Ce 500 non-cisco switch

How should I configure the smartport on a catalyst express 500 switch if I am connecting a non-cisco switch like a small linksys. I dont think I can make the smartport a switch because it tries to trunk?? right??
And if I leave it as a PC it complains abouting having to many devices connected to it.
Would having it configured as something like an access point work??

Now, I noticed something very odd, I kept the switch option selected on the port on the ce 500 that the linksys was plugged in to and the devices plugged in downstream behind the linksys all kept the correct VLAN assignment. Phones were in the voice vlan and PC's were in the data vlan. Does not really make sense to me how this is working??

Similar Messages

  • SIP 7960 to non-Cisco Switch

    Does anyone know if a 7960 (SIP) phone can connect to a non-Cisco switch and separate the Voice traffic from the access port traffic?
    I tried connecting a 7960 to a baystack 450T, configuring the switchport as a "tagged trunk", and then changing the Admin Vlan ID on the phone to the desired voice vlan. It looks as though the switch wants the access port traffic to be tagged as well.
    Any help would be greatly appreciated!
    Thanks,
    Darin

    Hi !
    You need to configure a 802.1q trunk on your non-cisco switch. The 802.1q native vlan should be the one the PC is in. The voice vlan will be tagged.
    Configure all parameters (like voice-vlan-id etc) on the phone manually (obviously CDP does not work). I have done it and it works fine (but i never tried on the switch you mentioned).
    Inline Power will also not work because the 7960 is not 802.3af compliant (yet).
    Mike

  • Interconnecting cisco switches with non-cisco switches

    I need help concerning interconnecting two Cisco switches (3550’s) using a non-Cisco switch or hub on the LAN. I have noticed that the two Cisco switches connected using a non-Cisco switch are able to communicate well, however a PC connected to the non-Cisco switch/hub can not ping any device on the LAN. The non-Cisco device is a working one. When the two Cisco switches are connected using a Cisco switch, PCs connected to the interconnecting switch are able to ping. What’s the explanation? Please help.

    Building configuration...
    Current configuration : 3342 bytes
    ! No configuration change since last restart
    version 12.1
    no service pad
    service timestamps debug uptime
    service timestamps log uptime
    no service password-encryption
    clock timezone GMT -2
    ip subnet-zero
    ip rcmd rcp-enable
    ip rcmd remote-username cwuser
    spanning-tree mode pvst
    spanning-tree extend system-id
    interface FastEthernet0/1
    switchport mode dynamic desirable
    interface FastEthernet0/2
    switchport mode dynamic desirable
    interface FastEthernet0/3
    switchport mode dynamic desirable
    interface FastEthernet0/4
    switchport mode dynamic desirable
    interface FastEthernet0/5
    switchport mode dynamic desirable
    interface FastEthernet0/6
    switchport mode dynamic desirable
    interface FastEthernet0/7
    switchport mode dynamic desirable
    interface FastEthernet0/8
    switchport mode dynamic desirable
    interface FastEthernet0/9
    switchport mode dynamic desirable
    interface FastEthernet0/10
    switchport mode dynamic desirable
    interface FastEthernet0/11
    switchport mode dynamic desirable
    interface FastEthernet0/12
    switchport mode dynamic desirable
    interface FastEthernet0/13
    switchport mode dynamic desirable
    interface FastEthernet0/14
    switchport mode dynamic desirable
    interface FastEthernet0/15
    switchport mode dynamic desirable
    interface FastEthernet0/16
    switchport mode dynamic desirable
    interface FastEthernet0/17
    switchport mode dynamic desirable
    interface FastEthernet0/18
    switchport mode dynamic desirable
    interface FastEthernet0/19
    switchport mode dynamic desirable
    interface FastEthernet0/20
    switchport mode dynamic desirable
    interface FastEthernet0/21
    switchport mode dynamic desirable
    interface FastEthernet0/22
    switchport mode dynamic desirable
    interface FastEthernet0/23
    switchport mode dynamic desirable
    interface FastEthernet0/24
    switchport mode dynamic desirable
    interface GigabitEthernet0/1
    switchport mode dynamic desirable
    interface GigabitEthernet0/2
    switchport mode dynamic desirable
    interface Vlan1
    ip address
    ip default-gateway
    ip classless
    ip http server
    snmp-server community
    snmp-server community
    snmp-server location
    snmp-server system-shutdown
    snmp-server enable traps snmp authentication warmstart linkdown linkup coldstart
    snmp-server enable traps config
    snmp-server enable traps entity
    snmp-server enable traps flash insertion removal
    snmp-server enable traps bridge
    snmp-server enable traps stpx
    snmp-server enable traps rtr
    snmp-server enable traps port-security
    snmp-server enable traps vtp
    snmp-server enable traps vlancreate
    snmp-server enable traps vlandelete
    snmp-server enable traps envmon fan shutdown supply temperature status
    snmp-server enable traps MAC-Notification
    snmp-server enable traps hsrp
    snmp-server enable traps cluster
    snmp-server enable traps copy-config
    snmp-server enable traps syslog
    snmp-server enable traps vlan-membership
    line con 0
    line vty 0 4
    login
    line vty 5 15
    login
    ntp clock-period 17180064
    end

