b Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide
b Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide
6.x
First Published: 2013-12-23
Last Modified: 2022-02-08
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS REFERENCED IN THIS DOCUMENTATION ARE SUBJECT TO CHANGE WITHOUT NOTICE.
EXCEPT AS MAY OTHERWISE BE AGREED BY CISCO IN WRITING, ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS DOCUMENTATION ARE
PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED.
The Cisco End User License Agreement and any supplemental license terms govern your use of any Cisco software, including this product documentation, and are located at:
http://www.cisco.com/go/softwareterms.Cisco product warranty information is available at http://www.cisco.com/go/warranty. US Federal Communications Commission Notices are found
here http://www.cisco.com/c/en/us/products/us-fcc-notice.html.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any products and features described herein as in development or available at a future date remain in varying stages of development and will be offered on a when-and if-available basis. Any
such product or feature roadmaps are subject to change at the sole discretion of Cisco and Cisco will have no liability for delay in the delivery or failure to deliver any products or feature
roadmap items that may be set forth in this document.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based
on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language
that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com
go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any
other company. (1721R)
© 2013 - 2015–2022 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 2 Overview 3
Licensing Requirements 3
About Interfaces 3
Ethernet Interfaces 4
Access Ports 4
Routed Ports 4
Management Interface 4
Port-Channel Interfaces 4
Subinterfaces 4
Loopback Interfaces 4
Breakout Interfaces 5
Module Level Breakout 5
About the Lane Selector 5
Notes About Breakout Interfaces 5
Virtual Device Contexts 8
High Availability for Interfaces 8
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
iii
Contents
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
iv
Contents
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
v
Contents
About BFD 87
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
vi
Contents
Asynchronous Mode 87
BFD Detection of Failures 88
Distributed Operation 89
BFD Echo Function 89
Security 89
High Availability 89
Virtualization Support 89
Prerequisites for BFD 89
Guidelines and Limitations 90
Default Settings 92
Configuring BFD 92
Configuration Hierarchy 92
Task Flow for Configuring BFD 92
Enabling the BFD Feature 93
Configuring Global BFD Parameters 94
Configuring BFD on an Interface 95
Configuring BFD on a Port Channel 96
Configuring the BFD Echo Function 98
Configuring BFD Support for Routing Protocols 99
Configuring BFD on BGP 99
Configuring BFD on EIGRP 100
Configuring BFD on OSPF 102
Configuring BFD on IS-IS 103
Configuring BFD on HSRP 105
Configuring BFD on VRRP 106
Configuring BFD on PIM 107
Configuring BFD on Static Routes 108
Disabling BFD on an Interface 109
Configuring BFD Interoperability 110
Configuring BFD Interoperability in Cisco NX-OS Devices in a Point-to-Point Link 110
Configuring BFD Interoperability in Cisco NX-OS Devices in a Switch Virtual Interface 111
Configuring BFD Interoperability in Cisco NX-OS Devices in Logical Mode 112
Verifying BFD Interoperability in a Cisco Nexus 9000 Series Device 113
Verifying the BFD Configuration 114
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
vii
Contents
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
viii
Contents
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
ix
Contents
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
x
Contents
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
xi
Contents
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
xii
Preface
This preface includes the following sections:
• Audience, on page xiii
• Document Conventions, on page xiii
• Related Documentation for Cisco Nexus 9000 Series Switches, on page xiv
• Documentation Feedback, on page xiv
• Communications, Services, and Additional Information, on page xiv
Audience
This publication is for network administrators who install, configure, and maintain Cisco Nexus switches.
Document Conventions
Command descriptions use the following conventions:
Convention Description
bold Bold text indicates the commands and keywords that you enter literally
as shown.
Italic Italic text indicates arguments for which you supply the values.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
xiii
Preface
Related Documentation for Cisco Nexus 9000 Series Switches
Convention Description
variable Indicates a variable for which you supply values, in context where italics
cannot be used.
string A nonquoted set of characters. Do not use quotation marks around the
string or the string includes the quotation marks.
Convention Description
screen font Terminal sessions and information the switch displays are in screen font.
boldface screen font Information that you must enter is in boldface screen font.
italic screen font Arguments for which you supply values are in italic screen font.
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to [email protected]. We appreciate your feedback.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
xiv
Preface
Preface
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
xv
Preface
Preface
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
xvi
CHAPTER 1
New and Changed Information
This chapter provides release-specific information for each new and changed feature in the Cisco Nexus 9000
Series NX-OS Interfaces Configuration Guide.
• New and Changed Information, on page 1
vPC forklift upgrade support Support for upgrading from a 6.1(2)I3(4) vPC Forklift Upgrade Scenario
pair of Nexus 9000 switches in
a vPC topology to a different
pair of Nexus 9000 series
switches.
IP-in-IP tunnel support Enables encapsulation and 6.1(2)I3(4) Point-to-Point IP-in-IP Tunnel
decapsulation of packets to Encapsulation and
create a tunnel. Decapsulation
Subinterface support on Support for one or more 6.1(2)I3(3) Configuring Layer 3 Interfaces,
port-channel interfaces subinterfaces on a port-channel on page 71
interface.
GRE support for IP tunnels Support for the GRE carrier 6.1(2)I3(2) Configuring IP Tunnels, on
protocol to enable IP tunnels to page 229
enable IPV4 transport between
two devices.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
1
New and Changed Information
New and Changed Information
Cisco Nexus 9300 subinterface Added support of Cisco Nexus 6.1(2)I3(1) Configuring Layer 3 Interfaces,
support 9300 subinterface support. on page 71
(Removed restriction of no
subinterface support for Cisco
Nexus 9300 platforms.)
FEX support Added Cisco Nexus 2000 6.1(2)I2(3) Configuring vPCs, on page 161
Fabric Extender(FEX) support.
Cisco QSFP+ to SFP+ Added the Cisco QSFP+ to 6.1(2)I2(2) Configuring Basic Interface
SFP+ Adapter (QSA) module Parameters, on page 9
Adapter (QSA) module
feature to provide 40G to 10G
conversion support.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
2
CHAPTER 2
Overview
• Licensing Requirements, on page 3
• About Interfaces, on page 3
• Virtual Device Contexts, on page 8
• High Availability for Interfaces, on page 8
Licensing Requirements
For a complete explanation of Cisco NX-OS licensing recommendations and how to obtain and apply licenses,
see the Cisco NX-OS Licensing Guide and the Cisco NX-OS Licensing Options Guide.
About Interfaces
Cisco NX-OS supports multiple configuration parameters for each of the interface types supported. Most of
these parameters are covered in this guide but some are described in other documents.
The following table shows where to get further information on the parameters you can configure for an
interface.
Layer 3 Bandwidth, delay, IP routing, VRFs Cisco Nexus 9000 Series NX-OS
Unicast Routing Configuration
Guide
Cisco Nexus 9000 Series NX-OS
Multicast Routing Configuration
Guide
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
3
Overview
Ethernet Interfaces
Ethernet Interfaces
• Ethernet interfaces include routed ports.
Access Ports
An access port carries traffic for one VLAN. This type of port is a Layer 2 interface only.
For more information on access ports, see the “Information About Access and Trunk Interfaces” section.
Routed Ports
A routed port is a physical port that can route IP traffic to another device. A routed port is a Layer 3 interface
only.
For more information on routed ports, see the “Routed Interfaces” section.
Management Interface
You can use the management Ethernet interface to connect the device to a network for remote management
using a Telnet client, the Simple Network Management Protocol (SNMP), or other management agents. The
management port (mgmt0) is autosensing and operates in full-duplex mode at a speed of 10/100/1000 Mb/s.
For more information on the management interface, see the Cisco Nexus 9000 Series NX-OS Fundamentals
Configuration Guide.
Port-Channel Interfaces
A port channel is a logical interface that is an aggregation of multiple physical interfaces. You can bundle up
to 32 individual links (physical ports) into a port channel to improve bandwidth and redundancy. For more
information about port-channel interfaces, see the “Configuring Port Channels” section.
Subinterfaces
You can create virtual subinterfaces using a parent interface configured as a Layer 3 interface. A parent
interface can be either a physical port or a port-channel. A parent interface can be a physical port. Subinterfaces
divide the parent interface into two or more virtual interfaces on which you can assign unique Layer 3
parameters such as IP addresses and dynamic routing protocols.
Loopback Interfaces
A loopback interface is a virtual interface with a single endpoint that is always up. Any packet that is transmitted
over a virtual loopback interface is immediately received by that interface. Loopback interfaces emulate a
physical interface. For more information about subinterfaces, see the “Loopback Interfaces” section.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
4
Overview
Breakout Interfaces
Breakout Interfaces
Cisco NX-OS supports the breakout of a high bandwidth interface into one or more low bandwidth interfaces
at the module level or at the per-port level.
The no interface breakout module module_number command undoes the breakout configuration. It puts all
interfaces of the module in 40G mode and deletes the configuration for the previous 10G interfaces.
Note A 10G breakout port's LED blinks when the beacon feature has been configured for it.
Note When a port is configured to be in 10G breakout mode and no lane is selected, the 40G port's LED illuminates
as green even though only one of the 10G breakout ports is up.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
5
Overview
Caveats
Caveats
• As of Cisco NX-OS Release 7.0(3)I7(2), manual breakout of QSA ports is not supported.
Manual breakout is supported on the following platforms because auto-breakout does not happen
successfully on them—N9K-C93128TX, N9K-9332, N9K-C9396PX, N9K-C9396TX, N9K-C9372PX,
N9K-C9372TX, N9K-C9332PQ, N9K-C93120TX, N9K-9432PQ, N9K-9536PQ, N9K-9636PQ,
N9K-X9632PC-QSFP100, N9K-X9432C-S, N3K-C3132Q-V, N3K-C3164Q, N3K-C3132C,
N3K-C3232C, N3K-C3264Q, N3K-C3264C, N3K-3064Q, N3K-3016, N3K-3172.
You need to perform manual breakout using "interface breakout module <module number> port <port
range> map <breakout mapping>" command.
• When a break-out port is configured as a part of a port-channel, you need to apply the configuration
twice (after write-erase/reload), to ensure the effectiveness of the port-channel.
• When you upgrade a Cisco Nexus 9000 device to Cisco NX-OS Release 7.0(3)I7(2) or later releases, if
a QSFP port is configured with the manual breakout command and is using a QSA, the configuration of
the interface Ethernet 1/50/1 is no longer supported and will need to be removed. To restore the
configuration, you must manually configure the Ethernet 1/50 on the device.
This behaviour is not applicable to the following platforms—N9K-C93128TX, N9K-9332, N9K-C9396PX,
N9K-C9396TX, N9K-C9372PX, N9K-C9372TX, N9K-C9332PQ, N9K-C93120TX, N9K-9432PQ,
N9K-9536PQ, N9K-9636PQ, N9K-X9632PC-QSFP100, N9K-X9432C-S, N3K-C3132Q-V, N3K-C3164Q,
N3K-C3132C, N3K-C3232C, N3K-C3264Q, N3K-C3264C, N3K-3064Q, N3K-3016, N3K-3172—because
manual breakout is supported on these platforms.
• Beginning with Cisco NX-OS Release 7.0(3)I7(3) you see two additional options to configure FEC such
as rs-cons16 and rs-ieee as per IEEE standards.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
6
Overview
Cisco Nexus 9000 C93180LC-EX Switch
• 1 Gigabit and 10 Gigabit QSA is supported on ports 29, 30, 31, and 32. However, QSAs on the top
and bottom front panel ports must be of same speed.
• Ports 29, 30, 31, and 32 support 10x4, 25x4, and 50x2 breakout.
• Mode 3: 18 x 40G/100G
• Hardware profile portmode 18x100g.
• 10x4, 25x4, and 50x2 breakout is supported on top ports from 1 to 27 (ports 1,3,5, 7...27) and on
ports 29,30,31,32.
• 1 Gigabit and 10 Gigabit QSA is supported on all the 18 ports.
Changing Mode 3 to any other mode or vice versa requires copy running-config startup-config command
followed by reload command to take effect. However, moving between Modes 1 and 2 is dynamic and
requires only copy running-config startup-config command.
Use the show running-config | grep portmode command to display the current operation mode.
Example:
With the Cisco Nexus C93180LC-EX switch, there are three breakout modes:
• 40G to 4x10G breakout ports
• Enables the breakout of 40G ports into 4 X 10G ports.
• Use the interface breakout module 1 port x map 10g-4x command.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
7
Overview
Virtual Device Contexts
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
8
CHAPTER 3
Configuring Basic Interface Parameters
This chapter describes how to configure the basic interface parameters on Cisco NX-OS devices.
• About the Basic Interface Parameters, on page 9
• Guidelines and Limitations, on page 16
• Default Settings, on page 17
• Configuring the Basic Interface Parameters, on page 18
• Verifying the Basic Interface Parameters, on page 39
• Monitoring the Interface Counters, on page 39
• Configuration Example for QSA, on page 41
Beacon
The beacon mode allows you to identify a physical port by flashing its link state LED with a green light. By
default, this mode is disabled. To identify the physical port for an interface, you can activate the beacon
parameter for the interface.
For information about configuring the beacon parameter, see the “Configuring the Beacon Mode” section.
Error Disabled
A port is in the error-disabled (err-disabled) state when the port is enabled administratively (using the no
shutdown command) but disabled at runtime by any process. For example, if UDLD detects a unidirectional
link, the port is shut down at runtime. However, because the port is administratively enabled, the port status
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
9
Configuring Basic Interface Parameters
Interface Status Error Policy
displays as err-disable. Once a port goes into the err-disable state, you must manually reenable it or you can
configure a timeout value that provides an automatic recovery. By default, the automatic recovery is not
configured, and by default, the err-disable detection is enabled for all causes.
When an interface is in the err-disabled state, use the errdisable detect cause command to find information
about the error.
You can configure the automatic error-disabled recovery timeout for a particular error-disabled cause and
configure the recovery period.
The errdisable recovery cause command provides an automatic recovery after 300 seconds.
You can use the errdisable recovery interval command to change the recovery period within a range of 30
to 65535 seconds. You can also configure the recovery timeout for a particular err-disable cause.
If you do not enable the error-disabled recovery for the cause, the interface stays in the error-disabled state
until you enter the shutdown and no shutdown commands. If the recovery is enabled for a cause, the interface
is brought out of the error-disabled state and allowed to retry operation once all the causes have timed out.
Use the show interface status err-disabled command to display the reason behind the error.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
10
Configuring Basic Interface Parameters
Modifying Interface MTU Size
Note You can change the system jumbo MTU size. When the value is changed, the Layer 2 interfaces that use the
system jumbo MTU value, will automatically changes to the new system jumbo MTU value.
A Layer 3 interface, can be Layer 3 physical interface (configure with no switchport), switch virtual interface
(SVI), and sub-interface, you can configure an MTU size between 576 and 9216 bytes.
For the Cisco Nexus 9372 switch, the following applies:
• The 10-G interfaces are mapped to specific hardware ports where the default MTU is 1500.
• The 40-G interfaces are mapped as a HiGiG port where the default MTU is 3FFF and the MTU limit
check is disabled.
• In the case of 40-G interfaces, since the MTU limit check is disabled, it ignores the packet size and traffic
flows irrespective of its MTU.
• When the configured MTU of all interfaces on the switch do not match, the switch's behavior may vary
depending on the specific port that is mismatched as well as the traffic flow. The following are examples
of the switch's behavior in various scenarios:
• When a Layer 3 port receives a frame whose length exceeds the port's MTU size, the port will drop
the frame.
• When a Layer 3 port receives a frame whose length is less than the ingress port's MTU size, but
greater than the egress Layer 3 port's MTU size, then the frame is punted to the supervisor of the
switch.
1. If the frame is an IP packet that has the Don't Fragment (DF) bit set, then the frame will be
dropped in software. Otherwise, the frame will be fragmented in software.
2. Otherwise, the frame will be fragmented in software.
3. This can cause performance issues (such as increased latency or packet loss for affected traffic
flows) due to Control Plane Policing (CoPP) enabled by default on Cisco Nexus switches. For
more information about Control Plane Policing, refer to the Configuring Control Plane Policing
chapter of the Cisco Nexus 9000 Series NX-OS Security Configuration Guide.
• When a Layer 2 port receives a frame whose length exceeds the port's MTU size, the port will drop
the frame.
• When a Layer 2 port receives a frame whose length is less than the ingress port's MTU size, but
greater than the egress Layer 2 port's MTU size, and the frame is routed between VLANs by the
switch, then the frame is punted to the supervisor of the switch.
1. If the frame is an IP packet that has the Don't Fragment (DF) bit set, then the frame will be
dropped in software. Otherwise, the frame will be fragmented in software.
2. Otherwise, the frame will be fragmented in software.
3. This can cause performance issues (such as increased latency or packet loss for affected traffic
flows) due to Control Plane Policing (CoPP) enabled by default on Cisco Nexus switches. For
more information about Control Plane Policing, refer to the Configuring Control Plane Policing
chapter of the Cisco Nexus 9000 Series NX-OS Security Configuration Guide.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
11
Configuring Basic Interface Parameters
Bandwidth
• When a Layer 2 port receives a frame whose length is less than the ingress port's MTU size, but
greater than the egress Layer 2 port's MTU size, and the frame is switched within the same VLAN
by the switch, then the switch will drop the frame.
For information about setting the MTU size, see the Configuring the MTU Size section.
Note On Cisco Nexus 9300-FX2 and 9300-GX devices, if ingress interface is configured with an MTU less than
9216, FTE does not capture input errors and does not display any events. However, if the ingress interface is
configured with an MTU of 9216, FTE displays all the events.
Bandwidth
Ethernet ports have a fixed bandwidth of 1,000,000 Kb at the physical layer. Layer 3 protocols use a bandwidth
value that you can set for calculating their internal metrics. The value that you set is used for informational
purposes only by the Layer 3 protocols—it does not change the fixed bandwidth at the physical layer. For
example, the Enhanced Interior Gateway Routing Protocol (EIGRP) uses the minimum path bandwidth to
determine a routing metric, but the bandwidth at the physical layer remains at 1,000,000 Kb.
For information about configuring the bandwidth parameter for port-channel interfaces, see the “Configuring
the Bandwidth and Delay for Informational Purposes” section. For information about configuring the bandwidth
parameter for other interfaces, see the “Configuring the Bandwidth” section.
Throughput Delay
Specifying a value for the throughput-delay parameter provides a value used by Layer 3 protocols; it does not
change the actual throughput delay of an interface. The Layer 3 protocols can use this value to make operating
decisions. For example, the Enhanced Interior Gateway Routing Protocol (EIGRP) can use the delay setting
to set a preference for one Ethernet link over another, if other parameters such as link speed are equal. The
delay value that you set is in the tens of microseconds.
For information about configuring the bandwidth parameter for port-channel interfaces, see the “Configuring
the Bandwidth and Delay for Informational Purposes” section. For information about configuring the
throughput-delay parameter for other interfaces, see the “Configuring the Throughput Delay” section.
Administrative Status
The administrative-status parameter determines whether an interface is up or down. When an interface is
administratively down, it is disabled and unable to transmit data. When an interface is administratively up, it
is enabled and able to transmit data.
For information about configuring the administrative status parameter for port-channel interfaces, see the
“Shutting Down and Restarting the Port-Channel Interface” section. For information about configuring the
administrative-status parameter for other interfaces, see the “Shutting Down and Activating the Interface”
section.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
12
Configuring Basic Interface Parameters
Unidirectional Link Detection Parameter
Note By default, UDLD is locally disabled on copper LAN ports to avoid sending unnecessary control traffic on
this type of media.
The figure shows an example of a unidirectional link condition. Device B successfully receives traffic from
device A on the port. However, device A does not receive traffic from device B on the same port. UDLD
detects the problem and disables the port.
Figure 1: Unidirectional Link
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
13
Configuring Basic Interface Parameters
Default UDLD Configuration
UDLD per-port enable state for fiber-optic media Enabled on all Ethernet fiber-optic LAN ports
UDLD per-port enable state for twisted-pair (copper) Disabled on all Ethernet 10/100 and 1000BASE-TX
media LAN ports
For information about configuring the UDLD for the device and its port, see the “Configuring the UDLD
Mode” section.
By default, UDLD aggressive mode is disabled. You can configure UDLD aggressive mode only on
point-to-point links between network devices that support UDLD aggressive mode.
If UDLD aggressive mode is enabled, when a port on a bidirectional link that has a UDLD neighbor relationship
established stops receiving UDLD frame, UDLD tries to re-establish the connection with the neighbor. After
eight failed retries, the port is disabled.
In the following scenarios, enabling the UDLD aggressive mode disables one of the ports to prevent the
discarding of traffic.
• One side of a link has a port stuck (both transmission and receive)
• One side of a link remains up while the other side of the link is down
Note You enable the UDLD aggressive mode globally to enable that mode on all the fiber ports. You must enable
the UDLD aggressive mode on copper ports on specified interfaces.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
14
Configuring Basic Interface Parameters
Port-Channel Parameters
Tip When a line card upgrade is being performed during an in-service software upgrade (ISSU) and some of the
ports on the line card are members of a Layer 2 port channel and are configured with UDLD aggressive mode,
if you shut down one of the remote ports, UDLD puts the corresponding port on the local device into an
error-disabled state. This behavior is correct.
To restore service after the ISSU has completed, enter the shutdown command followed by the no shutdown
command on the local port.
Port-Channel Parameters
A port channel is an aggregation of physical interfaces that comprise a logical interface. You can bundle up
to 32 individual interfaces into a port channel to provide increased bandwidth and redundancy. Port channeling
also load balances traffic across these physical interfaces. The port channel stays operational if at least one
physical interface within the port channel is operational.
You can create Layer 3 port channels by bundling compatible Layer 3 interfaces.
Any configuration changes that you apply to the port channel are applied to each interface member of that
port channel.
For information about port channels and for information about configuring port channels, see Chapter 6,
“Configuring Port Channels.”
Use the speed-group 10000 command to configure the first port of a port speed group for the QSA. This
command specifies the administrator speed preference for the port group. (The default port speed is 40G.)
• The speed-group 10000 command specifies a speed of 10G.
• The no speed-group 10000 command specifies a speed of 40G.
After the speed has been configured, the compatible transceiver modules are enabled. The remaining transceiver
modules in the port group (incompatible transceiver modules) become error disabled with a reason of "check
speed-group config".
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
15
Configuring Basic Interface Parameters
25G Autonegotiation Overview
Note The Cisco QSFP+ to SFP+ Adapter (QSA) module does not provide 10G support for the 40G line cards for
Cisco Nexus 9500 devices.
Note The device cannot automatically negotiate the Ethernet port speed and duplex
mode if the connecting port is configured to a value other than auto.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
16
Configuring Basic Interface Parameters
Default Settings
Caution Changing the Ethernet port speed and duplex mode configuration might shut
down and reenable the interface.
• For BASE-T copper ports, auto-negotiation is enabled even when fixed speed is configured.
• The port profile feature is not supported.
• Auto-negotiation is not supported on 25-Gigabit Ethernet Transceiver Modules on Cisco Nexus 9200
and 9300-EX platform switches; and Cisco Nexus 9500 platform switches that uses N9K-X9700-EX
line cards.
• When using a QSFP-40G-CR4 on Cisco Nexus 9000 switches, you must configure the default speed as
40G in the auto-negotiation parameters. Otherwise, the interface may not be able to bring the link up.
• The following line cards do not support Link Training:
Nexus 9300 Modules:
• N9K-M12PQ (C9396PX, C9396TX, C93128PX, C93128TX)
• If cable length is more than 5 meters, Auto Negotiation is not supported. This cable length limitation is
applicable only to copper cables and not applicable to optical cables.
Default Settings
The following lists the default settings for the basic interface parameters.
Parameter Default
Description Blank
Beacon Disabled
UDLD per-port enable state for fiber-optic media Enabled on all Ethernet fiber-optic LAN ports
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
17
Configuring Basic Interface Parameters
Configuring the Basic Interface Parameters
Parameter Default
UDLD per-port enable state for copper media Disabled on all Ethernet 1G, 10G, or 40G LAN ports
Buffer-boost Enabled
Note Feature available on N9K-X9564TX and
N9K-X9564PX line cards and Cisco
Nexus 9300 series devices.
The interface range configuration mode allows you to configure multiple interfaces with the same configuration
parameters. After you enter the interface range configuration mode, all command parameters you enter are
attributed to all interfaces within that range until you exit out of the interface range configuration mode.
You enter a range of interfaces using dashes (-) and commas (,). Dashes separate contiguous interfaces and
commas separate noncontiguous interfaces. When you enter noncontiguous interfaces, you must enter the
media type for each interface.
This example shows how to configure a contiguous interface range:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
18
Configuring Basic Interface Parameters
Specifying the Interfaces to Configure
You can specify subinterfaces in a range only when the subinterfaces are on the same port, for example,
2/29.1-2. But you cannot specify the subinterfaces in a range of ports, for example, you cannot enter
2/29.2-2/30.2. You can specify two of the subinterfaces discretely, for example, you can enter 2/29.2, 2/30.2.
This example shows how to configure a a breakout cable:
switch(config)# interface ethernet 1/2/1
switch(config-if-range)#
SUMMARY STEPS
1. configure terminal
2. interface interface
DETAILED STEPS
Step 2 interface interface Specifies the interface that you are configuring. You can
specify the interface type and identity. For an Ethernet port,
Example:
use ethernet slot/port. For the management interface, use
switch(config)# interface ethernet 2/1 mgmt0.
switch(config-if)#
Examples:
Example:
switch(config)# interface mgmt0 • The 1st example shows how to specify the slot 2, port
switch(config-if)# 1 Ethernet interface.
• The 2nd example shows how to specify the
management interface.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
19
Configuring Basic Interface Parameters
Configuring the Description
SUMMARY STEPS
1. configure terminal
2. interface interface
3. description text
4. show interface interface
5. exit
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface Specifies the interface that you are configuring. You can
specify the interface type and identity. For an Ethernet port,
Example:
use ethernet slot/port. For the management interface, use
switch(config)# interface ethernet 2/1 mgmt0.
switch(config-if)#
Examples:
Example:
switch(config)# interface mgmt0 • The 1st example shows how to specify the slot 2, port
switch(config-if)# 1 Ethernet interface.
• The 2nd example shows how to specify the
management interface.
Step 4 show interface interface (Optional) Displays the interface status, which includes the
description parameter.
Example:
switch(config)# show interface ethernet 2/1
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
20
Configuring Basic Interface Parameters
Configuring the Beacon Mode
Example
This example shows how to set the interface description to Ethernet port 24 on module 3:
switch# configure terminal
switch(config)# interface ethernet 3/24
switch(config-if)# description server1
switch(config-if)#
The output of the show interface eth command is enhanced as shown in the following example:
SUMMARY STEPS
1. configure terminal
2. interface ethernet slot/port
3. [no] beacon
4. show interface ethernet slot/port
5. exit
6. copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
21
Configuring Basic Interface Parameters
Configuring the Beacon Mode
DETAILED STEPS
Step 2 interface ethernet slot/port Specifies an interface to configure, and enters interface
configuration mode.
Example:
switch(config)# interface ethernet 3/1
switch(config-if)#
Step 3 [no] beacon Enables the beacon mode or disables the beacon mode. The
default mode is disabled.
Example:
switch(config)# beacon
switch(config-if)#
Step 4 show interface ethernet slot/port (Optional) Displays the interface status, which includes the
beacon mode state.
Example:
switch(config)# show interface ethernet 2/1
switch(config-if)#
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to enable the beacon mode for the Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# beacon
switch(config-if)#
This example shows how to disable the beacon mode for the Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# no beacon
switch(config-if)#
This example shows how to configure the dedicated mode for Ethernet port 4/17 in the group that
includes ports 4/17, 4/19, 4/21, and 4/23:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
22
Configuring Basic Interface Parameters
Configuring the Error-Disabled State
SUMMARY STEPS
1. configure terminal
2. errdisable detect cause {acl-exception | all | link-flap | loopback}
3. shutdown
4. no shutdown
5. show interface status err-disabled
6. copy running-config startup-config
DETAILED STEPS
Step 2 errdisable detect cause {acl-exception | all | link-flap | Specifies a condition under which to place the interface in
loopback} an error-disabled state. The default is enabled.
