Professional Documents
Culture Documents
Version 3.1
Version 3.1.4
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 1
ATTENTION
The Information contained in this guide is intended for training purposes only. This guide contains information and activities that, while beneficial for
purposes of training in a close, non-production environment, can result in downtime or other severe consequences and therefore are not intended as a
reference guide. This guide is not a technical reference and should not, under any circumstances be used in a production environment. Customers should
refer to the published specifications applicable to specific products for technical information. The information in this guide is distributed AS IS, and the
use of this information or implementation of any recommendations or techniques herein is a customer’s responsibility.
COPYRIGHT
Outline
This guide includes these activities:
n Guided Lab 1: Cisco Nexus 7000 Platform Discovery
n Guided Lab 2: Configuring User Management
n Guided Lab 3: Configuring System Management
n Guided Lab 4: Configuring Troubleshooting Features
n Guided Lab 5: Configuring Layer 2 Switching
n Guided Lab 6: Configuring vPC
n Guided Lab 7: Configuring Cisco FabricPath
n Guided Lab 8: Troubleshooting vPCs and Cisco FabricPath
n Guided Lab 9: Configuring Layer 3 Switching
n Guided Lab 10: Configuring FHRP (Optional)
n Guided Lab 11: Configuring MPLS
n Guided Lab 12: Configuring Cisco OTV
n Guided Lab 13: Implementing VXLAN Bridging on the Nexus 7000
n Guided Lab 14: Configuring LISP
n Guided Lab 15: Configuring FCoE
n Guided Lab 16: Configuring Security Features (Optional)
n Guided Lab 17: Configuring QoS (Optional)
n Guided Lab 18: Using Cisco Nexus 7000 Series Switch NX-API
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 3
Configuring Cisco Nexus 7000 Switches ............................................................................. 1
Overview ......................................................................................................................................... 3
Outline ....................................................................................................................................................... 3
Job Aids..................................................................................................................................................... 8
Laboratory Topology ................................................................................................................................. 8
Lab Connections ....................................................................................................................................... 9
Lab IP Address Plan................................................................................................................................ 12
Lab 0: Accessing the Remote Lab Environment ....................................................................... 13
Activity Objective ..................................................................................................................................... 13
Lab Topology........................................................................................................................................... 13
Task 1: Connect to the Remote Lab Environment .................................................................................. 14
Device Credentials .................................................................................................................................. 17
Guided Lab 1: Cisco Nexus 7000 Platform Discovery .............................................................. 18
Overview ................................................................................................................................................. 18
Visual Objective ....................................................................................................................................... 18
Required Resources................................................................................................................................ 18
Command List (Optional) ........................................................................................................................ 19
Task 1: Management Connectivity .......................................................................................................... 20
Task 2: Validation .................................................................................................................................... 21
Task 3: Interface Configuration ............................................................................................................... 27
Task 4: Layer 3 Connectivity ................................................................................................................... 30
Task 5: Checkpoints and Rollback .......................................................................................................... 32
Guided Lab 2: Configuring User Management .......................................................................... 38
Overview ................................................................................................................................................. 38
Visual Objective ....................................................................................................................................... 38
Required Resources................................................................................................................................ 38
Command List (Optional) ........................................................................................................................ 39
Task 1: Management Connectivity .......................................................................................................... 40
Task 2: AAA Server ................................................................................................................................. 40
Task 3: AAA ............................................................................................................................................ 42
Task 4: Users and Roles ......................................................................................................................... 43
Guided Lab 3: Configuring System Management ..................................................................... 46
Overview ................................................................................................................................................. 46
Visual Objective ....................................................................................................................................... 46
Required Resources................................................................................................................................ 46
Command List (Optional) ........................................................................................................................ 47
Task 1: Management Connectivity and Preparation ............................................................................... 49
Task 2: Scheduler ................................................................................................................................... 49
Task 3: Cisco (Smart) Call Home ............................................................................................................ 52
Task 4: Cisco Fabric Services (Optional) ................................................................................................ 58
Task 5: Cisco DCNM (Optional) .............................................................................................................. 64
Guided Lab 4: Configuring Troubleshooting Features ............................................................. 73
Overview ................................................................................................................................................. 73
Visual Objective ....................................................................................................................................... 73
Required Resources................................................................................................................................ 73
Command List (Optional) ........................................................................................................................ 74
Task 1: Management Connectivity .......................................................................................................... 75
Task 2: RMON ......................................................................................................................................... 75
Task 3: EEM ............................................................................................................................................ 77
Task 4: SPAN .......................................................................................................................................... 80
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 5
Guided Lab 10: Configuring FHRP (Optional) ......................................................................... 159
Overview ............................................................................................................................................... 159
Visual Objective ..................................................................................................................................... 159
Required Resources.............................................................................................................................. 159
Command List ....................................................................................................................................... 159
Task 1: Management Connectivity and Preparation ............................................................................. 161
Task 2: Configure HSRP ....................................................................................................................... 163
Task 3: Virtual Router Redundancy Protocol ........................................................................................ 165
Task 4: Gateway Load Balancing Protocol ........................................................................................... 168
Guided Lab 11: Configuring MPLS (Optional) ......................................................................... 170
Overview ............................................................................................................................................... 170
Visual Objective ..................................................................................................................................... 170
Required Resources.............................................................................................................................. 170
Command List ....................................................................................................................................... 171
Task 1: Management Connectivity and Preparation ............................................................................. 172
Task 2: Configure Basic MPLS ............................................................................................................. 174
Task 3: Configure MPLS Layer 3 VPNs ................................................................................................ 177
Task 4: Configure MPLS Traffic Engineering ........................................................................................ 181
Guided Lab 12: Configuring Cisco OTV ................................................................................... 186
Overview ............................................................................................................................................... 186
Visual Objective ..................................................................................................................................... 186
Required Resources.............................................................................................................................. 186
Command List ....................................................................................................................................... 187
Task 1: Management Connectivity and Preparation ............................................................................. 189
Task 2: Configuring Basic Cisco OTV ................................................................................................... 191
Task 3: Configuring Advanced OTV (Optional) ..................................................................................... 194
Guided Lab 13: Implementing VXLAN ...................................................................................... 197
Overview ............................................................................................................................................... 197
Required Resources.............................................................................................................................. 197
Command List ....................................................................................................................................... 198
Task 1: Management Connectivity and Preparation ............................................................................. 199
Task 2: Implement IP routing ................................................................................................................ 201
Task 3: Configure Multicast on Nexus 7000 Switches .......................................................................... 204
Task 4: Configure VXLAN Bridging ....................................................................................................... 206
Task 5: Configure centralized VXLAN Routing...................................................................................... 211
Guided Lab 14: Configuring LISP (Optional) ........................................................................... 214
Overview ............................................................................................................................................... 214
Visual Objective ..................................................................................................................................... 214
Required Resources.............................................................................................................................. 214
Command List ....................................................................................................................................... 214
Task 1: Management Connectivity and Preparation ............................................................................. 216
Task 2: Configure LISP ......................................................................................................................... 218
Task 3: Configure LISP VM Mobility ...................................................................................................... 220
Guided Lab 15: Configuring FCoE ............................................................................................ 222
Overview ............................................................................................................................................... 222
Visual Objective ..................................................................................................................................... 222
Required Resources.............................................................................................................................. 222
Command List ....................................................................................................................................... 223
Task 1: Management Connectivity and Preparation ............................................................................. 224
Task 2: Basic Configuration on the Cisco MDS Switch ......................................................................... 225
Task 3: Configuring FCoE on the Cisco Nexus 5000 Switch ................................................................ 227
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 7
Job Aids
Use the following job aids while performing the lab tasks in this lab guide.
Laboratory Topology
This diagram illustrates the physical topology of the lab pod that is used in this course.
FastLane(7K/5K/2K(Nexus(Lab((Rev.(5.0)(
FC(JBOD(
N7K(to(N7K(40GE:(
Pod1+2:(7/7W8( Windows(with(CNA(
Pod3+4:(7/9W10( 3( 3( MDS9124(
Pod5+6:(7/11W12( MDS9124(
(
For(4(Students(
N7K(to(N5K(40GE:(
Pod1:( (7/1(on(both(N7K( 1( 2( N7KW1( N7KW2( 1( 2( (
Pod2:( (7/2(on(both(N7K( GE(
Pod3:( (7/3(on(both(N7K((
Pod4:( (7/4(on(both(N7K(
Pod5:( (7/5(on(both(N7K( FC(
Pod6:( (7/6(on(both(N7K(
(
N7K(to(N2K(FEX:(
10GE(
2/1(2/2( 2/1(2/2(
none((Port(4(on(FEX(not(used)( 47( 48(
47( 48(
2/5( 2/5( 40GE(
2/6( 2/6(
11( 11(
4(
4(
9( 10( 3( 3( 10( 9(
1(2(3(4( 4(3(2(1(
From To
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 9
From To
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 11
Lab IP Address Plan
This table lists the IP addresses that are configured on the devices in this course.
Activity Objective
After completing this activity, you will be able to meet this objective:
n Connect to the remote lab environment
Lab Topology
FastLane&ACI&Lab&
OSPF&router&
40&
Cisco&
40& 2P& L2&switch&
2P&
APIC&
1P& P& P&
1P&
BareMetal&
Host1&
Web&VM,&
App&VM&
vCenter& DB&VM&
Student&PC& Appl.& ESXi1& vASA& ESXi2&
BareMetal&
Host2&
Management&Network&
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 13
Task 1: Connect to the Remote Lab Environment
In this task, you will connect to the remote labs.
Activity Procedure
Complete these steps:
Step 1 Start the remote lab client on your local PC
Step 2 Select “Preferences” and select a sensible Resolutin (as big as possible but a
smaller than the display in front of you)
Step 3 Verify the connection tests are all “green” – If not click “recheck” – of the
problem persists notify your instructor.
Step 4 Click OK
Step 5 Click the “Select Option 1” to log into the RemoteLab1.0 based lab.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 15
Step 8 Click on the “Win PC” in the lower left corner to start your RDP session.
Step 9 For a console connection to your Nexus 5000 click the Nexus 5000 switch
Step 10 For a console connection to your MDS click the MDS switch
Step 11 The nexus 7000 is NOT reachable via console (there is just one console and that
belongs to the admin context) – click the PC in the lower left corner and open a
putty ssh session to 192.168.0.20P (P is your Pod #) for access.
Step 12 Use the user account “Administrator” with the password “1234QWer” to log into
your student PC
Caution Whenever this lab guides talks about the Student PC the remote controlled PC is referred to,
never the local PC.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 17
Guided Lab 1: Cisco Nexus 7000 Platform Discovery
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Connect to the Cisco Nexus 7000 Switch
n Validate key Cisco Nexus 7000 hardware and software parameters
n Configure I/O module interfaces in your VDC
n Assign IP addresses to interfaces and validate Layer 3 connectivity
n Create a configuration checkpoint and perform a rollback operation
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5600 Series Switches, two Cisco Nexus 2000 Series Fabric Extenders,
and servers. These are the resources and equipment that are required to complete this activity:
n A PC connected to an onsite laboratory or a PC with an Internet connection, which is required
to access the remote laboratory equipment
n A lab switch that is connected to the management port of each laboratory device, if using a
remote laboratory
Command Description
checkpoint {[cp-name] [description descr] | This command creates a checkpoint of the running
file filename } configuration to either a user checkpoint name or a file.
rollback running-config checkpoint cp- This command creates a rollback to the specified
name checkpoint name or file.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 19
Task 1: Management Connectivity
In this task, you will use a Telnet or terminal utility to establish a connection to the default VDC.
Activity Procedure
Complete these steps:
Step 1 Using the remote access procedure and the login credentials that were provided to you
by your instructor, complete a connection to the DCNX7K lab.
Step 2 Log into the remote server.
Step 3 Start the SSH client on the remote server.
Step 4 Connect to the default Nexus 7000 VDC belonging to your pod.
N7K-1 (192.168.0.210) is the default VDC for pods 1, 3 and 5.
N7K-2 (192.168.0.220) is the default VDC for pods 2, 4 and 6.
Step 5 Use the login user name is podP and password podP, where P is your pod number.
Step 6 Connect to your Nexus 5000 switch by clicking on the icon in the remote lab GUI, log
in with user “admin” and password “1234QWer”
Note If the Nexus 5000 is initial config mode: Assign the admin password “1234QWer” and do NOT
enter setup. (crtl&c will break out of setup if you entered it by mistake – the only saved change
will be the admin password)
Activity Verification
You have completed this task when you attain these results:
n You have connected to the Nexus 7000 default VDC.
Activity Procedure
Complete these steps:
Step 1 View the bootflash directory.
N7K-1# dir bootflash:
15 Nov 19 05:33:15 2014 admin.rc.cli
4096 Jan 15 22:54:56 2015 lost+found/
477631895 Jun 22 13:39:18 2015 n7000-s2-dk9.7.2.0.D1.1.bin
67478627 Jun 22 13:41:49 2015 n7000-s2-epld.7.2.0.D1.1.img
37505536 Jun 22 13:40:36 2015 n7000-s2-kickstart.7.2.0.D1.1.bin
4096 Nov 28 21:22:18 2014 scripts/
4096 Jan 16 00:50:28 2015 vdc_2/
4096 Jan 16 01:07:50 2015 vdc_3/
4096 Jul 22 15:55:02 2013 vdc_4/
4096 Jan 19 16:20:34 2015 vdc_5/
Q1) What is the file size of each kickstart and system image?
Step 2 Determine the system software version that is currently running on the Cisco Nexus
7010 Switch.
N7K-1# show version
Software
BIOS: version 2.12.0
kickstart: version 7.2(0)D1(1)
system: version 7.2(0)D1(1)
BIOS compile time: 05/29/2013
kickstart image file is: bootflash:///n7000-s2-kickstart.7.2.0.D1.1.bin
kickstart compile time: 5/19/2015 11:00:00 [06/14/2015 21:46:33]
system image file is: bootflash:///n7000-s2-dk9.7.2.0.D1.1.bin
system compile time: 5/19/2015 11:00:00 [06/14/2015 23:40:32]
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 21
Hardware
cisco Nexus7000 C7010 (10 Slot) Chassis ("Supervisor Module-2")
Intel(R) Xeon(R) CPU with 12224912 kB of memory.
Processor Board ID JAF1726BCLF
plugin
Core Plugin, Ethernet Plugin
NAME: "Slot 33", DESCR: "Nexus7000 C7010 (10 Slot) Chassis Power Supply"
PID: N7K-AC-6.0KW , VID: V02 , SN: AZS15420093
NAME: "Slot 34", DESCR: "Nexus7000 C7010 (10 Slot) Chassis Power Supply"
PID: N7K-AC-6.0KW , VID: V02 , SN: AZS15420095
NAME: "Slot 36", DESCR: "Nexus7000 C7010 (10 Slot) Chassis Fan Module"
PID: N7K-C7010-FAN-S , VID: V01 , SN: FLN154400CV
NAME: "Slot 37", DESCR: "Nexus7000 C7010 (10 Slot) Chassis Fan Module"
PID: N7K-C7010-FAN-S , VID: V01 , SN: FLN154400HA
NAME: "Slot 38", DESCR: "Nexus7000 C7010 (10 Slot) Chassis Fan Module"
PID: N7K-C7010-FAN-F , VID: V02 , SN: FOX1543XA7B
NAME: "Slot 39", DESCR: "Nexus7000 C7010 (10 Slot) Chassis Fan Module"
PID: N7K-C7010-FAN-F , VID: V02 , SN: FOX1543XA3R
Q9) How many system fans (FAN-S) are installed in this chassis?
Q11) How many fabric fans (FAN-F) are installed in this chassis?
Q13) How many empty I/O module slots are there in this chassis?
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 23
Q14) Which supervisor slot is active?
Actual Power
Module Model Draw Allocated Status
(Watts ) (Watts )
------- ------------------- ----------- ----------- --------------
5 N7K-SUP2 92 W 190 W Powered-Up
6 supervisor N/A 0 W Absent
7 N7K-F312FQ-25 279 W 340 W Powered-Up
Xb1 N7K-C7010-FAB-1 N/A 80 W Powered-Up
Xb2 N7K-C7010-FAB-1 N/A 80 W Powered-Up
Xb3 xbar N/A 80 W Absent
Xb4 xbar N/A 80 W Absent
Xb5 xbar N/A 80 W Absent
fan1 N7K-C7010-FAN-S 198 W 720 W Powered-Up
fan2 N7K-C7010-FAN-S 198 W 720 W Powered-Up
fan3 N7K-C7010-FAN-F 11 W 120 W Powered-Up
fan4 N7K-C7010-FAN-F 11 W 120 W Powered-Up
Clock:
----------------------------------------------------------
Clock Model Hw Status
----------------------------------------------------------
A Clock Module -- NotSupported/None
B Clock Module -- NotSupported/None
Fan:
------------------------------------------------------
Fan Model Hw Status
------------------------------------------------------
Fan1(sys_fan1) N7K-C7010-FAN-S 1.1 Ok
Fan2(sys_fan2) N7K-C7010-FAN-S 1.1 Ok
Fan3(fab_fan1) N7K-C7010-FAN-F 1.1 Ok
Fan4(fab_fan2) N7K-C7010-FAN-F 1.1 Ok
Fan_in_PS1 -- -- Ok
Fan_in_PS2 -- -- Ok
Temperature:
--------------------------------------------------------------------
Module Sensor MajorThresh MinorThres CurTemp Status
(Celsius) (Celsius) (Celsius)
--------------------------------------------------------------------
5 Inlet (s1) 60 42 20 Ok
5 PMFPGA (s2) 80 60 26 Ok
5 Crossbar(s3) 105 95 29 Ok
5 L2L3Dev1(s4) 105 95 23 Ok
5 Arbiter (s5) 105 95 33 Ok
5 CPU1CORE1(s6) 85 70 28 Ok
5 CPU1CORE2(s7) 85 70 23 Ok
5 CPU1CORE3(s8) 85 70 29 Ok
5 CPU1CORE4(s9) 85 70 23 Ok
5 DDR3DIMM1(s14) 95 85 27 Ok
5 DDR3DIMM2(s15) 95 85 28 Ok
5 DDR3DIMM3(s16) 95 85 27 Ok
7 Crossbar(s1) 125 105 36 Ok
7 Arb-mux (s2) 125 105 32 Ok
7 L2L3Dev1(s4) 125 105 40 Ok
7 L2L3Dev2(s5) 125 105 38 Ok
7 L2L3Dev3(s6) 125 105 36 Ok
7 L2L3Dev4(s7) 125 105 32 Ok
7 L2L3Dev5(s8) 125 105 38 Ok
7 L2L3Dev6(s9) 125 105 34 Ok
xbar-1 Intake (s2) 60 42 21 Ok
xbar-1 Crossbar(s3) 105 95 36 Ok
xbar-2 Intake (s2) 60 42 20 Ok
xbar-2 Crossbar(s3) 105 95 34 Ok
Mod Sw Hw
--- --------------- ------
5 7.2(0)D1(1) 1.1
7 7.2(0)D1(1) 1.1
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 25
7 28-c7-ce-5d-fb-24 to 28-c7-ce-5d-fb-5f JAE183107YH
Xbar Sw Hw
--- --------------- ------
1 NA 1.1
2 NA 1.1
Activity Verification
You have completed this task when you attain these results:
n You have successfully identified key software and hardware parameters.
Activity Procedure
Complete these steps:
Caution DO NOT continue to use the SSH session from the last Task!
-----------------------------------------------------------------------------
Port VRF Status IP Address Speed MTU
-----------------------------------------------------------------------------
mgmt0 -- up 192.168.0.20P 1000 1500
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
Eth7/A 1 eth access down Administratively down auto(D) --
Eth7/B 1 eth access down Administratively down auto(D) --
Eth7/C 1 eth access down Administratively down auto(D) --
Eth7/D 1 eth access down Administratively down auto(D) --
Q18) Are the I/O module interfaces currently set to perform as Layer 2 or Layer 3 interfaces?
Step 5 Determine the QSFP+ transceiver type that is installed in module 7. (Replace the letter
in the first column with the exact interface number for your pod.)
N7K-Y-podP# show interface ethernet 7/A, ethernet 7/B, ethernet 7/C, ethernet
7/D transceiver
Ethernet7/A
transceiver is present
type is QSFP-40G-AOC
name is CISCO
part number is AFBR-7QER02Z-CS1
revision is 01
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 27
serial number is AVE1811B0DN-A
nominal bitrate is 10300 MBit/sec per channel
Link length supported for copper is 2 m
cisco id is --
cisco extended id number is 16
cisco part number is 10-2928-01
cisco product id is QSFP-H40G-AOC2M
cisco vendor id is V01
Ethernet7/B
transceiver is present
type is QSFP-40G-AOC
name is CISCO
part number is AFBR-7QER03Z-CS1
revision is 01
serial number is AVE1828C04S-B
nominal bitrate is 10300 MBit/sec per channel
Link length supported for copper is 3 m
cisco id is --
cisco extended id number is 16
cisco part number is 10-2927-01
cisco product id is QSFP-H40G-AOC3M
cisco vendor id is V01
Ethernet7/C
transceiver is present
type is QSFP-40G-AOC
name is CISCO
part number is AFBR-7QER03Z-CS1
revision is 01
serial number is AVE1828C04D-B
nominal bitrate is 10300 MBit/sec per channel
Link length supported for copper is 3 m
cisco id is --
cisco extended id number is 16
cisco part number is 10-2927-01
cisco product id is QSFP-H40G-AOC3M
cisco vendor id is V01
Ethernet7/D
transceiver is present
type is QSFP-40G-AOC
name is CISCO
part number is AFBR-7QER03Z-CS1
revision is 01
serial number is AVE1828C053-A
nominal bitrate is 10300 MBit/sec per channel
Link length supported for copper is 3 m
cisco id is --
cisco extended id number is 16
cisco part number is 10-2927-01
cisco product id is QSFP-H40G-AOC3M
cisco vendor id is V01
Q20) What is the maximum distance between devices that this transceiver will support?
N7K-Y-podP# config
N7K-Y-podP(config)# interface eth 7/A, eth 7/B, eth 7/C, eth 7/D
N7K-Y-podP (config-if-range)# no shutdown
N7K-Y-podP(config-if-range)# show interface brief | include up
Note The interface will only show “up” if your partner pod has also enabled their interface.
10G (D) = 10 Gbps Dedicated, 10G(S) = 10 Gbps Shared, 40G (D) = 40 Gbps
Dedicated.
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the Layer 2 connectivity and confirmed that
traffic can pass between devices.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 29
Task 4: Layer 3 Connectivity
During this exercise, you will assign IP addresses to the interfaces and verify Layer 3 connectivity
using the ping command.
Activity Procedure
Complete these steps:
Step 1 Verify Cisco Discovery Protocol neighbors.
Note Your partner pod must have completed task 3. Work together with them for this lab to succeed.
Step 2 Using the addresses that are listed in the “Lab IP Addresses Plan” section of this Lab
Guide, assign IP address 192.168.100.7P (P is your pod number) to the interface on
module 7, connected to peer pod. Addresses can be found in the “Job Aids” section of
this Lab Guide.
N7K-Y-podP # config
N7K-Y-podP (config-if)# interface ethernet X/C
N7K-Y-podP (config-if)# no switchport
N7K-Y-podP (config-if)# ip address 192.168.100.7P/24
Step 3 Verify that the IP addresses have been applied.
N7K-Y-podP (config-if)# show ip interface brief
IP Interface Status for VRF "default"(1)
Interface IP Address Interface Status
EthernetX/C 192.168.100.7P protocol-up/link-up/admin-up
Step 4 Verify Layer 3 link connectivity between interfaces using the ping command.
Note Before completing Step 4, assure that the peer pod has completed Steps 1 through 3 too.
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the Layer 3 connectivity and confirmed that
traffic can pass between devices.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 31
Task 5: Checkpoints and Rollback
This exercise will familiarize you with creating and utilizing a configuration checkpoint and
rollback. This exercise allows you to name and retrieve the saved running configuration from a
particular point in time. Creating a checkpoint is a convenient feature that allows you to revert to
an older running configuration. An older running configuration may be required because of
configuration error or instability of the existing configuration.
Activity Procedure
Complete these steps:
Step 1 Switch to your Nexus 5000 terminal session
Step 2 View the running configuration.
Step 3 Display existing checkpoints on your Nexus 5000
N5K-P# show checkpoint summary
N5K-P#
Step 4 Check the options for the checkpoint command..
N5K-P# checkpoint ?
<CR>
WORD Checkpoint name (Max Size 80)
description Checkpoint description for the given checkpoint
file Create configuration rollback checkpoint to file
Note Your Nexus 5000 may not display the “continue” warning depending on existence of that file.
N5K-P#
version 6.0(2)N2(1)
switchname N5K-P
feature telnet
!#feature ssh
feature lldp
<…snip…>
Note Checkpoint files are just text files on the file system.
!!
!
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 33
hostname blablubb
blablubb#
Step 12 Check the differences between the running-config and the base checkpoint (this is what
we need to do to get the old config back.
blablubb# sho diff rollback-patch running-config checkpoint base
Collecting Running-Config
#Generating Rollback Patch
!!
!
switchname N5K-P
blablubb#
Step 13 Create a new NVRAM based checkpoint named “newname”
blablubb(config)# checkpoint newname
....Done
blablubb(config)#
Step 14 Check the differences between the running-config and the newname checkpoint (should
be empty)
blablubb(config)# sho diff rollback-patch running-config
checkpoint newname
Collecting Running-Config
#Generating Rollback Patch
Rollback Patch is Empty
blablubb(config)#
Step 15 Enable the HTTP server on the Nexus 5000 switch
blablubb# conf
Enter configuration commands, one per line. End with CNTL/Z.
blablubb(config)# feature http-server
blablubb(config)# exit
Step 16 Check the changes since we created “base” (how to get from “base” to “running-
config”)
blablubb# sho diff rollback-patch checkpoint base running-config
Collecting Running-Config
#Generating Rollback Patch
!!
!
switchname blablubb
no feature http-server
blablubb#
Step 17 Check how to “undo” the changes since we created base (how to get from “running-
config” to “base”
blablubb# sho diff rollback-patch running-config checkpoint base
Collecting Running-Config
#Generating Rollback Patch
!!
!
feature http-server
blablubb#
Step 19 Check what changes where done between “base” and “newname”
blablubb# sho diff rollback-patch checkpoint base checkpoint newname
#Generating Rollback Patch
!!
!
hostname blablubb
blablubb#
Step 20 Check how to get back from current running config to “newname”
blablubb# sho diff rollback-patch running-config checkpoint newname
Collecting Running-Config
#Generating Rollback Patch
!!
no feature http-server <- Note the NO command here!!!
blablubb#
Step 21 Check how to get back from current running config to “base”
blablubb# sho diff rollback-patch running-config checkpoint base
Collecting Running-Config
#Generating Rollback Patch
!!
!
switchname N5K-P
no feature http-server <- Note the NO command here!!!
blablubb#
Step 22 Rollback the configuration to “base”
blablubb# rollback running-config checkpoint base
Collecting Running-Config
Generating Rollback patch for switch profile
Rollback Patch is Empty
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 35
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
N5K-P#
blablubb#
Step 24 Reconfigure the http server
blablubb# conf
Enter configuration commands, one per line. End with CNTL/Z.
blablubb(config)# feature http-server
blablubb(config)# exit
Step 25 Rollback to the file-based checkpoint “base” using the verbose option
blablubb# rollback running-config file base verbose
Collecting Running-Config
Generating Rollback patch for switch profile
Rollback Patch is Empty
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
========================================================
N5K-P#
Step 26 Remove checkpoint newname using the no form of the command.
N5K-P# no checkpoint newname
....Done
N5K-P#
Note A file-based checkpoint is deleted by just deleting the file from flash
N5K-P#
Activity Verification
You have completed this task when you attain these results:
n You have created configuration checkpoints. You have made some changes to the
configuration, compared configurations and you have successfully rolled back to the previous
checkpoint.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 37
Guided Lab 2: Configuring User Management
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Verify that the AAA server is configured correctly
n Configure the Cisco Nexus 7000 Switch to support central authentication through the AAA
server
n Verify the AAA configuration
n Configure the Cisco Nexus 7000 Switch to support local authentication by configuring local
users and roles
n Verify local authentication, local users, and roles configuration
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
Command Description
aaa authentication login default group This command configures the default authentication
radius methods.
permit vrf This command specifies the VRF that the role can
access.
radius-server host X.X.X.X key key This command specifies the IPv4 and key for a
RADIUS server to use for authentication.
role name name This command specifies a user role and enters role
configuration mode.
show running-config aaa This command displays the AAA configuration in the
running configuration.
vlan policy deny This command enters role VLAN policy configuration
mode.
vrf policy deny This command enters role VRF policy configuration
mode.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 39
Task 1: Management Connectivity
In this task, you will use a Telnet or terminal utility to establish management connectivity on your
pod.
Activity Procedure
Complete these steps:
Step 1 Start the SSH client on the remote server.
Step 2 Connect to your pod Nexus 7000 VDC at 192.168.0.20P with username “admin” and
password “1234QWer”.
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod VDC.
Activity Procedure
Complete these steps:
Step 1 Open a session to your Windows server. Login using the username Administrator and
password 1234QWer.
Step 2 Launch the Network Policy Server from the taskbar icon.
Note The user “student” with the password “student” is setup in Windows.
Activity Verification
You have completed this task when you attain these results:
n You have verified that the AAA server is correctly configured with show and test commands.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 41
Task 3: AAA
In this task, you will configure the Cisco Nexus 7000 Switch to support central authentication
through the AAA server, and verify that the configuration has been correctly applied.
Activity Procedure
Complete these steps:
Step 1 Configure the VDC AAA login authentication in your pod.
N7K-Y-podP(config)# aaa authentication login default group radius
version 7.2(0)D1(1)
aaa authentication login default group radius
Caution Do not close your ssh session during the completion of the task.
Activity Verification
You have completed this task when you attain these results:
n You have used show commands to verify the AAA configuration on the switch.
Activity Procedure
Complete these steps:
Step 1 Verify the AAA login authentication configuration and insure that local method is
configured.
N7K-Y-podP(config)# show running-config aaa all
version 7.2(0)D1(1)
aaa authentication login default local
aaa authorization ssh-publickey default local
aaa authorization ssh-certificate default local
aaa accounting default local
aaa user default-role
aaa authentication login default fallback error local
aaa authentication login console fallback error local
no aaa authentication login invalid-username-log
no aaa authentication login error-enable
no aaa authentication login mschap enable
no aaa authentication login mschapv2 enable
no aaa authentication login chap enable
no aaa authentication login ascii-authentication
no radius-server directed-request
Step 2 Issue the show role command.
N7K-Y-podP(config)# show role
Role: vdc-admin
Description: Predefined vdc admin role has access to all commands within a VDC
instance
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
1 permit read-write
Role: vdc-operator
Description: Predefined vdc operator role has access to all read commands
within a VDC instance
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
1 permit read
---output ommited---
Role: vdc-admin
Description: Predefined vdc admin role has access to all commands within a VDC
instance
-------------------------------------------------------------------
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 43
Rule Perm Type Scope Entity
-------------------------------------------------------------------
1 permit read-write
Role: vdc-operator
Description: Predefined vdc operator role has access to all read commands
within a VDC instance
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
1 permit read
---output ommited---
Role: Netadmin
Description: new role
Vlan policy: permit (default)
Interface policy: permit (default)
Vrf policy: permit (default)
Step 4 Assign read and write privileges to the newly created role Netadmin.
N7K-Y-podP(config-role)# rule 1 permit read-write
Step 5 Modify VLAN and VRF polices for the newly created role. Deny all VLANs except for
the range 1–100 and deny all VRF instances except VRF Webservers and VRF
Appservers.
N7K-Y-podP(config-role)# vlan policy deny
N7K-Y-podP(config-role-vlan)# permit vlan 1-100
N7K-Y-podP(config-role-vlan)# vrf policy deny
N7K-Y-podP(config-role-vrf)# permit vrf Webservers
N7K-Y-podP(config-role-vrf)# permit vrf Appservers
N7K-Y-podP(config-role-vrf)# show role name Netadmin
Role: Netadmin
Description: new role
Vlan policy: deny
Permitted vlans: 1-100
Interface policy: permit (default)
Vrf policy: deny. Permitted vrfs Webservers,Appservers
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
1 permit read-write
Role: Netadmin
Description: new role
Vlan policy: deny
Permitted vlans: 1-100
Interface policy: deny
Permitted interfaces:
Step 8 Attach the role Netadmin to the new user RBACNetadmin with the password “test123.”
N7K-Y-podP(config-role-interface)# username RBACNetadmin password test123 role
Netadmin
Step 9 Assign the new password.
N7K-pod1(config)# username RBACNetadmin password 1234QWer role Netadmin
Step 10 Log into your VDC using the new user account and test RBAC.
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the local user and roles configuration. You have
successfully logged on as that user and verified the restriction in commands available for that
role.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 45
Guided Lab 3: Configuring System Management
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure Cisco Fabric Services on the Cisco Nexus 7000 Switch and verify the configuration
n Configure the scheduler to run a job periodically and on demand, and verify that the job runs
automatically when required
n Configure Cisco Smart Call Home to send an email message when an event occurs, and verify
that the email is received by the intended recipient
n Use Cisco Prime DCNM and monitor and manage the Cisco Nexus 7000 Switch
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
callhome test This command generates a Smart Call Home message for
testing purposes.
cfs ipv4 distribute This command enables Cisco Fabric Services distribution
over IPv4.
cfs ipv4 mcast-address group-address This command changes the IPv4 multicast address that is
used for Cisco Fabric Services over IPv4.
copy bootflash:filename tftp://ip-address vrf vrf This command copies a file in bootflash to a TFTP server.
copy running-config bootflash:/ filename This command copies the current running configuration to a
file in bootflash.
destination-profile name alert-group groups This command sets the Smart Call Home alert groups for a
destination profile.
destination-profile name email-addr email- This command sets the email address to which Smart Call
address Home messages for a destination profile are sent.
destination-profile name format format This command creates a Smart Call Home destination
profile using XML, short text, or full text format.
destination-profile name message-level level This command sets the Smart Call Home message level for
a destination profile.
destination-profile name message-size size This command sets the maximum message size for a Smart
Call Home destination profile.
email-contact email-address This command sets the email contact for Smart Call Home.
phone-contact phone-number This command sets the contact phone number for Smart
Call Home.
radius-server host ip-address key key This command configures a RADIUS server and key.
rule nr permit read feature feature This command creates a rule that grants read access for a
specific feature.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 47
Command Description
rule nr permit read-write feature feature This command creates a rule that grants read-write access
for a specific feature.
show application pending-diff This command displays the pending Cisco Fabric Services
changes for an application.
show callhome destination-profile profile This command displays the operational parameters for a
name Smart Call Home destination profile.
show callhome transport This command displays the transport settings for Smart Call
Home messages.
show cfs lock This command displays the Cisco Fabric Services locks in
the fabric.
show cfs peers This command displays the active Cisco Fabric Services
peers.
show cfs regions This command displays the active Cisco Fabric Services
regions.
show cli variables This command displays the Cisco NX-OS system and user-
defined CLI variables.
show radius-server ip-address This command displays the RADIUS servers on the switch.
show role name name This command displays a specific user role on the switch.
show scheduler schedule This command displays the configured schedules on the
switch.
snmp-server contact contact-name This command sets the SNMP contact name.
streetaddress address This command sets the contact address for Smart Call
Home.
time start +time This command sets the start time for a schedule as an offset
to the current time.
time weekly day-and-time This command sets a weekly recurring time for a schedule.
transport email from email-address This command sets the “from” email address that is used in
Smart Call Home messages.
transport email reply-to email-address This command sets the “reply-to” email address that is used
in Smart Call Home messages.
transport email smtp-server ip-address use-vrf This command sets the IP address for the SMTP server that
vrf is used to send Smart Call Home messages.
Activity Procedure
Complete these steps:
Step 1 Start the SSH client on the remote server.
Step 2 Connect to your pod Nexus 7000 VDC at 192.168.0.20P with username “admin” and
password “1234QWer”.
Task 2: Scheduler
In this task you will configure the scheduler to run a job periodically and on demand, and verify
that the job runs automatically when required.
Activity Procedure
Complete these steps:
Step 1 Start the 3CDeamon TFTP server on the REMOTE Windows server using the taskbar
shortcut.
Caution DO NOT start the TFTP server on your local classroom PC.
Step 2 Examine the default CLI variables that are available on your VDC.
Step 3 Copy the running configuration to the TFTP server that is running on your Windows
server. Use the IP address on the management network for the server, which is
192.168.0.P1 (P is your pod Number).
Note If this address is not reported by the TFTP Server you probably started the TFTP server on the
local PC, not on the remote server.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 49
Step 4 Enable the scheduler feature.
Step 5 Create a scheduler job named BACKUP-CFG. Copy the running configuration to the
TFTP server in your pod using the management IP address (192.168.0.P1) where P is
your pod number.
Step 6 Create a schedule named DAILY where the job starts immediately and will repeat once
every 24 hours.
N7K-Y-podP(config)# scheduler schedule name DAILY
N7K-Y-podP(config-schedule)# job name BACKUP-CFG
N7K-Y-podP(config-schedule)# time start now repeat 24:00
Schedule starts from Tue Jan 20 11:41:26 2015
Step 7 Verify your configuration.
config terminal
scheduler job name BACKUP-CFG
copy running-config tftp://192.168.0.P1/$(SWITCHNAME)-$(TIMESTAMP).cfg vrf
management
end
config terminal
scheduler schedule name DAILY
time start 2015:01:20:11:41 repeat 24:0
job name BACKUP-CFG
end
==============================================================================
Step 10 Wait for a few minutes, then verify that the job has been completed using the scheduler
log file.
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the scheduler configuration, and then run the
scheduler job and confirmed that it runs as required.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 51
Task 3: Cisco (Smart) Call Home
During this exercise, you will configure Cisco Smart Call Home to send an email message when an
event occurs, and verify that the intended recipient receives the email.
Activity Procedure
Complete these steps:
Step 1 Configure the SNMP system contact on your pod Cisco Nexus 7000 (podP@cisco.com,
where P is your pod number).
Step 2 Enter the Call Home configuration context and specify customer and contact
information.
N7K-Y-podP(config)# callhome
N7K-Y-podP(config-callhome)# email-contact podP@cisco.com
N7K-Y-podP(config-callhome)# phone-contact +49-40-25334610
N7K-Y-podP(config-callhome)# streetaddress Gasstrasse 4 D-22761 Hamburg
Step 3 Verify the Call Home parameters.
Step 5 Configure two more profiles for short messages and the NOC.
N7K-Y-podP(config-callhome)# destination-profile SMS
N7K-Y-podP(config-callhome)# destination-profile SMS format short-txt
N7K-Y-podP(config-callhome)# destination-profile NOC
N7K-Y-podP(config-callhome)# destination-profile NOC format XML
Step 8 Configure all profiles to use email address podP@cisco.com (where P is your pod
number) as the receiver.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 53
smtp server:192.168.0.10
smtp server port:25
smtp server vrf:management
smtp server priority:0
Step 11 Configure the Cisco Call Home periodic inventory notification to send one inventory
message every day.
N7K-Y-podP(config-callhome)# enable
Note The warnings are for the partially configured but unused destination profiles.
Step 14 Start the IE browser on your Windows server desktop and open address
http://192.168.0.10/mail. Log in with the username “podP” and password “podP”
where P is your pod number.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 55
Step 17 Open the first email.
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the Smart Call Home configuration, logged into
the Mercury email server, and verified receipt of an email when the event occurred.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 57
Task 4: Cisco Fabric Services (Optional)
In this task, you will Configure Cisco Fabric Services on the Cisco Nexus 7000 Switch and verify
the configuration.
Activity Procedure
Complete these steps:
Step 1 Connect to your assigned Cisco Nexus 7000 VDC.
Step 2 Change the multicast address that is used for Cisco Fabric Services over IPv4 according
to the following table.
N7K-1-pod1 239.255.12.12
N7K-2-pod2 239.255.12.12
N7K-1-pod3 239.255.34.34
N7K-2-pod4 239.255.34.34
N7K-1-pod5 239.255.56.56
N7K-2-pod6 239.255.56.56
Physical Fabric
-------------------------------------------------------------------------
Switch WWN IP Address
-------------------------------------------------------------------------
20:00:f0:25:72:a9:e3:42 192.168.0.20P [Local]
20:00:10:8c:cf:14:62:c2 192.168.0.20Q
Note Do not continue to the next step until this command lists exactly two entries, your own Cisco
Nexus 7000 VDC and your peer pod Cisco Nexus 7000 VDC. Each pair of peer pods uses a
unique multicast address to separate them from other pairs of peer pods in the same lab. In this
lab task, you will be working very closely with your peer pod and it is important that you progress
through the lab at the same pace.
Step 5 Define a Cisco Fabric Services region on your Cisco Nexus 7000 VDC according to the
following table.
N7K-1-pod1 12
N7K-2-pod2
N7K-1-pod3 34
N7K-2-pod4
N7K-1-pod5 56
N7K-2-pod6
Note Even though the applications have been assigned to the region, they have not been activated
for Cisco Fabric Services distribution yet. Therefore, they do not show in the output of the show
cfs regions command.
Step 8 Enable Cisco Fabric Services distribution for the applications “role” and “radius.”
N7K-Y-podP(config-cfs-region)# role distribute
N7K-Y-podP(config-cfs-region)# radius distribute
Region-ID : ST
Application: role
Scope : Physical-fc-ip
-------------------------------------------------------------------------
Switch WWN IP Address
-------------------------------------------------------------------------
20:00:f0:25:72:a9:e3:42 192.168.0.20P [Local]
20:00:10:8c:cf:14:62:c2 192.168.0.20Q
Region-ID : ST
Application: radius
Scope : Physical-fc-ip
-------------------------------------------------------------------------
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 59
Switch WWN IP Address
-------------------------------------------------------------------------
20:00:f0:25:72:a9:e3:42 192.168.0.20P [Local]
20:00:10:8c:cf:14:62:c2 192.168.0.20Q
Step 10 Define a user role named TIER-2-OPS. This command can result in two possible
outcomes.
First possible result:
N7K-Y-podP(config)# role name TIER-2-OPS
N7K-Y-podP(config-role)#
Note The outcome of this command depends on who enters the role command first. Cisco Fabric
Services locks the fabric for the application as soon as you start configuring it. Other switches
cannot make changes as long as the lock remains.
Step 11 Examine the Cisco Fabric Services locks for the fabric.
N7K-Y-podP(config)# show cfs lock
Application: role
Scope : Physical-fc-ip
------------------------------------------------------------------------------
Switch WWN IP Address User Name User Type
------------------------------------------------------------------------------
20:00:b4:14:89:e3:9d:c4 192.168.0.20P admin CLI/SNMP v3
Note Switch WWN and the IP address point to a Cisco Nexus 7000 VDC that has locked Cisco Fabric
Services.
Step 12 If you got the first result on Step 10, continue here. If you got the second result on the
previous step, skip the next series of steps and continue at Step 21.
Step 13 Add a rule to the role TIER-2-OPS that adds read access to the role for all features.
N7K-Y-podP(config-role)# rule 1 permit read
Step 14 Add three more rules to add read-write rights for the “diagnostics,” “ping,” and “vlan”
features.
N7K-Y-podP(config-role)# rule 2 permit read-write feature diagnostics
N7K-Y-podP(config-role)# rule 3 permit read-write feature ping
N7K-Y-podP(config-role)# rule 4 permit read-write feature vlan
Step 15 Examine the role TIER-2-OPS.
N7K-Y-podP# show role name TIER-2-OPS
^
% Invalid command at '^' marker.
+ -------------------------------------------------------------------
+ 4 permit read-write feature vlan
+ 3 permit read-write feature ping
+ 2 permit read-write feature diagnostics
+ 1 permit read
Step 17 Commit the pending Cisco Fabric Services changes for the “role” application to the
fabric.
N7K-Y-podP(config)# role commit
You have interface configuration. Do you want to proceed? [no] yes
Step 18 Examine the role TIER-2-OPS again.
N7K-Y-podP# show role name TIER-2-OPS
Role: TIER-2-OPS
Description: new role
Vlan policy: permit (default)
Interface policy: permit (default)
Vrf policy: permit (default)
-------------------------------------------------------------------
Rule Perm Type Scope Entity
-------------------------------------------------------------------
4 permit read-write feature vlan
3 permit read-write feature ping
2 permit read-write feature diagnostics
1 permit read
Step 19 Ask your lab partners in the peer pod to execute the show role name TIER-2-OPS
command on their Cisco Nexus 7000 VDC.
Q2) Do they see the newly created role in their VDC?
Step 20 Skip the next series of steps and continue at Step 28.
Step 21 Configure a RADIUS server with IP address 192.168.0.P1, where P is your pod
number. Configure S3cr3t-K3y as the RADIUS server key.
N7K-Y-podP(config)# radius-server host 172.16.0.P1 key S3cr3t-K3y
Step 22 Add a second RADIUS server with IP address 192.168.0.Q1, where Q is your peer pod
number. Again, configure S3cr3t-K3y as the RADIUS server key.
N7K-Y-podP(config)# radius-server host 172.16.0.Q1 key S3cr3t-K3y
Step 23 Examine the RADIUS servers that you configured.
N7K-Y-podP# show radius-server 172.16.0.Q1
RADIUS server not found
N7K-Y-podP# show radius-server 172.16.0.P1
RADIUS server not found
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 61
Step 24 Examine the pending Cisco Fabric Services changes for the “radius” application.
N7K-Y-podP# show radius pending-diff
+radius-server host 172.16.0.P1 authentication accounting
+radius-server host 172.16.0.Q1 authentication accounting
Step 25 Commit the pending Cisco Fabric Services changes for the “radius” application to the
fabric.
N7K-Y-podP(config)# radius commit
Step 26 Examine the RADIUS servers again.
N7K-Y-podP# show radius-server
retransmission count:1
timeout value:5
deadtime value:0
source interface:any available
total number of servers:4
Caution The RADIUS server information is exchanged through Cisco Fabric Services, but the RADIUS
server keys are not included. The global radius-server key command can be used to set a
default key for all RADIUS servers.
Step 28 Verify with your peer pod that you see the role and RADIUS servers that were
distributed through Cisco Fabric Services in this exercise in both Cisco Nexus 7000
VDCs before moving on to the next task.
Step 29 Remove Cisco Fabric Services configuration.
N7K-Y-podP(config)# no cfs ipv4 distribute
This will prevent CFS from distributing over IPv4 network.
Are you sure? (y/n) [n] y
N7K-Y-podP(config)# no cfs ipv4 mcast-address 239.255.ST.ST
Distribution over this IP type will be affected
Change multicast address for CFS-IP ?
Are you sure? (y/n) [n] y
N7K-Y-podP(config)# no cfs region ST
WARNING: All applications in the region will be moved to default region.
Are you sure? (y/n) [n] y
N7K-Y-podP(config)# no role distribute
N7K-Y-podP(config)# no radius distribute
N7K-Y-podP(config)# show running-config cfs
Activity Verification
You have completed this task when you attain these results:
n You have enabled Cisco Fabric Services distribution using IPv4 and configured a Cisco Fabric
Services region and IPv4 multicast group.
n You have created a new role, distributed the role configuration through Cisco Fabric Services
between your pod and peer pod VDCs, and verified the operation of Cisco Fabric Services.
n You have created RADIUS servers, distributed the RADIUS server configuration through
Cisco Fabric Services between your pod and peer pod VDCs, and verified the operation of
Cisco Fabric Services.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 63
Task 5: Cisco DCNM (Optional)
During this exercise, you will use Cisco Prime DCNM to monitor and manage the Cisco Nexus
7000 Switch.
Activity Procedure
Complete these steps:
Step 1 On your N5K configure and enable the interfaces connecting to the N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/1-2
N5K-P(config-if)# no shutdown
Step 2 On your N7K VDC configure and enable the interfaces connecting to the N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/x-y (see table for x and y)
N7K-X-PodP(config-if)# no shutdown
Step 9 Choose Discovery Type of Hops from Seed Switch with a range of 1 hop and enter the
management IP address of your pod Nexus 7000 VDC, 192.168.0.20P. Enter
username admin and password 1234QWer and then click Next.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 65
Step 10 In the Shallow LAN Discovery mark the checkbox next Name to select all discovered
Switches and click Add.
Step 11 When the discovery process is completed, expand the discovery task from the left
column to review all of the discovered devices. Discovery was successful if the status of
the devices displays as listed as true in the Managed column.
Step 13 Acknowledge all Java warnings and login using the username admin and the password
1234QWer.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 67
Step 14 Verify that you see four devices listed in the device discovery pane: Your Cisco Nexus
7000 VDC, your Cisco Nexus 5000 Switch, your peer pod Cisco Nexus 7000 VDC, and
your peer pod Cisco Nexus 5000 Switch.
Step 15 Using “Shift”+”left mouse button” highlight all devices, then right click and choose
Deep Discovery.
Step 16 Wait for the discovery status to switch from “in progress” to “managed”, click View >
Refresh to make sure the client displays the status change.
Step 17 In the Feature Selector pane select Devices and Credentials to verify that all four
devices are listed with the status Managed.
Step 19 Click the Export as JPG button to save the visible area of your topology to the desktop
as a JPG picture named Topology Diagram.jpg.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 69
Step 20 On the left of your screen, select the Inventory tab.
Step 21 Open the inventory of your Cisco Nexus 7000 Switch and your Cisco Nexus 5600
Switch and examine the components.
Step 22 Go to the Environmental Status section of your assigned Cisco Nexus 7000 Switch.
Step 23 Go to the Memory Utilization tab of your assigned Cisco Nexus 7000 Switch. Click
New Charts in the toolbar and create a chart that graphs the memory utilization on the
Step 24 On the left of your screen, select the Interfaces tab. Select the item for the physical
Ethernet interfaces within the tab.
Step 25 Select your Cisco Nexus 7000 VDC and select the interface that connects your Cisco
Nexus 7000 VDC to your Cisco Nexus 5000 Switch and expand basic settings.
Eth7/1 Eth 7/2 Eth 7/3 Eth 7/4 Eth 7/5 Eth 7/6
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 71
Step 26 Examine the port details and status and close the DCNM LAN client when finished.
Activity Verification
You have completed this task when you attain these results:
n You have logged into the Cisco Prime DCNM server and verified that the topology reflects all
switches in the network, and used the interface to monitor and manage the Cisco Nexus 7000
Switch.
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure the Cisco Nexus 7000 Switch to use the RMON feature to monitor the traffic and
generate alerts when certain levels are reached
n Configure the EEM to respond to an event that occurs on the switch by automatically running
some commands
n Configure a SPAN session and use it to capture some specified traffic and send it through to
the destination ports
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 73
Command List (Optional)
The table describes the commands that are used in this activity.
Command Description
action number[.number2] cli command1 This command runs the configured CLI commands.
[command2...] [local]
action number[.number2] syslog [priority prio- This command sends a customized syslog message at
val] msg error-message the configured priority.
destination interface type {number | range} This command configures destinations for copied source
packets.
event event-statement This command configures the event statement for the
policy.
event manager applet applet-name This command registers the applet with EEM and enters
applet configuration mode.
event track object-number state {any | down | This command triggers an event if the tracked object is in
up} the configured state.
monitor session session-number This command enters the monitor configuration mode.
rmon event index [log] [trap string] [owner name] This command configures an RMON event.
[description string]
rmon hcalarm index mib-object sample-interval This command creates an RMON alarm.
{absolute | delta} rising-threshold-high value
rising-threshold-low value [event-index] falling-
threshold-high value falling-threshold-low
value [event-index] [owner name] [storagetype
type]
show event manager history events This command displays the history of events for all
policies.
show monitor session This command displays the SPAN session configuration.
show rmon logs This command displays information about RMON logs.
source {interface type | vlan {1-3967,4048- This command configures sources and the traffic direction
4093}} [rx | tx | both] in which to copy packets.
track object-id interface interface-type number This command creates a tracked object for an interface.
{{ip | ipv6} routing | line-protocol}
Activity Procedure
Complete these steps:
Step 1 Start the SSH client on the remote server.
Step 2 Connect to your pod Nexus 7000 VDC.
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod VDC.
Task 2: RMON
Configure the Cisco Nexus 7000 Switch to use the RMON feature to monitor the traffic and
generate alerts when certain levels are reached.
Activity Procedure
Complete these steps:
Step 1 Identify the mgmt0 SNMP interface index.
N7K-Y-podP# show interface snmp-ifindex
N7K-Y-podP# conf
N7K-Y-podP(config)# rmon alarm 10 1.3.6.1.2.1.2.2.1.10.83886080 10 delta rising-
threshold 5000 10 falling-threshold 3000 20 owner admin
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 75
Step 4 Configure an RMON event to generate a syslog message when the Cisco NX-OS
Software triggers a rising alarm.
N7K-Y-podP(config)# rmon event 10 log trap public description PKT_too_high owner
admin
Step 5 Configure an RMON event to generate a syslog message when the Cisco NX-OS
Software triggers a falling alarm.
N7K-Y-podP(config)# rmon event 20 log trap public description PKT_normal owner
admin
Step 6 Connect to your Windows server and start ping with 1450-byte packets to your VDC
mgmt0 IP address 192.168.0.20P (P is your pod number).
C:\Documents and Settings\Administrator>ping 192.168.0.20P -n 10 -l 1450
Step 7 Verify RMON logs on your pod Cisco Nexus 7000 Switch.
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the RMON configuration.
n You have generated some traffic on the Windows host so that the configured threshold is
reached and an alert is generated.
Activity Procedure
Complete these steps:
Step 1 Configure a tracked object for an interface that is connected to your peer pod Cisco
Nexus 7000 Switch.
Step 3 Configure the EEM applet to trigger an event if the tracked object is in the down state.
Step 4 Configure the EEM applet to create a syslog message that the port is shutting down.
Ethernet 7/A Eth 7/1 Eth 7/2 Eth 7/3 Eth 7/4 Eth 7/5 Eth 7/6
Step 5 Configure the EEM applet to disable the interface that is connected to your Cisco Nexus
5000.
Tip The command accepts only one parameter – therefore commands with spaced need “”
Step 7 Configure the EEM applet to trigger an event if the tracked object is in the up state.
Step 8 Configure the EEM applet to create a syslog message that the port is bringing up.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 77
Step 9 Configure the EEM applet to enable the interface that is connected to your Cisco Nexus
5000.
N7K-Y-podP(config-applet)# action 2 cli command “conf”
N7K-Y-podP(config-applet)# action 3 cli command “interface ethernet 7/A”
N7K-Y-podP(config-applet)# action 4 cli command “no shut”
Step 10 Shut down the interface that is connected to your peer pod Cisco Nexus 7000 Switch.
------------------------------------------------------------------------------
Port VRF Status IP Address Speed MTU
------------------------------------------------------------------------------
mgmt0 -- up 192.168.0.20P 1000 1500
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
EthX/A 1 eth access down Administratively down auto(D) --
EthX/B 1 eth access up none 40G(D) --
EthX/C -- eth routed down Administratively down auto(D) --
EthX/D 1 eth access up none 40G(D) --
Q4) What is the status of the interface that is connected to your Cisco Nexus 5000?
