<?xml version="1.0" encoding="utf-8"?>
<!-- generator="" -->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cisco Switches</title>
		<description><![CDATA[Leading Network Security & Cyber Security site. Cisco Routing/Switching, VPN, Microsoft, SASE, SSE, F5, PaloAlto Firewalls, Protocol Analysis, Tips & more.]]></description>
		<link>https://www.firewall.cx/cisco/cisco-switches.html</link>
		<lastBuildDate>Sat, 11 Apr 2026 12:41:59 +1000</lastBuildDate>
		<generator></generator>
		<atom:link rel="self" type="application/rss+xml" href="https://www.firewall.cx/cisco/cisco-switches.feed?type=rss"/>
		<language>en-gb</language>
		<item>
			<title>DHCP Option 82 Message Format, Analysis. DHCP Snooping Option 82 Injection &amp; Removal Method, Trusted – Untrusted Switch Ports</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/dhcp-snooping-option-82-relay-agent-message-format-analysis.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/dhcp-snooping-option-82-relay-agent-message-format-analysis.html</guid>
			<description><![CDATA[<p><img src="https://www.firewall.cx//images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-packet-structure-option-82-v2.png" alt="DHCP Option 82"></p><p style="text-align: justify;">This article provides in-depth analysis of <strong>DHCP Option 82</strong> (DHCP Relay Agent) which is one of the <strong>+180 DHCP Options</strong> available to the <strong>DHCP protocol</strong> and used by the <strong>Bootstrap Protocol</strong> (<strong>BOOTP</strong>) used for allowing&nbsp; diskless client machines to discover and obtain their IP address. We’ll show you how <strong>DHCP Option 82</strong> is used when implementing <strong>DHCP Snooping</strong>, the <strong>structure</strong> and <strong>content</strong> of <strong>DHCP Option 82</strong>, <strong>how</strong> and <strong>where</strong> it’s <strong>injected</strong> and <strong>removed</strong> from <strong>DHCP messages</strong> plus much more. You’ll can also download our <strong>DHCP/BOOTP Options Excel file</strong> and Wireshark <strong>packet captures</strong> of <strong>DHCP packets with Option 82</strong> used in this article to help further understand all topics covered.</p>
<p><strong>Key Topics</strong>:</p>
<ul>
<li style="text-align: left;"><a href="https://www.firewall.cx/#dhcp-options-field" title="The DHCP Options field within a DHCP Packet">The DHCP Options field within a DHCP Packet</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#dhcp-option-82-message-format" title="DHCP Option 82 (Agent Relay) Message Format, Structure &amp; Fields">DHCP Option 82 (Agent Relay) Message Format, Structure &amp; Fields</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#analysis-of-dhcp-option-82" title="Detailed Analysis of DHCP Option 82 – SubOption 1 &amp; SubOption2">Detailed Analysis of DHCP Option 82 – SubOption 1 &amp; SubOption2</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#dhcp-options-82-usage-examples" title="Purpose &amp; Usage Examples of DHCP Option 82 (Agent Relay)">Purpose &amp; Usage Examples of DHCP Option 82 (Agent Relay)</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#dhcp-snooping-options-82-considerations-switches" title="DHCP Snooping &amp; Option 82 (Agent Relay) Considerations. Switches &amp; Trusted – Untrusted Ports">DHCP Snooping &amp; Option 82 (Agent Relay) Considerations. Switches &amp; Trusted – Untrusted Ports</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/#dhcp-option-82-summary" title="dhcp options 82 summary">Summary</a></li>
</ul>
<p class="box-hint" style="text-align: justify;">It’s highly recommend to read through our <a href="https://www.firewall.cx/cisco/cisco-switches/understanding-dhcp-snooping-concepts-and-how-it-works.html" target="_blank" title="DHCP Snooping – DHCP Attack Mitigation">DHCP Snooping – DHCP Attack Mitigation</a> article which is a foundation article.</p>
<h2 style="text-align: justify;"><a name="dhcp-options-field">The ‘DHCP Options’ Field within a DHCP Packet</a></h2>
<p style="text-align: justify;">The <strong>DHCP Options</strong> field is included inside every DHCP packet and is critical for the correct operation of the DHCP/BOOTP protocol.&nbsp; You’d be surprised to know that there are almost <strong>200 different DHCP Options</strong> available and there are more added as new features are introduced in the protocol.</p>
<p class="box-info" style="text-align: justify;">The material used in this article such as wireshark <a href="https://www.firewall.cx/downloads/article-attachments/dhcp-snooping-option-82.html" target="_blank" title="DHCP Option 82 Packet Capture"><strong>DHCP Options 82 packet captures</strong></a>, are freely available to download from our <a href="https://www.firewall.cx/downloads/article-attachments.html" target="_blank" title="Article Attachments Section">Article Attachments</a> section.</p>
<p style="text-align: justify;">The diagram below shows the structure of a <strong>DHCP packet</strong> and highlights the position of the <strong>DHCP Options</strong> field.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-packet.png" alt="DHCP Packet-Diagram" title="DHCP Packet-Diagram" /></p>
<p style="text-align: justify;">It is important to understand that the above DHCP packet is the <strong>data payload</strong> within an <a href="https://www.firewall.cx/networking/ethernet/ethernet-ii.html" target="_blank" title="Ethernet frame">Ethernet frame</a> using <a href="https://www.firewall.cx/networking/network-protocols/tcp-udp-protocol.html" target="_blank" title="UDP Protocol">UDP</a> as the transport protocol.</p>
<p style="text-align: justify;">The below screenshot was taken from a packet analyzer and shows an Ethernet frame with the DHCP data payload expanded:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-packet-capture-with-dhcp-options.png" alt="dhcp packet capture with dhcp options" title="DHCP Packet capture with Option fields and Option 82" /></p>
<p style="text-align: justify;">We’ve highlighted sections of the <strong>DHCP protocol</strong> using the same colours as our previous diagram to help the correlation process. Every field shown in our diagram maps directly to the fields of the captured DHCP packet.</p>
<p style="text-align: justify;">The area marked in <strong>green</strong> is the section where the <strong>DHCP Options</strong> field is located. In our captured packet there are a total of <strong>8 DHCP Options</strong> used, among them is also <strong>Option 82</strong> (Agent Information Option).</p>
<h2 style="text-align: left;"><a name="dhcp-option-82-message-format">DHCP Option 82 (Agent Relay) Message Format, Structure &amp; Fields</a></h2>
<p style="text-align: justify;">The <strong>DHCP Option 82</strong>, aka <strong>Agent Relay Information Option </strong>or<strong> Agent Information Option</strong>, was originally created by <a href="https://tools.ietf.org/html/rfc3046" target="_blank" rel="nofollow noopener" title="RFC 3046">RFC 3046</a> to allow the DHCP relay agent (e.g switch, router, firewall or server) to <strong>identify itself</strong> and the <strong>DHCP client </strong>that sent the original DHCP message.</p>
<p style="text-align: justify;">The <strong>DHCP Option 82</strong> is inserted and removed by the <strong>DHCP Agent Relay</strong> (e.g switch) as shown in the diagram below:</p>
<p style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/insertion-of-dhcp-option-82-by-relay-agent.png" alt="insertion of dhcp option 82 by relay agent" title="insertion of dhcp option 82 by relay agent" /></p>
<p style="text-align: justify;">While some DHCP servers might not support the <strong>Option 82</strong> they are still required to copy the <strong>Option 82</strong> value received from the DHCP client and include it in all replies back to the client. We’ll discuss the <strong>Option 82 insertion</strong> and <strong>removal</strong> process in the next section.</p>
<p style="text-align: justify;">As we saw earlier, the <strong>DHCP Options field</strong> is positioned at the <strong>end</strong> of the DHCP packet and always contains <strong>multiple DHCP options</strong>. This of course means the <strong>DHCP Option</strong> field varies in length according to the number of options used:</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-packet.png" alt="" title="DHCP Packet-Diagram" data-alt="DHCP Packet-Diagram" />Let’s now take a closer look into the <strong>DHCP Options</strong> field at the end of the packet. This can contain multiple options as shown below in our packet analyzer screenshot:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-packet-capture-with-dhcp-options.png" alt="dhcp packet capture with dhcp options" title="DHCP Packet capture with Option fields and Option 82" /></p>
<p>&nbsp;Each option expands to include its own parameters however we will focus on <strong>Option 82</strong> shown below:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-packet-structure-option-82.png" alt="DHCP Option Field - Option 82 Agent Information Option Analysis" title="DHCP Option Field - Option 82 Agent Information Option Analysis" /></p>
<p style="text-align: justify;">Due to space restrictions we are only depicting the first (Message Type), second last (Option 82) and last (End) option.</p>
<p style="text-align: justify;">Remember there are over <strong>200 different DHCP options</strong> (<strong>Code</strong> options) available and multiple used in just a single DHCP packet so it can get very challenging analyzing only one DHCP packet!</p>
<p style="text-align: justify;">Looking at the above diagram we can appreciate that the structure of each <strong>DHCP Option</strong> varies depending on its purpose and information contained however there is a common set of fields used by all except the last (Option 255 – End):</p>
<ul style="text-align: justify;">
<li style="text-align: left;"><strong>Code </strong>(light green box). Identifies the <strong>DHCP Option type. </strong>Examples are <strong>Code=82</strong> (DHCP Agent Information), <strong>Code=53</strong> (DHCP Message Type: Discover, Offer, Request or Ack), etc.</li>
<li style="text-align: left;"><strong>Length </strong>(green box). This is the <strong>DHCP option type</strong> length in <strong>bytes</strong>. For <strong>DHCP Option 82</strong>, this includes the combined the length of <strong>SubOption1</strong> + <strong>SubOption2</strong>.</li>
<li style="text-align: left;"><strong>Value</strong> (blue box). This contains <strong>value</strong> or <strong>data</strong> related to the <strong>DHCP Option</strong> type. <strong>DHCP Option 82</strong> contains two <strong>SubOptions</strong>, each with its own unique value as shown above.</li>
</ul>
<p style="text-align: justify;">It’s probably worth mentioning at this point that <a href="https://tools.ietf.org/html/rfc3046" target="_blank" rel="nofollow noopener" title="RFC 3046">RFC 3046</a> states that <strong>DHCP Option 82</strong> should always be the <strong>last DHCP Option </strong>before the <strong>END</strong> option (Code 255).</p>
<p class="box-info" style="text-align: justify;">The material used in this article such as wireshark <a href="https://www.firewall.cx/downloads/article-attachments/dhcp-snooping-option-82.html" target="_blank" title="DHCP Option 82 Packet Capture"><strong>DHCP Options 82 packet captures</strong></a>, are freely available to download from our <a href="https://www.firewall.cx/downloads/article-attachments.html" target="_blank" title="Article Attachments Section">Article Attachments</a> section.</p>
<h2 style="text-align: left;"><a name="analysis-of-dhcp-option-82">Detailed Analysis of DHCP Option 82 – SubOption 1 &amp; SubOption 2</a></h2>
<p style="text-align: justify;">Before we begin analyzing the two <strong>SubOptions</strong> we need to understand that <strong>DHCP Option 82</strong> is inserted by the Agent Relay (switch) as the client’s DHCP packets traverse it.</p>
<p style="text-align: justify;">In this scenario the switch has <strong>DHCP Snooping enabled</strong> and the <strong>SubOption</strong> parameters configured accordingly. In the example below, switch <strong>DC-SW1</strong> has <strong>DHCP Snooping</strong> plus <strong>DHCP Options 82</strong> enabled and configured:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/insertion-of-dhcp-option-82-by-relay-agent.png" alt="Diagram with WAN and DHCP discover and options 82" style="display: block; margin-left: auto; margin-right: auto;" title="Diagram with WAN and DHCP discover and options 82" /></p>
<p style="text-align: justify;">As the client’s <strong>DHCP Discover</strong> packet enters switch <strong>DC-SW1 </strong>via port <strong>Gi0/5</strong> the switch will automatically add the <strong>DHCP Option 82</strong> and continue forwarding the packet to the DHCP server.</p>
<p style="text-align: justify;">Below is the breakdown of <strong>DHCP Option 82</strong> added inside the <strong>DHCP Options field</strong>:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-packet-structure-option-82-v2.png" alt="DHCP Option 82 Analysis - SubOption Values" style="display: block; margin-left: auto; margin-right: auto;" title="DHCP Option 82 Analysis - SubOption Values" /></p>
<p>The <strong>DHCP</strong> <strong>Option 82 </strong>in this example has the following configured:</p>
<ul class="check">
<li style="text-align: left;"><strong>SubOption 1</strong> (Agent Circuit ID) = <strong>Gi0/5</strong>. Used to identify the individual switchport.</li>
<li style="text-align: left;"><strong>SubOption 2</strong> (Agent Remote ID) = <strong>DC-SW1</strong>. The Hostname or description of the <strong>DHCP Relay Agent</strong></li>
</ul>
<p>Here is what a <strong>DHCP Option 82</strong> packet capture looks like in network protocol analyzer:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-option-82-packet-analyzer-suboptions.png" alt="Wireshark screenshot with DHCP  Suboptions 82" title="Wireshark screenshot with DHCP  Suboptions 82" /></p>
<p style="text-align: justify;">The top section highlights the two <strong>SubOptions</strong> along with their parameters and values which are all in <strong>HEX</strong> while the lower right section shows these values in <strong>ASCII</strong> – making them easy to decipher.</p>
<p style="text-align: justify;">Before we complete this section let’s take a closer look at the fields each <strong>SubOption</strong> consists of:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-packet-structure-option-82-v2.png" alt="DHCP Option 82 Analysis - SubOption Values" style="display: block; margin-left: auto; margin-right: auto;" title="DHCP Option 82 Analysis - SubOption Values" /></p>
<ul>
<li style="text-align: left;"><strong>SubOption Number</strong>. This identifies the first (Agent Circuit ID) or second (Agent Remote ID) SubOption.</li>
<li style="text-align: left;"><strong>Length</strong>. The length of the specific SubOption in bytes.</li>
<li style="text-align: left;"><strong>Value</strong>. The specific SubOption value.</li>
</ul>
<p style="text-align: justify;">This completed the protocol analysis of <strong>DHCP Option 82</strong>.&nbsp; Next up, we’ll take a look at examples where <strong>DHCP Option 82</strong> plays a significant role in the operation of the network infrastructure.</p>
<h2 style="text-align: left;"><a name="dhcp-options-82-usage-examples">Purpose &amp; Usage Examples of DHCP Option 82 (Agent Relay)</a></h2>
<p style="text-align: justify;">Most modern <strong>DHCP Servers</strong>, e.g Windows Server 2012 &amp; Windows Server 2016, support <strong>DHCP Option 82</strong> therefore allowing organizations to create <strong>DHCP policies</strong> according to the information contained inside the <strong>DHCP Option 82 field</strong>. For example DHCP Pools or IP address ranges can be reserved and assigned to DHCP clients connecting to specific switches within the network or specific ports on those switches.</p>
<p style="text-align: justify;">Large metropolitan networks, for example <strong>ISPs</strong> or <strong>university campuses</strong> make extensive use of the <strong>DHCP Option 82</strong> as it provides them with the capability of managing and maintaining DHCP network services from a centralized location without the need of dispersed DHCP servers at each site or campus.</p>
<p style="text-align: justify;"><strong>DHCP client requests</strong> are directed to the main datacenter with the help of <strong>local DHCP relay agents</strong> (switches, routers, etc) configured to inject the <strong>DHCP Option 82 </strong>inside the client’s original DHCP packet. This packet is then forwarded to the DHCP Servers with all the necessary information that will allow them to identify the site, network switch and port to which the client is connected to. <strong>DHCP server policies</strong> then come into effect and ensure each site is served from the correct DHCP pool and clients are assigned the correct IP address.<img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/insertion-of-dhcp-option-82-by-relay-agent.png" alt="Diagram with WAN and DHCP discover and options 82" style="display: block; margin-left: auto; margin-right: auto;" title="Diagram with WAN and DHCP discover and options 82" /></p>
<p style="text-align: justify;">The diagram above shows how a <strong>client’s DHCP Discover </strong>packet is modified by the <strong>local DHCP Relay Agent</strong> (<strong>DC-SW1</strong>) to include the <strong>DHCP Option 82 message</strong> allowing the DHCP server at the <strong>Core Network</strong> identify the campus, switch and port to which the client sending the request is connected to.</p>
<p style="text-align: justify;">As previously noted, the DHCP server is required to maintain the <strong>DHCP Option 82 information</strong> when replying to the client. This is also shown in the diagram below:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/removal-of-dhcp-option-82-by-relay-agent.png" alt="DHCP Snooping Option 82 removal by DHCP Relay Agent" title="DHCP Snooping Option 82 removal by DHCP Relay Agent" /></p>
<p style="text-align: justify;">The <strong>DHCP Relay Agent</strong> (DC-SW1) will receive the DHCP server’s reply and <strong>remove</strong> the <strong>Option 82</strong> information before forwarding it out to the DHCP client.</p>
<p style="text-align: justify;">Many sources on the internet incorrectly mention that the <strong>DHCP Relay Agent Option</strong> (<strong>Option 82</strong>) is automatically inserted by a <a href="https://www.firewall.cx/cisco/cisco-switches/understanding-dhcp-snooping-concepts-and-how-it-works.html" target="_blank" title="DHCP Snooping Enabled Switch"><strong>DHCP Snooping</strong></a><strong> enabled</strong> switch.&nbsp;<a href="https://tools.ietf.org/html/rfc3046" target="_blank" rel="nofollow noopener" title="RFC 3046">RFC 3046</a> (Section 2.1 – Agent Operation) specifically notes that this function should be disabled by default.</p>
<h2 style="text-align: left;"><a name="dhcp-snooping-options-82-considerations-switches">DHCP Snooping &amp; Option 82 (Relay Agent) Considerations. Switches &amp; Trusted - Untrusted Ports</a></h2>
<p style="text-align: justify;">We already know that with <strong>DHCP Snooping</strong> <strong>enabled</strong> and <strong>Option 82 configured</strong> a <a href="https://www.firewall.cx/cisco/cisco-switches.html" target="_blank" title="Cisco Catalyst Switches">Cisco Catalyst</a> or <a href="https://www.firewall.cx/cisco/cisco-data-center.html" target="_blank" title="Cisco Nexus Data Center Switches">Nexus switch</a>, it will insert the <strong>Option 82</strong> field into the client’s DHCP message as shown in the below diagram:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-snooping-option-82-considerations-1.png" alt="DHCP Snooping Option 82 - Switches Trusted and Untrusted Ports" title="DHCP Snooping Option 82 - Switches Trusted and Untrusted Ports" /></p>
<p style="text-align: justify;">As shown in the example above, the DHCP client’s <strong>DHCP Discover</strong> packet is received by the switch on interface <strong>Gi0/5</strong> which is by default an <a href="https://www.firewall.cx/cisco/cisco-switches/understanding-dhcp-snooping-concepts-and-how-it-works.html#how_dhcp_snooping_works" target="_blank" title="DHCP Untrusted Ports - Interfaces"><strong>untrusted port</strong></a>. The switch, which acts as a <strong>DHCP relay agent</strong>, immediately inserts the <strong>DHCP Option 82</strong> in the <strong>original DHCP Discover</strong> packet, updates the frame as needed (MAC addresses, destination IP, CRC) then sends it out Gi0/1, a <a href="https://www.firewall.cx/cisco/cisco-switches/understanding-dhcp-snooping-concepts-and-how-it-works.html#how_dhcp_snooping_works" target="_blank" title="DHCP Snooping Trusted Ports - Interfaces"><strong>trusted port</strong></a>, to the DHCP Server.</p>
<p style="text-align: justify;">As a general rule of thumb, <strong>any switch interface</strong> expected to receive <strong>DHCP packets</strong> containing <strong>DHCP Option 82</strong> must be configured as a <strong>Trusted interface</strong> otherwise the DHCP packet will be discarded by the switch:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-snooping-option82-trusted-untrusted-interfaces.png" alt="DHCP Snooping Option 82 via Switch trusted &amp; Untrusted interfaces" title="DHCP Snooping Option 82 via Switch trusted &amp; Untrusted interfaces" /></p>
<p style="text-align: justify;">In the case where there are multiple switches with involved in the path to reach the DHCP server the same rule applies to ensure DHCP packets with <strong>Option 82</strong> can traverse each hop:</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-option-82-analysis/dhcp-snooping-multiple-switches-options-82.png" alt="dhcp snooping multiple switches options 82 - Trusted &amp; Untrusted interfaces" title="dhcp snooping multiple switches options 82 - Trusted &amp; Untrusted interfaces" /></p>
<p style="text-align: justify;">Interfaces <strong>Gi0/1</strong> from <strong>SW1</strong> and <strong>Gi0/4</strong>, <strong>Gi0/2</strong> from <strong>SW2</strong> will always receive DHCP packets with <strong>Option 82</strong> therefore these ports must be configured as <strong>trusted ports</strong>.</p>
<h3>Related Articles</h3>
<ul>
<li style="text-align: left;"><a href="https://www.firewall.cx/cisco/cisco-switches/understanding-dhcp-snooping-concepts-and-how-it-works.html" target="_blank" title="Complete Guide to DHCP Snooping, Snooping Database &amp; mitigating DHCP Attacks">Complete Guide to DHCP Snooping, Snooping Database &amp; mitigating DHCP Attacks</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html" target="_blank" title="Basic &amp; Advanced Catalyst Layer 3 Switch Configuration">Basic &amp; Advanced Catalyst Layer 3 Switch Configuration</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/networking/vlan-networks.html" target="_blank" title="Understanding &amp; Designing VLAN Networks">Understanding &amp; Designing VLAN Networks</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/networking/ethernet/ethernet-ii.html" target="_blank" title="Ethernet II Frame Formats">Ethernet II Frame Formats</a></li>
<li style="text-align: left;"><a href="https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html" target="_blank" title="MAC Addresses">MAC Address</a></li>
</ul>
<h2><a name="dhcp-option-82-summary">Summary</a></h2>
<p style="text-align: justify;">This article provided <strong>in-depth analysis</strong> of the <strong>DHCP Options</strong> field and more specifically the <strong>DHCP Option 82</strong>. We examined the <strong>DHCP Option 82 message format</strong>, <strong>structure</strong> and <strong>fields</strong> while also taking a close look at <strong>SubOptions 1 &amp; 2</strong> and explaining their usage. Finally we talked about the <strong>purpose</strong> and <strong>real-usage examples</strong> of <strong>DHCP Option 82</strong> and showed how <strong>switchports</strong> should be configured on <strong>DHCP Snooping enabled</strong> switches with <strong>DHCP Option 82</strong> configured.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Sat, 21 Jul 2018 22:28:12 +1000</pubDate>
		</item>
		<item>
			<title>Complete Guide to DHCP Snooping, How it Works, Concepts, DHCP Snooping Database, DHCP Option 82, Mitigating DHCP Starvation Attacks, DHCP Hijacking, Man-in-the-Middle Attacks &amp; Rogue DHCP Servers</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/understanding-dhcp-snooping-concepts-and-how-it-works.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/understanding-dhcp-snooping-concepts-and-how-it-works.html</guid>
			<description><![CDATA[<p style="text-align: justify;">This article covers popular <strong>Layer 2 &amp; Layer 3 network attacks</strong> with a focus on <strong>DHCP Starvation Attacks</strong>, <strong>Man-in-the-Middle attacks</strong>, unintentional <strong>rogue DHCP servers</strong> and explains how <strong>security features</strong> like <strong>DHCP Snooping</strong> help <strong>protect networks</strong> from these attacks. We explain <strong>how DHCP Snooping works</strong>, cover <strong>DHCP Snooping terminology</strong> (trusted, untrusted ports/interfaces) and more. Finally we talk about the importance and purpose the <strong>DHCP Snooping Binding Database</strong> also used by <strong>Dynamic ARP Inspection </strong>to prevent <strong>ARP Poisoning</strong> and <strong>ARP Spoofing attacks</strong>.</p>
<p>Topics covered include:</p>
<ul>
<li><a href="https://www.firewall.cx/#dhcp_starvation_attacks_man_in_the_middle_attack" title="DHCP Starvation Attack, Man-in-the-Middle Attack, DHCP Hijacking &amp; Reconnaissance Attacks">DHCP Starvation Attack, Man-in-the-Middle Attack, DHCP Hijacking &amp; Reconnaissance Attacks</a></li>
<li><a href="https://www.firewall.cx/#rogue_dhcp_servers" title="Rogue DHCP Servers – A Major Security Threat &amp; Source of Network Disruptions">Rogue DHCP Servers – A Major Security Threat &amp; Source of Network Disruptions</a></li>
<li><a href="https://www.firewall.cx/#dhcp_snooping_catalyst_nexus_support" title="DHCP Snooping Support for Cisco Catalyst and Nexus Switches. Licensing &amp; Features">DHCP Snooping Support for Cisco Catalyst and Nexus Switches. Licensing &amp; Features</a></li>
<li><a href="https://www.firewall.cx/#how_dhcp_snooping_works" title="How DHCP Snooping Works – DHCP Snooping Concepts - Trusted, Untrusted Ports/Interfaces">How DHCP Snooping Works – DHCP Snooping Concepts - Trusted, Untrusted Ports/Interfaces</a></li>
<li><a href="https://www.firewall.cx/#traffic_dropped_by_dhcp_snooping" title="Traffic Dropped by DHCP Snooping, DHCP Snooping Violations – Syslog Messages">Traffic Dropped by DHCP Snooping, DHCP Snooping Violations – Syslog Messages</a></li>
<li><a href="https://www.firewall.cx/#ip_dhcp_snooping_binding_database" title="The IP DHCP Snooping Binding Database – Dynamic ARP Inspection">The IP DHCP Snooping Binding Database – Dynamic ARP Inspection</a></li>
<li><a href="https://www.firewall.cx/#dhcp_snooping_options_82" title="DHCP Snooping Option-82 Data Insertion">DHCP Snooping Option-82 Data Insertion</a></li>
<li><a href="https://www.firewall.cx/#summary" title="Summary">Summary</a></li>
</ul>
<h2>Related Articles</h2>
<ul>
<li><a href="https://www.firewall.cx/cisco/cisco-switches/dhcp-snooping-option-82-relay-agent-message-format-analysis.html" target="_blank" title="DHCP Option 82 Message Format, Analysis. DHCP Snooping Option 82 Injection &amp; Removal Method, Trusted – Untrusted Switch Ports">DHCP Option 82 Message Format, Analysis. DHCP Snooping Option 82 Injection &amp; Removal Method, Trusted – Untrusted Switch Ports</a></li>
<li><a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html" target="_blank" title="Basic &amp; Advanced Catalyst Layer 3 Switch Configuration">Basic &amp; Advanced Catalyst Layer 3 Switch Configuration</a></li>
<li><a href="https://www.firewall.cx/networking/vlan-networks.html" target="_blank" title="Understanding &amp; Designing VLAN Networks">Understanding &amp; Designing VLAN Networks</a></li>
<li><a href="https://www.firewall.cx/networking/ethernet/ethernet-ii.html" target="_blank" title="Ethernet II Frame Formats">Ethernet II Frame Formats</a></li>
<li><a href="https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html" target="_blank" title="MAC Address">MAC Address</a></li>
</ul>
<h2 style="text-align: left;"><a name="dhcp_starvation_attacks_man_in_the_middle_attack">DHCP Starvation Attack, Man-in-the-Middle Attack, DHCP Hijacking &amp; Reconnaissance Attacks</a></h2>
<p style="text-align: justify;"><strong>DHCP Starvation</strong> <strong>attack</strong> is a common network attack that targets network <strong>DHCP servers</strong>. Its primary objective is to <strong>flood</strong> the organization’s DHCP server with <strong>DHCP REQUEST messages</strong> using <strong>spoofed source MAC addresses</strong>. The DHCP server will respond to all requests, not knowing this is a <strong>DHCP Starvation attack</strong>, and assign available IP addresses until its <strong>DHCP pool is depleted</strong>.</p>
<p style="text-align: justify;">At this point the attacker has rendered the organization’s DHCP server useless and can now enable his own <strong>rogue DHCP server</strong> to serve network clients. <strong>DHCP Starvation</strong> is often accompanied by a <strong>Man-in-the-Middle attack</strong> as the <strong>rogue DHCP server</strong> distributes fake IP address parameters, including Gateway &amp; DNS IP address, so that all client traffic passes through the attacker for inspection.</p>
<p style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-snooping/rogue-dhcp-server-man-in-the-middle-attack.png" alt="rogue dhcp server man in the middle attack" style="display: block; margin-left: auto; margin-right: auto;" title="rogue dhcp server man-in-the-middle-attack" />Typical Man-in-the-Middle attack. Client data streams flow through the attacker</p>
<p style="text-align: justify;">Using packet capture and protocol analysis tools the attacker is able to fully reconstruct any data stream captured and export files from it. In fact the process so simple it only requires a basic level of understanding of these type of network tools.</p>
<p style="text-align: justify;">In other cases the <strong>Man-in-the-Middle attack</strong> can be used as a <strong>reconnaissance attack</strong> with the objective to obtain information about the network infrastructure, services but also identify hosts of high interest such as financial or database servers.</p>
<p style="text-align: justify;">It should be by now evident how a simple attack can become a <strong>major security threat</strong> for any organization. The above attacks are examples on how easy hackers can <strong>infiltrate the network</strong> and get access to <strong>valuable information</strong> by simply connecting an <strong>unauthorized/untrusted device</strong> to an available network port effectively bypassing firewalls and other levels of security.</p>
<h2 style="text-align: left;"><a name="rogue_dhcp_servers">Rogue DHCP Servers – A Major Security Threat &amp; Source of Network Disruptions</a></h2>
<p style="text-align: justify;"><strong>Rogue DHCP servers</strong> are a common problem within <strong>enterprise organizations</strong> and are not always directly related with an attack. <strong>Rogue DHCP Servers</strong> tend to appear out of nowhere thanks to users who connect consumer-grade network devices to the network infrastructure unaware that they have connected an <strong>unauthorized device</strong> with a <strong>rogue</strong> <strong>DHCP server enabled</strong>.</p>
<p style="text-align: justify;">The <strong>Rogue DHCP server</strong> then begins assigning IP addresses to hosts within the network therefore causing network connectivity problems and in many cases – major service disruptions. In a best case scenario DHCP clients are served with an invalid IP address disconnecting them from the rest of the network. Worst case scenario would be the clients been assigned an IP address used by network infrastructure devices e.g the <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html" target="_blank" title="VLAN Interface configuration">VLAN interface</a> on the Core switch or a firewall interface, causing serious network disruptions and conflicts.</p>
<div style="text-align: center;"><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-snooping/rouge-dhcp-server-in-action.png" alt="rouge dhcp server in action" title="rouge dhcp server in action" /></div>
<div style="text-align: center;">A rogue DHCP server in action, taking control of DHCP services</div>
<p style="text-align: justify;">While many organizations enforce security policies that do not allow 3<sup>rd</sup> party or <strong>unauthorized devices</strong> to be connected to their network, there are still incidents where users who do not understand (or care about) the security implications continue to connect these devices to the network infrastructure without consulting their IT Department.</p>
<p style="text-align: justify;">Educating users and <strong>enforcing security policies</strong> can be extremely challenging which is why security mechanisms need to be in place to help mitigate these incidents and is where <strong>DHCP Snooping</strong> comes into the picture.</p>
<h2 style="text-align: left;"><a name="dhcp_snooping_catalyst_nexus_support">DHCP Snooping Support for Cisco Catalyst and Nexus Switches. Licensing &amp; Features</a></h2>
<p style="text-align: justify;"><strong>DHCP Snooping</strong> is <strong>available</strong> on both the <strong><a href="https://www.firewall.cx/cisco/cisco-switches.html" target="_blank" title="Cisco Catalyst Switches">Cisco Catalyst</a></strong> and <strong><a href="https://www.firewall.cx/cisco/cisco-data-center.html" target="_blank" title="Cisco Nexus Data Centre Switches">Cisco Nexus</a> </strong>platform switches. Both platforms are classified as <strong>enterprise-grade switches</strong> and fully support all DHCP Snooping functions.</p>
<p style="text-align: justify;"><strong>DHCP Snooping</strong> is considered a standard security feature and does not require any additional licensing for the older Catalyst IOS, newer Catalyst IOS XE and Nexus NS-OS operating systems, therefore the feature is available and readily configurable on all switches.</p>
<p style="text-align: justify;">Examples of <strong>Cisco Catalyst</strong> switches that support <strong>DHCP Snooping</strong> are: Cisco Catalyst 2960S, 2960-X, 3560, 3750, 3750-X, 3850, 4500, 6500, 9300, 9400 and 9500 series.</p>
<p style="text-align: justify;">Examples of <strong>Cisco Nexus</strong> switches that support <strong>DHCP Snooping</strong> are: Nexus 2000, 3000, 5000, 7000 and 9000 series.</p>
<p style="text-align: justify;">DHCP Snooping can be <strong>enabled globally</strong> and on a <strong>per-VLAN basis</strong>. This means you can enable it for <strong>all VLANs</strong> (globally) or only for specific including VLAN ranges e.g VLANs 1-20 &amp; VLANs 45-50.</p>
<h2 style="text-align: left;"><a name="how_dhcp_snooping_works">How DHCP Snooping Works – DHCP Snooping Concepts – Trusted, Untrusted Ports/Interfaces</a></h2>
<p style="text-align: justify;"><strong>DHCP Snooping</strong> is a <strong>Layer 2 security switch feature</strong> which blocks <strong>unauthorized</strong> (rogue) <strong>DHCP servers</strong> from distributing IP addresses to <strong>DHCP clients</strong>. In fact Cisco was the first vendor to implement DHCP Snooping as a security feature in its network switches and other vendors have since then followed with similar features.</p>
<p class="box-warning" style="text-align: justify;">It is important to note that <strong>DHCP SNOOPING</strong> is an <strong>access layer protection service</strong> – it does not belong in the core network.</p>
<p style="text-align: justify;">The way <strong>DHCP Snooping</strong> works is fairly straight forward. DHCP Snooping categorizes all switchports into two simple categories:</p>
<ul class="check">
<li><strong>Trusted Ports</strong></li>
<li><strong>Untrusted Ports</strong></li>
</ul>
<p style="text-align: justify;">A <strong>Trusted Port</strong>, also known as a <strong>Trusted Source or Trusted Interface</strong>, is a port or source whose DHCP server messages are trusted because it is under the organization’s administrative control. For example, the port to which your organization’s DHCP server connects to is considered a <strong>Trusted Port</strong>. This is also shown in the diagram below:</p>
<div style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-snooping/dhcp-snooping-trusted-untrusted-interfaces-ports.png" alt="dhcp snooping trusted untrusted interfaces ports" title="dhcp snooping trusted untrusted interfaces ports" /></div>
<div style="text-align: center;">DHCP Snooping Concepts: Trusted and Untrusted Ports</div>
<p style="text-align: justify;">An <strong>Untrusted Port</strong>, also known as an <strong>Untrusted Source </strong>or<strong> Untrusted Interface</strong>, is a port from which DHCP server messages are <strong>not trusted</strong>. An example on an <strong>untrusted port</strong> is one where hosts or PCs connect to from which <strong>DHCP OFFER, DHCP ACK</strong> or <strong>DHCPNAK messages</strong> should<strong> never be seen</strong> as these are sent only by DHCP Servers.</p>
<h2 style="text-align: left;"><a name="traffic_dropped_by_dhcp_snooping">Traffic Dropped by DHCP Snooping, DHCP Snooping Violations - Syslog Messages</a></h2>
<p style="text-align: justify;">When <strong>enabling DHCP Snooping</strong> the switch will begin to drop specific type of DHCP traffic in order to protect the network from <strong>rogue DHCP servers</strong>. Here is a list of the type of traffic DHCP Snooping will drop:</p>
<ul class="check" style="text-align: justify;">
<li>DHCP Snooping will <strong>drop DHCP messages</strong> <strong>DHCPACK</strong>, <strong>DHCPNAK</strong>, <strong>DHCPOFFER</strong> originating from a DHCP server that is <strong>not trusted</strong> – that is, connected to an <strong>untrusted port</strong>.</li>
<li>DHCP Snooping will <strong>drop DHCP messages</strong> that <strong>release</strong> or <strong>decline an offer</strong> if these messages are not originating from the port where the <strong>original DHCP conversation</strong> was held. This stops attackers from trying to <strong>terminate</strong> or <strong>decline</strong> a DHCP offer on behalf of the actual DHCP client.</li>
<li>A&nbsp; DHCP relay agent forwards a DHCP packet that includes a relay-agent IP address that is not <strong>0.0.0.0</strong>, or the relay agent forwards a packet that includes <strong>Option 82</strong> information to an <strong>untrusted port</strong>. For an in-depth analysis please refer to our <a href="https://www.firewall.cx/cisco/cisco-switches/dhcp-snooping-option-82-relay-agent-message-format-analysis.html" target="_blank" title="DHCP Option 82 in-depth analysis"><strong>DHCP Option 82</strong></a> article.</li>
<li>DHCP Snooping will <strong>drop DHCP messages </strong>where the <strong>Source MAC address</strong> and <strong>client MAC address</strong> are not identical (see <strong>DHCP_SNOOPING-5-DHCP_SNOOPING_MATCH_MAC_FAIL </strong>below).</li>
</ul>
<p style="text-align: justify;">When DHCP Snooping detects a <strong>violation</strong> the DHCP packet(s) triggering the event is dropped and a message is logged in the switch’s log. The message can contain one of the following entries:</p>
<ul style="text-align: justify;">
<li><strong>%DHCP_SNOOPING-5-DHCP_SNOOPING_UNTRUSTED_PORT</strong>: DHCP Snooping has detected DHCP server messages from an <strong>untrusted port</strong>. This is a serious violation and usually points to a <strong>rogue DHCP server</strong> operating on an <strong>untrusted port</strong>.</li>
</ul>
<ul style="text-align: justify;">
<li><strong>%DHCP_SNOOPING-5-DHCP_SNOOPING_MATCH_MAC_FAIL</strong>: DHCP Snooping has detected the <span style="color: #800000;"><strong>Source MAC address</strong></span> of the <a href="https://www.firewall.cx/networking/ethernet/ethernet-ii.html" target="_blank" title="Ethernet II Frame Format"><strong>Ethernet frame</strong></a> and <a href="https://www.firewall.cx/networking/network-fundamentals/mac-addresses.html" target="_blank" title="Client MAC address"><span style="color: #333399;"><strong>Client MAC address</strong></span></a> in the <strong>DHCP message</strong> are not identical (see image below).</li>
</ul>
<div style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-snooping/dhcp-snooping-match-mac-fail.png" alt="dhcp snooping match source mac address fail" title="dhcp snooping match source mac address fail" /></div>
<div style="text-align: center;"><span style="color: #800000;"><strong>Source MAC address</strong></span> of an <strong>Ethernet frame</strong> and <span style="color: #000080;"><strong>Client MAC address</strong></span> in the <strong>DHCP message </strong>must always match</div>
<h2 style="text-align: left;"><a name="ip_dhcp_snooping_binding_database">The IP DHCP Snooping Binding Database – Dynamic ARP Inspection</a></h2>
<p style="text-align: justify;">When <strong>DHCP Snooping</strong> is enabled it will begin to build a <strong>dynamic database</strong> containing an entry for each <strong>untrusted host</strong> with a <strong>leased IP address</strong> if the host is associated with a VLAN that has <strong>DHCP Snooping enabled</strong>. No entries are created for hosts connected to <strong>trusted interfaces</strong>.</p>
<p style="text-align: justify;">Each entry in the binding database contains the following information:</p>
<ul style="text-align: justify;">
<li style="text-align: left;">MAC address of the <strong>untrusted host</strong></li>
<li style="text-align: left;">Leased IP address of the <strong>untrusted host</strong></li>
<li style="text-align: left;">Lease time</li>
<li style="text-align: left;">Binding type</li>
<li style="text-align: left;">VLAN number &amp; interface the <strong>untrusted host</strong> is associated with</li>
</ul>
<p style="text-align: justify;">As <strong>untrusted hosts</strong> are assigned IP addresses from the <strong>trusted DHCP server</strong> the switch will automatically create new entries, update and cleanup the <strong>DHCP Snooping Binding Database</strong>.</p>
<p style="text-align: justify;">For example, when an IP address lease expires or the switch receives a <strong>DHCPRELEASE</strong> message from the <strong>untrusted host</strong>, it will remove the specific entry from the database. On the other hand an entry will be created in the database if the switch sees a <strong>DHCPACK</strong> message from the <strong>trusted DHCP server</strong> acknowledging the assignment of an IP address to an <strong>untrusted host</strong>.</p>
<p>The <strong>show</strong> <strong>ip dhcp snooping binding</strong> command displays all entries inside the <strong>DHCP Snooping Binding Database</strong>:</p>
<p class="box-content">Cat3560-Firewall.cx# <strong>show ip dhcp snooping binding</strong><br /><br />MacAddress &nbsp; &nbsp; &nbsp; &nbsp; IpAddress &nbsp; &nbsp;&nbsp; Lease(sec)&nbsp;&nbsp; Type &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; VLAN&nbsp;&nbsp; Interface<br />------------&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ------------&nbsp;&nbsp; ---------- &nbsp; -------------&nbsp; ----&nbsp;&nbsp; -----------------<br />D0:76:58:0C:BB:80&nbsp; 192.168.4.50 &nbsp; 85228&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; dhcp-snooping &nbsp; 4&nbsp;&nbsp;&nbsp;&nbsp; GigabitEthernet0/5<br /><br />Total number of bindings: 1</p>
<p style="text-align: justify;">The <strong>DHCP Snooping Binding Database</strong> is also used by other Layer2/3 security features such as <strong>Dynamic ARP Inspection</strong> which help protect the network against <strong>ARP Poisoning</strong> &amp; <strong>ARP Spoofing attacks</strong>.</p>
<p class="box-hint" style="text-align: justify;"><strong>IP DHCP Snooping configuration</strong> for Cisco Catalyst and Cisco Nexus switching platforms will be covered extensively in an upcoming technical article.</p>
<p class="box-hint" style="text-align: left;"><strong>Dynamic ARP Inspection</strong>, <strong>ARP Poisoning</strong>, <strong>ARP Spoofing attacks</strong> will be covered in an upcoming security article.</p>
<h2 style="text-align: left;"><a name="dhcp_snooping_options_82">DHCP Snooping Option 82 – Relay Agent Information</a></h2>
<p style="text-align: justify;">The <a href="https://www.firewall.cx/cisco/cisco-switches/dhcp-snooping-option-82-relay-agent-message-format-analysis.html" target="_blank" title="DHCP Option 82 Message Format, Analysis"><strong>DHCP Option 82</strong></a>, aka <strong>Relay Agent Information Option</strong>, was originally created by <a href="https://tools.ietf.org/html/rfc3046" target="_blank" rel="nofollow noopener" title="RFC 3046">RFC 3046</a> to allow the <strong>DHCP relay agent</strong> (e.g switch or router) to <strong>identify itself</strong> and the <strong>DHCP client </strong>that sent the DHCP messages. <strong>DHCP Option 82</strong> is used in large metropolitan Ethernet-access deployments where DHCP is required to centrally manage the IP addresses for a large number of subscribers.</p>
<p style="text-align: justify;">When <strong>DHCP Snooping</strong> is <strong>enabled</strong> on a Cisco Catalyst or Nexus switch, it will insert the <a href="https://www.firewall.cx/cisco/cisco-switches/dhcp-snooping-option-82-relay-agent-message-format-analysis.html" target="_blank" title="DHCP Snooping Option 82"><strong>Option 82 field</strong> field</a> into the client’s DHCP message:</p>
<div style="text-align: center;">&nbsp;<img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-snooping/dhcp-snooping-enabled-switch-inserting-dhcp-option-82.png" alt="dhcp snooping enabled switch inserting dhcp option 82" title="DHCP Snooping enabled switch inserting DHCP Option 82 into a DHCP Request" /></div>
<div style="text-align: center;">DHCP Snooping enabled switch inserting DHCP Option 82 into a DHCP Request</div>
<p style="text-align: justify;"><strong>DHCP Option 82</strong> is not often used within organizations but it does provide an additional layer of protection if the DHCP server supports it. &nbsp;For example the <strong>DHCP Server</strong> on <strong>Windows Server 2012</strong> or <strong>2016</strong> supports <strong>Option 82</strong> allowing administrators to create DHCP Policies that control the assignment of IP addresses to specific switches within the network.</p>
<p><img src="https://www.firewall.cx/images/stories/cisco/catalyst-switches/dhcp-snooping/windows-dhcp-server-option-82-policy-configuration.png" alt="windows dhcp server option 82 policy configuration" style="display: block; margin-left: auto; margin-right: auto;" title="windows dhcp server option 82 policy configuration" /></p>
<p style="text-align: justify;">Analyzing the structure of <strong>DHCP Option 82 </strong>is out of this article’s scope but will be covered in great depth in an upcoming article.</p>
<p class="box-info">Read our article "<a href="https://www.firewall.cx/cisco/cisco-switches/dhcp-snooping-option-82-relay-agent-message-format-analysis.html" target="_blank" title="DHCP Option 82 Message Format, Analysis. DHCP Snooping Option 82 Injection &amp; Removal Method, Trusted – Untrusted Switch Ports">DHCP Option 82 Message Format, Analysis. DHCP Snooping Option 82 Injection &amp; Removal Method, Trusted – Untrusted Switch Ports</a>" for in-depth analysis of DHCP Option 82.</p>
<h2 style="text-align: left;"><a name="summary">Summary</a></h2>
<p style="text-align: justify;"><strong>Man-in-the-Middle attacks</strong> and network disruptions from <strong>rogue DHCP servers</strong> is a serious network security threat organizations are faced to deal with on a daily basis. In this article we explained how <strong>Man-in-the-Middle attacks</strong> allow attackers to gain <strong>visibility</strong> of your network and can potentially lead exposing <strong>sensitive data</strong> flowing between servers and clients. We explained <strong>what DHCP Snooping is</strong>, examined <strong>how DHCP Snooping works</strong> and how it can effectively <strong>protect the network</strong> from these attacks. We looked at the type of <strong>traffic dropped</strong> by DHCP snooping, <strong>violation warnings</strong> and also explained the purpose and operation of the <strong>DHCP Snooping Binding Database</strong>. Finally we touched on the <a href="https://www.firewall.cx/cisco/cisco-switches/dhcp-snooping-option-82-relay-agent-message-format-analysis.html" title="DHCP Snooping Option 82"><strong>DHCP Snooping Option 82</strong></a>.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Wed, 20 Jun 2018 08:38:47 +1000</pubDate>
		</item>
		<item>
			<title>Cisco Nexus 7000 Series Module Shutdown and Removal Procedure</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-nexus-7000-module-shutdown-replacement-removal.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-nexus-7000-module-shutdown-replacement-removal.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-1a.jpg" alt="cisco-nexus-7000-module-shutdown-replacement-removal-1a" style="margin: 7px; float: left;" title="Cisco Nexus Module Removal" />This article explains the procedure that should be followed to correctly <strong>shutdown/powerdown</strong> a <strong>Cisco Nexus 7000 series module</strong> and remove it from the chassis. We also include important tips that will help ensure you avoid common problems and mistakes during the removal procedure.</p>
<p style="text-align: justify;">The <strong>Nexus 7010</strong> is one of the larger <strong>data center switches</strong> in the <strong>Nexus portfolio</strong> found in most <strong>enterprise-class data centers</strong>. Even though the Nexus 7000 series switches have been in the market since 2008 there are still a lot of data centers powering their core infrastructure using the well-known <strong>Cisco Catalyst series</strong>.</p>
<p style="text-align: justify;">The Nexus 7000 series switches are designed for continuous operation, which means all parts are hot-swappable thereby eliminating downtime for upgrades or parts replacement.</p>
<p style="text-align: justify;">The process covered in this installation guide can be used with all <strong>Nexus 7000 series modules</strong> including:</p>
<ul>
<li style="text-align: left;">48-port 10/100/1000 Ethernet module (N7K-M148GT-11)</li>
<li style="text-align: left;">48-port 10/100/1000 Ethernet module with XL option (N7K-M148GT-11L)</li>
<li style="text-align: left;">48-port 1-Gigabit Ethernet I/O module (N7K-M148GS-11)</li>
<li style="text-align: left;">48-port 1-Gigabit Ethernet I/O module with XL option (N7K-M148GS-11L)</li>
<li style="text-align: left;">48-port 1-/10-Gigabit Ethernet I/O modules with XL (N7K-F248XP-25 and N7K-F248XP-25E)</li>
<li style="text-align: left;">32-port 10-Gigabit Ethernet I/O module (N7K-M132XP-12)</li>
<li style="text-align: left;">32-port 10-Gigabit Ethernet I/O module with XL option (N7K-M132XP-12L)</li>
<li style="text-align: left;">32-port 1- and 10-Gigabit Ethernet I/O module (N7K-F132XP-15)</li>
<li style="text-align: left;">8-port 10-Gigabit Ethernet I/O module with XL option (N7K-M108X2-12L)</li>
</ul>
<h2 style="text-align: left;">Step 1. Nexus 7000 Module Shutdown - Poweroff</h2>
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">The <strong>Nexus 7000 series modules</strong> are <strong>hot swappable</strong> and support <strong>automatic shutdown</strong> when ejected, however, it is always advisable to <strong>poweroff</strong> the module before removing it. If the module is to be removed or swapped with a different module type it is advisable to also ensure <strong>all configuration associated with the old module’s ports is cleared</strong> and <strong>ports are shutdown</strong> before the module is removed.</p>
<p style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;">Locate the slot number of the module to be uninstalled and remove all attached cables. It is very important no cables are attached to the module and there is enough space on both sides of the module. In our example we’ll be removing the module located in <strong>slot No.9</strong>:</p>
<p class="box-info" style="margin-bottom: 0.0001pt; text-align: justify; line-height: normal;"><strong>Click</strong> on the images to enlarge</p>
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center"><a href="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-1L.jpg" target="_blank" type="image/jpeg" class="jcepopup" title="Nexus 7010 with module in Slot No.9 to be removed" data-mediabox="1" data-mediabox-title="Nexus 7010 with module in Slot No.9 to be removed" data-mediabox-type="image/jpeg"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-1.jpg" alt="cisco-nexus-7000-module-shutdown-replacement-removal-1" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Nexus 7000 Series Module removal" /></a>Figure 1. Nexus 7010 with module No.9 to be removed.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">Issuing the <strong>show module 9</strong> command will reveal the module’s model, status, capabilities, serial number and diagnostic status:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">FCX_NEXUS_7010# <strong><strong>show module 9</strong></strong>
<div>&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Mod Ports Module-Type&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; Model&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Status</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">--- ----- -----------------------------------&nbsp;&nbsp; ---------------&nbsp; ----------</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">9&nbsp;&nbsp; 48&nbsp;&nbsp;&nbsp; 10/100/1000 Mbps Ethernet XL Module&nbsp;&nbsp; N7K-M148GT-11L &nbsp;&nbsp; ok</div>
<div>&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Mod Sw&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hw</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">--- -------------- ------</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">9&nbsp;&nbsp; 6.0(2)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1.0&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div>&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Mod MAC-Address(es)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Serial-Num</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">--- --------------------------------------&nbsp; ----------</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">9&nbsp;&nbsp; e8-b7-48-d4-75-00 to e8-b7-48-d4-75-34&nbsp; JAF1327BFHA</div>
<div>&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Mod Online Diag Status</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">--- ------------------</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">9&nbsp;&nbsp; Pass</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Chassis Ejector Support: Enabled</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Ejector Status:</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Top ejector CLOSE, Bottom ejector CLOSE, Module HW does support ejector based shutdown.</div>
</div>
<p style="margin-bottom: 0.0001pt; line-height: normal;">The output of the show module is also reflected on the module’s status LED. A <strong>green Status LED</strong>, as shown in the photo on the left, tells us that the module is currently online (powered on) and operating.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">The <strong>orange</strong> <strong>interface LEDs</strong> confirm that the interfaces are in a shutdown state.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">The specific card we are about to remove is a <strong>48-port 10/100/1000 Ethernet card</strong> (<strong>N7K-M148GT-11L</strong>):</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;"><a href="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-2L.jpg" target="_blank" type="image/jpeg" class="jcepopup" title="Nexus 7000 Module Status and Interface LEDs" data-mediabox="1" data-mediabox-title="Nexus 7000 Module Status and Interface LEDs" data-mediabox-type="image/jpeg"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-2.jpg" alt="Nexus 7000 Module Status and Interface LEDs" style="display: block; margin-left: auto; margin-right: auto;" title="Nexus 7000 Module Status and Interface LEDs" /></a>Figure 2. Nexus 7000 Module Status and Interface LEDs</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">Now proceed to power off the module using the <strong>poweroff module 9</strong> command:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">FCX_NEXUS_7010# <strong>configure terminal<br /></strong>FCX_NEXUS_7010 (config)#<strong> <strong>poweroff module 9</strong></strong></div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">&nbsp;</div>
<p style="margin-bottom: 0.0001pt; line-height: normal;">Once the <strong>poweroff</strong> command has been executed the Nexus will begin powering off the module and removing all associated interfaces from the configuration:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">2016 Oct 15 11:42:50 FCX_NEXUS_7010 %PLATFORM-2-PFM_MODULE_POWER_OFF: Manual power-off of Module 9 from Command Line Interface
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">2016 Oct 15 11:42:51 FCX_NEXUS_7010 %ETHPORT-5-IF_DOWN_INTERFACE_REMOVED: Interface Ethernet9/1 is down (Interface removed)</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">2016 Oct 15 11:42:51 FCX_NEXUS_7010 %ETHPORT-5-IF_DOWN_INTERFACE_REMOVED: Interface Ethernet9/2 is down (Interface removed)</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">….. output omitted</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">2016 Oct 15 11:42:51 FCX_NEXUS_7010 %ETHPORT-5-IF_DOWN_INTERFACE_REMOVED: Interface Ethernet9/48 is down (Interface removed)</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">2016 Oct 15 11:42:51 FCX_NEXUS_7010 %PLATFORM-2-MOD_PWRDN: Module 9 powered down (Serial number JAF1327BFHA)</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">2016 Oct 15 11:42:51 FCX_NEXUS_7010 %PLATFORM-5-MOD_STATUS: Module 9 current-status is MOD_STATUS_CONFIGPOWERED_DOWN</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">2016 Oct 15 11:42:51 FCX_NEXUS_7010 %PLATFORM-5-MOD_STATUS: <strong>Module 9</strong> current-status is <strong>MOD_STATUS_POWERED_DOWN</strong></div>
</div>
<p style="margin-bottom: 0.0001pt; line-height: normal;">Notice the final message confirms that <strong>module 9</strong> is now <strong>powered down</strong>.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">When looking at the module notice the change in its LEDs. The <strong>Status LED</strong> will be now <strong>flashing red</strong>, while all <strong>interface LEDs</strong> are <strong>off</strong>:</p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center"><a href="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-3L.jpg" target="_blank" type="image/jpeg" class="jcepopup" title="Nexus 7000 module powered down. Status LED flashing red" data-mediabox="1" data-mediabox-title="Nexus 7000 module powered down. Status LED flashing red" data-mediabox-type="image/jpeg"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-3.jpg" alt="Nexus 7000 module powered down. Status LED flashing red" title="Nexus 7000 module powered down. Status LED flashing red" /></a></p>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: center;" align="center">Figure 3. Nexus 7000 module powered down. Status LED flashing red</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">Using the <strong>show module 9</strong> command we can verify the module’s powered-down status:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">FCX_NEXUS_7010(config)# <strong><strong>show module 9</strong></strong>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Mod Ports Module-Type&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Model&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; Status</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">--- ----- ----------------------------------- &nbsp; --------------- ----------</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">9&nbsp;&nbsp; 48&nbsp;&nbsp;&nbsp;&nbsp; 10/100/1000 Mbps Ethernet XL Module&nbsp; N7K-M148GT-11L&nbsp;&nbsp; <strong>powered-dn</strong></div>
<div>&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Mod&nbsp; Power-Status&nbsp; Reason</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">---&nbsp; ------------&nbsp; ---------------------------</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">9&nbsp;&nbsp;&nbsp; powered-dn&nbsp;&nbsp;&nbsp; <strong>Configured Power down</strong></div>
<div>&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Mod Sw&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Hw</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">--- --------------&nbsp;&nbsp; ------</div>
<div>&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Mod MAC-Address(es)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Serial-Num</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">--- --------------------------------------&nbsp; ----------</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">9&nbsp;&nbsp; 00-00-00-00-00-00 to 00-00-00-00-00-00&nbsp; JAF1327BFHA</div>
<div>&nbsp;</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Mod Online Diag Status</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">--- ------------------</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Chassis Ejector Support: Enabled</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Ejector Status:</div>
<div style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">Top ejector CLOSE, Bottom ejector CLOSE, Module HW does support ejector based shutdown.</div>
</div>
<h2>Step 2. Removing A Nexus 7000 Module</h2>
<p style="margin-bottom: 0.0001pt; line-height: normal;">With the module powered down and the <strong>Status LED</strong> flashing red we are now able to remove the module from its slot.</p>
<p class="box-warning" style="margin-bottom: 0.0001pt; line-height: normal;">Note: Ensure you’re using an antistatic wrist band that has been appropriately grounded.</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">It’s now time to leave the keyboard, grab a screw driver and get our hands dirty:)</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">First unscrew the two captive screws located at each end of the module as shown below. A Philips or straight head screw driver will be adequate for the job:</p>
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center"><a href="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-4L.jpg" target="_blank" type="image/jpeg" class="jcepopup" title="Unscrewing Nexus 7000 module captive screws" data-mediabox="1" data-mediabox-title="Unscrewing Nexus 7000 module captive screws" data-mediabox-type="image/jpeg"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-4.jpg" alt="cisco-nexus-7000-module-shutdown-replacement-removal-4" style="display: block; margin-left: auto; margin-right: auto;" title="Unscrewing Nexus 7000 module captive screws" /></a> Figure 4. Unscrewing Nexus 7000 module captive screws</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">Next, using your fingers from both hands <strong>press</strong> <strong>simultaneously</strong> the <strong>ejector buttons</strong> located at each end of the module, right next to the captive screws, as shown below:</p>
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center"><a href="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-5L.jpg" target="_blank" type="image/jpeg" class="jcepopup" title="Pressing the ejector buttons on a Nexus 7000 module" data-mediabox="1" data-mediabox-title="Pressing the ejector buttons on a Nexus 7000 module" data-mediabox-type="image/jpeg"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-5.jpg" alt="Pressing the ejector buttons on a Nexus 7000 module" width="325" height="350" style="display: block; margin-left: auto; margin-right: auto;" title="Pressing the ejector buttons on a Nexus 7000 module" /></a> Figure 5. Pressing the ejector buttons on a Nexus 7000 module</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">When pressing the <strong>ejector buttons </strong>(No.1 below), two things will occur:</p>
<ul>
<li>The <strong>ejector levers</strong> will swing into the <strong>OPEN position</strong> (No.2 below)</li>
<li>The Nexus 7000 switch will generate a message notifying that the ejectors are in the <strong>OPEN position</strong></li>
</ul>
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center">&nbsp;<a href="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-6L.jpg" target="_blank" type="image/jpeg" class="jcepopup" title="Nexus 7000 Module ejector lever in OPEN position after pressing the ejector button" data-mediabox="1" data-mediabox-title="Nexus 7000 Module ejector lever in OPEN position after pressing the ejector button" data-mediabox-type="image/jpeg"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-6.jpg" alt="Nexus 7000 Module ejector lever in OPEN position after pressing the ejector button" style="display: block; margin-left: auto; margin-right: auto;" title="Nexus 7000 Module ejector lever in OPEN position after pressing the ejector button" /></a>Figure 6. Nexus 7000 Module ejector lever in OPEN position after pressing the ejector button</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">Following is the message generated by the Nexus 7000 operating system after pressing the ejector buttons:</p>
<p class="box-content" style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">2016 Oct 15 11:48:39 FCX_NEXUS_7010 %PLATFORM-3-EJECTOR_STAT_CHANGED: Ejectors' status in slot 9 has changed, <strong>Top Ejector</strong> is <strong>OPEN</strong>, <strong>Bottom Ejector</strong> is <strong>OPEN</strong></p>
<p>Now <strong>simultaneously swing open both ejector levers</strong> to unseat the module (No. 3 in the photo below) and with a hand on each ejector, <strong>pull the module part</strong> way out of its slot in the chassis (No.4 in the photo below):</p>
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center"><a href="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-7L.jpg" target="_blank" type="image/jpeg" class="jcepopup" title="Nexus 7000 module – Swinging the ejector levers and pulling the module out" data-mediabox="1" data-mediabox-title="Nexus 7000 module – Swinging the ejector levers and pulling the module out" data-mediabox-type="image/jpeg"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-7.jpg" alt="Nexus 7000 module – Swinging the ejector levers and pulling the module out" style="display: block; margin-left: auto; margin-right: auto;" title="Nexus 7000 module – Swinging the ejector levers and pulling the module out" /></a> Figure 7. Nexus 7000 module – Swinging the ejector levers and pulling the module out</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">As soon as the module disconnects from the Nexus backplane the system will produce a notification message:</p>
<p class="box-content" style="margin-bottom: 0.0001pt; line-height: normal; text-align: left;">2016 Oct 15 11:50:07 FCX_NEXUS_7010 %PLATFORM-2-MOD_REMOVE: <strong>Module 9 removed</strong> (Serial number JAF1327BFHA)</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">When the module is almost out grasp the front edge with one hand and place your other hand under the module to support its weight without touching the module’s circuitry:</p>
<p style="margin-bottom: 0.0001pt; text-align: center; line-height: normal;" align="center"><a href="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-8L.jpg" target="_blank" type="image/jpeg" class="jcepopup" title="Proper handling during the removal of the Nexus 7000 module" data-mediabox="1" data-mediabox-title="Proper handling during the removal of the Nexus 7000 module" data-mediabox-type="image/jpeg"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-8.jpg" alt="Proper handling during the removal of the Nexus 7000 module" style="display: block; margin-left: auto; margin-right: auto;" title="Proper handling during the removal of the Nexus 7000 module" /></a>Figure 8. Proper handling during the removal of the Nexus 7000 module</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">Once the module has been removed from the slot place it inside an antistatic bag.</p>
<p class="box-warning" style="text-align: justify;">If using a disposable anti-static wrist strap <strong>take extra caution</strong> as the fans inside the Nexus 7000 series chassis create strong airflow capable of pulling in lightweight items as shown in the photo below.</p>
<p style="text-align: center;"><a href="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-9L.jpg" target="_blank" type="image/jpeg" class="jcepopup" title="The Nexus 7000 airflow is strong enough to pull light items inside the empty slot" data-mediabox="1" data-mediabox-title="The Nexus 7000 airflow is strong enough to pull light items inside the empty slot" data-mediabox-type="image/jpeg"><img src="https://www.firewall.cx/images/stories/cisco-nexus-7000-module-shutdown-replacement-removal-9.jpg" alt="The Nexus 7000 airflow is strong enough to pull light items inside the empty slot" style="display: block; margin-left: auto; margin-right: auto;" title="The Nexus 7000 airflow is strong enough to pull light items inside the empty slot" /></a>Figure 9. The Nexus 7000 airflow is strong enough to pull light items inside the empty slot</p>
<p style="margin-bottom: 0.0001pt; line-height: normal;">Cisco advises not to leave the slot open for a long as it can disrupt the system airflow causing the system to overheat and shut down. This, however, should not be a problem in a properly cooled data center.</p>
<h2>Conclusion</h2>
<p style="margin-bottom: 0.0001pt; line-height: normal; text-align: justify;"><strong>Removing a module</strong> from a <strong>Nexus switch</strong> is a very delicate process. Special care must be taken to ensure the slot’s configuration is cleared, the module is <strong>powered down</strong> and safely removed using an <strong>anti-static wrist strap</strong>. Future articles will cover the <strong>installation</strong> of <strong>modules</strong> on Nexus 7000 data center switches.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Tue, 18 Oct 2016 16:18:20 +1100</pubDate>
		</item>
		<item>
			<title>Spanning Tree BPDU Guard and Errdisable Interface Automatic Recovery</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/spanning-tree-protocol-bpdu-guard-deployment-configuration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/spanning-tree-protocol-bpdu-guard-deployment-configuration.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Running <a href="https://www.firewall.cx/networking/network-protocols/spanning-tree-protocol.html" target="_blank" title="Spanning Tree Protocol">Spanning Tree Protocol</a> (STP) in a large network environment can be a challenging task especially when features/enhancements such as <strong>BPDU Filter</strong> and <strong>BPDU Guard</strong> need to be configured to help STP adapt to the network infrastructure requirements.</p>
<p style="text-align: justify;">The key to a successful STP deployment is understanding how each STP feature should be used and implemented.</p>
<h2 style="text-align: justify;">Understanding &amp; Configuring BPDU Guard</h2>
<p style="text-align: justify;"><strong>BPDU Guard</strong> is an STP enhancement which, when enabled, will place a port in the <strong>errdisable</strong> mode when it receives any BPDU packet from that port.</p>
<p style="text-align: justify;"><strong>BPDU Guard</strong> is usually configured on access layer ports where we are not expecting to see any BPDU packets arriving from devices connected to these ports e.g computers, printers, IP phones or other user-end devices.</p>
<p style="text-align: justify;">Ports used as uplinks or downlinks to other switches should <strong>not</strong> have <strong>BPDU Guard enabled</strong> as these are more likely to have BPDU packets transmitted and received as switches actively monitor for network loops.</p>
<p style="text-align: justify;"><strong>BPDU Guard</strong> can be configured either in <strong>Global mode</strong> or <strong>Interface mode</strong>.</p>
<p style="text-align: justify;">When configured in <strong>Global mode</strong> the feature is <strong>enabled globally</strong> for all switch ports configured with <strong>port-fast configuration</strong>. <strong>Port-Fast</strong> is an STP feature configured at each individual port that forces the port to go <strong>directly into a forwarding state</strong> rather than through the normal STP states (Listening, Learning, Forwarding).</p>
<p style="text-align: justify;">While <strong>port-fast</strong> is a very handy feature that forces a network port to transition immediately to the forwarding state (similar to an unmanaged switch), it must be used with caution as STP won’t be able to immediately detect a network loop through a <strong>Port-Fast enabled port</strong>.</p>
<p style="text-align: justify;">To configure <strong>BPDU Guard</strong> in <strong>Global mode</strong> use the <strong>spanning-tree portfast bpduguard default</strong> command in <strong>Global Configuration Mode</strong>:</p>
<p class="box-content" style="text-align: left;">SW2(config)# <strong>spanning-tree portfast bpduguard default</strong></p>
<p style="text-align: justify;">To configure <strong>BPDU Guard</strong> in <strong>Interface mode</strong> use the <strong>spanning-tree bpduguard enable</strong> command under the interface:</p>
<p class="box-content" style="text-align: left;">SW2(config-if)# <strong>spanning-tree bpduguard enable</strong></p>
<p style="text-align: justify;"><strong>Note:</strong> It is important to keep in mind that if the interface is configured as an <strong><a href="https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html" target="_blank" title="VLAN Access Ports">access port</a>,</strong> with <strong>port-fast enabled,</strong> and <strong>receives a BPDU packet</strong> it will automatically be <strong>disabled</strong> and placed in an <strong>errdisabled state</strong>.</p>
<p style="text-align: justify;">To help illustrate how BPDU Guard works, we’ve configured <strong>port G1/0/1</strong> on our 3750-X as an access link with <strong>port-fast</strong> and <strong>BPDU Guard</strong> enabled:</p>
<p style="text-align: center;" align="center"><img src="https://www.firewall.cx/images/stories/spanning-tree-protocol-bpdu-guard-deployment-configuration-1.png" alt="Spanning Tree BPDU Guard configuration and example" title="Spanning Tree BPDU Guard configuration and example" /></p>
<p style="text-align: center;" align="center">Figure 1. Spanning Tree BPDU Guard configuration and example</p>
<div class="box-content"><strong>interface GigabitEthernet1/0/1</strong>
<div>&nbsp;switchport mode access</div>
<div>&nbsp;switchport access vlan 2</div>
<div>&nbsp;spanning-tree portfast</div>
<div>&nbsp;spanning-tree bpduguard enable</div>
</div>
<p style="margin-bottom: 0.0001pt; text-align: justify;">Next, we connect another switch (rogue switch) running spanning tree protocol to port G1/0/1 on SW2. As soon as a BPDU packet is received on G1/0/1, here’s how SW2 reacted:</p>
<div style="text-align: left;">&nbsp;</div>
<div class="box-warning">*Oct 5 02:41:21.821: %SPANTREE-2-BLOCK_BPDUGUARD: Received BPDU on port Gi1/0/1 with BPDU Guard enabled. <strong>Disabling port</strong>.