Example:
switch(config)# errdisable detect cause all
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
23
Configuring Basic Interface Parameters
Enabling the Error-Disabled Recovery
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to enable the error-disabled detection in all cases:
switch(config)# errdisable detect cause all
switch(config)#
SUMMARY STEPS
1. configure terminal
2. errdisable recovery cause {all | bpduguard | failed-port-state | link-flap | loopback | miscabling |
psecure-violation | security-violation | storm-control | udld | vpc-peerlink}
3. show interface status err-disabled
4. copy running-config startup-config
DETAILED STEPS
Step 2 errdisable recovery cause {all | bpduguard | Specifies a condition under which the interface
failed-port-state | link-flap | loopback | miscabling | automatically recovers from the error-disabled state, and
psecure-violation | security-violation | storm-control | the device retries bringing the interface up. The device waits
udld | vpc-peerlink} 300 seconds to retry. The default is disabled.
Example:
switch(config)# errdisable recovery cause all
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
24
Configuring Basic Interface Parameters
Configuring the Error-Disabled Recovery Interval
Step 4 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to enable error-disabled recovery under all conditions:
switch(config)# errdisable recovery cause all
switch(config)#
SUMMARY STEPS
1. configure terminal
2. errdisable recovery interval interval
3. show interface status err-disabled
4. copy running-config startup-config
DETAILED STEPS
Step 2 errdisable recovery interval interval Specifies the interval for the interface to recover from the
error-disabled state. The range is from 30 to 65535 seconds,
Example:
and the default is 300 seconds.
switch(config)# errdisable recovery interval 32
switch(config-if)#
Step 3 show interface status err-disabled (Optional) Displays information about error-disabled
interfaces.
Example:
switch(config)# show interface status err-disabled
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
25
Configuring Basic Interface Parameters
Configuring the MTU Size
Example
This example shows how to configure the error-disabled recovery timer to set the interval for recovery
to 32 seconds:
switch(config)# errdisable recovery interval 32
switch(config)#
Note You can change the system jumbo MTU size. When the value is changed, the Layer 2 interfaces that use the
system jumbo MTU value, will automatically changes to the new system jumbo MTU value.
A Layer 3 interface, can be Layer 3 physical interface switch virtual interface (SVI), and subinterface, you
can configure an MTU size between 576–9216 bytes.
SUMMARY STEPS
1. configure terminal
2. interface ethernet slot/port, vlan vlan-id mgmt 0
3. mtu size
4. exit
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
26
Configuring Basic Interface Parameters
Configuring the Interface MTU Size
DETAILED STEPS
Step 2 interface ethernet slot/port, vlan vlan-id mgmt 0 Specifies an Ethernet interface to configure, and enters
interface configuration mode.
Example:
switch(config)# interface ethernet 3/1
switch(config-if)#
switch(config)# interface vlan 100
switch(config-if)#
switch(config)# interface mgmt 0
switch(config-if)#
Example
This example shows how to configure the Layer 2 Ethernet port 3/1 with the default MTU size (1500):
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport
switch(config-if)# mtu 1500
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
27
Configuring Basic Interface Parameters
Configuring the System Jumbo MTU Size
Note To configure jumbo frames for FEX modules, configure the FEX fabric port-channel interface with the required
MTU size for the FEX module.
SUMMARY STEPS
1. configure terminal
2. system jumbomtu size
3. show running-config all
4. interface type slot/port
5. interface type
6. mtu size
7. exit
8. copy running-config startup-config
DETAILED STEPS
Step 2 system jumbomtu size Specifies the system jumbo MTU size. Use an even number
between 1500 and 9216.
Example:
switch(config)# system jumbomtu 8000 Note In general accepted practice, a jumbo frame
switch(config)# is considered to have an MTU size greater
than 9000 bytes.
Step 3 show running-config all (Optional) Displays the current operating configuration,
which includes the system jumbo MTU size.
Example:
switch(config)# show running-config all | include
jumbomtu
Step 4 interface type slot/port Specifies an interface to configure and enters interface
configuration mode.
Example:
switch(config)# interface ethernet 2/1
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
28
Configuring Basic Interface Parameters
Configuring the Bandwidth
Step 6 mtu size For a Layer 2 interface, specifies either the default MTU
size (1500) or the system jumbo MTU size that you
Example:
specified earlier.
switch(config-if)# mtu 1500
switch(config-if)# For a Layer 3 interface, specifies any even size between
576 and 9216.
Step 8 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to configure the system jumbo MTU as 8000 bytes and how to change the
MTU specification for an interface that was configured with the previous jumbo MTU size:
switch# configure terminal
switch(config)# system jumbomtu 8000
switch(config)# show running-config
switch(config)# interface ethernet 2/2
switch(config-if)# switchport
switch(config-if)# mtu 1500
switch(config-if)#
SUMMARY STEPS
1. configure terminal
2. interface ethernet slot/port
3. bandwidth kbps
4. show interface ethernet slot/port
5. exit
6. copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
29
Configuring Basic Interface Parameters
Configuring the Throughput Delay
DETAILED STEPS
Step 2 interface ethernet slot/port Specifies an Ethernet interface to configure, and enters
interface configuration mode.
Example:
switch(config)# interface ethernet 3/1
switch(config-if)#
Step 4 show interface ethernet slot/port (Optional) Displays the interface status, which includes the
bandwidth value.
Example:
switch(config)# show interface ethernet 2/1
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to configure an informational value of 1,000,000 Kb for the Ethernet slot
3, port 1 interface bandwidth parameter:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# bandwidth 1000000
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
30
Configuring Basic Interface Parameters
Configuring the Throughput Delay
SUMMARY STEPS
1. configure terminal
2. interface ethernet slot/port
3. delay value
4. show interface ethernet slot/port
5. exit
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface ethernet slot/port Specifies an Ethernet interface to configure, and enters
interface configuration mode.
Example:
switch(config)# interface ethernet 3/1
switch(config-if)#
Step 3 delay value Specifies the delay time in tens of microseconds. You can
set an informational value range between 1 and 16777215
Example:
tens of microseconds.
switch(config-if)# delay 10000
switch(config-if)#
Step 4 show interface ethernet slot/port (Optional) Displays the interface status, which includes the
throughput-delay time.
Example:
switch(config)# show interface ethernet 3/1
switch(config-if)#
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to configure the throughput-delay time so that one interface is preferred
over another. A lower delay value is preferred over a higher value. In this example, Ethernet 7/48 is
preferred over 7/47. The default delay for 7/48 is less than the configured value on 7/47, which is
set for the highest value (16777215):
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
31
Configuring Basic Interface Parameters
Shutting Down and Activating the Interface
Note You must first ensure the EIGRP feature is enabled by running the feature eigrp command.
SUMMARY STEPS
1. configure terminal
2. interface interface
3. shutdown
4. show interface interface
5. no shutdown
6. show interface interface
7. exit
8. copy running-config startup-config
DETAILED STEPS
Step 2 interface interface Specifies the interface that you are configuring. You can
specify the interface type and identity. For an Ethernet port,
Example:
use ethernet slot/port. For the management interface, use
switch(config)# interface ethernet 2/1 mgmt0.
switch(config-if)#
Examples:
switch(config)# interface mgmt0
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
32
Configuring Basic Interface Parameters
Shutting Down and Activating the Interface
Step 4 show interface interface (Optional) Displays the interface status, which includes the
administrative status.
Example:
switch(config-if)# show interface ethernet 2/1
switch(config-if)#
Step 6 show interface interface (Optional) Displays the interface status, which includes the
administrative status.
Example:
switch(config-if)# show interface ethernet 2/1
switch(config-if)#
Step 8 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to change the administrative status for Ethernet port 3/1 from disabled to
enabled:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# shutdown
switch(config-if)# no shutdown
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
33
Configuring Basic Interface Parameters
Configuring the UDLD Mode
Note If the interface is a copper port, you must use the command enable UDLD to enable the UDLD. If the interface
is a fiber port you need not explicitly enable UDLD on the interface. However if you attempt to enable UDLD
on a fiber port using the enable UDLD command, you may get an error message indicating that is not a valid
command.
The following table lists CLI details to enable and disable UDLD on different interfaces
SUMMARY STEPS
1. configure terminal
2. [no] feature udld
3. udld message-time seconds
4. udld aggressive
5. interface ethernet slot/port
6. udld [enable | disable]
7. show udld [ethernet slot/port | global | neighbors]
8. exit
9. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
34
Configuring Basic Interface Parameters
Configuring the UDLD Mode
Step 3 udld message-time seconds (Optional) Specifies the interval between sending UDLD
messages. The range is from 7 to 90 seconds, and the default
Example:
is 15 seconds.
switch(config)# udld message-time 30
switch(config)#
Step 4 udld aggressive Enables UDLD in aggressive mode by default on all fiber
interfaces. Use the no form to disable aggressive mode
Example:
UDLD on all fibers ports by default.
switch(config)# udld aggressive
switch(config)# Note Use the udld aggressive command to configure
the ports to use a UDLD mode:
• To enable fiber interfaces for the
aggressive mode, enter the udld
aggressive command in the global
command mode and all the fiber
interfaces will be in aggressive UDLD
mode.
• To enable the copper interfaces for the
aggressive mode, you must enter the
udld aggressive command in the
interface mode, specifying each interface
you want in aggressive UDLD mode.
Step 5 interface ethernet slot/port (Optional) Specifies an interface to configure, and enters
interface configuration mode.
Example:
switch(config)# interface ethernet 3/1
switch(config-if)#
Step 6 udld [enable | disable] Enables UDLD in normal mode by default on all fiber
interfaces. Use the no form to disable normal mode UDLD
Example:
on all fibers ports by default.
switch(config-if)# udld enable
switch(config-if)#
Step 7 show udld [ethernet slot/port | global | neighbors] (Optional) Displays the UDLD status.
Example:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
35
Configuring Basic Interface Parameters
Configuring the UDLD Mode
Step 9 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to enable the UDLD for the device:
switch# configure terminal
switch(config)# feature udld
switch(config)#
This example shows how to set the UDLD message interval to 30 seconds:
switch# configure terminal
switch(config)# feature udld
switch(config)# udld message-time 30
switch(config)#
This example shows how to disable UDLD for Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if-range)# no udld enable
switch(config-if-range)# exit
This example shows how to enable fiber interfaces for the aggressive UDLD mode:
switch# configure terminal
switch(config)# udld aggressive
This example shows how to enable the aggressive UDLD mode for the copper Ethernet interface3/1:
switch# configure terminal
switch(config)# interface ethernet 3
switch(config-if)# udld aggressive
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
36
Configuring Basic Interface Parameters
Configuring Debounce Timers
This example shows how to check if udld aggressive mode is operational for a given interface.
switch# sh udld ethernet 8/2
Interface Ethernet8/2
--------------------------------
Port enable administrative configuration setting: device-default
Port enable operational state: enabled-aggressive
Current bidirectional state: bidirectional
Current operational state: advertisement - Single neighbor detected
Message interval: 15
Timeout interval: 5
<>
Note The link state of 10G and 100G ports may change repeatedly when connected to service provider network.
As a part of link reset or break-link functionality, it is expected that the Tx power light on the SFP to change
to N/A state, at an event of link state change.
However, to prevent this behavior during the link state change, you may increase the link debounce timer to
start from 500ms and increase it in 500ms intervals until the link stabilizes. On the DWDM, UVN, and WAN
network, it is recommended to disable automatic link suspension (ALS) whenever possible. ALS suspends
the link on the WAN when the Nexus turn off the link.
Note The link debounce time and link debounce link-up time commands can only be applied to a physical Ethernet
interface.
Use the show interface debounce command to display the debounce times for all Ethernet ports.
SUMMARY STEPS
1. configure terminal
2. interface ethernet slot/port
3. link debounce time time
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
37
Configuring Basic Interface Parameters
Configuring link mac-up timer
Step 3 link debounce time time Enables the debounce timer for the specified time (1 to 5000
milliseconds).
Example:
switch(config-if)# link debounce time 1000 If you specify 0 milliseconds, the debounce timer is
switch(config-if)# disabled.
Example
• The following example enables the debounce timer and sets the debounce time to 1000
milliseconds for an Ethernet interface:
• The following example disables the debounce timer for an Ethernet interface:
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. link mac-up timer seconds
DETAILED STEPS
Step 2 interface type slot/port Configures an interface and enters interface configuration
mode.
Example:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
38
Configuring Basic Interface Parameters
Verifying the Basic Interface Parameters
Step 3 link mac-up timer seconds Enables modification of the link mac-up timer. The link
mac-up timer range is 0-120.
Example:
switch(config-if)# link mac-up timer 10 Note This should only be done on DWDM links.
Command Purpose
show interface interface Displays the configured states of one or all interfaces.
show udld interface Displays the UDLD status for the current interface or
all interfaces.
show udld global Displays the UDLD status for the current device.
SUMMARY STEPS
1. configure terminal
2. interface ether slot/port
3. load-interval counters [1 | 2 | 3] seconds
4. show interface interface
5. exit
6. copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
39
Configuring Basic Interface Parameters
Displaying Interface Statistics
DETAILED STEPS
Step 3 load-interval counters [1 | 2 | 3] seconds Sets up to three sampling intervals to collect bit-rate and
packet-rate statistics. The default values for each counter
Example:
is as follows:
switch(config)# load-interval counters 1 100
switch(config)# 1—30 seconds (60 seconds for VLAN)
2—300 seconds
3—not configured
Step 4 show interface interface (Optional) Displays the interface status, which includes the
counters.
Example:
switch(config)# show interface ethernet 2/2
switch#
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to set the three sample intervals for the Ethernet port 3/1:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# load-interval counter 1 60
switch(config-if)# load-interval counter 2 135
switch(config-if)# load-interval counter 3 225
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
40
Configuring Basic Interface Parameters
Clearing Interface Counters
SUMMARY STEPS
1. clear counters interface [all | ethernet slot/port | loopback number | mgmt number | port channel
channel-number]
2. show interface interface
3. show interface [ethernet slot/port | port channel channel-number] counters
DETAILED STEPS
Step 3 show interface [ethernet slot/port | port channel (Optional) Displays the interface counters.
channel-number] counters
Example:
switch# show interface ethernet 2/1 counters
switch#
Example
This example shows how to clear the counters on Ethernet port 5/5:
switch# clear counters interface ethernet 5/5
switch#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
41
Configuring Basic Interface Parameters
Configuration Example for QSA
• Using the speed-group [ 10000 | 40000] command to configure port 2/7, all the QSAs in port group
2/7-12 are brought up with a speed of 10G or 40G. If there are any QSFP modules in port group 2/7-12,
they are error disabled.
This example shows how to configure QSA for the first port in the speed group for a Cisco Nexus 9396PX:
switch# conf t
switch(config)# interface ethernet 2/7
switch(config-if)# speed-group 10000
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
42
CHAPTER 4
Configuring Layer 2 Interfaces
This chapter describes how to configure Layer 2 switching ports as access or trunk ports on Cisco NX-OS
devices.
Note See the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide for information about
configuring a SPAN destination interface.
You can configure Layer 2 switching ports as access or trunk ports. Trunks carry the traffic of multiple VLANs
over a single link and allow you to extend VLANs across an entire network. All Layer 2 switching ports
maintain media access control (MAC) address tables.
Note See the Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration Guide for information about
VLANs, MAC address tables, private VLANs, and the Spanning Tree Protocol.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
43
Configuring Layer 2 Interfaces
Information About Access and Trunk Interfaces
Note See the Cisco Nexus 9000 Series NX-OS High Availability and Redundancy Guide for complete information
on high-availability features.
Note The device supports only IEEE 802.1Q-type VLAN trunk encapsulation.
By default, all the ports on Cisco Nexus 9300-EX switches are Layer 3 ports and all the ports on Cisco Nexus
9300 switches are Layer 2 ports.
You can make all ports Layer 2 ports using the setup script or by entering the system default switchport
command. See the Cisco Nexus 9000 Series NX-OS Fundamentals Configuration Guide for information about
using the setup script. To configure the port as a Layer 2 port using the CLI, use the switchport command.
All ports in the same trunk must be in the same VDC, and trunk ports cannot carry VLANs from different
VDCs.
The following figure shows how you can use trunk ports in the network. The trunk port carries traffic for two
or more VLANs.
Figure 2: Trunk and Access Ports and VLAN Traffic
Note See the Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration Guide for information about
VLANs.
In order to correctly deliver the traffic on a trunk port with several VLANs, the device uses the IEEE 802.1Q
encapsulation, or tagging, method (see the “IEEE 802.1Q Encapsulation” section for more information).
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
44
Configuring Layer 2 Interfaces
IEEE 802.1Q Encapsulation
Note See the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide for information about
subinterfaces on Layer 3 interfaces.
To optimize the performance on access ports, you can configure the port as a host port. Once the port is
configured as a host port, it is automatically set as an access port, and channel grouping is disabled. Use the
host designation to decrease the time that it takes the designated port to begin to forward packets.
Only an end station can be set as a host port; you will receive an error message if you attempt to configure
other ports as hosts.
If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that
port drops the packet without learning its MAC source address.
A Layer 2 interface can function as either an access port or a trunk port; it cannot function as both port types
simultaneously.
When you change a Layer 2 interface back to a Layer 3 interface, that interface loses all the Layer 2
configuration and resumes the default VLAN configurations.
Note For information about VLANs, see the Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration
Guide.
A trunk is a point-to-point link between the switch and another networking device. Trunks carry the traffic
of multiple VLANs over a single link and allow you to extend VLANs across an entire network.
To correctly deliver the traffic on a trunk port with several VLANs, the device uses the IEEE 802.1Q
encapsulation, or tagging, method that uses a tag that is inserted into the frame header. This tag carries
information about the specific VLAN to which the frame and packet belong. This method allows packets that
are encapsulated for several different VLANs to traverse the same port and maintain traffic separation between
the VLANs. Also, the encapsulated VLAN tag allows the trunk to move traffic end-to-end through the network
on the same VLAN.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
45
Configuring Layer 2 Interfaces
Access VLANs
Access VLANs
When you configure a port in access mode, you can specify which VLAN will carry the traffic for that interface.
If you do not configure the VLAN for a port in access mode, or an access port, the interface carries traffic for
the default VLAN (VLAN1).
You can change the access port membership in a VLAN by specifying the new VLAN. You must create the
VLAN before you can assign it as an access VLAN for an access port. If you change the access VLAN on an
access port to a VLAN that is not yet created, the system shuts that access port down.
If an access port receives a packet with an 802.1Q tag in the header other than the access VLAN value, that
port drops the packet without learning its MAC source address.
Note Native VLAN ID numbers must match on both ends of the trunk.
The trunk port sends an egressing packet with a VLAN that is equal to the default port VLAN ID as untagged;
all the other egressing packets are tagged by the trunk port. If you do not configure a native VLAN ID, the
trunk port uses the default VLAN.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
46
Configuring Layer 2 Interfaces
Tagging Native VLAN Traffic
Note You cannot use a Fibre Channel over Ethernet (FCoE) VLAN as a native VLAN for an Ethernet trunk
switchport.
Allowed VLANs
By default, a trunk port sends traffic to and receives traffic from all VLANs. All VLAN IDs are allowed on
each trunk. However, you can remove VLANs from this inclusive list to prevent traffic from the specified
VLANs from passing over the trunk. Later, you can add any specific VLANs that you may want the trunk to
carry traffic for back to the list.
To partition the Spanning Tree Protocol (STP) topology for the default VLAN, you can remove VLAN1 from
the list of allowed VLANs. Otherwise, VLAN1, which is enabled on all ports by default, will have a very big
STP topology, which can result in problems during STP convergence. When you remove VLAN1, all data
traffic for VLAN1 on this port is blocked, but the control traffic continues to move on the port.
Note See the Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration Guide for more information about
STP.
Note You can change the block of VLANs reserved for internal use. See the Cisco Nexus 9000 Series NX-OS
Layer 2 Switching Configuration Guide for more information about changing the reserved VLANs.
Default Interfaces
You can use the default interface feature to clear the configured parameters for both physical and logical
interfaces such as the Ethernet, loopback, VLAN network, tunnel, and the port-channel interface.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
47
Configuring Layer 2 Interfaces
Switch Virtual Interface and Autostate Behavior
Note A maximum of eight ports can be selected for the default interface. The default interfaces feature is not
supported for management interfaces because the device could go to an unreachable state.
High Availability
See the Cisco Nexus 9000 Series NX-OS High Availability and Redundancy Guide for complete information
about high availability features.
Virtualization Support
All ports in the same trunk must be in the same VDC, and trunk ports cannot carry VLANs from different
VDCs.
Counter Values
See the following information on the configuration, packet size, incremented counter values, and traffic.
L2 port – without any 6400 and 10000 Jumbo, giant, and input Dropped
MTU configuration error
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
48
Configuring Layer 2 Interfaces
Prerequisites for Layer 2 Interfaces
Layer 3 port with default 6400 Jumbo Packets are punted to the
Layer 3 MTU and jumbo CPU (subjected to CoPP
MTU 9216 in configs), get fragmented,
network-qos configuration and then they are
forwarded by the
software.
Layer 3 port with default 6400 Jumbo Packets are punted to the
Layer 3 MTU and jumbo CPU (subjected to CoPP
MTU 9216 in configs), get fragmented,
network-qos configuration and then they are
forwarded by the
software.
Layer 3 port with default 10000 Jumbo, giant, and input Dropped
Layer 3 MTU and jumbo error
MTU 9216 in
network-qos configuration
Layer 3 port with jumbo 10000 Jumbo, giant, and input Dropped
Layer 3 MTU and jumbo error
MTU 9216 in
network-qos configuration
Layer 3 port with jumbo 6400 and 10000 Jumbo, giant, and input Dropped
Layer 3 MTU and default error
L2 MTU configuration
Note • Under 64 bytes packet with good CRC–The short frame counter increments.
• Under 64 bytes packet with bad CRC–The runts counter increments.
• Greater than 64 bytes packet with bad CRC–The CRC counter increments.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
49
Configuring Layer 2 Interfaces
Guidelines and Limitations for Layer 2 Interfaces
• You must configure the port as a Layer 2 port before you can use the switchport mode command. By
default, all ports on the device are Layer 3 ports. By default, all ports on the Cisco Nexus 9504 and Cisco
Nexus 9508 devices are Layer 2 ports.
Note Peer speed must be set when using copper cables on these ports.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
50
Configuring Layer 2 Interfaces
Guidelines and Limitations for Layer 2 Interfaces
The caveats with the CLI that is executed on the switches are:
• L2 frames that egress out of the trunk ports are tagged even on the native VLAN on the port.
• Any other tunneling mechanism, for example, VXLAN and MPLS does not work with the CLI
configured.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
51
Configuring Layer 2 Interfaces
Default Settings for Layer 2 Interfaces
that setting to all ports in the group, such as the allowed VLANs and the trunk status. For example, if
one port in a port group ceases to be a trunk, all ports cease to be trunks.
• If you try to enable 802.1X on a trunk port, an error message appears, and 802.1X is not enabled. If you
try to change the mode of an 802.1X-enabled port to trunk, the port mode is not changed.
• Only ingress unicast packet counters are supported for SVI counters.
• When MAC addresses are cleared on a VLAN with the clear mac address-table dynamic command, the
dynamic ARP (Address Resolution Protocol) entries on that VLAN are refreshed.
• If a static ARP entry exists on the VLAN and no MAC address to port mapping is present, the supervisor
may generate an ARP request to learn the MAC address. Upon learning the MAC address, the adjacency
entry points to the correct physical port.
• Cisco NX-OS does not support transparent bridging between two VLANs when one of the SVIs is on
the Cisco Nexus 9000 using the BIA MAC (burned-in MAC address). This occurs when the BIA MAC
is shared between SVIs/VLANs. A MAC, different from the BIA MAC, can be configured under the
SVI for transparent bridging to work properly.
Note This behavior is applicable to Cisco Nexus 9300 Switches (Network Forwarding
Engine) and Cisco Nexus 9500 Switches with 95xx,96xx,94xx line cards. This
behavior is not applicable to Cisco Nexus 9200 Switches, Cisco Nexus 9300-EX
and Cisco Nexus 9500 Switches with 9700-EX line cards.
Parameters Default
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
52
Configuring Layer 2 Interfaces
Configuring Access and Trunk Interfaces
Parameters Default
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might
differ from the Cisco IOS commands that you would use.
SUMMARY STEPS
1. configure terminal
2. interface ethernet {{type slot/port} | {port-channel number}}
3. switchport mode [access | trunk]
4. switchport access vlan vlan-id
5. exit
6. show interface
7. no shutdown
8. copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
53
Configuring Layer 2 Interfaces
Configuring a VLAN Interface as a Layer 2 Access Port
DETAILED STEPS
Step 2 interface ethernet {{type slot/port} | {port-channel Specifies an interface to configure, and enters interface
number}} configuration mode.
Example:
switch(config)# interface ethernet 3/1
switch(config-if)#
Step 3 switchport mode [access | trunk] Sets the interface as a nontrunking nontagged, single-VLAN
Layer 2 interface. An access port can carry traffic in one
Example:
VLAN only. By default, an access port carries traffic for
switch(config-if)# switchport mode access VLAN1; to set the access port to carry traffic for a different
VLAN, use the switchport access vlan command.
Step 4 switchport access vlan vlan-id Specifies the VLAN for which this access port will carry
traffic. If you do not enter this command, the access port
Example:
carries traffic on VLAN1 only; use this command to change
switch(config-if)# switchport access vlan 5 the VLAN for which the access port carries traffic.
Step 6 show interface (Optional) Displays the interface status and information.
Example:
switch# show interface
Step 7 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Step 8 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
54
Configuring Layer 2 Interfaces
Configuring Access Host Ports
Example
This example shows how to set Ethernet 3/1 as a Layer 2 access port that carries traffic for VLAN
5 only:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport mode access
switch(config-if)# switchport access vlan 5
switch(config-if)#
Note You should apply the switchport host command only to interfaces that are connected to an end station.
You can optimize the performance of access ports that are connected to end stations by simultaneously setting
that port as an access port. An access host port handles the STP like an edge port and immediately moves to
the forwarding state without passing through the blocking and learning states. Configuring an interface as an
access host port also disables port channeling on that interface.
Note See “Configuring Port Channels” section and the Cisco Nexus 9000 Series NX-OS Layer 2 Switching
Configuration Guide for information about port-channel interfaces
SUMMARY STEPS
1. configure terminal
2. interface ethernet type slot/port
3. switchport host
4. exit
5. show interface
6. no shutdown
7. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
55
Configuring Layer 2 Interfaces
Configuring Trunk Ports
Step 3 switchport host Sets the interface to be an access host port, which
immediately moves to the spanning tree forwarding state
Example:
and disables port channeling on this interface.
switch(config-if)# switchport host
Note Apply this command only to end stations.
Step 5 show interface (Optional) Displays the interface status and information.
Example:
switch# show interface
Step 6 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to set Ethernet 3/1 as a Layer 2 access port with PortFast enabled and port
channel disabled:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport host
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
56
Configuring Layer 2 Interfaces
Configuring Trunk Ports
SUMMARY STEPS
1. configure terminal
2. interface {type slot/port | port-channel number}
3. switchport mode [access | trunk]
4. exit
5. show interface
6. no shutdown
7. copy running-config startup-config
DETAILED STEPS
Step 2 interface {type slot/port | port-channel number} Specifies an interface to configure, and enters interface
configuration mode.
Example:
switch(config)# interface ethernet 3/1
switch(config-if)#
Step 3 switchport mode [access | trunk] Sets the interface as a Layer 2 trunk port. A trunk port can
carry traffic in one or more VLANs on the same physical
Example:
link (VLANs are based on the trunk-allowed VLANs list).
switch(config-if)# switchport mode trunk By default, a trunk interface can carry traffic for all VLANs.
To specify that only certain VLANs are allowed on the
specified trunk, use the switchport trunk allowed vlan
command.
Step 5 show interface (Optional) Displays the interface status and information.
