Catalyst 4500 Sup 7 DBL Drops

Hallo Guy´s. 
I have a problem with a 4510 Switch with Sup 7 and VSS. sometimes i get from my management System a error message that i have drops. When i look at the Switch i see with a show interface the following output.
GigabitEthernet1/1/20 is up, line protocol is up (connected)
  Hardware is Gigabit Ethernet Port, address is fc5b.3981.00cb (bia fc5b.3981.00cb)
  Description: Uplink >> DEISSW28 > 0/49
  MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec,
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation ARPA, loopback not set
  Keepalive set (10 sec)
  Full-duplex, 1000Mb/s, link type is auto, media type is 1000BaseSX
  input flow-control is off, output flow-control is off
  ARP type: ARPA, ARP Timeout 04:00:00
  Last input 00:00:03, output never, output hang never
  Last clearing of "show interface" counters never
  Input queue: 0/2000/0/0 (size/max/drops/flushes); Total output drops: 33588
  Queueing strategy: Class-based queueing
  Output queue: 0/40 (size/max)
  5 minute input rate 3389000 bits/sec, 396 packets/sec
  5 minute output rate 1373000 bits/sec, 375 packets/sec
     259327531 packets input, 260486639929 bytes, 0 no buffer
     Received 2197702 broadcasts (1237454 multicasts)
     0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
     0 input packets with dribble condition detected
     687620273 packets output, 171964900087 bytes, 0 underruns
     0 output errors, 0 collisions, 6 interface resets
     0 unknown protocol drops
     0 babbles, 0 late collision, 0 deferred
     0 lost carrier, 0 no carrier
     0 output buffer failures, 0 output buffers swapped out
When i display the counters i see that i have DBL Drops:
Port InBytes InUcastPkts InMcastPkts InBcastPkts
Gi1/1/20 260445332225 257093813 1237385 960186
Port OutBytes OutUcastPkts OutMcastPkts OutBcastPkts
Gi1/1/20 171951485588 586491305 47531837 53564908
Port InPkts 64 OutPkts 64 InPkts 65-127 OutPkts 65-127
Gi1/1/20 169938 2535840 73860043 571805902
Port InPkts 128-255 OutPkts 128-255 InPkts 256-511 OutPkts 256-511
Gi1/1/20 15065293 22890554 3761375 4726098
Port InPkts 512-1023 OutPkts 512-1023
Gi1/1/20 2832564 3570926
Port InPkts 1024-1518 OutPkts 1024-1518 InPkts 1519-1548 OutPkts 1519-1548
Gi1/1/20 2133852 7956164 161468319 74102567
Port InPkts 1549-9216 OutPkts 1549-9216
Gi1/1/20 0 0
Port Tx-Bytes-Queue-1 Tx-Bytes-Queue-2 Tx-Bytes-Queue-3 Tx-Bytes-Queue-4
Gi1/1/20 3885776852 36149774 129367770 772345869
Port Tx-Bytes-Queue-5 Tx-Bytes-Queue-6 Tx-Bytes-Queue-7 Tx-Bytes-Queue-8
Gi1/1/20 430894369 32739589 141604609 166522564649
Port Tx-Drops-Queue-1 Tx-Drops-Queue-2 Tx-Drops-Queue-3 Tx-Drops-Queue-4
Gi1/1/20 0 0 1 0
Port Tx-Drops-Queue-5 Tx-Drops-Queue-6 Tx-Drops-Queue-7 Tx-Drops-Queue-8
Gi1/1/20 0 0 0 6
Port Dbl-Drops-Queue-1 Dbl-Drops-Queue-2 Dbl-Drops-Queue-3 Dbl-Drops-Queue-4
Gi1/1/20 0 0 0 0
Port Dbl-Drops-Queue-5 Dbl-Drops-Queue-6 Dbl-Drops-Queue-7 Dbl-Drops-Queue-8
Gi1/1/20 0 0 0 16787
Port Rx-No-Pkt-Buff RxPauseFrames TxPauseFrames PauseFramesDrop
Gi1/1/20 0 0 0 0
Port UnsupOpcodePause
Gi1/1/20 0
Port CrcAlign-Err Dropped-Bad-Pkts Collisions Symbol-Err
Gi1/1/20 0 0 0 0
Port Undersize Oversize Fragments Jabbers
Gi1/1/20 0 0 0 0
Port Single-Col Multi-Col Late-Col Excess-Col
Gi1/1/20 0 0 0 0
Port Deferred-Col False-Car Carri-Sen Sequence-Err
Gi1/1/20 0 0 0 0
Port RxIslTagFrames TxIslTagFrames RxDot1qTagFrames TxDot1qTagFrames
Gi1/1/20 0 0 257135468 683431783
On the Interface is auto qos configured. 
interface GigabitEthernet1/1/20
switchport trunk pruning vlan 2-1000
switchport mode trunk
auto qos trust
service-policy input AutoQos-4.0-Input-Policy
service-policy output AutoQos-4.0-Output-Policy
Comes this behavior from the qos? Where can i see wich traffic is assigned to queue 8?
Regards Stefan

Disclaimer
The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
Yes, DBL is a (unique to) 4500 sup QoS feature.  Likely configured in your egress service-policy.
I don't recall the sup7 QoS architecture, but switches often provide fixed egress queues that you map traffic to via either CoS or ToS markings.  The QoS section of the User Guide, for your IOS version, should explain.

Similar Messages

  • About the features of Catalyst 4500 SUP-II+Plus-TS supervisor engine

    Could anybody tell me if the SUP-II+Plus-TS can support PBR(policy based routing)?

    Hi!
    I apologise for saying that it does support PBR, actually I had sup-IV goin on in my mind!
    Well you can have a look at the following data-sheet, that should help!
    http://www.cisco.com/en/US/products/hw/modules/ps2797/products_data_sheet0900aecd8017a0c5.html
    Regards,
    AbhisheK
    Please rate all posts!!!

  • Catalyst 4500, supervisor II+, EIGRP

    Hi,
    We're bought a catalyst 4500 sup II+ with image cat4000-i9s-mz.122-25.EWA4.bin
    In feature navigator isn't anything about EIGRP in this image, but in CLI I may configure EIGRP.
    How is that possible?
    thx

    Hi,
    You can only configure the EIGRP stub on the Sup 2+. EIGRP fully is not supported on sup2+.
    http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/12_2_31s/conf/l3_int.htm#wp1042868
    http://www.cisco.com/en/US/products/hw/switches/ps4324/products_data_sheet09186a0080197424.html
    HTH, Please rate if it does.
    -amit singh

  • Cat 4500 - Sup 7L - 03.04.00.SG - WCCP

    Ciao,
    on a device with 2 service groups it seems that only 1 service group works at the (71 and 72) same time:
    Access-list are matched.
    If I change the priority I can swap between service group ...
    IOS-XE Software, Catalyst 4500 L3 Switch Software (cat4500e-UNIVERSALK9-M), Version 03.04.00.SG RELEASE SOFTWARE (fc3)
    cat4500e-universalk9.SPA.03.04.00.SG.151-2.SG.bin / enterprise services
    Mod Ports Card Type                              Model              Serial No.
    ---+-----+--------------------------------------+------------------+-----------
    1    18  10GE (X2), 1000BaseX (SFP)             WS-X4606-X2-E      JAE162703YY
    2    12  1000BaseX (SFP)                        WS-X4612-SFP-E     JAE163707H3
    3     4  Sup 7-E 10GE (SFP+), 1000BaseX (SFP)   WS-X45-SUP7-E      CAT1627L2M1
    5    48  10/100/1000BaseT EEE (RJ45)            WS-X4748-RJ45-E    CAT1629L0VB
    M MAC addresses                    Hw  Fw           Sw               Status
    --+--------------------------------+---+------------+----------------+---------
    1 a493.4ca1.972a to a493.4ca1.973b 1.2                               Ok
    2 6073.5c3a.3898 to 6073.5c3a.38a3 1.1                               Ok
    3 30f7.0db9.2900 to 30f7.0db9.2903 2.1 15.0(1r)SG5  03.04.00.SG      Ok
    5 30f7.0dac.ed50 to 30f7.0dac.ed7f 1.1                               Ok
    Mod  Redundancy role     Operating mode      Redundancy status
    ----+-------------------+-------------------+----------------------------------
    3   Active Supervisor   RPR                 Active
    Any clue?

