Configuring VSS on Catalyst 4500 Supervisor 8-E

I am trying to configure VSS between two Catalyst 4510R+E chassis that are equipped with dual Supervisor 8e blades, all running enterprise services licenses. I have configured SSO and NSF on both chassis, but when I get to the step to configure the virtual switch domain, I'm unable to proceed any further. I'm only able to get the following output:
Switch(config)#switch virtual ?
% Unrecognized command
According to the VSS setup documentation, I should be able to input switch virtual domain <#> at this point to configure the virtual domain for VSS.
I'm guessing that the problem is the IOS version that the supervisor engines are running, which is 3.3.0XO. I know on the Supervisor 7-E blades, IOS version 3.4.0SG or higher is required to run VSS.
Can anyone confirm whether or not 3.3.0XO supports VSS? Cisco's data sheet states that the 8-E supports VSS, but the release notes are rather vague:
http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_29983-01.html
If 3.3.0XO does not support VSS, can anyone confirm whether or not 3.4.0SG is supported on the Supervisor 8-E?

IOS-XE 3.6.0 does support VSS on Sup8 - Please make sure to upgrade the rom before attempting to upgrade the sup.
 ROM version = 15.1(1r)SG4
 HTH
Luke

Similar Messages

  • Upgrade Catalyst 4500 Supervisor Engine 8-E(IOS XE Software)

    Folks,
    We are looking to upgrade the Catalyst 4500 Supervisor Engine 8-E(IOS XE Software). As of now we are running on 3.3.1XO and as per the Cisco notes version 3.3.2XO which is suggested version.
    I would like to find some comparison documents on both these version and establish if there is a need to do the upgrade. What are the fixes that have been done in this version.
    Thanks,!!

    Hi Nikhil,
    Please find release notes of version 3.3.2XO below which can provide you the details to upgrade.
    Mainly you need to refer the features it supports and resolved cavets (which means the bugs resolved fro the earlier version on to this.).
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_29983-01.html
    HTH
    Regards
    Inayath
    *Plz rate if this info is helpfull.

  • Catalyst 4006 chassis with CATALYST 4500 SUPERVISOR V

    Hi Experts,
    Can I use CATALYST 4500 SUPERVISOR V(WS-X4516) in an old 6-slot catalyst 4006 chassis( WS-C4006). I want to run the latest IOS available and I have the following line cards:
    WS-X4232-RJ-XX
    WS-X4418-GB
    WS-X4148-RJ
    thanks and regards
    alex

    Hi Alex
    Yes you can run the Sup V in the 4006 chassis. See this link
    http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/module/guide/01overvw.html#wp1015031
    The Sup V also supports the WS-X4418-GB and WS-X4148-RJ modules - see attached link
    http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps4324/product_data_sheet09186a00801fcaba_ps2797_Products_Data_Sheet.html
    HTH
    Jon

  • Catalyst 4500, supervisor II+, EIGRP

    Hi,
    We're bought a catalyst 4500 sup II+ with image cat4000-i9s-mz.122-25.EWA4.bin
    In feature navigator isn't anything about EIGRP in this image, but in CLI I may configure EIGRP.
    How is that possible?
    thx

    Hi,
    You can only configure the EIGRP stub on the Sup 2+. EIGRP fully is not supported on sup2+.
    http://www.cisco.com/univercd/cc/td/doc/product/lan/cat4000/12_2_31s/conf/l3_int.htm#wp1042868
    http://www.cisco.com/en/US/products/hw/switches/ps4324/products_data_sheet09186a0080197424.html
    HTH, Please rate if it does.
    -amit singh

  • SFP-10G-ZR support on Catalyst 4500 SUP6E

    Hello,
    is the SFP-10G-ZR supported on the SUP6-E with the OneX converter?
    BR
    O.G

    End-of-Sale and End-of-Life Announcement for the Cisco Catalyst 4500 Supervisor Engine 6-E
    The chances of your SE submitting the PER is now ZERO.  You'll be forced to upgrade to Sup7E.

  • IDS/IPS functionality in Catalyst 4500 ?

    Hi,
    is there an IDS/IPS functionality in Catalyst 4500 (Supervisor 6-e), or do we need to propose external IDS/IPS device?

    I think cat 4500 sup 6-e does not have IDS/IPS functionality. You have to externally install it.
    http://www.cisco.com/en/US/prod/collateral/modules/ps2797/ps9294/product_data_sheet0900aecd806df543_ps4324_Products_Data_Sheet.html

  • Catalyst 4500-X, VSS, and SVI

    Hello, everybody!
    I have a proyect to implement the feature VSS, with two catalyst 4500-X, it will be the layer Core/Distribution.
    So, I want integrate in the catalyst 4500X, Inter vlan routing (SVI)  and vtp domain,  in the layer access, we´ll have  SW 3750-X  with PoE.
    Is possible configure SVI  in my catalyst 4500-X.  to separate traffic across VLANs. and the routing will be in the 4500X too.  ???
    My customer does not have sufficient space to mount the serie 4500E in the Rack, so he prefer the 4500-X.
    Help me!
    Thanks!
    Regards

    Hi,
    Is possible configure SVI in my catalyst 4500-X. to separate traffic across VLANs. and the routing will be in the 4500X too. ???
    Yes, there is no different between a VSS pair and non-VSS when it comes to SVI and inter-vlan routing.  It works the same way as if the 4500-X ware separate.
    HTH

  • High CPU with error "%ADJ-3-RESOLVE_REQ:" in Catalyst 4500-X VSS after making L3 function (static routing)

    We have a VSS based on 2x WS-C4500X-16., The VSS is used as Layer 2 Switch for diffrents Vlan in our DC.
    After making the VSS as a Layer 3 gateway for our production VLAN and added 2 routes for routing purposes, we encountered a network down time with high CPU in the VSS and  a huges log messages : 
    .May 14 12:11:25.947: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.22 Vlan100
    .May 14 12:11:34.516: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.22 Vlan100
    .May 14 12:11:40.072: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:11:49.682: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:11:55.079: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:12:00.926: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:06.701: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.8.32 Vlan100
    .May 14 12:12:12.624: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:21.627: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.7.40 Vlan100
    .May 14 12:12:32.261: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.8.32 Vlan100
    .May 14 12:12:41.801: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.2.105 Vlan100
    .May 14 12:12:49.633: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:12:54.831: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:12:59.960: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.1.1.254 Vlan100
    .May 14 12:13:08.745: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:16.138: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:22.393: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    .May 14 12:13:31.415: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.141 Vlan100
    .May 14 12:13:38.944: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.2.215 Vlan100
    .May 14 12:13:45.972: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.253 Vlan100
    Bellow are the show version of our VSS, 
    Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Software (cat4500e-UNIVERSALK9-M), Version 03.04.00.SG RELEASE SOFTWARE (fc3)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2012 by Cisco Systems, Inc.
    Compiled Wed 05-Dec-12 04:38 by prod_rel_team
    ROM: 15.0(1r)SG10
    S_C4500X_01 uptime is 33 weeks, 1 day, 14 minutes
    Uptime for this control processor is 33 weeks, 1 day, 16 minutes
    System returned to ROM by power-on
    System restarted at 11:59:10 UTC Tue Sep 24 2013
    Running default software
    Jawa Revision 2, Winter Revision 0x0.0x40
    Last reload reason: power-on
    License Information for 'WS-C4500X-16'
        License Level: ipbase   Type: Permanent
        Next reboot license Level: ipbase
    cisco WS-C4500X-16 (MPC8572) processor (revision 9) with 4194304K/20480K bytes of memory.
    Processor board ID JAE173303CF
    MPC8572 CPU at 1.5GHz, Cisco Catalyst 4500X
    Last reset from PowerUp
    4 Virtual Ethernet interfaces
    32 Ten Gigabit Ethernet interfaces
    511K bytes of non-volatile configuration memory.
    Configuration register is 0x2101
    Can you help please, 

    Hi,
    thanks for your reply, but there is no hsrp configured, just an interface vlan. with 2 static routes and the problem was there for more than an hour before we decided to rollback.
    Is there a BugId with this problem in Cisco DataBase.
    here is a show ip route 
    S_C4500X_01#      show ip route
    Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP
           D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area 
           N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
           E1 - OSPF external type 1, E2 - OSPF external type 2
           i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
           ia - IS-IS inter area, * - candidate default, U - per-user static route
           o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
           + - replicated route, % - next hop override
    Gateway of last resort is 10.2.1.253 to network 0.0.0.0
    S*    0.0.0.0/0 [1/0] via 10.2.1.253
          10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
    C        10.0.0.0/8 is directly connected, Vlan100
    L        10.1.1.250/32 is directly connected, Vlan100
          172.31.0.0/16 is variably subnetted, 2 subnets, 2 masks
    C        172.31.0.0/16 is directly connected, Vlan120
    L        172.31.0.1/32 is directly connected, Vlan120
    S     192.1.0.0/16 [1/0] via 10.1.1.254
    and the show ip cef: 
    _C4500X_01#        show ip cef 
    .May 14 12:13:57.859: %ADJ-3-RESOLVE_REQ: Adj resolve request: Failed to resolve 10.2.1.158 Vlan100 f
    Prefix               Next Hop             Interface
    0.0.0.0/0            10.2.1.253           Vlan100
    0.0.0.0/8            drop
    0.0.0.0/32           receive              
    10.0.0.0/8           attached             Vlan100
    10.0.0.0/32          receive              Vlan100
    10.1.1.6/32          attached             Vlan100
    10.1.1.17/32         attached             Vlan100
    10.1.1.40/32         attached             Vlan100
    10.1.1.41/32         attached             Vlan100
    10.1.1.50/32         attached             Vlan100
    10.1.1.60/32         attached             Vlan100
    10.1.1.99/32         attached             Vlan100
    10.1.1.121/32        attached             Vlan100
    10.1.1.122/32        attached             Vlan100
    10.1.1.124/32        attached             Vlan100
    10.1.1.125/32        attached             Vlan100
    10.1.1.126/32        attached             Vlan100
    10.1.1.225/32        attached             Vlan100
    10.1.1.227/32        attached             Vlan100
    10.1.1.250/32        receive              Vlan100
    10.1.1.254/32        10.1.1.254           Vlan100
    10.2.1.3/32          attached             Vlan100
    10.2.1.4/32          attached             Vlan100
    10.2.1.6/32          attached             Vlan100
    10.2.1.8/32          attached             Vlan100
    10.2.1.9/32          attached             Vlan100
    10.2.1.18/32         attached             Vlan100
    10.2.1.23/32         attached             Vlan100
    10.2.1.24/32         attached             Vlan100
    Prefix               Next Hop             Interface
    10.2.1.26/32         attached             Vlan100
    10.2.1.28/32         attached             Vlan100
    10.2.1.29/32         attached             Vlan100
    10.2.1.31/32         attached             Vlan100
    10.2.1.103/32        attached             Vlan100
    10.2.1.108/32        attached             Vlan100
    10.2.1.109/32        attached             Vlan100
    10.2.1.124/32        attached             Vlan100
    10.2.1.129/32        attached             Vlan100
    10.2.1.137/32        attached             Vlan100
    10.2.1.139/32        attached             Vlan100
    10.2.1.143/32        attached             Vlan100
    10.2.1.144/32        attached             Vlan100
    10.2.1.159/32        attached             Vlan100
    10.2.1.167/32        attached             Vlan100
    10.2.1.174/32        attached             Vlan100
    10.2.1.175/32        attached             Vlan100
    10.2.1.176/32        attached             Vlan100
    10.2.1.181/32        attached             Vlan100
    10.2.4.38/32         attached             Vlan100
    10.2.4.39/32         attached             Vlan100
    10.2.4.43/32         attached             Vlan100
    10.2.4.47/32         attached             Vlan100
    10.2.4.51/32         attached             Vlan100
    10.2.4.63/32         attached             Vlan100
    10.2.4.65/32         attached             Vlan100
    10.2.4.69/32         attached             Vlan100
    10.2.4.71/32         attached             Vlan100
    10.2.4.73/32         attached             Vlan100
    10.2.4.102/32        attached             Vlan100
    10.2.4.106/32        attached             Vlan100
    10.2.4.107/32        attached             Vlan100
    10.2.4.113/32        attached             Vlan100
    10.2.4.116/32        attached             Vlan100
    10.2.4.119/32        attached             Vlan100
    10.2.4.120/32        attached             Vlan100
    10.2.4.122/32        attached             Vlan100
    10.2.4.141/32        attached             Vlan100
    10.2.4.148/32        attached             Vlan100
    10.2.6.7/32          attached             Vlan100
    Prefix               Next Hop             Interface
    10.2.6.16/32         attached             Vlan100
    10.2.6.31/32         attached             Vlan100
    10.2.7.14/32         attached             Vlan100
    10.2.7.22/32         attached             Vlan100
    10.2.7.24/32         attached             Vlan100
    10.2.7.34/32         attached             Vlan100
    10.2.7.37/32         attached             Vlan100
    10.2.7.41/32         attached             Vlan100
    10.2.7.48/32         attached             Vlan100
    10.2.8.18/32         attached             Vlan100
    10.2.8.32/32         attached             Vlan100
    10.2.8.59/32         attached             Vlan100
    10.2.8.70/32         attached             Vlan100
    10.2.8.85/32         attached             Vlan100
    10.2.8.88/32         attached             Vlan100
    10.2.8.104/32        attached             Vlan100
    10.2.8.135/32        attached             Vlan100
    10.2.99.10/32        attached             Vlan100
    10.2.99.54/32        attached             Vlan100
    10.255.255.255/32    receive              Vlan100
    127.0.0.0/8          drop
    172.31.0.0/16        attached             Vlan120
    172.31.0.0/32        receive              Vlan120
    172.31.0.1/32        receive              Vlan120
    172.31.0.5/32        attached             Vlan120
    172.31.0.29/32       attached             Vlan120
    172.31.255.255/32    receive              Vlan120
    192.1.0.0/16         10.1.1.254           Vlan100
    224.0.0.0/4          drop
    224.0.0.0/24         receive              
    Prefix               Next Hop             Interface
    240.0.0.0/4          drop
    and show ip arp 
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.1.1.1                0   aa00.0400.c286  ARPA   Vlan100
    Internet  10.1.1.6                0   0050.5689.24b8  ARPA   Vlan100
    Internet  10.1.1.10               0   0050.5694.7d20  ARPA   Vlan100
    Internet  10.1.1.11               0   0050.5694.7d20  ARPA   Vlan100
    Internet  10.1.1.12               0   0050.5694.6ae7  ARPA   Vlan100
    Internet  10.1.1.13               0   0050.5694.6ae7  ARPA   Vlan100
    Internet  10.1.1.14               0   0050.568a.6321  ARPA   Vlan100
    Internet  10.1.1.16               0   0050.5694.0ab5  ARPA   Vlan100
    Internet  10.1.1.17               0   0050.5694.493d  ARPA   Vlan100
    Internet  10.1.1.40               0   0013.19b0.9c40  ARPA   Vlan100
    Internet  10.1.1.41               0   1c17.d35a.c840  ARPA   Vlan100