Step 13 Enable the interface that is connected to your peer pod Cisco Nexus 7000 Switch.
------------------------------------------------------------------------------
Port VRF Status IP Address Speed MTU
------------------------------------------------------------------------------
mgmt0 -- up 192.168.0.20P 1000 1500
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
EthX/A 1 eth access up none 40G(D) --
EthX/B 1 eth access up none 40G(D) --
EthX/C -- eth routed up none 40G(D) --
EthX/D 1 eth access up none 40G(D) --
Q5) What is the status of interface that is connected to your Cisco Nexus 5600?
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the EEM configuration, and then simulated an
event that causes the EEM to run corrective commands.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 79
Task 4: SPAN
During this exercise, you will configure a SPAN session and use it to capture some specified
traffic. Then you will send it through to a destination port to which an analyzer is attached.
Activity Procedure
Complete these steps:
Step 1 Enable SPAN monitoring on the interface that is connected to your Windows server on
your Nexus 5600.
N5K-P# conf
N5K-P(config)# interface ethernet 1/3
N5K-P(config-if)# switchport monitor
version 7.0(4)N1(1)
interface Ethernet1/3
switchport monitor
Step 4 Specify Ethernet 2/1 and 2/2 as source interfaces connected to Cisco Nexus 7000
Switches.
N5K-P(config-monitor)# no shut
version 7.0(4)N1(1)
logging level monitor 6
monitor session 1
source interface Ethernet2/1 both
source interface Ethernet2/2 both
destination interface Ethernet1/3
session 1
---------------
type : local
state : up
acl-name : acl-name not specified
source intf :
rx : Eth2/1 Eth2/2
tx : Eth2/1 Eth2/2
both : Eth2/1 Eth2/2
source VLANs :
rx :
source VSANs :
rx :
destination ports : Eth1/3
N5K-P# conf
N5K-P(config)# interface ethernet 1/3
N5K-P(config-if)# no switchport monitor
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the SPAN session configuration.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 81
Guided Lab 5: Configuring Layer 2 Switching
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure the Layer 2 interfaces and Rapid PVST+, and verify that the Rapid PVST+
configuration is performing as expected
n Configure the STP enhancements that are required, and verify that the configuration is
performing as expected
n Configure MST on the Cisco Nexus 7000 Switch, and then verify the configuration
n Configure the Cisco Nexus 7000 Switch to support Q-in-Q tunnels, and then verify that the
configuration is performing as expected
Visual Objective
The figure illustrates what you will accomplish in this activity.
Command List
The table describes the commands that are used in this activity.
Command Description
rate-mode dedicated This command sets the first port in a port group to
dedicated mode.
revision mst-revision-nr This command configures the MST revision number.
spanning-tree mst nr root primary This command changes the priority of the switch in
order to make it the root of the spanning tree for the
MST instance.
spanning-tree mst nr root secondary This command lowers the spanning-tree priority of the
switch below the default value, to make the switch the
backup spanning-tree root for the MST instance.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 83
Command Description
spanning-tree mst configuration This command enters configuration mode for MST.
Activity Procedure
Complete these steps:
Step 1 Start the SSH client on the remote server.
Step 2 Connect to your pod Nexus 7000 VDC at 192.168.0.20P with username “admin” and
password “1234QWer”.
Step 3 Rollback your N7K configuration to checkpoint “base”
N7K-Y-podP# rollback running-config checkpoint base
Collecting Running-Config
Generating Rollback patch for switch profile
Rollback Patch is Empty
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
N7K-Y-podP#
Note The “base” checkpoint on the N7K has been created by the support team when setting up the
lab.
Activity Verification
You have completed this task when you attain these results:
n You have connected to your assigned Pod Nexus 7000 VDC.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 85
Task 2: Configure the Cisco Nexus 5000 Switch Interfaces
In this task, you will configure the Cisco Nexus 5000 Switch interfaces.
Activity Procedure
Complete these steps:
Step 1 Set interfaces 2/1 and 2/2 within your Cisco Nexus 5000 Switch for trunk operation.
N5K-P(config)# interface ethernet 2/1-2
N5K-P(config-if-range)# switchport mode trunk
N5K-P(config-if-range)# no shutdown
Note The interfaces will display “link not connected” until the N7K will be configures (next task)
Step 2 Use the show cdp neighbors command or the interface descriptions in the
configuration to find interfaces that are connected to your peer Cisco Nexus 5000
Switch and disable them.
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
Eth2/5 1 eth access down Administratively down 40G(D) --
Eth2/6 1 eth access down Administratively down 40G(D) –-
Activity Verification
You have completed this task when you attain these results:
n You have configured interfaces on Cisco Nexus 5000 Switch.
Activity Procedure
Complete these steps:
Step 1 Connect to your assigned Cisco Nexus 7000 VDC.
Step 2 Change all the interfaces in your VDC that are listed on the following table to Layer 2
switch ports instead of routed ports and shut these interfaces down.
N7K-Y-podP# conf
N7K-Y-podP (config)# interface e 7/C
N7K-Y-podP (config-if)# switchport
N7K-Y-podP (config-if)# shutdown
Step 3 Verify that the proper interfaces have been enabled and changed to Layer 2 switch
ports.
N7K-Y-podP # show interface ethernet 7/C brief
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 87
EthX/C 1 eth access down Administratively down auto(D) --
Step 4 Configure all the Layer 2 interfaces from the previous step as trunks and verify that the
change was successful.
N7K-Y-podP (config)# interface eth 7/A-B, eth 7/D
N7K-Y-podP (config-if-range)# switchport
N7K-Y-podP (config-if-range)# switchport mode trunk
N7K-Y-podP (config-if-range)# no shut
N7K-1-podP (config-if-range)# show interface brief
------------------------------------------------------------------------------
Port VRF Status IP Address Speed MTU
------------------------------------------------------------------------------
mgmt0 -- up 192.168.0.20P 1000 1500
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
Eth7/A 1 eth trunk up none 40G(D) --
Eth7/B 1 eth trunk up none 40G(D) --
Eth7/C 1 eth access down Administratively down auto(D) --
Eth7/D 1 eth trunk up none 40G(D) --
Step 5 Examine spanning-tree operation for VLAN 1 using the show spanning-tree vlan 1
command. Output can vary depending on the installed hardware.
N7K-Y-podP # show spanning-tree vlan 1
VLAN0001
Spanning tree enabled protocol rstp
Root ID Priority 32769
Address 64a0.e742.6e42
Cost 1
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Q2) Which switch or VDC is the root bridge for VLAN 1 in your pod pair?
Step 6 Examine which VLANs are available to you and that are used internally.
N7K-Y-podP # show vlan internal usage
VLAN DESCRIPTION
--------- -------------------------------------------------------
3968-4031 Multicast
4032-4035,4048-4059 Online Diagnostic
4036-4039,4060-4087 ERSPAN
4042 Satellite
4044 Native VLAN to enable/disable tagging
N5K-P(config)# vlan 10
N5K-P(config-vlan)# name TEST
Step 8 Examine spanning-tree operation for all VLANs. Output can vary depending on the
installed hardware.
N7K-Y-podP # show spanning-tree
VLAN0001
Spanning tree enabled protocol rstp
Root ID Priority 32769
Address 64a0.e742.6e42
Cost 1
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
VLAN0010
Spanning tree enabled protocol rstp
Root ID Priority 32778
Address 64a0.e742.6e42
Cost 1
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Q3) Which switch or VDC is the root bridge for the spanning-tree instance for VLAN 10? Is it
the same or different from VLAN 1?
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 89
Step 9 Create additional VLANs 11 through 14 and 111 through 113 on both your Cisco
Nexus 7000 VDC and your Cisco Nexus 5000 Switch.
N7K-Y-podP(config)# vlan 11-14, 111-113
Step 11 Pods 1, 3, and 5 should configure the VDC of switch N7K-1 as the primary root bridge
for the odd VLANs (VLAN 11, 13, 111, and 113) and as the secondary root bridge for
the even VLANs (VLAN 10, 12, 14, and112).
N7K-1-podP(config-vlan)# spanning-tree vlan 11, 13, 111, 113 root primary
N7K-1-podP(config)# spanning-tree vlan 10, 12, 14, 112 root secondary
Step 12 Pods 2, 4, and 6 should configure the VDC of switch N7K-2 as the primary root bridge
for the even VLANs (VLAN 10, 12, 14, and112) and as the secondary root bridge for
the odd VLANs (VLAN 11, 13, 111, and 113).
Activity Verification
You have completed this task when you attain these results:
n You have configured the interface leading to the peer Cisco Nexus 7000 VDC as rate-mode
dedicated.
n You have verified basic interface operation and settings on your Cisco Nexus 7000 VDC and
Cisco Nexus 5000 Switch.
n You have configured the links between the switches in your pod and your peer pod as 802.1Q
trunks.
n You have configured the odd VDC as the root for the odd VLANs and the even VDC as the
backup root for the odd VLANs.
n You have configured the even VDC as the root for the even VLANs and the odd VDC as the
backup root for the even VLANs.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 91
Task 4: Using STP Enhancements
During this exercise, you will configure some of the spanning-tree optimization and protection
features and verify their operation.
Activity Procedure
Complete these steps:
Step 1 It is a best practice to configure ports that are connected to end devices, such as servers,
as spanning-tree edge ports. Configure the ports on your Cisco Nexus 5000 Switch that
connect to the lab servers as spanning-tree edge ports.
N5K-P(config)# interface e 1/3-4
N5K-P(config-if-range)# spanning-tree port type edge
Warning: edge port type (portfast) should only be enabled on ports connected
to a single host. Connecting hubs, concentrators, switches, bridges, etc...
to this interface when edge port type (portfast) is enabled, can cause
temporary bridging loops.
Use with CAUTION
Edge Port Type (Portfast) will be configured in 2 interfaces due to the range
command but will only have effect when the interfaces are in a non-trunking
mode.
Note The spanning-tree edge port feature is also known as Portfast. However, the Cisco NX-OS
Software does not support the “spanning-tree portfast” command.
Step 2 Enable UDLD in aggressive mode on the devices and all necessary ports in your pod
and peer pod to protect your switches against unidirectional link failures.
N7K-Y-podP(config)# feature udld
N7K-Y-podP(config)# udld aggressive
N7K-Y-podP(config)# show cdp neighbors
Capability Codes: R - Router, T - Trans-Bridge, B - Source-Route-Bridge
S - Switch, H - Host, I - IGMP, r - Repeater,
V - VoIP-Phone, D - Remotely-Managed-Device,
s - Supports-STP-Dispute
Step 3 Use the show udld neighbors command to verify UDLD operation.
N7K-Y-podP# show udld neighbors
Port Device Name Device ID Port ID Neighbor State
--------------------------------------------------------------------------
EthernetX/A FOC1843R54E 1 Ethernet2/1 bidirectional
Step 4 UDLD can protect against bridging loops that are caused by physical problems, but it
cannot protect against software-caused spanning-tree failures. The bridge assurance
feature can help protect against bridging loops that are caused by software failures.
Enable bridge assurance on the link between the Cisco Nexus 7000 VDC in your pod
and the VDC in your peer pod.
Step 5 Verify that bridge assurance is enabled on the link between the VDCs using the show
spanning-tree command.
N7K-Y-podP# show spanning-tree vlan 10
VLAN0010
Spanning tree enabled protocol rstp
Root ID Priority 24586
Address 64a0.e742.6e42
Cost 1
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Q5) Which keyword indicates that bridge assurance is enabled on the port?
Step 6 On your Cisco Nexus 7000 VDC, enable terminal monitor to see the logging messages.
N7K-Y-podP(config)# terminal monitor
Step 7 On your Cisco Nexus 7000 VDC, enable bridge assurance on the ports that are
connected to the Cisco Nexus 5000 Switches in your pod and peer pod.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 93
2015 Jan 21 11:53:00 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/A VLAN0001.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/B VLAN0010.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/A VLAN0010.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/B VLAN0011.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/A VLAN0011.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/B VLAN0012.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/A VLAN0012.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/B VLAN0013.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/A VLAN0013.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Bridge Assurance blocking port EthernetX/B VLAN0014.
2015 Jan 21 11:53:01 N7K-Y-podP %$ VDC-2 %$ %STP-2-BRIDGE_ASSURANCE_BLOCK:
Step 9 Repair the misconfiguration by enabling bridge assurance on your Cisco Nexus 5000
Switch for the ports that connect to the Cisco Nexus 7000 VDCs.
N5K-P(config)# int e 2/1 - 2
N5K-P(config-if-range)# spanning-tree port type network
Step 10 Ensure that no spanning-tree problems remain in the network by executing the show
spanning-tree inconsistentports command. Issue the command on all switches in your
pod and peer pod and verify that no inconsistent ports remain.
N7K-Y-podP# show spanning-tree inconsistentports
Activity Verification
You have completed this task when you attain these results:
n You have enabled, and later disabled, root guard on the ports on the Cisco Nexus 7000 VDC
that lead to the Cisco Nexus 5000 Switches in your pod and peer pod.
n You have configured the ports leading to the servers in your pod and peer pod as spanning-tree
edge ports.
n You have successfully enabled UDLD in aggressive mode between the switches in your pod
and peer pod.
n You have successfully enabled bridge assurance between the switches in your pod and peer
pod.
n You have observed the spanning-tree behavior when bridge assurance is enabled on only one
side of a link.
Activity Procedure
Complete these steps:
Step 1 Configure your Cisco Nexus 7000 VDC to participate in an MST region using the
following parameters (S is the SMALLER of the two peer pod numbers, and T is the
LARGER of the two peer pod numbers. Pods 5 and 6 will use 56 as the domain
identifier.)
N7K-1-pod1 Pod1and2 12
N7K-2-pod2
N7K-1-pod3 Pod3and4 34
N7K-2-pod4
N7K-1-pod5 Pod5and6 56
N7K-2-pod6
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 95
Step 2 Change the spanning-tree mode on your Cisco Nexus 7000 VDC to MST.
N7K-Y-podP(config)# spanning-tree mode mst
Step 3 Configure your Cisco Nexus 5000 Switch to participate in an MST region using the
following (S is the SMALLER of the two peer pod numbers, and T is the LARGER of
the two peer pod numbers. Pods 5 and 6 will use 56 as the domain identifier.)
N5K-1 Pod1and2 12
N5K-2
N5K-3 Pod3and4 34
N5K-4
N5K-5 Pod5and6 56
N5K-6
Step 4 Change the spanning-tree mode on your Cisco Nexus 5000 Switch to MST.
N5K-P(config)# spanning-tree mode mst
Step 5 Verify that MST is operating correctly between the VDCs and switches in your pod and
peer pod. Output can vary.
N7K-Y-podP# show spanning-tree
MST0000
Spanning tree enabled protocol mstp
Root ID Priority 32768
Address 64a0.e742.6e42
Cost 0
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Note Be aware that MST configuration is not applied until you exit MST configuration mode.
Therefore, you should leave MST configuration mode before issuing any show commands to
verify MST operation.
Q7) Which spanning-tree path cost method does MST use by default?
Step 6 Change the MST configuration on your Cisco Nexus 7000 VDC to add two new MST
instances. Map VLANs 11, 13,111, and 113 to MST instance 1 and map VLANs 10, 12,
14, and 112 to MST instance 2.
N7K-Y-podP(config)# spanning-tree mst configuration
N7K-Y-podP(config-mst)# instance 1 vlan 11,13,111,113
N7K-Y-podP(config-mst)# instance 2 vlan 10,12,14,112
N7K-Y-podP(config-mst)# exit
Step 7 Verify MST operation on the switches in your pod. Output can vary depending on the
installed hardware.
N7K-Y-podP# show spanning-tree
MST0000
Spanning tree enabled protocol mstp
Root ID Priority 32768
Address 64a0.e742.6e42
Cost 0
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
MST0001
Spanning tree enabled protocol mstp
Root ID Priority 32769
Address 64a0.e742.6e42
Cost 500
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
MST0002
Spanning tree enabled protocol mstp
Root ID Priority 32770
Address 64a0.e742.6e42
Cost 500
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 97
Bridge ID Priority 32770 (priority 32768 sys-id-ext 2)
Address 64a0.e743.03c2
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
MST0000
Spanning tree enabled protocol mstp
Root ID Priority 32768
Address 64a0.e742.6e42
Cost 500
Port 258 (Ethernet2/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Step 8 Change the MST configuration on your Cisco Nexus 5000 Switch to match the
configuration on your VDC by mapping VLANs 11 and 13 to MST instance 1 and
mapping VLANs 10 and 12 to MST instance 2.
N5K-P(config)# spanning-tree mst configuration
N5K-P(config-mst)# instance 1 vlan 11,13,111,113
N5K-P(config-mst)# instance 2 vlan 10,12,14,112
N5K-P(config-mst)# exit
Step 9 Verify that MST is now operating properly on all devices in your pod and peer pod.
Output can vary depending on the installed hardware.
N7K-Y-podP# show spanning-tree
MST0000
Spanning tree enabled protocol mstp
Root ID Priority 32768
Address 64a0.e742.6e42
Cost 0
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
MST0002
Spanning tree enabled protocol mstp
Root ID Priority 32770
Address 64a0.e742.6e42
Cost 500
Port 925 (EthernetX/D)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
MST0000
Spanning tree enabled protocol mstp
Root ID Priority 32768
Address 64a0.e742.6e42
Cost 0
Port 258 (Ethernet2/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
MST0001
Spanning tree enabled protocol mstp
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 99
Root ID Priority 32769
Address 64a0.e742.6e42
Cost 500
Port 258 (Ethernet2/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
MST0002
Spanning tree enabled protocol mstp
Root ID Priority 32770
Address 64a0.e742.6e42
Cost 500
Port 258 (Ethernet2/2)
Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec
Note You should not see any boundary ports in the output of the show spanning-tree commands.
Q9) Which switches or VDCs are the root bridges for each of the MST instances? Are they the
same or different?
Step 10 Students working on pod 1, pod 3 and pod 5 will configure the VDCs of switch N7K-1
as the root bridge for MST instances 0 and 1 and as the backup root bridge for MST
instance 2.
N7K-1-podP(config)# spanning-tree mst 0 root primary
N7K-1-podP(config)# spanning-tree mst 1 root primary
N7K-1-podP(config)# spanning-tree mst 2 root secondary
Step 11 Students working on pod 2, pod 4 and pod 6 will configure the VDCs of switch N7K-2
as the root bridge for MST instance 2 and as the backup root bridge for MST instance 1.
N7K-2-podP(config)# spanning-tree mst 0 root secondary
N7K-2-podP(config)# spanning-tree mst 1 root secondary
N7K-2-podP(config)# spanning-tree mst 2 root primary
100 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Root Hello Max Fwd
MST Instance Root ID Cost Time Age Dly Root Port
--------- ------------------- --- ------ --- --- ------
MST0000 24576 64a0.e743.03c2 0 2 20 15 This bridge is root
MST0001 24577 64a0.e743.03c2 0 2 20 15 This bridge is root
MST0002 24578 64a0.e742.6e42 500 2 20 15 EthernetX/D
Step 13 Ensure that you have no spanning-tree inconsistent ports or boundary ports on the
switches in your pod and peer pod.
N7K-Y-podP(config)# show spanning-tree | include Bound
N7K-Y-podP(config)# show spanning-tree inconsistentports
Activity Verification
You have completed this task when you attain these results:
n You have successfully enabled MST on all switches in your pod.
n You have configured the odd VDC as the root for the MST instance that contains the odd
VLANs and the even VDC as the backup root for this MST instance.
n You have configured the even VDC as the root for the MST instance that contains the even
VLANs and the odd VDC as the backup root for this MST instance.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 101
Task 6: Implementing and Verifying Q-in-Q Tunnels (optional)
This exercise will familiarize you with creating Q-in-Q tunnels on the Cisco Nexus 7000 Switch
and then verify that the configuration is performing as expected.
Activity Procedure
Complete these steps:
Step 1 Connect to your assigned Cisco Nexus 7000 VDC.
Step 2 Create a VLAN 100 dedicated to a Q-in-Q tunnel. Verify that the VLAN is created.
N7K-Y-podP(config)# vlan 100
N7K-Y-podP(config-vlan)# name QinQ
N7K-Y-podP(config-vlan)# exit
N7K-Y-podP(config)# vlan configuration 100
N7K-Y-podP(config-vlan-config)# no ip igmp snooping
N7K-Y-podP(config-vlan-config)# exit
N7K-Y-podP(config)# show vlan name QinQ
102 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 3 Disable the Ethernet interface on your VDC that is connected to the Nexus 5000 Switch
in your peer pod. Verify that your VDC is connected only to the Nexus 5000 Switch in
your pod and the peering Nexus 7000 VDC.
Step 4 Create an 802.1Q tunnel port on the interface that is connected to the Cisco Nexus 5000
Switch in your pod.
Edge Port Type (Portfast) has been configured on Ethernet1/2 but will only
have effect when the interface is in a non-trunking mode.
Step 7 Enable the Layer 2 protocol tunnel for STP and Cisco Discovery Protocol.
N7K-Y-podP(config-if)# l2protocol tunnel stp
N7K-Y-podP(config-if)# l2protocol tunnel cdp
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 103
N5K-P(config-if)# no shutdown
N5K-P(config-if)# ping 172.16.10.5Q
PING 172.16.10.5Q (172.16.10.5Q): 56 data bytes
Request 0 timed out
64 bytes from 172.16.10.5Q: icmp_seq=1 ttl=254 time=1.898 ms
64 bytes from 172.16.10.5Q: icmp_seq=2 ttl=254 time=0.872 ms
64 bytes from 172.16.10.5Q: icmp_seq=3 ttl=254 time=0.747 ms
64 bytes from 172.16.10.5Q: icmp_seq=4 ttl=254 time=0.712 ms
Step 10 Check for Cisco Discovery Protocol neighbors (Q is your peer pod number).
N5K-P(config-if)# show cdp neighbors
Capability Codes: R - Router, T - Trans-Bridge, B - Source-Route-Bridge
S - Switch, H - Host, I - IGMP, r - Repeater,
V - VoIP-Phone, D - Remotely-Managed-Device,
s - Supports-STP-Dispute
N5K-Q(FOC1841R063)
Eth2/1 150 R S I s N5K-C5672UP Eth2/1
N7K-Y-podP(JAF1545CJAM)
Eth2/1 28 R S s N7K-C7010 EthX/A
Q10) Why is the Cisco Nexus 5000 Switch a Cisco Discovery Protocol neighbor if there is no
direct Layer 2 connectivity between the two Cisco Nexus 5000 Switches?
Activity Verification
You have completed this task when you attain these results:
n You have configured a Q-in-Q tunnel on your VDC.
n You can ping the peering pod Nexus 5000 through the Q-in-Q tunnel.
n Show commands display that the Q-in-Q tunnel is up.
104 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Guided Lab 6: Configuring vPC
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Log into your VDC
n Configure the vPC domain ID
n Configure the vPC keepalive link between the Cisco Nexus 7000 Switches
n Configure the vPC peer link between the Cisco Nexus 7000 Switches
n Configure and optimize the vPC
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 105
Command List
The table describes the commands that are used in this activity.
Command Description
channel-group nr mode active This command adds an interface to a port channel that is
dynamically negotiated through LACP.
peer-keepalive destination vpc-peer-ip- This command enables the vPC peer keepalive link to the
address vPC peer IP address.
show interface intf brief This command displays summarized status information for
an interface.
show lacp neighbor This command displays a list of LACP neighbors and their
operational parameters.
show license usage This command displays the usage of licensed features.
show running-config intf This command displays the current configuration for an
interface.
show vpc brief This command displays a brief overview of vPC status.
show vpc consistency-parameters This command displays global vPC consistency status.
global
show vpc peer-keepalive This command displays status information for the vPC peer
keepalive link.
106 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection to your VDC and
your Cisco Nexus 5000 Switch. The next step is to revert to the checkpoint BASE configurations
on the VDC and Nexus 5000.
Activity Procedure
Complete these steps:
Step 1 Connect to the Cisco Nexus 7000 VDC in your pod.
Step 2 Roll back to the configuration checkpoint base on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Step 6 On your N5K configure and enable the interfaces connecting to the N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/1-2
N5K-P(config-if)# switchport
N5K-P(config-if)# switchport mode trunk
N5K-P(config-if)# no shutdown
Step 7 On your N5K configure and DISABLE the interfaces connecting to the peer N5K.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/5-6
N5K-P(config-if)# shutdown
Step 8 On your N7K VDC configure and enable the interfaces connecting to the N5Ks.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 107
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/a-b (see table for a and b)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 9 On your N7K VDC create VLANs 10-14.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP (config)# vlan 10-14
N7K-X-PodP (config-vlan)# exit
N7K-X-PodP (config)#
Step 10 On your N5K create VLANs 10-14.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 10-14
N5K-P(config-vlan)# exit
N5K-P(config)#
Activity Verification
You have completed this task when you attain these results:
n You have connected to your assigned pod VDC and your assigned Cisco Nexus 5000 Switch.
n You have successfully prepared the configurations.
108 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 2: Configuring the vPC Domain
In this task, you will configure the vPC domain ID.
Activity Procedure
Complete these steps:
Step 1 Enable the vPC feature on your VDC.
N7K-Y-podP(config)# feature vpc
N7K-Y-podP(config)#
Q1) Check the licensing. Do you require a license for the vPC?
Step 2 Configure a vPC domain using the domain identifier XY. (X is the SMALLER of the
two peer pod numbers, and Y is the LARGER of the two peer pod numbers. Pods 5 and
6 will use 56 as the domain identifier.)
N7K-1-pod1 12
N7K-2-pod2
N7K-1-pod3 34
N7K-2-pod4
N7K-1-pod5 56
N7K-2-pod6
vPC domain id : XY
Peer status : peer link not configured
vPC keep-alive status : Disabled
Configuration consistency status : failed
Configuration inconsistency reason: vPC peer-link does not exist
Per-vlan consistency status : failed
Type-2 consistency status : failed
Type-2 inconsistency reason : vPC peer-link does not exist
vPC role : none established
Number of vPCs configured : 0
Peer Gateway : Disabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)
Operational Layer3 Peer-router : Disabled
Self-isolation : Disabled
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 109
Task 3: Configuring the vPC Keepalive Link
In this task, you will configure the vPC keepalive link between the Cisco Nexus 7000 Switches.
Activity Procedure
Complete these steps:
Step 1 You are going to use the management port as the peer keepalive-link. Ping your peer
pod mgmt0 IP (192.168.0.20Q, Q is your peer pod number) to make sure IP
connectivity works.
N7K-Y-podP(config-vpc-domain)# ping 192.168.0.20Q vrf management
PING 192.168.0.20Q (192.168.0.202): 56 data bytes
Request 0 timed out
64 bytes from 192.168.0.20Q: icmp_seq=1 ttl=254 time=0.959 ms
64 bytes from 192.168.0.20Q: icmp_seq=2 ttl=254 time=0.657 ms
64 bytes from 192.168.0.20Q: icmp_seq=3 ttl=254 time=0.598 ms
64 bytes from 192.168.0.20Q: icmp_seq=4 ttl=254 time=0.6 ms
--- 192.168.0.20Q ping statistics ---
5 packets transmitted, 4 packets received, 20.00% packet loss
round-trip min/avg/max = 0.598/0.703/0.959 ms
Step 2 Configure the vPC keepalive link destination as your peer mgmt0 IP (192.168.0.20Q, Q
is your peer pod number).
