Nexus 5548UP L3 VLAN & implementation of OSPF

Ladies and gentlemen,

I would like to know what I need to do to configure a VLAN L3 in Nexus 5548UP 2. Each link is connected to two Catalyst 4500 s (Core - LAN). The kernel is running ospf so I thisnk a need to activate it in the Nexus and perhaps hsrp.

You already did something like this?

Here is the schema

Thanks in advance,

JC

Jorge,

Check private Inbox, I hope this helps you...

-Kenny

Tags: Cisco Support

Similar Questions

  • Cisco Nexus 5548UP switch current Version 5.2 (1) N1 (4)

    Hi, we are currently have Cisco Nexus 5548UP switch current Version 5.2 (1) N1 (4)

    It is not listed as affected version:

    Known affected releases:
    (5)
    5.2 (1) N1(8A)
    6.0 (2) N2 (5)
    7.0 (3) N1 (0.125)
    7.0 (4) N1 (1)
    7.1 (0) N1 (0.349)

    The fixed versions known as follows:

    Known fixed releases:
    (7)
    6.0 (2) N2 (4.3)
    6.0 (2) N2(5A)
    7.0 (1) ZN (0.615)
    7.0 (5) N1 (0.173)
    7.0 (5) N1 (1)
    7.1 (0) N1 (0.371)
    7.1 (0) N1 (1)

    It needs to be updated to the latest versions?

    If Yes, what version of the fixed known better adapt our current version

    Cisco Nexus 5548UP switch current Version 5.2 (1) N1 (4)

    Thank you.

    I had the same question, so I opened a folder of TAC to find the version of the software. I was told that the software listed as available in the bug report are versions of NX - custom OS and that there was no version patched for the 5548p. The support engineer also said that the updates of Nexus 5 k should not until November or December. The best advice I could get was to subscribe to the bug report and wait to be notified of an available upgrade.

  • How a policy without moving can be configured for iSCSI traffic in Nexus 5548UP? Are there side effects?

    How a policy without moving can be configured for iSCSI traffic in Nexus 5548UP? Are there side effects?

    Hello

    Side effect depends on your network config, but I can tell you how config no iscsi traffic reduction policy...

    We have three-stage configuration in link below is image...

    1. QOS class - for the first traffic ranking

    2 queue (INPUT/OUTPUT) - this is where you book or traffic police

    3 Netwrok QOS - where you key or setting MTU for classified traffic at the bottom of the basket which tissue in the nexus program

    (config) # class-map type qos myTraffic / / traffic ISCSI of Match
    (config-WCPA-qos) # match iscsi Protocol

    #policy - type myQoS-QoS policy map / / qos Set group 2 ISCSI traffic so that it can be recognized
    class myTraffic
    the value of qos-Group 2

    (config-WCPA-may) # class-map type networks myTraffic
    (nq-WCPA-config) # match qos-Group 2

    (nq-WCPA-config) # type network-qos policy-map myNetwork-QoS-policy
    (nq-pmap-config) # class type networks myTraffic
    (config-pmap-nq-c) # break without moving
    (config-pmap-nq-c) # mtu 2158
    (config-pmap-nq-c) # sh type of network-qos policy-map myNetwork-QoS-policy

    (config-pmap-c-qos) # class-map type myTraffic queues
    (config-WCPA-may) # match qos-Group 2

    (config-pmap-nq-c) # policy - map type queues myQueuing-policy
    (config-pmap-may) # class type myTraffic queues
    % of bandwidth (config-pmap-c-only) # 50
    (config-pmap-c-only) # class type class default queues
    % of bandwidth (config-pmap-c-only) # 25
    (config-pmap-c-only) # sh policy-map type myQueuing-policy Queuing

    (config-sys-qos) # type of service-QoS policy entry strategy myQoS
    (config-sys-qos) # type of service-network-qos myNetwork-QoS-policy policy
    -service policy (qos-sys-config) # type myQueuing-policy input queues
    (config-sys-qos) # type of service-policy output myQueuing-policy queuing

    Let me know your concerns

  • issue of Nexus 5548UP architecture base

    Hello community,

    Displays first - time researcher long

    Could a system architect or a person of vSphere networking experienced respond with a few thoughts on my theoretical network design below.  Please think not too technically specifications of each component other than the Nexus:

    Background:

    • I have a SAN (FC)
    • I have 8 Gbps FC HBA for 3 ESXi 5.0 servers that I currently run
    • I have multiple Cisco core switches more elders (4506, 4510) - max 1 Gbps fiber - * sigh - upgrade will talk later.
    • I have a few 3750 s Cisco for redundancy
    • Currently, I did NOT sufficiently put at my disposal of fiber ports

