Documentos de Académico
Documentos de Profesional
Documentos de Cultura
BRKCRS-3146
Dmitry Goloubev
Technical Leader, Tech services
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Goals
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
VPC at the network level
enables to build PortChannel to 2 separate switches
virtualizing network building block
from this to this or, logically
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
VPC components at a glance
2 active control planes
2 configs
2 points of management
VPC domain
Active Active
Control Plane Peer-Link Control Plane
Primary-Secondary notion for some Active Active
aspects of operation Data Plane
Peer
Data Plane
Keepalive link
Peer-Link
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Agenda
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Stages of VPC initialization
1. VPC manager starts
2. Peer-keepalive comes up (receives keepalives from the peer)
3. Peer-link comes up (data is not passing through yet, just CFS)
4. Primary/Secondary Role resolved
5. Global Consistency check
6. Peer-link is up for data
7. SVIs brought up (VPC + 10 sec)
8. VPCs brought up (SVI + 30 sec)
Consistency checking prevents the prevents network-wide issues (type1) and warns
about possible forwarding oddities (type2)
Inconsistency Type Action Example of inconsistency
Type 1 / Global Vlans suspended on peer-link, VPCs up with Rapid-PVST STP on one peer, MST
respective vlans suspended STP on another
Type 1 / Interface Vlans suspended on respective VPC MTU mismatch, STP guard config
mismatch
Type 2 Syslog message SVI is up on one peer, down on another
Nexus#
Nexus# shsh vpc
vpc consistency-parameters
consistency-parameters global
interface port-channel 1
Name
Name Type
Type Local
Local Value
Value Peer
Peer Value
Value
-------------
------------- ----
---- ----------------------
---------------------- -----------------------
-----------------------
STP
lag-id
Mode 11 Rapid-PVST
[(7f9b, Rapid-PVST
[(7f9b,
STP
... Disabled 1 None None
STP
modeMST Region Name 11 ""
active ""
active
STP
STP MST
PortRegion
Type Revision 11 0Default 0Default
STP
STP MST
PortRegion
Guard Instance to 11 None None
STP
VLANMST
Mapping
Simulate PVST 1 Default Default
STP
Native
Loopguard
Vlan 11 Disabled
1 Disabled
1
STP
PortBridge
Mode Assurance 11 Enabled
trunk Enabled
trunk
STP
MTU Port Type, Edge 11 Normal,
1500 Disabled, Normal,
1500 Disabled,
BPDUFilter,
Duplex Edge BPDUGuard 1 Disabled
full Disabled
full
STP
Speed
MST Simulate PVST 11 Enabled
10 Gb/s Enabled
10 Gb/s
Interface-vlan
Allowed VLANs admin up 2- 101
101 101
101
Interface-vlan routing 2 1,101 1,101
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Graceful Consistency check
VPC Type 1 inconsistency suspends all vlans on corresponding VPC on both
peers
This triggers forwarding interruption during config changes (for example while
changing MTU on VPC)
Enabled by default
vPC status
----------------------------------------------------------------------------
id Port Status Consistency Reason Active vlans
-- ---- ------ ----------- ------ ------------
1 Po1 down* failed vPC type-1 2-10
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
VPC behavior at initialization
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
VPC Reload Restore
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
VPC auto-recovery
(replaces Reload-Restore as of NXOS 5.2.1)
Auto-recovery addresses cases of multiple failures. For example
Peer-link fails and after a while primary switch (or keepalive link) fails
Both VPC peers are reloaded and only one comes back up
How it works
If Peer-link is down on secondary switch, 3 consecutive missing peer-keepalives will
trigger auto-recovery
After reload (role is none established) auto-recovery timer (240 sec) expires while
peer-link and peer-keepalive still down, autorecovery kicks in
Switch assumes primary role
VPCs are brought up bypassing consistency checks
vPC domain id : 1
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
Configuration consistency status: success
Type-2 consistency reason : Consistency Check Not Performed CFS can communicate with the
vPC role : primary peer
Number of vPCs configured : 1
Peer Gateway : Disabled We hear peer-alives
Dual-active excluded VLANs : - Configs are compatible
vPC Peer-link status
--------------------------------------------------------------------- Master/Slave for certain apps
id Port Status Active vlans
--
1
---- ------ --------------------------------------------------
Po100 up 1,101 Peer-Link is up with expected vlans
vPC status
----------------------------------------------------------------------
Vlans are active on VPCs
id Port Status Consistency Reason Active vlans
-- ---- ------ ----------- ------ ------------
1 Po1 up success success 101
Peer status issue check if peer-link is up, check if remote end is also configured as peer-link, then look at CFS.