    Luciano,
    Try adding 'ip wccp check services all' to your global config if you have multiple wccp service identifiers attached to an interface.  Each service identifier will need a mutually exclusive ACL for the appropriate service identifier to trigger.
    Thank You,
    Dan Laden
    Cisco PDI Data Center
    Want to know more about how PDI can assist you?
    http://www.youtube.com/watch?v=3OAJrkMfN3c
    http://www.cisco.com/go/pdihelpdesk

  • Trunking on Nexus 5000 to Catalyst 4500

    I have 2 devices on the each end of a Point to Point.  One side has a Nexus 5000 the other end a Catalyst 4500.  We want a trunk port on both sides to allow a single VLAN for the moment.  I have not worked with Nexus before.  Could someone look at the configurations of the Ports and let me know if it looks ok?
    nexus 5000
    interface Ethernet1/17
      description
      switchport mode trunk
      switchport trunk allowed vlan 141
      spanning-tree guard root
      spanning-tree bpdufilter enable
      speed 1000
    Catalyst 4500
    interface GigabitEthernet3/39
    description
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 141
    switchport mode trunk
    speed 1000
    spanning-tree bpdufilter enable
    spanning-tree guard root

    Thanks guys, we found the issue.  The Catalyst is on my side and the Nexus is on the side of the hosting center.  The hosting center moved his connection to a different Nexus 5000 and the connection came right up.  We dropped the spanning-tree guard root. 
    It was working on the previous nexus when we set the native vlan for 141.  So we thought it was the point to point dropping the tags.
    The hosting center engineer this it might have to do with the VPC Peer-Link loop prevention on the previous Nexus. 
    Anyway it is working the way we need it to.

  • IDS/IPS functionality in Catalyst 4500 ?

    Hi,
    is there an IDS/IPS functionality in Catalyst 4500 (Supervisor 6-e), or do we need to propose external IDS/IPS device?

    I think cat 4500 sup 6-e does not have IDS/IPS functionality. You have to externally install it.
    http://www.cisco.com/en/US/prod/collateral/modules/ps2797/ps9294/product_data_sheet0900aecd806df543_ps4324_Products_Data_Sheet.html

  • Catalyst 4006 chassis with CATALYST 4500 SUPERVISOR V

    Hi Experts,
    Can I use CATALYST 4500 SUPERVISOR V(WS-X4516) in an old 6-slot catalyst 4006 chassis( WS-C4006). I want to run the latest IOS available and I have the following line cards:
    WS-X4232-RJ-XX
    WS-X4418-GB
    WS-X4148-RJ
    thanks and regards
    alex

    Hi Alex
    Yes you can run the Sup V in the 4006 chassis. See this link
    http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/module/guide/01overvw.html#wp1015031
    The Sup V also supports the WS-X4418-GB and WS-X4148-RJ modules - see attached link
    http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps4324/product_data_sheet09186a00801fcaba_ps2797_Products_Data_Sheet.html
    HTH
    Jon

  • High CPU with error "%ADJ-3-RESOLVE_REQ:" in Catalyst 4500-X VSS after making L3 function (static routing)

    We have a VSS based on 2x WS-C4500X-16., The VSS is used as Layer 2 Switch for diffrents Vlan in our DC.
    After making the VSS as a Layer 3 gateway for our production VLAN and added 2 routes for routing purposes, we encountered a network down time with high CPU in the VSS and  a huges log messages : 
    .May 14 12:11:25.947: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.22 Vlan100
    .May 14 12:11:34.516: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.22 Vlan100
    .May 14 12:11:40.072: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:11:49.682: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:11:55.079: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:12:00.926: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:06.701: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.8.32 Vlan100
    .May 14 12:12:12.624: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:21.627: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:32.261: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.8.32 Vlan100
    .May 14 12:12:41.801: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.2.105 Vlan100
    .May 14 12:12:49.633: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:12:54.831: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:12:59.960: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:13:08.745: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:16.138: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:22.393: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:31.415: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.141 Vlan100
    .May 14 12:13:38.944: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.2.215 Vlan100
    .May 14 12:13:45.972: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    Bellow are the show version of our VSS, 
    Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Software (cat4500e-UNIVERSALK9-M), Version 03.04.00.SG RELEASE SOFTWARE (fc3)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2012 by Cisco Systems, Inc.
    Compiled Wed 05-Dec-12 04:38 by prod_rel_team
    ROM: 15.0(1r)SG10
    S_C4500X_01 uptime is 33 weeks, 1 day, 14 minutes
    Uptime for this control processor is 33 weeks, 1 day, 16 minutes
    System returned to ROM by power-on
    System restarted at 11:59:10 UTC Tue Sep 24 2013
    Running default software
    Jawa Revision 2, Winter Revision 0x0.0x40
    Last reload reason: power-on
    License Information for 'WS-C4500X-16'
        License Level: ipbase   Type: Permanent
        Next reboot license Level: ipbase
    cisco WS-C4500X-16 (MPC8572) processor (revision 9) with 4194304K/20480K bytes of memory.
    Processor board ID JAE173303CF
    MPC8572 CPU at 1.5GHz, Cisco Catalyst 4500X
    Last reset from PowerUp
    4 Virtual Ethernet interfaces
    32 Ten Gigabit Ethernet interfaces
    511K bytes of non-volatile configuration memory.
    Configuration register is 0x2101
    Can you help please, 

    Hi,
    thanks for your reply, but there is no hsrp configured, just an interface vlan. with 2 static routes and the problem was there for more than an hour before we decided to rollback.
    Is there a BugId with this problem in Cisco DataBase.
    here is a show ip route 
    S_C4500X_01#      show ip route
    Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
           D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area 
           N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
           E1 - OSPF external type 1, E2 - OSPF external type 2
           i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
           ia - IS-IS inter area, * - candidate default, U - per-user static route
           o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
           + - replicated route, % - next hop override
    Gateway of last resort is 10.2.1.253 to network 0.0.0.0
    S*    0.0.0.0/0 [1/0] via 10.2.1.253
          10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
    C        10.0.0.0/8 is directly connected, Vlan100
    L        10.1.1.250/32 is directly connected, Vlan100
          172.31.0.0/16 is variably subnetted, 2 subnets, 2 masks
    C        172.31.0.0/16 is directly connected, Vlan120
    L        172.31.0.1/32 is directly connected, Vlan120
    S     192.1.0.0/16 [1/0] via 10.1.1.254
    and the show ip cef: 
    _C4500X_01#        show ip cef 
    .May 14 12:13:57.859: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.158 Vlan100 f
    Prefix               Next Hop             Interface
    0.0.0.0/0            10.2.1.253           Vlan100
    0.0.0.0/8            drop
    0.0.0.0/32           receive              
    10.0.0.0/8           attached             Vlan100
    10.0.0.0/32          receive              Vlan100
    10.1.1.6/32          attached             Vlan100
    10.1.1.17/32         attached             Vlan100
    10.1.1.40/32         attached             Vlan100
    10.1.1.41/32         attached             Vlan100
    10.1.1.50/32         attached             Vlan100
    10.1.1.60/32         attached             Vlan100
    10.1.1.99/32         attached             Vlan100
    10.1.1.121/32        attached             Vlan100
    10.1.1.122/32        attached             Vlan100
    10.1.1.124/32        attached             Vlan100
    10.1.1.125/32        attached             Vlan100
    10.1.1.126/32        attached             Vlan100
    10.1.1.225/32        attached             Vlan100
    10.1.1.227/32        attached             Vlan100
    10.1.1.250/32        receive              Vlan100
    10.1.1.254/32        10.1.1.254           Vlan100
    10.2.1.3/32          attached             Vlan100
    10.2.1.4/32          attached             Vlan100
    10.2.1.6/32          attached             Vlan100
    10.2.1.8/32          attached             Vlan100
    10.2.1.9/32          attached             Vlan100
    10.2.1.18/32         attached             Vlan100
    10.2.1.23/32         attached             Vlan100
    10.2.1.24/32         attached             Vlan100
    Prefix               Next Hop             Interface
    10.2.1.26/32         attached             Vlan100
    10.2.1.28/32         attached             Vlan100
    10.2.1.29/32         attached             Vlan100
    10.2.1.31/32         attached             Vlan100
    10.2.1.103/32        attached             Vlan100
    10.2.1.108/32        attached             Vlan100
    10.2.1.109/32        attached             Vlan100
    10.2.1.124/32        attached             Vlan100
    10.2.1.129/32        attached             Vlan100
    10.2.1.137/32        attached             Vlan100
    10.2.1.139/32        attached             Vlan100
    10.2.1.143/32        attached             Vlan100
    10.2.1.144/32        attached             Vlan100
    10.2.1.159/32        attached             Vlan100
    10.2.1.167/32        attached             Vlan100
    10.2.1.174/32        attached             Vlan100
    10.2.1.175/32        attached             Vlan100
    10.2.1.176/32        attached             Vlan100
    10.2.1.181/32        attached             Vlan100
    10.2.4.38/32         attached             Vlan100
    10.2.4.39/32         attached             Vlan100
    10.2.4.43/32         attached             Vlan100
    10.2.4.47/32         attached             Vlan100
    10.2.4.51/32         attached             Vlan100
    10.2.4.63/32         attached             Vlan100
    10.2.4.65/32         attached             Vlan100
    10.2.4.69/32         attached             Vlan100
    10.2.4.71/32         attached             Vlan100
    10.2.4.73/32         attached             Vlan100
    10.2.4.102/32        attached             Vlan100
    10.2.4.106/32        attached             Vlan100
    10.2.4.107/32        attached             Vlan100
    10.2.4.113/32        attached             Vlan100
    10.2.4.116/32        attached             Vlan100
    10.2.4.119/32        attached             Vlan100
    10.2.4.120/32        attached             Vlan100
    10.2.4.122/32        attached             Vlan100
    10.2.4.141/32        attached             Vlan100
    10.2.4.148/32        attached             Vlan100
    10.2.6.7/32          attached             Vlan100
    Prefix               Next Hop             Interface
    10.2.6.16/32         attached             Vlan100
    10.2.6.31/32         attached             Vlan100
    10.2.7.14/32         attached             Vlan100
    10.2.7.22/32         attached             Vlan100
    10.2.7.24/32         attached             Vlan100
    10.2.7.34/32         attached             Vlan100
    10.2.7.37/32         attached             Vlan100
    10.2.7.41/32         attached             Vlan100
    10.2.7.48/32         attached             Vlan100
    10.2.8.18/32         attached             Vlan100
    10.2.8.32/32         attached             Vlan100
    10.2.8.59/32         attached             Vlan100
    10.2.8.70/32         attached             Vlan100
    10.2.8.85/32         attached             Vlan100
    10.2.8.88/32         attached             Vlan100
    10.2.8.104/32        attached             Vlan100
    10.2.8.135/32        attached             Vlan100
    10.2.99.10/32        attached             Vlan100
    10.2.99.54/32        attached             Vlan100
    10.255.255.255/32    receive              Vlan100
    127.0.0.0/8          drop
    172.31.0.0/16        attached             Vlan120
    172.31.0.0/32        receive              Vlan120
    172.31.0.1/32        receive              Vlan120
    172.31.0.5/32        attached             Vlan120
    172.31.0.29/32       attached             Vlan120
    172.31.255.255/32    receive              Vlan120
    192.1.0.0/16         10.1.1.254           Vlan100
    224.0.0.0/4          drop
    224.0.0.0/24         receive              
    Prefix               Next Hop             Interface
    240.0.0.0/4          drop
    and show ip arp 
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.1.1.1                0   aa00.0400.c286  ARPA   Vlan100
    Internet  10.1.1.6                0   0050.5689.24b8  ARPA   Vlan100
    Internet  10.1.1.10               0   0050.5694.7d20  ARPA   Vlan100
    Internet  10.1.1.11               0   0050.5694.7d20  ARPA   Vlan100
    Internet  10.1.1.12               0   0050.5694.6ae7  ARPA   Vlan100
    Internet  10.1.1.13               0   0050.5694.6ae7  ARPA   Vlan100
    Internet  10.1.1.14               0   0050.568a.6321  ARPA   Vlan100
    Internet  10.1.1.16               0   0050.5694.0ab5  ARPA   Vlan100
    Internet  10.1.1.17               0   0050.5694.493d  ARPA   Vlan100
    Internet  10.1.1.40               0   0013.19b0.9c40  ARPA   Vlan100
    Internet  10.1.1.41               0   1c17.d35a.c840  ARPA   Vlan100
    Internet  10.1.1.50               0   0002.b9b4.a5c0  ARPA   Vlan100
    Internet  10.1.1.60               0   000a.410f.e500  ARPA   Vlan100
    Internet  10.1.1.71               -   0008.e3ff.fc28  ARPA   Vlan100
    Internet  10.1.1.96               0   e02f.6d12.4df3  ARPA   Vlan100
    Internet  10.1.1.98               0   0050.5696.6d86  ARPA   Vlan100
    Internet  10.1.1.99               0   0050.5696.6d88  ARPA   Vlan100
    Internet  10.1.1.121              0   e02f.6d12.4dea  ARPA   Vlan100
    Internet  10.1.1.122              0   e02f.6d12.4e61  ARPA   Vlan100
    Internet  10.1.1.123              0   e02f.6d5b.c10e  ARPA   Vlan100
    Internet  10.1.1.124              0   e02f.6d17.c869  ARPA   Vlan100
    Internet  10.1.1.125              0   e02f.6d5b.c217  ARPA   Vlan100
    Internet  10.1.1.126              0   e02f.6d17.c8ec  ARPA   Vlan100
    Internet  10.1.1.127              0   e02f.6d17.c876  ARPA   Vlan100
    Internet  10.1.1.128              0   e02f.6d5b.bef3  ARPA   Vlan100
    Internet  10.1.1.202              0   0000.85b7.9031  ARPA   Vlan100
    Internet  10.1.1.222              0   000f.f84d.2ca9  ARPA   Vlan100
    Internet  10.1.1.225              0   000f.f84d.3963  ARPA   Vlan100
    Internet  10.1.1.227              0   00c0.ee26.9367  ARPA   Vlan100
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.1.1.250              -   0008.e3ff.fc28  ARPA   Vlan100
    Internet  10.1.1.254              0   0000.0c07.ac07  ARPA   Vlan100
    Internet  10.2.1.2                0   0011.4333.bcda  ARPA   Vlan100
    Internet  10.2.1.3                0   0050.5689.5d38  ARPA   Vlan100
    Internet  10.2.1.4                0   0050.5689.0404  ARPA   Vlan100
    Internet  10.2.1.6                0   0050.5689.6d3b  ARPA   Vlan100
    Internet  10.2.1.7                0   1cc1.def4.6940  ARPA   Vlan100
    Internet  10.2.1.8                0   0050.5689.330e  ARPA   Vlan100
    Internet  10.2.1.9                0   0012.793a.3ccc  ARPA   Vlan100
    Internet  10.2.1.10               0   0012.7990.e5d3  ARPA   Vlan100
    Internet  10.2.1.13               0   0050.568a.6dcf  ARPA   Vlan100
    Internet  10.2.1.15               0   0050.568a.60ff  ARPA   Vlan100
    Internet  10.2.1.18               0   0050.5689.091b  ARPA   Vlan100
    Internet  10.2.1.20               0   0050.5689.451c  ARPA   Vlan100
    Internet  10.2.1.21               0   0050.568a.0cf4  ARPA   Vlan100
    Internet  10.2.1.22               0   0050.5689.6c59  ARPA   Vlan100
    Internet  10.2.1.23               0   0050.5696.6d9e  ARPA   Vlan100
    Internet  10.2.1.24               0   0050.5689.76c4  ARPA   Vlan100
    Internet  10.2.1.26               0   0050.5689.2f4e  ARPA   Vlan100
    Internet  10.2.1.27               0   0050.5689.0632  ARPA   Vlan100
    Internet  10.2.1.28               0   0050.5689.1ce9  ARPA   Vlan100
    Internet  10.2.1.29               0   0050.5689.6aaa  ARPA   Vlan100
    Internet  10.2.1.31               0   0050.5689.0d1a  ARPA   Vlan100
    Internet  10.2.1.37               0   0050.5696.6d81  ARPA   Vlan100
    Internet  10.2.1.103              0   d4be.d9be.8eef  ARPA   Vlan100
    Internet  10.2.1.106              0   14fe.b5e1.c595  ARPA   Vlan100
    Internet  10.2.1.107              0   0023.ae7d.a966  ARPA   Vlan100
    Internet  10.2.1.108              0   d4be.d9c8.6770  ARPA   Vlan100
    Internet  10.2.1.109              0   14fe.b5e9.c5b5  ARPA   Vlan100
    Internet  10.2.1.110              0   14fe.b5ea.5f9d  ARPA   Vlan100
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.2.1.111              0   001e.c959.d4f0  ARPA   Vlan100
    Internet  10.2.1.114              0   b8ac.6f48.4538  ARPA   Vlan100
    Internet  10.2.1.115              0   14fe.b5e1.ed89  ARPA   Vlan100
    Internet  10.2.1.116              0   7845.c409.1959  ARPA   Vlan100
    Thanks
    Lotfi

  • Catalyst 4500 Ethernet and fibre channel passthru

    dear sir,
    anyone have any idea / documentation showing that the belows device 1.) & 2.) can support Ethernet and fibre channel passthru ? thanks.
    1.) WS-X4424-GB-RJ4 (Catalyst 4500 24-port 10/100/1000 Module (RJ45)
    2.) WS-X4306-GB (Catalyst 4500 Gigabit Ethernet Module, 6-Ports (GBIC)

    You're welcome. Check below for the module info. And there is description about support of fibre channel passthru.
    http://www.cisco.com/en/US/products/hw/switches/ps4324/products_data_sheet0900aecd802109ea.html
    You can also seach Cisco web for more info.
    Hope this helps.

  • WS-X4306-GB - Catalyst 4500 6-port GBIC Module & FC Tape Libraries

    WS-X4306-GB - Catalyst 4500 6-port GBIC Module & FC Tape Libraries
    I have several Tape Autoloader Libraries from Dell which have Fibre Channel interfaces. I have loop switches that these connect to today. I also have a Catalyst 4506 with a WS-X4306-GB - 6-port GBIC Module. I would like to use the X4306 as a loop switch. Some of the libraries can also connect via point-to-point FC.
    Can this be done? If yes, how do I start in making this happen?
    Thank You.

    Sorry but the Catalyst 4500 does not support Fibre Channel connections on the WS-X4306-GB (or on any card). It's strictly an Ethernet switch. Reference
    To mix and match Ethernet and FC interfaces, you'd have to be on a new platform like the Nexus 5k series - specifically the UP (Unified Port) variants.

  • QoS trust dscp or cos on catalyst 4500

    We have a 4510R with Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Software cat4500e-UNIVERSALK9-M), Version 03.05.02.E RELEASE SOFTWARE (fc1).
    I want use qos trust dscp or qos trust cos on the interface conected to other cisco switch or wlan controller.
    The current IOS version, do not support qos trust dscp:
    SW(config)#interface gi10/16
    SW(config-if)#qos tr
    SW(config-if)#qos trust ?
      device  trusted device class
      extend  Extend trust through a connected device
    SW(config-if)#qos trust device ?
      cisco-phone   Cisco IP Phone
      cts           Cisco-telepresence
      ip-camera     Cisco video surveillance camera
      media-player  Cisco Digital Media Player
    SW(config-if)#qos trust device
    What is the software that I need for this?. I tried with command lookup tool but the cat4500 do not appears.