Example:
switch# show interface
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
57
Configuring Layer 2 Interfaces
Configuring the Native VLAN for 802.1Q Trunking Ports
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to set Ethernet 3/1 as a Layer 2 trunk port:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport mode trunk
switch(config-if)#
Note You cannot configure an FCoE VLAN as a native VLAN for an Ethernet interface.
SUMMARY STEPS
1. configure terminal
2. interface {{type slot/port} | {port-channel number}}
3. switchport trunk native vlan vlan-id
4. exit
5. show vlan
6. no shutdown
7. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
58
Configuring Layer 2 Interfaces
Configuring the Allowed VLANs for Trunking Ports
Step 3 switchport trunk native vlan vlan-id Sets the native VLAN for the 802.1Q trunk. Valid values
are from 1 to 4094, except those VLANs reserved for
Example:
internal use. The default value is VLAN1.
switch(config-if)# switchport trunk native vlan 5
Step 5 show vlan (Optional) Displays the status and information of VLANs.
Example:
switch# show vlan
Step 6 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to set the native VLAN for the Ethernet 3/1, Layer 2 trunk port to VLAN
5:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport trunk native vlan 5
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
59
Configuring Layer 2 Interfaces
Configuring the Allowed VLANs for Trunking Ports
Note The switchport trunk allowed vlan vlan-list command replaces the current VLAN list on the specified port
with the new list. You are prompted for confirmation before the new list is applied.
If you are doing a copy and paste of a large configuration, you might see some failures because the CLI is
waiting for a confirmation before accepting other commands. To avoid this problem, you can disable prompting
by using the terminal dont-ask command before you paste the configuration.
Note You can change the block of VLANs reserved for internal use. See the Cisco Nexus 9000 Series NX-OS
Layer 2 Switching Configuration Guide for more information about changing the reserved VLANs.
SUMMARY STEPS
1. configure terminal
2. interface {ethernet slot/port | port-channel number}
3. switchport trunk allowed vlan {vlan-list add vlan-list | all | except vlan-list | none | remove vlan-list}
4. exit
5. show vlan
6. no shutdown
7. copy running-config startup-config
DETAILED STEPS
Step 2 interface {ethernet slot/port | port-channel number} Specifies an interface to configure, and enters interface
configuration mode.
Example:
switch(config)# interface ethernet 3/1
Step 3 switchport trunk allowed vlan {vlan-list add vlan-list | Sets the allowed VLANs for the trunk interface. The default
all | except vlan-list | none | remove vlan-list} is to allow all VLANs on the trunk interface: 1 to 3967 and
4048 to 4094. VLANs 3968 to 4047 are the default VLANs
Example:
reserved for internal use by default. By default, all VLANs
switch(config-if)# switchport trunk allowed vlan are allowed on all trunk interfaces.
add 15-20
The default reserved VLANs are 3968 to 4094, and you
can change the block of reserved VLANs. See the Cisco
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
60
Configuring Layer 2 Interfaces
Configuring a Default Interface
Step 5 show vlan (Optional) Displays the status and information for VLANs.
Example:
switch# show vlan
Step 6 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to add VLANs 15 to 20 to the list of allowed VLANs on the Ethernet 3/1,
Layer 2 trunk port:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# switchport trunk allowed vlan 15-20
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
61
Configuring Layer 2 Interfaces
Configuring a Default Interface
Note The default interface feature is not supported for management interfaces because the device could go to an
unreachable state.
If the speed group is configured, the default interface command displays the following error:
Error: default interface is not supported as speed-group is configured
SUMMARY STEPS
1. configure terminal
2. default interface int-if [checkpoint name]
3. exit
4. show interface
5. no shutdown
DETAILED STEPS
Step 2 default interface int-if [checkpoint name] Deletes the configuration of the interface and restores the
default configuration. Use the ? keyword to display the
Example:
supported interfaces.
switch(config)# default interface ethernet 3/1
checkpoint test8 Use the checkpoint keyword to store a copy of the running
configuration of the interface before clearing the
configuration.
Step 4 show interface (Optional) Displays the interface status and information.
Example:
switch# show interface
Step 5 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
62
Configuring Layer 2 Interfaces
Configuring SVI Autostate Disable for the System
Example
This example shows how to delete the configuration of an Ethernet interface while saving a checkpoint
of the running configuration for rollback purposes:
switch# configure terminal
switch(config)# default interface ethernet 3/1 checkpoint test8
.......Done
switch(config)#
Note The system default interface-vlan autostate command enables the SVI autostate feature.
SUMMARY STEPS
1. configure terminal
2. [no] system default interface-vlan autostate
3. no shutdown
4. show running-config [all]
DETAILED STEPS
Step 2 [no] system default interface-vlan autostate Disables the default autostate behavior for the device.
Example: Note Use the system default interface-vlan
switch(config)# no system default interface-vlan autostate command to enable the autostate
autostate behavior for the device.
Step 3 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
63
Configuring Layer 2 Interfaces
Configuring SVI Autostate Disable Per SVI
Example
This example shows how to disable the default autostate behavior on the Cisco NX-OS device:
switch# configure terminal
switch(config)# no system default interface-vlan autostate
switch(config)# show running-config
SUMMARY STEPS
1. configure terminal
2. feature interface-vlan
3. interface vlan vlan-id
4. [no] autostate
5. exit
6. show running-config interface vlan vlan-id
7. no shutdown
8. show startup-config interface vlan vlan-id
DETAILED STEPS
Step 3 interface vlan vlan-id Creates a VLAN interface and enters interface configuration
mode. The range is from 1 and 4094.
Example:
switch(config-if)# interface vlan10
switch(config)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
64
Configuring Layer 2 Interfaces
Configuring the Device to Tag Native VLAN Traffic
Step 6 show running-config interface vlan vlan-id (Optional) Displays the running configuration for the
specified VLAN interface.
Example:
switch(config)# show running-config interface
vlan10
Step 7 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Step 8 show startup-config interface vlan vlan-id (Optional) Displays the VLAN configuration in the startup
configuration.
Example:
switch(config)# show startup-config interface
vlan10
Example
This example shows how to disable the default autostate behavior on an individual SVI:
switch# configure terminal
switch(config)# feature interface-vlan
switch(config)# interface vlan10
witch(config-if)# no autostate
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
65
Configuring Layer 2 Interfaces
Configuring the Device to Tag Native VLAN Traffic
Note If you enable 802.1Q tagging on one device and disable it on another device, all traffic is dropped on the
device and this feature is disabled. You must configure this feature identically on each device.
SUMMARY STEPS
1. configure terminal
2. vlan dot1q tag native
3. exit
4. show vlan
5. no shutdown
6. copy running-config startup-config
DETAILED STEPS
Step 2 vlan dot1q tag native Modifies the behavior of a 802.1Q trunked native VLAN
ID interface. The interface maintains the taggings for all
Example:
packets that enter with a tag that matches the value of the
switch(config)# vlan dot1q tag native native VLAN ID and drops all untagged traffic. The control
traffic is still carried on the native VLAN.
Step 4 show vlan (Optional) Displays the status and information for VLANs.
Example:
switch# show vlan
Step 5 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
66
Configuring Layer 2 Interfaces
Changing the System Default Port Mode to Layer 2
Example
This example shows how to change the behavior of the native VLAN on an 802.1Q trunked interface
to maintain the tagged packets and drop all untagged traffic (except control traffic):
switch# configure terminal
switch(config)# vlan dot1q tag native
switch#
SUMMARY STEPS
1. configure terminal
2. system default switchport [shutdown]
3. exit
4. show interface brief
5. no shutdown
6. copy running-config startup-config
DETAILED STEPS
Step 2 system default switchport [shutdown] Sets the default port mode for all interfaces on the system
to Layer 2 access port mode and enters interface
Example:
configuration mode. By default, all the interfaces are Layer
switch(config-if)# system default switchport 3.
Note When the system default switchport
shutdown command is issued:
• Any FEX HIFs that are not configured
with no shutdown are shutdown. To
avoid the shutdown, configure the FEX
HIFs with no shut
• Any Layer 2 port that is not specifically
configured with no shutdown are
shutdown. To avoid the shutdown,
configure the Layer 2 port with no shut
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
67
Configuring Layer 2 Interfaces
Verifying the Interface Configuration
Step 4 show interface brief (Optional) Displays the status and information for interfaces.
Example:
switch# show interface brief
Step 5 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to set the system ports to be Layer 2 access ports by default:
switch# configure terminal
switch(config-if)# system default switchport
switch(config-if)#
Command Purpose
show interface ethernet slot/port [brief | | counters Displays the interface configuration.
| debounce | description | flowcontrol | mac-address
| status | transceiver]
show interface trunk [module module-number | vlan Displays trunk configuration information.
vlan-id]
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
68
Configuring Layer 2 Interfaces
Monitoring the Layer 2 Interfaces
Command Purpose
show running-config interface ethernet slot/port Displays configuration information about the specified
interface.
show running-config interface port-channel Displays configuration information about the specified
slot/port port-channel interface.
show running-config interface vlan vlan-id Displays configuration information about the specified
VLAN interface.
Command Purpose
load- interval {interval seconds {1 | 2 | 3}} Cisco Nexus 9000 Series devices set three different
sampling intervals to bit-rate and packet-rate statistics.
show interface counters [module module] Displays input and output octets unicast packets,
multicast packets, and broadcast packets.
show interface counters detailed [all] Displays input packets, bytes, and multicast as well
as output packets and bytes.
show interface counters errors [module module] Displays information on the number of error packets.
This example shows how to configure a Layer 2 trunk interface, assign the native VLAN and the allowed
VLANs, and configure the device to tag the native VLAN traffic on the trunk interface:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
69
Configuring Layer 2 Interfaces
Related Documents
Related Documents
Related Documents Document Title
VLANs, private VLANs, and STP Cisco Nexus 9000 Series NX-OS Layer 2 Switching
Configuration Guide
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
70
CHAPTER 5
Configuring Layer 3 Interfaces
• About Layer 3 Interfaces, on page 71
• Prerequisites for Layer 3 Interfaces, on page 74
• Guidelines and Limitations, on page 74
• Default Settings, on page 75
• Configuring Layer 3 Interfaces, on page 75
• Verifying the Layer 3 Interfaces Configuration, on page 83
• Monitoring the Layer 3 Interfaces, on page 84
• Configuration Examples for Layer 3 Interfaces, on page 86
• Related Documents, on page 86
Routed Interfaces
You can configure a port as a Layer 2 interface or a Layer 3 interface. A routed interface is a physical port
that can route IP traffic to another device. A routed interface is a Layer 3 interface only and does not support
Layer 2 protocols, such as the Spanning Tree Protocol (STP).
All Ethernet ports are routed interfaces by default. You can change this default behavior with the CLI setup
script.
Note The default behavior varies based on the type of switch (Cisco Nexus 9300, Cisco Nexus 9500, or Cisco
Nexus 3164).
Note Cisco Nexus 9300 Series switches (except Cisco Nexus 9332 switch) have a Layer 2 default mode.
You can assign an IP address to the port, enable routing, and assign routing protocol characteristics to this
routed interface.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
71
Configuring Layer 3 Interfaces
Subinterfaces
You can also create a Layer 3 port channel from routed interfaces. For more information about port channels,
see the “Configuring Port Channels” section.
Routed interfaces support exponentially decayed rate counters. Cisco NX-OS tracks the following statistics
with these averaging counters:
• Input packets/sec
• Output packets/sec
• Input bytes/sec
• Output bytes/sec
Subinterfaces
You can create virtual subinterfaces on a parent interface configured as a Layer 3 interface. A parent interface
can be a physical port.
Subinterfaces divide the parent interface into two or more virtual interfaces on which you can assign unique
Layer 3 parameters such as IP addresses and dynamic routing protocols. The IP address for each subinterface
should be in a different subnet from any other subinterface on the parent interface.
You create a subinterface with a name that consists of the parent interface name (for example, Ethernet 2/1)
followed by a period and then by a number that is unique for that subinterface. For example, you could create
a subinterface for Ethernet interface 2/1 named Ethernet 2/1.1 where .1 indicates the subinterface.
Cisco NX-OS enables subinterfaces when the parent interface is enabled. You can shut down a subinterface
independent of shutting down the parent interface. If you shut down the parent interface, Cisco NX-OS shuts
down all associated subinterfaces as well.
One use of subinterfaces is to provide unique Layer 3 interfaces to each virtual local area network (VLAN)
supported by the parent interface. In this scenario, the parent interface connects to a Layer 2 trunking port on
another device. You configure a subinterface and associate the subinterface to a VLAN ID using 802.1Q
trunking.
The following figure shows a trunking port from a switch that connects to router B on interface E 2/1. This
interface contains three subinterfaces that are associated with each of the three VLANs carried by the trunking
port.
Figure 4: Subinterfaces for VLANs
For more information about VLANs, see the Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration
Guide.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
72
Configuring Layer 3 Interfaces
VLAN Interfaces
VLAN Interfaces
A VLAN interface, or switch virtual interface (SVI), is a virtual routed interface that connects a VLAN on
the device to the Layer 3 router engine on the same device. Only one VLAN interface can be associated with
a VLAN, but you need to configure a VLAN interface for a VLAN only when you want to route between
VLANs or to provide IP host connectivity to the device through a virtual routing and forwarding (VRF)
instance that is not the management VRF. When you enable VLAN interface creation, Cisco NX-OS creates
a VLAN interface for the default VLAN (VLAN 1) to permit remote switch administration.
You must enable the VLAN network interface feature before you can see configure it. The system automatically
takes a checkpoint prior to disabling the feature, and you can roll back to this checkpoint. See the Cisco Nexus
9000 Series NX-OS System Management Configuration Guide for information on rollbacks and checkpoints.
You can route across VLAN interfaces to provide Layer 3 inter-VLAN routing by configuring a VLAN
interface for each VLAN that you want to route traffic to and assigning an IP address on the VLAN interface.
For more information about IP addresses and IP routing, see the Cisco Nexus 9000 Series NX-OS Unicast
Routing Configuration Guide.
The following figure shows two hosts connected to two VLANs on a device. You can configure VLAN
interfaces for each VLAN that allows Host 1 to communicate with Host 2 using IP routing between the VLANs.
VLAN 1 communicates at Layer 3 over VLAN interface 1 and VLAN 10 communicates at Layer 3 over
VLAN interface 10.
Figure 5: Connecting Two VLANs with VLAN interfaces
Loopback Interfaces
A loopback interface is a virtual interface with a single endpoint that is always up. Any packet transmitted
over a loopback interface is immediately received by this interface. Loopback interfaces emulate a physical
interface. You can configure up to 1024 loopback interfaces, numbered 0 to 1023.
You can use loopback interfaces for performance analysis, testing, and local communications. Loopback
interfaces can act as a termination address for routing protocol sessions. This loopback configuration allows
routing protocol sessions to stay up even if some of the outbound interfaces are down.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
73
Configuring Layer 3 Interfaces
High Availability
High Availability
Layer 3 interfaces support stateful and stateless restarts. After the switchover, Cisco NX-OS applies the runtime
configuration after the switchover.
See the Cisco Nexus 9000 Series NX-OS High Availability and Redundancy Guide for complete information
about high availability.
Virtualization Support
Layer 3 interfaces support Virtual Routing and Forwarding instances (VRFs). VRFs exist within virtual device
contexts (VDCs). By default, Cisco NX-OS places you in the default VDC and default VRF .
Note You must assign an interface to a VRF before you configure the IP address for that interface.
• The Dynamic Host Configuration Protocol (DHCP) option is not supported when configuring a subinterface
on a port-channel interface.
• Layer 3 routed traffic for missing Layer 2 adjacency information is not flooded back onto VLAN members
of ingress units when the source MAC address of routed traffic is a non-VDC (Virtual Device Context)
MAC address. This limitation is for hardware flood traffic and can occur when the SVI (Switched Virtual
Interface) has a user-configured MAC address.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
74
Configuring Layer 3 Interfaces
Default Settings
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might
differ from the Cisco IOS commands that you would use.
Default Settings
The following table lists the default settings for Layer 3 interface parameters.
Parameters Default
SUMMARY STEPS
1. configure terminal
2. interface ethernet slot/port
3. no switchport
4. [ip address ip-address/length | ipv6 address ipv6-address/length]
5. show interfaces
6. no shutdown
7. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
75
Configuring Layer 3 Interfaces
Configuring a Routed Interface
Step 4 [ip address ip-address/length | ipv6 address • Configures an IP address for this interface. See the
ipv6-address/length] Cisco Nexus 9000 Series NX-OS Unicast Routing
Configuration Guide for more information about IP
Example:
addresses.
switch(config-if)# ip address 192.0.2.1/8
• Configures an IPv6 address for this interface. See the
Example:
Cisco Nexus 9000 Series NX-OS Unicast Routing
switch(config-if)# ipv6 address 2001:0DB8::1/8 Configuration Guide for more information about IPv6
addresses.
Step 6 no shutdown (Optional) Clears the errors on the interfaces where policies
correspond with hardware policies. This command allows
Example:
policy programming to continue and the port to come up.
switch# If policies do not correspond, the errors are placed in an
switch(config-if)# int e2/1
switch(config-if)# no shutdown error-disabled policy state.
Example
• Use the medium command to set the interface medium to either point to point or broadcast.
Command Purpose
Note The default setting is broadcast, and this setting does not appear in any of the show commands.
However, if you do change the setting to p2p, you will see this setting when you enter the show
running config command.
• Use the switchport command to convert a Layer 3 interface into a Layer 2 interface.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
76
Configuring Layer 3 Interfaces
Configuring a Subinterface on a Routed Interface
Command Purpose
The default setting for interfaces is routed. If you want to configure an interface for Layer 2,
enter the switchport command. Then, if you change a Layer 2 interface to a routed interface,
enter the no switchport command.
SUMMARY STEPS
1. configure terminal
2. interface ethernet slot/port.number
3. [ip address ip-address/length | ipv6 address ipv6-address/length]
4. encapsulation dot1Q vlan-id
5. show interfaces
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface ethernet slot/port.number Creates a subinterface and enters subinterface configuration
mode. The number range is from 1 to 4094.
Example:
switch(config)# interface ethernet 2/1.1
switch(config-subif)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
77
Configuring Layer 3 Interfaces
Configuring a Subinterface on a Routed Interface
Step 4 encapsulation dot1Q vlan-id Configures IEEE 802.1Q VLAN encapsulation on the
subinterface. The range is from 2 to 4093.
Example:
switch(config-subif)# encapsulation dot1Q 33
Example
• This example shows how to create a subinterface:
switch# configure terminal
switch(config)# interface ethernet 2/1.1
switch(config-if)# ip address 192.0.2.1/8
switch(config-if)# encapsulation dot1Q 33
switch(config-if)# copy running-config startup-config
• The output of the show interface eth command is enhanced for the subinterfaces as shown
in the following :
switch# show interface ethernet 1/2.1
Ethernet1/2.1 is down (Parent Interface Admin down)
admin state is down, Dedicated Interface, [parent interface is Ethernet1/2]
Hardware: 40000 Ethernet, address: 0023.ac67.9bc1 (bia 4055.3926.61d4)
Internet Address is 10.10.10.1/24
MTU 1500 bytes, BW 40000000 Kbit, DLY 10 usec
reliability 255/255, txload 1/255, rxload 1/255
Auto-mdix is turned off
EtherType is 0x8100
L3 in Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
L3 out Switched:
ucast: 0 pkts, 0 bytes - mcast: 0 pkts, 0 bytes
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
78
Configuring Layer 3 Interfaces
Configuring a VLAN Interface
SUMMARY STEPS
1. configure terminal
2. feature interface-vlan
3. interface vlan number
4. [ip address ip-address/length | ipv6 address ipv6-address/length]
5. show interface vlan number
6. no shutdown
7. copy running-config startup-config
DETAILED STEPS
Step 3 interface vlan number Creates a VLAN interface. The number range is from 1 to
4094.
Example:
switch(config)# interface vlan 10
switch(config-if)#
Step 4 [ip address ip-address/length | ipv6 address • Configures an IP address for this VLAN interface. See
ipv6-address/length] the Cisco Nexus 9000 Series NX-OS Unicast Routing
Configuration Guide for more information on IP
Example:
addresses.
switch(config-if)# ip address 192.0.2.1/8
• Configures an IPv6 address for this VLAN interface.
Example:
See the Cisco Nexus 9000 Series NX-OS Unicast
switch(config-if)# ipv6 address 2001:0DB8::1/8 Routing Configuration Guide for more information on
IPv6 addresses.
Step 5 show interface vlan number (Optional) Displays the Layer 3 interface statistics.
Example:
switch(config-if)# show interface vlan 10
Step 6 no shutdown (Optional) Clears the errors on the interfaces where policies
correspond with hardware policies. This command allows
Example:
policy programming to continue and the port to come up.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
79
Configuring Layer 3 Interfaces
Configuring a Loopback Interface
Example
This example shows how to create a VLAN interface:
switch# configure terminal
switch(config)# feature interface-vlan
switch(config)# interface vlan 10
switch(config-if)# ip address 192.0.2.1/8
switch(config-if)# copy running-config startup-config
SUMMARY STEPS
1. configure terminal
2. interface loopback instance
3. [ip address ip-address/length | ipv6 address ipv6-address/length]
4. show interface loopback instance
5. copy running-config startup-config
DETAILED STEPS
Step 2 interface loopback instance Creates a loopback interface. The range is from 0 to 1023.
Example:
switch(config)# interface loopback 0
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
80
Configuring Layer 3 Interfaces
Assigning an Interface to a VRF
Step 4 show interface loopback instance (Optional) Displays the loopback interface statistics.
Example:
switch(config-if)# show interface loopback 0
Example
This example shows how to create a loopback interface:
switch# configure terminal
switch(config)# interface loopback 0
switch(config-if)# ip address 192.0.2.1/8
switch(config-if)# copy running-config startup-config
SUMMARY STEPS
1. configure terminal
2. interface interface-type number
3. vrf member vrf-name
4. ip address ip-prefix/length
5. show vrf [vrf-name] interface interface-type number
6. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
81
Configuring Layer 3 Interfaces
Configuring a DHCP Client on an Interface
Step 4 ip address ip-prefix/length Configures an IP address for this interface. You must do
this step after you assign this interface to a VRF.
Example:
switch(config-if)# ip address 192.0.2.1/16
Step 5 show vrf [vrf-name] interface interface-type number (Optional) Displays VRF information.
Example:
switch(config-vrf)# show vrf Enterprise interface
loopback 0
Example
This example shows how to add a Layer 3 interface to the VRF:
switch# configure terminal
switch(config)# interface loopback 0
switch(config-if)# vrf member RemoteOfficeVRF
switch(config-if)# ip address 209.0.2.1/16
switch(config-if)# copy running-config startup-config
SUMMARY STEPS
1. switch# configure terminal
2. switch(config)# interface ethernet type slot/port | mgmt mgmt-interface-number | vlan vlan id
3. switch(config-if)# [no] ipv6 address use-link-local-only
4. switch(config-if)# [no] [ip | ipv6] address dhcp
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
82
Configuring Layer 3 Interfaces
Verifying the Layer 3 Interfaces Configuration
DETAILED STEPS
Step 2 switch(config)# interface ethernet type slot/port | mgmt Creates a physical Ethernet interface, a management
mgmt-interface-number | vlan vlan id interface, or a VLAN interface.
The range of vlan id is from 1 to 4094.
Step 3 switch(config-if)# [no] ipv6 address use-link-local-only Prepares for request to the DHCP server.
Note This command is only required for an IPv6
address.
Step 4 switch(config-if)# [no] [ip | ipv6] address dhcp Requests the DHCP server for an IPv4 or IPv6 address.
The no form of this command removes any address that
was acquired.
Step 5 (Optional) switch(config)# copy running-config Saves the change persistently through reboots and restarts
startup-config by copying the running configuration to the startup
configuration.
Example
This example shows how to configure the IP address of a DHCP client on an SVI:
switch# configure terminal
switch(config)# interface vlan 15
switch(config-if)# ip address dhcp
This example shows how to configure an IPv6 address of a DHCP client on a management interface:
switch# configure terminal
switch(config)# interface mgmt 0
switch(config-if)# ipv6 address use-link-local-only
switch(config-if)# ipv6 address dhcp
Command Purpose
show interface ethernet slot/port Displays the Layer 3 interface configuration, status,
and counters (including the 5-minute exponentially
decayed moving average of inbound and outbound
packet and byte rates).
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
83
Configuring Layer 3 Interfaces
Monitoring the Layer 3 Interfaces
Command Purpose
show interface ethernet slot/port brief Displays the Layer 3 interface operational status.
show interface ethernet slot/port capabilities Displays the Layer 3 interface capabilities, including
port type, speed, and duplex.
show interface ethernet slot/port description Displays the Layer 3 interface description.
show interface ethernet slot/port status Displays the Layer 3 interface administrative status,
port mode, speed, and duplex.
show interface ethernet slot/port.number Displays the subinterface configuration, status, and
counters (including the f-minute exponentially
decayed moving average of inbound and outbound
packet and byte rates).
show interface loopback number Displays the loopback interface configuration, status,
and counters.
show interface loopback number brief Displays the loopback interface operational status.
show interface loopback number description Displays the loopback interface description.
show interface loopback number status Displays the loopback interface administrative status
and protocol status.
show interface vlan number Displays the VLAN interface configuration, status,
and counters.
show interface vlan number brief Displays the VLAN interface operational status.
show interface vlan number description Displays the VLAN interface description.
show interface vlan number status Displays the VLAN interface administrative status
and protocol status.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
84
Configuring Layer 3 Interfaces
Monitoring the Layer 3 Interfaces
Command Purpose
load- interval {interval seconds {1 | 2 | 3}} Cisco Nexus 9000 Series devices set three different
sampling intervals to bit-rate and packet-rate statistics.
The range for VLAN network interface is 60 to 300
seconds, and the range for Layer interfaces is 30 to
300 seconds.
show interface ethernet slot/port counters Displays the Layer 3 interface statistics (unicast,
multicast, and broadcast).
show interface ethernet slot/port counters brief Displays the Layer 3 interface input and output
counters.
show interface ethernet errors slot/port detailed Displays the Layer 3 interface statistics. You can
[all] optionally include all 32-bit and 64-bit packet and
byte counters (including errors).
show interface ethernet errors slot/port counters Displays the Layer 3 interface input and output errors.
errors
show interface ethernet errors slot/port counters Displays the Layer 3 interface counters reported by
snmp SNMP MIBs.
show interface ethernet slot/port.number counters Displays the subinterface statistics (unicast, multicast,
and broadcast).
show interface loopback number counters Displays the loopback interface input and output
counters (unicast, multicast, and broadcast).
show interface loopback number detailed [all] Displays the loopback interface statistics. You can
optionally include all 32-bit and 64-bit packet and
byte counters (including errors).
show interface loopback number counters errors Displays the loopback interface input and output
errors.
show interface vlan number counters Displays the VLAN interface input and output
counters (unicast, multicast, and broadcast).
show interface vlan number counters detailed [all] Displays the VLAN interface statistics. You can
optionally include all Layer 3 packet and byte counters
(unicast and multicast).
show interface vlan number counters snmp Displays the VLAN interface counters reported by
SNMP MIBs.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
85
Configuring Layer 3 Interfaces
Configuration Examples for Layer 3 Interfaces
Related Documents
Related Documents Document Title
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
86
CHAPTER 6
Configuring Bidirectional Forwarding Detection
• About BFD, on page 87
• Prerequisites for BFD, on page 89
• Guidelines and Limitations, on page 90
• Default Settings, on page 92
• Configuring BFD, on page 92
• Configuring BFD Support for Routing Protocols, on page 99
• Configuring BFD Interoperability, on page 110
• Verifying the BFD Configuration, on page 114
• Monitoring BFD, on page 114
• Configuration Examples for BFD, on page 115
• Related Documents, on page 116
• RFCs, on page 116
About BFD
BFD is a detection protocol designed to provide fast forwarding-path failure detection times for media types,
encapsulations, topologies, and routing protocols. You can use BFD to detect forwarding path failures at a
uniform rate, rather than the variable rates for different protocol hello mechanisms. BFD makes network
profiling and planning easier and reconvergence time consistent and predictable.