    Internet  10.1.1.50               0   0002.b9b4.a5c0  ARPA   Vlan100
    Internet  10.1.1.60               0   000a.410f.e500  ARPA   Vlan100
    Internet  10.1.1.71               -   0008.e3ff.fc28  ARPA   Vlan100
    Internet  10.1.1.96               0   e02f.6d12.4df3  ARPA   Vlan100
    Internet  10.1.1.98               0   0050.5696.6d86  ARPA   Vlan100
    Internet  10.1.1.99               0   0050.5696.6d88  ARPA   Vlan100
    Internet  10.1.1.121              0   e02f.6d12.4dea  ARPA   Vlan100
    Internet  10.1.1.122              0   e02f.6d12.4e61  ARPA   Vlan100
    Internet  10.1.1.123              0   e02f.6d5b.c10e  ARPA   Vlan100
    Internet  10.1.1.124              0   e02f.6d17.c869  ARPA   Vlan100
    Internet  10.1.1.125              0   e02f.6d5b.c217  ARPA   Vlan100
    Internet  10.1.1.126              0   e02f.6d17.c8ec  ARPA   Vlan100
    Internet  10.1.1.127              0   e02f.6d17.c876  ARPA   Vlan100
    Internet  10.1.1.128              0   e02f.6d5b.bef3  ARPA   Vlan100
    Internet  10.1.1.202              0   0000.85b7.9031  ARPA   Vlan100
    Internet  10.1.1.222              0   000f.f84d.2ca9  ARPA   Vlan100
    Internet  10.1.1.225              0   000f.f84d.3963  ARPA   Vlan100
    Internet  10.1.1.227              0   00c0.ee26.9367  ARPA   Vlan100
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.1.1.250              -   0008.e3ff.fc28  ARPA   Vlan100
    Internet  10.1.1.254              0   0000.0c07.ac07  ARPA   Vlan100
    Internet  10.2.1.2                0   0011.4333.bcda  ARPA   Vlan100
    Internet  10.2.1.3                0   0050.5689.5d38  ARPA   Vlan100
    Internet  10.2.1.4                0   0050.5689.0404  ARPA   Vlan100
    Internet  10.2.1.6                0   0050.5689.6d3b  ARPA   Vlan100
    Internet  10.2.1.7                0   1cc1.def4.6940  ARPA   Vlan100
    Internet  10.2.1.8                0   0050.5689.330e  ARPA   Vlan100
    Internet  10.2.1.9                0   0012.793a.3ccc  ARPA   Vlan100
    Internet  10.2.1.10               0   0012.7990.e5d3  ARPA   Vlan100
    Internet  10.2.1.13               0   0050.568a.6dcf  ARPA   Vlan100
    Internet  10.2.1.15               0   0050.568a.60ff  ARPA   Vlan100
    Internet  10.2.1.18               0   0050.5689.091b  ARPA   Vlan100
    Internet  10.2.1.20               0   0050.5689.451c  ARPA   Vlan100
    Internet  10.2.1.21               0   0050.568a.0cf4  ARPA   Vlan100
    Internet  10.2.1.22               0   0050.5689.6c59  ARPA   Vlan100
    Internet  10.2.1.23               0   0050.5696.6d9e  ARPA   Vlan100
    Internet  10.2.1.24               0   0050.5689.76c4  ARPA   Vlan100
    Internet  10.2.1.26               0   0050.5689.2f4e  ARPA   Vlan100
    Internet  10.2.1.27               0   0050.5689.0632  ARPA   Vlan100
    Internet  10.2.1.28               0   0050.5689.1ce9  ARPA   Vlan100
    Internet  10.2.1.29               0   0050.5689.6aaa  ARPA   Vlan100
    Internet  10.2.1.31               0   0050.5689.0d1a  ARPA   Vlan100
    Internet  10.2.1.37               0   0050.5696.6d81  ARPA   Vlan100
    Internet  10.2.1.103              0   d4be.d9be.8eef  ARPA   Vlan100
    Internet  10.2.1.106              0   14fe.b5e1.c595  ARPA   Vlan100
    Internet  10.2.1.107              0   0023.ae7d.a966  ARPA   Vlan100
    Internet  10.2.1.108              0   d4be.d9c8.6770  ARPA   Vlan100
    Internet  10.2.1.109              0   14fe.b5e9.c5b5  ARPA   Vlan100
    Internet  10.2.1.110              0   14fe.b5ea.5f9d  ARPA   Vlan100
    Protocol  Address          Age (min)  Hardware Addr   Type   Interface
    Internet  10.2.1.111              0   001e.c959.d4f0  ARPA   Vlan100
    Internet  10.2.1.114              0   b8ac.6f48.4538  ARPA   Vlan100
    Internet  10.2.1.115              0   14fe.b5e1.ed89  ARPA   Vlan100
    Internet  10.2.1.116              0   7845.c409.1959  ARPA   Vlan100
    Thanks
    Lotfi

  • Subinterfaces - hardware limitation on catalyst 4500-X

    Hi there,
    We are currently building a VSS and our design has L3 subinterfaces however we have hit a major wall while trying to do the following
             Create physical subinterface on VSS switch – Fail
             Create port-channel subinterface on VSS switch – Fail
             Create physical subinterface on standalone switch – Fail
             Create port-channel subinterface on standalone switch – Fail
    Below is the output showing that the option of a subinterfaces seems to be available, but it still doesn’t apply
    Enter configuration commands, one per line.  End with CNTL/Z.
    Switch(config)#int po1
    Switch(config-if)#no swi
    Switch(config-if)#no switchport
    Switch(config-if)#int po1.1
                          ^
    % Invalid input detected at '^' marker.
    Switch(config)#int po
    Switch(config)#int port-channel 1.?
      <0-4294967295>  Port-channel interface number
    Switch(config)#int port-channel 1.1
                       ^
    % Invalid input detected at '^' marker.
    Switch(config)#int tenGigabitEthernet 1/1
    Switch(config-if)#no swi
    Switch(config-if)#no switchport
    Switch(config-if)#exit
    Switch(config)#int tenGigabitEthernet 1/1.?
      <0-4294967295>  TenGigabitEthernet interface number
    Switch(config)#int tenGigabitEthernet 1/1.1
                        ^
    % Invalid input detected at '^' marker.
    Switch(config)#
    Here’s the show ver and show module output
    Switch#show ver
    Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch  Software (cat4500e-UNIVERSALK9-M), Version 03.07.00.E RELEASE SOFTWARE (fc4)
    Technical Support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2014 by Cisco Systems, Inc.
    Compiled Sun 07-Dec-14 22:13 by prod_rel_team
    Cisco IOS-XE software, Copyright (c) 2005-2014 by cisco Systems, Inc.
    All rights reserved.  Certain components of Cisco IOS-XE software are
    licensed under the GNU General Public License ("GPL") Version 2.0.  The
    software code licensed under GPL Version 2.0 is free software that comes
    with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
    GPL code under the terms of GPL Version 2.0.
    (http://www.gnu.org/licenses/gpl-2.0.html) For more details, see the
    documentation or "License Notice" file accompanying the IOS-XE software,
    or the applicable URL provided on the flyer accompanying the IOS-XE
    software.
    ROM: 15.0(1r)SG11
    Switch uptime is 5 minutes
    System returned to ROM by power-on
    Running default software
    Jawa Revision 2, Winter Revision 0x0.0x41
    Last reload reason: power-on
    This product contains cryptographic features and is subject to United
    States and local country laws governing import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third-party authority to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. and local country laws. By using this product you
    agree to comply with applicable laws and regulations. If you are unable
    to comply with U.S. and local laws, return this product immediately.
    A summary of U.S. laws governing Cisco cryptographic products may be found at:
    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
    If you require further assistance please contact us by sending email to
    [email protected].
    *Apr 29 18:56:44.596: %SYS-5-CONFIG_I: Configured from console by console
    License Information for 'WS-C4500X-32'
        License Level: entservices   Type: Permanent
        Next reboot license Level: entservices
    cisco WS-C4500X-32 (MPC8572) processor (revision 9) with 4194304K bytes of physical memory.
    Processor board ID JAE191304FG
    MPC8572 CPU at 1.5GHz, Cisco Catalyst 4500X
    Last reset from PowerUp
    1 Virtual Ethernet interface
    32 Ten Gigabit Ethernet interfaces
    511K bytes of non-volatile configuration memory.
    Configuration register is 0x2101
    Switch#
    Switch#show module
    Chassis Type : WS-C4500X-32
    Power consumed by backplane : 0 Watts
    Mod Ports Card Type                              Model              Serial No.
    ---+-----+--------------------------------------+------------------+-----------
    1    32  4500X-32 10GE (SFP+)                   WS-C4500X-32       JAE191304FG
    M MAC addresses                    Hw  Fw           Sw               Status
    --+--------------------------------+---+------------+----------------+---------
    1 b0aa.7777.5840 to b0aa.7777.585f 2.0 15.0(1r)SG11 03.07.00.E       Ok
    System Failures:
    Power Supply:   bad/off (see 'show power')
    Switch#
    All we can find is a little note on the release notes:
    A Catalyst 4006 switch with Supervisor Engine III does not support subinterfaces or the encapsulation keyword on 
    Layer 3 Fast Ethernet, Gigabit Ethernet, 10-Gigabit Ethernet interfaces.
    Source: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/XE3-7-0E/15-23E/configuration/guide/xe-370-configuration/l3_int.html
    I am assuming this restriction applies to this platform but other than that there is nothing specifying we can't do this. Anyone out there has hit the same issue? or can anyone confirm this is an actual platform restriction
    Thank you

    Hi,
    The 4500 and 4500x series switches do not support sub-interfaces.  Only 6500 series support sub-interfaces.
    HTH

  • What license neede to VSS in CAT 4500 with SUP7L-E

    I have two identical chassis with identical cards and supervisors SUP7L-E. License level is ipbase. Is it possible to deploy VSS in this configuration?
    I thought it is, but I've found doc http://www.cisco.com/c/dam/en/us/products/collateral/switches/catalyst-4500-x-series-switches/at_a_glance_c45-696645.pdf where:
    Supported supervisors on Catalyst 4500-E Supervisor Engine 7-E or 7-LE (identical pairs)
    Minimum license IP Base or higher (7-E) or special license (7-LE and Catalyst 4500-X)
    What means special license?
    In this guide https://supportforums.cisco.com/document/124626/virtual-switching-system-vss-configuration-cisco-4500-series-switches we have only:
    3) Minimum license : VSS will work with IP BASE or ENTSERVICES license; it doesn't work with LAN BASE .For information about Software Activation Licensing please refer Cisco Catalyst 4500E Supervisor 7-E and 7L-E and Cisco Catalyst 4500-X Series Software Activation Licensing Deployment Guide.

    I have the same issue.
    We are configuring VSS on Sup7L-E which has been purchased with IP  Base licensing, however when we look at the licensing summary, it  indicates that a feature of Enterprise Services has been configured .
    Currently we have only configured VSS, so this  indicates Enterprise Services is required for VSS, however I cannot find  any information confirming this.
    Switch#sho license sum
    Index 0   Feature: entservices
              Period left: 8 weeks 4 days
              License Type: Evaluation
              License State: Active, Not in Use, EULA not accepted
              License Count: Non-Counted
              License Priority: None
    Index 1   Feature: ipbase
              Period left: Life time
              License Type: Permanent
              License State: Active, In Use
              License Count: Non-Counted
              License Priority: Medium
    Index 2   Feature: lanbase
              Period left: 0 seconds
    Index 3   Feature: internal_service
              Period left: 0 seconds

  • VSS Lic on 4500 with Sup7L-E ?

    Hi,
    Does anyone know the correct way to lic VSS on a 4500 SUP7L-E ?
    At
    http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_27990-01.html
    Under Table 5 - Support by Image Type; VSS is listed as available on IP Base (SUP7E only) and a plain Yes under Enterprise Services,
    inferring that you need Enterprise Services lic on SUP7L-E to get VSS...?
    But
    http://www.cisco.com/en/US/prod/collateral/switches/ps10902/ps12332/at_a_glance_c45-696645.pdf
    Under Table 1 - Minimum License for VSS; IP Base or higher (7-E) or special license (7-LE and Catalyst 4500-X)
    Can find no option on CCO / configuration tools to list a 'special' VSS license for 4500R+E chasiss with dual SUP7L-E and IP Base
    How are you meant to purchase/license VSS on 4500E Chassis + SUP7L-E ?
    thanks,
    Sez

    I have the same issue.
    We are configuring VSS on Sup7L-E which has been purchased with IP  Base licensing, however when we look at the licensing summary, it  indicates that a feature of Enterprise Services has been configured .
    Currently we have only configured VSS, so this  indicates Enterprise Services is required for VSS, however I cannot find  any information confirming this.
    Switch#sho license sum
    Index 0   Feature: entservices
              Period left: 8 weeks 4 days
              License Type: Evaluation
              License State: Active, Not in Use, EULA not accepted
              License Count: Non-Counted
              License Priority: None
    Index 1   Feature: ipbase
              Period left: Life time
              License Type: Permanent
              License State: Active, In Use
              License Count: Non-Counted
              License Priority: Medium
    Index 2   Feature: lanbase
              Period left: 0 seconds
    Index 3   Feature: internal_service
              Period left: 0 seconds

  • QoS trust dscp or cos on catalyst 4500

    We have a 4510R with Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Software cat4500e-UNIVERSALK9-M), Version 03.05.02.E RELEASE SOFTWARE (fc1).
    I want use qos trust dscp or qos trust cos on the interface conected to other cisco switch or wlan controller.
    The current IOS version, do not support qos trust dscp:
    SW(config)#interface gi10/16
    SW(config-if)#qos tr
    SW(config-if)#qos trust ?
      device  trusted device class
      extend  Extend trust through a connected device
    SW(config-if)#qos trust device ?
      cisco-phone   Cisco IP Phone
      cts           Cisco-telepresence
      ip-camera     Cisco video surveillance camera
      media-player  Cisco Digital Media Player
    SW(config-if)#qos trust device
    What is the software that I need for this?. I tried with command lookup tool but the cat4500 do not appears.

    That is even new for me.
    I did a search and found that, now a days you no longer have to provide the Trust DSCP command, it is by default trusted.
    Went through this White Paper and excerpts are below:
    http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-4500-series-switches/white_paper_c11-539588.html
    The answer to your question comes from the following excerpt :-
    "Previously supervisor engines relied on “port trust” to classify traffic; however, this does not fall into the MQC CLI construct. MQC provides a more flexible capability, i.e. all traffic is trusted by default, an administrator can change this trust state using a policy map. Another difference is the “internal DSCP” value used within the switch to place packets in the proper queue.
    Cisco Catalyst 4500E Supervisor Engines do not use “internal DSCP”; rather, it relies on explicit matching of QoS values using class maps so that packets can be placed in the correct queue.
    Also, note that there is no specific priority queue: it is not queue 3 or queue 1. The priority queue is simply configured within a class; therefore, it is not tied to a specific queue. One final difference is that of classification. Cisco Catalyst 4500E Supervisor Engines provide sequential classification rather than parallel. This allows the network administrator to classify traffic at egress based on the ingress markings. These markings can be done unconditionally, using a policer or using a table map. Based on these changes, QoS CLI will now be more contiguous on the Supervisor Engines as it will now have standard Cisco MQC CLI, making configuration management much simpler"
    HTH,
    Please rate all helpful posts.
    Regards

  • Trunking on Nexus 5000 to Catalyst 4500

    I have 2 devices on the each end of a Point to Point.  One side has a Nexus 5000 the other end a Catalyst 4500.  We want a trunk port on both sides to allow a single VLAN for the moment.  I have not worked with Nexus before.  Could someone look at the configurations of the Ports and let me know if it looks ok?
    nexus 5000
    interface Ethernet1/17
      description
      switchport mode trunk
      switchport trunk allowed vlan 141
      spanning-tree guard root
      spanning-tree bpdufilter enable
      speed 1000
    Catalyst 4500
    interface GigabitEthernet3/39
    description
    switchport trunk encapsulation dot1q
    switchport trunk allowed vlan 141
    switchport mode trunk
    speed 1000
    spanning-tree bpdufilter enable
    spanning-tree guard root

    Thanks guys, we found the issue.  The Catalyst is on my side and the Nexus is on the side of the hosting center.  The hosting center moved his connection to a different Nexus 5000 and the connection came right up.  We dropped the spanning-tree guard root. 
    It was working on the previous nexus when we set the native vlan for 141.  So we thought it was the point to point dropping the tags.
    The hosting center engineer this it might have to do with the VPC Peer-Link loop prevention on the previous Nexus. 
    Anyway it is working the way we need it to.

  • Catalyst 4500, scp, rcp

    Does anybody know is it possible to set up a remote access to the Catalyst 4500 series switch thru the rcp or scp protocol? I want to start commands on the remote unix server. Like unix# scp -i identity -B acl.file user@catalyst:system:running-config or unix# rcp acl.file user@catalyst:system:running-config, where acl.file is the file with access-list. It's important to start commands on the remote server, not on the switch. Thanks for any advice.

    Hello,
    I just tried this on a Cat 4500 using tftp, and successfully changed its hostname, and added a new ACL.
    The same should be true for rcp and scp.
    Just remember to put "end" as the last line of the file, otherwise you will get a %PARSER-4-BADCFG: Unexpected end of configuration file message (but it still works).
    This was tried on Version 12.2(25)EWA4.
    Hope this helped,
    Michael.

  • Catalyst 4500 L3 QoS Issue

    Hi All
    I got 2 cisco catalyst 4500 l3 switches (Cisco IOS Software, IOS-XE Software, Version 03.02.00.XO RELEASE SOFTWARE (fc1))       
    I enabled Autoqos on one sw successfully without any issue
    but facing issue on the second, below is the screenshot for your reference kindly suggest
    Thanks!

    Yes it is.
    See this link for details -
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/54sg/configuration/guide/config/RPR.html#wp1130150
    Jon

Maybe you are looking for