Lab 019 How to Configure and Verify L2 EtherChannel LACP

Configure and verify Layer 2 EtherChannel using LACP, ensuring load balancing, redundancy, and continuous connectivity with failover testing


CCNA 200-301 Chapter 2 Network Access Lab 019 Configure and Verify L2 EtherChannel LACP

Watch Full Demo on YouTube:

Lab Objective:

EtherChannel is a technique used to bundle multiple physical links into a single logical link to increase bandwidth and provide redundancy.

Link Aggregation Control Protocol (LACP) is a dynamic protocol used to manage EtherChannel configurations.

This lab will guide you through the configuration and verification of Layer 2 EtherChannel using LACP, and include a failover test to ensure continuous connectivity.

The objective of this lab is to:

– Configure Layer 2 EtherChannel using LACP.

– Verify the EtherChannel configuration.

– Ensure proper load balancing and redundancy.

– Perform a failover test to ensure continuous connectivity in case of a link failure

Lab Topology:

CCNA 200-301 Lab Chapter 2 Network Access Lab 019 Configure and Verify Layer 2 EtherChannel LACP topology

Equipment Required:

  • 2 x Cisco switch (e.g. WS-C2960-24TT-L)
  • 4 x PCs or laptops with Ethernet ports (for data traffic)
  • Console Cable
  • Ethernet Cable for connections between devices
  • Computer with Terminal emulation software e.g. PuTTY

IPv4 Address Table:

A. Switch VLAN Table:

Device NameInterface IDInterface ModeAllowed VLANs
Switch1GigabitEthernet1/1/1Trunk10, 20
Switch1GigabitEthernet1/1/2Trunk10, 20
Switch1GigabitEthernet1/1/3Trunk10, 20
Switch1GigabitEthernet1/0/1Access10
Switch1GigabitEthernet1/0/2Access20
    
Switch2GigabitEthernet1/1/1Trunk10, 20
Switch2GigabitEthernet1/1/2Trunk10, 20
Switch2GigabitEthernet1/1/3Trunk10, 20
Switch2GigabitEthernet1/0/1Access10
Switch2GigabitEthernet1/0/2Access20

B. SVI Table:

Device NameInterface IDIP AddressSubnet-Mask
Switch1VLAN 10192.168.10.10255.255.255.0
Switch1VLAN 20192.168.20.10255.255.255.0
Switch2VLAN 20192.168.20.11255.255.255.0
Switch2VLAN 20192.168.20.11255.255.255.0

C. End Hosts IP Address Table:

Device NameInterface IDIPv4 AddressSubnet-MaskVLANDefault Gateway
PC1Fa0192.168.10.100255.255.255.010192.168.10.10
PC2Fa0192.168.20.100255.255.255.020192.168.20.10
PC3Fa0192.168.10.101255.255.255.010192.168.10.10
PC4Fa0192.168.20.101255.255.255.020192.168.20.10

List of Command Summary:

