How a Failure affects the Distributed Fabric
685
Router
Switch B will continue to do all the routing. As it was routing prior to Switch A’s
failure there will be no change of the router identity, that is, the router interface IP
addresses will not change. The router interface MAC addresses may change but
this will have no visible impact on your network. Any MAC address change is
propagated to your network by the issuing of gratuitous ARP messages.
Switch A Recovery
When Switch A recovers and starts to operate again, all links will reconfigure
themselves as they were before the failure, according to the protocols used. The
routing task will once again be shared between Switches A and B, using the same
IP address.
Loss of the Fabric
Interconnect
When an interconnect fails between two Switches in the Distributed Fabric,
assuming you have STP/RSTP and LACP enabled as recommended in “Important
Considerations and Recommendations” on page 676, your traffic flow should
continue through your network.
Figure 187
XRN Network reaction on Fabric Interconnect failure
In Figure 187, if the interconnect fails, the network will react in the following way:
LACP (IEEE 802.3ad) and Legacy Aggregated Links
The Switch 4400 automatically configured aggregated link (LACP) will reconfigure
itself to create two separate aggregated links.
The Switch 4300 legacy aggregated link will be split between the two Switches in
the Distributed Fabric and will no longer operate and will cause network
disruption.
Legacy aggregated links are not resilient to an interconnect failure. Hence the
3Com recommendation to use IEEE 802.3ad aggregated links (LACP) for maximum
resilience.
Switch 4400 units
XRN Distributed Fabric
802.3ad
Aggregated Link
Resilient Link
Standby Link
Active Link
STP/RSTP enabled
X
Switch 4200
Switch 3300
Legacy
Aggregated Link
Switch 4300
Interconnect Failure
Switch A
Switch B
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...