03-19-2013 07:44 PM - edited 03-07-2019 12:21 PM
Hello All
I'm implementing my first Cisco network and needed a little guidance. Here's the scenario and how I would like for it to function:
- I have to run DHCP on core switch, only on network 172.16.0.0/16 default Vlan 1 so my IP cameras can obtain an IP.
ip dhcp pool cameras
network 172.16.0.0 255.255.0.0
default-router 172.16.0.1
- On the PoE IP camera and POS station ports I'm thinking of configuring the following:
switchport mode access
spanning-tree portfast
Let me know what you guys think. I have a few weeks before these have to go to production. Any help and direction will be greatly appreciated!
I will be checking thread periodically and posting updates.
Solved! Go to Solution.
03-24-2013 02:26 PM
Oh I see!
So with each stack use the 'port-channel 1' for each of them.
e.g.
if we have one stack, it will only have only one etherchannel, therefore should only be port-channel 1 (the first of the 6). This could link to the 4500 on Portchannel 1
When we have the second stack, it will too have one etherchannel, which is port-channel 1 (the first of the 6).
This could link to the 4500 on Portchannel 2
and so on.... The port-channel number is locally significant only so you wont run in to loops if its configured the suggested way etc..
This way you can keep things simple and you will have ease of management this way.
No you do not need to connect physicals to configure
Hope this makes sense.
Please rate helpful posts, & mark any questions as answered thank you.
03-25-2013 10:37 AM
Po stands for Port-Channel
Coming to the config you are confused about lets say we have 4500 and the 2960 switch on level 1
on the 4500 we could configure our port-channels and channel-groups like this:
Firstly, which ever physical interfaces you have chosen for your uplinks then the portchannel to the switch on level 1
Interface gi2/1
channel-group 1 mode active
!
interface gi2/2
channel-group 1 mode active
!
interface po1
description ## Etherchannel to 2960 1st Floor ## Connects to Po1 ##
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 1-4
Now we will configure the etherchannel for the 2nd switch on level 2
Interface gi2/3
channel-group 2 mode active
!
interface gi2/4
channel-group 2 mode active
!
interface po2
description ## Etherchannel to 2960 2nd Floor ## Connects to Po1 ##
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 1-4
Next, configure the etherchannel for the 3rd switch on level 3
Interface gi2/5
channel-group 3 mode active
!
interface gi2/6
channel-group 3 mode active
!
interface po3
description ## Etherchannel to 2960 3rd Floor ## Connects to Po1 ##
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 1-4
and so on and so forth.... All on the 4500.
All 2960's can be consistent i.e. all of them can have this configuration (apart from the description - which you can change):
2960 on level 1:
Interface gi1/0/1
channel-group 1 mode active
!
interface gi2/0/1
channel-group 1 mode active
!
interface po1
description ## Etherchannel to 4506 ## Connects to Po1 ##
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 1-4
2960 on level 2:
Interface gi1/0/1
channel-group 1 mode active
!
interface gi2/0/1
channel-group 1 mode active
!
interface po1
description ## Etherchannel to 4506 ## Connects to Po2 ##
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 1-4
2960 on level 3:
Interface gi1/0/1
channel-group 1 mode active
!
interface gi2/0/1
channel-group 1 mode active
!
interface po1
description ## Etherchannel to 4506 ## Connects to Po3 ##
switchport trunk encapsulation dot1q
switchport mode trunk
switchport trunk allowed vlan 1-4
etc.....
As I said before, every time you do the channel-group 1 mode active command, it will create the interface portchannel 1.
This is the same for any other number.
I hope this makes sense now?
03-19-2013 09:51 PM
is the 4506e l3 or l2?
03-20-2013 02:45 PM
SUP6L-E so basic L3 from my lookup.
03-19-2013 11:58 PM
Hi,
Your 4506E will need to be the default gateway for all your devices I assume. So it will host all the SVI's for your vlans.
For example:
For vlan 1 since you have a 172.16.0.0/16, typically you would use the first address or the last address.
Interface vlan 1
IP address 172.16.0.1 255.255.0.0
Assuming you've created the vlans on the core, now you need to configure the uplink to a 2960.
Int gi4/1
Description ## Trunk to 2960 ## Gi0/1 ##
Switchport
Switchport trunk encapsulation dot1q
Switchport mode trunk
Your DHCP config seems fine, not too sure if camera system would use DNS?
All that needs to be done then is from your 2960 you need to create a trunk (your fiber uplinks)
E.g.
Int gi0/1
Description ## Trunk to 4506E ## Gi4/1 ##
Switchport
Switchport trunk encapsulation dot1q
Switchport mode trunk
(I am assuming you are using only one uplink and not more?)
This will trunk all local vlans on the switch, so you have to create the vlans if you are not using VTP. Be careful though, before connecting any switch device to your network, ensure that the switch is not the VTP server, should be transparent in most cases.
