Cisco Switching/Routing :: Layer 3 Module Required For 5500 Series Switch?
May 16, 2013
We are working with a contractor to upgrade our network, and I heard from them that the 5596/5548 might not need the Layer 3 module for our inter-VLAN routhing. They have yet to give me an answer.
We do have a few static routes on our current layer-3, core switch too.
There is very little and quite diverse Information regarding the if, where and how of a Nexus 5000 or 5500 series Switch and support for IEEE 802.1AE Link Layer Encryption (also called MACsec).
For example: the official FAQ denies that the Nexus 5500-series supports 802.1AE at all, while the data sheet says that only "downlink ports" are supported (host access).
On the Nexus 7000 platform the 802.1AE link layer encryption is part of TrustSec (feature cts) and much better documented.
The Question is: If and under which circumstances (configuration, L3 modules, license, NX/OS version) does a Nexus 5k or 5500 series Switch support 802.1AE on 1G or 10G interfaces that are directly connected to a Nexus 7000 (with the necessary cts feature licensed/configured)?
We have a requirement to build a datacenter within a datacenter for a new project. The existing Core network is 2 x Cisco 6509 in VSS configuration. We would like to connect the new datacenter to the existing Core switch from the new low-end Core switch. This datacenter would have a SAN network and blader chassis.
Listing the Cisco Switches requirements and expansion module requirements ?
- What expansion module is required at existing 6509 ? Can we have one 10Gibit modules on each switches and crate a port-channel connection from new datacenter core switch ?
- Which model of Switch you recommend for the new Datacenter Core which is only going to have one SAN Enclosure and two blade chassis? Will it be a good option to use 3750E ? If yes do we need any additional modules there ?
- Which aggregation switch should we use for the blade enclosure ?
- Should we have a Cisco Embedded Switch module on the chassis to create trunk with aggregation switch ?
- How the SAN director switch is connecting to the LAN ? should we have any particular module at new Core switch ?
I am trying to add WCCP to be configured for websense. My first option seems to be either purchase an IPServices license for the stack of 3750E switches, but i am thinking this will require us to license all three switches in the stack. The second option i am looking at is to do the WCCP configuration on the 2800 router we have on the edge. The problem is both Gig ports are in use, one going to the firewall and the second going to the ISP. My first question would be, which option is better in terms of manging as well as cost of implementing it.The second question is, if WCCP on the router is a better option, what is the add on module i should be looking to get to add the additional ports to hook up the Websense cache.
I have a 7K running 6.1 code, on F series line cards. I need to set it to prioritise DSCP EF marked traffic, that's all at this stage, but am unclear on the configuration steps required. The packets will already be marked, I just need to ensure they end up in a priority queue.
I got one SF 300-48 layer 3 switch I tried to configure to use it in the office network.Unfortunately I'm unable to configure the VLAN settings.I need port one for input(VLAN2),port 7-15 for another vlan(vlan3) also need to connect with the vlan 4.port 15 is another vlan(vlan4) this is for wireless.Other ports are static.It doesn't get any connections with other vlans.I wish to know how to configure vlans in GUI mode.I tried , But I can't get the Vlan setting correctly.Also,I need to know how to communicate both vlans in GUI mode.
I created a lab and I have a few issues. One with a layer 3 switch and another with a ASA 5550.
1. Layer 3 switch: I have created multiple Vlans and I am able to route between them. I can ping the switch IP but not the default gateway to the ASA. I did a tracert of the default gateway of the ASA and once I am past the Vlan gateway it fails.
2. On the ASA 5550 I created the Vlans on sub-interfaces but still cannot get to the internet. ASA config is below the switch config.
vlan 10 ports 1-10 vlan 21 ports 11-20 vlan 30 port 21-30 vlan 40 ports 31-40 default vlan should be vlan 21
I have the servers, switch and router connected to vlan 21. Vlan 21 works great I can browse the internet, but I cannot ping any other vlans. router is connected to fa0/19
[code] Building configuration... Current configuration : 4833 bytes ! version 12.2 no service pad
I can understand it 's one of those very basic questions , but how do I identify a Switch is Layer 2 or Layer 3 ?Looking through # show version command and checking the IOS version to be IP BASE or LAN BASE . Is it the right way ?Cisco 2960 is a Layer 2 or a Layer 3 Switch ? I noticed that access-lists could be configured which means that it 's a Layer 3 Switch , right?
