove a member port from the port channel,
the configuration of the port-channel subinterface does not propagate to the member ports.
Note When you delete the port channel, the software sets all member interfaces as if they were removed from
the port channel.
See the “LACP Marker Responders” section for information about port-channel modes.
Note The default load-balancing mode for Layer 3 interfaces is the source and destination IP address, and the
default load-balancing mode for non-IP traffic is the source and destination MAC address. Use the
port-channel load-balance command to set the load-balancing method among the interfaces in the
channel-group bundle. The default method for Layer 2 packets is src-dst-mac. The default method for
Layer 3 packets is src-dst-ip. For additional information about this command, see the Cisco Nexus 7000
Series NX-OS Interfaces Command Reference.
F1-series modules do not support load balancing of non-IP traffic based on a MAC address. If ports on
an F1-series module are used in a port channel and non-IP traffic is sent over the port channel, Layer 2
traffic might get out of order. From Cisco NX-OS Release 6.0(1), load balancing supports F2 modules.
You can configure the device to use one of the following methods to load balance across the port channel:
• Destination MAC address
Non-IP and Layer 3 port channels both follow the configured load-balancing method, using the source,
destination, or source and destination parameters. For example, when you configure load balancing to use the
source IP address, all non-IP traffic uses the source MAC address to load balance the traffic while the Layer
3 traffic load balances the traffic using the source IP address. Similarly, when you configure the destination
MAC address as the load-balancing method, all Layer 3 traffic uses the destination IP address while the non-IP
traffic load balances using the destination MAC address.
Note You cannot configure load balancing using port channels per virtual device context (VDC). You must be
in the default VDC to configure this feature; if you attempt to configure this feature from another VDC,
the system displays an error.
You can configure load balancing either by the entire system or by specific modules, regardless of the VDC.
The port-channel load balancing is a global setting across all VDCs.
If the ingress traffic is Multiprotocol Label Switching (MPLS) traffic, the software looks under the labels for
the IP address on the packet.
Multicast traffic inherits the same port-channel load balancing configuration as unicast traffic. This is applicable
for both system-wide and module-specific load balancing configurations.
Note Devices that run Cisco IOS can optimize the behavior of the member ports of ASICs if a failure of a single
member occurred if you enter the port-channel hash-distribution command. The Cisco Nexus 7000
Series device performs this optimization by default and does not require or support this command. Cisco
NX-OS does support the customization of the load-balancing criteria on port channels through the
port-channel load-balance command either for the entire device or on a per-module basis. See the Cisco
Nexus 7000 Series NX-OS Interfaces Command Reference for information about this command.
Cisco NX-OS Release 6.1(3) supports a new Result Bundle Hash (RBH) mode to improve load balancing on
port-channel members on Cisco Nexus 7000 M Series I/O XL modules and on F Series modules. With the
new RBH modulo mode, the RBH result is based on the actual count of port-channel members.
Symmetric Hashing
To effectively monitor traffic on a port channel, it is essential that each interface connected to a port channel
receives both forward and reverse traffic flows. Normally, there is no guarantee that the forward and reverse
traffic flows will use the same physical interface. However, when you enable symmetric hashing on the port
channel, bidirectional traffic is forced to use the same physical interface and each physical interface in the
port channel is effectively mapped to a set of flows.
When symmetric hashing is enabled, the parameters used for hashing, such as the source and destination IP
address, are normalized before they are entered into the hashing algorithm. This process ensures that when
the parameters are reversed (the source on the forward traffic becomes the destination on the reverse traffic),
the hash output is the same. Therefore, the same interface is chosen.
Only the following load-balancing algorithms support symmetric hashing:
• src ip
• dst ip rotate
• dst ip
• src ip rotate
• src-dst ip
• src ip-l4port
• dst ip-l4port rotate
• dst ip-l4port
• src ip-l4port rotate
• src-dst ip-l4port-vlan
• dst ip-vlan
• src ip-vlan rotate
• src-dst ip-vlan
• src l4port
• dst l4port rotate
• dst l4port
• src l4port rotate
• src-dst l4port
• src mac
• dst mac rotate
• dst mac
• src mac rotate
• src-dst mac
helps in load balancing and optimizing the port channels bandwidth. Random load balancing is supported
only on F3 series line cards. Random load balancing is applicable on all types of traffic and is effective on
egress ports of Layer 3 traffic. The Cisco NX-OS software does random load balancing of all traffic across
all interfaces in a port channel by using polynomial scheme.
LACP
LACP allows you to configure up to 16 interfaces into a port channel. A maximum of 8 interfaces can be
active, and a maximum of 8 interfaces can be placed in a standby state on the M-series modules.
From Cisco NX-OS Release 5.1, you can bundle up to 16 active links into a port channel on the F-Series
module.
Note You must enable LACP before you can use LACP. By default, LACP is disabled.
See the “Enabling LACP” section for information about enabling LACP.
From Cisco NX-OS Release 4.2, the system automatically takes a checkpoint before disabling the feature,
and you can roll back to this checkpoint. See the Cisco Nexus 7000 Series NX-OS System Management
Configuration Guide for information about rollbacks and checkpoints.
The figure below shows how individual links can be combined into LACP port channels and channel groups
as well as function as individual links.
With LACP, you can bundle up to 16 interfaces in a channel group. If the channel group has more than 8
interfaces, the remaining interfaces are in hot standby for the port channel associated with this channel group
on the M-series modules.
From Cisco NX-OS Release 5.1, you can bundle up to 16 active links into a port channel on the F-series
module.
Note When you delete the port channel, the software automatically deletes the associated channel group. All
member interfaces revert to their original configuration.
You cannot disable LACP while any LACP configurations are present.
Port-Channel Modes
Individual interfaces in port channels are configured with channel modes. When you run static port channels
with no aggregation protocol, the channel mode is always set to on.
After you enable LACP globally on the device, you enable LACP for each channel by setting the channel
mode for each interface to active or passive. You can configure either channel mode for individual links in
the LACP channel group when you are adding the links to the channel group.
Note You must enable LACP globally before you can configure an interface in either the active or passive
channel mode.
active LACP mode that places a port into an active negotiating state in which the
port initiates negotiations with other ports by sending LACP packets.
on All static port channels (that are not running LACP) remain in this mode.
If you attempt to change the channel mode to active or passive before
enabling LACP, the device displays an error message.
You enable LACP on each channel by configuring the interface in that
channel for the channel mode as either active or passive. When an LACP
attempts to negotiate with an interface in the on state, it does not receive
any LACP packets and becomes an individual link with that interface; it
does not join the LACP channel group.
The default port-channel mode is on.
Both the passive and active modes allow LACP to negotiate between ports to determine if they can form a
port channel based on criteria such as the port speed and the trunking state. The passive mode is useful when
you do not know whether the remote system, or partner, supports LACP.
Ports can form an LACP port channel when they are in different LACP modes if the modes are compatible
as seen in these examples:
• A port in active mode can form a port channel successfully with another port that is in active mode.
• A port in active mode can form a port channel with another port in passive mode.
• A port in passive mode cannot form a port channel with another port that is also in passive mode, because
neither port will initiate negotiation.
• A port in on mode is not running LACP and cannot form a port channel with another port that is in active
or passive mode.
LACP ID Parameters
Note The LACP system ID is the combination of the LACP system priority value and the MAC address.
LACP uses the Marker Protocol to ensure that frames are not duplicated or reordered due to this redistribution.
The Marker Protocol detects when all the frames of a given traffic flow are successfully received at the remote
end. LACP sends Marker PDUs on each of the port-channel links. The remote system responds to the Marker
PDU once it receives all the frames received on this link prior to the Marker PDU. The remote system then
sends a Marker Responder. Once the Marker Responders are received by the local system on all member links
of the port channel, the local system can redistribute the frames in the traffic flow with no chance of misordering.
The software supports only Marker Responders.
Table 33: Differences Between LACP-Enabled Port Channels and Static Port Channels
• Configures the minimum number of ports that must be linked up and bundled in the LACP port channel.
• Prevents the low-bandwidth LACP port channel from becoming active.
• Causes the LACP port channel to become inactive if there are few active members ports to supply the
required minimum bandwidth.
The LACP MaxBundle defines the maximum number of bundled ports allowed in a LACP port channel.
The LACP MaxBundle feature does the following:
• Defines an upper limit on the number of bundled ports in an LACP port channel.
• Allows hot-standby ports with fewer bundled ports. (For example, in an LACP port channel with five
ports, you can designate two of those ports as hot-standby ports.)
Note The minimum links and maxbundle feature works only with LACP port channels. However, the device
allows you to configure this feature in non-LACP port channels, but the feature is not operational.
Virtualization Support
You must configure the member ports and other port-channel related configuration from the virtual device
context (VDC) that contains the port channel and member ports. You can use the numbers from 1 to 4096 in
each VDC to number the port channels and you can reuse these port-channel numbers in different VDCs. For
example, you can configure port channel 100 in VDC1 and also configure a different port channel 100 in
VDC2.
However, the LACP system ID is different for each VDC. For more information about LACP, see the “LACP”
section.
Note See the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guidefor complete
information about VDCs and assigning resources.
All ports in one port channel must be in the same VDC. When you are using LACP, all possible 8 active ports
and all possible 8 standby ports must be in the same VDC. The port channels can originate in one VDC (with
all ports in that channel in the same VDC) and partner with a port channel in another VDC (again, all ports
in that channel must be in that VDC).
Note The port-channeling load-balancing mode works either for a single module or across the entire device.
You must configure load balancing using port channels in the default VDC. You cannot configure load
balancing using port channels within specified VDCs. See the “Load Balancing Using Port Channels”
section for more information about load balancing.
High Availability
Port channels provide high availability by load balancing traffic across multiple ports. If a physical port fails,
the port channel is still operational if there is an active member in the port channel. You can bundle ports
from different modules and create a port channel that remains operational even if a module fails because the
settings are common across the module.
Port channels support stateful and stateless restarts. A stateful restart occurs on a supervisor switchover. After
the switchover, the Cisco NX-OS software applies the runtime configuration after the switchover.
The port channel goes down if the operational ports fall below the configured minimum links number.
Note See the Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide for complete information
about high-availability features.
Procedure
Step 2 switch(config)# interface Specifies the port-channel interface to configure, and enters
port-channel channel-number the interface configuration mode. The range is from 1 to
4096. The Cisco NX-OS software automatically creates the
channel group if it does not already exist.
Use the no interface port-channel command to remove the port channel and delete the associated channel
group.
Command Purpose
no interface port-channel channel-number Removes the port channel and deletes the associated
channel group.
See the “Compatibility Requirements” section for details on how the interface configuration changes when
you delete the port channel.
Procedure
Step 2 switch(config)# interface Specifies the port-channel interface to configure, and enters
port-channel channel-number the interface configuration mode. The range is from 1 to 4096.
The Cisco NX-OS software automatically creates the channel
group if it does not already exist.
Use the no channel-group command to remove the port from the channel group.
Command Purpose
no channel-group Removes the port from the channel group.
This example shows how to add a Layer 2 Ethernet interface 1/4 to channel group 5:
switch# configure terminal
switch (config)# interface ethernet 1/4
switch(config-if)# switchport
switch(config-if)# channel-group 5
Procedure
Step 2 switch(config)# interface Specifies the port-channel interface to configure, and enters the
port-channel channel-number interface configuration mode. The range is from 1 to 4096. The
Cisco NX-OS software automatically creates the channel group
if it does not already exist.
Step 4 switch(config-if)# Configures the port in a channel group and sets the mode. The
channel-group channel-number channel-number range is from 1 to 4096. This command creates
[force] [mode {on | active | the port channel associated with this channel group if the port
passive}] channel does not already exist. All static port-channel interfaces
are set to mode on. You must set all LACP-enabled port-channel
interfaces to active or passive. The default mode is on.
Forces an interface with some incompatible configurations to
join the channel. The forced interface must have the same speed,
duplex, and flow control settings as the channel group.
Use the no channel-group command to remove the port from the channel group.
Command Purpose
no channel-group Removes the port from the channel group.
This example shows how to add a Layer 3 Ethernet interface 1/5 to channel group 6 in on mode:
switch# configure terminal
switch (config)# interface ethernet 1/5
switch(config-if)# no switchport
switch(config-if)# channel-group 6
This example shows how to create a Layer 3 port-channel interface and assign the IP address:
switch# configure terminal
switch(config)# interface port-channel 4
switch(config-if)# ip address 192.0.2.1/8
Procedure
Step 2 switch(config)# interface Specifies the port-channel interface to configure, and enters
port-channel channel-number the interface configuration mode.
Step 3 switch(config-if)# bandwidth value Specifies the bandwidth, which is used for informational
purposes. The range is from 1 to 80,000,000 kbs. The
Step 4 switch(config-if)# delay value Specifies the throughput delay, which is used for
informational purposes. The range is from 1 to 16,777,215
tens of microseconds. The default value is 10
microseconds.
Note Prior to Cisco Release 4.2(1), the default delay
value was 100 microseconds.
Step 5 switch(config-if)# exit Exits the interface mode and returns to the configuration
mode.
This example shows how to configure the informational parameters of the bandwidth and delay for port
channel 5:
switch# configure terminal
switch (config)# interface port-channel 5
switch(config-if)# bandwidth 60000000
switch(config-if)# delay 10000
switch(config-if)#
Procedure
Step 2 switch(config)# interface Specifies the port-channel interface to configure, and enters
port-channel channel-number the interface configuration mode.
Step 3 switch(config-if)# shutdown | no Shuts down the interface. No traffic passes and the interface
shutdown displays as administratively down. The default is no shutdown.
The no shutdown command opens the interface. The interface
displays as administratively up. If there are no operational
problems, traffic passes. The default is no shutdown.
Step 5 switch# show interface Displays interface information for the specified port channel.
port-channel channel-number
Step 6 switch# show interface status (Optional)
error policy [detail] Displays the interfaces and VLANs that produce an error
during policy programming to ensure that policies are
consistent with hardware policies.
Use the detail command to display the details of the interfaces
that produce an error.
This example shows how to bring up the interface for port channel 2:
switch# configure terminal
switch (config)# interface port-channel 2
switch(config-if)# no shutdown
Procedure
Step 2 switch(config)# interface Specifies the port-channel interface to configure, and enters
port-channel channel-number the interface configuration mode. The range is from 1 to
4096. The Cisco NX-OS software automatically creates
the channel group if it does not already exist.
Procedure
Step 3 switch(config-if)# speed {10 | 100 | 1000 Sets the speed for the port-channel interface. The
| auto} default is auto for autonegotiation.
Step 4 switch(config-if)# duplex {auto | full | Sets the duplex for the port-channel interface. The
half} default is auto for autonegotiation.
Step 5 switch(config-if)# exit Exits the interface mode and returns to the
configuration mode.
Note The settings have to match at both the local and remote ends of the link so that flow control can work
properly.
Procedure
Step 2 switch(config)# interface port-channel Specifies the port-channel interface to configure, and
channel-number enters the interface configuration mode.
Step 3 switch(config-if)# flowcontrol {receive Sets the flow control parameters for sending and
| send} {desired | off | on} receiving the pause packets for the port-channel
interface. The default is desired.
Step 4 switch(config-if)# exit Exits the interface mode and returns to the
configuration mode.
This example shows how to configure the port-channel interface for port channel group 2 to send and receive
pause packets:
switch# configure terminal
switch(config)# interface port-channel 2
switch(config-if)# flowcontrol receive on
switch(config-if)# flowcontrol send on
Procedure
Step 2 switch(config)# [no] Specifies the load-balancing algorithm for the device or module. The
port-channel load-balance range depends on the device. The default for Layer 3 is src-dst ip
method {dst ip | dst for both IPv4 and IPv6, and the default for non-IP is src-dst mac.
ip-l4port-vlan | dst ip-vlan | dst Note The asymmetric keyword is valid with the src-dst ip
mac | dst l4port | dst ip-l4port command and F2 or F2e modules only. As F2 or F2e
| src-dst ip | src-dst mac | modules are symmetric by default, the asymmetric keyword
src-dst l4port | src-dst prevents a traffic-drop occurring during bi-directional flow.
ip-l4port | src-dst ip-vlan | A warning message prompts you that an F2 or F2e module
src-dst ip-l4port-vlan | src ip | needs to be enabled. This improves load-balancing and
src ip-l4port-vlan | src avoids any disruption to the system.
ip-l4port | src ip-vlan | src mac Use the no port-channel load-balance src-dst mac asymmetric
| src l4port | hash-modulo command to revert back to the default system settings (symmetrical).
[force]} [gtp-teid] [module
module-number | fex {fex-range Note If a module-based configuration already exists, it takes
| all}] [asymmetric] [rotate precedence over the default system settings.
rotate] Use the no port-channel load-balance src-dst mac asymmetric
module command at module level to revert back to system level
settings (symmetrical).
Note The module, asymmetric, and rotate keywords are invalid
with the hash-modulo command.
When the gtp-teid keyword is specified in a packet that includes a
GTP header field, the port-channel member selected depends not
only on the already specified packet header fields such as MAC
address, IP address, and L4 ports, but also on the 32-bit Tunnel
Endpoint Identifier (TEID) header field. The packet must enter a port
on an M3 module for the TEID header field to be used in the
port-channel load-balancing.
When the gtp-teid keyword is specified in a packet, the packet's
TEID header field is used in port-channel member selection only if
the packet contains an IPv4 or IPv6 header field followed by a UDP
header field with the destination port 2152 and a GTP version 1
Use the no port-channel load-balance to restore the default load-balancing algorithm of src-dst mac for
non-IP traffic and src-dst ip for IP traffic.
Command Purpose
no port-channel load-balance Restores the default load-balancing algorithm.
This example shows how to configure source IP load balancing for port channels on module 5:
switch# configure terminal
switch(config)# port-channel load-balance src-ip-l4port module 5
This example shows how to configure different combinations for symmetric port channel load balancing for
a port channel connected to switch1 and switch2. Use the same rotate rotate-value as listed in the following
configuration combinations.
! Configure port-channel hash distribution at the global level!
!Combination 1!
!Combination 2!
!Combination 3!
!Combination 4!
!Combination 5!
!Combination 6!
!Combination 7!
!Combination 8!
!Combination 9!
!Combination 10!
!Combination 11!
!Combination 12!
Enabling LACP
LACP is disabled by default; you must enable LACP before you begin LACP configuration. You cannot
disable LACP while any LACP configuration is present.
LACP learns the capabilities of LAN port groups dynamically and informs the other LAN ports. Once LACP
identifies correctly matched Ethernet links, it group the links into a port channel. The port channel is then
added to the spanning tree as a single bridge port.
To configure LACP, you must do the following:
• Enable LACP globally by using the feature lacp command.
• You can use different modes for different interfaces within the same LACP-enabled port channel.
• You can change the mode between active and passive for an interface only if it is the only interface that
is designated to the specified channel group.
Procedure
Procedure
Step 3 switch(config-if)# channel-group Specifies the port mode for the link in a port channel.
number mode {active | on | passive} After LACP is enabled, you configure each link or the
entire channel as active or passive.