Note peer-link will fully come up when 1) peer-keepalive is up and 2) peers can talk via CFS over peer-link
Peer-keepalive issue check sh vpc keepalive, check outgoing interface being up, in correct vrf, check the route
to destination (in correct vrf), ping the remote and check the same on the remote peer
Role issue check sh vpc role on both sides, note that peer thats been up/active the longest will remain
operational-active even if other peer will have better priority. This is done to minimize traffic disruption. If role is none
established it means the VPC came up after reload/new config and VPCs will not come up before role is resolved or
reload-restore/auto-recovery kicks in
Vlans not up check if respective vlan allowed on peer-link, check syslog for other causes sh log log | inc VLANS
VPC Domain
Switch 1 Switch 2
HA-policy will trigger Process 1 Process 1
Active Active
supervisor switchover Process 2 Process 2
in response to
excessive process Process X Process X
crashing, software,
hardware or Standby(SSO) Standby(SSO)
diagnostic failure
Peer Keepalive
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Handling Peer-link failure flow Note: If primary fails completely
once the VPCs are down on
Peer-link failure secondary, VPCs will stay down
until primary recovers
Ignore keepalives
for hold-timeout (3 sec)
2ndary
Start keepalive timeout timer
Am I primary?
(default 5 sec)
primary
Keepalive timeout no no
Received Keepalive?
expired?
yes yes
Primary is gone Primary is alive
Become primary Bring down all VPC ports
Done
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Handling Peer-link failure flow with Auto-recovery
Note: Unlike in the previous case
the keepalive status is always
checked, not only for
keepalivehold + keepalivetimeout
no Peer-link seconds after peer-link failure
Received Keepalive
Down? yes
Done
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
If Peer-link and Keepalive both fail
while primary peer is still alive
Dual-active situation
There will be 2 primary switches sending independent BPDUs
VPC Port-channels on upstream/downstream switches will be error-disabled
by EtherChannel Misconfiguration Guard after ~90seconds
http://www.cisco.com/en/US/tech/tk389/tk213/technologies_tech_note09186a008009448d.shtml
If Nexus 7000/5000 is on the other end of VPC no errordisable as NXOS
does not support EtherChannel Guard
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
What to do if only 1 peer is operational
and VPCs are down
due to power issue, hardware failure on the 2nd peer etc
VPC(s) will be down if they had to flap or current peer was reloaded
(because consistency check couldnt be performed without 2nd peer)
Non-issue with auto-recovery, but what if current NXOS version < 5.2 ?
Possible actions
Recover 2nd peer
or remove VPC config from port-channel(s)
vpc(config-if)# no vpc 123
or in case of many VPCs, remove VPC config
vpc# sh run vpc > bootflash:myvpc.conf
vpc(config)# no feature vpc
vpc#
...
sh vpc
Peer status : peer link is down
vPC keep-alive status : Suspended (Destination IP not reachable)
Configuration consistency status : failed
Configuration inconsistency reason: Consistency Check Not Performed
vPC
...
role : none established
vPC status
----------------------------------------------------------------------
id Port Status Consistency Reason Active vlans
-- ---- ------ ----------- ------ ------------
102 Po102 down Not Consistency Check Not -
Applicable Performed
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Troubleshooting VPC peer-keepalives
Nexus# show vpc peer-keepalive
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
VPC operational considerations
from troubleshooting perspective
VPC troubleshooting is often part of investigation of larger scale
event connectivity issues following power-outage, upgrade,
migration, major changes etc
Datacenter connectivity being impacted usually implies lots of pressure
(time and otherwise)
Always know the current situation before trying to recover
Trying to fix a non-issue one risks to make things worse At minimum collect
the state of the system before trying anything drastic
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
VPC config considerations
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Agenda
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Spanning Tree in VPC domain
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
STP behavior upon VPC primary failure
Primary OP-Primary
Secondary STP root port doesnt change nor any STP port
states for VPCs, forwarding continues
Backup
1 ROOT ROOT
ROOT
Depending on control plane load it might take few
2 seconds for Op-primary to start sending BPDUs.