I've created a scenario using a 3750 cisco as core switch ad other 6 switch model 2900 in access level.my problem is this, the router is not a cisco router, and this router is not able to make NAT on more than one subnet.Into the core switch I've created 4 VLAN and I must to give internet access to 3 of them, 192.168.0.0/24 (vlan1), 172.16.0.0/24 (vlan2), 172.17.0.0/24 (vlan3).I've connected the switch to router via gigabit ethernet 0/1 and I've assigned to this interface ip address 192.168.10.2, the router ip address is 192.168.10.1, Switch ip default-gateway is router ip address 192.168.10.1, ip default route is 0.0.0.0 0.0.0.0 192.168.10.1 I've enabled ip routing feature and I've set no switchport feature to interface gigabit ethernet 0/1.From core switch I can ping router ip address but I can't make it from all other user, and the users not able to have internet access.
Below the switch configuration (only necessary strings)
version 12.1 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption
My understanding is that even layer 2 switches like the Cisco 3500XL can have 1 IP address for management. However, I cannot seem to figure out how to configure it to get it working in a router on a stick setup. I can manage the router through SSH, but I cannot SSH to the switch.
I have made a topology by using one 3560 switch and 2 2950 switches. I have also made 2 vlans name Clients and other Servers and vlan 1 is for anagement purposes. The left 2950 switch is for clients and the right is for servers. Clients is vlan 2 and servers is vlan3 . Now what i want is that my dhcp is should assign ips to clients in vlans 2 provided that servers are in vlan 3. I am also using a border router and i have introduced a default route on the 3560 to the border router.
Now when i assign static ips to my clients pc and server dhcp then i can ping between vlans but when i try to assign ip through dhcp then it wont work. Also the default route on the switch to the border router doesnt seem to work. I can ping only the border router when i put a default route on the border router instead of the 3560 switch.
is it possible to run a Catalyst 4500 as pure Layer 2 Switch, i.e. disabling "ip routing", but still managing the switch via Fa1, i.e. the defautl mgmtVrf vrf ?I tried the following:
! no ip routing ! interface FastEthernet1 ip vrf forwarding mgmtVrf ip address 192.168.1.1 255.255.255.0 ! ip route vrf mgmtVrf 0.0.0.0 0.0.0.0 192.168.1.254 ip default-gateway 192.168.1.254
I was not able to reach the Switch even from the same subnet. Only after enabling ip routing I could manage the Switch. I haven't found any command to set ip default-gateway for a vrf. Any workaround to keep routing disabled, but still manageable via VRF?
Configuring OSPF on a catalyst 3560G Switch to connect to our building next door by way of fiber. The other two switches in the other building are running OSPF, I am trying to connect to the other building and access a server which is on a switch running OSPF. I am trying to configure the switch here to run OSPF and be able to see the neighbor, but currently can't although I've identified the networks. Maybe I'm missing something, I've followed the instructions but something is not right.
RACK 1 is the old rack and NEW RACK is the rack which is going to be procurred for some new Servers. All the Servers in the RACK 1 has a default gateway as PIX Inside IP. As of now the 3560 Switches acts as Layer 2 and does not have L3 IP routing enabled. How can I enable conenctivity between 192.168.36.0 range and 192.168.57.0 range wihtout making any change to current PIX inside IP address 192.168.57.1?Is it possible that I can enable IP routing on the 3560 Switches , create interface VLAN 36 and since already Switch 2 has it 's default gateway as 192.168.57.1 , Would the traffic from 192.168.36.0 be routed to 192.168.57.1 ? Or do I need to create static route for that ?Since L3 Routing is not enabled and since the 3560 Switches are just acting as L2 , the VLAN 2 - 192.168.57.0 range does not have any interface VLAN configured. When it is changed I would need to create interface VLAN 2 on 3560 Switches?
I just received a Catalyst 2960-C (WS-C2960C-8TC-L R) switch and I am unable to sign into its web GUI in order to configure it. I've tried both the Cisco Network Assistant and Internet Explorer and I am unable to log in either way. The documentation provided by Cisco states that the default password is simply cisco and that a username is unnecessary. Needless to say, it doesn't work. I've also Googled for other default passwords (such as cisco-cisco as the username-password), none of which worked either. I've also tried resetting the switch back to its factory default a few times.
WAN -------- ASA5505 ------<802.1q trunk>----- L3 switch -----<802.1q trunk>----- L2 switch w/ VLAN support
The following VLANs exist on the ASA and both switches: VLAN 10 (10.10.10.0/24), VLAN 11 (10.10.11.0/24), and VLAN 99 (10.10.99.0/24).
The ASA5505 performs the following functions: routing to/from the WAN, firewall, NAT, and DHCP for each VLAN. It has an interface on each VLAN (10.10.x.2) for a DHCP server.
The L3 switch provides inter-VLAN routing and layer 2 switching. The L2 switch provides layer 2 switching, with VLAN support.
What should the default gateway on the L3 switch be? Should I set the IP of the physical interface connected the L3 switch to the ASA5505.
We have one switch 4510R which could have total 300 cisco GE color phone connected. That means 300x15.4=4620W. Considering the 89% effiency for the PoE line cards, that means each line card needs 5191W input power from chasis power supply. Based on the 6000W power supply specs, only up to 4800W is allocated for PoE purpose. But we need 5191W from power supply which redundant mode can't offer. We don't want to go with combined mode. So should we add external power shelf to add more power?Another question will be how much power we need from utility or UPS. For example, the efficency of cisco power supply is 75% and we use two 6000W power supplies in redudant mode. Then we need 8000W. The voltage is 220V. Then the AMP we need is 36.4A from UPS or utility power.
Configured Layer 3 portchannel from 6500VSS enabled switch to two different 6500 standalone switch. Configured first ip on VSS switch, second ip on standalone switch1 and third IP on standalone switch2. My question is
1. Will the portchannel be up? 2. If port channel is up, will I able to ping the connected IP's.
I need a L2 switch with dual AC power supply and RJ45 uplink The optin I got was WS-C3560X-48T-L + C3KX-PWR-350WAC , but the problem is with uplink . There is no RJ45 1G uplink , there is only option for SFP uplink The another option was WS-C2960G-48TC-L , but there is no dual AC power supply option a good model ( Dual AC power supply , RJ 45 uplink ports (Gig) , with 48 port 100/1000 UTP)
It has ip helper configured that points to DHCP.From 4500 switch port - port x connects to 2960 port.Port x is configured as trunk between 4500 and 2960.
2960 config vlan 10 name data
All user ports are configured under vlan 10 and as access ports.Port x is trunk port connected frpm 2960 to 4500 switch allowing vlan 1 and 10 only.This switch has no default gateway configured.
We connected user PC on 2960 switchports and they were able to get the IP from DHCP server and were able to access the network? My question is how users on 2960 switch are able to access the network without ip default-gateway configured on 2960 switch?
Do you have the ability to setup DHCP servers on this layer 3 switch? I know I can with my old 3550 switch. Want to upgrade and make sure this model supports setting up dhcp servers on it.
I have a switch layer 6500 series connected to a firewall, the port configuration between them is layer 2, in another words I do not configure an IP address in the Cisco switch port to conected it in the firewall, but when a apply a policy on firewall it lose communication with others vlans, just the vlan that is connected between the switch and firewall works, attachment the design. I think that is necessary to configure the connection between the firewall and switch as layer 3 ( a port with IP address in the switch), but I would like to know why? The switch is configured with about 10 vlan and it is a inter vlan routing, a default route is configured in the switch where the gateway is the firewall.
Suffered a big outage on the network, the fix was to reload the module 3 on the 6509 switch, we had these errors on the log %CONST_DIAG-SW1_SP-3-HM_PORT_TEST_FAIL: Switch 1 Module 3 TestUnusedPortLoopback Port(s)[24,46] failed. System operation continues.in the end, we reloaded the card and it was all ok. is there anything I can do to check the card / or any deeper logs? would that error cause the card to crash?
I'm trying to set up a 2951 with a 24 port switch module. I want the ports to act similiarly to the ports on an 881 router - where I assign the VLANs on the router and I set the VLANs to the switchport interfaces.I would like to be able to create the VLANs on the router portion of the 2951 and then, enter the switch module and configure the Ports to the VLANs but, how do I logically connect router to the switch? Is it an internal logical interface - meaning how are the VLANs getting from the router to the switch?