we currently have 1 x 10Gb link connecting 2 data centres. We will be deploying the second 10Gb link. How do we configure the switch to enable the new 10Gb to carry all traffic while the first 10Gb will only be used if the new 10Gb link fails.
This will form automatically according to your spanning tree configuration between switches. But I suggest not to make a 10Gb link wait and stay unutilized untill the primary goes down. Implement etherchannel instead. You will have redundancy as well as improved bandwidth (2x 10 Gb).
Thanks very much for the reply. We just wanted to test the new 10Gb for a week before having both the 10GB live. I understand that which link will be used is depending on the spanning-tree configuration.
Having just 1 10Gb active is just temporary for a week. Can you please advice how it can be achieved?
If both switches are Cisco, STP (Spanning tree) is enabled by default. And if two switches connected each other with two uplinks, one will automatically be set to blocking state by the nature of STP. If the fowarding one fails, blocking port will change its state to forwarding within 50 seconds. So you dont need special configuration.
One thing to keep in mind, If these datacenters do have their own STP instances locally, introducing other datacenter into this L2 network may extend the STP tree in an undesired way. So double-check your STP planning
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...