I am trying to Loab Balance traffic to the 2 x IDSM using Etherchannel and can only do this when both IDSMs are in a single chassis, I check some Cisco sites which highlighted that this can only be done like this. however I need this to run accross the chassis and take advantage of the VSS and have box level redundancy as well. Can you please advice if this fetaure will be released soon and or if there is any information available on this.
The IOS version on the Sup is 12.2(33)SXI1
The IOS version on the IDSM is 6.0.3
The information that got was from the following website:
By just making inline vlan pairs and bridging all traffic through the IDSM(s) before reaching the default gateway (FWSM or MSFC), you should get this to work. There is no stateful replication in the IDSM anyway. So both modules act independently in any case.
User VLAN 101 >> IDSM Pair 101 >> 701 >> SVI ON FWSM 701
But the documentation is not very clear, your link suggests what you want to do should be doable, But this other link reads:
"EtherChannel load balancing (ECLB) is notsupported between an IDSM-2 in the active chassis and an IDSM-2 in thestandby chassis."
First of all I appreciate your reply on my case. I know that ECLB is not supported with one IDSM on the Active Chassis and one IDSM on the Standby in a VSS setup. What I want to know if Cisco is working on a solution to this as it only makes sense to fully utilise the VSS capability then to have 2 IDSM one chassis and doing ECLB on that.
I need to know which IOS will support this in future and when is the release date.
Thanks for the support. I have done the escalation within Cisco but am just getting the response as "The scenario we are looking for is not going to be supported in the near future".
I was hoping someone (especially from Cisco) might have an answer on this forum. As it is only logical to take the full advantage of VSS by having the 2 IDSM on each chassis and being able to do ECLB on them.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :