cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2507
Views
20
Helpful
5
Replies

UDLD and vPC Good Mix?

Patrick McHenry
Level 3
Level 3

Hey,

 

If UDLD is configured to detect when a link is still up, but for whatever reason BPDUs have stopped, what use is configuring it on links that are connected to a vPC? Can a VPC configuration still benefit from UDLD?

Note: we've installed a 3850 stack with 2, 10G interfaces configured as a 20G port-channel. 1, 10G connecting to 1 Nexus core 5500 and 1, 10G connecting to the other Nexus core 5500.

We've configured a vPC so both 3850 trunks are forwarding.

 

Thanks - Pat

5 Replies 5

Reza Sharifi
Hall of Fame
Hall of Fame

Pat,

UDLD is designed to detect issues with physical fiber links.

have a look at this document on VPC design and look for:

Best Practices for Unidirectional Link Detection Interoperability

http://www.cisco.com/c/dam/en/us/td/docs/switches/datacenter/sw/design/vpc_design/vpc_best_practices_design_guide.pdf

HTH

Thanks Guys for the info -.

 

Is there any danger in enabling UDLD on the Nexus's?

 

Could anything be negatively effected like FCoE?

 

I noticed that I couldn't enable UDLD on the Nexus. I have to enable the feature - then, I suppose I will be able to enable it or will it be enabled once I enable the feature?

 

Thanks, Pat

 

 

Pat,

On nexus you have to enable the feature first than UDLD. UDLD will not be enabled if you just turn on the feature. So, you need both.

Enabling UDLD on Nexus should not be an issue.

HTH

Reza

UDLD is a sort of protection as already mentioned, so no danger at all and would not have any negativity as long as you have functional cables.
If you enable UDLD feature, it will be enabled on all the fiber ports globally and disabled on all non-fiber ports, if you want to enable it for non-fiber ports as well, you would still be able to do that by going into the interface config mode.

Regards,

Aref

Hi Patrick,

UDLD (UniDirectional Link Detection) would not detect any BPDUs, instead it operates at L2 and uses echo messages to detect a hardware (cabling) failure on the link typically for fiber, but it would also work with UTP cables. When UDLD echo messages are not received for the period set in timer the port that not receive those echos would be put in err-disabled state if the UDLD has been enabled in aggressive mode, instead in normal mode the port would be put in undeterminded state. UDLD should be configured on both ends ports, and for fiber ports it would be enabled in config mode, but for non-fiber ports it would be enabled in interface config mode. If an interface goes in err-disabled due the UDLD failure, there is no automatic system to bring it back up unless you use err-disable recovery mechanism, you would still be able to bring it back manually by issuing the command "udld reset" or by shut+no shut the interface. Finally, Cisco recommends to enable both UDLD and Loopguard together, please keep in mind that Loopguard would detect the software issues that may cause STP failure, but not for hardware (cabling) issues, and it has to be enabled on all root and alternate ports, it also has an automatic recovery mechanism to put back a port in normal state once PBDUs are sent back on that port.

Regards,

Aref

Review Cisco Networking products for a $25 gift card