Step 3 Check the vPC keepalive link. Do not continue to the next task before you verify that
the vPC peer keepalive status is alive.
vPC domain id : XY
Peer status : peer link not configured
vPC keep-alive status : Suspended (Destination IP not reachable)
Configuration consistency status : failed
Configuration inconsistency reason: vPC peer-link does not exist
Per-vlan consistency status : failed
Type-2 consistency status : failed
Type-2 inconsistency reason : vPC peer-link does not exist
vPC role : none established
Number of vPCs configured : 0
Peer Gateway : Disabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)
vPC domain id : XY
Peer status : peer link not configured
110 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
vPC keep-alive status : peer is alive
Configuration consistency status : failed
Configuration inconsistency reason: vPC peer-link does not exist
Per-vlan consistency status : failed
Type-2 consistency status : failed
Type-2 inconsistency reason : vPC peer-link does not exist
vPC role : none established
Number of vPCs configured : 0
Peer Gateway : Disabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify that the vPC keepalive link is up.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 111
Task 4: Configure the vPC Peer Link
In this task, you will configure the vPC peer link between the Cisco Nexus 7000 Switches.
Activity Procedure
Complete these steps:
Step 1 Create a static port-channel interface 7 containing the link between the Cisco Nexus
7000 Switches.
Legend:
Type 1 : vPC will be suspended in case of mismatch
112 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
STP Bridge Assurance 1 Enabled Enabled
STP Loopguard 1 Disabled Disabled
STP MST Region Instance to 1
VLAN Mapping
STP MST Region Revision 1 0 0
Allowed VLANs - 1,10-14 1,10-14
Local error VLANs - - -
Step 5 Check the vPC status. Do not continue to the next task before you verify that peers have
formed adjacency.
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id : XY
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
Configuration consistency status : success
Per-vlan consistency status : success
Type-2 inconsistency reason : Consistency Check Not Performed
vPC role : secondary
Number of vPCs configured : 0
Peer Gateway : Disabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)
Operational Layer3 Peer-router : Disabled
Self-isolation : Disabled
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify that the vPC peer link is up and the VPC status is
OK.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 113
Task 5: vPC Configuration and Optimization
In this task, you will configure the vPC between the Cisco Nexus 7000 Series Switches and the
Cisco Nexus 5000 Series Switches in your peer pod.
Activity Procedure
Complete these steps:
Step 1 Connect to your pod N5K. Create a port channel 7 using the LACP protocol, and add
e2/1 and 2/2 to this port channel.
Step 3 Create LACP-based port channels 5P and 5Q on the Cisco Nexus 7000 Switches (P is
your pod number, Q is the peer pod number) using the port to your Cisco Nexus 5000
and to the peer Cisco Nexus 5000 (create two port channels on each Cisco Nexus 7000).
Caution Keep in mind P is always YOUR Pod+, Q is always your PARTNER/PEER Pod.
Step 4 Check the state of the port channels on the Cisco Nexus 5000.
N5K-P(config-if-range)# show port-channel summary
Flags: D - Down P - Up in port-channel (members)
I - Individual H - Hot-standby (LACP only)
s - Suspended r - Module-removed
S – Switched R - Routed
U - Up (port-channel)
------------------------------------------------------------------------------
114 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Group Port- Type Protocol Member Ports
Channel
------------------------------------------------------------------------------
7 Po7(SU) Eth LACP Eth2/1(P) Eth2/2(s)
Step 5 Configure vPC IDs 5P and 5Q on the two port channel interfaces 5P and 5Q that are
connected to the Cisco Nexus 5000 Switches. Check with your partner to make sure that
the correct interfaces are configured.
Step 6 Check the vPC status and consistency parameters for your vPC.
vPC domain id : XY
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
Configuration consistency status : success
Per-vlan consistency status : success
Type-2 inconsistency reason : Consistency Check Not Performed
vPC role : secondary
Number of vPCs configured : 2
Peer Gateway : Disabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds
vPC Peer-link status
---------------------------------------------------------------------
id Port Status Active vlans
-- ---- ------ --------------------------------------------------
1 Po7 up 1,10-14
vPC status
----------------------------------------------------------------------
id Port Status Consistency Reason Active vlans
-- ---- ------ ----------- ------ ------------
5P Po5P up failed Peer does not have -
corresponding vPC
After both Cisco Nexus 7000 Switches are configured correctly, your output should look like
this.
N7K-Y-podP# show vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id : XY
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
Configuration consistency status : success
Per-vlan consistency status : success
Type-2 inconsistency reason : Consistency Check Not Performed
vPC role : secondary
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 115
Number of vPCs configured : 2
Peer Gateway : Disabled
Dual-active excluded VLANs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)
Operational Layer3 Peer-router : Disabled
Self-isolation : Disabled
vPC status
Id : 5P
Port : Po5P
Status : up
Consistency : success
Reason : success
Active Vlans : 1,10-14
Id : 5Q
Port : Po5Q
Status : up
Consistency : success
Reason : success
Active Vlans : 1,10-14
Step 7 Check the port channel status on the Cisco Nexus 5000 Switch.
Step 8 Check the spanning tree and spanning-tree root bridges on pod 1, 3 or 5:
N7K-1-podP(config-if)# show spanning-tree root
Step 9 Check the spanning tree and spanning-tree root bridges on pod 2, 4 or 6:
116 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
VLAN0011 32779 64a0.e742.6e42 0 2 20 15 This bridge is root
VLAN0012 32780 64a0.e742.6e42 0 2 20 15 This bridge is root
VLAN0013 32781 64a0.e742.6e42 0 2 20 15 This bridge is root
VLAN0014 32782 64a0.e742.6e42 0 2 20 15 This bridge is root
Step 10 Check the spanning tree and spanning-tree root bridges on the Cisco Nexus 5000
Switch.
N5K-P(config-if-range)# show spanning-tree root
Step 11 Configure spanning-tree priority to prepare the peer switch feature on your pod VDC -
change the bridge priority to 8192. Ensure that your peer pod has also done these
configurations.
Step 12 Enable the peer-switch feature to optimize spanning-tree processing for the vPC
domain.
N7K-Y-podP(config)# vpc domain XY
N7K-Y-podP(config-vpc-domain)# peer-switch
Step 13 Enable the vPC peer-gateway feature in order to allow your switch to forward traffic for
the peer switch router MAC addresses in order to support non-RFC compliant devices.
N7K-Y-podP(config)# vpc domain XY
N7K-Y-podP(config-vpc-domain)# peer-gateway
This peer-gateway config may cause traffic loss. Do you want to continue
(y/n)? [n] y
Step 15 Verify the spanning-tree root bridges on your VDC and the Nexus 5000 switch:
N7K-1-podP(config)# show spanning-tree root
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 117
VLAN0014 8206 0023.04ee.be0c 0 2 20 15 This bridge is root
Step 16 Verify the root ID and compare it with the root ID before you configure the peer switch
feature
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify that the vPC appears in the port channel database
and that traffic is passing over the different physical interfaces.
118 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 6: vPC Tracking Configuration (Optional)
In this task, you will configure and test the vPC tracking feature on the Cisco Nexus 7000 Series
Switch in your pod.
Activity Procedure
Complete these steps:
Step 1 On the primary vPC switch only, simulate module hardware failure. Disable all vPC
member interfaces and the interface in the peer link.
------------------------------------------------------------------------------
Port VRF Status IP Address Speed MTU
------------------------------------------------------------------------------
mgmt0 -- up 192.168.0.20P 1000 1500
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
Eth7/1 1 eth trunk down suspended by vpc auto(D) 51
Eth7/2 1 eth trunk down suspended by vpc auto(D) 52
Eth7/7 1 eth access down Administratively down auto(D) --
Eth7/8 1 eth trunk down Link not connected auto(D) 7
------------------------------------------------------------------------------
Port-channel VLAN Type Mode Status Reason Speed Protocol
Interface
------------------------------------------------------------------------------
Po7 1 eth trunk down No operational members auto(D) none
Po51 1 eth trunk down suspended by vpc auto(D) lacp
Po52 1 eth trunk down suspended by vpc auto(D) lacp
Q3) Why are the vPC member interfaces on the secondary vPC switch disabled?
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 119
N7K-Y-podP(config)# track 1 interface port-channel7 line-protocol
N7K-Y-podP(config-track)# track 2 interface ethernet7/x line-protocol
N7K-Y-podP(config-track)# track 3 interface ethernet7/y line-protocol
N7K-Y-podP(config-track)# track 4 interface ethernet7/z line-protocol
N7K-Y-podP(config-track)# track 10 list boolean or
N7K-Y-podP(config-track)# object 1
N7K-Y-podP(config-track)# object 2
N7K-Y-podP(config-track)# object 3
N7K-Y-podP(config-track)# object 4
N7K-Y-podP(config-track)# vpc domain XY
N7K-Y-podP(config-vpc-domain)# track 10
Step 2 Disable all vPC interfaces and the interface in the peer link on the primary vPC switch
again, and check the interface status on the secondary vPC switch.
N7K-Y-podP(config-track)# show interface brief | no-more
------------------------------------------------------------------------------
Port VRF Status IP Address Speed MTU
------------------------------------------------------------------------------
mgmt0 -- up 192.168.0.20P 1000 1500
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
Eth7/x 1 eth trunk up none 40G(D) 51
Eth7/y 1 eth trunk up none 40G(D) 52
Eth7/z 1 eth access down Administratively down auto(D) --
…
------------------------------------------------------------------------------
Port-channel VLAN Type Mode Status Reason Speed Protocol
Interface
------------------------------------------------------------------------------
Po7 1 eth trunk down No operational members auto(D) none
Po51 1 eth trunk up none a-40G(D) lacp
Po52 1 eth trunk up none a-40G(D) lacp
Activity Verification
You have completed this task when you attain these results:
n You have configured vPC tracking and used the show commands to verify that the tracking
feature modifies the vPC configuration as physical interfaces change their state.
120 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Guided Lab 7: Configuring Cisco FabricPath
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure the Cisco FabricPath and FabricPath interfaces and VLANs
n Configure vPC+
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 121
Command List
The table describes the commands that are used in this activity.
Command Description
fabricpath switch-id value This command assigns a static vPC+ ID to the vPC+
peer. The range is from 0 to 4094.
show fabricpath topology vlan This command displays information on all FabricPath
[active] topology VLANs.
spanning-tree mst [instance-id] You must configure all the MST VLANs on all the
priority [value] FabricPath Layer 2 gateway interfaces to a lower STP
priority.
122 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection to your VDC and
Cisco Nexus 5000 Switch. The next step is to revert to checkpoint BASE configurations on the
VDC and Cisco Nexus 5000.
Next, you will prepare your pod for Cisco FabricPath configuration.
Activity Procedure
Complete these steps:
Step 1 Connect to the Cisco Nexus 7000 VDC in your pod.
Step 2 Roll back to the configuration checkpoint BASE on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Step 5 On your N5K configure and ENABLE the interfaces connecting to YOUR N7K VDC.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/1
N5K-P(config-if)# switchport
N5K-P(config-if)# switchport mode trunk
N5K-P(config-if)# no shutdown
Step 6 On your N5K configure and DISABLE the interfaces connecting to the PEER N7K
VDC.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/2
N5K-P(config-if)# shutdown
Step 7 On your N5K configure and DISABLE the interfaces connecting to your peer N5K.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/5-6
N5K-P(config-if)# shutdown
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 123
Step 8 On your N7K VDC configure and enable the interfaces connecting to YOUR N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/P (P is your Pod#)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 9 On your N7K VDC create VLANs 10-14.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP (config)# vlan 10-14
N7K-X-PodP (config-vlan)# exit
N7K-X-PodP (config)#
Step 10 On your N5K create VLANs 10-14.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 10-14
N5K-P(config-vlan)# exit
N5K-P(config)#
Step 11 On your N5K create a SVI for VLAN 10.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# feature interface-vlan
N5K-P(config)# int vlan 10
N5K-P(config-if)# ip address 172.16.10.5P/24 (P is your Pod#)
N5K-P(config-if)# no shut
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod VDC and your pod Cisco Nexus 5000.
n You have successfully loaded the configuration from checkpoint BASE.
n You have used the show cdp neighbors command and verified the following: the Cisco Nexus
5000 Switch in your pod is connected to your VDC on the F1 interface and your VDC is
connected to the peer VDC only with F1 interfaces.
124 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 2: Configure Cisco FabricPath and FabricPath Interfaces
and VLANs
During this exercise, you will configure the Cisco FabricPath and FabricPath interfaces and
VLANs on your pod VDC.
Activity Procedure
Complete these steps:
Step 1 Enable the Cisco FabricPath feature set on your pod VDC.
Step 3 Examine the FabricPath switch ID of your Cisco Nexus 7000 VDC.
N7K-Y-podP(config)# show fabricpath switch-id
FABRICPATH SWITCH-ID TABLE
Legend: '*' - this system
'[E]' - local Emulated Switch-id
'[A]' - local Anycast Switch-id
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 125
Total Switch-ids: 1
=========================================================================
SWITCH-ID SYSTEM-ID FLAGS STATE STATIC EMULATED/
ANYCAST
----------+----------------+------------+-----------+--------------------
*3150 f025.72a9.e342 Primary Confirmed No No
Step 4 Configure the switch ID of your VDC to be PQ, where P is your pod number and Q is
your peer pod number.
Device Switch ID
N7K-1-pod1 12
N7K-2-pod2 21
N7K-1-pod3 34
N7K-2-pod4 43
N7K-1-pod5 56
N7K-2-pod6 65
Step 6 Configure interfaces that are connected to your peer pod in FabricPath mode.
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
Eth7/x 1 eth f-path up none 40G(D) –
Eth7/y 1 eth f-path up none 40G(D) --
Step 8 Examine the FabricPath switch ID table on your Cisco Nexus 7000 VDC.
N7K-Y-podP(config-if-range)# show fabricpath switch-id
126 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
FABRICPATH SWITCH-ID TABLE
Legend: '*' - this system
'[E]' - local Emulated Switch-id
'[A]' - local Anycast Switch-id
Total Switch-ids: 2
=========================================================================
SWITCH-ID SYSTEM-ID FLAGS STATE STATIC EMULATED/
ANYCAST
----------+----------------+------------+-----------+--------------------
*PQ f025.72a9.e342 Primary Confirmed Yes No
QP 108c.cf14.62c2 Primary Confirmed Yes No
Step 9 Configure that the interface that is connected to your pod Cisco Nexus 5000 Switch is
configured in trunk mode.
Ethernet 7/A Eth 7/1 Eth 7/2 Eth 7/3 Eth 7/4 Eth 7/5 Eth 7/6
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
Eth7/A 1 eth trunk up none 40G(D) –-
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 127
Step 13 Configure the VLANs from 10 to 14 in FabricPath mode.
N7K-Y-podP(config)# vlan 10-14
N7K-Y-podP(config-vlan)# mode fabricpath
N7K-Y-podP(config-vlan)# exit
Step 15 Verify connectivity to SVI of VLAN 10 on the peer pod Cisco Nexus 5000 (Q is your
peer pod number). If the interface is not present configure it using the ip address
172.16.10.5P/24.
Q4) Why are you able to ping SVI 10 on the peer pod Cisco Nexus 5000 Switch?
Activity Verification
You have completed this task when you attain these results:
n You have used the show command and verified that Cisco FabricPath is enabled.
n You have used the ping command and verified connectivity to the peer pod.
128 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 3: Configure vPC+ (Optional)
During this exercise, you will configure the vPC+ on your pod VDC.
Activity Procedure
Complete these steps:
Step 1 Enable the vPC feature on your VDC.
N7K-Y-podP(config)# feature vpc
Step 2 Configure a vPC domain using domain identifier XY. (X is the SMALLER of the two
peer pod numbers, and Y is the LARGER of the two peer pod numbers. Pods 5 and 6
will use 56 as the domain identifier.)
N7K-1-pod1
12
N7K-2-pod2
N7K-1-pod3
34
N7K-2-pod4
N7K-1-pod5
56
N7K-2-pod6
Step 3 Assign a static vPC+ ID to the vPC+ peer. Use static vPC+ ID 1XY. See the following
table for the specific ID in your pod.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 129
Device vPC Domain ID
N7K-1-pod1
112
N7K-2-pod2
N7K-1-pod3
134
N7K-2-pod4
N7K-1-pod5
156
N7K-2-pod6
Step 4 Configure the vPC keepalive link. The destination is your peer Cisco Nexus 7000 VDC
mgmt0 IP address (Q is your peer pod number).
N7K-Y-podP(config-vpc-domain)# exit
Step 5 Create a static port-channel interface 7 containing the interfaces between the Cisco
Nexus 7000 Switches.
Step 7 Restart the interfaces in the channel group and verify the vPC status. Do not continue to
the next steps before you have formed adjacency with your vPC peer.
vPC domain id : XY
vPC+ switch id : 1XY
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
vPC fabricpath status : peer is reachable through fabricpath
130 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Configuration consistency status : success
Per-vlan consistency status : success
Type-2 inconsistency reason : Consistency Check Not Performed
vPC role : secondary
Number of vPCs configured : 0
Peer Gateway : Disabled
Dual-active excluded VLANs and BDs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)
Fabricpath load balancing : Disabled
Operational Layer3 Peer-router : Disabled
Port Channel Limit : limit to 244
Self-isolation : Disabled
Step 8 Examine the FabricPath switch IDs of your Cisco Nexus 7000 VDC.
Step 9 Create a vPC+ LACP channel on the interfaces that are connected to the Cisco Nexus
5000 Switch in your pod and the peer pod. The port channel ID is 5 and the vPC ID is 5
for all lab pods.
Ethernet X/A Eth 7/1 Eth 7/2 Eth 7/3 Eth 7/4 Eth 7/5 Eth 7/6
N5K-1 212
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 131
N5K-2
N5K-3
234
N5K-4
N5K-5
256
N5K-6
Step 14 Create a static port-channel interface 5 that contains the interfaces between the Cisco
Nexus 5000 Switches.
N5K-P(config-vpc-domain)# interface ethernet 2/5-6
N5K-P(config-if-range)# switchport mode trunk
N5K-P(config-if-range)# no shutdown
N5K-P(config-if-range)# channel-group 5 mode on
Step 15 Make this port channel a peer link and verify the vPC status. Do not continue to the
next steps before you have formed adjacency with your vPC peer.
N5K-P(config-if-range)# interface port-channel 5
N5K-P(config-if)# vpc peer-link
Please note that spanning tree port type is changed to "network" port type on
vPC peer-link.
This will enable spanning tree Bridge Assurance on vPC peer-link provided the
STP Bridge Assurance (which is enabled by default) is not disabled.
Step 16 Create a vPC LACP channel on the Cisco Nexus 5000 interfaces that are connected to
the Cisco Nexus 7000 in your pod and the peer pod. The port channel ID is 7 and the
vPC ID is 7 for all lab pods.
N5K-P(config-if)# feature lacp
N5K-P(config)# interface ethernet 2/1
N5K-P(config-if)# channel-group 7 mode active
132 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
N5K-P(config-if)# interface port-channel 7
N5K-P(config-if)# vpc 7
Step 17 Verify the vPC and port channel status on the Cisco Nexus 7000 VDC and your Nexus
5000.
N7K-Y-podP(config-if)# show vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id : XY
vPC+ switch id : 1XY
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
vPC fabricpath status : peer is reachable through fabricpath
Configuration consistency status : success
Per-vlan consistency status : success
Type-2 inconsistency reason : Consistency Check Not Performed
vPC role : primary
Number of vPCs configured : 1
Peer Gateway : Disabled
Dual-active excluded VLANs and BDs : -
Graceful Consistency Check : Enabled
Auto-recovery status : Enabled (timeout = 240 seconds)
Fabricpath load balancing : Disabled
Operational Layer3 Peer-router : Disabled
Port Channel Limit : limit to 244
Self-isolation : Disabled
vPC status
Id : 5
Port : Po5
Status : up
Consistency : success
Reason : success
Active Vlans : 10-14
VPC+ Attributes: DF: Yes, FP MAC: 112.11.65535
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 133
id Port Status Active vlans
-- ---- ------ --------------------------------------------------
1 Po5 up 1,10-14
vPC status
----------------------------------------------------------------------------
id Port Status Consistency Reason Active vlans
------ ----------- ------ ----------- -------------------------- -----------
7 Po7 up success success 1,10-14,111
-113,200
Step 18 Clean up the Fabric-Path configuration on your Nexus 7000 switch pod VDC.
N7K-Y-podP# conf
N7K-Y-podP(config)# no feature-set fabricpath
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands and verified that all vPCs are operational.
134 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Guided Lab 8: Troubleshooting vPCs and Cisco
FabricPath
Overview
Complete this lab activity to practice what you learned in the related module.
In this activity, you will log into your pod VDC and troubleshoot problems that are injected into
the lab configuration relating to vPCs and Cisco FabricPath. After completing this activity, you
will be able to meet these objectives:
n Use the troubleshooting process to identify the problem that is related to the vPC configuration
n Having identified the problem, resolve the issue so that the vPC becomes fully operational
n Use the troubleshooting process to identify the problem that is related to the Cisco FabricPath
configuration
n Having identified the problem, resolve the issue so that the Cisco FabricPath becomes fully
operational
Visual Objective
The figure illustrates what you will accomplish in this activity.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 135
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
Activity Procedure
Complete these steps:
Step 1 Connect to the Cisco Nexus 7000 VDC in your pod.
Step 2 Roll back to the configuration checkpoint BASE on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Copy complete.
Step 5 Connect to your pod Cisco Nexus 5000 Switch console.
Step 6 Roll back to the configuration checkpoint BASE on your Nexus 5000 switch
N5K-P# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Copy complete.
Step 7 Before continuing to the next task, verify that your lab partners in the peer pod have
also loaded the trouble ticket on both of their devices.
Activity Verification
You have completed this task when you attain these results:
n You have successfully loaded the trouble ticket.
136 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 2: Identify the Problem
Use the troubleshooting process to identify the problem that is related to the vPC configuration. In
this task, you will interact with your peer pod.
Activity Procedure
Complete these steps:
Step 1 Refer to the visual objective. The text description accompanying the trouble ticket is as
follows: “Overnight a Layer 2 connectivity problem was detected. The junior support
engineer determined that the problem affected all vPCs to your pod and your peer pod
Cisco Nexus 7000 VDCs.”
Step 2 Use the troubleshooting process to identify the problem that relates to the vPC
configuration.
Activity Verification
You have completed this task when you attain these results:
n You have identified the problem that was injected into the lab environment.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 137
Task 3: Resolve the Problem
During this exercise, having identified the problem, you will resolve the issue so that the virtual
port channel becomes fully operational.
Activity Procedure
Complete these steps:
Step 1 Create an action plan for restoring an operational port channel.
Step 2 Implement your action plan.
Activity Verification
You have completed this task when you attain these results:
n You have identified how to resolve the problem.
n You have returned the lab environment to a fully working condition.
138 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 4: Troubleshooting Ticket TT2-FP
During this exercise, you will load the troubleshooting ticket onto the Cisco Nexus 7000 Switch.
Activity Procedure
Complete these steps:
Step 1 Connect to your VDC
Step 2 Clear the vPC configuration on your pod Cisco Nexus 7000 Switch (use keyword best-
effort with rollback, if the rollback fails without).
N7K-Y-podP# conf
N7K-Y-podP(config)# no feature vpc
Disabling feature vpc may cause traffic loss. Continue? (y/n) [n] y
N7K-Y-podP(config)# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Step 3 Load the troubleshooting ticket TT2-FP onto your pod Cisco Nexus 7000 Switch.
Copy complete.
Copy complete.
Step 6 Before continuing to the next task, verify that your lab partners in the peer pod have
also loaded the trouble ticket on both of their devices.
Activity Verification
You have completed this task when you attain these results:
n You have successfully loaded the trouble ticket.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 139
Task 5: Identify the Problem
Use the troubleshooting process to identify the problem relating to the FabricPath configuration. In
this task, you will interact with your peer pod.
Activity Procedure
Complete these steps:
Step 1 Refer to the visual objective. The description that accompanies the trouble ticket is as
follows: “After planned maintenance, a problem was detected with connectivity in
VLANs 10, 11, 12, and 13. The support engineer determined that the links between
your pod and the peer pod Cisco Nexus 7000 VDCs are down.”
Step 2 Use the troubleshooting process to identify the problem relating to the FabricPath
configuration.
Activity Verification
You have completed this task when you attain these results:
n You have identified the problem that was injected into the lab environment.
140 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 6: Resolve the Problem
During this exercise, having identified the problem, you will resolve the issue so that FabricPath l
becomes fully operational.
Activity Procedure
Complete these steps:
Step 1 Create an action plan for restoring an operational port channel.
Step 2 Implement your action plan.
Activity Verification
You have completed this task when you attain these results:
n You have identified how to resolve the problem.
n You have returned the lab environment to a fully working condition.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 141
Guided Lab 9: Configuring Layer 3 Switching
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure VRF instances with static routing and verify the configuration
n Configure VRF instances with OSPFv2 and verify the configuration
n Configure VRF instances with EIGRP and verify the configuration
n Configure BGP and verify configuration
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
142 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Command List
The table describes the commands that are used in this activity.
Command Description
show vrf [vrf-name] interface This command displays the VRF status for an
interface.
vrf context vrf-name This command creates a new VRF and enters
VRF configuration mode.
ip route {ip-prefix | ip-addr ip-mask} next-hop This command configures a static route and the
interface for this static route.
ip router ospf instance-tag area area-id This command adds the interface to the OSPFv2
instance and area.
show ip ospf neighbors vrf vrf-name This command displays the list of OSPFv2
neighbors.
show ip ospf database vrf vrf-name This command displays the OSPFv2 link-state
database summary.
ip router eigrp instance-tag This command associates this interface with the
configured EIGRP process.
show ip eigrp instance-tag neighbors This command displays information about all the
EIGRP neighbors.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 143
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection to your VDC and
Cisco Nexus 5000 Switch. The next step is to revert to the checkpoint BASE configurations on the
VDC and Nexus 5000 Switch.
Activity Procedure
Complete these steps:
Step 1 Connect to the Cisco Nexus 7000 VDC in your pod.
Step 2 Roll back to the configuration checkpoint BASE on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
144 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 9 On your N7K VDC DISABLE the interfaces connecting to the PEER N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/Q (P is your PEER Pod #)
N7K-X-PodP(config-if)# shutdown
Step 10 On your N7K VDC ENABLE the interfaces connecting to the PEER N7K.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/x-y (see table above)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 11 On your N7K VDC create VLANs 10-14.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP (config)# vlan 10-14
N7K-X-PodP (config-vlan)# exit
N7K-X-PodP (config)#
Step 12 On your N5K create VLANs 10-14.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 10-14
N5K-P(config-vlan)# exit
N5K-P(config)#
Activity Verification
You have completed this task when you attain these results:
n You have connected to your assigned pod VDC.
n You have connected to your assigned pod Cisco Nexus 5000 Switch.
n You have successfully loaded the configuration from checkpoint BASE.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 145
Task 2: Configuring VRF with Static Routing
During this exercise, you will configure VRF instances with static routing and verify the
configuration. While your workgroup is responsible for one Cisco Nexus 7000 VDC, your peer
workgroup will configure the other VDC on the other Cisco Nexus 7000 Switch, so some
coordination is required.
Activity Procedure
Complete these steps:
Step 1 Show the VRFs that exist within your VDC pod by default.
N7K-Y-podP# show vrf
VRF-Name VRF-ID State Reason
default 1 Up --
management 2 Up --
146 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 3 Verify the interfaces that belong to each VRF within your VDC pod.
