Hello, is it possible to create LACP port-channel against Cisco nexus extenders ?
I need to create layer 2 port-channels as trunks and carry different VLANs.
This is my design:
2 uplinks, each to different extender -this will be in WAN vlan
2 more uplinks, each to different extender - this will be LAN - need to carry more vlans
When I created aggregate interface, nexus shutdown member ports with warning that no LACP BPDUs have been received...
Any ideas?
Thanks in advance.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
What code are you running? I believe vPC support on extenders have been available in the latest NX-OS for a host and same extender, but I think you need to look at the NX-OS extender type and switch-type that's uses for across extenders. This would be a enhanced vPC configuration for server and data centers.You should really ask this in the cisco forum since the support and requires are a cisco requirement.
But I would check the switch and fex type and NXOS, but etherbundle across extenders are doable.
btw; i believe the 35xx don't support this, and you will need to be on hardware of a 7k or 5k series
PCNSE
NSE
StrongSwan
cisco Nexus 5596
version 6.0(2)N1(2a)
nexus32-RD5# show lacp counters interface port-channel 6 LACPDUs Marker Marker Response LACPDUs Port Sent Recv Sent Recv Sent Recv Pkts Err --------------------------------------------------------------------- port-channel6 Ethernet102/1/35 209 0 0 0 0 0 0 Ethernet103/1/35 208 0 0 0 0 0 0
well I think that the problem is with fortigate, since I am not receiving any LACP PDUs
I don't know how to configure port channel on fortigate properly...
nexus32-RD5# show lacp counters interface port-channel 6 LACPDUs Marker Marker Response LACPDUs Port Sent Recv Sent Recv Sent Recv Pkts Err --------------------------------------------------------------------- port-channel6 Ethernet102/1/35 209 0 0 0 0 0 0 Ethernet103/1/35 208 0 0 0 0 0 0 well I think that the problem is with fortigate, since I am not receiving any LACP PDUs I don't know how to configure port channel on fortigate properly...
Okay so what do you have configured at the host level? And do you have any lacp pcap captures?
Also did you try the " no lacp suspend-individual " command on the member ports? You can also monitor the lacp counters for control packets between host and FEX and/or debug lacp error
(e.g)
"show lacp counters interface port-channel xxxx"
NOTE: It might be in that NX-OS software code and switch, but it's doesn't exist in a 3548 so I can't confirm for your model.
PCNSE
NSE
StrongSwan
nexus32-RD5# show lacp counters interface port-channel 6 LACPDUs Marker Marker Response LACPDUs Port Sent Recv Sent Recv Sent Recv Pkts Err --------------------------------------------------------------------- port-channel6 Ethernet102/1/35 209 0 0 0 0 0 0 Ethernet103/1/35 208 0 0 0 0 0 0 well I think that the problem is with fortigate, since I am not receiving any LACP PDUs I don't know how to configure port channel on fortigate properly...
What FGT hardware are you running on?
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
oh, I didn't mention it. Sorry, my bad.
It's Fortigate 200D
Firmware Version v5.2.4,build688 (GA)
solved
reboot of the FGT was the solution
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1720 | |
1095 | |
752 | |
447 | |
234 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.