Nexus 7000 - integrate FEX - identify ID ASIC

Hi *.

in reference to this the following guide, I would like to identify the Asic-ID, to plan the integration of a FEX 2248PQ to an interexploité in a context of F2e M1-xl-type F2 module.

http://www.Cisco.com/en/us/docs/switches/Datacenter/nexus2000/SW/configuration/guide/rel_6_2/b_Configuring_the_Cisco_Nexus_2000_Series_Fabric_Extender_rel_6_2_chapter_010.html

There is a note in the section "combining of a tissue Expander to a Module of the F2 series.

Each port in the ASIC has an index. Allow only ports with similar indices across ASICs to be added to a port channel.

For example, if port 1 has an index of 1 and port 2 has an index of 2, the following ports are supported and not supported:

  • Support: 1 1 ASIC and port 1 of 2 ASIC are added to a port channel.
  • Unsupported: Port 1 of 1 ASIC and port 2 2 ASIC to form a port channel.

A set of ports to an ASIC that a set S, such as {1,2,4} Sub index, is authorized to add to a channel of port if the port channel has an equivalent, or an empty set.

So is there a way to get the asic-id, as mentioned above, with a few appropriate show commands?

Please be advised that the FEX are not yet installed.

I need to check beforehand if the wiring is correct.

Some useful answers in the next a few would be very much appreciated.

Thanks in advance

Sven

Sven

Take a look at this article, and if all goes well he will answer your questions.

http://www.netcraftsmen.NET/blogs/entry/using-FEX-with-the-F2-card-in-a-Nexus-7000.html

Jon

Tags: Cisco Network

Similar Questions

  • L3 Nexus 7000 routing Proxy

    Hello

    I propose Nexsu 7000 as backbone switch for my client.

    But I do not understand why proxy L3 routing must be used under M & F2 mixed condition.

    But module F2 also bear all capacity of L3, L3 routing dosen't support of the F2 module with module of the M series.

    Could you tell me why this is happening and explain Nexus 7000 architecture?

    Thank you

    Yun.

    M2 + F2e in same VDC works dated 6.2 (2), in which case F2e module returns to the classic transmission L2 mode, leaving all L3 decisions up to the M2 module, so you still need L3 routing proxy.

    I think the reasoning behind this is because of the motor M2 L3 being much more potent than the freight forwarder F2e L3.  For example, the motor M2 can make OTV, the impossible F2e.  Logic to return L3 decisions for a more powerful card.

    What I find strange is that although F2e online map has an integrated transmission of L3 engine, that I can not configure the IP of L3 addresses directly on F2e ports.  Creating a VLAN SVI and by setting the port access mode F2e work, but if I only need a link point single point of L3 between the Nexus 7 K and another device, and I have configured the vPC, vPC then in an inconsistent with Type 2 State, because the VLAN and/or IVR is not present on the switch of peers.

  • 6248up Nexus 7000 or 2000

    We have 2 core witches nexus 7000 and then downstream to 2 nexus 2000 is.

    then e have 6248up fi for the UCS. should he go to the nexus 2000 or directly at the base of 7000 nexus?

    What is the benefit or to the detriment of go to the nexus 2000 or 7000?

    You must join the Nexus 7000 6248.

    Nexus 2000 was created to connect to end-hosts and not the switches or the FI. Since all local switching is performed on N7k, if you connect FI N2k, ensuring the same between the blades will be sent through n2k to N7k, tissue link N2k - N7K will be oversubscribed and UCS will suffer poor performance.

    So FI must be connected to the N7K

    HTH,

    Alex

  • Nexus 7000 questions sampled NetFlow

    We have Nexus 7000 s set to sampled netflow. We have tools which have reconstitute recording of flows sampled for the management screens. Most of the tools require the template folder of feeds, optionally and to send in order to reconstruct the sampled flow record. We've captured some of this traffic and noticed that the template contains "SamplerMode": unknown (1) [see Nexus 1 - 1.png]. Is this normal or have we do not include the commands needed for the operation?