CommandCommand Description
enableenters privileged EXEC mode
configure terminalenters global configuration mode from privileged EXEC mode
hostname [hostname]assign a device name to router
switchport mode trunkis used to configure an interface on a Cisco switch to operate in trunk mode. In trunk mode, the interface is capable of carrying traffic for multiple VLANs simultaneously. This command allows the interface to send and receive traffic with VLAN tags, enabling it to interconnect switches or routers and carry traffic for multiple VLANs across a single link
interface port-channel [Port-Channel ID]used to create or enter the configuration mode for a specific port-channel interface on a Cisco switch or router. A port-channel interface represents an EtherChannel, which is a logical aggregation of multiple physical interfaces into a single logical link to increase bandwidth and provide redundancy
port-channel load-balance src-dst-ipused to configure the load balancing method for an EtherChannel on a Cisco switch. This particular command sets the load balancing method to use both the source and destination IP addresses for distributing traffic across the physical links in the EtherChannel
no switchportused on Cisco switches to configure a Layer 2 interface as a Layer 3 interface. By default, interfaces on a Cisco switch operate as Layer 2 switchports, meaning they are used to forward Ethernet frames based on MAC addresses. Applying the no switchport command converts the interface to a routed port, allowing it to forward packets based on IP addresses and making it capable of supporting IP routing
ip routingused on Cisco devices to enable IP routing. This command allows the switch to forward packets based on IP addresses, effectively turning it into a router. When IP routing is enabled, the switch can make forwarding decisions based on the destination IP address of packets, enabling communication between different subnets
ip route 0.0.0.0 0.0.0.0 <next-hop-ip>used to configure a default route (or gateway of last resort) on a Cisco router or Layer 3 switch. A default route specifies that any IP packet with a destination address not found in the routing table should be forwarded to a specific next-hop IP address
show ip routeused on Cisco routers and Layer 3 switches to display the IP routing table. The IP routing table contains information about known networks and the next-hop IP addresses or exit interfaces used to reach those networks. This command is fundamental for network troubleshooting, as it provides insights into how IP packets are forwarded based on the device’s routing decisions
channel-group 10 mode activeconfigures the selected interface(s) to join EtherChannel group 10 using LACP in active mode. In this mode, the switch actively initiates the formation of an EtherChannel by sending LACP packets to the remote switch. This configuration helps in aggregating multiple physical links into a single logical link, which increases bandwidth and provides redundancy
show interface port-channel [Port-Channel ID] statusused on Cisco devices to display the operational status and basic configuration details of a specific port-channel interface. Port-channel interfaces, also known as EtherChannels or aggregated links, bundle multiple physical interfaces together to increase bandwidth and provide redundancy. This command provides essential information about the current status of the port-channel interface
channel-group 10 mode passiveconfigures the selected interface(s) to join EtherChannel group 10 using LACP in passive mode. In this mode, the interface will passively wait for the remote switch to initiate the EtherChannel formation by sending LACP packets. This is useful in scenarios where you want the remote switch to control the EtherChannel formation process
show etherchannel summaryused to display a concise summary of the EtherChannel configurations on a switch. This command provides an overview of the status and configuration of all EtherChannel groups on the device
show etherchannel port-channelused on Cisco devices to display detailed information about the EtherChannel (port-channel) interfaces configured on the switch or router. EtherChannel is a technology that allows bundling multiple physical interfaces into a single logical interface to increase bandwidth and provide redundancy
show etherchannelused to display a summary of all configured EtherChannels (port-channels) and their current operational status. EtherChannel is a technology that allows multiple physical links to be bundled together into a single logical link, providing increased bandwidth and redundancy
port-channel load-balance [load balance method]used to specify the method by which traffic is distributed (load-balanced) across the links in an EtherChannel or port-channel. Load balancing helps in optimizing the usage of the aggregated links by distributing traffic based on various criteria. The actual options available for the load balancing method can vary depending on the specific model and IOS version of the Cisco switch