    Question:

    I did research on various methods to stimulate my backbone of fibre to accommodate my environment more and have developed the wth the Cisco Nexus 5548UP.  This seems to be appropriate switch in what ways to 'UP' Unified Ports that can be configured individually to run 1 Gbps and 10 Gbps FC for network 8, 4, 2 or 1 Gb/s FC to the SAN (among other options) connectivity.  Here's the datasheet if the link is allowed to send:

    http://www.Cisco.com/en/us/products/ps11681/index.html

    Should I not I can attach my SAN FC HBA to the Nexus to manage all my needs of SAN (my SAN provider said it will be seen by the HBAs via a switch when the targets are correct), while at the same time to connect to my existing network of the base to the Nexus on I have configured network (FC ports Uplonk trunk)?  I'm assuing the vCenter maintains routing necessary to serve requests for these virtual machines / servers on the network.  (Please assume this networking within vSphere and on switches are configured correctly).

    Is currently the throughout of Ethernet and iSCSI (software initiators) but I get my game and scalability - so the fiber portion must still be purchased/deployed.

    I have already excluded the Cisco MDS 4198 optionally because it only manages SAN - no network.

    http://www.Cisco.com/en/us/products/ps10703/index.html

    I just want to be sure that all talk properly with this configuration.

    I am mixes answers through different providers, but I think that it "s because they were not in the VMWare environment to see what I'm asking.  Some say FC and Ethernet won't talk to each other on the same switch (which is understandable) - but I do not know what matters in the world of vSphere/vCenter.  This my question.

    Here are the crude diagram:

    3 X ESXi 5.0 w / 8 Gb/s FC HBAS each-> 5548UP-> SAN Nexus

    ports of routers base CF Gbic (unfortunatley LC and SC mix)-> link 5548UP

    Someone at - it try?  Seems pretty likely to me, but I am certainly learning.

    Thank you

    Alex

    RTCRM,

    You are right.  The 5548UP can also manage Ethernet and FC set up / running on the same 5548UP at the same time.  With the correct configuration and licensing, this switch will handle both simultaneously and efficiently.

  • Nexus 5548UP uplinks to the Catalyst 4510R

    I design my entirely 10g data center access layer with a pair of 5548UP switches in an EvPC and a pair of double hosted 2232PP FEX. I need to be able to uplink my pair of 5500 s up to my pair of classic 4510R aggregation switches. Each 4510R has two supervisors SUP of v, each with two ports 10g X 2. I have a trunk double 10g in a port between each 4510R channel.

    What is the ideal method for uplink to the 5500's to 4510R switches? Like many, I understand that one of the two ports of 10 g on each V Sup can be active. I should double home each 5548 to each 4510R STP and let it do its thing? I am able to do it with my SUP of V? And if so, I've always will be able to junction ports dual 10g in a port between the two switches 4510R channel? I need to maintain a large pipe between the regular for my campus traffic aggregation swithces which do not cross to the data center.

    Thank you!

    Well since you cannot cluster the 45K as a virtual switch (Cisco with new sup will start the supported VSS in the 4500 try to check which sup exactly and if you get like this will make a significant improvement in your design)

    Anyway the only method you can use currently is the traditional way, which is a function of STP (use rapid-PVST)

    each N5K use a separate link for each 45K and STP will be on links in blocking mode

    However, you could do some STP design and vlan for load sharing where you can send the vlan x more link1 and vlan y b at 45 K using cost PLEASE link

    HTH

  • set up to bring the Fibre Channel between UCS of interconnection fiber and Nexus 5548UP.

    by using the following configuration between Nexus5k and UCS FI. the status of channel comes to ini and change to notConnected.

    -------------------------------------------------------------------------------
    FC1/31 431 notConnected swl - 100 F
    FC1/32 431 notConnected swl - 100 F

    -----------------------------------------------------------------------------------

    The system version: 5.2 (1) N1(1b)

    1 on FCoE
    1 active FEX
    active toy-channel-trunk 1
    interface vlan 1 on
    1 active LACP
    1 active LLDP
    1 active NPIV
    1 active sshServer
    1 on GANYMEDE
    1 active telnetServer
    Uni-directional active 1
    1 active VPC

    san-port-channel interface, 100
    active channel mode
    switchport mode F
    switchport trunk allowed vsan 431

    interface fc1/31
    switchport 'SAN PO to UCS - one' description
    channel-group 100
    no downtime

    interface fc1/32
    switchport 'SAN PO to UCS - one' description
    channel-group 100
    no downtime

    interface fc1/31
    switchport mode F
    interface fc1/32
    switchport mode F

    Help, please

    You must update your 5 k at least

    6.0 (2) N1 (2)

  • Passive routes with OSPF on the PIX

    Hello

    Having just upgraded my PIX to software v8 finally hoping to participate in OSPF on the network.