<div style="text-align: justify;">*Oct 5 02:41:21.830: %PM-4-ERR_DISABLE: bpduguard error detected on Gi1/0/1, putting Gi1/0/1 in <strong>err-disable state</strong></div>
<div style="text-align: justify;">*Oct 5 02:41:22.803: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet1/0/1, changed state to down</div>
<div style="text-align: justify;">*Oct 5 02:41:23.835: %LINK-3-UPDOWN: Interface GigabitEthernet1/0/1, changed state to down</div>
</div>
<p style="text-align: justify;">As expected, the port was automatically disabled by the spanning tree protocol.</p>
<p>Note: If interface G1/0/1 was configured as a <strong><a href="https://www.firewall.cx/networking/vlan-networks/vlan-access-trunk-links.html" target="_blank" title="VLAN Trunk Port">Trunk Port</a></strong> and received a <strong>BPDU packet</strong>, it would <strong>not be disabled</strong>.</p>
<h2 style="text-align: justify;">Recovery From Disabled Port Due To BPDU Guard</h2>
<p style="margin-bottom: 0.0001pt; text-align: justify;">There are many ways to recover from a port that has been placed in the <strong>errdisabled state</strong> and the most typical way used by engineers today is to issue the <strong>shutdown</strong> command followed by the <strong>no shutdown</strong> command directly under the interface’s configuration.<strong> <br /></strong></p>
<p style="margin-bottom: 0.0001pt; text-align: justify;"><a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-errdisable-autorecovery.html" target="_blank" title="Automatic recovery of errdisabled ports">Automatic recovery of the errdisabled port</a> can also be configured on the Cisco Catalyst switch. This handy feature will prevent the port from being permanently disabled, however, it means that if the unwanted condition of the port receiving a BPDU packet is continuously met, the port will flap between the <strong>up</strong> and <strong>errdisabled</strong> state.</p>
<p>For this reason, it is advised to use the <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-errdisable-autorecovery.html" target="_blank" title="automatic errdisable recovery feature">automatic errdisable recovery feature</a> only when absolutely necessary e.g for a remote switch that is difficult to visit.</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: left;">SW2(config)# <strong>errdisable recovery cause bpduguard</strong><br />SW2(config)# <strong>errdisable recovery interval 30</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<p style="text-align: justify;">The above global configuration will recover an <strong>errdisabled port</strong>, due to <strong>bpduguard</strong>, automatically every 30 seconds.</p>
<h2>Summary</h2>
<p style="text-align: justify;">A number of enhancements have been introduced into the <strong>Spanning Tree Protocol</strong> to make it flexible for today’s increasingly complex and demanding networks. Using <strong>enhanced STP features</strong> like <strong>BPDUGuard</strong> helps <strong>protect the network from rogue switches</strong> and <strong>avoid unwanted STP topology changes,</strong> however, it is important to understand the <strong>correct usage of BPDUGuard</strong> to ensure it’s correctly configured and placed in the STP topology.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Sun, 09 Oct 2016 12:01:02 +1100</pubDate>
		</item>
		<item>
			<title>How to Disable or Enable the Password Recovery Procedure on Cisco Catalyst Switches. Enhance Your Catalyst Switch Security – Protect Configuration Files</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-catalyst-switches-disable-enable-password-recovery-mechanism.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-catalyst-switches-disable-enable-password-recovery-mechanism.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-catalyst-switches-disable-enable-password-recovery-mechanism-1.jpg" alt="disable or enable password recovery on Cisco Catalyst switches" style="margin: 7px; float: left;" />Our previous article shows how to perform a <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-catalyst-3750-x-3560-x-password-recovery.html" target="_blank" title="password recovery on the Cisco Catalyst switches">password recovery on the Cisco Catalyst switches</a>. This article will now explain how to <strong>disable</strong> or <strong>enable</strong> the <strong>Cisco password recovery service</strong> allowing network engineers and administrators to further <strong>secure their Cisco equipment</strong>.</p>
<p style="text-align: justify;">The password recovery mechanism is <strong>enabled by default</strong> which means anyone with physical access to the switch is able to initiate the process and gain access to the switch or stack’s configuration. In some environments this might be a major security concern which is why Cisco provides the option to <strong>disable the password recovery mechanism</strong>.</p>
<p style="text-align: justify;">In cases where the mechanism is disabled the only option available to gain access to the switch is to delete its startup configuration.</p>
<h2 style="text-align: left;">How To Disable or Enable The Password Recovery Service On Cisco Catalyst Switches</h2>
<p style="text-align: justify;">Disabling the password recovery mechanism is achieved by using the <strong>no service password-recovery</strong> command in global configuration mode as shown below:</p>
<p class="box-content" style="text-align: justify;">3750-X-Stack1 (config) # <strong>no service password-recovery</strong></p>
<p style="text-align: justify;">Note: When applying the <strong>no service password-recovery</strong> command on the stack master, the command is propagated to all stack members, making it impossible to perform a password recovery on any switch part of a stack.</p>
<p style="text-align: justify;">When trying to initiate the password recovery process on a switch or stack that has the mechanism disabled, the user will receive the following message:</p>
<p class="box-hint" style="text-align: justify;">The password-recovery mechanism has been triggered, but is currently disabled. Access to the boot loader prompt through the password-recovery mechanism is disallowed at this point. However, if you agree to let the system be reset back to the default system configuration, access to the boot loader prompt can still be allowed.<br /> <br /><strong>Would you like to reset the system back to the default configuration (y/n)?</strong></p>
<p style="text-align: justify;">Answering “<strong>y</strong>” at the prompt will wipe the current startup configuration from the switch.</p>
<p style="text-align: justify;">To <strong>enable the password recovery mechanism</strong>, simply enter <strong>service password-recovery</strong> in global configuration mode:</p>
<p class="box-content" style="text-align: justify;">3750-X-Stack1 (config) #<strong> service password-recovery</strong></p>
<p style="text-align: justify;">Once all configuration changes are complete, don’t forget to <strong>save</strong> the configuration.</p>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">This article explained the usage of the Cisco password recovery mechanism on Cisco Catalyst switches. We showed how network engineers and administrators can <strong>disable the recovery mechanism</strong> to increase their security and stop unauthorized people from gaining access to their configuration files and even user account credentials. More technical articles on Cisco Catalyst switches can be found in our Cisco Catalyst Switches section.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Sat, 27 Aug 2016 18:12:42 +1000</pubDate>
		</item>
		<item>
			<title>Password Recovery / Password Reset Procedure for Catalyst 3750-X &amp; 3560-X Switches - Single or Stack Member Configuration</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-catalyst-3750-x-3560-x-password-recovery.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-catalyst-3750-x-3560-x-password-recovery.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-catalyst-3750-x-3560-x-password-recovery-1.jpg" alt="cisco-catalyst-3750-x-3560-x-password-recovery-1" style="margin: 7px; float: left;" title="Cisco Catalyst 3750-X 3560 Password Recovery" />This article shows how to <strong>reset a password</strong> on a <strong>Cisco Catalyst 3750-X</strong> (stacked or single unit) and <strong>Cisco Catalyst 3560-x</strong> switch without losing its startup configuration. The <strong>Cisco password recovery procedure</strong> involves interrupting the switch’s normal boot procedure, renaming the <strong>flash:config.text</strong> (that’s the startup-config file for switches) to something else e.g <strong>flash:config.text.old</strong> so that the configuration file is skipped during bootup.</p>
<p style="text-align: justify;">Once the switch has loaded its operating system we can enter <strong>privileged-exec mode</strong>, rename back the <strong>flash:config.text.old</strong> to <strong>flash:config.text </strong>(<strong>startup-config</strong>), copy the <strong>startup-config</strong> file to memory (DRAM), make the necessary password changes and save the configuration.</p>
<h2 style="text-align: justify;">Password Recovery – Reset Procedure</h2>
<p style="text-align: justify;">The procedure described below assumes the <strong>password recovery mechanism is enabled</strong> (by default, it is) and there is physical access to the switch or stack (3750-X only).</p>
<p style="text-align: justify;"><strong>Note</strong>: If this procedure is being performed on a 3750-X stack, it is important to understand that all switches participating in the stack should be <strong>powered off</strong> and <strong>only the Master switch is powered on</strong> when initiating the password recovery procedure. The <strong>Master switch</strong> can be easily identified by searching for the switch with the green “Master” LED on.</p>
<p style="text-align: justify;"><strong>Step 1</strong></p>
<p style="text-align: justify;">On a 3750-X switch, <strong>Power off</strong> the entire stack or standalone switch. On a Catalyst 3560-X switch, power off the switch. Connect your console cable to the switch – 3750-X Master or the standalone switch.</p>
<p style="text-align: justify;"><strong>Step 2</strong></p>
<p style="text-align: justify;">Reconnect the power to the switch (standalone 3750-X or 3750-X) or stack master (3750-X stack only). Within 10 seconds, <strong>press and hold</strong> the <strong>Mode button</strong> while the <strong>System LED</strong> is <strong>flashing green</strong>. After the <strong>System LED</strong> turns <strong>amber</strong> and then <strong>solid green</strong>, <strong>release</strong> the <strong>Mode button</strong>.</p>
<div style="text-align: justify;">If the process has been followed correctly, the following message should be displayed:</div>
<div class="box-info" style="text-align: justify;">The system has been interrupted prior to initializing the flash file system. The following commands will initialize the flash file system and finish loading the operating system software:
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">flash_init</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">load_helper</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">boot</div>
</div>
<p style="text-align: justify;"><strong>Step 3</strong></p>
<p style="text-align: justify;">Now <strong>initialize</strong> the flash file system, <strong>rename</strong> the <strong>startup configuration</strong> file (<strong>config.text</strong>) and <strong>boot</strong> the IOS:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">switch: <strong><strong>flash_init</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Initializing Flash...</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[2]: 12 files, 1 directories</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[2]: Total bytes : 2097152</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[2]: Bytes used : 755200</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[2]: Bytes available : 1341952</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[2]: mifs fsck took 2 seconds.</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[3]: 0 files, 1 directories</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">.......</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[6]: 455 files, 8 directories</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[6]: Total bytes : 57671680</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[6]: Bytes used : 42235904</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[6]: Bytes available : 15435776</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">mifs[6]: mifs fsck took 48 seconds.</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">...done Initializing Flash.</div>
</div>
<p>Now search for the <strong>startup configuration</strong> file (<strong>config.text</strong>) and rename it:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">switch: <strong><strong>dir flash:</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Directory of flash:/</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;"><strong>2 -rwx 118939 &lt;date&gt; config.text</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">3 -rwx 5656 &lt;date&gt; vlan.dat</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">4 drwx 512 &lt;date&gt; c3750e-universalk9-mz.122-58.SE1</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">459 -rwx 3833 &lt;date&gt; private-config.text</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">460 -rwx 117555 &lt;date&gt; config.text.backup</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">461 -rwx 3833 &lt;date&gt; private-config.text.backup</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">462 -rwx 20437248 &lt;date&gt; c3750e-universalk9-mz.150-2.SE8.bin</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">463 -rwx 15384 &lt;date&gt; multiple-fs</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">15435776 bytes available (42235904 bytes used)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">switch: <strong>rename flash:config.text flash:config.text.old</strong></div>
</div>
<p>We can now boot the switch IOS:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">switch:<strong><strong> boot</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Loading</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">"flash:/c3750e-universalk9-mz.1502.SE8.bin" ...@@@@@@@@@@@@@@@@@@@@@@@@@@ &lt;output omitted&gt;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">POST: PortASIC RingLoopback Tests : Begin</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">POST: PortASIC RingLoopback Tests : End, Status Passed</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">extracting front_end/front_end_ucode_info (309 bytes)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">SM: Detected stack cables at PORT1 PORT2</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Waiting for Stack Master Election...</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">SM: Waiting for other switches in stack to boot...</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">######################################################</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Election Complete</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Switch 1 booting as Master</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Waiting for Port download...Complete</div>
</div>
<p style="margin-bottom: 0.0001pt; text-align: justify;"><strong>Step 4</strong></p>
<p style="margin-bottom: 0.0001pt; text-align: justify;">At this point, the switch has booted bypassing its configuration file. At the prompt, type <strong>enable</strong> to enter <strong>privileged exec mode</strong> and <strong>rename back</strong> the <strong>config.text.old</strong> file:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">Switch&gt; <strong>enable<br /></strong>Switch# <strong><strong>rename flash:config.text.old flash:config.text</strong> <br /></strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<p class="box-warning" style="margin-bottom: 0.0001pt; text-align: justify;"><strong>3750-X Note:</strong> At this point, power on any 3750-X stack members and wait until they are loaded. This is a very important step to ensure no configuration is lost.</p>
<p style="margin-bottom: 0.0001pt; text-align: justify;"><strong>Step 5</strong></p>
<p style="text-align: justify;">Finally, load the <strong>startup configuration</strong> of the master or standalone switch to memory and make the necessary changes to the <strong>enable secret / password</strong> or <strong>user account</strong> in question:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">Switch# <strong><strong>copy flash:config.text system:running-config</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Source filename [config.text]? (hit enter)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Destination filename [running-config]? (hit enter)</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">Wait a moment as the switch copies the configuration file to its DRAM memory.</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">3750-X-Stack1# <strong>configure terminal</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">3750-X-Stack1 (config) # <strong>enable secret Firewall.cx!</strong></div>
</div>
<p style="margin-bottom: 0.0001pt; text-align: justify;">If you require to change the password to an account e.g admin, use the following command:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">3750-X-Stack1 (config) # <strong>username admin privilege 15 secret Firewall.cx4831!<br /></strong>3750-X-Stack1 (config) # <strong>exit</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">&nbsp;</div>
<p style="margin-bottom: 0.0001pt; text-align: justify;"><strong>Step 6</strong></p>
<p style="margin-bottom: 0.0001pt; text-align: justify;">Depending on the switch model and configuration, it is possible that after executing the password recovery procedure VLAN interfaces might be in a <strong>shutdown state</strong>. Issue the <strong>show running-config</strong> command and search for any <strong>shutdown</strong> command under the vlan interfaces. If found, enter the interface and issue the <strong>no shutdown</strong> command to ensure the interface is enabled.</p>
<p style="margin-bottom: 0.0001pt; text-align: justify;">When done, save your configuration and reload the switch or stack:</p>
<div class="box-content" style="margin-bottom: 0.0001pt; text-align: justify;">3750-X-Stack1 (config) # <strong><strong>copy running-config startup-config</strong></strong>
<div style="margin-bottom: 0.0001pt; text-align: justify;">3750-X-Stack1 (config) # <strong>exit</strong></div>
<div style="margin-bottom: 0.0001pt; text-align: justify;">3750-X-Stack1 # <strong>reload</strong></div>
</div>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">This article showed in detailed steps the <strong>password recovery process</strong> for <strong>Cisco Catalyst 3560-X and 3750-X switches</strong> including standalone or stacked 3750-Xs. We explained how to safely gain access to the switch configuration and change the <strong>enable/secret password</strong> and/or administrator user accounts passwords. More technical and security articles on Catalyst switch can be found at our <a href="https://www.firewall.cx/cisco/cisco-switches.html" title="Cisco Catalyst Switches Section">Cisco Catalyst Switches Section</a>.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Mon, 22 Aug 2016 15:53:51 +1000</pubDate>
		</item>
		<item>
			<title>Resolving Cisco Switch &amp; Router ‘DHCP Server Pool Exhausted-Empty’ Error – Client IP Assignment Failure</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switch-router-dhcp-server-conflicts.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switch-router-dhcp-server-conflicts.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-switch-router-dhcp-server-conflicts-1.png" alt="cisco-switch-router-dhcp-server-conflicts-1" style="margin: 7px; float: left;" title="Cisco Router &amp; Switch DHCP Server" />In previous articles, we showed how it is possible to <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-dhcp-config.html" target="_blank" title="Configure DHCP Server on Cisco Router">configure a Cisco router</a> or <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-dhcp-config.html" target="_blank" title="Configure DHCP Server on Cisco Catalyst Switch">Catalyst switch</a> to provide DHCP server services to network clients. Everything usually works without a problem, however there are times when the <strong>Cisco DHCP server stops assigning IP addresses</strong> and we need to look into the issue and resolve it as quickly as possible. System messages such as ‘<strong>POOL EXHAUSTED</strong>’, ‘<strong>ASSIGNMENT FAILURE</strong>’ &amp; ‘<strong>address pool Guest-VLAN is empty</strong>’ provide some basic information, however further investigation is required to identify the real cause.</p>
<p style="text-align: justify;">Small-sized networks usually have DHCP services configured on their <a href="https://www.firewall.cx/cisco/cisco-routers.html" target="_blank" title="Cisco Router Technical KnowledgeBase">Cisco router</a>, while large-sized networks (with multiple VLANs) assign DHCP services to their backbone layer-3 switch (Catalyst 6500, 4500, 3750 etc). The good news is that configuration and debugging commands are identical for both <a href="https://www.firewall.cx/cisco/cisco-switches.html" target="_blank" title="Cisco Switches Technical KnowledgeBase">Cisco Catalyst switches</a> and <a href="https://www.firewall.cx/cisco/cisco-routers.html" target="_blank" title="Cisco Router Technical KnowledgeBase">Cisco routers</a>.</p>
<p style="text-align: justify;">&nbsp;</p>
<h2 style="text-align: justify;">Debugging DHCP Server On Cisco Catalyst Switch &amp; Cisco Router</h2>
<p style="text-align: justify;">The first symptoms of DHCP server issues are users nagging that they cannot connect to the network because they haven’t got an IP address, and that’s where the fun begins.</p>
<p style="text-align: justify;">Assuming no configuration changes have been made to the Cisco DHCP server, the best way to troubleshoot the problem is to <strong>enable debugging</strong> on the dhcp server.&nbsp; The <strong>debug ip dhcp events</strong> &amp; <strong>debug ip dhcp server packets</strong> are useful debugging commands that will help us identify what is happening:</p>
<div class="box-content" style="text-align: justify;">4507R+E# <strong>debug ip dhcp server packets</strong><br />4507R+E# <strong>debug ip dhcp server events</strong><br />Nov&nbsp; 6 13:46:26.742: DHCPD: Sending notification of DISCOVER:<br />Nov&nbsp; 6 13:46:26.742: DHCPD: htype 1 chaddr 34bb.1f9b.17f9<br />Nov&nbsp; 6 13:46:26.742: DHCPD: giaddr = 192.168.7.10<br />Nov&nbsp; 6 13:46:26.742: DHCPD: interface = Vlan7<br />Nov&nbsp; 6 13:46:26.742: DHCPD: class id 426c61636b4265727279<br />Nov&nbsp; 6 13:46:26.742: DHCPD: out_vlan_id 0<br />Nov&nbsp; 6 13:46:26.742: DHCPD: Sending notification of DISCOVER:<br />Nov&nbsp; 6 13:46:26.742: DHCPD: htype 1 chaddr 34bb.1f9b.17f9<br />Nov&nbsp; 6 13:46:26.742: DHCPD: giaddr = 192.168.7.10<br />Nov&nbsp; 6 13:46:26.742: DHCPD: interface = Vlan7<br />Nov&nbsp; 6 13:46:26.742: DHCPD: class id 426c61636b4265727279<br />Nov&nbsp; 6 13:46:26.742: DHCPD: out_vlan_id 0<br />Nov&nbsp; 6 13:46:26.742: DHCPD: subnet [192.168.7.1,192.168.7.254] in <strong>address pool Guest-WiFi-VLAN is empty</strong>.<br />Nov&nbsp; 6 13:46:26.742: DHCPD: Sending notification of <strong>ASSIGNMENT FAILURE</strong>:<br />Nov&nbsp; 6 13:46:26.742: DHCPD: htype 1 chaddr 34bb.1f9b.17f9<br />Nov&nbsp; 6 13:46:26.742: DHCPD: remote id 020a0000c0a8070107000000<br />Nov&nbsp; 6 13:46:26.742: DHCPD: giaddr = 192.168.7.10<br />Nov&nbsp; 6 13:46:26.742: DHCPD: interface = Vlan7<br />Nov&nbsp; 6 13:46:26.742: DHCPD: class id 426c61636b4265727279<br />Nov&nbsp; 6 13:46:26.742: DHCPD: out_vlan_id 0<br />Nov&nbsp; 6 13:46:26.742: DHCPD: Sending notification of <strong>ASSIGNMENT_FAILURE</strong>:<br />Nov&nbsp; 6 13:46:26.742: DHCPD: due to: <strong>POOL EXHAUSTED</strong></div>
<p style="text-align: justify;">The key information provided by our debugging is <strong>highlighted in bold</strong>. This information tells us that our address pool named <strong>Guest-WiFi-VLAN</strong> is the DHCP Pool where we have a problem because the <strong>pool is empty</strong>, which means the DHCP server has no more free IP addresses to assign to new clients.</p>
<p style="text-align: justify;">The next step is to understand why there are no more free IP addresses. A common reason is that there are more clients in the specific VLAN requesting IP addresses, than what the DHCP server can assign. Let’s see if this is the case.</p>
<p style="text-align: justify;">First, we take a look at the configured IP address range for that VLAN/Pool. Note that our Guest VLAN is assigned to VLAN7:</p>
<div class="box-content" style="text-align: justify;">4507R+E# <strong>show run</strong><br />...output omitted....<br />!<br />ip dhcp excluded-address 192.168.7.1 192.168.7.20<br />!<br />ip dhcp pool Guest-WiFi-VLAN<br />&nbsp;network 192.168.7.0 255.255.255.0<br />&nbsp;default-router 192.168.7.1 <br />&nbsp;dns-server 8.8.8.8 8.8.4.4 <br />&nbsp;lease 0 2<br />!<br />…output omitted</div>
<div style="text-align: justify;">Looking at our DHCP server configuration, we’ve reserved the first 20 IP addresses from the Class C network 192.168.7.0, which leaves us with <strong>234 available IP addresses</strong>.&nbsp; At the same time, our DHCP server is configured to provide a <strong>2 hour lease</strong> (lease 0 2) for each IP address. This means that every 2 hours, the DHCP lease is automatically renewed between the DHCP server and client – assuming the client is still connected to the network. If the client is disconnected from the network when the renewal time arrives, the IP address assigned is then released by the DHCP server, moved back into the VLAN’s DHCP pool and made available for assignment to another client.</div>
<p style="text-align: justify;">Let’s check and see how many clients have been assigned an IP address for VLAN7:</p>
<div class="box-content" style="text-align: justify;">4507R+E# <strong>show ip dhcp binding | inc Vlan7</strong><br />IP address&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Client-ID/Hardware address&nbsp;&nbsp; Lease expiration&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Type&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; State&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Interface<br />192.168.7.81&nbsp;&nbsp;&nbsp; 019c.65b0.3760.e3&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Nov 06 2014 05:19 PM&nbsp;&nbsp;&nbsp; Automatic&nbsp; Active&nbsp;&nbsp;&nbsp;&nbsp; Vlan7<br />192.168.7.92&nbsp;&nbsp;&nbsp; 012c.2997.58a3.b5&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; Nov 06 2014 05:42 PM&nbsp;&nbsp;&nbsp; Automatic&nbsp; Active&nbsp;&nbsp;&nbsp;&nbsp; Vlan7<br />192.168.7.134&nbsp;&nbsp; 0114.8fc6.bd62.f2&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Nov 06 2014 04:41 PM&nbsp;&nbsp;&nbsp; Automatic&nbsp; Active&nbsp;&nbsp;&nbsp;&nbsp; Vlan7</div>
<div style="text-align: justify;">&nbsp;We should begin by explaining that the pipe used in the command <strong>show ip dhcp binding | inc Vlan7</strong> helps us filter the output that will be provided, so that we only see information that includes the word <strong>Vlan7</strong>. If we did not include the <strong>| inc Vlan7</strong> filter, the command line would return DHCP information for other Vlans – assuming the switch was configured as a DHCP server for them.</div>
<p style="text-align: justify;">The output surprisingly shows us that we have only <strong>3 clients</strong> to which IP addresses have been allocated. So the question now is where did all the rest of the <strong>231</strong> (234-3) IP addresses go?</p>
<p style="text-align: justify;">Another useful command to check the DHCP pool usage is the <strong>show ip dhcp pool</strong>. It provides the overall usage of the pool alongside with the total addresses, leased and excluded addresses:</p>
<div class="box-content" style="text-align: justify;">&nbsp;4507R+E# <strong>show ip dhcp pool</strong><br />Pool Guest-WiFi-VLAN :<br />&nbsp;Utilization mark (high/low) : 100 / 0<br />&nbsp;Subnet size (first/next)&nbsp;&nbsp;&nbsp; : 0 / 0 <br />&nbsp;Total addresses&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 254<br />&nbsp;Leased addresses&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 3<br />&nbsp;Excluded addresses&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; : <strong>251</strong><br />&nbsp;Pending event&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; : none<br />&nbsp;1 subnet is currently in the pool :<br />&nbsp;Current index&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; IP address range&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Leased / Excluded / Total<br />&nbsp;&nbsp;&nbsp;&nbsp; 0.0.0.0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 192.168.7.1 - 192.168.7.254&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; &nbsp; 3&nbsp;&nbsp;&nbsp;&nbsp; / 231&nbsp;&nbsp;&nbsp; / 254 &nbsp;</div>
<p style="text-align: justify;">Here we can again confirm that from the 254 total IP addresses, <strong>251 are excluded</strong> and <strong>3 are leased</strong>. Note that the <strong>Excluded addresses</strong> includes the manually excluded and conflicted IP addresses.</p>
<p style="text-align: justify;">The <strong>Current index</strong> column shows the next IP address that will be assigned by the DHCP server. Under normal operation, we would expect to see and IP address within the 192.168.7.0 network, however the value of <strong>0.0.0.0</strong> means that there are no more available IP addresses to lease.</p>
<p style="text-align: justify;">The next step is to check the DHCP server for possible conflicts using the <strong>show ip dhcp conflict</strong> command – we are sure to find something here:</p>
<div class="box-content" style="text-align: justify;">4507R+E# <strong>show ip dhcp conflict </strong><br />IP address&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Detection method&nbsp;&nbsp; Detection time&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VRF<br />192.168.7.59&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ping&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sep 10 2014 06:17 AM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.62&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ping&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sep 10 2014 06:35 AM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.21&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Sep 10 2014 09:58 AM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.67&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; Sep 10 2014 10:54 AM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.69&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sep 10 2014 12:08 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.96&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; Sep 10 2014 12:11 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.100&nbsp;&nbsp;&nbsp;&nbsp; Ping&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; Sep 10 2014 01:37 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.129&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; Sep 11 2014 02:13 AM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.156&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sep 11 2014 02:19 AM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.164&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sep 11 2014 04:52 AM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.158&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; Sep 11 2014 05:46 AM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.230&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; Sep 11 2014 04:35 PM&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<br />192.168.7.236&nbsp;&nbsp;&nbsp;&nbsp; Gratuitous ARP&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; Sep 11 2014 09:00 PM&nbsp; &nbsp;<br />…output omitted</div>
<p style="text-align: justify;">To save space, we had to remove the rest of the command’s output. Surprisingly enough, we found that all <strong>231 IP addresses</strong> were listed in the <strong>dhcp conflict table</strong>.&nbsp; As shown above, the IP addresses are listed by <strong>date of conflict</strong> with the older entries shown first.</p>
<h2 style="text-align: justify;">Understanding The DHCP Conflict Table &amp; Cisco DHCP Server Functionality</h2>
<p style="text-align: justify;">Before a <strong>Cisco DHCP server</strong> hands out an IP address to a client, it always <strong>ARPs</strong> and then <strong>pings</strong> the address to be handed out to make sure no one is using it.</p>
<p style="text-align: justify;">When a <strong>Cisco DHCP server</strong> discovers a conflict, it will place the IP address into the conflict table stating the address was conflicting and how it came to that conclusion, as noted under the <strong>Detection method column</strong>.</p>
<p style="text-align: justify;">If for any reason the client who is already using the IP address that is about to be handed out by the Cisco DHCP server, does not respond to the ping from the DHCP server, the DHCP server will lease out the IP address since it cannot identify any conflict issues.</p>
<p style="text-align: justify;">The first thing the client will do once the IP address assignment is complete, is to send out a <strong>gratuitous ARP message</strong> with its new IP address. If not reply is received, then it is safe to assume no one else is using it. However if it does receive a <strong>gratuitous ARP reply</strong>, then it will indicate that <strong>another device on the network is already using that address</strong>.</p>
<p style="text-align: justify;">Assuming a <strong>gratuitous ARP reply</strong> is received, the client will send a <strong>DECLINE</strong> message to the <strong>DHCP server</strong>, rejecting the IP address it was just assigned. Since <strong>Cisco DHCP server</strong> has seen<strong> two gratuitous ARP messages</strong> and discovered there is a conflict, it will move the IP address into its <strong>conflict table</strong> and assign the <strong>next available IP address</strong> to the client.</p>
<h2 style="text-align: justify;">Clearing The IP DHCP Conflict Table</h2>
<p style="text-align: justify;">When the DHCP server detects there is a conflict of an IP address before or right after it is assigned to a client, it will automatically <strong>remove the IP address</strong> from the <strong>DHCP pool</strong> and move it to the <strong>DHCP conflict table</strong>.&nbsp; The IP address in question will remain there until an administrator sees and clears the <strong>DHCP conflict table</strong>.</p>
<p style="text-align: justify;">If <strong>DHCP conflicts</strong> are occurring frequently, it is only a matter of time until all available IP addresses are moved to the <strong>DHCP conflict table</strong> and the <strong>DHCP Pool</strong> is <strong>left empty</strong> with <strong>no IP addresses to hand out</strong>.</p>
<p style="text-align: justify;">We can clear the <strong>DHCP conflict table</strong> by using the <strong>clear ip dhcp conflict *</strong> command. This will instruct the DHCP server to clear the conflict table and return all IP addresses to the DHCP Pool.&nbsp; In case we have multiple VLANs and Pools, the command will affect them as well:</p>
<div class="box-content" style="text-align: justify;">4507R+E# <strong>clear ip dhcp conflict *</strong> <br />4507R+E# <strong>show ip dhcp conflict</strong> <br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IP address&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Detection method&nbsp;&nbsp; Detection time&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; VRF<br /><br />4507R+E#</div>
<p style="text-align: justify;">Issuing the <strong>show ip dhcp conflict</strong> command confirms that there are no more IP addresses in the table.</p>
<p style="text-align: justify;">The <strong>show ip dhcp pool</strong> command will now show all previously conflicted IP addresses, available to be handed out to our clients.</p>
<p>&nbsp;</p>
<p></p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Mon, 17 Nov 2014 06:55:56 +1100</pubDate>
		</item>
		<item>
			<title>Basic &amp; Advanced Catalyst Layer 3 Switch Configuration: Creating VLANs, InterVLAN Routing (SVI), VLAN Security, VTP, Trunk Link, NTP Configuration. IOS License Requirements for SVI Routing</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-basic-advanced-configuration.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left"><img src="https://www.firewall.cx/images/stories/cisco-switches-basic-advanced-configuration-1.jpg" alt="cisco-switches-basic-advanced-configuration-1" width="300" height="197" style="margin: 7px; float: left;" title="Cisco Catalyst 3750X StackWise Basic &amp; Advanced Configuration" />This article covers basic and advanced configuration of <strong>Cisco Catalyst Layer-3 switches</strong> such as the <strong>Cisco Catalyst 3560G</strong>, <strong>3560E</strong>, <strong>3560-X</strong>, <strong>3750</strong>, <strong>3750E</strong>, <strong>3750-X</strong>, <strong>3850,</strong> <strong>4500</strong>, <strong>6500</strong> , <strong>9300</strong>, <strong>9400 series</strong>, and extends to include the configuration of additional features considered important to the secure and correct operation of these devices.</p>
<p style="text-align: justify;" align="left">In many cases, these Catalyst Layer 3 switches are purchase and installed with basic configuration or features enabled, without leveraging their layer 3 capabilities.</p>
<p style="text-align: justify;" align="left">After observing many installations that fell into this category (almost out of the box configurations), we decided it was a great idea to begin covering configuration best-practices that will help engineers understand the capabilities of this equipment and better adapt configurations to their company needs.</p>
<p style="text-align: justify;" align="left">By correctly leveraging the capabilities offered by any Cisco Catalyst Layer 3 switch we can create a solid network backbone with high security standards that will have the necessary flexibility to ensure the smooth operation of our network.</p>
<p style="text-align: justify;" align="left">Article Key Topics::</p>
<ul class="checkbox" style="text-align: justify;">
<li>Layer 2 Switching Limitations</li>
<li>Introduction to Layer 3 Switches</li>
<li>IOS License Requirements for InterVLAN Routing/ SVI IP Routing</li>
<li>Creating, Configuring and Verifying VLANs</li>
<li>Enable InterVLAN Routing (SVI - ip routing) and Configuring Default Gateway</li>
<li>VLAN Security: Moving Ports (interfaces) off the Management VLAN (VLAN1)</li>
<li>Configuring &amp; Securing Access &amp; Trunk Links Against VLAN Hopping</li>
<li>Configuring Virtual Trunk Protocol (VTP) Server</li>
<li>Configuring Network Time Protocol (NTP) - Understanding Why NTP is Essential</li>
</ul>
<div class="box-info">Configuration commands covered in this article are applicable to <strong>all Cisco Catalyst Layer-3 switches</strong>.</div>
<h2>Layer 2 Switching Limitations</h2>
<p style="text-align: justify;" align="left">Cisco's portfolio of catalyst switches is designed to meet any network requirement (in speed, capacity, expandability and security) from small companies up to very large enterprises. Take for example the popular Catalyst Cisco 2960 series switches – these Layer 2 switches provide a healthy amount of features in speed, functionality and security, leaving very little to be desired even in very demanding network environments.</p>
<p style="text-align: justify;" align="left">The biggest problem with Layer 2 switches is that while they can support the creation of multiple VLAN, Layer 2 switches are unable to route packets between VLANs – a process known as InterVLAN routing. Making InterVLAN routing possible requires a switch (or any other device) that operates at the 3<sup>rd</sup> layer of the OSI model, this translates to a router (<a href="https://www.firewall.cx/cisco/cisco-routers/cisco-router-8021q-router-stick.html" target="_blank" title="Router on a Stick">Router-on-a-stick method</a>), layer 3 switch or server.</p>
<p class="box-info" style="text-align: justify;" align="left">Note: <a href="https://www.firewall.cx/networking/vlan-networks/vlan-concept.html" target="_blank" title="VLAN Concepts">VLAN concepts</a> and <a href="https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html" target="_blank" title="InterVLAN Routing">InterVLAN routing</a> theory is covered in great depth at our popular Firewall.cx <a href="https://www.firewall.cx/networking/vlan-networks.html" target="_blank" title="VLAN section">VLAN section</a>.</p>
<h2>Introducing Cisco Catalyst Layer-3 Switches</h2>
<p style="text-align: justify;" align="left">Cisco produces a number of high-end switches that are capable of delivering Layer 3 routing functionality within an enterprise network of any size. The most popular models found on the market are as follows:</p>
<ul style="text-align: justify;">
<li>Cisco Catalyst 3560, 3560G, and newer 3560-E &amp; 3560-X</li>
<li>Cisco Catalyst 3750, 3750G and newer 3750-E &amp; 3750-X</li>
<li>Cisco Catalyst 3850</li>
<li>Cisco Catalyst 4500 series. Includes 4503-E, 4506-E, 4507R+E, 4510R+E etc.</li>
<li>Cisco Catalyst 6500 series. Includes 6503-E, 6504-E, 6506-E, 6506-E, 6509(E,V, NEB) &amp; 6513 etc.</li>
<li>Cisco Catalyst 9300 series</li>
<li>Cisco Catalyst 9400 series</li>
</ul>
<p style="text-align: justify;" align="left">These Layer 3 switches are usually found at the Core Network Layer, interconnecting all other Layer 2 switches, providing secure access to all VLAN networks according to the company’s security policy. VLANs are created at the Core Layer (on these switches) and InterVLAN routing is configured according to the company’s requirements.</p>
<p style="text-align: justify;" align="left">While some might consider Layer 3 switching unnecessary, the truth is that if there is more than one VLAN on the network, chances are that a Layer 3 switch is necessary as it will allow control of VLAN communications and integrate security, flexibility and network performance into one (or more) physical device(s).</p>
<h2>IOS License Requirements For InterVLAN Routing – SVI IP Routing</h2>
<p style="text-align: justify;" align="left"><img src="https://www.firewall.cx/images/stories/cisco-switches-basic-advanced-configuration-2.jpg" alt="cisco-switches-basic-advanced-configuration-2" width="300" height="155" style="margin: 7px; float: left;" title="Cisco Catalyst 3560G, 3560X - Basic &amp; Advanced Configuration" />Due to Cisco’s new licensing model, purchasing a Layer 3 switch doesn’t really mean that essential features such as InterVLAN routing can be used.</p>
<p style="text-align: justify;" align="left">In order to enable features such as InterVLAN routing, the switch must have the appropriate license. This is applicable for the newer 3560-E, 3560-X, 3750-E, 3750-X models &amp; all 4500/6500 Supervisor engines using the new <strong>Universal Cisco IOS software image</strong> (IOS 15.x onwards).</p>
<p>&nbsp;</p>
<p style="text-align: justify;" align="left">Thankfully Catalyst switch models 3560, 3560G, 3750, 3750G, Catalyst 4500/4000 Series with Sup II+ or later, or Catalyst 6500/6000 Series that run Cisco IOS system software, support basic InterVLAN routing features in all their software versions.</p>
<p style="text-align: justify;" align="left">So if purchasing a Layer 3 switch is on the company's plans, special attention must be given to ensure it has the correct license that will allow InterVLAN routing or other desired features.&nbsp; In the event an incorrect model number/license is purchased, the only way to enable the feature required is to purchase an additional license – an exercise that will increase costs significantly and should be avoided. For this reason it is very important the correct license is selected with the initial purchase.</p>
<p style="text-align: justify;" align="left">The table below outlines the <strong>Feature Set Characteristics and Differences</strong> of all available licensing models:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-switches-basic-advanced-configuration-3.png" alt="" width="750" height="451" style="margin: 7px auto; display: block; vertical-align: middle;" title="Cisco Catalyst License Requirements and IOS Features for 3560G, 3560E, 3560-X, 3750G, 3750E &amp; 3750-X" data-alt="cisco-switches-basic-advanced-configuration-3" /></p>
<p style="text-align: justify;" align="left">As a rule of thumb, any newer 3560-E, 3560-X, 3750-E or 3750-X switches must be purchased with the <strong>IP Base license</strong> in order to support <strong>InterVLAN routing</strong>. The <strong>LAN Base</strong> license will allow Switched Virtual Interfaces (VLANs) to be created, however, <strong>it does not support InterVLAN routing or IP routing</strong>.</p>
<p style="text-align: justify;" align="left">Now that we’ve got the licensing covered, it’s time to begin creating our VLAN interfaces.</p>
<h2>Creating &amp; Configuring VLANs</h2>
<p style="text-align: justify;" align="left">First step on any Layer 3 switch is to create the necessary VLANs. &nbsp;</p>
<p style="text-align: justify;" align="left">By default, VLAN1 exists on every switch. VLAN1 is also known as the <strong>Management VLAN</strong> and it's highly advisable VLAN1 is not used to carry user data/traffic, as VLAN1 is used only for the management of the network’s switches. Company traffic (Servers, workstations etc) should be placed on a different VLAN, for example, VLAN2.&nbsp; Voice traffic e.g IP Phones, CallManager, CallManager Express or Voice Gateways, should also be placed on a VLAN of their own – also known as the Voice VLAN.</p>
<p style="text-align: justify;" align="left">As part of the design and implementation phase, we strongly advise to create a list of the VLANs that will be created along with their name and any additional information to help identify their purpose and of course the IP address that will be assigned to every VLAN interface on the core Layer 3 switch. This will ensure all VLANs are created and everything is documented for future reference.</p>
<p style="text-align: justify;" align="left">Below is an example of a VLAN list we created during the installation of our Cisco Catalyst 3560G:</p>
<p><img src="https://www.firewall.cx/images/stories/cisco-switches-basic-advanced-configuration-4.png" alt="cisco-switches-basic-advanced-configuration-4" width="624" height="205" style="margin: 7px auto; display: block; vertical-align: middle;" title="Planning our VLAN Networks, IP addresses, Gateway IP and VLAN names" /><br /> Before we begin creating our VLANs, let’s take a look and see the default VLANs that exist on Catalyst Layer 3 switches using the <strong style="mso-bidi-font-weight: normal;">show vlan brief </strong>command:</p>
<div class="box-content">C3560G# <strong>show vlan brief</strong><br /><br />
<div>VLAN Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Status&nbsp;&nbsp;&nbsp; Ports</div>
<div>---- -------------------------------- --------- -------------------------------</div>
<div>1&nbsp;&nbsp;&nbsp; default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; &nbsp;&nbsp; active&nbsp;&nbsp; &nbsp; Gi0/1, Gi0/2, Gi0/3, Gi0/4</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; Gi0/5, Gi0/6, Gi0/7, Gi0/8</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Gi0/9, Gi0/10, Gi0/11, Gi0/12</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Gi0/13, Gi0/14, Gi0/15, Gi0/16</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Gi0/17, Gi0/18, Gi0/19, Gi0/20</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; Gi0/21, Gi0/22, Gi0/23, Gi0/24</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; Gi0/25, Gi0/26, Gi0/27, Gi0/28</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Gi0/29, Gi0/30, Gi0/31, Gi0/32</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Gi0/33, Gi0/34, Gi0/35, Gi0/36</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Gi0/37, Gi0/38, Gi0/39, Gi0/40</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Gi0/41, Gi0/42, Gi0/43, Gi0/44</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; Gi0/45, Gi0/46, Gi0/47, Gi0/48</div>
<div>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; Gi0/49, Gi0/50, Gi0/51, Gi0/52</div>
<div>1002 fddi-default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; act/unsup</div>
<div>1003 token-ring-default&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp; act/unsup</div>
<div>1004 fddinet-default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; act/unsup</div>
<div>1005 trnet-default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; act/unsup</div>
</div>
<p>First step is to create and name the new VLANs in the switch’s VLAN database. This is accomplished by using the <strong>vlan</strong> command, followed by the <strong>name </strong>command. Depending on the switch model, these commands might or might-not appear in the configuration:</p>
<div class="box-content">C3560G(config)# <strong>vlan 2</strong><br />C3560G(config-vlan)# name Data-VLAN<br />C3560G(config-vlan)# <strong>vlan 3</strong><br />C3560G(config-vlan)# name Voice-VLAN<br />C3560G(config-vlan)# <strong>vlan 4</strong><br />C3560G(config-vlan)# name IP-Cameras<br />C3560G(config-vlan)# <strong>vlan 5</strong><br />C3560G(config-vlan)# name Mgnt-WiFi<br />C3560G(config-vlan)# <strong>vlan 6</strong><br />C3560G(config-vlan)# name Company-WiFi<br />C3560G(config-vlan)# <strong>vlan 7</strong><br />C3560G(config-vlan)# name PDA-WiFi-VLAN<br />C3560G(config-vlan)# <strong>vlan 8</strong><br />C3560G(config-vlan)# name Guest-VLAN<br />C3560G(config-vlan)# end</div>
<p>We can verify the new VLANs have been created in the VLAN database by issuing the <strong>show vlan brief</strong> command:</p>
<div class="box-content">C3560G# show&nbsp; vlan brief<br />VLAN Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Status&nbsp;&nbsp;&nbsp; Ports<br />---- -------------------------------- --------- -------------------------------<br />1&nbsp;&nbsp;&nbsp; default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; &nbsp; active&nbsp;&nbsp;&nbsp; Gi0/1, Gi0/2, Gi0/3, Gi0/4<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Gi0/5, Gi0/6, Gi0/7, Gi0/8<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Gi0/9, Gi0/10, Gi0/11, Gi0/12<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; Gi0/13, Gi0/14, Gi0/15, Gi0/16<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gi0/17, Gi0/18, Gi0/19, Gi0/20<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Gi0/21, Gi0/22, Gi0/23, Gi0/24<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Gi0/25, Gi0/26, Gi0/27, Gi0/28<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Gi0/29, Gi0/30, Gi0/31, Gi0/32<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp; Gi0/33, Gi0/34, Gi0/35, Gi0/36<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; Gi0/37, Gi0/38, Gi0/39, Gi0/40<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp; Gi0/41, Gi0/42, Gi0/43, Gi0/44<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; Gi0/45, Gi0/46, Gi0/47, Gi0/48<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Gi0/49, Gi0/50, Gi0/51, Gi0/52<br />2&nbsp;&nbsp;&nbsp; Data-VLAN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; active&nbsp;&nbsp; <br />3&nbsp;&nbsp;&nbsp; Voice-VLAN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; active&nbsp;&nbsp; <br />4&nbsp;&nbsp;&nbsp; IP-Cameras&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; active&nbsp;&nbsp; <br />5&nbsp;&nbsp;&nbsp; Mgnt-WiFi&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; active&nbsp;&nbsp; <br />6&nbsp;&nbsp;&nbsp; Company-WiFi&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; active&nbsp;&nbsp; <br />7&nbsp;&nbsp;&nbsp; PDA-WiFi-VLAN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; active&nbsp;&nbsp; <br />8&nbsp;&nbsp;&nbsp; Guest-VLAN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; active&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br />VLAN Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Status&nbsp;&nbsp;&nbsp; Ports<br />---- ------------------------------ --------- -------------------------------<br />1002 fddi-default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; act/unsup<br />1003 token-ring-default&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; act/unsup<br />1004 fddinet-default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; act/unsup<br />1005 trnet-default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; act/unsup</div>
<div style="text-align: justify;">The <strong>show vlan brief</strong> command is very useful as it not only shows the vlans created, but the switch ports assigned to each VLAN. We can quickly identify which ports might be assigned to a specific VLAN.&nbsp; Since this is a new switch, all ports are assigned to VLAN1, the Management VLAN, but this is about to change.</div>
<p style="text-align: justify;" align="left">Note that created VLANs are stored in the switch’s VLAN database. The VLAN database is a file named <strong>vlan.dat</strong> and is located in the switch’s <strong>FLASH memory</strong>:</p>
<div class="box-content">C3560G# <strong>dir flash:</strong><br /><br />Directory of flash:/<br />&nbsp;<br /><strong>&nbsp;&nbsp;&nbsp; 2&nbsp; -rwx&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 976&nbsp;&nbsp; Mar 1 1993 00:04:52 +00:00&nbsp; vlan.dat</strong><br />&nbsp;&nbsp;&nbsp; 3&nbsp; -rwx&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; 2110&nbsp;&nbsp; Mar 1 1993 00:03:54 +00:00&nbsp; config.text<br />&nbsp;&nbsp;&nbsp; 4&nbsp; -rwx&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 5&nbsp;&nbsp; Mar 1 1993 00:03:54 +00:00&nbsp; private-config.text<br />&nbsp;&nbsp;&nbsp; 7&nbsp; drwx&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; 192&nbsp;&nbsp; Mar 1 1993 00:09:28 +00:00&nbsp; c3560-ipbase-mz.122-35.SE5<br />&nbsp;<br />32514048 bytes total (23457280 bytes free)</div>
<p style="text-align: justify;" align="left">Looking carefuly at the creation/modified date of the files, it seems like we are off by a bit more than 10 years, so it is evident the correct date and time have not yet been configured. We’ll take care of this later.</p>
<p style="text-align: justify;">&nbsp;<br />Next, we create our VLAN interfaces and assign IP addresses and descriptions:</p>
<div class="box-content"><strong>interface Vlan1</strong><br />
<div>&nbsp;description Core-Network</div>
<div>&nbsp;ip address 172.16.10.1 255.255.255.0</div>
<div>!</div>
<div><strong>interface Vlan2</strong></div>
<div>&nbsp;description Data-VLAN</div>
<div>&nbsp;ip address 192.168.0.1 255.255.255.0</div>
<div>!</div>
<div><strong>interface Vlan3</strong></div>
<div>&nbsp;description Voice-VLAN</div>
<div>&nbsp;ip address 192.168.3.1 255.255.255.0</div>
<div>!</div>
<div><strong>interface Vlan4</strong></div>
<div>&nbsp;description IP-Cameras-VLAN</div>
<div>&nbsp;ip address 192.168.4.1 255.255.255.0</div>
<div>!</div>
<div><strong>interface Vlan5</strong></div>
<div>&nbsp;description Mgnt-WiFi-VLAN</div>
<div>&nbsp;ip address 192.168.5.1 255.255.255.0</div>
<div>!</div>
<div><strong>interface Vlan6</strong></div>
<div>&nbsp;description Company-WiFi-VLAN</div>
<div>&nbsp;ip address 192.168.6.1 255.255.255.0</div>
<div>!</div>
<div><strong>interface Vlan7</strong></div>
<div>&nbsp;description PDA-WiFi-VLAN</div>
<div>&nbsp;ip address 192.168.7.1 255.255.255.0</div>
<div>!</div>
<div><strong>interface Vlan8</strong></div>
<div>&nbsp;description Guest-VLAN</div>
<div>&nbsp;ip address 192.168.8.1 255.255.255.0</div>
<div>!</div>
</div>
<p style="text-align: justify;">Note: When configuring the new VLAN interfaces, the switch will show the following message on the console for each VLAN interface configured: <strong>%LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan2, changed state to down</strong>. This message can safely be ignored as the VLAN Line protocol will come up as soon as ports on the switch are assigned to the VLAN. <br />&nbsp;<br />There is a possibility that Interface VLAN1 might have the <strong>shutdown </strong>command configured. This can be checked by issuing the <strong>show run</strong> command. In the case the <strong>shutdown </strong>command is present under VLAN1 interface, it is imperative to issue the <strong>no shutdown</strong> command so that the Management VLAN interface comes up.<br />&nbsp;<br />The<strong> show ip interface brief</strong> command will verify all VLANs are up (<strong>Status</strong>), but with a <strong>protocol down</strong> status as explained earlier:</p>
<div class="box-content">C3560G# <strong>show ip interface brief</strong><br />
<div>Interface&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; IP-Address&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; OK? Method Status&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Protocol</div>
<div>Vlan1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; &nbsp; 172.16.10.1&nbsp;&nbsp;&nbsp;&nbsp; YES manual up&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; down&nbsp;&nbsp;&nbsp;</div>
<div>Vlan2&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; &nbsp; 192.168.0.1&nbsp;&nbsp;&nbsp;&nbsp; YES manual up&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;down&nbsp;&nbsp;&nbsp;</div>
<div>Vlan3&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; 192.168.3.1&nbsp;&nbsp;&nbsp;&nbsp; YES manual up&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; down&nbsp;&nbsp;&nbsp;</div>
<div>Vlan4&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; 192.168.4.1&nbsp;&nbsp;&nbsp;&nbsp; YES manual up&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; down&nbsp;&nbsp;&nbsp;</div>
<div>Vlan5&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 192.168.5.1&nbsp;&nbsp;&nbsp;&nbsp; YES manual up&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; down&nbsp; &nbsp;&nbsp;</div>
<div>Vlan6&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; 192.168.6.1&nbsp;&nbsp;&nbsp;&nbsp; YES manual up&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; down&nbsp;&nbsp;&nbsp;</div>
<div>Vlan7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 192.168.7.1&nbsp;&nbsp;&nbsp;&nbsp; YES manual up&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; down&nbsp;&nbsp;&nbsp;</div>
<div>Vlan8&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; 192.168.8.1&nbsp;&nbsp;&nbsp;&nbsp; YES manual up&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; down&nbsp;&nbsp;&nbsp;</div>
</div>
<h2><span lang="EN-GB">Enable SVI InterVLAN Routing – IP Routing &amp; Configuring Default Gateway</span></h2>
<p style="text-align: justify;" align="left">A Switch Virtual Interface (SVI) is a VLAN of switch ports represented by one interface to a routing or bridging system. Since there is no physical interface for the VLAN, the SVI provides the Layer 3 processing for packets from all switch ports associated with the VLAN. Once VLANs have been created and VLAN interfaces are configured with their IP addresses, we can enable ip routing on our switch, effectively switching ‘on’ the InterVLAN routing capabilities of the switch and enabling the supported routing protocols.</p>
<p style="text-align: justify;" align="left">Let’s take a look at the routing capabilities before enabling ip routing. This can be done using the <strong>show ip route</strong> command:</p>
<div class="box-content"><span lang="EN-GB">C3560G# <strong>show ip route</strong><br /></span>
<div><span lang="EN-GB">Default gateway is not set</span></div>
<div><span lang="EN-GB"></span></div>
<div><span lang="EN-GB">Host&nbsp;&nbsp;&nbsp; Gateway&nbsp;&nbsp;&nbsp;&nbsp; Last Use&nbsp;&nbsp;&nbsp; Total Uses&nbsp; Interface<br /><br /></span></div>
<div><span lang="EN-GB">ICMP redirect cache is empty</span></div>
</div>
<p><span lang="EN-GB">Notice the ip routing protocol is not enabled, and therefore no entries exist in the switch’s routing table.&nbsp; </span></p>
<p class="box-warning" style="text-align: justify;">It is important to mention that hosts belonging to different VLANs are <strong>not</strong> able to communicate or ‘ping’ each other at this point. IP routing <strong>must be enabled</strong> to allow the switch to pass (route) packets from one VLAN to another.</p>
<p style="text-align: justify;"><span lang="EN-GB"><strong>IP routing</strong> is easily enabled using the <strong>ip routing</strong> command:</span></p>
<div class="box-content"><span lang="EN-GB">C3560G(config)# <strong>ip routing</strong><br /></span>
<div><span lang="EN-GB">C3560G(config)# <strong>end</strong></span></div>
<div><span lang="EN-GB">C3560G# <strong>show ip route</strong></span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area </span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ia - IS-IS inter area, * - candidate default, U - per-user static route</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; o - ODR, P - periodic downloaded static route</span></div>
<div><span lang="EN-GB"></span></div>
<div><span lang="EN-GB">Gateway of last resort is not set</span></div>
</div>
<p style="text-align: justify;"><span lang="EN-GB">At this point, ip routing has been enabled. When issuing the <strong>show ip route</strong> command, the switch shows all networks learnt from the supported routing protocols (none active at the moment). &nbsp;Hosts between different VLANs are now able to communicate with each other as long as they have their IP gateway set to the 3560’s VLAN IP interface of their network.</span></p>
<p style="text-align: justify;" align="left"><span lang="EN-GB">Next, we need to configure a default gateway for the Layer 3 switch. This will instruct the switch to send any packets not belonging to the local network(s), to the next hop, which is usually a router:&nbsp;</span><span lang="EN-GB"></span></p>
<div align="left"><span lang="EN-GB"><span class="box-content">C3560G(config)# <strong>ip route 0.0.0.0 0.0.0.0 192.168.0.10&nbsp;</strong></span> </span></div>
<p style="text-align: justify;"><span lang="EN-GB">With the default gateway set, we can now issue the <strong>show ip route</strong> command again and check the results:<br /></span></p>
<div class="box-content"><span lang="EN-GB">C3560G# <strong>show ip route</strong><br /></span>
<div><span lang="EN-GB">Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area </span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ia - IS-IS inter area, * - candidate default, U - per-user static route</span></div>
<div><span lang="EN-GB">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; o - ODR, P - periodic downloaded static route</span></div>
<div><span lang="EN-GB"></span></div>
<div><strong><span lang="EN-GB">Gateway of last resort is 192.168.0.10 to network 0.0.0.0</span></strong></div>
<div><span lang="EN-GB"></span></div>
<div><span lang="EN-GB">C&nbsp;&nbsp;&nbsp; 192.168.0.0/24 is directly connected, Vlan2</span></div>
<div align="left"><span lang="EN-GB">S*&nbsp;&nbsp; <strong>0.0.0.0/0 [1/0] via 192.168.0.10</strong></span></div>
</div>
<div>&nbsp;</div>
<div style="text-align: justify;" align="left"><span lang="EN-GB">Notice the switch has set IP address <strong>192.168.0.10</strong> as the gateway of last resort. The static route that correctly reflects this is also highlighted at the end of the command output (<strong>S*</strong>)</span></div>
<h2><span lang="EN-GB">VLAN Security: Moving All Ports (interfaces) Off The Management-VLAN</span></h2>
<p style="text-align: justify;" align="left">When configuring a switch, it is very important not to leave any ports (interfaces) assigned to the Management VLAN. Doing so will expose the backbone network to anyone who connects to a port assigned to VLAN1. All ports should be configured for another VLAN or, even better, shutdown any unused ports.</p>
<p style="text-align: justify;" align="left">The 3560G in our lab has 48 Gigabit Ethernet ports plus 4 SFP ports, but we will use the <strong>interface range</strong> command to apply the configuration changes to all 48 Gigabit Ethernet ports at the same time, saving us valuable time:</p>
<div class="box-content" style="text-align: justify;">C3560G(config)#<strong> interface range gigabitethernet 0/1 - 48</strong><br />
<div style="text-align: justify;">C3560G(config-if-range)# <strong>switchport mode access</strong></div>
<div style="text-align: justify;">C3560G(config-if-range)# <strong>switchport access vlan 2</strong></div>
<div style="text-align: justify;">C3560G(config-if-range)# <strong>end</strong></div>
</div>
<p>Issuing the <strong>show vlan brief </strong>command will verify our new configuration changes:</p>
<div class="box-content" style="text-align: justify;">C3560G# <strong>show vlan brief</strong><br /><br />
<div style="text-align: justify;">VLAN Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Status&nbsp;&nbsp;&nbsp; Ports</div>
<div style="text-align: justify;">---- -------------------------------- --------- -------------------------------</div>
<div style="text-align: justify;">1&nbsp;&nbsp;&nbsp; default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; active&nbsp;&nbsp;&nbsp; Gi0/49, Gi0/50, Gi0/51, Gi0/52</div>
<div style="text-align: justify;">2&nbsp;&nbsp;&nbsp; Data-VLAN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; active&nbsp;&nbsp;&nbsp; Gi0/1, Gi0/2, Gi0/3, Gi0/4</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Gi0/5, Gi0/6, Gi0/7, Gi0/8</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Gi0/9, Gi0/10, Gi0/11, Gi0/12</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gi0/13, Gi0/14, Gi0/15, Gi0/16</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gi0/17, Gi0/18, Gi0/19, Gi0/20</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gi0/21, Gi0/22, Gi0/23, Gi0/24</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Gi0/25, Gi0/26, Gi0/27, Gi0/28</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp;&nbsp; Gi0/29, Gi0/30, Gi0/31, Gi0/32</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gi0/33, Gi0/34, Gi0/35, Gi0/36</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gi0/37, Gi0/38, Gi0/39, Gi0/40</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gi0/41, Gi0/42, Gi0/43, Gi0/44</div>
<div style="text-align: justify;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Gi0/45, Gi0/46, Gi0/47, Gi0/48</div>
<div style="text-align: justify;">3&nbsp;&nbsp;&nbsp; Voice-VLAN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; active&nbsp;&nbsp;&nbsp;</div>
<div style="text-align: justify;">4&nbsp;&nbsp;&nbsp; IP-Cameras&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; active&nbsp;&nbsp;&nbsp;</div>
<div style="text-align: justify;">5&nbsp;&nbsp;&nbsp; Mgnt-WiFi&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; active&nbsp;&nbsp;&nbsp;</div>
<div style="text-align: justify;">6&nbsp;&nbsp;&nbsp; Company-WiFi&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; active&nbsp;&nbsp;&nbsp;</div>
<div style="text-align: justify;">7&nbsp;&nbsp;&nbsp; PDA-WiFi-VLAN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; &nbsp; active&nbsp;&nbsp;&nbsp;</div>
<div style="text-align: justify;">8&nbsp;&nbsp;&nbsp; Guest-VLAN&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp; active&nbsp;&nbsp;&nbsp;</div>
<div style="text-align: justify;">1002 fddi-default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; act/unsup</div>
<div style="text-align: justify;">1003 token-ring-default&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; act/unsup</div>
<div style="text-align: justify;">1004 fddinet-default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; act/unsup</div>
<div style="text-align: justify;">1005 trnet-default&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; act/unsup</div>
</div>
<p>As shown, only the last four ports (0/49 – 0/52) are still on VLAN1. These ports represent the four SFP ports on the switch, normally used to connect to other switches via fiber optic links.&nbsp; We’ll talk about them soon.</p>
<h2><span lang="EN-GB">Configuring &amp; Securing Access &amp; Trunk Links Against VLAN Hopping</span></h2>
<p style="text-align: justify;" align="left"><span lang="EN-GB">VLAN Hopping is a well-known attack method by which an attacker uses insecure switch ports to help him jump from one VLAN to another, gaining access to multiple networks. Preventing attacks such as VLAN hopping can be easily achieved by following some basic steps.</span></p>
<p style="text-align: justify;" align="left"><span lang="EN-GB">The previous section explained why it is important all access ports are configured with a VLAN other than the management VLAN. In addition to the <strong>switchport mode access</strong> command, the <strong>switchport nonegotiate</strong> command will ensure that the specific port configured to never negotiate trunks automatically:</span></p>
<div class="box-content" style="text-align: justify;">C3560G(config)# <strong>interface range gigabitethernet 0/1 - 48</strong><br />C3560G(config-if-range)# <strong>switchport nonegotiate</strong></div>
<div style="text-align: justify;"><span lang="EN-GB">The combination of the <strong>switchport mode access</strong> and <strong>switchport nonegotiate</strong> commands will ensure that the switch will never negotiate the link as a <strong>trunk link</strong>, therefore preventing an attacker from gaining access to all VLANs.<br /></span></div>
<p style="text-align: justify;" align="left"><span lang="EN-GB">On the other hand, Trunk links are essential on any VLAN network as they carry traffic from all VLANs, allowing switches to connect between each other and move traffic between them as necessary. A port is usually configured as a Trunk when it connects to one of the following:</span></p>
<ul class="check">
<li><span lang="EN-GB">Switch </span></li>
<li><span lang="EN-GB">IP Phone</span></li>
<li><span lang="EN-GB">Access Point configured with multiple SSIDs</span></li>
</ul>
<p style="text-align: justify;">Trunk links are also configured with a<strong> native VLAN</strong>. A Trunk link’s native VLAN carries <strong>untagged traffic</strong>, just like any port configured as an <strong>access link</strong>. So if we were to connect an access device (e.g computer) to a port configured as a Trunk link, then the computer will have access to the Trunk's native VLAN. The problem here is that, by default, all Trunk links have their native VLAN configured to <strong>VLAN1 - the Management VLAN</strong>!<br /><br />The workaround here is to ensure the native VLAN of any Trunk link is set to an unused VLAN. For this reason we normally create a ‘dummy’ VLAN and configure it as the native VLAN for our Trunk Links. Assuming we have created <strong>VLAN 20</strong> as our 'dummy' VLAN, we configure the Trunk Links native VLAN to that.</p>
<div class="box-content" style="text-align: left;">C3560G(config)# <strong><span lang="EN-GB">interface range GigabitEthernet1/0/49 - 52<br /></span></strong>
<div style="text-align: left;">C3560G(config-if)#&nbsp; <span lang="EN-GB"><strong>description Trunk Links</strong><br /></span></div>
<div style="text-align: left;">C3560G(config-if)# &nbsp;<strong><span lang="EN-GB">switchport trunk encapsulation dot1q</span></strong></div>
<div style="text-align: left;">C3560G(config-if)# &nbsp;<strong><span lang="EN-GB">switchport trunk native vlan 20</span></strong></div>
<div lang="EN-GB">C3560G(config-if)#&nbsp;<span lang="EN-GB"><strong> switchport mode trunk</strong> </span></div>
</div>
<p><span lang="EN-GB">By using a few additional commands under our switch port interfaces, we can secure our switch interfaces and effectively avoid these attack methods.</span></p>
<h2><span lang="EN-GB">Configuring Virtual Trunk Protocol Server (VTP)</span></h2>
<p style="text-align: justify;" align="left"><span lang="EN-GB">Configuring VTP is essential in any Cisco powered network infrastructure. The VTP protocol ensures all VLAN information is propagated to all Cisco switches that are part of the configured VTP Domain.&nbsp; VTP is analysed extensively at Firewall.cx’s <a href="https://www.firewall.cx/networking-topics/vlan-networks/virtual-trunk-protocol.html" target="_blank" title="Virtual Trunk Protocol">Virtual Trunk Protocol</a> section. The section provides in-depth analysis of the VTP protocol structure with 3d protocol structure frames, how VTP works, VTP modes and advantages offered, plus a lot more. For more information on VTP, please visit </span>the<span lang="EN-GB"> <span lang="EN-GB"><a href="https://www.firewall.cx/networking-topics/vlan-networks/virtual-trunk-protocol.html" target="_blank" title="Virtual Trunk Protocol">Virtual Trunk Protocol</a></span> section.</span></p>
<p style="text-align: justify;" align="left"><span lang="EN-GB">VTP configuration consists of a few basic parameters and a number of optional parameters. &nbsp;We’ve selected a number of these parameters that are necessary to get VTP working in any working environment:</span></p>
<ul class="check">
<li><span lang="EN-GB">Configuration of VTP Mode</span></li>
<li><span lang="EN-GB">Configuration of VTP Domain</span></li>
<li><span lang="EN-GB">Configuration of VTP Password</span></li>
<li><span lang="EN-GB">Verification of VTP Status</span></li>
</ul>
<p style="text-align: justify;" align="left"><span lang="EN-GB">Configuring the VTP mode is essential for VTP’s correct functionality.&nbsp; In any given network of switches only one switch is assigned with the VTP Server role, while all other switches are set to VTP Client or VTP Transparent mode.</span></p>
<h4 style="text-align: justify;" align="left">Configuration of VTP Mode</h4>
<p style="text-align: justify;" align="left">By default, all switches are configured in VTP Server mode. We can view the mode status by using the <strong>show vtp status</strong> command:</p>
<div class="box-content" style="text-align: justify;">C3560G#<strong> show vtp status</strong><br />
<div style="text-align: justify;">VTP Version&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; : 2</div>
<div style="text-align: justify;">Configuration Revision&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; : 9</div>
<div style="text-align: justify;">Maximum VLANs supported locally : 1005</div>
<div style="text-align: justify;">Number of existing VLANs&nbsp; &nbsp; &nbsp; &nbsp; : 12</div>
<div style="text-align: justify;">VTP Operating Mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Server</div>
<div style="text-align: justify;">VTP Domain Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; :</div>
<div style="text-align: justify;">VTP Pruning Mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Disabled</div>
<div style="text-align: justify;">VTP V2 Mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; : Disabled</div>
<div style="text-align: justify;">VTP Traps Generation&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; : Disabled</div>
<div style="text-align: justify;">MD5 digest&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 0x14 0x10 0x98 0x59 0x56 0x66 0x5E 0x0D</div>
<div style="text-align: justify;">Configuration last modified by 0.0.0.0 at 3-1-93 00:04:52</div>
<div style="text-align: justify;" align="left">Local updater ID is 0.0.0.0 (no valid interface found)</div>
</div>
<p style="text-align: justify;">Notice the <strong>VTP Operating Mode</strong> is set to <strong>Server </strong>and the amount of VLANs (12) already contained in the database. The <strong>Configuration Revision number </strong>is automatically incremented every time a change is made to the existing VLAN database.</p>
<p style="text-align: justify;" align="left">Configuring the VTP Mode to server is accomplished with the <strong>vtp mode server</strong> command:</p>
<div class="box-content" style="text-align: justify;">C3560G(config)# <strong>vtp mode server</strong><br />Device mode already VTP SERVER.</div>
<p align="left">If the switch is already in Server Mode, expect to see the <strong>Device mode already VTP SERVER message</strong>.</p>
<h4 style="text-align: justify;" align="left">Configuration of VTP Domain</h4>
<p style="text-align: justify;" align="left">Configuring the VTP Domain is accomplished with the use of the <strong>vtp domain</strong> command. Network switches configured as VTP Clients and the same VTP Domain will ‘listen’ to the VTP Server. VLANs created at the VTP server will automatically be made available on all other switches configured as VTP Clients:</p>
<div class="box-content" style="text-align: justify;">C3560G(config)# <strong>vtp domain Firewall.cx</strong><br />Changing VTP domain name from NULL to Firewall.cx</div>
<p align="left">As shown, the initial<strong> VTP Domain</strong> is by default set to <strong>NULL</strong>. This changes as soon as we set the VTP Domain.<span lang="EN-GB"></span></p>
<h4 style="text-align: justify;" align="left"><span lang="EN-GB">Configuration of VTP Password</span></h4>
<p style="text-align: justify;" align="left">Setting the VTP password is very important as it ensures only VTP clients with the correct password are able to exchange VTP information for the specified VTP Domain.</p>
<div class="box-content" style="text-align: justify;">C3560G(config)# <strong>vtp password $secret$&nbsp; </strong><br />Setting device VLAN database password to $secret$</div>
<h4 style="text-align: justify;" align="left"><span lang="EN-GB">Verification of VTP Status</span></h4>
<p style="text-align: justify;" align="left">Finally, we can verify our VTP setup and status using the <strong>show vtp status</strong> command:</p>
<div class="box-content" style="text-align: justify;">C3560G# <strong>show vtp status</strong><br /><br />
<div style="text-align: justify;">VTP Version&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; : 2</div>
<div style="text-align: justify;">Configuration Revision&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; : 9</div>
<div style="text-align: justify;">Maximum VLANs supported locally : 1005</div>
<div style="text-align: justify;">Number of existing VLANs&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; : 12</div>
<div style="text-align: justify;">VTP Operating Mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; : Server</div>
<div style="text-align: justify;">VTP Domain Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; : Firewall.cx</div>
<div style="text-align: justify;">VTP Pruning Mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Disabled</div>
<div style="text-align: justify;">VTP V2 Mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; : Disabled</div>
<div style="text-align: justify;">VTP Traps Generation&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Disabled</div>
<div style="text-align: justify;">MD5 digest&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; : 0xEF 0x53 0x71 0x4A 0xBA 0xF5 0xB9 0xD8</div>
<div style="text-align: justify;">Configuration last modified by 0.0.0.0 at 3-1-93 00:04:52</div>
<div style="text-align: justify;">Local updater ID is 0.0.0.0 (no valid interface found)</div>
</div>
<p>Of course VTP offers a number of additional parameters that can be tweaked to reduce broadcast traffic (VTP Pruning), increased security (VTP v2 mode) and more,&nbsp; but these commands are out of this article's scope.</p>
<h4>NTP Configuration – Understanding Why NTP Service is Essential</h4>
<p style="text-align: justify;" align="left">The NTP service is used by the switch to synchronize its internal clock and date with an NTP server. This ensures that the switch is correctly synced at all times. Many engineers wonder why it is so important to configure a switch’s clock, considering the device is simply a switch and not a file server or domain controller. The truth is that NTP configuration is extremely important and we will explain why.</p>
<p style="text-align: justify;" align="left">A switch with a properly configure NTP service allows us to easily analyse the switch log messages to help determine when specific events might have happened. If for example a file server’s network card was disconnected briefly from the network, we could then view the switch’s log messages and see when exactly this occurred. Another frequently observed example is when switch ports in violation are automatically shutdown by the switch. Examining the logs, we can view when a specific violation occurred and why it caused the switch to shutdown its port. As a last example, if a syslog server is configured to track all switch messages, errors and events or if we are using a Radius server to restrict network access for specific days of the week and times, then NTP configuration is mandatory.</p>
<p style="text-align: justify;" align="left">In every case, it’s good practice to ensure NTP is configured on the network equipment we are responsible for. Along with NTP, it’s always important to remember to configure the correct timezone and daylight saving, so that the switch automatically adjusts the time when necessary.</p>
<p style="text-align: justify;" align="left">When configuring NTP, we can select either an internal or public NTP server from which the switch will synchronize. In the event a public ntp server is the preferred choice, we advise visiting the NTP Pool Project homepage <a href="http://www.pool.ntp.org/en/" target="_blank" rel="nofollow noopener">http://www.pool.ntp.org/en/</a> &nbsp;and selecting a server from the available lists. Currently there are over 4000 servers all over the world to choose from.</p>
<p style="text-align: justify;" align="left">Let’s take a look at the current date and time our lab switch has:</p>
<div class="box-content" style="text-align: justify;">C3560G# <strong>show clock<br /></strong>*00:26:47.190 UTC Mon Mar 1 1993</div>
<p style="text-align: justify;" align="left">First step is to configure a preferred NTP server. We’ve selected <strong>0.europe.pool.ntp.org</strong> from the European NTP Pool. Note that in order for our switch to resolve 0.europe.pool.ntp.org to an IP address, we must have configured a valid name server. We used Google’s public DNS server 8.8.8.8:</p>
<div class="box-content" style="text-align: justify;" align="left">C3560G(config)#<strong> ip name-server 8.8.8.8<br /></strong>
<div style="text-align: justify;">C3560G(config)# <strong>ntp server 0.europe.pool.ntp.org </strong></div>
<div style="text-align: justify;" align="left">Translating "0.europe.pool.ntp.org"...domain server (8.8.8.8) [OK]</div>
</div>
<p style="text-align: justify;">Notice how the switch will automatically attempt to translate the FQDN into an IP address. The IP address of the NTP server is then stored into the configuration. Viewing the date and clock after executing the above commands will show that the switch has correctly synchronized with the selected NTP server:</p>
<div class="box-content" style="text-align: justify;">C3560G# <strong>show clock<br /></strong>09:32:49.653 UTC Sun Sep 22 2013</div>
<p style="text-align: justify;" align="left">Notice that the time is synched for <strong>UTC </strong>or <strong>GMT 0</strong>. Since we are located in Greece, we need to instruct the switch to use the correct timezone (GMT +2) and daylight saving:</p>
<div class="box-content" style="text-align: justify;">C3560G(config)# <strong>clock timezone Greece 2 0<br /></strong>C3560G(config)# <strong>clock summer-time Athens recurring last Sun Mar 3:00 last Sun Oct 4:00</strong></div>
<p style="text-align: justify;" align="left">As soon as the above commands are entered, the switch will automatically adjust the time:</p>
<div class="box-content" style="text-align: justify;">00:40:16: %SYS-6-CLOCKUPDATE: System clock has been updated from 09:36:35 UTC Sun Sep 22 2013 to 11:36:35 Greece Sun Sep 22 2013, configured from console by console.<br />00:40:17: %SYS-6-CLOCKUPDATE: System clock has been updated from 11:36:36 Greece Sun Sep 22 2013 to 12:36:36 Athens Sun Sep 22 2013, configured from console by console.</div>
<p style="text-align: justify;" align="left">Finally, issuing the <strong>show clock</strong> command will confirm everything is configured correctly:</p>
<div class="box-content" style="text-align: justify;">C3560G# <strong>show clock<br /></strong>12:38:12.036 Athens Sun Sep 22 2013</div>
<p style="text-align: justify;">As a final note, do not forget to save the configuration!</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Sun, 22 Sep 2013 06:55:15 +1000</pubDate>
		</item>
		<item>
			<title>Cisco Catalyst 4500 Series Zero-Downtime IOS Upgrade Process for Supervisor Engine 7-E, 7L-E, 6L-E and V-10GE Redundant Configurations</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4500-supervisor-engine-ios-upgrade.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4500-supervisor-engine-ios-upgrade.html</guid>
			<description><![CDATA[<p style="text-align: justify;">The <strong>Supervisor Engine</strong> is the heart of the <strong>Cisco Catalyst 4500</strong> and <strong>6500 series</strong> switches. It is the equivalent of an engine in a car. Every packet that enters or exits your switch passes through the <strong>Supervisor Engine</strong> and, naturally, the Cisco IOS is the software that brings this beast to life.</p>
<p style="text-align: justify;">Cisco makes an enormous effort to bring new features to its products through new versions of its popular IOS software, especially for the enterprise-class series switches such as the 4500 and 6500 Catalyst switches. Unlike other vendor operating systems, it is always advisable to keep your Cisco Catalyst operating system up to date by fitting it with the latest IOS image.</p>
<p style="text-align: justify;">To be eligible to download an IOS image from Cisco’s website, one must have a valid contract support with Cisco Systems. This contract not only makes you eligible for all software upgrades for the duration of your contract, but also binds Cisco in delivering Top-Class support for your covered device(s).</p>
<p style="text-align: justify;" align="left">Note: Information on installing the <strong>Cisco 4507R-E/4507R+E</strong> Catalyst Switch, Supervisor Engines, Line cards and power supplies can be found in our following articles which, combined, contain over 30 pictures of all switch components, including the passive backplane, fantray and more:</p>
<ul style="text-align: justify;">
<li><a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4507re-ws-x45-sup7l-e-installation.html" target="_blank" title="Cisco 4507R+E Layer 3 Installation: Redundant WS-X45-SUP7L-E Supervisor Engines &amp; WS-X4648-RJ45V+E Line Card">Cisco 4507R+E Layer 3 Installation: Redundant WS-X45-SUP7L-E Supervisor Engines &amp; WS-X4648-RJ45V+E Line Card</a></li>
</ul>
<ul>
<li style="text-align: justify;"><a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-catalyst-4507r-e.html" target="_blank" title="Installation of a Cisco Catalyst 4507R-E Layer 3 Switch">Installation of a Cisco Catalyst 4507R-E Layer 3 Switch</a><strong><br /></strong></li>
</ul>
<h2 style="text-align: left;">Are Network Services Affected During Or After The Catalyst Supervisor Engine(s) Upgrade?</h2>
<p style="text-align: justify;" align="left">This is perhaps one of the most frequently asked question that troubles engineers, administrators and IT Managers who have not dealt with the Supervisor Engine upgrade process before.&nbsp; Who wouldn’t be? This is, after all, the network backbone switch and when it comes to large campus, Enterprise networks or networks that operate around the clock, downtime is not an option.</p>
<p style="text-align: justify;" align="left">At this point, we should note that when upgrading a Supervisor Engine the engine must be reloaded (rebooted) in order for the system to load the new IOS image. For the <strong>Cisco Catalyst 4503</strong> and <strong>4506</strong> series, which can only accept a single Supervisor Engine, this means network service interruption is unavoidable as the single Supervisor Engine <strong>must</strong> reboot. On the other hand, the <strong>Cisco Catalyst 4507R</strong> and <strong>4510R</strong> series are capable of accepting up to <strong>two</strong> <strong>Supervisor Engines</strong> (hence the ‘<strong>R</strong>’ – Redundancy), therefore in case of a <strong>4507R</strong>/<strong>4510R</strong> with two Supervisor Engines installed, IOS upgrades can be performed with <strong>guaranteed Zero-Service-Interruption</strong>.&nbsp;</p>
<p style="text-align: justify;" align="left">Note: The process we are about to describe was performed on a live 4507R+E with <strong>two</strong> <strong>Supervisor Engines 7L-E</strong>, on a network of <strong>120+ users</strong> and <strong>11 servers</strong> connected to our 4507R+E via <strong>dual 10Gbps fiber optic links</strong> (one 10Gbps link on each Supervisor Engine).</p>
<h2>Quick Overview Of The Supervisor Engine Upgrade Process</h2>
<p style="text-align: justify;" align="left">Before we dive into the upgrade process, let’s take a quick look at the steps to be followed. This will help understand the process and caveats of each step.</p>
<p style="text-align: justify;" align="left">When upgrading a system with redundant Supervisor Engines the upgrade process has to be performed in a specific way as each Supervisor Engine is upgraded in turn.&nbsp;&nbsp;</p>
<p style="text-align: justify;" align="left">Following is a brief overview of the upgrade steps:</p>
<ul class="check">
<li>Load the new IOS image on to the Active Supervisor Engine (SE1)</li>
<li>Copy IOS image to Standby Supervisor Engine (SE2)</li>
<li>Configure Supervisor Engines to load the new image upon reboot</li>
<li>Set <strong>Configuration-Register</strong> variable to ensure newest image is loaded upon bootup</li>
<li>Force reload of <strong>Standby Supervisor Engine</strong> (SE2) &amp; Switchover to Standby Supervisor Engine (SE2). This now becomes the <strong>new</strong> Active Supervisor Engine</li>
<li>Force reload of previously Active Supervisor Engine (SE1).</li>
</ul>
<h2>Step 1: Loading The New IOS Image On To The Active Supervisor Engine (SE1)</h2>
<p style="text-align: justify;" align="left">The first step is to copy the new IOS image on to the active Supervisor Engine (SE1). For this, a TFTP server is required for the file transfer. Users can download a selection of <a href="https://www.firewall.cx/downloads/freeware-security-a-free-trials/3cdaemon-ftp-tftp-server-client.html" target="_blank" title="Free TFTP Servers from our FTP/TFTP Servers &amp; Clients">Free TFTP Servers from our FTP/TFTP Servers &amp; Clients</a> download section.</p>
<p style="text-align: justify;">Once the TFTP server is ready, we issue the necessary command to initiate the file transfer:</p>
<div class="box-content">4507R# <strong><strong>copy tftp bootflash:<br /></strong></strong>
<div>Address or name of remote host []? <strong>10.0.0.76</strong></div>
<div>Source filename []? <strong>cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</strong></div>
<div>Destination filename [cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin]?</div>
<div>Accessing tftp://10.0.0.76/cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin...</div>
<div>Loading cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin from 10.0.0.36 (via Vlan2): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!</div>
<div>[OK - 119576292 bytes]</div>
<div>119576292 bytes copied in 356.708 secs (335222 bytes/sec)</div>
</div>
<p>Note that the new IOS image is saved to the <strong>bootflash:</strong> file system.&nbsp; Cisco Supervisor Engines use the <strong>bootflash:</strong> file system rather than the <strong>flash:</strong> file system which most of us are used to. <br /><br />If in doubt, simply make use of the show file system command that will reveal the file systems on your Catalyst switch:</p>
<div class="box-content">4507R# <strong>show file system</strong><br />File Systems:<br />&nbsp;&nbsp;&nbsp;&nbsp; Size(b)&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; Free(b)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Type&nbsp; Flags&nbsp; Prefixes<br />*&nbsp;&nbsp;&nbsp; <strong>831541248&nbsp;&nbsp;&nbsp;&nbsp; 718979072&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; disk&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; bootflash:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; 141433856&nbsp;&nbsp;&nbsp;&nbsp; 139310080&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; rom&nbsp;&nbsp;&nbsp;&nbsp; ro&nbsp;&nbsp; crashinfo:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 16915456&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 16660992&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; disk&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; kinfo:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; disk&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; slot0:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; disk&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; usb0:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; opaque&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; system:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; opaque&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; tmpsys:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 524284&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 523248&nbsp;&nbsp;&nbsp;&nbsp; flash&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; cat4000_flash:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 524284&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 510196&nbsp;&nbsp;&nbsp;&nbsp; nvram&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; slavenvram:<br />&nbsp;&nbsp;&nbsp;&nbsp; 820875264&nbsp;&nbsp;&nbsp;&nbsp; 708313088&nbsp;&nbsp;&nbsp;&nbsp; flash&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; slavebootflash:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 524284&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 523248&nbsp;&nbsp;&nbsp;&nbsp; flash&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; slavecat4000_flash:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; flash&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; slaveslot0:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; flash&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; slaveusb0:<br />&nbsp;&nbsp;&nbsp;&nbsp; 139940864&nbsp;&nbsp;&nbsp;&nbsp; 137817088&nbsp;&nbsp;&nbsp; opaque&nbsp;&nbsp;&nbsp;&nbsp; ro&nbsp;&nbsp; slavecrashinfo:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; opaque&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; slavercsf:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 16915456&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 16660992&nbsp;&nbsp;&nbsp;&nbsp; flash&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; slavekinfo:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; opaque&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; null:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; opaque&nbsp;&nbsp;&nbsp;&nbsp; ro&nbsp;&nbsp; tar:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; network&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; tftp:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; opaque&nbsp;&nbsp;&nbsp;&nbsp; wo&nbsp;&nbsp; syslog:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 524284&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 510196&nbsp;&nbsp;&nbsp;&nbsp; nvram&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; nvram:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp; &nbsp; &nbsp;&nbsp; network&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; rcp:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp; &nbsp; &nbsp;&nbsp; network&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; http:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp; &nbsp; &nbsp;&nbsp; network&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; ftp:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; opaque&nbsp;&nbsp;&nbsp;&nbsp; ro&nbsp;&nbsp; cns:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -&nbsp; &nbsp; &nbsp; &nbsp; opaque&nbsp;&nbsp;&nbsp;&nbsp; rw&nbsp;&nbsp; revrcsf:</div>
<h2>Step 2: Copy IOS Image To Standby Supervisor Engine (SE2)</h2>
<p style="text-align: justify;">Once the IOS image is loaded on to the active Supervisor Engine (SE1), it must be copied to the standby Supervisor Engine (SE2). For this, we use the <strong>copy bootflash: slavebootflash:</strong> command. Note that the <strong>slavebootflash:</strong> file system refers to the <strong>bootflash:</strong> of the standby Supervisor Engine, regardless of which physical engine is on standby mode.</p>
<div class="box-content" style="text-align: justify;">4507R# <strong><strong>copy bootflash: slavebootflash:<br /></strong></strong>
<div>Source filename []? <strong>cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</strong></div>
<div>Destination filename [cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin]?</div>
<div>Copy in progress...CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC</div>
<div>CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC</div>
<div>CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC</div>
<div>119576292 bytes copied in 99.404 secs (1202932 bytes/sec)</div>
<div><br />4507R#</div>
</div>
<p style="text-align: justify;">To verify the image is correctly loaded on both Supervisor Engine bootflash systems, use the <strong>show bootflash</strong> &amp; <strong>show slavebootflash </strong>commands:</p>
<div class="box-content" style="text-align: justify;">4507R#&nbsp;<strong>show bootflash: <br /></strong>-#- --length-- ---------date/time--------- path<br />&nbsp; 1&nbsp; 112337548 Feb 26 2013 08:44:27 +00:00 cat4500e-universal.SPA.03.03.00.SG.151-1.SG.bin<br /><span style="color: #000000;">&nbsp; <span style="color: #ffffff; background-color: #008000;">2&nbsp; 119576292 Mar 21 2013 03:07:21 +00:00 cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</span></span><br />557035520 bytes available (232263680 bytes used)<br />Filesystem: bootflash<br />Mounted: Unknown<br /><br />4507R# <strong>show slavebootflash:</strong><br />-#- --length-- ---------date/time--------- path<br />&nbsp; 1&nbsp; 112337548 Feb 26 2013 06:46:26 +00:00 cat4500e-universal.SPA.03.03.00.SG.151-1.SG.bin<br /><span style="color: #ffffff; background-color: #008000;">&nbsp; 2&nbsp; 119576292 Mar 21 2013 01:09:33 +00:00 cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</span><br />546914304 bytes available (232263680 bytes used)<strong><br /></strong></div>
<p style="text-align: justify;"><strong>Note:</strong>&nbsp; Notice that the <strong>first IOS image</strong> listed is the previous version (<strong>03.03.00.SG.151-1.SG</strong>). We’ll need to keep this information in mind for our next step.</p>
<h2>Step 3: Configure Supervisor Engines To Load The New Image Upon Reboot</h2>
<p style="text-align: justify;" align="left">In our next step, we configure the active Supervisor Engine to load the new IOS image when it reboots. This is easily done using <strong>the boot system flash</strong> command as shown below:</p>
<div class="box-content" style="text-align: justify;" align="left">4507R(config)# <strong>boot system flash bootflash:cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</strong></div>
<p style="text-align: justify;" align="left">It is highly likely the <strong>boot system flash bootflash</strong> command already exists in the system’s configuration for the <strong>previous IOS image</strong>, so we’ll need to remove the command from the configuration to ensure the newest IOS image we just uploaded (<strong>03.04.00.SG.151-2.SG</strong>) is the only one referenced:</p>
<div class="box-content" style="text-align: justify;" align="left">4507R(config)# <strong>no boot system flash bootflash:cat4500e-universal.SPA.03.03.00.SG.151-1.SG.bin</strong></div>
<p style="text-align: justify;" align="left">Next, we must ensure the configuration is saved to the startup-configuration:</p>
<div class="box-content" style="text-align: justify;" align="left">4507R# <strong><strong>wr mem<br /></strong></strong>
<div align="left">Building configuration...</div>
<div align="left">% VRF table-id 0 not activeCompressed configuration from 12839 bytes to 3791 bytes[OK]</div>
<div align="left">*Mar 21 01:15:28.356: %C4K_REDUNDANCY-5-CONFIGSYNC: The private-config has been successfully synchronized to the standby supervisor</div>
<div align="left">*Mar 21 01:15:29.098: %C4K_REDUNDANCY-5-CONFIGSYNC: The startup-config has been successfully synchronized to the standby supervisor</div>
</div>
<p style="text-align: justify;" align="left">Readers wondering about the <strong>% VRF table-id 0 not activeCompressed</strong> message when saving the running-configuration should not be alarmed as this is a cosmetic bug and can be safely ignored. If no such message was reported when saving the configuration, it means that the IOS currently running does not have this cosmetic bug.</p>
<p style="text-align: justify;" align="left">On another note, every time we save our configuration to startup-config the system will immediately synchronize the configuration changes to the standby supervisor. When this happens, we’ll receive a message, similar to the one show above, confirming the synchronization has been successful.</p>
<h2 style="text-align: justify;" align="left">Step 4: Set Configuration-Register Variable To Ensure Newest Image Is Loaded Upon Bootup</h2>
<p style="text-align: justify;" align="left">Cisco Supervisor Engines, by factory default, have their <strong>configuration register</strong> set to <strong>0x2101</strong>. While this value is a combination of settings, we will focus on two specific values: <strong>0x2101</strong> &amp; <strong>0x2102</strong>.&nbsp; The value <strong>0x2101</strong> instructs the system to <strong>boot the first system image in the onboard flash memory</strong> (bootflash). <strong>This is usually the oldest image in the flash</strong>. The value of <strong>0x2102</strong> instructs the system to use the image specified in the <strong>BOOT environment variable</strong>, which is essentially whatever was specified in the previous step (No.3) using the <strong>boot system flash bootflash: c</strong>ommand.</p>
<p style="text-align: justify;" align="left">To view the environment variables on both Supervisor Engines, use the <strong>show bootvar</strong> command:</p>
<div class="box-content" style="text-align: justify;" align="left">4507R# <strong><strong>show bootvar<br /></strong></strong>
<div align="left">BOOT variable = bootflash:<strong><span style="color: #000000;">cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</span></strong>,1;</div>
<div align="left">CONFIG_FILE variable does not exist</div>
<div align="left">BOOTLDR variable does not exist</div>
<div align="left"><strong><span style="color: #000000;">Configuration register is 0x2101</span></strong></div>
<div align="left"><strong><span style="color: #000000;">Standby BOOT variable = bootflash:cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</span></strong>,1;</div>
<div align="left">Standby CONFIG_FILE variable does not exist</div>
<div align="left">Standby BOOTLDR variable does not exist</div>
<div align="left"><strong><span style="color: #000000;">Standby Configuration register is 0x2101</span></strong></div>
</div>
<p style="text-align: justify;">Notice how the newly uploaded IOS image <strong>cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</strong> is set for the <strong>BOOT variable</strong>, however the <strong>Configuration register</strong> value is <strong>0x2101</strong>, which means it will force the Supervisor Engine to boot the first image it is going to find on the bootflash. Which image is that?&nbsp; Let’s refresh our memory:</p>
<div class="box-content" style="text-align: justify;">4507R# <strong><strong>show bootflash: all<br /></strong></strong>
<div><span style="color: #000000;">-#- --length-- ---------date/time--------- path</span></div>
<div><span style="color: #000000;">&nbsp; </span><strong>1&nbsp; 112337548 Feb 26 2013 08:44:27 +00:00 cat4500e-universal.SPA.03.03.00.SG.151-1.SG.bin</strong></div>
<div><span style="color: #000000;">&nbsp; 2&nbsp; 119576292 Mar 21 2013 03:07:21 +00:00 cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</span></div>
<div><br /><span style="color: #000000;">4507R# <strong>show slavebootflash:</strong></span></div>
<div><span style="color: #000000;">-#- --length-- ---------date/time--------- path</span></div>
<div>&nbsp;<strong> 1&nbsp; 112337548 Feb 26 2013 06:46:26 +00:00 cat4500e-universal.SPA.03.03.00.SG.151-1.SG.bin</strong></div>
<div><span style="color: #000000;">&nbsp; 2&nbsp; 119576292 Mar 21 2013 01:09:33 +00:00 cat4500e-universal.SPA.03.04.00.SG.151-2.SG.bin</span></div>
<span style="color: #000000;"></span></div>
<p style="text-align: justify;">As we can see, despite the <strong>boot system flash command</strong> being correctly set to load the second IOS image, the configuration register setting of <strong>0x2101</strong> will force the Supervisor Engine to boot the first image found, that is: <strong>cat4500e-universal.SPA.03.03.00.SG.151-1.SG.bin</strong>.</p>
<p style="text-align: justify;">To overcome this problem, we have two options:&nbsp;</p>
<p style="text-align: justify;">1) Delete all older IOS images from the Bootflash&nbsp;</p>
<p style="text-align: justify;">2) Set the configuration register to <strong>0x2102</strong>.&nbsp;</p>
<p style="text-align: justify;">We decided to set the configuration register just to be on the safe side:</p>
<div class="box-content" style="text-align: justify;">4507R(config)# <strong>config-register 0x2102<br /><br />*Mar 21 01:19:55.542: %C4K_REDUNDANCY-5-CONFIGSYNC:<strong> The config-reg has been successfully synchronized to the standby supervisor</strong><br /></strong></div>
<div style="text-align: justify;">&nbsp;</div>
<div class="box-content" style="text-align: justify;">4507R# <strong><strong>wr mem<br /></strong></strong>
<div>Building configuration...</div>
<div>% VRF table-id 0 not activeCompressed configuration from 12849 bytes to 3791 bytes[OK]</div>
<div>*Mar 21 01:20:08.352: %C4K_REDUNDANCY-5-CONFIGSYNC: The private-config has been successfully synchronized to the standby supervisor</div>
<div>*Mar 21 01:20:09.091: %C4K_REDUNDANCY-5-CONFIGSYNC: The startup-config has been successfully synchronized to the standby supervisor</div>
</div>
<p style="text-align: justify;">Take note that the system is confirming that both configuration register and startup-config have been successfully synchronized with the standby supervisor.</p>
<p style="text-align: justify;">…and there’s that cosmetic bug again :)</p>
<h2 style="text-align: left;">Step 5: Force Reload Of Standby Supervisor (SE2) &amp; Switchover To Standby Supervisor Engine (SE2)</h2>
<p style="text-align: justify;">At this point we are ready to force the standby Supervisor Engine(SE2) to reload. Once this happens, the Supervisor Engine (SE2) will load the new IOS. Once we confirm the new IOS is loaded, we can then make the standby Supervisor Engine (SE2) the active Supervisor Engine.</p>
<p style="text-align: justify;">To force the reload of the standby Supervisor Engine (SE2), use the <strong>redundancy reload peer</strong> command:</p>
<div class="box-content" style="text-align: justify;">4507R# <strong><strong>redundancy reload peer<br /></strong></strong>
<div>Reload peer [<strong>confirm</strong>]</div>
<div>4507R#</div>
<div>*Mar 21 01:21:02.318: %RF-5-RF_RELOAD: Peer reload. Reason: Unknown Reason</div>
<div>*Mar 21 01:21:05.314: %C4K_REDUNDANCY-3-COMMUNICATION: <strong><span style="color: #000000;">Communication with the peer Supervisor has been lost</span></strong></div>
<div>*Mar 21 01:21:05.327: %C4K_REDUNDANCY-3-SIMPLEX_MODE: The peer Supervisor has been lost</div>
</div>
<p style="text-align: justify;">The second (standby) Supervisor Engine is now restarting. This process will take a couple of minutes and will have no negative impact on the 4507R switch.</p>
<p style="text-align: justify;">Once the IOS has loaded and the restart process is complete we will receive a message similar to the following:</p>
<p class="box-content">*Mar 21 01:24:54.312: %C4K_REDUNDANCY-6-DUPLEX_MODE: <strong>The peer Supervisor has been detected</strong><br />*Mar 21 01:25:36.066: %C4K_IOSMODPORTMAN-6-MODULEONLINE: <strong>Module 4</strong> (WS-X45-SUP7L-E S/N: CAT1714L4T4 Hw: 1.1) is online<br />*Mar 21 01:25:36.094: %C4K_REDUNDANCY-6-MODE: ACTIVE supervisor initializing for sso mode<br />*Mar 21 01:25:36.344: %C4K_REDUNDANCY-3-COMMUNICATION: <strong>Communication with the peer Supervisor has been established</strong><br />*Mar 21 01:25:37.098: %C4K_REDUNDANCY-6-MODE: <strong>ACTIVE supervisor initializing for sso mode</strong></p>
<p style="text-align: justify;">The above messages indicate that the standby Supervisor Engine has successfully completed its reboot and is fully synchronized with the active Supervisor Engine. The system shows the product ID (WS-X45-SUP7L-E), serial number and hardware revision of the Supervisor Engine that has just established communication with the active Supervisor Engine.</p>
<p style="text-align: justify;">To verify that the standby Supervisor Engine is running the latest and greatest IOS image we just loaded, use the <strong>show module</strong> command:</p>
<div class="box-content" style="text-align: justify;">4507R# <strong>show module</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br />
<div>Chassis Type : WS-C4507R+E</div>
<div>Power consumed by backplane : 40 Watts</div>
<div>Mod Ports Card Type&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Model&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Serial No.</div>
<div>---+-----+--------------------------------------+------------------+-----------</div>
<div>&nbsp;1&nbsp;&nbsp;&nbsp; 48&nbsp; 10/100/1000BaseT Premium POE E Series&nbsp; WS-X4748-RJ45V+E&nbsp;&nbsp; CAT1754L4C7<br />&nbsp;2&nbsp;&nbsp;&nbsp; 48&nbsp; 10/100/1000BaseT Premium POE E Series&nbsp; WS-X4648-RJ45V+E&nbsp;&nbsp; JAE171515SY<br />&nbsp;3&nbsp;&nbsp;&nbsp;&nbsp; 6&nbsp; Sup 7L-E 10GE (SFP+), 1000BaseX (SFP)&nbsp; WS-X45-SUP7L-E&nbsp;&nbsp;&nbsp;&nbsp; CAT1712L2X5<br /><span style="color: #cc99ff;"><strong><span style="color: #000000;">&nbsp;4&nbsp;&nbsp;&nbsp;&nbsp; 6&nbsp; Sup 7L-E 10GE (SFP+), 1000BaseX (SFP)&nbsp; WS-X45-SUP7L-E</span></strong>&nbsp;&nbsp;&nbsp;&nbsp; </span>CAT1714L4T4<br />&nbsp;5&nbsp;&nbsp;&nbsp; 48&nbsp; 10/100/1000BaseT Premium POE E Series&nbsp; WS-X4648-RJ45V+E&nbsp;&nbsp; JAE170525D3</div>
<div><br />&nbsp;M MAC addresses&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hw&nbsp; Fw&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sw&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Status</div>
<div>--+--------------------------------+---+------------+----------------+---------</div>
<div>&nbsp;1 4c4e.352e.a2cc to 4c4e.352e.a2fb 1.3&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;</div>
<div>&nbsp;2 0006.f6e9.7520 to 0006.f6e9.754f 3.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div>&nbsp;3 0006.f620.2e80 to 0006.f620.2e85 1.1 15.0(1r)SG3&nbsp; 03.03.00.SG&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div>&nbsp;4 0006.f620.2e86 to 0006.f620.2e8b 1.1 <span style="color: #cc99ff;"><strong><span style="color: #000000;">15.0(1r)SG3&nbsp; 03.04.00.SG</span></strong>&nbsp;&nbsp;&nbsp;</span>&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div>&nbsp;5 0006.f673.51d4 to 0006.f673.5203 3.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div><br />Mod&nbsp; Redundancy role&nbsp;&nbsp;&nbsp;&nbsp; Operating mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Redundancy status</div>
<div>----+-------------------+-------------------+----------------------------------</div>
<div>&nbsp;3&nbsp;&nbsp; Active Supervisor&nbsp;&nbsp; SSO&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;Active&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div><span style="color: #cc99ff;">&nbsp;<strong><span style="color: #000000;">4&nbsp;&nbsp; Standby Supervisor&nbsp; SSO&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Standby hot&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></strong></span><strong><span style="color: #000000;"></span></strong></div>
</div>
<p style="text-align: justify;">The <strong>show module </strong>command provides a generous amount of information including all line cards installed, Supervisor Engine models, IOS software versions, serial numbers, operational status and redundancy mode (SSO by default).</p>
<p style="text-align: justify;">We’ve highlighted our standby Supervisor Engine which happens to be in slot No.4. Notice the software image the system is reporting for both Supervisor Engines. Our current active Supervisor Engine is running version 03.03.00.SG, while our standby Supervisor Engine is running version <strong>03.04.00.SG</strong> – the new IOS loaded!</p>
<p style="text-align: justify;">We’ve now confirmed that the standby Supervisor Engine has loaded the new IOS and is fully operational, waiting eagerly to manage our 4507R switch and all its data!!</p>
<h2>Step 6: Force Reload Of Previously Active Supervisor Engine (SE1)</h2>
<p style="text-align: justify;">On our final step, we will need to force the reload of the active Supervisor Engine (SE1) so it too can boot using the new IOS image. Forcing a Supervisor Engine switch over is an experience when you consider what’s really happening inside the switch at that moment. During the process of the switchover we don’t get LEDs lighting up, flashing like crazy. The <strong>SUP</strong> <strong>ACTIVE LED</strong> will simply <strong>switch off</strong> from the current active Supervisor Engine and <strong>switch on</strong> on our previously standby Supervisor Engine, indicating it is now the new active engine.</p>
<p style="text-align: justify;">To initiate the Supervisor Engine switchover, use the redundancy force-switchover command as shown below:</p>
<div class="box-content" style="text-align: justify;">4507R# <strong><strong>redundancy force-switchover<br /></strong></strong>
<div>This will reload the active unit and force switchover to standby[confirm]</div>
<div>Preparing for switchover..</div>
<div>*Mar 21 01:27:57.007: %SYS-5-SWITCHOVER: Switchover requested by Virtual Exec. Reason: Stateful Switchover.</div>
</div>
<p style="text-align: justify;">Once the command is entered and we’ve confirmed by hitting ENTER, we will lose our telnet session to the 4507R. This is normal expected behaviour – do not be alarmed!&nbsp; Apart from the switch cutting our telnet session, <strong>users will not notice any service disruption</strong> – the switchover will be <strong>completely transparent</strong> to them <strong>no matter the network load during the switchover</strong>.</p>
<p style="text-align: justify;">To reconnect to the switch, simply telnet back into the same IP address. If connected via console cable it will be necessary to connect it to the new active supervisor engine in order to continue controlling the switch.</p>
<p style="text-align: justify;">Engineers who would like to monitor, via telnet or direct console cable connection (to the new active engine), the reload progress of the Supervisor Engine can use the <strong>show module</strong> command. By typing the command we will see the 4507R identifying a Supervisor Engine in <strong>slot 3</strong> (that’s SE1 that is reloading), however, further down we will see that no information about the engine’s MAC address or IOS software is provided due to the fact that it has not fully booted into its new IOS. In addition the <strong>redundancy status</strong> of the first engine is <strong>Disabled </strong>– an expected result since the Supervisor Engine (SE1) has not booted yet.</p>
<div class="box-content" style="text-align: justify;">4507R# <strong><strong>show module<br /></strong></strong>
<div>Chassis Type : WS-C4507R+E</div>
<div>Power consumed by backplane : 40 Watts</div>
<div>Mod Ports Card Type&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Model&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Serial No.</div>
<div>---+-----+--------------------------------------+------------------+-----------</div>
<div>&nbsp;1&nbsp;&nbsp;&nbsp; 48&nbsp; 10/100/1000BaseT Premium POE E Series&nbsp; WS-X4748-RJ45V+E&nbsp;&nbsp; CAT1754L4C7<br />&nbsp;2&nbsp;&nbsp;&nbsp; 48&nbsp; 10/100/1000BaseT Premium POE E Series&nbsp; WS-X4648-RJ45V+E&nbsp;&nbsp; JAE171515SY<br /><strong><span style="color: #000000;">&nbsp;3&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Supervisor</span></strong><br />&nbsp;4&nbsp;&nbsp;&nbsp;&nbsp; 6&nbsp; Sup 7L-E 10GE (SFP+), 1000BaseX (SFP)&nbsp; WS-X45-SUP7L-E&nbsp;&nbsp;&nbsp;&nbsp; CAT1714L4T4<br />&nbsp;5&nbsp;&nbsp;&nbsp; 48&nbsp; 10/100/1000BaseT Premium POE E Series&nbsp; WS-X4648-RJ45V+E&nbsp;&nbsp; JAE170525D3</div>
<div>&nbsp;<br />M MAC addresses&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hw&nbsp; Fw&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sw&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Status</div>
<div>--+--------------------------------+---+------------+----------------+---------</div>
<div>&nbsp;1 4c4e.352e.a2cc to 4c4e.352e.a2fb 1.3&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div>&nbsp;2 0006.f6e9.7520 to 0006.f6e9.754f 3.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div><strong><span style="color: #000000;">&nbsp;3 Unknown&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Unknown&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Unknown&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Other&nbsp;&nbsp;&nbsp;</span></strong></div>
<div>&nbsp;4 0006.f620.2e86 to 0006.f620.2e8b 1.1 15.0(1r)SG3&nbsp; 03.04.00.SG&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div>&nbsp;5 0006.f673.51d4 to 0006.f673.5203 3.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
<div><br />Mod&nbsp; Redundancy role&nbsp;&nbsp;&nbsp;&nbsp; Operating mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Redundancy status</div>
<div>----+-------------------+-------------------+----------------------------------</div>
<div><strong><span style="color: #000000;">&nbsp;3&nbsp;&nbsp; Standby Supervisor&nbsp; SSO&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Disabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</div>
&nbsp;4&nbsp;&nbsp; Active Supervisor&nbsp;&nbsp; SSO&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Active&nbsp;&nbsp;&nbsp;<strong>&nbsp; <br /></strong></div>
<p style="text-align: justify;">At this point, we can continue to issue the show module command and monitor the output changes. At some point the system will show the Supervisor Engine (SE1) loaded with the new IOS, however, the redundancy status will go through the following phases until it is ready (Standby hot):</p>
<p style="text-align: justify;"><strong>Standby Supervisor Redundancy Status Cycle:</strong></p>
<ol style="text-align: justify;">
<li>Disabled</li>
<li>In progress to Standby cold</li>
<li>Standby cold</li>
<li>In progress to Issu negotiation la</li>
<li>In progress to Standby config</li>
<li>In progress to Standby bulk&nbsp;&nbsp;</li>
<li>Standby hot</li>
</ol>
<p style="text-align: justify;">When the Supervisor Engine reaches <strong>Standby hot</strong> status, it is ready to take over in the event the active Supervisor Engine fails.</p>
<p style="text-align: justify;">Following is the expected output when the Supervisor Engine IOS is loaded and fully synced with the active Supervisor Engine:</p>
<div class="box-content" style="text-align: justify;">4507R# <strong>show module<br /></strong>Chassis Type : WS-C4507R+E<br />Power consumed by backplane : 40 Watts<br /><br />Mod Ports Card Type&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Model&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Serial No.<br />---+-----+--------------------------------------+------------------+-----------<br />&nbsp;1&nbsp;&nbsp;&nbsp; 48&nbsp; 10/100/1000BaseT Premium POE E Series&nbsp; WS-X4748-RJ45V+E&nbsp;&nbsp; CAT1754L4C7<br />&nbsp;2&nbsp;&nbsp;&nbsp; 48&nbsp; 10/100/1000BaseT Premium POE E Series&nbsp; WS-X4648-RJ45V+E&nbsp;&nbsp; JAE171515SY<br />&nbsp;3&nbsp;&nbsp;&nbsp;&nbsp; 6&nbsp; Sup 7L-E 10GE (SFP+), 1000BaseX (SFP)&nbsp; WS-X45-SUP7L-E&nbsp;&nbsp;&nbsp;&nbsp; CAT1712L2X5<br />&nbsp;4&nbsp;&nbsp;&nbsp;&nbsp; 6&nbsp; Sup 7L-E 10GE (SFP+), 1000BaseX (SFP)&nbsp; WS-X45-SUP7L-E&nbsp;&nbsp;&nbsp;&nbsp; CAT1714L4T4<br />&nbsp;5&nbsp;&nbsp;&nbsp; 48&nbsp; 10/100/1000BaseT Premium POE E Series&nbsp; WS-X4648-RJ45V+E&nbsp;&nbsp; JAE170525D3<br /><br />&nbsp;M MAC addresses&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Hw&nbsp; Fw&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Sw&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Status<br />--+--------------------------------+---+------------+----------------+---------<br />&nbsp;1 4c4e.352e.a2cc to 4c4e.352e.a2fb 1.3&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br />&nbsp;2 0006.f6e9.7520 to 0006.f6e9.754f 3.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br />&nbsp;3 0006.f620.2e80 to 0006.f620.2e85 1.1 15.0(1r)SG3&nbsp; 03.04.00.SG&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br />&nbsp;4 0006.f620.2e86 to 0006.f620.2e8b 1.1 15.0(1r)SG3&nbsp; 03.04.00.SG&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br />&nbsp;5 0006.f673.51d4 to 0006.f673.5203 3.1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ok&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br /><br />Mod&nbsp; Redundancy role&nbsp;&nbsp;&nbsp;&nbsp; Operating mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Redundancy status<br />----+-------------------+-------------------+----------------------------------<br /><strong><span style="color: #000000;">&nbsp;3&nbsp;&nbsp; Standby Supervisor&nbsp; SSO&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Standby hot&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br />&nbsp;4&nbsp;&nbsp; Active Supervisor&nbsp;&nbsp; SSO&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Active<strong><br /></strong></div>
<h2>Summary</h2>
<p style="text-align: justify;">This article explained the importance of upgrading the Cisco Supervisor Engine IOS to the latest version, the process that needs to be followed for the upgrade and how the Catalyst switch’s operations are affected during or after the upgrade. We also covered the IOS upgrade process for redundant Supervisor Engine configurations, how to force a Supervisor Engine switchover and monitoring the Supervisor Engine bootup and sync process.</p>
<p style="text-align: justify;">More articles covering Cisco Catalyst switches and LAN switching technologies can be found in our <a href="https://www.firewall.cx/cisco/cisco-switches.html" title="Cisco Knowledgebase Switching">Cisco Knowledgebase Switching</a> category.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Mon, 08 Apr 2013 07:00:00 +1000</pubDate>
		</item>
		<item>
			<title>Cisco 4507R+E Layer 3 Installation: Redundant WS-X45-SUP7L-E Supervisor Engines &amp; WS-X4648-RJ45V+E Line Cards</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4507re-ws-x45-sup7l-e-installation.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4507re-ws-x45-sup7l-e-installation.html</guid>
			<description><![CDATA[<p style="text-align: justify;" align="left"><a href="https://www.firewall.cx/images/stories/cisco-switches-4507re-ws-x45-sup7l-e-2l.jpg" class="jcepopup"><strong><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-2.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-2" width="286" height="373" style="display: block; margin: 10px; float: left;" title="Cisco Catalyst 4507re with ws-x45-supervisor engine 7l-e" /></strong></a>It's no news that we here at Firewall.cx enjoy writing about our installations of Cisco equipment and especially devices that we don’t get to see and play with every day. Today we cover the installation of a new <strong>Cisco 4507R+E</strong> Catalyst switch populated with two <strong>7L-E Supervisor engines</strong>, three <strong>WS-X4648-RJ45V+E 48</strong> Gigabit PoE line cards and two <strong>4200Watt </strong>power supplies with the ability to cover full future PoE requirements of the switch, when fully populated with PoE line cards.</p>
<p style="text-align: justify;" align="left">Many might be aware of our first 4507R article that covered the <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-catalyst-4507r-e.html" target="_blank" title="installation of a Cisco Catalyst 4507R-E switch">installation of a Cisco Catalyst 4507R-E switch</a>.&nbsp; Since then, Cisco has replaced the <strong>4507R-E</strong> with the newer <strong>4507R+E</strong> chassis and introduced new Supervisor Engines. The difference between the two chassis is that the <strong>4507R-E</strong> supports up to <strong>24Gbps bandwidth per slot</strong>, whereas the newer <strong>4507R+E</strong> supports up to <strong>48Gbps per slot</strong>, bringing the chassis up to date with the new market trends and high-connectivity speed requirements of enterprise companies.</p>
<p style="text-align: justify;" align="left">To make things more interesting, we ensured we captured as many pictures as possible from our <strong>4507R+E</strong> switch installation so that our readers can familiarise themselves with it as much as possible.</p>
<p style="text-align: justify;" align="left">After unpacking and looking at the back of the switch chassis we noticed that not much has changed except that its label now mentions <strong>4500+E Series</strong>, indicating that it is the newer <strong>+E</strong> series. On the front side, the fan tray manages to give away that this is the newer series as it too is labelled <strong>Catalyst 4507R+E</strong>.&nbsp; Apart from these minor cosmetic changes the switch looks exactly the same as its predecessor.</p>
<p style="text-align: justify;">The picture below shows the back of the <strong>Cisco 4507R+E chassis</strong>. The dual power supplies are positioned at the top part of the switch and the specially designed grid allows adequate air to be pumped through the power supplies and out the back, with the help of the massive power supply fans.&nbsp; The fans used are extremely high quality with very little friction – when during our test run, we switched off the power supplies, the fans continued to spin for at least another 20 seconds before coming to a complete stop:</p>
<p style="text-align: justify;" align="left"><a href="https://www.firewall.cx/images/stories/cisco-switches-4507re-ws-x45-sup7l-e-3l.jpg" class="jcepopup"><strong><strong><strong><strong><img src="https://www.firewall.cx/images/stories/cisco-switches-4507re-ws-x45-sup7l-e-3.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-3" width="280" height="282" style="display: block; margin-left: auto; margin-right: auto; vertical-align: middle;" title="Cisco Catalyst 4507R-E Chasis" /></strong></strong></strong></strong></a></p>
<p style="text-align: justify;" align="left">Mounting a Catalyst 4500 into a rack can be a daunting experience, mainly due to its weight. When fully populated, the switch can weigh up to 55 Kgs and requires at least two people to safely pick up and place the switch into the rack, then you’d need one more person to tighten the necessary screws to keep it inside the rack!</p>
<p style="text-align: justify;" align="left">We also found it necessary for the rack to have adequate spacing above and below the area where the switch is to be placed, because it’s very difficult to keep the switch steady during installation because of its weight. In addition, it is imperative the rack’s side covers can be removed so the two handles on the switch (one on each side) are accessible.</p>
<p align="left"><strong><a href="https://www.firewall.cx/images/stories/cisco-switches-4507re-ws-x45-sup7l-e-4l.jpg" class="jcepopup"><img src="https://www.firewall.cx/images/stories/cisco-switches-4507re-ws-x45-sup7l-e-4.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-4" width="280" height="210" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst 4507R-E " /></a> </strong></p>
<p style="text-align: justify;" align="left">To overcome the problem of installing the heavy switch, we decided to remove both power supplies and all cards from the chassis. The empty chassis made things much easier.</p>
<h2 style="text-align: justify;" align="left">Revealing The Magnificent Cisco 4507R+E Backplane</h2>
<p style="text-align: justify;">As we begun to slowly remove the switch’s power supplies, line cards and Supervisor Engines, we had a clear view of the spectacular 4507R backplane! The backplane is the switch’s ‘spine’, responsible of interconnecting all components together. Naturally, we had to capture this moment and here it is in all its glory:</p>
<p align="left"><strong><a href="https://www.firewall.cx/images/stories/cisco-switches-4507re-ws-x45-sup7l-e-5l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-5.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-5" width="350" height="349" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst 4507R-E Chasis " /></a> </strong></p>
<p style="text-align: justify;" align="left">We should note that extreme caution must be given when removing and inserting the 4507 cards. The engineer performing the procedure must be properly grounded and the cards must be placed on antistatic mats or, even better, inside antistatic bags. This will help avoid electrostatic discharge that can possibly damage the line cards or supervisor engines.</p>
<p style="text-align: justify;" align="left">After removing all five cards we had a clear view of the 4507R+E’s backplane – something you don’t get to see every day. On the left side of the backplane the white and black sockets caught our attention – these are the connectors for the line cards and supervisor engines (marked in <span style="color: #ff0000;">red</span>). The Supervisor Engine sockets extend to the far right to a total of three sockets per Supervisor Engine:</p>
<p align="left"><strong><a href="https://www.firewall.cx/images/stories/cisco-switches-4507re-ws-x45-sup7l-e-6l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-6.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-6" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4507R-E Backplane" /></a> </strong></p>
<p style="text-align: justify;" align="left">Looking to the left, the strategically placed fan tray is visible, ready to blow cool air into the chassis and directly on all cards. As shown in our picture the fan tray consists of two larger fans on the same level as the Supervisor Engines, and six smaller fans taking care of the cooling for the rest of the line cards:</p>
<p align="left"><strong><a href="https://www.firewall.cx/images/stories/cisco-switches-4507re-ws-x45-sup7l-e-7l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-7.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-7" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4507R-E Fan Tray" /></a> </strong></p>
<p style="text-align: justify;" align="left">Obviously the most critical cards are the <strong>Supervisor Engines</strong>, generating most of the heat under intensive workload.</p>
<h2 style="text-align: justify;" align="left">Introducing The WS-X45-SUP7L-E Supervisor Engine</h2>
<p style="text-align: justify;" align="left">The Supervisor Engine is the heart of every modular Cisco 4500 and 6500 series switch. The <strong>Supervisor Engine 7L-E</strong> provides a number of enhancements over its predecessor <strong>Supervisor Engine 6L-E</strong>,making it a primary choice for Enterprise-class networks seeking unprecedented performance.&nbsp;&nbsp;</p>
<p align="left"><strong><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-8.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-8" width="500" height="252" style="display: block; margin-left: auto; margin-right: auto;" title="Csico Catalyst Supervisor Engine 7L-E" /></strong></p>
<p align="left">Following are key innovations offered by the <strong>Supervisor Engine 7L-E</strong>:</p>
<ul style="text-align: justify;">
<li><strong>520Gbps</strong> system performance with <strong>48Gpbs</strong> per slot to <strong>every</strong> line-card slot and <strong>225mpps</strong> throughput</li>
<li><strong>Dual 10Gigabit Ethernet</strong> uplinks (via SFP+ optics) or <strong>four Gigabit Ethernet</strong> uplinks (via SFP optics)</li>
<li>Application visibility through Flexible NetFlow (FNF) supporting Layer 2/3/4 information and synthetic traffic monitoring with IP SLA</li>
<li>Cisco IOS XE Software which provides the ability to host third-party applications</li>
<li>Support of <strong>802.3az</strong> Energy Efficient Ethernet (EEE) capable line cards</li>
