09-25-2013 02:45 AM - edited 03-07-2019 03:40 PM
Hi guys,
I'm rather new to this so I might be asking some silly questions.
We have just bought two 24port 3850, and I'd love to get them work as a stack. I've plugged in the stackwise, configured VLAN's and Syslog. I boot the master then the slave and it joins the stack fine.
My problem is that the master stays as active and the slave sits there waiting patiently doing nothing, ready for the master to die and for the slave to take over.
It'd be great to get these guys working together in a traditional stack.
After a bunch of reading I can't find the answer I'm looking for, I come across bits about Level 3 licensing, but I'm still not clear about what I actually have to do.
Please could someone point me in the right direction.
thanks!
Paul
09-25-2013 03:38 AM
Below config guides should help you on this
2. http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps12686/deployment_guide_c07-727067.html
HTH
Rasika
09-25-2013 03:47 AM
HTH
Regards
Inayath
*Plz rate if this info is helpfull.
09-25-2013 03:51 AM
Hey guys,
Thanks for the links, I've read through that I don't know how many times
But I can't find the command for making both switches work together. Typing "show switch" just gives me the following.
Switch/Stack Mac Address : ece1.a9b8.e180 - Local Mac Address
Mac persistency wait time: Indefinite
H/W Current
Switch# Role Mac Address Priority Version State
------------------------------------------------------------
*1 Active ece1.a9b8.e180 1 V01 Ready
2 Standby 68bc.0c5b.8b00 1 V01 Ready
How can I turn the Standby into Active so both switches are working together?
thanks,
05-16-2014 07:10 AM
have you found the solution to stack those two switches together as active/active?
09-25-2013 04:16 AM
Can you please comeup with the IOS version you have ?
Second, A switch stack always has one active switch and one standby switch.
09-25-2013 04:18 AM
surething, here you go,
Switch Ports Model SW Version SW Image Mode
------ ----- ----- ---------- ---------- ----
1 32 WS-C3850-24T 03.02.02.SE cat3k_caa-universalk9 INSTALL
2 32 WS-C3850-24T 03.02.02.SE cat3k_caa-universalk9 INSTALL
re: switch stack always having one active and standby, is there no way of getting them to work together? I thought that was the point of the Stackwise480 cables?
thanks!
09-25-2013 04:50 AM
Hope you got what you wanted ?
09-25-2013 04:53 AM
Hi Pavesh,
Thanks for getting back to me, but not quite yet
re: switch stack always having one active and standby, is there no way of getting them to work together? I thought that was the point of the Stackwise480 cables?
If these switches can't be configured to work together, rather than have one idle on standby, I think I might have bought the wrong ones.
thanks,
09-25-2013 04:52 AM
Are you sure it's not working ? If you do a show interface status do you see all the ports in both switches ? You will have an active and a standby , if the active dies the standby takes over the "master" for the entire stack . standby does not mean both switches are not working. It's a little different than the older 3750 stacks.
09-25-2013 04:55 AM
I do indeed see all the ports on both switches. I'll have another play with it.
So to confirm, these switches should be working together, but the Active/Standby part just means that the Standby will take over as master, should master die?
I'll have a play and let you know how I get on.
cheers,
09-25-2013 04:59 AM
Hey,
One more thing, if I plug a laptop into the slave switch, I can't ping anything thats plugged into the master switch, I was taking that as indiction they're not passing packets between each other.
cheers,
09-25-2013 05:01 AM
:-)
09-25-2013 05:13 AM
can you please post the configs ?
09-25-2013 05:26 AM
hope this helps - I removed passwords, and by looking at this there could be some IP address issues...
thanks so much!
cisco-master#show configuration
Using 2447 out of 2097152 bytes, uncompressed size = 5614 bytes
!
! Last configuration change at 18:08:36 UTC Wed Sep 18 2013
!
version 15.0
no service pad
service timestamps debug uptime
service timestamps log datetime
no service password-encryption
service compress-config
service sequence-numbers
!
hostname cisco-master
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
logging console emergencies
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
!
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
no aaa new-model
switch 1 provision ws-c3850-24t
switch 2 provision ws-c3850-24t
!
!
!
qos wireless-default-untrust
!
crypto pki trustpoint TP-self-signed-3573889528
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3573889528
revocation-check none
rsakeypair TP-self-signed-3573889528
!
!
crypto pki certificate chain TP-self-signed-3573889528
certificate self-signed 01 nvram:IOS-Self-Sig#1.cer
!
!
!
!
!
diagnostic bootup level minimal
identity policy webauth-global-inactive
inactivity-timer 3600
spanning-tree mode pvst
spanning-tree extend system-id
!
redundancy
mode sso
!
!
!
class-map match-any non-client-nrt-class
match non-client-nrt
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 2
spanning-tree portfast
!
interface GigabitEthernet1/0/2
switchport access vlan 2
!
interface GigabitEthernet1/0/3
switchport access vlan 2
!
interface GigabitEthernet1/0/4
switchport access vlan 2
!
interface GigabitEthernet1/0/5
switchport access vlan 2
!
interface GigabitEthernet1/0/6
switchport access vlan 2
!
interface GigabitEthernet1/0/7
switchport access vlan 2
!
interface GigabitEthernet1/0/8
switchport access vlan 2
!
interface GigabitEthernet1/0/9
switchport access vlan 2
!
interface GigabitEthernet1/0/10
switchport access vlan 2
!
interface GigabitEthernet1/0/11
switchport access vlan 2
!
interface GigabitEthernet1/0/12
switchport access vlan 2
!
interface GigabitEthernet1/0/13
switchport access vlan 3
!
interface GigabitEthernet1/0/14
switchport access vlan 3
!
interface GigabitEthernet1/0/15
switchport access vlan 3
!
interface GigabitEthernet1/0/16
switchport access vlan 3
!
interface GigabitEthernet1/0/17
switchport access vlan 3
!
interface GigabitEthernet1/0/18
switchport access vlan 3
!
interface GigabitEthernet1/0/19
switchport access vlan 3
!
interface GigabitEthernet1/0/20
switchport access vlan 3
!
interface GigabitEthernet1/0/21
switchport access vlan 3
!
interface GigabitEthernet1/0/22
switchport access vlan 3
!
interface GigabitEthernet1/0/23
switchport access vlan 3
!
interface GigabitEthernet1/0/24
switchport access vlan 3
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface GigabitEthernet2/0/1
!
interface GigabitEthernet2/0/2
!
interface GigabitEthernet2/0/3
!
interface GigabitEthernet2/0/4
!
interface GigabitEthernet2/0/5
!
interface GigabitEthernet2/0/6
!
interface GigabitEthernet2/0/7
!
interface GigabitEthernet2/0/8
!
interface GigabitEthernet2/0/9
!
interface GigabitEthernet2/0/10
!
interface GigabitEthernet2/0/11
!
interface GigabitEthernet2/0/12
!
interface GigabitEthernet2/0/13
!
interface GigabitEthernet2/0/14
!
interface GigabitEthernet2/0/15
!
interface GigabitEthernet2/0/16
!
interface GigabitEthernet2/0/17
!
interface GigabitEthernet2/0/18
!
interface GigabitEthernet2/0/19
!
interface GigabitEthernet2/0/20
!
interface GigabitEthernet2/0/21
!
interface GigabitEthernet2/0/22
!
interface GigabitEthernet2/0/23
!
interface GigabitEthernet2/0/24
!
interface GigabitEthernet2/1/1
!
interface GigabitEthernet2/1/2
!
interface GigabitEthernet2/1/3
!
interface GigabitEthernet2/1/4
!
interface TenGigabitEthernet2/1/1
!
interface TenGigabitEthernet2/1/2
!
interface TenGigabitEthernet2/1/3
!
interface TenGigabitEthernet2/1/4
!
interface Vlan1
no ip address
ip broadcast-address 192.168.15.255
!
interface Vlan2
ip address 192.168.0.251 255.255.255.0
!
interface Vlan3
no ip address
!
ip default-gateway 192.168.15.1
no ip http server
ip http authentication local
ip http secure-server
!
!
logging 192.168.15.51
logging 192.168.0.191
!
!
!
line con 0
exec-timeout 0 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
login
line vty 5 15
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
login
!
wsma agent exec
profile httplistener
profile httpslistener
wsma agent config
profile httplistener
profile httpslistener
wsma agent filesys
profile httplistener
profile httpslistener
wsma agent notify
profile httplistener
profile httpslistener
!
wsma profile listener httplistener
transport http
!
wsma profile listener httpslistener
transport https
ap dot11 24ghz rrm channel dca 1
ap dot11 24ghz rrm channel dca 6
ap dot11 24ghz rrm channel dca 11
ap dot11 5ghz rrm channel dca 36
ap dot11 5ghz rrm channel dca 40
ap dot11 5ghz rrm channel dca 44
ap dot11 5ghz rrm channel dca 48
ap dot11 5ghz rrm channel dca 52
ap dot11 5ghz rrm channel dca 56
ap dot11 5ghz rrm channel dca 60
ap dot11 5ghz rrm channel dca 64
ap dot11 5ghz rrm channel dca 149
ap dot11 5ghz rrm channel dca 153
ap dot11 5ghz rrm channel dca 157
ap dot11 5ghz rrm channel dca 161
ap group default-group
end
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide