Using Enhanced vPC

Table Of Contents

Using Enhanced vPC

Information About Enhanced vPC

Supported Platform

Enhanced vPC Topology and Scalability

Supported Enhanced vPC Topology

Unsupported Enhanced vPC Topology

vPC Between Hosts and a Pair of FEXs that are Connected to a Single Cisco Nexus 5500 Series Device

Port Channel Between Host and Ports from More Than Two FEXs

Enhanced vPC Scalability

Total Number of FEXs Per Cisco Nexus 5000 Series Device

Enhanced vPC with FCoE

SAN A and SAN B Traffic Isolation

FEX Uplink Traffic Load

Enhanced vPC Failure Reaction

Port Channel Member Port Failure

FEX Failure

Cisco Nexus 5000 Series Switch Failure

FEX Uplink Failure

vPC Peer-Link Failure

vPC Keepalive Failure

Deploying and Monitoring Enhanced vPC

Enhanced vPC Configuration

Enhanced vPC Consistency Checks

Port Channel ID Checks

Different Port Channel Members

Global vPC Consistency Check

Port Channel Interface Level Configuration Checks

FCoE Configuration with Enhanced vPC

Software Upgrade with Enhanced vPC

Monitoring the Traffic in Enhanced vPC


Using Enhanced vPC


This chapter provides an overview of Enhanced virtual port channelling(vPC).

This chapter includes the following sections:

Information About Enhanced vPC

Enhanced vPC Topology and Scalability

Enhanced vPC Scalability

Enhanced vPC with FCoE

Enhanced vPC Failure Reaction

Deploying and Monitoring Enhanced vPC

Information About Enhanced vPC

Enhanced vPC enables you to support server connectivity with one topology and address requirement for both high availability and high bandwidth. Enhanced vPC is technology that supports the topology that is shown in Figure 6-1, where a Cisco Nexus 2000 Fabric Extender (FEX) is dual-homed to a pair of Cisco Nexus 5500 Series devices while the hosts are also dual-homed to a pair of FEXs using a vPC.

Figure 6-1 Enhanced vPC Topology

With Enhanced vPC, all available paths from hosts to FEXs and from FEXs to the Cisco Nexus 5500 Series device are active, carry Ethernet traffic, and maximize the available bandwidth. All available paths in the Enhanced vPC topology can carry Ethernet traffic.

With Enhanced vPC, you could choose either a single-homed FEX topology see Figure 6-2 or a dual-homed FEX topology see Figure 6-3 for a dual-homed FEX topology example.

The single-homed FEX topology is well suited for servers with multiple NICs that support 802.3ad port channel. The dual-homed FEX topology is ideal for servers with one NIC, because the failure of one Cisco Nexus 5500 Series device does not bring down the FEX and does not cut the single NIC server out of the network. The Dual-homed FEX topology can also be deployed for servers that have multiple NICs but do not support 802.3ad. Without an Enhanced vPC server, you cannot connect port channels to FEXs when the FEXs are dual-homed to both Cisco Nexus 5500 Series devices.

Figure 6-2 Single-Homed FEX Topology

Figure 6-3 Dual-Homed FEX Topology

Use Enhanced vPC if you want to connect a dual-homed FEX to a Cisco Nexus 5000 Series device to have better redundancy for a single NIC server and at the same time, want to run port channels between the servers that have multiple NICs and FEXs. See Figure 6-4 for an example of enhanced vPC with a single-homed server and host vPC.

Figure 6-4 Enhanced vPC with Single-Homed Server and Host vPC

Supported Platform

Cisco NX-OS 5.1(3)N1(1) supports Enhanced vPC on the Cisco Nexus 5548P, Cisco Nexus 5548UP, and Cisco Nexus 5596UP devices. The Cisco Nexus 5010 and Cisco Nexus 5020 devices cannot support Enhanced vPC. Enhanced vPC is implemented on the Cisco Nexus 5500 Series device and has no specific requirements from a FEX. As a result, different types of FEXs can be deployed in an Enhanced vPC topology.

Enhanced vPC is also supported with Layer 3 running on Cisco Nexus 5500 Series devices, but it does not change any Layer 3 CLI or how Layer 3 features are implemented on a Cisco Nexus 5500 Series device.

With the introduction of the Enhanced vPC, the three topologies supported by a Cisco Nexus 5500 Series device and FEX are the single-homed FEX topology, the dual-homed FEX topology, and the Enhanced vPC topology. A hybrid topology is also supported, where the FEX and hosts are connected to the same pair of Cisco Nexus 5500 Series devices.

Enhanced vPC Topology and Scalability

Supported Enhanced vPC Topology

Figure 6-5 shows various server connections that are supported with an Enhanced vPC topology.

Figure 6-5 Enhanced vPC with Various Types of Server Connections

The figure shows the following configurations:

A single-homed server — Provides a failover path when one of the Cisco Nexus 5000 Series devices or the link between a Cisco Nexus 5000 Series device and a FEX fails. (Shown as H1 in the Figure 6-5.)

A dual-homed server runs a port channel to the same FEX — (Shown as H2 in the Figure 6-5.)

A dual-homed server runs port channel to two FEXs — Support both static port channel and LACP based port channels. The port channel members can span up to two FEXs. (Shown as H3 in the figure.)

A dual-homed server runs a port channel to any two FEXs connected to the same pair of Cisco Nexus 5000 Series devices — Enhanced vPC topology supports the port channels between the host and any randomly chosen FEXs connected to the same pair of Cisco Nexus 5000 Series devices. As shown in the Figure 6-5, while host H3 runs a port channel to ports from FEX 101 and FEX 102 , host H4 can run a port channel to ports from FEX 102 and FEX 103 , which implies that a port channel can span to any two line cards. This configuration is useful when the Cisco Nexus 5000 Series device and the FEX are deployed as EoR devices where all the FEXs are installed in the network. You do not need to track which FEXs are considered as a pair of FEXs for a host vPC connection and they can connect the server to any two FEXs where ports are available.

A dual-homed server runs the Fiber Channel over Ethernet (FCoE) and a port channel for Ethernet — The Enhanced vPC topology supports FCoE connectivity to servers. The Figure 6-5, hosts H3 and H4 can use CNA to connect to a Cisco Nexus 2232PP to run FCoE for storage traffic and a port channel for Ethernet traffic. See FEX Uplink Traffic Load for details about how FC traffic is handled and how the FC traffic isolation for SAN A and SAN B Traffic Isolation are implemented in the Enhanced vPC topology.

A dual-homed server runs active/standby NIC teaming — This configuration is similar to the Dual-homed FEX topology. The server can run active or standby NIC and connect to two or more FEXs. See H5 in the Figure 6-5.

In addition to the various types of connections, the same pair of Cisco Nexus 5000 Series devices can also support the single-homed FEX topology. This kind of combination is referred to as a hybrid topology.

Unsupported Enhanced vPC Topology

vPC Between Hosts and a Pair of FEXs that are Connected to a Single Cisco Nexus 5500 Series Device

Figure 6-6 shows unsupported topology where a vPC is between hosts and two FEXs that are connected to one Cisco Nexus 5500 Series device. This topology does not provide a good high availability solution because the server loses the connectivity to the network when the Cisco Nexus 5000 Series device fails.

Figure 6-6 Unsupported Topology—Host vPC With One Cisco Nexus 5000 Series Device

If you need to connect a multi-homing server to a pair of FEXs when there is only one Cisco Nexus 5000 Series device, you have the option to run active or standby NIC teaming from the server.

Port Channel Between Host and Ports from More Than Two FEXs

With Enhanced vPC, the port channel can be formed among ports from up to two FEXs that are connected to the same pair of Cisco Nexus 5000 Series devices. This topology which is shown in Figure 6-7, does not work and is not supported.

Figure 6-7 Unsupported Topology—Host vPC Spans Across More Than Two FEXs

This topology adds little value in terms of high availability but increases the complexity of cabling and management. The CLI rejects the configuration when it detects the port channel members are from more than two FEXs.

Enhanced vPC Scalability

In general, the Enhanced vPC does not change the scalability of a Cisco Nexus 5000 Series device and a FEX. Scalability is similar to the dual-homed FEX topology.

Total Number of FEXs Per Cisco Nexus 5000 Series Device

From the Cisco NX-OS 5.1(3)N1(1) release and later releases, each Cisco Nexus 5500 Series device can manage and support up to 24 FEXs without Layer 3. With Layer 3, the number of FEXs supported per Cisco Nexus 5500 Series device is 8. With Enhanced vPC and a dual-homed FEX topology each FEX is managed by both Cisco Nexus 5000 Series devices. As a result, one pair of Cisco Nexus 5500 Series devices can support up to 24 FEXs and 16 FEXs for Layer 2 and Layer 3.

