Catalyst 4500, supervisor II+, EIGRP

Hi,
We're bought a catalyst 4500 sup II+ with image cat4000-i9s-mz.122-25.EWA4.bin
In feature navigator isn't anything about EIGRP in this image, but in CLI I may configure EIGRP.
How is that possible?
thx

Hi,
You can only configure the EIGRP stub on the Sup 2+. EIGRP fully is not supported on sup2+.
http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/12_2_31s/conf/l3_int.htm#wp1042868
http://www.cisco.com/en/US/products/hw/switches/ps4324/products_data_sheet09186a0080197424.html
HTH, Please rate if it does.
-amit singh

Similar Messages

  • Upgrade Catalyst 4500 Supervisor Engine 8-E(IOS XE Software)

    Folks,
    We are looking to upgrade the Catalyst 4500 Supervisor Engine 8-E(IOS XE Software). As of now we are running on 3.3.1XO and as per the Cisco notes version 3.3.2XO which is suggested version.
    I would like to find some comparison documents on both these version and establish if there is a need to do the upgrade. What are the fixes that have been done in this version.
    Thanks,!!

    Hi Nikhil,
    Please find release notes of version 3.3.2XO below which can provide you the details to upgrade.
    Mainly you need to refer the features it supports and resolved cavets (which means the bugs resolved fro the earlier version on to this.).
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_29983-01.html
    HTH
    Regards
    Inayath
    *Plz rate if this info is helpfull.

  • Catalyst 4006 chassis with CATALYST 4500 SUPERVISOR V

    Hi Experts,
    Can I use CATALYST 4500 SUPERVISOR V(WS-X4516) in an old 6-slot catalyst 4006 chassis( WS-C4006). I want to run the latest IOS available and I have the following line cards:
    WS-X4232-RJ-XX
    WS-X4418-GB
    WS-X4148-RJ
    thanks and regards
    alex

    Hi Alex
    Yes you can run the Sup V in the 4006 chassis. See this link
    http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/module/guide/01overvw.html#wp1015031
    The Sup V also supports the WS-X4418-GB and WS-X4148-RJ modules - see attached link
    http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps4324/product_data_sheet09186a00801fcaba_ps2797_Products_Data_Sheet.html
    HTH
    Jon

  • Configuring VSS on Catalyst 4500 Supervisor 8-E

    I am trying to configure VSS between two Catalyst 4510R+E chassis that are equipped with dual Supervisor 8e blades, all running enterprise services licenses. I have configured SSO and NSF on both chassis, but when I get to the step to configure the virtual switch domain, I'm unable to proceed any further. I'm only able to get the following output:
    Switch(config)#switch virtual ?
    % Unrecognized command
    According to the VSS setup documentation, I should be able to input switch virtual domain <#> at this point to configure the virtual domain for VSS.
    I'm guessing that the problem is the IOS version that the supervisor engines are running, which is 3.3.0XO. I know on the Supervisor 7-E blades, IOS version 3.4.0SG or higher is required to run VSS.
    Can anyone confirm whether or not 3.3.0XO supports VSS? Cisco's data sheet states that the 8-E supports VSS, but the release notes are rather vague:
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_29983-01.html
    If 3.3.0XO does not support VSS, can anyone confirm whether or not 3.4.0SG is supported on the Supervisor 8-E?

    IOS-XE 3.6.0 does support VSS on Sup8 - Please make sure to upgrade the rom before attempting to upgrade the sup.
     ROM version = 15.1(1r)SG4
     HTH
    Luke

  • SFP-10G-ZR support on Catalyst 4500 SUP6E

    Hello,
    is the SFP-10G-ZR supported on the SUP6-E with the OneX converter?
    BR
    O.G

    End-of-Sale and End-of-Life Announcement for the Cisco Catalyst 4500 Supervisor Engine 6-E
    The chances of your SE submitting the PER is now ZERO.  You'll be forced to upgrade to Sup7E.

  • IDS/IPS functionality in Catalyst 4500 ?

    Hi,
    is there an IDS/IPS functionality in Catalyst 4500 (Supervisor 6-e), or do we need to propose external IDS/IPS device?

