SlideShare una empresa de Scribd logo
1 de 8
The Virtual Switching System (VSS) allows two Cisco Catalyst 6500 or 4500 chassis to
bond together so that is seen as a single virtual switch to the rest of the network.
Other devices will see the VSS configured 6500 as a single device which means it’s
possible to use multi chassis ether channel and protocols like spanning-tree will only
see a single switch.
Some other features are NSF (Non Stop Forwarding)/SSO (Stateful Switchover) which
means that when a single chassis fails the other one will take over without any
downtime since the routing table / CEF table etc. are stored in both chassis’
supervisors.
Another cool feature is EFSU (Enhanced Fast Software Upgrade) which allows you to
upgrade the IOS version without any downtime.
In this tutorial I will be using two Cisco Catalyst 6504 switches with 720-10G VSS
supervisors to show you how to configure VSS and verify that it’s working.
Right now I have two 6500s that are running in “standalone”. In order to bond these
two using VSS we will have to do the following:
 Configure a virtual switch domain on both switches and configure one switch
as “switch 1″ and the other one as “switch 2″.
 Configure the virtual switch links.
 Execute the conversion command which will reboot the switches.
Before we configure anything let’s verify what modules my 6500s have and see if
they are running the same IOS or not!
Verification
We should start by taking a look at the modules in our 6500s and the IOS versions
that we are using, just to be sure that we use supported hardware and software.
SW1-VSS#show module
Mod Ports Card Type
Model
Serial No.
--- ----- -------------------------------------- ------------------ ----------1
5
Supervisor Engine 2T 10GE w/ CTS (Acti VS-SUP2T-10G
SAL11111111
2
4
CEF720 4 port 10-Gigabit Ethernet
WS-X6704-10GE
SAL11111111
3
48
CEF720 48 port 10/100/1000mb Ethernet
WS-X6748-GE-TX
SAL11111111
Mod MAC addresses
Hw
Fw
Sw
Status
--- ---------------------------------- ------ ------------ ------------ ------1 588d.09e6.d0b9 to 588d.09e6.d0c0 1.3 12.2(50r)SYS 15.0(1)SY2
Ok
2 001a.a10e.833c to 001a.a10e.833f 2.5 12.2(14r)S5 15.0(1)SY2
Ok
3 0002.fcc1.1bd0 to 0002.fcc1.1bff
1.2 12.2(14r)S5 15.0(1)SY2 Ok
Mod Sub-Module
Model
Serial
Hw
Status
---- --------------------------- ------------------ ----------- ------- ------1 Policy Feature Card 4
VS-F6K-PFC4
SAL11111111 1.2
Ok
1 CPU Daughterboard
VS-F6K-MSFC5
SAL11111111 1.4
Ok
2 Centralized Forwarding Card WS-F6700-CFC
SAD11111111 3.1
Ok
3 Centralized Forwarding Card WS-F6700-CFC
SAD11111111 1.1
Ok
Mod Online Diag Status
---- ------------------1 Pass
2 Pass
3 Pass
And this is what switch 2 looks like:
SW2-VSS#show module
*Aug 13 18:37:25.727: %SYS-5-CONFIG_I: Configured from console by console
Mod Ports Card Type
Model
Serial No.
--- ----- -------------------------------------- ------------------ ----------1
5
Supervisor Engine 2T 10GE w/ CTS (Acti VS-SUP2T-10G
SAL22222222
2
4
CEF720 4 port 10-Gigabit Ethernet
WS-X6704-10GE
SAL22222222
3
48
CEF720 48 port 10/100/1000mb Ethernet
WS-X6748-GE-TX
SAD22222222
Mod MAC addresses
Hw
Fw
Sw
Status
--- ---------------------------------- ------ ------------ ------------ ------1 588d.09e6.cc7d to 588d.09e6.cc84
1.3 12.2(50r)SYS 15.0(1)SY1
Ok
2 001a.6c68.73e0 to 001a.6c68.73e3
2.5 12.2(14r)S5 15.0(1)SY1
Ok
3 000d.6551.041a to 000d.6551.0449
1.2 12.2(14r)S5 15.0(1)SY1
Ok
Mod Sub-Module
Model
Serial
Hw
Status
---- --------------------------- ------------------ ----------- ------- ------1 Policy Feature Card 4
VS-F6K-PFC4
SAL22222222 1.2
Ok
1 CPU Daughterboard
VS-F6K-MSFC5
SAL22222222 1.4
Ok
2 Centralized Forwarding Card WS-F6700-CFC
SAL22222222 3.1
Ok
3 Centralized Forwarding Card WS-F6700-CFC
SAD22222222 1.1
Ok
Mod Online Diag Status
---- ------------------1 Pass
2 Pass
3 Pass
Both switches have the VS-SUP2T-10G supervisor that we will use for VSS. Let’s also
check the IOS version:
SW1-VSS#show version
Cisco IOS Software, s2t54 Software (s2t54-ADVENTERPRISEK9-M), Version 15.0(1)SY2,
RELEASE SOFTWARE (fc4)
Technical Support: http://www.cisco.com/techsupport
sw2:
SW2-VSS#show version
Cisco IOS Software, s2t54 Software (s2t54-ADVENTERPRISEK9-M), Version 15.0(1)SY2,
RELEASE SOFTWARE (fc4)
Technical Support: http://www.cisco.com/techsupport
Both switches are running IOS 15.0(1)SY2 so it’s looking good. Now we can move on
to the configuration.
Configure Virtual Switch Domain
Configuring the virtual switch domain is nothing more but grouping the two switches
using an ID. This ID can be a value between 1 and 255 and has to be the same on
both switches. Here’s what it looks like:
I have two 6500s, one called “SW1-VSS” and the other one is called “SW2-VSS”. I will
configure them both to use virtual switch domain 1.
Let’s configure the virtual switch domain ID and switch numbers:
SW1-VSS(config)#switch virtual domain 1
Domain ID 1 config will take effect only
after the exec command 'switch convert mode virtual' is issued
SW1-VSS(config-vs-domain)#switch 1
SW2-VSS(config)#switch virtual domain 1
Domain ID 1 config will take effect only
after the exec command 'switch convert mode virtual' is issued
SW2-VSS(config-vs-domain)#switch 2
Both switches are configured to use virtual domain 1, SW1-VSS has been configured
as “switch 1″ and SW2-VSS as “switch 2″. The next step is to assign a priority to
determine what switch will become active or standby.
SW1-VSS(config-vs-domain)#switch 1 priority 110
SW1-VSS(config-vs-domain)#switch 2 priority 100
SW2-VSS(config-vs-domain)#switch 1 priority 110
SW2-VSS(config-vs-domain)#switch 2 priority 100
The higher the priority the more likely you will become the active switch. Switch 1
will have a priority of 110 and switch 2 a priority of 100. This means SW1-VSS will
become the active switch.
Configure Virtual Switch Link
The virtual switch link is used to exchange configuration and stateful information
between the two physical switches. You can use a single physical interface for VSL or
create an etherchannel for redundancy. VSL will add a “virtual switch header” on
each frame when it is sent on this link, basically it looks like this:
Not all interfaces are supported for VSL. In my example I’m using the Ten Gigabit
interfaces on the Supervisors. To make sure we have redundancy I’ll create an
etherchannel using the Ten 1/4 and Ten 1/5 interfaces on the 6500s:
SW1-VSS(config)#interface port-channel 1
SW1-VSS(config-if)#no shutdown
SW1-VSS(config-if)#switch virtual link 1
SW1-VSS(config-if)#exit
SW1-VSS(config)#int range ten 1/4 - 5
SW1-VSS(config-if-range)#channel-group 1 mode on
SW1-VSS(config-if-range)#no shut
SW2-VSS(config)#interface port-channel 2
SW2-VSS(config-if)#no shutdown
SW2-VSS(config-if)#switch virtual link 2
SW2-VSS(config-if)#exit
SW2-VSS(config)#int range ten 1/4 - 5
SW2-VSS(config-if-range)#channel-group 2 mode on
SW2-VSS(config-if-range)#no shutdown
As you can see above we have a basic etherchannel configuration but I used
the switch vrtual link command to tell the switch that the etherchannel is a VSL
interface. Let’s verify that our etherchannel is working between the two switches:
SW1-VSS#show etherchannel summary | incl Po1
1
Po1(RU)
Te1/4(P)
Te1/5(P)
SW2-VSS#show etherchannel summary | incl Po2
2
Po2(RU)
Te1/4(P)
Te1/5(P)
We are now ready to convert the 6500s to VSS.
Execute Conversion
The final step in configuring VSS is to execute the conversion. Once we do this the
switches will reload and 3 things will happen:
 The configurations of both switches will be merged into a single
configuration.
 The
interface numbers will be renumbered from slot/port to
switch-number/slot/port.
 Negotiation to determine which switch is active or standby.
This is how we execute the conversion:
SW1-VSS#switch convert mode virtual
This command will convert all interface names
to naming convention "interface-type switch-number/slot/port",
save the running config to startup-config and
reload the switch.
NOTE: Make sure to configure one or more dual-active detection methods
once the conversion is complete and the switches have come up in VSS mode.
Do you want to proceed? [yes/no]: yes
Converting interface names
Building configuration...
SW2-VSS#switch convert mode virtual
This command will convert all interface names
to naming convention "interface-type switch-number/slot/port",
save the running config to startup-config and
reload the switch.
NOTE: Make sure to configure one or more dual-active detection methods
once the conversion is complete and the switches have come up in VSS mode.
Do you want to proceed? [yes/no]: yes
Converting interface names
Building configuration...
The switches will now reboot and you will see this on the console:
SW1-VSS#
System detected Virtual Switch configuration...
Interface TenGigabitEthernet 1/1/4 is member of PortChannel 1
Interface TenGigabitEthernet 1/1/5 is member of PortChannel 1
SW2-VSS#
System detected Virtual Switch configuration...
Interface TenGigabitEthernet 2/1/4 is member of PortChannel 2
Interface TenGigabitEthernet 2/1/5 is member of PortChannel 2
And you will see the negotiation between active and standby:
SW1-VSS#
%PFREDUN-6-ACTIVE: Initializing as ACTIVE processor for this switch
%VSL_BRINGUP-6-MODULE_UP: VSL module in slot 1 switch 1 brought up
%VSLP-5-RRP_ROLE_RESOLVED: Role resolved as ACTIVE by VSLP
%VSL-5-VSL_CNTRL_LINK: New VSL Control Link 1/1/4
SW2-VSS#
%PFREDUN-6-ACTIVE: Initializing as ACTIVE processor for this switch
%VSL_BRINGUP-6-MODULE_UP: VSL module in slot 1 switch 2 brought up
%VSLP-5-RRP_ROLE_RESOLVED: Role resolved as STANDBY by VSLP
%VSL-5-VSL_CNTRL_LINK: New VSL Control Link 2/1/4
The two switches rebooted and during the boot process the switches will detect
which interfaces are used for the virtual switch link. The switches will then negotiate
on the VSL to see which one becomes active or standby. As expected SW1-VSS is the
active switch.
After booting you’ll see that the console of SW2-VSS is no longer responding, we
can’t use it anymore for configuration. All configurations have to be done from the
active switch now.
VSS is now up and running! Since the two switches have bonded to become one
logical switch, it’s best to create a new hostname:
SW1-VSS(config)#hostname SW-VSS
I’ll call it “SW-VSS”. We are now done with the configuration but it’s a good idea to
verify our configuration.
Verification
The active switch is used to control both switches so some commands have been
changed. For example “show run” can now be used to check the running
configuration from both switches:
SW-VSS#show run switch 1
Building configuration...
Current configuration : 4283 bytes
!
[output omitted]
SW-VSS#show run switch 2
Building configuration...
Current configuration : 4223 bytes
!
[output omitted]
By adding “switch <id>” you can check the running configuration from switch 1 or 2.
There’s also some special VSS commands that we can use:
SW-VSS#show switch virtual
Switch mode
: Virtual Switch
Virtual switch domain number : 1
Local switch number
:1
Local switch operational role: Virtual Switch Active
Peer switch number
:2
Peer switch operational role : Virtual Switch Standby
The show switch virtual command tells us that this switch is active and the other one
is standby. We can also take a closer look at the VSL:
SW-VSS#show switch virtual link
VSL Status : UP
VSL Uptime : 28 minutes
VSL SCP Ping : Pass
VSL ICC Ping : Pass
VSL Control Link : Te1/1/4
VSL Encryption : Configured Mode - Off, Operational Mode - Off
This is how you can check the VSL etherchannel:
SW-VSS#show interfaces vsl
VSL Port-channel: Po1
Port: Te1/1/4
Port: Te1/1/5
And there’s a useful command that gives you more information about the switch
roles and priorities:
SW-VSS#show switch virtual role
RRP information for Instance 1
-------------------------------------------------------------------Valid Flags Peer
Preferred Reserved
Count
Peer
Peer
-------------------------------------------------------------------TRUE
V
1
1
1
Switch

Switch
Status
Priority
Role
Local Remote
Number
Oper(Conf)
SID
SID
-------------------------------------------------------------------LOCAL 1
UP
110(110)
ACTIVE
0
0
REMOTE 2
UP
100(100)
STANDBY
2921
12
Peer 0 represents the local switch
Flags : V - Valid
In dual-active recovery mode: No
That’s all for now. I hope this has been helpful to understand configure VSS. If you
have any questions feel free to leave a comment!
More Cisco Switch Reviews, Tips and Guides you can see
http://blog.router-switch.com/category/reviews/cisco-switches/

Más contenido relacionado

La actualidad más candente

VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)Netwax Lab
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)KHNOG
 
VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)Netwax Lab
 
HSRP (hot standby router protocol)
HSRP (hot standby router protocol)HSRP (hot standby router protocol)
HSRP (hot standby router protocol)Netwax Lab
 
Brkdcn 2035 multi-x
Brkdcn 2035 multi-xBrkdcn 2035 multi-x
Brkdcn 2035 multi-xMason Mei
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Peter R. Egli
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersBruno Teixeira
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routingWilfredzeng
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architectureSagarR24
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to HeroDhruv Sharma
 
Huawei switch configuration commands
Huawei switch configuration commandsHuawei switch configuration commands
Huawei switch configuration commandsHuanetwork
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2Nil Menon
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Febrian ‎
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksAPNIC
 

La actualidad más candente (20)

VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)
 
VLAN
VLANVLAN
VLAN
 
Router commands
Router commandsRouter commands
Router commands
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)Virtual Extensible LAN (VXLAN)
Virtual Extensible LAN (VXLAN)
 
VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)VRRP (virtual router redundancy protocol)
VRRP (virtual router redundancy protocol)
 
HSRP (hot standby router protocol)
HSRP (hot standby router protocol)HSRP (hot standby router protocol)
HSRP (hot standby router protocol)
 
Brkdcn 2035 multi-x
Brkdcn 2035 multi-xBrkdcn 2035 multi-x
Brkdcn 2035 multi-x
 
Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)Overview of Spanning Tree Protocol (STP & RSTP)
Overview of Spanning Tree Protocol (STP & RSTP)
 
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service ProvidersCisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
Cisco Live! :: Introduction to IOS XR for Enterprises and Service Providers
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
CCNA Lab Guide
CCNA Lab GuideCCNA Lab Guide
CCNA Lab Guide
 
Ethernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider NeedsEthernet VPN (EVPN) EVerything Provider Needs
Ethernet VPN (EVPN) EVerything Provider Needs
 
Ccnp presentation day 4 sd-access vs traditional network architecture
Ccnp presentation   day 4  sd-access vs traditional network architectureCcnp presentation   day 4  sd-access vs traditional network architecture
Ccnp presentation day 4 sd-access vs traditional network architecture
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to Hero
 
Huawei switch configuration commands
Huawei switch configuration commandsHuawei switch configuration commands
Huawei switch configuration commands
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 
CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2CCNA 2 Routing and Switching v5.0 Chapter 2
CCNA 2 Routing and Switching v5.0 Chapter 2
 
Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010Deploying IP/MPLS VPN - Cisco Networkers 2010
Deploying IP/MPLS VPN - Cisco Networkers 2010
 
VXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building BlocksVXLAN BGP EVPN: Technology Building Blocks
VXLAN BGP EVPN: Technology Building Blocks
 

Similar a How to configure cisco 6500 vss

Cisco data center support
Cisco data center supportCisco data center support
Cisco data center supportKrunal Shah
 
Vlan lab
Vlan labVlan lab
Vlan labtmim8
 
CCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updatedCCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updatedCCIERNSTRICKS.COM
 
CCN3Switching_lab_5_5_2
CCN3Switching_lab_5_5_2CCN3Switching_lab_5_5_2
CCN3Switching_lab_5_5_2alan moreno
 
CCNA R&S 2 3 4 All Commands
CCNA R&S 2 3 4 All Commands CCNA R&S 2 3 4 All Commands
CCNA R&S 2 3 4 All Commands MohamedZiadi5
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingMuhd Mu'izuddin
 
Cisco labs practical6
Cisco labs practical6Cisco labs practical6
Cisco labs practical6Tai Lam
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchiLeandro Uglar
 
Communication &amp; switching networks lab manual
Communication &amp; switching networks lab manualCommunication &amp; switching networks lab manual
Communication &amp; switching networks lab manualMUSAAB HASAN
 
Ccna3 lab 9_1_5b_en
Ccna3 lab 9_1_5b_enCcna3 lab 9_1_5b_en
Ccna3 lab 9_1_5b_envin424
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commandsAreej Khasawneh
 
Cisco CCNA- How to Configure Multi-Layer Switch
Cisco CCNA- How to Configure Multi-Layer SwitchCisco CCNA- How to Configure Multi-Layer Switch
Cisco CCNA- How to Configure Multi-Layer SwitchHamed Moghaddam
 
Pe1 configuring pvst+ rapid pvst+
Pe1   configuring pvst+  rapid pvst+Pe1   configuring pvst+  rapid pvst+
Pe1 configuring pvst+ rapid pvst+mohdsyahmi789
 

Similar a How to configure cisco 6500 vss (20)

Cisco data center support
Cisco data center supportCisco data center support
Cisco data center support
 
Vlan lab
Vlan labVlan lab
Vlan lab
 
CCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updatedCCIE R&S Real Lab Workbbok 2018 updated
CCIE R&S Real Lab Workbbok 2018 updated
 
CCIE R&S Real Lab H1 Config
CCIE R&S Real Lab H1 ConfigCCIE R&S Real Lab H1 Config
CCIE R&S Real Lab H1 Config
 
CCIE R&S Real Lab H2 Config
CCIE R&S Real Lab H2 ConfigCCIE R&S Real Lab H2 Config
CCIE R&S Real Lab H2 Config
 
CCIE R&S Real TS-1 Config
CCIE R&S Real TS-1 ConfigCCIE R&S Real TS-1 Config
CCIE R&S Real TS-1 Config
 
CCIE R&S Real Lab H3 Config
CCIE R&S Real Lab H3 ConfigCCIE R&S Real Lab H3 Config
CCIE R&S Real Lab H3 Config
 