    Thank you

    Terrence

    fearure netflow

    Active Stream timeout 60

    flow timer 15 inactive (default)

    workflow session

    threshold flow timeout agreesive 80

    workflow exporter flow_exporter

    x.x.x.x use-vrf destinations management

    9996 udp transport

    version 9

    the 30 model data timeout

    exporter-stats 30 timeout option

    option table sampler timeout 60

    flow flow_record record

    match source ipv4 address

    ! {many instructions}

    netflow_sampler-2 sampler

    out of 1 100 mode

    Flow monitor flow_monitor

    record flow_record

    exporter flow_exporter

    interface VLAN 150

    IP flow monitor output flow_monitor netflow_sampler-2 sampler

    Hello Terrence,

    You are right about "most of the tools require registration of flow, the option and the model" and they also require the definitions of all elements used for export.

    We maintain constant communication with Cisco for their last item ID and definitions (e.g., description, type, length, etc.).  It looks like your collector may need definitions.  Once updated, the front-end server must then be updated to make use of the new element if you want to use.

    If you send a capture of packets of the flow to Plixer will give you a more complete diagnosis. Make sure you include the models.

    You can vote if my post answered your question.

  • What does Nexus 1000v Version number Say

    Can any body provide long Nexus 1000v version number, for example 5.2 (1) SV3 (1.15)

    And what does SV mean in the version number.

    Thank you

    SV is the abbreviation of "Swiched VMware"

    See below for a detailed explanation:

    http://www.Cisco.com/c/en/us/about/Security-Center/iOS-NX-OS-reference-g...

    The Cisco NX - OS dialing software

    Software Cisco NX - OS is a data-center-class operating system that provides a high thanks to a modular design availability. The Cisco NX - OS software is software-based Cisco MDS 9000 SAN - OS and it supports the Cisco Nexus series switch Cisco MDS 9000 series multilayer. The Cisco NX - OS software contains a boot kick image and an image of the system, the two images contain an identifier of major version, minor version identifier and a maintenance release identifier, and they may also contain an identifier of reconstruction, which can also be referred to as a Patch to support. (See Figure 6).

    Software NX - OS Cisco Nexus 7000 Series and MDS 9000 series switches use the numbering scheme that is illustrated in Figure 6.

    Figure 6. Switches of the series Cisco IOS dial for Cisco Nexus 7000 and MDS 9000 NX - OS

    For the other members of the family, software Cisco NX - OS uses a combination of systems independent of the platform and is dependent on the platform as shown in Figure 6a.

    Figure 6 a. software Cisco IOS NX - OS numbering for the link between 4000 and 5000 Series and Nexus 1000 switches virtual

    The indicator of the platform is N for switches of the 5000 series Nexus, E for the switches of the series 4000 Nexus and S for the Nexus 1000 series switches. In addition, Nexus 1000 virtual switch uses a designation of two letters platform where the second letter indicates the hypervisor vendor that the virtual switch is compatible with, for example V for VMware. Features there are patches in the platform-independent code and features are present in the version of the platform-dependent Figure 6 a above, there is place of bugs in the version of the software Cisco NX - OS 4.0(1a) are present in the version 4.0(1a) N1(1a).

  • Nexus F2e series modules

    Can someone tell me what is the difference between F2 and new F2e?  All I can find is supportive effect. Isn't it?

    The biggest complaint (and Gotcha) when people bought the N7K-F248XP-25 (aka standard F2) is an inability of the online map to work with F1 and M1/M2 card.  The F2 has be in it's own little VDC.   No member of Cisco would have admitted that it was due to a technical fault (or disaster).

    Thus the F2e is born.  Whatever the standard F2 can do, the F2e can do as well.  And the F2e can work with M1/M2.  "And when that happens (as indicated on the data sheet)" when you deploy the Module Cisco Nexus 7000 F2e-series fiber has VCC with the Cisco Nexus 7000 M Series modules, the Nexus 7000 F2e - series Cisco Fiber Module will run in mode Layer 2 only, delegating all capabilities of layer 3 for the Cisco Nexus 7000 M-modules of the series present in the VDC. The initial version of the software does not support this feature. »

    The F2e comes in two "forms": 1/10BaseTx 48-ports or SFP / SFP +.

    As the "F2", the F2e still won't be able to support the OTV (integrating F2 series Modules in a Cisco Nexus 7000 Series System).