<li>First and only modular switch with 8 bidirectional line-rate SPAN/RSPAN sessions</li>
<li>Supports up to <strong>244 ports 10/100/1000</strong> in a 7-slot chassis</li>
<li>External USB &amp; SD card support for flexible storage options</li>
<li>Maximum resiliency with redundant components, Nonstop Forwarding/Stateful Switchover (NSF/SSO), and <strong>In-Service Software Upgrade</strong> (ISSU) support</li>
<li>Full backward compatibility with 6 G, 24 G, and 48 Gbps slot line cards with no performance degradation</li>
</ul>
<p style="text-align: justify;" align="left">Product Datasheet for the <strong>Supervisor Engine 7L-E </strong>can be found in our <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-catalyst-4500-6500-supervisor-engines.html" target="_blank" title="Cisco Catalyst 4500-6500 Supervisor Engine">Cisco Catalyst 4500-6500 Supervisor Engine</a> download section</p>
<p style="text-align: justify;" align="left">Our users can refer to our popular <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4500-supervisor-engine-ios-upgrade.html" target="_blank" title="Cisco Catalyst 4500 Series Zero-Downtime IOS Upgrade Process for Supervisor Engine 7-E, 7L-E, 6L-E and V-10GE Redundant Configurations">Cisco Catalyst 4500 Series Zero-Downtime IOS Upgrade Process for Supervisor Engine 7-E, 7L-E, 6L-E and V-10GE Redundant Configurations</a> article to learn how to upgrade their Supervisor Engine without network service interruption.</p>
<p style="text-align: justify;" align="left">Looking to the front left side of the Supervisor Engine, we can see the <strong>Status</strong> LED, <strong>Active SUP</strong> LED (<strong>on</strong> when the Sup. Engine is in active state) and <strong>Utilization </strong>LEDs. Visible behind the faceplate is the circuitry board and heatsinks attached to the dual-CPUs and other processors.:</p>
<p align="left"><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-9l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-9.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-9" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst Supervisor Engine" /></a> </strong></p>
<p style="text-align: justify;" align="left">On the right we can see the <strong>Console port</strong>, <strong>Management port</strong> and <strong>4 SFP/SFP+</strong> slots providing <strong>two 10Gbps</strong> or <strong>four 1Gbps</strong> links! The LEDs below each SFP/SFP+ port will turn on according to the negotiated speed with the other end:</p>
<p align="left"><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-10l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-10.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-10" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst Supervisor Engine 7L-E Uplink SFP Ports" /></a> </strong></p>
<p style="text-align: justify;" align="left">Looking at the back of the <strong>Supervisor Engine 7L-E</strong>, we can see the three connectors that plug directly into the 4507R+E chassis backplane. The heat sinks fins, covering the dual core CPU and other processors, are placed in a direction where the air from the fan tray can provide maximum cooling and heat dissipation:</p>
<p align="left"><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-11l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-11.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-11" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Supervisor Engine 7L-E Backplane connector" /></a> </strong></p>
<p style="text-align: justify;" align="left">The <strong>Supervisor Engine 7L-E</strong> board is indeed impressive. The picture above shows the Supervisor Engine almost fully inserted into the 4507R+E chassis. We took this picture to show how the Supervisor Engine’s connectors perfectly line up with the 4507R’s backplane sockets:</p>
<p align="left"><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-12l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-12.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-12" width="350" height="262" style="display: block; margin-left: auto; margin-right: auto;" title="Supervisor Engine 7L-E and 4507R-E Backplane" /></a> </strong></p>
<p style="text-align: justify;" align="left">Note how the Supervisor Engine’s processors carrying the large heatsinks are strategically placed next to the fan tray’s largest fans.</p>
<h2>The WS-X4648-RJ45V+E Line Card</h2>
<p style="text-align: justify;">The <strong>WS-X4648-RJ45V+E</strong> line card provides a number of enhanced features designed to bring maximum flexibility and expandability some of which are:</p>
<ul>
<li>48 ports</li>
<li>10/100/1000 module (RJ-45)</li>
<li>Supported from Cisco IOS Software Release 12.2(40)SG or later</li>
<li>IEEE 802.3af/at and Cisco prestandard PoE, IEEE 802.3x flow control</li>
<li>Bandwidth is allocated across eight 6-port groups, providing 3 Gbps per port group (2:1)</li>
<li>L2-4 Jumbo Frame support (up to 9216 bytes)</li>
<li>Capable of up to 30 Watts of inline power per port on up to 24 ports simultaneously</li>
<li>Enterprise and commercial: designed to power next-generation IP phones, wireless base stations, video cameras, and other PoE devices</li>
<li>Campus and branch applications requiring enhanced performance for large file transfers and network backups</li>
</ul>
<p style="text-align: justify;">In the photo below, we can see the <strong>WS-X4648</strong> main board with its chipsets, two of which are equipped with large heatsinks. The white connector at the back provides the connection with the <strong>4507R+E</strong> backplane through which the card and its PoE ports are powered, and data traffic is carried to the rest of the system:</p>
<p><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-13l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-13.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-13" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco WS-X4648 Board" /></a> </strong></p>
<p style="text-align: justify;">We should note that all 4500 &amp; 6500 series line cards, including <strong>Supervisor Engines</strong>, have a metal carrier on the bottom of the board that covers almost all of the circuit board, making it safe to hold the line card without touching any circuits:</p>
<p style="text-align: center;" align="left"><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-15l.jpg" class="jcepopup"><strong><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-15.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-15" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Installing WS-X4648 Board" /></strong></a><em>Network Administrator Savvas Filippidis gets ready to install a line card</em></p>
<p style="text-align: justify;" align="left">After a careful inspection of the card it was time to place it into its slot and complete the physical installation of the 4507R+E switch.&nbsp; After ensuring the two module ejector levers (one on each side) were out and away from the faceplate, we gently lined it up with the two chassis slot guides of our slot and slowly pushed the line card inwards:</p>
<p align="left"><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-14l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-14.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-14" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Inserting WS-X4648 into 4507R-E" /></a> </strong></p>
<p style="text-align: justify;">As soon as the line card’s connector ‘touched’ the backplane we continued to push it inwards, with a little more strength this time, and the two module ejector levers automatically started to fold inwards until the line card was fully in place:</p>
<p><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-16.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-16.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-16" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Installation of WS-X4648 Line Card" /></a> </strong></p>
<h2 style="text-align: justify;">Cisco 4507R+E 4200Watt Power Supplies</h2>
<p style="text-align: justify;">The Cisco 4507R+E supports a number of different power supply configurations. Depending on how the switch is intended to be used, it can be populated fully with 48 Gigabit PoE ports, providing full PoE to all 5 line cards – a total of <strong>240 ports</strong> where each line card can draw a maximum of 820 Watts.</p>
<p style="text-align: justify;">Of course, the switch needs the appropriate power supplies to be able to undertake the load and this is why it’s always a great idea to purchase large power supplies as you’ll never need to upgrade them in the future when the switch is fully populated with PoE line cards.</p>
<p style="text-align: justify;">The whopping <strong>4200Watt</strong> power supplies were a considerable weight. To remove them, we had to loosen the captive installation screws (two for each power supply) and pull the power supply slowly outwards. Pulling out the power supply did not require much effort as it came out smoothly with the little force we used.</p>
<p><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-17l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-17.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-17" width="300" height="357" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst 4200Watt Power Supplies" /></a> </strong></p>
<p style="text-align: justify;">The <strong>4200Watt</strong> power supply is the second largest power supply available for the 4500 series and has two <strong>IEC60320-C20</strong> connectors (per power supply) to ensure the power drawn from the UPS or power circuit&nbsp; is evenly split.</p>
<p style="text-align: justify;">We took both power supplies out and took a picture of them to show both front and back side.&nbsp; At the back of each power supply, as expected, we found one long connector, split into three groups, the middle group containing pins which are barely visible in the picture:</p>
<p><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-18l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-18.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-18" width="350" height="167" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4200Watt Power Supply" /></a> </strong></p>
<p style="text-align: justify;">Going back to the chassis, all we found was the power supply connector where the middle pin sockets are easily seen. In total we counted an impressive 46 connection points between the power supply and chassis:</p>
<p><strong><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-19l.jpg" class="jcepopup"><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-19.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-19" width="350" height="263" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4507R-E 4200Watt Power Supply Chassis connector" /></a> </strong></p>
<p style="text-align: justify;">When we initially powered the Cisco 4507R+E switch, after it booted up we found both Supervisor Engine Status LEDs&nbsp; orange. After checking Cisco's site to find out more information, the explanation for the orange LEDs was that the Supervisor Engine was performing a '<em>System boot or a diagnostic test is in progress</em>', however it was not true as the system was fully booted and working.</p>
<p style="text-align: justify;">A careful inspection showed that we had forgotten to switch on the second 4200Watt power supply and the system was running off only one power supply.&nbsp; At the time, the power requirements were only around 500Watts and the system was reporting the second power supply as "<strong>bad/off</strong>".</p>
<p><a href="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-20l.jpg" class="jcepopup"><strong><img src="https://www.firewall.cx//images/stories/cisco-switches-4507re-ws-x45-sup7l-e-20.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-20" width="300" height="350" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst 4507R-E Supervisor Engine Leds" /></strong></a></p>
<p style="text-align: justify;">As soon as we switched on the second power supply, the <strong>Supervisor Engine</strong> LEDs magically turned <strong>Green</strong>! While we found no documentation to explain this behavior, we thought it would be worth mentioning for our readers and engineers preparing to install a 4500 series switch!</p>
<h2>Summary</h2>
<p style="text-align: justify;">Those who have had the luck to physically install and work on a <strong>Cisco Catalyst 4507R</strong> or any Catalyst 4500 series switch would surely agree that it is a wonderful experience and impressive piece of equipment. Examining the design and construction of the chassis, line cards and Supervisor Engines shows how much thought and work have gone into the product.</p>
<p style="text-align: justify;">Our <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4500-supervisor-engine-ios-upgrade.html" target="_blank" title="Cisco 4507R-E Supervisor Engine IOS Upgrade">next article</a> covers the IOS upgrade of the Supervisor engine, health checkup, using the <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4500-supervisor-engine-ios-upgrade.html" target="_blank" title="Catalyst Supervisor Engine zero downtime IOS upgrade procedure"><strong>zero downtime IOS upgrade procedure</strong></a> – a necessary and extremely handy procedure that ensures the upgrade of the IOS Supervisor engines without any service interruption!</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Mon, 01 Apr 2013 08:14:04 +1100</pubDate>
		</item>
		<item>
			<title>Discover Features &amp; Capabilities - Cisco Catalyst 3850 With Integrated Wireless LAN Controller (WLC)</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-catalyst-3850.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-catalyst-3850.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx//images/stories/cisco-switches-catalyst3850-1.jpg" alt="cisco catalyst 3850 overview" width="200" height="99" style="margin: 7px; float: left;" />There’s a new switch around the block and its name is Catalyst 3850 – Cisco’s latest addition to its successful Catalyst series switches. The Cisco Catalyst 3850 is no ordinary switch – it’s fully stackable and designed to integrate wired and wireless networks by offering full switch and the industry’s first built in wireless LAN controller.</p>
<p style="text-align: justify;">With 480Gbps stacking bandwidth, support for 802.11ac (at least 500Mbit/sec single link throughput) wireless, Power over Ethernet Plus (30Watt/ port), StackPower and Flexible NetFlow support on all ports, this is one of the most comprehensive list of features ever produced in a Catalyst switch.</p>
<h2>Cisco 3850 Integrated Wireless Controller</h2>
<p style="text-align: justify;">Perhaps one of the features most engineers and managers would have asked for is now available with the new 3850 series. The integrated wireless controller allows organizations to invest in one switch that will cover their wired and wireless needs, and we are not talking about a simple wireless LAN controller.</p>
<p style="text-align: justify;">The wireless capabilities provided by the new Catalyst 3850 are nothing less than impressive. With support for up to 50 access points, 2000 wireless clients per 3850 switch/stack, support of the new upcoming 802.11ac standard that allows throughput of at least 500Mbps per link and, get ready for it, a total of 40Gbps wireless throughput (20Gbps on 24port models) - makes this switch blazingly fast with enough room to cover today’s and tomorrow’s wireless needs.</p>
<p style="text-align: justify;">Each <strong>Cisco Catalyst 3850 switch/stack</strong> can operate the Wireless Controller in two modes:&nbsp; Mobility Agent (MA) or Mobility Controller (MC).</p>
<p style="text-align: justify;"><strong>Mobility Agent</strong> is the default mode where the switch is capable of terminating CAPWAP tunnels from access points and provide wireless connectivity to wireless clients. Mobility Agent mode requires the IP Base license installed.</p>
<p style="text-align: justify;"><strong>Mobility Controller</strong> mode allows the Catalyst 3850 to perform additional tasks such as radio resource management (RRM), Cisco Clean Air coordination inside a mobility subdomain. Mobility Controller mode is supported in the IP Base license and can be enabled via CLI.</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-switches-catalyst3850-2.jpg" alt="cisco catalyst 3850 front and network modules" width="450" height="223" style="display: block; margin-left: auto; margin-right: auto; vertical-align: middle;" title="Cisco Catalyst 3850 switch/stack" /></strong></p>
<h2>Catalyst 3850 Features</h2>
<p style="text-align: justify;">The <strong>Catalyst 3850</strong> comes in 3 different configurations: <strong>Non-PoE</strong>, <strong>PoE+</strong> and <strong>Full PoE+</strong> support.</p>
<p style="text-align: justify;">Each configuration supports 24 or 48 ports, except for Full PoE+ which is only supported in the 48 port version as shown in the table below:</p>
<table border="1" style="width: 92%;" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td style="width: 24%;" valign="top">
<p><strong>Models</strong></p>
</td>
<td style="width: 21%;" valign="top">
<p><strong>Total 10/100/1000 Ethernet Ports</strong></p>
</td>
<td style="width: 18%;" valign="top">
<p><strong>Default AC Power Supply</strong></p>
</td>
<td style="width: 16%;" valign="top">
<p><strong>Available PoE Power</strong></p>
</td>
<td style="width: 19%;" valign="top">
<p><strong>StackPower</strong></p>
</td>
</tr>
<tr>
<td style="width: 24%;" valign="top">
<p>&nbsp;WS-C3850-24T</p>
</td>
<td style="width: 21%;" valign="top">
<p>&nbsp;24</p>
</td>
<td rowspan="2" style="width: 18%;" valign="top">
<p>&nbsp;350WAC</p>
</td>
<td rowspan="2" style="width: 16%;" valign="top">
<p>-</p>
</td>
<td rowspan="5" style="width: 19%;" valign="top">
<p>&nbsp;Yes</p>
</td>
</tr>
<tr>
<td style="width: 24%;" valign="top">
<p>&nbsp;WS-C3850-48T</p>
</td>
<td style="width: 21%;" valign="top">
<p>&nbsp;48</p>
</td>
</tr>
<tr>
<td style="width: 24%;" valign="top">
<p>&nbsp;WS-C3850-24P</p>
</td>
<td style="width: 21%;" valign="top">
<p>&nbsp;24 PoE+</p>
</td>
<td rowspan="2" style="width: 18%;" valign="top">
<p>&nbsp;715WAC</p>
</td>
<td rowspan="2" style="width: 16%;" valign="top">
<p>&nbsp;435W</p>
</td>
</tr>
<tr>
<td style="width: 24%;" valign="top">
<p>&nbsp;WS-C3850-48P</p>
</td>
<td style="width: 21%;" valign="top">
<p>&nbsp;48 PoE+</p>
</td>
</tr>
<tr>
<td style="width: 24%;" valign="top">
<p>&nbsp;WS-C3850-48F</p>
</td>
<td style="width: 21%;" valign="top">
<p>&nbsp;48 PoE+</p>
</td>
<td style="width: 18%;" valign="top">
<p>&nbsp;1100WAC</p>
</td>
<td style="width: 16%;" valign="top">
<p>&nbsp;800W</p>
</td>
</tr>
</tbody>
</table>
<p>Full PoE+ configurations guarantees 30watts of PoE power on all ports.</p>
<p><strong>More features include</strong>:</p>
<ul class="check">
<li style="text-align: justify;">Integrated Wireless Controller.&nbsp; Supports up to 50 access points and 2000 wireless clients on each individual switch or stack.</li>
<li style="text-align: justify;">Dual Power Supply. Combine up to two power supplies in each switch.</li>
<li style="text-align: justify;">Cisco StackPower. Allows power stacking between stack members for power redundancy.</li>
<li style="text-align: justify;">StackWise Technology. Stack your 3850’s together and create one single manageable switch with 480Gbps of bandwidth – enough to satisfy the most demanding network environments</li>
<li style="text-align: justify;">Full PoE+ support (IEEE 802.3at)</li>
<li style="text-align: justify;">Cisco IOS software support. Engineers with experience in IOS will have no trouble learning to operate and configure the new features offered.</li>
<li style="text-align: justify;">Enhanced limited lifetime warranty (E-LLW) with next business day (NBD) advanced hardware replacement and 90-days Cisco Technical Assistance Center Support (Cisco TAC).</li>
</ul>
<h4><strong><img src="https://www.firewall.cx//images/stories/cisco-switches-catalyst3850-3.jpg" alt="catalyst 3850 stackwise powerstack dual power supply" width="550" height="297" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst 3850 Power Stack - StackWise connectors" /></strong></h4>
<h2>Network Modules</h2>
<p style="text-align: justify;">The Catalyst 3850 supports three optional network modules for optical uplinks to other switches or central servers. As shown in the table below, the network modules allow support for the following configurations:</p>
<ul>
<li><strong>4 x 1</strong> Gigabit Ethernet via SFP modules</li>
<li><strong>2 x 10</strong> Gigabit Ethernet via SFP+ modules</li>
<li><strong>4 x 40</strong> Gigabit Ethernet via SFP+ modules (Only on 48-port models)</li>
</ul>
<table border="1" style="width: 80%;" cellspacing="0" cellpadding="0">
<tbody>
<tr>
<td valign="top">
<p><strong>Product Number</strong></p>
</td>
<td valign="top">
<p><strong>Product Description</strong></p>
</td>
</tr>
<tr>
<td valign="top">
<p>&nbsp;C3850-NM-4-1G</p>
</td>
<td valign="top">
<p>&nbsp;4 x Gigabit Ethernet network modules</p>
</td>
</tr>
<tr>
<td valign="top">
<p>&nbsp;C3850-NM-2-10G</p>
</td>
<td valign="top">
<p>&nbsp;4 x Gigabit Ethernet/2 x 10 Gigabit Ethernet network modules</p>
</td>
</tr>
<tr>
<td valign="top">
<p>&nbsp;C3850-NM-4-10G</p>
</td>
<td valign="top">
<p style="text-align: justify;">&nbsp;4 x Gigabit Ethernet/4 x 10 Gigabit Ethernet network modules</p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">For a comprehensive list of features, services and configurations, readers can download the <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-catalyst-3850-switches.html" target="_blank" title="Cisco Catalyst 3850 Datasheet">Cisco Catalyst 3850 Datasheet</a>, now available in our <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides.html" target="_blank" title="Cisco Product Datashets and Guides">Cisco Product Datashets and Guides</a> download section.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Mon, 11 Feb 2013 00:11:36 +1100</pubDate>
		</item>
		<item>
			<title>Configuring SPAN On Cisco Catalyst Switches - Monitor &amp; Capture Network Traffic/Packets</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-span-monitoring.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Being able to monitor your network traffic is essential when it comes to troubleshooting problems, performing a security audit or even casually checking your network for suspicious traffic.</p>
<p style="text-align: justify;">Back in the old days whenever there was a need to monitor or capture network traffic, a hub would be introduced somewhere in the network link and, thanks to the hub’s inefficient design, it would copy all packets incoming from one port out to all the rest of the ports, making it very easy to monitor network traffic. Those interested in hub fundamentals can read our <a href="https://www.firewall.cx/networking/network-fundamentals/hubs-repeaters.html" target="_blank" title="Hubs &amp; Repeaters">Hubs &amp; Repeaters</a> article.</p>
<p style="text-align: justify;">Of course switches work on an entirely different principle and do not replicate unicast packets out of every port on the switch, but keep them isolated unless it’s a broadcast or multicast.</p>
<p style="text-align: justify;">Thankfully, monitoring network traffic on Cisco Catalyst switches is a straightforward process and does not require the presence of a hub. The Cisco method is called <strong>Switched Port Analyser</strong> also known as&nbsp; <strong>SPAN</strong>.</p>
<h2>Understanding SPAN Terminology</h2>
<ul>
<li><strong>Ingress Traffic</strong>: Traffic that enters the switch</li>
<li><strong>Egress Traffic</strong>: Traffic that leaves the switch</li>
<li><strong>Source (SPAN) port</strong>: A port that is monitored</li>
<li><strong>Source (SPAN) VLAN</strong>: A VLAN whose traffic is monitored</li>
<li><strong>Destination (SPAN) port</strong>: A port that monitors source ports. This is usually the point to which a network analyser is connected.</li>
<li><strong>Remote SPAN</strong> (<strong>RSPAN</strong>): When <strong>Source ports</strong> are not located on the same switch as the <strong>Destination port</strong>. RSPAN is an advanced feature that requires a special VLAN to carry the monitored traffic and is not supported by all switches. RSPAN explanation and configuration will be covered in another article.</li>
</ul>
<p style="text-align: center;"><img src="https://www.firewall.cx//images/stories/cisco-switches-span-1.png" alt="cisco-switches-span-1" width="673" height="343" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst Switches - Remote SPAN (RSPAN) Configuration" />Figure 1. The network diagram above helps us understand the terminology and implementation of <strong>SPAN</strong>.</p>
<p><strong>Source SPAN</strong> ports are monitored for <strong>received</strong> (RX - Ingress), <strong>transmitted</strong> (TX - Egress) or bidirectional (both) traffic.&nbsp; Traffic entering or exiting the <strong>Source SPAN</strong> ports is mirrored to the <strong>Destination SPAN</strong> port. Typically, you would connect a PC with a network analyser&nbsp; on the <strong>Destination SPAN</strong> port, and configure it to capture and analyse the traffic.</p>
<p>The amount of information you can obtain from a SPAN session really depends on how well the captured data can be interpreted and understood. A reliable Network Analyser will not only show the captured packets but automatically diagnose problems such as TCP retransmissions, DNS failures, slow TCP responses, ICMP redirect messages and much more. These capabilities help any engineer to quickly locate network problems which otherwise could not be easily found.</p>
<h2>Basic Characteristics &amp; Limitations Of Source Port</h2>
<p style="text-align: justify;">A <strong>source port</strong> has the following characteristics:</p>
<ul>
<li>It can be any port type such as EtherChannel, Fast Ethernet, Gigabit Ethernet and so forth.</li>
<li>It can be monitored in multiple SPAN sessions.</li>
<li>It cannot be a destination port (that’s where the packet analyser is connected)</li>
<li>Each source port can be configured with a direction (ingress, egress, or both) to monitor. For EtherChannel sources, the monitored direction applies to all physical ports in the group.</li>
<li>Source ports can be in the same or different VLANs.</li>
<li>For VLAN SPAN sources, all active ports in the source VLAN are included as source ports.</li>
</ul>
<h2>Basic Characteristics &amp; Limitations Of Destination Port</h2>
<p style="text-align: justify;">Each SPAN session must have a destination port that receives a copy of the traffic from the source ports and VLANs.</p>
<p style="text-align: justify;">A <strong>destination port</strong> has these characteristics:</p>
<ul>
<li>A destination port must reside on the same switch as the source port (for a local SPAN session).</li>
<li>A destination port can be any Ethernet physical port.</li>
<li>A destination port can participate in only one SPAN session at a time.</li>
<li>A destination port in one SPAN session cannot be a destination port for a second SPAN session.</li>
<li>A destination port cannot be a source port.</li>
<li>A destination port cannot be an EtherChannel group.</li>
</ul>
<h2>Limitations Of SPAN On Cisco Catalyst Models</h2>
<p style="text-align: justify;">Following are the <strong>limitations</strong> of <strong>SPAN</strong> on various <strong>Cisco Catalyst switches</strong>:</p>
<ul>
<li><strong>Cisco Catalyst 2950 switches</strong> are only able to have one SPAN session active at a time and can monitor source ports. These switches cannot monitor VLAN source.</li>
<li>Cisco Catalyst switches can forward traffic on a <strong>destination SPAN port</strong> in Cisco <strong>IOS 12.1(13)EA1 and later</strong></li>
<li><strong>Cisco Catalyst 3550, 3560</strong> and <strong>3750</strong> switches can support up to<strong> two SPAN sessions</strong> at a time and can monitor source ports as well as VLANs</li>
<li>The <strong>Catalyst 2970, 3560, and 3750</strong> switches <strong>do not</strong> require the configuration of a <strong>reflector port</strong> when you configure an RSPAN session.</li>
<li>The <strong>Catalyst 3750</strong> switches support <strong>session configuration</strong> with the use of <strong>source</strong> and <strong>destination ports</strong> that reside on any of the switch stack members.</li>
<li>Only <strong>one destination port</strong> is allowed <strong>per SPAN session</strong> and the same port <strong>cannot</strong> be a <strong>destination port</strong> for <strong>multiple SPAN sessions</strong>. Therefore, you <strong>cannot</strong> have<strong> two SPAN sessions</strong> that use the <strong>same destination port</strong>.</li>
</ul>
<h2>Configuring SPAN On Cisco Catalyst Switches</h2>
<p style="text-align: justify;">Our test-bed was a Cisco Catalyst 3550 Layer 3 switch, however, the commands used are fully supported on all Cisco Catalyst 2940, 2950, 2955, 2960, 2970, 3550, 3560, 3560−E, 3750, 3750−E and 4507R Series Switches.</p>
<p style="text-align: justify;">The diagram below represents a typical network setup where there is a need to monitor traffic entering (Ingress) and exiting (Egress) the port to which the router connects (FE0/1). This strategically selected port essentially monitors all traffic entering and exiting our network.</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-switches-span-2.png" alt="" width="688" height="419" style="display: block; margin-left: auto; margin-right: auto;" title="Configuring SPAN On Cisco Catalyst Switches" data-alt="cisco-switches-span-2" /></p>
<p style="text-align: justify;">Since router <strong>R1 </strong>connects to the <strong>3550 </strong>Catalyst switch on port <strong>FE0/1</strong>, this port is configured as the <strong>Source SPAN port</strong>. Traffic copied from <strong>FE0/1</strong> is to be mirrored out <strong>FE0/24</strong> where our monitoring workstation is waiting to capture the traffic.</p>
<p style="text-align: justify;">Once we have our network analyser setup and running, the first step is to configure <strong>FastEthernet 0/1</strong> as a <strong>source SPAN port</strong>:</p>
<div class="box-content" style="text-align: justify;">Catalyst-3550(config)# <strong>monitor session 1 source interface fastethernet 0/1</strong></div>
<p style="text-align: justify;">Next, configure <strong>FastEthernet 0/24</strong> as the <strong>destination SPAN port</strong>:</p>
<div class="box-content" style="text-align: justify;">Catalyst-3550(config)# <strong>monitor session 1 destination interface fastethernet 0/24</strong></div>
<p style="text-align: justify;">After entering both commands, we noticed our destination’s SPAN port LED (<strong>FE0/24</strong>) began flashing in synchronisation with that of <strong>FE0/1’s</strong> LED – an expected behaviour considering all <strong>FE0/1 </strong>packets were being copied to <strong>FE0/24</strong>.</p>
<p style="text-align: justify;">Confirming the monitoring session and operation requires one simple command, <strong style="text-align: justify;">show monitor session 1</strong>:</p>
<div class="box-content" style="text-align: justify;">Catalyst-3550# &nbsp;<strong><strong>show monitor session 1<br /></strong></strong>Session 1<br />---------<br />Type&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Local Session<br />Source Ports&nbsp;&nbsp; :<br />Both&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Fa0/1<br />Destination Ports : Fa0/24<br />&nbsp;&nbsp;&nbsp; Encapsulation : Native<br />&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ingress : Disabled</div>
<p><br />To display the detailed information from a saved version of the monitor configuration for a specific session, issue the <strong>show monitor session 1 detail </strong>command:</p>
<div class="box-content">Catalyst-3550#<strong> show monitor session 1 detail</strong><br />Session 1<br />---------<br />Type&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Local Session<br />Source Ports&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; :<br />&nbsp;&nbsp;&nbsp; RX Only&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : None<br />&nbsp;&nbsp;&nbsp; TX Only&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; : None<br />&nbsp;&nbsp;&nbsp; Both&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Fa0/1<br />Source VLANs&nbsp;&nbsp; &nbsp;&nbsp; :<br />&nbsp;&nbsp;&nbsp; RX Only&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : None<br />&nbsp;&nbsp;&nbsp; TX Only&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : None<br />&nbsp;&nbsp;&nbsp; Both&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; : None<br />Source RSPAN VLAN : None<br />Destination Ports&nbsp;&nbsp;&nbsp; : Fa0/24<br />&nbsp;&nbsp;&nbsp; Encapsulation &nbsp;&nbsp; : Native<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Ingress:&nbsp; &nbsp; Disabled<br />Reflector Port&nbsp; &nbsp; &nbsp;&nbsp; : None<br />Filter VLANs&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; : None<br />Dest RSPAN VLAN&nbsp; &nbsp; : None</div>
<p>Notice how the<strong> Source Ports</strong> section shows <strong>Fa0/1</strong> for the row named <strong>Both</strong>. This means that we are monitoring both RX &amp; TX packets for Fa0/1, while the <strong>Destination Port</strong> is set to Fa0/24.<br /><br />Turning to our network analyser, thanks to its predefined filters we were able to catch packets to and from the worksation monitored:</p>
<p><img src="https://www.firewall.cx//images/stories/cisco-switches-span-3.png" alt="" width="700" height="444" style="display: block; margin-left: auto; margin-right: auto;" title="Packet Sniffer - RSPAN Configuration on Catalyst Switches" data-alt="cisco-switches-span-3" /></p>
<p style="text-align: justify;">This completes our discussion on <strong>SPAN configuration</strong> and how to monitor/capture packets on a Cisco Catalyst switch. Upcoming articles will cover <strong>RSPAN</strong> and more advanced packet capturing techniques using dedicated VLANs for captured traffic and other complex scenarios.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Tue, 29 Jan 2013 08:00:00 +1100</pubDate>
		</item>
		<item>
			<title>Download The Complete Cisco Catalyst Switching Portfolio. Includes Catalyst 6500, 4500, 4900,  3750-X, 3560-X, 3560-E, 2960, 2960S &amp; 2360 Series Datasheets</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-portfolio.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-portfolio.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx//images/stories/cisco-switches-portfolio-1.png" alt="Cisco Catalyst 4500 and 6500 switches" width="210" height="140" style="margin: 7px; float: left;" />The Cisco Catalyst Switching Portfolio is perhaps one of the most useful Cisco PDF files, containing all Catalyst series products.&nbsp; <br /><br />The portfolio covers all Cisco modular switches, including the popular 6500 and 4500 series, the chassis, slots, supervisor engine options, compatible line cards for 10 Gigabit Ethernet, Gigabit Ethernet, Fiber, 10/100/1000 and bundles. <br /><br />The Fixed Configuration Switches section includes the Cisco Catalyst 4900 series, popular 3750-X StackWise Plus switches, 3750V2, 3560-X, 3560-E, 3560, 2960S with FlexStack Stacking and LAN Base, LAN Lite software, 3560-C, 2960-C and 2360 models.<br /><br />For each category of Catalyst switches you'll find full model numbers, detailed descriptions and the necessary product number.&nbsp; <br /><br />This great PDF file will allow you to quickly find the right product for your needs without spending hours on Cisco's site trying to figure out what products are available.<br /><br />To download this time-saver PDF, visit our <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides.html" target="_blank" title="Cisco Product Datasheets &amp; Guides">Cisco Product Datasheets &amp; Guides</a> Download section. </p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Tue, 18 Dec 2012 08:00:00 +1100</pubDate>
		</item>
		<item>
			<title>End-of-Sale and End-of-Life Announcement for the Cisco Catalyst 3750G, 3560G, 3750-E, and 3560-E Series Switches</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-eol.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-eol.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Cisco announces the end-of-sale and end-of-life dates for the <strong>Cisco Catalyst 3750G</strong>, <strong>3560G</strong>, <strong>3750-E</strong>, and <strong>3560-E Series Switches</strong>. The last day to order the affected product(s) is January 30, 2013. Customers with active service contracts will continue to receive support from the Cisco Technical Assistance Center (TAC) as shown in Table 1 of the EoL bulletin.</p>
<p style="text-align: justify;">Table 1 describes the end-of-life milestones, definitions, and dates for the affected product(s). Table 2 lists the product part numbers affected by this announcement. For customers with active and paid service and support contracts, support will be available until the termination date of the contract, even if this date exceeds the Last Date of Support shown in Table 1.</p>
<div style="text-align: justify;">Please note that the list price of some of the products listed in this announcement may increase in the next 12&nbsp;months.</div>
<p style="text-align: justify;"><strong>Table 1.</strong> End-of-Life Milestones and Dates for the Cisco Catalyst 3750G, 3560G, 3750-E, and 3560-E Series Switches</p>
<div align="left">
<table border="1" id="wp9000001table4000001" style="width: 80%;" cellspacing="0" cellpadding="6">
<tbody>
<tr align="left" valign="top">
<td><strong>&nbsp;</strong>
<p><strong>Milestone</strong></p>
</td>
<td><strong>&nbsp;</strong>
<p><strong>Definition</strong></p>
</td>
<td><strong>&nbsp;</strong>
<p><strong>Date</strong></p>
</td>
</tr>
<tr align="left" valign="top">
<td>&nbsp;
<p>End-of-Life Announcement Date</p>
</td>
<td>&nbsp;
<p>The date the document that announces the end-of-sale and end-of-life of a product is distributed to the general public.</p>
</td>
<td>&nbsp;
<p>January 31, 2012</p>
</td>
</tr>
<tr align="left" valign="top">
<td>&nbsp;
<p>End-of-Sale Date</p>
</td>
<td>&nbsp;
<p>The last date to order the product through Cisco point-of-sale mechanisms. The&nbsp;product is no longer for sale after this date.</p>
</td>
<td>&nbsp;
<p>January 30, 2013</p>
</td>
</tr>
<tr align="left" valign="top">
<td>&nbsp;
<p>Last Ship Date:<br /> HW</p>
</td>
<td>&nbsp;
<p>The last-possible ship date that can be requested of Cisco and/or its contract manufacturers. Actual ship date is dependent on lead time.</p>
</td>
<td>&nbsp;
<p>April 30, 2013</p>
</td>
</tr>
<tr align="left" valign="top">
<td>&nbsp;
<p>End of SW Maintenance Releases Date:<br /> HW</p>
</td>
<td>&nbsp;
<p>The last date that Cisco Engineering may release any final software maintenance releases or bug fixes. After this date, Cisco Engineering will no longer develop, repair, maintain, or test the product software.</p>
</td>
<td>&nbsp;
<p>January 30, 2014</p>
</td>
</tr>
<tr align="left" valign="top">
<td>&nbsp;
<p>End of Routine Failure Analysis Date:<br /> HW</p>
</td>
<td>&nbsp;
<p>The last-possible date a routine failure analysis may be performed to determine the cause of hardware product failure or defect.</p>
</td>
<td>&nbsp;
<p>January 30, 2014</p>
</td>
</tr>
<tr align="left" valign="top">
<td>&nbsp;
<p>End of New Service Attachment Date:<br /> HW</p>
</td>
<td>&nbsp;
<p>For equipment and software that is not covered by a service-and-support contract, this&nbsp;is the last date to order a new service-and-support contract or add the equipment and/or software to an existing service-and-support contract.</p>
</td>
<td>&nbsp;
<p>January 30, 2014</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p>End of Vulnerability/Security Support:<br /> OS SW</p>
</td>
<td>
<p>The last date that Cisco Engineering may release a planned maintenance release or scheduled software remedy for a security vulnerability issue.</p>
</td>
<td>
<p>January 30, 2016</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p>End of Service Contract Renewal Date:<br /> HW</p>
</td>
<td>
<p>The last date to extend or renew a service contract for the product.</p>
</td>
<td>
<p>April 30, 2017</p>
</td>
</tr>
<tr align="left" valign="top">
<td>
<p>Last Date of Support:<br /> HW</p>
</td>
<td>
<p>The last date to receive service and support for the product. After this date, all support services for the product are unavailable, and the product becomes obsolete.</p>
</td>
<td>
<p>January 31, 2018</p>
</td>
</tr>
</tbody>
</table>
</div>
<p>&nbsp;</p>
<div>HW = Hardware OS SW = Operating System Software App. SW = Application Software</div>
<p><br /><br /><br /></p>
<p><strong>Table 2.</strong> Product Part Numbers Affected by This Announcement</p>
]]></description>
			<category>Cisco Switches</category>
			<pubDate>Thu, 23 Aug 2012 19:20:19 +1000</pubDate>
		</item>
		<item>
			<title>Installation and Setup of Cisco SG500-52P - 500 Series Stackable Managed Switches</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-sg500-52p.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-sg500-52p.html</guid>
			<description><![CDATA[<p style="text-align: justify;">The <strong>SG500 series</strong> Cisco switches are the next step up from the already popular <strong>SG300 Layer-3 switches</strong>. Cisco introduced the SG Small Business series switches to compete against DELL’s and HP’s offerings and take the same share of the market.&nbsp;</p>
<p style="text-align: justify;">Cisco saw the massive gap between its entry level Catalyst switches (2960S &amp; 3560) and the competition, and decided to hit them as much as it could with the SG series switches.</p>
<p style="text-align: justify;">The specifications on the newer SG 500 series switches are impressive: switching capacity starting from 28.8Gbps for the smallest <strong>24-port SG500</strong>, up to 176Gbps for the largest models that include 10Gpbs uplinks, all with layer-3 switching, stacking and power efficiency capabilities!</p>
<p align="center"><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-1.jpg" alt="cisco-sg500-1" width="650" height="295" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 Series Switch Installation" /></strong></p>
<p style="text-align: justify;">Here are some highlights of the <strong>SG 500 Series</strong>:</p>
<ul class="checkbox check" style="text-align: justify;">
<li>High-Power Power over Ethernet Plus (PoE+), providing up to 30 watts per port</li>
<li>Full IPv6 Support</li>
<li>Advanced Layer 3 Traffic Management (InterVLAN-Routing)</li>
<li>Strong Security. Access Control Lists (ACLs), Voice VLAN, Guest VLAN and many more security features.</li>
<li>Power Efficiency. Ability to automatic power shutoff ports not used, adjusting signal strength based on length of connecting cable etc.</li>
<li>Expandability. Offering 1G and 1G/5G Ethernet expansion slots. 10G expansion slots for the 500X series.</li>
<li>Limited lifetime warranty with next-business-day advanced replacement.</li>
</ul>
<p style="text-align: justify;">For our readers' convenience, we've made the following downloads available directly from Firewall.cx:</p>
<ul>
<li>Cisco SG500 Series Overview</li>
<li>Cisco SG500 Series Datasheet</li>
<li>Cisco SG500 Quick Start Guide</li>
</ul>
<p style="text-align: justify;">&nbsp;These are easily accessible in our <a href="https://www.firewall.cx/downloads/cisco-product-datasheets-a-guides/cisco-sg500-series-switches.html" target="_blank" title="SG500 Datasheet Download">SG500 Datasheet Download</a> section.</p>
<h2 style="text-align: justify;">Initial Setup of SG500-52P</h2>
<p style="text-align: justify;">Just like the SG200 &amp; SG300 series, the SG500 can be configured by both Web and CLI interface. The Web interface is highly intuitive but does require some time to understand its layout and where to configure different aspects of the switch.</p>
<p style="text-align: justify;">The CLI mode is similar to that of the Cisco IOS Catalyst switches but it has its own logic, something we believe Cisco did deliberately to ensure the SG series configuration experience is not ‘identical’ to the much more expensive and well known Catalyst switches.</p>
