I have been looking at the Cisco Hardware docs and I can't find anything on the proper way to setup a 2 switch stack for Stackwise redundancy and Stackpower redundancy. Everything details 3 or more switches. Does anyone have some insight?
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Crossovers (sw1 port 1 to sw2 port 2 and sw 1 port 2 to sw 2 port 1) are probably more common, but at least for StackWise, it will also work sw 1 port 1 to sw 2 port 1 and sw 1 port 2 to sw 2 port 2. I think StackPower doesn't really care either, as long as you complete one or both rings.
BTW, StackPower has limitations to how much amperage can flow through the power cables. You need to take into account maximum power draw per switch and where you place power supplies. This gets a little tricky when you consider a power supply failure.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...