So in summary
Create vlans on 4506
Create SVIs for the vlans on 4506
Configure DHCP pool on 4506
Configure trunk uplink to 2960 on 4506
Then
Create vlans on 2960
Configure trunk to 4506
Configure your access ports
So lets say you have a camera in vlan 1
On the 2960 it would look like this:
Int fa 0/1
Switchport
Switchport mode access
Switchport access vlan 1
Spanning-tree portfast
You might want to have another vlan dedicated for managing your cisco devices remotely via telnet or ssh. Or not sure of that was the reason for vlan 3.
With powering your devices, you could use 'power inline consumption' command if the power is standardised and recognised by the 2960. I think it's 802.3af devices.
Please see FAQ RE to this
http://www.cisco.com/en/US/products/hw/phones/ps379/products_qanda_item09186a00808996f3.shtml
Hth
Sent from Cisco Technical Support iPhone App
03-20-2013 03:20 PM
For vlan 1 since you have a 172.16.0.0/16, typically you would use the first address or the last address.
Interface vlan 1
IP address 172.16.0.1 255.255.0.0
I'll use the last address 172.16.0.254 as gateway. Will that command above stay the same or is that just setting a static IP on vlan 1? How do you recommend setting the gateway?
Your DHCP config seems fine, not too sure if camera system would use DNS?
No DNS on camera system. Will I have to exclude my other networks / vlans from DHCP server? Only setting up on 172.16.0.0/16 network. Don't want any conflicts.
ip dhcp pool cameras
network 172.16.0.0 255.255.0.0
default-router 172.16.0.1
(I am assuming you are using only one uplink and not more?)
This will trunk all local vlans on the switch, so you have to create the vlans if you are not using VTP. Be careful though, before connecting any switch device to your network, ensure that the switch is not the VTP server, should be transparent in most cases.
I'm using two 1GB uplinks from each 2960S Stack, one from each switch. How do I make sure one of the 2960S switches isn't the VTP server?
Your 4506E will need to be the default gateway for all your devices I assume. So it will host all the SVI's for your vlans.
Create SVIs for the vlans on 4506
How do I create SVI's on 4506?
Thank you very much for your time in helping me out, much appreciated!
03-21-2013 03:56 AM
Okay so there's quite a few things we need to cover so I'll try my best to explain step by step.
So you need to create an SVI (switched virtual interface) which is an interface that resides on that particular vlan. So it belongs to a vlan, same as having a physical interface with an IP, it belongs to that port, but in our case the vlan.
The interface (SVI) that we will create for our VLANs will be the default gateway for the end point devices, I.e your pc's, cameras etc...
The address you suggested is 172.16.0.254 which then means its a /24 not a /16 (please google on subnetting if you don't know this) /24 has a subnet mask 255.255.255.0.
So lets begin with our first interface on vlan 1 which will be the gateway for all hosts on vlan 1.
The description on the interface can be anything, so you can change this to something more explanatory to you.
Conf t
Interface vlan 1
Description ## Vlan 1 ## Camera ##
IP address 172.16.0.254 255.255.255.0
No shut
So this is the gateway for vlan 1 that we have set up.
Now DHCP for devices on vlan 1. Since you stated the gateway will be 254 then we'll have to change DHCP.
Ip dhcp pool camera
Network 172.16.0.0 255.255.255.0
Default-router 172.16.0.254
This DHCP will not conflict with other DHCP scopes for other vlans. It will only be active in vlan 1. The Cisco devices know this because one of their interfaces are within the same network. Therefore is active only on that network.
So the clients send a DHCP discovery message on that vlan to the 255.255.255.255 which is a broadcast address, saying 'is there anyone out there who can help me get an IP address' then the router will reply saying yes (since it has a DHCP scope that resides in the same vlan)! It will the offer an address, for example 172.16.0.5, and then there's a closing acknowledgement, saying everything is OK to use this address.
During this process, key information is sent down to the host like the default gateway as we have configured. So then at least the camera knows where to go if the camera itself doesn't know the way. Hence the, default router command for DHCP telling the camera to go to the interface vlan 1 (SVI) so that it can be routed if needed.
Next up is the trunks and the 2960. So I hope I have clarified the potential configuration of the actual trunk itself??
To work out the VTP info, issue a 'show VTP status' command and you should be able to see if its either server, transparent or client. (You could output the info on here if you have any queries with regards to this)
I have already explained what SVI is, so it's an interface on the vlan which we plan to use as the default gateway for all the devices in their vlans respectively.
Hope this helps.
03-21-2013 05:52 PM
Understand SVI's now thanks! Few more questions though bear with me.
I decided to go with this network range 172.16.16.0/20. I need max camera growth to be around 4,000 won't exceed that. Do I have to set a static IP on core switch or just SVI gateway on vlan? Will I need to assign a static IP on 2960 switches?
Conf t
Interface vlan 1
Description Vlan 1 IP Cameras
IP address 172.16.31.254 255.255.240.0
No shut
Ip dhcp pool camera
Network 172.16.16.0 255.255.240.0
Default-router 172.16.31.254
Configure your access ports
So lets say you have a camera in vlan 1
On the 2960 it would look like this:
Int fa 0/1
Switchport
Switchport mode access
Switchport access vlan 1
Spanning-tree portfast
Once I create vlans on core all I have to do is configure access ports on 2960 and associate to vlan on core correct?
