Catalyst 4500 IOS to IOS XE command compatibility check?

Good Day.
I will be performing 4500 non-E chassis to 4500E chassis upgrade this week.
non-E chassis has IOS 12.2 running on it while 4500E will have IOS-XE 3.2.5SG code running. Is there any website where I can paste the IOS configuration to see if they are compatible on IOS XE code?
Thank you, sir.

There's no website or tool that I'm aware of to do such a pre-upgrade check for IOS to IOS-XE. That said, I've done several without issue. Just about all old commands carry forward.
One thing indirectly command-related is to make sure you have the same license level on the new switch (i.e. lanbase, ipbase or ipservices). If your new switch has a lower license level and you were using features that require the higher license level on the old switch, those commands won't be parsed on the new one because the features aren't available without the necessary license.
To verify, you should connect to the physical console port and log the output to a file while the system loads. Any commands that aren't parsed or have been deprecated will be logged as exceptions during the boot process. You can do this using the old switch configuration file loaded onto the new switch in advance of the actual cutover and resolve any issues ahead of time.

Similar Messages

  • Catalyst 4500 ios upgrade question

    I am currently running cat4000-i9s-mz.122-25ewa6 on a catalyst 4503 supervisor II plus TS, which doesnt support SSH management. Will upgrading to one of the following do the job:
    12.2.31-SGA1 (ED)
    12.2.31-SGA (ED)
    12.2.31-SG1 (ED)
    12.2.31-SG (ED)
    12.2.25-SG1 (ED)
    12.2.25-SG (ED)
    I want to keep the same functionality but just add ssh. Also, which one should I go with, the latest 12.2.31-SGA1 (ED)? And can someone explain what the letters represent, EWA6, SG, SGA1, ED, etc. Thanks for the help.

    Hi
    Your ideal image should be cat4000-i9k91s-mz.122-25.EWA8.bin and also do ensure you have 32 mb flash and 256 mb dram. This would ensure same functionality.
    Follow the link
    http://www.cisco.com/cgi-bin/Software/Iosplanner/Planner-tool/iosresult.cgi?get_crypto=&data_from=&hardware_name=CAT4500-SUP2-PLUS-TS&software_name=BASIC%20L3%203DES%20%28RIP%2CST.ROUTERS%2CIPX%2CAT%29&release_name=12.2.25-EWA8&majorRel=12.2&state=:HW:RL:SW&type=Early%20Deployment
    But if you do want to get SG images you can use this cat4500-ipbasek9-mz.122-31.SGA1.bin but this requires higher flash 64mb and dram is still 256mb.
    The link
    http://www.cisco.com/cgi-bin/Software/Iosplanner/Planner-tool/iosresult.cgi?get_crypto=&data_from=&hardware_name=CAT4500-SUP2-PLUS-TS&software_name=IP%20BASE%20SSH&release_name=12.2.31-SGA1&majorRel=12.2&state=:HW:RL:SW&type=Early%20Deployment
    HTH
    Hoogen
    Do rate if this helps :)

  • Upgrade Catalyst 4500 Supervisor Engine 8-E(IOS XE Software)

    Folks,
    We are looking to upgrade the Catalyst 4500 Supervisor Engine 8-E(IOS XE Software). As of now we are running on 3.3.1XO and as per the Cisco notes version 3.3.2XO which is suggested version.
    I would like to find some comparison documents on both these version and establish if there is a need to do the upgrade. What are the fixes that have been done in this version.
    Thanks,!!

    Hi Nikhil,
    Please find release notes of version 3.3.2XO below which can provide you the details to upgrade.
    Mainly you need to refer the features it supports and resolved cavets (which means the bugs resolved fro the earlier version on to this.).
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_29983-01.html
    HTH
    Regards
    Inayath
    *Plz rate if this info is helpfull.

  • 4500 IOS-XE: Crash on ACL configuration

    Hi All ,
    We have recently migrated from standalone to VSS on our C4500 switches with Sup 7-E.
    but the switch crashes every time we edit or modify the ACL with below error message :
    %SYS-3-BADBLOCK: Bad block pointer 
    %SYS-6-MTRACE: mallocfree: addr, pc
    %SYS-6-BLKINFO: Corrupted next pointer blk
    %SYS-6-MEMDUMP: 0x7E043FF8
    We noticed that there is a new bug for this issue i.e
    CSCun33897 Symptom:
    A Catalyst 4500 series switch running IOS-XE may unexpectedly reboot when ACL configuration is applied to an interface.
    but there is no fix available yet.
    Please let me know if anyone had this kind of issue. Appreciate your suggestion and feedback on this issue .
    Current used Image : cat4500e-universalk9.SPA.03.05.00.E.152-1.E.bin .
    Thanks in advance .

    its seems to be closely matching to the bug you mentioned
    If you upload crashinfo i can look it and try to confirm.
    Regards
    Naveen
    ***rate if it is helpful***

  • QoS trust dscp or cos on catalyst 4500

    We have a 4510R with Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Software cat4500e-UNIVERSALK9-M), Version 03.05.02.E RELEASE SOFTWARE (fc1).
    I want use qos trust dscp or qos trust cos on the interface conected to other cisco switch or wlan controller.
    The current IOS version, do not support qos trust dscp:
    SW(config)#interface gi10/16
    SW(config-if)#qos tr
    SW(config-if)#qos trust ?
      device  trusted device class
      extend  Extend trust through a connected device
    SW(config-if)#qos trust device ?
      cisco-phone   Cisco IP Phone
      cts           Cisco-telepresence
      ip-camera     Cisco video surveillance camera
      media-player  Cisco Digital Media Player
    SW(config-if)#qos trust device
    What is the software that I need for this?. I tried with command lookup tool but the cat4500 do not appears.

    That is even new for me.
    I did a search and found that, now a days you no longer have to provide the Trust DSCP command, it is by default trusted.
    Went through this White Paper and excerpts are below:
    http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-4500-series-switches/white_paper_c11-539588.html
    The answer to your question comes from the following excerpt :-
    "Previously supervisor engines relied on “port trust” to classify traffic; however, this does not fall into the MQC CLI construct. MQC provides a more flexible capability, i.e. all traffic is trusted by default, an administrator can change this trust state using a policy map. Another difference is the “internal DSCP” value used within the switch to place packets in the proper queue.
    Cisco Catalyst 4500E Supervisor Engines do not use “internal DSCP”; rather, it relies on explicit matching of QoS values using class maps so that packets can be placed in the correct queue.
    Also, note that there is no specific priority queue: it is not queue 3 or queue 1. The priority queue is simply configured within a class; therefore, it is not tied to a specific queue. One final difference is that of classification. Cisco Catalyst 4500E Supervisor Engines provide sequential classification rather than parallel. This allows the network administrator to classify traffic at egress based on the ingress markings. These markings can be done unconditionally, using a policer or using a table map. Based on these changes, QoS CLI will now be more contiguous on the Supervisor Engines as it will now have standard Cisco MQC CLI, making configuration management much simpler"
    HTH,
    Please rate all helpful posts.
    Regards

  • Subinterfaces - hardware limitation on catalyst 4500-X

    Hi there,
    We are currently building a VSS and our design has L3 subinterfaces however we have hit a major wall while trying to do the following
             Create physical subinterface on VSS switch – Fail
             Create port-channel subinterface on VSS switch – Fail
             Create physical subinterface on standalone switch – Fail
             Create port-channel subinterface on standalone switch – Fail
    Below is the output showing that the option of a subinterfaces seems to be available, but it still doesn’t apply
    Enter configuration commands, one per line.  End with CNTL/Z.
    Switch(config)#int po1
    Switch(config-if)#no swi
    Switch(config-if)#no switchport
    Switch(config-if)#int po1.1
                          ^
    % Invalid input detected at '^' marker.
    Switch(config)#int po
    Switch(config)#int port-channel 1.?
      <0-4294967295>  Port-channel interface number
    Switch(config)#int port-channel 1.1
                       ^
    % Invalid input detected at '^' marker.
    Switch(config)#int tenGigabitEthernet 1/1
    Switch(config-if)#no swi
    Switch(config-if)#no switchport
    Switch(config-if)#exit
    Switch(config)#int tenGigabitEthernet 1/1.?
      <0-4294967295>  TenGigabitEthernet interface number
    Switch(config)#int tenGigabitEthernet 1/1.1
                        ^
    % Invalid input detected at '^' marker.
    Switch(config)#
    Here’s the show ver and show module output
    Switch#show ver
    Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch  Software (cat4500e-UNIVERSALK9-M), Version 03.07.00.E RELEASE SOFTWARE (fc4)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2014 by Cisco Systems, Inc.
    Compiled Sun 07-Dec-14 22:13 by prod_rel_team
    Cisco IOS-XE software, Copyright (c) 2005-2014 by cisco Systems, Inc.
    All rights reserved.  Certain components of Cisco IOS-XE software are
    licensed under the GNU General Public License ("GPL") Version 2.0.  The
    software code licensed under GPL Version 2.0 is free software that comes
    with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
    GPL code under the terms of GPL Version 2.0.
    (http://www.gnu.org/licenses/gpl-2.0.html) For more details, see the
    documentation or "License Notice" file accompanying the IOS-XE software,
    or the applicable URL provided on the flyer accompanying the IOS-XE
    software.
    ROM: 15.0(1r)SG11
    Switch uptime is 5 minutes
    System returned to ROM by power-on
    Running default software
    Jawa Revision 2, Winter Revision 0x0.0x41
    Last reload reason: power-on
    This product contains cryptographic features and is subject to United
    States and local country laws governing import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third-party authority to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. and local country laws. By using this product you
    agree to comply with applicable laws and regulations. If you are unable
    to comply with U.S. and local laws, return this product immediately.
    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected].
    *Apr 29 18:56:44.596: %SYS-5-CONFIG_I: Configured from console by console
    License Information for 'WS-C4500X-32'
        License Level: entservices   Type: Permanent
        Next reboot license Level: entservices
    cisco WS-C4500X-32 (MPC8572) processor (revision 9) with 4194304K bytes of physical memory.
    Processor board ID JAE191304FG
    MPC8572 CPU at 1.5GHz, Cisco Catalyst 4500X
    Last reset from PowerUp
    1 Virtual Ethernet interface
    32 Ten Gigabit Ethernet interfaces
    511K bytes of non-volatile configuration memory.
    Configuration register is 0x2101
    Switch#
    Switch#show module
    Chassis Type : WS-C4500X-32
    Power consumed by backplane : 0 Watts
    Mod Ports Card Type                              Model              Serial No.
    ---+-----+--------------------------------------+------------------+-----------
    1    32  4500X-32 10GE (SFP+)                   WS-C4500X-32       JAE191304FG
    M MAC addresses                    Hw  Fw           Sw               Status
    --+--------------------------------+---+------------+----------------+---------
    1 b0aa.7777.5840 to b0aa.7777.585f 2.0 15.0(1r)SG11 03.07.00.E       Ok
    System Failures:
    Power Supply:   bad/off (see 'show power')
    Switch#
    All we can find is a little note on the release notes:
    A Catalyst 4006 switch with Supervisor Engine III does not support subinterfaces or the encapsulation keyword on 
    Layer 3 Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet interfaces.
    Source: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-7-0E/15-23E/configuration/guide/xe-370-configuration/l3_int.html
    I am assuming this restriction applies to this platform but other than that there is nothing specifying we can't do this. Anyone out there has hit the same issue? or can anyone confirm this is an actual platform restriction
    Thank you

    Hi,
    The 4500 and 4500x series switches do not support sub-interfaces.  Only 6500 series support sub-interfaces.
    HTH

  • Catalyst 4500 Hi CPU

    Hi,
    I have an issue with a Catalyst-4500 (4507R-E, ipbase, 12.2.46SG), that is running very hi CPU since some days:
    By investigating, I observed a couple of processes that are realy CPU-consuming:
    I don't know where to look ...
    Some help and/or some suggestion ?
    Best regars,
    Claudio

    Two good resources for troubleshooting high CPU on the 4K
    High CPU Utilization on Cisco IOS Software-Based Catalyst 4500 Switches
    http://www.cisco.com/c/en/us/support/docs/switches/catalyst-4000-series-switches/65591-cat4500-high-cpu.html
    Troubleshooting High CPU on the Catalyst 4500-E Series Switch
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/troubleshooting/cpu_util.html
    HTH
    Luke

  • Catalyst 4500 L3 QoS Issue

    Hi All
    I got 2 cisco catalyst 4500 l3 switches (Cisco IOS Software, IOS-XE Software, Version 03.02.00.XO RELEASE SOFTWARE (fc1))       
    I enabled Autoqos on one sw successfully without any issue
    but facing issue on the second, below is the screenshot for your reference kindly suggest
    Thanks!