CCN3Switching_lab_5_5_2
CCN3Switching_lab_5_5_2CCN3Switching_lab_5_5_2
CCN3Switching_lab_5_5_2
 
CCNA R&S 2 3 4 All Commands
CCNA R&S 2 3 4 All Commands CCNA R&S 2 3 4 All Commands
CCNA R&S 2 3 4 All Commands
 
Lab6.4.1
Lab6.4.1Lab6.4.1
Lab6.4.1
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routing
 
Cisco labs practical6
Cisco labs practical6Cisco labs practical6
Cisco labs practical6
 
Day 13.1..1 catalyst switch
Day 13.1..1 catalyst switchDay 13.1..1 catalyst switch
Day 13.1..1 catalyst switch
 
Ccna 4 final lab switchi
Ccna 4 final lab switchiCcna 4 final lab switchi
Ccna 4 final lab switchi
 
Ccna2 project
Ccna2 projectCcna2 project
Ccna2 project
 
Communication &amp; switching networks lab manual
Communication &amp; switching networks lab manualCommunication &amp; switching networks lab manual
Communication &amp; switching networks lab manual
 
Ccna3 lab 9_1_5b_en
Ccna3 lab 9_1_5b_enCcna3 lab 9_1_5b_en
Ccna3 lab 9_1_5b_en
 
The bryant advantage 150 commands
The bryant advantage 150 commandsThe bryant advantage 150 commands
The bryant advantage 150 commands
 
Cisco CCNA- How to Configure Multi-Layer Switch
Cisco CCNA- How to Configure Multi-Layer SwitchCisco CCNA- How to Configure Multi-Layer Switch
Cisco CCNA- How to Configure Multi-Layer Switch
 
Pe1 configuring pvst+ rapid pvst+
Pe1   configuring pvst+  rapid pvst+Pe1   configuring pvst+  rapid pvst+
Pe1 configuring pvst+ rapid pvst+
 

Más de IT Tech

Cisco ip phone key expansion module setup
Cisco ip phone key expansion module setupCisco ip phone key expansion module setup
Cisco ip phone key expansion module setupIT Tech
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideIT Tech
 
Cisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideCisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideIT Tech
 
Hpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideHpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideIT Tech
 
The new cisco isr 4461 faq
The new cisco isr 4461 faqThe new cisco isr 4461 faq
The new cisco isr 4461 faqIT Tech
 
New nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesNew nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesIT Tech
 
Tested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresTested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresIT Tech
 
Aruba campus and branch switching solution
Aruba campus and branch switching solutionAruba campus and branch switching solution
Aruba campus and branch switching solutionIT Tech
 
Cisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesCisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesIT Tech
 
Cisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesCisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesIT Tech
 
Cisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesCisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesIT Tech
 
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellCompetitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellIT Tech
 
Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000IT Tech
 
The difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexThe difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexIT Tech
 
Cisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesCisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesIT Tech
 
Guide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesGuide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesIT Tech
 
892 f sfp configuration example
892 f sfp configuration example892 f sfp configuration example
892 f sfp configuration exampleIT Tech
 
Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700IT Tech
 
Cisco firepower ngips series migration options
Cisco firepower ngips series migration optionsCisco firepower ngips series migration options
Cisco firepower ngips series migration optionsIT Tech
 
Eol transceiver to replacement model
Eol transceiver to replacement modelEol transceiver to replacement model
Eol transceiver to replacement modelIT Tech
 

Más de IT Tech (20)

Cisco ip phone key expansion module setup
Cisco ip phone key expansion module setupCisco ip phone key expansion module setup
Cisco ip phone key expansion module setup
 
Cisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guideCisco catalyst 9200 series platform spec, licenses, transition guide
Cisco catalyst 9200 series platform spec, licenses, transition guide
 
Cisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guideCisco isr 900 series highlights, platform specs, licenses, transition guide
Cisco isr 900 series highlights, platform specs, licenses, transition guide
 
Hpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guideHpe pro liant gen9 to gen10 server transition guide
Hpe pro liant gen9 to gen10 server transition guide
 
The new cisco isr 4461 faq
The new cisco isr 4461 faqThe new cisco isr 4461 faq
The new cisco isr 4461 faq
 
New nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switchesNew nexus 400 gigabit ethernet (400 g) switches
New nexus 400 gigabit ethernet (400 g) switches
 
Tested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi featuresTested cisco isr 1100 delivers the richest set of wi-fi features
Tested cisco isr 1100 delivers the richest set of wi-fi features
 
Aruba campus and branch switching solution
Aruba campus and branch switching solutionAruba campus and branch switching solution
Aruba campus and branch switching solution
 
Cisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switchesCisco transceiver module for compatible catalyst switches
Cisco transceiver module for compatible catalyst switches
 
Cisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switchesCisco ios on cisco catalyst switches
Cisco ios on cisco catalyst switches
 
Cisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modesCisco's wireless solutions deployment modes
Cisco's wireless solutions deployment modes
 
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dellCompetitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
Competitive switching comparison cisco vs. hpe aruba vs. huawei vs. dell
 
Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000Four reasons to consider the all in-one isr 1000
Four reasons to consider the all in-one isr 1000
 
The difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fexThe difference between yellow and white labeled ports on a nexus 2300 series fex
The difference between yellow and white labeled ports on a nexus 2300 series fex
 
Cisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches seriesCisco transceiver modules for compatible cisco switches series
Cisco transceiver modules for compatible cisco switches series
 
Guide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 seriesGuide to the new cisco firepower 2100 series
Guide to the new cisco firepower 2100 series
 
892 f sfp configuration example
892 f sfp configuration example892 f sfp configuration example
892 f sfp configuration example
 
Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700Cisco nexus 7000 and nexus 7700
Cisco nexus 7000 and nexus 7700
 
Cisco firepower ngips series migration options
Cisco firepower ngips series migration optionsCisco firepower ngips series migration options
Cisco firepower ngips series migration options
 
Eol transceiver to replacement model
Eol transceiver to replacement modelEol transceiver to replacement model
Eol transceiver to replacement model
 

