a. this is not supported design - ports on FEX are called HIF - means HOST INTERFACE PORT - used for conencting the hosts
b. by default ports on fex towards 3750 will be blocked by bpduguard
c. all traffic fomr FEX will be sent to n5k - and traffic from 3750 will drain port resources on N5K
2. I'm not sure what is BC so cannot give any comments on it.
3. according to the diagram looks like you're going to install n5k in big distance one from each other - please be aware that if you are going to connect each FEX to both N5K - all traffic from FEX will be loadbalanced between both N5K and if one nexus will be far away - this will introduce some undesired delay. Also FCoE adds distance limit for FEX to N5K connection - 300m
4. If each FEX will be connected to both N5K - configuration should be same on both N5K for each single fex.
And portchannel connecting N5K to FEX has to be a VPC port-channel
5. Routing is not supported between N5K and the device connected by VPC to N5K
how do we restrict a router interfaces from directly connected to Some vlans? can any one help me to figureout?the question is Router should not have interfaces directly connected to Vlan 30 and Vlan 40
I've got a one problem. Me and my friend have the same ISP. I checked my External IP address at WhatIsMyIp.com and my friend do it to. And we saw we have the same External IP.So my question is can 2 routers have the same External IP address?If i'm right 2...
LISP Protocol (Location Identifier Separation Protocol)! - The LISP protocol has become a brilliant stardom with the digital transformation that we are now experiencing. - Today we will talk about the LISP protocol and its advantages and method of p...
SD-Access provides automated end-to-end services (such as segmentation, quality of service, and analytics) for user, device, and application traffic. SD-Access automates user policy so organizations can ensure the appropriate access control and applicati...
Purpose: This document shows you how to create a group-based security policy in Cisco DNA Center.
Security policies determine the types of network traffic permitted or denied between scalable groups. Scalable groups are a critical compo...