Cisco N7K-C7010 Configuration Guide - Page 212

Features That You Must Manually Con on the Primary and Secondary Devices, vPC Peer Links and STP

Page 212 highlights

Information About vPCs Chapter 7 Configuring vPCs Send document comments to [email protected] Note We recommend that you use two different modules for redundant on each vPC peer device vPC peer links. The software keeps all traffic that forwards across the vPC peer devices as local traffic. A packet that ingresses the port channel uses one of the local links rather than moving across the vPC peer link. Unknown unicast, multicast, and broadcast traffic (including STP BPDUs) are flooded across the vPC peer link. The software keeps the multicast forwarding state synchronized on both of the vPC peer devices. You can configure any of the standard load-balancing schemes on both the vPC peer link devices and the downstream device (see Chapter 6, "Configuring Port Channels," for information on load balancing). Configuration information flows across the vPC peer links using the Cisco Fabric Service over Ethernet (CFSoE) protocol. (See the "CFSoE" section on page 7-26 for more information about CFSoE.) All MAC addresses for those VLANs configured on both devices are synchronized between vPC peer devices. The software uses CFSoE for this synchronization. (See the "CFSoE" section on page 7-26 for information about CFSoE.) If the vPC peer link fails, the software checks the status of the remote vPC peer device using the peer-keepalive link, which is a link between vPC peer devices that ensures that both devices are up. If the vPC peer device is up, the secondary vPC device disables all vPC ports on its device, to prevent loops and disappearing or flooding traffic. The data then forwards down the remaining active links of the port channel. Note We recommend that you create and configure a separate VRF and configure a Layer 3 port on each vPC peer device in that VRF for the vPC peer-keepalive link. The default ports and VRF for the peer-keepalive are the management ports and VRF. The software learns of a vPC peer device failure when the keepalive messages are not returned over the peer-keepalive link. Use a separate link (vPC peer-keepalive link) to send configurable keepalive messages between the vPC peer devices. The keepalive messages on the vPC peer-keepalive link determines whether a failure is on the vPC peer link only or on the vPC peer device. The keepalive messages are used only when all the links in the peer link fail. See the "Peer-Keepalive Link and Messages" section on page 7-11 for information about the keepalive message. Features That You Must Manually Configure on the Primary and Secondary Devices You must manually configure the following features to conform to the primary/secondary mapping of each of the vPC peer devices: • STP root-Configure the primary vPC peer device as the STP primary root device and configure the vPC secondary device to be the STP secondary root device. See the "vPC Peer Links and STP" section on page 7-21 for more information on vPC and STP. - We recommend that you configure the vPC peer link interfaces as STP network ports so that Bridge Assurance is enabled on all vPC peer links - We recommend that you configure Rapid PVST+ so that the primary device is the root for all VLANs and configure MST so that the primary device is the root for all instances. • Layer 3 VLAN network interface-Configure Layer 3 connectivity from each vPC peer device by configuring a VLAN network interface for the same VLAN from both devices. 7-10 Cisco Nexus 7000 Series NX-OS Interfaces Configuration Guide, Release 5.x OL-23435-03

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308

Send document comments to [email protected]
7-10
Cisco Nexus 7000 Series NX-OS Interfaces Configuration Guide, Release 5.x
OL-23435-03
Chapter 7
Configuring vPCs
Information About vPCs
Note
We recommend that you use two different modules for redundant on each vPC peer device vPC peer
links.
The software keeps all traffic that forwards across the vPC peer devices as local traffic. A packet that
ingresses the port channel uses one of the local links rather than moving across the vPC peer link.
Unknown unicast, multicast, and broadcast traffic (including STP BPDUs) are flooded across the vPC
peer link. The software keeps the multicast forwarding state synchronized on both of the vPC peer
devices.
You can configure any of the standard load-balancing schemes on both the vPC peer link devices and the
downstream device (see
Chapter 6, “Configuring Port Channels,”
for information on load balancing).
Configuration information flows across the vPC peer links using the Cisco Fabric Service over Ethernet
(CFSoE) protocol. (See the
“CFSoE” section on page 7-26
for more information about CFSoE.)
All MAC addresses for those VLANs configured on both devices are synchronized between vPC peer
devices. The software uses CFSoE for this synchronization. (See the
“CFSoE” section on page 7-26
for
information about CFSoE.)
If the vPC peer link fails, the software checks the status of the remote vPC peer device using the
peer-keepalive link, which is a link between vPC peer devices that ensures that both devices are up. If
the vPC peer device is up, the secondary vPC device disables all vPC ports on its device, to prevent loops
and disappearing or flooding traffic. The data then forwards down the remaining active links of the port
channel.
Note
We recommend that you create and configure a separate VRF and configure a Layer 3 port on each vPC
peer device in that VRF for the vPC peer-keepalive link. The default ports and VRF for the
peer-keepalive are the management ports and VRF.
The software learns of a vPC peer device failure when the keepalive messages are not returned over the
peer-keepalive link.
Use a separate link (vPC peer-keepalive link) to send configurable keepalive messages between the vPC
peer devices. The keepalive messages on the vPC peer-keepalive link determines whether a failure is on
the vPC peer link only or on the vPC peer device. The keepalive messages are used only when all the
links in the peer link fail. See the
“Peer-Keepalive Link and Messages” section on page 7-11
for
information about the keepalive message.
Features That You Must Manually Configure on the Primary and Secondary Devices
You must manually configure the following features to conform to the primary/secondary mapping of
each of the vPC peer devices:
STP root—Configure the primary vPC peer device as the STP primary root device and configure the
vPC secondary device to be the STP secondary root device. See the
“vPC Peer Links and STP”
section on page 7-21
for more information on vPC and STP.
We recommend that you configure the vPC peer link interfaces as STP network ports so that
Bridge Assurance is enabled on all vPC peer links
We recommend that you configure Rapid PVST+ so that the primary device is the root for all
VLANs and configure MST so that the primary device is the root for all instances.
Layer 3 VLAN network interface—Configure Layer 3 connectivity from each vPC peer device by
configuring a VLAN network interface for the same VLAN from both devices.