When you run port channels with no associated
aggregation protocol, the port-channel mode is always
on.
The default port-channel mode is on.
This example shows how to set the LACP-enabled interface to the active port-channel mode for Ethernet
interface 1/4 in channel group 5:
switch# configure terminal
switch(config)# interface ethernet 1/4
switch(config-if)# channel-group 5 mode active
Procedure
Step 2 switch(config)# interface port-channel Specifies the port-channel interface to configure, and
channel-number enters the interface configuration mode.
Step 3 switch(config-if)# lacp min-links Specifies the port-channel interface to configure the
number number of minimum links and enters the interface
configuration mode. The range is from 1 to 16.
Use the no lacp min-links command to restore the default port-channel minimum links configuration.
Command Purpose
no lacp min-links Restores the default port-channel minimum links
configuration.
This example shows how to configure the minimum number of port-channel interfaces on module 3:
switch# configure terminal
switch(config)# lacp min-links 3
Procedure
Step 2 switch(config)# interface Specifies the port-channel interface to configure, and enters
port-channel channel-number the interface configuration mode.
Use the no lacp max-bundle command to restore the default port-channel max-bundle configuration.
Command Purpose
no lacp max-bundle Restores the default port-channel max-bundle
configuration.
This example shows how to configure the port channel interface max-bundle on module 3:
switch# configure terminal
switch(config)# lacp max-bundle 3
Note We do not recommend changing the LACP timer rate. In-service software upgrade (ISSU) and stateful
switchover (SSO) are not supported with the LACP fast rate timer.
Procedure
Step 3 switch(config-if)# lacp rate fast Configures the fast rate (one second) at which LACP
control packets are sent to an LACP-supported interface.
To reset the timeout rate to its default, use the no form
of the command.
This example shows how to configure the LACP fast rate on Ethernet interface 1/4:
switch# configure terminal
switch(config)# interface ethernet 1/4
switch(config-if)# lacp rate fast
This example shows how to restore the LACP default rate (30 seconds) on Ethernet interface 1/4:
switch# configure terminal
switch(config)# interface ethernet 1/4
switch(config-if)# no lacp rate fast
Procedure
Step 2 switch(config)# lacp system-priority Configures the system priority for use with LACP. Valid
priority values are from 1 through 65535, and higher numbers
have a lower priority. The default value is 32768.
Note Each VDC has a different LACP system ID
because the software adds the MAC address to
this configured value.
Step 3 switch(config)# show lacp (Optional)
system-identifier Displays the LACP system identifier.
This example shows how to set the LACP system priority to 2500:
switch# configure terminal
switch(config)# lacp system-priority 2500
Procedure
Step 2 switch(config)# interface port-channel Specifies the port-channel interface to configure, and
channel-number enters the interface configuration mode.
This example shows how to set the LACP port priority for Ethernet interface 1/4 to 40000:
Note The port channel has to be in the administratively down state before the command can be run.
Procedure
This example shows how to disable LACP graceful convergence on a port channel:
switch# configure terminal
switch(config)# interface port-channel 1
switch(config-if)# shutdown
switch(config-if)# no lacp graceful-convergence
switch(config-if)# no shutdown
Procedure
This example shows how to enable LACP graceful convergence on a port channel:
switch# configure terminal
switch(config)# interface port-channel 1
switch(config-if)# shutdown
switch(config-if)# lacp graceful-convergence
switch(config-if)# no shutdown
Note You should only enter the lacp suspend-individual command on edge ports. The port channel has to be
in the administratively down state before you can use this command.
Procedure
This example shows how to disable LACP individual port suspension on a port channel:
switch# configure terminal
switch(config)# interface port-channel 1
switch(config-if)# shutdown
switch(config-if)# no lacp suspend-individual
switch(config-if)# no shutdown
Procedure
This example shows how to re-enable the LACP individual port suspension on a port channel:
switch# configure terminal
switch(config)# interface port-channel 1
switch(config-if)# shutdown
switch(config-if)# lacp suspend-individual
switch(config-if)# no shutdown
Procedure
Step 2 switch(config)# port-channel Specifies the port-channel hash distribution at the global level.
hash-distribution {adaptive |
fixed}
This example shows how to configure adaptive hash distribution at the global level:
configure terminal
port-channel hash-distribution adaptive
show port-channel rbh-distribution
ChanId Member port RBH values Num of buckets
-------- ------------- ----------------- ----------------
3022 Eth15/5 0 1
3022 Eth15/21 4 1
3022 Eth15/6 1 1
3022 Eth15/13 2 1
3022 Eth15/14 3 1
Procedure
Step 2 switch(config)# interface Specifies the interface to configure, and enters the interface
port-channel {channel-number | configuration mode.
range}
Step 3 switch(config-if)# [no] Specifies the port-channel hash distribution at the global level.
port-channel hash-distribution
{adaptive | fixed} • adaptive—This is the default mode. RBH values are
asymmetric.
• fixed—Peer port connections must be in an ascending
order. RBH values are distributed symmetrically as per
the ascending order of the port. The number of buckets
in each port is equal.
This example shows how to configure fixed hash distribution at the port channel level:
configure terminal
interface port-channel 3010
port-channel hash-distribution fixed
show port-channel rbh-distribution interface port-channel 3021
ChanId Member port RBH values Num of buckets
-------- ------------- ----------------- ----------------
3021 Eth15/23 0 1
3021 Eth15/24 1 1
3021 Eth15/25 2 1
3021 Eth15/26 3 1
Procedure
Step 2 switch(config)# port-channel Enables the RBH modulo mode. This command reinitializes
load-balance hash-modulo all port channels so there is an option to continue or not
continue.
Note This command is rejected if the current system-wide
module types include the M1-Series module. To
remove the M1-Series module type from the
system-wide configuration, enter the system
module-type f1, f2, m1xl, m2xl command.
Step 3 switch(config-if)# copy (Optional)
running-config startup-config Copies the running configuration to the startup configuration.
Procedure
Step 2 switch(config)# interface port-channel Specifies the interface to configure and enters the
number interface configuration mode.
Step 4 switch(config-if)# switchport mode Sets the port channel to support an external Fabric
fex-fabric Extender.
Step 5 switch(config-if)# [no] port-channel Configures the minimum number of links on the
min-links number FEX fabric port channel. The range is from 1 to
16.
This example shows how to configure the minimum number of links for the FEX fabric port channel:
switch# configure terminal
switch(config)# interface port-channel 100
switch(config-if)# switchport
switch(config-if)# switchport mode fex-fabric
switch(config-if)# port-channel min-links 3
switch(config-if)# show port-channel summary
Flags: D - Down P - Up in port-channel (members) I - Individual
H - Hot-standby (LACP only) s - Suspended r - Module-removed
S - Switched R - Routed U - Up (port-channel)
M - Not in use. Min-links not met
--------------------------------------------------------------------------------
Group Port- Type Protocol Member Ports Channel
--------------------------------------------------------------------------------
101 Po101(SM) Eth NONE Eth10/46(P) Eth10/47(P) Eth10/48(P)
Step 3 Configure random load balance for the port-channel interface. Use the no form of the following command to
disable the random load balance feature.
switch(config-if)# egress port-channel load-balance random
Note This will override the default system or module-wide port-channel load balance settings. To configure
random load balancing for ingress traffic, configure the egress port-channel load-balance random
command on an switch virtual interface (SVI) on Layer 3.
Step 3 Configure random load balance for the interface. Use the no form of the following command to disable the
random load balance feature.
switch(config-if)# egress port-channel load-balance random
Note The ingress Layer 3 interface or a port-channel interface performs random load balance on the Layer
2 or Layer 3 egress interface and port-channel interface.
Configuring random load balance on a single physical interface is useful in scenarios where traffic
comes in from an ingress Layer 3 interface and goes out of a port-channel interface.
Step 4 Configure random load balance for the VLAN. Use the no form of the following command to disable the
random load balance feature.
switch(config-if)# egress port-channel load-balance random
Note Random load balance is applied on all the Layer 2 ingress interfaces under the VLAN. The ingress
interfaces perform random load balance on all the Layer 2 or Layer 3 port-channel egress interfaces.
Step 4 Configure random load balance for the SVI for ingress traffic. Use the no form of the following command to
disable the random load balance feature.
switch(config-vlan-config)# egress port-channel load-balance random
This example shows how to configure random load balance on a physical interface:
configure terminal
interface Ethernet6/1
egress port-channel load-balance random
This example shows how to configure random load balance on a switch virtual interface (SVI) for ingress
traffic:
configure terminal
vlan 2-10
vlan configuration 2-10
egress port-channel load-balance random
Command Purpose
show interface port-channel channel-number Displays the status of a port-channel interface.
load-interval {interval seconds {1 | 2 | 3}} From Cisco NX-OS Release 4.2(1) for the Cisco
Nexus 7000 Series devices, sets three different
sampling intervals to bit-rate and packet-rate statistics.
show port-channel compatibility-parameters Displays the parameters that must be the same among
the member ports in order to join a port channel.
show port-channel database [interface Displays the aggregation state for one or more
port-channel channel-number] port-channel interfaces.
show port-channel load-balance Displays the type of load balancing in use for port
channels.
show port-channel rbh distribution Displays the distribution of RBH values across
port-channel interfaces.
show port-channel traffic Displays the traffic statistics for port channels.
show port-channel usage Displays the range of used and unused channel
numbers.
Command Purpose
show lacp {counters [interface port-channel Displays information about LACP.
channel-number] | [interface type/slot] | neighbor
[interface port-channel channel-number] |
port-channel [interface port-channel
channel-number] | system-identifier]]}
show running-config interface port-channel Displays information about the running configuration
channel-number of the port-channel.
show interface status error policy [detail] Displays errors on interfaces and VLANs that are
inconsistent with hardware policies.
The detail command displays the details of the
interfaces and VLANs that receive an error.
For more information about these commands, see the Cisco Nexus 7000 Series NX-OS Interfaces Command
Reference.
Command Purpose
clear counters interface port-channel Clears the counters.
channel-number
load-interval {interval seconds {1 | 2 | 3}} From Cisco NX-OS Release 4.2(1) for the Cisco
Nexus 7000 Series devices, sets three different
sampling intervals to bit-rate and packet-rate statistics.
show interface counters [module module] Displays input and output octets unicast packets,
multicast packets, and broadcast packets.
show interface counters detailed [all] Displays input packets, bytes, and multicast and
output packets and bytes.
show interface counters errors [module module] Displays information about the number of error
packets.
See the Cisco Nexus 7000 Series NX-OS Interfaces Command Reference for information about these
commands.
This example shows how to add two Layer 3 interfaces to a channel group. The Cisco NX-OS software
automatically creates the port channel.
switch# configure terminal
switch(config)# interface ethernet 1/5
switch(config-if)# no switchport
switch(config-if)# no ip address
switch(config-if)# channel-group 6 mode active
switch(config)# interface ethernet 2/5
switch(config-if)# no switchport
switch(config-if)# no ip address
switch(config-if)# channel-group 6 mode active
switch(config)# interface port-channel 6
switch(config-if)# ip address 192.0.2.1/8
Related Documents
Table 40: Related Documents
Related Topic
Cisco Nexus 7000 Series NX-OS Interfaces Command Reference
Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide
Cisco Nexus 2000 Series NX-OS Fabric Extender Software Configuration Guide for Cisco Nexus 7000
Series Switches, Release 6.x
Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide
Related Topic
VLANs, MAC address tables, private VLANs, and the Spanning Tree Protocol.
Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide
Standards
Table 41: Standards
Standards Title
IEEE 802.3ad —
MIBs
Table 42: MIBs
Note From Cisco NX-OS Release 5.1(1), vPCs have been enhanced to interoperate with FabricPath. To configure
vPCs with FabricPath networks, see the Cisco Nexus 7000 Series NX-OS FabricPath Configuration Guide.
From Cisco NX-OS Release 5.1(1), you can use any of the 10-Gigabit Ethernet (10GE) interfaces, or higher,
on the F-series modules or the 10-Gigabit Ethernet interfaces, or higher, on the M-series modules for the
vPC peer link on an individual switch, but you cannot combine member ports on an F module with ports on
an M module into a single port channel on a single switch. The port-channel compatibility parameters must
be the same for all the port channel members on the physical switch.
You cannot configure shared interfaces to be part of a vPC. See the Cisco NX-OS FCoE Configuration Guide
for Cisco Nexus 7000 and Cisco MDS 9000 for more information about shared interfaces.
The port-channel compatibility parameters must also be the same for all vPC member ports on both peers
and therefore you must use the same type of module in each chassis.
Hitless vPC Role Change 7.3(0)D1(1) Added support for switching vPC roles
without impacting traffic flows.
Physical Port vPC on F3 7.2(0)D1(1) Added support for physical port vPCs for F3.
1500 host vPC for FEX 7.2(0)D1(1) Added support for 1500 host vPC for FEX
(Physical Port vPC on FEX) (Physical Port vPC on FEX).
Layer 3 over vPC for F2E and 7.2(0)D1(1) Added support for this feature.
F3 modules
Physical Port vPC on F2 6.2(6) Added support for physical port vPCs for F2.
FCoE over physical port vPCs 6.2(6) Added support for this feature.
Physical port vPCs 6.2(6) Added support for physical port vPCs on the
physical interface of vPC peer devices.
See the Cisco Nexus 7000 Series NX-OS Unicast Routing Configuration Guide for further details about
OSPF.
• BFD for HSRP is not supported in a vPC environment.
• The STP port cost is fixed to 200 in a vPC environment.
• A single vPC domain between two VDCs on the same physical Cisco Nexus 7000 device is not supported.
• Jumbo frames are enabled by default on the vPC peer link.
• Routing protocol adjacency over a fabric path VLAN is not supported.
• Link Aggregation Control Protocol (LACP) cannot be enabled on a physical port without vPC.
• Same vPC configuration cannot be applied to multiple physical ports.
FCoE over physical port vPC has the following guidelines and limitations:
• FCoE is supported only on trunk ports.
• FCoE is supported only for shared interfaces.
• FCoE is not supported on port channel vPCs.
• FCoE over a physical port vPC is supported in storage VDCs of type F2 only.
• FCoE over a physical port vPC is not supported in storage VDCs because Layer 2 multipathing over
physical port vPCs are supported only for LAN.
• FCoE over a VPC+ is not supported.
• The shutdown LAN configuration is supported on shared interfaces only.
• The Link Layer Discovery Protocol (LLDP) must be enabled in the Ethernet VDC for shutdown LAN.
Hitless vPC role change feature has the following guidelines and limitations:
• vPC STP hitless role change feature is supported only from Cisco Nexus 7.3(0)D1(1) release onwards.
• vPC role change can be performed from either of the peer devices.
• If the original secondary device has higher role priority value than the original primary device, role
swapping cannot be performed. Change the role priority on either vPC device so that the value of the
original secondary device is lower than the original primary one. To view the existing role of a device,
use the show vpc role command on local and peer switch.
• On vPC+, enable the fabricpath multi path load-balance command before configuring the vPC hitless
role change feature. The Forwarding Tag (FTag) scheme is used in vPC+ to seamlessly configure the
role change. To ensure FTag scheme is used, you need to enable the no port channel limit command
on vPC+ as it has dependencies on the fabricpath multi path load-balance command.
• Enable the no port channel limit command on vPC+ before configuring the vPC hitless role change
feature. If this command is not enabled, vPC hitless role change cannot be configured and an error
message is displayed. Configure this command on both the vPC devices.
Note Always check the existing configured role priority before configuring vPC hitless role
change feature.
• In a vPC domain, enable the peer-switch command, where both vPC peers have same STP priorities,
and ensure it is operational before issuing a role change. If you do not enable the peer-switch command,
it can lead to convergence issues.
• vPC hitless role change cannot be performed if there are any Type 1 inconsistencies on the peer devices.
vPC+
A virtual port channel+ (vPC+) is an extension to virtual port channels (vPCs) that run CE only. A vPC+
domain allows a classical Ethernet (CE) vPC domain and a Cisco FabricPath cloud to interoperate and also
provides a First Hop Routing Protocol (FHRP) active-active capability at the FabricPath to Layer 3 boundary.
A vPC+ domain enables Cisco Nexus 7000 Series enabled with FabricPath devices to form a single vPC+,
which is a unique virtual switch to the rest of the FabricPath network. For more detailed information on vPC+
see the Cisco Nexus 7000 Series NX-OS FabricPath Configuration Guide.
Note You cannot configure a vPC+ domain and a vPC domain in the same VDC.
You can use only Layer 2 port channels in the vPC. A vPC domain is associated to a single Virtual Device
Context (VDC), so all vPC interfaces belonging to a given vPC domain must be defined in the same VDC.
You must have a separate vPC peer link and peer-keepalive link infrastructure for each VDC deployed.
Consolidating a vPC pair (two vPC peer devices of the same domain) in two VDCs of the same physical
device is not supported. The vPC peer link must use at least 10-Gigabit Ethernet ports for both ends of the
link or the link will not form.
You configure the port channels by using one of the following:
• No protocol
• Link Aggregation Control Protocol (LACP)
When you configure the port channels in a vPC—including the vPC peer link channel—without using LACP,
the F-series line cards can have 16 active links and M-series line cards can have 8 active links in a single port
channel. When you configure the port channels in a vPC—including the vPC peer link channels—using LACP,
F-series card each device can have eight active links and eight standby links in a single port channel. (See the
“vPC Interactions with Other Features” section for more information on using LACP and vPCs.)
You can use the lacp graceful-convergence command to configure port channel Link Aggregation Control
Protocol (LACP) graceful convergence. You can use this command only on a port-channel interface that is
in an administratively down state. You cannot configure (or disable) LACP graceful convergence on a port
channel that is in an administratively up state.
You can use the lacp suspend-individual command to enable LACP port suspension on a port channel. LACP
sets a port to the suspended state if it does not receive an LACP bridge protocol data unit (BPDU) from the
peer ports in a port channel. This can cause some servers to fail to boot up as they require LACP to logically
bring up the port.
Note You must enable the vPC feature before you can configure or run the vPC functionality.
From Cisco NX-OS Release 4.2, the system automatically takes a checkpoint prior to disabling the feature,
and you can roll back to this checkpoint. See the Cisco Nexus 7000 Series NX-OS System Management
Configuration Guide for information about rollbacks and checkpoints.
After you enable the vPC functionality, you create the peer-keepalive link, which sends heartbeat messages
between the two vPC peer devices.
You can create a vPC peer link by configuring a port channel on one Cisco Nexus 7000 Series chassis by
using two or more 10-Gigabit Ethernet ports in dedicated port mode. To ensure that you have the correct
hardware to enable and run a vPC from Cisco NX-OS Release 4.1(5), enter the show hardware feature-capability
command. If you see an X across from the vPC in your command output, your hardware cannot enable the
vPC feature.
We recommend that you configure the vPC peer link Layer 2 port channels as trunks. On another Cisco Nexus
7000 Series chassis, you configure another port channel again using two or more 10-Gigabit Ethernet ports
in the dedicated port mode. Connecting these two port channels creates a vPC peer link in which the two
linked Cisco Nexus devices appear as one device to a third device. The third device, or downstream device,
can be a switch, server, or any other networking device that uses a regular port channel to connect to the vPC.
If you are not using the correct module, the system displays an error message.
Note We recommend that you configure the vPC peer links on dedicated ports of different modules to reduce
the possibility of a failure. For the best resiliency scenario, use at least two modules.
From Cisco NX-OS Release 4.2, if you must configure all the vPC peer links and core-facing interfaces on a
single module, you should configure a track object that is associated with the Layer 3 link to the core and on
all the links on the vPC peer link on both vPC peer devices. Once you configure this feature and if the primary
vPC peer device fails, the system automatically suspends all the vPC links on the primary vPC peer device.
This action forces all the vPC traffic to the secondary vPC peer device until the system stabilizes.
You can create a track object and apply that object to all links on the primary vPC peer device that connect
to the core and to the vPC peer link. See the Cisco Nexus 7000 Series NX-OS Unicast Routing Configuration
Guide for information about the track interface command.
The vPC domain includes both vPC peer devices, the vPC peer-keepalive link, the vPC peer link, and all of
the port channels in the vPC domain connected to the downstream device. You can have only one vPC domain
ID on each device.
In this version, you can connect each downstream device to a single vPC domain ID using a single port channel.
Note Always attach all vPC devices using port channels to both vPC peer devices.
vPC Terminology
The terminology used in vPCs is as follows:
• vPC—The combined port channel between the vPC peer devices and the downstream device.
• vPC peer device—One of a pair of devices that are connected with the special port channel known as
the vPC peer link.
• vPC peer link—The link used to synchronize states between the vPC peer devices. Both ends must be
on 10-Gigabit Ethernet interfaces.
• vPC member port—An interface that belongs to a vPC.
• Host vPC port—A Fabric Extender host interfaces that belongs to a vPC.
• vPC domain—This domain includes both vPC peer devices, the vPC peer-keepalive link, and all of the
port channels in the vPC connected to the downstream devices. It is also associated to the configuration
mode that you must use to assign vPC global parameters.
• vPC peer-keepalive link—The peer-keepalive link monitors the vitality of a vPC peer Cisco Nexus 7000
Series device. The peer-keepalive link sends configurable, periodic keepalive messages between vPC
peer devices.
We recommend that you associate a peer-keepalive link to a separate virtual routing and forwarding (VRF)
instance that is mapped to a Layer 3 interface in each vPC peer device. If you do not configure a separate
VRF, the system uses the management VRF by default. However, if you use the management interfaces for
the peer-keepalive link, you must put a management switch connected to both the active and standby
management ports on each vPC peer device (see the figure below).
Figure 12: Separate Switch Required to Connect Management Ports for vPC Peer-Keepalive Link
No data or synchronization traffic moves over the vPC peer-keepalive link; the only traffic on this link is a
message that indicates that the originating switch is operating and running a vPC.
• vPC member port—Interfaces that belong to the vPCs.
• Dual-active— Both vPC peers act as primary. This situation occurs when the peer-keepalive and peer-link
go down when both the peers are still active. In this case, the secondary vPC assumes that the primary
vPC is inactive and acts as the primary vPC.
• Recovery—When the peer-keepalive and the peer-link come up, one switch becomes the secondary
vPC. On the switch that becomes the secondary vPC, the vPC links go down and come back up.
Note You must configure the peer-keepalive link before you configure the vPC peer link or the peer link does
not come up. (See the “Peer-Keepalive Link and Messages” section for information about the vPC
peer-keepalive link and messages.)
You can configure a vPC peer link to configure two devices as vPCs peers. You must use the module in order
to configure a vPC peer link.
We recommend that you use the dedicated port mode when you configure a vPC peer link. For information
about the dedicated port mode, see “Configuring Basic Interface Parameters.”
vPC Peer Link and I/O Modules Support in Cisco NX-OS Release 6.2
You can configure F2e VDCs. The VDC type for two vPC peer devices must match when the F2 Series module
and the F2e Series module are used in the same VDC or system. For an F2 Series module and an F2e Series
module in the same topology, the features related to the F2 Series module will only apply.
After ISSU to Cisco NX-OS Release 6.2(2), F2 VDCs will automatically change to F2 F2e VDCs, regardless
of the existence of an F2e Series module.
The table below displays the I/O modules that are supported on both sides of a vPC peer link in Cisco NX-OS
Release 6.2.
Table 44: I/O Module Combinations Supported on Both Sides of a vPC Peer Link, Cisco NX-OS Release 6.2 and Later
vPC Peer Link and I/O Modules Support in Cisco NX-OS Release 6.1 and Earlier Releases
In Cisco NX-OS Release 6.1 and earlier releases, only identical I/O modules on either side of a vPC peer link
are supported. Using different I/O modules on either side of a vPC peer link is not supported. Mixing I/O
modules on the same side of a port channel is also not supported. The table above displays the I/O modules
that are supported on both sides of a vPC peer link.
While using port channels, we recommended that you use identical line cards on both sides.
To make a valid configuration, you first configure a port channel on each device and then configure the vPC
domain. You assign the port channel on each device as a peer link, using the same vPC domain ID. For
redundancy, we recommend that you should configure at least two of the dedicated ports into the port channel
because if one of the interfaces in the vPC peer link fails, the device automatically falls back to use another
interface in the peer link.
Note We recommend that you configure the Layer 2 port channels in trunk mode.
Many operational parameters and configuration parameters must be the same in each device connected by a
vPC peer link (see the “Compatibility Parameters for vPC Interfaces” section). Because each device is completely
independent on the management plane, you must ensure that the devices are compatible on the critical
parameters. vPC peer devices have separate control planes. After configuring the vPC peer link, you should
display the configuration on each vPC peer device to ensure that the configurations are compatible.
You must ensure that the two devices connected by the vPC peer link have certain identical operational and
configuration parameters. For more information on required configuration consistency, see the “Compatibility
Parameters for vPC Interfaces” section.
When you configure the vPC peer link, the vPC peer devices negotiate that one of the connected devices is
the primary device and the other connected device is the secondary device (see the “Configuring vPCs” section).
The Cisco NX-OS software uses the lowest MAC address to elect the primary device. The software takes
different actions on each device—that is, the primary and secondary—only in certain failover conditions. If
the primary device fails, the secondary device becomes the new primary device when the system recovers,
and the previously primary device is now the secondary device.
You can also configure which of the vPC devices is the primary device. Changing the priority of the vPC peer
devices can cause the interfaces in your network to go up and down. If you want to configure the role priority
again to make one vPC device the primary device, configure the role priority on both the primary vPC device
with a lower priority value and the secondary vPC device with the higher value. Then, shut down the port
channel that is the vPC peer link on both devices by entering the shutdown command, and finally reenable
the port channel on both devices by entering the no shutdown command.
We recommend that you use two different modules for redundancy on each vPC peer device on each vPC
peer link.
The software keeps all traffic that forwards across the vPC peer devices as local traffic. A packet that ingresses
the port channel uses one of the local links rather than moving across the vPC peer link. Unknown unicast,
multicast, and broadcast traffic (including STP BPDUs) are flooded across the vPC peer link. The software
keeps the multicast forwarding state synchronized on both of the vPC peer devices.
You can configure any of the standard load-balancing schemes on both the vPC peer link devices and the
downstream device (see Chapter 6, “Configuring Port Channels” for information about load balancing).
Configuration information flows across the vPC peer links using the Cisco Fabric Services over Ethernet
(CFSoE) protocol. (See the “Cisco Fabric Services Over Ethernet” section on page 7-30 for more information
about CFSoE.)
All MAC addresses for those VLANs configured on both devices are synchronized between vPC peer devices.
The software uses CFSoE for this synchronization. (See the “Cisco Fabric Services Over Ethernet” section on
page 7-30 for information about CFSoE.)
If the vPC peer link fails, the software checks the status of the remote vPC peer device using the peer-keepalive
link, which is a link between vPC peer devices that ensures that both devices are up. If the vPC peer device
is up, the secondary vPC device disables all vPC ports on its device, to prevent loops and disappearing or
flooding traffic. The data then forwards down the remaining active links of the port channel.
We recommend that you create and configure a separate VRF and configure a Layer 3 port on each vPC peer
device in that VRF for the vPC peer-keepalive link. The default ports and VRF for the peer-keepalive are the
management ports and VRF.
The software learns of a vPC peer device failure when the keepalive messages are not returned over the
peer-keepalive link.
Use a separate link (vPC peer-keepalive link) to send configurable keepalive messages between the vPC peer
devices. The keepalive messages on the vPC peer-keepalive link determines whether a failure is on the vPC
peer link only or on the vPC peer device. The keepalive messages are used only when all the links in the peer
link fail. See the “Peer-Keepalive Link and Messages” section for information about the keepalive message.
Features That You Must Manually Configure on the Primary and Secondary Devices
You must manually configure the following features to conform to the primary/secondary mapping of each
of the vPC peer devices:
• STP root—Configure the primary vPC peer device as the STP primary root device and configure the
vPC secondary device to be the STP secondary root device. See the “vPC Peer Links and STP” section
for more information about vPCs and STP.
◦When the port-channel is designated as the vPC peer link, the spanning-tree port type network
command is added and so the port-channel becomes the bridge assurance port.
◦We recommend that you configure Rapid per VLAN Spanning Tree plus (PVST+) so that the
primary device is the root for all VLANs and configure Multiple Spanning Tree (MST) so that the
primary device is the root for all instances.
• Layer 3 VLAN network interface—Configure Layer 3 connectivity from each vPC peer device by
configuring a VLAN network interface for the same VLAN from both devices.
• HSRP active—If you want to use Hot Standby Router Protocol (HSRP) and VLAN interfaces on the
vPC peer devices, configure the primary vPC peer device with the HSRP active highest priority. Configure
the secondary device to be the HSRP standby and ensure that you have VLAN interfaces on each vPC
device that are in the same administrative and operational mode. (See the “vPC Peer Links and Routing”
section for more information on vPC and HSRP.)
While you configure Unidirectional Link Detection (UDLD), note the following recommendations:
• If LACP is used as port-channel aggregation protocol, UDLD is not required in a vPC domain.
• If LACP is not used as the port-channel aggregation protocol (static port-channel), use UDLD in normal
mode on vPC member ports.
• If STP is used without Bridge Assurance and if LACP is not used, use UDLD in normal mode on vPC
orphan ports.
See the “Configuring UDLD Mode” section for information about configuring UDLD.
Note Ensure that you have a VLAN network interface configured on each peer device and that the interface is
connected to the same VLAN on each device. Also, each VLAN interface must be in the same administrative
and operational mode. For more information about configuring VLAN network interfaces, see “Configuring
Layer 2 Interfaces.”
From Cisco NX-OS Release 6.2(2), if the vPC peer link is on an F2e-Series module in a mixed chassis with
an M-Series module and an F2e-Series module, do not use the Layer 3 backup routing path over the vPC peer
link; instead deploy a dedicated Layer 3 backup routing path using an additional inter-switch port channel.
If a failover occurs on the vPC peer link, the VLAN interfaces on the vPC peer devices are also affected. If
a vPC peer link fails, the system brings down associated VLAN interfaces on the secondary vPC peer device.
From Cisco NX-OS Release 4.2(1), you can ensure that specified VLAN interfaces do not go down on the
vPC secondary device when the vPC peer link fails.
Use the dual-active exclude interface-vlan command to configure this feature.
Note From Cisco NX-OS Release 7.2(0)D1(1), when you attach a Layer 3 device to a vPC domain, the peering
of routing protocols using a VLAN also carried on the vPC peer link is not supported. If routing protocol
adjacencies are needed between vPC peer devices and a generic Layer 3 device, you must use physical
routed interfaces for the interconnection. Use of the vPC peer-gateway feature does not change this
requirement.
Note Ensure that both the source and destination IP addresses used for the peer-keepalive messages are unique
in your network and these IP addresses are reachable from the VRF associated with the vPC peer-keepalive
link.
Use the CLI to configure the interfaces you are using the vPC peer-keepalive messages as trusted ports. Leave
the precedence at the default (6) or configure it higher.
This is an example of configuring an interface as a trusted port:
(config)# class-map type qos match-all trust-map
(config-cmap-qos)# match cos 4-7
See the Cisco Nexus 7000 Series NX-OS Quality of Service Configuration Guide for complete information
about configuring trusted ports and precedence.
Note From Cisco NX-OS Release 6.2(2), you can use the mode auto command to automatically enable this
feature. See the “Enabling Certain vPC Commands Automatically” section for more information about
using this command.
Some network-attached storage (NAS) devices or load balancers might have features that help to optimize
the performances of particular applications. These features enable the device to avoid a routing-table lookup
when responding to a request that originated from a host that is not locally attached to the same subnet. Such
devices might reply to traffic using the MAC address of the sender Cisco Nexus 7000 Series and Cisco Nexus
7700 Series devices rather than the common HSRP gateway. This behavior is noncompliant with some basic
Ethernet RFC standards. Packets that reach a vPC device for the nonlocal router MAC address are sent across
the peer link and could be dropped by the built in vPC loop avoidance mechanism if the final destination is
behind another vPC.
The vPC peer-gateway capability allows a vPC switch to act as the active gateway for packets that are addressed
to the router MAC address of the vPC peer. This feature enables local forwarding of packets without the need
to cross the vPC peer link. In this scenario, the feature optimizes use of the peer link and avoids potential
traffic loss.
Configuring the peer-gateway feature must be done on both primary and secondary vPC peers and is
nondisruptive to the operations of the device or to the vPC traffic. The vPC peer-gateway feature can be
configured globally under the vPC domain submode.
When you enable this feature, Cisco NX-OS automatically disables IP redirects on all interface VLANs
mapped over a vPC VLAN to avoid generation of IP redirect messages for packets switched through the peer
gateway router.
Note From Cisco NX-OS Release 5.1(3) and above, when a VLAN interface is used for Layer 3 backup routing
on the vPC peer devices and an F1 line card is used as the peer link, the VLAN must be excluded from
the peer-gateway feature, if enabled, by running the peer-gateway exclude-vlan vlan-number command.
For more information about backup routes, see the “Configuring Layer 3 Backup Routes on a vPC Peer
Link” section.
Packets that arrive at the peer-gateway vPC device have their Time to Live (TTL) decremented, so that packets
carrying a TTL of 1 might get dropped in transit due to TTL expiration. You should take this situation into
account when the peer-gateway feature is enabled and particular network protocols that source packets with
a TTL of 1 operate on a vPC VLAN.
vPC complex. vPC peers must have identical VLANs. The TTL of the traffic sent over a peer link does not
decrement. The peer-gateway feature should be enabled before configuring the Layer 3 over vPC for F2E and
F3 Modules feature. The peer-gateway feature allows the vPC peer (SVI X) (refer the figure below) to forward
packets on behalf of other peer (SVI-Y). This feature saves bandwidth by avoiding traffic over the peer link.
You can set up peer adjacency between Layer 3 device and vPC peer without separate Layer 3 links. Both
bridged and routed traffic can flow over the same link.
Routing adjacency between Layer 3 device and vPC peer is formed without a non-vPC VLAN. Adjacency is
formed on the vPC VLAN. Routing adjacency between a Layer 3 device and a vPC peer is formed without
Layer 3 inter-switch links between the vPC peers. Adjacency is formed on the vPC peer-link. There is faster
convergence when a link or device fails for all traffic. vPC loop avoidance mechanism is available for all
traffic.
Figure 15: Supported: Peering Over a vPC Interconnection Where the Router Peers with Both the vPC Peers.
Figure 16: Supported: Peering Over an STP Interconnection Using a vPC VLAN Where the Router Peers with Both the vPC
Peers.
Figure 17: Supported: Peering Over an Orphan Device with Both the vPC Peers.
Figure 18: Supported: Peering Over a vPC Interconnection Where Each Nexus Device Peers with Two vPC Peers.
Figure 19: Supported: Peering with vPC Peers Over FEX vPC Host Interfaces
The FEX is connected to Nexus in straight-through topology. The router peers with both Nexus boxes over
satellite ports. Layer 3 over vPC in FEX Active-Active mode vPC is not supported.
Figure 20: Unsupported: Peering Across vPC Interfaces with Unequal Layer 3 Metrics
Figure 21: Unsupported: Peering Over vPC+ Interfaces in Cisco NX-OS 7.2(0)D1(1)
Figure 22: Unsupported: Peering with vPC+ Peers an STP Interconnection Using a vPC+ VLAN
Figure 23: Unsupported: Route Peering with Orphan Device with Both the vPC+ Peers
Figure 24: Unsupported: Peering Over PC Interconnection and Over vPC+ Peer Link Using vPC VLAN
vPC Domain
You can use the vPC domain ID to identify the vPC peer links and the ports that are connected to the vPC
downstream devices.
The vPC domain is also a configuration mode that you use to configure the keepalive messages and other
vPC peer link parameters rather than accept the default values. See the “Configuring vPCs” section for more
information about configuring these parameters.
To create a vPC domain, you must first create a vPC domain ID on each vPC peer device using a number
from 1 to 1000. You can have only one vPC domain per VDC.
You must explicitly configure the port channel that you want to act as the peer link on each device. You
associate the port channel that you made a peer link on each device with the same vPC domain ID to form a
single vPC domain. Within this domain, the system provides a loop-free topology and Layer 2 multipathing.
You can only configure these port channels and vPC peer links statically. All ports in the vPC on each of the
vPC peer devices must be in the same VDC. You can configure the port channels and vPC peer links either
using LACP or no protocol. We recommend that you use LACP with the interfaces in active mode to configure
port channels in each vPC, which ensures an optimized, graceful recovery in a port-channel failover scenario
and provides configuration checks against configuration mismatches among the port channels themselves.
The vPC peer devices use the vPC domain ID that you configure to automatically assign a unique vPC system
MAC address. Each vPC domain has a unique MAC address that is used as a unique identifier for the specific
vPC-related operations, although the devices use the vPC system MAC addresses only for link-scope operations,
such as LACP. We recommend that you create each vPC domain within the contiguous Layer 2 network with
a unique domain ID. You can also configure a specific MAC address for the vPC domain, rather than having
the Cisco NX-OS software assign the address.
See the “Cisco Fabric Services Over Ethernet” section for more information about displaying the vPC MAC
table. After you create a vPC domain, the Cisco NX-OS software creates a system priority for the vPC domain.
You can also configure a specific system priority for the vPC domain.
Note When manually configuring the system priority, you must ensure that you assign the same priority value
on both vPC peer devices. If the vPC peer devices have different system priority values, vPC does not
come up.
vPC Topology
The figure below shows a basic configuration in which the Cisco Nexus 7000 Series device ports are directly
connected to another switch or host and are configured as part of a port channel that becomes part of a vPC.
In the figure, vPC 20 is configured on port channel 20, which has Eth1/10 on the first device and Eth2/1 on
the second as member ports.
From Cisco NX-OS Release 5.2(1), you can configure a vPC from the peer devices through Fabric Extenders
(FEXs), as shown in the figure below.
In the figure, each FEX is single-homed (straight-through FEX topology) with a Cisco Nexus 7000 Series
device. The host interfaces on this FEX are configured as port channels and those port channels are configured
as vPCs. Eth100/1/1 and Eth102/1/5 are configured as members of PO200, and PO200 is configured for vPC
200.
In both topologies, port channels P020 and P0200 must be configured identically on the peer switches and
configuration synchronization is used to synchronize the configurations of the vPC switches. See Cisco Nexus
2000 Series Fabric Extender Software Configuration Guide for Cisco Nexus 7000 Series Switches, Release
8.x for more information about configuring FEX ports.
Note The fabricpath multicast load-balance command must be enabled before configuring
Physical Port vPC+. This requirement applies to regular front panel and FEX ports.
Note Enter the show vpc consistency-parameters command to display the configured values on all interfaces
in the vPC. The displayed configurations are only those configurations that would limit the vPC peer link
and vPC from coming up.
The compatibility check process for vPCs differs from the compatibility check for regular port channels. See
“Configuring Port Channels” for information about regular port channels.
Note You must ensure that all interfaces in the vPC have the identical operational and configuration parameters
listed in this section.
Note Enter the show vpc consistency-parameters command to display the configured values on all interfaces
in the vPC. The displayed configurations are only those configurations that would limit the vPC peer link
and vPC from coming up.
The devices automatically check for compatibility for some of these parameters on the vPC interfaces. The
per-interface parameters must be consistent per interface, and the global parameters must be consistent globally:
• Port-channel mode: on, off, or active (port-channel mode can, however, be active/passive on each side
of the vPC peer)
• Link speed per channel
• Duplex mode per channel
• Trunk mode per channel:
◦Native VLAN
◦VLANs allowed on trunk
◦Tagging of native VLAN traffic
The following parameters were added in Cisco NX-OS Release 6.2(6) for physical port vPCs:
• Native VLAN
• Port mode
• Interface type
• VLAN xLT mapping
• vPC card type
• Shared mode
If any of these parameters are not enabled or defined on either device, the vPC consistency check ignores
those parameters.
Note To ensure that none of the vPC interfaces are in the suspend mode, enter the show vpc brief and show
vpc consistency-parameters commands and check the syslog messages.
• Port security
• Cisco Trusted Security (CTS)
• Port security
• Cisco Trusted Security (CTS)
• Dynamic Host Configuration Protocol (DHCP) snooping
• Network Access Control (NAC)
• Dynamic ARP Inspection (DAI)
• IP source guard (IPSG)
• Internet Group Management Protocol (IGMP) snooping
• Hot Standby Routing Protocol (HSRP)
• Protocol Independent Multicast (PIM)
• Gateway Load-Balancing Protocol (GLBP)
To ensure that all the configuration parameters are compatible, we recommend that you display the
configurations for each vPC peer device once you configure the vPC.
vPC Number
Once you have created the vPC domain ID and the vPC peer link, you create port channels to attach the
downstream device to each vPC peer device. That is, you create one port channel to the downstream device
from the primary vPC peer device and you create another port channel to the downstream device from the
secondary peer device.
Note We recommend that you configure the ports on the downstream devices that connect to a host or a network
device that is not functioning as a switch or a bridge as STP edge ports. See the Cisco Nexus 7000 Series
NX-OS Layer 2 Switching Configuration Guide for more information about STP port types.
On each vPC peer device, you assign a vPC number to the port channel that connects to the downstream
device. You will experience minimal traffic disruption when you are creating vPCs. To simplify the
configuration, you can assign the vPC ID number to every port channel to be the same as the port channel
itself (that is, vPC ID 10 for port channel 10).
Note The vPC number that you assign to the port channel that connects to the downstream device from the vPC
peer device must be identical on both vPC peer devices.
vPC Shutdown
The vPC Shutdown feature enables a user to isolate a switch from a vPC complex before it is debugged,
reloaded, or even removed physically, so that the vPC traffic passing through the peer vPC switch in the vPC
complex is not affected.
When the user executes the shutdown command, the MCEC module (MCECM) stops sending out-of-band
(OOB) keep-alive messages and also brings down all the vPC ports, SVIs, and the peer-link. On detection of
the peer-link going down and the non-availability of the keep-alive messages, the peer vPC switch takes over
as the primary peer. As the keep-alive messages are not received, the peer vPC switch does not bring up the
vPC peer-link even after a flap. The isolated vPC switch keeps all the vPCs down as the peer-link is down.
The vPC orphan port suspends configured orphan ports.
When the user executes the no form of this command, the switch is brought back into the vPC complex with
minimal disruption of the network traffic. Executing the no form of this command, starts the keepalives, brings
up the peer links, and consecutively brings up all the vPCs.
When executed on the primary switch, the shutdown command dual-active status is established.
Orphan ports lose connectivity when the vPC shutdown command is executed.
Cisco NX-OS services saves the shutdown command in the persistent storage service (PSS). The command
is restored when the switch reloads. The shutdown command is saved as vPC configuration. The shutdown
command executed again along with the vPC configuration, if it has been copied to the startup configuration.
The shutdown command is restored when the switch reloads
• An ISSU has been performed on the active peer, that is Peer 1, for upgrading from one software image
version to a higher version
All line cards and the remote line cards, including FEX Active-Active, upgrade to higher version of the
software image. This happens because the FEX Active-Active is offline on the inactive peer.
Consecutively, when the inactive peer becomes online due to the VPC no shutdown command, this peer will
still run the lower version of the software image. In such as case, the status of FEX Active-Active toggles
between AA version mismatch and Offline in this peer. This is because both the peers run different versions
of the software image. To avoid this situation, the user should not bring up the Peer 2, or execute the VPC
shutdown command on it, until the Peer 2 is also upgraded to higher version software image.
Note You must attach a downstream device using a port channel to both vPC peer devices.
To connect to the downstream device, you create a port channel to the downstream device from the primary
vPC peer device and you create another port channel to the downstream device from the secondary peer device.
On each vPC peer device, you assign a vPC number to the port channel that connects to the downstream
device. You will experience minimal traffic disruption when you are creating vPCs.
Configuring vPC Peer Links and Links to the Core on a Single Module
Note We recommend that you configure the vPC peer links on dedicated ports of different modules to reduce
the possibility of a failure. For the best resiliency scenario, use at least two modules.
From Cisco NX-OS Release 4.2, if you must configure all the vPC peer links and core-facing interfaces on a
single module, you should configure, using the command-line interface, a track object and a track list that is
associated with the Layer 3 link to the core and on all vPC peer links on both vPC peer devices. You use this
configuration to avoid dropping traffic if that particular module goes down because when all the tracked
objects on the track list go down, the system does the following:
• Stops the vPC primary peer device sending peer-keepalive messages, which forces the vPC secondary
peer device to take over.
• Brings down all the downstream vPCs on that vPC peer device, which forces all the traffic to be rerouted
in the access switch toward the other vPC peer device.
Once you configure this feature and if the module fails, the system automatically suspends all the vPC links
on the primary vPC peer device and stops the peer-keepalive messages. This action forces the vPC secondary
device to take over the primary role and all the vPC traffic to go to this new vPC primary device until the
system stabilizes.
You should create a track list that contains all the links to the core and all the vPC peer links as its object.
Enable tracking for the specified vPC domain for this track list. Apply this same configuration to the other
vPC peer device. See the Cisco Nexus 7000 Series NX-OS Unicast Routing Configuration Guide for information
about configuring object tracking and track lists.
See the Cisco Nexus 7000 Series NX-OS Unicast Routing Configuration Guide for information about
configuring object tracking.
Note This example uses Boolean OR in the track list and forces all traffic to the vPC peer device only for a
complete module failure. If you want to trigger a switchover when any core interface or peer link goes
down, use a Boolean AND in the track list below.
A vPC deployment with a single Cisco Nexus 7000 Series M132XP-12 module or M108XP-12 module, where
the L3 core uplinks and vPC peer-link interfaces are localized on the same module, is vulnerable to access
layer isolation if the 10-Gbps module fails on the primary vPC (vPC member ports are defined on both 1-Gbps
line cards and on 10-Gbps line card).
To configure a track list to switch over a vPC to the remote peer when all related interfaces on a single module
fail, follow these steps:
1 Configure track objects on an interface (Layer 3 to core) and on a port channel (vPC peer link).
switch(config-if)# track 35 interface ethernet 8/35 line-protocol
switch(config-track)# track 23 interface ethernet 8/33 line-protocol
switch(config)# track 55 interface port-channel 100 line-protocol
2 Create a track list that contains all the interfaces in the track list using the Boolean OR to trigger when all
objects fail.
switch(config)# track 44 list boolean OR
switch(config-track)# object 23
switch(config-track)# object 35
switch(config-track)# object 55
switch(config-track)# end
This example shows how to display information about the track objects:
switch# show track brief
Track Type Instance Parameter State Last
Change
23 Interface Ethernet8/33 Line Protocol UP 00:03:05
35 Interface Ethernet8/35 Line Protocol UP 00:03:15
44 List ----- Boolean
or UP 00:01:19
55 Interface port-channel100 Line Protocol UP 00:00:34
Note When manually configuring the system priority, you must ensure that you assign the same priority value
on both vPC peer devices. If the vPC peer devices have different system priority values, vPC does not
come up.
When you are running both MST and Rapid PVST+, ensure that the PVST simulation feature is correctly
configured.
See the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide for information about STP
enhancement features and PVST simulation.
You must configure a list of parameters to be identical on the vPC peer devices on both sides of the vPC peer
link. See the “Compatibility Parameters for vPC Interfaces” section for information about these required
matched settings.
STP is distributed; that is, the protocol continues running on both vPC peer devices. However, the configuration
on the vPC peer device elected as the primary device controls the STP process for the vPC interfaces on the
secondary vPC peer device.
The primary vPC device synchronizes the STP state on the vPC secondary peer device using Cisco Fabric
Services over Ethernet (CFSoE). See the “Cisco Fabric Services Over Ethernet” section for information about
CFSoE.
The STP process for vPC also relies on the periodic keepalive messages to determine when one of the connected
devices on the peer link fails. See the “Peer-Keepalive Link and Messages” section for information about these
messages.
The vPC manager performs a proposal/handshake agreement between the vPC peer devices that set the primary
and secondary devices and coordinates the two devices for STP. The primary vPC peer device then controls
the STP protocol on both the primary and secondary devices. We recommend that you configure the primary
vPC peer device as the STP primary root device and configure the secondary VPC device to be the STP
secondary root device.
If the primary vPC peer device fails over to the secondary vPC peer device, there is no change in the STP
topology.
The BPDUs uses the MAC address set for the vPC for the STP bridge ID in the designated bridge ID field.
The vPC primary device sends these BPDUs on the vPC interfaces.
You must configure both ends of vPC peer link with the identical STP configuration for the following
parameters:
• STP global settings:
◦STP mode
◦STP region configuration for MST
◦Enable/disable state per VLAN
◦Bridge Assurance setting
◦Port type setting
◦Loop Guard settings
Note If any of these parameters are misconfigured, the Cisco NX-OS software suspends all interfaces in the
vPC. Check the syslog and enter the show vpc brief command to see if the vPC interfaces are suspended.
Ensure that the following STP interface configurations are identical on both sides of the vPC peer links or
you may see unpredictable behavior in the traffic flow:
• BPDU Filter
• BPDU Guard
• Cost
• Link type
• Priority
• VLANs (PVRST+)
Note Display the configuration on both sides of the vPC peer link to ensure that the settings are identical.
You can use the show spanning-tree command to display information about the vPC when that feature is
enabled. See the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide for an example.
We recommend that you configure the ports on the downstream devices as STP edge ports. You should
configure all host ports connected to a switch as STP edge ports. See the Cisco Nexus 7000 Series NX-OS
Layer 2 Switching Configuration Guide for more information about STP port types.
Note If you bridge two VLANs on a Nexus 7000 peer-switch, with an Adaptive Security Appliance (ASA) in
a transparent mode, the switch puts one of the VLAN in a STP dispute. To avoid this, disable peer-switch
or STP on the ports.
Note The Peer-switch feature on networks that use vPC and STP-based redundancy is not supported. If the vPC
peer-link fails in a hybrid peer-switch configuration, you can lose traffic. In this scenario, the vPC peers
use the same STP root ID as well as the same bridge ID. The access switch traffic is split in two with half
traffic going to the first vPC peer and the other half traffic to the second vPC peer. With peer link failure,
there is no impact to the north/south traffic but the east/west traffic is lost.
See the Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide for information about STP
enhancement features and Rapid PVST+.
From Cisco NX-OS Release 6.2(2), this feature is automatically enabled when the mode auto command is
used. See the “Enabling Certain vPC Commands Automatically” section for more information about using
this command.
Note Only an F2-series module supports multicast load balancing. On an F1-series module, the configuration
is supported, but load balancing does not occur.
Note The fabricpath multicast load-balance command is required for configuring vPC+ with FEX ports.
See the Cisco Nexus 7000 Series NX-OS FabricPath Configuration Guide for more detailed information on
enabling designated forwarders on vPCs.
Note From Cisco NX-OS Release 6.2(2), you can use the mode auto command to automatically enable this
feature. See the “Enabling Certain vPC Commands Automatically” section for information about using
this command.
Note The Cisco NX-OS software for the Nexus 7000 Series devices does not support Product Independent
Multicast (PIM), Source-Specific Multicast(SSM) or Bidirectional (BIDR) on a vPC. The Cisco NX-OS
software fully supports PIM Any Source Multicast (ASM) on a vPC.
The software keeps the multicast forwarding state synchronized on both of the vPC peer devices. The IGMP
snooping process on a vPC peer device shares the learned group information with the other vPC peer device
through the vPC peer link; the multicast states are always synchronized on both vPC peer devices. The PIM
process in vPC mode ensures that only one of the vPC peer devices forwards the multicast traffic to the
receivers.
Each vPC peer is a Layer 2 or Layer 3 device. Multicast traffic flows from only one of the vPC peer devices.
You might see duplicate packets in the following scenarios:
• Orphan hosts
• When the source and receivers are in the Layer 2 vPC cloud in different VLANs with multicast routing
enabled and a vPC member link goes down.
Ensure that you dual-attach all Layer 3 devices to both vPC peer devices. If one vPC peer device goes down,
the other vPC peer device continues to forward all multicast traffic normally.
See the Cisco Nexus 7000 Series NX-OS Interfaces Command Reference for information about commands
that display information on a vPC and multicast.
The following outlines vPC PIM and vPC IGMP/IGMP snooping:
• vPC PIM—The PIM process in vPC mode ensures that only one vPC peer device forwards multicast
traffic. The PIM process in vPC mode synchronizes the source state with both vPC peer devices and
elects which vPC peer device forwards the traffic.
• vPC IGMP/IGMP snooping—The IGMP process in vPC mode synchronizes the designated router (DR)
information on both vPC peer devices. Dual DRs are available for IGMP when you are in vPC mode.
Dual DRs are not available when you are not in vPC mode, because both vPC peer devices maintain the
multicast group information between the peers.
Note A PIM neighbor relationship between a vPC VLAN (a VLAN that is carried on a vPC peer link) and a
downstream vPC-attached Layer 3 device is not supported, which can result in dropped multicast packets.
If a PIM neighbor relationship is required with a downstream Layer 3 device, a physical Layer 3 interface
must be used instead of a vPC interface.
You should enable or disable IGMP snooping identically on both vPC peer devices, and all the feature
configurations should be identical. IGMP snooping is on by default.
See the Cisco Nexus 7000 Series NX-OS Multicast Routing Configuration Guide for more information
about multicasting.
VPC Device2:
------------
(*,G)
oif1 (igmp)
(S,G)
oif1 (mrib)
VPC Device2:
------------
(*,G)
oif1 (igmp)
(S,G)
NULL
In the case of a failure (for example, a Layer 3 Reverse Path Forwarding(RPF) link on the forwarder becomes
inoperational or the forwarder gets reloaded), if the current nonforwarder ends up becoming the forwarder,
it has to start sending PIM joins for (S,G) toward the source to pull the traffic. Depending upon the number
of hops to reach the source, this operation might take some time (PIM is a hop-by-hop protocol).
To eliminate this issue and get better convergence, use the ip pim pre-build-spt command. This command
enables PIM send joins even if the multicast route has 0 OIFs. In a vPC device, the nonforwarder sends PIM
(S,G) joins upstream toward the source. The downside is that the link bandwidth upstream from the
nonforwarder gets used for the traffic that is ultimately dropped by it. The benefits that result with better
convergence far outweigh the link bandwidth usage. Therefore, we recommend that you use this command
if you use vPCs.
PIM DUAL DR and IP PIM PRE-BUILD SPT with VPC Peer Link on F2 Modules
In the vPC implementation in F2-mode, because of a hardware limitation, the PIM dual DR mode is disabled.
As a result, only the PIM DR adds the OIF, and the states are shown in this example:
Case 1: One OIF
===============
VPC Device1 (say this is PIM DR on oif1):
----------------------------------------
(*,G)
oif1 (igmp)
VPC Device2:
------------
(*,G) will not be created.
When the source traffic is received, only vPC Device 1 adds the (S,G) route.
VPC Device1 (say this is PIM DR on oif1):
----------------------------------------
(*,G)
oif1 (igmp)
(S,G)
oif1 (mrib)
VPC Device2:
------------
(*, G) will not be created.
(S, G) will not be created.
In this case (with F2 mode), even if you enter the ip pim pre-build-spt command, no value is added because
the corresponding (S,G) route is not created in the first place.
Case 2: Two OIFs
================
VPC Device1 (say this is PIM DR on oif1):
----------------------------------------
(*,G)
oif1 (igmp)
(*,G)
oif2 (igmp)
When the source traffic is received, associated OIFs are inherited by the (S,G) routes as shown in this example:
VPC Device1 (say this is PIM DR on oif1):
----------------------------------------
(*,G)
oif1 (igmp)
(S,G)
oif1 (mrib)
(S,G)
oif2 (mrib)
In the case of a vPC peer link with F2 modules, you do not need to enter the ip pim pre-build-spt command
because PIM sends (S,G) joins upstream because associated routes have a non-NULL oiflist.
Note Do not enter the ip pim pre-build-spt command if the vPC feature is enabled in F2 mode.
We do not recommend that you configure the burnt-in MAC address option (use-bia) for HSRP or manually
configure virtual MAC addresses for any FHRP protocol in a vPC environment because these configurations
can adversely affect vPC load balancing. The HSRP use-bia option is not supported on vPCs. When you are
configuring custom MAC addresses, you must configure the same MAC address on both vPC peer devices.
From Cisco NX-OS Release 4.2(1), you can use the delay restore command to configure a restore timer that
delays the vPC coming back up until after the peer adjacency forms and the VLAN interfaces are back up.
This feature enables you to avoid packet drops when the routing tables might not be converged before the
vPC is once again passing traffic. Use the delay restore command to configure this feature.
To delay the VLAN interfaces on the restored vPC peer device from coming up, use the interfaces-vlan option
to the delay restore command.
See the Cisco Nexus 7000 Series NX-OS Unicast Routing Configuration Guide for more information about
FHRPs and routing.
Note Do not enter the no cfs eth distribute or the no cfs distribute command. You must enable Cisco FSoE
for vPC functionality. If you do enter either of these commands with vPC enabled, the system displays
an error message.
When you enter the show cfs application command, the output displays “Physical-eth,” which shows the
applications that are using Cisco FSoE.
Cisco Fabric Service also transports data over TCP/IP. See the Cisco Nexus 7000 Series NX-OS System
Management Configuration Guide for more information about Cisco Fabric Service over IP.
Note The software does not support Cisco Fabric Service regions.
If a peer link failure or restoration occurs, an orphan port’s connectivity might be bound to the vPC failure or
restoration process. For example, if a device’s active orphan port connects to the secondary vPC peer, the
device loses any connections through the primary peer if a peer link failure occurs and the vPC ports are
suspended by the secondary peer. If the secondary peer were to also suspend the active orphan port, the device’s
standby port becomes active, provides a connection to the primary peer, and restores connectivity. From Cisco
NX-OS Release 5.2(1), you can configure in the CLI that specific orphan ports are suspended by the secondary
peer when it suspends its vPC ports and are restored when the vPC is restored.
Shutdown LAN
Certain configuration and network parameters must be consistent across peer switches in order for physical
port vDCs to work. If an inconsistency impacting the network (Type 1) is detected, the secondary vPC leg
(the physical link between the access switch and the host) is brought down. With FCoE over physical port
vPC, vPC legs carry both FCoE and LAN traffic so that the FCoE and LAN link are both brought down. The
shutdown LAN feature enables you to shut down or bring up only the LAN VLANs on an Ethernet interface.
Restore on Reload
Note From Cisco NX-OS Release 5.2(1), the reload restore command and method is deprecated. We recommend
that you use the auto-recovery command and method.
From Cisco NX-OS Release 5.0(2), you can configure the Cisco Nexus 7000 Series device to restore vPC
services when its peer fails to come online by using the reload restore command. You must save this setting
in the startup configuration. On reload, the Cisco NX-OS software starts a user-configurable timer (the default
is 240 seconds). If the peer link port comes up physically or if the peer-keepalive is functional, the timer is
stopped and the device waits for the peer adjacency to form.
If at timer expiration no peer-keepalive or peer link up packets were received, the Cisco NX-OS software
assumes the primary STP role and the primary LACP role. The software reinitializes the vPCs, bringing up
its local ports. Because there are no peers, the consistency check is bypassed for the local vPC ports. The
device elects itself to be STP primary regardless of its role priority and also acts as the master for LACP port
roles.
Autorecovery
From Cisco NX-OS Release 5.2(1), you can configure the Cisco Nexus 7000 Series device to restore vPC
services when its peer fails to come online by using the auto-recovery command. You must save this setting
in the startup configuration. On reload, if the peer link is down and three consecutive peer-keepalive messages
are lost, the secondary device assumes the primary STP role and the primary LACP role. The software
reinitialize the vPCs, bringing up its local ports. Because there are no peers, the consistency check is bypassed
for the local vPC ports. The device elects itself to be the STP primary regardless of its role priority and also
acts as the master for LACP port roles.
From Cisco NX-OS Release 6.2(2), you can use the mode auto command to automatically enable this feature.
See the “Enabling Certain vPC Commands Automatically” section for information about using this command.
From Cisco NX-OS Release 7.2(0)D1(1), the secondary device assumes primary role, if the primary peer is
down and 15 keep-alives messages are lost.
From Cisco NX-OS Release 7.2(0)D1(1), to enable the secondary peer to take over as the primary peer if the
secondary peer misses 15 keep-alives from primary peer, you can configure auto-recovery command. When
the switch reloads, the auto-recovery timer starts, and the switch takes on the primary STP role if the peer
switch does not respond to it.
When vPC shutdown command is configured, auto-recovery is blocked.
From Cisco NX-OS Release 6.2.(2), for auto recovery to occur during the initial boot, the logical peer link
must be down, and no peer keepalive messages must be received. In earlier releases, auto recovery did not
occur if peer kepalive messages were not received and the physical peer link was set to Up status.
High Availability
During an In-Service Software Upgrade (ISSU), the software reload process on the first vPC device locks its
vPC peer device by using CFS messaging over the vPC communications channel. Only one device at a time
is upgraded. When the first device completes its upgrade, it unlocks its peer device. The second device then
performs the upgrade process, locking the first device as it does so. During the upgrade, the two vPC devices
temporarily run different releases of Cisco NX-OS, however the system functions correctly because of its
backward compatibility support.
See the Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide for complete information
about high-availability features.
Note Always check the existing device role priority before configuring the vpc role preempt
command. Configure no port-channel limit under the vpc domain command before
configuring the vpc role preempt command.
• Dual-active recovery—In a dual-active recovery scenario, the vPC primary switch continues to be
(operational) primary, but the vPC secondary switch becomes the targeted primary switch and keeps its
vPC member ports up. You can use the vPC hitless feature and restore the device roles. After the
Dual-active recovery, if one side is operational primary and the other side operational secondary, then
you can use the the vpc role preempt command to restore the device roles to be primary and secondary.
Note The show vpc config-sync cli syntax command lists all the commands that are enabled for configuration
synchronization. You cannot choose which commands are synchronized. For more information, see the
Cisco Nexus 7000 Series NX-OS Interfaces Command Reference.
• Type-1 configurations:
◦Global configurations
◦vPC member port-channel configurations
• vPC configurations.
Note The configurations can be given on either of the vPC peer switches.
Configuring vPCs
Enabling vPCs
Before You Begin
• You must enable the vPC functionality before you can configure and use vPCs.
• Before you configure this feature for the entire system, ensure that you are in the correct VDC. To change
the VDC, use the switchto vdc command.
Procedure
Disabling vPCs
Note When you disable the vPC functionality, the device clears all the vPC configurations.
Procedure
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
This example shows how to enter the vpc-domain command mode to configure an existing vPC domain:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# exit
Note You must configure the vPC peer-keepalive link before the system can form the vPC peer link.
You can configure the destination IP for the peer-keepalive link that carries the keepalive messages. Optionally,
you can configure other parameters for the keepalive messages.
Note We recommend that you configure a separate VRF instance and put a Layer 3 port from each vPC peer
device into that VRF for the vPC peer-keepalive link. Do not use the peer link itself to send vPC
peer-keepalive messages. For information about creating and configuring VRFs, see the Cisco Nexus
7000 Series NX-OS Unicast Routing Configuration Guide. Ensure that both the source and destination
IP addresses use for the peer-keepalive message are unique in your network.
The management port and management VRF are the defaults for these keepalive messages.
Procedure
Step 2 switch(config)# vpc domain domain-id Creates a vPC domain on the device, and enters
vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to
1000.
Step 3 switch(config-vpc-domain)# peer-keepalive Configures the IPv4 address for the remote end of the
destination ip address [hold-timeout secs vPC peer-keepalive link.
| interval msecs {timeout secs} | Note The system does not form the vPC peer link
{precedence {prec-value | network | until you configure a vPC peer-keepalive
internet | critical | flash-override | flash | link.
immediate | priority | routine}} | {tos The management ports and VRF are the defaults.
{tos-value | max-reliability |
max-throughput | min-delay | Note We recommend that you configure a separate
min-monetary-cost | normal}} | tos-byte VRF and use a Layer 3 port from each vPC
tos-byte-value} | source ipaddress | peer device in that VRF for the vPC
udp-port number | vrf {name | peer-keepalive link. For more information
management | vpc-keepalive}] about creating and configuring VRFs, see
the Cisco Nexus 7000 Series NX-OS Unicast
Routing Configuration Guide.
Step 4 switch(config-vpc-domain)# exit Exits vpc-domain configuration mode.
For more information about configuring VRFs, see the Cisco Nexus 7000 Series NX-OS Unicast Routing
Configuration Guide.
This example shows how to configure the destination and source IP address and VRF for the vPC-peer-keepalive
link:
switch# configure terminal
switch(config)# vpc domain 100
switch(config-vpc-domain)# peer-keepalive destination 172.168.1.2 source 172.168.1.1 vrf
vpc-keepalive
switch(config-vpc-domain)# exit
designating as the vPC peer link in trunk mode and that you use two ports on separate modules on each vPC
peer device for redundancy.
Procedure
Step 2 switch(config)# interface Selects the port channel that you want to use as the vPC
port-channel channel-number peer link for this device, and enters interface
configuration mode.
Step 5 switch(config-if)# vpc peer-link Configures the selected port channel as the vPC peer
link, and enters vpc-domain configuration mode.
Note When the port-channel is designated as the vPC
peer link, the spanning-tree port type network
command is added, so the port-channel becomes
the bridge assurance port.
Step 6 switch(config-vpc-domain)# exit Exits vpc-domain configuration mode.
Step 2 switch(config)# interface name Specifies the interface that you want to add to a physical
number port, and enters the interface configuration mode.
Step 4 switch(config-if)# vpc number Configures the selected physical interface into the vPC to
connect to the downstream device, and enters interface
vPC configuration mode. You can use any module in the
device for the physical interface. The range is from 1 and
4096.
Note The vPC number that you assign to the physical
interface connecting to the downstream device
from the vPC peer device must be identical on
both vPC peer devices.
Step 5 switch(config-if-vpc)# lacp mode Enables LACP on the physical port.
active Note Static mode can also be
used.
Step 6 switch(config-if-vpc)# exit Exits the interface vPC configuration mode.
This example shows how to configure Physical Port vPC on F2, F3, and FEX modules:
switch# configure terminal
switch(config)# interface ethernet 1/1
switch(config-if)# switchport
switch(config-if)# vpc 10
switch(config-if-vpc)# lacp mode active
switch(config-if-vpc)# exit
switch(config-if)# exit
switch(config)# exit
switch# show running-config interface
Interface Ethernet1/1
no shutdown
Switchport
vpc 1
lacp mode active
Procedure
Step 2 switch(config)# vlan 200-299 Configures VLANs in the range 200 to 299 and
enters the VLAN configuration mode.
This example shows how to configure 100 VLANs and name each of them:
switch# configure terminal
switch(config)# vlan 200-299
switch(config-vlan)# exit
switch(config)# vlan 201
switch(config-vlan)# name finance
switch(config-vlan)# exit
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to
1000.
Step 3 switch(config-vpc-domain)# layer3 Enables the Layer 3 device to form peering adjacency
peer-router with both peers.
Note Configure this command in both the
peers.
Step 4 switch(config-vpc-domain)# exit Exits vpc-domain configuration mode.
This example shows how to configure a Layer 3 over vPC for F2, F2E, and F3 modules:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# layer3 peer-router
switch(config-vpc-domain)# exit
This example shows how to verify if the Layer 3 over vPC for F2, F2E, and F3 modules feature is configured:
switch# show vpc brief
vPC domain id : 1
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
Configuration consistency status : success
Per-vlan consistency status : failed
Type-2 consistency status : success
vPC role : secondary
Number of vPCs configured : 2
Peer Gateway : Enabled
Peer gateway excluded VLANs : -
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)
Operational Layer3 Peer : Enabled
When you attach a Layer 3 device to a vPC domain, the peering of routing protocols using a VLAN also
carried on the vPC peer-link is not supported. If routing protocol adjacencies are needed between vPC peer
devices and a generic Layer 3 device, you must use physical routed interfaces for the interconnection. Use of
the vPC peer-gateway feature does not change this requirement.
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to 1000.
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to 1000.
Step 3 switch(config-vpc-domain)# Specifies that only the links on the secondary peer device
graceful consistency-check are suspended when a mismatch is detected in a mandatory
compatibility parameter.
Use the no form of this command to disable the feature.
This example shows how to enable the graceful consistency check feature:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# graceful consistency-check
switch(config-vpc-domain)# exit
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters vpc-domain
domain-id configuration mode for configuration purposes. There is no
default; the range is from 1 to 1000.
Step 3 switch(config-vpc-domain)# Shuts down the peer to isolate it for debugging, reloading,
shutdown or physically removing it from the vPC complex, and
enables the peer vPC switch to take over as the primary
peer.
Use the no form of this command to disable the feature.
This example shows how to enable the graceful consistency check feature:
switch# configure terminal
switch(config)# vpc domain 1
switch(config-vpc-domain)# shutdown
switch(config-vpc-domain)# exit
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to 1000.
Step 3 switch(config-vpc-domain)# Enables vPC configuration synchronization.
config-sync Note This command must be configured on both the
primary and secondary switch.
The table below shows the process of configuration synchronization on switch 1 and switch 2:
The configuration is applied on the secondary switch and is configuration synchronized to the primary
switch.
Note The configuration can be applied to either
switch.
Procedure
Step 2 switch(config)# interface type Specifies the vPC physical port, and enters interface
slot/port configuration mode.
Step 3 switch(config-if)# vpc vpc-id [sync Moves port channel into a vPC and enters interface vPC
{export | import}] configuration mode. The range is from 1 to 4096.
• sync export enables the primary switch
configuration to be exported to the secondary
switch.
• sync import enables the secondary switch
configuration to be imported to primary switch.
Asymmetric Mapping
The table below shows the process of enabling configuration synchronization (asymmetric mapping) on the
vPC physical port on the primary and the secondary switch:
The physical port (ethernet1/1) is added to the vPC 100 domain on the primary switch.
vPC 100 is not configured on the secondary switch. The configuration will not be synchronized until vPC
100 is added to the secondary switch.
Following the configuration of vPC 100 to the secondary switch, the physical ports (interface ethernet2/3
on the secondary switch and interface ethernet1/1 on the primary switch) will be configuration synchronized.
Symmetric Mapping
The table below shows the process of enabling configuration synchronization (symmetric mapping) on the
vPC physical port on the primary and the secondary switch:
The physical port (ethernet1/1) is added to the vPC 100 domain on the primary switch. The physical port
(ethernet 1/1) is also present on the secondary switch.
The configuration of the physical port on both the primary and secondary switch will be kept in
synchronization.
Procedure
Step 2 switch(config)# interface Selects the port channel that you want to use as the vPC
port-channel channel-number peer link for this device, and enters interface
configuration mode.
Step 4 switch(config-if)# vpc vpc-id [sync Moves port channel into a vPC and enters interface vPC
{export | import}] configuration mode. The range is from 1 to 4096.
• sync export enables the primary switch
configuration to be exported to the secondary
switch.
• sync import enables the secondary switch
configuration to be imported to primary switch.
The table below shows the process of enabling configuration synchronization under port channel 10 on the
primary and the secondary switch:
interface port-channel10
switchport
vpc 10
The show running-config interface port-channel channel-number command shows that the configuration
synchronization for port channel 10 is successful:
Command Purpose
show running-config vpc-config-sync Displays whether config-sync is available or not.
show vpc config-sync cli syntax Displays the list of commands that are able to be
configuration synchronized.
show vpc config-sync merge status Displays the merge status of the switch and of each
vPC interface.
show vpc config-sync status Displays the status of the last 10 operations of the
vPC configuration synchronization process.
• Displays merge status (success/failure).
• Displays the last action done by the vPC
configuration synchronization process and the
result of that action.
Procedure
This example shows how to check that the required configurations are compatible across all the vPC interfaces:
switch# configure terminal
switch(config)# show vpc consistency-parameters global
Note Messages regarding the vPC interface configuration compatibility are also logged to the syslog.
Note We recommend that you attach the vPC domain downstream port channel to two devices for redundancy.
To connect to the downstream device, you create a port channel from the downstream device to the primary
vPC peer device and you create another port channel from the downstream device to the secondary peer device.
On each vPC peer device, you assign a vPC number to the port channel that connects to the downstream
device. You will experience minimal traffic disruption when you are creating vPCs.
Procedure
Step 2 switch(config)# interface Selects the port channel that you want to use as the vPC
port-channel channel-number peer link for this device, and enters interface configuration
mode.
Step 3 switch(config-if)# vpc number Configures the selected port channel into the vPC to connect
to the downstream device. You can use any module in the
device for these port channels. The range is from 1 and
4096.
Note The vPC number that you assign to the port channel
connecting to the downstream device from the vPC
peer device must be identical on both vPC peer
devices.
Step 4 switch(config-vpc-domain)# exit Exits vpc-domain configuration mode.
This example shows how to configure a port channel to connect to the downstream device:
switch# configure terminal
switch(config)# interface port-channel 20
switch(config-if)# vpc 5
switch(config-if)# exit
Note From Cisco NX-OS Release 6.2(2) and later releases, auto recovery is enabled by default. If you want to
disable auto recovery in Release 6.2(2) and later releases, you must use the no auto-recovery command
to explicitly disable auto recovery.
Procedure
Step 3 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to 1000.
This example shows how to simultaneously enable the following commands: peer-gateway, auto-recovery,
fabricpath multicast load-balance, ip arp synchronize, and ipv6 nd synchronize.
Warning:
Enables restoring of vPCs in a peer-detached state after reload, will wait for 240 seconds
to determine if peer is un-reachable
switch(config-vpc-domain)# exit
switch(config)# exit
switch# show running-config vpc
version 6.2(2)
feature vpc
vpc domain 1
peer-gateway
auto-recovery
fabricpath multicast load-balance
ip arp synchronize
ipv6 nd synchronize
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to
1000.
Step 3 switch(config-vpc-domain)# Enters the MAC address that you want for the specified
system-mac mac-address vPC domain in the following format: aaaa.bbbb.cccc.
This example shows how to manually configure a vPC domain MAC address:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# system-mac 13gb.4ab5.4c4e
switch(config-vpc-domain)# exit
Note We recommend that you manually configure the vPC system priority when you are running LACP to
ensure that the vPC peer devices are the primary devices on LACP. When you manually configure the
system priority, ensure that you configure the same priority value on both vPC peer devices. If these values
do not match, vPC does not come up.
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to
1000.
Step 3 switch(config-vpc-domain)# Enters the system priority that you want for the
system-priority priority specified vPC domain. The range of values is from 1
to 65535. The default value is 32667.
This example shows how to manually configure the vPC domain system priority:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# system-priority 4000
switch(config-vpc-domain)# exit
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to 1000.
Step 3 switch(config-vpc-domain)# role Enters the role priority that you want for the vPC system
priority priority priority.The range of values is from 1 to 65636, and the
default value is 32667. A lower value means that this
switch has a better chance of being the primary vPC.
This example shows how to manually configure the role priority of the vPC peer device:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# role priority 4
switch(config-vpc-domain)# exit
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to 1000.
Step 3 switch(config-vpc-domain)# track Adds the previously configured track-list object with its
track-object-id associated interfaces to the vPC domain. See the Cisco
Nexus 7000 Series NX-OS Unicast Routing Configuration
Guide for information about configuring object tracking
and track lists.
This example shows how to put the previously configured track-list object into the vPC domain on the vPC
peer device:
switch# configure terminal
Note From Cisco NX-OS Release 5.2(1), the reload restore command and procedure described in this section
is deprecated. We recommend that you use the auto-recovery command and procedure described in the
“Configuring an Autorecovery” section.
From Cisco NX-OS Release 5.0(2), you can configure the Cisco Nexus 7000 Series device to restore vPC
services when its peer fails to come online by using the reload restore command.
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to 1000.
