This document provides information about configuring Cisco StackWise Virtual, which allows two physical Cisco switches to operate as a single logical switch. It discusses prerequisites, restrictions, and features of StackWise Virtual. Key points include that StackWise Virtual uses a virtual link over 10G or 40G Ethernet to connect switches, supports stateful switchover redundancy, and allows configuration of multichassis EtherChannels across stack members.
Cisco stack power technology for cisco catalyst 3850 switchesIT Tech
Cisco StackPower technology allows switches to share power as a common resource. Up to four switches can be connected in a power stack using special cables to aggregate all available power. This allows oversubscribed switches to draw power from others in the stack. Switches discover available power and boot up based on allocated budgets. Zero-footprint redundancy is possible as redundant power is already available within the stack.
This document provides instructions for installing or upgrading Oracle Governance, Risk and Compliance Controls (GRCC) release 8.6.0. It outlines prerequisites including supported operating systems and required software. The steps include downloading files, performing the installation, configuring global users and datasources, and installing additional components for specific applications. Additional chapters provide instructions for installing Preventive Enforcement Agents for Oracle and PeopleSoft applications.
SkySQL implements a groundbreaking, state-of-the-art architecture based on Kubernetes and ServiceNow, and with a strong emphasis on cloud security – using compartmentalization and indirect access to secure and protect customer databases.
In this session, we’ll walk through the architecture of SkySQL and discuss how MariaDB leverages an advanced Kubernetes operator and powerful ServiceNow configuration/workflow management to deploy and manage databases on cloud infrastructure.
Cisco catalyst 3850 series switches datasheet3Anetwork com
The Cisco Catalyst 3850 Series is a next generation stackable access switch that provides converged wired and wireless networking capabilities. It uses Cisco's new UADP ASIC to enable unified policy enforcement and application optimization across wired and wireless connections. Key features include integrated wireless controller functionality, PoE+ and UPOE, modular uplink and power supply options, and Cisco StackPower for power redundancy.
Overview on cisco catalyst 3750 switches,features, technology, intelligent sw...IT Tech
The document provides an overview of the Cisco Catalyst 3750 switch. It describes the key features of the switch including its stacking capabilities, support for Fast Ethernet and Gigabit Ethernet, and software images. It also discusses the switch's role in providing intelligent services, network management, and security features to medium and large enterprise networks.
VMware vSphere 6.0 - Troubleshooting Training - Day 3 Sanjeev Kumar
The document discusses vSphere networking and distributed switches. It describes the benefits of distributed switches over standard switches, such as simplifying administration and enabling features like private VLANs and port mirroring. It explains how to create and manage distributed switches and port groups, assign physical NICs and virtual machines, and configure properties and advanced features. Troubleshooting tips are provided for issues with virtual machine communication across distributed switch ports.
Cisco stack power technology for cisco catalyst 3850 switchesIT Tech
Cisco StackPower technology allows switches to share power as a common resource. Up to four switches can be connected in a power stack using special cables to aggregate all available power. This allows oversubscribed switches to draw power from others in the stack. Switches discover available power and boot up based on allocated budgets. Zero-footprint redundancy is possible as redundant power is already available within the stack.
This document provides instructions for installing or upgrading Oracle Governance, Risk and Compliance Controls (GRCC) release 8.6.0. It outlines prerequisites including supported operating systems and required software. The steps include downloading files, performing the installation, configuring global users and datasources, and installing additional components for specific applications. Additional chapters provide instructions for installing Preventive Enforcement Agents for Oracle and PeopleSoft applications.
SkySQL implements a groundbreaking, state-of-the-art architecture based on Kubernetes and ServiceNow, and with a strong emphasis on cloud security – using compartmentalization and indirect access to secure and protect customer databases.
In this session, we’ll walk through the architecture of SkySQL and discuss how MariaDB leverages an advanced Kubernetes operator and powerful ServiceNow configuration/workflow management to deploy and manage databases on cloud infrastructure.
Cisco catalyst 3850 series switches datasheet3Anetwork com
The Cisco Catalyst 3850 Series is a next generation stackable access switch that provides converged wired and wireless networking capabilities. It uses Cisco's new UADP ASIC to enable unified policy enforcement and application optimization across wired and wireless connections. Key features include integrated wireless controller functionality, PoE+ and UPOE, modular uplink and power supply options, and Cisco StackPower for power redundancy.
Overview on cisco catalyst 3750 switches,features, technology, intelligent sw...IT Tech
The document provides an overview of the Cisco Catalyst 3750 switch. It describes the key features of the switch including its stacking capabilities, support for Fast Ethernet and Gigabit Ethernet, and software images. It also discusses the switch's role in providing intelligent services, network management, and security features to medium and large enterprise networks.
VMware vSphere 6.0 - Troubleshooting Training - Day 3 Sanjeev Kumar
The document discusses vSphere networking and distributed switches. It describes the benefits of distributed switches over standard switches, such as simplifying administration and enabling features like private VLANs and port mirroring. It explains how to create and manage distributed switches and port groups, assign physical NICs and virtual machines, and configure properties and advanced features. Troubleshooting tips are provided for issues with virtual machine communication across distributed switch ports.
The document provides an introduction to VMware vSphere distributed switches. It lists the benefits of distributed switches over standard switches, describes the distributed switch architecture, and discusses how to create, manage, and configure distributed switches and their properties. It also covers topics like distributed port groups, VMkernel networking, NetFlow, private VLANs, and troubleshooting distributed switch issues.
Creating ethernet vla ns on catalyst switchesabeforu
Creating Ethernet VLANs on Catalyst Switches
1. Define a VTP domain name to configure the VLAN Trunking Protocol settings before creating VLANs. 2. Create VLANs using the "set vlan" command and verify the VLAN configuration using "show vlan". 3. Assign switch ports to VLANs using "set vlan vlan_number mod/ports" to associate the ports with the VLAN.
VLANs logically segment networks based on functions or projects regardless of physical connections. This document defines VLANs, lists benefits like improved security and easier network changes, and explains how VLANs create broadcast domains separated by routers. It also covers configuring static VLANs on Catalyst switches by assigning ports to VLANs, creating VLANs, and verifying configurations with commands like show vlan. Dynamic VLANs assign membership based on device MAC addresses.
The document discusses campus network architecture and VLAN implementation. It covers implementing VLANs and trunks in a campus environment, including the differences between end-to-end and local VLAN models. It also discusses configuring and verifying VLANs and trunks, such as creating VLANs, assigning access ports, and configuring trunk ports between switches. Best practices are provided such as using IEEE 802.1Q trunking and limiting the number of VLANs per switch.
vPC techonology for full ha from dc core to baremetel server.Ajeet Singh
This document discusses a data center network design using Cisco Nexus switches in a leaf-spine topology with virtual port channels (vPCs) between the core, aggregation, and access layers for high availability. It includes configuration details for Cisco Nexus 5000 and 9500 series switches in the core and access layers with Cisco Nexus 2000 Fabric Extenders providing top-of-rack connectivity to bare-metal servers. vPCs are configured between the core switches, down to the access switches, and to the server ports for redundancy and load distribution.
VMware vSphere 6.0 - Troubleshooting Training - Day 2Sanjeev Kumar
This document provides an introduction to virtual networking in VMware vSphere, including:
- Types of virtual switch connections like virtual machine port groups and VMkernel ports
- Standard switches that provide networking for VMs on a single host
- Components of standard switches like port groups and VLANs
- Configuring security, traffic shaping, and NIC teaming policies for port groups
- Methods for load balancing, failure detection, and failover in a standard switch environment
The document provides an overview of virtual networking concepts in VMware vSphere, including:
- Types of virtual switch connections like virtual machine port groups and VMkernel ports
- Standard switches and distributed switches
- VLAN configurations and tagging
- Network adapter and switch port policies for security, traffic shaping, and failover
- Troubleshooting tools like ESXCLI, TCPDUMP and networking commands
Layer 2 switching provides four key advantages: hardware-based bridging at wire speed and low latency and cost. Layer 2 switches perform three main functions: address learning, forward/filter decisions using the MAC address table, and loop avoidance using the Spanning Tree Protocol. Configuring Layer 2 switches involves setting the hostname, enable secret password, interface descriptions, VLANs, trunking, and protocols like VTP for consistent VLAN configuration across switches in the same management domain.
This chapter discusses how switches and routers forward network traffic. It covers Layer 2 forwarding using MAC addresses on switches and Layer 3 forwarding using IP addresses on routers. The chapter examines common forwarding mechanisms like MAC address tables, VLANs, trunking, and allowed VLANs. It describes how switches build MAC tables to reduce flooding and how routers use IP forwarding tables to send packets to their destination.
