Table of Contents
Aruba CX 6400v2 / 6200 Series Switches
Select a Product to View the List of Commands
AOS-CX 10.10 IP Services Guide 6300, 6400 Switch Series
AOS-CX 10.10 IP Services Guide 6300, 6400 Switch Series
hpe_a00094242en_us_vsx_configuration_best_practices_for_aruba_cx_6400_8320_8325_8360_8400_v1.3.pdf
Disables connection to Aruba Central server.
When the connection is disabled, the switch does not attempt to connect to the Aruba Central server or fetch central location from any of the three sources (CLI/Aruba Activate/DHCP). It also disconnects any active connection to the Aruba Central server.
Example
switch(config)# aruba-central switch(config-aruba-central)# disable switch(config-aruba-central)#
Laboratory
Configuring a Layer 2 static aggregation group
Configuring a Layer 3 static aggregation group
Note: ISL stands for Inter-Switch Link, and it is a Cisco proprietary protocol. It works by adding a 26-byte header and a 4-byte trailer to the original Ethernet frame, creating a new ISL frame. The header contains the VLAN ID, which identifies the VLAN to which the frame belongs; ISL adds more overhead to the Ethernet frame compared to IEEE 802.1Q due to its proprietary encapsulation, which can impact network performance, especially in high-throughput environments. In contrast, IEEE 802.1Q has a lower overhead, making it more efficient in terms of bandwidth utilization.
VLAN Aggregation Mode-------IEEE 802.1Q and ISL
IEEE 802.1Q
IEEE 802.1Q, commonly known as “Dot One Q”, is an IEEE-certified protocol for attaching VLAN identification information to data frames.
Here, please recall the standard format of Ethernet data frames.
The VLAN identification information attached by IEEE 802.1Q is located between the “Sending Source MAC Address” and the “Type Field” (Type Field) in the data frame. The specific content is 2 bytes of TPID (Tag Protocol Identifier) and 2 bytes of TCI (Tag Control Information), a total of 4 bytes.
Add 4 bytes of content to the data frame, so the CRC value will naturally change. At this time, the CRC on the data frame is the value obtained by recalculating the entire data frame including them after inserting TPID and TCI.
When the data frame leaves the aggregation link, the TPID and TCI will be removed, and a CRC recalculation will be performed at this time.
The position of the TPID field in the Ethernet packet is the same as the position of the protocol type field in the packet without a VLAN tag. The value of TPID is fixed to 0x8100, which indicates the 802.1Q type carried by the network frame, and the switch uses it to determine that the IEEE 802.1Q-based VLAN information is attached to the data frame. The actual VLAN ID is 12 bits in TCI. Since there are 12 bits in total, up to 4096 VLANs can be identified.
The VLAN information attached based on IEEE 802.1Q is like a tag attached when transferring items. Therefore, it is also called “Tagging VLAN” (Tagging VLAN).
ISL (Inter-Switch Link)
ISL is a protocol similar to IEEE 802.1Q supported by Cisco products for attaching VLAN information to the aggregation link.
After using ISL, 26 bytes of “ISL Header” will be appended to the header of each data frame, and 4 words obtained by calculating the entire data frame including the ISL header on the frame tail band Section CRC value. In other words, a total of 30 bytes of information have been added.
In an environment where ISL is used, when a data frame leaves the convergence link, simply remove the ISL header and the new CRC. Since the original data frame and its CRC are completely preserved, there is no need to recalculate the CRC.
ISL is like wrapping the entire original data frame with an ISL header and a new CRC, so it is also called an “Encapsulated VLAN” (Encapsulated VLAN).
It should be noted that neither the “Tagging VLAN” of IEEE802.1Q or the “Encapsulated VLAN” of ISL is a very strict term. In different books and reference materials, the above words may be mixed and used, so you need to pay special attention when studying.
And because ISL is a Cisco unique protocol, it can only be used for interconnection between Cisco network devices.
¿Maximum transmission unit - MTU -)?
Note: For Ethernet networks, the recommended MTU size is usually 9000 bytes. This is because Ethernet networks are designed to handle larger frames, making it easier to achieve higher performance with JUMBO Frames.
Note: What is MTU 9198 (Jumbo frames)?; this is the value of the global jumbos IP MTU (or L3 MTU) supported by the switch. The default value is set to 9198 bytes (a value that is 18 bytes less than the largest possible maximum frame size of 9216 bytes). This object can be used only in switches that support max-frame-size and ip- mtu configuration.
Note: What is the best MTU setting (WAN)?; it is generally recommended that the MTU for a WAN interface connected to a PPPoE DSL network be 1492. In fact, with auto MTU discovery, 1492 is discovered to be the maximum allowed MTU. However, having an MTU of 1452 is most optimal.
¿What is power over ethernet PoE?
VSX/VSF - CLI test configuration
2.aos-cx-simulator-vsx-part-2-lab-guide.pdf
Virtual MAC and System-MAC Guidance
One of the main VSX best practice is to set VSX system-mac and not leave it blank with default HW system-mac being used. By doing so, the VSX system-mac is independent from the physical hardware MAC address and in case of hardware replacement of the VSX primary, the new switch can be configured with the same configuration than the previous primary unit with no impact on the VSX secondary as the cluster ID remains unchanged. With such practice, VSX primary HW replacement is hitless for the VSX secondary. (Otherwise the VSX secondary would have to join a new cluster ID, ID from VSX primary, and would turn-off temporary its VSX LAG ports).
Please use locally administered unicast MAC Address when assigning system-mac or active-gateway virtual MAC address. There are 4 ranges reserved for private use for unicast (with second least significant bit of the first octet of the unicast address set to 1). x is any Hexadecimal value.
- x2-xx-xx-xx-xx-xx
- x6-xx-xx-xx-xx-xx
- xA-xx-xx-xx-xx-xx
- xE-xx-xx-xx-xx-xx
In this document, 02:01:00:00:01:00 is used or system-mac and 12:01:00:00:01:00 is used for active-gateway Virtual MAC.
The scope of this VMAC is purely link-local. Consequently, the same Virtual MAC address value can be used on any L3 VLAN interface (SVI).
If some servers or systems have dual-attachment to two different SVIs, and the system administrator would like to see distinct MAC addresses for the next-hops over these separate interfaces, then 16 VMACs are available. For dual-stack IPv4 and IPv6, 16 VMACs can be used for IPv4 and the same VMACs can be used for IPv6. It is however a best practice to use only 8 VMACs for IPv4 and 8 different VMACs for IPV6.
Note: any other allocation rules can be chosen according to administrative rules in place by the network operational team. Multicast orbroadcast MAC addresses must not be used for System-mac.
vsx-sync
Switch 8360-1
8360-1#conf 8360-1#hotname 8360-1 8360-1#int mgmt 8360-1#ip static 10.1.1.12/24 8360-1#no shut 8360-1#end 8360-1#wr mem 8360-1#sh ver //must have the same software version// 8360-1#int lag 256 8360-1#no shut 8360-1#description ISL Link 8360-1#no routing 8360-1#vlan trunk native 1 8360-1#vlan trunk allowed all 8360-1#lacp mode active 8360-1#exit //over QSFP28 DAC X 2 // 8360-1#interface 1/1/25 8360-1#no shut 8360-1#mtu 9198 8360-1#description ISL port 1 8360-1#lag 256 8360-1#interface 1/1/26 8360-1#no shut 8360-1#mtu 9198 8360-1#description ISL port 2 8360-1#lag 256 8360-1#exit 8360-1#wr mem 8360-1#sh interface lag 256 8360-1#sh lacp interfaces //over SFP+ DAC// 8360-1#config t 8360-1#vrf keepAlive 8360-1#exit 8360-1#interface 1/1/24 8360-1#no shut 8360-1#vrf attach keepAlive 8360-1#routing 8360-1#ip address 192.168.99.1/30 8360-1#end 8360-1#wr mem //test// 8360-1#ping 192.168.99.2 vrf keepAlive 8360-1#conf 8360-1#vsx 8360-1#system-mac 02:01:00:00:01:00 8360-1#inter-switch-link lag 256 8360-1#role primary 8360-1#vsx-sync vsx-global 8360-1#end 8360-1#wr mem 8360-1#sh vsx status 8360-1#sh run | begin vsx 8360-1#sh run vsx-sync 8360-1#sh vsx brief 8360-1#conf 8360-1#vsx 8360-1#keepalive peer 192.168.99.2 source 192.168.99.1 vrf keepAlive 8360-1#end 8360-1#wr mem 8360-1#sh vsx brief 8360-1#sh vsx status config-sync 8360-1#conf 8360-1#vsx 8360-1#vsx-sync aaa acl-log-timer bfd-global bgp copp-policy dhcp-relay dhcp-server dns icmp-tcp lldp loop- protect-global mac-lockout mclag-interfaces neighbor ospf qos-global route-map sflow-global snmp ssh stp-global time vsx-global 8360-1#end 8360-1#wr mem //Lag multi-chassis// 8360-1#config 8360-1#interface lag 1 multi-chassis 8360-1#description Access VSX LAG 8360-1#no shut 8360-1#vlan trunk allowed 10,20 8360-1#exit 8360-1#interface 1/1/1 8360-1#no shut 8360-1#mtu 9100 8360-1#description LAG1 Port 8360-1#lag 1 8360-1#end 8360-1#wr mem //VLAN 10 - VIP - 10.1.10.1// //VLAN 20 - VIP - 10.1.20.1// 8360-1#conf 8360-1#interface vlan 10 8360-1#vsx-sync active-gateways 8360-1#ip mtu 9100 8360-1#ip address 10.1.10.2/24 8360-1#active-gateway ip mac 12:01:00:00:01:00 8360-1#active-gateway ip 10.1.10.1 8360-1#no shut 8360-1#exit 8360-1#interface vlan 20 8360-1#vsx-sync active-gateways 8360-1#ip mtu 9100 8360-1#ip address 10.1.20.2/24 8360-1#active-gateway ip mac 12:01:00:00:01:00 8360-1#active-gateway ip 10.1.20.1 8360-1#end 8360-1#wr mem 8360-1# 8360-1#
Enabling or disabling IGMP snooping
switch(config)# vlan 2 switch(config-vlan)# ip igmp snooping enable switch(config-vlan)# ip igmp snooping version 2
Enabling or disabling IGMP
switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp enable
ip igmp querier
switch(config)# vlan 2 switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp enable switch(config-if-vlan)# ip igmp querier
IGMP snooping runs on a Layer 2 device as a multicast constraining mechanism to improve multicast forwarding efficiency. It creates Layer 2 multicast forwarding entries from IGMP packets that are exchanged between the hosts and the router.
When IGMP snooping is not enabled, the snooping switch floods multicast packets to all hosts in a VLAN. IGMP L2 snooping switch provides the benefit of conserving bandwidth on those segments of the network where no node has expressed interest in receiving packets addressed to the group address. When IGMP snooping is enabled, the L2 snooping switch forwards multicast packets of known multicast groups to only the receivers.
multicast_6200-6300-6400-8xxx.pdf
access-list ip mygroup 10 permit any any 239.1.1.1/24 access-list ip mygroup1 10 permit any any any vlan 1 ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 500 name ServerVM ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 501 name ServerStack ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 502 name ISP1 ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 503 name ISP2 ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 504 name ISP3 ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 505 name LAN-UTM ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 506 name WIFI-AP ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 507 name VIP ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 508 name ST ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 509 name Staff ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 510 name Teacher ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 511 name Students ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 512 name Accounting ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 513 name Printer ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 514 name AC ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 515 name iDRAC ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 516 name KVM ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 517 name Guest ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 518 name VoIP ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 519 name IoT ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 520 name Cameras ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 521 name VC ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 522 name VPN ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 523 ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 524 ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup vlan 525 ip igmp snooping enable ip igmp snooping version 2 ip igmp snooping apply access-list mygroup interface vlan 511 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 512 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 513 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 514 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 515 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 516 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 517 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 518 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 519 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 520 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 521 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 522 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 523 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 524 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1 interface vlan 525 ip igmp enable ip igmp version 2 ip igmp querier ip igmp querier interval 100 ip igmp query-max-response-time 30 ip igmp robustness 5 ip igmp last-member-query-interval 2 ip igmp query-max-response-time 50 ip igmp apply access-list mygroup1
DHCP relay
DHCP relay is enabled by default. If it was previously disabled, enable it.
Switch A:
switch#config switch(config)#dhcp-relay switch(config)#dhcp-smart-relay
switch(config)#interface vlan 508 switch(config-if-vlan)#description Vlan 508 ST switch(config-if-vlan)#vsx-sync active-gateways switch(config-if-vlan)#ip mtu 9100 switch(config-if-vlan)#ip address 10.28.72.2/23 switch(config-if-vlan)#active-gateway ip mac 12:01:00:00:01:00 switch(config-if-vlan)#active-gateway ip 10.28.72.1 switch(config-if-vlan)#ip helper-address 10.28.64.22
Switch B:
switch#config switch(config)#dhcp-relay switch(config)#dhcp-smart-relay
switch(config)#interface vlan 508 switch(config-if-vlan)#description Vlan 508 ST switch(config-if-vlan)#vsx-sync active-gateways switch(config-if-vlan)#ip mtu 9100 switch(config-if-vlan)#ip address 10.28.72.3/23 switch(config-if-vlan)#active-gateway ip mac 12:01:00:00:01:00 switch(config-if-vlan)#active-gateway ip 10.28.72.1 switch(config-if-vlan)#ip helper-address 10.28.64.22
Other scenarios:
switch#config switch(config)#dhcp-relay switch(config)#dhcp-smart-relay switch(config)#interface 1/1/1 switch(config-if)#ip address 192.168.2.11/24 switch(config-if)#ip helper-address 192.168.1.1 switch(config-if)#interface 1/1/2 switch(config-if)#ip address 192.168.2.12/24 switch(config-if)#ip helper-address1 92.168.1.1
switch(config-if-vlan)#show dhcp-relay switch(config-if-vlan)#show ip helper-address
DHCP-SERVER
enabled the DHCPv4 server on VRF primary.
Option1: switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# enable
Option2: switch(config)# dhcp-server vrf default switch(config-dhcp-server)# enable
Disables the DHCPv4 server on VRF primary.
Option1: switch(config)# dhcp-server vrf primary switch(config-dhcp-server)# disable
Option2: switch(config)# dhcp-server vrf default switch(config-dhcp-server)# disable
show dhcp-server
show dhcp-server [all-vrfs] show dhcp-server leases {all-vrfs | vrf <VRF-NAME>} show dhcp-server pool <POOL-NAME> [vrf <VRF-NAME>]
dhcp-server vrf default pool VLAN_523_10.28.196.0_23 range 10.28.196.21 10.28.197.254 prefix-len 23 default-router 10.28.196.1 dns-server 45.90.28.15 45.90.30.15 8.8.8.8 8.8.4.4 lease 00:00:30 exit pool VLAN_524_10.28.200.0_23 range 10.28.200.21 10.28.201.254 prefix-len 23 default-router 10.28.200.1 dns-server 45.90.28.15 45.90.30.15 8.8.8.8 8.8.4.4 lease 00:00:30 exit pool VLAN_525_10.28.204.0_23 range 10.28.204.21 10.28.205.254 prefix-len 23 default-router 10.28.204.1 dns-server 45.90.28.15 45.90.30.15 8.8.8.8 8.8.4.4 lease 00:00:30 exit enable
When the DHCP-SERVER is local to the 6400 chassis, no relay is required for interfaces that require the service:
interface vlan 523 description Vlan 523 vsx-sync active-gateways ip mtu 9100 ip address 10.28.196.2/23 active-gateway ip mac 12:01:00:00:01:00 active-gateway ip 10.28.196.1 interface vlan 524 description Vlan 524 vsx-sync active-gateways ip mtu 9100 ip address 10.28.200.2/23 active-gateway ip mac 12:01:00:00:01:00 active-gateway ip 10.28.200.1 interface vlan 525 description Vlan 525 vsx-sync active-gateways ip mtu 9100 ip address 10.28.204.2/23 active-gateway ip mac 12:01:00:00:01:00 active-gateway ip 10.28.204.1
Switch 8360-2
8360-2#conf 8360-2#hotname 8360-2 8360-2#int mgmt 8360-2#ip static 10.1.1.11/24 8360-2#no shut 8360-2#end 8360-2#wr mem 8360-2#int lag 256 8360-2#no shut 8360-2#description ISL Link 8360-2#no routing 8360-2#vlan trunk native 1 8360-2#vlan trunk allowed all 8360-2#lacp mode active 8360-2#exit //over QSFP28 DAC X 2 // 8360-2#interface 1/1/25 8360-2#no shut 8360-2#mtu 9198 8360-2#description ISL port 1 8360-2#lag 256 8360-2#interface 1/1/26 8360-2#no shut 8360-2#mtu 9198 8360-2#description ISL port 2 8360-2#lag 256 8360-2#exit 8360-2#wr mem 8360-2#sh interface lag 256 8360-2#sh lacp interfaces //over SFP+ DAC// 8360-2#config t 8360-2#vrf keepAlive 8360-2#exit 8360-2#interface 1/1/24 8360-2#no shut 8360-2#vrf attach keepAlive 8360-2#routing 8360-2#ip address 192.168.99.2/30 8360-2#end 8360-2#wr mem //test// 8360-2#ping 192.168.99.1 vrf keepAlive 8360-2#config 8360-2#vsx 8360-2#inter-switch-link lag 256 8360-2#role secondary 8360-2#end 8360-2#wr mem 8360-2#sh vsx status 8360-2#sh run | begin vsx 8360-2#sh vsx brief 8360-2#conf 8360-2#vsx 8360-2#keepalive peer 192.168.99.1 source 192.168.99.2 vrf keepAlive 8360-2#end 8360-2#wr mem 8360-2#sh vsx brief 8360-2#sh vsx status keepAlive 8360-2#sh run | beg vsx 8360-2#vlan 10,20 8360-2#vsx-sync 8360-2#exit 8360-2#wr mem 8360-2#sh vlan //Lag multi-chassis// 8360-2#conf 8360-2#interface lag 1 multi-chassis 8360-2#no shut 8360-2#exit 8360-2#interface 1/1/1 8360-2#no shut 8360-2#mtu 9100 8360-2#description LAG1 Port 8360-2#lag 1 8360-2#end 8360-2#wr mem 8360-2#sh run int lag 1 //VLAN 10 - VIP - 10.1.10.1// //VLAN 20 - VIP - 10.1.20.1// 8360-2#conf 8360-2#interface vlan 10 8360-2#ip mtu 9100 8360-2#ip address 10.1.10.3/24 8360-2#no shut 8360-2#exit 8360-2#interface vlan 20 8360-2#ip mtu 9100 8360-2#ip address 10.1.20.3/24 8360-2#no shut 8360-2#exit 8360-2#end 8360-2#wr mem 8360-2#sh run int vlan 10 8360-2#sh vsx status 8360-2#sh vsx brief
Enabling or disabling IGMP snooping
switch(config)# vlan 2 switch(config-vlan)# ip igmp snooping enable switch(config-vlan)# ip igmp snooping version 2
Enabling or disabling IGMP
switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp enable
ip igmp querier
switch(config)# vlan 2 switch(config)# interface vlan 2 switch(config-if-vlan)# ip igmp enable switch(config-if-vlan)# ip igmp querier
VSF
Switch 6200-1
6200-1#conf 6200-1#hotname 6200-1 6200-1#int mgmt 6200-1#ip static 10.1.1.21/24 6200-1#no shut 6200-1#end 6200-1#wr mem 6200-1#conf 6200-1#vsf member 1 6200-1#link 1 1/1/27 6200-1#link 2 1/1/28 6200-1#exit 6200-1#vsf secondary-member 2 this will save the configuration and reboot the specified switch. Do you want to continue (y/n)? y 6200-1#end 6200-1#wr mem 6200-1#conf 6200-1#vlan 10,20 6200-1#no shut 6200-1#exit 6200-1#interface lag 1 6200-1#loop-protect 6200-1#description IDF 1 6200-1#no shut 6200-1#vlan trunk allowed 10,20 6200-1#lacp 6200-1#lacp mode active 6200-1#exit 6200-1#interface 1/1/25,2/1/25 6200-1#no shut 6200-1#mtu 9100 6200-1#lag 1 6200-1#exit 6200-1#int 1/1/1 6200-1#no shut 6200-1#vlan access 10 6200-1#end 6200-1#wr mem //SFP+ DAC (ARUBAOS)// 6200-1#sh lacp interfaces multi-chassis 6200-1#
6200-1# show lacp interfaces State abbreviations : A - Active P - Passive F - Aggregable I - Individual S - Short-timeout L - Long-timeout N - InSync O - OutofSync C - Collecting D - Distributing X - State m/c expired E - Default neighbor state
Actor details of all interfaces: ---------------------------------------------------------------------------------- Intf Aggr Port Port State System-ID System Aggr Forwarding Name Id Pri Pri Key State ---------------------------------------------------------------------------------- 1/1/52 lag1 53 1 ALFNCD 4c:d5:87:19:1f:00 65534 1 up 2/1/28 lag1 93 1 ALFNCD 4c:d5:87:19:1f:00 65534 1 up
Partner details of all interfaces: ---------------------------------------------------------------------------------- Intf Aggr Port Port State System-ID System Aggr Name Id Pri Pri Key ---------------------------------------------------------------------------------- 1/1/52 lag1 129 1 ALFNCD 02:01:00:00:01:00 65534 1 2/1/28 lag1 1129 1 ALFNCD 02:01:00:00:01:00 65534 1
Switch 6200-2
6200-2#conf 6200-2#hotname 6200-2 6200-2#int mgmt 6200-2#ip static 10.1.1.22/24 6200-2#no shut 6200-2#end 6200-2#wr mem 6200-2#conf 6200-2#vsf member 1 6200-2#link 1 1/1/27 6200-2#link 2 1/1/28 6200-2#end 6200-2#conf 6200-2#vsf renumber-to 2 this will save the VSF configuration and reboot the switch. Do you want to continue (y/n)? y 6200-2#end 6200-2#wr mem
Verification setting
6200-1#sh vsf 6200-1#sh vsf link 6200-1#sh vsf topology 6200-1# 6200-1#
6200-1# show vsf Force Autojoin : Disabled Autojoin Eligibility Status: Not Eligible MAC Address : 4c:d5:87:19:1f:00 Secondary : 2 Topology : Ring Status : No Split Split Detection Method : None Mbr Mac Address type Status ID --- ------------------- -------------- --------------- 1 4c:d5:87:19:1f:00 JL659A Conductor 2 9c:37:08:06:c1:00 JL658A Standby
6200-1# show vsf link VSF Member 1 Link Peer Peer Link State Member Link Interfaces ---- ---------- ------- ------ --------------------------- 1 up 2 1 1/1/49 2 up 2 2 1/1/50 VSF Member 2 Link Peer Peer Link State Member Link Interfaces ---- ---------- ------- ------ --------------------------- 1 up 1 1 2/1/25 2 up 1 2 2/1/26
6200-1# sh vsf topology Conductor Standby +-------+ +-------+ | 1 |1==1| 2 | +-------+ +-------+ 2 2 +============+
6200-1# show vlan 1 ------------------------------------------------------------------------------------------------------------------ VLAN Name Status Reason Type Interfaces ------------------------------------------------------------------------------------------------------------------ 1 DEFAULT_VLAN_1 up ok default 1/1/1-1/1/48,1/1/51-1/1/52, 2/1/1-2/1/24,2/1/27-2/1/28
VSF best practices for Aruba CX 6300 switch series
VSF best practices for Aruba CX 6300 switch series.
Remote AAA (TACACS+, RADIUS) commands
Switch SSH and user password authentication
This option is a subset of full certificate authentication of the client public-key authentication shown in Client public-key authentication (login/operator level) with user password authentication (enable/manager level). It occurs if the switch has SSH enabled but does not have login access (login public-key) configured to authenticate the client’s key. As in Client public-key authentication (login/operator level) with user password authentication (enable/manager level), the switch authenticates itself to SSH clients. Users on SSH browser then authenticate themselves to the switch (login and/or enable levels) by providing passwords stored locally on the switch or on a TACACS+ or RADIUS server. However, the client does not use a certificate to authenticate itself to the switch.
How do I disable VSF on 2930F switch?
vsf disable vsf member <MEMBER-ID> remove
Switch 6300 example code
Current configuration: ! !Version ArubaOS-CX FL.10.10.1070 !export-password: default banner motd ! This computing system is a St. Francis School owned asset and provided for the exclusive use of authorized personnel for technical purposes. All information and data created, accessed, processed, or stored using this system (including personal information) are subject to monitoring, auditing, or review to the extent permitted by applicable law. Unauthorized use or abuse of this system may lead to corrective action including termination of employment, civil and/or criminal penalties. ! banner exec ! This computing system is a St. Francis School owned asset and provided for the exclusive use of authorized personnel for technical purposes. All information and data created, accessed, processed, or stored using this system (including personal information) are subject to monitoring, auditing, or review to the extent permitted by applicable law. Unauthorized use or abuse of this system may lead to corrective action including termination of employment, civil and/or criminal penalties. ! user admin group administrators password ciphertext AQBapbpjjaGqvjsW372p3ay3Qy23SBZqdgORp3dt7dBgFq/1YgAAAMc5kaYk7mkg7Vw8JspGEjAgaZvfqEr6pPrZMnc2dep+NGGyPq++9HpItww7f7x1I3uokFIt9r3PtFwtCF3XBbV6kb06gEyo3VKlGS7NwJ7eHEOFBNaq3wGonPHYpdwKwXi6 user manager group administrators password ciphertext AQBapYDzadb2pSm6IB5urLSMywx+5PxeWV7VEeQ6EnfoGzqGYgAAAOd/Z2sSXnAf4Jy2+Zt3+rxRY3FlmEekAQnJhGpPdr3gTXSCgJTlv0ukI/P7YjjGjnPCLkKyzveFWMVcju0KitYBN/7AcfGkg+FZE9sWVrUiedsi2w0p3x/W88gwl9TxP/dx loop-protect re-enable-timer 30 loop-protect trap loop-detected ntp server pool.ntp.org minpoll 4 maxpoll 4 iburst ntp server time.google.com ntp enable ! ! ! ! ! ! ssh server vrf default ssh server vrf mgmt vsf secondary-member 2 vsf member 1 type jl658a link 1 1/1/25 link 2 1/1/26 vsf member 2 type jl658a link 1 2/1/25 link 2 2/1/26 vlan 1 ip igmp snooping enable vlan 500 name ServerVM ip igmp snooping enable vlan 501 name ServerStack ip igmp snooping enable vlan 502 name ISP1 ip igmp snooping enable vlan 503 name ISP2 ip igmp snooping enable vlan 504 name ISP3 ip igmp snooping enable vlan 505 name LAN-UTM ip igmp snooping enable vlan 506 name WIFI-AP ip igmp snooping enable vlan 507 name VIP ip igmp snooping enable vlan 508 name ST ip igmp snooping enable vlan 509 name Staff ip igmp snooping enable vlan 510 name Teacher ip igmp snooping enable vlan 511 name Students ip igmp snooping enable vlan 512 name Accounting ip igmp snooping enable vlan 513 name Printer ip igmp snooping enable vlan 514 name AC ip igmp snooping enable vlan 515 name iDRAC ip igmp snooping enable vlan 516 name KVM ip igmp snooping enable vlan 517 name Guest ip igmp snooping enable vlan 518 name VoIP ip igmp snooping enable vlan 519 name IoT ip igmp snooping enable vlan 520 name Cameras ip igmp snooping enable vlan 521 name VC ip igmp snooping enable vlan 522 name VPN ip igmp snooping enable vlan 523 ip igmp snooping enable vlan 524 ip igmp snooping enable vlan 525 ip igmp snooping enable spanning-tree mode rpvst no spanning-tree spanning-tree priority 5 spanning-tree vlan 1,500-525 spanning-tree vlan 1 priority 5 spanning-tree vlan 500 priority 5 spanning-tree vlan 501 priority 5 spanning-tree vlan 502 priority 5 spanning-tree vlan 503 priority 5 spanning-tree vlan 504 priority 5 spanning-tree vlan 505 priority 5 spanning-tree vlan 506 priority 5 spanning-tree vlan 507 priority 5 spanning-tree vlan 508 priority 5 spanning-tree vlan 509 priority 5 spanning-tree vlan 510 priority 5 spanning-tree vlan 511 priority 5 spanning-tree vlan 512 priority 5 spanning-tree vlan 513 priority 5 spanning-tree vlan 514 priority 5 spanning-tree vlan 515 priority 5 spanning-tree vlan 516 priority 5 spanning-tree vlan 517 priority 5 spanning-tree vlan 518 priority 5 spanning-tree vlan 519 priority 5 spanning-tree vlan 520 priority 5 spanning-tree vlan 521 priority 5 spanning-tree vlan 522 priority 5 spanning-tree vlan 523 priority 5 spanning-tree vlan 524 priority 5 spanning-tree vlan 525 priority 5 interface mgmt no shutdown ip static 192.168.150.23/23 interface lag 1 description Access LAG-1 to MDF-1 - 6400 IP: 172.16.28.1 no shutdown no routing vlan trunk native 1 vlan trunk allowed all lacp mode active loop-protect interface 1/1/1 no shutdown no routing vlan access 1 interface 1/1/2 no shutdown no routing vlan access 1 interface 1/1/3 no shutdown no routing vlan access 1 interface 1/1/4 no shutdown no routing vlan access 1 interface 1/1/5 no shutdown no routing vlan access 1 interface 1/1/6 no shutdown no routing vlan access 1 interface 1/1/7 no shutdown no routing vlan access 1 interface 1/1/8 no shutdown no routing vlan access 1 interface 1/1/9 no shutdown no routing vlan access 1 interface 1/1/10 no shutdown no routing vlan access 1 interface 1/1/11 no shutdown no routing vlan access 1 interface 1/1/12 no shutdown no routing vlan access 1 interface 1/1/13 no shutdown no routing vlan access 1 interface 1/1/14 no shutdown no routing vlan access 1 interface 1/1/15 no shutdown no routing vlan access 1 interface 1/1/16 no shutdown no routing vlan access 1 interface 1/1/17 no shutdown no routing vlan access 1 interface 1/1/18 no shutdown no routing vlan access 1 interface 1/1/19 no shutdown no routing vlan access 1 interface 1/1/20 no shutdown no routing vlan access 1 interface 1/1/21 no shutdown no routing vlan access 1 interface 1/1/22 no shutdown no routing vlan access 1 interface 1/1/23 no shutdown no routing vlan access 1 interface 1/1/24 no shutdown no routing vlan access 1 interface 1/1/25 no shutdown interface 1/1/26 no shutdown interface 1/1/27 no shutdown no routing vlan access 1 interface 1/1/28 description Access LAG-1 to MDF-1 - 6400 IP: 172.16.28.1 no shutdown mtu 9100 lag 1 interface 2/1/1 no shutdown no routing vlan access 1 interface 2/1/2 no shutdown no routing vlan access 1 interface 2/1/3 no shutdown no routing vlan access 1 interface 2/1/4 no shutdown no routing vlan access 1 interface 2/1/5 no shutdown no routing vlan access 1 interface 2/1/6 no shutdown no routing vlan access 1 interface 2/1/7 no shutdown no routing vlan access 1 interface 2/1/8 no shutdown no routing vlan access 1 interface 2/1/9 no shutdown no routing vlan access 1 interface 2/1/10 no shutdown no routing vlan access 1 interface 2/1/11 no shutdown no routing vlan access 1 interface 2/1/12 no shutdown no routing vlan access 1 interface 2/1/13 no shutdown no routing vlan access 1 interface 2/1/14 no shutdown no routing vlan access 1 interface 2/1/15 no shutdown no routing vlan access 1 interface 2/1/16 no shutdown no routing vlan access 1 interface 2/1/17 no shutdown no routing vlan access 1 interface 2/1/18 no shutdown no routing vlan access 1 interface 2/1/19 no shutdown no routing vlan access 1 interface 2/1/20 no shutdown no routing vlan access 1 interface 2/1/21 no shutdown no routing vlan access 1 interface 2/1/22 no shutdown no routing vlan access 1 interface 2/1/23 no shutdown no routing vlan access 1 interface 2/1/24 no shutdown no routing vlan access 1 interface 2/1/25 no shutdown interface 2/1/26 no shutdown interface 2/1/27 no shutdown no routing vlan access 1 interface 2/1/28 description Access LAG-1 to MDF-1 - 6400 IP: 172.16.28.1 no shutdown mtu 9100 lag 1 interface vlan 1 ip address 172.16.28.21/23 no ip dhcp ip route 0.0.0.0/0 172.16.28.1 ! ! ! ! ! https-server vrf default https-server vrf mgmt
aos-cx_simulator_lab_-_ipv4_dhcp_lab_guide.pdf
United States of America rangos de direcciones IP
QinQ vs VLAN vs VXLAN: A Comprehensive Introduction of Switch Functions
Redundancy with opnsense UTM
show inventory
#show inventory
Description: This command displays the hardware inventory of Mobility Conductor or the managed device. Example: Execute this command to display the hardware component inventory of Mobility Conductor.
(host) [mynode] #show inventory
Mgmt Port HW MAC Addr : 00:0C:29:71:10:0B HW MAC Addr : 00:0C:29:71:10:15 System Serial# : DC0604083 Activate license : Not applicable Supported device type : MM Active device type : MM
(host-md) #show inventory
Supervisor Card slot : 0 System Serial# : BA0009743 (Date:12/26/14) CPU Card Serial# : AE51038711 (Date:12/25/14) CPU Card Assembly# : 2010216H CPU Card Revision : (Rev:01.00) Interface Card Serial# : AE51031572 (Date:12/25/14) Interface Card Assembly# : 2010085E Interface Card Revision : (Rev:04.00) SC Model# : Aruba7210 HW MAC Addr : 00:1a:1e:01:b2:28 to 00:1a:1e:01:b2:2f CPLD Version : (Rev: 1.4) Power Supply 0 : Present : No Power Supply 1 : Present : Yes : 12V OK : Yes : Fan OK : Yes : Aruba Model No : 2510057 : Vendor & Model No : QCS DCJ3501-01P : Serial No : QCS142320YU : MFG Date : 6/5/14 : Output 1 Config : 12V 350W : Input Min : 90V AC : Input Max : 264V AC Main Board Temperatures : : U24 - Local Temp 30 C (shadow of XLP heatsink) : Q1 - Remote 1 Temp 34 C (shadow of VRM, VDD_CPU) : Q2 - Remote 2 Temp 33 C (shadow of VRM, VDD_SOC) : U44 - Local Temp 25 C (shadow of DPI connector) : U29 - Remote 1 Temp 31 C (XLP die temperature) : Q36 - Remote 2 Temp 28 C (shadow of 98X1422) : J2 - DDR A Temp 24 C (DDR3 A temp) : J4 - DDR B Temp 26 C (DDR3 B temp) : J1 - DDR C Temp 25 C (DDR3 C temp) : J3 - DDR D Temp 27 C (DDR3 D temp) : Port 0 Temp 148 C (1G PHY temp) : Port 1 Temp 148 C (1G PHY temp) Interface Board Temperatures : : U21 - Local Temp 27 C (shadow of port 1 RJ45) : Q4 - Remote 1 Temp 28 C (shadow of 88E1543) : Q3 - Remote 2 Temp 34 C (shadow of 88X2140) Fan 0 : 8916 rpm (5.495 V),Speed Low Fan 1 : 9029 rpm (5.495 V),Speed Low Fan 2 : 9029 rpm (5.450 V),Speed Low Fan 3 : 8998 rpm (5.630 V),Speed Low Main Board Voltages : ispPAC_POWR1014A_A : : 1V2 1.20V sense 1.232 V : VDD SOC 0.937V sense 0.918 V : VCC IOBD 1V5 1.50V sense 1.528 V : DDR3BD_VTT 0.75V sense 0.750 V : VCC 1A 1.00V sense 1.024 V : IV8_DIGITAL 1.80V sense 1.848 V : 3V3_MAIN 3.30V sense 3.366 V : VCC1 1.00V sense 1.018 V : VCC25 2.50V sense 2.556 V : 3V3 SB 3.30V sense 3.360 V ispPAC_POWR1014A_B : : VDD 0.806V sense 0.786 V : VCC IOAC 1V5 1.50V sense 1.528 V : DDR3AC_VTT 0.75V sense 0.752 V : VDD_SRAM 1.00V sense 1.042 V : VCC1B 1.00V sense 1.030 V : 1V8_ANALOG 1.80V sense 1.854 V : 1V8 1.80V sense 1.866 V : VDDIO12_XAUI 1.20V sense 1.224 V : 5V 5.00V sense 5.016 V Interface Board Voltages : ispPAC_POWR6AT6 : : VCC33 3.30V sense 3.366 V : VCC 18 1.80V sense 1.856 V : VCC1 1.00V sense 1.026 V : VCC12 1.20V sense 1.224 V : VCC12-DVDD 1.20V sense 1.212 V : VCC9 0.90V sense 0.928 V
show system
6300# show system Hostname : 6300 System Description : FL.10.10.1070 System Contact : System Location : Vendor : Aruba Product Name : JL659A 6300M 48SR5 CL6 PoE 4SFP56 Swch Chassis Serial Nbr : SG30KMY0ZP Base MAC Address : 4cd587-191f00 ArubaOS-CX Version : FL.10.10.1070 Time Zone : UTC Up Time : 5 days, 7 hours, 59 minutes CPU Util (%) : 22 Memory Usage (%) : 25 6300#
6300 Switch LAG errror: State information : Disabled by aggregation
State information : Disabled by LACP or LAG
6400-SWITCH# show lag 1 System-ID : ec:67:94:f5:69:00 System-priority : 65534 Aggregate lag1 is down Admin state is up State information : Disabled by LACP or LAG Description : Access VSX LAG-1 to IDF-1 - 6300-24-PORT-SFP+ - IP: 172.16.28.21 Type : multi-chassis Lacp Fallback : Disabled MAC Address : 02:01:00:00:01:00 Aggregated-interfaces : 1/3/1 Aggregation-key : 1 Aggregate mode : active Hash : l3-src-dst LACP rate : slow Speed : 0 Mb/s Mode : trunk
Aggregate lag1 is down Admin state is up State information : Disabled by aggregation Description : MAC Address : bc:d7:a5:6a:e8:00 Aggregated-interfaces : 1/1/1 1/1/2 Aggregation-key : 1 Aggregate mode : active Speed : 0 Mb/s qos trust dscp VLAN Mode: native-untagged Native VLAN: 1 Allowed VLAN List: all L3 Counters: Rx Disabled, Tx Disabled
Note: Usually when we see lacp_block on an interface in a LAG group, it is because the interface isn't receiving LACP BPDUs from the link partner. The reason could be the peer switch is not configured with LACP mode or BPDUs are getting dropped due to link specific issues. If it is the case where the link partner isn't sending LACP BPDUs, a static LAG group assignment of ports should work and probably worth trying.