    I think cat 4500 sup 6-e does not have IDS/IPS functionality. You have to externally install it.
    http://www.cisco.com/en/US/prod/collateral/modules/ps2797/ps9294/product_data_sheet0900aecd806df543_ps4324_Products_Data_Sheet.html

  • QoS trust dscp or cos on catalyst 4500

    We have a 4510R with Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Software cat4500e-UNIVERSALK9-M), Version 03.05.02.E RELEASE SOFTWARE (fc1).
    I want use qos trust dscp or qos trust cos on the interface conected to other cisco switch or wlan controller.
    The current IOS version, do not support qos trust dscp:
    SW(config)#interface gi10/16
    SW(config-if)#qos tr
    SW(config-if)#qos trust ?
      device  trusted device class
      extend  Extend trust through a connected device
    SW(config-if)#qos trust device ?
      cisco-phone   Cisco IP Phone
      cts           Cisco-telepresence
      ip-camera     Cisco video surveillance camera
      media-player  Cisco Digital Media Player
    SW(config-if)#qos trust device
    What is the software that I need for this?. I tried with command lookup tool but the cat4500 do not appears.

    That is even new for me.
    I did a search and found that, now a days you no longer have to provide the Trust DSCP command, it is by default trusted.
    Went through this White Paper and excerpts are below:
    http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-4500-series-switches/white_paper_c11-539588.html
    The answer to your question comes from the following excerpt :-
    "Previously supervisor engines relied on “port trust” to classify traffic; however, this does not fall into the MQC CLI construct. MQC provides a more flexible capability, i.e. all traffic is trusted by default, an administrator can change this trust state using a policy map. Another difference is the “internal DSCP” value used within the switch to place packets in the proper queue.
    Cisco Catalyst 4500E Supervisor Engines do not use “internal DSCP”; rather, it relies on explicit matching of QoS values using class maps so that packets can be placed in the correct queue.
    Also, note that there is no specific priority queue: it is not queue 3 or queue 1. The priority queue is simply configured within a class; therefore, it is not tied to a specific queue. One final difference is that of classification. Cisco Catalyst 4500E Supervisor Engines provide sequential classification rather than parallel. This allows the network administrator to classify traffic at egress based on the ingress markings. These markings can be done unconditionally, using a policer or using a table map. Based on these changes, QoS CLI will now be more contiguous on the Supervisor Engines as it will now have standard Cisco MQC CLI, making configuration management much simpler"
    HTH,
    Please rate all helpful posts.
    Regards

  • Subinterfaces - hardware limitation on catalyst 4500-X

    Hi there,
    We are currently building a VSS and our design has L3 subinterfaces however we have hit a major wall while trying to do the following
             Create physical subinterface on VSS switch – Fail
             Create port-channel subinterface on VSS switch – Fail
             Create physical subinterface on standalone switch – Fail
             Create port-channel subinterface on standalone switch – Fail
    Below is the output showing that the option of a subinterfaces seems to be available, but it still doesn’t apply
    Enter configuration commands, one per line.  End with CNTL/Z.
    Switch(config)#int po1
    Switch(config-if)#no swi
    Switch(config-if)#no switchport
    Switch(config-if)#int po1.1
                          ^
    % Invalid input detected at '^' marker.
    Switch(config)#int po
    Switch(config)#int port-channel 1.?
      <0-4294967295>  Port-channel interface number
    Switch(config)#int port-channel 1.1
                       ^
    % Invalid input detected at '^' marker.
    Switch(config)#int tenGigabitEthernet 1/1
    Switch(config-if)#no swi
    Switch(config-if)#no switchport
    Switch(config-if)#exit
    Switch(config)#int tenGigabitEthernet 1/1.?
      <0-4294967295>  TenGigabitEthernet interface number
    Switch(config)#int tenGigabitEthernet 1/1.1
                        ^
    % Invalid input detected at '^' marker.
    Switch(config)#
    Here’s the show ver and show module output
    Switch#show ver
    Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch  Software (cat4500e-UNIVERSALK9-M), Version 03.07.00.E RELEASE SOFTWARE (fc4)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2014 by Cisco Systems, Inc.
    Compiled Sun 07-Dec-14 22:13 by prod_rel_team
    Cisco IOS-XE software, Copyright (c) 2005-2014 by cisco Systems, Inc.
    All rights reserved.  Certain components of Cisco IOS-XE software are
    licensed under the GNU General Public License ("GPL") Version 2.0.  The
    software code licensed under GPL Version 2.0 is free software that comes
    with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
    GPL code under the terms of GPL Version 2.0.
    (http://www.gnu.org/licenses/gpl-2.0.html) For more details, see the
    documentation or "License Notice" file accompanying the IOS-XE software,
    or the applicable URL provided on the flyer accompanying the IOS-XE
    software.
    ROM: 15.0(1r)SG11
    Switch uptime is 5 minutes
    System returned to ROM by power-on
    Running default software
    Jawa Revision 2, Winter Revision 0x0.0x41
    Last reload reason: power-on
    This product contains cryptographic features and is subject to United
    States and local country laws governing import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third-party authority to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. and local country laws. By using this product you
    agree to comply with applicable laws and regulations. If you are unable
    to comply with U.S. and local laws, return this product immediately.
    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected].
    *Apr 29 18:56:44.596: %SYS-5-CONFIG_I: Configured from console by console
    License Information for 'WS-C4500X-32'
        License Level: entservices   Type: Permanent
        Next reboot license Level: entservices
    cisco WS-C4500X-32 (MPC8572) processor (revision 9) with 4194304K bytes of physical memory.
    Processor board ID JAE191304FG
    MPC8572 CPU at 1.5GHz, Cisco Catalyst 4500X
    Last reset from PowerUp
    1 Virtual Ethernet interface
    32 Ten Gigabit Ethernet interfaces
    511K bytes of non-volatile configuration memory.
    Configuration register is 0x2101
    Switch#
    Switch#show module
    Chassis Type : WS-C4500X-32
    Power consumed by backplane : 0 Watts
    Mod Ports Card Type                              Model              Serial No.
    ---+-----+--------------------------------------+------------------+-----------
    1    32  4500X-32 10GE (SFP+)                   WS-C4500X-32       JAE191304FG
    M MAC addresses                    Hw  Fw           Sw               Status
    --+--------------------------------+---+------------+----------------+---------
    1 b0aa.7777.5840 to b0aa.7777.585f 2.0 15.0(1r)SG11 03.07.00.E       Ok
    System Failures:
    Power Supply:   bad/off (see 'show power')
    Switch#
    All we can find is a little note on the release notes:
    A Catalyst 4006 switch with Supervisor Engine III does not support subinterfaces or the encapsulation keyword on 
    Layer 3 Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet interfaces.
    Source: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-7-0E/15-23E/configuration/guide/xe-370-configuration/l3_int.html
    I am assuming this restriction applies to this platform but other than that there is nothing specifying we can't do this. Anyone out there has hit the same issue? or can anyone confirm this is an actual platform restriction
    Thank you

    Hi,
    The 4500 and 4500x series switches do not support sub-interfaces.  Only 6500 series support sub-interfaces.
    HTH

  • Twingig support in 4500 Supervisor II+10GE

    Hello,
    I have a doubt regarding the support of CVR-X2-SFP - aka twingig adapter - in WS-X4013+10GE (Supervisor II+10GE in a 4507R-E chassis).
    This sup has 2 10GE and 4 GE interfaces and the 4 GE interfaces are all occupied. We need to connect 2 more switches that don't have 10GE ports, so the idea was to use the twingig adapter to use 2 more gigabit SFP's. The problem is I can't find it in any compatibility list, either stating it is supported or not supported.
    Has anyone tried this in real life?
    Thanks for any answers!
    Miguel

    I couldn't find that particular (older) Supervisor but it is conspicuous by its absence on this page where it specifically states:
    To increase the flexibility of X2 ports on the Supervisor Engine 6-E, Supervisor Engine 6L-E and WS-X4606-X2-E, the Catalyst 4500 series switch, as well as Catalyst 4900M and Catalyst 4948E, support TwinGig Convertor modules. When you plug a TwinGig Convertor module into an X2 hole, it converts a single X2 hole (capable of holding one pluggable X2 optic) into two SFP holes (capable of holding two pluggable SFP optics). This enables you to have 10-Gigabit ports and 1-Gigabit ports on the same line card. It also allows you to use Gigabit ports, and then switch to a 10-Gigabit port, when needed.

  • High CPU with error "%ADJ-3-RESOLVE_REQ:" in Catalyst 4500-X VSS after making L3 function (static routing)

    We have a VSS based on 2x WS-C4500X-16., The VSS is used as Layer 2 Switch for diffrents Vlan in our DC.
    After making the VSS as a Layer 3 gateway for our production VLAN and added 2 routes for routing purposes, we encountered a network down time with high CPU in the VSS and  a huges log messages : 
    .May 14 12:11:25.947: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.22 Vlan100
    .May 14 12:11:34.516: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.22 Vlan100
    .May 14 12:11:40.072: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:11:49.682: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:11:55.079: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:12:00.926: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:06.701: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.8.32 Vlan100
    .May 14 12:12:12.624: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:21.627: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:32.261: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.8.32 Vlan100
    .May 14 12:12:41.801: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.2.105 Vlan100
    .May 14 12:12:49.633: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:12:54.831: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:12:59.960: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:13:08.745: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:16.138: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:22.393: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:31.415: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.141 Vlan100
    .May 14 12:13:38.944: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.2.215 Vlan100
    .May 14 12:13:45.972: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    Bellow are the show version of our VSS, 
    Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Software (cat4500e-UNIVERSALK9-M), Version 03.04.00.SG RELEASE SOFTWARE (fc3)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2012 by Cisco Systems, Inc.
    Compiled Wed 05-Dec-12 04:38 by prod_rel_team
    ROM: 15.0(1r)SG10
    S_C4500X_01 uptime is 33 weeks, 1 day, 14 minutes
    Uptime for this control processor is 33 weeks, 1 day, 16 minutes
    System returned to ROM by power-on
    System restarted at 11:59:10 UTC Tue Sep 24 2013
    Running default software
    Jawa Revision 2, Winter Revision 0x0.0x40
    Last reload reason: power-on
    License Information for 'WS-C4500X-16'
        License Level: ipbase   Type: Permanent
        Next reboot license Level: ipbase
    cisco WS-C4500X-16 (MPC8572) processor (revision 9) with 4194304K/20480K bytes of memory.
    Processor board ID JAE173303CF
    MPC8572 CPU at 1.5GHz, Cisco Catalyst 4500X
    Last reset from PowerUp
    4 Virtual Ethernet interfaces
    32 Ten Gigabit Ethernet interfaces
    511K bytes of non-volatile configuration memory.
    Configuration register is 0x2101
    Can you help please, 

    Hi,
    thanks for your reply, but there is no hsrp configured, just an interface vlan. with 2 static routes and the problem was there for more than an hour before we decided to rollback.
    Is there a BugId with this problem in Cisco DataBase.
    here is a show ip route 
    S_C4500X_01#      show ip route
    Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
           D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area 
           N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
           E1 - OSPF external type 1, E2 - OSPF external type 2
           i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
           ia - IS-IS inter area, * - candidate default, U - per-user static route
           o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
           + - replicated route, % - next hop override
    Gateway of last resort is 10.2.1.253 to network 0.0.0.0
    S*    0.0.0.0/0 [1/0] via 10.2.1.253
          10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
    C        10.0.0.0/8 is directly connected, Vlan100
    L        10.1.1.250/32 is directly connected, Vlan100
          172.31.0.0/16 is variably subnetted, 2 subnets, 2 masks
    C        172.31.0.0/16 is directly connected, Vlan120
    L        172.31.0.1/32 is directly connected, Vlan120
    S     192.1.0.0/16 [1/0] via 10.1.1.254
    and the show ip cef: 
    _C4500X_01#        show ip cef 
    .May 14 12:13:57.859: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.158 Vlan100 f
    Prefix               Next Hop             Interface
    0.0.0.0/0            10.2.1.253           Vlan100
    0.0.0.0/8            drop
    0.0.0.0/32           receive              
    10.0.0.0/8           attached             Vlan100
    10.0.0.0/32          receive              Vlan100
    10.1.1.6/32          attached             Vlan100
    10.1.1.17/32         attached             Vlan100
    10.1.1.40/32         attached             Vlan100
    10.1.1.41/32         attached             Vlan100
    10.1.1.50/32         attached             Vlan100
    10.1.1.60/32         attached             Vlan100
    10.1.1.99/32         attached             Vlan100
    10.1.1.121/32        attached             Vlan100
    10.1.1.122/32        attached             Vlan100
    10.1.1.124/32        attached             Vlan100
    10.1.1.125/32        attached             Vlan100
    10.1.1.126/32        attached             Vlan100
    10.1.1.225/32        attached             Vlan100
    10.1.1.227/32        attached             Vlan100
    10.1.1.250/32        receive              Vlan100
    10.1.1.254/32        10.1.1.254           Vlan100
    10.2.1.3/32          attached             Vlan100
    10.2.1.4/32          attached             Vlan100
    10.2.1.6/32          attached             Vlan100
    10.2.1.8/32          attached             Vlan100
    10.2.1.9/32          attached             Vlan100
    10.2.1.18/32         attached             Vlan100
    10.2.1.23/32         attached             Vlan100
    10.2.1.24/32         attached             Vlan100
    Prefix               Next Hop             Interface
    10.2.1.26/32         attached             Vlan100
    10.2.1.28/32         attached             Vlan100
    10.2.1.29/32         attached             Vlan100
    10.2.1.31/32         attached             Vlan100
    10.2.1.103/32        attached             Vlan100
    10.2.1.108/32        attached             Vlan100
    10.2.1.109/32        attached             Vlan100
    10.2.1.124/32        attached             Vlan100
    10.2.1.129/32        attached             Vlan100
    10.2.1.137/32        attached             Vlan100
    10.2.1.139/32        attached             Vlan100
    10.2.1.143/32        attached             Vlan100
    10.2.1.144/32        attached             Vlan100
    10.2.1.159/32        attached             Vlan100
    10.2.1.167/32        attached             Vlan100
    10.2.1.174/32        attached             Vlan100
    10.2.1.175/32        attached             Vlan100
    10.2.1.176/32        attached             Vlan100
    10.2.1.181/32        attached             Vlan100
    10.2.4.38/32         attached             Vlan100
    10.2.4.39/32         attached             Vlan100
    10.2.4.43/32         attached             Vlan100
    10.2.4.47/32         attached             Vlan100
    10.2.4.51/32         attached             Vlan100
    10.2.4.63/32         attached             Vlan100
    10.2.4.65/32         attached             Vlan100
    10.2.4.69/32         attached             Vlan100
    10.2.4.71/32         attached             Vlan100
    10.2.4.73/32         attached             Vlan100
    10.2.4.102/32        attached             Vlan100
    10.2.4.106/32        attached             Vlan100
    10.2.4.107/32        attached             Vlan100
    10.2.4.113/32        attached             Vlan100
    10.2.4.116/32        attached             Vlan100
    10.2.4.119/32        attached             Vlan100
    10.2.4.120/32        attached             Vlan100
    10.2.4.122/32        attached             Vlan100
    10.2.4.141/32        attached             Vlan100
    10.2.4.148/32        attached             Vlan100
    10.2.6.7/32          attached             Vlan100
    Prefix               Next Hop             Interface
    10.2.6.16/32         attached             Vlan100
    10.2.6.31/32         attached             Vlan100
    10.2.7.14/32         attached             Vlan100
    10.2.7.22/32         attached             Vlan100
    10.2.7.24/32         attached             Vlan100
    10.2.7.34/32         attached             Vlan100
    10.2.7.37/32         attached             Vlan100
    10.2.7.41/32         attached             Vlan100
    10.2.7.48/32         attached             Vlan100
    10.2.8.18/32         attached             Vlan100
    10.2.8.32/32         attached             Vlan100
    10.2.8.59/32         attached             Vlan100
    10.2.8.70/32         attached             Vlan100
    10.2.8.85/32         attached             Vlan100
    10.2.8.88/32         attached             Vlan100
    10.2.8.104/32        attached             Vlan100
    10.2.8.135/32        attached             Vlan100
    10.2.99.10/32        attached             Vlan100
    10.2.99.54/32        attached             Vlan100
    10.255.255.255/32    receive              Vlan100
    127.0.0.0/8          drop
    172.31.0.0/16        attached             Vlan120
    172.31.0.0/32        receive              Vlan120
    172.31.0.1/32        receive              Vlan120
    172.31.0.5/32        attached             Vlan120
    172.31.0.29/32       attached             Vlan120
    172.31.255.255/32    receive              Vlan120
    192.1.0.0/16         10.1.1.254           Vlan100
    224.0.0.0/4          drop
    224.0.0.0/24         receive              
    Prefix               Next Hop             Interface
    240.0.0.0/4          drop
    and show ip arp 
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.1.1.1                0   aa00.0400.c286  ARPA   Vlan100
    Internet  10.1.1.6                0   0050.5689.24b8  ARPA   Vlan100
    Internet  10.1.1.10               0   0050.5694.7d20  ARPA   Vlan100
    Internet  10.1.1.11               0   0050.5694.7d20  ARPA   Vlan100
    Internet  10.1.1.12               0   0050.5694.6ae7  ARPA   Vlan100
    Internet  10.1.1.13               0   0050.5694.6ae7  ARPA   Vlan100
    Internet  10.1.1.14               0   0050.568a.6321  ARPA   Vlan100
    Internet  10.1.1.16               0   0050.5694.0ab5  ARPA   Vlan100
    Internet  10.1.1.17               0   0050.5694.493d  ARPA   Vlan100
    Internet  10.1.1.40               0   0013.19b0.9c40  ARPA   Vlan100
    Internet  10.1.1.41               0   1c17.d35a.c840  ARPA   Vlan100
    Internet  10.1.1.50               0   0002.b9b4.a5c0  ARPA   Vlan100
    Internet  10.1.1.60               0   000a.410f.e500  ARPA   Vlan100
    Internet  10.1.1.71               -   0008.e3ff.fc28  ARPA   Vlan100
    Internet  10.1.1.96               0   e02f.6d12.4df3  ARPA   Vlan100
    Internet  10.1.1.98               0   0050.5696.6d86  ARPA   Vlan100
    Internet  10.1.1.99               0   0050.5696.6d88  ARPA   Vlan100
    Internet  10.1.1.121              0   e02f.6d12.4dea  ARPA   Vlan100
    Internet  10.1.1.122              0   e02f.6d12.4e61  ARPA   Vlan100
    Internet  10.1.1.123              0   e02f.6d5b.c10e  ARPA   Vlan100
    Internet  10.1.1.124              0   e02f.6d17.c869  ARPA   Vlan100
    Internet  10.1.1.125              0   e02f.6d5b.c217  ARPA   Vlan100
    Internet  10.1.1.126              0   e02f.6d17.c8ec  ARPA   Vlan100
    Internet  10.1.1.127              0   e02f.6d17.c876  ARPA   Vlan100
    Internet  10.1.1.128              0   e02f.6d5b.bef3  ARPA   Vlan100
    Internet  10.1.1.202              0   0000.85b7.9031  ARPA   Vlan100
    Internet  10.1.1.222              0   000f.f84d.2ca9  ARPA   Vlan100
    Internet  10.1.1.225              0   000f.f84d.3963  ARPA   Vlan100
    Internet  10.1.1.227              0   00c0.ee26.9367  ARPA   Vlan100
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.1.1.250              -   0008.e3ff.fc28  ARPA   Vlan100
    Internet  10.1.1.254              0   0000.0c07.ac07  ARPA   Vlan100
    Internet  10.2.1.2                0   0011.4333.bcda  ARPA   Vlan100
    Internet  10.2.1.3                0   0050.5689.5d38  ARPA   Vlan100
    Internet  10.2.1.4                0   0050.5689.0404  ARPA   Vlan100
    Internet  10.2.1.6                0   0050.5689.6d3b  ARPA   Vlan100
    Internet  10.2.1.7                0   1cc1.def4.6940  ARPA   Vlan100
    Internet  10.2.1.8                0   0050.5689.330e  ARPA   Vlan100
    Internet  10.2.1.9                0   0012.793a.3ccc  ARPA   Vlan100
    Internet  10.2.1.10               0   0012.7990.e5d3  ARPA   Vlan100
    Internet  10.2.1.13               0   0050.568a.6dcf  ARPA   Vlan100
    Internet  10.2.1.15               0   0050.568a.60ff  ARPA   Vlan100
    Internet  10.2.1.18               0   0050.5689.091b  ARPA   Vlan100
    Internet  10.2.1.20               0   0050.5689.451c  ARPA   Vlan100
    Internet  10.2.1.21               0   0050.568a.0cf4  ARPA   Vlan100
    Internet  10.2.1.22               0   0050.5689.6c59  ARPA   Vlan100
    Internet  10.2.1.23               0   0050.5696.6d9e  ARPA   Vlan100
    Internet  10.2.1.24               0   0050.5689.76c4  ARPA   Vlan100
    Internet  10.2.1.26               0   0050.5689.2f4e  ARPA   Vlan100
    Internet  10.2.1.27               0   0050.5689.0632  ARPA   Vlan100
    Internet  10.2.1.28               0   0050.5689.1ce9  ARPA   Vlan100
    Internet  10.2.1.29               0   0050.5689.6aaa  ARPA   Vlan100
    Internet  10.2.1.31               0   0050.5689.0d1a  ARPA   Vlan100
    Internet  10.2.1.37               0   0050.5696.6d81  ARPA   Vlan100
    Internet  10.2.1.103              0   d4be.d9be.8eef  ARPA   Vlan100
    Internet  10.2.1.106              0   14fe.b5e1.c595  ARPA   Vlan100
    Internet  10.2.1.107              0   0023.ae7d.a966  ARPA   Vlan100
    Internet  10.2.1.108              0   d4be.d9c8.6770  ARPA   Vlan100
    Internet  10.2.1.109              0   14fe.b5e9.c5b5  ARPA   Vlan100
    Internet  10.2.1.110              0   14fe.b5ea.5f9d  ARPA   Vlan100
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.2.1.111              0   001e.c959.d4f0  ARPA   Vlan100
    Internet  10.2.1.114              0   b8ac.6f48.4538  ARPA   Vlan100
    Internet  10.2.1.115              0   14fe.b5e1.ed89  ARPA   Vlan100
    Internet  10.2.1.116              0   7845.c409.1959  ARPA   Vlan100
    Thanks
    Lotfi

  • Catalyst 4500 Ethernet and fibre channel passthru

    dear sir,
    anyone have any idea / documentation showing that the belows device 1.) & 2.) can support Ethernet and fibre channel passthru ? thanks.
    1.) WS-X4424-GB-RJ4 (Catalyst 4500 24-port 10/100/1000 Module (RJ45)
    2.) WS-X4306-GB (Catalyst 4500 Gigabit Ethernet Module, 6-Ports (GBIC)

    You're welcome. Check below for the module info. And there is description about support of fibre channel passthru.
    http://www.cisco.com/en/US/products/hw/switches/ps4324/products_data_sheet0900aecd802109ea.html
    You can also seach Cisco web for more info.
    Hope this helps.

  • Trunking on Nexus 5000 to Catalyst 4500

    I have 2 devices on the each end of a Point to Point.  One side has a Nexus 5000 the other end a Catalyst 4500.  We want a trunk port on both sides to allow a single VLAN for the moment.  I have not worked with Nexus before.  Could someone look at the configurations of the Ports and let me know if it looks ok?
    nexus 5000
    interface Ethernet1/17
      description
      switchport mode trunk
      switchport trunk allowed vlan 141
      spanning-tree guard root
      spanning-tree bpdufilter enable
      speed 1000
    Catalyst 4500
    interface GigabitEthernet3/39
    description
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 141
    switchport mode trunk
    speed 1000
    spanning-tree bpdufilter enable
    spanning-tree guard root

    Thanks guys, we found the issue.  The Catalyst is on my side and the Nexus is on the side of the hosting center.  The hosting center moved his connection to a different Nexus 5000 and the connection came right up.  We dropped the spanning-tree guard root. 
    It was working on the previous nexus when we set the native vlan for 141.  So we thought it was the point to point dropping the tags.
    The hosting center engineer this it might have to do with the VPC Peer-Link loop prevention on the previous Nexus. 
    Anyway it is working the way we need it to.

  • WS-X4306-GB - Catalyst 4500 6-port GBIC Module & FC Tape Libraries

    WS-X4306-GB - Catalyst 4500 6-port GBIC Module & FC Tape Libraries
    I have several Tape Autoloader Libraries from Dell which have Fibre Channel interfaces. I have loop switches that these connect to today. I also have a Catalyst 4506 with a WS-X4306-GB - 6-port GBIC Module. I would like to use the X4306 as a loop switch. Some of the libraries can also connect via point-to-point FC.
    Can this be done? If yes, how do I start in making this happen?
    Thank You.

    Sorry but the Catalyst 4500 does not support Fibre Channel connections on the WS-X4306-GB (or on any card). It's strictly an Ethernet switch. Reference
    To mix and match Ethernet and FC interfaces, you'd have to be on a new platform like the Nexus 5k series - specifically the UP (Unified Port) variants.

  • Catalyst 4500-X, VSS, and SVI

    Hello, everybody!
    I have a proyect to implement the feature VSS, with two catalyst 4500-X, it will be the layer Core/Distribution.
    So, I want integrate in the catalyst 4500X, Inter vlan routing (SVI)  and vtp domain,  in the layer access, we´ll have  SW 3750-X  with PoE.
    Is possible configure SVI  in my catalyst 4500-X.  to separate traffic across VLANs. and the routing will be in the 4500X too.  ???
    My customer does not have sufficient space to mount the serie 4500E in the Rack, so he prefer the 4500-X.
    Help me!
    Thanks!
    Regards

    Hi,
    Is possible configure SVI in my catalyst 4500-X. to separate traffic across VLANs. and the routing will be in the 4500X too. ???
    Yes, there is no different between a VSS pair and non-VSS when it comes to SVI and inter-vlan routing.  It works the same way as if the 4500-X ware separate.
    HTH

  • Catalyst 4500 ios upgrade question

    I am currently running cat4000-i9s-mz.122-25ewa6 on a catalyst 4503 supervisor II plus TS, which doesnt support SSH management. Will upgrading to one of the following do the job:
    12.2.31-SGA1 (ED)
    12.2.31-SGA (ED)
    12.2.31-SG1 (ED)
    12.2.31-SG (ED)
    12.2.25-SG1 (ED)
    12.2.25-SG (ED)
    I want to keep the same functionality but just add ssh. Also, which one should I go with, the latest 12.2.31-SGA1 (ED)? And can someone explain what the letters represent, EWA6, SG, SGA1, ED, etc. Thanks for the help.

    Hi
    Your ideal image should be cat4000-i9k91s-mz.122-25.EWA8.bin and also do ensure you have 32 mb flash and 256 mb dram. This would ensure same functionality.
    Follow the link
    http://www.cisco.com/cgi-bin/Software/Iosplanner/Planner-tool/iosresult.cgi?get_crypto=&data_from=&hardware_name=CAT4500-SUP2-PLUS-TS&software_name=BASIC%20L3%203DES%20%28RIP%2CST.ROUTERS%2CIPX%2CAT%29&release_name=12.2.25-EWA8&majorRel=12.2&state=:HW:RL:SW&type=Early%20Deployment
    But if you do want to get SG images you can use this cat4500-ipbasek9-mz.122-31.SGA1.bin but this requires higher flash 64mb and dram is still 256mb.
    The link
    http://www.cisco.com/cgi-bin/Software/Iosplanner/Planner-tool/iosresult.cgi?get_crypto=&data_from=&hardware_name=CAT4500-SUP2-PLUS-TS&software_name=IP%20BASE%20SSH&release_name=12.2.31-SGA1&majorRel=12.2&state=:HW:RL:SW&type=Early%20Deployment
    HTH
    Hoogen
    Do rate if this helps :)

Maybe you are looking for