BFD provides subsecond failure detection between two adjacent devices and can be less CPU-intensive than
protocol hello messages because some of the BFD load can be distributed onto the data plane on supported
modules.
Asynchronous Mode
Cisco NX-OS supports the BFD asynchronous mode, which sends BFD control packets between two adjacent
devices to activate and maintain BFD neighbor sessions between the devices. You configure BFD on both
devices (or BFD neighbors). Once BFD has been enabled on the interfaces and on the appropriate protocols,
Cisco NX-OS creates a BFD session, negotiates BFD session parameters, and begins to send BFD control
packets to each BFD neighbor at the negotiated interval. The BFD session parameters include the following:
• Desired minimum transmit interval—The interval at which this device wants to send BFD hello messages.
• Required minimum receive interval—The minimum interval at which this device can accept BFD hello
messages from another BFD device.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
87
Configuring Bidirectional Forwarding Detection
BFD Detection of Failures
• Detect multiplier—The number of missing BFD hello messages from another BFD device before this
local device detects a fault in the forwarding path.
The following figure shows how a BFD session is established. The figure shows a simple network with two
routers running Open Shortest Path First (OSPF) and BFD. When OSPF discovers a neighbor (1), it sends a
request to the local BFD process to initiate a BFD neighbor session with the OSPF neighbor router (2). The
BFD neighbor session with the OSPF neighbor router is now established (3).
Figure 6: Establishing a BFD Neighbor Relationship
Note Note The BFD failure detection occurs in less than a second, which is much faster than OSPF Hello messages
could detect the same failure.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
88
Configuring Bidirectional Forwarding Detection
Distributed Operation
Distributed Operation
Cisco NX-OS can distribute the BFD operation to compatible modules that support BFD. This process offloads
the CPU load for BFD packet processing to the individual modules that connect to the BFD neighbors. All
BFD session traffic occurs on the module CPU. The module informs the supervisor when a BFD failure is
detected.
Security
Cisco NX-OS uses the packet Time to Live (TTL) value to verify that the BFD packets came from an adjacent
BFD peer. For all asynchronous and echo request packets, the BFD neighbor sets the TTL value to 255 and
the local BFD process verifies the TTL value as 255 before processing the incoming packet. For the echo
response packet, BFD sets the TTL value to 254.
You can configure SHA-1 authentication of BFD packets.
High Availability
BFD supports stateless restarts. After a reboot or supervisor switchover, Cisco NX-OS applies the running
configuration and BFD immediately sends control packets to the BFD peers.
Virtualization Support
BFD supports virtual routing and forwarding instances (VRFs). VRFs exist within virtual device contexts
(VDCs). By default, Cisco NX-OS places you in the default VDC and default VRF.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
89
Configuring Bidirectional Forwarding Detection
Guidelines and Limitations
• SVI limitations:
• An ASIC reset causes traffic disruption for other ports and it can cause the SVI sessions on the other
ports to flap. For example, if the carrier interface is a virtual port channel (vPC), BFD is not supported
over the SVI interface and it could cause a trigger for an ASIC reset. When a BFD session is over
SVI using virtual port channel (vPC) Peer-Link, the BFD echo function is not supported. You must
disable the BFD echo function for all sessions over SVI between vPC peer nodes.
An SVI on the Cisco Nexus series switches should not be configured to establish a BFD neighbor
adjacency with a device connected to it via a vPC. This is because the BFD keepalives from the
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
90
Configuring Bidirectional Forwarding Detection
Guidelines and Limitations
neighbour, if sent over the vPC member link connected to the vPC peer-switch, do not reach this
SVI causing the BFD adjacency to fail.
• When you change the topology (for example, add or delete a link into a VLAN, delete a member
from a Layer 2 port channel, and so on), the SVI session could be affected. It may go down first
and then come up after the topology discovery is finished.
• BFD over FEX HIF interfaces is not supported.
• When a BFD session is over SVI using virtual port-channel (vPC) Peer-Link (either BCM or GEM
based ports), the BFD echo function is not supported. You must disable the BFD echo function for
all sessions over SVI between vPC peer nodes using the no bfd echo command at the SVI
configuration level.
Tip If you do not want the SVI sessions to flap and you need to change the topology,
you can disable the BFD feature before making the changes and reenable BFD
after the changes have been made. You can also configure the BFD timer to be
a large value (for example, 5 seconds), and change it back to a fast timer after
the above events complete.
• When you configure the BFD Echo function on the distributed Layer 3 port channels, reloading a member
module flaps the BFD session hosted on that module, which results in a packet loss.
If you connect the BFD peers directly without a Layer 2 switch in between, you can use the BFD per-link
mode as an alternative solution.
• When you specify a BFD neighbor prefix in the clear {ip | ipv6} route prefix command, the BFD echo
session will flap.
• The clear {ip | ipv6} route * command causes BFD echo sessions to flap.
• HSRP for IPv4 is supported with BFD.
• BFD packets generated by the Cisco NX-OS device linecards are sent with COS 6/DSCP CS6. The
DSCP/COS values for BFD packets are not user configurable.
• When configuring BFDv6 in no-bfd-echo mode, it is recommended to run with timers of 150 ms with a
multiplier of 3.
• BFDv6 is not supported for VRRPv3 and HSRP for v6.
• IPv6 eigrp bfd cannot be disabled on an interface.
• Port channel configuration notes:
• When the BFD per-link mode is configured, the BFD echo function is not supported. You must
disable the BFD echo function using the no bfd echo command before configuring the bfd per-link
command.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
91
Configuring Bidirectional Forwarding Detection
Default Settings
Default Settings
The following table lists the default settings for BFD parameters.
Parameters Default
Detect multiplier 3
Mode Asynchronous
Configuring BFD
Configuration Hierarchy
You can configure BFD at the global level and at the interface level. The interface configuration overrides
the global configuration.
For physical ports that are members of a port channel, the member port inherits the primary port channel BFD
configuration.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
92
Configuring Bidirectional Forwarding Detection
Enabling the BFD Feature
Note Use the no feature bfd command to disable the BFD feature and remove all associated configuration.
Command Purpose
SUMMARY STEPS
1. configure terminal
2. feature bfd
3. show feature | include bfd
4. copy running-config startup-config
DETAILED STEPS
Step 3 show feature | include bfd (Optional) Displays enabled and disabled features.
Example:
switch(config)# show feature | include
bfd
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
93
Configuring Bidirectional Forwarding Detection
Configuring Global BFD Parameters
SUMMARY STEPS
1. configure terminal
2. bfd interval mintx min_rx msec multiplier value
3. bfd slow-timer [interval]
4. bfd echo-interface loopback interface number
5. show running-config bfd
6. copy running-config startup-config
DETAILED STEPS
Step 2 bfd interval mintx min_rx msec multiplier value Configures the BFD session parameters for all BFD sessions
on the device. This command overrides these values by
Example:
configuring the BFD session parameters on an interface.
switch(config)# bfd interval 50 min_rx The mintx and msec range is from 50 to 999 milliseconds
50 multiplier 3
and the default is 50. The multiplier range is from 1 to 50.
The multiplier default is 3.
Step 3 bfd slow-timer [interval] Configures the slow timer used in the echo function. This
value determines how fast BFD starts up a new session and
Example:
at what speed the asynchronous sessions use for BFD
switch(config)# bfd slow-timer 2000 control packets when the echo function is enabled. The
slow-timer value is used as the new control packet interval,
while the echo packets use the configured BFD intervals.
The echo packets are used for link failure detection, while
the control packets at the slower rate maintain the BFD
session. The range is from 1000 to 30000 milliseconds. The
default is 2000.
Step 4 bfd echo-interface loopback interface number Configures the interface used for Bidirectional Forwarding
Detection (BFD) echo frames. This command changes the
Example:
source address for the echo packets to the one configured
switch(config)# bfd echo-interface loopback 1 3 on the specified loopback interface. The interface number
range is from 0 to 1023.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
94
Configuring Bidirectional Forwarding Detection
Configuring BFD on an Interface
SUMMARY STEPS
1. configure terminal
2. interface int-if
3. bfd interval mintx min_rx msec multiplier value
4. bfd authentication keyed-sha1 keyid id key ascii_key
5. show running-config bfd
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Example:
switch(config)# interface ethernet 2/1
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
95
Configuring Bidirectional Forwarding Detection
Configuring BFD on a Port Channel
Step 4 bfd authentication keyed-sha1 keyid id key ascii_key (Optional) Configures SHA-1 authentication for all BFD
sessions on the interface. The ascii_key string is a secret
Example:
key shared among BFD peers. The id value, a number
switch(config-if)# bfd authentication between 0 and 255, is assigned to this particular ascii_key.
keyed-sha1 keyid 1 ascii_key cisco123
BFD packets specify the key by id, allowing the use of
multiple active keys.
To disable SHA-1 authentication on the interface, use the
no form of the command.
Step 5 show running-config bfd (Optional) Displays the BFD running configuration.
Example:
switch(config-if)# show running-config bfd
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
96
Configuring Bidirectional Forwarding Detection
Configuring BFD on a Port Channel
Ensure that Internet Control Message Protocol (ICMP) redirect messages are disabled on BFD-enabled
interfaces. Use the no ip redirects command on the interface.
Enable the BFD feature. See the Enabling the BFD Feature section.
SUMMARY STEPS
1. configure terminal
2. interface port-channel number
3. bfd per-link
4. bfd interval mintx min_rx msec multiplier value
5. bfd authentication keyed-sha1 keyid id key ascii_key
6. show running-config bfd
7. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel number Enters port-channel configuration mode. Use the ? keyword
to display the supported number range.
Example:
switch(config)# interface port-channel 2
switch(config-if)#
Step 3 bfd per-link Configures the BFD sessions for each link in the port
channel.
Example:
switch(config-if)# bfd per-link
Step 4 bfd interval mintx min_rx msec multiplier value (Optional) Configures the BFD session parameters for all
BFD sessions on the port channel. This command overrides
Example:
these values by configuring the BFD session parameters.
switch(config-if)# bfd interval 50 The mintx and msec range is from 50 to 999 milliseconds
min_rx 50 multiplier 3
and the default is 50. The multiplier range is from 1 to 50.
The multiplier default is 3.
Step 5 bfd authentication keyed-sha1 keyid id key ascii_key (Optional) Configures SHA-1 authentication for all BFD
sessions on the interface. The ascii_key string is a secret
Example:
key shared among BFD peers. The id value, a number
switch(config-if)# bfd authentication between 0 and 255, is assigned to this particular ascii_key.
keyed-sha1 keyid 1 ascii_key cisco123
BFD packets specify the key by id, allowing the use of
multiple active keys.
To disable SHA-1 authentication on the interface, use the
no form of the command.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
97
Configuring Bidirectional Forwarding Detection
Configuring the BFD Echo Function
SUMMARY STEPS
1. configure terminal
2. bfd slow-timer echo-interval
3. interface int-if
4. bfd echo
5. show running-config bfd
6. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
98
Configuring Bidirectional Forwarding Detection
Configuring BFD Support for Routing Protocols
Step 3 interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Example:
switch(config)# interface ethernet 2/1
switch(config-if)#
Step 4 bfd echo Enables the echo function. The default is enabled.
Example:
switch(config-if)# bfd echo
Step 5 show running-config bfd (Optional) Displays the BFD running configuration.
Example:
switch(config-if)# show running-config bfd
SUMMARY STEPS
1. configure terminal
2. router bgp as-number
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
99
Configuring Bidirectional Forwarding Detection
Configuring BFD on EIGRP
DETAILED STEPS
Step 2 router bgp as-number Enables BGP and assigns the AS number to the local BGP
speaker. The AS number can be a 16-bit integer or a 32-bit
Example:
integer in the form of a higher 16-bit decimal number and
switch(config)# router bgp 64496 a lower 16-bit decimal number in xx.xx format.
switch(config-router)#
Step 3 neighbor (ip-address | ipv6-address) remote-as as-number Configures the IPv4 or IPv6 address and AS number for a
remote BGP peer. The ip-address format is x.x.x.x. The
Example:
ipv6-address format is A:B::C:D.
switch(config-router)# neighbor
209.165.201.1 remote-as 64497
switch(config-router-neighbor)#
Step 5 update-source interface Allows BGP sessions to use the primary IP address from a
particular interface as the local address when forming a
Example:
BGP session with a neighbor and enables BGP to register
switch(config-router-neighbor)# update-source as a client with BFD.
ethernet 2/1
Step 6 show running-config bgp (Optional) Displays the BGP running configuration.
Example:
switch(config-router-neighbor)# show
running-config bgp
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
100
Configuring Bidirectional Forwarding Detection
Configuring BFD on EIGRP
SUMMARY STEPS
1. configure terminal
2. router eigrp instance-tag
3. bfd [ipv4 | ipv6]
4. interface int-if
5. ip eigrp instance-tag bfd
6. show ip eigrp [vrf vrf-name] [ interfaces if]
7. copy running-config startup-config
DETAILED STEPS
Step 2 router eigrp instance-tag Creates a new EIGRP process with the configured instance
tag. The instance tag can be any case-sensitive,
Example:
alphanumeric string up to 20 characters.
switch(config)# router eigrp Test1
switch(config-router)# If you configure an instance-tag that does not qualify as an
AS number, you must use the autonomous-system to
configure the AS number explicitly or this EIGRP instance
will remain in the shutdown state.
Step 3 bfd [ipv4 | ipv6] (Optional) Enables BFD for all EIGRP interfaces.
Example:
switch(config-router-neighbor)# bfd ipv4
Step 4 interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Example:
switch(config-router-neighbor)# interface
ethernet 2/1
switch(config-if)#
Step 5 ip eigrp instance-tag bfd (Optional) Enables or disables BFD on an EIGRP interface.
The instance tag can be any case-sensitive, alphanumeric
Example:
string up to 20 characters.
switch(config-if)# ip eigrp Test1 bfd
The default is disabled.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
101
Configuring Bidirectional Forwarding Detection
Configuring BFD on OSPF
SUMMARY STEPS
1. configure terminal
2. router ospf instance-tag
3. bfd [ipv4 | ipv6]
4. interface int-if
5. ip ospf bfd
6. show ip ospf [vrf vrf-name] [ interfaces if]
7. copy running-config startup-config
DETAILED STEPS
Step 2 router ospf instance-tag Creates a new OSPF instance with the configured instance
tag. The instance tag can be any case-sensitive,
Example:
alphanumeric string up to 20 characters.
switch(config)# router ospf 200
switch(config-router)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
102
Configuring Bidirectional Forwarding Detection
Configuring BFD on IS-IS
Step 4 interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Example:
switch(config-router)# interface
ethernet 2/1
switch(config-if)#
Step 6 show ip ospf [vrf vrf-name] [ interfaces if] (Optional) Displays information about OSPF. The vrf-name
can be any case-sensitive, alphanumeric string up to 32
Example:
characters.
switch(config-if)# show ip ospf
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
103
Configuring Bidirectional Forwarding Detection
Configuring BFD on IS-IS
SUMMARY STEPS
1. configure terminal
2. router isis instance-tag
3. bfd [ipv4 | ipv6]
4. interface int-if
5. isis bfd
6. show isis [vrf vrf-name] [ interface if]
7. copy running-config startup-config
DETAILED STEPS
Step 2 router isis instance-tag Creates a new IS-IS instance with the configured instance
tag.
Example:
Step 3 bfd [ipv4 | ipv6] (Optional) Enables BFD for all OSPF interfaces.
Example:
switch(config-router)# bfd
Step 4 interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Example:
switch(config-router)# interface
ethernet 2/1
switch(config-if)#
Step 6 show isis [vrf vrf-name] [ interface if] (Optional) Displays information about IS-IS. The vrf-name
can be any case-sensitive, alphanumeric string up to 32
Example:
characters.
switch(config-if)# show isis
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
104
Configuring Bidirectional Forwarding Detection
Configuring BFD on HSRP
SUMMARY STEPS
1. configure terminal
2. hsrp bfd all-interfaces
3. interface int-if
4. hsrp bfd
5. show running-config hsrp
6. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
105
Configuring Bidirectional Forwarding Detection
Configuring BFD on VRRP
Step 3 interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Example:
switch(config-router)# interface
ethernet 2/1
switch(config-if)#
Step 5 show running-config hsrp (Optional) Displays the HSRP running configuration.
Example:
switch(config-if)# show running-config hsrp
SUMMARY STEPS
1. configure terminal
2. interface int-if
3. vrrp group-no
4. vrrp bfd address
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
106
Configuring Bidirectional Forwarding Detection
Configuring BFD on PIM
DETAILED STEPS
Step 2 interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Example:
switch(config)# interface
ethernet 2/1
switch(config-if)#
Step 4 vrrp bfd address Enables or disables BFD on a VRRP interface. The default
is disabled.
Example:
switch(config-if)# vrrp bfd
Step 5 show running-config vrrp (Optional) Displays the VRRP running configuration.
Example:
switch(config-if)# show running-config vrrp
SUMMARY STEPS
1. configure terminal
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
107
Configuring Bidirectional Forwarding Detection
Configuring BFD on Static Routes
2. ip pim bfd
3. interface int-if
4. ip pim bfd-instance [disable]
5. show running-config pim
6. copy running-config startup-config
DETAILED STEPS
Step 3 interface int-if Enters interface configuration mode. Use the ? keyword to
display the supported interfaces.
Example:
switch(config)# interface
ethernet 2/1
switch(config-if)#
Step 4 ip pim bfd-instance [disable] (Optional) Enables or disables BFD on a PIM interface.
The default is disabled.
Example:
switch(config-if)# ip pim bfd-instance
Step 5 show running-config pim (Optional) Displays the PIM running configuration.
Example:
switch(config)# show running-config pim
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
108
Configuring Bidirectional Forwarding Detection
Disabling BFD on an Interface
SUMMARY STEPS
1. configure terminal
2. vrf context vrf-name
3. ip route route interface {nh-address | nh-prefix}
4. ip route static bfd interface {nh-address | nh-prefix}
5. show ip route static [vrf vrf-name]
6. copy running-config startup-config
DETAILED STEPS
Step 3 ip route route interface {nh-address | nh-prefix} Creates a static route Use the ? keyword to display the
supported interfaces.
Example:
switch(config-vrf)# ip route 192.0.2.1 ethernet
2/1 192.0.2.4
Step 4 ip route static bfd interface {nh-address | nh-prefix} Enables BFD for all static routes on an interface. Use the?
keyword to display the supported interfaces.
Example:
switch(config-vrf)# ip route static bfd ethernet
2/1 192.0.2.4
Step 5 show ip route static [vrf vrf-name] (Optional) Displays the static routes.
Example:
switch(config-vrf)# show ip route static vrf Red
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
109
Configuring Bidirectional Forwarding Detection
Configuring BFD Interoperability
Command Purpose
ip eigrp instance-tag bfd disable Disables BFD on an EIGRP interface. The instance
tag can be any case-sensitive, alphanumeric string up
Example:
to 20 characters.
switch(config-if)# ip eigrp Test1 bfd
disable
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
110
Configuring Bidirectional Forwarding Detection
Configuring BFD Interoperability in Cisco NX-OS Devices in a Switch Virtual Interface
DETAILED STEPS
Step 2 interface port-channel int-if Enters interface configuration mode. Use the ? keyword
to display the supported interfaces.
Example:
switch(config-if)# interface ethernet 2/1
Step 5 bfd interval mintx min_rx msec multiplier value Configures the BFD session parameters for all BFD sessions
on the port channel. This command overrides these values
Example:
by configuring the BFD session parameters. The mintx and
switch(config-if)# bfd interval 50 msec range is from 50 to 999 milliseconds and the default
min_rx 50 multiplier 3
is 50. The multiplier range is from 1 to 50. The multiplier
default is 3.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
111
Configuring Bidirectional Forwarding Detection
Configuring BFD Interoperability in Cisco NX-OS Devices in Logical Mode
DETAILED STEPS
Step 2 interface port-channel vlan vlan-id Creates a dynamic Switch Virtual Interface (SVI).
Example:
switch(config)# interface vlan 998
switch(config-if)#
Step 3 bfd interval mintx min_rx msec multiplier value Configures the BFD session parameters for all BFD sessions
on the device. The mintx and msec range is from 50 to 999
Example:
milliseconds and the default is 50. The multiplier range is
switch(config-if)# bfd interval 50 from 1 to 50. The multiplier default is 3.
min_rx 50 multiplier 3
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
112
Configuring Bidirectional Forwarding Detection
Verifying BFD Interoperability in a Cisco Nexus 9000 Series Device
DETAILED STEPS
Step 2 interface port-channel type number.subinterface-id Enters port channel configuration mode. Use the ? keyword
to display the supported number range.
Example:
switch(config-if)# interface port-channel 50.2
Step 3 bfd interval mintx min_rx msec multiplier value Configures the BFD session parameters for all BFD sessions
on the port channel. The mintx and msec range is from 50
Example:
to 999 milliseconds and the default is 50. The multiplier
switch(config-if)# bfd interval 50 range is from 1 to 50. The multiplier default is 3.
min_rx 50 multiplier 3
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
113
Configuring Bidirectional Forwarding Detection
Verifying the BFD Configuration
Command Purpose
show startup-config bfd Displays the BFD configuration that will be applied
on the next system startup.
Monitoring BFD
Use the following commands to display BFD:
Command Purpose
show bfd neighbors [application name] [details] Displays information about BFD for a supported
application, such as BGP or OSPFv2.
show bfd neighbors [interface int-if] [details] Displays information about BGP sessions on an
interface.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
114
Configuring Bidirectional Forwarding Detection
Configuration Examples for BFD
Command Purpose
show bfd neighbors [dest-ip ip-address] [src-ip Displays information about the specified BGP session
ip-address][details] on an interface.
show bfd neighbors [vrf vrf-name] [details] Displays information about BFD for a VRF.
show bfd [ipv4 | ipv6] [neighbors] Displays information about IPv4 neighbors or IPv6
neighbors.
feature bfd
feature ospf
router ospf Test1
interface ethernet 2/1
ip ospf bfd
no shutdown
This example shows how to configure BFD for all EIGRP interfaces, using the default BFD session parameters:
feature bfd
feature eigrp
bfd interval 100 min_rx 100 multiplier 4
router eigrp Test2
bfd
feature bfd
feature ospfv3
router ospfv3 Test1
interface Ethernet2/7
ipv6 router ospfv3 Test1 area 0.0.0.0
ospfv3 bfd
no shutdown
OurAddr NeighAddr
LD/RD RH/RS Holdown(mult) State Int
Vrf
cc:10::2 cc:10::1
1090519335/1090519260 Up 5692(3) Up Po1
default
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
115
Configuring Bidirectional Forwarding Detection
Related Documents
Related Documents
Related Topic Document Title
RFCs
RFC Title
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
116
CHAPTER 7
Configuring Port Channels
This chapter describes how to configure port channels and to apply and configure the Link Aggregation
Control Protocol (LACP) for more efficient use of port channels in the Cisco NX-OS devices.
On a single switch, the port-channel compatibility parameters must be the same among all the port-channel
members on the physical switch.
• About Port Channels, on page 117
• Port Channels, on page 118
• Port-Channel Interfaces, on page 118
• Basic Settings, on page 119
• Compatibility Requirements, on page 120
• Load Balancing Using Port Channels, on page 122
• Symmetric Hashing, on page 123
• Resilient Hashing, on page 123
• LACP, on page 124
• Prerequisites for Port Channeling, on page 129
• Guidelines and Limitations, on page 130
• Default Settings, on page 130
• Configuring Port Channels, on page 131
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
117
Configuring Port Channels
Port Channels
Note After a Layer 2 port becomes part of a port channel, all switchport configurations must be done on the port
channel; you can no longer apply switchport configurations to individual port-channel members. You cannot
apply Layer 3 configurations to an individual port-channel member either; you must apply the configuration
to the entire port channel.
You can use static port channels, with no associated aggregation protocol, for a simplified configuration.
For more flexibility, you can use the Link Aggregation Control Protocol (LACP), which is defined in IEEE
802.3ad. When you use LACP, the link passes protocol packets. You cannot configure LACP on shared
interfaces.
See the LACP Overview section for information about LACP.
Port Channels
A port channel bundles physical links into a channel group to create a single logical link that provides the
aggregate bandwidth of up to 32 physical links. If a member port within a port channel fails, the traffic
previously carried over the failed link switches to the remaining member ports within the port channel.
However, you can enable the LACP to use port channels more flexibly. Configuring port channels with LACP
and static port channels require a slightly different procedure (see the “Configuring Port Channels” section).
Note The device does not support Port Aggregation Protocol (PAgP) for port channels.
Each port can be in only one port channel. All the ports in a port channel must be compatible; they must use
the same speed and duplex mode (see the “Compatibility Requirements” section). When you run static port
channels with no aggregation protocol, the physical links are all in the on channel mode; you cannot change
this mode without enabling LACP (see the “Port-Channel Modes” section).
You can create port channels directly by creating the port-channel interface, or you can create a channel group
that acts to aggregate individual ports into a bundle. When you associate an interface with a channel group,
the software creates a matching port channel automatically if the port channel does not already exist. In this
instance, the port channel assumes the Layer 2 or Layer 3 configuration of the first interface. You can also
create the port channel first. In this instance, the Cisco NX-OS software creates an empty channel group with
the same channel number as the port channel and takes the default Layer 2 or Layer 3 configuration, as well
as the compatibility configuration (see the “Compatibility Requirements” section).
Note The port channel is operationally up when at least one of the member ports is up and that port’s status is
channeling. The port channel is operationally down when all member ports are operationally down.
Port-Channel Interfaces
The following shows port-channel interfaces.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
118
Configuring Port Channels
Basic Settings
You can classify port-channel interfaces as Layer 2 or Layer 3 interfaces. In addition, you can configure Layer
2 port channels in either access or trunk mode. Layer 3 port-channel interfaces have routed ports as channel
members.
You can configure a Layer 3 port channel with a static MAC address. If you do not configure this value, the
Layer 3 port channel uses the router MAC of the first channel member to come up. See the Cisco Nexus 9000
Series NX-OS Layer 2 Switching Configuration Guide for information about configuring static MAC addresses
on Layer 3 port channels.
See the "Configuring Layer 2 Interfaces" chapter for information about configuring Layer 2 ports in access
or trunk mode and the "Configuring Layer 3 Interfaces" chapter for information about configuring Layer 3
interfaces and subinterfaces.
Basic Settings
You can configure the following basic settings for the port-channel interface:
• Bandwidth—Use this setting for informational purposes only; this setting is to be used by higher-level
protocols.
• Delay—Use this setting for informational purposes only; this setting is to be used by higher-level protocols.
• Description
• Duplex
• IP addresses
• Maximum Transmission Unit (MTU)
• Shutdown
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
119
Configuring Port Channels
Compatibility Requirements
• Speed
Compatibility Requirements
When you add an interface to a channel group, the software checks certain interface attributes to ensure that
the interface is compatible with the channel group. For example, you cannot add a Layer 3 interface to a Layer
2 channel group. The Cisco NX-OS software also checks a number of operational attributes for an interface
before allowing that interface to participate in the port-channel aggregation.
The compatibility check includes the following operational attributes:
• Network layer
• (Link) speed capability
• Speed configuration
• Duplex capability
• Duplex configuration
• Port mode
• Access VLAN
• Trunk native VLAN
• Tagged or untagged
• Allowed VLAN list
• MTU size
• SPAN—Cannot be a SPAN source or a destination port
• Storm control
• Flow-control capability
• Flow-control configuration
• Media type, either copper or fiber
Use the show port-channel compatibility-parameters command to see the full list of compatibility checks
that the Cisco NX-OS uses.
You can only add interfaces configured with the channel mode set to on to static port channels, and you can
only add interfaces configured with the channel mode as active or passive to port channels that are running
LACP. You can configure these attributes on an individual member port. If you configure a member port with
an incompatible attribute, the software suspends that port in the port channel.