How to configure cisco 6500 vss

  • 1. The Virtual Switching System (VSS) allows two Cisco Catalyst 6500 or 4500 chassis to bond together so that is seen as a single virtual switch to the rest of the network. Other devices will see the VSS configured 6500 as a single device which means it’s possible to use multi chassis ether channel and protocols like spanning-tree will only see a single switch. Some other features are NSF (Non Stop Forwarding)/SSO (Stateful Switchover) which means that when a single chassis fails the other one will take over without any downtime since the routing table / CEF table etc. are stored in both chassis’ supervisors. Another cool feature is EFSU (Enhanced Fast Software Upgrade) which allows you to upgrade the IOS version without any downtime. In this tutorial I will be using two Cisco Catalyst 6504 switches with 720-10G VSS supervisors to show you how to configure VSS and verify that it’s working. Right now I have two 6500s that are running in “standalone”. In order to bond these two using VSS we will have to do the following:  Configure a virtual switch domain on both switches and configure one switch as “switch 1″ and the other one as “switch 2″.  Configure the virtual switch links.  Execute the conversion command which will reboot the switches. Before we configure anything let’s verify what modules my 6500s have and see if they are running the same IOS or not! Verification We should start by taking a look at the modules in our 6500s and the IOS versions that we are using, just to be sure that we use supported hardware and software. SW1-VSS#show module Mod Ports Card Type Model Serial No. --- ----- -------------------------------------- ------------------ ----------1 5 Supervisor Engine 2T 10GE w/ CTS (Acti VS-SUP2T-10G SAL11111111 2 4 CEF720 4 port 10-Gigabit Ethernet WS-X6704-10GE SAL11111111 3 48 CEF720 48 port 10/100/1000mb Ethernet WS-X6748-GE-TX SAL11111111
  • 2. Mod MAC addresses Hw Fw Sw Status --- ---------------------------------- ------ ------------ ------------ ------1 588d.09e6.d0b9 to 588d.09e6.d0c0 1.3 12.2(50r)SYS 15.0(1)SY2 Ok 2 001a.a10e.833c to 001a.a10e.833f 2.5 12.2(14r)S5 15.0(1)SY2 Ok 3 0002.fcc1.1bd0 to 0002.fcc1.1bff 1.2 12.2(14r)S5 15.0(1)SY2 Ok Mod Sub-Module Model Serial Hw Status ---- --------------------------- ------------------ ----------- ------- ------1 Policy Feature Card 4 VS-F6K-PFC4 SAL11111111 1.2 Ok 1 CPU Daughterboard VS-F6K-MSFC5 SAL11111111 1.4 Ok 2 Centralized Forwarding Card WS-F6700-CFC SAD11111111 3.1 Ok 3 Centralized Forwarding Card WS-F6700-CFC SAD11111111 1.1 Ok Mod Online Diag Status ---- ------------------1 Pass 2 Pass 3 Pass And this is what switch 2 looks like: SW2-VSS#show module *Aug 13 18:37:25.727: %SYS-5-CONFIG_I: Configured from console by console Mod Ports Card Type Model Serial No. --- ----- -------------------------------------- ------------------ ----------1 5 Supervisor Engine 2T 10GE w/ CTS (Acti VS-SUP2T-10G SAL22222222 2 4 CEF720 4 port 10-Gigabit Ethernet WS-X6704-10GE SAL22222222 3 48 CEF720 48 port 10/100/1000mb Ethernet WS-X6748-GE-TX SAD22222222 Mod MAC addresses Hw Fw Sw Status --- ---------------------------------- ------ ------------ ------------ ------1 588d.09e6.cc7d to 588d.09e6.cc84 1.3 12.2(50r)SYS 15.0(1)SY1 Ok 2 001a.6c68.73e0 to 001a.6c68.73e3 2.5 12.2(14r)S5 15.0(1)SY1 Ok 3 000d.6551.041a to 000d.6551.0449 1.2 12.2(14r)S5 15.0(1)SY1 Ok
  • 3. Mod Sub-Module Model Serial Hw Status ---- --------------------------- ------------------ ----------- ------- ------1 Policy Feature Card 4 VS-F6K-PFC4 SAL22222222 1.2 Ok 1 CPU Daughterboard VS-F6K-MSFC5 SAL22222222 1.4 Ok 2 Centralized Forwarding Card WS-F6700-CFC SAL22222222 3.1 Ok 3 Centralized Forwarding Card WS-F6700-CFC SAD22222222 1.1 Ok Mod Online Diag Status ---- ------------------1 Pass 2 Pass 3 Pass Both switches have the VS-SUP2T-10G supervisor that we will use for VSS. Let’s also check the IOS version: SW1-VSS#show version Cisco IOS Software, s2t54 Software (s2t54-ADVENTERPRISEK9-M), Version 15.0(1)SY2, RELEASE SOFTWARE (fc4) Technical Support: http://www.cisco.com/techsupport sw2: SW2-VSS#show version Cisco IOS Software, s2t54 Software (s2t54-ADVENTERPRISEK9-M), Version 15.0(1)SY2, RELEASE SOFTWARE (fc4) Technical Support: http://www.cisco.com/techsupport Both switches are running IOS 15.0(1)SY2 so it’s looking good. Now we can move on to the configuration. Configure Virtual Switch Domain Configuring the virtual switch domain is nothing more but grouping the two switches using an ID. This ID can be a value between 1 and 255 and has to be the same on both switches. Here’s what it looks like: I have two 6500s, one called “SW1-VSS” and the other one is called “SW2-VSS”. I will configure them both to use virtual switch domain 1. Let’s configure the virtual switch domain ID and switch numbers: SW1-VSS(config)#switch virtual domain 1 Domain ID 1 config will take effect only after the exec command 'switch convert mode virtual' is issued
  • 4. SW1-VSS(config-vs-domain)#switch 1 SW2-VSS(config)#switch virtual domain 1 Domain ID 1 config will take effect only after the exec command 'switch convert mode virtual' is issued SW2-VSS(config-vs-domain)#switch 2 Both switches are configured to use virtual domain 1, SW1-VSS has been configured as “switch 1″ and SW2-VSS as “switch 2″. The next step is to assign a priority to determine what switch will become active or standby. SW1-VSS(config-vs-domain)#switch 1 priority 110 SW1-VSS(config-vs-domain)#switch 2 priority 100 SW2-VSS(config-vs-domain)#switch 1 priority 110 SW2-VSS(config-vs-domain)#switch 2 priority 100 The higher the priority the more likely you will become the active switch. Switch 1 will have a priority of 110 and switch 2 a priority of 100. This means SW1-VSS will become the active switch. Configure Virtual Switch Link The virtual switch link is used to exchange configuration and stateful information between the two physical switches. You can use a single physical interface for VSL or create an etherchannel for redundancy. VSL will add a “virtual switch header” on each frame when it is sent on this link, basically it looks like this: Not all interfaces are supported for VSL. In my example I’m using the Ten Gigabit interfaces on the Supervisors. To make sure we have redundancy I’ll create an etherchannel using the Ten 1/4 and Ten 1/5 interfaces on the 6500s: SW1-VSS(config)#interface port-channel 1 SW1-VSS(config-if)#no shutdown SW1-VSS(config-if)#switch virtual link 1 SW1-VSS(config-if)#exit SW1-VSS(config)#int range ten 1/4 - 5 SW1-VSS(config-if-range)#channel-group 1 mode on SW1-VSS(config-if-range)#no shut SW2-VSS(config)#interface port-channel 2 SW2-VSS(config-if)#no shutdown SW2-VSS(config-if)#switch virtual link 2 SW2-VSS(config-if)#exit SW2-VSS(config)#int range ten 1/4 - 5 SW2-VSS(config-if-range)#channel-group 2 mode on SW2-VSS(config-if-range)#no shutdown As you can see above we have a basic etherchannel configuration but I used
  • 5. the switch vrtual link command to tell the switch that the etherchannel is a VSL interface. Let’s verify that our etherchannel is working between the two switches: SW1-VSS#show etherchannel summary | incl Po1 1 Po1(RU) Te1/4(P) Te1/5(P) SW2-VSS#show etherchannel summary | incl Po2 2 Po2(RU) Te1/4(P) Te1/5(P) We are now ready to convert the 6500s to VSS. Execute Conversion The final step in configuring VSS is to execute the conversion. Once we do this the switches will reload and 3 things will happen:  The configurations of both switches will be merged into a single configuration.  The interface numbers will be renumbered from slot/port to switch-number/slot/port.  Negotiation to determine which switch is active or standby. This is how we execute the conversion: SW1-VSS#switch convert mode virtual This command will convert all interface names to naming convention "interface-type switch-number/slot/port", save the running config to startup-config and reload the switch. NOTE: Make sure to configure one or more dual-active detection methods once the conversion is complete and the switches have come up in VSS mode. Do you want to proceed? [yes/no]: yes Converting interface names Building configuration... SW2-VSS#switch convert mode virtual This command will convert all interface names to naming convention "interface-type switch-number/slot/port", save the running config to startup-config and reload the switch. NOTE: Make sure to configure one or more dual-active detection methods once the conversion is complete and the switches have come up in VSS mode. Do you want to proceed? [yes/no]: yes Converting interface names
  • 6. Building configuration... The switches will now reboot and you will see this on the console: SW1-VSS# System detected Virtual Switch configuration... Interface TenGigabitEthernet 1/1/4 is member of PortChannel 1 Interface TenGigabitEthernet 1/1/5 is member of PortChannel 1 SW2-VSS# System detected Virtual Switch configuration... Interface TenGigabitEthernet 2/1/4 is member of PortChannel 2 Interface TenGigabitEthernet 2/1/5 is member of PortChannel 2 And you will see the negotiation between active and standby: SW1-VSS# %PFREDUN-6-ACTIVE: Initializing as ACTIVE processor for this switch %VSL_BRINGUP-6-MODULE_UP: VSL module in slot 1 switch 1 brought up %VSLP-5-RRP_ROLE_RESOLVED: Role resolved as ACTIVE by VSLP %VSL-5-VSL_CNTRL_LINK: New VSL Control Link 1/1/4 SW2-VSS# %PFREDUN-6-ACTIVE: Initializing as ACTIVE processor for this switch %VSL_BRINGUP-6-MODULE_UP: VSL module in slot 1 switch 2 brought up %VSLP-5-RRP_ROLE_RESOLVED: Role resolved as STANDBY by VSLP %VSL-5-VSL_CNTRL_LINK: New VSL Control Link 2/1/4 The two switches rebooted and during the boot process the switches will detect which interfaces are used for the virtual switch link. The switches will then negotiate on the VSL to see which one becomes active or standby. As expected SW1-VSS is the active switch. After booting you’ll see that the console of SW2-VSS is no longer responding, we can’t use it anymore for configuration. All configurations have to be done from the active switch now. VSS is now up and running! Since the two switches have bonded to become one logical switch, it’s best to create a new hostname: SW1-VSS(config)#hostname SW-VSS I’ll call it “SW-VSS”. We are now done with the configuration but it’s a good idea to verify our configuration.
  • 7. Verification The active switch is used to control both switches so some commands have been changed. For example “show run” can now be used to check the running configuration from both switches: SW-VSS#show run switch 1 Building configuration... Current configuration : 4283 bytes ! [output omitted] SW-VSS#show run switch 2 Building configuration... Current configuration : 4223 bytes ! [output omitted] By adding “switch <id>” you can check the running configuration from switch 1 or 2. There’s also some special VSS commands that we can use: SW-VSS#show switch virtual Switch mode : Virtual Switch Virtual switch domain number : 1 Local switch number :1 Local switch operational role: Virtual Switch Active Peer switch number :2 Peer switch operational role : Virtual Switch Standby The show switch virtual command tells us that this switch is active and the other one is standby. We can also take a closer look at the VSL: SW-VSS#show switch virtual link VSL Status : UP VSL Uptime : 28 minutes VSL SCP Ping : Pass VSL ICC Ping : Pass VSL Control Link : Te1/1/4 VSL Encryption : Configured Mode - Off, Operational Mode - Off This is how you can check the VSL etherchannel: SW-VSS#show interfaces vsl VSL Port-channel: Po1 Port: Te1/1/4 Port: Te1/1/5
  • 8. And there’s a useful command that gives you more information about the switch roles and priorities: SW-VSS#show switch virtual role RRP information for Instance 1 -------------------------------------------------------------------Valid Flags Peer Preferred Reserved Count Peer Peer -------------------------------------------------------------------TRUE V 1 1 1 Switch Switch Status Priority Role Local Remote Number Oper(Conf) SID SID -------------------------------------------------------------------LOCAL 1 UP 110(110) ACTIVE 0 0 REMOTE 2 UP 100(100) STANDBY 2921 12 Peer 0 represents the local switch Flags : V - Valid In dual-active recovery mode: No That’s all for now. I hope this has been helpful to understand configure VSS. If you have any questions feel free to leave a comment! More Cisco Switch Reviews, Tips and Guides you can see http://blog.router-switch.com/category/reviews/cisco-switches/