Tag: NX-OS

Port-Channel in NX-OS: Let’s Bundle Up!

I am pretty exhausted after having a great NYE. It’s the third week of January but it feels like I need six months of hibernation after 1 night of celebration. If you are feeling the same way, well, we definitely meet up because we’re a good fit for each other. We’re compatible! Let’s be friends!


The topic I like to discuss today is about port-channel in Nexus. Port-channel bundles physical links to form one logical link by using the channel group that provides aggregated bandwidth and redundancy. On the M-series module, you can bundle up 8 physical links but with the release of Cisco NX-OS 5.1, you can bundle up to 16 ports on the F series module. The Port-channel feature does not need a license in order for you to use it. However, since you are going to use VDCs, you need to have the Advanced Services license. This need to be installed before you configure ports within the VDC. Make sure that all member ports are in the same VDC. You can have them configured in any desired VDC but if you are going to configure the load balancing, you must do it in the default VDC. (more…)

VLAN Trunking Protocol (VTP) in Nexus NX-OS – Slight Difference with IOS

VLAN Trunking Protocol (VTP) is also available in Nexus NX-OS. The creation, modification and deletion of VLAN are easy with the use of VTP. Like in the Cisco Catalyst switches, the configuration is just the same. There is not much difference when configuring it but there are some few things to take note. These things make it unlikeable to deploy VTP in a data center environment.

Firstly, let’s discuss VTP version 3. Do you recall what is VTP version 3? Ok, this is the 3rd version of VTP. So what’s the difference with this new version compare to old versions? VTP version 1 and 2 only support a normal range of VLANs from 1 – 1005 but VTP version 3 expands the VLAN range up to 4094. Yes, it is supporting the entire VLAN range! It also supports enhanced authentication where you can configure the password as hidden or secret. VTP version 3 also supports MST and transfer information of private VLANs. Not only that, there is primary server and secondary server concept here where the primary server is responsible for updating and sending updates to VLANs while secondary server serves as a backup. Interesting right? However, in Cisco NX-OS there is no VTP version 3. Yeah, after giving you a lot of exciting features, you cannot use it in Nexus. (more…)