show EtherChannel load-balanceDisplays the current load-balancing method configured for EtherChannel on the switch. Load balancing determines how traffic is distributed across the links that make up an EtherChannel. This command is useful for understanding how the switch is handling traffic distribution, which is crucial for optimizing network performance and troubleshooting issues related to traffic imbalance
show interfaces [interface-ID] switchportis used to display detailed information about the switchport configuration of a specific interface on a Cisco switch. It provides information such as the administrative and operational mode of the switchport, the VLAN membership of the switchport, trunking status, allowed VLANs, native VLAN, and other relevant details related to the switchport configuration
vlan [vlan-id]used to create a new VLAN with the specified VLAN ID. This command allows network administrators to segment the network into multiple virtual LANs (VLANs) for better traffic management and security. By assigning devices to different VLANs based on their network requirements, administrators can control broadcast domains, enforce security policies, and optimize network performance
switchport mode accessused on Cisco switches to configure an interface as an access port. Access ports are used to connect end devices, such as computers or printers, to the switch. When configured as an access port, the switch treats all incoming frames on that interface as belonging to the VLAN assigned to the port. This command disables dynamic trunking protocol (DTP) negotiation on the interface, ensuring that it operates only as an access port and does not participate in VLAN trunking
switchport access vlan [VLAN-ID]used on Cisco switches to assign a specific VLAN to an access port. This command is typically used in conjunction with the “switchport mode access” command to configure an interface as an access port and specify the VLAN to which it belongs. By assigning a VLAN to an access port, the switch ensures that all incoming traffic on that port is tagged with the specified VLAN ID. This allows the switch to segregate traffic from different VLANs and control broadcast and multicast traffic within each VLAN
switchport mode dynamic autoallows the interface to dynamically negotiate trunking with the neighboring device, becoming a trunk port if the other end initiates trunk negotiation
switchport mode dynamic desirableconfigures the interface to actively negotiate trunking with the neighboring device, becoming a trunk port if the other end supports trunking
switchport trunk encapsulation dot1qused to configure the encapsulation method for a trunk port on a Cisco switch. Specifically, it specifies that the switch should use the IEEE 802.1Q encapsulation protocol for tagging VLAN information on frames traversing the trunk port. This command is typically applied to a port configured as a trunk port using the “switchport mode trunk” command. By default, Cisco switches use the 802.1Q encapsulation method for trunk ports, so this command is often unnecessary unless there is a specific requirement to explicitly set the encapsulation method
show vlan briefused on Cisco switches to display a summary of VLAN information. When you enter this command in the CLI interface of a Cisco switch, it provides a concise overview of the VLAN configuration on the switch. This includes details such as the VLAN ID, name, and interface membership status. The output of this command is often used to quickly verify the VLAN configuration and interface assignments on the switch
ipconfig /allused in Windows operating systems to display detailed information about all network interfaces and their configurations
no shutdownenables an interface
show running-configsave the running configuration to the startup-configuration file
show running-config | section interface GigabitEthernet0/*used to display the configuration details of a specific GigabitEthernet interface (interface GigabitEthernet0/) within the running configuration of a Cisco device. This command allows you to view the configuration settings related to the specified interface only, filtering out other configuration sections. It provides a focused view of the configuration parameters associated with the specified interface, including its IP address, VLAN membership, trunking settings, and any other relevant configuration details. The asterisk (*) is a wildcard character that matches any character or sequence of characters. In this context, it is used to match any subinterface under GigabitEthernet0
show running-config | section interface FastEthernet0/1$The “show running-config | section interface FastEthernet0/1$” command is similar to the previous one, but it focuses specifically on the FastEthernet0/1 interface. The “$” symbol at the end of the interface name indicates that the command will match only the interface that ends with “FastEthernet0/1”. This command is helpful when you want to view the configuration details of a specific FastEthernet interface without displaying configurations for other interfaces
copy running-config startup-configused to save the currently running configuration (stored in the RAM) to the startup configuration (stored in the NVRAM)
endexit configuration mode
exitexits one level in the menu structure command

Lab Task:

  1. VLAN and SVI Configurations:
    1. On Switch1 and Switch2:
      1. Create VLAN 10 and 20
      2. Name each VLAN with the appropriate department
      3. Configure SVI as per the SVI table above
      4. Verify the configuration
  2. Trunk Configuration:
    1. On all Switches do the following:
      1. Configure the following on GigabitEthernet1/1/1-3:
        1. Set the interface description to include which device is connected to
        2. Configure both interfaces to use static trunking
        3. Verify the configuration
  3. Access port configuration:
    1. On all switches:
      1. Assign gigabitEthernet1/0/1 interface with the appropriate VLAN Access, include an interface description as per department and force each port to operate in access mode
      2. Verify the step above with the appropriate commands
  4. End host configuration:
    1. Configure the appropriate IP address on each PC from each department
    2. Verify that each PC has the appropriate IP address
  5. Review the initial configuration:
    1. On Switch1 and Switch2 execute the appropriate command to display the spanning tree information, can you confirm which ports are blocked?
  6. Configure Layer 2 EtherChannel by Using LACP on Ports gigabitEthernet1/1/1-3:
    1. On Switch1 and Switch2 configure gigabitEthernet1/1/1-2 using Active Mode to be a member of port-channel 10
    2. On Switch1 and Switch2 configure gigabitEthernet1/1/3 using Passive Mode
    3. On Switch1 and Switch2 issue the appropriate command to verify your configuration. What is the current state for each interface and why?
    4. On Switch1 and Switch2 issue the appropriate command to check the EtherChannel summary information.
    5. On Switch1 configure gigabitEthernet1/1/3 using Active Mode
    6. Perform some in-flight checks
    7. Issue the appropriate command to display the interface information about port-channel 10. Examine the output and check the state of the port-channel. What bandwidth is used by this interface?
    8. On Switch1 and Switch2 execute the appropriate command to display the spanning tree information, can you confirm which ports are blocked?
  7. Connectivity test:
    1. Ping from PC1 to PC3, is the ping successful?
    2. Ping from PC1 to PC2, is the ping successful?
    3. Ping from PC4 to PC2, is the ping successful?
    4. Ping from PC4 to PC3, is the ping successful?
  8. Mimic a link failure to check connectivity between each department:
    1. Initiate a continuous ping from PC1 to PC3
    2. On Switch1 shutdown this interface gigabitEthernet1/1/1 and observe the ping output? Do you still have connectivity? Why?
    3. Rollback the interface change on gigabitEthernet1/1/1 to enable it once more
  9. EtherChannel Load balancing configuration:
    1. Display the current EtherChannel load balancing, what method does it use by default?
    2. Change the load-balance to source and destination MAC address
    3. Perform in-flight check
  10. If the ping is successful then go ahead and save the configuration. Else, use the troubleshoot steps below:
    1. Check VLAN configuration on each Switch
    2. Verify each port assignments to the VLAN in question
    3. Ensure Trunk links are properly configured
    4. Verify IP addressing and routing if applicable
    5. Verify Physical Connectivity
    6. Check Interface Configuration
    7. Verify EtherChannel Configuration
    8. Check Spanning Tree Protocol (STP) Status
    9. Examine EtherChannel Status
    10. Perform Basic Connectivity Tests
    11. Review Log Messages

Lab Solution:

1- VLAN and SVI Configurations:
a. On Switch1 and Switch2:
i. Create VLAN 10 and 20
ii. Name each VLAN with the appropriate department
iii. Configure SVI as per the SVI table above
iv. Verify the configuration

On Switch1:

Switch1#configure terminal
Switch1(config)#vlan 10
Switch1(config-vlan)#name “IT Department”
Switch1(config-vlan)#vlan 20
Switch1(config-vlan)#name “HR Department”
Switch1(config-vlan)#
Switch1(config-vlan)#int vlan 10
Switch1(config-if)#ip address 192.168.10.10 255.255.255.0
Switch1(config-if)#int vlan 20
Switch1(config-if)#ip address 192.168.20.10 255.255.255.0
Switch1(config-if)#

In-flight checks:

Issue the following commands:
a. show vlan brief
b. show ip interface brief | include lan
c. show running-config | section Vlan10
d. show interfaces vlan 10

On Switch2:

Switch2#configure terminal
Switch2(config)#vlan 10
Switch2(config-vlan)#name “IT Department”
Switch2(config-vlan)#vlan 20
Switch2(config-vlan)#name “HR Department”
Switch2(config-vlan)#int vlan 20
Switch2(config-if)#
%LINK-5-CHANGED: Interface Vlan20, changed state to up

Switch2(config-if)#ip address 192.168.20.11 255.255.255.0
Switch1(config-if)#int vlan 10
Switch1(config-if)#ip address 192.168.10.11 255.255.255.0
Switch1(config-if)#
Switch2#

In-flight checks:

Issue the following commands:
a. show vlan brief
b. show ip interface brief | include lan
c. show running-config | section Vlan20
d. show interfaces vlan 20

2- Trunk Configuration:
a. On all Switches do the following:
i. Configure the following on GigabitEthernet1/1/1-3:

  1. Set the interface description to include which device is connected to
  2. Configure both interfaces to use static trunking
  3. Verify the configuration

On Switch1:

Switch1#configure terminal
Switch1(config)#interface range gigabitEthernet 1/1/1-3
Switch1(config-if-range)#description “Link To Switch2”
Switch1(config-if-range)#switchport mode trunk
Switch1(config-if-range)#

On Switch2:

Switch2#configure terminal
Switch2(config)#interface range gigabitEthernet 1/1/1-3
Switch2(config-if-range)#description “Link To Switch1”
Switch2(config-if-range)#switchport mode trunk
Switch2(config-if-range)#

In-flight check:

Issue “show interfaces trunk”, “show interfaces gigabitEthernet 1/1/1 switchport”

3- Access port configuration:
a. On all switches:
i. Assign gigabitEthernet1/0/1-2 interface with the appropriate VLAN Access, include an interface description as per department and force each port to operate in access mode
ii. Verify the step above with the appropriate commands

On Switch1:

Switch1#configure ter
Switch1#configure terminal
Switch1(config)#interface gigabitEthernet 1/0/1
Switch1(config-if)#description “Link to PC1”
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchport access vlan 10
Switch1(config-if)#interface gigabitEthernet 1/0/2
Switch1(config-if)#description “Link to PC2”
Switch1(config-if)#switchport mode access
Switch1(config-if)#switchport access vlan 20

On Switch2:

Switch2#configure ter
Switch2#configure terminal
Switch2(config)#interface gigabitEthernet 1/0/1
Switch2(config-if)#description “Link to PC3”
Switch2(config-if)#switchport mode access
Switch2(config-if)#switchport access vlan 10
Switch2(config-if)#interface gigabitEthernet 1/0/2
Switch2(config-if)#description “Link to PC4”
Switch2(config-if)#switchport mode access
Switch2(config-if)#switchport access vlan 20

In-flight checks:

You can issue “show vlan brief”, “show running-config | section 1/0/1$”, “show running-config | section 1/0/2$”, “show interfaces gigabitEthernet 1/0/1 switchport”

4- End host configuration:
a. Configure the appropriate IP address on each PC from each department
b. Verify that each PC has the appropriate IP address

Go to Desktop -> IP Configuration -> IP Configuration -> Static

5- Review the initial configuration:
a. On Switch1 and Switch2 execute the appropriate command to display the spanning tree information, can you confirm which ports are blocked?

Issue this command “show spanning-tree vlan 10” for VLAN10 and “spanning-tree vlan 10” for VLAN10

On Switch1:

Having looked at the output above, we can see that Switch1 is the root bridge which means all interfaces are that are active in the Forwarding state. Let’s issue the same commands on Switch2:

You can see from the output above that gig 1/1/2 and gig 1/1/3 are in the blocking state.

6- Configure Layer 2 EtherChannel by Using LACP on Ports gigabitEthernet1/1/1-3:
a. On Switch1 and Switch2 configure gigabitEthernet1/1/1-2 using Active Mode to be a member of port-channel 10

On Switch1:

Switch1(config)#interface ran gigabitEthernet 1/1/1-2
Switch1(config-if-range)#channel-group 10 mode active

On Switch2:

Switch2(config)#interface ran gigabitEthernet 1/1/1-2
Switch2(config-if-range)#channel-group 10 mode active

b. On Switch1 and Switch2 configure gigabitEthernet1/1/3 using Passive Mode

On Switch1:

Switch1(config)#interface ran gigabitEthernet 1/1/3
Switch1(config-if-range)#channel-group 10 mode passive

On Switch2:

Switch2(config)#interface ran gigabitEthernet 1/1/3
Switch2(config-if-range)#channel-group 10 mode passive

c. On Switch1 and Switch2 issue the appropriate command to verify your configuration. What is the current state for each interface and why?