N7K-Y-podP# show vrf default interface
Interface VRF-Name VRF-ID Site-of-Origin
Step 6 Place the VLAN 11 interface into the STATICvrf VRF and assign IP 172.16.11.7P (P is
your pod number).
N7K-Y-podP(config)# interface vlan 11
N7K-Y-podP(config-if)# vrf member STATICvrf
Warning: Deleted all L3 config on interface Vlan11
N7K-Y-podP(config-if)# ip address 172.16.11.7P/24
N7K-Y-podP(config-if)# no shutdown
Step 8 Create a static route pointing to your neighbor loopback using your peer pod VLAN 11
interface as the next hop (Q is your peer pod number).
N7K-Y-podP(config)# vrf context STATICvrf
N7K-Y-podP(config-vrf)# ip route 192.168.11.7Q/32 172.16.11.7Q
N7K-Y-podP(config-vrf)#
Step 9 Check the routing table for VRF STATICvrf (Q is your peer pod number).
Step 10 Ping your peer pod loopback 11 interface (Q is your peer pod number).
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 147
N7K-Y-podP# ping 192.168.11.7Q
ping 192.168.11.7Q
PING 192.168.11.7Q (192.168.11.7Q): 56 data bytes
ping: sendto 192.168.11.7Q 64 chars, No route to host
Request 0 timed out
ping: sendto 192.168.11.7Q 64 chars, No route to host
Request 1 timed out
ping: sendto 192.168.11.7Q 64 chars, No route to host
Request 2 timed out
ping: sendto 192.168.11.7Q 64 chars, No route to host
Request 3 timed out
ping: sendto 192.168.11.7Q 64 chars, No route to host
Request 4 timed out
Step 11 Ping your peer pod loopback 11 interface inside the VRF instance (Q is your Peer Pod
number).
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify that the VRF is configured and that the static
routing entries are in the correct IP routing table.
148 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 3: Configuring VRFs with OSPFv2
During this exercise, you will configure VRF instances with OSPFv2 and verify the configuration.
Activity Procedure
Complete these steps:
Step 1 Create a VRF context named OSPFvrf.
N7K-Y-podP(config)# vrf context OSPFvrf
N7K-Y-podP(config-vrf)#
Step 2 Place interface VLAN 12 into VRF OSPFvrf and assign IP address 172.16.12.7P/24 (P
is your pod number).
N7K-Y-podP(config-vrf)# interface vlan 12
N7K-Y-podP(config-if)# vrf member OSPFvrf
Warning: Deleted all L3 config on interface Vlan12
N7K-Y-podP(config-if)# ip address 172.16.12.7P/24
N7K-Y-podP(config-if)# no shutdown
Step 3 Create interface loopback 12, place it into VRF OSPFvrf, and assign IP address
192.168.12.7P/32 (P is your pod number).
N7K-Y-podP(config-if)# interface loopback 12
N7K-Y-podP(config-if)# vrf member OSPFvrf
Warning: Deleted all L3 config on interface loopback12
N7K-Y-podP(config-if)# ip address 192.168.12.7P/32
N7K-Y-podP(config-if)# no shutdown
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 149
N7K-Y-podP(config)#
Q1) Check the Cisco Nexus 7000 Switch enterprise license. Is it in use?
Feature Ins
Lic Status Expiry Date Comments
Count
------------------------------------------------------------------------------
MPLS_PKG Yes - In use never -
STORAGE-ENT No - Unused -
VDC_LICENSES No 0 Unused -
ENTERPRISE_PKG No - Unused -
FCOE-N7K-F132XP No 0 Unused -
FCOE-N7K-F248XP No 0 Unused -
FCOE-N7K-F312FQ No 0 Unused -
FCOE-N7K-F348XP No 0 Unused -
ENHANCED_LAYER2_PKG Yes - Unused never -
SCALABLE_SERVICES_PKG No - Unused -
TRANSPORT_SERVICES_PKG Yes - Unused never -
LAN_ADVANCED_SERVICES_PKG Yes - Unused never -
LAN_ENTERPRISE_SERVICES_PKG Yes - In use never -
------------------------------------------------------------------------------
Step 5 Check the details of the license usage.
Step 7 Configure OSPF on interface Loopback 12 using OSPF area P (P is your pod number).
150 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Graceful-restart is configured
Grace period: 60 state: Inactive
Last graceful restart exit status: None
Supports only single TOS(TOS0) routes
Supports opaque LSA
This router is an area border
Administrative distance 110
Reference Bandwidth is 40000 Mbps
SPF throttling delay time of 200.000 msecs,
SPF throttling hold time of 1000.000 msecs,
SPF throttling maximum wait time of 5000.000 msecs
LSA throttling start time of 0.000 msecs,
LSA throttling hold interval of 5000.000 msecs,
LSA throttling maximum wait time of 5000.000 msecs
Minimum LSA arrival 1000.000 msec
LSA group pacing timer 10 secs
Maximum paths to destination 8
Number of external LSAs 0, checksum sum 0
Number of opaque AS LSAs 0, checksum sum 0
Number of areas is 2, 2 normal, 0 stub, 0 nssa
Number of active areas is 2, 2 normal, 0 stub, 0 nssa
Install discard route for summarized external routes.
Install discard route for summarized internal routes.
Area BACKBONE(0.0.0.0) (Inactive)
Area has existed for 00:00:11
Interfaces in this area: 1 Active interfaces: 1
Passive interfaces: 0 Loopback interfaces: 0
No authentication available
SPF calculation has run 1 times
Last SPF ran for 0.000299s
Area ranges are
Number of LSAs: 2, checksum sum 0xa226
Area (0.0.0.P) (Inactive)
Area has existed for 00:00:11
Interfaces in this area: 1 Active interfaces: 1
Passive interfaces: 0 Loopback interfaces: 1
No authentication available
SPF calculation has run 1 times
Last SPF ran for 0.000049s
Area ranges are
Number of LSAs: 2, checksum sum 0x17750
Step 10 Check the adjacent OSPF on VLAN 12. (Q is your peer pod number.)
OR
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 151
Link ID ADV Router Age Seq# Checksum Link Count
192.168.12.7P 192.168.12.7P 62 0x80000003 0xa9e4 1
192.168.12.7Q 192.168.12.7Q 63 0x80000003 0xa7e3 1
Step 12 Check the routing table and ping your peer loopback 12 IP address (Q is your peer pod
number).
Activity Verification
You have completed this task when you attain these results:
n You have used the show and ping commands to verify that the VRF is configured, and that the
OSPF routes are showing in the IP routing table and are reachable.
152 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 4: Configuring VRFs and EIGRP
In this task, you will configure VRF instances with EIGRP and verify the configuration.
Activity Procedure
Complete these steps:
Step 1 Create a VRF context named EIGRPvrf.
N7K-Y-podP(config)# vrf context EIGRPvrf
N7K-Y-podP(config-vrf)#
Step 2 Create interface VLAN 13 in VRF EIGRPvrf using 172.16.13.7P/24 as the IP address
(P is your pod number).
N7K-Y-podP(config)# interface vlan 13
N7K-Y-podP(config-if)# vrf member EIGRPvrf
Warning: Deleted all L3 config on interface Vlan13
N7K-Y-podP(config-if)# ip address 172.16.13.7P/24
N7K-Y-podP(config-if)# no shutdown
Step 3 Create interface loopback 13, place it into VRF EIGRPvrf, and assign IP address
192.168.13.7P/32 (P is your pod number).
N7K-Y-podP(config)# interface loopback 13
N7K-Y-podP(config-if)# vrf member EIGRPvrf
Warning: Deleted all L3 config on interface loopback13
N7K-Y-podP(config-if)# ip address 192.168.13.7P/32
N7K-Y-podP(config-if)# no shutdown
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 153
Step 5 Check the Cisco Nexus 7000 enterprise license. Is it in use?
N7K-Y-podP(config)# show license usage
Count
------------------------------------------------------------------------------
MPLS_PKG Yes - In use never -
STORAGE-ENT No - Unused -
VDC_LICENSES No 0 Unused -
ENTERPRISE_PKG No - Unused -
FCOE-N7K-F132XP No 0 Unused -
FCOE-N7K-F248XP No 0 Unused -
FCOE-N7K-F312FQ No 0 Unused -
FCOE-N7K-F348XP No 0 Unused -
ENHANCED_LAYER2_PKG Yes - Unused never -
SCALABLE_SERVICES_PKG No - Unused -
TRANSPORT_SERVICES_PKG Yes - Unused never -
LAN_ADVANCED_SERVICES_PKG Yes - Unused never -
LAN_ENTERPRISE_SERVICES_PKG Yes - In use never -
------------------------------------------------------------------------------
Application Vdc
----------------------------------------------------------------------------
ospf podP
eigrp podP
----------------------------------------------------------------------------
Step 7 Start the EIGRP process for AS 42.
154 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
NSF route-hold time limit/expiries: 240/0
NSF signal time limit/expiries: 20/0
Redistributed max-prefix: Disabled
Step 11 Check the EIGRP neighbor relationship (Q is your peer pod number).
Step 12 Check the routing table (Q is your peer pod number) and ping your peer loopback 13 IP
address (Q is your peer pod number).
N7K-Y-podP# show ip route eigrp-42 vrf EIGRPvrf
IP Route Table for VRF "EIGRPvrf"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%<string>' in via output denotes VRF <string>
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify that the VRF is configured and that the EIGRP
routes are showing in the IP routing table.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 155
Task 5: Configuring BGP
In this task, you will configure BGP and verify the configuration.
Activity Procedure
Complete these steps:
Step 1 Create SVI 14 and assign IP address 172.16.14.7P (P is your pod number).
N7K-Y-podP(config-if)# interface Vlan14
N7K-Y-podP(config-if)# ip address 172.16.14.7P/24
N7K-Y-podP(config-if)# no shutdown
Step 3 Configure the BGP process with AS number 6500P (P is your pod number).
N7K-Y-podP(config)# router bgp 6500P
Step 4 Configure a BGP session with your peer pod (Q is your peer pod number).
N7K-Y-podP(config-router)# neighbor 172.16.14.7Q remote-as 6500Q
N7K-Y-podP(config-router-neighbor)# address-family ipv4 unicast
156 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Received 6 messages, 0 notifications, 0 bytes in queue
Sent 6 messages, 0 notifications, 0 bytes in queue
Connections established 1, dropped 0
Last reset by us never, due to No error
Last reset by peer never, due to No error
Neighbor capabilities:
Dynamic capability: advertised (mp, refresh, gr) received (mp, refresh, gr)
Dynamic capability (old): advertised received
Route refresh capability (new): advertised received
Route refresh capability (old): advertised received
4-Byte AS capability: advertised received
Address family IPv4 Unicast: advertised received
Graceful Restart capability: advertised received
Message statistics:
Sent Rcvd
Opens: 1 1
Notifications: 0 0
Updates: 1 1
Keepalives: 2 2
Route Refresh: 0 0
Capability: 2 2
Total: 6 6
Total bytes: 106 106
Bytes in queue: 0 0
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 157
<CR>
secondary Configure additional IP addresses on interface
tag URIB route tag value for local/direct routes
Step 8 Verify the BGP table (P is your pod number, Q is your peer pod number).
N7K-Y-podP(config-if)# show ip bgp
BGP routing table information for VRF default, address family IPv4 Unicast
BGP table version is 14, local router ID is 192.168.P4.1
Status: s-suppressed, x-deleted, S-stale, d-dampened, h-history, *-valid, >-best
Path type: i-internal, e-external, c-confed, l-local, a-aggregate, r-redist, I-
injected
Origin codes: i - IGP, e - EGP, ? - incomplete, | - multipath
Step 9 Verify connectivity to the peer interface loopback addresses (Q is your peer pod
number).
N7K-Y-podP(config-if)# ping 192.168.Q4.1
PING 192.168.Q4.1 (192.168. Q4.1): 56 data bytes
64 bytes from 192.168.Q4.1: icmp_seq=0 ttl=254 time=1.091 ms
64 bytes from 192.168.Q4.1: icmp_seq=1 ttl=254 time=0.747 ms
64 bytes from 192.168.Q4.1: icmp_seq=2 ttl=254 time=0.649 ms
64 bytes from 192.168.Q4.1: icmp_seq=3 ttl=254 time=0.633 ms
64 bytes from 192.168.Q4.1: icmp_seq=4 ttl=254 time=0.673 ms
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify that the BGP is configured and that the BGP
routes are showing in the IP routing table.
158 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Guided Lab 10: Configuring FHRP (Optional)
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure HSRP on a pair of Cisco Nexus 7000 Switches and verify the configuration by
setting up a continuous ping to see if there is any packet loss
n Configure VRRP on a pair of Cisco Nexus 7000 Switches and verify the configuration by
setting up a continuous ping to see if there is any packet loss
n Configure GLBP on a pair of Cisco Nexus 7000 Switches and verify the configuration by
setting up a continuous ping to see if there is any packet loss
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
Command List
The table describes the commands that are used in this activity.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 159
Command Description
160 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection to your VDC and
Cisco Nexus 5000 Switch. The next step is to revert to the checkpoint BASE configurations on the
VDC and the Nexus 5000 Switch.
Activity Procedure
Complete these steps:
Step 1 Connect to the Cisco Nexus 7000 VDC in your pod.
Step 2 Roll back to the configuration checkpoint BASE on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/x-y (see table for x and y)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 8 On your N7K VDC ENABLE the interfaces connecting to the PEER N7K.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 161
Pod 1 and 2 Pod 3 and 4 Pod 5 and 6
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/x-y (see table above)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 9 On your N7K VDC create VLANs 111-113.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP (config)# vlan 111-113
N7K-X-PodP (config-vlan)# exit
N7K-X-PodP (config)#
Step 10 On your N5K create VLANs 111-113.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 111-113
N5K-P(config-vlan)# exit
N5K-P(config)#
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod VDC and your pod Cisco Nexus 5000 Switch.
162 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 2: Configure HSRP
During this exercise, you will configure your VDC pod to be a member of two HSRP groups and
verify its operation and status.
Activity Procedure
Complete these steps:
Step 1 Enable the SVI feature on the Cisco Nexus 7000 Switch.
N7K-Y-podP(config)# feature interface-vlan
Step 2 Configure an SVI on the Cisco Nexus 7000 Switch for VLAN 111 using IP address
172.16.111.7P (P is your pod number).
N7K-Y-podP(config)# interface vlan 111
N7K-Y-podP(config-if)# ip address 172.16.111.7P/24
N7K-Y-podP(config-if)# no shutdown
Step 3 Enable the SVI feature on the Cisco Nexus 5000 Switch.
N5K-P(config)# feature interface-vlan
Step 4 Configure an SVI on the Cisco Nexus 5000 Switch for VLAN 111 using IP address
172.16.111.5P (P is your pod number).
N5K-P(config)# interface vlan 111
N5K-P(config-if)# ip address 172.16.111.5P/24
N5K-P(config-if)# no shutdown
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 163
Step 6 Enable the HSRP feature on your Cisco Nexus 7000 VDC:
N7K-Y-podP(config)# feature hsrp
Q1) Which are the active and standby routers in your first HSRP group?
Step 9 Change the priority of the HSRP group 1 on the standby HSRP router to 120. Verify the
state of both HSRP groups within both switches.
N7K-Y-podP(config-if)# hsrp 1
N7K-Y-podP(config-if-hsrp)# priority 120
Step 10 Recreate the instance on the former standby and change the priority to 120 before
assigning the group IP address.
N7K-Y-podP(config)# interface vlan 111
N7K-Y-podP(config-if)# no hsrp 1
N7K-Y-podP(config-if)# hsrp 1
N7K-Y-podP(config-if-hsrp)# priority 120
N7K-Y-podP(config-if-hsrp)# ip 172.16.111.1
Step 11 Remove the HSRP 1 instance within the active HSRP router and recreate the instance.
Q3) Did any of the HSRP routers change their state?
Step 12 Ping the HSRP group IP addresses from within your VDC pod.
Q4) Were the ping commands successful?
164 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 3: Virtual Router Redundancy Protocol
During this exercise, you will configure VRRP on a pair of Cisco Nexus 7000 Switches, and verify
the configuration by setting up a continuous ping to see if there is any packet loss.
Activity Procedure
Complete these steps:
Step 1 You will perform the remainder of this task with the associated VDC pod in both Cisco
Nexus 7000 Switches, that is, Pod 1 will partner with Pod 2, and so on, for six total
groups.
Step 2 Configure an SVI on the Cisco Nexus 7000 Switch for VLAN 112 using IP address
172.16.112.7P (P is your pod number).
N7K-Y-podP(config)# interface vlan 112
N7K-Y-podP(config-if)# ip address 172.16.112.7P/24
N7K-Y-podP(config-if)# no shutdown
Step 3 Configure an SVI on the Cisco Nexus 5000 Switch for VLAN 30 using IP address
172.16.112.5P (P is your pod number).
N5K-P(config)# interface vlan 112
N5K-P(config-if)# ip address 172.16.112.5P/24
N5K-P(config-if)# no shutdown
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 165
Step 6 Configure VRRP group 1 on your VLAN 112 SVI interfaces and assign the IP address
172.16.112.7Z.
Z 1 3 5
Step 7 Verify that the active and standby routers that are part of VRRP within your VDC are
functioning.
N7K-1-podP(config-if)# show vrrp
Interface VR IpVersion Pri Time Pre State VR IP addr
---------------------------------------------------------------
Vlan112 1 IPV4 255 1 s Y Init 172.16.112.7Z
And
And
Q6) Which are the active and standby routers in your first VRRP group?
Step 10 Change the priority of VRRP group 1 on the standby router to become a master.
N7K-2-podP(config-if-vrrp)# priority 254
166 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 11 Ping the VRRP group IP addresses from within your VDC pod. Disable the active
VRRP router in your group.
Q9) Were the ping commands successful?
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the VRRP configuration.
n You logged into the Windows hosts and set up a continuous ping, and then disabled the active
VRRP router and verified that the client did not lose connectivity.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 167
Task 4: Gateway Load Balancing Protocol
During this exercise, you will configure GLBP on a pair of Cisco Nexus 7000 Switches, and verify
the configuration by setting up a continuous ping to see if there is any packet loss.
Activity Procedure
Complete these steps:
Step 1 You will perform the remainder of this task with the associated VDC pod in both Cisco
Nexus 7000 Switches, that is, Pod 1 will partner with Pod 2, and so on, for six total
groups.
Step 2 Configure an SVI on the Cisco Nexus 7000 Switch for VLAN 113 using IP address
172.16.113.7P (P is your pod number).
N7K-Y-podP(config)# interface vlan 113
N7K-Y-podP(config-if)# ip address 172.16.113.7P/24
N7K-Y-podP(config-if)# no shutdown
Step 3 Configure an SVI on the Cisco Nexus 5000 Switch for VLAN 113 using IP address
172.16.113.5P (P is your pod number).
N5K-P(config)# interface vlan 113
N5K-P(config-if)# ip address 172.16.113.5P/24
N5K-P(config-if)# no shutdown
Step 4 Check Layer 3 connectivity by pinging IP addresses 172.16.113.7P and 172.16.113.5P
(P is your pod number).
Step 6 Configure GLBP group 1 on your SVI interfaces 113. Assign IP address 172.16.113.1.
168 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
N7K-Y-podP(config)# interface vlan 113
N7K-Y-podP(config-if)# glbp 1
N7K-Y-podP(config-if-glbp)# ip 172.16.113.1
N7K-Y-podP(config-if-glbp)# exit
N7K-Y-podP(config-if)# exit
Step 7 Verify that the active and standby routers that are part of GLBP within your VDC are
functioning.
N7K-Y-podP# show glbp brief
Interface Grp Fwd Pri State Address Active rtr Standby rtr
Vlan113 1 - 100 Standby 172.16.113.1 172.16.113.7Q local
Vlan113 1 1 7 Listen 0007.B400.0101 172.16.113.7Q -
Vlan113 1 2 7 Active 0007.B400.0102 local -
And
Step 8 Ping the GLBP group IP addresses from within your VDC pod. Disable the active
GLBP router in your group.
Q10) Were the ping commands successful?
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the VRRP configuration.
n You have logged into the Cisco Nexus 5000 Switch and set up a continuous ping, and then
disabled the active GLBP router and verified that the client did not lose connectivity.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 169
Guided Lab 11: Configuring MPLS (Optional)
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure and verify MPLS and LDP on the Cisco Nexus 7000 Switch
n Configure and verify MP-BGP and MPLS VPN customers on the Cisco Nexus 7000 Switch
n Configure and verify MPLS TE, OSPF for Cisco MPLS TE, and an explicit path on the Cisco
Nexus 7000 Switch
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
170 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Command List
The table describes the commands that are used in this activity.
Command Description
autoroute announce This command specifies that the IGP should use the tunnel (if the
tunnel is up) in its enhanced SPF calculation.
bandwidth This command configures the bandwidth for the MPLS TE tunnel.
destination ip-address This command specifies the destination for a tunnel. The
destination must be the MPLS TE router ID of the destination
device or the hostname.
explicit-path name name This command enters explicit path configuration mode and
creates or modifies the specified path.
feature mpls l3vpn This command enables the MPLS feature set.
feature mpls ldp This command enables the MPLS LDP feature on the device.
index 10 next-address address This command inserts or modifies a path entry at a specific index.
ip unnumbered type slot/port This command gives the tunnel interface an IP address that is the
same as the IP address of the configured interface.
mpls ldp sync This command enables MPLS LDP IGP synchronization for all
OSPF interfaces.
mpls traffic-eng area area-id This command turns on MPLS TE for the indicated OSPF area.
mpls traffic-eng bandwidth This command allocates the MPLS TE bandwidth pool for the
interface.
mpls traffic-eng router-id interface This command specifies that the TE router identifier for the node
is the IP address that is associated with the configured interface.
path-option 10 explicit name name This command configures the tunnel to use a named IP explicit
path.
show mpls interface detail This command displays the configuration status of MPLS LDP on
the interface.
show mpls ldp neighbor detail This command shows that the LDP session between routers was
successfully established.
show mpls traffic-eng link-management This command displays the link management information.
summary
show mpls traffic-eng tunnels brief This command displays information about configured MPLS TE
tunnels at the head and signaled TE LSPs at other hops.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 171
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection to your VDC and
Cisco Nexus 5000 Switch. The next step is to revert to checkpoint BASE configurations on the
VDC and Cisco Nexus 5000 Switch.
Step 6 On your N5K configure and ENABLE the interfaces connecting to the N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/1
N5K-P(config-if)# switchport
N5K-P(config-if)# switchport mode trunk
N5K-P(config-if)# no shutdown
Step 7 On your N5K DISABLE the interfaces connecting to the N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/2
N5K-P(config-if)# shutdown
Step 8 On your N7K VDC configure and ENABLE the interfaces connecting to YOUR N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/P (P is your Pod #)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 9 On your N7K VDC DISABLE the interfaces connecting to the PEER N5Ks.
172 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/Q (Q is your PEER Pod #)
N7K-X-PodP(config-if)# shutdown
Step 10 On your N7K VDC create VLANs 10-14.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP (config)# vlan 10-14
N7K-X-PodP (config-vlan)# exit
N7K-X-PodP (config)#
Step 11 On your N5K create VLANs 10-14.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 10-14
N5K-P(config-vlan)# exit
Step 12 Disable the interface that is connected to the peer Cisco Nexus 5000 and 7000 VDC.
N5K-P# conf t
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# int eth 2/5-6, eth 2/2
N5K-P(config-if)# shutdown
N5K-P(config-if)# show cdp neighbors
Capability Codes: R - Router, T - Trans-Bridge, B - Source-Route-Bridge
S - Switch, H - Host, I - IGMP, r - Repeater,
V - VoIP-Phone, D - Remotely-Managed-Device,
s - Supports-STP-Dispute
N7K-Y-podP(config)#
N7K-Y-podP(config)# interface ethernet X/D
N7K-Y-podP(config-if)# no switchport
N7K-Y-podP(config-if)# ip address 192.168.100.7P/24
Step 15 Verify connectivity to the peer pod IP address, which was configured in previous Step
(Q is peer pod number).
N7K-Y-podP(config-if)# ping 192.168.100.7Q
PING 192.168.100.7Q (192.168.100.7Q): 56 data bytes
Request 0 timed out
64 bytes from 192.168.100.7Q: icmp_seq=1 ttl=254 time=1.284 ms
64 bytes from 192.168.100.7Q: icmp_seq=2 ttl=254 time=0.663 ms
64 bytes from 192.168.100.7Q: icmp_seq=3 ttl=254 time=0.696 ms
64 bytes from 192.168.100.7Q: icmp_seq=4 ttl=254 time=0.724 ms
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 173
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod VDC and your pod Cisco Nexus 5000 Switch.
n You have successfully loaded the configuration from checkpoint BASE.
n Your pod Cisco Nexus 5000 Switch is connected only to your pod VDC.
n You have IP connectivity between your pod VDC and peer pod VDC.
Activity Procedure
Complete these steps:
Step 1 Create interface loopback 14 with IP address 192.168.14.7P/32 (P is your Pod number).
N7K-Y-podP(config-if)# interface loopback 14
N7K-Y-podP(config-if)# ip address 192.168.14.7P/32
Step 2 Enable the MPLS feature that is set on your pod VDC.
N7K-Y-podP(config)# feature-set mpls
Step 3 Check the details of the license usage.
N7K-Y-podP(config)# show license usage
Feature Ins
Lic Status Expiry Date Comments
Count
------------------------------------------------------------------------------
MPLS_PKG Yes - In use never -
STORAGE-ENT No - Unused -
174 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
VDC_LICENSES No 0 Unused -
ENTERPRISE_PKG No - Unused -
FCOE-N7K-F132XP No 0 Unused -
FCOE-N7K-F248XP No 0 Unused -
FCOE-N7K-F312FQ No 0 Unused -
FCOE-N7K-F348XP No 0 Unused -
ENHANCED_LAYER2_PKG Yes - Unused never -
SCALABLE_SERVICES_PKG No - Unused -
TRANSPORT_SERVICES_PKG Yes - Unused never -
LAN_ADVANCED_SERVICES_PKG Yes - Unused never -
LAN_ENTERPRISE_SERVICES_PKG Yes - Unused never -
------------------------------------------------------------------------------
Step 5 Enable MPLS LDP on the interface that is connected to the peer pod VDC.
Interface EthernetX/D:
ldp enabled
MPLS operational
Label space id 0x10000001
MPLS sub-layer EthernetX/D-mpls layer(0x26000001)
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 175
Step 7 Configure the OSPF process.
N7K-Y-podP(config-if)# feature ospf
N7K-Y-podP(config)# router ospf 100
N7K-Y-podP(config-router)#
Step 8 Configure OSPF on the interface that is connected to the peer pod VDC. Use OSPF area
0.
Step 9 Configure OSPF on interface loopback 14. Use OSPF area P (P is your pod number).
N7K-Y-podP(config-if)# interface loopback 14
N7K-Y-podP(config-if)# ip router ospf 100 area P
Step 12 Configure the LDP router ID to use the IP address of loopback 14.
N7K-Y-podP(config-router)# mpls ldp configuration
N7K-Y-podP(config-ldp)# router-id loopback 14
Step 13 Verify that the LDP session between routers was successfully established.
N7K-Y-podP(config-ldp)# show mpls ldp neighbor detail
Peer LDP Ident: 192.168.14.7Q:0; Local LDP Ident 192.168.14.7P:0
TCP connection: 192.168.14.7Q.61011 - 192.168.14.7P.646
Password: not required, none, in use
State: Oper; Msgs sent/rcvd: 8/9; Downstream; Last TIB rev sent 9
Up time: 00:01:09; UID: 1; Peer Id 0
LDP discovery sources:
EthernetX/D; Src IP addr: 192.168.100.7Q
holdtime: 15000 ms, hello interval: 5000 ms
Addresses bound to peer LDP Ident:
192.168.14.7Q 192.168.100.7Q
Peer holdtime: 180000 ms; KA interval: 60000 ms; Peer state: estab
Capabilities Sent:
[Dynamic Announcement (0x0506)]
[Typed Wildcard (0x050b)]
Capabilities Received:
[Dynamic Announcement (0x0506)]
[Typed Wildcard (0x050b)]
176 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify that MPLS is configured and that the LDP
session between routers was successfully established.
Activity Procedure
Complete these steps:
Step 1 Enable the BGP feature on your Cisco Nexus 7000 VDC.
N7K-Y-podP(config)# feature bgp
Step 2 Enable the MPLS Layer 3 VPN feature on your Cisco Nexus 7000 VDC.
N7K-Y-podP(config)# feature mpls l3vpn
Step 3 Configure a BGP routing process. Use AS number 650XY. (X is the SMALLER of the
two peer pod numbers, and Y is the LARGER of the two peer pod numbers. Pods 5 and
6 will use 65056 as the AS number.)
N7K1-pod1
65012
N7K2-pod2
N7K1-pod3 65034
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 177
N7K2-pod4
N7K1-pod5
65056
N7K2-pod6
Step 4 Configure a BGP session with your peer pod. Use the IP address 192.168.14.7Q (Q is
your peer pod number).
N7K-Y-podP(config-router)# neighbor 192.168.14.7Q remote-as 650XY
N7K-Y-podP(config-router-neighbor)# update-source loopback 14
Step 6 After your peer pod has finished BGP configuration, check the BGP neighbors.
N7K-Y-podP(config-router-neighbor-af)# show bgp vpnv4 unicast neighbors
Neighbor capabilities:
Dynamic capability: advertised (mp, refresh, gr) received (mp, refresh, gr)
Dynamic capability (old): advertised received
Route refresh capability (new): advertised received
Route refresh capability (old): advertised received
4-Byte AS capability: advertised received
Address family VPNv4 Unicast: advertised received
Graceful Restart capability: advertised received
Message statistics:
Sent Rcvd
Opens: 1 1
Notifications: 0 0
Updates: 2 2
Keepalives: 3 3
Route Refresh: 0 0
178 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Capability: 2 2
Total: 8 8
Total bytes: 154 154
Bytes in queue: 0 0
Step 8 Configure the route distinguisher. Configure the route distinguisher 650XY:1XY. (X is
the SMALLER of the two peer pod numbers, and Y is the LARGER of the two peer
pod numbers. Pods 5 and 6 will use 65056:156 as the route distinguisher.)
N7K1-pod1 65012:112
N7K2-pod2
N7K1-pod3 65034:134
N7K2-pod4
N7K1-pod5 65056:156
N7K2-pod6
N7K-Y-podP(config-vrf)# rd 650XY:1XY
Step 10 Configure a route target extended community for a VRF as follows: Import routing
information from the VPN extended community 650XY:1XY. Export routing
information to the VPN extended community 6500XY:1XY. (X is the SMALLER of
the two peer pod numbers, and Y is the LARGER of the two peer pod numbers. Pods 5
and 6 will use 65056:156 as the extended community.)
N7K-Y-podP(config-vrf-af-ipv4)# route-target import 650XY:1XY
N7K-Y-podP(config-vrf-af-ipv4)# route-target export 650XY:1XY
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 179
Step 12 Create SVI 10 on the same interface. Associate SVI 10 with VRF vpn_web_servers and
assign IP address 172.16.1P.7P/24 (P is your pod number).
N7K-Y-podP(config-vrf-af-ipv4)# feature interface-vlan
N7K-Y-podP(config)# interface vlan 10
N7K-Y-podP(config-if)# vrf member vpn_web_servers
Warning: Deleted all L3 config on interface Vlan10
N7K-Y-podP(config-if)# ip address 172.16.1P.7P/24
N7K-Y-podP(config-if)# no shutdown
Step 13 Check the interfaces that are associated with VRF vpn_web_servers.
N7K-Y-podP(config-if)# show vrf vpn_web_servers interface
Step 14 Configure a route map that matches network 172.16.1P.0/24 (P is your pod number).
N7K-Y-podP(config-if)# ip prefix-list AllowPrefix seq 10 permit 172.16.1P.0/24
N7K-Y-podP(config)# show ip prefix-list
ip prefix-list AllowPrefix: 1 entries
seq 10 permit 172.16.1P.0/24
N7K-Y-podP(config)# route-map AllowConnected permit 10
N7K-Y-podP(config-route-map)# match ip address prefix-list AllowPrefix
Step 17 Redistribute directly connected routes into BGP. Use route map AllowConnected.
N7K-Y-podP(config-router-vrf)# address-family ipv4 unicast
N7K-Y-podP(config-router-vrf-af)# redistribute direct route-map AllowConnected
Step 18 Verify that you have 172.16.1P.0/24 and 172.16.1Q.0/24 networks in the BGP table and
VRF routing table (P is your pod number, Q is your peer pod number).
N7K-Y-podP(config-router-vrf-af)# show ip bgp vrf vpn_web_servers
BGP routing table information for VRF vpn_web_servers, address family IPv4
Unicast
BGP table version is 5, local router ID is 172.16.11.7P
Path type: i-internal, e-external, c-confed, l-local, a-aggregate, r-redist, I-
injected
Origin codes: i - IGP, e - EGP, ? - incomplete, | - multipath
180 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
*via 172.16.11.7Q, Vlan10, [0/0], 01:37:37, direct
172.16.1P.71/32, ubest/mbest: 1/0, attached
*via 172.16.11.7Q, Vlan10, [0/0], 01:37:37, local
172.16.1Q.0/24, ubest/mbest: 1/0
*via 192.168.14.7P%default, [200/0], 00:08:51, bgp-650XY, internal, tag
650XY (mpls-vpn)
Step 19 On your Cisco Nexus 5000 Switch, configure an interface that is connected to your
Windows server in VLAN 10.
N5K-P(config)# interface ethernet 1/3
N5K-P(config-if)# switchport access vlan 10
Step 20 On your Windows server, configure a network adapter that is connected to your pod
Cisco Nexus 5000 Switch with IP address 172.16.1P.101/24. (P is your pod number.)
Step 21 Open Windows Command Processor and use command route ADD 172.16.1Q.0
MASK 255.255.255.0 172.16.1P.7P to configure a static route to your peer pod. (P is
your pod number, Q is your peer pod number.)
Step 22 Use the ping command from your Windows server to verify connectivity to the peer
Windows server address 172.16.1Q.101 (Q is your peer pod number).
Activity Verification
You have completed this task when you attain these results:
n You have used show commands to verify the MPLS Layer 3 VPN configuration.
n You can ping the peer Windows server through the configured MPLS Layer 3 VPN.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 181
Activity Procedure
Complete these steps:
Step 1 Connect to your pod Cisco Nexus 7000 VDC. Remove the IP address, the OSPF
configuration, and disable MPLS LDP on the interface that is connected to your peer
Cisco Nexus 7000 VDC.
Step 2 Configure two subinterfaces on the same interface (P is your pod number) and enable
MPLS LDP.
182 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
N7K-Y-podP(config-subif)# encapsulation dot1Q 102
N7K-Y-podP(config-subif)# ip address 192.168.102.7P/24
N7K-Y-podP(config-subif)# ip router ospf 100 area 0
N7K-Y-podP(config-subif)# mpls ip
N7K-Y-podP(config-subif)# no shutdown
Step 7 Create an MPLS TE tunnel with the following parameters (Q is your peer pod number).
1, 3 or 5 192.168.101.72
2, 4 or 6 192.168.102.71
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 183
Explicit Path name Link1:
10: next-address 192.168.10C.7Q
N7K-Y-podP(config-te)# index 20 next-address 192.168.14.7Q
Explicit Path name Link1:
10: next-address 192.168.10C.7Q
20: next address 192.168.14.7Q
Step 9 Use the ping command from your Windows server to verify connectivity to your peer
Windows server address 172.16.1Q.101 (Q is your peer pod number).
Step 10 Use various commands to verify the MPLS TE configuration.
N7K-Y-podP(config-te)# show mpls traffic-eng link-management summary
System Information::
Links Count: 2
Flooding System: enabled
IGP Area ID:: ospf-100 area-0
Flooding Protocol: OSPF
Flooding Status: data flooded
Periodic Flooding: enabled (every 60 seconds, next in 27 seconds)
Flooded Links: 2
IGP System ID: 192.168.14.7P
MPLS TE Router ID: 192.168.14.7P
Neighbors: 2
Link ID:: EthX/D.101 (192.168.101.7P)
Local Intfc ID: 439382117
Link Status:
Intfc Switching Capability Descriptors:
Default: Intfc Switching Cap psc1, Encoding ethernet
Link Label Type: Packet
Physical Bandwidth: 5640261 kbits/sec
Max Res Global BW: 10000 kbits/sec (reserved: 0% in, 100% out)
MPLS TE Link State: MPLS TE on, RSVP on, up, flooded, allocated
Inbound Admission: reject-huge
Outbound Admission: allow-if-room
Admin. Weight: 1 (IGP)
IGP Neighbor Count: 1
Link ID:: EthX/D.102 (192.168.102.7P)
Local Intfc ID: 439382118
Link Status:
Intfc Switching Capability Descriptors:
Default: Intfc Switching Cap psc1, Encoding ethernet
Link Label Type: Packet
Physical Bandwidth: 5640261 kbits/sec
Max Res Global BW: 10000 kbits/sec (reserved: 0% in, 0% out)
MPLS TE Link State: MPLS TE on, RSVP on, up, flooded, allocated
Inbound Admission: reject-huge
Outbound Admission: allow-if-room
Admin. Weight: 1 (IGP)
IGP Neighbor Count: 1
Signalling Summary:
LSP Tunnels Process: running
Passive LSP Listener: running
RSVP Process: running
Forwarding: enabled
Periodic reoptimization: every 3600 seconds, next in 286 seconds
Periodic FRR Promotion: Not Running
184 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Periodic auto-bw collection: disabled
TUNNEL NAME DESTINATION UP IF DOWN IF STATE/PROT
N7K-Y-podP_t1 192.168.10C.7Q - EthX/D.10C up/up
N7K-Y-podQ_t1 192.168.10C.7P EthX/D.10C - up/up
Displayed 1 (of 1) heads, 0 (of 0) midpoints, 1 (of 1) tails
Step 11 Remove the static route from your Windows server: route DELETE 172.16.1Q.0 (Q is
your peer pod number).
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the MPLS TE configuration.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 185
Guided Lab 12: Configuring Cisco OTV
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure basic Cisco OTV features and verify the configuration between the two sites
n Configure advanced Cisco OTV features and verify the configuration between the two sites
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
186 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Command List
The table describes the commands that are used in this activity.
Command Description
key-string [encryption-type] text-string This command configures the text string for the key.
otv isis authentication keychain keychain- This command configures the authentication
name keychain for edge device authentication.
send-lifetime start-time end-time This command configures a send lifetime for the key.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 187
This command displays the Cisco OTV VPN
show otv isis hostname vpn all configuration.
188 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection to your VDC and
your pod Cisco Nexus 5000 Switch.
Activity Procedure
Complete these steps:
Step 1 Connect to the Cisco Nexus 7000 VDC in your pod.
Step 2 Roll back to the configuration checkpoint BASE on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP(config)# no feature-set mpls
N7K-Y-podP(config)# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Step 6 On your N5K configure and ENABLE the interfaces connecting to the N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/1
N5K-P(config-if)# switchport
N5K-P(config-if)# switchport mode trunk
N5K-P(config-if)# no shutdown
Step 7 On your N5K DISABLE the interfaces connecting to the N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/2
N5K-P(config-if)# shutdown
Step 8 On your N5K configure and DISABLE the interfaces connecting to your peer N5K.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/5-6
N5K-P(config-if)# shutdown
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 189
Step 9 On your N7K VDC configure and ENABLE the interfaces connecting to YOUR N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/P (P is your Pod #)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 10 On your N7K VDC DISABLE the interfaces connecting to the PEER N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/Q (P is your PEER Pod #)
N7K-X-PodP(config-if)# shutdown
Step 11 On your N7K VDC create VLANs 10-14.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP (config)# vlan 10-14
N7K-X-PodP (config-vlan)# exit
N7K-X-PodP (config)#
Step 12 On your N5K create VLANs 10-14.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 10-14
N5K-P(config-vlan)# exit
N5K-P(config)#
Step 13 On your N5K create a SVI for VLAN 10.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# feature interface-vlan
N5K-P(config)# int vlan 10
N5K-P(config-if)# ip address 172.16.10.5P/24 (P is your Pod#)
N5K-P(config-if)# no shut
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod VDC and your pod Cisco Nexus 5000 Switch.
n Your pod Cisco Nexus 5000 Switch is connected only to your pod VDC.
190 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 2: Configuring Basic Cisco OTV
In this task, you will configure basic Cisco OTV features and verify the configuration between the
two sites.
Activity Procedure
Complete these steps:
Step 1 Connect to your VDC pod and enable the Cisco OTV feature.
N7K-Y-podP(config)# feature otv
Step 3 Configure the physical interface that Cisco OTV uses to reach the DCI transport
infrastructure. Reconfigure the Ethernet interface that is connected to your peer pod as a
Layer 3 interface with address 192.168.100.7P/24 (P is your pod number).
Step 5 Configure the site identifier. Use value 0xP (P is your pod number).
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 191
Step 7 Configure a multicast group address that is used by the Cisco OTV control plane for
this OTV overlay network.
N7K-Y-podP(config-if-overlay)# otv control-group 239.1.1.1
Step 8 Configure a range of local IPv4 multicast group prefixes used for multicast data traffic.
N7K-Y-podP(config-if-overlay)# otv data-group 232.1.1.0/28
Step 9 Join the Cisco OTV overlay interface with a physical Layer 3 interface that is
configured in the previous steps.
N7K-Y-podP(config-if-overlay)# otv join-interface ethernet 7/D
OTV needs join interfaces to be configured for IGMP version 3
Overlay-Interface Overlay1 :
Hostname System-ID Dest Addr Up Time State
N7K-Y-podQ 0026.9804.a942 192.168.100.7Q 00:00:46 UP
Step 13 Verify the VLANs that are associated with an overlay interface.
N7K-Y-podP# show otv vlan
192 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Dual Adjacency State Description
Full - Both site and overlay adjacency up
Partial - Either site/overlay adjacency down
Down - Both adjacencies are down (Neighbor is down/unreachable)
(!) - Site-ID mismatch detected
------------------------------------------------------------------------------
Step 15 Test connectivity from your pod Cisco Nexus 5000 Switch to your peer pod Cisco
Nexus 5000 Switch using IP addresses that are configured on SVI 10 (Q is your peer
pod number).
N5K-P# ping 172.16.10.5Q
PING 172.16.10.5Q (172.16.10.5Q): 56 data bytes
36 bytes from 172.16.10.5Q: Destination Host Unreachable
Request 0 timed out
64 bytes from 172.16.10.5Q: icmp_seq=1 ttl=254 time=0.736 ms
64 bytes from 172.16.10.5Q: icmp_seq=2 ttl=254 time=0.705 ms
64 bytes from 172.16.10.5Q: icmp_seq=3 ttl=254 time=0.721 ms
64 bytes from 172.16.10.5Q: icmp_seq=4 ttl=254 time=0.723 ms
Caution You may have to try to ping from both sides – a VLAN interface is silent and the N7K can only
learn the MAC (and send it through OTV) once traffic has been sent – remember OTV does
NOT flood unknown traffic. The ARP request succeeds but the ARP reply never makes it back.
Step 16 Check information about the Cisco OTV routes on your pod VDC.
N7K-Y-podP# show otv route
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 193
VLAN MAC Address Type age Secure NTFY Ports/SWID.SSID.LID
---------+-----------------+--------+---------+------+----+------------------
G - 64a0.e742.6e42 static - F F sup-eth1(R)
* 1 000a.f71d.e3d2 dynamic ~~~ F F EthX/A
* 1 000a.f71d.e3d3 dynamic ~~~ F F EthX/A
* 1 000a.f71d.edc0 dynamic ~~~ F F EthX/A
* 1 000a.f71d.edc1 dynamic ~~~ F F EthX/A
* 10 8c60.4f18.9bbc dynamic ~~~ F F EthX/A
O 10 8c60.4f22.ad7c dynamic - F F Overlay1
Activity Verification
You have completed this task when you attain these results.
n You have used the show commands to verify that the basic Cisco OTV configuration is in
place and that a connection exists between the two sites.
Activity Procedure
Complete these steps.
Step 1 Configure a key chain named otv-keys.
N7K-Y-podP(config)# key chain otv-keys
N7K-Y-podP(config-keychain)# key 0
N7K-Y-podP(config-keychain-key)# key-string 0 test12345
N7K-Y-podP(config-keychain-key)# accept-lifetime 00:00:00 Mar 01 2014 23:59:59
Sep 12 2019
N7K-Y-podP(config-keychain-key)# send-lifetime 00:00:00 Mar 01 2014 23:59:59 Aug
12 2019
Step 3 Configure Cisco OTV PDU authentication. Use the VPN name Overlay1.
N7K-Y-podP(config)# otv-isis default
N7K-Y-podP(config-router)# vpn Overlay1
N7K-Y-podP(config-router-vrf)# authentication-check
N7K-Y-podP(config-router-vrf)# authentication-type md5
N7K-Y-podP(config-router-vrf)# authentication key-chain otv-keys
Step 4 Change an IS-IS network entity title for the routing process to 10.0000.0000.000P.00 (P
is your pod number).
N7K-Y-podP(config-router-vrf)# net 10.0000.0000.000P.00
Step 5 Check the Cisco OTV VPN configuration. (P is your pod number. Q is your peer pod
number.)
N7K-Y-podP(config-router-vrf)# show otv isis hostname vpn all
194 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
1 0000.0000.000Q N7K-Y-podQ
Step 6 Complete these steps only if you are working on pod 1, pod 3 or pod 5. Configure the
adjacency server.
N7K-1-podP(config-router-vrf)# interface Overlay1
N7K-1-podP(config-if-overlay)# otv adjacency-server unicast-only
Cannot Configure Adjacency-Server with Control-Group configured
Step 7 Complete this step only if you are working on pod 2, pod 4 or pod 6. Configure the
peer pod IP address as the adjacency server.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 195
Site vlan : 1 (up)
AED-Capable : Yes
Capability : Unicast-Only
Is Adjacency Server : No
Adjacency Server(s) : 192.168.100.7Q / [None]
Step 9 Check and that the Cisco OTV route to your partner pods OTV interface is present
again before continuing to the next step.
N7K-Y-podP# show otv route
Step 10 Test connectivity from your pod Cisco Nexus 5000 Switch to your peer pod Cisco
Nexus 5000 Switch, using IP addresses that are configured on SVI 10 (Q is your peer
pod number).
N5K-P# ping 172.16.10.5Q
PING 172.16.10.5Q (172.16.10.5Q): 56 data bytes
64 bytes from 172.16.10.5Q: icmp_seq=0 ttl=254 time=1.306 ms
64 bytes from 172.16.10.5Q: icmp_seq=1 ttl=254 time=0.736 ms
64 bytes from 172.16.10.5Q: icmp_seq=2 ttl=254 time=0.705 ms
64 bytes from 172.16.10.5Q: icmp_seq=3 ttl=254 time=0.721 ms
64 bytes from 172.16.10.5Q: icmp_seq=4 ttl=254 time=0.723 ms
Activity Verification
You have completed this task when you attain these results.
n You have used the show commands to verify that the advanced Cisco OTV features are
configured correctly.
196 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Guided Lab 13: Implementing VXLAN
Overview
Complete this lab activity to implement VXLAN bridging on the Cisco Nexus 7000 Series
Switch. Odd pods will connect to even pods and test connectivity over the bridged VXLAN.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches with F3 linecards, two Cisco Nexus 5000 Series Switches.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 197
Command List
The table describes the commands that are used in this activity.
Command Description
feature pim Enables pim protocol
show ip route To display the IP routing table, use the show ip route
command
feature vni Configures the global mode for all VXLAN bridge
domains.
ip router ospf instance-tag area areaid [ To specify the Open Shortest Path First (OSPF)
secondaries none ] instance and area for an interface, use the ip router
ospf area command. To return to the default, use the
no form of this command
member vni [range] [mcast-group Associate VXLAN VNIs (Virtual Network Identifiers)
startaddr [end addr]] with the NVE interface and assign a multicast group to
the VNIs
198 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection to your VDC and
Cisco Nexus 5000 Switch. Next step is to revert to checkpoint BASE configurations on the VDC
and Nexus 5000 Switch.
Activity Procedure
Complete these steps:
Step 1 Connect to the Cisco Nexus 7000 VDC in your pod.
Step 2 Roll back to the configuration checkpoint BASE on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Step 5 On your N5K configure and ENABLE the interfaces connecting to YOUR N7K VDC.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/1
N5K-P(config-if)# switchport
N5K-P(config-if)# switchport mode trunk
N5K-P(config-if)# no shutdown
Step 6 On your N5K configure and DISABLE the interfaces connecting to your peer N5K.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/5-6
N5K-P(config-if)# shutdown
Step 7 On your N5K configure and DISABLE the interfaces connecting to the PEER N7K
VDC.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/2
N5K-P(config-if)# shutdown
Step 8 On your N5K create VLANs 10.
N5K-P# conf
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 199
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 10
N5K-P(config-vlan)# exit
N5K-P(config)#
Caution There is NO connectivity between the Nexus 5000 switches at this point.
200 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 2: Implement IP routing
In this task, you will configure IP routing on the Cisco Nexus 7000 and verify the operations.
Note This lab requires coordination between pod pairs 1 and 2, 3 and 4, 5 and 6.
Activity Procedure
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 201
Step 6 Configure OSPF on interface from step 2 using OSPF area 0
N7K-Y-podP(config)# interface ethernet 7/X (see table in step 3)
N7K-Y-podP(config-if)# ip router ospf 42 area 0
N7K-Y-podP(config-if)#
Activity Verification
Use this section to verify your results.
Step 1 Verify OSP neighbor – wait for the adjacency to be “FULL” state
N7K-X-podP(config-if)# sho ip ospf neighbors vrf underlay
OSPF Process ID 42 VRF underlay
Total number of neighbors: 1
Neighbor ID Pri State Up Time Address Interface
192.168.101.7Q 1 FULL/DR 00:00:02 192.168.100.7Q Eth7/10
N7K-X-podP(config-if)#
202 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
64 bytes from 192.168.101.7Q: icmp_seq=2 ttl=254 time=0.755 ms
64 bytes from 192.168.101.7Q: icmp_seq=3 ttl=254 time=0.885 ms
64 bytes from 192.168.101.7Q: icmp_seq=4 ttl=254 time=0.735 ms
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 203
Task 3: Configure Multicast on Nexus 7000 Switches
In this task, you will configure PIM on the Cisco Nexus 7000 switches and verify the operations.
Note This lab requires coordination between pod pairs 1 and 2, 3 and 4, 5 and 6.
Activity Procedure
Step 3 Configure pim sparse-mode on the interface that face the other Nexus 7000 switch.
Step 4 Configure your Nexus 7000 VDC to be a BSR candidate on interface loop 0
N7K-2-pod4(config)# vrf context underlay
N7K-2-pod4(config-vrf)# ip pim bsr-candidate loopback 0
N7K-2-pod4(config-vrf)#
Step 5 Configure your Nexus 7000 VDC to be a BSR candidate on interface loop 0 for groups
239.1.1.0/24
N7K-2-pod4(config-vrf)# ip pim rp-candidate loopback 0 group-list 239.1.1.0/24
N7K-2-pod4(config-vrf)#
204 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Activity Verification
Use this section to verify your results.
Step 1 Verify your PIM neighbor
N7K-X-podP# sho ip pim neighbor vrf underlay
PIM Neighbor Status for VRF "underlay"
Neighbor Interface Uptime Expires DR Bidir- BFD
Priority Capable State
192.168.100.74 Ethernet7/10 00:04:13 00:01:43 1 yes n/a
N7K-X-podP#
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 205
Task 4: Configure VXLAN Bridging
In this task you need to implement VXLAN bridging on the Cisco Nexus 7000 Series Switch. The Nexus
5000 will be used as an “end station” to test connectivity over the bridged VXLAN.
Note The Nexus 5600 switch also supports full VXLAN functionality.
Activity Procedure
N7K-X-podP(config-vni)# exit
N7K-X-podP(config)#
Step 4 Define system bridge domains 1000-1999
N7K-X-podP(config)# system bridge-domain 1000-1999
N7K-X-podP(config)#
Step 5 Create a bridge domain 1010
N7K-X-podP(config)# bridge-domain 1010
N7K-X-podP(config-bdomain)#
Step 6 Assign VNI 5010 to the bridge domain
N7K-X-podP(config-bdomain)# member vni 5010
N7K-X-podP(config-bdomain)# exit
N7K-X-podP(config)#
206 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 7 Create an encapsulation profile for dot1q tagged VLAN 10 and VNI 5010
N7K-X-podP(config)# encapsulation profile vni vlan10_to_vni5010
N7K-X-podP(config-vni-encap-prof)# dot1q 10 vni 5010
N7K-X-podP(config-vni-encap-prof)# exit
N7K-X-podP(config)#
Step 8 Create and enable the NVE interface, assign source loop0
N7K-X-podP(config)# int nve 1
N7K-X-podP(config-if-nve)# source-interface loopback 0
N7K-X-podP(config-if-nve)# no shut
N7K-X-podP(config-if-nve)#
Step 9 Assign VNI 5010 using ip multicast group 239.1.1.10
N7K-X-podP(config-if-nve)# member vni 5010 mcast-group 239.1.1.10
N7K-X-podP(config-if-nve)#
Step 10 Configure the Port 7/P connecting to your nexus 5000 switch for NOT switching
N7K-X-podP(config)# int ethernet 7/P
N7K-X-podP(config-if)# no switchport
N7K-X-podP(config-if)# no shutdown
N7K-X-podP(config-if)#
Step 11 Assign the encapsulation profile to your interface using service instance ID 1
N7K-X-podP(config-if)# service instance 1 vni
N7K-X-podP(config-if-srv-vni)# encapsulation profile vlan10_to_vni5010 default
N7K-X-podP(config-if-srv-vni)# no shut
N7K-X-podP(config-if-srv-vni)#
Step 12 Check the state of your NVE VNI
N7K-X-podP# sho nve vni
Codes: CP - Control Plane DP - Data Plane
UC - Unconfigured SA - Suppress ARP
N7K-X-podP#
Step 13 Check the nve interface configuration
N7K-X-podP# sho nve interface
Interface: nve1, State: Up, encapsulation: VXLAN
VPC Capability: VPC-VIP-Only [not-notified]
Local Router MAC: f025.72a8.bf43
Host Learning Mode: Data-Plane
Source-Interface: loopback0 (primary: 192.168.101.7P, secondary: 0.0.0.0)
N7K-X-podP#
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 207
Step 14 Check the state of your Service Instance
N7K-X-podP# sho service instance vni detail
VSI: VSI-Ethernet7/P.1
If-index: 0x35302001
Admin Status: Up
Oper Status: Up
Auto-configuration Mode: No
encapsulation profile vni vlan10_to_vni5010
dot1q 10 vni 5010
Dot1q VNI BD
------------------
10 5010 1010
N7K-X-podP#
Step 15 Check the global Bridge Domain status
N7K-X-podP# sho bridge-domain summary
N7K-X-podP(config)#
Step 16 Check the state of your Bridge domain
N7K-X-podP# sho bridge-domain 1010
N7K-X-podP#
Step 17 Verify your peer Pod has also reached this step.