This chapter discusses high availability features in Cisco switches including StackWise, Virtual Switching System (VSS), and supervisor redundancy. StackWise allows switches to be grouped into a single logical switch for configuration and management. VSS combines two physical switches into one virtual switch. Redundant supervisor modules and protocols like Stateful Switchover (SSO) provide continuity of operations during supervisor failures.
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
This document discusses VLANs and trunking. It covers VLAN segmentation and implementation, including assigning ports to VLANs, configuring trunk ports, and troubleshooting VLAN and trunking issues. It also addresses VLAN security concerns like spoofing attacks and mitigation techniques like private VLANs. The document provides best practices for VLAN design such as separating management and user traffic into different VLANs.
Subnetting Properly subnet addressing blocks to accommodate the sit.pdfebrahimbadushata00
Subnetting: Properly subnet addressing blocks to accommodate the site\'s VLAN sizes. You will
not need to implement VLANs here; rather, you will create the correct sizing to properly
accommodate the devices stated per the xACME educational topology. Carefully consider the
challenges faced when structuring subnets too large and/or too small during your design. The
starting Worchester site addressing range is 10.20.0.0 /16 (per the xACME educational topology
diagram). Formatting per subnet should follow the format below and should be clearly stated and
placed within a table.
NetID
mask/CIDR values
broadcast
usable range
No additional device configurations required to complete
Existing VLANs
-
Remote locations vary in terms of size and requirements. Some implementations will require
current site router/switch-running configurations, which will be provided. All sites will use the
following four VLANs, but you will need to configure only what is asked per site (some
assumptions will be made).
Existing VLANs, per xACME:Faculty VLAN
used by faculty on-site for all office locations (non-instructional communications)
total devices per site will vary
Administrative VLAN
used by staff on-site for business administrative communications
total devices per site will vary
Academic VLAN
used by faculty and students for classroom labs and instructional communications
total devices per site will vary
Server VLAN
used by IT staff for all technology/management communications
total devices per site will vary
The types of devices per site will be the same; however, the number of deployed devices may
vary (all documented in the xAcme educational topology).
Routers Per Site:
Switches Per Site:
Note:Device type will not impact your configuration commands and implementation of ALL
required technologies will use Cisco IOS commands/concepts learned in our TestOut lecture(s).
Standard switchports will be configured and used as trunk OR access ports, and DCE ends
should be noted when configuring serial ports per router.Cisco 2800 Series Integrated
ServicesInterfaces Ports Available4 Fast Ethernet Interfaces
(Per Router)2 Serial Interfaces
(Per Router)fa0/0s0/0/0fa0/1s0/0/1fa1/0fa1/1 Acme Educational Topology Public Address
Range 165.128.63.0 /26 Private Network 10.0.0.0 /8 Boston Site Administrative VLA structional
VLAN Device List 4 Devices 34 Devices Network 10.10.0.0 Switches: Catalyst 6500 Series
Server VLAN Faculty VLAN Devices 5 Devices 96 Gigabit Ports fa010 Mod 220 Total Hosts
Module 2.gl1j1 gl n Stub Area Module 3 gi2u1-g gi012 Boston, MA Module 4 31-g 3/24 Site
Router 2 Router 2800 Series Integrated Services Sacramento. SWTch1 Sacramento SWRch2 Sac
3 024 ta0A0 Pot Contuurations uper Router 4 Fast Ethernet erfaces Sacramento Site 010
Network 10.50.0.0 2- fa011 fa 100 42 Total Hosts 65.128.63. Stub Area Boston, 2 Serial
Interfaces Route Boston, MA Site Router 3 DCE Sacramento, CA 0.255.25 48 30 0,255 .252 130
Internet Faculty VLAN Worchester Site 21 Devices Network.
VLANs logically segment devices on the same physical network to improve security, performance and manageability. Trunks allow VLANs to extend across multiple switches by carrying traffic for all VLANs over a single link. This module explains how to configure VLANs and trunks on Cisco switches including creating VLANs, assigning ports, setting trunk modes and verifying configurations. Hands-on packet tracer activities and a lab are included to reinforce the concepts.
Chapter 3: Objectives
---------------------------------------------------
Explain the purpose of VLANs in a switched network.
Analyze how a switch forwards frames based on VLAN configuration in a multi-switched environment.
Configure a switch port to be assigned to a VLAN based on requirements.
Configure a trunk port on a LAN switch.
Configure Dynamic Trunk Protocol (DTP).
Troubleshoot VLAN and trunk configurations in a switched network.
Configure security features to mitigate attacks in a VLAN-segmented environment.
Explain security best practices for a VLAN-segmented environment.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
This document discusses VLANs and their implementation in Cisco switches. It covers VLAN segmentation and types of VLANs, how switches use 802.1Q tagging to identify VLAN traffic on trunk links between switches, and best practices for VLAN security and design including mitigating VLAN hopping and double-tagging attacks. Configuration topics include creating VLANs, assigning ports, configuring trunks, and troubleshooting. The objectives are to explain VLAN purposes, switch forwarding based on VLANs, and configure and secure VLAN environments.
Explain the purpose of VLANs in a switched network.
1) Analyze how a switch forwards frames based on VLAN configuration in a multi-switched environment.
2) Configure a switch port to be assigned to a VLAN based on requirements.
3) Configure a trunk port on a LAN switch.
4) Configure Dynamic Trunk Protocol (DTP).
5) Troubleshoot VLAN and trunk configurations in a switched network.
6) Configure security features to mitigate attacks in a VLAN-segmented environment.
7) Explain security best practices for a VLAN-segmented environment.
VLANs logically group users and resources together without being restricted by physical network segments. There are static and dynamic VLANs, with static VLAN port assignments always remaining fixed while dynamic VLANs are created through management software. Frame tagging allows VLANs to span multiple switches by uniquely assigning a VLAN ID to each frame. The VLAN Trunking Protocol (VTP) manages VLAN configurations across switches to provide benefits like consistent VLAN setup, accurate monitoring, and dynamic reporting of new VLANs. Configuring VLANs involves creating VLANs, assigning switch ports, configuring trunk ports between switches, and setting up inter-VLAN routing using subinterfaces on a router interface.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
More Related Content
Similar to configuring_cisco_stackwise_virtual.pdf
The document provides an introduction to VMware vSphere distributed switches. It lists the benefits of distributed switches over standard switches, describes the distributed switch architecture, and discusses how to create, manage, and configure distributed switches and their properties. It also covers topics like distributed port groups, VMkernel networking, NetFlow, private VLANs, and troubleshooting distributed switch issues.
Creating ethernet vla ns on catalyst switchesabeforu
Creating Ethernet VLANs on Catalyst Switches
1. Define a VTP domain name to configure the VLAN Trunking Protocol settings before creating VLANs. 2. Create VLANs using the "set vlan" command and verify the VLAN configuration using "show vlan". 3. Assign switch ports to VLANs using "set vlan vlan_number mod/ports" to associate the ports with the VLAN.
VLANs logically segment networks based on functions or projects regardless of physical connections. This document defines VLANs, lists benefits like improved security and easier network changes, and explains how VLANs create broadcast domains separated by routers. It also covers configuring static VLANs on Catalyst switches by assigning ports to VLANs, creating VLANs, and verifying configurations with commands like show vlan. Dynamic VLANs assign membership based on device MAC addresses.
The document discusses campus network architecture and VLAN implementation. It covers implementing VLANs and trunks in a campus environment, including the differences between end-to-end and local VLAN models. It also discusses configuring and verifying VLANs and trunks, such as creating VLANs, assigning access ports, and configuring trunk ports between switches. Best practices are provided such as using IEEE 802.1Q trunking and limiting the number of VLANs per switch.
vPC techonology for full ha from dc core to baremetel server.Ajeet Singh
This document discusses a data center network design using Cisco Nexus switches in a leaf-spine topology with virtual port channels (vPCs) between the core, aggregation, and access layers for high availability. It includes configuration details for Cisco Nexus 5000 and 9500 series switches in the core and access layers with Cisco Nexus 2000 Fabric Extenders providing top-of-rack connectivity to bare-metal servers. vPCs are configured between the core switches, down to the access switches, and to the server ports for redundancy and load distribution.
VMware vSphere 6.0 - Troubleshooting Training - Day 2Sanjeev Kumar
This document provides an introduction to virtual networking in VMware vSphere, including:
- Types of virtual switch connections like virtual machine port groups and VMkernel ports
- Standard switches that provide networking for VMs on a single host
- Components of standard switches like port groups and VLANs
- Configuring security, traffic shaping, and NIC teaming policies for port groups
- Methods for load balancing, failure detection, and failover in a standard switch environment
The document provides an overview of virtual networking concepts in VMware vSphere, including:
- Types of virtual switch connections like virtual machine port groups and VMkernel ports
- Standard switches and distributed switches
- VLAN configurations and tagging
- Network adapter and switch port policies for security, traffic shaping, and failover
- Troubleshooting tools like ESXCLI, TCPDUMP and networking commands
Layer 2 switching provides four key advantages: hardware-based bridging at wire speed and low latency and cost. Layer 2 switches perform three main functions: address learning, forward/filter decisions using the MAC address table, and loop avoidance using the Spanning Tree Protocol. Configuring Layer 2 switches involves setting the hostname, enable secret password, interface descriptions, VLANs, trunking, and protocols like VTP for consistent VLAN configuration across switches in the same management domain.
This chapter discusses how switches and routers forward network traffic. It covers Layer 2 forwarding using MAC addresses on switches and Layer 3 forwarding using IP addresses on routers. The chapter examines common forwarding mechanisms like MAC address tables, VLANs, trunking, and allowed VLANs. It describes how switches build MAC tables to reduce flooding and how routers use IP forwarding tables to send packets to their destination.
This chapter discusses high availability features in Cisco switches including StackWise, Virtual Switching System (VSS), and supervisor redundancy. StackWise allows switches to be grouped into a single logical switch for configuration and management. VSS combines two physical switches into one virtual switch. Redundant supervisor modules and protocols like Stateful Switchover (SSO) provide continuity of operations during supervisor failures.
CCNA 2 Routing and Switching v5.0 Chapter 3Nil Menon
This document discusses VLANs and trunking. It covers VLAN segmentation and implementation, including assigning ports to VLANs, configuring trunk ports, and troubleshooting VLAN and trunking issues. It also addresses VLAN security concerns like spoofing attacks and mitigation techniques like private VLANs. The document provides best practices for VLAN design such as separating management and user traffic into different VLANs.
Subnetting Properly subnet addressing blocks to accommodate the sit.pdfebrahimbadushata00
Subnetting: Properly subnet addressing blocks to accommodate the site\'s VLAN sizes. You will
not need to implement VLANs here; rather, you will create the correct sizing to properly
accommodate the devices stated per the xACME educational topology. Carefully consider the
challenges faced when structuring subnets too large and/or too small during your design. The
starting Worchester site addressing range is 10.20.0.0 /16 (per the xACME educational topology
diagram). Formatting per subnet should follow the format below and should be clearly stated and
placed within a table.
NetID
mask/CIDR values
broadcast
usable range
No additional device configurations required to complete
Existing VLANs
-
Remote locations vary in terms of size and requirements. Some implementations will require
current site router/switch-running configurations, which will be provided. All sites will use the
following four VLANs, but you will need to configure only what is asked per site (some
assumptions will be made).
Existing VLANs, per xACME:Faculty VLAN
used by faculty on-site for all office locations (non-instructional communications)
total devices per site will vary
Administrative VLAN
used by staff on-site for business administrative communications
total devices per site will vary
Academic VLAN
used by faculty and students for classroom labs and instructional communications
total devices per site will vary
Server VLAN
used by IT staff for all technology/management communications
total devices per site will vary
The types of devices per site will be the same; however, the number of deployed devices may
vary (all documented in the xAcme educational topology).
Routers Per Site:
Switches Per Site:
Note:Device type will not impact your configuration commands and implementation of ALL
required technologies will use Cisco IOS commands/concepts learned in our TestOut lecture(s).
Standard switchports will be configured and used as trunk OR access ports, and DCE ends
should be noted when configuring serial ports per router.Cisco 2800 Series Integrated
ServicesInterfaces Ports Available4 Fast Ethernet Interfaces
(Per Router)2 Serial Interfaces
(Per Router)fa0/0s0/0/0fa0/1s0/0/1fa1/0fa1/1 Acme Educational Topology Public Address
Range 165.128.63.0 /26 Private Network 10.0.0.0 /8 Boston Site Administrative VLA structional
VLAN Device List 4 Devices 34 Devices Network 10.10.0.0 Switches: Catalyst 6500 Series
Server VLAN Faculty VLAN Devices 5 Devices 96 Gigabit Ports fa010 Mod 220 Total Hosts
Module 2.gl1j1 gl n Stub Area Module 3 gi2u1-g gi012 Boston, MA Module 4 31-g 3/24 Site
Router 2 Router 2800 Series Integrated Services Sacramento. SWTch1 Sacramento SWRch2 Sac
3 024 ta0A0 Pot Contuurations uper Router 4 Fast Ethernet erfaces Sacramento Site 010
Network 10.50.0.0 2- fa011 fa 100 42 Total Hosts 65.128.63. Stub Area Boston, 2 Serial
Interfaces Route Boston, MA Site Router 3 DCE Sacramento, CA 0.255.25 48 30 0,255 .252 130
Internet Faculty VLAN Worchester Site 21 Devices Network.
VLANs logically segment devices on the same physical network to improve security, performance and manageability. Trunks allow VLANs to extend across multiple switches by carrying traffic for all VLANs over a single link. This module explains how to configure VLANs and trunks on Cisco switches including creating VLANs, assigning ports, setting trunk modes and verifying configurations. Hands-on packet tracer activities and a lab are included to reinforce the concepts.
Chapter 3: Objectives
---------------------------------------------------
Explain the purpose of VLANs in a switched network.
Analyze how a switch forwards frames based on VLAN configuration in a multi-switched environment.
Configure a switch port to be assigned to a VLAN based on requirements.
Configure a trunk port on a LAN switch.
Configure Dynamic Trunk Protocol (DTP).
Troubleshoot VLAN and trunk configurations in a switched network.
Configure security features to mitigate attacks in a VLAN-segmented environment.
Explain security best practices for a VLAN-segmented environment.
Yaser Rahmati | یاسر رحمتی
Rahmati Academy | آکادمی رحمتی
www.yaser-rahmati.ir
www.rahmati-academy.ir
This document discusses VLANs and their implementation in Cisco switches. It covers VLAN segmentation and types of VLANs, how switches use 802.1Q tagging to identify VLAN traffic on trunk links between switches, and best practices for VLAN security and design including mitigating VLAN hopping and double-tagging attacks. Configuration topics include creating VLANs, assigning ports, configuring trunks, and troubleshooting. The objectives are to explain VLAN purposes, switch forwarding based on VLANs, and configure and secure VLAN environments.
Explain the purpose of VLANs in a switched network.
1) Analyze how a switch forwards frames based on VLAN configuration in a multi-switched environment.
2) Configure a switch port to be assigned to a VLAN based on requirements.
3) Configure a trunk port on a LAN switch.
4) Configure Dynamic Trunk Protocol (DTP).
5) Troubleshoot VLAN and trunk configurations in a switched network.
6) Configure security features to mitigate attacks in a VLAN-segmented environment.
7) Explain security best practices for a VLAN-segmented environment.
VLANs logically group users and resources together without being restricted by physical network segments. There are static and dynamic VLANs, with static VLAN port assignments always remaining fixed while dynamic VLANs are created through management software. Frame tagging allows VLANs to span multiple switches by uniquely assigning a VLAN ID to each frame. The VLAN Trunking Protocol (VTP) manages VLAN configurations across switches to provide benefits like consistent VLAN setup, accurate monitoring, and dynamic reporting of new VLANs. Configuring VLANs involves creating VLANs, assigning switch ports, configuring trunk ports between switches, and setting up inter-VLAN routing using subinterfaces on a router interface.
Similar to configuring_cisco_stackwise_virtual.pdf (20)
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
A Survey of Techniques for Maximizing LLM Performance.pptx
configuring_cisco_stackwise_virtual.pdf
1. Configuring Cisco StackWise Virtual
• Finding Feature Information, on page 1
• Prerequisites for Cisco StackWise Virtual, on page 1
• Restrictions for Cisco StackWise Virtual, on page 2
• Information About Cisco StackWise Virtual, on page 3
• How to Configure Cisco StackWise Virtual, on page 13
• Verifying Cisco StackWise Virtual Configuration, on page 21
• Additional References for StackWise Virtual, on page 22
• Feature History for Cisco StackWise Virtual, on page 22
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and
feature information, see Bug Search Tool and the release notes for your platform and software release. To
find information about the features documented in this module, and to see a list of the releases in which each
feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support.
To access Cisco Feature Navigator, go to https://cfnng.cisco.com/. An account on Cisco.com is not required.
Prerequisites for Cisco StackWise Virtual
• Both switches in the Cisco StackWise Virtual pair must be directly connected to each other.
• Both switches in the Cisco StackWise Virtual pair must be of the same switch model.
• Both switches in the Cisco StackWise Virtual pair must be running the same license level.
• Both switches in the Cisco StackWise Virtual pair must be running the same software version.
• Both switches in the Cisco StackWise Virtual pair must be running the same SDM template.
• All the ports used for configuring a StackWise Virtual Link (SVL) must share the same speed. For
example, you cannot configure a 10G or a 40G port to form an SVL, simultaneously.
Configuring Cisco StackWise Virtual
1
2. When you enable Cisco StackWise Virtual on the device:
• Layer 2, Layer 3, Security, Quality of Service, Multicast, Application, Monitoring and Management,
Multiprotocol Label Switching, and High Availability are supported. Contact the Cisco Technical Support
Centre for the specific list of features that are supported under each one of these technologies.
• Resilient Ethernet Protocol, Remote Switched Port Analyzer, and Sofware-Defined Access are NOT
supported.
Note
Restrictions for Cisco StackWise Virtual
Common Restrictions for Cisco Catalyst 9500 and 9500 High Performance Series Switches
The following are the restrictions common to all the switches:
• The Federal Information Processing Standards (FIPS) is not supported on SVLs; using FIPS commands
in releases that do not support FIPS will result in nondeterministic behavior.
• When deploying Cisco StackWise Virtual, ensure that VLAN ID 4094 is not used anywhere on the
network. All inter-chassis system control communication between stack members is carried over the
reserved VLAN ID 4094 from the global range.
• Dual-Active Detection (DAD) and SVL configuration must be performed manually and the devices
should be rebooted for the configuration changes to take effect.
• Cisco StackWise Virtual configuration commands will be recognised only on a switch running Network
Advantage license. The configuration commands will not be recognised on a Network Essentials license.
• Only Cisco Transceiver Modules are supported.
• The interface VLAN MAC address that is assigned by default, can be overridden using the mac-address
command. If this command is configured on a single SVI or router port that requires Layer 3 injected
packets, all other SVIs or routed ports on the device also must be configured with the same first four
most significant bytes (4MSB) of the MAC address. For example, if you set the MAC address of any
SVI to xxxx.yyyy.zzzz, set the MAC address of all other SVIs to start with xxxx.yyyy. If Layer 3 injected
packets are not used, this restriction does not apply.
This applies to all Layer 3 ports, SVIs, and routed ports. This does not apply to
GigabitEthernet0/0 port.
Note
Restrictions for Cisco Catalyst 9500 Series Switches
• When configuring StackWiseVirtual links (SVLs) on 9500-40X and C9500-16X models of the Cisco
Catalyst 9500 Series Switches, note that you cannot create SVLs on any of the network modules.
• 4x10G breakout cables are not supported with SVL mode.
Configuring Cisco StackWise Virtual
2
Configuring Cisco StackWise Virtual
Restrictions for Cisco StackWise Virtual
3. Restrictions for Cisco Catalyst 9500 Series High Performance Switches
• 4x25G and 4x10G breakout cables are not supported with SVL mode.
• On C9500-32C switches, you can configure SVL and DAD only on interfaces numbered 1-16 on the
front panel of the switch.
• On C9500-32QC, you can configure SVL and DAD only on native 100G and 40G interfaces (default
configuration ports). You cannot configure SVL and DAD on converted 100G and 40G interfaces.
• On Cisco Catalyst 9500 Series High Performance Switches, configuring SVL using 1G interfaces is not
supported.
Information About Cisco StackWise Virtual
Cisco StackWise Virtual on Cisco Catalyst 9500 Series Switches
This section describes the Cisco StackWise Virtual features specific to Cisco Catalyst 9500 Series Switches
and Cisco Catalyst 9500 Series High Performance Switches.
• Cisco StackWise Virtual is supported on the following models:
Table 1: Switches supporting StackWise Virtual
Cisco Catalyst 9500 Series High Performance
Switches
Cisco Catalyst 9500 Series Switches
C9500-32C
C9500-24Q
C9500-32QC
C9500-12Q
C9500-24Y4C
C9500-40X
C9500-48Y4C
C9500-16X
• You can establish SVLs using 40G or 10G Ethernet connections (downlink connections) on Cisco Catalyst
9500 Series Switches and 100G, 40G, 25G and 10G Ethernet connections on Cisco Catalyst 9500 Series
High Performance Switches.
• You can configure upto 8 SVLs in a Cisco StackWise Virtual solution using Cisco Catalyst 9500 Series
Switches or Cisco Catalyst 9500 Series High Performance Switches.
StackWise Virtual Overview
Cisco StackWise Virtual is a network system virtualization technology that pairs two switches into one virtual
switch. Switches in a Cisco StackWise Virtual solution increase operational efficiency by using single control
and management plane, scale system bandwidth with distributed forwarding plane, and assist in building
resilient networks using the recommended network design. Cisco StackWise Virtual allows two physical
switches to operate as a single logical virtual switch using an Ethernet connection.
Configuring Cisco StackWise Virtual
3
Configuring Cisco StackWise Virtual
Information About Cisco StackWise Virtual
4. Cisco StackWise Virtual Topology
A typical network design consists of core, distribution, and access layers. The default mode of a switch is
standalone. When two redundant switches are deployed in the distribution layer, the following network
challenges arise:
• If VLAN IDs are reused between access layers then, it will introduce a spanning tree loop that will impact
the overall performance of the network.
• Spanning tree protocols and configuration are required to protect Layer 2 network against spanning tree
protocol loop, and root and bridge protocol data unit management.
• Additional protocols such as first hop redundancy protocol are required to virtualize the IP gateway
function. This should align with STP root priorities for each VLAN.
• The Protocol independent multicast designated router (PIM DR) configuration should be fine-tuned to
selectively build a multicast forwarding topology on a VLAN.
• The standalone distribution layer system provides protocol-driven remote failure and detection, which
results in slower convergence time. Fine-tune FHRP and PIM timers for rapid fault detection and recovery
process.
We recommend Cisco StackWise Virtual model for aggregation layers and collapsed aggregation and core
layers. The stack can be formed over a redundant 100G, 25G, 40G or 10G fiber links to ensure that the
distribution or the aggregation switches can be deployed over a large distance.
Note that STP keeps one of the ports connected to the distribution switches blocked on the access switches.
As a result of this, an active link failure causes STP convergence and the network suffers from traffic loss,
flooding, and a possible transient loop in the network. On the other hand, if the switches are logically merged
into one switch, all the access switches might form an EtherChannel bundle with distribution switches, and
a link failure within an EtherChannel would not have any impact as long as at least one member within the
EtherChannel is active.
Figure 1: Typical Network Design using Cisco StackWise Virtual
Etherchannel in StackWise Virtual is capable of implementing Multi-chassis EtherChannel (MEC) across the
stack members. When access layer and aggregation layer are collapsed into a single StackWise Virtual system,
MEC across the different access layer domain members and across distribution and access layer switches will
not be supported. MEC is designed to forward the traffic over the local link irrespective of the hash result.
Configuring Cisco StackWise Virtual
4
Configuring Cisco StackWise Virtual
Cisco StackWise Virtual Topology
5. Since the control plane, management plane, and data plane are integrated, the system behaves as a single
switch.
The virtualization of multiple physical switches into a single logical switch is from a control and management
plane perspective only. Because of the control plane being common, it may look like a single logical entity
to peer switches. The data plane of the switches is distributed. Each switch is capable of forwarding over its
local interfaces without involving other members. However, when a packet coming into a switch has to be
forwarded over a different member’s port, the forwarding context of the packet is carried over to the destination
switch after ingress processing is performed in the ingress switch. Egress processing is done only in the egress
switch. This provides a uniform data plane behavior to the entire switch irrespective whether of the destination
port is in a local switch or in a remote switch. However, the common control plane ensures that all the switches
have equivalent data plane entry for each forwarding entity.
An election mechanism elects one of the switches to be Cisco StackWise Virtual active and the other switch
to be Cisco StackWise Virtual standby in terms of Control Plane functions. The active switch is responsible
for all the management, bridging and routing protocols, and software data path. The standby switch is in hot
standby state ready to take over the role of active, if the active switch fails over.
The following are the components of the Cisco StackWise Virtual solution:
• Stack members
• StackWise Virtual link: 100G, 25G, 40G or 10G Ethernet connections. SVL is established using the
100G, 25G, 40G or 10G interfaces depending on the switch models. However, a combination of two
different speeds is not supported.
StackWise Virtual link is the link that connects the switches over Ethernet. Typically, Cisco StackWise Virtual
consists of multiple 100G, 25G, 40G or 10G physical links. It carries all the control and data traffic between
the switching units. You can configure a StackWise Virtual link on a supported port. When a switch is powered
up and the hardware is initialized, it looks for a configured StackWise Virtual link before the initialization of
the control plane.
The Link Management Protocol (LMP) is activated on each link of the StackWise Virtual links as soon as the
links are established. LMP ensure the integrity of SVL links and monitors and maintains the health of the
links. The redundancy role of each switch is resolved by the StackWise Discovery Protocol (SDP). It ensures
that the hardware and software versions are compatible to form the SVL and determines which switch becomes
active or standby from a control plane perspective.
Cisco StackWise Virtual Header (SVH) is 64-byte frame header that is prepended over all control, data, and
management plane traffic that traverse over each SVL between the two stack members of the Cisco StackWise
Virtual domain. The SVH-encapsulated traffic operates at OSI Layer 2 and can be recognized and processed
only by Cisco StackWise Virtual-enabled switches. SVL interfaces are non-bridgeable and non-routeable,
and allows non-routeable traffic over L2 or L3 network.
Cisco StackWise Virtual Redundancy
Cisco StackWise Virtual operates stateful switchover (SSO) between the active and standby switches. The
following are the ways in which Cisco StackWise Virtual's redundancy model differs from that of the standalone
mode:
• The Cisco StackWise Virtual active and standby switches are hosted in separate switches and use a
StackWise Virtual link to exchange information.
• The active switch controls both the switches of Cisco StackWise Virtual. The active switch runs the
Layer 2 and Layer 3 control protocols and manages the switching modules of both the switches.
Configuring Cisco StackWise Virtual
5
Configuring Cisco StackWise Virtual
Cisco StackWise Virtual Redundancy
6. • The Cisco StackWise Virtual active and standby switches perform data traffic forwarding.
If the Cisco StackWise Virtual active switch fails, the standby switch initiates a switchover and assumes the
Cisco StackWise Virtual active switch role.
Note
SSO Redundancy
A StackWise Virtual system operates with SSO redundancy if it meets the following requirements:
• Both the switches must be running the same software version, unless they are in the process of software
upgrade.
• StackWise Virtual link-related configuration in the two switches must match.
• License type must be same on both the switch models.
• Both the switch models must be in the same StackWise Virtual domain.
With SSO redundancy, the StackWise Virtual standby switch is always ready to assume control if a fault
occurs on the StackWise Virtual active switch. Configuration, forwarding, and state information are
synchronized from the StackWise Virtual active switch to the redundant switch at startup, and whenever
changes to the StackWise Virtual active switch configuration occur. If a switchover occurs, traffic disruption
is minimized.
If StackWise Virtual does not meet the requirements for SSO redundancy, it will be incapable of establishing
a relationship with the peer switch. StackWise Virtual runs stateful switchover (SSO) between the StackWise
Virtual active and standby switches. The StackWise Virtual determines the role of each switch during
initialization.
The CPU in the StackWise Virtual standby switch runs in hot standby state. StackWise Virtual uses a StackWise
Virtual link to synchronize configuration data from the StackWise Virtual active switch to the StackWise
Virtual standby switch. Also, protocols and features that support high availability synchronize their events
and state information to the StackWise Virtual standby switch.
Nonstop Forwarding
While implementing Nonstop Forwarding (NSF) technology in systems using SSO redundancy mode, network
disruptions are minimized for campus users and applications. High availability is provided even when the
control-plane processing stack-member switch is reset. During a failure of the underlying Layer 3, NSF-capable
protocols perform graceful network topology resynchronization. The preset forwarding information on the
redundant stack-member switch remains intact; this switch continues to forward the data in the network. This
service availability significantly lowers the mean time to repair (MTTR) and increases the mean time between
failure (MTBF) to achieve a high level of network availability.
Multichassis EtherChannels
Multichassis EtherChannel (MEC) is an EtherChannel bundled with physical ports having common
characteristics such as speed and duplex, that are distributed across each Cisco StackWise Virtual system. A
Cisco StackWise Virtual MEC can connect to any network element that supports EtherChannel (such as a
host, server, router, or switch). Cisco StackWise Virtual supports up to 128 MECs deployed in Layer 2 or
Configuring Cisco StackWise Virtual
6
Configuring Cisco StackWise Virtual
SSO Redundancy
7. Layer 3 modes. EtherChannel 127 and 128 are reserved for SVL connections. Hence, the maximum available
MEC count is 126.
In a Cisco StackWise Virtual system, an MEC is an EtherChannel with additional capability. A multichassis
EtherChannel link reduces the amount of traffic that requires transmission across the StackWise Virtual link
by populating the index port only with the ports local to the physical switch. This allows the switch to give
precedence to the local ports of the multichassis EtherChannel link over those on the remote switch.
Each MEC can optionally be configured to support either Cisco PAgP, IEEE LACP, or Static ON mode. We
recommend that you implement EtherChannel using Cisco PAgP or LACP with a compatible neighbor. If a
remotely connected neighbor such as Cisco Wireless LAN Controller (WLC) does not support this link-bundling
protocol, then a Static ON mode can be deployed. These protocols run only on the Cisco StackWise Virtual
active switch.
An MEC can support up to eight physical links that can be distributed in any proportion between the Cisco
StackWise Virtual active switch and the Cisco StackWise Virtual standby switch. We recommend that you
distribute the MEC ports across both switches evenly.
MEC Minimum Latency Load Balancing
The StackWise Virtual environment is designed such that data forwarding always remains within the switch.
The Virtual Stack always tries to forward traffic on the locally available links. This is true for both Layer 2
and Layer3 links. The primary motivation for local forwarding is to avoid unnecessarily sending data traffic
over the StackWise Virtual link and thus reduce the latency (extra hop over the SVL) and congestion.The
bidirectional traffic is load-shared between the two StackWise Virtual members. However, for each StackWise
Virtual member, ingress and egress traffic forwarding is based on locally-attached links that are part of MEC.
This local forwarding is a key concept in understanding convergence and fault conditions in a StackWise
Virtual enabled campus network.
The active and standby switches support local forwarding that will individually perform the desired lookups
and forward the traffic on local links to uplink neighbors. If the destination is a remote switch in the StackWise
Virtual domain, ingress processing is performed on the ingress switch and then traffic is forwarded over the
StackWise Virtual link to the egress switch where only egress processing is performed.
MEC Failure Scenarios
We recommend that you configure a MEC with at least one link to each switch. This configuration ensures
that there is always an alternate path for data traffic in case of a switch failure.
The following sections describe issues that may arise and the resulting impact:
Single MEC Link Failure
If a link within a MEC fails (and other links in the MEC are still operational), the MEC redistributes the load
among the operational links, as in a regular port.
All MEC Links to the Cisco StackWise Virtual Active Switch Fail
If all the links to the Cisco StackWise Virtual active switch fail, a MEC becomes a regular EtherChannel with
operational links to the Cisco StackWise Virtual standby switch.
Data traffic that terminates on the Cisco StackWise Virtual active switch reaches the MEC by crossing a
StackWise Virtual link to the Cisco StackWise Virtual standby switch. Control protocols continue to run in
the Cisco StackWise Virtual active switch. Protocol messages reach the MEC by crossing a StackWise Virtual
link.
Configuring Cisco StackWise Virtual
7
Configuring Cisco StackWise Virtual
MEC Minimum Latency Load Balancing
8. All MEC Links Fail
If all the links in an MEC fail, the logical interface for the EtherChannel is set to Unavailable. Layer 2 control
protocols perform the same corrective action as for a link-down event on a regular EtherChannel.
On adjacent switches, routing protocols and the Spanning Tree Protocol (STP) perform the same corrective
action as for a regular EtherChannel.
Cisco StackWise Virtual Standby Switch Failure
If the Cisco StackWise Virtual standby switch fails, a MEC becomes a regular EtherChannel with operational
links on the Cisco StackWise Virtual active switch. Connected peer switches detect the link failures, and
adjust their load-balancing algorithms to use only the links to the StackWise Virtual active switch.
Cisco StackWise Virtual Active Switch Failure
Cisco StackWise Virtual active switch failure results in a stateful switchover (SSO). After the switchover, a
MEC is operational on the new Cisco StackWise Virtual active switch. Connected peer switches detect the
link failures (to the failed switch), and adjust their load-balancing algorithms to use only the links to the new
Cisco StackWise Virtual active switch.
Cisco StackWise Virtual Packet Handling
In Cisco StackWise Virtual, the Cisco StackWise Virtual active switch runs the Layer 2 and Layer 3 protocols
and features and manages the ports on both the switches.
Cisco StackWise Virtual uses StackWise Virtual link to communicate system and protocol information between
the peer switches and to carry data traffic between the two switches.
The following sections describe packet handling in Cisco StackWise Virtual.
Traffic on a StackWise Virtual link
A StackWise Virtual link carries data traffic and in-band control traffic between two switches. All the frames
that are forwarded over the StackWise Virtual link are encapsulated with a special StackWise Virtual Header
(SVH). The SVH adds an overhead of 64 bytes for control and data traffic, which provides information for
Cisco StackWise Virtual to forward the packet on the peer switch.
A StackWise Virtual link transports control messages between two switches. Messages include protocol
messages that are processed by the Cisco StackWise Virtual active switch, but received or transmitted by
interfaces on the Cisco StackWise Virtual standby switch. Control traffic also includes module programming
between the Cisco StackWise Virtual active switch and the switching modules on the Cisco StackWise Virtual
standby switch.
Cisco StackWise Virtual transmits data traffic over a StackWise Virtual link under the following circumstances:
• Layer 2 traffic flooded over a VLAN (even for dual-homed links).
