[SDN] switch MTU configuration summary

  This article is intended: a good memory as bad written, this information from the network, the main purpose of combing end, if infringement contact will be deleted.

  Abstract: When using the SDN VXLAN-based solutions, the basic requirement is to modify the physical network MTU, let it be greater than 1600 (NSX), the following summarizes several major manufacturers to configure different models or versions of the switch, the future will continue to update, too Please have been configured experienced counterparts to help supplement.

Configuration Description:

  When the general configuration of MTU, note that all devices arranged end to end along the way, if the source and destination in the same network segment, only need to configure all the devices along the interface Layer MTU. Generally in accordance with the different devices may require global configuration MTU, the MTU or disposed on the corresponding interface.

  If the source and destination in a different network segment, arranged along all Layer except the MTU, the need to configure the gateway interface the two networks MTU (Layer interface).

  Arrangement is a general interface vlan 100, mtu 1600

Cisco Series Switches

Nexus Series Switches:

Reference: https://www.cisco.com/c/en/us/support/docs/switches/nexus-9000-series-switches/118994-config-nexus-00.html

  Three MTU 

#SVI interface configuration: 
Switch (config) #interface VLAN. 1 
Switch (config-IF) #mtu 9216 

# Physical Layer Interface Configuration: 
Switch (config) 1/1 #interface Ethernet 
Switch (config-IF) #no switchport 
Switch ( config-if) #mtu 9216

  MTU story

  Layer MTU can be configured based on the port or by Qos. At present, only Nexus 7000, 7700, 9300, and 9500 support port configurations MTU. Nexus 3048, 3064, 3100, 3500, 5000, 5500, and 6000 configuration This configuration will take effect on all interfaces;

policy-map type network-qos jumbo
  class type network-qos class-default
      mtu 9216
system qos
  service-policy type network-qos jumbo

  Nexus 7000, 7700, 9300, and 9500 configuration

  The following is based on interface configurations:

Switch(config)#interface ethernet 1/1
Switch(config-if)#mtu 9216

  Nexus 2000 configuration

  Note: the Nexus 2000 MTU configuration needs to be configured on a switch FEX parent, if the parent Switches support MTU interface, then the interface configuration corresponding to, if not, you need to use network-qos.

  Note that when using FEX, Fabric Port Channel (FPC), which is connected to a port aggregation group FEX also need to configure the MTU

interface port-channel136
  switchport mode fex-fabric
  fex associate 136
  vpc 136
  mtu 9216

  Note: After version 6.2, Nexus 7000 Fabric Port Channel does not support direct interface to configure the MTU, you must create a global QoS policy to adjust MTU.

policy-map type network-qos jumbo
  class type network-qos class-default
    mtu 9216
system qos
  service-policy type network-qos jumbo

MTU value verification:

  Three MTU

# All Nexus series switches can interface through show eth x / y command to view the interface MTU: 
Nexus # interface ethernet 1/19 Show 
Ethernet1 / 19 IS up 
Dedicated Interface 
Hardware: 100/1000/10000 Ethernet, address: 547f.ee5d. 413 c (BIA 547f.ee5d.40fa) 
MTU 9216 bytes, BW 1000000 Kbit, DLY 10 usec # using the show interface vlan X command to view the interface SVI MTU: 
Leaf3 Show # interface vlan 1 
Vlan1 IS Down (Non-Routable the MODE VDC), Line IS Down Protocol 
  Hardware EtherSVI IS, IS 547f.eed8.ec7c address 
  Internet address IS 1.1.1.1/23 
  MTU 9216 bytes, BW 1000000 Kbit, DLY 10 usec

  MTU story

#Nexus 3100, 3500, 5000, 5500, 及 6000
Nexus#show queuing interface ethernet 1/1
Ethernet1/1 queuing information:
  TX Queuing
    qos-group  sched-type  oper-bandwidth
        0       WRR            100
  RX Queuing
    qos-group 0
    q-size: 469760, HW MTU: 9216 (9216 configured)   