  • Passing Voice VLAN through a non-Cisco switch

    Hi All,
    Will a non-Cisco switch (no 802.1q support) that is putted beetween Cisco IP Telephone and Cisco Catalyst switch (which is configured with auxilary Voice Vlan) pass voice vlan frames and CDP?

    Any switch should pass on either ISL(which is cisco properitary and hence not supported on non-Cisco) or IEEE 802.1Q frames or else it cannot support voice vlan support . And non-Cisco switches do not support CDP as it is once again Cisco proprietary protocol.

  • Non Cisco Switches

    Dear ALL,
    I am an IT Potfessional, Doing Network + . I have a questions:
    1) Do Non Cisco Switches have Access and Trunk ports. What i mean is do non cisco switches distinguish between ethernet prots as trunk and access.
    2) Do we need Cross talk cable for Connectine two non cisco switches preferably D-Link . Also How to interconnect a Cisco switch wioth non cisco switch.
    Regards
    Haseeb

    Disclaimer
    The   Author of this posting offers the information contained within this   posting without consideration and with the reader's understanding that   there's no implied or expressed suitability or fitness for any purpose.   Information provided is for informational purposes only and should not   be construed as rendering professional advice of any kind. Usage of  this  posting's information is solely at reader's own risk.
    Liability Disclaimer
    In   no event shall Author be liable for any damages whatsoever (including,   without limitation, damages for loss of use, data or profit) arising  out  of the use or inability to use the posting's information even if  Author  has been advised of the possibility of such damage.
    Posting
    As Daniel noted "decent" switches, i.e. manageable and supporting VLANs, will generally support VLAN tagging ports using the 801.2q standard.  (NB: this standard allows VLAN tagging between different vendors.)  Switches that support VLANs will distinguish between untagged (edge) ports (e.g. Cisco access) and the tagged ports (e.g. a Cisco trunk), but as Daniel also noted, their terminology might be different.
    As Leo noted, many switches offer auto MDI/MDI-X.  Surprisingly, this feature was often seen on unmanageable switches before it was seen on manageable switches.  Also on older unmanageable switches, you might find a pair of physical ports that are the same logical port, one wired MDI and other wired MDI-X or you might find some button to change one port's MDI to/from MDI-X.  Such "special" ports are often the "uplink" port.  (NB: the purpose of the "uplink" port was to allow connecting it to another switch whether you had a straight through or cross over cable.)
    If you do have a switch supporting auto MDI/MDI-X, or one with the earlier physical MDI/MDI-X options, you only need one switch, not both with such a feature, to support either a straight through or cross over cable.  Of course, both switches might have such an option, which is fine too.  Only if both switches are "hard wired", you'll need a cross over cable for a switch to switch connection.

  • Stacking a non-Cisco Switch with a Catalyst Express 500 switch

    We are using a Cisco Catalyst Express 500 Ethernet switch and need to add another switch to get a few more ports. Is is possible to stack a Catalyst Express 500 Ethernet switch with a non-Cisco Ethernet switch. If so, is there any Cisco documentation telling how to do this?

    If by stack, you mean connect the two switches via Ethernet ports, yes you should be able to do that. Depending on the port capabilities of the switches, and whether they have any special uplink ports, you might need to use a different Ethernet connecting cable (cross-over vs. straight thru).

  • ISE web auth for non-cisco switch(D-link 3528)

    Is it possible to use ISE(inline posture node) to redirect the wired users to ISE guest portal ?
    And the wired users will get full network access after they pass the web auth.

    you can use ISE ln-line posture node with 3rd part switches
    RADIUS access device must supply the following RADIUS attributes:
        Calling-Station-Id (for MAC_ADDRESS)
        User-Name
        NAS-Port-Type
        RADIUS accounting message must have the Framed-IP-Address attribute
    VLAN, DACL features can be used  but again it depends on switch models let us know  specific switch  models . Certain advanced use cases, such as those that involve posture assessment, profiling, and web authentication, are not consistently available with non-Cisco devices or may provide limited functionality,

  • WLC4402 connect to non-cisco switch?

    I have 2 WLC4402-50 connected to an Extreme Black Diamond chassis, using GLC-T. I have configured LAG on the controllers to support the number of AP's needed and I have configured the ports on the switch to use LaCP aggregation because that is what is available. Is this a supported configuration or do I just need to leave those ports as non-LaCP ports?

    just to help out anyone else using extreme, here is how I got it to work
    first I define the src-dst ip load sharing like this
    Switch#. configure sharing address-based L2_L3_CHK_SUM
    and then I configure sharing on the ports (the port number between the sharing and grouping is just the master port number for the share)
    Switch#. enable sharing 3:26 grouping 3:26, 3:56 algorithm address-based
    Switch#. enable sharing 3:28 grouping 3:28, 3:58 algorithm address-based
    and then I do the vlan config like
    Switch#. create vlan "Wireless"
    Switch#. configure vlan Wireless tag 250
    Switch#. config vlan "default" add ports 3:26, 3:28 untagged
    Switch#. config vlan "Wireless" add ports 3:26, 3:58 tag

  • Using FCoE connection to non Cisco switches

    Hello,
    does anyone know what port configuration needs to be configured on a Nexus switch that is connected to say Brocade switch or any other vendor that supports FCoE. I have created VLAN to VSAN mapping, i assume next step is to create a vfc device ? Since this is not connection to an initiator or a target but another FCoE capable switch, how do i need to configure this vfc ?  Any tips ?
    Thanks

    Hi,
    Looks like from the document that you referenced that this switch runs in NPV mode for FCoE:
    FCoE features
    Fibre Channel over Ethernet (FCoE*)
    FIP & FCoE packets are all forwarded when DCB is configured
    * FCoE frames as defined by T11 Committee
    So, I would configure the Cisco Nexus switch for FCoE and NPIV
    Configure the Nexus 5000 for FCoE and NPIV
    There are several procedures that are required in order to configure the Nexus 5000 for FCoE and NPIV:
        Enable Feature FCoE
        Enable N Port Identifier Virtualization (NPIV) on the Nexus 5000
        Enable Nexus 5000 Quality of Service (QoS) for FCoE
        Enable Link Layer Discovery Protocol (LLDP)
        Configure VLAN
        Configure VSAN
        Map the VLAN to VSAN
    Example:
    feature lldp
    feature fcoe
    feature npiv
    interface vfc130
      bind interface Ethernet1/30
      switchport mode F
      no shutdown
    interface Ethernet1/30
      switchport mode trunk
      switchport trunk allowed vlan 1,100
      spanning-tree port type edge trunk
    vsan database
      vsan 100 interface vfc130
    vlan 100
      fcoe vsan 100
    Example of QOS:
     system qos
      service-policy type qos input fcoe-default-in-policy
      service-policy type queuing input fcoe-default-in-policy
      service-policy type queuing output fcoe-default-out-policy
      service-policy type network-qos fcoe-default-nq-policy
    Best regards,
    Jim

  • Configuring Switch for CCA is behind non-Cisco phone, NAC OOB VGW Deployment

    Hi,
    I need to configure the edge switch port to keep serving non-Cisco IP phone on deploying NAC as OOB VGW.
    I appreciate your advise, but make sure 802.1x solution as the last option.
    Thanks
    Mike

    Hi,
    Please look at the config guide:
    http://www.cisco.com/en/US/docs/security/nac/appliance/configuration_guide/48/cam/m_oob.html.
    HTH,
    Tiago
    If  this helps you and/or answers your question please mark the question as  "answered" and/or rate it, so other users can easily find it.

  • Does Supervisor Engine 6L-E compatible with Cisco Ws-C4506 Non-E switch?

    Does Supervisor Engine 6L-E compatible with Cisco Ws-C4506 Non-E switch?

    Yes, it is compatible with non-e chassis.
    see below:
    The Cisco Catalyst 4500 Supervisor Engine 6L-E is also compatible with classic Cisco Catalyst 4500 line cards, chassis (3-, 6-, and 7-slot), and power supplies, providing full investment protection.
    link to data sheet:
    http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-4500-series-switches/data_sheet_c78-530856.html
    HTH

  • Any one ever worked on 6500 series Cisco switches QOS or 6503 or 6524 QOS(Urgent help needed)

    Hi All,
    I am having issue specifally doing QOS configuration on 6503 or 6524 or 6509 switches. I am unable to match any EF(voice) traffic for eompls(vlan based) on 6503 cisco switch. If i use any other router as 2811 or 2821 my QOS configuration works perfect but if i put 6503 as PE2 it does not work.i am using vlan based eompls.
    Below is the scenario & configuration which i am having issue.
    CE1(2821 router)(dot1Q)--------->PE1(2821 router)------->P(6524 switch)-------->PE2(6503 switch)------->(dot1Q)(2821 switch)CE2.
    On CE1 i can match ip-precedence 5 traffic and mark that traffic to cos5 on outbound port.On PE1 i can match cos5 packet and mark with mpls exp top5 on inbound port, on outbound port i can match mpls exp 5. 
    On PE2(6503) i am unable to match that mpls exp5 packet on inbound port. none of the configuration worked on 6500 series switches with mls qos, ,mls qos trust dscp,mls qos trust cos etc. Although i can match cos5 traffic on CE2 on inbound interface.i can not match mpls exp 5 traffic on 6503 and all i can see traffic as default-class on 6503 switch. I tried many things and many configurations on 6503 but nothing worked.If i put 2821 router as PE2 instead of 6503 my qos configuration works. but why if i put 6503 my same qos configuration does not work? 
    ---match means=classification or classify
    Can anyone tell me how qos works on 6500 series switches or where i am having issue in my scenario.
    i am using this ios on 6503: s72033-advipservicesk9_wan-mz.122-33.SXI3.bin.
    below r my questions for 6503 qos:
    1.do i need to use some other map tables,am i  using correct map tables on 6503 as cos-dscp,dscp-cos,exp-dscp etc.
    2.any other configutaion of qos needed on 6503?
    3.i am unable to match anything on outbound port of 6503.
    4.on 6503 i am using sup720 and PFC3BXL.any specific configuration needed for PFC3bxl.
    5. 6503 not allowing me to match qos-group on inbound interface, not allowing me to set cos5 on outbound interface. not allowing me to set cos5 as an inbound interface.
    CE1(2821) config:
    class-map match-any EF
     match ip precedence 5
    class-map match-any data
     match ip precedence 3
    policy-map ip2mpls
     class EF
      set cos 5
     class data
      set cos 3
    interface FastEthernet0/0
     no ip address
     duplex auto
     speed auto
    interface FastEthernet0/0.455
     encapsulation dot1Q 455
     ip address 172.16.15.1 255.255.255.252
     service-policy output EF
    PE1(2821) config:
    mls qos map cos-dscp 0 8 16 24 32 40 48 56
    class-map match-all exp_3
     match mpls experimental topmost 3
    class-map match-all mpls_exp
     match mpls experimental topmost 5
    class-map match-any cos3
     match cos  3
    class-map match-any LOO1
     match cos  5
    policy-map EF
     class LOO1
      set mpls experimental imposition 5
     class cos3
      set mpls experimental imposition 3
    policy-map QOS_G_5
     class mpls_exp
      priority
     class exp_3
      bandwidth 500
    interface Loopback0
     ip address 3.3.3.3 255.255.255.255
    interface FastEthernet0/0
     ip address 192.168.23.2 255.255.255.0
     ip ospf network point-to-point
     duplex auto
     speed auto
     mpls ip
     service-policy output QOS_G_5
    interface FastEthernet0/1.455
     encapsulation dot1Q 455
     xconnect 5.5.5.5 455 encapsulation mpls
     service-policy input EF
    PE2(6503 qos):
    R1#show module
    Mod Ports Card Type                              Model              Serial No.
      1    4  CEF720 4 port 10-Gigabit Ethernet      WS-X6704-10GE      SAL09401U2L
      2   48  CEF720 48 port 10/100/1000mb Ethernet  WS-X6748-GE-TX     SAL114247YN
      3   16  16 port 1000mb GBIC ethernet           WS-X6416-GBIC      SAL0712AM69
      4   24  CEF720 24 port 1000mb SFP              WS-X6724-SFP       SAL10019J4N
      5    2  Supervisor Engine 720 (Hot)            WS-SUP720-3BXL     SAD102805VM
      6    2  Supervisor Engine 720 (Active)         WS-SUP720-BASE     SAD0846060F
    Mod  Sub-Module                  Model              Serial       Hw     Status
      1  Distributed Forwarding Card WS-F6700-DFC3BXL   SAD102504EF  5.3    Ok
      2  Centralized Forwarding Card WS-F6700-CFC       SAD111300PD  3.1    Ok
      4  Centralized Forwarding Card WS-F6700-CFC       SAL1004BQ2A  2.0    Ok
      5  Policy Feature Card 3       WS-F6K-PFC3BXL     SAD10270189  1.8    Ok
      5  MSFC3 Daughterboard         WS-SUP720          SAD102801G5  2.5    Ok
      6  Policy Feature Card 3       WS-F6K-PFC3BXL     SAL1415FE95  1.11   Ok
      6  MSFC3 Daughterboard         WS-SUP720          SAD08440794  2.4    Ok
    R1#show mls qos maps
       Normal Burst Policed-dscp map:                                  (dscp= d1d2)
         d1 :  d2 0  1  2  3  4  5  6  7  8  9
          0 :    01 01 02 03 04 05 06 07 08 09
          1 :    10 11 12 13 14 15 16 17 18 19
          2 :    20 21 22 23 24 25 26 27 28 29
          3 :    30 31 32 33 34 35 36 37 38 39
          4 :    40 41 42 43 44 45 01 47 48 49
          5 :    50 51 52 53 54 55 56 57 58 59
          6 :    60 61 62 63
       Maximum Burst Policed-dscp map:                                  (dscp= d1d2)
         d1 :  d2 0  1  2  3  4  5  6  7  8  9
          0 :    00 01 02 03 04 05 06 07 08 09
          1 :    10 11 12 13 14 15 16 17 18 19
          2 :    20 21 22 23 24 25 26 27 28 29
          3 :    30 31 32 33 34 35 36 37 38 39
          4 :    40 41 42 43 44 45 46 47 48 49
          5 :    50 51 52 53 54 55 56 57 58 59
          6 :    60 61 62 63
       Dscp-cos map:                                  (dscp= d1d2)
         d1 :  d2 0  1  2  3  4  5  6  7  8  9
          0 :    00 00 00 00 00 00 00 00 01 01
          1 :    01 01 01 01 01 01 02 02 02 02
          2 :    02 02 02 02 03 03 03 03 03 03
          3 :    03 03 04 04 04 04 04 04 04 04
          4 :    05 05 05 05 05 05 05 05 06 06
          5 :    06 06 06 06 06 06 07 07 07 07
          6 :    07 07 07 07
       Dscp-exp map:                                  (dscp= d1d2)
         d1 :  d2 0  1  2  3  4  5  6  7  8  9
          0 :    00 00 00 00 00 00 00 00 01 01
          1 :    01 01 01 01 01 01 02 02 02 02
          2 :    02 02 02 02 03 03 03 03 03 03
          3 :    03 03 04 04 04 04 04 04 04 04
          4 :    05 05 05 05 05 05 05 05 06 06
          5 :    06 06 06 06 06 06 07 07 07 07
          6 :    07 07 07 07
    Cos-dscp map:
             cos:   0  1  2  3  4  5  6  7
            dscp:   0 10 18 24 34 46 48 56
       IpPrecedence-dscp map:
          ipprec:   0  1  2  3  4  5  6  7
            dscp:   0  8 16 24 32 40 48 56
       Exp-dscp map:
             exp:   0  1  2  3  4  5  6  7
            dscp:   0  8 16 24 32 40 48 56
    mls netflow interface
    mls qos map cos-dscp 0 10 18 24 34 46 48 56
    mls qos
    class-map match-all exp_3
     match mpls experimental topmost 3
    class-map match-all EXP_5
     match mpls experimental topmost 5
    class-map match-all QOS_GROUP_5
     match qos-group 5
    class-map match-all prec5
     match ip precedence 5
    class-map match-all cos5
     match cos  5
    policy-map mpls2ip
    class QOS_GROUP_5
     set cos 5
    policy-map IN_FROM_R3
     class EXP_5
      set qos-group 5
    interface Loopback0
     ip address 5.5.5.5 255.255.255.255
    interface GigabitEthernet2/2
     mls qos trust cos 
    or <------------ (tried both individually but none worked)
     mls qos trust dscp
    interface GigabitEthernet2/2.455
     encapsulation dot1Q 455
     xconnect 3.3.3.3 455 encapsulation mpls
     service-policy output mpls2ip
    interface GigabitEthernet2/1
     ip address 192.168.34.4 255.255.255.0
     ip ospf network point-to-point
     mls qos trust cos 
    or <------------ (tried both individually but none worked)
     mls qos trust dscp
     mpls ip
     service-policy input IN_FROM_R4
    Thanks & regards,
    Ahsan Rasheed

    Hi All,.
    I am still having issue on 6503 or 6524 Cisco Switch. 
    " Can any one give me any sample of 6524 or 6503 QOS working configuration, i would be really thankful "
    As i have mentioned in my prevoius post of configuration of 6503. I am unable to match mpls exp 5 packet on 6503. My qos configuration on PE1(2811 router) is working perfectly. I am unable to classify mpls ex5 or mpls exp3 on 6503 switch. Am i missing something on configuration?
    PE2 config:"6503 switch"
    class-map match-all mpls_exp
     match mpls experimental topmost 5
    policy-map EF
    class mpls_exp
    R!#mls qos
    int Gi2/4
    service-policy input EF
    mls qos trust cos
        dscp:   0 10 18 24 34 46 48 56
       Exp-dscp map:
             exp:   0  1  2  3  4  5  6  7
            dscp:   0 10 18 24 34 46 48 56
    Thanks,
    Ahsan Rasheed

  • Using 802.1X and non-Cisco IP Phones

    Hi there,
    Having some questions about an 802.1x/non-Cisco ip phone setup and was hoping to find some answers/user-experience with this setup.
    Main questions i'm facing:
    1) When using non-Cisco ip phones (eg Nortel or Siemens) and a previous authorized client connected behind this ip phone gets disconnected. What will this action do with the authorized state of 802.1X on the switch port? WIll it stay authorized until the reauth timer expires or does it reject communication from any other device?
    2) What about EAPOL-Logoff messages from the ip phone to the switch. Are these only used by Cisco phones when they experience a link-status change on data ports?
    Thanks for sharing your thoughts