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
STP behavior upon VPC primary recovery
Backup
4 Left switch has better STP priority becomes
1 ROOT SYNC ROOT
ROOT STP root
4 5
5 STP root port of right switch will change and that
will trigger SYNC: all non-edge STP ports will be
temporarily blocked
Once sync is complete ports will resume
forwarding
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
VPC Peer-Switch feature
Both VPC switches originate BPDUs with preconfigured information. This
allows to keep the same BPDU when primary fails/recovers no extra
SYNC required short interruption in forwarding described on previous
slide is avoided
Both left and right switches consider themselves root
Both left and right switches send BPDUs all the time no need to raise
hello time & STP Bridge Assurance can be enabled on VPCs
Primary Secondary
ROOT ROOT
spanning-tree vlan 1-1000 priority 8192 spanning-tree vlan 1-1000 priority 8192
vpc domain 1 vpc domain 1
peer-switch peer-switch
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
VPC Peer-Switch feature
Primary Secondary
left# sh span vlan 101
VLAN0101
Spanning tree enabled protocol rstp
ROOT ROOT
Root ID Priority 8293
Address 0023.04ee.be01
This bridge is the root
...
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
STP inconsistencies
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Handling Peer-Link STP inconsistencies
on Primary switch
Primary Secondary
primary switch the link will be put in inconsistent
STP state (effectively blocking state)
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Handling Peer-Link STP inconsistencies
on Secondary switch
This behavior depends on STP Bridge Assurance on peer-link (default) as a way to signal to the
secondary peer about inconsistency
With BA disabled on Peer-link any inconsistency on the Primary will lead to Peer-link flap
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
STP troubleshooting: PES/SPS & BPDU redirection
Primary VPC peer controls the port states on the secondary peer by
means of SPS (set-port-state) messages
Changes in STP information are syncronized between peers using PES
(port-event-sync) messages
Constantly incrementing SPS/PES
nexus# sh spanning-tree internal info vpc | exc 0$ counters might indicate STP
...
======= CFSoe Statistics =========================
instability or constant
Total PES Msgs sent : 4 reconvergence.
Total SPS Msgs sent : 4 Use sh spanning detail and
Total MCS Msgs sent : 8 debug spanning-tree events to
Total PES Response Msgs received : 4 find a reason for reconvergences
Total SPS Response Msgs received : 4
Total Response Msgs received : 8
BPDUs are sent to VPCs out of primary switch. If VPC leg connected to
primary is down, BPDUs are sent over peer-link and sent out by
secondary
nexus# sh system internal frame traffic | i BPDU
Ingress BPDUs qualified for redirection 42
Ingress BPDUs redirected to peer 42
Egress BPDUs qualified for redirection 0
Egress BPDUs dropped due to remote down 0
Egress BPDUs redirected to peer 0
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
STP troubleshooting It is possible to see situation when
there are 2 root ports: peer-link
vpc1# sh spanning-tree vlan 4 and some VPC
VLAN0004 This happens when STP root is
Spanning tree enabled protocol rstp behind VPC and BPDU is received
Root ID Priority 32772 by the peer - this does not indicate
Address 0018.ba88.4a00
Cost 2 any issue
Port 4096 (port-channel1)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Bridge ID Priority 32772 (priority 32768 sys-id-ext 4)
Address 68bd.abd7.51c2
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Interface Role Sts Cost Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
Po1 Root FWD 1 128.4096 (vPC peer-link) Network P2p
Po102 Root FWD 1 128.4197 (vPC) P2p
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
STP troubleshooting This output can be easily limited to
necessary Vlan/Interface, but it
Looking at BPDUs live
doent dump the BPDU
vpc1# debug spanning-tree bpdu_tx tree 101
Very chatty use debug logfile
14:20:37.556707 stp: RSTP(101): transmitting RSTP BPDU on port-channel100
14:20:37.556750 stp: vb_vlan_shim_send_bpdu(1933): VDC <file>
4 Vlan 101to redirect output to a file
port port-
channel100 enc_type 1 len 42
14:20:37.556834 stp: RSTP(101): transmitting RSTP BPDU on port-channel1
14:20:37.556863 stp: vb_vlan_shim_send_bpdu(1933): VDC 4 Vlan 101 port port-channel1
enc_type 2 len 36
Alternatively use ethanalyzer to capture and dump BPDUs. Beware the BPDUs
received by other peer and redirected to primary will not be seen in expected way
because of extra encapsulation
Looking at past events
nexus# sh spanning-tree internal event-history tree 0 interface port-channel 50
VDC02 MST0000 <port-channel50>
0) Transition at 497772 usecs after Tue Oct 20 17:42:01 2009
State: FWD Role: Root Age: 5 Inc: no [STP_PORT_STATE_CHANGE]
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Special case for forwarding
x
PC B
PC A ends a packet to PC B
x
1
2 MAC B is not known by left switch flood
PC A 1
x
A 5
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Special case for forwarding: VPC way
PC B
2 3
X
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Topologies where VPC forwarding rules will have
implications
x
x
may not come up arriving to left switch
for destination on
vlan 2
This issue is not VPC in vlan 2 will
specific to OSPF have to cross Peer-
same for any routing Link and will be
protocol dropped by right
switch
Use routed links to Add routed cross-link
connect routers between peers
Frames received from Peer-Link are never sent out of
VPC (except those without operational ports on ingress
switch)
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Verifying whether frame will be sent to peer-link
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
MAC address learning
PC A
Traffic should prefer local links when available
(traffic locality rule)
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
MAC address learning: VPC way
PC B
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Po50 Po22
Vlan 50 Vlan 20
Troubleshooting VPC
Layer 2
91.0.0.10
0013.1908.e246 20.1.2.3
91.0.0.10
0013.1908.e246 20.1.2.3
For port-channels
nexus# sh port-channel load-balance forwarding-path interface port-channel 22 dst-ip
20.1.2.3 src-ip 91.0.0.10 vlan 20 module 2
Missing params will be substituted by 0's.
Load-balancing is configurable
Module 2: Load-balance Algorithm: source-dest-ip-vlan
RBH: 0 Outgoing port id: Ethernet1/14
under port-channel load-balance
in default VDC and affects all VDCs
Use sh port-channel rbh-distribution to see which link sends traffic for
which of 8 available load-balancing buckets
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Datapath Drops
#1 command to look for hardware
nexus# sh hardware internal errors all
---------------------------------------- packet drops
Hardware errors as reported in module 1
---------------------------------------- Not every drop listed here is actual
data packet drop
|------------------------------------------------------------------------|
| Device:R2D2 Role:MAC Run several | times to see if any
|------------------------------------------------------------------------|
Instance:7 counters increase at rate similar to
ID Name Value Ports
-- ---- ----- traffic loss
-----
28688 aric_no_port_select_error 0000000000000002
... To clear1,3,5,7
counters,I2use
| Device:Ashburton Role:MAC
clear statistics
|------------------------------------------------------------------------|
Mod: 1 |
module-all device all
|------------------------------------------------------------------------|
Instance:0
3629 Egress Port-1 VSL Dropped Packet Count 0000000853635833 5 -
3630 Egress Port-2 VSL Dropped Packet Count 0000000857893046 3 -
...
|------------------------------------------------------------------------|
| Device:Naxos Role:MAC SECURITY |
|------------------------------------------------------------------------|
Instance:0
ID Name Value Ports
-- ---- ----- -----
106 m1_fab_p25_txq_tc0_drop_count 00000000000012af 2 -
...
|------------------------------------------------------------------------|
| Device:Metropolis Role:REWR |
|------------------------------------------------------------------------|
Instance:1
ID Name Value Ports
-- ---- ----- -----
70 Krypton input controller zero portsel cnt 0000000000000038 18,20,22,24,26,28,30,32
|------------------------------------------------------------------------|
| Device:Lamira Role:L3 |
|------------------------------------------------------------------------|
Instance:0
ID Name Value Ports
-- ---- ----- -----
93 CL2 Invalid Pkt count 00000008759cb9cb 1-32 I1
...
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Agenda
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
1st hop redundancy with VPC
MAC_B vMAC
IP B IP A
PC B
Each of VPC peers will L3 forward packets
destined to its respective Router MAC address
HSRP/VRRP/GLBP used for 1st hop redundancy
Router MAC1 Router MAC2 Both switches will L3 switch packets to vMAC
0001.0002.0003 HSRP 0005.0006.0007
Virtual MAC Virtual MAC address as long as one of them is HSRP active or
0000.0c07.ac00 0000.0c07.ac00 HSRP standby.
MAC_A vMAC
IP A IP B
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
First hop redundancy troubleshooting
standby active
Interface Vlan1 Interface Vlan1
ip address 1.1.1.252/24 ip address 1.1.1.253/24
hsrp 1 hsrp 1
HSRP
ip 1.1.1.254 ip 1.1.1.254
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
1st hop issue with some devices
MAC_B Router MAC1 1 PC A sends a packet to Server B
IP B IP A
3
2 Left VPC switch will receive the packet and
forward it to Server B, note Source MAC of
outgoing packet will be that of Router1
3 Server B responding to PC A will populate
Server B
destination MAC from source MAC of received
Router MAC1 MAC_B MAC_B Router MAC1 frame (this is wrong, it should use ARP)
IP A IP B IP B IP A
4 If frame from BA will be load-balanced to right
4
switch the MAC address of Router1 will point to
2 Router MAC1 Router MAC2
Peer-Link and this is where the frame will be sent
0001.0002.0003 0005.0006.0007
Virtual MAC Virtual MAC
0000.0c07.ac00 0000.0c07.ac00 5 Left switch will receive the frame from Peer-Link
and drop it
X
5
PC A
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Peer-Gateway : the implications
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
IP Multicast with VPC
Receiver sends IGMP report (join)
RP
Access switch sends join to right VPC peer
Receiver
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
IP Multicast with VPC: source behind VPC
RP
VPC1 VPC2
Source S1
Receiver
For sources behind VPC both peers will forward as they have no control on which
one will get the traffic
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
VPC multicast: following packet flow
Nexus# show ip mroute 239.1.2.3
(*, 239.1.2.3/32), uptime: 06:46:05, igmp pim ip static control plane state for this group
Incoming interface: Vlan36, RPF nbr: 36.0.0.3
Outgoing interface list: (count: 2)
where information came from
Ethernet2/43, uptime: 03:01:36, static stable?
Vlan37, uptime: 06:46:05, igmp
RPF interface
(33.0.0.33/32, 239.1.2.3/32), uptime: 06:46:05, ip pim mrib
Incoming interface: Vlan36, RPF nbr: 36.0.0.3
Outgoing interface list: (count: 2)
Ethernet2/43, uptime: 03:01:36, mrib
Vlan37, uptime: 06:46:04, mrib
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
When traffic arrives via VPC
How to find which slot receives the S,G flow when ingress interface is
port-channel scattered across several modules?
show forwarding multicast route group <g> source <s>
Nexus# show forwarding multicast route group 239.1.1.1 source 1.0.1.2 | i Received|slot
slot 1
Received Packets: 0 Bytes: 0
slot 2
Received Packets: 727203 Bytes: 487290999
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Are there drops in forwarding path?
Always take several snapshots and look for drops that grow coherently with
[suspected] multicast traffic drops
There are always some drops shown by above command this doesnt always
mean the actual network packets are dropped. Some of these are diag packets,
some are packets that are dropped on blocked ports, extra floods etc
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Review & Summary
Infrastructure
Redundancy at process, supervisor, port-channel, chassis,
VPC level
Both peers are needed to bring up VPCs auto-
recovery/reload-restore can change this
Peer-Keepalive + Role defines behavior during VPC
failovers
Forwarding
Traffic locality (VPC check) + No learning on Peer-Link
No blocking ports (generally), but common L2 stability
mechanisms still important (LACP active, UDLD, BA,
Dispute)
Interfacing with L3 requires separate links + cross link
Troubleshooting
Layered, always take basic info, narrow down to a
layer/issue type before trying to recover
Data plane troubleshoot each peer like normal switch
paying attention to nuances like VPC check, dual-DR and
Router-MACs
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Recommended Reading
BRKCRS-3146 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 86