Some commands for support:
- show interface brief
- show lag brief
- show lacp interfaces
- show lacp aggregates
- show lacp interface 1/1/3
- show lacp interface 1/1/4
- show lldp neighbor-info
6300(config-lag-if)# show lldp neighbor-info LLDP Neighbor Information ========================= Total Neighbor Entries : 2 Total Neighbor Entries Deleted : 3 Total Neighbor Entries Dropped : 0 Total Neighbor Entries Aged-Out : 3 LOCAL-PORT CHASSIS-ID PORT-ID PORT-DESC TTL SYS-NAME ----------------------------------------------------------------------------------------------------------- 1/1/28 ec:67:94:f5:69:00 1/3/1 Access VSX LAG-1 to IDF-... 120 CS-2P-MDFHA-A 2/1/28 ec:67:94:f5:89:00 1/3/1 Access VSX LAG-1 to IDF-... 120 CS-2P-MDFHA-B
BGP
To prevent the above from happening, IANA is in control of the AS numbers (similar to public IP addresses). If you want an AS number for the Internet then you’ll have to request one. They started with 16-bit AS numbers (also called 2-octet AS numbers) that were assigned like this:
- 0: reserved.
- 1-64.495: public AS numbers.
- 64.496 – 64.511 – reserved to use in documentation.
- 64.512 – 65.534 – private AS numbers.
- 65.535 – reserved.
Switch A - 6400:
interface loopback 0 ip address 172.24.0.1/32 interface loopback 1 ip address 172.24.0.2/32
router ospf 1 router-id 172.24.0.1 redistribute bgp redistribute connected redistribute static area 0.0.0.0
router bgp 65010 bgp router-id 172.24.0.1 neighbor 172.18.0.4 remote-as 65020 address-family ipv4 unicast neighbor 172.18.0.4 default-originate neighbor 172.18.0.4 activate network 172.18.0.0/27 exit-address-family
interface vlan 1 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 500 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 501 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 505 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 506 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 507 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 508 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 509 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 510 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 511 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 512 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 513 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 514 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 515 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 516 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 517 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 518 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 519 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 520 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 521 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 522 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 523 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 524 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 525 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 526 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 527 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 530 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point
SwitchA(config)# show ip ospf neighbors
SwitchB# show lldp neighbor
SwitchA# show ip ospf neighbors VRF : default Process : 1 =================================================== Total Number of Neighbors : 26 Neighbor ID Priority State Nbr Address Interface ------------------------------------------------------------------------- 192.168.2.3 n/a FULL 172.16.28.3 vlan1 192.168.2.3 n/a FULL 10.28.64.3 vlan500 192.168.2.3 n/a FULL 192.168.2.3 vlan501 192.168.2.3 n/a FULL 172.16.32.3 vlan505 192.168.2.3 n/a FULL 172.16.36.3 vlan506
Switch B - 6400:
interface loopback 0 ip address 172.24.0.4/32 interface loopback 1 ip address 172.24.0.5/32
router ospf 1
router-id 172.24.0.4 redistribute bgp redistribute connected redistribute static area 0.0.0.0
router bgp 65020
bgp router-id 172.24.0.4 neighbor 172.18.0.1 remote-as 65010 address-family ipv4 unicast neighbor 172.18.0.1 default-originate neighbor 172.18.0.1 activate network 172.18.0.0/27 exit-address-family
interface vlan 1 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 700 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 701 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 705 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 706 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 707 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 708 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 709 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 710 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 711 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 712 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 713 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 714 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 715 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 716 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 717 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 718 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 719 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 720 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 721 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 722 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 723 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 724 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 725 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 726 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 727 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point interface vlan 730 ip ospf 1 area 0.0.0.0 ip ospf network point-to-point
OSPF Troubleshooting
FEC on an SFP port refers to Forward Error Correction (FEC), which is a technique used in fiber optic and Ethernet networks to enhance data transmission reliability by detecting and correcting errors without the need for retransmission.
FEC (Forward Error Correction): FEC is a mechanism that adds redundant information to the transmitted data. This redundancy allows the receiving end to detect and correct errors caused by signal degradation or noise during transmission.
Purpose: FEC is essential for high-speed data links (e.g., 10G, 25G, 40G, 100G Ethernet) to improve link quality and performance.
Types: Different FEC modes can be used depending on the standard and speed of the connection (e.g., Reed-Solomon FEC).
- auto Enable FEC Auto-Neg
- cl108 Enable clause108 with 25G
- cl74 Enable clause74 with 25G
- off Turn FEC off, FEC is mandatory for speeds 50G or higher
Benefits of FEC on SFP Ports:
- Error Correction: FEC can correct errors due to signal attenuation or interference.
- Better Link Performance: Allows for longer cable runs or higher speeds by improving signal integrity.
- No Retransmissions: Unlike other error correction methods, FEC works proactively without needing retransmissions, which is important for low-latency environments.
Aruba Switch 6400:
CS-2P-MDFHA-A#** show ver** ----------------------------------------------------------------------------- ArubaOS-CX (c) Copyright 2017-2024 Hewlett Packard Enterprise Development LP ----------------------------------------------------------------------------- Version : FL.10.13.1010 Build Date : 2024-04-09 00:34:12 UTC Build ID : ArubaOS-CX:FL.10.13.1010:ef2109377880:202404090010 Build SHA : ef21093778805e954ec130b0939d34927bb7ba19 Hot Patches : Active Image : primary Service OS Version : FL.01.14.0002 BIOS Version : FL.01.0002
CS-2P-MDFHA-A(config)# interface 1/3/36
error-control Configure the error control (FEC) mode
CS-2P-MDFHA-A(config-if)# error-control auto Use the transceiver default base-r-fec Use IEEE BASE-R (Firecode) FEC none Do not use any FEC rs-fec Use IEEE Reed-Solomon FEC