    The PIX have all many DMZ I want to advertise on OSPF to remove a * much * of fragile static routes but of course I would * not * advertise or get OSPF of these demilitarized. I thought I could do these interfaces passive - or better still, question:

    router ospf 1
    passive-interface default

    And then exempt only the internal interface.

    However, (unlike IOS) it seems to be without notion of passive in the implementation of OSPF from the PIX - a place where I thought it would be very useful...

    How to distribute the these DMZ on OSPF without advertising OSPF in them?

    I had planned to use:

    redistributed connected subnets

    However, which redistributes things like the public interface of the Internet, I don't want to. In addition, even if there is a way to stop there including the public interface, it seems more prone to the error of the user than passive by default with one exception.

    Any ideas? If this is not the case, can I restrict the interfaces in connected subnets redrawn?

    Thanks for all the ideas!

    Hi Peter,.

    Thank you, Yes... I was suggesting to remove network dmz under the OSPF process commands.  As you said, it used to really do what you want to do with the removal of the static since its disabling ospf for this network.

    Start-up eigrp would seem to be a lot of extra work just to eliminate the static if that's what it will be used for, but it would allow you to make the passive interface that would not accomplish snd/RRs eigrp on the specific interface.

    I just re-read your first message and I think I understand now what you're after - which goes back to your first survey of redistribution... you can redistribute static electricity and use a road map to control what roads you want to redistribute.  You can then remove the networks for the demilitarized zone under router ospf process.

    example:

    access-list ospfredist standard permit 10.10.10.0 255.255.255.0
    access-list ospfredist standard permit 192.168.10.0 255.255.255.0

    route-map static-ospf
      match ip address ospfredist

    router ospf 10
      redistribute static subnets route-map static-ospf

    this should redistribute only the statics that you listed above.

    hope this helps a bit.

    -scott

  • Nexus 5000 operating as a standalone FibreChannel Switch

    Hello world

    Does anyone know if the Nexus 5000 can be used as a standalone FibreChannel Switch? Which means I don't want to run NPV on this and connect it up to a MDS or a different type of switch FibreChannel. I'm looking to create a 'Pod' scenario. Where a few servers and a storage Bay would hang the 5K on a login F_Ports is local FLOGI DB and be able to use zoning and traffic went immediately from the 5K, etc etc? I know that 5 K is not a full blown fibre channel switch such that it has some limitations, but again I think to a "Pod" as scenario.

    If the script above won't work for some reason any using CF can achieve us with FCoE CNAs on servers & storage Bay?

    Finally, FC domain IDS how 5 K can cause?

    Sorry for the questions. I'm new to SAN switching at this stage.

    Thank you all!

    Yes, it works even FC code NX - OS like a switch MDS switch.

    You connect FC HBAS, ports SAN or FCoE CNAs to Nexus.

    However, you need to license storage.

    Nexus 5010 supports up to 8 4 G FC or FC G 6 8 ports with the expansion module

    Nexus 5020 supports up to 16 4 G FC or 12 8 G FC ports with the expansion module

    Nexus 5548UP supports up to ports FC 32 4 / 8G without the expansion module

    Nexus 5548UP supports up to 48 4 FC ports / 8G with the expansion module

    Nexus 5596UP supports up to 48 4 FC ports / 8G without the expansion module

    Nexus 5596UP supports up to 96 4 FC ports / 8G with the expansion module

  • Double room Nexus 2348UPQ / Max ports for vPC links

    Hi people,

    Cisco Nexus 2348UPQ has 24 to 10 GB uplink interfaces. Supposedly on the distribution layer, we have a pair of Cisco Nexus 5548UP, how many ports we can group about 2348 for vPC for double-homing links.

    Thank you very much!!!

    Hi Chris,

    Using an Extender of fabric with a Cisco Nexus 5000 and 6000 Series Switch Cisco Nexus

    http://www.Cisco.com/c/en/us/TD/docs/switches/Datacenter/nexus2000/HW/installation/guide/nexus_2000_hig/overview.html#pgfId-1415984

    -If you decide to use the drop cable instead of the 40 G uplinks, please note the following limitation:

    The 2348TQ of Cisco Nexus and Nexus 2348UPQ FEX, if a port channel is used to connect a switch parent with a tissue Expander device, the port channels can have up to 8 ports.