    Due to the release of the new map of F2e expect Cisco to announce (within 6 months) at the end of sale of the standard map of F2.  (My own opinion, read below for refutation of the management team Cisco Nexus 7000 Production.)

    I don't know what Cisco will do to customers who bought the standard F2 by mistake.  Cisco quietly will allow them to trade or swap for F2e?  Only people (like Jerry) in Cisco will know.

    Post edited by: Leo Laohoo

  • Clarification of Nexus VPC

    After a recent deployment of the switch, I see some very strange transmission problems layer 2.  I'm not sure if this is related to a problem of configuration on my part.  I would like clarification on the VPC, and I hope you can help me.

    It is my understanding that when you have a series of double-sided VPC between, say, a pair of N7700 and several pairs of Nexus 9 K or K 5 switches, that all the field of VPC ID must be different.  However, a contractor told me that each number VPC - associated with the uplink of etherchannel to the Nexus 7Ks - must also be unique.  A graph that shows my dilemma is attached.

    Question - I am ok to reuse the port-channel number 3 with the VPC 3 for all pairs of leaves, or if they should be different?

    Hello

    What you show, it's perfectible acceptable. The two areas of vPC in the Nexus 9000 layer, domain of the vPC 117 and 118 in your diagram, have no knowledge of the other, and so the same vPC and port channel number can be used.

    As you said, you obviously have a unique numbering to the layer of Nexus 7000.

    Concerning

  • groups of IP addresses are supported on Nexus-5000 and models down?

    Looking online, I see the ip address of the object-group is explicitly listed as

    supprted on Nexus 7000 but on other model documents command is confusing.

    For example, for Nexus-5000 references to IP address source/destination to refuse the order group objects exist in the documentation older versions of NX - OS 4.0 and 4.1 (with no explicit object-group command is listed in the same CLI reference) but in v5.x current source/destination shows no Group of IP addresses as available choice.

    Can one with access to the Nexus 5000 or 3000 check if the ip address of the object-group is an order valid on this platform?

    It seems full support (like on IOS), using the IP address groups was established in v6 NX - OS (which only works on platform 7000).

    There was also presented on the lower models?

    Thank you.

    Hi Alexandre

    This feature is not currently supported on N5k/N3k

    If you have specific requirements for this feature, please join your team has to describe your network design. And they will be able to help you.

    HTH,

    Alex

  • Nexus MTBF

    Hello

    Are there MTBF values available for switches of Nexus and components (line cards, sup, fabrics, etc.)? I could not find on the data sheets.

    Thank you in advance.

    Hi Andras,

    Thanks for the note. In fact, I just found a few more which covers modules e/s in the Nexus 7000 Linecards feature comparison document.

    Concerning

  • Nexus NX of VDC update - isolated OS

    Hey guys Nexus!

    I received a Virtual Device context (VDC) with administrator privileges to use for research and development. Can I switch my Nexus 7000 series NX of VDC - OS without affecting the other TDC on this box?

    Thank you

    Frank

    Hi Frank,.

    You are unable to pass the Cisco NX - OS for an individual VDC software because when you upgrade the software for Nexus NX - OS he witches upgraded software for the VDC in the switch.

    Discover the VDC upgrade confirmation document

    It could be that useful...

    -GI

    Rate if this can help

  • Nexus 5 k with L3

    Hello

    Could you explain the following paragraph, located at the following ADDRESS:

    http://www.Cisco.com/c/en/us/TD/docs/switches/Datacenter/nexus5000/SW/operations/interfaces/602_n1_1/N5K_Interfaces_Ops_Guide/L3_w_vpc_5500platform.html#wp1014116

    «In some circumstances, you might consider having a distinct link between both vPC switches, to form the layer 3 Protocol Routing peering or transport traffic VLAN no - vPC.» * While this design is compatible with the Cisco Nexus 7000 Series switch, it does not work on the Cisco Nexus 5000 series switch *. With the Cisco Nexus 5000 Series switch, we recommend using a link of vPC for Layer 3 peering peers in order to perform the vPC and non - vPC VLAN. »

    I have deployments of Nexus 5 k with L3 cards which have separate links for L3 and no vpc VLAN instead of having them on the link of peers VPC and they seem to work well. This is a mistake in the documentation or could I have problems?