• Packets processed by software on the Cisco StackWise Virtual active switch where the ingress interface
is on the Cisco StackWise Virtual standby switch.
• The packet destination is on the peer switch, as described in the following examples:
• Traffic within a VLAN where the known destination interface is on the peer switch.
• Traffic that is replicated for a multicast group and the multicast receivers are on the peer switch.
Configuring Cisco StackWise Virtual
8
Configuring Cisco StackWise Virtual
Cisco StackWise Virtual Packet Handling
9. • The known unicast destination MAC address is on the peer switch.
• The packet is a MAC notification frame destined for a port on the peer switch.
A StackWise Virtual link also transports system data, such as NetFlow export data and SNMP data, from the
Cisco StackWise Virtual standby switch to the Cisco StackWise Virtual active switch.
Traffic on the StackWise Virtual link is load balanced with the same global hashing algorithms available for
EtherChannels (the default algorithm is source-destination IP).
Layer 2 Protocols
The Cisco StackWise Virtual active switch runs the Layer 2 protocols (such as STP and VTP) for the switching
modules on both the switches. Protocol messages that are received on the standby switch ports must traverse
SVL links to reach the active switch where they are processed. Similarly, protocol messages that are transmitted
from the standby switch ports originate on the active switch, and traverse the SVL links to reach the standby
ports.
All the Layer 2 protocols in Cisco StackWise Virtual work similarly in standalone mode. The following
sections describe the difference in behavior for some protocols in Cisco StackWise Virtual.
Spanning Tree Protocol
The Cisco StackWise Virtual active switch runs the STP. The Cisco StackWise Virtual standby switch redirects
the STP BPDUs across a StackWise Virtual link to the StackWise Virtual active switch.
The STP bridge ID is commonly derived from the switch MAC address. To ensure that the bridge ID does
not change after a switchover, Cisco StackWise Virtual continues to use the original switch MAC address for
the STP Bridge ID.
EtherChannel Control Protocols
Link Aggregation Control Protocol (LACP) and Port Aggregation Protocol (PAgP) packets contain a device
identifier. Cisco StackWise Virtual defines a common device identifier for both the switches. Use either PAgP
or LACP on Multi EtherChannels instead of mode ON, even if all the three modes are supported.
A new PAgP enhancement has been defined for assisting with dual-active scenario detection.
Note
Switched Port Analyzer
Switched Port Analyzer (SPAN) on StackWise Virtual link ports is not supported; SVL ports can be neither
a SPAN source, nor a SPAN destination. Cisco StackWise Virtual supports all the SPAN features for non-SVL
interfaces. The number of SPAN sessions that are available on Cisco StackWise Virtual matches that on a
single switch running in standalone mode.
Private VLANs
Private VLANs on StackWise Virtual work the same way as in standalone mode. The only exception is that
the native VLAN on isolated trunk ports must be configured explicitly.
Configuring Cisco StackWise Virtual
9
Configuring Cisco StackWise Virtual
Layer 2 Protocols
10. Apart from STP, EtherChannel Control Protocols, SPAN, and private VLANs, the Dynamic Trunking Protocol
(DTP), Cisco Discovery Protocol (CDP), VLAN Trunk Protocol (VTP), and Unidirectional Link Detection
Protocol (UDLD) are the additional Layer 2 control-plane protocols that run over the SVL connections.
Layer 3 Protocols
The Cisco StackWise Virtual active switch runs the Layer 3 protocols and features for the StackWise Virtual.
All the Layer 3 protocol packets are sent to and processed by the Cisco StackWise Virtual active switch. Both
the member switches perform hardware forwarding for ingress traffic on their interfaces. When software
forwarding is required, packets are sent to the Cisco StackWise Virtual active switch for processing.
The same router MAC address assigned by the Cisco StackWise Virtual active switch is used for all the Layer
3 interfaces on both the Cisco StackWise Virtual member switches. After a switchover, the original router
MAC address is still used. The router MAC address is chosen based on chassis-mac and is preserved after
switchover by default. Cisco Catalyst 9500 Series High Performance switches support Layer 3 subinterfaces.
The following sections describe the Layer 3 protocols for Cisco StackWise Virtual.
IPv4 Unicast
The CPU on the Cisco StackWise Virtual active switch runs the IPv4 routing protocols and performs any
required software forwarding. All the routing protocol packets received on the Cisco StackWise Virtual standby
switch are redirected to the Cisco StackWise Virtual active switch across the StackWise Virtual link. The
Cisco StackWise Virtual active switch generates all the routing protocol packets to be sent out over ports on
either of the Cisco StackWise Virtual member switches.
Hardware forwarding is distributed across both members on Cisco StackWise Virtual. The CPU on the Cisco
StackWise Virtual active switch sends Forwarding Information Base (FIB) updates to the Cisco StackWise
Virtual standby switch, which in turn installs all the routes and adjacencies into hardware.
Packets intended for a local adjacency (reachable by local ports) are forwarded locally on the ingress switch.
Packets intended for a remote adjacency (reachable by remote ports) must traverse the StackWise Virtual
link.
The CPU on the Cisco StackWise Virtual active switch performs all software forwarding and feature processing
(such as fragmentation and Time to Live exceed functions). If a switchover occurs, software forwarding is
disrupted until the new Cisco StackWise Virtual active switch obtains the latest Cisco Express Forwarding
and other forwarding information.
In virtual switch mode, the requirements to support non-stop forwarding (NSF) match those in the standalone
redundant mode of operation.
From a routing peer perspective, Multi-Chassis EtherChannels (MEC) remain operational during a switchover,
that is, only the links to the failed switch are down, but the routing adjacencies remain valid.
Cisco StackWise Virtual achieves Layer 3 load balancing over all the paths in the Forwarding Information
Base entries, be it local or remote.
IPv6
Cisco StackWise Virtual supports IPv6 unicast and multicast because it is present in the standalone system.
IPv4 Multicast
The IPv4 multicast protocols run on the Cisco StackWise Virtual active switch. Internet Group Management
Protocol (IGMP) and Protocol Independent Multicast (PIM) protocol packets received on the Cisco StackWise
Configuring Cisco StackWise Virtual
10
Configuring Cisco StackWise Virtual
Layer 3 Protocols
11. Virtual standby switch are transmitted across a StackWise Virtual link to the StackWise Virtual active switch.
The latter generates IGMP and PIM protocol packets to be sent over ports on either of the Cisco StackWise
Virtual members.
The Cisco StackWise Virtual active switch synchronizes the Multicast Forwarding Information Base (MFIB)
state to the Cisco StackWise Virtual standby switch. On both the member switches, all the multicast routes
are loaded in the hardware, with replica expansion table (RET) entries programmed for only local, outgoing
interfaces. Both the member switches are capable of performing hardware forwarding.
To avoid multicast route changes as a result of a switchover, we recommend that all the links carrying multicast
traffic be configured as MEC rather than Equal Cost Multipath (ECMP).
Note
For packets traversing a StackWise Virtual link, all Layer 3 multicast replications occur on the egress switch.
If there are multiple receivers on the egress switch, only one packet is replicated and forwarded over the
StackWise Virtual link, and then replicated to all the local egress ports.
Software Features
Software features run only on the Cisco StackWise Virtual active switch. Incoming packets to the Cisco
StackWise Virtual standby switch that require software processing are sent across a StackWise Virtual link
to the Cisco StackWise Virtual active switch.
Dual-Active Detection
If the standby switch detects a complete loss of the StackWise Virtual link, it assumes the active switch has
failed and will take over as the active switch. However, if the original Cisco StackWise Virtual active switch
is still operational, both the switches will now be Cisco StackWise Virtual active switches. This situation is
called a dual-active scenario. This scenario can have adverse effects on network stability because both the
switches use the same IP addresses, SSH keys, and STP bridge IDs. Cisco StackWise Virtual detects a
dual-active scenario and takes recovery action. Dual-active-detection link is the dedicated link used to mitigate
this.
If a StackWise Virtual link fails, the Cisco StackWise Virtual standby switch cannot determine the state of
the Cisco StackWise Virtual active switch. To ensure that switchover occurs without delay, the Cisco StackWise
Virtual standby switch assumes that the Cisco StackWise Virtual active switch has failed and initiates switchover
to take over the Cisco StackWise Virtual active role. The original Cisco StackWise Virtual active switch
enters recovery mode and brings down all the interfaces except the StackWise Virtual link and the management
interfaces.
Dual-Active-Detection Link with Fast Hello
To use the dual-active fast hello packet detection method, you must provision a direct ethernet connection
between the two Cisco StackWise Virtual switches. You can dedicate up to four links for this purpose.