    Nexus 2348 FEX devices have a total of 6 * 40 Gigabit Ethernet uplink ports to the parent switch. If these are used with native port of 40G uplinks on a switch of parent, there is no limitation. 6 ports can be used in a hosted configuration only hosted or double. You can also use 40 Gigabit Ethernet uplink ports on the extensor of N2348 fabric with 10 Gigabit Ethernet ports on the switch to parent when it is used with the appropriate wiring. A maximum of 8 ports can be added to the string of port between the parent switch and the fabric Extender. If it's a double hosted configuration, VPC for the extensor of fabric, only 4 ports per switch are allowed in the channel of the port.

    Cisco Nexus 5600 series NX - OS Layer 2 switching Configuration Guide, version 7.x - configuration of the fabric Extender

    http://www.Cisco.com/c/en/us/TD/docs/switches/Datacenter/nexus5600/SW/Layer2/7x/b_5600_Layer2_Config_7x/b_6k_Layer2_Config_7x_chapter_01110.html

    -SFP support and cables are listed in the Cisco Nexus 2300 platform fabric Extender card (http://www.cisco.com/c/en/us/products/collateral/switches/nexus-2000-series-fabric-extenders/datasheet-c78-731663.html).

    I'd be suspicious of this bug;

    https://Tools.Cisco.com/bugsearch/bug/CSCuu88175/?reffering_site=dumpcr

    "If it's a double configuration hosted, vpc for fex, that only 4 ports per switch are permitted in the Port-Channel"

    HTH,

    Qiese Sa'di

  • EMC XtremIO Gen2 table, vSphere 5.5 and Windows Server 2012 R2 EFI

    We spin the new array of XtremIO Gen2 a POC of EMC and discovered a problem with customers running Windows Server R2 2012 or the EFI firmware. The details are in the blog below, but the goal here is to ask for the community of entry of anyone else running on XtremIO with firmware Win2k12 R2 and non - R2 and EFI/BIOS. EMC support is also working on this subject, so I can finish to post my reply here. Nevertheless, community information XtremIO is so limited (because of his November GA), I hope that this will make a difference.

    Blog/details: XtremIO Gen2 EMC and VMware: bcTechNet

    Environment:

    Dell PowerEdge R810/R820 hosts

    QLogic CNAs 8262 (5, 5-compatible firmware/drivers)

    Switches-Cisco Nexus 5548UP

    FCoE to guests; CF storage

    3Par T400 source of storage (FC 4 GB/s)

    Target storage XtremIO Gen2 (8 Gbps FC)

    VMware vSphere, ESXi 5.5 Build 1331820

    The Windows Server 2008 R2 (BIOS), 2012 (BIOS) clients and 2012 R2 (EFI)

    Storage 3PAR - no problem with all the guests

    XtremIO storage - can not (re) start guests R2 EFI 2012

    After a few weeks of troubleshooting by engineers from VMware and EMC/XtremIO, the question was determined to be a problem starting EFI replace a block of 7 MB in the XtremIO table, which filled the queue, and who would never clear that he expected more data to complete the communication (i.e. deadlock). This seems to happen only with firmware of EFI VMs (tested with 2012 Windows and Windows 2012 R2) and the question is on the end of XtremIO.

    The good news is that the problem can be mitigated by adjusting the Disk.DiskMaxIOSize parameter on each ESXi host by default 32 MB 32768-4 MB (4096). You can find it in vCenter > Home > Configuration > advanced settings (from the bottom) > drive > Disk.DiskMaxIOSize. The XtremIO team is working on a permanent fix in the meantime, and the workaround can be implemented hot with no impact on ongoing operations (potentially minor host CPU load increase as ESXi breaks > 4 MB e/s in MB 4 pieces).

    The rest of the ventilation on the latency, small block IO, etc. can be read here: XtremIO EMC and VMware EFI | bcTechNet

    Thank you, Darius, and EMC/XtremIO team.

    -Chris

  • Total for the port-channel when speed config speed 1000-nexus5548?

    Hello world.

    now I connect cisco 6509 and nexus 5548up using two link of 1000M and I want the two link port-Channel binding.