    That is even new for me.
    I did a search and found that, now a days you no longer have to provide the Trust DSCP command, it is by default trusted.
    Went through this White Paper and excerpts are below:
    http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-4500-series-switches/white_paper_c11-539588.html
    The answer to your question comes from the following excerpt :-
    "Previously supervisor engines relied on “port trust” to classify traffic; however, this does not fall into the MQC CLI construct. MQC provides a more flexible capability, i.e. all traffic is trusted by default, an administrator can change this trust state using a policy map. Another difference is the “internal DSCP” value used within the switch to place packets in the proper queue.
    Cisco Catalyst 4500E Supervisor Engines do not use “internal DSCP”; rather, it relies on explicit matching of QoS values using class maps so that packets can be placed in the correct queue.
    Also, note that there is no specific priority queue: it is not queue 3 or queue 1. The priority queue is simply configured within a class; therefore, it is not tied to a specific queue. One final difference is that of classification. Cisco Catalyst 4500E Supervisor Engines provide sequential classification rather than parallel. This allows the network administrator to classify traffic at egress based on the ingress markings. These markings can be done unconditionally, using a policer or using a table map. Based on these changes, QoS CLI will now be more contiguous on the Supervisor Engines as it will now have standard Cisco MQC CLI, making configuration management much simpler"
    HTH,
    Please rate all helpful posts.
    Regards

  • Catalyst 4500-X, VSS, and SVI

    Hello, everybody!
    I have a proyect to implement the feature VSS, with two catalyst 4500-X, it will be the layer Core/Distribution.
    So, I want integrate in the catalyst 4500X, Inter vlan routing (SVI)  and vtp domain,  in the layer access, we´ll have  SW 3750-X  with PoE.
    Is possible configure SVI  in my catalyst 4500-X.  to separate traffic across VLANs. and the routing will be in the 4500X too.  ???
    My customer does not have sufficient space to mount the serie 4500E in the Rack, so he prefer the 4500-X.
    Help me!
    Thanks!
    Regards

    Hi,
    Is possible configure SVI in my catalyst 4500-X. to separate traffic across VLANs. and the routing will be in the 4500X too. ???
    Yes, there is no different between a VSS pair and non-VSS when it comes to SVI and inter-vlan routing.  It works the same way as if the 4500-X ware separate.
    HTH

  • Catalyst 4500 Hi CPU

    Hi,
    I have an issue with a Catalyst-4500 (4507R-E, ipbase, 12.2.46SG), that is running very hi CPU since some days:
    By investigating, I observed a couple of processes that are realy CPU-consuming:
    I don't know where to look ...
    Some help and/or some suggestion ?
    Best regars,
    Claudio

    Two good resources for troubleshooting high CPU on the 4K
    High CPU Utilization on Cisco IOS Software-Based Catalyst 4500 Switches
    http://www.cisco.com/c/en/us/support/docs/switches/catalyst-4000-series-switches/65591-cat4500-high-cpu.html
    Troubleshooting High CPU on the Catalyst 4500-E Series Switch
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/troubleshooting/cpu_util.html
    HTH
    Luke

  • Catalyst 4500, scp, rcp

    Does anybody know is it possible to set up a remote access to the Catalyst 4500 series switch thru the rcp or scp protocol? I want to start commands on the remote unix server. Like unix# scp -i identity -B acl.file user@catalyst:system:running-config or unix# rcp acl.file user@catalyst:system:running-config, where acl.file is the file with access-list. It's important to start commands on the remote server, not on the switch. Thanks for any advice.

    Hello,
    I just tried this on a Cat 4500 using tftp, and successfully changed its hostname, and added a new ACL.
    The same should be true for rcp and scp.
    Just remember to put "end" as the last line of the file, otherwise you will get a %PARSER-4-BADCFG: Unexpected end of configuration file message (but it still works).
    This was tried on Version 12.2(25)EWA4.
    Hope this helped,
    Michael.

  • Catalyst 4500 L3 QoS Issue

    Hi All
    I got 2 cisco catalyst 4500 l3 switches (Cisco IOS Software, IOS-XE Software, Version 03.02.00.XO RELEASE SOFTWARE (fc1))       
    I enabled Autoqos on one sw successfully without any issue
    but facing issue on the second, below is the screenshot for your reference kindly suggest
    Thanks!

    Yes it is.
    See this link for details -
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/54sg/configuration/guide/config/RPR.html#wp1130150
    Jon

Maybe you are looking for