Step 3 switch(config-vpc-domain)# reload Configures the vPC to assume its peer is not functional
restore [delay time-out] and to bring up the vPC. The default delay is 240
seconds. You can configure a time-out delay from 240
to 3600 seconds.
Use the no form of the command to reset the vPC to its
default settings.
This example shows how to set the vPC reload restore feature and save it in the switch startup configuration:
version 5.0(2)
feature vpc
Configuring an Autorecovery
From Cisco NX-OS Release 5.2(1), you can configure the Cisco Nexus 7000 Series device to restore vPC
services when its peer fails to come online by using the auto-recovery command.
Note From Cisco NX-OS Release 6.2(2) and later releases, auto recovery is enabled by default. If you want to
disable auto recovery in Release 6.2(2) or a later release, you must use the no auto-recovery command
to explicitly disable auto recovery.
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to 1000.
Step 3 switch(config-vpc-domain)# Configures the vPC to assume its peer is not functional
auto-recovery [reload-delay time] and to bring up the vPC, and specifies the time to wait
after a reload to restore the vPC. The default delay is 240
seconds. You can configure a delay from 240 to 3600
seconds.
Use the no form of the command to reset the vPC to its
default settings.
This example shows how to set the vPC autorecovery feature and save it in the switch startup configuration:
switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# vpc domain 5
switch(config-vpc-domain)# auto-recovery
Warning:
Enables restoring of vPCs in a peer-detached state after reload, will wait for 240
Note From Cisco NX-OS Release 6.2 and earlier, configure the vPC orphan-port command on all the member
ports and bundle them into the port channel. For later releases, configure the command directly on the
port-channel interfaces.
Procedure
Step 3 switch(config)# interface port-channel Selects the port channel that you want to use as the
channel-number vPC peer link for this device, and enters interface
configuration mode.
Step 4 switch(config-if)# vpc orphan-ports Configures the selected interface as a vPC orphan
suspend port to be suspended by the secondary peer in the
case of a vPC failure.
This example shows how to configure an interface as a vPC orphan port to be suspended by the secondary
peer in the case of a vPC failure:
switch# configure terminal
Note When using a non-VPC dedicated trunk link between the VPC peers, the non-VPC VLANs should have
a different global priority on the peers to prevent STP from blocking the VLANs.
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to
1000.
Step 3 switch(config-vpc-domain)# Enables the vPC switch pair to appear as a single STP
peer-switch root in the Layer 2 topology.
Use the no form of the command to disable the peer
switch vPC topology.
This example shows how to configure a pure vPC peer switch topology:
switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# vpc domain 5
switch(config-vpc-domain)# peer-switch
2010 Apr 28 14:44:44 switch %STP-2-VPC_PEERSWITCH_CONFIG_ENABLED: vPC peer-switch
configuration is enabled. Please make sure to configure spanning tree "bridge" priority as
per recommended guidelines to make vPC peer-switch operational.
switch(config-vpc-domain)# spanning-tree vlan 1 priority 8192
switch(config-vpc-domain)# exit
Note When using a non-VPC dedicated trunk link between the VPC peers, the non-VPC VLANs should have
a different pseudo root priority on the peers to prevent STP from blocking the VLANs.
Procedure
Step 5 switch(config)# vpc domain Creates a vPC domain on the device, and enters
domain-id vpc-domain configuration mode for configuration
purposes. There is no default; the range is from 1 to
1000.
Step 6 switch(config-vpc-domain)# Enables the vPC switch pair to appear as a single STP
peer-switch root in the Layer 2 topology.
Use the no form of the command to disable the peer
switch vPC topology.
This example shows how to configure a hybrid vPC peer switch topology:
switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# spanning-tree pseudo-information
switch(config-pseudo)# vlan 1 designated priority 8192
switch(config-pseudo)# vlan 1 root priority 4096
switch(config-pseudo)# vpc domain 5
switch(config-vpc-domain)# peer-switch
switch(config-vpc-domain)# exit
Procedure
Step 2 switch(config)# vpc domain Creates a vPC domain on the device, and enters vpc-domain
domain-id configuration mode for configuration purposes. There is no
default; the range is from 1 to 1000.
Step 5 switch(config-vpc-domain)# vpc (Optional) Triggers the merging of configuration with the
config-sync re-emerge [ sync { peer switch if the current merge has failed.
export|import}] Note You can use the sync export option to apply the
local switch configuration to the peer switch. You
can use the sync import option to apply the remote
switch configuration to the local switch.
Step 6 switch(config-vpc-domain)# vpc (Optional) Triggers the merging of interface port-channel
config-sync re-emerge interface configuration with the peer switch if the current merge has
port-channel channel-name [ sync failed.
{ export|import}] Note You can use the sync export option to apply the
local interface port-channel channel-number
command configuration with the peer switch. You
can use the sync import option to apply the remote
interface port-channel channel-number command
configuration to the local switch.
Step 7 switch(config-vpc-domain)# vpc (Optional) Triggers the merging of interface ethernet with
config-sync re-emerge interface the peer switch if the current merge has failed.
type slot/port[ sync { Note You can use the sync export option to apply the
export|import}] local interface ethernet slot/port command
configuration with the peer switch. You can use the
sync import option to apply the remote interface
ethernet slot/port command configuration to the
local switch.
Step 8 switch(config-vpc-domain)# exit Exits vPC domain configuration mode.
Step 10 switch(config)# show vpc Displays the status of the configuration merge with the peer
config-sync merge status switch.
Procedure
Step 2 switch(config)# interface ethernet Specifies an Ethernet interface and enters interface
slot/port-list configuration mode.
The range is from 1 to 253 for the slot and from 1 to 128
for the port.
Step 4 switch(config-if)# switchport mode Specifies the trunking VLAN interface in Layer 2.
trunk A trunk port can carry traffic in one or more VLANs
(based on the trunk allowed VLAN list configuration)
on the same physical link.
Step 5 switch(config-if)# switchport trunk Configures a list of allowed VLANs on the trunking
allowed vlan vlan-list interface.
Step 6 switch(config-if)# spanning-tree Configures the interface that connects to a Layer 2 switch
port type network as a network spanning tree port.
Step 7 switch(config-if)# vpc number Moves port channels into a vPC and enters interface vPC
configuration mode.
The range of the number argument is from 1 to 4096.
Step 8 switch(config-if-vpc)# lapc mode Enables LAPC on the peer link member interfaces on
active which you configured the channel group mode active
command.
These examples show how to configure a physical port vPC in an Ethernet VDC:
switch-eth(config)# feature vpc
switch-eth(config)# interface port-channel 1
switch-eth(config-if)# switchport
switch-eth(config-if)# switchport mode trunk
switch-eth(config-if)# switchport trunk allowed vlan 10-20
switch-eth(config-if)# spanning-tree port type network
switch-eth(config-if)# vpc peer-link
switch-eth(config)# interface Ethernet3/21
switch-eth(config-if)# switchport
switch-eth(config-if)# switchport mode trunk
switch-eth(config-if)# switchport trunk allowed vlan 10-20
switch-eth(config-if)# channel group 1 mode active
switch-eth(config-if)# no shutdown
switch-eth(config)# interface Ethernet3/1
switch-eth(config-if)# switchport
switch-eth(config-if)# switchport mode trunk
switch-eth(config-if)# switchport trunk allowed vlan 10-20
switch-eth(config-if)# vpc 10
switch-eth(config-if-vpc)# lacp mode active
switch-eth(config-if-vpc)# no shutdown
These examples show how to configure a physical port vPC in the peer VDC:
switch-eth(config)# feature vpc
switch-eth(config)# interface port-channel 1
switch-eth(config-if)# switchport
switch-eth(config-if)# switchport mode trunk
switch-eth(config-if)# switchport trunk allowed vlan 10-20
switch-eth(config-if)# spanning-tree port type network
switch-eth(config-if)# vpc peer-link
switch-eth(config)# interface Ethernet4/21
switch-eth(config-if)# switchport
switch-eth(config-if)# switchport mode trunk
switch-eth(config-if)# switchport trunk allowed vlan 10-20
switch-eth(config-if)# channel group 1 mode active
switch-eth(config-if)# no shutdown
switch-eth(config)# interface Ethernet4/1
switch-eth(config-if)# switchport
switch-eth(config-if)# switchport mode trunk
switch-eth(config-if)# switchport trunk allowed vlan 10-20
switch-eth(config-if)# vpc 10
switch-eth(config-if-vpc)# lacp mode active
switch-eth(config-if-vpc)# no shutdown
Procedure
! The following is an output from the show vpc role command after the
vPC hitless feature is configured !
Note • Traffic outage might occur on orphan ports when a vPC peer is isolated.
• Multicast receivers behind the vPC might experience traffic outages.
• Ensure that there are alternate paths from core routes to each vPC peer.
• Ensure that the new line card module has the same slot ID and number as the old line card module.
Procedure
Step 1 Perform an ISSU upgrade to a supported Cisco NX-OS release version for a new line card module on both
the switches. Perform this task one at a time on both the switches. For information on supported release version
for a line card module type, see the Cisco Nexus 7000 Series NX-OS Release Notes document. For information
on how to perform an ISSU upgrade, see the Cisco Nexus 7000 Series NX-OS Software Upgrade and
Downgrade Guide.
Step 2 On both the switches, move the peer-keepalive link out of the existing module, and use the management
interface for the peer-keepalive link.
Example:
switch# configure terminal
switch(config)# vpc domain <domain-id>
switch(config-vpc-domain)# peer-keepalive destination <peer-switch management-ip>
Step 3 Enable the hidden commands on both the switches, one at a time.
Example:
switch# configure terminal
switch(config)# vpc domain <domain-id>
switch(config-vpc-domain)# bypass module-check
Step 4 Copy the running configuration to the startup configuration on both the switches.
Example:
switch# copy running-config startup-config vdc-all
Step 5 On the secondary switch (Switch B), shut down the vPC legs. Perform this action in batches and wait until
all the traffic is converged. All traffic is now on the primary switch (Switch A).
Example:
switch(config)# interface port-channel <channel-number>
switch(config-if)# shutdown
Step 6 On the secondary switch (Switch B), shut down all the ports going to core devices. Perform this action in
batches and wait until all the traffic is converged.
Step 7 On the secondary switch (Switch B), shut down the vPC peer link.
Step 8 On the secondary switch (Switch B), save the running configuration to a file on bootflash.
Example:
switch# copy running-config bootflash:run-cfg-SwitchB.txt vdc-all
Step 9 On the secondary switch (Switch B), edit the saved configuration file to change the Virtual Device Context
(VDC) type from an existing module to a new module.
For more information on Cisco NX-OS release support for a module type, see the Cisco Nexus 7000 Series
NX-OS Release Notes document.
This example shows that the VDC type has changed from an existing module (F2 or F2e) to a new module
(F3):
Edit { vdc <xyx>
limit-resource module-type “f3” }
Step 10 On the secondary switch (Switch B), replace the old line card with the new line card module.
Step 11 On the secondary switch (Switch B), reconnect the vPC leg ports to the new module. Ensure that all the ports
have the same number as the old line card module.
Step 12 On the secondary switch (Switch B), reconfigure the respective ports on the new module using the saved
configuration file on bootflash. Ensure that vPC leg ports are in shut state.
Example:
switch# copy bootflash:run-cfg-SwitchB.txt running-config
Step 13 On the secondary switch, copy the running configuration to the startup configuration on the admin VDC.
Example:
switch# copy running-config startup-config vdc-all
Step 14 On the secondary switch (Switch B), bring up the vPC peer link. Ensure that the vPC peer link speed is the
same on both the switches.
Ensure that vPC is up and Switch A is the primary switch and Switch B is the secondary switch.
Step 15 On the secondary switch (Switch B), bring up the vPC leg ports. Perform this task in batches and wait for all
the traffic to converge.
Step 16 On the secondary switch (Switch B), bring up all the ports going to the core device. Perform this task in
batches and wait for all the traffic to converge.
Step 17 On the secondary switch (Switch B), clear all the dynamic MAC entries from the MAC address table.
Example:
switch# clear mac address-table dynamic
switch# test l2fm dump smac
Migration to the new module on the secondary switch is completed.
Step 18 On the primary switch (Switch A), shut down the vPC legs. Perform this action in batches and wait until all
the traffic is converged.
Example:
switch(config)# interface port-channel <channel-number>
switch(config-if)# shutdown
All the traffic is now on the secondary switch (Switch B).
Step 19 On the secondary switch (Switch B), change the vPC role priority to match the primary switch.
Example:
switch(config)# vpc-domain <domain-id>
switch(config-vpc-domain)# role priority <priority-id>
Step 20 On the primary switch (Switch A), shut down all the ports going to the core devices. Perform this action in
batches and wait until all the traffic is converged. All traffic is now on the secondary switch (Switch B).
Step 21 On the primary switch (Switch A), reconfigure the vPC peer-keepalive link by configuring a dummy IP
address.
Example:
switch# configure terminal
switch(config-if)# vpc domain <domain-id>
switch(config-if)# peer-keepalive destination <dummy-ip>
Step 22 On the primary switch (Switch A), shut down the vPC peer link.
vPC role change takes place without any disruption because of the sticky bit feature on the Switch B.
Example:
switch# copy running-config bootflash:run-cfg-SwitchA.txt vdc-all
Step 24 Edit the saved configuration file to change the VDC type from the existing module to the new module.
For information on Cisco NX-OS release support for a module type, see the Cisco Nexus 7000 Series NX-OS
Release Notes document.
Example:
This example shows that the VDC type is changed from F2 to F3 module.
Edit { vdc <xyx>
limit-resource module-type “f3” }
Step 25 On the primary switch (Switch A), replace the old line card with the new line card module.
Step 26 On the primary switch (Switch A), reconnect the vPC leg ports to the new module. Ensure that all the ports
have the same number as the old line card module.
Step 27 On the primary switch (Switch A), reconfigure the respective ports on the new module using the saved
configuration file on bootflash.
Example:
switch# copy bootflash:run-cfg-SwitchA.txt running-config
Note Ensure that all the vPC leg ports are in shut
state.
Step 28 On the primary switch (Switch A), copy the running configuration to the startup configuration on the Admin
virtual device context (VDC).
Example:
switch# copy running-config startup-config vdc-all
Step 29 On the primary switch (Switch A), bring up the vPC peer-keepalive link by configuring the peer-keepalive
destination address back to the management IP of Switch B.
Example:
switch# configure terminal
switch(config-if)# vpc domain <domain-id>
switch(config-if)# peer-keepalive destination <management-ip peer-device
Step 30 On the primary switch (Switch A), bring up the vPC peer link.
Note Ensure that the vPC peer-link speed configuration is same on both the switches.
All the traffic is on the secondary switch (Switch B).
Step 31 On the primary switch (Switch A), bring up the vPC leg ports. Perform this task in batches and wait for all
the traffic to converge.
All the traffic is load balanced on both the switches.
Step 32 On the primary switch (Switch A), bring up all the ports going to the core device. Perform this task in batches
and wait for all the traffic to converge.
Step 33 Disable the hidden commands on both the switches. Perform this step one at a time on both the switches.
Example:
switch# configure terminal
switch(config)# vpc-domain <domain-id>
switch(config-vpc-domain)# no bypass module-check
Step 34 On both the switches, reconfigure the peer-keepalive link on the new card modules.
Step 35 Copy the running configuration to the startup configuration on the Admin VDC on both the switches.
Example:
switch# copy running-config startup-config vdc-all
Step 36 On the primary switch (Switch A), clear all the dynamic MAC entries from the MAC address table.
Example:
switch# clear mac address-table dynamic
switch# test l2fm dump smac
Step 37 On the secondary switch (Switch B), run the test l2fm dump smac command to view any errors.
Example:
switch# test l2fm dump smac
Migration to the new module on the primary switch is completed.
Migration from existing line card module to a new module is completed on both the switches.
Before you plan to upgrade a line card module, refer the Cisco Nexus 7000 Series NX-OS Release Notes
document, to see the supported Cisco NX-OS release version for a line card module.
Note Traffic outage might occur on orphan ports when a vPC peer is isolated. Multicast receivers behind the
vPC might experience traffic outages (30 to 40 seconds).
Procedure
Step 1 Set equal vPC role priority on both the vPC peer devices.
Example:
switch# configure terminal
switch(config)# vpc domain <domain-id>
switch(config-vpc-domain)# role priority <priority-id>
Step 2 Set the auto-recovery reload-delay value, in seconds, to maximum delay time on both the switches.
Example:
switch(config-vpc-domain)# auto-recovery reload-delay 84600
Step 3 Change the system boot parameters to boot the system from the Cisco NX-OS release verison that is supported
on the new module on both the switches.
Example:
This example shows that the Cisco NX-OS 6.2(16) image is used for the Cisco Nexus F3 module:
switch(config)# no boot kickstart
switch(config)# no boot system
switch(config)# boot kickstart bootflash://n7000-s2-kickstart.6.2.16.bin
switch(config)# boot system bootflash://n7000-s2-dk9.6.2.16.bin
For information on the supported release version for a module type, see the Cisco Nexus 7000 Series NX-OS
Release Notes document.
Step 4 On the secondary switch (Switch B), shut down the vPC legs. Perform this action in batches and wait until
all the traffic is converged.
Example:
switch(config)# interface port-channel <channel-number>
switch(config-if)# shutdown
All the traffic is now on the primary switch (Switch A).
Step 5 On the secondary switch (Switch B), copy the running configuration to the start up configuration for an Admin
VDC.
Example:
switch# copy running-config startup-config vdc-all
Step 6 On the secondary switch (Switch B), reboot the system with the new Cisco NX-OS image. Wait for the system
to boot up and for the Layer 3 links to come up.
Example:
switch# reload
Step 7 On the secondary switch (Switch B), bring the vPC legs up again. Perform this action in batches and wait
until all the traffic is converged.
Example:
switch(config)# interface port-channel <channel-number>
switch(config-if)# no shutdown
Step 8 On the primary switch (Switch A), shut down the vPC legs. Perform this action in batches and wait until all
the traffic is converged.
Example:
switch(config)# interface port-channel <channel-number>
switch(config-if)# shutdown
Step 9 On the primary switch (Switch A), copy the running configuration to the start up configuration for an Admin
VDC.
Example:
switch# copy running-config startup-config vdc-all
Step 10 On the primary switch (Switch A), reboot the system with the new Cisco NX-OS image. Wait for the system
to boot up and for the Layer 3 links to come up.
Example:
switch# reload
Step 11 On the primary switch (Switch A), bring the vPC legs up again. Perform this action in batches and wait until
all the traffic is converged.
Example:
switch(config)# interface port-channel <channel-number>
switch(config-if)# no shutdown
Traffic is load balanced between the primary switch (Switch A) and the secondary switch (Switch B).
Switch B takes on the role of the operational primary, and Switch A takes on the role of the operational
secondary.
Installing a Line Card Module on a vPC Peer Using the Reload Method
Before You Begin
• Ensure that you have installed a compatible Cisco NX-OS release version on the vPC peers. For more
information, on how to install a Cisco NX-OS release version using the reload method, see Installing a
Cisco Image on vPC Peers, on page 275. For more information on the compatible Cisco NX-OS release
version for a line card module type, refer to the Cisco Nexus 7000 Series NX-OS Release Notes document.