    5548up port 10GE port cisco 6509 is 1GE, I config speed 1000 in nexus5548 ethernet port, and I find

    the speed 1000 order auto config interface port-channel, so I would like to know the total speed in this channel port

    is 1000M and 2000M when port-channel speed config 1000? I appreciate your help!

    the topology like this:

    1000M

    --------------------------------------------

    6509 port-channel speed 1000M nexus5548UP

    ----------------------------------------------

    1000M

    Hi again

    The speed of the links and portchannel is 1000M but the bandwidth of the portchannel is 2000M

  • 6200 FCoE in the direction of the North

    I have a quick question that I have not been able to get a definitive right answer to (in literature)-regarding the new 6200 FI and FCoE in the direction of the North...

    Anyway, my question: with the function UP on the 6200 (with UCS 2.0) - can we now do FCoE in the north direction (in this case a nexus 5548UP)? Or do we still need out in separate eth and FC rising?

    I see of the configuration Guide, we can configure ports such as FCoE ports - and options for eth uplinks and CF uplinks are still there too. I was not able to determine if the FCoE port type can be used for uplink.

    Thanks in advance!

    Hi Daniel,.

    * You can always northbound FCoE connectivity of the UCS YEW which in your case, you can not uplink between 62xx FCoE and the 5548UP.

    * You must always have seprate FC rising and uplinks Eth.

    * The feature to have FCoE uplink will be available in a future release (on request at the end of the year).

    * the FCoE ports that you see are to use when you want to direct fix storage of FCoE for FI (limited support model).

    I hope this helps!

    . / Afonso

  • ACS SE - domains Windows AD

    Can I use groups of network devices ACS to have one device acting as authenticator ACS two Windows domains to 802. 1 x for a single switch?

    Hope the question makes sense but to put it a little more meat on the issue:

    I have a single ACS device that I try to use for authentication of 802. 1 x on a switch. The problem is that I want to have the part of allocation of VLAN implementation allocated through the ACS server on the control dependant users with an account domain, but we have two domains without trust between them. the remote agent in ACS to should not be installed on servers in different domains and that two agents available are for resiliance only, so does not fit this unfortunatley.

    That's why I finished watching with several groups of devices.

    someone at - it ideas if this will work or if there is another way to make this work.

    Hello

    ACS cannot authenticate 'natively' in 2 different domains that do not have a defined relationship. If this is not possible, then you must make 2 ACS servers, one in each area. Configure the ACS 'primary' to the 'secondary' server proxy queries based on the provided field.

    This would require a second server ACS be set upwards (you will probably pay an additional fee for the second ACS server). You do not want to configure a proxy distribution table. This would require the user explicitly indicate the domain name with their user name.

    Kind regards

    ~ JG

    Please evaluate the useful messages

  • FC Port-Channel

    Hello

    I'm still new in Cisco nexus environment. I need help on setting up 10 GB FC Port-channel between Cisco Nexus 5548UP switch and the catalyst 6513.

    Help, please.

    Kind regards

    Sorry, but does not support the catalyst 6513 CF native? do you mean MDS 9513?

  • vPC and VSS port-channel uplinks

    Hello Forum team!

    Currently I have a configuration of a couple of Nexus 5548UP in a field of vPC with a couple of Nexus 2248TP aircraft in a double scenario hosted for the access layer (FEX in a vPC also). Core/distribution, there are a pair of 6509 cluster VSS. Now I configured a regular port-channel every 5K to the VSS functionality and works as expected. My question is this: given that in the vPC a 5K is the main and the other is secondary, a configurable vPC for the uplinks to the VSS instead of a channel of regular port of each 5 K?

    In addition, configurations must be replicated manually on both Nexus 5 K? I'm in denial about this. I'm used to how VSS works.

    Thanks to the advanced guys!

    Hello

    You can use a vPC of the pair of Nexus 5 K to the VSS cluster. There is a white paper Cisco Catalyst 6500 VSS and Cisco Nexus 7000 vPC of interoperability and best practices that will in this. While the white paper is for Nexus 7000 are you interested to do probably is the configuration shown in Figure 2 and so the scenario and considerations are the same.

    On the Nexus switches with vPC there are still two control i.e. plans, the primary and secondary that you mention. For all the configurations that should be applied at the primary and secondary, you can manually configure on the two switches or use the synchronization of Configuration characteristic Nexus (see Configuration synchronization Operations for more details).

    He was 15-months we have looked at the function so probably things have changed, but following issues with our tests, and we were see reported here in the forum at this time, we decided not to use the config Sync feature. Outside all bugs, there are some operational changes to consider and then make sure that you are comfortable with how config-sync works before putting it in a production environment.

    Concerning

Maybe you are looking for