#Nexus 3000, 7000, 7700, 及 9000
Nexus#show interface ethernet 1/12
Ethernet1/12 is up
admin state is up, Dedicated Interface
  Hardware: 1000/10000 Ethernet, address: 7c0e.ceca.f183 (bia 7c0e.ceca.f183)
  MTU 9216 bytes, BW 10000000 Kbit, DLY 10 usec 

#Nexus 5000, 6000, 及 7000 的 FEX 接口
Nexus#show queuing interface ethernet 136/1/1
if_slot 68, ifidx 0x1f870000
Ethernet136/1/1 queuing information:
  Input buffer allocation:
  Qos-group: 0
  frh: 3
  drop-type: drop
  cos: 0 1 2 3 4 5 6 7
  xon       xoff      buffer-size
  ---------+---------+-----------
  19200     78080     90880

  Queueing:
  queue   qos-group    cos                 priority     bandwidth     mtu 
--------+------------+--------------------+---------+----------------+--------
  3                   0        0 1 2 3 4 5 6      WRR       100       9280

#**Nexus 9000 的FEX 接口 **
9396-B#show interface ethernet 104/1/1
Ethernet104/1/1 is up
admin state is up,
  Hardware: 100/1000 Ethernet, address: 5475.d0e0.e5c2 (bia 5475.d0e0.e5c2)
  MTU 9216 bytes, BW 1000000 Kbit, DLY 10 usec

  

 

 

 

Common causes switch interface appears (err-disable) are:

  • EtherChannel misconfiguration (port link aggregation protocol (PAgP oscillation))
  • Duplex mismatch (duplex mismatch)
  • BPDU port guard
  • UDLD (Uni-Link Detection)
  • Link-flap error (oscillating link)
  • Loopback error
  • Port security violation
  • DHCP Snooping speed limit

The reason err-disable analysis:

. 1, an EtherChannel misconfiguration: Ethernet Channel (EC) Configuration error:

  If you want the EC to work properly, the EC participation to the configuration port binding, must be consistent, such as in the same VLAN, same trunk mode, speed, duplex mode match and so on. If the EC disposed at one end, while the other end is not configured EC, STP will participate in the closed configuration to the EC EC one port. And when the swing is in PAgP mode on the mode switch information is not sent out to PAgP negotiation. In this case STP determines the loop problem, so the port is set to err-disable state

  The solution: the FEC mode configuration for the channel-group 1 mode desirable non- silent This means that only when the two sides after the FEC negotiated successfully established channel, otherwise the interface is still in the normal state.

2, Duplex mismatch: mismatched duplex mode.

  After the end configured to half-duplex, he will detect whether the peer data transmission, only stop transmitting data to the end, he would like to send ack packet to make the link up, but to end it became a full-duplex configuration he do not care whether the link is idle, so that he would stop sending requests link up, so go on, the link state becomes the err-disable.

3, BPDU port guard: BPDU lead

  That is, and portfast BPDU guard and relevant. If an interface is configured portfast, that means that this interface should be connected to a pc, pc will not send BPDU frame spanning-tree is, so this port also receives BPDU to generate spanning-tree, the administrator is also out of good intentions on the same interface is configured with BPDU guard to prevent unknown BPDU frame to enhance security, but he just does not care to configure a switch receives this BPDU guard and portfast on the interface, so this interface received a BPDU frame, because the configuration the BPDU guard, this interface is natural to enter into err-disable state.

  Solution: no spanning-tree portfast bpduguard default, or directly to the portfast off.

4, UDLD: Unidirectional Link Detection

  2 is a private UDLD cisco layer protocol for unidirectional link problem detection. Sometimes the physical layer is up but the link layer is down, this time you need UDLD to detect whether the link is really up. When the ends are configured UDLD AB, A sends B a frame containing its own port id UDLD after UDLD B receives a return frame, and which contains the A port id received, when A receives after this frame and the port id found himself among them, that this link is good. Conversely becomes a err-disable state. Suppose A is configured with UDLD, and B is not configured UDLD: A to B to send a frame containing its own port id after receipt of B does not know what the frame is that it does not return a UDLD frame contains the port id of A , this time a link would think this is a one-way link, naturally became the err-disable state.