There are differences in scalability between the straight-through topology, the dual-homed FEX topology, and the Enhanced vPC topology. In the straight through topology, only one Cisco Nexus 5000 Series device manages each FEX and a pair of Cisco Nexus 5500 Series devices manage up to 48 FEXs. This difference is shown in Figure 6-8 for an Layer 2 scenario.

Figure 6-8 FEX Scalability

Because the total number of FEXs that are supported by a pair of Cisco Nexus 5000 Series devices is different between these two topologies, the FEX straight-through design with more than 24 FEXs per one pair of Cisco Nexus 5000 Series devices cannot migrate to Enhanced vPC topology.

The configurations are as follows:

Total number of host vPC — With Enhanced vPC, each FEX port can be part of a host vPC. The host vPC does not consume port channel resources on the parent Cisco Nexus 5000 Series device.

Total number of ports per host vPC — The total number of ports that can be assigned to each host vPC differs with each FEX model.

The Cisco Nexus 2148 device does not support port channels. With the Cisco Nexus 2148 device, the host vPC can have up to two ports with one from each Cisco Nexus 2148.

The Cisco Nexus 2248, Cisco Nexus 2224, Cisco Nexus 2232 and Cisco Nexus 2248TP-E devices support hardware port channels and up to 16 ports in a host vPC with up to 8 ports from each FEX.

Enhanced vPC with FCoE

SAN A and SAN B Traffic Isolation

You can deploy FCoE in an Enhanced vPC topology. Traditionally, the SAN network maintains two fabrics, the SAN A and SAN B. The traffic from side A is isolated from side B. Hosts and storage arrays are attached to host SAN networks for high availability. The FCoE traffic in an Enhanced vPC topology maintain the traffic isolation for two SAN networks. The FCoE command ensures the FCoE traffic from the FEX is only sent to one Cisco Nexus 5000 Series device is as follows:

N5k-1(config)# fex 101
N5k-1(config-fex)# fcoe
N5k-2(config)# fex 102
N5k-2(config-fex)# fcoe

In this configuration, the FCoE traffic from FEX 101 is sent only to N5k-1 and the FCoE traffic from FEX 102 is sent only to N5k-2 although both FEXs are connected to both devices. This is true for the reverse FCoE traffic from a Cisco Nexus 5000 Series device to a FEX where the FCoE traffic is sent only on a FEX. As a result, SAN A and SAN B separation is achieved.

Starting the Cisco NX-OS 5.1(3)N1(1) release, FCoE is supported for an Enhanced vPC topology and dual-homed FEX topology.

For an Ethernet-only network with Enhanced vPC, you have the option to connect hosts to random selected pairs of FEXs, such as the host H3 and H4 in Figure 6-9. However, this approach is not recommended because it may have hosts connected to the two FEXs that are mapped to the same side of a SAN network.

From the Cisco NX-OS 5.1(3)N1(1) release and later releases, the topology that has four ports in the host vPC (two ports to each FEX) is not supported.

Figure 6-9 FCoE Traffic Flow with Enhanced vPC

FEX Uplink Traffic Load

In the Enhanced vPC topology, the traffic load for the FEX uplinks is not even, because the FCoE traffic from a FEX is forwarded to one Cisco Nexus 5000 Series device for SAN traffic isolation. Po101 between N5k-1 and FEX 101, and Po102 between N5k-2 and FEX 102 carries more traffic than the rest of two the port channels between a FEX and a Cisco Nexus 5000 Series device. You must provision enough bandwidth to prevent the undesirable oversubscription for links that carry both FCoE and Ethernet traffic.

To avoid the imbalance of traffic distribution, we recommend a FEX straight-through topology for FCoE deployments that have a FEX. In an enhanced vPC topology, you can have only up to four 10-Gigabyte Ethernet links for FCoE traffic for each of the Cisco Nexus 2232 devices. However, in a FEX straight-through topology, all eight 10-Gigabyte Ethernet uplinks can carry FCoE traffic.

You can control how the bandwidth of a FEX uplink is shared between the Ethernet and FCoE traffic by configuring an ingress and egress queuing policy. The default QoS template allocates half of the bandwidth to each. For the links that carry both Ethernet and FCoE traffic, each gets half of the guaranteed bandwidth in case of congestion. When there is congestion, each type of traffic can take all available bandwidth. For links that carry only Ethernet traffic, all 10-Gbps bandwidth is available for Ethernet traffic.

Enhanced vPC Failure Reaction

Port Channel Member Port Failure

If one port channel member fails, the traffic flow is moved to the remaining port channel members. If the host loses all its connections to one FEX, the traffic flow is redirected to another flow for both host to network and network to host.

