The biggest limitation to a classic port-channel communication is that port-channel operates only between two devices. To overcome this limitation, NX-OS has a technology called virtual Port Channel (vPC). A pair of switches acting as a vPC peer endpoint look like a single logical entity to port-channel attached devices; the two devices that act as the logical port-channel endpoint are actually two separate devices. This setup has the benefits of hardware redundancy combined with the benefits offered by port-channel, e.g loop management.
A virtual port channel (vPC) allows links that are physically connected to two different Cisco Nexus 7000 Series devices to appear as a single port channel by a third device. The third device can be a switch, server, or any other networking device that supports port channels. You can use only Layer 2 port channels in the vPC. A vPC domain is associated to a single VDC, so all vPC interfaces belonging to a given vPC domain must be defined in the same VDC. You must have a separate vPC peer-link and peer-keepalive link infrastructure for each VDC deployed. Consolidating a vPC pair (two vPC peer devices of the same domain) in two VDCs of the same physical device is not supported. The vPC peer link must use 10-Gigabit Ethernet ports for both ends of the link or the link will not form.
vPC Control Plane Recommendations
For the Peer Link, it is good to use two 10GbE ports on separate line cards for resilent connectivity.
Also, for the Peer Link, make sure that the ports are in dedicated mode (not Shared).
If using the Management Interface for Peer-Keepalive traffic, the management interface should be connected to a Layer 2 management switch, not back to back.
The Peer Keepalive traffic should be over a separate keepalive link and not over the Peer Link.
vPC Member Connectivity Recommendations
Make sure to dual attach all devices into the vPC Domain.
It is good to use LACP for the Port Channels of vPC Member ports.
vPC Spanning Tree Recommendations
Check that the Spanning Tree parameters match across vPC peers in accordance with vPC requirements.
Do not use Bridge Assurance feature on vPC Member ports.
Use Bridge Assurance feature on vPC Peer Link.
Ensure all switches in the Layer 2 domain are using Rapid-PVST to avoid slow STP convergence time.
Configure Portfast on Edge ports, to avoid slow STP convergence.
vPC Layer 3 Connectivity Recommendations
Use separate layer 3 links to connect routers to the vPC Domain.
Enable Layer 3 routing between vPC peers over a separate layer 3 link.
Do not enable routing over vPC for vPC members. In the DCI environment, use HSRP tracking to ensure Layer 3 failover between Data Center.
Do not use Link tracking for HSRP, use extended Object tracking.
Hello, Could you check my config template, I just want to make sure that it makes a domain and works fine, I am about to put it on lot of switches. thanks a lot 5k-1#Config T
5k-1(Config-Fex)#Pinning max-links 1
Hi, Could anyone here please help clarify if I can configure either BIOS of Cisco 12G SAS Raid bios to have a standard SATA hard drive access? I am having a Cisco C220 M4 server with Cisco 12G SAS raid controller...
Hi,The APIC EP tracker does not give results when searched with VM name.FYI: Getting results when searched with same IP address.Has anybody tried this ? The tool tip shows as:e.g., 00:50:56:BD:2E:6C, 10.0.0.1 or 2002:50:22:0:50::1, or comp-vm1APIC ve...
I have 2 x 7009 chassis, each have 2 x SUP1 supervisors (NXOS 6.2(16)), 3 x M108X2-12L, 1 x M148GT-11L line cards and 5 x FAB2 fabric modules. These act as the core switches, with VPCs to downstream Nexus 5500s.I need to replace the modules in each 7009 w...
I have taken the following exams:(300-165)(300-175)(300-180)According to the migration tool, it says that with these 3 approved exams it is enough to have the new ccnp Data Center certification of February 2020. So here my question, I really only need to ...