Step 18 Send a ping from your Nexus 5000 to your peer Nexus 5000.
N5K-P# ping 172.16.10.5Q
PING 172.16.10.5Q (172.16.10.5Q): 56 data bytes
36 bytes from 172.16.10.5P: Destination Host Unreachable
Request 0 timed out
64 bytes from 172.16.10.5Q: icmp_seq=1 ttl=254 time=1.414 ms
64 bytes from 172.16.10.5Q: icmp_seq=2 ttl=254 time=1.33 ms
64 bytes from 172.16.10.5Q: icmp_seq=3 ttl=254 time=1.027 ms
64 bytes from 172.16.10.5Q: icmp_seq=4 ttl=254 time=0.996 ms
208 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
--- 172.168.10.5Q ping statistics ---
5 packets transmitted, 4 packets received, 20.00% packet loss
round-trip min/avg/max = 0.996/1.191/1.414 ms
N5K-P#
Step 19 Verify the ARP cache for the remote MAC
N5K-P# sho ip arp
Legend:
* - primary entry, G - Gateway MAC, (R) - Routed MAC, O - Overlay MAC
age - seconds since last seen,+ - primary entry using vPC Peer-Link, E
-
EVPN entry
(T) - True, (F) - False , ~~~ - use 'hardware-age' keyword to
retrieve
age info
VLAN/BD MAC Address Type age Secure NTFY Ports/SWID.SSID.LID
---------+-----------------+--------+---------+------+----+------------------
G - b414.89dc.7a43 static - F F sup-eth1(R)
* 1010 8c60.4f2d.bf7c dynamic ~~~ F F VSI-Eth7/P.1
* 1010 8c60.4f2f.077c dynamic ~~~ F F nve1/192.168.101.7Q
N7K-X-podP#
Step 21 Check the NVE peer learned by your Nexus 7000 VDC
N7K-X-podP# sho nve peers
Interface Peer-IP State LearnType Uptime Router-Mac
--------- --------------- ----- --------- -------- -----------------
nve1 192.168.101.7Q Up DP 00:13:27 n/a
N7K-X-podP#
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 209
Step 22 Check the VLAN configuration on your Nexus 7000 VDC, note VLAN 10 does NOT
exist.
N7K-X-podP(config)# sho vlan
N7K-X-podP(config)#
Step 23 Check the spanning-tree status, note BD1010 has a STP instance.
N7K-X-podP(config)# sho spanning-tree
BD1010
Spanning tree enabled protocol rstp
Root ID Priority 32778
Address 8c60.4f2f.077c
Cost 1
Port 905 (VSI-Ethernet7/P.1)
Hello Time 2 sec Max Age 20 sec Forward Delay
15 sec
N7K-X-podP(config)#
Activity Verification
You have completed this task when you attain these results:
§ You have verified ping works between the two Nexus 5000
§ You have verified MAC address are learned at the VXLAN bridge
210 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 5: Configure centralized VXLAN Routing
In this task you need to implement VXLAN routing on the Cisco Nexus 7000 Series Switch. The Nexus
5000 will be used as an “end station” to test connectivity. This lab configures the two nexus 7K VDCs as
“border Leafs” in a VXLAN fabric using standard routing and HSRP.
Note The Nexus 5600 switch also supports full VXLAN routing functionality.
Activity Procedure
Step 4 Create a BDI interface (like a VLAN interface but for a bridge domain)
N7K-Y-podP(config)# int bdi 1010
N7K-Y-podP(config-if)#
Step 5 Assign the interface to VRF “overlay1”
N7K-Y-podP(config-if)# vrf member overlay1
Warning: Deleted all L3 config on interface Bdi1010
N7K-Y-podP(config-if)#
Step 6 Assign address 172.16.10.7P/24 to the interface
N7K-Y-podP(config-if)# ip address 172.16.10.7P/24
N7K-Y-podP(config-if)#
Step 7 Create HSRP group 1 on the interface
N7K-Y-podP(config-if)# hsrp 1
N7K-Y-podP(config-if-hsrp)#
Step 8 Assign HSRP IP 172.168.10.1
N7K-Y-podP(config-if-hsrp)# ip 172.16.10.1
N7K-Y-podP(config-if-hsrp)# exit
N7K-Y-podP(config-if)#
Step 9 Enable the interface
N7K-Y-podP(config-if)# no shut
N7K-Y-podP(config-if)#
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 211
Step 10 Test connectivity to YOUR BDI interface from your Nexus 5000 switch.
N5K-P# ping 172.16.10.7P
PING 172.16.10.7P (172.16.10.7P): 56 data bytes
36 bytes from 172.16.10.5P: Destination Host Unreachable
Request 0 timed out
64 bytes from 172.16.10.7P: icmp_seq=1 ttl=254 time=1.411 ms
64 bytes from 172.16.10.7P: icmp_seq=2 ttl=254 time=1.115 ms
64 bytes from 172.16.10.7P: icmp_seq=3 ttl=254 time=1.104 ms
64 bytes from 172.16.10.7P: icmp_seq=4 ttl=254 time=1.098 ms
N7K-Y-podP(config-if)#
Step 13 Wait for the state of HSRP to become active or standby.
212 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 14 Test connectivity from your Nexus 5000 switch to the HSRP IP.
N5K-P# ping 172.16.10.1
PING 172.16.10.1 (172.16.10.1): 56 data bytes
36 bytes from 172.16.10.5P: Destination Host Unreachable
Request 0 timed out
64 bytes from 172.16.10.1: icmp_seq=1 ttl=254 time=1.355 ms
64 bytes from 172.16.10.1: icmp_seq=2 ttl=254 time=1.156 ms
64 bytes from 172.16.10.1: icmp_seq=3 ttl=254 time=1.129 ms
64 bytes from 172.16.10.1: icmp_seq=4 ttl=254 time=1.128 ms
Activity Verification
You have completed this task when you attain these results:
§ You have verified ping works to the router IPs and HSRP IPs
§ HSRP works as usual in a “flood and learn” border leaf.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 213
Guided Lab 14: Configuring LISP (Optional)
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure and verify LISP on the Cisco Nexus 7000 Switch
n Configure and verify LISP VM Mobility on the Cisco Nexus 7000 Switch
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
Command List
The table describes the commands that are used in this activity.
Command Description
authentication-key key-type password This command enters the authentication key type and
password for the LISP site.
214 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
database-mapping EID-prefix/prefixlength This command configures a dynamic EID range, the
locator priority priority weight weight RLOC mapping relationship, and associated traffic
policy for all IPv4 dynamic EID prefixes for this LISP
site.
description description This command enters a description for the LISP site
that is being configured.
eid-prefix EID-prefix This command enters the EID prefix for which the LISP
site that is being configured is authoritative.
ip lisp etr map-server map-server-address This command configures the locator address of the
key key-type authentication-key LISP map server to which this router, acting as an IPv4
LISP ETR, registers.
ip lisp itr map-resolver map-resolver-address This command configures the locator address of the
map resolver to which this router sends map-request
messages for IPv4 EIDs.
ip lisp itr-etr This command enables both the LISP ITR and the
LISP ETR functionality.
ip lisp map-resolver map-resolver-address This command configures the locator address of the
map resolver to which this router sends.
lisp dynamic-eid dynamic-eid-map-name This command enables dynamic EIDs for roaming and
enters dynamic EID configuration mode.
lisp mobility dynamic-eid-map-name This command associates this VLAN interface with a
dynamic EID map.
map-server map-server-address key [0 |3 |7] This command configures the IP address of the LISP
authentication-key map server to which this router registers as an IPv4
LISP ETR.
show ip lisp database This command displays the LISP ETR, configured local
IPv4 EID prefixes, and associated locator sets.
show ip lisp map-cache This command displays the LISP IPv4 EID-to-RLOC
data-cache mapping on an ITR.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 215
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection to your VDC and
Cisco Nexus 5000 Switch. Next step is to revert to checkpoint BASE configurations on the VDC
and Nexus 5000 Switch.
Activity Procedure
Complete these steps:
Step 1 Connect to the Cisco Nexus 7000 VDC in your pod.
Step 2 Roll back to the configuration checkpoint BASE on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP# no feature otv
N7K-Y-podP# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
216 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/P (P is your Pod #)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 10 On your N7K VDC DISABLE the interfaces connecting to the PEER N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/Q (P is your PEER Pod #)
N7K-X-PodP(config-if)# shutdown
Step 11 On your N7K VDC create VLANs 10-14.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP (config)# vlan 10-14
N7K-X-PodP (config-vlan)# exit
N7K-X-PodP (config)#
Step 12 On your N5K create VLANs 10-14.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 10-14
N5K-P(config-vlan)# exit
N5K-P(config)#
Step 13 Configure a Layer 3 interface between your VDC and peer pod VDC. Use the IP
address 192.168.100.7P/24 (P is your pod number).
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod VDC and your pod Cisco Nexus 5000 Switch.
n You have IP connectivity between your pod VDC and your peer pod VDC.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 217
Task 2: Configure LISP
In this task, you will enable LISP and configure the LISP map resolver, LISP-ALTLISP, and
ITR/ETR (xTR) on a pair of VDCs on Cisco Nexus 7000 switches, and verify the configuration
using show commands.
Activity Procedure
Complete these steps:
Note The next two step are to be configured ONLY on the odd Pods VDCs. All following steps
have to be configured for each Pod, odd and even again.
Step 3 Only for VDCs pod1, pod3 and pod5 configure LISP map server and map resolver
functionality.
N7K-Y-podP(config)# ip lisp map-resolver
N7K-Y-podP(config)# ip lisp map-server
Step 4 Only for VDCs pod1, pod3 and pod 5 configure LISP site Pod P and Pod Q (P is your
pod number, Q is your peer pod number). Associate EID prefixes 172.16.1P.0/24 and
172.16.1Q.0/24, respectively. Use authentication key 123456789.
N7K-Y-podP(config)# lisp site PodP
N7K-Y-podP(config-lisp-site)# eid-prefix 172.16.1P.0/24
218 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
N7K-Y-podP(config-lisp-site)# authentication-key 0 123456789
N7K-Y-podP(config-lisp-site)# description LISP Site PodP
Step 5 Configure the locator address 192.168.100.7X of the map resolvers to which this router
sends map-request messages for IPv4.
X 1 3 5
Step 6 Configure an EID-to-RLOC mapping relationship for the 172.16.1P.0/24 prefix for this
LISP site. Use IP address 192.168.100.7P as the locator ID. (P is your pod number.)
Step 8 Configure the locator address 192.168.100.7X of the LISP map servers to which this
router, acting as an IPv4 LISP ETR, registers. Use authentication key 123456789.
X 1 3 5
Step 9 Verify the LISP ETR configured local IPv4 EID prefixes and associated locator set.
LISP ETR IP Mapping Database for VRF "default" (iid 0), global LSBs: 0x00000001
Step 10 On your Cisco Nexus 5000 Switch, configure interface Ethernet 1/3, which is connected
to your Windows server in VLAN 10.
N5K-P(config)# interface ethernet 1/3
N5K-P(config-if)# switchport access vlan 10
Step 11 On your Windows server network adapter that is connected to your pod Cisco Nexus
5000 with IP address 172.16.1P.10P/24.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 219
Step 12 Using the command shell add a route towards 172.16.1Q.0/24 with gateway
172.16.1P.7P (P is your pod number, Q is your peer pod number).
C:\> route add 172.16.1Q.0 mask 255.255.255.0 172.16.1P.7P
Step 13 Use the ping command from your Windows server to verify connectivity to peer
Windows server address 172.16.1Q.10Q (Q is your peer pod number).
C:\> ping 172.16.1Q.10Q
Step 14 Verify the current EID-to-RLOC map cache entries.
N7K-Y-podP(config)# show ip lisp map-cache
Activity Verification
You have completed this task when you attain these results:
n You can ping your peer pod Windows server.
Activity Procedure
Complete these steps:
Step 1 Connect to your VDC and enable dynamic EIDS for roaming.
N7K-Y-podP(config)# lisp dynamic-eid eidmapVM
Step 2 Configure a dynamic EID range, the RLOC mapping relationship, and associated traffic
policy for dynamic EID prefixes 172.16.10.0/24 for this LISP site. (P is your pod
number):
N7K-Y-podP(config-dynamic-eid)# database-mapping 172.16.10.0/24 192.168.100.7P
priority 1 weight 100
Step 3 Configure the LISP map server to which this router registers as an IPv4 LISP ETR.
X 1 3 5
220 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 4 Configure the IP address 172.16.10.7P/24 and VM mobility with VLAN extensions on
VLAN11 (P is your pod number).
N7K-Y-podP(config-dynamic-eid)# interface vlan 10
N7K-Y-podP(config-if)# ip address 172.16.10.7P/24
N7K-Y-podP(config-if)# lisp mobility eidmapVM
N7K-Y-podP(config-if)# lisp extended-subnet-mode
Activity Verification
You have completed this task when you attain these results:
n You have used show commands to verify LISP VM mobility configuration.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 221
Guided Lab 15: Configuring FCoE
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure FCoE
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
222 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Command List
The table describes the commands that are used in this activity.
Command Description
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 223
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection to your Cisco Nexus
5000 Switch. Next step is to revert to checkpoint BASE configurations on the Nexus 5000.
Activity Procedure
Complete these steps:
Step 1 Connect to your pod Cisco Nexus 5000 Switch console.
Step 2 Roll back to the configuration checkpoint BASE on your Nexus 5000 series switch.
N5K-P# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod Cisco Nexus 5000 Switch.
224 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 2: Basic Configuration on the Cisco MDS Switch
In this task, you will perform the initial configuration on the Cisco MDS 9000 Switch.
Activity Procedure
Complete these steps:
Step 1 Using the remote access procedure, connect to your pod Cisco MDS 9000 Switch (P is
your pod number).
User Access Verification
MDS-P login: admin
Password: 1234QWer
Step 2 Erase the startup configuration and reboot the switch.
MDS-P# write erase
Warning: This command will erase the startup-configuration.
Do you wish to proceed anyway? (y/n) [n] y
MDS-P# reload
This command will reboot the system. (y/n)? [n] y
Step 3 When the switch has reloaded, configure the admin password as 1234QWer and select
N to enter setup.
---- System Admin Account Setup ----
This setup utility will guide you through the basic configuration of
the system. Setup configures only enough connectivity for management
of the system.
Please register Cisco MDS 9000 Family devices promptly with your
supplier. Failure to register may affect response times for initial
service calls. MDS devices must be registered to receive entitled
support services.
Step 4 Log into the switch with the username “admin” and password “1234QWer.”
User Access Verification
192.168.0.P9 login: admin
Password: 1234QWer
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 225
MDS-P(config-if)# no shutdown
------------------------------------------------------------------------------
Interface Vsan Admin Admin Status SFP Oper Oper Port
Mode Trunk Mode Speed Channel
Mode (Gbps)
------------------------------------------------------------------------------
fc1/1 1 auto on notConnected swl -- --
fc1/2 1 auto on notConnected swl -- --
fc1/3 1 auto on up swl FL 1 --
Step 8 Create VSAN 200 and place Fibre Channel interface 1/3 into VSAN 200.
MDS-P(config)# vsan database
MDS-P(config-vsan-db)# vsan 200
MDS-P(config-vsan-db)# vsan 200 interface fc1/3
Traffic on fc1/3 may be impacted. Do you want to continue? (y/n) y
------------------------------------------------------------------------------
Interface Vsan Admin Admin Status SFP Oper Oper Port
Mode Trunk Mode Speed Channel
Mode (Gbps)
------------------------------------------------------------------------------
fc1/3 200 auto on up swl FL 1 --
Activity Verification
You have completed this task when you attain these results:
n You have performed an initial configuration on the Cisco MDS switch.
226 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 3: Configuring FCoE on the Cisco Nexus 5000 Switch
In this task, you will configure FCoE on your Cisco Nexus 5000 Switch, and verify the
configuration using show commands.
Activity Procedure
Complete these steps:
Step 1 Connect to your pod Cisco Nexus 5000 Switch console.
Step 2 Enable FCoE on the Cisco Nexus 5000 Switch.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# feature fcoe
FC license checked out successfully
fc_plugin extracted successfully
FC plugin loaded successfully
FCoE manager enabled successfully
FC enabled on all modules successfully
Enabled FCoE QoS policies successfully
Step 3 Configure the unified ports 47–48 to work as Fibre Channel interfaces.
N5K-P(config)# Slot 1
N5K-P(config-slot)# port 47-48 type fc
Port type is changed. Please reload the switch
Step 4 Save your configuration.
Step 6 As soon as the switch is accessible again, log in and configure interface Ethernet 1/3 for
FCoE.
N5K-P(config-sys-qos)# interface ethernet 1/3
N5K-P(config-if)# switchport mode trunk
N5K-P(config-if)# spanning-tree port type edge trunk
Warning: Edge port type (portfast) should only be enabled on ports connected to
a single
host. Connecting hubs, concentrators, switches, bridges, etc... to this
interface when edge port type (portfast) is enabled, can cause temporary
bridging loops.
Use with CAUTION
N5K-P(config-if)# no shutdown
Step 7 Create a virtual Fibre Channel interface and bind it to interface Ethernet 1/3.
N5K-P(config-if)# interface vfc 1
N5K-P(config-if)# bind interface ethernet 1/3
N5K-P(config-if)# no shutdown
N5K-P(config-if)# show interface vfc 1
vfc1 is trunking
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 227
Bound interface is Ethernet1/3
Hardware is Ethernet
Port WWN is 20:00:8c:60:4f:22:ad:7f
Admin port mode is F, trunk mode is on
snmp link state traps are enabled
Port mode is TF
Port vsan is 1
Trunk vsans (admin allowed and active) (1)
Trunk vsans (up) ()
Trunk vsans (isolated) ()
Trunk vsans (initializing) (1)
1 minute input rate 0 bits/sec, 0 bytes/sec, 0 frames/sec
1 minute output rate 0 bits/sec, 0 bytes/sec, 0 frames/sec
0 frames input, 0 bytes
0 discards, 0 errors
0 frames output, 0 bytes
0 discards, 0 errors
last clearing of "show interface" counters Tue Jan 27 20:35:44 2015
------------------------------------------------------------------------------
INTERFACE FCID PORT NAME MAC ADDRESS
------------------------------------------------------------------------------
vfc1 0x4d0000 21:00:00:c0:dd:18:6c:d5 00:c0:dd:18:6c:d5
228 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Total number of flogi count from FCoE devices = 1.
VSAN 200:
--------------------------------------------------------------------------
FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE
--------------------------------------------------------------------------
0x4d0000 N 21:00:00:c0:dd:18:6c:d5 scsi-fcp:init
------------------------------------------------------------------------------
Interface Vsan Admin Admin Status SFP Oper Oper Port
Mode Trunk Mode Speed Channel
Mode (Gbps)
------------------------------------------------------------------------------
fc1/47 1 auto on trunking swl TE 4 --
fc1/48 1 auto on trunking swl TE 4 --
VSAN 200:
--------------------------------------------------------------------------
FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE
--------------------------------------------------------------------------
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 229
0xd1009b NL 21:00:00:0c:50:a3:c7:1f (Seagate) scsi-fcp:target
0xd100b3 NL 21:00:00:0c:50:a3:b4:31 (Seagate) scsi-fcp:target
0xda0000 N 20:00:00:0a:f7:1d:e3:d1 scsi-fcp:init
Step 18 Before you continue, verify that your peer pod has completed the previous steps.
Step 19 Configure interface Ethernet 2/5 as a trunk and allow only VLAN 200 on the interface.
Step 20 Create interface VFC 2 and bind it to interface Ethernet 2/5. Configure the interface as
E.
------------------------------------------------------------------------------
Interface Vsan Admin Admin Status Bind Oper Oper
Mode Trunk Info Mode Speed
Mode (Gbps)
------------------------------------------------------------------------------
vfc2 1 E on trunking Eth2/5 TE 40
230 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 23 Check the FCNS table. Verify that you see pWWNs from your pod and from the peer
pod.
VSAN 200:
--------------------------------------------------------------------------
FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE
--------------------------------------------------------------------------
0x7c0000 N 20:00:00:0a:f7:1d:ed:c1 scsi-fcp:init
0xad009b NL 22:00:00:0c:50:a3:c7:1f (Seagate) scsi-fcp:target
0xad00b3 NL 22:00:00:0c:50:a3:b4:31 (Seagate) scsi-fcp:target
0xd1009b NL 21:00:00:0c:50:a3:c7:1f (Seagate) scsi-fcp:target
0xd100b3 NL 21:00:00:0c:50:a3:b4:31 (Seagate) scsi-fcp:target
0xda0000 N 20:00:00:0a:f7:1d:e3:d1 scsi-fcp:init
Activity Verification
You have completed this task when you attain these results:
n You have used show commands to verify that the host has been able to successfully perform a
FLOGI into the switch.
n You have used show commands to verify that your pod and the peer pod form a Fibre Channel
fabric.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 231
Guided Lab 16: Configuring Security Features
(Optional)
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure and verify access control lists using atomic programming
n Configure port security on the Cisco Nexus 7000 Switch and verify that the configuration has
been applied as per the design requirements
n Configure traffic storm control on the Cisco Nexus 7000 Switch and verify that the
configuration has been applied as per the design requirements
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
232 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Command List
The table describes the commands that are used in this activity.
Command Description
absolute start time date [end time date] This command creates an absolute rule that is in effect
beginning at the time and date that are specified after the
start keyword.
configure session name This command creates a configuration session and enters
session configuration mode.
ip access-group access-list {in | out} This command applies an IPv4 or IPv6 ACL to the Layer 3
interface for traffic flowing in the direction specified.
ip access-list name This command creates the IP ACL and enters IP ACL
configuration mode.
object-group ip address name This command creates the IPv4 address object group.
object-group ip port name This command creates the protocol port object group.
periodic list-of-weekdays time to time This command creates a periodic rule that is in effect on the
days that are specified by the list-of-weekdays argument
between and including the specified start and end times.
periodic weekday time to [weekday] time This command creates a periodic rule that is in effect for one
or more contiguous days between and including the
specified start and end days and times.
show configuration session This command displays the contents of the session.
show interface [ethernet slot/port | port-channel This command displays the traffic storm control
number] counters storm-control configuration for the interfaces.
show port-security interface This command displays the port security status of a specific
interface.
show running-config aclmgr This command displays ACL configuration, including all time
ranges.
storm-control {broadcast | multicast | unicast} This command configures traffic storm control for traffic on
level percentage the interface.
switchport port-security maximum number This command configures the maximum number of MAC
addresses that can be learned or statically configured for the
current interface.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 233
Task 1: Management Connectivity and Preparation
In this task, you will use a Telnet or terminal utility to establish a connection and will perform
initial configuration on your pod.
Activity Procedure
Complete these steps:
Step 1 Connect to your pod Cisco Nexus 7000 VDC.
Step 2 Roll back to the configuration checkpoint BASE on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP# rollback running-config checkpoint base
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Step 3 Verify that SSH access is still possible otherwise connect via telnet and re-enable it.
Step 4 Connect to your Nexus 5000 switch by clinking on the icon in the remote lab GUI
Step 5 Roll back to the configuration checkpoint BASE on your Nexus 5000 series switch.
N5K-P# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Step 6 On your N5K configure and ENABLE the interface connecting to YOUR N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/1
N5K-P(config-if)# switchport
N5K-P(config-if)# switchport mode trunk
N5K-P(config-if)# no shutdown
Step 7 On your N5K DISABLE the interfaces connecting to the PEER N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/2
N5K-P(config-if)# shutdown
Step 8 On your N5K DISABLE the interfaces connecting to your peer N5K.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/5-6
N5K-P(config-if)# shutdown
Step 9 On your N7K VDC configure and ENABLE the interface connecting to YOUR N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/P (P is your Pod #)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
234 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
N7K-X-PodP(config-if)# no shutdown
Step 10 On your N7K VDC DISABLE the interface connecting to the PEER N5K.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/Q (P is your PEER Pod #)
N7K-X-PodP(config-if)# shutdown
Step 11 On your N7K VDC create VLANs 10-14.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP (config)# vlan 10-14
N7K-X-PodP (config-vlan)# exit
N7K-X-PodP (config)#
Step 12 On your N5K create VLANs 10-14.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 10-14
N5K-P(config-vlan)# exit
N5K-P(config)#
Step 13 Enable the SVI feature and configure SVI 10 with IP address 172.16.1P.7P/24 (P is
your pod number).
N7K-Y-podP(config)# feature interface-vlan
N7K-Y-podP(config)# interface vlan 10
N7K-Y-podP(config-if)# ip address 172.16.1P.7P/24
N7K-Y-podP(config-if)# no shutdown
Step 14 Configure an Ethernet interface that is connected to your pod Windows server in
VLAN10.
N5K-P(config)# interface ethernet 1/3
N5K-P(config-if)# switchport mode access
N5K-P(config-if)# switchport access vlan 10
N5K-P(config-if)# no shutdown
Step 15 Configure the pod Windows server NIC connected to your pod Cisco Nexus 5000
Switch with IP address 172.16.1P.10P/24. Verify that you can ping 172.16.1P.7P. (P is
your pod number.)
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod VDC and your pod Cisco Nexus 5000 Switch.
n You have connectivity between the Windows server and SVI 10 on your pod VDC.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 235
Task 2: Configuring ACLs
In this task, you will configure and verify ACLs using atomic programming.
Activity Procedure
Complete these steps:
Step 1 From within your VDC pod, enter the session using the configure session command.
Name your session ACL-CHECK and create two object groups, one named
RemSupport (includes host 172.16.1P.10P and host 172.16.1Q.10Q) and the
other named RemTerminal (permits Telnet and SSH).
N7K-Y-podP# configure session ACL-CHECK
Config Session started, Session ID is 1
Enter configuration commands, one per line. End with CNTL/Z.
N7K-Y-podP(config-s)# object-group ip address RemSupport
N7K-Y-podP(config-s-ipaddr-ogroup)# host 172.16.1P.10P
N7K-Y-podP(config-s-ipaddr-ogroup)# host 172.16.1Q.10Q
N7K-Y-podP(config-s-ipaddr-ogroup)# exit
N7K-Y-podP(config-s)# object-group ip port RemTerminal
N7K-Y-podP(config-s-port-ogroup)# eq 22
N7K-Y-podP(config-s-port-ogroup)# eq 23
N7K-Y-podP(config-s-port-ogroup)# exit
Step 3 Configure the time range: absolute starting from 8:00 a.m. (0800) 27 January 2015 and
periodic for working time (from 8:00 a.m. [0800] to 6:00 p.m. [1800]) and weekends.
Adjust time to ensure that you are in the correct time range (show clock command on
the Cisco Nexus 7000 VDC).
N7K-Y-podP(config-s)show clock
Time source is NTP
23:41:48.846 UTC Tue Jan 27 2015
N7K-Y-podP(config-s)# time-range RemSupportVPN
N7K-Y-podP(config-s-time-range)# absolute start 8:00:00 27 January 2014
N7K-Y-podP(config-s-time-range)# periodic Monday Tuesday Wednesday Thursday
8:00:00 to 18:00:00
N7K-Y-podP(config-s-time-range)# periodic Friday 18:00:00 to Monday 9:00:00
N7K-Y-podP(config-s-time-range)# exit
Step 5 Configure the IP access list TermAccess to permit access from your pod and the peer
Windows servers to SVI 10. Use the object groups named RemSupport and
RemTerminal that were created in Step 1 with the time range RemSupportVPN that was
created in Step 3.
