Optics information for the Brocade ICX7750 stacking
TABLE 10
Model
Front Panel Ports LR4
Optional 40G Module Ports LR4
ICX 7750-26Q
1/2/1, 2, 3,4,5,6
1/3/5 and 1/3/6
ICX 7750-48F
1/2/5 and 1/2/6
1/3/5 and 1/3/6
ICX 7750-48C
1/2/5 and 1/2/6
1/3/5 and 1/3/6
Stack formation method 1: Using Stack Secure setup
Description
The stack secure setup utility is the most convenient of all methods to form a stack. This utility uses a
Brocade proprietary discovery protocol that discovers units that are connected upstream and
downstream of the unit where this command is entered.
Steps
Summarized steps:
• Configure 'stack enable' on the intended active controller unit at configuration level.
• Enter 'stack secure setup' on the intended active controller unit at device level.
Detailed steps:
1. Connect the units in a stack based on the connection guidelines. Select a unit that you want to
become an active controller. Configure 'stack enable' at configuration level as seen in the following
logs.
ICX7750-48F Router# configure terminal
ICX7750-48F Router(config)#
stack enable
Enable stacking. This unit actively participates in stacking
stacking is enable. optical monitoring for stacking ports 1/2/1, 1/2/4 is not
available.
2. Once stack enable configured, this command will configure two default stack ports 1/2/1 and 1/2/4
as seen in the message displayed. And this can be confirmed using 'show run' command. If user
wants to stack using rear ports, default-ports command can be configured for 1/3/1 and 1/3/4
manually by the user.
When module 3 on the rear of ICX 7750 devices is used for stacking, before
performing secure setup, change the default ports on the respective units as
shown in the following example.
Otherwise, the secure-setup utility will not be able to discover the stacking
ports in module 3, and
invalid stack trunk messages will be displayed.
ICX7750-48F Router# configure terminal
ICX7750-48F Router(config)# stack unit 1
ICX7750-48F Router(config-unit-1)#
default-ports 1/3/1 1/3/4
3. Enter 'stack secure setup 'at device level. As shown in the following example, this command
triggers a Brocade proprietary discovery protocol that begins the discovery process in both
upstream and downstream directions. The discovery process produces a list of upstream and
downstream devices that are available to join the stack. This process will assign IDs to the units.
4. During stack formation user will be prompted to enter desired number of units either upstream or
downstream depending on the connections.
NOTE
During the secure-setup process, after one minute of inactivity, authentication for stack members
expires, forcing you to restart the process.
To exit the secure-setup, enter
^C
at any time.
ICX7750-48F Switch#
stack secure
ICX7750-48F Switch# Discovering the stack topology...
Current Discovered Topology - RING
Stack formation method 1: Using Stack Secure setup
46
Brocade ICX 7450, Brocade ICX 7750, and Brocade ICX 7250 Stacking Deployment Guide
53-1003581-03