Cisco Network Assistant (CNA) only supports these features on the Catalyst 4500 Series Switches:
Administration menu IP Address, Simple Network Management Protocol (SNMP), System Time, HTTP Port, Users and Passwords, Console Baud Rate, MAC Addresses, Address Resolution Protocol (ARP), Save Configuration, Back Up/Restore Configuration, Software Upgrade, System Reload, and System Message Notification
Cluster menu Create Cluster, Delete Cluster, Add To Cluster, Remove From Cluster, and Hop Count
Port menu Smartports Port Setup, Port Settings, and Port Security
Device menu Hostname and Security Wizard
VLAN menu VLAN and Voice VLAN
Reports menu Inventory, Bandwidth Graphs, Link Graphs, and System Messages
View menu Front Panel, Topology, Topology Options, Automatic Topology Layout, and Save Topology Layout
These limitations apply to the Cisco Catalyst 4500 Series Switches:
By default, clustering is disabled on Cisco Catalyst 4500 Series Switches.
An IP address must be assigned to the Cisco Catalyst 4500 Series Switch if it is a cluster command switch candidate. If the switch is a cluster member candidate, an IP address is not always necessary.
By default, the HTTP server is disabled on the Cisco Catalyst 4500 Series Switch. In order to connect the switch to CNA, enable the HTTP server on all cluster members.
The HTTP port number on Network Assistant and the Cisco Catalyst 4500 Series Switch must match.
A Cisco Catalyst 4500 Series Switch can be a cluster member only if another Catalyst 4500 is the command device.
By default, the Cisco Catalyst 4500 Series Switch is configured with five vty lines. If the switch such as a cluster command device with multiple cluster members is connected to the CNA, at least eight + x vty lines must be configured, where x is the number of vty lines used by other applications. A maximum of 16 vty lines can be configured.
Create a Switch Virtual Interface (SVI) for intracluster communication. The SVI must be in the no shut state.
Hi people, I've been struggling with this problem all day.So I got 3 VLANsVLAN 10: 192.168.10.0/24VLAN 20: 192.168.20.0/24VLAN 30: 192.168.30.0/24Now I have a DHCP server on VLAN 10 and I need VLAN 20 to be able to communicate fully with VLAN 10 and 30 an...
Got 6 new 9300 switches and want to stack them but get licensing error. Difference i see in license is of DNA essentials. I did not activate any license, only upgraded IOS. There is no license right-to-use command to activate/deactivate..How can i make th...
I currently use the CML2.0 and add a NX-OSv node. It's version is 7.3(0).D1(1). After configuring the snmp-server community string for snmpv1 v2c, IP Address and "no shut" the interface, then connecting it to the ext-conn which is bridge type.  ...
Hi folks. I know the private VLAN promiscuous trunk port is supported on the Cat4500. If I am reading the documentation properly, the feature is also available on the Nexus product line, 5.0(2) or above. I need to make sure I have the right feature i...
I have a UCS C24 M3S with IMC version 1.5(1f). I received an alarm from a Vulnerability detection service saying that this server is vulnerable to FREAK attack: https://geekflare.com/test-freak-attack-cve-2015-0204-and-fix/