glpro76
asked on
cisco virtual switching system question
i am running 2 6505 chassis running in vss. we have 1 24 port sfp module in each chassis. we currently have all 24 fiber links in chassis 1 connected to access switches. chassis 2 only has a vsl back to chassis1. my questions is where is my redundancy for the access switches in case of failure on chassis 1? what if module 1/1/5 fails how does my edge switch talk back to the core? can someone help me understand this? What would be the best design in the scenario? thanks for your help
Your access switches should connect into both chassis for redundancy. I believe you bundle the links as an EtherChannel but I'm not an expert on VSS.
Unless the access switches have a connection to each chassis you would see a service interruption.
Connect a port from each access switch to each chassis and setup an etherchannel.
Connect a port from each access switch to each chassis and setup an etherchannel.
ASKER
Let me make sure I'm correct. Since on chassis 1 I have a interface 1/1/5 with an ip address 192.168.50.1 back to my access switch. I would need to create a port channel6 on chassis 1 , assign it the ip address 192.168.50.1 and then do a no ip on interface 1/1/5, add it to the port channel6. Then go to chassis 2 interface 2/1/5 add it to port channel 6, no ip. Does this sound correct? Am I missing something? What about service interruption on changing interface ip's? Thanks for the help.
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Thanks @donjohnston I'm reviewing your comment.
ASKER
this is my current interface setting on chassis 1
interface GigabitEthernet1/1/5
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 6,50,250
switchport mode trunk
this is my current interface setting on chassis 2 which has no connection on it currently.
interface GigabitEthernet2/1/5
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 6,50,250
switchport mode trunk
shutdown
@donjohnston would i still need to add a svi? or just add a channel group on each interface? thanks again for the help.
interface GigabitEthernet1/1/5
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 6,50,250
switchport mode trunk
this is my current interface setting on chassis 2 which has no connection on it currently.
interface GigabitEthernet2/1/5
switchport
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 6,50,250
switchport mode trunk
shutdown
@donjohnston would i still need to add a svi? or just add a channel group on each interface? thanks again for the help.
ASKER
the previous conment is on the core 6505 by the way.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Thank you I am reviewing your comments
ASKER
i do have a svi on the 6500 for those vlans.
interface Vlan50
ip address 192.168.50.1 255.255.255.0
interface Vlan6
ip address 192.168.6.1 255.255.255.0
interface Vlan250
ip address 192.168.250.1 255.255.255.0
this wouldnt change would it?
interface Vlan50
ip address 192.168.50.1 255.255.255.0
interface Vlan6
ip address 192.168.6.1 255.255.255.0
interface Vlan250
ip address 192.168.250.1 255.255.255.0
this wouldnt change would it?
ASKER
i assume i would add the the same channel group commands to the trunked interfaces on the access switch's that connect back to g1/1/5 and g2/1/5?
SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Thanks again for all the help!