Does anyone know if it is possible to use uplinkfast in a switch configuration other than the 'delta' type always shown in the Cisco documentation?
I have 4 switches, 2 core (6506+msfc2 running hybrid) and 2 server access (5500 w/Sup3). They are connected in a U configuration - 1 link from 1st core to 1st access, 2 links between 1st and 2nd access switches and another 1 to second core switch. One of the links between the access switches blocks because the links are on different modules and Cat55XX can't port channel.
I'd like to use uplinkfast on the access switches to allow the blocking link to forward soon after the forwarding link fails (to avoid HSRP problems) but have been told this may result in network unstability. Any thoughts?
Re: Uplinkfast in 'non-delta' switch configuration
The topology looks like this:
(where *** means nothing)
there is no layer 2 connection between the core switches (only a layer 3 connection - the core 'switches' are primarily routers)
The reason citied for uplinkfast possibly causing network unstability was that in this configuration, when the blocking link goes forwarding the switch has to flood it's CAM table over the newly forwarding link to the neighbouring switch e.g. A2 sends all it's mac addresses to A1. I have been told that the access switch A1 could meltdown by having to accept all these mac addresses it already knows on the 'old' port on the newly forwarding port.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...