Hi all. I have been trying to establish a etherchannel between a Cisco 6500 switch and a Solaris 10 server over it's 2 gigabit ports but without much luck.
The thing is that when I configure everything I can see the etherchannel go up but the problem is that I can ping the server from server VLAN and the server can ping only inside server VLAN and not outside it. If I try to ping from outside the VLAN and vice versa I get time outs. I can still ping all the other servers in the server VLAN from other VLAN's.
I'm attaching the relevant parts of the config so maybe someone can see something that I'm missing.
We found the problem in the configuration of the server. It seems that the Solaris server by default assigns subnet masks to the interface according to the class.
In our case our server had the IP address 10.64.12.101 and the server automatically assigned 255.0.0.0 mask. If that isn't enough it also added a route to 10.0.0.0 network(where all our other VLANs are) to the routing table but set the gateway to 10.4.0.51(the 2nd route from the previous post). On top of all that when you reboot the server it doesn't remember the subnet mask you entered on the interface but reverts to the default setting I explained and you have to write the IP manually all over again. Thanks for all your help.
BTW is there some way to test load balancing across the etherchannel?
And what about the encapsulation line of the etherchannel? Any idea about that?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...