11-19-2019 02:39 PM
Hi,
I have 2 metro ethernet Layer 2 circuits by 2 different carriers. They fully pass all vlan traffic. When I do a show cdp neighbor command I see the switch on the other side. My question is, is it possible to etherchannel 2 ports over different carries. physically the 2 ports are not connected to each other just logically.
Solved! Go to Solution.
11-21-2019 12:46 AM
bear in mind that if you using provider network, the interface never go down - because your switch port is connected to NTU - this interface always up. (and far go down, you will not notice)
you need to crack with CDP neighbour also an advanced level, just my thought. or create Local VLAN for a different provider. and track them is a good idea. rather rely on hardware interface.
Another case if have access both the side, you can control with IGP. (ex: OSPF)
11-21-2019 04:26 AM
11-21-2019 04:28 AM
11-21-2019 07:43 AM
Thanks for everyones input. I have gotten most of it figured out, the problem now is I am not sure how set my threshold on the ip sla. Here is the current config
track 1 ip sla 1 reachability
delay down 45 up 60
ip sla 1
icmp-echo 10.0.0.1 source-interface Vlan1
ip sla schedule 1 life forever start-time now
ip sla reaction-configuration 1 react timeout threshold-type consecutive 16
ip sla enable reaction-alerts
I am trying to allow for some time before issuing the shutdown port commands. I have tried variuos things. So for example if it does not get a response from 10.0.0.1 x number of seconds then alert. Should I use RTT instead? Hope this makes sense.
11-21-2019 07:58 AM
ip sla 10
icmp-echo 10.0.0.1 source-ip source-interface Vlan1
threshold 400
just it will solve your problem... if threshold is over 400ms, it will be considered down. :)
11-21-2019 08:22 AM
So is there a way to tell it not to alert unless 10.0.0.1 is unreachable for at least 1 minute? or is 60 seconds. I see I can set a time out value as well. Not quite sure the difference.
11-21-2019 08:23 AM
what I am trying to accomplish is if the link is down for just a couple of minutes, I don't want the ports being shutdown etc.
11-21-2019 08:47 AM
Here is what I am attempting to see if it works
ip sla 1
icmp-echo 10.0.0.1 source-interface Vlan1
frequency 180000
timeout 121000
threshold 60000
ip sla schedule 1 life forever start-time now
ip sla reaction-configuration 1 react timeout threshold-type immediate
ip sla enable reaction-alerts
11-21-2019 09:01 AM
correction on the frequency 180 (that is in seconds not milli LOL)
11-21-2019 05:11 PM
As I was reading through the first few responses I was going to mention this but see you figured it out. You can do port channel using two separate service provider layer 2 links. we did it until we ran into this black holing issue. We then moved to doing OSPF with load balancing instead which has worked out great.
11-22-2019 06:09 AM
Larry,
I have limited knowledge of OSPF, but I do no it is a routing protocol. this is layer 2 with some of the same vlans on each side, how do you use OSPF to do load balancing with out creating loop?
11-22-2019 06:19 AM
11-25-2019 04:30 PM - edited 11-25-2019 04:32 PM
In our case our Layer2 WAN services terminated on an ASR. We did layer 3 port-channel. Once we ran into the black holing, I suggested OSPF and we moved to that successfully. If your WAN services terminate on a layer 2 only device then implementing OSPF will be that much more intrusive to get running. That being said, if you do OSPF load balancing across two circuits then of course you have to do routing instead of switching (which sounds like your biggest concern.) If these are the only two circuits between sites then no worries about a loop as OSPF has measures to protect against that.
11-21-2019 09:23 AM
Jaderson,
Went a head and accepted this as a solution, since it is just a matter of fine tuning etc. At this point it switched to IP SLA configuration etc.
Thanks for your help.
11-21-2019 10:00 AM
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: