Drag to reposition cover

Brocade ICX Series (cheap & powerful 10gbE/40gbE switching)

Notice: Page may contain affiliate links for which we may earn a small commission through services like Amazon Affiliates or Skimlinks.

Mark

Member
Nov 6, 2014
39
15
8
Looks like someone is dumping a bunch of 7150-48ZP on ebay.


Still out of my budget... So so close though.

For those that don't know, the "ZP" models have PoH 802.3bt for up to 90W equipment, per port, as well as 16x 1/2.5/10 RJ45 ports.

I'm sure with the largest PoE budget of all 7150 series, 1480 W w/2x 920W PSUs, and those PSUs being the largest PSUs in the 7150 series, it would be loud. Very loud. Specs say 52 dBA.

My 7250-48P is the loudest thing in my rack (yeah, haven't done the fan swap yet), and it's rated at 45.9 dB. It drove me crazy when playing with it in my office for a few days. Much louder than my stock SC846 chassis that I've IPMI'd the fans down to 0%. Louder than the 3D printers I haven't replaced the loud stepper drivers in.
Thanks for this just picked one up.
 

m4r1k

Member
Nov 4, 2016
75
8
8
35
Hey guys,

I need a bit of help. Since this afternoon my ICX6610 is acting in a weird way. The symptom is packet drop/delay.

See below a sample ping

Code:
$ ping diablo -i 0.1
PING diablo (192.168.178.10): 56 data bytes
64 bytes from 192.168.178.10: icmp_seq=0 ttl=64 time=0.678 ms
64 bytes from 192.168.178.10: icmp_seq=1 ttl=64 time=0.607 ms
64 bytes from 192.168.178.10: icmp_seq=2 ttl=64 time=0.853 ms
64 bytes from 192.168.178.10: icmp_seq=3 ttl=64 time=0.780 ms
64 bytes from 192.168.178.10: icmp_seq=4 ttl=64 time=0.847 ms
64 bytes from 192.168.178.10: icmp_seq=5 ttl=64 time=0.600 ms
64 bytes from 192.168.178.10: icmp_seq=6 ttl=64 time=0.704 ms
64 bytes from 192.168.178.10: icmp_seq=7 ttl=64 time=0.701 ms
64 bytes from 192.168.178.10: icmp_seq=8 ttl=64 time=1.020 ms
64 bytes from 192.168.178.10: icmp_seq=9 ttl=64 time=0.879 ms
64 bytes from 192.168.178.10: icmp_seq=10 ttl=64 time=0.804 ms
64 bytes from 192.168.178.10: icmp_seq=11 ttl=64 time=0.786 ms
64 bytes from 192.168.178.10: icmp_seq=12 ttl=64 time=0.749 ms
64 bytes from 192.168.178.10: icmp_seq=13 ttl=64 time=0.841 ms
64 bytes from 192.168.178.10: icmp_seq=14 ttl=64 time=0.847 ms
64 bytes from 192.168.178.10: icmp_seq=15 ttl=64 time=0.958 ms
Request timeout for icmp_seq 16
Request timeout for icmp_seq 17
Request timeout for icmp_seq 18
Request timeout for icmp_seq 19
Request timeout for icmp_seq 20
Request timeout for icmp_seq 21
Request timeout for icmp_seq 22
Request timeout for icmp_seq 23
Request timeout for icmp_seq 24
Request timeout for icmp_seq 25
Request timeout for icmp_seq 26
Request timeout for icmp_seq 27
Request timeout for icmp_seq 28
Request timeout for icmp_seq 29
Request timeout for icmp_seq 30
Request timeout for icmp_seq 31
64 bytes from 192.168.178.10: icmp_seq=16 ttl=64 time=1672.865 ms
64 bytes from 192.168.178.10: icmp_seq=17 ttl=64 time=1569.951 ms
64 bytes from 192.168.178.10: icmp_seq=18 ttl=64 time=1465.662 ms
64 bytes from 192.168.178.10: icmp_seq=19 ttl=64 time=1362.174 ms
64 bytes from 192.168.178.10: icmp_seq=20 ttl=64 time=1261.169 ms
64 bytes from 192.168.178.10: icmp_seq=21 ttl=64 time=1156.913 ms
64 bytes from 192.168.178.10: icmp_seq=22 ttl=64 time=1052.125 ms
64 bytes from 192.168.178.10: icmp_seq=23 ttl=64 time=949.553 ms
64 bytes from 192.168.178.10: icmp_seq=24 ttl=64 time=848.981 ms
64 bytes from 192.168.178.10: icmp_seq=25 ttl=64 time=748.313 ms
64 bytes from 192.168.178.10: icmp_seq=26 ttl=64 time=646.812 ms
64 bytes from 192.168.178.10: icmp_seq=27 ttl=64 time=546.815 ms
64 bytes from 192.168.178.10: icmp_seq=28 ttl=64 time=443.034 ms
64 bytes from 192.168.178.10: icmp_seq=29 ttl=64 time=342.879 ms
64 bytes from 192.168.178.10: icmp_seq=30 ttl=64 time=241.997 ms
64 bytes from 192.168.178.10: icmp_seq=31 ttl=64 time=141.787 ms
64 bytes from 192.168.178.10: icmp_seq=32 ttl=64 time=39.833 ms
64 bytes from 192.168.178.10: icmp_seq=33 ttl=64 time=1.124 ms
64 bytes from 192.168.178.10: icmp_seq=34 ttl=64 time=0.850 ms
64 bytes from 192.168.178.10: icmp_seq=35 ttl=64 time=0.588 ms
64 bytes from 192.168.178.10: icmp_seq=36 ttl=64 time=0.828 ms
64 bytes from 192.168.178.10: icmp_seq=37 ttl=64 time=0.934 ms
^C
--- diablo ping statistics ---
38 packets transmitted, 38 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 0.588/381.785/1672.865/539.441 ms
My ICX config is here -> m4r1k/nfvi_lab

A reload as well as poweroff (for more than 40 min) did not make any change.

Do you have any idea? Thanks a lot!

Follows a couple of dumps from the ICX.

Code:
#show version
  Copyright (c) 1996-2016 Brocade Communications Systems, Inc. All rights reserved.
    UNIT 1: compiled on Feb 13 2019 at 18:30:50 labeled as FCXR08030t
        (10545807 bytes) from Primary FCXR08030t.bin
        SW: Version 08.0.30tT7f3
  Boot-Monitor Image size = 370695, Version:10.1.00T7f5 (grz10100)
  HW: Stackable ICX6610-24
==========================================================================
UNIT 1: SL 1: ICX6610-24 24-port Management Module
      Serial  #: SNIP
      License: ICX6610_ADV_ROUTER_SOFT_PACKAGE   (LID: SNIP)
      P-ENGINE  0: type E02B, rev 01
==========================================================================
UNIT 1: SL 2: ICX6610-QSFP 10-port 160G Module
==========================================================================
UNIT 1: SL 3: ICX6610-8-port Dual Mode(SFP/SFP+) Module
==========================================================================
  800 MHz Power PC processor 8544E (version 0021/0023) 400 MHz bus
65536 KB flash memory
  512 MB DRAM
STACKID 1  system uptime is 22 minute(s) 26 second(s)
The system started at 07:28:06 GMT+01 Thu Feb 07 2036

The system : started=cold start

#show loop-detection status
loop detection packets interval: 10 (unit 0.1 sec)
index port/vlan  status                         # errdis  sent-pkts recv-pkts
1     vlan1      0 errdis port                  0         993       0
2     vlan120    0 errdis port                  0         993       0
3     vlan130    0 errdis port                  0         993       0
4     vlan178    0 errdis port                  0         388       0
5     vlan2000   0 errdis port                  0         993       0
6     vlan2001   0 errdis port                  0         993       0
7     vlan2002   0 errdis port                  0         993       0
8     vlan2003   0 errdis port                  0         993       0
9     vlan2004   0 errdis port                  0         993       0
10    vlan2005   0 errdis port                  0         993       0
11    vlan2006   0 errdis port                  0         993       0
12    vlan2007   0 errdis port                  0         993       0
13    vlan2008   0 errdis port                  0         993       0
14    vlan2009   0 errdis port                  0         993       0
15    vlan2010   0 errdis port                  0         993       0
16    vlan2011   0 errdis port                  0         993       0
17    vlan2012   0 errdis port                  0         993       0
18    vlan2013   0 errdis port                  0         993       0
19    vlan2014   0 errdis port                  0         993       0
20    vlan2015   0 errdis port                  0         993       0
21    vlan2016   0 errdis port                  0         993       0
22    vlan2017   0 errdis port                  0         993       0
23    vlan2018   0 errdis port                  0         993       0
24    vlan2019   0 errdis port                  0         993       0
25    vlan2020   0 errdis port                  0         993       0
26    vlan2021   0 errdis port                  0         993       0
27    vlan2022   0 errdis port                  0         993       0
28    vlan2023   0 errdis port                  0         993       0
29    vlan2024   0 errdis port                  0         993       0
30    vlan2025   0 errdis port                  0         993       0
31    vlan2026   0 errdis port                  0         993       0
32    vlan2027   0 errdis port                  0         993       0
33    vlan2028   0 errdis port                  0         993       0
34    vlan2029   0 errdis port                  0         993       0
35    vlan2030   0 errdis port                  0         993       0
36    vlan2031   0 errdis port                  0         993       0
37    vlan2032   0 errdis port                  0         992       0
38    vlan2033   0 errdis port                  0         992       0
39    vlan2034   0 errdis port                  0         992       0
40    vlan2035   0 errdis port                  0         992       0
41    vlan2036   0 errdis port                  0         992       0
42    vlan2037   0 errdis port                  0         992       0
43    vlan2038   0 errdis port                  0         993       0
44    vlan2039   0 errdis port                  0         993       0
45    vlan2040   0 errdis port                  0         993       0
46    vlan2041   0 errdis port                  0         993       0
47    vlan2042   0 errdis port                  0         993       0
48    vlan2043   0 errdis port                  0         993       0
49    vlan2044   0 errdis port                  0         993       0
50    vlan2045   0 errdis port                  0         993       0
51    vlan2046   0 errdis port                  0         993       0
52    vlan2047   0 errdis port                  0         993       0
53    vlan2048   0 errdis port                  0         993       0
54    vlan2049   0 errdis port                  0         993       0
55    vlan2050   0 errdis port                  0         993       0
#show statistics

Port             In Packets       Out Packets       In Errors      Out Errors
1/1/1                  9052              6555               0               0
1/1/2                     0                 0               0               0
1/1/3                   231               224               0               0
1/1/4                     0                 0               0               0
1/1/5                     0                 0               0               0
1/1/6                     0                 0               0               0
1/1/7                     0                 0               0               0
1/1/8                     0                 0               0               0
1/1/9                     0                 0               0               0
1/1/10                    0                 0               0               0
1/1/11                    0                 0               0               0
1/1/12                    0                 0               0               0
1/1/13                    0                 0               0               0
1/1/14                    0                 0               0               0
1/1/15                    0                 0               0               0
1/1/16                    0                 0               0               0
1/1/17                    0                 0               0               0
1/1/18                    0                 0               0               0
1/1/19                    0                 0               0               0
1/1/20                    0                 0               0               0
1/1/21                    0                 0               0               0
1/1/22                    0                 0               0               0
1/1/23                    0                 0               0               0
1/1/24                    0                 0               0               0
1/2/1                     0                 0               0               0
1/2/2                     0                 0               0               0
1/2/3                     0                 0               0               0
1/2/4                     0                 0               0               0
1/2/5                     0                 0               0               0
1/2/6                     0                 0               0               0
1/2/7                     0                 0               0               0
1/2/8                     0                 0               0               0
1/2/9                     0                 0               0               0
1/2/10                    0                 0               0               0
1/3/1                     0                 0               0               0
1/3/2                     0                 0               0               0
1/3/3                     0                 0               0               0
1/3/4                     0                 0               0               0
1/3/5                     0                 0               0               0
1/3/6                     0                 0               0               0
1/3/7                     0                 0               0               0
1/3/8                     0                 0               0               0
mgmt1                     0                 0               0               0

TOTAL                  9283              6779               0               0
Hey guys,

Quick update, this morning I did a factory reset and the problem didn't go away (the config was default and IP assigned by DHCP)
I was originally running the 08.0.30t and now upgraded to 08.0.30u but the issue is still here.

It's weird because if I detach all DACs (10 and 40Gbps) the packet drop/delay is gone but there is still noticeable delay.

Can anybody advise? Replacing it, it's also an answer ... just this expense wasn't planned but I'll deal with it

Thanks!
 

ArmedAviator

Member
May 16, 2020
91
56
18
Kansas
@m4r1k

Paste the running-config and the log and are you pinging from a device directly connected to the switch? Is the switch being used as the primary gateway of the device doing the pinging?
 

m4r1k

Member
Nov 4, 2016
75
8
8
35
@m4r1k

Paste the running-config and the log
Running config is here -> m4r1k/nfvi_lab
Tomorrow I'll share the system logs (but there is literally nothing)

and are you pinging from a device directly connected to the switch?
Yes, I was directly connected to the mgmt port and also to various 10 and 40 Gbps ports.
Nothing in between (besides the switch).

Is the switch being used as the primary gateway of the device doing the pinging?
Any network communication (ICMP, TCP, UDP, GRE etc) going through the switch has delay and packet drop.

This applies to the VE interfaces and anything attached to it (1, 10, and 40Gbps).

To be clear, until last week there wasn't any issue with the Switch.

Earlier today I opened it up and it looks all good: no dust and nothing looks burn down.
The main CPU in the middle was extremely hot tho, much hotter than what reported by the sensors (50-ish C)
 

ArmedAviator

Member
May 16, 2020
91
56
18
Kansas
Sorry I missed that you had the running-config linked already.

Th pasted ping shows the packet delays when pinging the switch. In your latest post, you say it happens to any traffic going through the switch (i.e. edge device to edge device). If the latter is true, than there may be an issue. If pings between edge devices are not experiencing this issue, than it is likely normal. Traffic sent to the switch itself is shunted to the management CPU and given low priority. The pings you see are higher than I've seen thus far on my setup, however I'm not sure how loaded up your switch is with traffic.
 

EngineerNate

Member
Jun 3, 2017
68
16
8
35
Digging up this old post from 9 months ago...

@EngineerNate Did that cable work? Also, are we able to assign individual ports on the rear module to systems? Ashamed to say I actually dug through your user history and rear all of your posts since that one above. Didn't see any follow-up. ;)
Sorry I missed this, this last year was bonkers and I didn't get to play with the switch at all after I got it!

Looks like fodeesha answered the question for me though. Shame it doesn't have that flexibility, though with the 4x10g modules being so cheap it's not a huge loss.
 
  • Like
Reactions: eduncan911

DerTom

New Member
Mar 30, 2021
11
0
1
Hi,

I'm looking for a L3 switch and have been told to have a look at Brocade ICX. I'm interested in an ICX7250-48p for my homelab.

As I do need SFP+ 10Gb ports, I would like to have all the eight ports available with 10Gb. I used Mr. Google and saw an item ' 8X10G-LIC-POD' that I have to use. Is this the way to go - seems to be quite expensive... :cool:
Searching the forum for this item the result was '0'...

I'm sorry for this newbie question but I'm new to this and would like to get the correct switch...

Happy Easter!

Tom
 

EngineerNate

Member
Jun 3, 2017
68
16
8
35
Hi,

I'm looking for a L3 switch and have been told to have a look at Brocade ICX. I'm interested in an ICX7250-48p for my homelab.

As I do need SFP+ 10Gb ports, I would like to have all the eight ports available with 10Gb. I used Mr. Google and saw an item ' 8X10G-LIC-POD' that I have to use. Is this the way to go - seems to be quite expensive... :cool:
Searching the forum for this item the result was '0'...

I'm sorry for this newbie question but I'm new to this and would like to get the correct switch...

Happy Easter!

Tom
First post in this thread has all the info you need.
 

DerTom

New Member
Mar 30, 2021
11
0
1
First post in this thread has all the info you need.
Hi EngineerNate,

I read the first post already. This is why I decided to go for the ICX-7250-48p.

Reading:
...
medium beef
24/48 1gbE copper (PoE available)
8x 10gbE SFP+
...
I would expect all eight ports to run at 10Gb.

According to the datasheet the ports are upgradable... OK, there seems to be a way 1Gb->10Gb.

Searching for an offer at Ebay I saw something like 'ICX7250-48P-2X10G' or within the description '... ALSO HAVE 3 THAT HAVE THE CX7250-48P-8X10G-LIC-POD FOR $1300 EACH'. I haven't found an offer 'ICX7250-48P-8x10Gb'.

I just want to be sure to have all 8 ports at 10Gb. If I have to buy some specific device (Ebay description!?) I would like to know before I place an order.

Thank you!

Tom
 

Vesalius

Active Member
Nov 25, 2019
252
190
43
all 8 sfp+ ports are 10g. Follow the guide and all will be available to you without additional purchase.
I just want to be sure to have all 8 ports at 10Gb. If I have to buy some specific device (Ebay description!?) I would like to know before I place an order.

Thank you!

Tom
 
  • Like
Reactions: DerTom

Nikotine

Member
Mar 17, 2021
35
0
6
From the opening post:
Brocade switches will take any make of optics, the brand does not matter. I've been using quite a few of the $7 dollar 10gbase-SR avago/jdsu/etc modules off of ebay with no issues for a few years. However since "official" Brocade SFP+ modules have come down in price to around $8, I would recommend those as they unlock optical monitoring, so you can see link strength, module temp, etc. They will take any manner of DAC's as well. Same goes for the 40gbE QSFP+ ports on the rear of the 6610 - optics or DACs, your choice.
Where do you find these for $7??
Cheapest I can find is around $50...
 

Nikotine

Member
Mar 17, 2021
35
0
6
Search for "57-0000075-01" on eBay. They're Brocade 10G SR modules for around $10. Base price could be lower but you'd need to pay shipping in those cases.

I took @datanet's advice and got some 40G transceivers for $10. https://forums.servethehome.com/index.php?threads/mto-questions.31800/post-298142
Thanks. You have these with cable included, do they work?
 

klui

Well-Known Member
Feb 3, 2019
824
453
63
Thanks. You have these with cable included, do they work?
I don't have these specific passive copper direct attached cables. DACs are different from transceiver + fiber cables. You won't be able to get temperature, power readings, etc. from DACs.
 

brob

New Member
Feb 3, 2021
3
0
1
Hi

I am having troubles getting the computers on my VLAN's to be able to access the internet through my 6450. I can ping google and my firewall from the CLI on the 6450, but am unable to ping from any computer on my network (google or even my firewall).

I have been trying all day to get this to work. looked thru this forum and can not seem to find anything that says why I am unable to get this to work. I have included the ip route 0.0.0.0/0 192.168.1.1. below is the basic topology


ISP---- DSL modem--------- Watchguard firewall(192.168.1.1)-----------(192.168.1.250, 1/1/48)ICX 6450(1/1/4, VLAN5)--------(192.168.5.4)computer


Below is my config. and I also put the show IP route at the end. I have my firewall pluged into 1/1/48 and my computer into 1/1/4 with a IP of 192.168.5.4


from my computer I can ping 192.168.5.1, 192.168.1.250, but am not able to ping 192.168.1.1. but yet the switch can thru its CLI. I dont understand.


Can anyone help me with this?

Thanks








Current configuration:
!
ver 08.0.30uT313
!
stack unit 1
module 1 icx6450-48p-poe-port-management-module
module 2 icx6450-sfp-plus-4port-40g-module
priority 128
stack-port 1/2/1 1/2/3
stack unit 2
module 1 icx6450-48p-poe-port-management-module
module 2 icx6450-sfp-plus-4port-40g-module
priority 128
stack-port 2/2/1 2/2/3
stack enable
!
global-stp
!
!
!
vlan 1 name DEFAULT-VLAN by port
spanning-tree
!
vlan 2 name RMD by port
untagged ethe 1/1/1 ethe 1/1/7 to 1/1/47 ethe 2/1/1 to 2/1/48
spanning-tree 802-1w
spanning-tree 802-1w priority 1
!
vlan 5 name management by port
untagged ethe 1/1/4
router-interface ve 5
spanning-tree 802-1w
spanning-tree 802-1w priority 1
!
vlan 9 by port
untagged ethe 1/1/48
router-interface ve 9
!
vlan 10 name Voice by port
untagged ethe 1/1/2
spanning-tree 802-1w
spanning-tree 802-1w priority 1
!
!
!
!
!
aaa authentication web-server default local
aaa authentication enable default local
aaa authentication login default local
enable aaa console
ip dhcp-client disable
ip dns server-address 192.168.1.110 192.168.1.1
ip route 0.0.0.0/0 192.168.1.1
!
no telnet server
username root password .....
!
!
!
!
ntp
!
!
hitless-failover enable
!
!
!
interface ve 5
ip address 192.168.5.1 255.255.255.0
!
interface ve 9
ip address 192.168.1.250 255.255.255.0
!
!
!
!
!
!
!
!
!
end


1 0.0.0.0/0 192.168.1.1 ve 9 1/1 S 12m3s
2 192.168.1.0/24 DIRECT ve 9 0/0 D 12m5s
3 192.168.5.0/24 DIRECT ve 5 0/0 D 11m55s
 

kapone

Well-Known Member
May 23, 2015
1,095
642
113
Your firewall doesn't have a static route back to 192.168.5.x.

When you ping the firewall from the switch CLI, you're on the same subnet as the firewall, so no specific route needed on the firewall. When you ping it from that .5.x computer....:)

computer (.5.x) --> switch-->firewall-->firewall goes...how the hell do I send a response back to .5.4?? I don't know where it is!
 
  • Like
Reactions: fohdeesha

brob

New Member
Feb 3, 2021
3
0
1
Thank you very much Kapone. That was the ticket!

Been doing a lot of learning on networking recently..
 

ArmedAviator

Member
May 16, 2020
91
56
18
Kansas
There might also be an issue with NAT on your firewall. I know this is an issue with pfSense.OPNSense where you have to manually adjust NAT settings.