openfiler nic bonding with cisco etherchannel

Posted on 2010-01-05
Medium Priority
Last Modified: 2014-07-16
HI Guys,
I'm trying to setupa nic bonding on OPenfiler SAN. the issue i got is : what openfiler nic bonding mode will work with standard etherchannel on cisco 2960 switch?
the ether channel i got on cisco is as followes

int ether-channel 1
switchport mode trunk
switchport no negotiate
spanning-tree portfast trunk

int range gig 0/1 - 2
switchport mode trunk
switchport no negotiate
spanning-tree portfast trunk
channel-group 1 mode on

Please help me what configuration on the Penfiler will work ? if not do i have to chnage anything on cisco switch?
Question by:APPIREDDY
  • 3
  • 2
LVL 22

Accepted Solution

Jody Lemoine earned 1000 total points
ID: 26180877
Setting "channel-group 1 mode on" disables any kind of negotiation of the trunk, which is good if the other device doesn't support PAgP or LACP protocols.  In the case of Openfiler though, LACP (802.3ad) is fully supported so I would configure the Cisco to negotiate with the Openfiler for best results.  Configure the LACP bonding on the Openfiler and try "channel-group 1 mode active" to see if it negotiates properly.

Author Comment

ID: 26285103
thanks for the reply. i have solved this issue. but i got another issue in openfiler.as i'm linux newbie i need some help here guys.

i have renamed the openfiler volume using lmrename command.
but after renaming the volume, i couldn't see the volume in web gui interface under volumes, but when i try using console i could see the volume is still there and with the new name.how can i see the renamed volume under web interface under volumes...

many thanks
LVL 22

Expert Comment

by:Jody Lemoine
ID: 26285150
Hey Red.

I'm going to suggest you close this question and ask the volume question separately.  All of the tagging on this question is related to the networking side of things, which is appropriate for the LACP problem, but is somewhat left-field for the volume-related problem.  If you propose that problem as a separate question with appropriate tagging, you're more likely to get people who are more familiar with the storage side of things.

I'm glad the channel bonding is working for you.

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.


Author Closing Comment

ID: 31672935
i have done all the configuration, before i received this help

Author Comment

ID: 26290822
i opned a separate question

Expert Comment

ID: 40200864
what was the config? i have the same question.

Featured Post

Identify and Prevent Potential Cyber-threats

Become the white hat who helps safeguard our interconnected world. Transform your career future by earning your MS in Cybersecurity. WGU’s MSCSIA degree program was designed in collaboration with national intelligence organizations and IT industry leaders.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article I will be showing you how to subnet the easiest way possible for IPv4 (Internet Protocol version 4). This article does not cover IPv6. Keep in mind that subnetting requires lots of practice and time.
Herein one will find an aggregate of some of my experience building and deploying virtualization stacks both in standalone, clustered Hyper-V, clustered Hyper-V with a Scale-Out File Server (SOFS) backend, and Storage Spaces Direct (S2D).
This video shows you how to use a vSphere client to connect to your ESX host as the root user. Demonstrates the basic connection of bypassing certification set up. Demonstrates how to access the traditional view to begin managing your virtual mac…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question