cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2860
Views
5
Helpful
4
Replies

Portchannel from Nexus 5672UP to C6807-XL VSS suspend

gaigl
Level 3
Level 3

Hello,

 

we've a remote location with 2 Nexus 5672 connected via dark fiber to our core C6807-XL as VSS.

If I connect 2 x 10Gig over the same Fiber to the same Chassis of the VSS, the connection (LACP) is fine, but if I connect crosswise (Nexus A eth1/1 to VSS Ten1/1/1 and Nexus A eth1/2 to VSS Ten2/1/1) for redundancy, the Interface eth1/2 on Nexus A goes to suspend.

On Interface-Stats there are no errors.

 

the Log before this happens:

 

2019 Dec 16 11:34:18 swi-stu2-brz-20 %ETHPORT-5-SPEED: Interface Ethernet1/2, operational speed changed to 10 Gbps
2019 Dec 16 11:34:18 swi-stu2-brz-20 %ETHPORT-5-IF_DUPLEX: Interface Ethernet1/2, operational duplex mode changed to Full
2019 Dec 16 11:34:18 swi-stu2-brz-20 %ETHPORT-5-IF_RX_FLOW_CONTROL: Interface Ethernet1/2, operational Receive Flow Control state changed to off
2019 Dec 16 11:34:18 swi-stu2-brz-20 %ETHPORT-5-IF_TX_FLOW_CONTROL: Interface Ethernet1/2, operational Transmit Flow Control state changed to off
2019 Dec 16 11:34:23 swi-stu2-brz-20 %ETH_PORT_CHANNEL-5-PORT_SUSPENDED: Ethernet1/2: Ethernet1/2 is suspended

I've nothing configured with Flow-Control so should be default.

 

any Idea's

1 Accepted Solution

Accepted Solutions

Looks like you're missing the appropriate "vpc X" configuration under Po20/Po21 from the Nexus perspective.

 

Which one of the two designs below are you trying to achieve (the one on the left would generally be considered best practice since the vPC pair will appear as a single MEC to the VSS pair):

 

Screen Shot 2019-12-17 at 8.05.51 AM.png

 

Essentially, to achieve the design on the left, you would place all the interfaces from both the VSS pair and the Nexus pair in Po20, and under Po20 on the Nexus switches, you issue "vpc 20". If this is a production environment, you'd need a window to execute this change as this will be highly disruptive.

 

If you're trying to achieve the design on the right, then you will have two separate port-channels and two separate vPCs. The config here should be intuitive as well but Im happy to help if it isn't clear. Same caveat as far as scheduling a window for this applies.

 

P.S: See attached vPC/VSS best practices document for detailed information.

 

HTH

- Andrea, CCIE #56739 R&S

View solution in original post

4 Replies 4

Andrea Testino
Cisco Employee
Cisco Employee

Can you share a basic diagram of the two Nexus devices along with the VSS Catalyst pair and labeled interfaces of how they are cross-connected?

 

Then share the following (put it back in the 'broken' state):

 

show run int ex/y < or gx/x.. For both the Nexus and Catalyst
show run int PoX < Where X is the port-channel(s) b/w the devices
show vpc
show port-channel summary < On NX-OS
show etherchannel summary < On IOS
show lacp counters 

Thanks,

- Andrea, CCIE #56739 R&S

Hello Andrea,

 

have a look here:

nexus-suspend.PNG

with this Layout everything is fine but if i patch the ten1/1/9 from C6807 #1 to Nexus B Eth1/1 and vice versa the eth1/2 goes in suspend

 

attached the configs

Looks like you're missing the appropriate "vpc X" configuration under Po20/Po21 from the Nexus perspective.

 

Which one of the two designs below are you trying to achieve (the one on the left would generally be considered best practice since the vPC pair will appear as a single MEC to the VSS pair):

 

Screen Shot 2019-12-17 at 8.05.51 AM.png

 

Essentially, to achieve the design on the left, you would place all the interfaces from both the VSS pair and the Nexus pair in Po20, and under Po20 on the Nexus switches, you issue "vpc 20". If this is a production environment, you'd need a window to execute this change as this will be highly disruptive.

 

If you're trying to achieve the design on the right, then you will have two separate port-channels and two separate vPCs. The config here should be intuitive as well but Im happy to help if it isn't clear. Same caveat as far as scheduling a window for this applies.

 

P.S: See attached vPC/VSS best practices document for detailed information.

 

HTH

- Andrea, CCIE #56739 R&S

hello Andrea,

 

thank's very much.

I planned for the Scenario on the right, but when I configured po20 with vpc 20 I got under "show vpc" the error, that the endpoints of the members are on different devices (don't know exactly the message), so I removed the vpc-config.

 

So I think I've got to configure an MEC on the VSS, never heard about, so I will read the docs.

 

thank you and a fine christmas

 

Karl

 

Review Cisco Networking for a $25 gift card