• Ensure that the new line card module has the same slot ID and number as the old line card module.
Note In this task, Switch A is the operational secondary, and Switch B is the operational primary switch.
Procedure
Example:
switch(config)# vpc-domain <domain-id>
switch(config-vpc-domain)# role priority <priority-id>
Step 2 Set the auto-recovery reload-delay value , in seconds, to maximum delay time on both the switches.
Example:
switch(config-vpc-domain)# auto-recovery reload-delay 86400
Step 3 Enable the hidden commands on both the switches, one at a time.
Example:
switch# configure terminal
switch(config)# vpc domain <domain-id>
switch(config-vpc-domain)# bypass module-check
Step 4 Copy the running configuration to the startup configuration on the Admin VDC on both the switches.
Example:
switch# copy running-config startup-config vdc-all
Step 5 On the operational secondary (Switch A) switch, shut down the vPC legs. Perform this action in batches and
wait until all the traffic is converged.
Example:
switch(config)# interface port-channel <channel-number>
switch(config-if)# shutdown
All the traffic is on Switch B.
Step 6 Save the running configuration to a file on bootflash and transfer the configuration file outside the switch
(Switch A).
Example:
switch# copy running-config bootflash:run-cfg-SwitchA.txt vdc-all
switch# copy bootflash:run-cfg-SwitchA.txt tftp://server/run-cfg-SwitchA.txt vrf management
Step 7 On the operational secondary switch, edit the saved configuration file to change the VDC type from an existing
module to a new module. Copy the configuration file back to the switch (Switch A).
Example:
This example show that the VDC type is changed from F2 to F3 module:
Edit { vdc <xyx>
limit-resource module-type “f3” }
For information on the Cisco NX-OS release support for a module type, see the Cisco Nexus 7000 Series
NX-OS Release Notes document.
Step 8 Power off the operational secondary switch (Switch A) and physically replace the existing module with the
new module on the switch.
Step 9 Power on the switch (Switch A) and wait for the system to go online.
Ensure that the Admin VDC is active. On the Admin VDC, reconfigure the new module ports using the saved
configuration file. Ensure that all the ports have the same number as the old line card module.
Ensure that all the vPC leg ports are in shut state, and the vPC peer link and the Layer 3 links are up.
Example:
switch# copy bootflash:run-cfg-SwitchA.txt running-config
Step 10 Bring up the vPC legs on the operational secondary (Switch A). Perform this task in batches and wait for all
the traffic to converge.
Example:
switch# interface port-channel <channel-number>
Switch# no shutdown
Step 11 On the operational primary (Switch B) switch, shut down the vPC legs. Perform this action in batches and
wait until all the traffic is converged.
Example:
switch(config)# interface port-channel <channel-number>
switch(config-if)# shutdown
All the traffic is on Switch A.
Step 12 Save the running configuration to a file on bootflash and transfer the configuration file outside the switch
(Switch B).
Example:
switch# copy running-config bootflash:run-cfg-SwitchB.txt vdc-all
switch# copy bootflash:run-cfg-SwitchA.txt tftp://server/run-cfg-SwitchB.txt vrf management
Step 13 On the operational primary switch (Switch B), edit the saved configuration file to change the VDC type from
an existing module to a new module. Copy the configuration file back to the switch (Switch B).
Example:
This example shows that the VDC type is changed from F2 to F3 module:
Edit { vdc <xyx>
limit-resource module-type “f3” }
For information on the Cisco NX-OS release support for a module type, see the Cisco Nexus 7000 Series
NX-OS Release Notes document.
Step 14 Power off the operational primary switch (Switch B) and physically replace the existing module with the new
module on the switch.
Step 15 Power on the switch (Switch B) and wait for the system to go online.
Note Ensure that the Admin VDC is active. On the Admin VDC, reconfigure the new module ports using
the saved configuration file. Ensure that all the ports have the same number as the old line card
module.
Ensure that all the vPC leg ports are in shut state, and the vPC peer link and the Layer 3 links are up.
Example:
switch# copy bootflash:run-cfg-SwitchB.txt running-config
Step 16 Bring up the vPC legs on the operational primary (Switch B). Perform this task in batches and wait for all the
traffic to converge.
Switch A resumes the role of a primary switch and Switch B takes on the role of a secondary switch. Traffic
is load balanced between both the switches.
Example:
switch# interface port-channel <channel-number>
Switch# no shutdown
Step 17 Disable the hidden commands on both the switches. Perform this step one at a time on both the switches.
Example:
switch# configure terminal
switch(config)# vpc-domain <domain-id>
switch(config-vpc-domain)# no bypass module-check
Step 18 Copy the running configuration to the startup configuration on the Admin VDC on both the switches.
Example:
switch# copy running-config startup-config vdc-all
Migration from existing line card module to a new module is completed on both the switches.
Command Purpose
show feature Displays whether the vPC is enabled or not.
Command Purpose
show vpc brief Displays brief information about the vPCs.
show vpc consistency-parameters Displays the status of those parameters that must be
consistent across all vPC interfaces.
show port-channel capacity Displays how many port channels are configured and
how many are still available on the device.
show vpc role Displays the peer status, the role of the local device,
the vPC system MAC address and system priority,
and the MAC address and priority for the local vPC
device.
For detailed information about the fields in the output from these commands, see the Cisco Nexus 7000 Series
NX-OS Interfaces Command Reference.
Table 46: Verifying Physical Port vPC on F2, F3, and FEX
Command Purpose
show vpc brief Displays brief information about the vPCs.
show lacp port-vpc summary Displays the LACP status for the physical
port VPC, such as the vPC ID, physical
port, and the LACP port state details.
show lacp counters interface name number Displays the LACP counters on a physical
interface or port-channel interface
depending on the interface name.
Command Purpose
show lacp neighbor Displays LACP neighbor information for
the port.
show lacp neighbor interface name number Displays the neighbors of ports that are
configured on a physical interface.
This example shows how to verify brief information about the vPCs:
switch# show vpc brief
vPC status
-----------------------------------------------------------------------------------
id Port Status Consistency Reason Active vlans
-----------------------------------------------------------------------------------
1 Ethernet1/1 up success - - - - 200-250, 900-1000
This example shows how to verify LACP status for the physcial port VPC, such as the vPC ID, physical port,
and the LACP port state details:
switch# show lacp port-vpc summary
Flags: D – Down P – up
s - Suspended H – Hot-standby (LACP only)
port-channel2
Ethernet2/2 1677 1808 0 0 0 0 0
This example shows how to verify the LACP counters on a physical interface:
switch# show lacp counters interface ethernet 1/1
This example shows how to verify the neighbors of ports that are configured both as a vPC and as a port-channel
member:
switch# show lacp neighbor
Partner's information
Partner Partner Partner
Port System ID Port Number Age Flags
Eth1/1 32768,2-0-0-0-0-66 0x2402 41595 SA
This example shows how to verify the neighbors of ports that are configured on the physical interface:
switch# show lacp neighbor interface ethernet 1/1
Monitoring vPCs
Use the show vpc statistics command to display vPC statistics.
Note This command displays the vPC statistics only for the vPC peer device that you are working on.
switch(config)# interface ethernet 7/1, ethernet 7/3, ethernet 7/5. ethernet 7/7
switch(config-if)# shutdown
switch(config-if)# exit
switch(config)# interface ethernet 7/1
switch(config-if)# rate-mode dedicated
switch(config-if)# no shutdown
switch(config-if)# exit
switch(config)#
3 (Optional) Configure the second, redundant interface that you want to be a peer link in the dedicated port
mode:
switch(config)# interface ethernet 7/2, ethernet 7/4, ethernet 7/6. ethernet 7/8
switch(config-if)# shutdown
switch(config-if)# exit
switch(config)# interface ethernet 7/2
switch(config-if)# rate-mode dedicated
switch(config-if)# no shutdown
switch(config-if)# exit
switch(config)#
4 Configure the two interfaces (for redundancy) that you want to be in the peer link to be an active Layer 2
LACP port channel.:
Note If you configure the port channel first, ensure that it is a Layer 2 port channel.
Related Documents
Table 47: Related Documents
Related Topic
Cisco Nexus 7000 Series NX-OS Interfaces Command Reference
Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide
Cisco Nexus 2000 Series NX-OS Fabric Extender Software Configuration Guide for Cisco Nexus 7000
Series Switches, Release 6.x
Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide
VLANs, MAC address tables, private VLANs, and the Spanning Tree Protocol.
Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide
Standards
Table 48: Standards
Standards Title
IEEE 802.3ad —
MIBs
Table 49: MIBs
Note When the Breakout feature is configured, the configuration for the corresponding interface is removed.
The Breakout feature is supported in the following modules:
• Cisco Nexus 7000 F3-Series 12-Port 40 Gigabit Ethernet Module
• Cisco Nexus 7000 M2-Series 6-Port 40 Gigabit Ethernet Module
• Cisco Nexus 7700 F3-Series 24-Port 40 Gigabit Ethernet Module
Starting with Cisco NX-OS Release 8.0(1), the Breakout feature is supported in the following modules::
• Cisco Nexus 7000 M3-Series 24-port 40-Gigabit Ethernet Module
• Cisco Nexus 7700 M3-Series 24-port 40-Gigabit Ethernet Module
• In a Cisco Nexus 7700 M3-Series 24-port 40-Gigabit Ethernet Module, you can break out any 23 ports
of the available 24 ports.
Procedure
Step 2 switch(config)# interface breakout Configures the Breakout feature for a port.
module slot port port-range map
10g-4x • slot—Slot number of port depending on the
chassis model.
• port-range—Single port or range of ports on
which breakout is configured.
This example shows how to break out a 40 Gigabit Ethernet port into four 10 Gigabit Ethernet ports:
switch# configure terminal
switch(configure)# interface breakout module 1 port 1-12 map 10g-4x
switch(configure)# copy running-config startup-config
Procedure
This example shows how to remove the breakout configuration in a port and return to the 40 Gigabit Ethernet
mode of operation:
switch# configure terminal
switch(configure)# no interface breakout module 1 port 1-12 map 10g-4x
switch(configure)# copy running-config startup-config
Procedure
Support for tunnel and its 6.1(1) This feature was introduced.
transport in different VRFs
IP Tunnel Overview
IP tunnels consists of the following three main components:
• Passenger protocol—The protocol that needs to be encapsulated. IPv4 is an example of a passenger
protocol.
• Carrier protocol—The protocol that is used to encapsulate the passenger protocol. Cisco NX-OS supports
GRE as a carrier protocol.
• Transport protocol—The protocol that is used to carry the encapsulated protocol. IPv4 is an example of
a transport protocol.
An IP tunnel takes a passenger protocol, such as IPv4, and encapsulates that protocol within a carrier protocol,
such as GRE. The device then transmits this carrier protocol over a transport protocol, such as IPv4.
You configure a tunnel interface with matching characteristics on each end of the tunnel.
For more information, see the “Configuring IP Tunnels” section.
You must enable the tunnel feature before you can see configure it. From Cisco NX-OS Release 4.2, the
system automatically takes a checkpoint prior to disabling the feature, and you can roll back to this checkpoint.
See the Cisco Nexus 7000 Series NX-OS System Management Configuration Guide for information about
rollbacks and checkpoints.
GRE Tunnels
Note From Cisco NX-OS Release 5.1(1), the software supports multicasting over GRE tunnels.
You can use generic routing encapsulation (GRE) as the carrier protocol for a variety of passenger protocols.
The figure below shows the IP tunnel components for a GRE tunnel. The original passenger protocol packet
becomes the GRE payload and the device adds a GRE header to the packet. The device then adds the transport
protocol header to the packet and transmits it.
Note PMTUD on a tunnel interface requires that the tunnel endpoint can receive ICMP messages generated by
devices in the path of the tunnel. Check that ICMP messages can be received before using PMTUD over
firewall connections. Cisco NX-OS software disables ICMP unreachable messages by default. ICMP
unreachable messages can be enabled in the Cisco NX-OS software using the ip unreachables interface
command.
Virtualization Support
From Cisco NX-OS Release 4.2, you can configure tunnels in a nondefault VDC and a nondefault VRF. A
tunnel configured in one VDC is isolated from a tunnel with the same number configured in another VDC.
For example, Tunnel 0 in VDC 1 is independent of tunnel 0 in VDC 2.
Before Cisco NX-OS Release 6.1(1), a tunnel interface and tunnel transport should be in the same VRF. See
the Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide for information about
VDCs and see the Cisco Nexus 7000 Series NX-OS Unicast Routing Configuration Guide for information
about VRFs.
High Availability
IP tunnels support stateful restarts. A stateful restart occurs on a supervisor switchover. After the switchover,
Cisco NX-OS applies the runtime configuration after the switchover.
• Tunnel features are supported only on M series and F3 series modules on Cisco Nexus 7000 Series and
Cisco Nexus 7700 Series platforms.
• Cisco NX-OS does not support GRE tunnel keepalives.
Parameter Default
Path MTU discovery age timer 10 minutes
Configuring IP Tunnels
Enabling Tunneling
Before You Begin
You must enable the tunneling feature before you can configure any IP tunnels.
Procedure
Step 2 switch(config)# feature tunnel Allows the creation of a new tunnel interface.
To disable the tunnel interface feature, use the no form
of this command.
Procedure
Step 3 switch(config-if)# tunnel source {ip-address Configures the source address for this IP
| interface-name} tunnel.
Step 4 switch(config-if)# tunnel destination Configures the destination address for this IP
{ip-address | host-name} tunnel.
Step 5 switch(config-if)# tunnel use-vrf vrf-name Uses the configured VRF to look up the tunnel
IP destination address.
Use the no interface tunnel command to remove the tunnel interface and all associated configuration.
Table 52: Removing the Tunnel Interface and its Associated Configuration
Command Purpose
no interface tunnel number Deletes the tunnel interface and the associated
configuration.
You can configure the following optional parameters to tune the tunnel in interface configuration mode:
Command Purpose
description string Configures a description for the tunnel.
Command Purpose
mtu value Sets the MTU of IP packets sent on an interface.
tunnel ttl value Sets the tunnel time-to-live value. The range is from
1 to 255.
Procedure
Step 3 switch(config-if)# tunnel mode gre ip Sets this tunnel mode to GRE.
Command Purpose
tunnel path-mtu-discovery [age-timer min] Enables Path MTU Discovery (PMTUD) on a tunnel
[min-mtu bytes] interface. The parameters are as follows:
• mins—Number of minutes. The range is from
10 to 30. The default is 10.
• mtu-bytes—Minimum MTU recognized. The
range is from 92 to 65535. The default is 92.
Procedure
Command Purpose
show interface tunnel number Displays the configuration for the tunnel interface
(MTU, protocol, transport, and VRF). Displays input
and output packets, bytes, and packet rates.
show interface brief | include Tunnel Displays the operational status, IP address,
encapsulation type, and MTU of the tunnel interface.
show interface tunnel number description Displays the configured description of the tunnel
interface.
show interface tunnel number status Displays the operational status of the tunnel interface.
show interface tunnel number status err-disabled Displays the error disabled status of the tunnel
interface.
Related Documents
Table 55: Related Documents
Related Topic
Cisco Nexus 7000 Series NX-OS Interfaces Command Reference
Cisco Nexus 7000 Series NX-OS High Availability and Redundancy Guide
Cisco Nexus 2000 Series NX-OS Fabric Extender Software Configuration Guide for Cisco Nexus 7000
Series Switches, Release 6.x
Cisco Nexus 7000 Series NX-OS Virtual Device Context Configuration Guide
VLANs, MAC address tables, private VLANs, and the Spanning Tree Protocol.
Cisco Nexus 7000 Series NX-OS Layer 2 Switching Configuration Guide
Table 56: Feature History for Q-in-Q Tunnels and Layer 2 Protocol tunneling
• You should enter the vlan dot1Q tag native command to maintain the tagging on the native VLAN and
drop untagged traffic. This command prevents native VLAN misconfigurations.
• You must manually configure the 802.1Q interfaces to be edge ports.
• Dot1x tunneling is not supported.
• You should perform an EPLD upgrade to newer versions in order for EtherType configuration to take
effect on some Cisco Nexus devices.
• You cannot configure Layer 2 protocol features to forward STP BPDU or CDP packets across the tunnel.
Q-in-Q Tunneling
Business customers of service providers often have specific requirements for VLAN IDs and the number of
VLANs to be supported. The VLAN ranges required by different customers in the same service-provider
network might overlap, and the traffic of customers through the infrastructure might be mixed. Assigning a
unique range of VLAN IDs to each customer would restrict customer configurations and could easily exceed
the VLAN limit of 4096 of the 802.1Q specification.
Note Q-in-Q is supported on port channels and virtual port channels (vPCs). To configure a port channel as an
asymmetrical link, all ports in the port channel must have the same tunneling configuration.
Using the 802.1Q tunneling feature, service providers can use a single VLAN to support customers who have
multiple VLANs. Customer VLAN IDs are preserved and the traffic from different customers is segregated
within the service-provider infrastructure even when they appear to be on the same VLAN. The 802.1Q
tunneling expands the VLAN space by using a VLAN-in-VLAN hierarchy and tagging the tagged packets.
A port configured to support 802.1Q tunneling is called a tunnel port. When you configure tunneling, you
assign a tunnel port to a VLAN that is dedicated to tunneling. Each customer requires a separate VLAN, but
that VLAN supports all of the customer’s VLANs.
Customer traffic that is tagged in the normal way with appropriate VLAN IDs come from an 802.1Q trunk
port on the customer device and into a tunnel port on the service-provider edge switch. The link between the
customer device and the edge switch is an asymmetric link because one end is configured as an 802.1Q trunk
port and the other end is configured as a tunnel port. You assign the tunnel port interface to an access VLAN
ID that is unique to each customer. See the figure below.
Note Selective Q-in-Q tunneling is not supported. All frames that enter the tunnel port are subject to Q-in-Q
tagging.
Packets that enter the tunnel port on the service-provider edge switch, which are already 802.1Q-tagged with
the appropriate VLAN IDs, are encapsulated with another layer of an 802.1Q tag that contains a VLAN ID
that is unique to the customer. The original 802.1Q tag from the customer is preserved in the encapsulated
packet. Therefore, packets that enter the service-provider infrastructure are double-tagged.
The outer tag contains the customer’s access VLAN ID (as assigned by the service provider), and the inner
VLAN ID is the VLAN of the incoming traffic (as assigned by the customer). This double tagging is called
tag stacking, Double-Q, or Q-in-Q as shown in the figure below.
By using this method, the VLAN ID space of the outer tag is independent of the VLAN ID space of the inner
tag. A single outer VLAN ID can represent the entire VLAN ID space for an individual customer. This
technique allows the customer’s Layer 2 network to extend across the service provider network, potentially
creating a virtual LAN infrastructure over multiple sites.
from the tunnel port. The packet carries only the VLAN 30 tag through the service-provider network to the
trunk port of the egress-edge switch (Switch C) and is misdirected through the egress switch tunnel port to
Customer Y.
Note The vlan dot1q tag native command is a global command that affects the tagging
behavior on all trunk ports.
• Ensure that the native VLAN ID on the edge switch trunk port is not within the customer VLAN range.
For example, if the trunk port carries traffic of VLANs 100 to 200, assign the native VLAN a number
outside that range.
remote sites across the service-provider infrastructure. The Cisco Discovery Protocol (CDP) must be able to
discover neighboring Cisco devices from local and remote sites, and the VLAN Trunking Protocol (VTP)
must provide consistent VLAN configuration throughout all sites in the customer network.
When protocol tunneling is enabled, edge switches on the inbound side of the service-provider infrastructure
encapsulate Layer 2 protocol packets with a special MAC address and send them across the service-provider
network. Core switches in the network do not process these packets, but forward them as normal packets.
Bridge protocol data units (BPDUs) for CDP, STP, or VTP cross the service-provider infrastructure and are
delivered to customer switches on the outbound side of the service-provider network. Identical packets are
received by all customer ports on the same VLANs.
If protocol tunneling is not enabled on 802.1Q tunneling ports, remote switches at the receiving end of the
service-provider network do not receive the BPDUs and cannot properly run STP, CDP, 802.1X, and VTP.
When protocol tunneling is enabled, Layer 2 protocols within each customer’s network are totally separate
from those running within the service-provider network. Customer switches on different sites that send traffic
through the service- provider network with 802.1Q tunneling achieve complete knowledge of the customer’s
VLAN.
Note Layer 2 protocol tunneling works by tunneling BPDUs in the software. A large number of BPDUs that
come into the supervisor will cause the CPU load to go up. You might need to make use of hardware rate
limiters to reduce the load on the supervisor CPU. See the “Configuring the Rate Limit for Layer 2 Protocol
Tunnel Ports” section.
For example, in the figure below, Customer X has four switches in the same VLAN that are connected through
the service-provider network. If the network does not tunnel BPDUs, switches on the far ends of the network
cannot properly run the STP, CDP, 802.1X, and VTP protocols.
In the preceding example, STP for a VLAN on a switch in Customer X, Site 1 will build a spanning tree on
the switches at that site without considering convergence parameters based on Customer X’s switch in Site
2.
The figure below shows the resulting topology on the customer’s network when BPDU tunneling is not enabled.
Note You must set the 802.1Q tunnel port to an edge port with the spanning-tree port type edge command.
The VLAN membership of the port is changed using the switchport access vlan vlan-id command.
You should disable IGMP snooping on the access VLAN allocated for the dot1q-tunnel port to allow
multicast packets to traverse the Q-in-Q tunnel.
Procedure
Step 2 switch(config)# interface ethernet Specifies an interface to configure, and enters interface
slot/port configuration mode.
Step 4 switch(config-if)# switchport Creates a 802.1Q tunnel on the port. The port will go down
mode dot1q-tunnel and reinitialize (port flap) when the interface mode is
Note You must set the EtherType only on the egress trunk interface that carries double tagged frames (the trunk
interface that connects the service providers). If you change the EtherType on one side of the trunk, you
must set the same value on the other end of the trunk (symmetrical configuration).
Caution The EtherType value you set affect all the tagged packets that go out on the interface (not just Q-in-Q
packets).
Procedure
Step 2 switch(config)# interface ethernet Specifies an interface to configure, and enters interface
slot/port configuration mode.
Step 4 switch(config-if)# switchport dot1q Sets the EtherType for the Q-in-Q tunnel on the port.
ethertype value
Step 5 switch(config-if)# no switchport (Optional)
dot1q ethertype Resets the EtherType on the port to the default value of
0x8100.
Procedure
Step 2 switch(config)# interface ethernet Specifies an interface to configure, and enters interface
slot/port configuration mode.
Step 4 switch(config-if)# switchport mode Creates a 802.1Q tunnel on the port. The port will go down
dot1q-tunnel and reinitialize (port flap) when the interface mode is
changed. BPDU filtering is enabled and CDP is disabled
on tunnel interfaces.
Step 5 switch(config-if)# l2protocol Enables Layer 2 protocol tunneling. Optionally, you can
tunnel [cdp | stp | vtp] enable CDP, STP, or VTP tunneling.
This example shows how to enable protocol tunneling on an 802.1Q tunnel port:
switch# configure terminal
switch(config)# interface ethernet 7/1
switch(config-if)# switchport
switch(config-if)# switchport mode dot1q-tunnel
switch(config-if)# l2protocol tunnel stp
switch(config-if)# exit
switch(config)# exit
Procedure
Step 2 switch(config)# l2protocol tunnel Specifies a global CoS value on all Layer 2 protocol
cos value tunneling ports. The default cos-value is 5.
This example shows how to specify a global CoS value for the purpose of Layer 2 protocol tunneling:
switch# configure terminal
switch(config)# l2protocol tunnel cos 6
switch(config)# exit
Procedure
Step 2 switch(config)# hardware rate-limiter Sets the threshold in packets per second above which
layer-2 l2pt packets-per-sec incoming protocol packets from dot1q-tunnel ports
are dropped in hardware. Valid values are from 0 to
30000.
Procedure
Step 2 switch(config)# interface ethernet Specifies an interface to configure, and enters interface
slot/port configuration mode.
Command Purpose
clear l2protocol tunnel counters [interface if-range] Clears all the statistics counters. If no interfaces are
specified, the Layer 2 protocol tunnel statistics are
cleared for all interfaces.
show dot1q-tunnel [interface if-range] Displays a range of interfaces or all interfaces that
are in dot1q-tunnel mode.
Command Purpose
show l2protocol tunnel [interface if-range | vlan Displays Layer 2 protocol tunnel information for a
vlan-id] range of interfaces, for all dot1q-tunnel interfaces that
are part of a specified VLAN or all interfaces.
show l2protocol tunnel summary Displays a summary of all ports that have Layer 2
protocol tunnel configurations.
show running-config l2pt Displays the current Layer 2 protocol tunnel running
configuration.
show interface status error policy [detail] Displays errors on interfaces and VLANs that are
inconsistent with hardware policies.
The detail command displays the details of the
interfaces and VLANs that receive an error.
When an interface is also using a link OAM profile, specific parameters that are set in the profile can be
overridden by configuring a different value directly on the interface.
An EOAM profile simplifies the process of configuring EOAM features on multiple interfaces. An Ethernet
OAM profile, and all of its features, can be referenced by other interfaces, allowing other interfaces to inherit
the features of that Ethernet OAM profile.
Individual Ethernet link OAM features can be configured on individual interfaces without being part of a
profile. In these cases, the individually configured features always override the features in the profile.
The preferred method of configuring custom EOAM settings is to create an EOAM profile in Ethernet
configuration mode and then attach it to an individual interface or to multiple interfaces.
The following standard Ethernet Link OAM features are supported on the Cisco Nexus 7000 Series switch:
• Neighbor Discovery
• Link Monitoring
• Miswiring Detection (Cisco-Proprietary)
Neighbor Discovery
Neighbor discovery enables each end of a link to learn the OAM capabilities of the other end and establish
an OAM peer relationship. Each end also can require that the peer have certain capabilities before it will
establish a session. You can configure certain actions to be taken if there is a capabilities conflict or if a
discovery process times out, using the capabilities-conflict or discovery-timeout commands in the action
configuration submode.
Link Monitoring
Link monitoring enables an OAM peer to monitor faults that cause the quality of a link to deteriorate over
time. When link monitoring is enabled, an OAM peer can be configured to take action when the configured
thresholds are exceeded.
Example:
switch# configure terminal
switch(config)#
Example:
switch(config)# feature
ethernet-link-oam
Step 3 ethernet oam profile profile-name Creates a new Ethernet Operations, Administration and
Maintenance (OAM) profile and enters Ethernet OAM
Example: configuration mode.
switch(config)# ethernet oam
profile Profile_1
switch(config-eoam)#
Example:
switch(config-eoam)#
link-monitor
switch(config-eoam-lm)#
Example:
switch(config-eoam-lm)# exit
switch(config-eoam)#
Step 14 connection timeout seconds Configures the timeout value (in seconds) for an Ethernet
OAM session.
Example: The range is 2 to 30. The default value is 5.
switch(config-eoam)# connection
timeout 30
Step 15 mode {active | passive} Configures the Ethernet OAM mode. The default is active.
Example:
switch(config-eoam)# mode
passive
Step 17 mode {active | passive} Requires that active mode or passive mode is configured
on the remote end before the Ethernet OAM session
Example: becomes active.
switch(config-eoam-require)#
mode active
Example:
switch(config-eoam-require)#
exit
switch(config-eoam)#
Step 21 capabilities-conflict {disable | efd | Specifies the action that is taken on an interface when a
error-disable-interface} capabilities-conflict event occurs. The default action is to
create a syslog entry.
Example: Note If you change the default, the log keyword option
switch(config-eoam-action)#
capabilities-conflict disable is available in Interface Ethernet OAM
configuration mode to override the profile setting
and log the event for the interface when it occurs.
Step 22 critical-event {disable | Specifies the action that is taken on an interface when a
error-disable-interface} critical-event notification is received from the remote
Ethernet OAM peer. The default action is to create a syslog
Example: entry.
switch(config-eoam-action)#
critical-event Note If you change the default, the log keyword option
error-disable-interface is available in Interface Ethernet OAM
configuration mode to override the profile setting
and log the event for the interface when it occurs.
Step 23 discovery-timeout {disable | efd | Specifies the action that is taken on an interface when a
error-disable-interface} connection timeout occurs. The default action is to create
a syslog entry.
Example: Note If you change the default, the log keyword option
switch(config-eoam-action)#
discovery-timeout disable is available in Interface Ethernet OAM
configuration mode to override the profile setting
and log the event for the interface when it occurs.
Step 24 dying-gasp {disable | Specifies the action that is taken on an interface when a
error-disable-interface} dying-gasp notification is received from the remote Ethernet
OAM peer. The default action is to create a syslog entry.
Example: Note If you change the default, the log keyword option
switch(config-eoam-action)#
dying-gasp is available in Interface Ethernet OAM
error-disable-interface configuration mode to override the profile setting
and log the event for the interface when it occurs.
Example:
switch(config-eoam-action)# end
Example:
switch# configure terminal
switch(config)#
Step 4 profile profile-name Attaches the specified Ethernet OAM profile and
all of it's configuration to the interface.
Example:
switch(config-if-eoam)# profile
Profile_1
Procedure
Example:
switch# configure terminal
switch(config)#
Step 2 interface interface Enters interface configuration mode and specifies the
Ethernet interface name and notation
Example: rack/slot/module/port.
switch(config)# interface
GigabitEthernet 0/0/6/11
switch(config-if)#
Step 3 ethernet oam Enables Ethernet OAM and enters interface Ethernet
OAM configuration mode.
Example:
switch(config-if)# ethernet oam
switch(config-if-eoam)#
Step 5 end Ends the configuration session and exits to the EXEC
mode.
Example:
switch(config-if-eoam)# end
Note Some of these settings are not supported on certain platforms, but the defaults are still reported. On the
Cisco Nexus 7000 Series switches, the following areas are unsupported:
• Hello interval configuration
• Remote loopback
• EFD
Use the show ethernet oam discovery command to display the status of the OAM sessions. If no interface
is specified, details of all interfaces that have OAM configured will be displayed.
switch# show ethernet oam discovery GigabitEthernet0/0/6/11
GigabitEthernet0/0/6/11
Local client
Administrative configuration:
PDU revision: 2
Mode: Active
Unidirectional support: N
Link monitor support: N
Remote loopback support: Y
MIB retrieval support: Y
Maximum PDU size: 1500
Mis-wiring detection key: 20492C
Operational status:
Port status: Operational
Loopback status: None
Interface mis-wired: N
Remote client
MAC address: 0030.96fd.6bfa
Vendor (OUI): 00.00.0C (Cisco)
Administrative configuration:
PDU revision: 5
Mode: Passive
Unidirectional support: N
Link monitor support: Y
Remote loopback support: Y
MIB retrieval support: N
Maximum PDU size: 1500
Use the show ethernet oam statistics command to display statistics for local and remote OAM sessions. If
no interface is specified, statistics of all interfaces that have OAM configured will be displayed.
switch# show ethernet oam statistics
GigabitEthernet0/0/6/11
Counters
--------
Information OAMPDU Tx 45
Information OAMPDU Rx 42
Unique Event Notification OAMPDU Tx 0
Unique Event Notification OAMPDU Rx 0
Duplicate Event Notification OAMPDU Tx 0
Duplicate Event Notification OAMPDU Rx 0
Loopback Control OAMPDU Tx 0
Loopback Control OAMPDU Rx 3
Variable Request OAMPDU Tx 0
Variable Request OAMPDU Rx 0
Variable Response OAMPDU Tx 0
Variable Response OAMPDU Rx 0
Organization Specific OAMPDU Tx 0
Organization Specific OAMPDU Rx 0
Unsupported OAMPDU Tx 93
Unsupported OAMPDU Rx 0
Frames Lost due to OAM 12
Use the show ethernet oam event-log command to display the most recent event logs for interfaces on which
OAM is configured.
switch# show ethernet oam event-log
Wed Jan 23 06:16:46.684 PST
Local Action Taken:
N/A - No action needed EFD - Interface brought down using EFD
None - No action taken Err.D - Interface error-disabled
Logged - System logged
GigabitEthernet0/1/0/0
================================================================================
Time Type Loc'n Action Threshold Breaching Value
------------------------- -------------- ------ ------ --------- ---------------
Wed Jan 23 06:13:25 PST Symbol period Local N/A 1 4
Wed Jan 23 06:13:33 PST Frame Local N/A 1 6
Wed Jan 23 06:13:37 PST Frame period Local None 9 12
Wed Jan 23 06:13:45 PST Frame seconds Local N/A 1 10
Wed Jan 23 06:13:57 PST Dying gasp Remote Logged N/A N/A
GigabitEthernet0/1/0/1
================================================================================
Time Type Loc'n Action Threshold Breaching Value
------------------------- -------------- ------ ------ --------- ---------------
Wed Jan 23 06:26:14 PST Dying gasp Remote Logged N/A N/A
Wed Jan 23 06:33:25 PST Symbol period Local N/A 1 4
Wed Jan 23 06:43:33 PST Frame period Remote N/A 9 12
Wed Jan 23 06:53:37 PST Critical event Remote Logged N/A N/A
Wed Jan 23 07:13:45 PST Link fault Remote EFD N/A N/A
Wed Jan 23 07:18:23 PST Dying gasp Local Logged N/A N/A
Use the show ethernet oam event-log interface detail command to display detailed event logs for specific
interfaces on which OAM is configured.
switch# show ethernet oam event-log interface detail
Wed Jan 23 06:21:16.392 PST
(Scaled): For remote threshold events "Local High Threshold" is scaled for
comparison with "Breaching Value".
This is to account for different local and remote window sizes.
GigabitEthernet0/1/0/0
====================================================================
Event at Wed Jan 23 2013 06:26:14.62 PST:
Type: Dying gasp
Location: Remote
Local Action Taken: System logged
Local Event Running Total: 1
Event at Wed Jan 23 2013 06:33:25.62 PST:
Type: Threshold Event - Symbol period
Location: Local
Local Action Taken: No action needed
Local Event Running Total: 1
Local Window Size: 1000
Local Threshold: 1
Local High Threshold: Not configured
Breaching Value: 4
Local Error Running Total: 8
Event at Wed Jan 23 2013 06:43:37.73 PST:
Type: Threshold Event - Frame period
Location: Remote
Local Action Taken: No action needed
Remote Event Running Total: 1
Remote Window Size: 1000
Remote Threshold: 9
Local High Threshold (Scaled): Not configured
Breaching Value: 12
Use the show ethernet oam summary to display a summary of all the active OAM sessions.
switch# show ethernet oam summary
Link OAM System Summary
=======================
Profiles 6
Interfaces 10
Interface states:
Port down 1
Passive wait 1
Active send 1
[Evaluating 0]
[Local accept 0]
[Local reject 0]
Remote reject 1
Operational 6
Loopback mode 1
Miswired connections 1
Events 13
Local 4
Symbol error 0
Frame 2
Frame period 1
Frame seconds 1
Remote 9
Symbol error 3
Frame 4
Frame period 1
Frame seconds 1
Use the show ethernet oam summary detail command to display a summary of all the active OAM sessions
and details about the 10 most recent events across all interfaces.
switch# show ethernet oam summary detail
Link OAM System Summary
=======================
Profiles 6
Interfaces 10
Interface states:
Port down 1
Passive wait 1
Active send 1
[Evaluating 0]
[Local accept 0]
[Local reject 0]
Remote reject 1
Operational 6
Loopback mode 1
Miswired connections 1
Events 13
Local 4
Symbol error 0
Frame 2
Frame period 1
Frame seconds 1
Remote 9
Symbol error 3
Frame 4
Frame period 1
Frame seconds 1
Related Documents
Table 59: Related Documents
Related Topic
Cisco NX-OS Licensing Guide
Note By default, the FEC admin state is AUTO. Operational state for all optics except QSFP-100G-LR4
transceiver modules will be negotiated to cl90 (ON). For QSFP, by default, the FEC operational state will
negotiate to OFF. In a FEC set up, if one side of the link is set to AUTO and the other side of the FEC
link is set to OFF, it can cause link failure (link down).
Step 2 Specify an interface range to configure, and enter interface configuration mode.
switch(config)# interface interface-range
Step 3 Configure the Forward Error Correction feature for the interface range.
switch(config-if-range)# fec {auto | cl91 | off}
• auto—Enables the FEC feature based on the transceiver type.
Note The default admin mode is auto on all transceiver modules, but on the QSFP-100G-LR4 transceiver
module by default, the admin mode is auto and the operational state of FEC is OFF.
Step 4 (Optional) Copy the running configuration as startup configuration.
switch(config)# copy running-config startup-config
Configuring FEC
This example shows how to configure and verify the FEC feature on a QSFP-100G-LR4 transceiver module:
switch# configure terminal
switch(config)# interface ethernet1/2,Ethernet 18/12
switch(config-if-range)# fec cl91
switch(config-if-range)# exit
switch(config)# copy running-config startup-config
switch(config)# exit
switch# show interface Ethernet1/2
Ethernet1/2 is up
admin state is up, Dedicated Interface
Hardware: 40000/100000 Ethernet, address: 00eb.d56e.9fd0 (bia 00eb.d56e.9fd0)
MTU 9216 bytes, BW 40000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, medium is broadcast
Port mode is access
full-duplex, 40 Gb/s, media type is 40G
Beacon is turned off
Auto-Negotiation is turned on
Input flow-control is off, output flow-control is off
Auto-mdix is turned off
Rate mode is dedicated
Switchport monitor is off
EtherType is 0x8100
EEE (efficient-ethernet) : n/a
admin fec state is auto, oper fec state is off
.
.
.
Additional References
Related Documents
RFC Title
RFC 1981 Path MTU Discovery for IP version 6
RFC 2463 Internet Control Message Protocol (ICMPv6) for the Internet Protocol
Version 6 (IPv6) Specification
RFC Title
RFC 3162 RADIUS and IPv6