We can issue the following commands:
i. show etherchannel
ii. show running-config | sec 1/1/1$
iii. show running-config | sec 1/1/3$

d. On Switch1 and Switch2 issue the appropriate command to check the EtherChannel summary information.

Issue this command “show etherchannel summary” on both Switches

If we were to examine the output from this command “show etherchannel summary” we can find the following:

Flags:
D: Port is down.
P: Port is bundled in the port-channel.
I: Port is stand-alone.
s: Port is suspended.
H: Port is in Hot-standby mode (LACP only).
R: Layer 3 port-channel.
S: Layer 2 port-channel.
U: Port is in use.
f: Failed to allocate aggregator.
M: Port is not in use, minimum links not met.
u: Port is unsuitable for bundling.
w: Port is waiting to be aggregated.
d: Default port.

Number of channel-groups in use: Indicates the number of EtherChannel groups currently configured and in use on the switch.

Number of aggregators: Shows the number of aggregators configured on the switch. Aggregators manage the grouping of ports into EtherChannels.

Group: The EtherChannel group number.

Port-channel: The Port-channel interface identifier (e.g., Po10).
The status flags for the Port-channel are also shown:
S: Layer 2.
U: In use.

Protocol: The protocol used for the EtherChannel:

LACP: Link Aggregation Control Protocol.

Ports: Lists the member ports of the EtherChannel, with their individual status flags:
Gi1/1/1(P): GigabitEthernet 1/1/1 is bundled in the port-channel.
Gi1/1/2(P): GigabitEthernet 1/1/2 is bundled in the port-channel.
Interpretation of the Example
Gi1/1/3(I): GigabitEthernet 1/1/3 is in Stand-alone mode.

e. On Switch1 configure gigabitEthernet1/1/3 using Active Mode

On Switch1:

Switch1#configure terminal
Switch1(config)#interface gigabitEthernet 1/1/3
Switch1(config-if)#channel-group 10 mode active
Switch1(config-if)#

In-flight checks:

f. Perform some in-flight checks

Issue this command for configuration verification “sh running-config | section 1/1/3$”

g. Issue the appropriate command to display the interface information about port-channel 10. Examine the output and check the state of the port-channel. What bandwidth is used by this interface?

Issue this command “show etherchannel summary”

We can see from the output above is that port-channel 10 is operating in layer 2 and in use.

To find out the current bandwidth for port-channel 10 interface we will need to execute this command “show interfaces port-channel 10”

h. On Switch1 and Switch2 execute the appropriate command to display the spanning tree information, can you confirm which ports are blocked?

We can see that there are no more ports that are blocked from both switched due to a loop prevention mechanism which is the Spanning Tree Protocol, as seen previously. We have managed to increase the bandwidth across different networks and utilizing all links that interconnects both switches.

When we use LACP between both Switches we are combining all three interfaces into a single virtual port, this helps us utilize the bandwidth, the speed of all three ports simultaneously to transmit and receive data across both Switches.

7- Connectivity test:
a. Ping from PC1 to PC3, is the ping successful?
b. Ping from PC1 to PC2, is the ping successful?
c. Ping from PC4 to PC2, is the ping successful?
d. Ping from PC4 to PC3, is the ping successful?

Yes, we issue the relevant command to for each step mentioned above and we have successful pings, as you can see below:

8- Mimic a link failure to check connectivity between each department:
a. Initiate a continuous ping from PC1 to PC3
b. On Switch1 shutdown this interface gigabitEthernet1/1/1 and observe the ping output? Do you still have connectivity? Why?

Yes, we do have connectivity without a single drop from Switch1. This is because we still have a couple of links in the logical interface port-channel 10 that are up and running. Additionally, the port-channel itself is in the up/up state

c. Rollback the interface changes on gigabitEthernet1/1/1 to enable it once more

On Switch1: just issue the “no shut” command under gig 1/1/1 interface

9- EtherChannel Load balancing configuration on both Switches:
a. Display the current EtherChannel load balancing, what method does it use by default?

