I have one 6500 at site "a" connected to two 4948's and those two 4948's are connected via fiber to two more 4948's that are connected to another 6500 at site "b". The two connections between the 4948's are at layer two. I have GLBP up and I see the vlans as up. I have set priority for some of the vlans on site "a" and the others to be primary at site "b" and it seems to be working but when I run a "sh glbp brief" on each 6500 I guess I expected the output to be the same but just reversed (for each 6500.
Can you please explain to me why the output is not the same (meaning not just reversed?).
I would have expected it to be presented that way and am not sure why it isn't.
Using the description I have given where the two 4948's on each site are connected via fiber at layer two to the other two 4948's (Wow that's a mouth full)... Should I expect to see any spanning-tree issues?
It was mentioned to me that I would have possible spanning-tree issues but I didn't see anything amiss...
I need to see you configuration for GLBP and spanning tree but GLBP cannot create Spanning tree problem. If you are configure it correctly. Base on your show glbp br you GLBP should be healthy. Check sh logg to see, they change active and passive a lot if they do then maybe you have issue. some useful commands are debug glbp error and debug glbp event
For spanning tree you should control your spanning tree and you are the one chose your primary root.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...