We are having a cosmetic problem with a etherchannel connecting 2 Cisco 6500, via 2 gigabit interfaces in each side. The link is okay and is it working fine, is more a cosmetic problem. The devices are directly connected and when we do a "show interfaces" we get the following:
SWITCH 1 SWITCH 2
_ Port channel X _ Port channel Y
4459995 packets input 5038640 packets input
2396802 packets output9470937 packets output
_ Interface Giga X/1 _ Interface Giga Y/1
3980467 packets input 1930376 packets input
1938976 packets output3963757 packets output
_ Interface Giga X/2 _ Interface Giga Y/2
7173942 packets input3989266 packets input
3989205 packets output7172782 packets output
As you can see there the packet counters in the interfaces that form the Etherchannel are alright:
The total of the input packets in SWITCH 1 interface X/1 and X/2 are similar to the total of the output packets in SWITCH 2 interface Y/1 and Y/2 and the total of the output packets in SWITCH 1 interface X/1 and X/2 are similar to the total of the input packets in SWITCH 2 interface Y/1 and Y/2.
The problem is with Port-channel counters:
_ First, the input/output packets is not the total of its interfaces input/output packets
_ Second one, input/putput packets of Port-channel X of SWITCH 1 does not coincide with output/input packets of Port-channel Y of SWITCH 2
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...