    Yes it is.
    See this link for details -
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/54sg/configuration/guide/config/RPR.html#wp1130150
    Jon

  • Catalyst 4006 chassis with CATALYST 4500 SUPERVISOR V

    Hi Experts,
    Can I use CATALYST 4500 SUPERVISOR V(WS-X4516) in an old 6-slot catalyst 4006 chassis( WS-C4006). I want to run the latest IOS available and I have the following line cards:
    WS-X4232-RJ-XX
    WS-X4418-GB
    WS-X4148-RJ
    thanks and regards
    alex

    Hi Alex
    Yes you can run the Sup V in the 4006 chassis. See this link
    http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/module/guide/01overvw.html#wp1015031
    The Sup V also supports the WS-X4418-GB and WS-X4148-RJ modules - see attached link
    http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps4324/product_data_sheet09186a00801fcaba_ps2797_Products_Data_Sheet.html
    HTH
    Jon

  • High CPU with error "%ADJ-3-RESOLVE_REQ:" in Catalyst 4500-X VSS after making L3 function (static routing)

    We have a VSS based on 2x WS-C4500X-16., The VSS is used as Layer 2 Switch for diffrents Vlan in our DC.
    After making the VSS as a Layer 3 gateway for our production VLAN and added 2 routes for routing purposes, we encountered a network down time with high CPU in the VSS and  a huges log messages : 
    .May 14 12:11:25.947: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.22 Vlan100
    .May 14 12:11:34.516: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.22 Vlan100
    .May 14 12:11:40.072: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:11:49.682: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:11:55.079: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:12:00.926: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:06.701: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.8.32 Vlan100
    .May 14 12:12:12.624: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:21.627: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:32.261: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.8.32 Vlan100
    .May 14 12:12:41.801: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.2.105 Vlan100
    .May 14 12:12:49.633: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:12:54.831: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:12:59.960: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:13:08.745: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:16.138: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:22.393: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:31.415: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.141 Vlan100
    .May 14 12:13:38.944: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.2.215 Vlan100
    .May 14 12:13:45.972: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    Bellow are the show version of our VSS, 
    Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Software (cat4500e-UNIVERSALK9-M), Version 03.04.00.SG RELEASE SOFTWARE (fc3)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2012 by Cisco Systems, Inc.
    Compiled Wed 05-Dec-12 04:38 by prod_rel_team
    ROM: 15.0(1r)SG10
    S_C4500X_01 uptime is 33 weeks, 1 day, 14 minutes
    Uptime for this control processor is 33 weeks, 1 day, 16 minutes
    System returned to ROM by power-on
    System restarted at 11:59:10 UTC Tue Sep 24 2013
    Running default software
    Jawa Revision 2, Winter Revision 0x0.0x40
    Last reload reason: power-on
    License Information for 'WS-C4500X-16'
        License Level: ipbase   Type: Permanent
        Next reboot license Level: ipbase
    cisco WS-C4500X-16 (MPC8572) processor (revision 9) with 4194304K/20480K bytes of memory.
    Processor board ID JAE173303CF
    MPC8572 CPU at 1.5GHz, Cisco Catalyst 4500X
    Last reset from PowerUp
    4 Virtual Ethernet interfaces
    32 Ten Gigabit Ethernet interfaces
    511K bytes of non-volatile configuration memory.
    Configuration register is 0x2101
    Can you help please, 

    Hi,
    thanks for your reply, but there is no hsrp configured, just an interface vlan. with 2 static routes and the problem was there for more than an hour before we decided to rollback.
    Is there a BugId with this problem in Cisco DataBase.
    here is a show ip route 
    S_C4500X_01#      show ip route
    Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
           D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area 
           N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
           E1 - OSPF external type 1, E2 - OSPF external type 2
           i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
           ia - IS-IS inter area, * - candidate default, U - per-user static route
           o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
           + - replicated route, % - next hop override
    Gateway of last resort is 10.2.1.253 to network 0.0.0.0
    S*    0.0.0.0/0 [1/0] via 10.2.1.253
          10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
    C        10.0.0.0/8 is directly connected, Vlan100
    L        10.1.1.250/32 is directly connected, Vlan100
          172.31.0.0/16 is variably subnetted, 2 subnets, 2 masks
    C        172.31.0.0/16 is directly connected, Vlan120
    L        172.31.0.1/32 is directly connected, Vlan120
    S     192.1.0.0/16 [1/0] via 10.1.1.254
    and the show ip cef: 
    _C4500X_01#        show ip cef 
    .May 14 12:13:57.859: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.158 Vlan100 f
    Prefix               Next Hop             Interface
    0.0.0.0/0            10.2.1.253           Vlan100
    0.0.0.0/8            drop
    0.0.0.0/32           receive              
    10.0.0.0/8           attached             Vlan100
    10.0.0.0/32          receive              Vlan100
    10.1.1.6/32          attached             Vlan100
    10.1.1.17/32         attached             Vlan100
    10.1.1.40/32         attached             Vlan100
    10.1.1.41/32         attached             Vlan100
    10.1.1.50/32         attached             Vlan100
    10.1.1.60/32         attached             Vlan100
    10.1.1.99/32         attached             Vlan100
    10.1.1.121/32        attached             Vlan100
    10.1.1.122/32        attached             Vlan100
    10.1.1.124/32        attached             Vlan100
    10.1.1.125/32        attached             Vlan100
    10.1.1.126/32        attached             Vlan100
    10.1.1.225/32        attached             Vlan100
    10.1.1.227/32        attached             Vlan100
    10.1.1.250/32        receive              Vlan100
    10.1.1.254/32        10.1.1.254           Vlan100
    10.2.1.3/32          attached             Vlan100
    10.2.1.4/32          attached             Vlan100
    10.2.1.6/32          attached             Vlan100
    10.2.1.8/32          attached             Vlan100
    10.2.1.9/32          attached             Vlan100
    10.2.1.18/32         attached             Vlan100
    10.2.1.23/32         attached             Vlan100
    10.2.1.24/32         attached             Vlan100
    Prefix               Next Hop             Interface
    10.2.1.26/32         attached             Vlan100
    10.2.1.28/32         attached             Vlan100
    10.2.1.29/32         attached             Vlan100
    10.2.1.31/32         attached             Vlan100
    10.2.1.103/32        attached             Vlan100
    10.2.1.108/32        attached             Vlan100
    10.2.1.109/32        attached             Vlan100
    10.2.1.124/32        attached             Vlan100
    10.2.1.129/32        attached             Vlan100
    10.2.1.137/32        attached             Vlan100
    10.2.1.139/32        attached             Vlan100
    10.2.1.143/32        attached             Vlan100
    10.2.1.144/32        attached             Vlan100
    10.2.1.159/32        attached             Vlan100
    10.2.1.167/32        attached             Vlan100
    10.2.1.174/32        attached             Vlan100
    10.2.1.175/32        attached             Vlan100
    10.2.1.176/32        attached             Vlan100
    10.2.1.181/32        attached             Vlan100
    10.2.4.38/32         attached             Vlan100
    10.2.4.39/32         attached             Vlan100
    10.2.4.43/32         attached             Vlan100
    10.2.4.47/32         attached             Vlan100
    10.2.4.51/32         attached             Vlan100
    10.2.4.63/32         attached             Vlan100
    10.2.4.65/32         attached             Vlan100
    10.2.4.69/32         attached             Vlan100
    10.2.4.71/32         attached             Vlan100
    10.2.4.73/32         attached             Vlan100
    10.2.4.102/32        attached             Vlan100
    10.2.4.106/32        attached             Vlan100
    10.2.4.107/32        attached             Vlan100
    10.2.4.113/32        attached             Vlan100
    10.2.4.116/32        attached             Vlan100
    10.2.4.119/32        attached             Vlan100
    10.2.4.120/32        attached             Vlan100
    10.2.4.122/32        attached             Vlan100
    10.2.4.141/32        attached             Vlan100
    10.2.4.148/32        attached             Vlan100
    10.2.6.7/32          attached             Vlan100
    Prefix               Next Hop             Interface
    10.2.6.16/32         attached             Vlan100
    10.2.6.31/32         attached             Vlan100
    10.2.7.14/32         attached             Vlan100
    10.2.7.22/32         attached             Vlan100
    10.2.7.24/32         attached             Vlan100
    10.2.7.34/32         attached             Vlan100
    10.2.7.37/32         attached             Vlan100
    10.2.7.41/32         attached             Vlan100
    10.2.7.48/32         attached             Vlan100
    10.2.8.18/32         attached             Vlan100