You can issue this command “show etherchannel load-balance” on the Switch

We can see from the output above that the current load balance method for EtherChannel is the Source MAC to balance traffic across the EtherChannel links. The default load-balancing method is set to Source MAC address.

b. Change the load-balance to source and destination MAC address

On Switch1:
Switch1#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch1(config)#
Switch1(config)#port-channel load-balance src-dst-mac
Switch1(config)#

On Switch2:
Switch2#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch2(config)#
Switch2(config)#port-channel load-balance src-dst-mac
Switch2(config)#

c. Perform in-flight check

Issue the same show command as above in step 9.a:

You can see from the output above that the load balancing method has changed from “src-mac” to “src-dst-mac”

10- If the ping is successful then go ahead and save the configuration. Else, use the troubleshoot steps below:
a. Check VLAN configuration on each Switch
b. Verify each port assignments to the VLAN in question
c. Ensure Trunk links are properly configured
d. Verify IP addressing and routing if applicable
e. Verify Physical Connectivity
f. Check Interface Configuration
g. Verify EtherChannel Configuration
h. Check Spanning Tree Protocol (STP) Status
i. Examine EtherChannel Status
j. Perform Basic Connectivity Tests
k. Review Log Messages

Troubleshooting Steps:

Troubleshooting issues with EtherChannel and LACP configurations can involve several steps to diagnose and resolve the problem.
Here’s a structured approach to troubleshooting any issues that might arise from the EtherChannel LACP lab:

  1. Verify Physical Connectivity: Check Cable Connections: Ensure that all cables are properly connected and seated in the correct ports.
    Inspect Link Lights: Verify that the link lights on the switch ports are illuminated, indicating physical connectivity.
  2. Check Interface Configuration: Consistency Across Switches. Ensure that interfaces on both switches are configured consistently.
    On both switches, check the interface configuration:
    Switch# show running-config interface [interface-id]
    For example:
    Switch# show running-config interface GigabitEthernet0/1
    Switch# show running-config interface GigabitEthernet0/2
    Speed and Duplex: Verify that the speed and duplex settings match on both ends of each link.
    Switch# show interfaces [interface-id] status
  3. Verify EtherChannel Configuration:
    Check EtherChannel Group: Ensure that interfaces are correctly assigned to the EtherChannel group.
    Switch# show running-config interface Port-channel1
    Switch# show running-config interface range GigabitEthernet0/1 – 2
    LACP Mode: Verify that LACP mode is set to “active” on both ends.
    Switch# show etherchannel summary
  4. Check Spanning Tree Protocol (STP) Status:
    Port Roles and States: Verify that the STP status of the involved ports is as expected.
    Switch# show spanning-tree
    Blocked Ports: Ensure that no ports that should be part of the EtherChannel are blocked by STP.
  5. Examine EtherChannel Status:
    Detailed EtherChannel Information: Review detailed EtherChannel status and member ports.
    Switch# show etherchannel detail
    Switch# show interfaces port-channel 1
    LACP Status: Check the status of LACP negotiations.
    Switch# show lacp neighbor
  6. Perform Basic Connectivity Tests:
    Ping Tests: Verify basic connectivity between the switches.
    Switch# ping [Switch2_IP_Address]
    Failover Tests: Disconnect one of the physical links and check for continuous connectivity.
    Switch# ping [Switch2_IP_Address]
    Verify that the remaining link takes over without loss of connectivity.
  7. Review Logs and Error Messages:
    System Logs: Check system logs for any error messages or warnings related to EtherChannel.
    Switch# show logging
    Interface Errors: Check for errors on the physical interfaces.
    Switch# show interfaces [interface-id] counters
  8. Verify VLAN and Trunk Configuration:
    VLAN Membership: Ensure that the VLANs are correctly configured and allowed on the trunk ports.
    Switch# show vlan brief
    Trunk Status: Verify the trunk status of the Port-channel interface.
    Switch# show interfaces trunk
  9. Configuration Consistency Check:
    Ensure Consistency: Verify that the configuration on both ends of the EtherChannel is consistent and correct.
    Switch# show running-config | include interface|channel-group|switchport
  10. Consult Documentation and Support:
    Cisco Documentation: Review Cisco’s documentation for any specific guidelines or known issues related to EtherChannel and LACP.
    Technical Support: If issues persist, contact Cisco technical support for further assistance.