Alternatively, you can force ports with incompatible parameters to join the port channel if the following
parameters are the same:
• (Link) speed capability
• Speed configuration
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
120
Configuring Port Channels
Compatibility Requirements
• Duplex capability
• Duplex configuration
• Flow-control capability
• Flow-control configuration
When the interface joins a port channel, some of its individual parameters are removed and replaced with the
values on the port channel as follows:
• Bandwidth
• Delay
• Extended Authentication Protocol over UDP
• VRF
• IP address
• MAC address
• Spanning Tree Protocol
• NAC
• Service policy
• Access control lists (ACLs)
Many interface parameters remain unaffected when the interface joins or leaves a port channel as follows:
• Beacon
• Description
• CDP
• LACP port priority
• Debounce
• UDLD
• MDIX
• Rate mode
• Shutdown
• SNMP trap
Note When you delete the port channel, the software sets all member interfaces as if they were removed from the
port channel.
See the “LACP Marker Responders” section for information about port-channel modes.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
121
Configuring Port Channels
Load Balancing Using Port Channels
Non-IP and Layer 3 port channels both follow the configured load-balancing method, using the source,
destination, or source and destination parameters. For example, when you configure load balancing to use the
source IP address, all non-IP traffic uses the source MAC address to load balance the traffic while the Layer
3 traffic load balances the traffic using the source IP address. Similarly, when you configure the destination
MAC address as the load-balancing method, all Layer 3 traffic uses the destination IP address while the non-IP
traffic load balances using the destination MAC address.
The unicast and multicast traffic is load-balanced across port-channel links based on configured load-balancing
algorithm displayed in show port-channel load-balancing command output.
The multicast traffic uses the following methods for load balancing with port channels:
• Multicast traffic with Layer 4 information—Source IP address, source port, destination IP address,
destination port
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
122
Configuring Port Channels
Symmetric Hashing
Note Devices that run Cisco IOS can optimize the behavior of the member ports ASICs if a failure of a single
member occurred by running the port-channel hash-distribution command. The Cisco Nexus 9000 Series
device performs this optimization by default and does not require or support this command. Cisco NX-OS
does support the customization of the load-balancing criteria on port channels through the port-channel
load-balance command for the entire device.
Symmetric Hashing
To be able to effectively monitor traffic on a port channel, it is essential that each interface connected to a
port channel receives both forward and reverse traffic flows. Normally, there is no guarantee that the forward
and reverse traffic flows will use the same physical interface. However, when you enable symmetric hashing
on the port channel, bidirectional traffic is forced to use the same physical interface and each physical interface
in the port channel is effectively mapped to a set of flows.
When symmetric hashing is enabled, the parameters used for hashing, such as the source and destination IP
address, are normalized before they are entered into the hashing algorithm. This process ensures that when
the parameters are reversed (the source on the forward traffic becomes the destination on the reverse traffic),
the hash output is the same. Therefore, the same interface is chosen.
Only the following load-balancing algorithms support symmetric hashing:
• src-dst ip
• src-dst ip-l4port
Resilient Hashing
With the exponential increase in the number of physical links used in data centers, there is also the potential
for an increase in the number of failed physical links. In static hashing systems that are used for load balancing
flows across members of port channels or Equal Cost Multipath (ECMP) groups, each flow is hashed to a
link. If a link fails, all flows are rehashed across the remaining working links. This rehashing of flows to links
results in some packets being delivered out of order even for those flows that were not hashed to the failed
link.
This rehashing also occurs when a link is added to the port channel or Equal Cost Multipath (ECMP) group.
All flows are rehashed across the new number of links, which results in some packets being delivered out of
order.
Resilient hashing maps flows to physical ports and it is supported for both ECMP groups and port channel
interfaces.
If a physical link fails, the flows originally assigned to the failed link are redistributed uniformly among the
remaining working links. The existing flows through the working links are not rehashed and hence are not
impacted.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
123
Configuring Port Channels
LACP
Resilient hashing supports IPv4 and IPv6 unicast traffic, but it does not support IPv4 multicast traffic.
Resilient hashing is supported on all the Cisco Nexus 9000 Series platforms. . Beginning Cisco NX-OS Release
9.3(3), resilient hashing is supported on Cisco Nexus 92160YC-X, 92304QC, 9272Q, 9232C, 9236C, 92300YC
switches.
LACP
LACP allows you to configure up to 16 interfaces into a port channel.
LACP Overview
The Link Aggregation Control Protocol (LACP) for Ethernet is defined in IEEE 802.1AX and IEEE 802.3ad.
This protocol controls how physical ports are bundled together to form one logical channel.
Note You must enable LACP before you can use LACP. By default, LACP is disabled. See the “Enabling LACP”
section for information about enabling LACP.
The system automatically takes a checkpoint before disabling the feature, and you can roll back to this
checkpoint. See the Cisco Nexus 9000 Series NX-OS System Management Configuration Guide for information
about rollbacks and checkpoints.
The following figure shows how individual links can be combined into LACP port channels and channel
groups as well as function as individual links.
Figure 9: Individual Links Combined into a Port Channel
Note When you delete the port channel, the software automatically deletes the associated channel group. All member
interfaces revert to their original configuration.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
124
Configuring Port Channels
Port-Channel Modes
You cannot disable LACP while any LACP configurations are present.
Port-Channel Modes
Individual interfaces in port channels are configured with channel modes. When you run static port channels
with no aggregation protocol, the channel mode is always set to on. After you enable LACP globally on the
device, you enable LACP for each channel by setting the channel mode for each interface to either active or
passive. You can configure channel mode for individual links in the LACP channel group when you are
adding the links to the channel group
Note You must enable LACP globally before you can configure an interface in either the active or passive channel
mode.
Both the passive and active modes allow LACP to negotiate between ports to determine if they can form a
port channel based on criteria such as the port speed and the trunking state.The passive mode is useful when
you do not know whether the remote system, or partner, supports LACP.
Two devices can form an LACP port channel when their ports are in different LACP modes if the modes are
compatible as in the following example:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
125
Configuring Port Channels
LACP ID Parameters
Passive Passive Cannot form a port channel because no ports can initiate
negotiation.
LACP ID Parameters
This section describes the LACP parameters.
Note The LACP system ID is the combination of the LACP system priority value and the MAC address.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
126
Configuring Port Channels
LACP Marker Responders
Table 11: Port Channels with LACP Enabled and Static Port Channels
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
127
Configuring Port Channels
LACP Port-Channel Minimum Links and MaxBundle
other members, the auxiliary LACP ports, are brought up. This avoids having the links becoming suspended
when PDUs are not received.
Which port in the port-channel comes up first depends on the port-priority value of the ports. A member link
in a port channel with lowest priority value, will come come up first as a LACP delayed port. Regardless of
the operational status of the links, the configured priority of a LACP port is used to select the delayed-lacp
port
This feature supports Layer 2 port channels, trunk mode spanning tree, and vPC and has the following
limitations:
• Using no lacp suspend-individual and lacp mode delay on a same port channel is not recommended
because it can put non-lacp delayed ports in individual state. As a best practice, you must avoid combining
these two configurations.
• Not supported on Layer 3 port channels.
• Not supported on Cisco Nexus 9500 Switches and FEX HIF and FEX fabric ports.
The LACP MaxBundle defines the maximum number of bundled ports allowed in a LACP port channel.
The LACP MaxBundle feature does the following:
• Defines an upper limit on the number of bundled ports in an LACP port channel.
• Allows hot-standby ports with fewer bundled ports. (For example, in an LACP port channel with five
ports, you can designate two of those ports as hot-standby ports.)
Note The minimum links and maxbundle feature works only with LACP port channels. However, the device allows
you to configure this feature in non-LACP port channels, but the feature is not operational.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
128
Configuring Port Channels
Virtualization Support
on LACP-enabled interfaces. To configure the LACP fast time rate, see the “Configuring the LACP Fast
Timer Rate” section.
ISSU and ungraceful switchovers are not supported with LACP fast timers.
Virtualization Support
You must configure the member ports and other port channel-related configuration from the virtual device
context (VDC) that contains the port channel and member ports. You can use the numbers from 1 to 4096 in
each VDC to number the port channels.
All ports in one port channel must be in the same VDC. When you are using LACP, all possible 8 active ports
and all possible 8 standby ports must be in the same VDC.
Note You must configure load balancing using port channels in the default VDC. See the “Load Balancing Using
Port Channels” section for more information about load balancing.
High Availability
Port channels provide high availability by load balancing traffic across multiple ports. If a physical port fails,
the port channel is still operational if there is an active member in the port channel. You can bundle ports
from different modules and create a port channel that remains operational even if a module fails because the
settings are common across the module.
Port channels support stateful and stateless restarts. A stateful restart occurs on a supervisor switchover. After
the switchover, the Cisco NX-OS software applies the runtime configuration after the switchover.
The port channel goes down if the operational ports fall below the configured minimum links number.
Note See the Cisco Nexus 9000 Series NX-OS High Availability and Redundancy Guide for complete information
about high-availability features.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
129
Configuring Port Channels
Guidelines and Limitations
Default Settings
The following table lists the default settings for port-channel parameters.
Parameters Default
Load balancing method for Layer 3 interfaces Source and destination IP address
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
130
Configuring Port Channels
Configuring Port Channels
Parameters Default
Load balancing method for Layer 2 interfaces Source and destination MAC address
LACP Disabled
Channel mode on
Maxbundle 32
Note See the "Configuring Basic Interface Parameters” chapter for information about configuring the maximum
transmission unit (MTU) for the port-channel interface. See the “Configuring Layer 3 Interfaces” chapter for
information about configuring IPv4 and IPv6 addresses on the port-channel interface.
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might
differ from the Cisco IOS commands that you would use.
Note When the port channel is created before the channel group, the port channel should be configured with all of
the interface attributes that the member interfaces are configured with. Use the switchport mode trunk
{allowed vlan vlan-id | native vlan-id} command to configure the members.
This is required only when the channel group members are Layer 2 ports (switchport) and trunks (switchport
mode trunk).
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
131
Configuring Port Channels
Creating a Port Channel
Note Use the no interface port-channel command to remove the port channel and delete the associated channel
group.
Command Purpose
no interface port-channel channel-number Removes the port channel and deletes the
associated channel group.
Example:
switch(config)# no interface port-channel 1
SUMMARY STEPS
1. configure terminal
2. interface port-channel channel-number
3. show port-channel summary
4. no shutdown
5. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel channel-number Specifies the port-channel interface to configure, and enters
the interface configuration mode. The range is from 1 to
Example:
4096. The Cisco NX-OS software automatically creates the
switch(config)# interface port-channel 1 channel group if it does not already exist.
switch(config-if)
Step 3 show port-channel summary (Optional) Displays information about the port channel.
Example:
switch(config-router)# show port-channel
summary
Step 4 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
132
Configuring Port Channels
Adding a Layer 2 Port to a Port Channel
Example
This example shows how to create a port channel:
switch# configure terminal
switch (config)# interface port-channel 1
See the “Compatibility Requirements” section for details on how the interface configuration changes
when you delete the port channel.
Note Use the no channel-group command to remove the port from the channel group.
Command Purpose
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. switchport
4. switchport mode trunk
5. switchport trunk {allowed vlan vlan-id | native vlan-id}
6. channel-group channel-number [force] [mode {on | active | passive}]
7. show interface type slot/port
8. no shutdown
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
133
Configuring Port Channels
Adding a Layer 2 Port to a Port Channel
DETAILED STEPS
Step 2 interface type slot/port Specifies the interface that you want to add to a channel
group, and enters the interface configuration mode.
Example:
switch(config)# interface ethernet 1/4
switch(config-if)#
Step 4 switchport mode trunk (Optional) Configures the interface as a Layer 2 trunk port.
Example:
switch(config)# switchport mode trunk
Step 5 switchport trunk {allowed vlan vlan-id | native vlan-id} (Optional) Configures necessary parameters for a Layer 2
trunk port.
Example:
switch(config)# switchport trunk native 3
switch(config-if)#
Step 6 channel-group channel-number [force] [mode {on | active Configures the port in a channel group and sets the mode.
| passive}] The channel-number range is from 1 to 4096. This command
creates the port channel associated with this channel group
Example:
if the port channel does not already exist. All static
• switch(config-if)# channel-group 5 port-channel interfaces are set to mode on. You must set
all LACP-enabled port-channel interfaces to active or
• switch(config-if)# channel-group 5 force
passive. The default mode is on.
(Optional) Forces an interface with some incompatible
configurations to join the channel. The forced interface must
have the same speed, duplex, and flow control settings as
the channel group.
Note The force option fails if the port has a QoS
policy mismatch with the other members of
the port channel.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
134
Configuring Port Channels
Adding a Layer 3 Port to a Port Channel
Step 9 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to add a Layer 2 Ethernet interface 1/4 to channel group 5:
switch# configure terminal
switch (config)# interface ethernet 1/4
switch(config-if)# switchport
switch(config-if)# channel-group 5
Note Use the no channel-group command to remove the port from the channel group. The port reverts to its original
configuration. You must reconfigure the IP addresses for this port.
Command Purpose
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
135
Configuring Port Channels
Adding a Layer 3 Port to a Port Channel
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. no switchport
4. channel-group channel-number [force] [mode {on | active | passive}]
5. show interface type slot/port
6. no shutdown
7. copy running-config startup-config
DETAILED STEPS
Step 2 interface type slot/port Specifies the interface that you want to add to a channel
group, and enters the interface configuration mode.
Example:
switch(config)# interface ethernet 1/4
switch(config-if)#
Step 4 channel-group channel-number [force] [mode {on | active Configures the port in a channel group and sets the mode.
| passive}] The channel-number range is from 1 to 4096. The Cisco
NX-OS software creates the port channel associated with
Example:
this channel group if the port channel does not already exist.
• switch(config-if)# channel-group 5
(Optional) Forces an interface with some incompatible
• switch(config-if)# channel-group 5 force configurations to join the channel. The forced interface must
have the same speed, duplex, and flow control settings as
the channel group.
Step 6 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
136
Configuring Port Channels
Configuring the Bandwidth and Delay for Informational Purposes
Example
This example shows how to add a Layer 3 Ethernet interface 1/5 to channel group 6 in on mode:
switch# configure terminal
switch (config)# interface ethernet 1/5
switch(config-if)# switchport
switch(config-if)# channel-group 6
This example shows how to create a Layer 3 port-channel interface and assign the IP address:
switch# configure terminal
switch (config)# interface port-channel 4
switch(config-if)# ip address 192.0.2.1/8
SUMMARY STEPS
1. configure terminal
2. interface port-channel channel-number
3. bandwidth value
4. delay value
5. exit
6. show interface port-channel channel-number
7. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel channel-number Specifies the port-channel interface that you want to
configure, and enters the interface mode.
Example:
switch(config)# interface port-channel 2
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
137
Configuring Port Channels
Shutting Down and Restarting the Port-Channel Interface
Step 4 delay value Specifies the throughput delay, which is used for
informational purposes. The range is from 1 to 16,777,215
Example:
tens of microseconds. The default value is 10 microseconds.
switch(config-if)# delay 10000
switch(config-if)#
Step 5 exit Exits the interface mode and returns to the configuration
mode.
Example:
switch(config-if)# exit
switch(config)#
Step 6 show interface port-channel channel-number (Optional) Displays interface information for the specified
port channel.
Example:
switch# show interface port-channel 2
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to configure the informational parameters of the bandwidth and delay for
port channel 5:
switch# configure terminal
switch (config)# interface port-channel 5
switch(config-if)# bandwidth 60000000
switch(config-if)# delay 10000
switch(config-if)#
SUMMARY STEPS
1. configure terminal
2. interface port-channel channel-number
3. shutdown
4. exit
5. show interface port-channel channel-number
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
138
Configuring Port Channels
Shutting Down and Restarting the Port-Channel Interface
6. no shutdown
7. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel channel-number Specifies the port-channel interface that you want to
configure, and enters the interface mode.
Example:
switch(config)# interface port-channel 2
switch(config-if)#
Step 3 shutdown Shuts down the interface. No traffic passes and the interface
displays as administratively down. The default is no
Example:
shutdown.
switch(config-if)# shutdown
switch(config-if)# Note Use the no shutdown command to open the
interface.
The interface displays as administratively up.
If there are no operational problems, traffic
passes. The default is no shutdown.
Step 4 exit Exits the interface mode and returns to the configuration
mode.
Example:
switch(config-if)# exit
switch(config)#
Step 5 show interface port-channel channel-number (Optional) Displays interface information for the specified
port channel.
Example:
switch(config-router)# show interface port-channel
2
Step 6 no shutdown (Optional) Clears the errors on the interfaces and VLANs
where policies correspond with hardware policies. This
Example:
command allows policy programming to continue and the
switch# configure terminal port to come up. If policies do not correspond, the errors
switch(config)# int e3/1
switch(config-if)# no shutdown
are placed in an error-disabled policy state.
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
139
Configuring Port Channels
Configuring a Port-Channel Description
Example
This example shows how to bring up the interface for port channel 2:
switch# configure terminal
switch (config)# interface port-channel 2
switch(config-if)# no shutdown
SUMMARY STEPS
1. configure terminal
2. interface port-channel channel-number
3. description
4. exit
5. show interface port-channel channel-number
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel channel-number Specifies the port-channel interface that you want to
configure, and enters the interface mode.
Example:
switch(config)# interface port-channel 2
switch(config-if)#
Step 4 exit Exits the interface mode and returns to the configuration
mode.
Example:
switch(config-if)# exit
switch(config)#
Step 5 show interface port-channel channel-number (Optional) Displays interface information for the specified
port channel.
Example:
switch# show interface port-channel 2
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
140
Configuring Port Channels
Configuring the Speed and Duplex Settings for a Port-Channel Interface
Example
This example shows how to add a description to port channel 2:
switch# configure terminal
switch (config)# interface port-channel 2
switch(config-if)# description engineering
SUMMARY STEPS
1. configure terminal
2. interface port-channel channel-number
3. speed {10 | 100 | 1000 | auto}
4. duplex {auto | full | half}
5. exit
6. show interface port-channel channel-number
7. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel channel-number Specifies the port-channel interface that you want to
configure, and enters the interface mode.
Example:
switch(config)# interface port-channel 2
switch(config-if)#
Step 3 speed {10 | 100 | 1000 | auto} Sets the speed for the port-channel interface. The default is
auto for autonegotiation.
Example:
switch(config-if)# speed auto
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
141
Configuring Port Channels
Configuring Load Balancing Using Port Channels
Step 5 exit Exits the interface mode and returns to the configuration
mode.
Example:
switch(config-if)# exit
switch(config)#
Step 6 show interface port-channel channel-number (Optional) Displays interface information for the specified
port channel.
Example:
switch# show interface port-channel 2
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to set port channel 2 to 100 Mb/s:
switch# configure terminal
switch (config)# interface port-channel 2
switch(config-if)# speed 100
Note Use the no port-channel load-balance command to restore the default load-balancing algorithm of
source-dest-mac for non-IP traffic and source-dest-ip for IP traffic.
Command Purpose
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
142
Configuring Port Channels
Enabling LACP
SUMMARY STEPS
1. configure terminal
2. port-channel load-balance method {dst ip | dst ip-gre | dst ip-l4port | dst ip-l4port-vlan | dst ip-vlan
| dst l4port | dst mac | src ip | src ip-gre | src ip-l4port | src ip-l4port-vlan | src ip-vlan | src l4port |
src mac | src-dst ip | src-dst ip-gre | src-dst ip-l4port [symmetric] | src-dst ip-l4port-vlan | src-dst
ip-vlan | src-dst l4port | src-dst mac} [fex {fex-range | all}] [rotate rotate]
3. show port-channel load-balance
4. copy running-config startup-config
DETAILED STEPS
Step 2 port-channel load-balance method {dst ip | dst ip-gre | Specifies the load-balancing algorithm for the device. The
dst ip-l4port | dst ip-l4port-vlan | dst ip-vlan | dst l4port range depends on the device. The default for Layer 3 is
| dst mac | src ip | src ip-gre | src ip-l4port | src src-dst ip-l4port for both IPv4 and IPv6, and the default
ip-l4port-vlan | src ip-vlan | src l4port | src mac | src-dst for non-IP is src-dst mac.
ip | src-dst ip-gre | src-dst ip-l4port [symmetric] | src-dst
Note Only the following load-balancing algorithms
ip-l4port-vlan | src-dst ip-vlan | src-dst l4port | src-dst
support symmetric hashing:
mac} [fex {fex-range | all}] [rotate rotate]
• src-dst ip
Example:
• switch(config)# port-channel load-balance • src-dst ip-l4port
src-dst mac
switch(config)#
Step 4 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Enabling LACP
LACP is disabled by default; you must enable LACP before you begin LACP configuration. You cannot
disable LACP while any LACP configuration is present.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
143
Configuring Port Channels
Configuring LACP Port-Channel Port Modes
LACP learns the capabilities of LAN port groups dynamically and informs the other LAN ports. Once LACP
identifies correctly matched Ethernet links, it group the links into a port channel. The port channel is then
added to the spanning tree as a single bridge port.
To configure LACP, you must do the following:
• Enable LACP globally by using the feature lacp command.
• You can use different modes for different interfaces within the same LACP-enabled port channel. You
can change the mode between active and passive for an interface only if it is the only interface that is
designated to the specified channel group.
SUMMARY STEPS
1. configure terminal
2. feature lacp
3. copy running-config startup-config
DETAILED STEPS
Step 3 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to enable LACP:
switch# configure terminal
switch (config)# feature lacp
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
144
Configuring Port Channels
Configuring LACP Port-Channel Port Modes
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. channel-group number mode {active | on | passive}
4. show port-channel summary
5. copy running-config startup-config
DETAILED STEPS
Step 2 interface type slot/port Specifies the interface that you want to add to a channel
group, and enters the interface configuration mode.
Example:
switch(config)# interface ethernet 1/4
switch(config-if)#
Step 3 channel-group number mode {active | on | passive} Specifies the port mode for the link in a port channel. After
LACP is enabled, you configure each link or the entire
Example:
channel as active or passive.
switch(config-if)# channel-group 5 mode active
When you run port channels with no associated aggregation
protocol, the port-channel mode is always on.
The default port-channel mode is on.
Step 4 show port-channel summary (Optional) Displays summary information about the port
channels.
Example:
switch(config-if)# show port-channel summary
Step 5 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to set the LACP-enabled interface to the active port-channel mode for
Ethernet interface 1/4 in channel group 5:
switch# configure terminal
switch (config)# interface ethernet 1/4
switch(config-if)# channel-group 5 mode active
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
145
Configuring Port Channels
Configuring LACP Port-Channel Minimum Links
Note Use the no lacp min-links command to restore the default port-channel minimum links configuration.
Command Purpose
SUMMARY STEPS
1. configure terminal
2. interface port-channel number
3. lacp min-links number
4. show running-config interface port-channel number
DETAILED STEPS
Step 2 interface port-channel number Specifies the interface to configure, and enters the interface
configuration mode.
Example:
switch(config)# interface port-channel 3
switch(config-if)#
Step 3 lacp min-links number Specifies the port-channel interface to configure the number
of minimum links. The range is from 1 to 16.
Example:
switch(config-if)# lacp min-links 3
Step 4 show running-config interface port-channel number (Optional) Displays the port-channel minimum links
configuration.
Example:
switch(config-if)# show running-config interface
port-channel 3
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
146
Configuring Port Channels
Configuring the LACP Port-Channel MaxBundle
Example
This example shows how to configure the minimum number of port-channel member interfaces to
be up/active for the port-channel to be up/active:
switch# configure terminal
switch(config)# interface port-channel 3
switch(config-if)# lacp min-links 3
Note Use the no lacp max-bundle command to restore the default port-channel max-bundle configuration.
Command Purpose
SUMMARY STEPS
1. configure terminal
2. interface port-channel number
3. lacp max-bundle number
4. show running-config interface port-channel number
DETAILED STEPS
Step 2 interface port-channel number Specifies the interface to configure, and enters the interface
configuration mode.
Example:
switch(config)# interface port-channel 3
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
147
Configuring Port Channels
Configuring the LACP Fast Timer Rate
Step 4 show running-config interface port-channel number (Optional) Displays the port-channel max-bundle
configuration.
Example:
switch(config-if)# show running-config interface
port-channel 3
Example
This example shows how to configure the port channel interface max-bundle:
switch# configure terminal
switch(config)# interface port-channel 3
switch(config-if)# lacp max-bundle 3
Note We do not recommend changing the LACP timer rate. HA and SSO are not supported when the LACP fast
rate timer is configured.
Note Configuring lacp rate fast is not recommended on the vPC Peer-Links. When lacp rate fast is configured
on the vPC Peer-Link member interfaces, an alert is displayed in the syslog messages only when the LACP
logging level is set to 5.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
148
Configuring Port Channels
Configuring the LACP System Priority
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. lacp rate fast
DETAILED STEPS
Step 2 interface type slot/port Specifies the interface to configure and enters the interface
configuration mode.
Example:
switch(config)# interface ethernet 1/4
switch(config-if)#
Step 3 lacp rate fast Configures the fast rate (one second) at which LACP control
packets are sent to an LACP-supported interface.
Example:
switch(config-if)# lacp rate fast To reset the timeout rate to its default, use the no form of
the command.
Example
This example shows how to configure the LACP fast rate on Ethernet interface 1/4:
switch# configure terminal
switch (config)# interface ethernet 1/4
switch(config-if)# lacp rate fast
This example shows how to restore the LACP default rate (30 seconds) on Ethernet interface 1/4.
switch# configure terminal
switch (config)# interface ethernet 1/4
switch(config-if)# no lacp rate fast
SUMMARY STEPS
1. configure terminal
2. lacp system-priority priority
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
149
Configuring Port Channels
Configuring the LACP Port Priority
DETAILED STEPS
Step 2 lacp system-priority priority Configures the system priority for use with LACP. Valid
values are from 1 through 65535, and higher numbers have
Example:
a lower priority. The default value is 32768.
switch(config)# lacp system-priority 40000
Note Each VDC has a different LACP system ID
because the software adds the MAC address
to this configured value.
Step 3 show lacp system-identifier (Optional) Displays the LACP system identifier.
Example:
switch(config-if)# show lacp system-identifier
Step 4 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to set the LACP system priority to 2500:
switch# configure terminal
switch(config)# lacp system-priority 2500
SUMMARY STEPS
1. configure terminal
2. interface type slot/port
3. lacp port-priority priority
4. copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
150
Configuring Port Channels
Disabling LACP Graceful Convergence
DETAILED STEPS
Step 2 interface type slot/port Specifies the interface that you want to add to a channel
group, and enters the interface configuration mode.
Example:
switch(config)# interface ethernet 1/4
switch(config-if)#
Step 3 lacp port-priority priority Configures the port priority for use with LACP. Valid values
are from 1 through 65535, and higher numbers have a lower
Example:
priority. The default value is 32768.
switch(config-if)# lacp port-priority
40000
Step 4 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config-if)# copy running-config
startup-config
Example
This example shows how to set the LACP port priority for Ethernet interface 1/4 to 40000:
switch# configure terminal
switch (config)# interface ethernet 1/4
switch(config-if)# lacp port-priority 40000
Note The port channel has to be in the administratively down state before the command can be run.
SUMMARY STEPS
1. configure terminal
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
151
Configuring Port Channels
Disabling LACP Graceful Convergence
DETAILED STEPS
Step 2 interface port-channel number Specifies the port channel interface to configure and enters
the interface configuration mode.
Example:
switch(config)# interface port-channel 1
switch(config-if)#
Step 4 no lacp graceful-convergence Disables LACP graceful convergence on the port channel.
Example:
switch(config-if)# no lacp graceful-convergence
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to disable LACP graceful convergence on a port channel:
switch# configure terminal
switch (config)# interface port-channel 1
switch(config-if)# shutdown
switch(config-if)# no lacp graceful-convergence
switch(config-if)# no shutdown
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
152
Configuring Port Channels
Reenabling LACP Graceful Convergence
SUMMARY STEPS
1. configure terminal
2. interface port-channel number
3. shutdown
4. lacp graceful-convergence
5. no shutdown
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel number Specifies the port channel interface to configure and enters
the interface configuration mode.
Example:
switch(config)# interface port-channel 1
switch(config-if)#
Step 4 lacp graceful-convergence Enables LACP graceful convergence on the port channel.
Example:
switch(config-if)# lacp graceful-convergence
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to enable LACP graceful convergence on a port channel:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
153
Configuring Port Channels
Disabling LACP Suspend Individual
Note You should only enter the lacp suspend-individual command on edge ports. The port channel has to be in
the administratively down state before you can use this command.
SUMMARY STEPS
1. configure terminal
2. interface port-channel number
3. shutdown
4. no lacp suspend-individual
5. no shutdown
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel number Specifies the port channel interface to configure and enters
the interface configuration mode.
Example:
switch(config)# interface port-channel 1
switch(config-if)#
Step 4 no lacp suspend-individual Disables LACP individual port suspension behavior on the
port channel.
Example:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
154
Configuring Port Channels
Reenabling LACP Suspend Individual
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to disable LACP individual port suspension on a port channel:
switch# configure terminal
switch (config)# interface port-channel 1
switch(config-if)# shutdown
switch(config-if)# no lacp suspend-individual
switch(config-if)# no shutdown
SUMMARY STEPS
1. configure terminal
2. interface port-channel number
3. shutdown
4. lacp suspend-individual
5. no shutdown
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel number Specifies the port channel interface to configure and enters
the interface configuration mode.
Example:
switch(config)# interface port-channel 1
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
155
Configuring Port Channels
Configuring Port Channel Hash Distribution
Step 4 lacp suspend-individual Enables LACP individual port suspension behavior on the
port channel.
Example:
switch(config-if)# lacp suspend-individual
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to reenable the LACP individual port suspension on a port channel:
switch# configure terminal
switch (config)# interface port-channel 1
switch(config-if)# shutdown
switch(config-if)# lacp suspend-individual
switch(config-if)# no shutdown
SUMMARY STEPS
1. configure terminal
2. no port-channel hash-distribution {adaptive | fixed}
3. copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
156
Configuring Port Channels
Configuring Port Channel Hash Distribution at the Port Channel Level
DETAILED STEPS
Step 2 no port-channel hash-distribution {adaptive | fixed} Specifies the port-channel hash distribution at the global
level.
Example:
switch(config)# port-channel hash-distribution The default is adaptive mode.
adaptive
switch(config)#
The command does not take effect until the next member
link event (link down/up/no shutdown/shutdown). (Do you
still want to continue(y/n)? [yes])
Step 3 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to configure hash distribution at the global level:
switch# configure terminal
switch(config)# no port-channel hash-distribution fixed
SUMMARY STEPS
1. configure terminal
2. interface port-channel {channel-number | range}
3. no port-channel port hash-distribution {adaptive | fixed}
4. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel {channel-number | range} Specifies the interface to configure, and enters the interface
configuration mode.
Example:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
157
Configuring Port Channels
Verifying the Port-Channel Configuration
Step 3 no port-channel port hash-distribution {adaptive | fixed} Specifies the port-channel hash distribution at the port
channel level.
Example:
switch(config-if)# port-channel port There is no default.
hash-distribution adaptive
switch(config-if)
The command does not take effect until the next member
link event (link down/up/no shutdown/shutdown). (Do you
still want to continue(y/n)? [yes])
Step 4 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch(config)# copy running-config startup-config
Example
This example shows how to configure hash distribution as a global-level command:
switch# configure terminal
switch(config)# no port-channel hash-distribution fixed
Command Purpose
load- interval {interval seconds {1 | 2 | 3}} Sets three different sampling intervals to bit-rate and
packet-rate statistics.
show port-channel compatibility-parameters Displays the parameters that must be the same among
the member ports in order to join a port channel.
show port-channel database [interface Displays the aggregation state for one or more
port-channel channel-number] port-channel interfaces.
show port-channel load-balance Displays the type of load balancing in use for port
channels.
show port-channel traffic Displays the traffic statistics for port channels.
show port-channel usage Displays the range of used and unused channel
numbers.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
158
Configuring Port Channels
Monitoring the Port-Channel Interface Configuration
Command Purpose
show running-config interface port-channel Displays information about the running configuration
channel-number of the port-channel.
Command Purpose
load- interval {interval seconds {1 | 2 | 3}} Sets three different sampling intervals to bit-rate and
packet-rate statistics.
show interface counters [module module] Displays input and output octets unicast packets,
multicast packets, and broadcast packets.
show interface counters detailed [all] Displays input packets, bytes, and multicast and output
packets and bytes.
show interface counters errors [module module] Displays information about the number of error
packets.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
159
Configuring Port Channels
Related Documents
This example shows how to add two Layer 3 interfaces to a channel group. The Cisco NX-OS software
automatically creates the port channel:
Related Documents
Related Topic Document Title
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
160
CHAPTER 8
Configuring vPCs
This chapter describes how to configure virtual port channels (vPCs) on Cisco NX-OS devices.
• Information About vPCs, on page 161
• Guidelines and Limitations, on page 187
• Best Practices for Layer 3 and vPC Configuration, on page 190
• Default Settings, on page 196
• Configuring vPCs, on page 197
• Verifying the vPC Configuration, on page 225
• Monitoring vPCs, on page 226
• Configuration Examples for vPCs, on page 226
• Related Documents, on page 228
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
161
Configuring vPCs
vPC Overview
You can use only Layer 2 port channels in the vPC.You configure the port channels by using one of the
following:
• No protocol
• Link Aggregation Control Protocol (LACP)
When you configure the port channels in a vPC—including the vPC Peer-Link channel—without using LACP,
each device can have up to 32 active links in a single port channel. When you configure the port channels in
a vPC—including the vPC Peer-Link channels—using LACP, each device can have 32 active links and eight
standby links in a single port channel. (See the “vPC Interactions with Other Features” section for more
information on using LACP and vPCs.)
Note You must enable the vPC feature before you can configure or run the vPC functionality.
After you enable the vPC functionality, you create the peer-keepalive link, which sends heartbeat messages
between the two vPC peer devices.
You can create a vPC Peer-Link by configuring a port channel on one Cisco Nexus 9000 Series chassis by
using two or more Ethernet ports higher speed than 1-Gigabit Ethernet. To ensure that you have the correct
hardware to enable and run a vPC, enter the show hardware feature-capability command. If you see an X
across from the vPC in your command output, your hardware cannot enable the vPC feature.
We recommend that you configure the vPC Peer-Link Layer 2 port channels as trunks. On another Cisco
Nexus 9000 Series chassis, you configure another port channel again using two or more Ethernet ports
withspeed higher than 1-Gigabit in the dedicated port mode. Connecting these two port channels creates a
vPC Peer-Link in which the two linked Cisco Nexus devices appear as one device to a third device. The third
device, or downstream device, can be a switch, server, or any other networking device that uses a regular port
channel to connect to the vPC.
For modular Cisco Nexus 9500 switches, we recommend that you configure the vPC Peer-Links on dedicated
ports of different modules to reduce the possibility of a failure. For the best resiliency scenario, use at least
two modules.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
162
Configuring vPCs
Hitless vPC Role Change
You can use any of the interfaces of the Nexus 9000 device for the vPC Peer-Link.If you must configure all
the vPC Peer-Links and core-facing interfaces on a single module, you should configure a track object that
is associated with the Layer 3 link to the core and on all the links on the vPC Peer-Link on both vPC peer
devices.
The vPC domain includes both vPC peer devices, the vPC peer-keepalive link, the vPC Peer-Link, and all of
the port channels in the vPC domain connected to the downstream device. You can have only one vPC domain
ID on each device.
In this version, you can connect each downstream device to a single vPC domain ID using a single port channel.
Note Devices attached to a vPC domain using port channels should be connected to both of vPC peers.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
163
Configuring vPCs
vPC Terminology
between vPC peers without impacting traffic flow. The vPC role switching is done based on the role priority
value of the device under the vPC domain. A vPC peer device with lower role priority is selected as the primary
vPC device during the vPC Role switch. You can use the vpc role preempt command to switch vPC role
between peers.
For information about how to configure Hitless vPC Role Change, see Configuring Hitless vPC Role Change,
on page 223.
vPC Terminology
The terminology used in vPCs is as follows:
• vPC—The combined port channel between the vPC peer devices and the downstream device.
• vPC peer device—One of a pair of devices that are connected with the special port channel known as
the vPC Peer-Link.
• vPC Peer-Link—The link used to synchronize state between the vPC peer devices. This link must use a
10-Gigabit Ethernet interface at a minimum. Higher-bandwidth interfaces (such as 25-Gigabit Ethernet,
40-Gigabit Ethernet, 100-Gigabit Ethernet, and so on) may also be used.
• vPC member port—An interface that belongs to a vPC.
• Host vPC port—A Fabric Extender host interfaces that belongs to a vPC.
• vPC domain—This domain includes both vPC peer devices, the vPC peer-keepalive link, and all of the
port channels in the vPC connected to the downstream devices. It is also associated to the configuration
mode that you must use to assign vPC global parameters.
• vPC peer-keepalive link—The peer-keepalive link monitors the vitality of a vPC peer Cisco Nexus 9000
Series device. The peer-keepalive link sends configurable, periodic keepalive messages between vPC
peer devices.
We recommend that you associate a peer-keepalive link to a separate virtual routing and forwarding
(VRF) instance that is mapped to a Layer 3 interface in each vPC peer device. If you do not configure a
separate VRF, the system uses the management VRF by default. However, if you use the management
interfaces for the peer-keepalive link, you must put a management switch connected to both the active
and standby management ports on each vPC peer device (see figure).
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
164
Configuring vPCs
vPC Peer-Link Overview
Figure 12: Separate Switch Required to Connect Management Ports for vPC Peer-Keepalive Link
No data or synchronization traffic moves over the vPC peer-keepalive link; the only traffic on this link
is a message that indicates that the originating switch is operating and running a vPC.
• vPC member port—Interfaces that belong to the vPCs.
• Dual-active— Both vPC peers act as primary. This situation occurs when the peer-keepalive and vPC
Peer-Link go down when both the peers are still active. In this case, the secondary vPC assumes that the
primary vPC is inactive and acts as the primary vPC.
• Recovery—When the peer-keepalive and the vPC Peer-Link come up, one switch becomes the secondary
vPC. On the switch that becomes the secondary vPC, the vPC links go down and come back up.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
165
Configuring vPCs
vPC Peer-Link Overview
To make a valid configuration, you first configure a port channel on each device and then configure the vPC
domain. You assign the port channel on each device as a vPC Peer-Link, using the same vPC domain ID. For
redundancy, we recommend that you should configure at least two of the dedicated ports into the port channel
because if one of the interfaces in the vPC Peer-Link fails, the device automatically falls back to use another
interface in the vPC Peer-Link.
Note We recommend that you configure the Layer 2 port channels in trunk mode.
Many operational parameters and configuration parameters must be the same in each device connected by a
vPC Peer-Link (see the Compatibility Parameters for vPC Interfaces section). Because each device is completely
independent on the management plane, you must ensure that the devices are compatible on the critical
parameters. vPC peer devices have separate control planes. After configuring the vPC Peer-Link, you should
display the configuration on each vPC peer device to ensure that the configurations are compatible.
Note You must ensure that the two devices connected by the vPC Peer-Link have certain identical operational and
configuration parameters. For more information on required configuration consistency, see the Compatibility
Parameters for vPC Interfaces section.
When you configure the vPC Peer-Link, the vPC peer devices negotiate that one of the connected devices is
the primary device and the other connected device is the secondary device (see the “Configuring vPCs”
section). The Cisco NX-OS software uses the lowest MAC address to elect the primary device. The software
takes different actions on each device—that is, the primary and secondary—only in certain failover conditions.
If the primary device fails, the secondary device becomes the new primary device when the system recovers,
and the previously primary device is now the secondary device.
You can also configure which of the vPC devices is the primary device. Changing the priority of the vPC peer
devices can cause the interfaces in your network to go up and down. If you want to configure the role priority
again to make one vPC device the primary device, configure the role priority on both the primary vPC device
with a lower priority value and the secondary vPC device with the higher value. Then, shut down the port
channel that is the vPC Peer-Link on both devices by entering the shutdown command, and finally reenable
the port channel on both devices by entering the no shutdown command.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
166
Configuring vPCs
Features That You Must Manually Configure on the Primary and Secondary Devices
Note We recommend that you use two different modules for redundancy on each vPC peer device on each vPC
Peer-Link.
The software keeps all traffic that forwards across the vPC peer devices as local traffic. A packet that ingresses
the port channel uses one of the local links rather than moving across the vPC Peer-Link. Unknown unicast,
multicast, and broadcast traffic (including STP BPDUs) are flooded across the vPC Peer-Link. The software
keeps the multicast forwarding state synchronized on both of the vPC peer devices.
You can configure any of the standard load-balancing schemes on both the vPC Peer-Link devices and the
downstream device (see the Configuring Port Channels chapter for information about load balancing).
Configuration information flows across the vPC Peer-Links using the Cisco Fabric Services over Ethernet
(CFSoE) protocol. (See the CFSoE, on page 183 section for more information about CFSoE.)
All MAC addresses for those VLANs configured on both devices are synchronized between vPC peer devices.
The software uses CFSoE for this synchronization. (See the CFSoE, on page 183 section for information about
CFSoE.)
If the vPC Peer-Link fails, the software checks the status of the remote vPC peer device using the peer-keepalive
link, which is a link between vPC peer devices that ensures that both devices are up. If the vPC peer device
is up, the secondary vPC device disables all vPC ports on its device, to prevent loops and disappearing or
flooding traffic. The data then forwards down the remaining active links of the port channel.
The software learns of a vPC peer device failure when the keepalive messages are not returned over the
peer-keepalive link.
Use a separate link (vPC peer-keepalive link) to send configurable keepalive messages between the vPC peer
devices. The keepalive messages on the vPC peer-keepalive link determines whether a failure is on the vPC
Peer-Link only or on the vPC peer device. The keepalive messages are used only when all the links in the
vPC Peer-Link fail. See the “Peer-Keepalive Link and Messages” section for information about the keepalive
message.
Features That You Must Manually Configure on the Primary and Secondary Devices
You must manually configure the following features to conform to the primary/secondary mapping of each
of the vPC peer devices:
• STP root—Configure the primary vPC peer device as the STP primary root device and configure the
vPC secondary device to be the STP secondary root device. See the “vPC Peer-Links and STP” section
for more information about vPCs and STP.
• We recommend that you configure the vPC Peer-Link interfaces as STP network ports so that Bridge
Assurance is enabled on all vPC Peer-Links.
• We recommend that you configure Rapid per VLAN Spanning Tree plus (PVST+) so that the
primary device is the root for all VLANs and configure Multiple Spanning Tree (MST) so that the
primary device is the root for all instances.
• Layer 3 VLAN network interface—Configure Layer 3 connectivity from each vPC peer device by
configuring a VLAN network interface for the same VLAN from both devices.
• HSRP active—If you want to use Hot Standby Router Protocol (HSRP) and VLAN interfaces on the
vPC peer devices, configure the primary vPC peer device with the HSRP active highest priority. Configure
the secondary device to be the HSRP standby and ensure that you have VLAN interfaces on each vPC
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
167
Configuring vPCs
Configuring Layer 3 Backup Routes on a vPC Peer-Link
device that are in the same administrative and operational mode. (See the “vPC Peer-Links and Routing”
section for more information on vPC and HSRP.)
While you configure Unidirectional Link Detection (UDLD), note the following recommendations:
Note We recommend that you associate the vPC peer-keepalive link to a separate VRF mapped to a Layer 3 interface
in each vPC peer device. If you do not configure a separate VRF, the system uses the management VRF and
management ports by default. Do not use the vPC Peer-Link itself to send and receive vPC peer-keepalive
messages.
If one of the vPC peer devices fails, the vPC peer device on the other side of the vPC Peer-Link senses the
failure by not receiving any peer-keepalive messages. The default interval time for the vPC peer-keepalive
message is 1 second, and you can configure the interval between 400 milliseconds and 10 seconds.
You can configure a hold-timeout value with a range of 3 to 10 seconds; the default hold-timeout value is 3
seconds. This timer starts when the vPC Peer-Link goes down. During this hold-timeout period, the secondary
vPC peer device ignores vPC peer-keepalive messages, which ensures that network convergence occurs before
a vPC action takes place. The purpose of the hold-timeout period is to prevent false-positive cases.
You can also configure a timeout value with a range of 3 to 20 seconds; the default timeout value is 5 seconds.
This timer starts at the end of the hold-timeout interval. During the timeout period, the secondary vPC peer
device checks for vPC peer-keepalive hello messages from the primary vPC peer device. If the secondary
vPC peer device receives a single hello message, that device disables all vPC interfaces on the secondary vPC
peer device.
The difference between the hold-timeout and the timeout parameters is as follows:
• During the hold-timeout, the vPC secondary device does not take any action based on any keepalive
messages received, which prevents the system taking action when the keepalive might be received just
temporarily, such as if a supervisor fails a few seconds after the vPC Peer-Link goes down.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
168
Configuring vPCs
vPC Peer-Gateway
• During the timeout, the vPC secondary device takes action to become the vPC primary device if no
keepalive message is received by the end of the configured interval.
See the “Configuring vPC Keepalive Link and Messages” section for information about configuring the timer
for the keepalive messages.
Note Ensure that both the source and destination IP addresses used for the peer-keepalive messages are unique in
your network and these IP addresses are reachable from the VRF associated with the vPC peer-keepalive link.
Peer-keepalive IP addresses must be global unicast addresses. Link-local addresses are not supported.
Use the command-line interface (CLI) to configure the interfaces you are using the vPC peer-keepalive
messages as trusted ports. Leave the precedence at the default (6) or configure it higher.
vPC Peer-Gateway
You can configure vPC peer devices to act as the gateway even for packets that are destined to the vPC peer
device’s MAC address.
Use the peer-gateway command to configure this feature.
Note The peer-gateway exclude-vlan command that is used when configuring a VLAN interface for Layer 3
backup routing on vPC peer devices is not supported.
Some network-attached storage (NAS) devices or load balancers might have features that help to optimize
the performances of particular applications. These features enable the device to avoid a routing-table lookup
when responding to a request that originated from a host that is not locally attached to the same subnet. Such
devices might reply to traffic using the MAC address of the sender Cisco Nexus 9000 Series device rather
than the common HSRP gateway. This behavior is noncomplaint with some basic Ethernet RFC standards.
Packets that reach a vPC device for the nonlocal router MAC address are sent across the vPC Peer-Link and
could be dropped by the built in vPC loop avoidance mechanism if the final destination is behind another
vPC.
The vPC peer-gateway capability allows a vPC switch to act as the active gateway for packets that are addressed
to the router MAC address of the vPC peer. This feature enables local forwarding of packets without the need
to cross the vPC Peer-Link. In this scenario, the feature optimizes use of the vPC Peer-Link and avoids potential
traffic loss.
Configuring the peer-gateway feature must be done on both primary and secondary vPC peers and is
nondisruptive to the operations of the device or to the vPC traffic. The vPC peer-gateway feature can be
configured globally under the vPC domain submode.
When you enable this feature, Cisco NX-OS automatically disables IP redirects on all interface VLANs
mapped over a vPC VLAN to avoid generation of IP redirect messages for packets switched through the peer
gateway router.
Packets that arrive at the peer-gateway vPC device have their Time to Live (TTL) decremented, so that packets
carrying a TTL of 1 might get dropped in transit due to TTL expiration. You should take this situation into
account when the peer-gateway feature is enabled and particular network protocols that source packets with
a TTL of 1 operate on a vPC VLAN.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
169
Configuring vPCs
vPC Domain
vPC Domain
You can use the vPC domain ID to identify the vPC Peer-Links and the ports that are connected to the vPC
downstream devices.
The vPC domain is also a configuration mode that you use to configure the keepalive messages and other
vPC Peer-Link parameters rather than accept the default values. See the “Configuring vPCs” section for more
information about configuring these parameters.
To create a vPC domain, you must first create a vPC domain ID on each vPC peer device using a number
from 1 to 1000. You can have only one vPC domain per vPC peer.
You must explicitly configure the port channel that you want to act as the vPC Peer-Link on each device. You
associate the port channel that you made a vPC Peer-Link on each device with the same vPC domain ID to
form a single vPC domain. Within this domain, the system provides a loop-free topology and Layer 2
multipathing.
You can only configure these port channels and vPC Peer-Links statically. You can configure the port channels
and vPC Peer-Links either using LACP or no protocol. We recommend that you use LACP with the interfaces
in active mode to configure port channels in each vPC, which ensures an optimized, graceful recovery in a
port-channel failover scenario and provides configuration checks against configuration mismatches among
the port channels themselves.
The vPC peer devices use the vPC domain ID that you configure to automatically assign a unique vPC system
MAC address. Each vPC domain has a unique MAC address that is used as a unique identifier for the specific
vPC-related operations, although the devices use the vPC system MAC addresses only for link-scope operations,
such as LACP. We recommend that you create each vPC domain within the contiguous Layer 2 network with
a unique domain ID. You can also configure a specific MAC address for the vPC domain, rather than having
the Cisco NX-OS software assign the address.
See the “vPC and Orphan Ports” section for more information about displaying the vPC MAC table.
After you create a vPC domain, the Cisco NX-OS software creates a system priority for the vPC domain. You
can also configure a specific system priority for the vPC domain.
Note When manually configuring the system priority, you must ensure that you assign the same priority value on
both vPC peer devices. If the vPC peer devices have different system priority values, vPC does not come up.
vPC Topology
The following figure shows a basic configuration in which the Cisco Nexus 9000 Series device ports are
directly connected to another switch or host and are configured as part of a port channel that becomes part of
a vPC.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
170
Configuring vPCs
vPC Topology
In the figure, vPC 20 is configured on port channel 20, which has Eth1/10 on the first device and Eth2/1 on
the second as member ports.
You can configure a vPC from the peer devices through Fabric Extenders (FEXs) as shown in the figure.
Figure 15: FEX Straight-Through Topology (Host vPC)
In the figure, each FEX is single-homed (straight-through FEX topology) with a Cisco Nexus 9000 Series
device. The host interfaces on this FEX are configured as port channels and those port channels are configured
as vPCs. Eth101/1/1 and Eth102/1/5 are configured as members of PO200, and PO200 is configured for vPC
200.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
171
Configuring vPCs
Compatibility Parameters for vPC Interfaces
In both topologies, port channels P020 and P0200 must be configured identically on the peer switches and
configuration synchronization is used to synchronize the configurations of the vPC switches.
See the Cisco Nexus 2000 Series NX-OS Fabric Extender Configuration Guide for Cisco Nexus 9000 Series
Switches for more information about configuring FEX ports.
Note Enter the show vpc consistency-parameterscommand to display the configured values on all interfaces in
the vPC. The displayed configurations are only those configurations that would limit the vPC Peer-Link and
vPC from coming up.
Note The port channel compatibility parameters must be the same for all the port channel members on the physical
switch. You cannot configure shared interfaces to be part of a vPC.
The compatibility check process for vPCs differs from the compatibility check for regular port channels.
See the “Configuring Port Channels” chapter for information about regular port channels.
Note You must ensure that all interfaces in the vPC have the identical operational and configuration parameters
listed in this section.
Note Enter the show vpc consistency-parameters command to display the configured values on all interfaces in
the vPC. The displayed configurations are only those configurations that would limit the vPC Peer-Link and
vPC from coming up.
The devices automatically check for compatibility for some of these parameters on the vPC interfaces. The
per-interface parameters must be consistent per interface, and the global parameters must be consistent globally:
• Port-channel mode: on, off, or active (port-channel mode can, however, be active/passive on each side
of the vPC peer)
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
172
Configuring vPCs
Configuration Parameters That Should Be Identical
If any of these parameters are not enabled or defined on either device, the vPC consistency check ignores
those parameters.
Note To ensure that none of the vPC interfaces are in the suspend mode, enter the show vpc brief and show vpc
consistency-parameters commands and check the syslog messages.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
173
Configuring vPCs
Consequences of Parameter Mismatches
• Port security
• Cisco Trusted Security (CTS)
• Dynamic Host Configuration Protocol (DHCP) snooping
• Network Access Control (NAC)
• Dynamic ARP Inspection (DAI)
• IP source guard (IPSG)
• Internet Group Management Protocol (IGMP) snooping
• Hot Standby Routing Protocol (HSRP)
• Protocol Independent Multicast (PIM)
• All routing protocol configurations
To ensure that all the configuration parameters are compatible, we recommend that you display the
configurations for each vPC peer device once you configure the vPC.
vPC Number
Once you have created the vPC domain ID and the vPC Peer-Link, you create port channels to attach the
downstream device to each vPC peer device. That is, you create one port channel to the downstream device
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
174
Configuring vPCs
Moving Other Port Channels into a vPC
from the primary vPC peer device and you create another port channel to the downstream device from the
secondary peer device.
Note We recommend that you configure the ports on the downstream devices that connect to a host or a network
device that is not functioning as a switch or a bridge as STP edge ports.
On each vPC peer device, you assign a vPC number to the port channel that connects to the downstream
device. You will experience minimal traffic disruption when you are creating vPCs. To simplify the
configuration, you can assign the vPC ID number to every port channel to be the same as the port channel
itself (that is, vPC ID 10 for port channel 10).
Note The vPC number that you assign to the port channel that connects to the downstream device from the vPC
peer device must be identical on both vPC peer devices.
Note You must attach a downstream device using a port channel to both vPC peer devices.
To connect to the downstream device, you create a port channel to the downstream device from the primary
vPC peer device and you create another port channel to the downstream device from the secondary peer device.
On each vPC peer device, you assign a vPC number to the port channel that connects to the downstream
device. You will experience minimal traffic disruption when you are creating vPCs.
Note We recommend that you configure the vPC Peer-Links on dedicated ports of different modules on Cisco
Nexus 9500 devices. This is recommended to reduce the possibility of a failure. For the best resiliency scenario,
use at least two modules.
vPC object tracking is used to prevent traffic black-holing in case of failure of a module where both vPC
Peer-Link and uplinks to the core resides. By tracking interface feature can suspend vPC on affected switch
and prevent traffic black-holing.
If you must configure all the vPC Peer-Links and core-facing interfaces on a single module, you should
configure, using the command-line interface, a track object and a track list that is associated with the Layer
3 link to the core and on all vPC Peer-Links on both vPC peer devices. You use this configuration to avoid
dropping traffic if that particular module goes down because when all the tracked objects on the track list go
down, the system does the following:
• Stops the vPC primary peer device sending peer-keepalive messages, which forces the vPC secondary
peer device to take over.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
175
Configuring vPCs
vPC Object Tracking
• Brings down all the downstream vPCs on that vPC peer device, which forces all the traffic to be rerouted
in the access switch toward the other vPC peer device.
Once you configure this feature and if the module fails, the system automatically suspends all the vPC links
on the primary vPC peer device and stops the peer-keepalive messages. This action forces the vPC secondary
device to take over the primary role and all the vPC traffic to go to this new vPC primary device until the
system stabilizes.
You should create a track list that contains all the links to the core and all the vPC Peer-Links as its object.
Enable tracking for the specified vPC domain for this track list. Apply this same configuration to the other
vPC peer device. See the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide for information
about configuring object tracking and track lists.
Note This example uses Boolean OR in the track list and forces all traffic to the vPC peer device only for a complete
module failure. If you want to trigger a switchover when any core interface or vPC Peer-Link goes down, use
a Boolean AND in the torack list below.
To configure a track list to switch over a vPC to the remote peer when all related interfaces on a single module
fail, follow these steps:
1. Configure track objects on an interface (Layer 3 to core) and on a port channel (vPC Peer-Link).
2. Create a track list that contains all the interfaces in the track list using the Boolean OR to trigger when
all objects fail.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
176
Configuring vPCs
vPC Interactions with Other Features
This example shows how to display information about the track objects:
Note When manually configuring the system priority, you must ensure that you assign the same priority value on
both vPC peer devices. If the vPC peer devices have different system priority values, vPC does not come up.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
177
Configuring vPCs
vPC Peer-Links and STP
of the STP enhancement features on vPC Peer-Links. If the STP enhancements are already configured, they
do not cause any problems for the vPC Peer-Links..
When you are running both MST and Rapid PVST+, ensure that the PVST simulation feature is correctly
configured.
See the Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration Guide for information about STP
enhancement features and PVST simulation.
Note You must configure a list of parameters to be identical on the vPC peer devices on both sides of the vPC
Peer-Link. See the “Compatibility Parameters for vPC Interfaces” section for information about these required
matched settings.
STP is distributed; that is, the protocol continues running on both vPC peer devices. However, the configuration
on the vPC peer device elected as the primary device controls the STP process for the vPC interfaces on the
secondary vPC peer device.
The primary vPC device synchronizes the STP state on the vPC secondary peer device using Cisco Fabric
Services over Ethernet (CFSoE). See the “vPC and Orphan Ports” section for information about CFSoE.
The STP process for vPC also relies on the periodic keepalive messages to determine when one of the connected
devices on the vPC Peer-Link fails. See the “Peer-Keepalive Link and Messages” section for information
about these messages.
The vPC manager performs a proposal/handshake agreement between the vPC peer devices that set the primary
and secondary devices and coordinates the two devices for STP. The primary vPC peer device then controls
the STP protocol on both the primary and secondary devices. We recommend that you configure the primary
vPC peer device as the STP primary root device and configure the secondary VPC device to be the STP
secondary root device.
If the primary vPC peer device fails over to the secondary vPC peer device, there is no change in the STP
topology.
The BPDUs uses the MAC address set for the vPC for the STP bridge ID in the designated bridge ID field.
The vPC primary device sends these BPDUs on the vPC interfaces.
You must configure both ends of vPC Peer-Link with the identical STP configuration for the following
parameters:
• STP global settings:
• STP mode
• STP region configuration for MST
• Enable/disable state per VLAN
• Bridge Assurance setting
• Port type setting
• Loop Guard settings
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
178
Configuring vPCs
vPC Peer Switch
• Loop Guard
• Root Guard
Note If any of these parameters are misconfigured, the Cisco NX-OS software suspends all interfaces in the vPC.
Check the syslog and enter the show vpc brief command to see if the vPC interfaces are suspended.
Ensure that the following STP interface configurations are identical on both sides of the vPC Peer-Links or
you may see unpredictable behavior in the traffic flow:
• BPDU Filter
• BPDU Guard
• Cost
• Link type
• Priority
• VLANs (PVRST+)
Note Display the configuration on both sides of the vPC Peer-Link to ensure that the settings are identical.
You can use the show spanning-tree command to display information about the vPC when that feature is
enabled. See the Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration Guide for an example.
Note We recommend that you configure the ports on the downstream devices as STP edge ports. You should
configure all host ports connected to a switch as STP edge ports. See the Cisco Nexus 9000 Series NX-OS
Layer 2 Switching Configuration Guide for more information about STP port types.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
179
Configuring vPCs
vPC and ARP or ND
Note Peer-switch feature is supported on networks that use vPC and STP-based redundancy is not supported. If the
vPC Peer-Link fail in a hybrid peer-switch configuration, you can lose traffic. In this scenario, the vPC peers
use the same STP root ID as well as the same bridge ID. The access switch traffic is split in two with half
going to the first vPC peer and the other half to the second vPC peer. With vPC Peer-Link failure, there is no
impact to the north/south traffic but the east/west traffic is lost.
See the Cisco Nexus 9000 Series NX-OS Layer 2 Switching Configuration Guide for information about STP
enhancement features and Rapid PVST+.
Note The Cisco NX-OS software does not support Bidirectional (BIDR) on a vPC.
The software keeps the multicast forwarding state synchronized on both of the vPC peer devices. The IGMP
snooping process on a vPC peer device shares the learned group information with the other vPC peer device
through the vPC Peer-Link; the multicast states are always synchronized on both vPC peer devices. The PIM
process in vPC mode ensures that only one of the vPC peer devices forwards the multicast traffic to the
receivers.
Each vPC peer is a Layer 2 or Layer 3 device. Multicast traffic flows from only one of the vPC peer devices.
You might see duplicate packets in the following scenarios:
• Orphan hosts
• When the source and receivers are in the Layer 2 vPC cloud in different VLANs with multicast routing
enabled and a vPC member link goes down.
Overall multicast convergence times are scale and vPC role change / PIM restart duration dependent.
Ensure that you dual-attach all Layer 3 devices to both vPC peer devices. If one vPC peer device goes down,
the other vPC peer device continues to forward all multicast traffic normally.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
180
Configuring vPCs
Multicast PIM Dual DR (Proxy DR )
Note A PIM adjacency between a Switched Virtual Interface (SVI) on a vPC VLAN (a VLAN that is carried on a
vPC Peer-Link) and a downstream device is not supported; this configuration can result in dropped multicast
packets. If a PIM neighbor relationship is required with a downstream device, a physical Layer 3 interface
must be used on the Nexus switches instead of a vPC SVI.
For SVIs on vPC VLANs, only one PIM adjacency is supported, which is with the vPC peer switch. PIM
adjacencies over the vPC Peer-Link with devices other than the vPC peer switch for the vPC-SVI are not
supported.
You should enable or disable IGMP snooping identically on both vPC peer devices, and all the feature
configurations should be identical. IGMP snooping is on by default.
See the Cisco Nexus 9000 Series NX-OS Multicast Routing Configuration Guide for more information about
multicasting.
VPC Device1:
------------
(*,G)
oif1 (igmp)
VPC Device2:
------------
(*,G)
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
181
Configuring vPCs
IP PIM PRE-BUILD SPT
oif1 (igmp)
In the case of a failure (for example, a Layer 3 Reverse Path Forwarding (RPF) link on the forwarder becomes
inoperable or the forwarder gets reloaded), if the current nonforwarder ends up becoming the forwarder, it
has to start sending PIM joins for (S,G) toward the source to pull the traffic. Depending upon the number of
hops to reach the source, this operation might take some time (PIM is a hop-by-hop protocol).
To eliminate this issue and get better convergence, use the ip pim pre-build-spt command. This command
enables PIM send joins even if the multicast route has 0 OIFs. In a vPC device, the nonforwarder sends PIM
(S,G) joins upstream toward the source. The downside is that the link bandwidth upstream from the
nonforwarder gets used for the traffic that is ultimately dropped by it. The benefits that result with better
convergence far outweigh the link bandwidth usage. Therefore, we recommend that you use this command
if you use vPCs.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
182
Configuring vPCs
CFSoE
We recommend that you configure routing adjacency between the two vPC peer devices to act as a backup
routing path. If one vPC peer device loses Layer 3 uplinks, the vPC can redirect the routed traffic to the other
vPC peer device and leverage its active Layer 3 uplinks.
You can configure the inter-switch link for a backup routing path in the following ways:
• Create a Layer 3 link between the two vPC peer devices.
• Use the non-VPC VLAN trunk with a dedicated VLAN interface.
• Use a vPC Peer-Link with a dedicated VLAN interface.
We do not recommend that you configure the burnt-in MAC address option (use-bia) for HSRP or manually
configure virtual MAC addresses for any FHRP protocol in a vPC environment because these configurations
can adversely affect vPC load balancing. The HSRP use-bia option is not supported on vPCs. When you are
configuring custom MAC addresses, you must configure the same MAC address on both vPC peer devices.
You can use the delay restore command to configure a restore timer that delays the vPC coming back up
until after the peer adjacency forms and the VLAN interfaces are back up. This feature enables you to avoid
packet drops when the routing tables might not be converged before the vPC is once again passing traffic.
Use the delay restore command to configure this feature.
To delay the VLAN interfaces on the restored vPC peer device from coming up, use the interfaces-vlan
option of the delay restore command.
See the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide for more information about
FHRPs and routing.
CFSoE
The Cisco Fabric Services over Ethernet (CFSoE) is a reliable state transport mechanism that is used to
synchronize the actions of the vPC peer devices. CFSoE carries messages and packets for many features linked
with vPC, such as STP and IGMP. Information is carried in CFS/CFSoE protocol data units (PDUs).
When you enable the vPC feature, the device automatically enables CFSoE, and you do not have to configure
anything. CFSoE distributions for vPCs do not need the capabilities to distribute over IP or the CFS regions.
You do not need to configure anything for the CFSoE feature to work correctly on vPCs.
The CFSoE transport is local to each VDC.
You can use the show mac address-table command to display the MAC addresses that CFSoE synchronizes
for the vPC Peer-Link.
Note Do not enter the no cfs eth distribute or the no cfs distribute command. You must enable CFSoE for vPC
functionality. If you do enter either of these commands with vPC enabled, the system displays an error message.
When you enter the show cfs application command, the output displays “Physical-eth,” which shows the
applications that are using CFSoE.
CFS also transports data over TCP/IP. See the Cisco Nexus 9000 Series NX-OS System Management
Configuration Guide for more information about CFS over IP.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
183
Configuring vPCs
vPC and Orphan Ports
Virtualization Support
All ports in a given vPC must be in the same VDC. This version of the software supports only one vPC domain
per VDC. You can use the numbers from 1 to 4096 in each VDC to number the vPC.
Autorecovery
You can configure the Cisco Nexus 9000 Series device to restore vPC services when its peer fails to come
online by using the auto-recovery command. You must save this setting in the startup configuration. On
reload, if the vPC Peer-Link is down and three consecutive peer-keepalive messages are lost, the secondary
device assumes the primary STP role and the primary LACP role. The software reinitializes the vPCs, bringing
up its local ports. Because there are no peers, the consistency check is bypassed for the local vPC ports. The
device elects itself to be the STP primary regardless of its role priority and also acts as the primary device for
LACP port roles.
High Availability
During an In-Service Software Upgrade (ISSU), the software reload process on the first vPC device locks its
vPC peer device by using CFS messaging over the vPC communications channel. Only one device at a time
is upgraded. When the first device completes its upgrade, it unlocks its peer device. The second device then
performs the upgrade process, locking the first device as it does so. During the upgrade, the two vPC devices
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
184
Configuring vPCs
vPC Forklift Upgrade Scenario
temporarily run different releases of Cisco NX-OS, however the system functions correctly because of its
backward compatibility support.
Note See the Cisco Nexus 9000 Series NX-OS High Availability and Redundancy Guide for complete information
about high-availability features.
The following example is a migration scenario that replaces vPC peer nodes Node1 and Node2 with New_Node1
and New_Node2.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
185
Configuring vPCs
vPC Forklift Upgrade Scenario
5 Bring up all vPCs and Traffic will be primary Primary secondary Secondary
uplink ports on forwarded by both
Sticky bit: Sticky bit:
New_Node2. Node 1 and
False False
New_Node2.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
186
Configuring vPCs
Guidelines and Limitations
9 Bring up all vPCs and Traffic will be primary Secondary secondary Primary
uplink ports on forwarded by both
Sticky bit: Sticky bit:
New_Node1. New Node1 and
False True
new Node2.
Note If you prefer to have the configured secondary node as the operational secondary and the configured primary
as the operational primary, then Node2 can be reloaded at the end of the migration. This is optional and does
not have any functional impact.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
187
Configuring vPCs
Guidelines and Limitations
See the Cisco Nexus 9000 Series NX-OS Unicast Routing Configuration Guide for further details about
OSPF.
• BFD for VRRP/HSRP is not supported in a vPC environment.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
188
Configuring vPCs
Guidelines and Limitations
• vPC STP hitless role change feature is supported only from Cisco Nexus 9000 Release 7.0(3)I7(1)
onwards.
• vPC role change can be performed from either of the peer devices.
• When forming a vPC domain between two Cisco Nexus 9300 Series switches, both switches must be
the exact same model to form a supported vPC domain. When forming a vPC domain between two Cisco
Nexus 9500 Series switches, both switches must consist of the same models of line cards, fabric modules,
supervisor modules, and system controllers inserted in the same slots of the chassis to form a supported
vPC domain.
• If the original secondary device has higher role priority value than the original primary device, role
swapping cannot be performed. Change the role priority on either vPC device so that the value of the
original secondary device is lower than the original primary one. To view the existing role of a device,
use the show vpc role command on local and peer switch.
• Always check the existing configured role priority before configuring vPC hitless role change feature
• In a vPC domain, enable the peer-switch command, where both vPC peers have same STP priorities, and
ensure it is operational before issuing a role change. If you do not enable the peer-switch command, it
can lead to convergence issues. Use show spanning-tree summary | grep peer command to verify
whether the peer vPC switch is operational or not.
• All the devices that are attached to a vPC domain must be dual homed.
• The first generation Broadcom based Nexus 9300 series switches and Nexus 9500 series line-cards does
not support policy based routing route map with a set ip next-hop statement where the egress interface
is the vPC Peer-Link while the vPC convergence TCAM region is allocated. This limitation does not
apply to cloud scale based Nexus 9000 series devices such as Cisco Nexus 9200 switches, 9300 switches
with EX/FX/FX2 line-cards and Nexus 9500 platform switches with 9700-EX/FX line-cards.
• Beginning with Cisco NX-OS Release 7.0(3)I5(1), Layer 3 over vPC is supported on Cisco Nexus 9000
Series switches for Layer 3 unicast communication only. Layer 3 over vPC is not supported for Layer 3
multicast traffic. For more information see the Best Practices for Layer 3 and vPC Configuration section
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
189
Configuring vPCs
Best Practices for Layer 3 and vPC Configuration
• The default behavior with Layer 3 peer-router and TTL=1 packet destined to IP of vPC peer is to punt
packet to CPU and then forward the software to vPC peer. This is applicable to the Cloud Scale based
EOR switches.
• Starting with Cisco NX-OS Release 7.0(3)I7(9) Cloud Scale based TOR switches can forward TTL=1
packet destined to vPC peer in hardware/data plane. It is recommended to use one of these releases or
later releases for a seamless operation of the feature.
vPC is a Layer 2 virtualization technology, so at Layer 2, both vPC peer devices present themselves as a
unique logical device to the rest of the network.
There is no virtualization technology at Layer 3, so each vPC peer device is seen as a distinct Layer 3 device
by the rest of the network.
The following figure illustrates the two different Layer 2 and Layer 3 views with vPC.
Figure 16: Different Views for vPC Peer Devices
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
190
Configuring vPCs
Peering with an External Router Using Layer 3 Links
Note Interconnecting the two entities together in this way allows to support Layer 3 unicast and multicast
communication.
Layer 3 devices can initiate Layer 3 routing protocol adjacencies with both vPC peer devices.
One or multiple Layer 3 links can be used to connect a Layer 3 device to each vPC peer device. Cisco Nexus
9000 series devices support Layer 3 Equal Cost Multipathing (ECMP) with up to 16 hardware load-sharing
paths per prefix. Traffic from a vPC peer device to a Layer 3 device can be load-balanced across all the Layer
3 links interconnecting the two devices together.
Using Layer 3 ECMP on the Layer 3 device can effectively use all Layer 3 links from the device to the vPC
domain. Traffic from a Layer 3 device to the vPC domain can be load-balanced across all the Layer 3 links
interconnecting the two entities together.
Follow these guidelines when connecting a Layer 3 device to the vPC domain using Layer 3 links:
• Use separate Layer 3 links to connect Layer 3 devices to the vPCdomain. Each link represents a
point-to-point Layer 3 connection and should get assigned an IP address taken from a small IP subnet
(/30 or /31).
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
191
Configuring vPCs
Peering Between vPC Devices for a Backup Routing Path
• If the Layer 3 peering is required for multiple VRFs, it is recommended to define multiple sub-interfaces,
each mapped to an individual VRF.
The Layer 3 devices can peer with each other in following two methods. Peering also depends on the specific
device deployed for this role.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
192
Configuring vPCs
Peering Between Two Routers with vPC Devices as Transit Switches
• Defining a VLAN network interface (SVI) for a VLAN that is extended between the Layer 3 devices
through the intermediate Cisco Nexus 9000 vPC peer switches.
• Defining a Layer 3 port-channel interface on each Layer 3 device and establishing a point-to-point Layer
3 peering.
Note In deployments where the Layer 3 peering must be established for multiple VRFs, the first method require
the definition on the Layer 3 devices of a VLAN (and SVI) per VRF. For the second method, it is possible to
create a Layer 3 port-channel subinterface per VRF
This topology is commonly used when you want to establish connectivity between separate data centers that
are interconnected with direct links (dark fibers or DWDM circuits). The two pairs of Cisco Nexus 9000
switches, in this case, provide only Layer 2 extension services, allowing the Layer 3 devices to peer with each
other at Layer 3.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
193
Configuring vPCs
Peering between vPC Switch Pairs on Parallel Interconnected Routed Ports
Figure 22: Peering with an External Router on Parallel Interconnected Routed Ports
The back-to-back vPC connection between the two data centers carry bridged traffic or inter-VLAN traffic
while the dedicated Layer 3 links carry the routed traffic across the two sites.
Peering Over a PC Interconnection and Dedicated Interswitch Link Using non-vPC VLAN
This example shows when the Layer 3 device is single-attached to the vPC domain, you can use a non-vPC
VLAN with a dedicated inter-switch link to establish the routing protocol peering adjacency between the
Layer 3 device and each vPC peer device. However, the non-vPC VLAN must be configured to use a static
MAC that is different than the vPC VLAN.
Note Configuring the vPC VLAN (and vPC Peer-Link) for this purpose is not supported.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
194
Configuring vPCs
Peering Directly Over a vPC Connection
Figure 24: Peering Over a PC Interconnection and Dedicated Interswitch Link Using non-vPC VLAN
Note Peering directly over a vPC connection is supported only for Layer 3 unicast communication but not for Layer
3 multicast traffic. If you require Layer 3 multicast, you must establish peering over dedicated Layer 3 links
Figure 25: Supported: Peering Over a vPC Interconnection Where the Router Peers with Both the vPC Peers.
In this scenario, the Layer 3 peering between the external router and the Cisco Nexus 9000 switches that are
part of a same vPC domain is established directly on a VLAN carried on the vPC connection. The external
router in this case peers with SVI interfaces defined on each vPC device. As for the scenario shown in previous
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
195
Configuring vPCs
Default Settings
figure 12, the external router could use an SVI or a Layer 3 Port-Channel to peer with the vPC devices (multiple
SVIs or Port-Channel subinterfaces could be used for a multi-VRF deployment).
This deployment model requires configuring layer3 peer-router command as part of the vPC domain. You
can adopt the same approach for establishing Layer 2 and Layer 3 connectivity on a vPC back-to-back
connection established between two separate pairs of vPC switches.
Figure 26: Supported: Peering Over a vPC Interconnection Where Each Nexus Device Peers with Two vPC Peers.
In this deployment model, SVI interfaces in the same VLAN is configured on all the four Cisco Nexus 9000
switches to establish routing peering and connectivity between them.
Default Settings
The following table lists the default settings for vPC parameters.
Parameters Default
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
196
Configuring vPCs
Configuring vPCs
Configuring vPCs
Note You must use these procedures on both devices on both sides of the vPC Peer-Link. You configure both of
the vPC peer devices using these procedures.
This section describes how to configure vPCs using the command-line interface (CLI).
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might
differ from the Cisco IOS commands that you would use.
Enabling vPCs
You must enable the feature vPC before you can configure and use vPCs.
SUMMARY STEPS
1. configure terminal
2. feature vpc
3. exit
4. show feature
5. copy running-config startup-config
DETAILED STEPS
Step 4 show feature (Optional) Displays which features are enabled on the
device.
Example:
switch# show feature
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
197
Configuring vPCs
Disabling vPCs
Example
This example shows how to enable the vPC feature:
switch# configure terminal
switch(config)# feature vpc
switch(config)# exit
switch(config)#
Disabling vPCs
Note When you disable the vPC functionality, the device clears all the vPC configurations.
SUMMARY STEPS
1. configure terminal
2. no feature vpc
3. exit
4. show feature
5. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
198
Configuring vPCs
Creating a vPC Domain and Entering vpc-domain Mode
Step 5 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
This example shows how to disable the vPC feature:
switch# configure terminal
switch(config)# no feature vpc
switch(config)# exit
switch#
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. exit
4. show vpc brief
5. copy running-config startup-config
DETAILED STEPS
Step 2 vpc domain domain-id Creates a vPC domain on the device, and enters vpc-domain
configuration mode for configuration purposes. There is no
Example:
default; the range is from 1 to 1000.
switch(config)# vpc domain 5
switch(config-vpc-domain)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
199
Configuring vPCs
Configuring a vPC Keepalive Link and Messages
Step 4 show vpc brief (Optional) Displays brief information about each vPC
domain.
Example:
switch# show vpc brief
Step 5 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
This example shows how to enter the vpc-domain command mode to configure an existing vPC
domain:
Note You must configure the vPC peer-keepalive link before the system can form the vPC Peer-Link.
Note We recommend that you configure a separate VRF instance and put a Layer 3 port from each vPC peer device
into that VRF for the vPC peer-keepalive link. Do not use the vPC Peer-Link itself to send vPC peer-keepalive
messages. For information about creating and configuring VRFs, see the Cisco Nexus 9000 Series NX-OS
Unicast Routing Configuration Guide. Ensure that both the source and destination IP addresses use for the
peer-keepalive message are unique in your network. The management port and management VRF are the
defaults for these keepalive messages.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
200
Configuring vPCs
Configuring a vPC Keepalive Link and Messages
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. peer-keepalive destination ipaddress [hold-timeout secs | interval msecs {timeout secs} | {precedence
{prec-value | network | internet | critical | flash-override | flash | immediate priority | routine}} | tos
{tos-value | max-reliability | max-throughput | min-delay | min-monetary-cost | normal}} |tos-byte
tos-byte-value} | source ipaddress | vrf {name | management vpc-keepalive}]
4. exit
5. show vpc statistics
6. copy running-config startup-config
DETAILED STEPS
Step 2 vpc domain domain-id Creates a vPC domain on the device, and enters vpc-domain
configuration mode.
Example:
switch(config)# vpc domain 5
switch(config-vpc-domain)#
Step 3 peer-keepalive destination ipaddress [hold-timeout secs Configures the IPv4 and IPv6 addresses for the remote end
| interval msecs {timeout secs} | {precedence {prec-value of the vPC peer-keepalive link.
| network | internet | critical | flash-override | flash |
Note The system does not form the vPC Peer-Link
immediate priority | routine}} | tos {tos-value |
until you configure a vPC peer-keepalive link.
max-reliability | max-throughput | min-delay |
min-monetary-cost | normal}} |tos-byte tos-byte-value}
Note You may get the following error message if
| source ipaddress | vrf {name | management
you do not specify the source IP address when
vpc-keepalive}]
you configure an IPv6 address for the remote
Example: end of the vPC peer-keepalive link.
switch(config-vpc-domain)# peer-keepalive Cannot configure IPV6 peer-keepalive
destination 172.28.230.85 without source IPV6 address
switch(config-vpc-domain)#
The management ports and VRF are the defaults.
Note We recommend that you configure a separate
VRF and use a Layer 3 port from each vPC
peer device in that VRF for the vPC
peer-keepalive link. For more information
about creating and configuring VRFs, see the
Cisco Nexus 9000 Series NX-OS Unicast
Routing Configuration Guide.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
201
Configuring vPCs
Creating a vPC Peer-Link
Step 5 show vpc statistics (Optional) Displays information about the configuration
for the keepalive messages.
Example:
switch# show vpc statistics
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
For more information about configuring VRFs, see the Cisco Nexus 9000 Series NX-OS Unicast
Routing Configuration Guide.
This example shows how to configure the destination and source IP address and VRF for the
vPC-peer-keepalive link:
switch# configure terminal
switch(config)# vpc domain 100
switch(config-vpc-domain)# peer-keepalive destination 172.168.1.2 source 172.168.1.1 vrf
vpc-keepalive
switch(config-vpc-domain)# exit
switch#
SUMMARY STEPS
1. configure terminal
2. interface port-channel channel-number
3. switchport mode trunk
4. switchport trunk allowed vlan vlan-list
5. vpc peer-link
6. exit
7. show vpc brief
8. copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
202
Configuring vPCs
Creating a vPC Peer-Link
DETAILED STEPS
Step 2 interface port-channel channel-number Selects the port channel that you want to use as the vPC
Peer-Link for this device, and enters interface configuration
Example:
mode.
switch(config)# interface port-channel 20
switch(config-if)#
Step 3 switchport mode trunk (Optional) Configures this interface in trunk mode.
Example:
switch(config-if)# switchport mode trunk
Step 4 switchport trunk allowed vlan vlan-list (Optional) Configures the permitted VLAN list.
Example:
switch(config-if)# switchport trunk
allowed vlan 1-120,201-3967
Step 5 vpc peer-link Configures the selected port channel as the vPC Peer-Link,
and enters vpc-domain configuration mode.
Example:
switch(config-if)# vpc peer-link
switch(config-vpc-domain)#
Step 7 show vpc brief (Optional) Displays information about each vPC, including
information about the vPC Peer-Link.
Example:
switch# show vpc brief
Step 8 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
This example shows how to configure a vPC Peer-Link:
switch# configure terminal
switch(config)# interface port-channel 20
switch(config-if)# switchport mode
switch(config-if)# switchport mode trunk
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
203
Configuring vPCs
Configuring a vPC Peer-Gateway
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. peer-gateway
4. exit
5. show vpc brief
6. copy running-config startup-config
DETAILED STEPS
Step 2 vpc domain domain-id Creates a vPC domain if it does not already exist, and enters
vpc-domain configuration mode.
Example:
switch(config-if)# vpc domain 5
switch(config-vpc-domain)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
204
Configuring vPCs
Configuring a Graceful Consistency Check
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. graceful consistency-check
4. exit
5. show vpc brief
DETAILED STEPS
Step 2 vpc domain domain-id Creates a vPC domain if it does not already exist, and enters
vpc-domain configuration mode.
Example:
switch(config-if)# vpc domain 5
switch(config-vpc-domain)#
Step 3 graceful consistency-check Specifies that only the links on the secondary peer device
are suspended when a mismatch is detected in a mandatory
Example:
compatibility parameter.
switch(config-vpc-domain)# graceful
consistency-check Use the no form of this command to disable the feature.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
205
Configuring vPCs
Checking the Configuration Compatibility on a vPC Peer-Link
Example
This example shows how to enable the graceful consistency check feature:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# graceful consistency-check
switch(config-vpc-domain)# exit
switch(config)#
SUMMARY STEPS
1. configure terminal
2. show vpc consistency-parameters {global | interface port-channel channel-number}
DETAILED STEPS
Step 2 show vpc consistency-parameters {global | interface (Optional) Displays the status of those parameters that must
port-channel channel-number} be consistent across all vPC interfaces.
Example:
switch(config)# show vpc consistency-parameters
global
switch(config)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
206
Configuring vPCs
Moving Other Port Channels into a vPC
Example
This example shows how to check that the required configurations are compatible across all the vPC
interfaces:
switch# configure terminal
switch(config)# show vpc consistency-parameters global
switch(config)#
Note Messages regarding the vPC interface configuration compatibility are also logged to the syslog.
SUMMARY STEPS
1. configure terminal
2. interface port-channel channel-number
3. vpc number
4. exit
5. show vpc brief
6. copy running-config startup-config
DETAILED STEPS
Step 2 interface port-channel channel-number Selects the port channel that you want to put into the vPC
to connect to the downstream device, and enters interface
Example:
configuration mode.
switch(config)# interface port-channel 20
switch(config-if)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
207
Configuring vPCs
Manually Configuring a vPC Domain MAC Address
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
This example shows how to configure a port channel to connect to the downstream device:
switch# configure terminal
switch(config)# interface port-channel 20
switch(config-if)# vpc 5
switch(config-if)# exit
switch(config)#
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. system-mac mac-address
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
208
Configuring vPCs
Manually Configuring a vPC Domain MAC Address
4. exit
5. show vpc role
6. copy running-config startup-config
DETAILED STEPS
Step 2 vpc domain domain-id Enters the vPC domain number that you want to configure.
The system enters vpc-domain configuration mode.
Example:
switch(config)# vpc domain 5
switch(config-vpc-domain)#
Step 3 system-mac mac-address Enters the MAC address that you want for the specified
vPC domain in the following format: aaaa.bbbb.cccc.
Example:
switch(config-vpc-domain)# system-mac
23fb.4ab5.4c4e
switch(config-vpc-domain)#
Step 5 show vpc role (Optional) Displays the vPC system MAC address.
