fbpx
Category: IT & Networking Blog

What is EtherChannel

Ethernet is a LAN technology based on the Institute of Electrical and Electronics Engineers (IEEE) 802.3 standard. Ethernet is a shared medium between the networking devices and provides the specific bandwidth to the end users. Ethernet also evolves as the users and their need of accessing the resources increases.  

Ethernet Generation

The evolution helps end-users’ effective access to resources, both on- and off- the campus network. However, today's mission-critical applications and services demand networks that provide high availability and reliability. This article will focus on the technology that you can use in your network to provide higher bandwidth and reliability between switches.

Switch Port Aggregation with EtherChannel

We need to expand our network, to accommodate the increasing number of end-users. And the selection of the switch port speed also depends on the factors of, how many users, applications type, etc.

Original Configuration

In the above graphic (Figure-1), 4-PCs, PC1 to PC4, want to access the File Server (File_Server-FS1). There can be more end devices too. But, there is only one link between the switches SW1 and SW2. If that link goes down, the communication between the devices will be no more. For the high availability and reliability, we need more than one link between the devices. Right?

Multiple Links

We added three more links between SW1 and SW2. If any link will go down, another will forward the traffic. It might seem logical to simply add more links between two switches to scale the bandwidth incrementally.

What do you think, now the available bandwidth will be four time?
No, because each link acts independently.

In case of redundant links between the switches, Spanning Tree Protocol is responsible for providing the layer 2, loop-free network. For this, STP will place only one link in the forwarding state and rest of the links will be in the blocking state.

In this case, only one link is forwarding the traffic out of three links. It means that our resources are underutilized.

How can we use all these four links, without occurring the bridging loop?

Cisco offers a technology of "EtherChannel", which provides the method of logically aggregating or bundling the parallel links. Two to eight links of either Fast Ethernet (FE), Gigabit Ethernet (GE), or 10-Gigabit Ethernet (IOGE) can be bundled as one logical link of Fast EtherChannel (FEC), Gigabit EtherChannel (GEC), or 10-Gigabit Etherchannel (IOGEC), respectively.

EtherChannel or Port Channel

As the above graphic presents, the four 1Gbps Physical links, bundled into a single 4Gbps EtherChannel Logical link. Now for STP only one link exists and it will be in forwarding state, i.e. all the links in this bundle will be in forwarding state.

Distribution of the traffic across the links, is dependent upon the what Load-balancing hash algorithm will be in use.

EtherChannel also known as:

Working of EtherChannel or Port Channel

EtherChannel can be configured statically or dynamically. Statically configured EtherChannel will not exchange any negotiation information of the Port Channel. And for dynamically configuration, there are two types of EtherChannel negotiation protocols:

  1. Port Aggregation Protocol (PAgP) is a Cisco proprietary solution
  2. Link Aggregation Control Protocol (LACP) is IEEE 802.3 AD a standards based

PAgP Modes

PAgP negotiates EtherChannel formation and maintenance:

PAgP mode

LACP Modes

LACP mode

*************************

7-Steps for EtherChannel or Port Channel Configuration 

Before starting the configuration of EtherChannel, we should consider the following guidelines:

  1. Port-channel interface configuration changes affect the EtherChannel.
  2. The physical interface configuration changes affect the interface only.
  3. EtherChannel cannot be used if SPAN is a destination port.
  4. All interfaces within an EtherChannel must have same configuration:

Let us use the same topology for the configuration of EtherChannel.

Topology


Featured Article New CCNA Cyber Ops


 

Step-1 : Enable RSTP

Decide which interfaces do you want to aggregate in the Port-Channel, in our example we are going to use E3/0 - E3/3. In the below figure you can see STP is blocking three ports on SW2, only port E3/0 is in the forwarding state.

HTP State

However, this step is optional, we should look to configure the RSTP for faster convergence as compare to STP.

Run these commands on both switches:

RSTP Configuration

Step-2 : Create VLAN

We will create the VLAN 100 on both switches and assign the ports to that VLAN as per the topology.

create VLAN

These ports will be trunk ports.

Step-3 : Configure Port Channel

Configure Port or EtherChannel

We can see, SW1 and SW2 successfully created a Port-Channel Po1

Port Channel

Step-4 : Observation of Traffic Distribution

You can change the selection of the Load-balancing method as per the switch model and requirement of the traffic flow in the network. In this step we will observe, the traffic distribution behavior in the Po1.

etherchannel method selection

PC-1 is sending the ICMP packets to File_Server-FS1

13

14

I have used the 'clear counters' command, for clearing the counter. Then I run the ping command on the PC-1 (source) to File_Server-FS1 (destination).

Now we will check, which interface will transfer the traffic between the PC-2 (source) to File_Server-FS1 (destination).

14 1

PC-2 is sending the ICMP packets to File_Server-FS1.

ICMP PING

PC-3 is sending the ICMP packets to File_Server-FS1

PING

In step 4, we can observe that current method of load-balancing is not distributing the traffic among the links. So, we need to select the another method of load-balancing.

Step-5 : Etherchannel Load Balancing

We need to implement the proper method of Load-Balancing which is suitable for our network and can transfer the traffic between the links. Here is the list of possible methods of EtherChannel Load-Balancing.

Load blancing methods

It is locally significant and outbound, i.e. on the SW1, we can implement the different load-balancing method as compare to the SW2.

In our topology, when the traffic is going from the PCs to File_Server-FS1, we have many sources and one destination.

connection test

In this situation, we can pick one of the load-balancing method given below:

On the other hand, when traffic is going from the File_Server-FS1 to PCs, we have one source and many destinations.

connectivity test

In this situation, we can select one of the load-balancing method given below:

We are going to use 'src-ip' EtherChannel Load-Balancing method on SW1 and 'dst-ip' on SW2.

src-ip

Step-6 : Verification of Load Balancing from PCs to Server

PC-1 is sending the ICMP packets to File_Server-FS1

21

PC-2 is sending the ICMP packets to File_Server-FS1

22

PC-3 is sending the ICMP packets to File_Server-FS1

23

PC-4 is sending the ICMP packets to File_Server-FS1

24

 In the step 6, we can see this load-balancing method is distributing the traffic between the links. If we will use more PCs or end devices, the traffic can be distributed among all the links.

Step-7 : Verification of Load Balancing from Server to PCs

File_Server-FS1 is sending the ICMP packets to PC-1

25

File_Server-FS1 is sending the ICMP packets to PC-2

26

File_Server-FS1 is sending the ICMP packets to PC-3

27

File_Server-FS1 is sending the ICMP packets to PC-4

28

Finally, we can say that properly check the flow of the traffic among the links. If the existing load-balancing method is not working, then use the another.

What do you think about this demonstration of EtherChannel configuration?

Kindly let us know your opinion.

Thanks.


This Article Was Written & published by Meena R,  Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India. 

Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...

She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms. 

30,000+ professionals are following her on Facebook and  mesmerized by the quality of content of her posts on Facebook. 

If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:

Click Here to follow her: Cybersecurity PRISM