    Thank you

    Eric Lauriault, CCIE 27521

    Hi Eric,.

    In the URL you have specified http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/operations/n5k_L3_w_vpc_5500platform.html

    Take a look at Figure 3-10 and now add another layer 3 linking N5K N5K-1-2.

    1 multicast is sent on N5K - 1

    2. multicast routing on N5K - 1.  A copy is sent to the interface of L3 and another copy is sent to the peer-link in vlan reserved (in the vpc bin - vrf default vlan xxxx).

    3. the packet received on the interface of layer 3 multicasting will still get replicate by the peers-Link.

    Thank you

    -KL

  • vPC and VSS port-channel uplinks

    Hello Forum team!

    Currently I have a configuration of a couple of Nexus 5548UP in a field of vPC with a couple of Nexus 2248TP aircraft in a double scenario hosted for the access layer (FEX in a vPC also). Core/distribution, there are a pair of 6509 cluster VSS. Now I configured a regular port-channel every 5K to the VSS functionality and works as expected. My question is this: given that in the vPC a 5K is the main and the other is secondary, a configurable vPC for the uplinks to the VSS instead of a channel of regular port of each 5 K?

    In addition, configurations must be replicated manually on both Nexus 5 K? I'm in denial about this. I'm used to how VSS works.

    Thanks to the advanced guys!

    Hello

    You can use a vPC of the pair of Nexus 5 K to the VSS cluster. There is a white paper Cisco Catalyst 6500 VSS and Cisco Nexus 7000 vPC of interoperability and best practices that will in this. While the white paper is for Nexus 7000 are you interested to do probably is the configuration shown in Figure 2 and so the scenario and considerations are the same.

    On the Nexus switches with vPC there are still two control i.e. plans, the primary and secondary that you mention. For all the configurations that should be applied at the primary and secondary, you can manually configure on the two switches or use the synchronization of Configuration characteristic Nexus (see Configuration synchronization Operations for more details).

    He was 15-months we have looked at the function so probably things have changed, but following issues with our tests, and we were see reported here in the forum at this time, we decided not to use the config Sync feature. Outside all bugs, there are some operational changes to consider and then make sure that you are comfortable with how config-sync works before putting it in a production environment.

    Concerning

  • MacBook as Cisco Switch profiles in 2.1

    I'm experimenting with trying to Mac to the profile to the ISE. 2.1. I tried installing AnyConnect, and for some reason he sees it as a Nexus 7000 switch.