N7K-Y-podP(config-s-acl)# permit tcp addrgroup RemSupport host 172.16.1P.7P
portgroup RemTerminal time-range RemSupportVPN
236 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 6 Assign the IP access list “TermAccess” to an SVI 10 interface within your pod VDC in
the ingress direction.
N7K-Y-podP(config-s)# interface vlan 10
N7K-Y-podP(config-s-if)# ip access-group TermAccess in
Q2) Ping the SVI from your Windows server. Was the ping successful? Why?
Step 9 If the operation in Step 9 was successful, then commit the session to the running
configuration.
N7K-Y-podP(config-s)# commit
Commit Successful
Q3) Ping the SVI from your Windows server. Was the ping successful? Why?
Q4) Try Telnet and SSH to the SVI from your Windows server. Were Telnet and SSH
successful? Why?
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 237
version 7.2(0)D1(1)
object-group ip address RemSupport
10 host 172.16.1P.10p
20 host 172.16.1Q.10Q
object-group ip port RemTerminal
10 eq 22
20 eq 23
ip access-list TermAccess
10 permit tcp addrgroup RemSupport 172.16.1P.7P/32 portgroup RemTerminal time-
range RemSupportVPN
interface Vlan10
ip access-group TermAccess in
time-range RemSupportVPN
10 absolute start 8:00:00 27 January 2014
20 periodic Monday Tuesday Wednesday Thursday 8:00:00 to 18:00:00
30 periodic Friday 18:00:00 to Monday 9:00:00
Q5) Are the access list and object groups part of the running configuration?
Step 13 Permit the following IP hosts between sequence numbers 5 and 10.
192.168.150.10
192.168.160.10
192.168.165.55
192.168.179.35
238 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
N7K-Y-podP# conf t
Enter configuration commands, one per line. End with CNTL/Z.
N7K-Y-podP(config)# ip access-list TermAccess
N7K-Y-podP(config-acl)# 5 permit ip host 192.168.150.10 any
N7K-Y-podP(config-acl)# 6 permit ip host 192.168.160.10 any
N7K-Y-podP(config-acl)# 7 permit ip host 192.168.165.55 any
N7K-Y-podP(config-acl)# 8 permit ip host 192.168.179.35 any
Step 14 View the IP access list TermAccess.
N7K-Y-podP(config-acl)# show access-lists TermAccess
Step 15 Use the resequence command to change the sequence numbers and the step increment.
N7K-Y-podP(config)# resequence ip access-list TermAccess 10 20
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the ACL configuration. You have logged into the
Windows host and generated some traffic, and then verified that the traffic that should be
denied has been denied.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 239
Task 3: Configuring Port Security
In this task, you will configure port security on the Cisco Nexus 7000 Switch and verify that the
configuration has been applied as per the design requirements.
Activity Procedure
Complete these steps:
Step 1 Enable the port security feature.
N7K-Y-podP(config)# feature port-security
N7K-Y-podP(config)#
Step 3 Enable port security on Ethernet interfaces that are connected to your pod Nexus 5000
Switch.
Step 7 Remove port security from the interface and configure the static MAC address again.
240 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 8 Enable port security.
------------------------------------------------------------------------------
Ethernet VLAN Type Mode Status Reason Speed Port
Interface Ch #
------------------------------------------------------------------------------
EthX/A 1 eth trunk up none 40G(S) --
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify that port security is configured.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 241
Task 4: Configuring Traffic Storm Control
In this task, you will configure traffic storm control on the Cisco Nexus 7000 Switch and verify
that the configuration has been applied as per the design requirements.
Activity Procedure
Complete these steps:
Step 1 Configure the broadcast traffic storm control limits to 50 percent on interface Ethernet
X/C.
------------------------------------------------------------------------------
Port UcastSupp % McastSupp % BcastSupp % TotalSuppDiscards
------------------------------------------------------------------------------
Eth7/C 100.00 100.00 50.00 0
Step 3 Configure the multicast traffic storm control limits to 30 percent on interface Ethernet
7/C:
N7K-Y-podP(config-if)# storm-control multicast level 30
N7K-Y-podP(config-if)#
------------------------------------------------------------------------------
Port UcastSupp % McastSupp % BcastSupp % TotalSuppDiscards
------------------------------------------------------------------------------
Eth7/C 100.00 30.00 30.00 0
Step 5 Configure the unicast traffic storm control limits to 75 percent on interface Ethernet
7/C.
N7K-Y-podP(config-if)# storm-control unicast level 75
N7K-Y-podP(config-if)#
------------------------------------------------------------------------------
Port UcastSupp % McastSupp % BcastSupp % TotalSuppDiscards
------------------------------------------------------------------------------
Eth7/A 75.00 75.00 75.00 0
Note Only one suppression level is shared by all three suppression modes. As an example, if you set
the broadcast level to 30 and set the multicast level to 40, both levels are enabled and set to 40.
242 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify that storm control is enabled.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 243
Guided Lab 17: Configuring QoS (Optional)
Overview
Complete this lab activity to practice what you learned in the related module.
Upon completing this guided lab, you will be able to:
n Configure type QoS class maps and verify the configuration
n Configure type QoS policy maps and verify the configuration
n Configure type QoS service policies and verify that the configuration has been applied to the
correct traffic stream
Visual Objective
The figure illustrates what you will accomplish in this activity.
Required Resources
In this configuration, a pod consists of four students, two servers, two Cisco Nexus 7000 Series
Switches, two Cisco Nexus 5000 Series Switches and two Cisco Nexus 2000 Series Fabric
Extenders.
244 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Command List (Optional)
The table describes the commands that are used in this activity.
Command Description
class-map [type qos] [match-any | match-all] This command creates or accesses the class map
class-map-name named class-map-name.
This command specifies the default action for
mapping input field values to output field values in a
default {value | copy} table map.
police [cir] {committed-rate [data-rate] | percent Polices cir in bits or as a percentage of the link rate.
cir-link-percent} [bc committed-burst-rate [link- The conform action is taken if the data rate is cir. If
speed]][pir] {peak-rate [data-rate] | percent cir- be and pir are not specified, all other traffic takes the
link-percent} [be peak-burst-rate [link-speed]] violate action. If be or violate are specified, the
[conform {transmit | set-prec-transmit | set- exceed action is taken if the data rate is pir, and the
dscp-transmit | set-cos-transmit | set-qos- violate action is taken otherwise.
transmit | set-discard-class-transmit} [exceed
{drop | set dscp dscp table {cir-markdown-
map}} [violate {drop | set dscp dscp table {pir-
markdown-map}}]]}
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 245
This command displays information about all
show table-map configured table maps or a selected table map.
Activity Procedure
Complete these steps:
Step 1 Connect to your pod Cisco Nexus 7000 VDC.
Step 2 Roll back to the configuration checkpoint BASE on your VDC (use the keyword best-
effort if the rollback fails without).
N7K-Y-podP# rollback running-config checkpoint base
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Step 3 Verify that SSH access is still possible otherwise connect via telnet and re-enable it.
Step 4 Connect to your Nexus 5000 switch by clinking on the icon in the remote lab GUI Roll
back to the configuration checkpoint BASE on your Nexus 5000 series switch.
N5K-P# rollback running-config checkpoint base
Note: Applying config parallelly may fail Rollback verification
Collecting Running-Config
#Generating Rollback Patch
Executing Rollback Patch
Generating Running-config for verification
Generating Patch for verification
Rollback Patch is Empty
Step 5 On your N5K configure and ENABLE the interfaces connecting to the N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/1
N5K-P(config-if)# switchport
N5K-P(config-if)# switchport mode trunk
N5K-P(config-if)# no shutdown
Step 6 On your N5K DISABLE the interfaces connecting to the N7K VDCs.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# interface ethernet 2/2
N5K-P(config-if)# shutdown
Step 7 On your N7K VDC configure and ENABLE the interfaces connecting to YOUR N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/P (P is your Pod #)
246 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 8 On your N7K VDC DISABLE the interfaces connecting to the PEER N5Ks.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/Q (P is your PEER Pod #)
N7K-X-PodP(config-if)# shutdown
Step 9 On your N7K VDC ENABLE the interfaces connecting to the PEER N7K.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP(config)# interface ethernet 7/x (see table above)
N7K-X-PodP(config-if)# switchport
N7K-X-PodP(config-if)# switchport mode trunk
N7K-X-PodP(config-if)# no shutdown
Step 10 On your N7K VDC create VLANs 10-14.
N7K-X-PodP# conf
Enter configuration commands, one per line. End with CNTL/Z.
N7K-X-PodP (config)# vlan 10-14
N7K-X-PodP (config-vlan)# exit
N7K-X-PodP (config)#
Step 11 On your N5K create VLANs 10-14.
N5K-P# conf
Enter configuration commands, one per line. End with CNTL/Z.
N5K-P(config)# vlan 10-14
N5K-P(config-vlan)# exit
N5K-P(config)#
Step 13 On your Cisco Nexus 5000 Switch, configure interface Ethernet 1/3 in VLAN 10:
N5K-P(config)# interface ethernet 1/3
N5K-P(config-if)# switchport access vlan 10
Step 14 Connect to your assigned Windows server. Configure the NIC that is connected to your
pod Cisco Nexus 5000 Switch with IP address 172.16.10.10P/24. Verify that you can
ping 172.16.10. 10Q. (P is your pod number and Q is your peer pod number.)
Step 15 Open a command prompt and navigate to C:\Users\Administrator\Desktop\Labfiles.
Enter iperf.exe -h to see the help text for the Iperf utility.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 247
Step 16 Start an Iperf server on your system in daemon mode. Use the web TCP port 80 as the
port and set the TCP window size to 64 KB.
C:\Documents and Settings\Administrator\Desktop\Labfiles> .\iperf.exe -s -D -p
80 -w 64k
------------------------------------------------------------
Server listening on TCP port 80
TCP window size: 64.0 KByte
------------------------------------------------------------
IPerf Service started.
Step 17 Check with your peer pod to make sure that they have started the Iperf daemon on their
server.
Step 18 Use the Iperf client to connect to the Iperf service on your peer pod Windows server on
VLAN 10. The IP address of your peer pod is 172.16.10.11Q. (Q is your peer pod
number.) Set the TCP window size to 64 KB and use TCP port 80 as the destination
port.
C:\Documents and Settings\Administrator Desktop\Labfiles> .\iperf.exe -c
172.16.10.10Q -w 64k -p 80
------------------------------------------------------------
Client connecting to 172.16.10.10Q, TCP port 80
TCP window size: 64.0 KByte
------------------------------------------------------------
[1868] local 172.16.10.10P port 4131 connected with 172.16.10.10Q port 80
[ ID] Interval Transfer Bandwidth
[1868] 0.0-10.0 sec 1.96 GBytes 1.68 Gbits/sec
248 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Q1) What is the transfer speed that you achieved?
Activity Verification
You have completed this task when you attain these results:
n You have connected to your pod VDC and your pod Cisco Nexus 5000 Switch.
n You can transfer data between your Windows server and your peer pod Windows server using
the Iperf utility.
n You can connect to your peer pod VDC using Telnet or SSH.
Activity Procedure
Complete these steps:
Step 1 Connect to your VDC.
Step 2 Enable global QoS statistics.
N7K-Y-podP(config)# qos statistics
Step 3 Configure an access list named WEB-TRAFFIC that matches TCP port 80 for either the
source or the destination port. Enable statistics gathering for the access list.
N7K-Y-podP(config)# ip access-list WEB-TRAFFIC
N7K-Y-podP(config-acl)# permit tcp any any eq 80
N7K-Y-podP(config-acl)# permit tcp any eq 80 any
N7K-Y-podP(config-acl)# statistics per-entry
Step 4 Configure an access list named MGMT-TRAFFIC that matches TCP ports 22 and 23
for either the source or the destination port. Enable statistics gathering for the access
list.
N7K-Y-podP(config-acl)# ip access-list MGMT-TRAFFIC
N7K-Y-podP(config-acl)# permit tcp any any eq 22
N7K-Y-podP(config-acl)# permit tcp any eq 22 any
N7K-Y-podP(config-acl)# permit tcp any any eq 23
N7K-Y-podP(config-acl)# permit tcp any eq 23 any
N7K-Y-podP(config-acl)# statistics per-entry
Step 5 Configure a type QoS class map named WEB within your VDC pod.
N7K-Y-podP(config)# class-map type qos match-any WEB
Step 6 Configure the class to match traffic that is permitted by access list WEB-TRAFFIC.
N7K-Y-podP(config-cmap-qos)# match access-group name WEB-TRAFFIC
N7K-Y-podP(config-cmap-qos)# exit
Step 7 Configure a type QoS class map named MGMT within your VDC pod.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 249
N7K-Y-podP(config)# class-map type qos match-any MGMT
Step 8 Configure the class to match traffic that is permitted by access list MGT-TRAFFIC.
N7K-Y-podP(config-cmap-qos)# match access-group name MGMT-TRAFFIC
Step 9 Configure a type QoS class map named WEB-CORE, which matches packets with CoS
value 4 within your VDC pod.
N7K-Y-podP(config)# class-map type qos match-any WEB-CORE
N7K-Y-podP(config-cmap-qos)# match cos 4
Step 10 Configure a type QoS class map named MGMT-CORE, which matches packets with
CoS value 2 within your VDC pod.
N7K-Y-podP(config)# class-map type qos match-any MGMT-CORE
N7K-Y-podP(config-cmap-qos)# match cos 2
Step 11 Validate the type QoS class map.
N7K-Y-podP# show class-map type qos
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the class map configuration.
250 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Task 3: Configuring Policy Maps
In this task, you will configure type QoS and queuing policy maps and verify the configuration.
Activity Procedure
Complete these steps:
Step 1 Create a policy map of type QoS named CLASSIFICATION and associate the class
map WEB with it.
N7K-Y-podP(config-cmap-qos)# policy-map type qos CLASSIFICATION
N7K-Y-podP(config-pmap-qos)# class type qos WEB
N7K-Y-podP(config-pmap-c-qos)#
Step 2 Set the CoS value to 4.
N7K-Y-podP (config-pmap-c-qos)# set cos 4
Step 3 Associate the class map MGMT with the policy map and set the CoS value to 2.
N7K-Y-podP(config-pmap-c-qos)# class type qos MGMT
N7K-Y-podP(config-pmap-c-qos)# set cos 2
Step 4 Create a policy map of type QoS named POLICE and associate the class map WEB-
CORE with it.
N7K-Y-podP(config-pmap-c-qos)# policy-map type qos POLICE
N7K-Y-podP(config-pmap-qos)# class type qos WEB-CORE
Step 5 Configure this class map to mark these packets with DSCP af11 and police to 1 Mb/s:
N7K-Y-podP(config-pmap-c-qos)# set dscp af11
N7K-Y-podP(config-pmap-c-qos)# police cir 1 mbps
Step 6 Associate the class map MGMT-CORE and configure this class map to mark these
packets with DSCP af23.
N7K-Y-podP(config-pmap-c-qos)# class type qos MGMT-CORE
N7K-Y-podP(config-pmap-c-qos)# set dscp af23
Step 7 View the policy maps.
N7K-Y-podP(config)# show policy-map type qos
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 251
1p3q4t-out-pq1 Egress priority queue of 1p3q4t type
1p3q4t-out-q-default Egress default queue of 1p3q4t type
1p3q4t-out-q2 Egress queue 2 of 1p3q4t type
1p3q4t-out-q3 Egress queue 3 of 1p3q4t type
1p7q4t-out-pq1 Egress priority queue of 1p7q4t type
1p7q4t-out-q-default Egress default queue of 1p7q4t type
1p7q4t-out-q2 Egress queue 2 of 1p7q4t type
1p7q4t-out-q3 Egress queue 3 of 1p7q4t type
1p7q4t-out-q4 Egress queue 4 of 1p7q4t type
1p7q4t-out-q5 Egress queue 5 of 1p7q4t type
1p7q4t-out-q6 Egress queue 6 of 1p7q4t type
1p7q4t-out-q7 Egress queue 7 of 1p7q4t type
2q4t-8e-in-q-default Ingress default queue of 4q2t8e type
2q4t-8e-in-q1 Ingress queue 1 of 4q2t8e type
2q4t-in-q-default Ingress default queue of 2q4t type
2q4t-in-q1 Ingress queue 1 of 2q4t type
8q2t-in-q-default Ingress default queue of 8q2t type
8q2t-in-q1 Ingress queue 1 of 8q2t type
8q2t-in-q2 Ingress queue 2 of 8q2t type
8q2t-in-q3 Ingress queue 3 of 8q2t type
8q2t-in-q4 Ingress queue 4 of 8q2t type
8q2t-in-q5 Ingress queue 5 of 8q2t type
8q2t-in-q6 Ingress queue 6 of 8q2t type
8q2t-in-q7 Ingress queue 7 of 8q2t type
system-pq1 System default queue
system-q-default System priority queue
system-q2 System queue 2
system-q3 System queue 3
Step 10 Assign a queue limit that is based on the queue size or a percentage of the buffer
memory that is used by the queue.
N7K-Y-podP(config-pmap-c-que)# priority level 1
N7K-Y-podP(config-pmap-c-que)# queue-limit percent 20
N7K-Y-podP(config-pmap-c-que)# exit
Step 11 Assign a class-map type queuing to the policy map named ToN5K.
N7K-Y-podP(config-pmap-que)# class type queuing 1p7q4t-out-q-default
Step 12 Assign a queue limit that is based on the queue size or a percentage of the buffer
memory that is used by the queue.
N7K-Y-podP(config-pmap-c-que)# queue-limit percent 80
252 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
class type queuing 1p7q4t-out-q-default
queue-limit percent 80
bandwidth remaining percent 25
random-detect cos-based
policy-map type queuing default-4q-8e-in-policy
class type queuing 2q4t-8e-in-q1
queue-limit percent 10
bandwidth percent 50
class type queuing 2q4t-8e-in-q-default
queue-limit percent 90
bandwidth percent 50
policy-map type queuing default-4q-8e-out-policy
class type queuing 1p3q1t-8e-out-pq1
priority level 1
class type queuing 1p3q1t-8e-out-q2
bandwidth remaining percent 33
class type queuing 1p3q1t-8e-out-q3
bandwidth remaining percent 33
class type queuing 1p3q1t-8e-out-q-default
bandwidth remaining percent 33
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the policy map configuration.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 253
Task 4: Configuring Service Policies
In this task, you will configure type QoS service policies and verify that the configuration has been
applied to the correct traffic stream.
Activity Procedure
Complete these steps:
Step 1 Assign a service policy type QoS named Data to the Ethernet interface that is connected
to the Cisco Nexus 5000 Switch in the ingress direction.
EthernetX/A
Aggregate forwarded :
0 packets
Match: access-group WEB-TRAFFIC
0 packets
set cos 4
Aggregate forwarded :
0 packets
Match: access-group MGMT-TRAFFIC
0 packets
set cos 2
Step 3 Assign a service policy type QoS named POLICE to the interface that is connected to
your peer VDC in the egress direction (P is your pod number).
254 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 4 Assign a service policy type QoS named POLICE to the interface that is connected to
your peer VDC in the ingress direction.
N7K-Y-podP(config-if)# service-policy type qos input POLICE
Step 5 View the service police type QoS on the port channel interface.
EthernetX/D
Aggregate forwarded :
0 packets
Match: cos 4
0 packets
set dscp af11
police cir 1 mbps bc 200 ms
conformed 0 bytes, 0 bps action: transmit
violated 0 bytes, 0 bps action: drop
Aggregate forwarded :
0 packets
Match: cos 2
0 packets
set dscp af23
Step 6 Do not continue to the next step until your peer pod has finished QoS configuration.
Step 7 Repeat the connection test that was performed in Task 1 in which you used the Iperf
client to connect to the Iperf service on your peer pod Windows server on VLAN 10.
The IP address of your peer pod is 172.16.10.11Q. (Q is your peer pod number.) Set the
TCP window size to 64 KB and use TCP port 80 as the destination port. Compare the
output with output in Task.:
Activity Verification
You have completed this task when you attain these results:
n You have used the show commands to verify the service policy configuration and application.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 255
Guided Lab 18: Using Cisco Nexus 7000 NXAPI
Overview
Complete this lab activity to become familiar with the Cisco NX-API Sandbox.
Activity Objective
Upon completing this guided lab, you will be able to:
Configure the Cisco Nexus 7000 Series Switch to run a web server for the Cisco NXAPI
Use the Cisco NX-API Sandbox to familiarize yourself with Rest APIs
Visual Objective
The figure illustrates what you will accomplish in this activity.
256 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Required Resources
These are the resources and equipment required to complete this activity:
• One Cisco Nexus 7010 Switch
Command List
The table describes the commands used in this activity.
Commands
Command Description
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 257
Task 1: Configure the Cisco Nexus 7000 Series Switch to Accept
HTTP Connections
In this task, you will configure the Cisco Nexus 7000 Series Switch to accept a web browser connection into the
Cisco NX-API.
Activity Procedure
Step 2 Log in to the Cisco Nexus 7010 Switch pod with the username admin and password
1234QWer.
N7K-Y-podP# con
Enter configuration commands, one per line. End with CNTL/Z.
N7K-Y-podP(config)# feature nxapi
258 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
N7K-Y-podP(config)# show nxapi nxapi enabled
Listen on port 80 Listen on port 443 Pod1(config)#
Step 6 Confirm that you have configured the management interface by typing the show run int
mgmt 0 command. This example is of Pod 1.
Step 7 Open a web browser and connect to the management IP address of your pod.
Step 8 Log in with the username and password that you created in Lab 1 and click Log In.
Note If you are unable to connect to NX-API, verify that your mgmt 0 interface is configured
correctly.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 259
Step 9 In the top-right corner, explore the options that are in the Message format field.
260 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Step 11 In the Command type field, choose cli_show. The Textarea field should say "show
version" and the output should be xml. This setting is the default when you log in.
Click the POST button.
You should get an XML response that shows on the right-hand side of the page. Notice
that the response is formatted as you would expect from XML.
Step 12 Change Command type field to cli_show_ascii. This action will verify to you that the
command is the command you want by displaying the text as if you had entered the
command in the CLI.
Step 13 Change the value in the Textarea field to show switchname, and then click the POST
button. You will see that the ASCII output returns <hostname>Pod1</hostname> (or
the switchname that you have set your pod to).
<body>
<hostname> N7K-1-pod1</hostname>
</body>
Step 14 Change the Command type field to cli_conf and change the Textarea to switchname
NX-API_X where X is your pod number. Click the POST Request button and you will
get a returned output of success in the <msg> field.
<code>200</code>
<msg>Success</msg>
Step 15 Switch to interface e7/2 (since that interface is still at its default configuration) to add
Layer 2 information and enable the interface. Keep the Command type field set to
cli_conf. In the Textarea field, type commands to make the interface a switchport and a
trunk, add VLAN 1XX, where XX is your two-digit pod number (so Pod 1 would be
01, and so on), and enable the interface. Type the following:
Note There must be a space to the right and left of the semi-colon character that separates
commands.
Step 16 Once you post the input, you should get the same response message of success.
© 2018 Fast Lane and Cisco Systems, Inc. Fast Lane Lab Guide 3.1.4 261
<body/>
<code>200</code>
<msg>Success</msg>
Step 17 Verify by changing the Command type field to cli_show_ascii, input the following
message, and post your request.
show switchname ; show run int e7/2
<body>N7K-Y-podP
</body>
<code>200</code>
<msg>Success</msg>
</output>
<output>
<body>!Command: show running-config interface Ethernet7/2
!Time: Tue Sep 15 17:17:31 2015
version 7.2(0)D1(1) interface Ethernet7/2
switchport mode trunk
switchport trunk allowed vlan 201 no shutdown
Step 18 You can verify that the two changes you made have taken effect in the CLI. Open a
PuTTY session to your pod switch, and then type the show run int e7/2 command.
You will see that the switch name and interface have changed to reflect your use of the
Cisco NX-API.
262 Cisco Data Center Configuring Nexus 7000 Switches (DCNX7K) 3.1
Answer Key
The correct answers and expected solutions for the activities that are described in this guide
appear here. Please note that these answers and outputs are a guideline and may not completely
match your configurations or device outputs.
Q2) Which version of Cisco NX-OS Software is currently running on the active and
standby processors?
BIOS: version 2.12.0
kickstart: version 7.2(0)D1(1)
system: version 7.2(0)D1(1)
Q5) How many fabric modules are installed in the Cisco Nexus 7010 Switch chassis?
Two fabric modules are installed in the Cisco Nexus 7010 Switch chassis.
Q6) Does this switch offer N + 1 switching redundancy?
This switch offers N+1 switching redundancy only for M1 I/O module.
Q7) How many I/O modules are installed in this chassis?
Two I/O modules are installed in this chassis.
Q8) How many power supplies are installed in this chassis?
One power supplies are installed in this chassis.
Q9) How many system fans are installed in this chassis?
Two system fans are installed in this chassis.
Q10) Is there system fan redundancy in this chassis?
Yes, there is system fan redundancy in this chassis.
Q11) How many fabric fans are installed in this chassis?
Two fabric fans are installed in this chassis.
Q12) Is there fabric fan redundancy in this chassis?
Yes, there is fabric fan redundancy in this chassis.
Q13) How many empty I/O module slots are there in this chassis?
There are six empty I/O module slots in this chassis.
Q14) Which supervisor is active?
Supervisor 5 is active.
Q15) Which power supply redundancy mode is currently specified?
Redundant power supply redundancy mode is specified, but the Cisco Nexus 7000 Switch uses
nonredundant mode because only two power supplies are installed in the chassis.
Q16) Which module or modules draw the least amount of power?
Fabric modules draw 60 W.
Q17) How many sensors are distributed on a single I/O module?
Eleven sensors are distributed on M1 I/O module and eighteen on F1 I/O module.
264 Configuring Cisco Nexus 7000 Switches (DCNX7K) v3.1 © 2018 Fast Lane and Cisco Systems, Inc.
Q2) What is the status of the interface that is connected to your Cisco Nexus 5000?
Up.
© 2016 Fast Lane and Cisco Systems, Inc. Lab Guide 3.1.0 265
Task 5: Implementing and Verifying Q-in-Q Tunnels
Q10) Why is the Cisco Nexus 5000 Switch a Cisco Discovery Protocol neighbor if there is
no direct Layer 2 connectivity between the two Cisco Nexus 5000 Switches?
You have configured a Layer 2 protocol tunnel Cisco Discovery Protocol on the Cisco Nexus
7000 tunnel interface.
© 2016 Fast Lane and Cisco Systems, Inc. Lab Guide 3.1.0 267
Guided Lab 17: Configuring QoS (Optional)
Task 0: Initial Configuration
Q1) What is the transfer speed that you achieved?
268 Configuring Cisco Nexus 7000 Switches (DCNX7K) v3.1 © 2018 Fast Lane and Cisco Systems, Inc.
This page intentionally left blank
© 2016 Fast Lane and Cisco Systems, Inc. Lab Guide 3.1.0 269
270
FastLane(7K/5K/2K(Nexus(Lab((Rev.(5.0)(
FC(JBOD(
N7K(to(N7K(40GE:(
Pod1+2:(7/7W8( Windows(with(CNA(
Pod3+4:(7/9W10( 3( 3( MDS9124(
Pod5+6:(7/11W12( MDS9124(
(
For(4(Students(
N7K(to(N5K(40GE:(
Pod1:( (7/1(on(both(N7K( 1( 2( N7KW1( N7KW2( 1( 2( (
Pod2:( (7/2(on(both(N7K( GE(
Pod3:( (7/3(on(both(N7K((
Pod4:( (7/4(on(both(N7K(
Pod5:( (7/5(on(both(N7K( FC(
1(2(3(4( 4(3(2(1(