    10.2.8.32/32         attached             Vlan100
    10.2.8.59/32         attached             Vlan100
    10.2.8.70/32         attached             Vlan100
    10.2.8.85/32         attached             Vlan100
    10.2.8.88/32         attached             Vlan100
    10.2.8.104/32        attached             Vlan100
    10.2.8.135/32        attached             Vlan100
    10.2.99.10/32        attached             Vlan100
    10.2.99.54/32        attached             Vlan100
    10.255.255.255/32    receive              Vlan100
    127.0.0.0/8          drop
    172.31.0.0/16        attached             Vlan120
    172.31.0.0/32        receive              Vlan120
    172.31.0.1/32        receive              Vlan120
    172.31.0.5/32        attached             Vlan120
    172.31.0.29/32       attached             Vlan120
    172.31.255.255/32    receive              Vlan120
    192.1.0.0/16         10.1.1.254           Vlan100
    224.0.0.0/4          drop
    224.0.0.0/24         receive              
    Prefix               Next Hop             Interface
    240.0.0.0/4          drop
    and show ip arp 
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.1.1.1                0   aa00.0400.c286  ARPA   Vlan100
    Internet  10.1.1.6                0   0050.5689.24b8  ARPA   Vlan100
    Internet  10.1.1.10               0   0050.5694.7d20  ARPA   Vlan100
    Internet  10.1.1.11               0   0050.5694.7d20  ARPA   Vlan100
    Internet  10.1.1.12               0   0050.5694.6ae7  ARPA   Vlan100
    Internet  10.1.1.13               0   0050.5694.6ae7  ARPA   Vlan100
    Internet  10.1.1.14               0   0050.568a.6321  ARPA   Vlan100
    Internet  10.1.1.16               0   0050.5694.0ab5  ARPA   Vlan100
    Internet  10.1.1.17               0   0050.5694.493d  ARPA   Vlan100
    Internet  10.1.1.40               0   0013.19b0.9c40  ARPA   Vlan100
    Internet  10.1.1.41               0   1c17.d35a.c840  ARPA   Vlan100
    Internet  10.1.1.50               0   0002.b9b4.a5c0  ARPA   Vlan100
    Internet  10.1.1.60               0   000a.410f.e500  ARPA   Vlan100
    Internet  10.1.1.71               -   0008.e3ff.fc28  ARPA   Vlan100
    Internet  10.1.1.96               0   e02f.6d12.4df3  ARPA   Vlan100
    Internet  10.1.1.98               0   0050.5696.6d86  ARPA   Vlan100
    Internet  10.1.1.99               0   0050.5696.6d88  ARPA   Vlan100
    Internet  10.1.1.121              0   e02f.6d12.4dea  ARPA   Vlan100
    Internet  10.1.1.122              0   e02f.6d12.4e61  ARPA   Vlan100
    Internet  10.1.1.123              0   e02f.6d5b.c10e  ARPA   Vlan100
    Internet  10.1.1.124              0   e02f.6d17.c869  ARPA   Vlan100
    Internet  10.1.1.125              0   e02f.6d5b.c217  ARPA   Vlan100
    Internet  10.1.1.126              0   e02f.6d17.c8ec  ARPA   Vlan100
    Internet  10.1.1.127              0   e02f.6d17.c876  ARPA   Vlan100
    Internet  10.1.1.128              0   e02f.6d5b.bef3  ARPA   Vlan100
    Internet  10.1.1.202              0   0000.85b7.9031  ARPA   Vlan100
    Internet  10.1.1.222              0   000f.f84d.2ca9  ARPA   Vlan100
    Internet  10.1.1.225              0   000f.f84d.3963  ARPA   Vlan100
    Internet  10.1.1.227              0   00c0.ee26.9367  ARPA   Vlan100
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.1.1.250              -   0008.e3ff.fc28  ARPA   Vlan100
    Internet  10.1.1.254              0   0000.0c07.ac07  ARPA   Vlan100
    Internet  10.2.1.2                0   0011.4333.bcda  ARPA   Vlan100
    Internet  10.2.1.3                0   0050.5689.5d38  ARPA   Vlan100
    Internet  10.2.1.4                0   0050.5689.0404  ARPA   Vlan100
    Internet  10.2.1.6                0   0050.5689.6d3b  ARPA   Vlan100
    Internet  10.2.1.7                0   1cc1.def4.6940  ARPA   Vlan100
    Internet  10.2.1.8                0   0050.5689.330e  ARPA   Vlan100
    Internet  10.2.1.9                0   0012.793a.3ccc  ARPA   Vlan100
    Internet  10.2.1.10               0   0012.7990.e5d3  ARPA   Vlan100
    Internet  10.2.1.13               0   0050.568a.6dcf  ARPA   Vlan100
    Internet  10.2.1.15               0   0050.568a.60ff  ARPA   Vlan100
    Internet  10.2.1.18               0   0050.5689.091b  ARPA   Vlan100
    Internet  10.2.1.20               0   0050.5689.451c  ARPA   Vlan100
    Internet  10.2.1.21               0   0050.568a.0cf4  ARPA   Vlan100
    Internet  10.2.1.22               0   0050.5689.6c59  ARPA   Vlan100
    Internet  10.2.1.23               0   0050.5696.6d9e  ARPA   Vlan100
    Internet  10.2.1.24               0   0050.5689.76c4  ARPA   Vlan100
    Internet  10.2.1.26               0   0050.5689.2f4e  ARPA   Vlan100
    Internet  10.2.1.27               0   0050.5689.0632  ARPA   Vlan100
    Internet  10.2.1.28               0   0050.5689.1ce9  ARPA   Vlan100
    Internet  10.2.1.29               0   0050.5689.6aaa  ARPA   Vlan100
    Internet  10.2.1.31               0   0050.5689.0d1a  ARPA   Vlan100
    Internet  10.2.1.37               0   0050.5696.6d81  ARPA   Vlan100
    Internet  10.2.1.103              0   d4be.d9be.8eef  ARPA   Vlan100
    Internet  10.2.1.106              0   14fe.b5e1.c595  ARPA   Vlan100
    Internet  10.2.1.107              0   0023.ae7d.a966  ARPA   Vlan100
    Internet  10.2.1.108              0   d4be.d9c8.6770  ARPA   Vlan100
    Internet  10.2.1.109              0   14fe.b5e9.c5b5  ARPA   Vlan100
    Internet  10.2.1.110              0   14fe.b5ea.5f9d  ARPA   Vlan100
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.2.1.111              0   001e.c959.d4f0  ARPA   Vlan100
    Internet  10.2.1.114              0   b8ac.6f48.4538  ARPA   Vlan100
    Internet  10.2.1.115              0   14fe.b5e1.ed89  ARPA   Vlan100
    Internet  10.2.1.116              0   7845.c409.1959  ARPA   Vlan100
    Thanks
    Lotfi