5, Link-flap error: error jitter link.

  When the link up again within 10 seconds, Down five, then proceeds to err-disable state.

6, Loopback error: error loop

  When keepalive information, and from which this information is received from the interface after the switch egress port is sent, the loop error occurs. Keepalive message is sent out from all ports the switch by default. However, due to STP failed to block certain ports, causing these messages may be forwarded back to form a logical loop. Port will therefore enter err-disable state

7, port security: Port security policy violation

  Port security feature is provided according to the MAC address, the dynamic characteristics of the switch port protection. In violation of this policy will lead to enter the port err-disable state. Thanks to a port-security violation shutdown

Manual recovery mode err-disable of:

  ? Switch to enter the global configuration mode, perform errdisable recovery cause, you will see the following message:

Switch(config)#errdisable recovery cause ?
all                 Enable timer to recover from all causes
bpduguard           Enable timer to recover from BPDU Guard error disable state
channel-misconfig   Enable timer to recover from channel misconfig disable state
dhcp-rate-limit     Enable timer to recover from dhcp-rate-limit error disable state
dtp-flap            Enable timer to recover from dtp-flap error disable state
gbic-invalid        Enable timer to recover from invalid GBIC error disable state
l2ptguard           Enable timer to recover from l2protocol-tunnel error disable state link-flap Enable timer to recover from link-flap error disable state loopback Enable timer to recover from loopback detected disable state pagp-flap Enable timer to recover from pagp-flap error disable state psecure-violation Enable timer to recover from psecure violation disable state security-violation Enable timer to recover from 802.1x violation disable state udld Enable timer to recover from udld error disable state unicast-flood Enable timer to recover from unicast flood disable state vmps Enable timer to recover from vmps shutdown error disable state

  From the options listed, we can see, there are a lot of reasons cause the port is placed in an error state, assume that the cause of non-err-disable loop, you can type commands directly:

Switch(config)#errdisable recovery cause loopback        #显示被置于错误状态端口的恢复情况
Switch# show errdisable recovery
ErrDisable Reason    Timer Status
-----------------    --------------
udld                 Disabled
bpduguard            Disabled
security-violatio    Disabled
channel-misconfig    Disabled
vmps                 Disabled
pagp-flap            Disabled
dtp-flap Disabled link-flap Disabled gbic-invalid Disabled l2ptguard Disabled psecure-violation Disabled gbic-invalid Disabled dhcp-rate-limit Disabled unicast-flood Disabled loopback Enabled Timer interval: 300seconds Interfaces that will be enabled at the next timeout: Interface Errdisable reason Time left (sec) --------- ----------------- ----- --------- the Fa0 / 276. 8 Loopback the Fa0 / 267. 17 Loopback the Fa0 / 20 is Loopback 250 # information display can be seen from the above, this switch has three ports (Fa0 / 8, Fa0 / 17 , Fa0 / 20), respectively, will resume after 276,267,250 seconds a normal state, the reality is this, I waited a few minutes later, we found a laptop computer, were received tried it on these ports, port can work normally. This time finally re-switch without a case, several in "suspended animation" port state "save" back.

  By configuring the recovery cause errdisable? Recovery err-disable, IOS trying to recover after a period of time is set to err-disable an interface, this time the default is 300 seconds. However, if the source err-disable cause no cure, after recovery, the interface will again be set to err-disable. Adjust err-disable timeout, use the following command:

W1 (config) #errdisable Recovery interval The? 
<30-86400> timer- interval The (sec) 
can be adjusted 30-86400 seconds. The default is 300 seconds. 
If an err- reason disable is udld, below there is a very useful command: 

SW1 # UDLD the RESET 
No the ports are Disabled by UDLD.

 

Guess you like

Origin www.cnblogs.com/amonos/p/11229311.html