By following these structured troubleshooting steps, you can systematically diagnose and resolve issues related to EtherChannel and LACP configurations.

This approach helps ensure that the network is operating efficiently and that redundancy and load balancing are functioning as expected.

Note:

Layer 2 Link Aggregation Control Protocol (LACP) is a protocol defined by the IEEE 802.3ad standard (now part of IEEE 802.1AX) that provides a method to control the bundling of several physical Ethernet links to form a single logical link. This technique is known as link aggregation or EtherChannel. Here’s a detailed overview:

Key Features of LACP:

  1. Dynamic Link Aggregation: LACP can dynamically create, manage, and configure link aggregation groups (LAGs), ensuring that all the links in a group are active and correctly configured.
  2. Redundancy and Load Balancing: By aggregating multiple physical links, LACP provides redundancy and load balancing. If one link fails, traffic is redistributed among the remaining links, ensuring continuous network availability.
  3. Port Aggregation: Multiple physical ports are combined into a single logical link, which simplifies network topology and management.
  4. Automatic Configuration: LACP automatically detects and configures links to be part of an LAG, which reduces manual configuration errors.
  5. Failover: If a link within the aggregation group fails, LACP automatically adjusts the configuration to remove the failed link and redistribute the load among the remaining links.

How LACP Works:

  1. Link Detection: LACP detects and establishes which links can be aggregated by exchanging LACP Data Units (LACPDUs) between the switches.
  2. Negotiation: During the negotiation process, switches agree on which ports can be aggregated based on their configurations and operational states.
  3. Aggregation: Once the links are identified and agreed upon, LACP bundles them into a single logical link, known as a port channel or LAG.
  4. Monitoring: LACP continuously monitors the state of the links and adjusts the configuration dynamically if there are any changes (e.g., link failures).

LACP Modes:

  1. Active Mode: The port actively sends LACP packets to establish a link aggregation connection.
  2. Passive Mode: The port waits to receive LACP packets before establishing a link aggregation connection. It responds to LACP packets but does not initiate them.

Benefits of Using LACP:

  1. Improved Bandwidth: Aggregates the capacity of multiple links to provide a higher overall bandwidth.
  2. Enhanced Reliability: Provides redundancy; if one link fails, the traffic is automatically redistributed.
  3. Simplified Management: Multiple links appear as a single logical link, simplifying network topology and management.
  4. Flexibility: Allows dynamic adjustments and scalability, adding or removing links without disrupting the network.

LACP is a robust protocol for aggregating multiple Ethernet links into a single logical connection, enhancing network performance, reliability, and manageability. It is widely used in enterprise networks to ensure high availability and efficient use of network resources.

Tips:

In order for Layer 2 EtherChannel to work at least one of the switches must be set as in Active Mode if however, both Switches set in Passive Mode, EtherChannel will not form, please check the table below for visual illustration:

Conclusion:

In this lab, we successfully configured and verified Layer 2 EtherChannel using LACP between two Cisco switches. Additionally, we performed a failover test by disconnecting one link to ensure continuous connectivity through the remaining link. This demonstrated the redundancy and fault tolerance provided by EtherChannel, ensuring network reliability even in the event of a link failure.

Packet Tracer Lab (Pre/Post configuration):

Download the file below and open the word document to access the Packet Tracer labs.


Discover more from IEE

Subscribe to get the latest posts sent to your email.


Discover more from IEE

Subscribe now to keep reading and get access to the full archive.

Continue reading