Example:
switch# show vpc brief
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
This example shows how to manually configure a vPC domain MAC address:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# system-mac 13gb.4ab5.4c4e
switch(config-vpc-domain)# exit
switch(config)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
209
Configuring vPCs
Manually Configuring the System Priority
Note We recommend that you manually configure the vPC system priority when you are running LACP to ensure
that the vPC peer devices are the primary devices on LACP. When you manually configure the system priority,
ensure that you configure the same priority value on both vPC peer devices. If these values do not match, vPC
does not come up.
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. system-priority priority
4. exit
5. show vpc role
6. copy running-config startup-config
DETAILED STEPS
Step 2 vpc domain domain-id Enters the vPC domain number that you want to configure.
The system enters vpc-domain configuration mode.
Example:
switch(config)# vpc domain 5
switch(config-vpc-domain)#
Step 3 system-priority priority Enters the system priority that you want for the specified
vPC domain. The range of values is from 1 to 65535. The
Example:
default value is 32667.
switch(config-vpc-domain)# system-priority 4000
switch(config-vpc-domain)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
210
Configuring vPCs
Manually Configuring the vPC Peer Device Role
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
This example shows how to manually configure the vPC domain system priority:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# system-priority 4000
switch(config-vpc-domain)# exit
switch(config)#
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. role priority priority
4. exit
5. show vpc role
6. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
211
Configuring vPCs
Configuring vPC Object Tracking Tracking Feature on a Single-Module vPC
Step 2 vpc domain domain-id Enters the vPC domain number that you want to configure.
The system enters vpc-domain configuration mode.
Example:
switch(config)# vpc domain 5
switch(config-vpc-domain)#
Step 3 role priority priority Enters the role priority that you want for the vPC system
priority. The range of values is from 1 to 65636, and the
Example:
default value is 32667. A lower value means that this switch
switch(config-vpc-domain)# role priority 4 has a better chance of being the primary vPC.
switch(config-vpc-domain)#
Step 5 show vpc role (Optional) Displays the vPC system priority.
Example:
switch# show vpc role
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
This example shows how to manually configure the role priority of the vPC peer device:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# role priority 4
switch(config-vpc-domain)# exit
switch(config)#
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
212
Configuring vPCs
Configuring vPC Object Tracking Tracking Feature on a Single-Module vPC
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. track track-object-id
4. exit
5. show vpc brief
6. copy running-config startup-config
DETAILED STEPS
Step 2 vpc domain domain-id Enters the vPC domain number that you want to configure,
and enters vpc-domain configuration mode.
Example:
switch(config)# vpc domain 5
switch(config-vpc-domain)#
Step 3 track track-object-id Adds the previously configured track-list object with its
associated interfaces to the vPC domain. See the Cisco
Example:
Nexus 9000 Series NX-OS Unicast Routing Configuration
switch(config-vpc-domain)# track object 23 Guide for information about configuring object tracking
switch(config-vpc-domain)#
and track lists.
Step 5 show vpc brief (Optional) Displays information about the tracked objects.
Example:
switch# show vpc brief
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
213
Configuring vPCs
Configuring for Recovery After an Outage
Example
This example shows how to put the previously configured track-list object into the vPC domain on
the vPC peer device:
switch# configure terminal
switch(config)# vpc domain 5
switch(config-vpc-domain)# track object 5
switch(config-vpc-domain)# exit
switch(config)#
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. reload restore [delay time-out]
4. exit
5. show running-config vpc
6. show vpc consistency-parameters interface port-channel number
7. copy running-config startup-config
DETAILED STEPS
Step 2 vpc domain domain-id Enters the vPC domain number that you want to configure,
and enters vpc-domain configuration mode.
Example:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
214
Configuring vPCs
Configuring Reload Restore
Step 3 reload restore [delay time-out] Configures the vPC to assume its peer is not functional and
to bring up the vPC. The default delay is 240 seconds. You
Example:
can configure a time-out delay from 240 to 3600 seconds.
switch(config-vpc-domain)# reload restore
Use the no form of the command to reset the vPC to its
default settings.
Step 5 show running-config vpc (Optional) Displays information about the vPC, specifically
the reload status.
Example:
switch# show running-config vpc
Step 6 show vpc consistency-parameters interface port-channel (Optional) Displays information about the vPC consistency
number parameters for the specified interface.
Example:
switch# show vpc consistency-parameters
interface port-channel 1
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config Note To ensure the reload feature is enabled, you
should perform this step.
Example
This example shows how to set the vPC reload restore feature and save it in the switch startup
configuration:
switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# vpc domain 5
switch(config-vpc-domain)# reload restore
Warning:
Enables restoring of vPCs in a peer-detached state after reload, will wait for 240
seconds (by default) to determine if peer is un-reachable
switch(config-vpc-domain)# exit
switch(config)# exit
switch# copy running-config startup-config
switch# show running-config vpc
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
215
Configuring vPCs
Configuring an Autorecovery
feature vpc
logging level vpc 6
vpc domain 5
reload restore
Legend:
Type 1 : vPC will be suspended in case of mismatch
Name Type Local Value Peer Value
------------- ---- ----------- ---------------
STP Port Type 1 Default -
STP Port Guard 1 None -
STP MST Simulate PVST 1 Default -
mode 1 on -
Speed 1 1000 Mb/s -
Duplex 1 full -
Port Mode 1 trunk -
Native Vlan 1 1 -
MTU 1 1500 -
Allowed VLANs - 1-3967,4048-4093
Local suspended VLANs
Configuring an Autorecovery
You can configure the Cisco Nexus 9000 Series device to restore vPC services when its peer fails to come
online by using the auto-recovery command.
You can configure the Cisco Nexus 9000 Series device to restore vPC services on the secondary vPC peer
when its vPC primary peer fails and bringing down peer-keepalive and vPC Peer-Link, by using the
auto-recovery command. In case of failure of primary switch where both peer-keepalive and vPC Peer-Links
are down secondary switch will suspend vPC member. However, after 3 missed keepalive heartbeats secondary
switch resumes the role of a primary switch and bring up vPC member ports. The auto-recovery reload
restore command can be used in scenarios when vPC primary switch reloads, where secondary switch resumes
the role of the vPC primary and bring ip VPC member ports.
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. auto-recovery [reload-delay time]
4. exit
5. show running-config vpc
6. show vpc consistency-parameters interface port-channel number
7. copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
216
Configuring vPCs
Configuring an Autorecovery
DETAILED STEPS
Step 2 vpc domain domain-id Enters the vPC domain number that you want to configure,
and enters vpc-domain configuration mode.
Example:
switch(config)# vpc domain 5
switch(config-vpc-domain)#
Step 3 auto-recovery [reload-delay time] Configures the vPC to assume its peer is not functional and
to bring up the vPC, and specifies the time to wait after a
Example:
reload to restore the vPC. The default delay is 240 seconds.
switch(config-vpc-domain)# auto-recovery You can configure a delay from 240 to 3600 seconds.
Use the no form of the command to reset the vPC to its
default settings.
Step 5 show running-config vpc (Optional) Displays information about the vPC, specifically
the reload status.
Example:
switch# show running-config vpc
Step 6 show vpc consistency-parameters interface port-channel (Optional) Displays information about the vPC consistency
number parameters for the specified interface.
Example:
switch# show vpc consistency-parameters
interface port-channel 1
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config Note To ensure the autorecovery feature is enabled,
you should perform this step.
Example
This example shows how to set the vPC autorecovery feature and save it in the switch startup
configuration:
switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# vpc domain 5
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
217
Configuring vPCs
Configuring the Suspension of Orphan Ports
switch(config-vpc-domain)# auto-recovery
switch(config-vpc-domain)# auto-recovery auto-recovery reload-delay 100
Warning:
Enables restoring of vPCs in a peer-detached state after reload, will wait for 240
seconds to determine if peer is un-reachable
switch(config-vpc-domain)# exit
switch(config)# exit
switch# copy running-config startup-config
Note You can configure vPC orphan port suspension only on physical ports, portchannels. However, you cannot
configure the same on individual port channel member ports.
SUMMARY STEPS
1. configure terminal
2. show vpc orphan-ports
3. interface type slot/port
4. vpc orphan-port suspend
5. exit
6. copy running-config startup-config
DETAILED STEPS
Step 2 show vpc orphan-ports (Optional) Displays a list of the orphan ports.
Example:
switch# show vpc orphan-ports
Step 3 interface type slot/port Specifies an interface to configure, and enters interface
configuration mode.
Example:
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
218
Configuring vPCs
Configuring the vPC Peer Switch
Step 4 vpc orphan-port suspend Configures the selected interface as a vPC orphan port to
be suspended by the secondary peer in the case of a vPC
Example:
failure.
switch(config-if)# vpc orphan-ports suspend
Step 6 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
This example shows how to configure an interface as a vPC orphan port to be suspended by the
secondary peer in the case of a vPC failure:
switch# configure terminal
switch(config)# interface ethernet 3/1
switch(config-if)# vpc orphan-ports suspend
switch(config-if)# exit
switch(config)#
Note When using a non-VPC dedicated trunk link between the VPC peers, the non-VPC VLANs should have a
different global priority on the peers to prevent STP from blocking the VLANs.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
219
Configuring vPCs
Configuring a Pure vPC Peer Switch Topology
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. peer-switch
4. spanning-tree vlan vlan-range priority value
5. exit
6. show spanning-tree summary
7. copy running-config startup-config
DETAILED STEPS
Step 2 vpc domain domain-id Enters the vPC domain number that you want to configure,
and enters vpc-domain configuration mode.
Example:
switch(config)# vpc domain 5
switch(config-vpc-domain)#
Step 3 peer-switch Enables the vPC switch pair to appear as a single STP root
in the Layer 2 topology.
Example:
switch(config-vpc-domain)# peer-switch Use the no form of the command to disable the peer switch
vPC topology.
Step 4 spanning-tree vlan vlan-range priority value Configures the bridge priority of the VLAN. Valid values
are multiples of 4096. The default value is 32768.
Example:
switch(config)# spanning-tree vlan 1
priority 8192
Step 6 show spanning-tree summary (Optional) Displays a summary of the spanning tree port
states including the vPC peer switch.
Example:
switch# show spanning-tree summary
Step 7 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
220
Configuring vPCs
Configuring a Hybrid vPC Peer Switch Topology
Example
This example shows how to configure a pure vPC peer switch topology:
switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# vpc domain 5
switch(config-vpc-domain)# peer-switch
SUMMARY STEPS
1. configure terminal
2. spanning-tree pseudo-information
3. vlan vlan-id designated priority priority
4. vlan vlan-id root priority priority
5. vpc domain domain-id
6. peer-switch
7. exit
8. show spanning-tree summary
9. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
221
Configuring vPCs
Configuring a Hybrid vPC Peer Switch Topology
Step 3 vlan vlan-id designated priority priority Configures the designated bridge priority of the VLAN.
Valid values are multiples of 4096 from 0 to 61440.
Example:
switch(config-pseudo)# vlan 1 designated
priority 8192
Step 4 vlan vlan-id root priority priority Configures the root bridge priority of the VLAN. Valid
values are multiples of 4096 from 0 to 61440.
Example:
switch(config-pseudo)# vlan 1 root
priority 4096
Step 5 vpc domain domain-id Enters the vPC domain number that you want to configure,
and enters vpc-domain configuration mode.
Example:
switch(config)# vpc domain 5
switch(config-vpc-domain)#
Step 6 peer-switch Enables the vPC switch pair to appear as a single STP root
in the Layer 2 topology.
Example:
switch(config-vpc-domain)# peer-switch Use the no form of the command to disable the peer switch
vPC topology.
Step 8 show spanning-tree summary (Optional) Displays a summary of the spanning tree port
states including the vPC peer switch.
Example:
switch# show spanning-tree summary
Step 9 copy running-config startup-config (Optional) Copies the running configuration to the startup
configuration.
Example:
switch# copy running-config startup-config
Example
This example shows how to configure a hybrid vPC peer switch topology:
switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# spanning-tree pseudo-information
switch(config-pseudo)# vlan 1 designated priority 8192
switch(config-pseudo)# vlan 1 root priority 4096
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
222
Configuring vPCs
Configuring Hitless vPC Role Change
SUMMARY STEPS
1. vpc role preempt
2. show vpc role
DETAILED STEPS
Step 2 show vpc role (Optional) Verify hitless vPC role change feature.
Example:
switch(config)# show vpc role
Example
This example on how to configure hitless vPC role change:
switch# show vpc rolevPC Role status
----------------------------------------------------
vPC role : secondary
vPC system-mac : 00:23:04:ee:be:01
vPC system-priority : 32667
vPC local system-mac : 8c:60:4f:03:84:41
vPC local role-priority : 32668
vPC peer system-mac : 8c:60:4f:03:84:43
vPC peer role-priority : 32667
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
223
Configuring vPCs
Use Case Scenario for vPC Role Change
switch(config)#
Note Always check the existing device role priority before switching vPC role.
• Dual-active recovery—In a dual-active recovery scenario, the vPC primary switch continues to be
(operational) primary, but the vPC secondary switch becomes the targeted primary switch and keeps its
vPC member ports up. You can use the vPC hitless feature and restore the device roles. After the
Dual-active recovery, if one side is operational primary and the other side operational secondary, then
you can use the vpc role preempt command to restore the device roles to be primary and secondary
SUMMARY STEPS
1. configure terminal
2. vpc domain domain-id
3. [no] mac-address bpdu source version 2
4. exit
5. (Optional) copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
224
Configuring vPCs
Verifying the vPC Configuration
DETAILED STEPS
Step 2 vpc domain domain-id Creates a vPC domain if it does not already exist, and enters
vpc-domain configuration mode.
Example:
switch(config)# vpc domain 5
Step 3 [no] mac-address bpdu source version 2 Enables STP to use the Cisco MAC address
(00:26:0b:xx:xx:xx) as the source address of BPDUs
Example:
generated on vPC ports.
switch(config-vpc-domain)# mac-address bpdu source
version 2
Step 5 (Optional) copy running-config startup-config Copies the running configuration to the startup
configuration.
Example:
switch(confg)# copy running-config startup-config
Command Purpose
show vpc consistency-parameters Displays the status of those parameters that must be
consistent across all vPC interfaces.
show port-channel capacity Displays how many port channels are configured and
how many are still available on the device.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
225
Configuring vPCs
Monitoring vPCs
Command Purpose
show vpc role Displays the peer status, the role of the local device,
the vPC system MAC address and system priority,
and the MAC address and priority for the local vPC
device.
Monitoring vPCs
Use the show vpc statisticscommand to display vPC statistics.
Note This command displays the vPC statistics only for the vPC peer device that you are working on.
2. (Optional) Configure one of the interfaces that you want to be a vPC Peer-Link in the dedicated port
mode.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
226
Configuring vPCs
Configuration Examples for vPCs
switch(config-if)# no shutdown
switch(config-if)# exit
switch(config)#
3. (Optional) Configure the second, redundant interface that you want to be a vPC Peer-Link in the dedicated
port mode.
switch(config)# interface ethernet 7/2, ethernet 7/4,
ethernet 7/6. ethernet 7/8
switch(config-if)# shutdown
switch(config-if)# exit
switch(config)# interface ethernet 7/2
switch(config-if)# no shutdown
switch(config-if)# exit
switch(config)#
4. Configure the two interfaces (for redundancy) that you want to be in the vPC Peer-Link to be an active
Layer 2 LACP port channel.
switch(config)# interface ethernet 7/1-2
switch(config-if)# switchport
switch(config-if)# switchport mode trunk
switch(config-if)# switchport trunk allowed vlan 1-50
switch(config-if)# switchport trunk native vlan 20
switch(config-if)# channel-group 20 mode active
switch(config-if)# exit
6. Create a separate VRF for the vPC peer-keepalive link and add a Layer 3 interface to that VRF.
switch(config)# vrf context pkal
switch(config-vrf)# exit
switch(config)# interface ethernet 8/1
switch(config-if)# vrf member pkal
switch(config-if)# ip address 172.23.145.218/24
switch(config-if)# no shutdown
switch(config-if)# exit
7. Create the vPC domain and add the vPC peer-keepalive link.
switch(config)# vpc domain 1
switch(config-vpc-domain)# peer-keepalive
destination 172.23.145.217 source 172.23.145.218 vrf pkal
switch(config-vpc-domain)# exit
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
227
Configuring vPCs
Related Documents
switch(config-if)# exit
switch(config)#
9. Configure the interface for the port channel to the downstream device of the vPC.
switch(config)# interface ethernet 7/9
switch(config-if)# switchport mode trunk
switch(config-if)# allowed vlan 1-50
switch(config-if)# native vlan 20
switch(config-if)# channel-group 50 mode active
switch(config-if)# exit
switch(config)# interface port-channel 50
switch(config-if)# vpc 50
switch(config-if)# exit
switch(config)#
Note If you configure the port channel first, ensure that it is a Layer 2 port channel.
Related Documents
Related Topic Related Topic
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
228
CHAPTER 9
Configuring IP Tunnels
This chapter describes how to configure IP tunnels using Generic Route Encapsulation (GRE) on Cisco NX-OS
devices.
• Information About IP Tunnels, on page 229
• Prerequisites for IP Tunnels, on page 231
• Guidelines and Limitations, on page 231
• Default Settings, on page 232
• Configuring IP Tunnels, on page 232
• Verifying the IP Tunnel Configuration, on page 240
• Configuration Examples for IP Tunneling, on page 240
• Related Documents, on page 241
IP Tunnel Overview
IP tunnels consists of the following three main components:
• Passenger protocol—The protocol that needs to be encapsulated. IPv4 is an example of a passenger
protocol.
• Carrier protocol—The protocol that is used to encapsulate the passenger protocol. Cisco NX-OS supports
GRE as a carrier protocol.
• Transport protocol—The protocol that is used to carry the encapsulated protocol. IPv4 is an example of
a transport protocol. An IP tunnel takes a passenger protocol, such as IPv4, and encapsulates that protocol
within a carrier protocol, such as GRE. The device then transmits this carrier protocol over a transport
protocol, such as IPv4.
You configure a tunnel interface with matching characteristics on each end of the tunnel.
You must enable the tunnel feature before you can configure it. The system automatically takes a checkpoint
prior to disabling the feature, and you can roll back to this checkpoint. See the Cisco Nexus 9000 Series
NX-OS System Management Configuration Guide for information about rollbacks and checkpoints.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
229
Configuring IP Tunnels
GRE Tunnels
GRE Tunnels
You can use generic routing encapsulation (GRE) as the carrier protocol for a variety of passenger protocols.
The following figure shows the IP tunnel components for a GRE tunnel. The original passenger protocol
packet becomes the GRE payload and the device adds a GRE header to the packet. The device then adds the
transport protocol header to the packet and transmits it.
Figure 28: GRE PDU
Note The selection of GRE or IP-in-IP tunnel destination based on the PBR policy is not supported.
Note PMTUD on a tunnel interface requires that the tunnel endpoint can receive ICMP messages generated by
devices in the path of the tunnel. Check that ICMP messages can be received before using PMTUD over
firewall connections.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
230
Configuring IP Tunnels
High Availability
High Availability
IP tunnels support stateful restarts. A stateful restart occurs on a supervisor switchover. After the switchover,
Cisco NX-OS applies the runtime configuration after the switchover.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
231
Configuring IP Tunnels
Default Settings
• BGP adjacency over tunnel is not supported in a scenario where the tunnel interface and tunnel source
are in same VRF (example: VRF-A) and tunnel destination is reachable with route-leak from opposite
end (example: via VRF-B)
• Configuring two tunnel interfaces with the same source and destination address is not supported. Loopback
interfaces may be configured as the source addresses instead.
• Cisco Nexus 9200, 9300-EX, 9300-FX, 9300-FX2 series switches and Cisco Nexus 9500 platform
switches with 9700-EX/FX line cards may not have multiple tunnel interfaces in a single VRF that are
sourced from or destined to the same IP address. For example, a device may not have tunnel 0 and tunnel
1 interfaces in the default VRF that are sourced from the same IP address or interface.
Default Settings
The following table lists the default settings for IP tunnel parameters.
Parameters Default
Configuring IP Tunnels
Note If you are familiar with the Cisco IOS CLI, be aware that the Cisco NX-OS commands for this feature might
differ from the Cisco IOS commands that you would use.
Enabling Tunneling
You must enable the tunneling feature before you can configure any IP tunnels.
SUMMARY STEPS
1. configure terminal
2. feature tunnel
3. exit
4. show feature
5. copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
232
Configuring IP Tunnels
Creating a Tunnel Interface
DETAILED STEPS
Step 3 exit Exits the interface mode and returns to the configuration
mode.
Example:
switch(config-if)# exit
switch#
Step 4 show feature (Optional) Displays information about the features enabled
on the device.
Example:
switch(config-if)# show feature
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
233
Configuring IP Tunnels
Creating a Tunnel Interface
Note Use the no interface tunnel command to remove the tunnel interface and all associated configuration.
Command Purpose
SUMMARY STEPS
1. configure terminal
2. interface tunnel number
3. tunnel mode {gre ip | ipip {ip | decapsulate-any}}
4. tunnel source {ip-address |interface-name}
5. tunnel destination {ip-address |host-name}
6. tunnel use-vrf vrf-name
7. show interfaces tunnel number
8. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
234
Configuring IP Tunnels
Creating a Tunnel Interface
Step 3 tunnel mode {gre ip | ipip {ip | decapsulate-any}} Sets this tunnel mode to GRE, ipip, or ipip decapsulate-only.
The gre and ip keywords specify that GRE encapsulation
over IP will be used.
The ipip keyword specifies that IP-in-IP encapsulation will
be used. The optional decapsulate-any keyword terminates
IP-in-IP tunnels at one tunnel interface. This keyword
creates a tunnel that will not carry any outbound traffic.
However, remote tunnel endpoints can use a tunnel
configured as their destination.
Step 4 tunnel source {ip-address |interface-name} Configures the source address for this IP tunnel. The source
can be specified by IP address or logical interface name.
Example:
switch(config-if)# tunnel source
ethernet 1/2
Step 5 tunnel destination {ip-address |host-name} Configures the destination address for this IP tunnel. The
destination can be specified by IP address or logical host
Example:
name.
switch(config-if)# tunnel destination
192.0.2.1
Step 6 tunnel use-vrf vrf-name (Optional) Uses the configured VRF to look up the tunnel
IP destination address.
Example:
switch(config-if)# tunnel use-vrf blue
Step 7 show interfaces tunnel number (Optional) Displays the tunnel interface statistics.
Example:
switch# show interfaces tunnel 1
Example
This example shows how to create a tunnel interface
switch# configure terminal
switch(config)# interface tunnel 1
switch(config-if)# tunnel source ethenet 1/2
switch(config-if)# tunnel destination 192.0.2.1
switch(config-if)# copy running-config startup-config
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
235
Configuring IP Tunnels
Configuring a Tunnel Interface
SUMMARY STEPS
1. configure terminal
2. interface tunnel number
3. tunnel mode {gre ip | ipip | {ip | decapsulate-any}}
4. show interfaces tunnel number
5. mtu value
6. copy running-config startup-config
DETAILED STEPS
Step 3 tunnel mode {gre ip | ipip | {ip | decapsulate-any}} Sets this tunnel mode to GRE, ipip, or ipip decapsulate-only.
The gre and ip keywords specify that GRE encapsulation
over IP will be used.
The ipip keyword specifies that IP-in-IP encapsulation will
be used. The optional decapsulate-any keyword terminates
IP-in-IP tunnels at one tunnel interface. This keyword
creates a tunnel that will not carry any outbound traffic.
However, remote tunnel endpoints can use a tunnel
configured as their destination.
Step 4 show interfaces tunnel number (Optional) Displays the tunnel interface statistics.
Example:
switch(config-if)# show interfaces tunnel 1
Step 5 mtu value Sets the maximum transmission unit (MTU) of IP packets
sent on an interface.
The range is from 64 to 9192 units.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
236
Configuring IP Tunnels
Configuring a GRE Tunnel
Example
This example shows how to create the tunnel interface to GRE:
switch# configure terminal
switch(config)# interface tunnel 1
switch(config-if)# tunnel mode gre ip
switch(config-if)# copy running-config startup-config
Note Cisco NX-OS supports only the GRE protocol for IPV4 over IPV4.
SUMMARY STEPS
1. configure terminal
2. interface tunnel number
3. tunnel mode gre ip
4. show interfaces tunnel number
5. copy running-config startup-config
DETAILED STEPS
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
237
Configuring IP Tunnels
Enabling Path MTU Discovery
Step 4 show interfaces tunnel number (Optional) Displays the tunnel interface statistics.
Example:
switch(config-if)# show interfaces tunnel 1
SUMMARY STEPS
1. tunnel path-mtu-discovery age-timer min
2. tunnel path-mtu-discovery min-mtu bytes
DETAILED STEPS
Step 2 tunnel path-mtu-discovery min-mtu bytes Enables Path MTU Discovery (PMTUD) on a tunnel
interface.
Example:
switch(config-if)# tunnel path-mtu-discovery • bytes—Minimum MTU recognized.
min-mtu 1500
The range is from 64 to 9192. The default is 64.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
238
Configuring IP Tunnels
Assigning VRF Membership to a Tunnel Interface
SUMMARY STEPS
1. configure terminal
2. interface tunnel number
3. vrf member vrf-name
4. ip address ip-prefix/length
5. show vrf [vrf-name] interface interface-type number
6. copy running-config startup-config
DETAILED STEPS
Step 4 ip address ip-prefix/length Configures an IP address for this interface. You must do
this step after you assign this interface to a VRF.
Example:
switch(config-if)# ip address 192.0.2.1/16
Step 5 show vrf [vrf-name] interface interface-type number (Optional) Displays VRF information.
Example:
switch(config-vrf)# show vrf Enterprise
interface tunnel 0
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
239
Configuring IP Tunnels
Verifying the IP Tunnel Configuration
Example
This example shows how to add a tunnel interface to the VRF:
switch# configure terminal
switch(config)# interface tunnel 0
switch(config-if)# vrf member RemoteOfficeVRF
switch(config-if)# ip address 209.0.2.1/16
switch(config-if)# copy running-config startup-config
Command Purpose
show interface tunnel number Displays the configuration for the tunnel interface
(MTU, protocol, transport, and VRF). Displays input
and output packets, bytes, and packet rates.
show interface tunnel number brief Displays the operational status, IP address,
encapsulation type, and MTU of the tunnel interface.
show interface tunnel number counters Displays interface counters of input/output packets.
Note The byte count displayed with the
interface counters include the internal
header size.
show interface tunnel number description Displays the configured description of the tunnel
interface.
show interface tunnel number status Displays the operational status of the tunnel interface.
show interface tunnel number status err-disabled Displays the error disabled status of the tunnel
interface.
feature tunnel
interface tunnel 0
ip address 209.165.20.2/8
tunnel source ethernet 1/2
tunnel destination 192.0.2.2
tunnel mode gre ip
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
240
Configuring IP Tunnels
Related Documents
Router B:
feature tunnel
interface tunnel 0
ip address 209.165.20.1/8
tunnel source ethernet 2/1
tunnel destination 192.0.2.55
tunnel mode gre ip
Related Documents
Related Topic Document Title
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
241
Configuring IP Tunnels
Related Documents
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
242
APPENDIX A
IETF RFCs supported by Cisco NX-OS Interfaces
This appendix lists the IETF RFCs for interfaces supported by Cisco NX-OS.
• IPv6 RFCs, on page 243
IPv6 RFCs
RFCs Title
RFC 2590 Transmission of IPv6 Packets over Frame Relay Networks Specification
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
243
IETF RFCs supported by Cisco NX-OS Interfaces
IETF RFCs supported by Cisco NX-OS Interfaces
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
244
APPENDIX B
Configuration Limits for Cisco NX-OS Interfaces
The configuration limits are documented in the Cisco Nexus 9000 Series NX-OS Verified Scalability Guide.
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
245
Configuration Limits for Cisco NX-OS Interfaces
Configuration Limits for Cisco NX-OS Interfaces
Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 6.x
246