The two switches periodically exchange special dual-active hello messages containing information about the
switch state. If all SVLs fail and a dual-active scenario occurs, each switch recognizes that there is a dual-active
scenario from the peer's messages. This initiates recovery actions as described in the Recovery Actions, on
page 12 section. If a switch does not receive an expected dual-active fast hello message from the peer before
the timer expires, the switch assumes that the link is no longer capable of dual-active detection.
Configuring Cisco StackWise Virtual
11
Configuring Cisco StackWise Virtual
Dual-Active Detection
12. Do not use the same port for SVL and DAD link.
Note
Dual-Active Detection with enhanced PAgP
Port aggregation protocol (PAgP) is a Cisco proprietary protocol used for managing EtherChannels. If a
StackWise Virtual MEC terminates on a Cisco switch, you can run PAgP protocol on the MEC. If PAgP is
running on the MECs between the StackWise Virtual switch and an upstream or downstream switch, the
StackWise Virtual can use PAgP to detect a dual-active scenario. The MEC must have at least one port on
each switch of the StackWise Virtual setup.
Enhanced PAgP is an extension of the PAgP protocol. In virtual switch mode, ePAgP messages include a
new type length value (TLV) which contains the ID of the StackWise Virtual active switch. Only switches in
virtual switch mode send the new TLV.
When the StackWise Virtual standby switch detects SVL failure, it initiates SSO and becomes StackWise
Virtual active. Subsequent ePAgP messages sent to the connected switch from the newly StackWise Virtual
active switch contain the new StackWise Virtual active ID. The connected switch sends ePAgP messages
with the new StackWise Virtual active ID to both StackWise Virtual switches.
If the formerly StackWise Virtual active switch is still operational, it detects the dual-active scenario because
the StackWise Virtual active ID in the ePAgP messages changes.
Figure 2: Dual-active-detection with ePAgP
To avoid PAgP flaps and to ensure that dual-active detection functions as expected, the stack MAC persistent
wait timer must be configured as indefinite using the command stack-mac persistent timer 0 .
Note
Recovery Actions
A Cisco StackWise Virtual active switch that detects a dual-active condition shuts down all of its non-SVL
interfaces to remove itself from the network. The switch then waits in recovery mode until the SVLs have
been recovered. You should physically repair the SVL failure and the recovery switch should be manually
reloaded for it to be the standby switch.
Configuring Cisco StackWise Virtual
12
Configuring Cisco StackWise Virtual
Dual-Active Detection with enhanced PAgP
13. Implementing Cisco StackWise Virtual
The two-node solution of Cisco StackWise Virtual is normally deployed at the aggregation layer. Two switches
are connected over an SVL.
Cisco StackWise Virtual combines the two switches into a single logical switch with a large number of ports,
offering a single point of management. One of the member switches is the active and works as the control
and management plane, while the other one is the standby. The virtualization of multiple physical switches
into a single logical switch is only from a control and management perspective. Because of the control plane
being common, it may look like a single logical entity to peer switches. The data plane of the switches are
converged, that is, the forwarding context of a switch might be passed to the other member switch for further
processing when traffic is forwarded across the switches. However, the common control plane ensures that
all the switches have equivalent data plane entry for each forwarding entity.
Figure 3: Two-Node Solution
An election mechanism that determines which switch is Cisco StackWise Virtual active and which one is a
control plane standby, is available. The active switch is responsible for management, bridging and routing
protocols, and software data path. These are centralized on the active switch supervisor of the Cisco StackWise
Virtual active switch.
How to Configure Cisco StackWise Virtual
Configuring Cisco StackWise Virtual Settings
To enable StackWise Virtual, perform the following procedure on both the switches:
Procedure
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Step 1
Example: • Enter your password if prompted.
Device>enable
(Optional) Reassigns the switch number.
switchswitch-numberrenumbernew switch
-number
Step 2
Configuring Cisco StackWise Virtual
13
Configuring Cisco StackWise Virtual
Implementing Cisco StackWise Virtual
14. Purpose
Command or Action
The default switch number will be 1. The valid
values for the new switch number are 1 and 2.
Example:
Device#switch 1 renumber 2
(Optional) Assigns the priority number.
switchswitch-numberprioritypriority-number
Step 3
Example: The default priority number is 1. The highest
priority number is 15.
Device#switch 1 priority 5
Enters global configuration mode.
configure terminal
Example:
Step 4
Device#configure terminal
Enables Cisco StackWise Virtual and enters
stackwise-virtual submode.
stackwise-virtual
Example:
Step 5
Device(config)#stackwise-virtual
(Optional) Specifies the Cisco StackWise
Virtual domain ID.
The domain ID range is from 1 to 255. The
default value is one.
domain id
Example:
Device(config-stackwise-virtual)#domain
2
Step 6
Returns to privileged EXEC mode.
end
Example:
Step 7
Device(config-stackwise-virtual)#end
show stackwise-virtual
Step 8
Example:
Device#show stackwise-virtual
Saves the running-configuration which resides
in the system RAM and updates the ROMmon
write memory
Example:
Step 9
variables. If you do not save the changes, the
Device#write memory changes will no longer be part of the startup
configuration when the switch reloads. Note
that the configurations for stackwise-virtual
and domain are saved to the
running-configuration and the
startup-configuration after the reload.
Restarts the switch and forms the stack.
reload
Example:
Step 10
Configuring Cisco StackWise Virtual
14
Configuring Cisco StackWise Virtual
Configuring Cisco StackWise Virtual Settings
15. Purpose
Command or Action
Device#reload
Configuring Cisco StackWise Virtual Link
Depending on the switch model, SVL is supported on all 10G interfaces and 40G interfaces of the Cisco
Catalyst 9500 Series switches and on all the 100G, 40G, 25G and 10G interfaces of the Cisco Catalyst 9500
Series High Performance switches. However, a combination of different interface speeds is not supported.
Note
To configure a switch port as an SVL port, perform the following procedure on both the switches:
Procedure
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Step 1
Example: • Enter your password if prompted.
Device>enable
Enters global configuration mode.
configure terminal
Example:
Step 2
Device#configure terminal
Enters ethernet interface configuration mode.
Perform one the of the following depending on
the switch that you are configuring.
Step 3
• If you are configuring a Cisco Catalyst
9500 Series Switch, use interface
{T
enGigabitEthernet|FortyGigabitEthernet}<interface>
• If you are configuring a Cisco Catalyst
9500 Series High Performance Switch, use
interface {HundredGigE
|FortyGigabitEthernet
|TwentyFiveGigE}<interface>
Example:
Device(config)#interface
TenGigabitEthernet1/0/2
Associates the interface with configured SVL.
stackwise-virtual link link value
Example:
Step 4
Device(config-if)#stackwise-virtual link
1
Configuring Cisco StackWise Virtual
15
Configuring Cisco StackWise Virtual
Configuring Cisco StackWise Virtual Link
16. Purpose
Command or Action
Returns to privileged EXEC mode.
end
Example:
Step 5
Device(config-if)#end
Saves the running-configuration which resides
in the system RAM and updates the ROMmon
write memory
Example:
Step 6
variables. If you do not save the changes, the
Device#write memory changes will no longer be part of the startup
configuration when the switch reloads. Note
that the configuration for stackwise-virtual
link link value is saved only in the
running-configuration and not the
startup-configuration.
Restarts the switch.
reload
Step 7
Example: Note
When converting a Cisco Catalyst 9500 Series
High Performance switch from standalone mode
Device#reload
to SVL mode for the first time, one of the
switches boots up or resets, for resolving the
switch number conflict and sets the
SWITCH_NUMBER environment variable to
2. The following message appears on the
console prompt indicating this:
Waiting for remote chassis to join
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
#
Chassis number is 2
All chassis in the stack have been
discovered. Accelerating discovery
Chassis is reloading, reason: Configured
Switch num conflicts with peer,
Changing local switch number to 2 and
reloading to take effect
Configuring StackWise Virtual Fast Hello Dual-Active-Detection Link
To configure StackWise Virtual Fast Hello DAD link, perform the following procedure. This procedure is
optional.
Procedure
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Step 1
Example: • Enter your password if prompted.
Device>enable
Configuring Cisco StackWise Virtual
16
Configuring Cisco StackWise Virtual
Configuring StackWise Virtual Fast Hello Dual-Active-Detection Link
17. Purpose
Command or Action
Enters global configuration mode.
configure terminal
Example:
Step 2
Device#configure terminal
Enters ethernet interface configuration mode.
Perform one the of the following depending on
the switch that you are configuring.
Step 3
• If you are configuring a Cisco Catalyst
9500 Series Switch, use interface
{T
enGigabitEthernet|FortyGigabitEthernet}<interface>
• If you are configuring a Cisco Catalyst
9500 Series High Performance Switch, use
interface {HundredGigE
|FortyGigabitEthernet
|TwentyFiveGigE}<interface>
Example:
Device(config)#interface
TenGigabitEthernet1/0/40
Associates the interface with StackWise Virtual
dual-active-detection.
stackwise-virtual dual-active-detection
Example:
Step 4
This command will not be visible on
the device after the configuration,
but will continue to function.