  • Catalyst 4500, scp, rcp

    Does anybody know is it possible to set up a remote access to the Catalyst 4500 series switch thru the rcp or scp protocol? I want to start commands on the remote unix server. Like unix# scp -i identity -B acl.file user@catalyst:system:running-config or unix# rcp acl.file user@catalyst:system:running-config, where acl.file is the file with access-list. It's important to start commands on the remote server, not on the switch. Thanks for any advice.

    Hello,
    I just tried this on a Cat 4500 using tftp, and successfully changed its hostname, and added a new ACL.
    The same should be true for rcp and scp.
    Just remember to put "end" as the last line of the file, otherwise you will get a %PARSER-4-BADCFG: Unexpected end of configuration file message (but it still works).
    This was tried on Version 12.2(25)EWA4.
    Hope this helped,
    Michael.

  • 1000v uplink to Catalyst 4500

    We have a 1000v switch uplinked to nexus 5K and Catalyst 4500 switches. I can see all the VEMs(ESX servers) connected to the nexus 5K uplink switch and everything seems working fine. However, I am not able to see the VEMs uplinked to Cisco Catalyst 4500 switch. The "show  Module" command shows all VEMs connected to the nexus 5K uplink switches but not the Catalyst 4500 switches.The log file on the 1000V shows the following:
       7 09:36:21 NX-1K-100 %VMS-5-DVS_HOSTMEMBER_INFO: A host with name=[IP ADD. OF ESX SERVER] and uuid=[34393232-3035-3255-5839-3430303
    03537] is added to the dvs. The host is not found  as a module in the VSM configuration.
    If anyone have run into similar situation, plpease let me know how you handled it.
    Thanks

    Hi bharga,
    I did all the checking....
        1) all important VLANS including the control vlan are not blocked (No STP issue)
        2) The Nexus 5K and the 4500 switch are in layer layer 2  ( They are not directly connected but are in layer two domain or no hop between them)
       3) the ESX Server hosting the VSM is connected to the Nexus 5K 
    Here is some of the show commands that i run on the 4500 switch that is connects the ESX server to the rest ofd the network:-
    Catalyst-4500#sh spanning-tree interface gigabitEthernet 1/38
    Vlan                Role Sts Cost      Prio.Nbr Type
    VLAN0073            Desg FWD 4         128.38   P2p Edge
    VLAN0074            Desg FWD 4         128.38   P2p Edge
    VLAN0151            Desg FWD 4         128.38   P2p Edge
    VLAN0152            Desg FWD 4         128.38   P2p Edge
    VLAN0153            Desg FWD 4         128.38   P2p Edge
    VLAN0165            Desg FWD 4         128.38   P2p Edge
    Catalyst-4500#sh mac address-table interface gigabitEthernet 1/38
    Multicast Entries
    vlan    mac address     type    ports
    -------+---------------+-------+--------------------------------------------
      73    ffff.ffff.ffff   system Gi1/32,Gi1/38,Gi1/42,Gi1/45
      74    ffff.ffff.ffff   system Gi1/38,Gi1/41,Gi1/45
    151    ffff.ffff.ffff   system Gi1/3,Gi1/5,Gi1/6,Gi1/7,Gi1/9,Gi1/10,Gi1/11
                                    Gi1/12,Gi1/14,Gi1/16,Gi1/17,Gi1/18,Gi1/19
                                    Gi1/21,Gi1/22,Gi1/23,Gi1/25,Gi1/26,Gi1/27
    I still don't see the VEM  connected to port 1/38 of this switch on my nexus 1000v switch. The configuration file show exactly how many VEMs I have as shown below:
    Nexus-1000v# sh running-config
      host vmware id 34373030-3635-3255-5830-303630344
    vem 4
      host vmware id 34373030-3635-3255-5830-313130313
    vem 5
      host vmware id 34373030-3635-3255-5830-303630344
    vem 6
      host vmware id 34393232-3035-3255-5839-3134303537
    vem 7
      host vmware id 34373030-3635-3255-5830-313130313
    vem 8
      host vmware id 33393138-3335-5553-4539-31314e3438
    vem 9
      host vmware id 34393232-3035-3255-5839-3339303646
    vem 10
      host vmware id 34393232-3035-3255-5839-3430303035
    vem 11
      host vmware id 34393232-3035-3255-5839-3339303646
    But the show module command on the nexus 1000v shows only those VEMs coonected to the Nexus 5K switches and not those connected to the Catalyst 4500 switches.
    the uplink por-profile confguration on the Nexus 1000 V :
    vmware port-group
      switchport mode trunk
      switchport trunk native vlan 74
      switchport trunk allowed vlan 73-74,151-153,165,180,811,813,815,817-822,824,826-831
      channel-group auto mode on sub-group cdp
      no shutdown
      system vlan 74,180,811,819-821
      state enabled
    the corresponding interface on the 4500 switch :
    interface GigabitEthernet1/38
    switchport trunk encapsulation dot1q
    switchport trunk native vlan 74
    switchport trunk allowed vlan 73,74,151-153,165,180,811,813,815,817-822,824
    switchport trunk allowed vlan add 826-831
    switchport mode trunk
    mtu 9000
    spanning-tree portfast trunk
    I really appreciate in finiding out why I can't see the VEM (ESX Servers) connected to the 4500 switches.
    Thanks

  • I recently updated my iPad to iOS 8 and still checking on the settings. When I happened to swipe on my screen fro too long, it zoomed and I can no longer see what's on it. I can not even unlock it. What shall I do?

    I recently updated my iPad to iOS 8 and still checking on the settings. When I happened to swipe on my screen for too long, it zoomed and I can no longer see what's on it. I can not even unlock it. I can not use my iPad anymore. What shall I do?

    Try double tapping with three fingers and see if that reduces the screen image. If it does, unlock the iPad and go to Settings>General>Accessibility>zoom>Off. If double tapping with three fingers doesn't work, try triple tapping the home button instead.

  • Catalyst 4500 Ethernet and fibre channel passthru

    dear sir,
    anyone have any idea / documentation showing that the belows device 1.) & 2.) can support Ethernet and fibre channel passthru ? thanks.
    1.) WS-X4424-GB-RJ4 (Catalyst 4500 24-port 10/100/1000 Module (RJ45)
    2.) WS-X4306-GB (Catalyst 4500 Gigabit Ethernet Module, 6-Ports (GBIC)

    You're welcome. Check below for the module info. And there is description about support of fibre channel passthru.
    http://www.cisco.com/en/US/products/hw/switches/ps4324/products_data_sheet0900aecd802109ea.html
    You can also seach Cisco web for more info.
    Hope this helps.

  • So now i might ned u all help, currently im using ipad and i get some news abt ios 6.1 and im interested abt it so i updated wif my Ipad (ver. ios 5) and i checked some web said ipad1 cnt update to ios6 so i might ned u all help how to restore bck to ios5

    so now i might ned u all help, currently im using ipad and i get some news abt ios 6.1 and im interested abt it so i updated wif my Ipad (ver. ios 5) and i checked some web said ipad1 cnt update to ios6 so i might ned help how to restore bck to ios5 as normal be4

    If it's showing the connect to iTunes screen then you will need to do that.
    But Apple don't provide any method to update the first gen iPad to iOS 5 (nor do they support downgrading the iOS version).

Maybe you are looking for