<p style="text-align: justify;">We found that the best way to configure the switch was to use the CLI interface for specific functions such as setting up IP Addresses, creating and naming VLANs, setting default gateway, then using the web interface for configuring the trunk and access links, allowed VLANs etc. When we completed the configuration and performed a ‘<strong>show running-config</strong>’ in CLI mode, we then understood that some of the web configuration could have easily been done through CLI.</p>
<p style="text-align: justify;">As with the SG200 &amp; SG300 models, it is advised to always keep the firmware updated to the latest available version. Earlier SG300 firmware suffered from plenty of problems that could cause the switch to stop processing packets and required a reboot to restore functionality.</p>
<p>Hopefully, we won’t be experiencing the same problems with the SG500 firmware.</p>
<h2>Before You Begin</h2>
<p style="text-align: justify;">Both SG300 and SG500 series switches are layer-3 capable, which means you can create multiple VLANs and route between them - a function called InterVLAN routing. For more information about InterVLAN routing, you can read our <a href="https://www.firewall.cx/networking/vlan-networks/intervlan-routing.html" target="_blank" title="InterVLAN Routing">InterVLAN&nbsp; routing</a> article.</p>
<p style="text-align: justify;">Most people are not aware that when an SG300 or SG500 switch is powered up for the first time, it defaults to Layer-2 mode!&nbsp; In order to create multiple VLANs, assign IP Addresses and enable Layer-3 Switching, you must switch the SG300 &amp; SG500 to <strong>router</strong> mode! When this is done all configuration is erased and the device is reset, losing any configuration performed.</p>
<p style="text-align: justify;">It is therefore highly advisable to always switch to <strong>router</strong> mode before any configuration is performed on the switch!</p>
<h2 style="text-align: justify;">Switching to ‘Router’ Mode – Enabling Layer-3 Switching</h2>
<p style="text-align: justify;">To switch to router mode, connect to the serial port using the provided DB9 serial cable (read up on our serial cable articles for info on DB9 connectors) and set the com port thus:</p>
<ul class="arrow">
<li>115200 Baud Rate</li>
<li>8 Data Bits</li>
<li>No Parity</li>
<li>1 Stop Bit</li>
<li>No Flow Control</li>
</ul>
<p>When presented with the login prompt, use ‘<strong>cisco</strong>’ as the username and password. You will be requested to change the password before you perform any configuration:</p>
<p class="box-content">User Name:cisco&nbsp; Password:*****<br /><br />Please change your password from the default settings. Please change the password for better protection of your network. <br /><br />Do you want to change the password (Y/N)[Y] ?Y<br /><br />Enter old password&nbsp; : *****<br />Enter new password&nbsp; : ************<br />Confirm new password: ************</p>
<p style="text-align: justify;">When complete, the CLI prompt will be presented along with the familiar hash symbol. At the prompt, enter show system mode to view the current mode:<code></code></p>
<p class="box-content">switch# <strong>show system mode</strong><br /><br />Feature&nbsp;&nbsp;&nbsp; State<br />------&nbsp;&nbsp; ---------<br />Mode:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Switch</p>
<p>Without delay, let’s switch to router mode:</p>
<p class="box-content" style="text-align: justify;">switch# <strong>set system mode router</strong><br /><br />Changing the switch working mode will *delete* the startup configuration file and reset the device right after that. It is highly recommended that you will backup it before changing the mode, continue ? (Y/N)[N] <strong>Y</strong></p>
<p>As the reset process begins, a number of messages will be displayed on the console and the switch will finally reboot:<code></code><code></code></p>
<p class="box-content">switch# 02-Feb-2012 10:48:36 %AAA-I-CONNECT: User CLI session for user cisco over console , source 0.0.0.0 destination&nbsp; 0.0.0.0 ACCEPTED, aggregated (1)<br /><br /><br />02-Feb-2012 10:48:55 %FILE-I-DELETE: File Delete - file URL flash://startup-config<br />Resetting local unit<br /><br />**************************************************<br />*****************&nbsp; SYSTEM RESET&nbsp; *****************<br />**************************************************<br />Boot1 Checksum Test...............................PASS<br /><br />Boot2 Checksum Test...............................PASS<br /><br />Flash Image Validation Test.......................PASS<br /><br />BOOT Software Version 1.2.0.12 Built&nbsp; 23-Nov-2011&nbsp; 08:31:59<br /><br />Networking device with Marvell ARM CPU core. 256 MByte SDRAM. <br />I-Cache 16 KB. D-Cache 16 KB. L2 Cache 256 KB. Cache Enabled.<br /><br />MAC Address&nbsp;&nbsp; :&nbsp; 88:43:e1:ad:52:53.<br /><br />Autoboot in 2 seconds - press RETURN or Esc. to abort and enter prom.<br />Preparing to decompress... <br />&nbsp;100%<br />Decompressing SW from image-1<br />&nbsp;100%<br /><br />OK<br />Running from RAM...<br />About to erase CDB. Terminal baud rate will now be set to default!<br />Board ID is 27<br />Device ID 0xdc7411ab<br /><br />*********************************************************************<br />*** Running&nbsp; SW&nbsp; Ver. 1.2.0.97&nbsp; Date&nbsp; 02-Feb-2012&nbsp; Time&nbsp; 10:12:46 ***<br />*********************************************************************<br />HW version is V01<br />Base Mac address is: 88:43:e1:ad:52:53<br />Dram size is&nbsp; : 256M bytes<br />Dram first block size is&nbsp; : 208896K bytes<br />Dram first PTR is&nbsp; : 0x3000000<br />Dram second block size is&nbsp; : 4096K bytes<br />Dram second PTR is&nbsp; : 0xFC00000<br />Flash size is: 32M<br />02-Feb-2012 10:13:09 %CDB-I-LOADCONFIG: Loading running configuration.<br />02-Feb-2012 10:13:09 %CDB-I-LOADCONFIG: Loading startup configuration.<br />Device configuration:<br />Slot 1 - SG500-52P<br />Device 0: GT_98DX3124 (TomCat)<br />Device 1: GT_98DX3124 (TomCat)<br /><br />------------------------------------<br />-- Unit Number 1&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; --<br />------------------------------------<br />02-Feb-2012 10:13:21 %Entity-I-SEND-ENT-CONF-CHANGE-TRAP: entity configuration change trap.<br />02-Feb-2012 10:13:32 %INIT-I-InitCompleted: Initialization task is completed<br /><br />&gt;<br />-----------------------------------<br />-- Unit Number 1&nbsp; Master Enabled --<br />-----------------------------------<br /><br />Tapi Version: v1.9.5<br />Core Version: v1.9.5<br />02-Feb-2012 10:13:39 %Stack-I-STCK-CFG-CHNG: Configuration changed: chain<br />02-Feb-2012 10:13:39 %MLDP-I-MASTER: Switching to the Master Mode.<br />02-Feb-2012 10:13:43 %Environment-I-FAN-STAT-CHNG: FAN# 1 status changed - operational.<br />02-Feb-2012 10:13:43 %Environment-I-FAN-STAT-CHNG: FAN# 2 status changed - operational.<br />02-Feb-2012 10:13:43 %Environment-I-FAN-STAT-CHNG: FAN# 3 status changed - operational.<br />02-Feb-2012 10:13:43 %Environment-I-FAN-STAT-CHNG: FAN# 4 status changed - operational.<br />02-Feb-2012 10:13:43 %Environment-I-FAN-STAT-CHNG: FAN# 1 status changed - operational.<br />02-Feb-2012 10:13:43 %Environment-I-FAN-STAT-CHNG: FAN# 2 status changed - operational.<br />02-Feb-2012 10:13:43 %SNMP-I-CDBITEMSNUM: Number of running configuration items loaded: 0<br />02-Feb-2012 10:13:43 %Environment-I-FAN-STAT-CHNG: FAN# 3 status changed - operational.<br />02-Feb-2012 10:13:43 %Environment-I-FAN-STAT-CHNG: FAN# 4 status changed - operational.<br />02-Feb-2012 10:13:43 %SNMP-I-CDBITEMSNUM: Number of startup configuration items loaded: 0<br />02-Feb-2012 10:13:43 %Entity-I-SEND-ENT-CONF-CHANGE-TRAP: entity configuration change trap.<br /><br />&gt;lcli</p>
<p>At this point, it is necessary to login using the <strong>cisco </strong>username &amp; password, then change the password as prompted.</p>
<p style="text-align: justify;">Issuing the show system mode command will then confirm the switch is in <strong>router </strong>mode, which means we are in business:</p>
<div class="box-content">switch# <strong>show system mode</strong><br /><br />Feature&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; State<br />---------&nbsp;&nbsp;&nbsp; ---------<br />Mode:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Router</div>
<h2>Creating VLANs, Assigning IP Addresses, Default Gateway, DNS Name-Server &amp; Enabling IP Routing</h2>
<p style="text-align: justify;">The process of creating VLANs on the SG500 is similar to that of the Catalyst switches. First create your VLANs and then VLAN interfaces to configure IP addresses.&nbsp; Since VLAN 1, the Default VLAN is already created, we only require that we change its IP address to match our network.&nbsp; Keep in mind that the switch has VLAN 1 preconfigured with IP address 192.168.1.254, but also has DHCP enabled, so if the switch finds a DHCP server during startup it will automatically obtain an IP address. When the system uses its default IP address (192.168.1.254), the <strong>System LED</strong> shown below will flash continuously:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-2.jpg" alt="cisco-sg500-2" width="650" height="365" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500-52P Front View" /></strong></p>
<div class="box-content">switch# <strong>configure terminal</strong><br />switch(config)# <strong>interface vlan 1</strong><br />switch(config-if)# <strong>ip address 192.168.1.2 255.255.255.0</strong><br />switch(config-if)# <strong>exit</strong></div>
<p style="text-align: justify;">We’ve now set VLAN 1’s IP address to 192.168.1.2. Next step is to create VLAN2 &amp; 5, our Voice VLAN &amp; Guest VLAN, name them and configure an IP address for each:</p>
<p class="box-content">switch(config)# <strong>vlan 2</strong><br />switch(config)# <strong>interface vlan 2</strong><br />switch(config-if)# <strong>name Voice-VLAN</strong><br />switch(config-if)# <strong>ip address 192.168.10.2 255.255.255.0</strong><br />switch(config-if)# <strong>exit</strong><br />switch(config)# <strong>vlan 5</strong><br />switch(config)# <strong>interface vlan 5</strong><br />switch(config-if)# <strong>name Guest-VLAN</strong><br />switch(config-if)# <strong>ip address 192.168.50.2 255.255.255.0</strong><br />switch(config-if)# <strong>exit</strong></p>
<p style="text-align: justify;">The <strong>vlan 2</strong> &amp; <strong>vlan 5</strong> command creates VLAN 2 and VLAN 5, however the switch’s prompt will not change, so do not be alarmed.</p>
<p style="text-align: justify;">Finally, we set the switch’s hostname, configure the <strong>default gateway</strong>, <strong>name-server</strong> for dns resolution and <strong>enable ip routing</strong>:</p>
<div class="box-content">switch(config)# <strong>hostname SG500</strong><br />SG500 (config)# <strong>ip default-gateway 192.168.1.1</strong><br />SG500 (config)# <strong>ip name-server 192.168.1.1</strong><br />SG500 (config)# <strong>ip routing</strong></div>
<h2>Saving Our Configuration</h2>
<p style="text-align: justify;">Saving the configuration is easily performed using the classical command:</p>
<div class="box-content">SG500# <strong>copy running-config startup-config</strong><br />Overwrite file [startup-config].... (Y/N)[N] ? <strong>Y</strong><br />02-Feb-2012 10:34:43 %COPY-I-FILECPY: Files Copy - source URL running-config destination URL flash://startup-config<br />02-Feb-2012 10:34:53 %COPY-N-TRAP: The copy operation was completed successfully<br />Copy succeeded</div>
<h2>Web Configuration</h2>
<p style="text-align: justify;">For those wishing to use the web interface to configure the switch, don’t despair as there are still plenty of features that can be configured through the web interface.&nbsp; VLAN creation and IP address configuration are certainly a lot faster and easier through the CLI interface, especially if you make a mistake and need to make corrections.</p>
<p style="text-align: justify;">To access the web interface, enter the switch’s VLAN 1 IP address as configured previously. In our example, this is 192.168.1.2.&nbsp; You’ll be greeted with the login screen and prompted to enter a valid username and password. Once entered, the Getting Started screen is shown:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-3.jpg" alt="cisco-sg500-3" width="650" height="486" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500-52P Web Interface" /></strong></p>
<h2 style="text-align: justify;">Assigning Ports To VLANs</h2>
<p style="text-align: justify;">The web interface provides two different ways to assign VLANs to the switch’s ports. Under the <strong>VLAN Management</strong> menu, you’ll find the <strong>Port-to-VLAN</strong> and <strong>Port-VLAN-Membership </strong>options.&nbsp; The first, <strong>Port-to-VLAN</strong> option, presents all available ports and by selecting the appropriate VLAN from the top you can assign it, exclude it or make it the native VLAN for any of the selected ports:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-4.jpg" alt="cisco-sg500-4" width="850" height="608" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 Port to VLAN Configuration" /></strong></p>
<p style="text-align: justify;">In our example, we’ve selected<strong> VLAN 2 </strong>(VLAN ID equals 2), our Voice VLAN, and configured all but one port to carry VLAN 2 traffic as&nbsp;<strong>Tagged</strong>. When configuring a VLAN as <strong>Tagged </strong>traffic, the port automatically becomes a trunk port and the <strong>Trunk </strong>option above is greyed out as you cannot disable it – a logical restriction.&nbsp; When configuring a VLAN to <strong>Untagged</strong> it then becomes the <strong><em>Native VLAN</em></strong> for that port. If these concepts are new, we would highly recommend you read through our<a href="https://www.firewall.cx/networking/vlan-networks.html" target="_blank" title="VLAN Section">VLAN section</a>.</p>
<p style="text-align: justify;">We’ve configured VLAN2 traffic as <strong>Tagged</strong>, which means we plan to connect an IP Phone to these ports and from there on a PC. VLAN 1 traffic is set as the <strong>Untagged </strong>traffic, or Native VLAN for all ports.</p>
<p style="text-align: justify;">Finally, Port GE1 is forbidden to carry VLAN2 traffic. The reason for this is that we plan to connect our Internet router on port GE1 and there is no reason for our Voice VLAN traffic to exist on that port, for security reasons of course.</p>
<p style="text-align: justify;">When done, click on <strong>Apply</strong> to save the changes and continue with the rest of the VLAN port configuration.</p>
<p style="text-align: justify;">The <strong>Port-VLAN-Membership</strong> menu provides an overview of all port configuration, however, changes can only be made for one port at a time:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-5.jpg" alt="cisco-sg500-5" width="839" height="566" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500-52P Port VLAN Membership - configuration" /></strong></p>
<p style="text-align: justify;">Our screenshot shows no configuration has been made as VLAN2 and 5 are not configured for any port. Select the port of interest and click on <strong>Join VLAN</strong> at the bottom of the page:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-6.jpg" alt="cisco-sg500-6" width="621" height="107" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 Join VLAN" /></strong></p>
<p style="text-align: justify;">The small pop-up window will appear in which we can select a VLAN from the area on the right (under <strong>Select VLAN:</strong>), then choose the tagging method for the selected VLAN and finally assign it to the port by clicking on the right arrow ‘<strong>&gt;</strong>’:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-7.jpg" alt="cisco-sg500-7" width="696" height="351" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 Interface VLAN configuration" /></strong></p>
<p style="text-align: justify;">Once complete, click on <strong>Apply</strong> to save the changes followed by <strong>Close</strong> to return to the menu, or select the next port to be configured from the upper area of the page.</p>
<p style="text-align: justify;">We should note that the <strong>Port-to-VLAN</strong> is the fastest way to configure multiple switch ports simultaneously.</p>
<h2 style="text-align: justify;">Configuring Voice VLAN Settings</h2>
<p style="text-align: justify;">Configuration of the Voice VLAN settings is necessary to ensure the switch understands which VLAN will carry the traffic.&nbsp; Experience shows its best to specify the Voice VLAN port under these settings, rather than leave it to the switch's discretion to figure it out.</p>
<p style="text-align: justify;">In our example, <strong>VLAN ID 2</strong> is our <strong>Voice VLAN</strong>, so we've changed the default VLAN ID from 1, to 2 and <strong>disabled </strong>the Dynamic Auto Voice VLAN feature for security purposes.</p>
<p style="text-align: justify;">Finally, click on <strong>Apply </strong>to save the changes.</p>
<p><strong><img src="https://www.firewall.cx/images/stories/cisco-sg500-16.jpg" alt="cisco-sg500-16" width="800" height="555" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 Voice VLAN Properties - Configuration" /></strong></p>
<div style="text-align: justify;"><span class="alert">Note: If problems are experienced with the IP Phones registering to CallManager or CallManager Express, make sure to <strong>Enable </strong>the <strong>Dynamic Voice VLAN</strong> feature and setting it to <strong>Enable Auto Voice VLAN</strong>.</span></div>
<h2 style="text-align: justify;">Setting System Time</h2>
<p style="text-align: justify;">The system’s time can be configured under the <strong>Administration &gt; Time Settings &gt; System Time</strong>:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-8.jpg" alt="cisco-sg500-8" width="850" height="630" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 NTP Clock Sync Configuration" /></strong></p>
<p style="text-align: justify;">To configure synchronization with an NTP server, enable the <strong>Main Clock Source SNTP Servers</strong> and set the correct <strong>Time Zone Offset</strong>. Next, configure the <strong>Daylight Saving Settings</strong> and click on <strong>Apply</strong>.&nbsp;</p>
<p style="text-align: justify;">Move to <strong>SNTP Unicast</strong> menu option, enable the <strong>SNTP Client Unicast</strong> and add your preferred NTP server as shown below:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-9.jpg" alt="cisco-sg500-9" width="850" height="631" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 SNTP (Secure NTP) configuration" /></strong></p>
<p style="text-align: justify;">Click on <strong>Apply</strong> to save your changes.</p>
<h2 style="text-align: justify;">Creating User Accounts</h2>
<p style="text-align: justify;">To create the desired user accounts to access the switch, select the <strong>Administration &gt; User Accounts</strong> menu.</p>
<p style="text-align: justify;">Currently there is only the default account "cisco". Click on Add and enter the username and&nbsp; password:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-10.jpg" alt="cisco-sg500-10" width="850" height="489" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 Creating User Accounts" /></strong></p>
<p style="text-align: justify;">Note the different User Levels available for the user being created. For full access, select level 15.</p>
<p style="text-align: justify;">Once created, the cisco user can be deleted, however it is imperative the configuration is saved by clicking on the flashing <strong>Save button</strong> at the top of the page.</p>
<h2 style="text-align: justify;">Defining Management Method</h2>
<p style="text-align: justify;">Our final step for the basic setup of the switch is to define the management method. The SG500 and previous models support a variety of management methods which include Telnet, SSH, HTTP, HTTPS and SNMP.</p>
<p style="text-align: justify;">To setup your access profile, visit the <strong>Security &gt; Mgmt Access Method &gt; Access Profiles</strong>:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-11.jpg" alt="cisco-sg500-11" width="838" height="623" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 Access Profiles Configuration" /></strong></p>
<p style="text-align: justify;">&nbsp;Next, click on the <strong>Add</strong> button to add a new profile:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-12.jpg" alt="cisco-sg500-12" width="651" height="533" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 - Configuring Management Access Methods" /></strong></p>
<p style="text-align: justify;">The pop-up window will allow you to define the access profile name, rule priority (the highest rule number takes priority over other access profiles), management method, interface to which it applies and IP Addresses to which access is allowed or denied:</p>
<p style="text-align: justify;">In our example we named our access profile All-Access, set the rule priority to No.1 which takes precedence over other rules, management method of All, permit action, interface VLAN 1 only and source IP of 192.168.1.0 / 24, which of course is the VLAN1 network.</p>
<p style="text-align: justify;">When complete click on <strong>Apply</strong> and <strong>Close</strong>.</p>
<p style="text-align: justify;">This action will return you to the <strong>Access Profiles</strong> section. We now select the <strong>Active Access Profile</strong> we just created (All-Access) and click on <strong>Apply</strong>. A pop-up window will request us to confirm this action. Click on <strong>OK</strong>:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-13.jpg" alt="cisco-sg500-13" width="841" height="623" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 - Applying Access Profiles to Switch" /></strong></p>
<p style="text-align: justify;">If the session is disconnected, simply reconnect to the switch using VLAN1’s IP address.</p>
<p style="text-align: justify;"><strong>Note:</strong> If configuring the switch for <strong>Telnet </strong>or <strong>SSH </strong>remote access, it is important not to forget to enable these services from the <strong>Security &gt; TCP/UDP Services</strong> menu option as shown below:</p>
<p><strong><img src="https://www.firewall.cx/images/stories/cisco-sg500-13b.jpg" alt="cisco-sg500-13b" width="838" height="807" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 - Configuring TCP/UDP Services &amp; Remote Management" /></strong></p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">Again, do not forget to click on the flashing <strong>Save</strong> button at the top of the page:</p>
<p><strong><img src="https://www.firewall.cx//images/stories/cisco-sg500-14.jpg" alt="cisco-sg500-14" width="601" height="46" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 - Save icon in web interface" /></strong></p>
<p style="text-align: justify;">Clicking on the <strong>Save </strong>button will take us to the Copy/Save Configuration page. Select <strong>Running-Configuration</strong> as the <strong>Source File Name</strong> and <strong>Startup-Configuration</strong> as the <strong>Destination File Name</strong> and hit <strong>Apply</strong>:</p>
<p><strong><img src="https://www.firewall.cx/images/stories/cisco-sg500-15.jpg" alt="cisco-sg500-15" width="839" height="306" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 Copy/Save Configuration via Web" /></strong></p>
<h2 style="text-align: justify;">Configuration Backup</h2>
<p style="text-align: justify;">To download the switch's configuration to a workstation for backup purposes, select <strong>File Management &gt; Download/Backup Configuration/Log</strong> from the main menu. Here, select <strong>HTTP </strong>method and <strong>Backup</strong> action. Finally select <strong>Running </strong>or <strong>Startup Configuration</strong> depending on your requirements and <strong>Apply</strong>.&nbsp; You'll soon be prompted with the option to save the configuration file to your hard disk drive:</p>
<p><strong><img src="https://www.firewall.cx/images/stories/cisco-sg500-17.jpg" alt="cisco-sg500-17" width="829" height="367" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco SG500 Download/Backup Configuration Log" /></strong></p>
<p style="text-align: justify;">This completes our introduction to the <strong>SG500-52p PoE</strong> Switch and its <strong>basic configuration</strong>.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Sun, 29 Jul 2012 18:05:42 +1000</pubDate>
		</item>
		<item>
			<title>Cisco Catalyst Err-disabled Port State, Enable &amp; Disable Autorecovery Feature</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-errdisable-autorecovery.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-errdisable-autorecovery.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><strong><img src="https://www.firewall.cx/images/stories/cisco-switches-4507re-ws-x45-sup7l-e-20.jpg" alt="cisco-switches-4507re-ws-x45-sup7l-e-20" width="98" height="116" style="margin: 7px; float: left;" title="Cisco Catalyst Error disabled ports" />Errdisable</strong> is a feature that automatically <strong>disables a port on a Cisco Catalyst switch</strong>.&nbsp;When a port is<strong> error disabled</strong>, it is effectively shut down and no traffic is sent or received on that port.</p>
<p style="text-align: justify;">The <strong>error disabled</strong>&nbsp; feature is supported on most Catalyst switches running the Cisco IOS software. Including all the following models:</p>
<ul class="checkbox" style="text-align: justify;">
<li>Catalyst 2940 / 2950 / 2960 / 2960S</li>
<li>Catalyst 3550 / 3560 / 3560-E / 3750 / 3750-E</li>
<li>Catalyst 4000 / 4500 / 4507R</li>
<li>Catalyst 6000 / 6500</li>
</ul>
<p style="text-align: justify;">&nbsp;The <strong>Errdisable</strong> error disable feature was designed to inform the administrator when there is a port problem or error.&nbsp; The reasons a catalyst switch can go into <strong>Errdisable </strong>mode and shutdown a port are many and include:</p>
<ul class="arrow" style="text-align: justify;">
<li>
<div>Duplex Mismatch</div>
</li>
<li>
<div>Loopback Error</div>
</li>
<li>Link Flapping (up/down)</li>
<li>Port Security Violation</li>
<li>Unicast Flodding</li>
<li>UDLD Failure</li>
<li>Broadcast Storms</li>
<li>BPDU Guard</li>
</ul>
<p style="text-align: justify;">When a port is in error-disabled state, it is effectively shut down and no traffic is sent or received on that port. The port LED is set to the orange color and, when you issue the <strong>show interfaces command</strong>, the port status shows as <strong>Errdisabled</strong>.</p>
<p style="text-align: justify;">Following is an example of what an error-disabled port looks like:<code></code></p>
<div class="box-content" style="text-align: justify;">2960G# <strong>show interface gigabit0/7</strong><br />GigabitEthernet0/7 is down, line protocol is down (<strong>err-disabled</strong>)<br />&nbsp; Hardware is Gigabit Ethernet, address is 001b.54aa.c107 (bia 001b.54aa.c107)<br />&nbsp; MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,<br />&nbsp;&nbsp;&nbsp;&nbsp; reliability 234/255, txload 1/255, rxload 1/255<br />&nbsp; Encapsulation ARPA, loopback not set<br />&nbsp; Keepalive set (10 sec)<br />&nbsp; Auto-duplex, Auto-speed, media type is 10/100/1000BaseTX<br />&nbsp; input flow-control is off, output flow-control is unsupported<br />&nbsp; ARP type: ARPA, ARP Timeout 04:00:00<br />&nbsp; Last input 18w5d, output 18w5d, output hang never<br />&nbsp; Last clearing of "show interface" counters never<br />&nbsp; Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0<br />&nbsp; Queueing strategy: fifo<br />&nbsp; Output queue: 0/40 (size/max)<br />&nbsp; 5 minute input rate 0 bits/sec, 0 packets/sec<br />&nbsp; 5 minute output rate 0 bits/sec, 0 packets/sec<br />&nbsp;&nbsp;&nbsp;&nbsp; 1011 packets input, 862666 bytes, 0 no buffer<br />&nbsp;&nbsp;&nbsp;&nbsp; Received 157 broadcasts (0 multicast)<br />&nbsp;&nbsp;&nbsp;&nbsp; 0 runts, 0 giants, 0 throttles<br />&nbsp;&nbsp;&nbsp;&nbsp; 3021 input errors, 2 CRC, 0 frame, 0 overrun, 0 ignored<br />&nbsp;&nbsp;&nbsp;&nbsp; 0 watchdog, 144 multicast, 0 pause input<br />&nbsp;&nbsp;&nbsp;&nbsp; 0 input packets with dribble condition detected<br />&nbsp;&nbsp;&nbsp;&nbsp; 402154 packets output, 86290866 bytes, 0 underruns<br />&nbsp;&nbsp;&nbsp;&nbsp; 0 output errors, 0 collisions, 1 interface resets<br />&nbsp;&nbsp;&nbsp;&nbsp; 0 babbles, 0 late collision, 0 deferred<br />&nbsp;&nbsp;&nbsp;&nbsp; 0 lost carrier, 0 no carrier, 0 PAUSE output<br />&nbsp;&nbsp;&nbsp;&nbsp; 0 output buffer failures, 0 output buffers swapped out</div>
<p style="text-align: justify;">To recover a port that is in an Errdisable state, manual intervention is required, and the administrator must access the switch and configure the specific port with '<strong>shutdown</strong>' followed by the '<strong>no shutdown</strong>' command. This command sequence will enable the port again, however, if the problem persists expect to find the port in Errdisable state again soon.</p>
<h2 style="text-align: justify;">Understanding And Configuring Errdisable AutoRecovery</h2>
<p style="text-align: justify;">As outlined above, there are a number of reasons a port can enter the Errdisable state.&nbsp; One common reason is the Port Security error, also used in our example below.</p>
<p style="text-align: justify;">Of all the errors, Port Security is more a feature rather than an error. Port Security allows the restriction of MAC Addresses on an interface configured as a layer 2 port. This effectively prevents others connecting unwanted hubs or switches on the network. Port Security allows us to specify a single MAC Address to be connected to a specific port, thus restricting access to a specific computer.</p>
<p style="text-align: justify;">In the case of a violation, Port Security will automatically disable the port. This is the behaviour of the default port security policy when enabling Port Security. Following is a configuration example of port security:</p>
<div class="box-content" style="text-align: justify;">2960G(config)# <strong>interface GigabitEthernet0/48</strong><br />2960G(config-if)# <strong>switchport access vlan 2</strong><br />2960G(config-if)# <strong>switchport mode access</strong><br />2960G(config-if)# <strong>switchport port-security</strong><br />2960G(config-if)# <strong>spanning-tree portfast</strong></div>
<p>Once a host is connected to the port, we can get more information on its port-security status and actions that will be taken when a violation occurs<code>:</code></p>
<div class="box-content">2960G# <strong>show port-security interface GigabitEthernet 0/48</strong><br />Port Security&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Enabled<br />Port Status&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; : Secure-up<br />Violation Mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Shutdown<br />Aging Time&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 0 mins<br />Aging Type&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Absolute<br />SecureStatic Address Aging : Disabled<br />Maximum MAC Addresses&nbsp;&nbsp; : 1<br />Total MAC Addresses&nbsp;&nbsp;&nbsp;&nbsp; : 1<br />Configured MAC Addresses: 0<br />Sticky MAC Addresses&nbsp;&nbsp;&nbsp; : 0<br />Last Source Address:Vlan: 001b.54aa.c107<br />Security Violation Count: 0</div>
<p><code></code>Note that the <strong>Violation Mode</strong> is set to <strong>Shutdown</strong>. This means that when a violation is detected, the switch will place gigabitethernet 0/48 in the err-disable shutdown state as shown below:</p>
<div class="box-info">%PORT_SECURITY-2-PSECURE_VIOLATION: <strong>Security violation occurred, caused by MAC address 0031.f6ac.03f5 on port GigabitEthernet0/48</strong></div>
<p>While it's almost always necessary to know when a port security violation occurs there are some circumstances where autorecovery is a desirable feature, especially durng accidental violations.<br /><br />The following commands enable the autorecovery feature 30 seconds after a port security violation<code>:</code></p>
<div class="box-content">2960G(config)# <strong>errdisable recovery cause psecure-violation</strong><br />2960G(config)# <strong>errdisable recovery interval 30</strong></div>
<h2>Determine The Reason For The Errdisabled State</h2>
<p>To view the Errdisabled reasons, and see for which reason the autorecovery feature has been enabled, use the <strong>show Errdisable recovery </strong>command:</p>
<div class="box-content">2960G# <strong>show errdisable recovery</strong>
<div>ErrDisable Reason&nbsp; Timer Status<br />-----------------&nbsp; --------------<br />udld&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Disabled<br />bpduguard&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Disabled<br />security-violatio&nbsp;&nbsp; Disabled<br />channel-misconfig&nbsp;&nbsp; Disabled<br />vmps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; Disabled<br />pagp-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; Disabled<br />dtp-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; Disabled<br />link-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Disabled<br /><strong>secure-violation&nbsp;&nbsp;&nbsp; Enabled</strong><br />sfp-config-mismat&nbsp;&nbsp; Disabled<br />gbic-invalid&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Disabled<br />dhcp-rate-limit&nbsp;&nbsp;&nbsp;&nbsp; Disabled<br />unicast-flood&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Disabled<br />storm-control&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Disabled<br />loopback&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; Disabled</div>
<div>Timer interval: 30 seconds</div>
<div>Interfaces that will be enabled at the next timeout.</div>
</div>
<p>We have now confirmed that autorecovery is enabled for port-security violations. If it is required to enable the Errdisable autorecovery feature for all supported reasons, use the following command:</p>
<div class="box-content">2960G(config)# <strong>errdisable recovery cause all</strong></div>
<p style="text-align: justify;">To test our configuration we forced a port security violation, causing the switch to place the offending port in the shutdown state. Notice we've enabled autorecovery for<strong> all Errdisable </strong>reasons and the time left to enable the interfaces placed in shutdown state by the port security violation:</p>
<div class="box-content">2960G# <strong>show errdisable recovery</strong><br />ErrDisable Reason&nbsp; Timer Status<br />-----------------&nbsp; --------------<br />udld&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; Enabled<br />bpduguard&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled<br />security-violatio &nbsp; Enabled<br />channel-misconfig&nbsp;&nbsp; Enabled<br />vmps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled<br />pagp-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Enabled<br />dtp-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; Enabled<br />link-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; Enabled<br />psecure-violation&nbsp;&nbsp; Enabled<br />sfp-config-mismat&nbsp;&nbsp; Enabled<br />gbic-invalid&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled<br />dhcp-rate-limit&nbsp;&nbsp; &nbsp; Enabled<br />unicast-flood&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled<br />storm-control&nbsp;&nbsp; &nbsp; &nbsp; Enabled<br />loopback&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Enabled<br /> <br /> Timer interval: 30 seconds<br /> <br /> Interfaces that will be enabled at the next timeout:<br /> <br /> Interface&nbsp; Errdisable reason&nbsp;&nbsp; Time left(sec)<br /> ---------&nbsp; -----------------&nbsp; --------------<br /> Gi0/48&nbsp;&nbsp;&nbsp; security-violation &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 17</div>
<p style="text-align: justify;">Seventeen seconds later, the switch automatically recovered from the port security violation and re-enabled the interface:</p>
<div class="info" style="text-align: left;">%PM-4-ERR_RECOVER: Attempting to recover from <strong>secure-violation err-disable state</strong> on <strong>gigabitethernet0/48</strong><br />18w4d: %LINK-3-UPDOWN: Interface GigabitEthernet0/48, changed state to up<br />18w4d: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/48, changed state to up</div>
<h2>Disabling The Errdisable Feature</h2>
<p style="text-align: justify;">There are cases where it might be necessary to disable the Errdisable mechanism for specific supported features in order to overcome constant interface shutdowns and auto recoveries.&nbsp; While the Catalyst IOS does not allow disabling all features we can still fine-tune the mechanism and selectively disable a few.<br /><br />To view the <strong>Errdisable</strong> reasons monitored by the switch, use the <strong>show Errdisable detect</strong> command:</p>
<p class="box-content">2960G# <strong>show errdisable detect</strong><br /><br />ErrDisable Reason&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Detection&nbsp;&nbsp;&nbsp; Mode<br />-----------------&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ---------&nbsp;&nbsp;&nbsp; ----<br />bpduguard&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />channel-misconfig&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />community-limit&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />dhcp-rate-limit&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />dtp-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />gbic-invalid&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />inline-power&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />invalid-policy&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />link-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />loopback&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />lsgroup&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />mac-limit&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />pagp-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />port-mode-failure&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />secure-violation&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port/vlan<br />security-violation&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />sfp-config-mismatch&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />small-frame&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />storm-control&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />udld&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />vmps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port</p>
<p><br />As shown, the command lists all supported Errdisable reasons.&nbsp; For our example, let's assume we want to disable the <strong>inline-power Errdisable feature.</strong><br /><br />To achieve this, we simply use the following command:<code></code></p>
<div class="box-content">2960G(config)# <strong>errdisable recovery cause all</strong></div>
<p>And verify that <strong>Errdisable</strong> has been disabled for the feature:</p>
<div class="box-content" style="text-align: justify;">2960G# show errdisable detect<br />ErrDisable Reason&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Detection&nbsp;&nbsp;&nbsp; Mode<br />-----------------&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ---------&nbsp;&nbsp;&nbsp; ----<br />bpduguard&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />channel-misconfig&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />community-limit&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />dhcp-rate-limit&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />dtp-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />gbic-invalid&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br /><span style="background-color: #008000; color: #ffffff;">inline-power&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Disabled</span>&nbsp;&nbsp;&nbsp;&nbsp; port<br />invalid-policy&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />link-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />loopback&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />lsgroup&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />mac-limit&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />pagp-flap&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />port-mode-failure&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />psecure-violation&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port/vlan<br />security-violation&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />sfp-config-mismatch&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />small-frame&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />storm-control&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />udld&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<br />vmps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enabled&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; port<code><strong><br /></strong></code></div>
<p>Overall, the Errdisable feature is an extremely useful tool if configured and monitored correctly. Take the necessary time to play around with the supported options of your Cisco Catalyst switch and fine-tune it to suit your network needs.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Wed, 25 Jul 2012 07:00:00 +1000</pubDate>
		</item>
		<item>
			<title>Forcing A Cisco Catalyst Switch To Use 3rd Party SFP Modules</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-3rd-party-sfp.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-3rd-party-sfp.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-switches-3rd-party-sfp-1.jpg" alt="cisco-switches-3rd-party-sfp-1" width="195" height="150" style="margin: 7px; float: left;" title="Configuring Cisco Catalyst Switch to Support 3rd party SFP" />Many companies are seeking for Cisco SFP alternatives to help cut down the costs on these expensive modules.</p>
<p style="text-align: justify;">A frequent customer problem with Cisco's new line of Catalyst switches is that they do not support 3rd party (non-Cisco) SFPs - or at least they do not seem to...</p>
<p style="text-align: justify;">If you've just replaced your network switches and tried using any 3rd party SFPs to connect your network backbone, you'll quickly stumble across an error similar to the following:</p>
<div class="info" style="text-align: justify;">%PHY-4-UNSUPPORTED_TRANSCEIVER: Unsupported transceiver found in Gi1/0/0<br />%GBIC_SECURITY_CRYPT-4-VN_DATA_CRC_ERROR: GBIC in port 65538 has bad crc</div>
<p style="text-align: justify;">Congratulations!&nbsp; The Catalyst switch has just disabled the GBIC port! This happens because Cisco Catalyst switches are configured by default not to work with non-Cisco SFPs.<br /><br />When a SFP is inserted into a switch's GBIC port, the switch immediately reads a number of values from the SFP and if it doesn't like what it sees, it throws the above error message and disables the port. <br /><br />All SFP modules contain a number of recorded values in their EEPROM and include:</p>
<ul class="check" style="text-align: justify;">
<li>Vendor Name</li>
<li>Vendor ID</li>
<li>Serial Number</li>
<li>Security Code</li>
<li>CRC</li>
</ul>
<h2>How To Force Your Cisco Switch To Use 3rd Party SFPs</h2>
<p style="text-align: justify;">Despite the error displayed, which leaves no hope for a solution, keep smiling as you're about to be given one.</p>
<p style="text-align: justify;">There are two undocumented commands which can be used to force the Cisco Catalyst switch to enable the GBIC port and use the 3rd party SFP:</p>
<div class="box-content">3750G-Stack(config)# <strong>service unsupported-transceiver</strong><br /><br />Warning: When Cisco determines that a fault or defect can be traced to<br />the use of third-party transceivers installed by a customer or reseller,<br />then, at Cisco's discretion, Cisco may withhold support under warranty or<br />a Cisco support program. In the course of providing support for a Cisco<br />networking product Cisco may require that the end user install Cisco<br />transceivers if Cisco determines that removing third-party parts will<br />assist Cisco in diagnosing the cause of a support issue.<br /><br />3750G-Stack(config)# <strong>no errdisable detect cause gbic-invalid</strong></div>