FEX Failure

If a FEX fails, all flows are moved to the second FEX in the Enhanced vPC topology. For both directions, the traffic does not need to traverse the vPC peer link.

Cisco Nexus 5000 Series Switch Failure

When one Cisco Nexus 5000 Series device goes down, all FEXs remain connected to the other Cisco Nexus 5000 Series devices. All FEX front panel ports are still operational. All traffic flows continue to be forwarded by all FEXs.

FEX Uplink Failure

When a FEX loses its uplinks, it shuts down its front panel ports and the traffic is carried by another FEX for Enhanced vPC topology.

vPC Peer-Link Failure

When the vPC secondary device detects a peer-link failure it checks if the primary device is alive via a peer keepalive link. If the primary device is alive, the secondary device suspends all its vPC member ports. In an Enhanced vPC topology, the vPC secondary device suspends all the interfaces that connects to a FEX. As a result, all FEXs are connected only to a vPC primary device. All FEX host ports are up and running and traffic continues to be distributed to both FEXs.

Because the FEXs are not connected to a vPC secondary device when the peer-link fails, the vPC secondary device cannot carry the FCoE traffic and the secondary device shuts down all the VFC interfaces that are bound to the FEX host ports. The multi pathing software that runs on the host moves all the SAN traffic flow to the remaining VFC interface.

If the secondary device cannot reach the primary device via the keepalive link, the secondary device keeps its vPC member ports up and running.

vPC Keepalive Failure

The vPC keepalive failure does not have any impact on the vPC and traffic flow. We recommend that you check and restore the keepalive link as soon as possible.

Deploying and Monitoring Enhanced vPC

Enhanced vPC Configuration

In the Enhanced vPC topology, the FEXs are virtual line cards and the FEX front panel ports are mapped to the virtual interfaces on a parent Cisco Nexus 5000 Series device. From the CLI perspective, the configuration of Enhanced vPC is the same as a regular port channel with member ports from two FEXs. You do not have to enter the CLI vpc vpc ID to create an Enhanced vPC. An example of how to create an Enhanced vPC with topology.

The following procedure uses the topology in Figure 6-10. In the figure, the number next to the line is the interface ID. Assume all the ports are base ports the interface ID 2 represent interface eth1/2 on the Cisco Nexus 5000 Series device.

Figure 6-10 Creating an Enhanced vPC Topology

Configuration on the first Cisco Nexus 5000 Series device:

N5k-1(config)# interface eth101/1/, eth101/1/2
N5k-1(config-if)# channel-group 2 mode active
N5k-1(config-if)# interface eth102/1/, eth102/1/2
N5k-1(config-if)# channel-group 2 mode active

Configuration from the second Cisco Nexus 5000 Series device:

N5k-2(config)# interface eth101/1/, eth101/1/2
N5k-2(config-if)# channel-group 2 mode active
N5k-2(config-if)# interface eth102/1/, eth102/1/2
N5k-2(config-if)# channel-group 2 mode active

Although the vPC vPC ID command is not required, the software assigns an internal vPC ID for each Enhanced vPC. The output of the show vpc command displays this internal vPC ID.


Step 1 Enable a vPC and LACP.

N5k-1(config)# feature vpc
N5k-1(config)# feature lacp
N5k-2(config)# feature vpc
N5k-2(config)# feature lacp

Step 2 Create VLANs.

N5k-1(config)# vlan 10-20
N5k-2(config)# vlan 10-20

Step 3 Assign the vPC domain ID and configure the vPC peer keepalive.

N5k-1(config)# vpc domain 123
N5k-1(config-vpc)# peer-keepalive destination 172.25.182.100
N5k-2(config)# vpc domain 123
N5k-2(config-vpc)# peer-keepalive destination 172.25.182.99

Step 4 Configure the vPC peer-link.

N5k-1(config)# interface eth1/1-2
N5k-1(config-if)# channel-group 1 mode active
N5k-1(config-if)# interface Po1
N5k-1(config-if)# switchport mode trunk
N5k-1(config-if)# switchport trunk allowed vlan 1, 10-20
N5k-1(config-if)# vpc peer-link
N5k-2(config)# interface eth1/1-2
N5k-2(config-if)# channel-group 1 mode active
N5k-2(config-if)# interface Po1
N5k-2(config-if)# switchport mode trunk
N5k-2(config-if)# switchport trunk allowed vlan 1, 10-20
N5k-2(config-if)# vpc peer-link

Step 5 Configure FEX 101.

N5k-1(config)# fex 101
N5k-1(config-fex)# interface eth1/3-4
N5k-1(config-if)# channel-group 101
N5k-1(config-if)# interface po101
N5k-1(config-if)# switchport mode fex-fabric
N5k-1(config-if)# vpc 101
N5k-1(config-if)# fex associate 101
N5k-2(config)# fex 101
N5k-2(config-fex)# interface eth1/3-4
N5k-2(config-if)# channel-group 101
N5k-2(config-if)# interface po101
N5k-2(config-if)# switchport mode fex-fabric
N5k-2(config-if)# vpc 101
N5k-2(config-if)# fex associate 101

Step 6 Configure FEX 102.

N5k-1(config)# fex 102
N5k-1(config-fex)# interface eth1/5-6
N5k-1(config-if)# channel-group 102
N5k-1(config-if)# interface po102
N5k-1(config-if)# switchport mode fex-fabric
N5k-1(config-if)# vpc 102
N5k-1(config-if)# fex associate 102
N5k-2(config)# fex 102
N5k-2(config-fex)# interface eth1/5-6
N5k-2(config-if)# channel-group 102
N5k-2(config-if)# interface po102
N5k-2(config-if)# switchport mode fex-fabric
N5k-2(config-if)# vpc 102
N5k-2(config-if)# fex associate 102

Step 7 Create Enhanced vPC.

N5k-1(config)# interface eth101/1/1, eth101/1/2
N5k-1(config-if)# channel-group 2 mode active
N5k-1(config-if)# interface eth102/1/1, eth102/1/2
N5k-1(config-if)# channel-group 2 mode active
N5k-1(config-if)# int po2
N5k-1(config-if)# switchport access vlan 10
N5k-2(config)# interface eth101/1/1, eth101/1/2
N5k-2(config-if)# channel-group 2 mode active
N5k-2(config-if)# interface eth102/1/1, eth102/1/2
N5k-2(config-if)# channel-group 2 mode active
N5k-2(config-if)# int po2
N5k-2(config-if)# switchport access vlan 10

As shown in the above procedure, the Enhanced vPC configuration is the same configuration as when you configure the host port channel with channel members from the same FEX.

Enhanced vPC Consistency Checks

Cisco NX-OS checks whether the vPC-related configuration is consistent between the two vPC peer devices to avoid undesired data forwarding behavior. Cisco NX-OS checks both global configuration parameters and interface level configuration parameters. For Enhanced vPC, the consistency check for global configuration parameters remain the same as for a dual-homed FEX topology. For details about the vPC consistency check, see the vPC operation guide:

http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/operations/n5k_vpc_ops.html

Port Channel ID Checks

Cisco NX-OS requires that the same port channel ID is used on two peer devices for Enhanced vPC. The port channel and its channel members are suspended when different port channel IDs are used for the same FEX ports. The following example shows that the FEX interfaces eth110/1/1 and eth111/1/1 are assigned to different port channels on the two vPC devices. As a result, the two FEX interfaces are suspended on both Cisco Nexus 5000 Series devices and the port channel is not operational.

N5596-1# show run int e110/1/1,e111/1/1
!Command: show running-config interface Ethernet110/1/1, Ethernet111/1/1
!Time: Sun Aug 28 03:38:23 2011
version 5.1(3)N1(1)
interface Ethernet110/1/1
  channel-group 1002
interface Ethernet111/1/1
  channel-group 1002
N5596-2# show run int e110/1/1,e111/1/1
!Command: show running-config interface Ethernet110/1/1, Ethernet111/1/1
!Time: Mon Aug 29 21:01:20 2011
version 5.1(3)N1(1)
interface Ethernet110/1/1
  hardware N2348TP queue-limit 1024000 rx
  hardware N2348TP queue-limit 1024000
  switchport access vlan 20
  channel-group 1001
interface Ethernet111/1/1
  switchport access vlan 20
  channel-group 1001
N5596-2# 
N5596-2# show int e110/1/1
Ethernet110/1/1 is down (suspended by vpc)
  Hardware: 100/1000 Ethernet, address: 7081.0500.2402 (bia 7081.0500.2402)
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
<snip>
N5596-1# show int e110/1/1
Ethernet110/1/1 is down (suspended by vpc)
  Hardware: 100/1000 Ethernet, address: 7081.0500.2402 (bia 7081.0500.2402)
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
<snip>

Different Port Channel Members

The port channel is up and operational when there is at least one common port channel member between the two Cisco Nexus 5000 Series devices. The FEX interfaces that are assigned to A port channel on only one Cisco Nexus 5000 Series device are suspended. In the following example, FEX interfaces eth110/1/1 and eth111/1/1, are assigned to Po1001 on N5596-1. However, on N5596-2 only eth110/1/1 is assigned to Po1001. Therefore, only eth110/1/1 becomes the active port channel member and Po1001 is up on both Cisco Nexus 5000 Series devices. FEX interface eth111/1/1 is suspended on both Cisco Nexus 5000 Series devices. With this configuration, the host is connected only to FEX 110.

N5k-1(config)# interface eth110/1/1, eth111/1/1
N5k-1(config-if)# channel-group 1001 
N5k-1(config-if)# int po1001
N5k-1(config-if)# switchport access vlan 20
N5k-2(config)# interface eth110/1/1
N5k-2(config-if)# channel-group 1001
N5k-2(config-if)# int po1001
N5k-2(config-if)# switchport access vlan 20
N5596-1(config)# show int e111/1/1
Ethernet111/1/1 is down (suspended by vpc)
  Hardware: 100/1000 Ethernet, address: 7081.0500.2582 (bia 7081.0500.2582)
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
  reliability 255/255, txload 1/255, rxload 1/255
N5596-1# show port-channel summary 
Flags:  D - Down        P - Up in port-channel (members)
        I - Individual  H - Hot-standby (LACP only)
        s - Suspended   r - Module-removed
        S - Switched    R - Routed
        U - Up (port-channel)
        M - Not in use. Min-links not met

Table 6-1 shows the port channel summary for N5596-1.

Table 6-1 Port Channel Summary for N5596-1

Group
Port Channel
Type
Protocol
Member
Ports

1

Po1(SU)

Ethernet

LACP

1/1 (P)

Eth1/2 (P)

31

Po31(RU)

Ethernet

LACP

1/21 (P)

Eth1/22 (P)

101

Po101(SD)

Ethernet

1/41 (D)

Eth1/42 (D)

102

Po102(SU)

Ethernet

1/43 (P)

Eth1/44 (P)

103

Po103(SD)

Ethernet

1/10 (D)

Eth1/11 (D)

110

Po110(SU)

Ethernet

1/33 (P)

111

Po111(SU)

Ethernet

1/35 (P)

961

Po961(SD)

Ethernet

1001

Po1001(SU)

Ethernet

110/1/1 (P)

Eth111/1/1 (D)

2000

Po2000(SD)

Ethernet

110/1/3 (D)

Eth110/1/5 (D)


N5596-1# 
N5596-2# show int e111/1/1
Ethernet111/1/1 is down (suspended by vpc)
  Hardware: 100/1000 Ethernet, address: 7081.0500.2582 (bia 7081.0500.2582)
  MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
  reliability 255/255, txload 1/255, rxload 1/255
N5596-2# show port-channel summary 
Flags:  D - Down        P - Up in port-channel (members)
        I - Individual  H - Hot-standby (LACP only)
        s - Suspended   r - Module-removed
        S - Switched    R - Routed
        U - Up (port-channel)
        M - Not in use. Min-links not met

Table 6-2 shows the port channel summary for N5596-2.

Table 6-2 Port Channel Summary for N5596-2

Group
Port Channel
Type
Protocol
Member
Ports

1

Po1(SU)

Ethernet

LACP

1/1 (P)

1/2 (P)

31

Po31(SD)

Ethernet

32

Po32(RU)

Ethernet

LACP

1/21 (P)

1/22 (P)

101

Po101(SU)

Ethernet

1/41 (D)

1/42 (D)

102

Po102(SD)

Ethernet

110

Po110(SU)

Ethernet

1/33 (P)

111

Po111(SU)

Ethernet

1/35 (P)

1001

Po1001(SU)

Ethernet

110/1/1 (P)


Global vPC Consistency Check

The configuration that is subject to a global vPC consistency check is displayed as follows:

N5596-1# show vpc consistency-parameters global 
Legend:
        Type 1 : vPC will be suspended in case of mismatch
Table 6-3 shows the vPC consistency check.

Table 6-3 vPC Consistency Check

Name

Type

Local Value

Peer Value

QoS

2

([], [], [], [], [],

([], [], [4], [], [],

 

[])

[])

 

Network QoS (MTU)

2

(9216, 0, 0, 0, 0, 0)

(1538, 0, 1538, 0, 0,

 

0)

   

Network Qos (Pause)

2

(F, F, F, F, F, F)

(F, F, F, F, F, F)

Input Queuing (Bandwidth)

2

(100, 0, 0, 0, 0, 0)

(100, 0, 0, 0, 0, 0)

Input Queuing (Absolute

2

(F, F, F, F, F, F)

(F, F, F, F, F, F)

Priority)

     

Output Queuing (Bandwidth)

2

(100, 0, 0, 0, 0, 0)

(100, 0, 0, 0, 0, 0)

Output Queuing (Absolute

2

(F, F, F, F, F, F)

(F, F, F, F, F, F)

Priority)

     

STP Mode

1

MST

Rapid-PVST

STP Disabled

1

VLANs 123

None

STP MST Region Name

1

""

""

STP MST Region Revision

1

0

0

STP MST Region Instance to

1

   

VLAN Mapping

     

STP Loopguard

1

Disabled

Disabled

STP Bridge Assurance

1

Enabled

Enabled

STP Port Type, Edge

1

Normal, Disabled,

Normal, Disabled,

BPDUFilter, Edge BPDUGuard

Disabled

Disabled

 

STP MST Simulate PVST

1

Enabled

Enabled

Allowed VLANs

1,10,20,58-61,100-102, 1,10,20,58-61,100,1000

 

N5596-1#

     

For a type 2 consistency check parameter, a warning message displays to remind you to have identical configurations on both vPC devices. The vPC and vPC member ports is up and running on both Cisco Nexus 5000 Series devices. Starting in the Cisco NX-OS 5.0(2)N2(1) release, an enhancement called Graceful consistency check was introduced to improve the resilience for vPC. With this feature, the mismatch of the type 1 consistency check parameter on a vPC secondary device, suspends its vPC member port. The vPC primary device keeps the vPC member ports operational to avoid the complete loss of connectivity for a network device behind a vPC.

The graceful consistency check feature does not work for the dual-homed FEX topology and Enhanced vPC topology. With the mismatch of the type 1 consistency check parameters, both vPC devices suspend their vPC member ports for a dual-homed FEX and Enhanced vPC. For example, the output shown above indicates that the STP mode is configured differently on two Cisco Nexus 5596 devices. All the interfaces from dual-homed FEXs are suspended due to the mismatch of the type-1 configuration.

The vPC graceful consistency check works for the FEX straight through topology.

Port Channel Interface Level Configuration Checks

Under the port channel for Enhanced vPC configuration the two important parameters are the port mode (access vs. trunk) and the allowed VLAN for trunk mode.

The applicable configuration parameters that are subject to interface level consistency check are displayed with CLI show vpc consistency check interface.

N5K# show vpc consistency-parameters interface po1000
    Legend:
        Type 1 : vPC will be suspended in case of mismatch
Table 6-4 shows the port channel interface level configuration checks.

Table 6-4 Port Channel Interface Level Configuration Checks

Name
Type
Local Value
Peer Value

mode

1

on

on

Speed

1

1000 Mb/s

1000 Mb/s

Duplex

1

full

full

Port Mode

1

access

trunk

MTU

1

1500

1500

Admin port mode

1

   

Shut Lan

1

No

No

vPC+ Switch-id

1

3000

3000

Allowed VLANs

-

10

1-57,61-3967,4048-4093

Local suspended VLANs

-

10

-

N5596-1#

     

FCoE Configuration with Enhanced vPC

Prior to the Cisco NX-OS 5.1(3)N1(1) release, when an Ethernet interface was a port channel member, the VFC interface could only be bound to a port channel.

This example shows how to configure FCoE with Enhanced vPC:

interface eth100/1/1
Channe-group 1001
Interface Po1001
Switchport mode trunk
Switchport trunk allowed vlan 1, 100,2000
Interface vfc 1
bind interface Po1001

This configuration model requires that there is only one member for the port channel. It cannot be supported for Enhanced vPC where the port channel has at least two interfaces. Starting from the Cisco NX-OS 5.1(3)N1(1) release and later releases the VFC interface can be bound to physical interfaces.

Figure 6-11 shows an FCoE configuration topology.

Figure 6-11 FCoE Configuration Example Topology

This example shows how to configure the topology that is shown in Figure 6-11:

N5k-1(config)# fex 101
N5k-1(config-fex)# fcoe
N5k-1(config-fex)# interface vfc1
N5k-1(config-if)# bind interface eth101/1/1
N5k-2(config)# fex 102
N5k-2(config-fex)# fcoe
N5k-2(config-fex)# interface vfc1
N5k-2(config-if)# bind interface eth102/1/1

The FCoE portion of the configuration on the two vPC devices are different for the SAN traffic isolation and they are not subject to vPC consistency check.

You can enter the fcoe command to create an association between a FEX and a Cisco Nexus 5000 Series device for FCoE traffic. This command allows you to specify which Cisco Nexus 5000 Series device the FCoE traffic should be forwarded to from the FEX.

The same FEX cannot be associated to both the Cisco Nexus 5000 Series devices. The configuration shown in the following exampls shows that with the same FEX that is associated with both Cisco Nexus 5000 Series device for FCoE is rejected.

N5k-1(config)# fex 101
N5k-1(config-fex)# fcoe
N5k-2(config)# fex 101
N5k-2(config-fex)# fcoe

On a Cisco Nexus 5000 Series device, the VFC can only be bound to a FEX interface if the FEX where the interface resides has already been associated to the Cisco Nexus 5000 Series device from an FCoE point of view. In the following example, FEX 101 is associated with N5k-1. When you try to bind a VFC interface to an interface from the FEX 102, the commands are rejected.

N5k-1(config)# fex 101
N5k-1(config-fex)# fcoe
N5k-1(config-fex)# interface vfc1
N5k-1(config-if)# bind interface eth102/1/1

The FEX association to the Cisco Nexus 5000 Series device has to be configured before any VFC interfaces can be created for an Enhanced vPC topology.

Software Upgrade with Enhanced vPC

The Enhanced vPC topology does not change the Cisco NX-OS software upgrade procedure. It has an identical upgrade procedure as the dual-home FEX topology. It supports ISSU if the ISSU conditions are met. For the detailed software upgrade/downgrade procedure see the following URL:

http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/upgrade/503_N1_1/n5k_upgrade_downgrade_503.html

Monitoring the Traffic in Enhanced vPC

The vPC topology presents a challenge for traffic monitoring because each vPC device carries half of the traffic flow. Prior to ERSPAN, you had to configure local SPAN on both vPC devices to monitor all flows sent to and received from the vPC. The procedure required that you combined the packets trace from two SPAN destination ports to get a complete view.

From the Cisco NX-OS 5.1(3)N1(1) release and later releases, the Cisco Nexus 5000 Series devices support ERSPAN source session. With ERSPAN, you can monitor and capture all the flows for the same vPC from one sniffer. The following example shows how to capture all the traffic flows from a host behind an Enhanced vPC.


Note The Cisco Nexus 5000 Series device supports only ERSPAN source sessions not the ERSPAN destination sessions. The platforms that support the ERSPAN destination session are the Cisco Nexus 7000 Series devices, the Cisco Catalyst 6500 Series devices, and the Cisco Nexus 1010 NAM.


Figure 6-12 Monitoring the Traffic in Enhanced vPC

In the Enhanced vPC topology, a unicast and multicast flow can be sent to either one of two FEXs involved in the host vPC. The following example shows how to identify which path the traffic flow is forwarded to. In the following example po1001 is an Enhanced vPC host port channel consists of eth110/1/1 and eth111/1/1. The unicast flow from 30.30.1.2 to 30.30.3.2 is sent to FEX 111. Enter the command to determine which FEX interface from N5k-1 to FEX 111 is carrying the flow.

N5596-1# show port-channel load-balance forwarding-path interface po1001 Vlan 10 Src-ip 
30.30.1.2 dst-ip 30.30.3.2 src-mac 0000.0100.1100 dst-mac 0000.0000.0b00 
Missing params will be substituted by 0's.
Load-balance Algorithm on FEX: source-dest-ip
crc8_hash: Not Used     Outgoing port id: Ethernet111/1/1
Param(s) used to calculate load-balance (Unknown unicast, multicast and broadcast 
packets):
        dst-mac:  0000.0000.0b00
        vlan id:  10

This example shows FEX 110 and interface eth110/1/1 carries the multicast flow for Po1001:

N5596-1# show port-channel load-balance forwarding-path interface po1001 vlan 10 src-mac 
0000.0100.1100 dst-mac 0100.5e01.010a src-ip 30.30.1.2 dst-ip 224.1.1.10 
Missing params will be substituted by 0's.
Load-balance Algorithm on FEX: source-dest-ip
crc8_hash: Not Used     Outgoing port id: Ethernet110/1/1
Param(s) used to calculate load-balance (Unknown unicast, multicast and broadcast 
packets):
        dst-ip:   224.1.1.10
        vlan id:  10
N5596-1#