CONNECTED TWO 3508'S TOGETHER USING GIGABIT ETHERCHANNEL, APPLIED THE PORT GROUP COMMAND. WITHIN TWENTY MINUTES, THE ENTIRE LAN (25 SWITCHES, 550 WORKSTATIONS) HAD SHUT DOWN. WHAT HAPPENED? HAD TO RECONNECT THE FIBER TO UNUSED PORTS THAT WERE NOT CONFIGURED FOR PORT GROUPING TO BRING THE NETWORK BACK UP.
NEED ADVICE ON THE PITFALLS AND "GOTCHA'S" OF PORT GROUPING.
If you are describing a network outage due to traffic storm then it's possible that the channel was misconfigured and caused a spanning tree loop. Are you doing channel and trunking? Or are these links for a single vlan? Was removing the fiber links and reconnecting them the only actions taken to resolve? That is, you removed only this new channel's fiber links (breaking a possible loop) and placed them in new access ports and all was well? If so, check your configs and spanning tree topology for any issues.
Remember for port channeling partner links on the same chassis and peer must match physical characteristics and software configuration. That is, if you have an interface hard coded for 100/Full then it's parter on the same chassis must have same settings and capability. The other device you are channeling to must also have same configuration. If one port is configured for trunking in the channel then all ports of the channel must be configured for trunking.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...