<p style="text-align: justify;">When entering the <strong>service unsupported-transceiver</strong> command, the switch will automatically throw a warning message as a last hope to prevent the usage of a 3rd party SFP.</p>
<p style="text-align: justify;">The <strong>no errdisable detect cause gbic-invalid </strong>command will help ensure the GBIC port is not disabled when inserting an invalid GIBC.</p>
<p style="text-align: justify;">Since the <strong>service unsupported-transceiver&nbsp;</strong> is undocumented, if you try searching for the command with the usual method (<strong>?</strong>), you won't find it:</p>
<div class="box-content">3750G-Stack(config)# <strong>service ?</strong><br />compress-config&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; Compress the configuration file<br />&nbsp; config&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; TFTP load config files<br />&nbsp; counters&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Control aging of interface counters<br />&nbsp; dhcp&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Enable DHCP server and relay agent<br />&nbsp; disable-ip-fast-frag &nbsp;&nbsp; Disable IP particle-based fast fragmentation<br />&nbsp; exec-callback&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Enable exec callback<br />&nbsp; exec-wait&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; Delay EXEC startup on noisy lines<br />&nbsp; finger&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; Allow responses to finger requests<br />&nbsp; hide-telnet-addresses &nbsp; Hide destination addresses in telnet command<br />&nbsp; linenumber&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp;&nbsp; enable line number banner for each exec<br />&nbsp; nagle&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Enable Nagle's congestion control algorithm<br />&nbsp; old-slip-prompts&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; Allow old scripts to operate with slip/ppp<br />&nbsp; pad&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; &nbsp;&nbsp; &nbsp;&nbsp;&nbsp; Enable PAD commands<br />&nbsp; password-encryption &nbsp;&nbsp;&nbsp; Encrypt system passwords<br />&nbsp; password-recovery&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Disable password recovery<br />&nbsp; prompt&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; &nbsp;&nbsp; Enable mode specific prompt<br />&nbsp; pt-vty-logging&nbsp; &nbsp;&nbsp; &nbsp; &nbsp;&nbsp; Log significant VTY-Async events<br />&nbsp; sequence-numbers&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Stamp logger messages with a sequence number<br />&nbsp; slave-log&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enable log capability of slave IPs<br />&nbsp; tcp-keepalives-in&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Generate keepalives on idle incoming network connections<br />&nbsp; tcp-keepalives-out&nbsp;&nbsp;&nbsp; &nbsp; Generate keepalives on idle outgoing network connections<br />&nbsp; tcp-small-servers&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enable small TCP servers (e.g., ECHO)<br />&nbsp; telnet-zeroidle&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; Set TCP window 0 when connection is idle<br />&nbsp; timestamps&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; Timestamp debug/log messages<br />&nbsp; udp-small-servers&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Enable small UDP servers (e.g., ECHO)<br /><br />3750G-Stack(config)# <strong>service </strong></div>
<p style="text-align: justify;">The same applies for the <strong>no errdisable detect cause gbic-invalid</strong> command. <br /><br />We tried both <strong>service unsupported-transceiver</strong> &amp; <strong>no errdisable detect cause gbic-invalid </strong>commands on <strong>2960G</strong>, <strong>3560G</strong>, <strong>3750G</strong>, <strong>4507R</strong> and <strong>4507R-E</strong> Catalyst switches and all accepted the commands without a problem. In fact if the Catalyst switch is running <strong>IOS 12.2(25)SE</strong> and above, the&nbsp;undocumented commands are available.</p>
<h2 style="text-align: justify;">Should 3rd Party SFPs Be Used?</h2>
<p style="text-align: justify;">There are mixed feelings about this. We certainly do not recommend using non-Cisco SFP's in production environments, however in a lab environment, its most probably a cheap way out. <br /><br />When using 3rd party GBICs, one must keep in mind that Cisco TAC will not provide any support for problems related to the SFPs as they are totally unsupported. Here is a small portion from the Cisco Catalyst <a href="http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps5023/prod_qas09186a00801b0971.html#wp9000383" target="_blank" rel="nofollow noopener" title="3750G Q&amp;A">3750G Q&amp;A</a> that refers to the usage of 3rd party SFP modules on the switch:</p>
<div class="alert"><strong>Q.</strong> Do the Cisco Catalyst 3750 Series Switches interoperate with SFPs from other vendors?<br /><br />
<div style="text-align: justify;"><strong>A.</strong> Yes, starting from 12.2(25)SE release, the user has the option via CLI to turn on the support for 3rd party SFPs. However, the Cisco TAC will not support such 3rd party SFPs. In the event of any link error involving such 3rd party SFPs the customer will have to replace 3rd party SFPs with Cisco SFPs before any troubleshooting can be done by TAC.</div>
</div>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Thu, 26 Apr 2012 05:44:49 +1000</pubDate>
		</item>
		<item>
			<title>VLAN Security Tips - Best Practices</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-vlan-security.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-vlan-security.html</guid>
			<description><![CDATA[<p style="text-align: justify;"><img src="https://www.firewall.cx/images/stories/cisco-switches-vlan-security-1.jpg" alt="cisco-switches-vlan-security-1" style="margin: 7px; float: left;" title="Cisco Catalyst VLAN Security Configuration" />This article focuses on VLAN Security and its implementation within the business network environment. We provide tips and Cisco CLI commands that will help you upgrade your VLAN network security.</p>
<p style="text-align: justify;">Even though many Administrators and IT Managers are aware of VLAN technologies and concepts, unfortunately, it has been proven that the same does not apply when it comes to VLAN Security. While this section mainly focuses on security implemented on Cisco switches, many of the concepts can be applied on other vendor switches.</p>
<p style="text-align: justify;">The first principle in securing a <a href="https://www.firewall.cx/networking/vlan-networks.html" target="_blank" title="VLAN network">VLAN network</a> is physical security. If you do not want your devices to be tampered with, physical access to the device must be strictly controlled. &nbsp;Core switches are usually safely located in a datacenter with restricted access, however edge switches are not that lucky and are usually placed in areas where they are left exposed.</p>
<p style="text-align: justify;">Just as physical security guidelines require equipment to be in a controlled space, VLAN-based security requires the usage of special tools and following a few ‘best security practices’ to give the desired result.</p>
<p style="text-align: justify;">Let’s take a look at a few important steps an Administrator or IT Manager can take, to strip their network from the security problems most networks suffer today.<strong><br /></strong></p>
<h2 style="text-align: left;">Removal of Console-port Cables, Introduction of Password-Protected Console/Vty Access with Specified Timeouts and Restricted Access</h2>
<p style="text-align: justify;">Console ports on the back side of Cisco switches provide direct access to the system. If no care is taken to secure this access method, then the switch might remain fully exposed to anyone with the popular ‘blue console cable’. Configuration of complex user credentials on the console and telnet/ssh ports will ensure any unwanted visitor will remain in the dark when trying to access the device. &nbsp;Using special commands such as the ‘exec-timeout’ commands,&nbsp; when the Administrator accidently forgets to logout of the session, it will automatically timeout after the programmed timeout value.</p>
<p style="text-align: justify;">Following is a set of commands that will help you accomplish the above measures to help restrict access to the swich:</p>
<div class="box-content" style="text-align: justify;">Switch# <strong>configure terminal<br /></strong>Switch(config)# <strong><strong>username admin privilege 15 secret *Firewall.cx*<br /></strong></strong>Switch(config)# <strong><strong><strong>line console 0<br /></strong></strong></strong>Switch(config-line)# <strong><strong><strong><strong>login local<br /></strong></strong></strong></strong>Switch(config-line)# <strong><strong><strong><strong><strong>password cisco<br /></strong></strong></strong></strong></strong>Switch(config-line)# <strong><strong><strong><strong><strong><strong>exec-timeout 60 0</strong><br /></strong></strong></strong></strong></strong></div>
<p style="text-align: justify;">We also apply the same commands to our VTY (telnet/ssh) section and create an <strong>access-list 115</strong> to restrict telnet/ssh access from specific networks &amp; hosts:</p>
<div class="box-content" style="text-align: justify;">Switch (config)# <strong>line vty 0 15<br /></strong>Switch (config-line)# <strong>password cisco</strong><br />Switch (config-line)#<strong> login local<br /></strong>Switch (config-line)#<strong> exec-timeout 60 0</strong><br />Switch (config-line)#<strong> transport preferred ssh&nbsp; <br /></strong>Switch (config-line)#<strong> access-class 115 in</strong></div>
<div style="text-align: justify;">Following is the <strong>access-list 115</strong> we created:</div>
<div class="box-content" style="text-align: justify;">Switch (config)# <strong>access-list 115 remark -=[Restrict VTY Access]=-</strong><br />Switch (config)# <strong>access-list 115 permit ip host 74.200.84.4 any</strong><br />Switch (config)# <strong>access-list 115 permit ip host 69.65.126.42 any<br /></strong>Switch (config)# <strong>access-list 115 permit ip 192.168.50.0 0.0.0.255 any</strong><br />Switch (config)# <strong>access-list 115 remark</strong></div>
<p style="text-align: justify;">Always ensure the use of the ‘<strong>secret</strong>’ parameter rather than the ‘password’ parameter in your username syntax, when defining usernames and their passwords. The classic ‘<strong>password</strong>’ parameter uses a much weaker encryption algorithm that is easily unencrypted.</p>
<p style="text-align: justify;">To demonstrate this, you can use the 'password' parameter and then copy past the encrypted password into our popular <a href="https://www.firewall.cx/cisco/cisco-routers/cisco-type7-password-crack.html" target="_blank" title="Cisco Type 7 Password decryption">Cisco Type 7 Password decrypt</a> page and see what happens!</p>
<h2>Avoid Using VLAN1 (Default VLAN)&nbsp; for your Network Data</h2>
<p style="text-align: justify;">VLAN 1 is a special VLAN selected by design to carry specific information such as CDP (Cisco Discovery Protocol), VTP, PAgP and more. &nbsp;VLAN 1 was never intended to be used as standard VLAN to carry network data.</p>
<p style="text-align: justify;">By default configuration, any Access Link on a Cisco switch is set to VLAN 1, causing a major security issue as direct access to the network backbone is given.&nbsp; As a consequence, VLAN 1 can end up unwisely spanning the entire network if not appropriately pruned.</p>
<p style="text-align: justify;">The practice of using a potentially omnipresent VLAN for management purposes puts trusted devices to higher risk of security attacks from untrusted devices that by misconfiguration or pure accident gain access to VLAN 1 and try to exploit this unexpected security hole.</p>
<p style="text-align: justify;">As a general rule of thumb, the network Administrator should prune any VLAN, and in particular VLAN 1 from all ports where that VLAN is not needed.</p>
<p style="text-align: justify;">The following example prunes VLANs 1&nbsp; to 5 and 7 to 8, allowing access only to VLAN 6 when in trunking mode. Furthermore, we assign the port to VLAN 6 only:</p>
<div class="box-content" style="text-align: justify;">Switch(config)# <strong>interface fastethernet0/24<br /></strong>Switch(config-if)# <strong>switchport trunk allowed vlan remove ? (help)</strong><em><br />WORD&nbsp; VLAN IDs of disallowed VLANS when this port is in trunking mode</em><br /><br />Switch(config-if)# <strong>switchport trunk allowed vlan remove 1,2,3,4,5,7,8</strong><br />Switch(config-if)# <strong>switchport access vlan 6</strong></div>
<h2>Disable High-Risk Protocols on Switchports</h2>
<p style="text-align: justify;">If a port is connected to a ‘foreign’ device, don’t try to speak its language – it could be turned to someone else’s advantage and used against your network. Ensure you disable protocols such as CDP, DTP, PAgP, UDLD (Unidirectional Link Detection Protocol) &nbsp;and always enable spanning-tree&nbsp; portfast &amp; bpduguard on the port.</p>
<p style="text-align: justify;">Here is an example on how to disable the above mentioned protocols and enable spanning-tree portfast bpduguard:</p>
<div class="box-content" style="text-align: justify;">Switch(config)# <strong>interface fastethernet0/24<br /></strong>Switch(config-if)# <strong>no cdp enable<br /></strong>Switch(config-if)# <strong>no udld port</strong><br />Switch(config-if)# <strong>spanning-tree portfast</strong><br />Switch(config-if)# <strong>spanning-tree bpduguard enable<br /></strong>Switch(config-if)# <strong>spanning-tree guard root</strong></div>
<p style="text-align: justify;">Finally, if the port is not to be used, issue the ‘<strong>shutdown</strong>’ command to ensure it won’t be accessed by anyone without the proper authorization.</p>
<h2>VTP Domain, VTP Pruning and Password Protection</h2>
<p style="text-align: justify;">Two choices exists here – either configure the VTP domain appropriately or turn off VTP altogether!&nbsp; VTP is a great tool that ensures all VLAN information is carried to your network switches. If necessary security measures are not taken, wiping your network-wide VLAN configuration is as easy as connecting a switch with the ‘proper’ devastating configuration.</p>
<p style="text-align: justify;">&nbsp;A switch configured with the same ‘<a href="https://www.firewall.cx/networking/vlan-networks/vtp-introduction.html" target="_blank" title="VTP domain"><strong>VTP domain</strong></a>’, a role type of ‘<strong>Server</strong>’ and a higher ‘<strong>VTP revision</strong>’ number of the real VTP server (usually the core switch), is all that’s required to cause major disruption and panic across any network size. All other switches will automatically ‘listen’ to the new ‘VTP Server’ and wipe all existing VLAN information. You can then start looking for a new job.</p>
<p style="text-align: justify;">A few simple self-explanatory commands on your core switch will help ensure the above scenario is avoided:</p>
<div class="box-content" style="text-align: justify;">CoreSwitch(config)# <strong>vtp domain firewall.cx<br /></strong>CoreSwitch(config)# <strong>vtp password fedmag secret<br /></strong>CoreSwitch(config)# <strong>vtp mode server</strong><br />CoreSwitch(config)# <strong>vtp version 2<br /></strong>CoreSwitch(config)# <strong>vtp pruning</strong></div>
<p style="text-align: justify;">Edge switches will require the ‘<strong>vtp mode client</strong>’ and ‘<strong>vtp password</strong>’ command, after which they will automatically receive all necessary VLAN information from your core switch.</p>
<p style="text-align: justify;">You can verify the configuration using the ‘<strong>show vtp status</strong>’ command:</p>
<div class="box-content" style="text-align: justify;">CoreSwitch # <strong><strong>show vtp status<br />VTP Version capable&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; : 1 to 3<br /></strong></strong>
<div>VTP version running&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : 2</div>
<div>VTP Domain Name&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;: <strong>firewall.cx</strong></div>
<div>VTP Pruning Mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : <strong>Enabled</strong></div>
<div>VTP Traps Generation&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : Disabled</div>
<div>Device ID&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : c062.6b10.5600</div>
<div>Configuration last modified by 192.168.50.1 at 3-16-11 16:53:48</div>
<div>Local updater ID is 192.168.50.1 on interface Vl1 (lowest numbered VLAN interface found)</div>
<div><br />Feature VLAN:</div>
<div>--------------</div>
<div>VTP Operating Mode&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : <strong>Server</strong></div>
<div>Maximum VLANs supported locally&nbsp; : 1005</div>
<div>Number of existing VLANs&nbsp;&nbsp;&nbsp; &nbsp; &nbsp;&nbsp; : 8</div>
<div>Configuration Revision&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; : <strong>25</strong></div>
<div>MD5 digest&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp; : 0xDD 0x9D 0x3B 0xA0 0x80 0xD8 0x7A 0x3A</div>
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp; &nbsp; 0x1F 0x2F 0x2A 0xDB 0xCD 0x84 0xCE 0x5F <strong><br /></strong></div>
<h2>Control Inter-VLAN Routing Using IP Access Lists</h2>
<p style="text-align: justify;">Inter-VLAN routing is a great and necessary feature. Because in many cases there is the need to isolate VLANs or restrict access between them, the usage of IP Access lists is mandatory.</p>
<p style="text-align: justify;">IP Access lists should be created in such a way, that they allow the normal flow of traffic between VLANs, but do not expose the networks that need to be protected. Once the Access Lists are created, they are applied directly on the VLAN interface of the core layer-3 switch.&nbsp;&nbsp; All traffic from the designated VLAN trying to pass to other VLANs will be denied according to the Access Lists, making sure the core network is not exposed.&nbsp;</p>
<p style="text-align: justify;">Let’s take a common example to make this tip more practical.</p>
<p style="text-align: justify;">You’ve created a new guest VLAN (VLAN 6 – Network 192.168.141.0/24) to provide free Internet access to your company visitors. The requirement is to allow full Internet access, but restrict access to other VLANs.&nbsp; In addition, configuration of a DHCP server is also deemed necessary, to make your life easier and less troublesome.</p>
<p style="text-align: justify;">Here’s the configuration used for the DHCP server serving this VLAN:</p>
<div class="box-content" style="text-align: justify;">CoreSwitch(config)# <strong><strong>ip dhcp pool vlan6-Guest-Internet&nbsp; </strong></strong><br />CoreSwitch(dhcp-config)# <strong>network 192.168.141.0 255.255.255.0</strong><br />CoreSwitch(dhcp-config)# <strong>dns-server 192.168.130.5</strong><br />CoreSwitch(dhcp-config)#&nbsp; <strong>default-router 192.168.141.1 </strong><strong><br /></strong></div>
<p style="text-align: justify;">Note that <strong>192.168.141.1</strong> is our core switch VLAN 6 IP Address, and <strong>192.168.130.5 </strong>is our DNS server located on a different VLAN.</p>
<p style="text-align: justify;">Next, we create our necessary Access Lists.</p>
<div class="box-content" style="text-align: justify;">CoreSwitch(config)# <strong><strong>access-list 100 remark --[Allow Guest DNS requests to DNS Server]--</strong></strong><br />CoreSwitch(config)# <strong>access-list 100 permit udp 192.168.141.0 0.0.0.255 host 192.168.130.5 eq 53</strong><br />CoreSwitch(config)# <strong>access-list 100 remark [Necessary for DHCP Server to receive Client requests]</strong><br />CoreSwitch(config)# <strong>access-list 100 permit udp any any eq bootps</strong><br />CoreSwitch(config)# <strong>access-list 100 permit udp any any eq bootpc</strong><br />CoreSwitch(config)# <strong>access-list 100 remark --[Deny Guest Access to other VLANs]--</strong><br />CoreSwitch(config)# <strong>access-list 100 deny&nbsp;&nbsp; ip 192.168.141.0 0.0.0.255 192.168.50.0 0.0.0.255 log</strong><br />CoreSwitch(config)# <strong>access-list 100 deny&nbsp;&nbsp; ip 192.168.141.0 0.0.0.255 192.168.130.0 0.0.0.255 log</strong><br />CoreSwitch(config)# <strong>access-list 100 deny&nbsp;&nbsp; ip 192.168.141.0 0.0.0.255 192.168.135.0 0.0.0.255 log</strong><br />CoreSwitch(config)# <strong>access-list 100 deny&nbsp;&nbsp; ip 192.168.141.0 0.0.0.255 192.168.160.0 0.0.0.255 log</strong><br />CoreSwitch(config)# <strong>access-list 100 deny&nbsp;&nbsp; ip 192.168.141.0 0.0.0.255 192.168.131.0 0.0.0.255 log</strong><br />CoreSwitch(config)# <strong>access-list 100 deny&nbsp;&nbsp; ip 192.168.141.0 0.0.0.255 192.168.170.0 0.0.0.255 log</strong><br />CoreSwitch(config)# <strong>access-list 100 deny&nbsp;&nbsp; ip 192.168.141.0 0.0.0.255 192.168.180.0 0.0.0.255 log</strong><br />CoreSwitch(config)# <strong>access-list 100 remark --[Permit Guest Access to everywhere else –Internet ]--</strong><br />CoreSwitch(config)# <strong>access-list 100 permit ip 192.168.141.0 0.0.0.255 any</strong><br />CoreSwitch(config)# <strong>access-list 100 remark</strong><strong><br /></strong></div>
<p style="text-align: justify;">Notice that we permit <strong>DNS</strong> and <strong>DHCP</strong> requests initially, and then deny access to all VLANs. Finally we permit access everywhere else. This logical structure of our Access List is built to comply with the Top-Down Access List examination performed by the Core switch.</p>
<p style="text-align: justify;">If we were to place the DNS or Bootp last in the Access List, it would clearly fail as the deny statements would prevail.&nbsp; Finally, the ‘<strong>log</strong>’ parameter seen on our deny statements would trigger a log entry on our core switch, allowing us to catch any guests trying persistently to access our other VLANs</p>
<p style="text-align: justify;">Last step would be to apply the access-list to the newly created VLAN interface, in the ‘incoming’ direction:</p>
<div class="box-content" style="text-align: justify;">CoreSwitch(config)# <strong>interface vlan 6<br /></strong>CoreSwitch (config-if)#<strong> <strong>ip access-group 100 in</strong><br /></strong></div>
<h2 style="text-align: justify;">Summary</h2>
<p style="text-align: justify;">VLAN Technology is wonderful – it offers great enhancements to the network and provides paths to run multiple services in isolated environments without sacrificing speed, quality and network availability. If the necessary basic security guidelines are taken in consideration during its initial implementation and ongoing administration, it can perform wonders and dramatically reduce the administrative overhead from your IT Administrators or Managers. On other hand, if these security guidelines are ignored, the imminent exposure of the whole network is at risk and simply a matter of time.</p>
<p style="text-align: justify;">Perhaps the most serious mistake that an IT Administrator or Manager can make, is to underestimate the importance of the DataLink layer, and of VLANs in particular, in the architecture of switched networks. It should not be forgotten that any network is only as robust as its weakest link, and that therefore an equal amount of attention should be given to any of its layers, to make sure that its entire structure is sound.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Tue, 20 Sep 2011 05:37:38 +1000</pubDate>
		</item>
		<item>
			<title>Installation of a Cisco Catalyst 4507R-E Layer 3 Switch</title>
			<link>https://www.firewall.cx/cisco/cisco-switches/cisco-switches-catalyst-4507r-e.html</link>
			<guid isPermaLink="true">https://www.firewall.cx/cisco/cisco-switches/cisco-switches-catalyst-4507r-e.html</guid>
			<description><![CDATA[<p style="text-align: justify;">Driven by our thirst for technical material and experience, we thought it would be a great idea to start presenting various installations of Cisco equipment around the globe, especially equipment that we don't get to play with everyday.</p>
<p style="text-align: justify;" align="left">We recently had the chance to unpack and install a <strong>Cisco Catalyst 4507R-E Layer 3 switch</strong>, which we must admit was extremely impressive. The Cisco Catalyst series is world-known for its superior network performance and modularity that allows it to 'adapt' to any demands your network might have.</p>
<p style="text-align: justify;" align="left">For those who haven't seen or worked with a 4507R/4507R-E switch, it's a very big and heavy switch in a metal cabinet (chassis) supporting up to two large power supplies and a total of 7 cards (modules), two of which are the supervisor engines that do all the switching and management work.</p>
<p style="text-align: justify;" align="left">The new 4507R-E series is a mammoth switch that allows a maximum of 320Gbps (full duplex) switching capacity by utilising all 7 slots, in other words 5 modules alongside with two Supervisor Engine 6-E cards (with two full line rate 10Gb Uplinks).</p>
<p style="text-align: justify;" align="left">The 4507R-E switch is shipped in a fairly large box 50(H)x44(W)x32(D) cm and weights around 21 Kgrs with its shipping box. The practical height of the unit for a rack is 11U which means you need quite a bit of room to make sure it's comfortably placed.</p>
<h2>Unboxing the Cisco Catalyst 4507R</h2>
<p style="text-align: justify;" align="left">Like most Cisco engineers, we couldn't wait to open the heavy box and smell the freshly packaged item that came directly from Cisco's manufacturing line. We carefully moved the 4507R-E box to the datacenter and opened the top side of the box.....</p>
<p style="text-align: justify;" align="left"><a class="highslide"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-1.jpg" alt="tk-cisco-switches-install-4507r-1" width="484" height="362" style="display: block; margin-left: auto; margin-right: auto; border: 1px solid #000000;" title="Opening a Cisco Catalyst 4507R" /></a></p>
<p style="text-align: justify;" align="left">The upper area of the picture is where you'll find the two large cube slots for the power supplies. Below them, you can identify 6 out of the 7 slots waiting to be populated and give this monster unbelievable functionality!</p>
<p style="text-align: justify;" align="left">After opening the package and removing the plastic wrapping, we placed the switch on the floor so we could take a better look at it.</p>
<p style="text-align: justify;" align="left">Because we couldn't wait any longer, we quickly opened one of two power supplies and inserted it into the designated slot. The power supplies installed were rated at 2800Watts each - providing more than enough juice to power a significant number of IP Phones via the PoE cards installed later on.</p>
<p style="text-align: justify;" align="left">The picture below shows both power supplies, one inserted into its slot, while the other was placed on top of the chassis with its connectors facing frontwards so you can get a glimpse of them. When inserted into its slot, the power supply's bottom connectors plug firmly into the chassis connectors and power up the Catalyst switch:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-2.jpg" alt="tk-cisco-switches-install-4507r-2" width="600" height="450" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst 4507R Chassis and Power supplies" /></p>
<p style="text-align: justify;" align="left">Turning on the power supplies for the first time made the datacenter's light dim instantantly as they began to draw power for the first time! Interestingly enough, if you take a look at the power supply on top of the chassis, you'll notice three long white strips inside the power supply. These are actually three very large <em>electrolytic </em> capacitors - quite impressive!</p>
<p style="text-align: justify;" align="left">For those interested, the power supplies were made by Sony (yes, they had a Sony sticker on them!).</p>
<h2>Supervisor Engine Line Card Installation</h2>
<p style="text-align: justify;" align="left">As we mentioned in the beginning of this article, the powering engine of any 4500 series Catalyst switch is the Supervisor Engine. The Supervisor engines occupy up to two slots on the 4507R chassis, one of them used for redundancy in case the other fails. When working with two supervisor engines, the 4507R is usually configured to automatically switch from one engine to the other without network interruptions, even for a VoIP network with active calls between ends.</p>
<p style="text-align: justify;" align="left">Cisco currently has around 7 different Supervisor Engines, each with unique characteristics, designed for various levels of density and bandwidth requirements.</p>
<p style="text-align: justify;" align="left">Currently, the Supervisor Engine 6-E is the best performing engine available, providing 320Gbps bandwidth (full duplex) and 250 million packets per second forwarding rate!</p>
<p style="text-align: justify;" align="left">Our users can refer to our popular <a href="https://www.firewall.cx/cisco/cisco-switches/cisco-switches-4500-supervisor-engine-ios-upgrade.html" target="_blank" title="Cisco Catalyst 4500 Series Zero-Downtime IOS Upgrade Process for Supervisor Engine 7-E, 7L-E, 6L-E and V-10GE Redundant Configurations">Cisco Catalyst 4500 Series Zero-Downtime IOS Upgrade Process for Supervisor Engine 7-E, 7L-E, 6L-E and V-10GE Redundant Configurations</a> article to learn how to upgrade their Supervisor Engine without network service interruption.</p>
<p style="text-align: justify;" align="left">For our installation, we worked with the <strong>Supervisor Engine II-Plus</strong>, also known as Cisco part <strong>WS-X4013+</strong>. Here's one of the supervisor engines in its original antistatic bag:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-3.jpg" alt="tk-cisco-switches-install-4507r-3" width="400" height="300" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Supervisor Engine II-Plus - WS-X4013+" /></p>
<p style="text-align: justify;" align="left">After placing on my wrist the antistatic wrist-strap contained in the package and carefully unwrapping the supervisor engine, the green circuit-board with its black towers (heatsinks) is revealed. You can easily see the 5 heatsinks, two of which are quite large and do an excellent job in keeping the processors cool:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-4.jpg" alt="tk-cisco-switches-install-4507r-4" width="600" height="450" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Supervisor Engine II-Plus - WS-X4013+" /></p>
<p style="text-align: justify;" align="left">At the back left side of the board, you can see the supervisor engine's connector which is equally impressive with 450 pin connectors - 50 on each row!</p>
<p style="text-align: justify;" align="left">We took a picture from the back of the board to make sure the connector was clearly visible:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-5.jpg" alt="tk-cisco-switches-install-4507r-5" width="600" height="450" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Supervisor Engine II-Plus - WS-X4013+ Backplane Connectors" /></p>
<p style="text-align: justify;">Just looking at the connector makes you imagine the number of signals that pass through it to give the 4507R-E the performance rating it has! On the left of the board's connector is the engine's RAM (256MB), while right behind it is the main CPU with the large heatsink, running at 266Mhz.</p>
<p style="text-align: justify;">Here is a close up of the engine's RAM module. The existing 256MB memory module can be removed and upgraded according to your requirements:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-5a.jpg" alt="tk-cisco-switches-install-4507r-5a" width="600" height="450" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Supervisor Engine II-Plus WS-X4013+, Board, Ram" /></p>
<p style="text-align: justify;">Moving to the front side of the <strong>Supervisor Engine</strong>, you can see the part number and description:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-6.jpg" alt="tk-cisco-switches-install-4507r-6" width="600" height="450" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Supervisor Engine II-Plus WS-X4013+ Board" /></p>
<p style="text-align: justify;">The uplink ports visible on the front are GBIC (GigaBit Interface Converter) that can be used as normal Gigabit interfaces. By using different GBIC's you can connect multimode, singlemode fiber optic cable or standard CAT5e/CAT6 Ethernet cabling. These ports can come in handy when you're approaching your switch's full capacity.</p>
<p style="text-align: justify;">The impressive Supervisor Engine fits right into one of the two dedicated slots available on the 4507R-E chassis. These are slots 3 &amp; 4 as shown in the picture below. Also visible is the switch's backplane and black connectors awaiting the Supervisor Engine boards (marked with red):</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-7.jpg" alt="tk-cisco-switches-install-4507r-7" width="350" height="364" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4507R Backplane - Supervisor Engine Connectors" /></p>
<p style="text-align: justify;">We took another picture inside the chassis to make things as clear as possible:</p>
<p><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-8.jpg" alt="tk-cisco-switches-install-4507r-8" width="600" height="395" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4507R Backplane - Supervisor Engine Connectors" /></p>
<p style="text-align: justify;">Here you can see the backplane with the two Supervisor Engine connectors. The white coloured connectors just above and below the Supervisor Engines are used by the rest of the boards available to the 4507R.</p>
<p style="text-align: justify;">After inserting one of the Supervisor Engines and two power supplies, here is the result:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-9.jpg" alt="tk-cisco-switches-install-4507r-9" width="600" height="450" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco Catalyst 4507R Front View" /></p>
<p style="text-align: justify;" align="left">One detail well worth noticing is the colour coded bars on the left and right side of the Supervisor card. These colour codes exist to ensure engineers don't accidently try to insert a Supervisor card into an inappropriate slot. The <strong>4507R-E</strong> can accept upto two supervisor engines, therefore you have two slots dedicated to them, leaving 5 slots available.</p>
<p style="text-align: justify;" align="left">Cisco engineers have thought of everything on the 4507R-E. The cooling mechanisim is a good example of smart-thinking and intelligent engineering. With 7 cards installed on the system, pumping a generous amount of heat, the cooling had to be as effective as possible. Any heat captured between the cards could inadvertably lower the components' reliability and cause damage in the long term.</p>
<p style="text-align: justify;" align="left">This challenge was dealt with by placing a fan-tray right next to the cards in a vertical direction. The fan-tray is not easily noticed when taking a quick glance, but the available handle on the front gives away that something is hidden in there. Unscrew the top &amp; bottom bolts, place your hand firmly around the handle and pulling outwards will suprise you:</p>
<p><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-10.jpg" alt="tk-cisco-switches-install-4507r-10" width="210" height="264" style="display: block; margin: 5px; float: left;" title="Cisco 4507R FanTray" /></p>
<p style="text-align: justify;">&nbsp;The picture taken on the left shows the eight fans placed on the fan-tray. These fans work full speed the moment you power the switch on, consuming 140Watts alone!</p>
<p style="text-align: justify;">Once they start spinning, you really can't argue that the cooling is inadequate, as the air flow produced is so great that when we powered the 4507R-E, the antistatic bags accidently forgotten on the right hand side of the chassis were sucked almost immediately against the chassis grip, just at it happens when you leave a plastic bag behind a powerful fan!</p>
<p style="text-align: justify;">Of course, anything on the left side of the chassis (vieweable in our picture) would be immediately blown away.</p>
<p style="text-align: justify;">After inserting the fan-tray back in place, it was time to take a look around and see what else what left to play with.</p>
<p style="text-align: justify;">Our eyes caught another Cisco box and we approached it, picked it up and checked out the label:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-11.jpg" alt="tk-cisco-switches-install-4507r-11" width="492" height="370" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco WS-X4548-GB-RJ45V" /></p>
<p style="text-align: justify;">The product number <strong>WS-X4548-GB-RJ45V</strong> and size of the package made it clear we were looking at a card designated for the <strong>4507R-E</strong>. Opening the package confirmed our thoughts - this was a <strong>48port Gigabit card</strong> with <strong>PoE support</strong>:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-12.jpg" alt="tk-cisco-switches-install-4507r-12" width="600" height="450" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco WS-X4548-GB-RJ45V Antistatic bag" /></p>
<p style="text-align: justify;">We carefully unwrapped the contents always using our antistatic wrist-strap so that we don't damage the card, and then placed it on top of its box:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-13.jpg" alt="tk-cisco-switches-install-4507r-13" width="600" height="403" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco WS-X4548-GB-RJ45V board" /></p>
<p style="text-align: justify;">The card has an impressive quantity of heatsinks, two of which are quite large and therefore must generate a lot of heat. The backplane connector is visible with its white colour (back left corner), and right behind the 48 ports is an area covered with a metallic housing. This attracted our attention as we thought something very senstive must be in that area for Cisco to protect it in such a way.</p>
<p style="text-align: justify;">Taking a look under the protective shield we found a PCB board that ran along the length of the board:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-14.jpg" alt="tk-cisco-switches-install-4507r-14" width="600" height="351" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco WS-X4548-GB-RJ45V Board, Power Modules" /></p>
<p style="text-align: justify;">Our understanding is that this rail of PCB with transistors and other electrical circuits mounted on it seemed to be regulators for the PoE support. Taking into consideration that we didn't see the same protection in other similar non-PoE boards, we couldn't image it being something else.</p>
<p style="text-align: justify;">When we completed our checkup, we decided it was time to install the card and finally power the 4507R-E switch.</p>
<p style="text-align: justify;"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-15.jpg" alt="tk-cisco-switches-install-4507r-15" width="309" height="412" style="margin: 5px; float: left;" title="Cisco Catalyst 4507R &amp; Firewall.cx" /></p>
<p style="text-align: justify;">The picture on the left shows our <strong>4507R-E</strong> installed with <strong>two Supervisor Engine II-Plus</strong> engines in active-standby redundancy mode and one 48 port Gigabit Ethernet card with PoE support.</p>
<p style="text-align: justify;">On top is the editor's (Chris Partsenidis) laptop with a familair website loaded, Firewall.cx!</p>
<p style="text-align: justify;">Configuring the Supervisor engines was a simple task. When the <strong>4507R-E</strong> is powered on, both engines will boot by first performing a <strong>POST test</strong> on their modules, memory buffers etc. When this internal POST phase is successfully complete without errors, the engines begin to boot the IOS.</p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">&nbsp;</p>
<p style="text-align: justify;">The screenshot below shows us the described procedure from one Supervisor engine since you can't monitor both engines unless you have one serial port connected to each supervisor's console port:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-16.jpg" alt="tk-cisco-switches-install-4507r-16" width="550" height="514" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4507R Supervisor Engine Plus II Startup" /></p>
<p style="text-align: justify;">As shown above, the Supervisor engine passed all tests and then proceeded to boot the IOS.</p>
<p style="text-align: justify;">Once loaded, the IOS will check for the existence of a second Supervisor engine, establish connection with it and, depending on which slot it is located in, it will automatically initialise the second engine in standby mode as shown below:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-17.jpg" alt="tk-cisco-switches-install-4507r-17" width="600" height="433" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4507R Supervisor Engine Plus II Boot Process" /></p>
<p style="text-align: justify;">&nbsp;Once the Supervisor engine bootup process is complete, you are able to configure any aspect of the switch according to your needs, just as you would with any other Cisco Catalyst switch. The interesting part is when you try to save your configuration:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-18.jpg" alt="tk-cisco-switches-install-4507r-18" width="600" height="170" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4507R Supervisor Engine Plus II Config Sync" /></p>
<p style="text-align: justify;">In the above screenshot, we've configured the switch to boot using a specific IOS located in the bootflash, as soon as we saved the configuration using the <strong>wr</strong> command, the Supervisor engine automatically synchronised the two engines' nvram without any additional commands. This excellent functionality makes sure that whatever configuration is applied to the active Supervisor engine will be available to the standby engine should the first one fail.</p>
<p style="text-align: justify;">The great part of this switch is that you can obtain any type of information you require from it. For example, we switched off one of the two power supplies and executed the <strong>show modules</strong> command. This command gives a report of the installed modules (cards) in the catalyst switch along with a few more details:</p>
<p align="center"><img src="https://www.firewall.cx//images/stories/tk-cisco-switches-install-4507r-19.jpg" alt="tk-cisco-switches-install-4507r-19" width="600" height="302" style="display: block; margin-left: auto; margin-right: auto;" title="Cisco 4507R - Show modules" /></p>
<p style="text-align: justify;">The command reveals that the backplane power consumption is approximately 40 Watts followed by a detailed report of the installed modules. In our example, you can see the two Supervisor engines in slot 3 &amp; 4, followed by the 48 Gigabit Ethernet module in slot 5. The command also shows the Supervisor engines' configured redundany operating mode and status. Lastly, any system failures are reported at the end - this output shows that we've got a problem with one of the power supplies, but rest assured, we had simply switched it off to see if it was going to show up in the report!</p>
<h2>Summary</h2>
<p style="text-align: justify;">This article covered the initial installation and setup of a new <strong>Cisco Catalyst 4507R-E</strong> switch, populated with <strong>two Supervisor Engines II-Plus</strong> and a <strong>48 port Gigabit module with PoE support</strong>. We saw areas of the switch which you won't easily find elsewhere and our generous amount of pictures made sure you understood what the 4507R-E looks like, inside and out! Lastly, we saw the switch bootup procedure and Supervisor engine POST test and syncronization process.</p>]]></description>
			<category>Cisco Switches</category>
			<pubDate>Sat, 20 Aug 2011 08:13:09 +1000</pubDate>
		</item>
	</channel>
</rss>
