• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1112
  • Last Modified:

Setting up trunking on HP Procurve 2824 to Alied Telesyn AT 8350GB

We have just purchased a new HP Procurve 2824 and have one cable running to a Alied Telesyn AT 8350GB as our 1GB link. We are experiencing a bottle neck on this port and would like to set up trunking between the two switches using an extra 3 ports.

I have looked at the instructions for the HP switch and am a little uncertain at the exact way to go about setting the two units up.  The allied Telesyn seems pretty straight forward as its just a case of going to the trunk configuration and selecting the ports.  The HP is a little more complicated and as I have never set trunking up before I would like some advice as to how to connect the two.

The manual gives options for setting up static LCAP, dynamic LCAP, FEC or TRUNK (NON PROTOCOL), this is the section that is confusing me.  As I am uncertain which option to use to configure with the other switch correctly.

0
MaherLimited
Asked:
MaherLimited
  • 2
1 Solution
 
NetTechDudeCommented:
Why don't you try it out ?
You cannot damage the hardware with an incorrect protocol and you can always set the setting back or revert to factory default.
If it doesn't work at all, then you are caught with the same Problems as many people: Different verndors (here: HP and ATS) don't trunk well :-( This ist sad but true too often to be ignored.

With LCAP you usually have to set LCAP active or LCAP passive with switches and you have tzo set one to actve and the other to passive. Or you try LCAP dynamic and let the switches work it out, if they can.
0
 
MaherLimitedAuthor Commented:
We set all ports used in the trunking to 100, worked fine.  
0
 
NetTechDudeCommented:
It's good to hear that everything works.
So - what did you set up on the HP switch ?  LCAP, dynamic LCAP, FEC or TRUNK (NON PROTOCOL) ?
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now