Following command can be used to turn on/off DOM for all transceivers type in the system
Router(config)#transceiver type all
Once enabled, DOM can be accessed via CLI using "show interface transceiver command"
Off all the five values two mostly used and rellevant values are TX and RX power, temperature is also used sometimes. The operating range of these three values is unique across all modules and is available in the data sheet.
There is an extension available for this command, which is also very helpful and is used to check threshold values of the above paramaeters like temperature , Tx, Rx. The command is , show interface gig x/y transceiver detail
sh int gi 1/3 transceiver detail
Transceiver monitoring is disabled for all interfaces.
ITU Channel not available (Wavelength not available),
Transceiver is externally calibrated.
mA: milliamperes, dBm: decibels (milliwatts), NA or N/A: not applicable.
++ : high alarm, + : high warning, - : low warning, -- : low alarm.
A2D readouts (if they differ), are reported in parentheses.
The threshold values are calibrated.
High Alarm High Warn Low Warn Low Alarm
Temperature Threshold Threshold Threshold Threshold
Port (Celsius) (Celsius) (Celsius) (Celsius) (Celsius)
I need help figuring out what is going wrong. I am only worried about the Honolulu network. I have 5 vlans setup. I also have 2 of them being given addresses via DHCP on the router. For some reason I cannot reach my servers or my printers though.
Using the above topology, I have ebgp running between edge1 and edge2 with isp1 and isp2, and ibgp running between the two edge routers and core routers. I had this up and working before but I'm studying for the CCNP so I decided to tear it do...
I am experiencing an issue with multicast feeds over a VTI. We have two VPN gateways at both source and receiver sites. From the receiver side, a static default route has been put in place towards the tunnel. On the source side, we have configured IGMP st...
Folks,We are working on some OSPF design where 2 routers need to talk OSPF with an internal network. The catch, we want to pass the traffic via a Palo Alto firewall. I have attached the diagram on the design on how we are going to implement this...
Hi Freinds am i right as per below: SSO: sup aware feature to prevent the interruption of L2 Traffic NSF : it prevents the interruption of L3 traffic during Sup failover NSR: acts as graceful restart prevents peer to experiencing flapp...