    Overall, you need to try and deal with the fact that a machine can disappear from the network and the network may not know about it directly (i.e. Link doesn't go down).
    I have no idea what other phones do, but Cisco phones send an EAPOL-Logoff when something is unplugged. This lets the switch know directly, and 1X session start is torn down immediately, closing what would be a security hole.
    Fundamentally, re-auth is a workaround only, and this is not the reason to enable re-auth to begin with.
    If your phone doesn't send an EAPOL-Logoff in this case, the switch might be left thinking an attack is underway when someone else tries to plug in (with presumably a different MAC). You do NOT want this to occur.
    Hope this helps,

  • MARS topology in non-Cisco environment

    In a heterogeneous, non-Cisco environment (e.g. Dell switches, Sidewinder firewall), is it possible to obtain accurate topology/visualization information? If so, how is this accomplished? Any other best-practices/gotchas for getting the most out of MARS in such environment would be helpful as well. Thank you.

    We don't really have any topology information in MARS, and for the most part don't pay much attention to the topology or attack graphs/charts. Don't even use the summary page. We don't use the MARS for anything but collecting events. Maybe I don't know what I'm missing, but we get along just fine without(we even have a mostly Cisco network).

  • WLC in a non-Cisco network

    I'm planning to use a Cisco WLC 5508 in a non-Cisco core network (switch and routers) and I'm wondering about the problems I can have.
    For the moment, I can only think that I can't have CDP (Cisco Discovery Protocol) in the new core network (access switchs are cisco).
    So, do you need CDP to run a Cisco Controller Based WLAN?
    Maybe for Rogue Switchport tracing? Anything else?
    Can I use a WLC connected to a non-Cisco core network?
    More trouble?
    Thanks

    Cisco wlc's do not use LACP, LAG is non-negotiated, just on. 5508 also require 1g ports, it will not connect to anything less than this.
    http://www.cisco.com/en/US/partner/docs/wireless/controller/7.0MR1/configuration/guide/cg_ports_interfaces.html#wp1182892
    As for LWAPP/CAPWAP, you will need to make sure that if yo uare going through a firewall that UDP ports 12222/12223 for LWAPP and UDP port 5246/5247 are not blocked. You can use option43 on your DHCP server for the APs to find the controller.
    http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a00808714fe.shtml
    OR
    DNS discovery—The access point can discover  controllers through your domain name server (DNS). For the access point  to do so, you must configure your DNS to return controller IP addresses  in response to CISCO-LWAPP-CONTROLLER.localdomain or CISCO-CAPWAP-CONTROLLER.localdomain, where localdomain
    is the access point domain name. When an access point receives an IP  address and DNS information from a DHCP server, it contacts the DNS to  resolve CISCO-LWAPP-CONTROLLER.localdomain or CISCO-CAPWAP-CONTROLLER.localdomain

Maybe you are looking for

  • Illustrator CS 2 activation

    hello I have an Adobe Illustrator CS 2 software installed on a windows XP machine. As I need to transfer the licence on a windows 7 machine. I tried to unistall it from the Xp machine deactivating it. I'm not able to deactivate it. I read that activa

  • SD/MM Query

    Hi all, Greeting all. Apparently, I'm searching a clue (perhaps a way) to accomplish the following: I have a third party system, which will create PO (Purchase Order) and SO (Sales Order), will pass the said PO/SO to SAP system via abap interface pro

  • Attch a PDF to an email

    The email message I want to sent witha PDF attchment will only put the attchment at the end of the e-mail message. How do I change this to send as windows friendly which is grayed out

  • Installing Leapord ask for a password??

    Im installing Leapord on an iMac G5. at a pint during install it askes for a password and the original password on the mac does not work. any solutions? thanks

  • KTML Lite 4.1.0

    I saw some older threads, where people wanted a download of this discontinued product. I've uploaded a zip (windoze, sorry!) of it here: [Link removed by forum host] Hope that helps somebody