    Here's the debug info

    Attribute: AAA-server value: ise-2
    Attribute: Airespace-Wlan-Id value: 5
    Attribute: AllowedProtocolMatchedRule value: EAP_Chaining_Wireless
    Attribute: AuthenticationMethod value: MSCHAPV2
    Attribute: AuthorizationPolicyMatchedRule value: default
    Attribute: BYODRegistration value: unknown
    Attribute: CacheUpdateTime value: 1465417705907
    Attribute: Called-Station-ID value:20-3a-07-66-96-20
    Attribute: Calling-Station-ID value:a4-5e-60-cf-81-83
    Attribute: CreateTime value: 1464896196500
    Attribute: DestinationIPAddress value: 10.10.207.156
    Attribute: Value DestinationPort: 1812
    Attribute value: DetailedInfo: authentication succeed
    Attribute value: IP address: 10.10.204.114
    Value of the attribute identifier: Device:
    Attribute value: device Port: 32772
    Attribute: Value Type Device: Device Type #All Types of devices
    Attribute: DeviceCompliance value: unknown
    Attribute: DeviceRegistrationStatus value: NotRegistered
    Attribute: value:A4-5E-60-CF-81-83 EndPointMACAddress
    Attribute: EndPointPolicy value: Cisco-switch
    Attribute value: EndPointPolicyID: 4afc4ae0-6d8e-11e5-978e-005056bf2f0a
    Attribute: EndPointProfilerServer value: ise-2
    Attribute: EndPointSource value: RADIUS probe
    Attribute: FailureReason value: 5440 abandoned Endpoint EAP session and began again
    Attribute: FirstCollection value: 1464896196418
    Attribute: value Framed-IP-Address:
    Attribute: value Framed-IPv6-Address:
    Attribute: IdentityAccessRestricted value: false
    Attribute value: IdentityGroup: profile
    Attribute value: IdentityGroupID: b132c920-6d8d-11e5-978e-005056bf2f0a
    Attribute: IsThirdPartyDeviceFlow value: false
    Attribute: LastActivity value: 1465417705904
    Attribute: LastNmapScanTime value: 1465245395228
    Attribute: value: a place #All locations
    Attribute: LogicalProfile value: infrastructure network devices
    Attribute: MACAddress value: A4:5E:60:CF:81:83
    Attribute value: MDMServerID:
    Attribute: MatchedPolicy value: Cisco-switch
    Attribute value: MatchedPolicyID: 4afc4ae0-6d8e-11e5-978e-005056bf2f0a
    Attribute: Value MessageCode: 5440
    Attribute: NAS-IP-address value: 10.10.204.114
    Attribute: NAS-identifier value: WLC-3
    Attribute: NAS-Port value: 1
    Attribute: NAS-Port-Type value: Wireless - IEEE 802.11
    Attribute value: Network Device Profile: Cisco
    Attribute: NetworkDeviceGroups value: location #All locations, Types of devices Device Type #All
    Attribute: NetworkDeviceName value: WLC-3
    Attribute value: NetworkDeviceProfileId: 8ade1f15-aef1-4a9a-8158-d02e835179db
    Attribute: NetworkDeviceProfileName value: Cisco
    Attribute: NmapScanCount value: 1
    Attribute: NmapSubnetScanID value: 0
    Attribute: YES value: Apple, Inc.
    Attribute value: PhoneID:
    Attribute: PolicyVersion value: 32
    Attribute value: PortalUser:
    Attribute: PostureApplicable value: Yes
    Attribute: PostureAssessmentStatus value: NotApplicable
    Attribute value: PostureExpiry:
    Attribute: PostureStatus value: unknown
    Attribute: RadiusFlowType value: Wireless802_1x
    Attribute: RadiusPacketType value: AccessRequest
    Attribute: RegistrationTimeStamp value: 0
    Attribute value: response: {RadiusPacketType = drop ;}
    Attribute: SSID value:20-3a-07-66-96-20
    Attribute: SelectedAccessService value: lack of access to the network
    Attribute value: SelectedAuthenticationIdentityStores: the internal users, ise-2, All_AD_Join_Points
    Attribute: SelectedAuthorizationProfiles value: DenyAccess
    Attribute: Service-Type value: box
    Attribute: StaticAssignment value: false
    Attribute: StaticGroupAssignment value: false
    Attribute: StepData value: 4 = standardized Radius.RadiusFlowType, 5 = EAP_Chaining_Wireless
    Attribute value: TLSCipher: ECDHE-RSA-AES256-SHA
    Attribute: TLSVersion value: TLSv1
    Attribute: TimeToProfile value: 44
    Factor of certainty attribute value: Total: 30
    Attribute value: UniqueSubjectID:
    Attribute: UpdateTime value: 1465245396597
    Attribute: allowEasyWiredSession value: false
    Attribute: Host-name value:
    Value of the attribute: ip:
    Attribute: value operating system switch: Cisco Nexus 7000 (NX - OS 4.2.6) (99% accuracy)
    Attribute: result of operating-system value: Cisco Nexus 7000 switch (NX - OS 4.2.6) (99% accuracy)
    Attribute: SkipProfiling value: false

    Yes you must add the ISE server in your help-dhcp (dhcp relay) in order to obtain information about the DHCP request to profile correctly the devices.

    Even after setting correctly ISE in your DHCP relay, you aren't able to profile?

  • N5K - N2K design: straight through the Active topology vs mobile comparison

    Hello

    Can anyone provide a comparison on straight through the topology N2K N5K Active mobile vs . In addition need to answer on below

    -Can we send active active traffic using straight through the topology with using VPC at end of server.

    Thanks in advance.

    Kind regards

    Farhad

    Hi Farhad,

    Please see below links where you can find more information on the topologies of vPC straight through, active and improved.

    http://www.Cisco.com/en/us/docs/switches/Datacenter/nexus5000/SW/mkt_ops...

    I don't think that you would be able to send the active traffic just by using straight through topology. You can use VPC and bind the 2 straight through aircraft spread over 2 switches sheets for active traffic however.

    Please find the link as well, where are the topologies supported between Nexus devices and fex below.

    http://www.Cisco.com/c/en/us/support/docs/switches/nexus-2000-series-FAB...

    Kind regards
    Sunil.

  • Question of vPC NEXUS7K

    Guyz please correct me if im wrong, I have 2 x Nexus7k and lets say 1 3750 switch now I need to have the connected and active also vPC inter - vlan routing for VLAN10 on the two Nexus switches as follows: -.

    SW1 - 2x10G - SW2 Nexus nexus

    (Gi0/3)-/(Gi0/2)

    3750 Switch3

    |

    VLAN 10

    Requirements on the Nexus two, SWs

    ------------------------------------------------------------

    (1) turn on vPC on both switches to Nexus

    (2) create vPC area 8 on the two switches

    management interface 3) the use of two switches to configure the peer of vPC keepalive

    (4) (4) configurer set up on links two 10 G on both sides on the port channel 5, turn on the trunk and spanning tree-type network

    (5) activate vPC Peer to the port-channel 5 on both sides

    (6) create VLAN 10 on Nexus SW1< by="" doing="" this="" shouldnt="" vlan="" 10="" be="" created="" on="" nexus="" sw2="" by="" default="">

    (7) create the Vlan 10 interface and IP address assignment< is="" there="" anything="" i="" need="" to="" add="" here="" other="" than="" this="" also="" the="" interface="" vlan="" will="" be="" added="" automatically="" on="" the="" other="" switch="" with="" the="" same="" ip="" address="">

    (8) create port channel 7, assign Gi0/3 and Gi0/2 and allow both the trunk

    (9) select vPC 101 to the channel port 7 on both sides

    Requirements on the two 3750 SW1

    ------------------------------------------------------------

    (1) create a vlan 10

    (2) assign the interface vlan Access 10

    (3) to activate the trunk Gi0/3 and Gi0/2

    (4) create port channel 7 and add the two links

    -NOW assume that everything is configured correctly, all links between the switches that none should be blocked by STP and VLAN 10 traffic should be secured by two Nexus switches?

    Hello

    Most of the steps you outlined is correct, although a few comments:

    (3) use the two switches management interface to configure the peer of vPC keepalive

    A point to note here is that if you have a supervisor engine double (SE) in your Nexus 7 K, then you need to install the management between the two interface IS active that is current and wait for SE, since the two N7K to the same local network. This way you will always have peer connectivity vPC regardless of who is active.

    (6) create VLAN 10 on Nexus SW1< by="" doing="" this="" shouldnt="" vlan="" 10="" be="" created="" on="" nexus="" sw2="" by="" default="">

    VLANs are not created on the second switch unless you use the switch profiles i.e., config-sync, and this feature is not supported on the Nexus 7 K.

    (7) create the Vlan 10 interface and IP address assignment< is="" there="" anything="" i="" need="" to="" add="" here="" other="" than="" this="" also="" the="" interface="" vlan="" will="" be="" added="" automatically="" on="" the="" other="" switch="" with="" the="" same="" ip="" address="">

    I guess the obvious thing is to allow a first Hop Router Protocol as HSRP. Note that when you use HSRP jointly with vPC, while the control plan continues to operate as active / standby, in a perspective of data plan, both routers are capable of transmitting data in VLAN that is, assets.

    With regard to the SVI created automatically, according to the note to point 6 above, the IVR will not be created as there is not of the Sync feature of config on the Nexus 7 K.

    -NOW assume that everything is configured correctly, all links between the switches that none should be blocked by STP and VLAN 10 traffic should be secured by two Nexus switches?

    Fix. You should probably also follow best practices spanning tree as Setup providing the bridge root is located on one of the Nexus 7 K, the root of the backup is the second Nexus 7 K etc.

    This and much more are covered in the Configuration and Design Guide: best practices for Virtual Port channels (vPC) on switches Cisco Nexus 7000 Series on CCO. It is a very good reference and well worth taking a look through.

    Concerning

Maybe you are looking for