Note
Device(config-if)#stackwise-virtual
dual-active-detection
Returns to privileged EXEC mode.
end
Example:
Step 5
Device(config-if)#end
Saves the running-configuration which resides
in the system RAM and updates the ROMmon
write memory
Example:
Step 6
variables. If you do not save the changes, the
Device#write memory changes will no longer be part of the startup
configuration when the switch reloads. Note
that the configuration for stackwise-virtual
dual-active-detection is saved only in the
running-configuration and not the
startup-configuration.
Restarts the switch and configuration takes
effect.
reload
Example:
Step 7
Device#reload
Configuring Cisco StackWise Virtual
17
Configuring Cisco StackWise Virtual
Configuring StackWise Virtual Fast Hello Dual-Active-Detection Link
18. Enabling ePAgP Dual-Active-Detection
To enable ePAgP dual-active-detection on a switch port, perform the following procedure on . This procedure
is optional.
Procedure
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Step 1
Example: • Enter your password if prompted.
Device>enable
Enters global configuration mode.
configure terminal
Example:
Step 2
Device#configure terminal
Enters the interface configuration mode.
interface { TenGigabitEthernet |
FortyGigabitEthernet | TwentyFiveGigE
} <interface>
Step 3
Example:
Device(config)#interface
FortyGigabitEthernet 1/0/5
Enables PAgP MEC with channel-group id in
the range of 1 to 126 for 10 GigabitEthernet
interfaces.
channel-group group_ID mode desirable
Example:
Device(config-if)#channel-group 1 mode
desirable
Step 4
Exits interface configuration.
exit
Example:
Step 5
Device(config-if)#exit
Selects a port channel interface to configure.
interface port-channel channel-group-id
Example:
Step 6
Device(config)#interface port-channel
1
Shuts down an interface.
shutdown
Example:
Step 7
Device(config-if)#shutdown
Exits interface configuration.
exit
Example:
Step 8
Device(config-if)#exit
Configuring Cisco StackWise Virtual
18
Configuring Cisco StackWise Virtual
Enabling ePAgP Dual-Active-Detection
19. Purpose
Command or Action
Enters the StackWise Virtual configuration
mode.
stackwise-virtual
Example:
Step 9
Device(config)#stackwise-virtual
Enables pagp dual-active detection. This is
enabled by default.
dual-active detection pagp
Example:
Step 10
Device(config-stackwise-virtual)#dual-active
detection pagp
Enables dual-active detection trust mode on
channel-group with the configured ID.
dual-active detection pagp trust
channel-group channel-group id
Example:
Step 11
Device(config-stackwise-virtual)#dual-active
detection pagp trust channel-group 1
Exits the StackWise-Virtual configuration
mode.
exit
Example:
Step 12
Device(config-stackwise-virtual)#exit
Configured port-channel on the switch.
interface port-channel portchannel
Example:
Step 13
Device(config)#interface port-channel
1
Enables the configured port-channel on the
switch.
no shutdown
Example:
Step 14
Device(config-if)#no shutdown
Exits interface configuration.
end
Example:
Step 15
Device(config-if)#end
Saves the running-configuration which resides
in the system RAM and updates the ROMmon
write memory
Example:
Step 16
variables. If you do not save the changes, the
Device#write memory changes will no longer be part of the startup
configuration when the switch reloads. Note
that the configuration for dual-active
detection pagp trust channel-group
channel-group id is saved to the
running-configuration and the
startup-configuration after the reload.
Restarts the switch and configuration takes
effect.
reload
Example:
Step 17
Configuring Cisco StackWise Virtual
19
Configuring Cisco StackWise Virtual
Enabling ePAgP Dual-Active-Detection
20. Purpose
Command or Action
Device#reload
Disabling Cisco StackWise Virtual
To disable Cisco StackWise Virtual on a switch, perform the following procedure:
Procedure
Purpose
Command or Action
Enables privileged EXEC mode.
enable
Step 1
Example: • Enter your password if prompted.
Device>enable
Enters global configuration mode.
configure terminal
Example:
Step 2
Device#configure terminal
Enters ethernet interface configuration mode.
Perform one the of the following depending
on the switch that you are configuring.
Step 3
• If you are configuring a Cisco Catalyst
9500 Series Switch, use interface
{T
enGigabitEthernet|FortyGigabitEthernet}<interface>
• If you are configuring a Cisco Catalyst
9500 Series High Performance Switch,
use interface {HundredGigE
|FortyGigabitEthernet
|TwentyFiveGigE}<interface>
Example:
Device(config)#interface
TenGigabitEthernet 1/0/41
Dissociates the interface from StackWise
Virtual DAD.
no stackwise-virtual dual-active-detection
Example:
Step 4
Device(config-if)#no stackwise-virtual
dual-active-detection
Enters the interface configuration mode.
Repeat step Step 3, on page 20.
Example:
Step 5
Device(config)#interface
TenGigabitEthernet 1/0/5
Configuring Cisco StackWise Virtual
20
Configuring Cisco StackWise Virtual
Disabling Cisco StackWise Virtual
21. Purpose
Command or Action
Dissociates the interface from SVL.
no stackwise-virtual link link
Example:
Step 6
Device(config-if)#no stackwise-virtual
link 1
Exits interface configuration.
exit
Example:
Step 7
Device(config-if)#exit
Disables StackWise Virtual configuration.
no stackwise-virtual
Example:
Step 8
Device(config)#no stackwise-virtual
Exits the global configuration mode.
exit
Example:
Step 9
Device(config)#exit
Saves the running configuration.
write memory
Example:
Step 10
Device#write memory
Restarts the switch and the configuration takes
effect.
reload
Example:
Step 11
Device#reload
Verifying Cisco StackWise Virtual Configuration
To verify your StackWise Virtual configuration, use the following show commands:
Displays information of a particular switch in the stack.
show stackwise-virtual switch number <1-2>
Displays StackWise Virtual link information.
show stackwise-virtual link
Displays the bandwidth available for the Cisco StackWise
Virtual.
show stackwise-virtual bandwidth
Displays the Cisco StackWise Virtual neighbors.
show stackwise-virtual neighbors
Displays StackWise Virtual dual-active-detection
information.
show stackwise-virtual dual-active-detection
Displays ePAgP dual-active-detection information.
show stackwise-virtual dual-active-detection
pagp
Configuring Cisco StackWise Virtual
21
Configuring Cisco StackWise Virtual
Verifying Cisco StackWise Virtual Configuration
22. Additional References for StackWise Virtual
Related Documents
Document Title
Related Topic
High Availability Command Reference for Catalyst 9500
Switches
For complete syntax and usage information for
the commands used in this chapter.
MIBs
MIBs Link
MIB
To locate and download MIBs for selected platforms, Cisco IOS releases,
and feature sets, use Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
All the supported MIBs for this
release.
Technical Assistance
Link
Description
http://www.cisco.com/support
The Cisco Support website provides extensive online resources, including
documentation and tools for troubleshooting and resolving technical issues
with Cisco products and technologies.
To receive security and technical information about your products, you can
subscribe to various services, such as the Product Alert Tool (accessed from
Field Notices), the Cisco Technical Services Newsletter, and Really Simple
Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website requires a Cisco.com user
ID and password.
Feature History for Cisco StackWise Virtual
This table provides release and related information for features explained in this module.
These features are available on all releases subsequent to the one they were introduced in, unless noted
otherwise.
Configuring Cisco StackWise Virtual
22
Configuring Cisco StackWise Virtual
Additional References for StackWise Virtual
23. Feature Information
Feature
Release
Cisco StackWise Virtual is a network system
virtualization technology that pairs two switches
into one virtual switch to simplify operational
efficiency with a single control and management
plane.
Support for this feature was introduced on the
C9500-12Q, C9500-16X, C9500-24Q, C9500-40X
models of the Cisco Catalyst 9500 Series Switches
Cisco StackWise Virtual
Cisco IOS XE Everest 16.6.1
Cisco StackWise Virtual is a network system
virtualization technology that pairs two switches
into one virtual switch to simplify operational
efficiency with a single control and management
plane.
Support for this feature was introduced on the
C9500-32C, C9500-32QC, C9500-48Y4C, and
C9500-24Y4C models of the Cisco Catalyst 9500
Series Switches.
Cisco StackWise Virtual
Cisco IOS XE Gibraltar
16.10.1
Use Cisco Feature Navigator to find information about platform and software image support. To access Cisco
Feature Navigator, go to http://www.cisco.com/go/cfn.
Configuring Cisco StackWise Virtual
23
Configuring Cisco StackWise Virtual
Feature History for Cisco StackWise Virtual
24. Configuring Cisco StackWise Virtual
24
Configuring Cisco StackWise Virtual
Feature History for Cisco StackWise Virtual