Int gi0/1
Description ## Trunk to 4506E ## Gi4/1 ##
Switchport
Switchport trunk encapsulation dot1q
Switchport mode trunk
I'm going to have two fiber uplinks to core one from each switch in stack. Will the commands above suffice or do you recommend a different scenario?
Conf t
Interface vlan 1
Description ## Vlan 1 ## Camera ##
IP address 172.16.0.254 255.255.255.0
No shut
Do I need to type in the above commands for vlan 2 and 3 also correct? Any other vlan configuration needed on core?
Thank you very much for your patience and time leading me in the right direction Bilal.
03-21-2013 10:22 PM
ruckessbx1 wrote:Understand SVI's now thanks! Few more questions though bear with me.
I decided to go with this network range 172.16.16.0/20. I need max camera growth to be around 4,000 won't exceed that. Do I have to set a static IP on core switch or just SVI gateway on vlan? Will I need to assign a static IP on 2960 switches?
if by you mean static ip - you mean a way to reach them remotely - then yes. vlan 4 could work. and you would ave to create your own subnet and svi on the core for it as well.
so for the 2960's you can just do;
config t
int vlan 4
ip address
192.166.4.4 255.255.255.0
no shut
end
wr
or whatever ip/subnet you wanted to go with. then i would also add this command to all trunk ports between switches:
config t
int g0/1
switch trunk native vlan 4
end
wr
do that on the core side as well
Conf t
Interface vlan 1
Description Vlan 1 IP Cameras
IP address 172.16.31.254 255.255.240.0
No shut
Ip dhcp pool camera
Network 172.16.16.0 255.255.240.0
Default-router 172.16.31.254
Configure your access ports
So lets say you have a camera in vlan 1
On the 2960 it would look like this:
Int fa 0/1
Switchport
Switchport mode access
Switchport access vlan 1
Spanning-tree portfast
Once I create vlans on core all I have to do is configure access ports on 2960 and associate to vlan on core correct?
once you create the vlans on the core - enter this command in the core switch:
config t
vtp mode server
then - on all of your access switches - enter this command:
config t
vtp mode client
end
wr
this will make whatever vlans that were created on the core be transferred to the access switches. now when you connect something to an access port on the access switches, you would just need to put:
config t
in f0/2
switch access vlan 2
end
wr
or whatever vlan you are wanting them to have access to
Int gi0/1
Description ## Trunk to 4506E ## Gi4/1 ##
Switchport
Switchport trunk encapsulation dot1q
Switchport mode trunk
I'm going to have two fiber uplinks to core one from each switch in stack. Will the commands above suffice or do you recommend a different scenario?
no. this would create a loop on your network by creating a redundant link. i would set them up as portchannels if it were me. this way - you would have twice the bandwidth and a redundant link.here is an article o0 portchannels:
http://www.cisco.com/en/US/tech/tk389/tk213/technologies_configuration_example09186a0080094647.shtml
you will also have to enable spanning-tree on your network to help you from creating loops. to enable spanning-tree on the network - its a bit tricky. read up on this and come back with questions:
http://www.cisco.com/en/US/tech/tk389/tk621/technologies_configuration_example09186a008009467c.shtml
i will be back tomorrow with my personal sugestions for these configurations.
you can also circumvent all of this by just doing one uplink to each switch....just sayin'
Conf t
Interface vlan 1
Description ## Vlan 1 ## Camera ##
IP address 172.16.0.254 255.255.255.0
No shut
Do I need to type in the above commands for vlan 2 and 3 also correct? Any other vlan configuration needed on core?
you will have to create an svi for every vlan on the network. to create the vlans use the following command:
config t
vlan 1
des camera vlan
vlan 2
des client vlan
vlan 3
des seerver vlan
vlan 4
des switch mangement vlan
end
wr
i wish i could elborate more but i must go, i will be back tomorrow to answer anymore questions. im sure bilal will be here to help too
Thank you very much for your patience and time leading me in the right direction Bilal.
03-22-2013 05:13 PM
you can also circumvent all of this by just doing one uplink to each switch....just sayin'
I have 8 stacks of access switches with two 1GB uplinks each going to core. I already have all the GBIC's on hand and need the redundant links. I'll do some research on etherchannel.
I also would like to set a password on all switches to access through console and ssh.
Thanks Matthew!
03-22-2013 05:28 PM
Bilal did a very good job of outlining how to setup the etherchannels.
To setup the username and password, use the following command:
config t
username XXXXXXXX pasword XXXXXXXX privilege 15
line console 0 privilege 15
end
wr
03-22-2013 03:03 AM
With vlan 1, if you assign a SVI with an IP then you do not need another static address for this vlan. If you wanted to create another one for vlan 2 you would follow the same method.
Will you need to assign a static IP on 2960 switches?
Umm, no - not necessarily, however as Matthew mentioned briefly, you could assign a management vlan and SVI so you could manage your devices using SSH or telnet.
Once you configure the vlans and SVI's on the core, all you will have to create the vlans on the 2960 (no svi's needed on this device).... Did you manage to verify the VTP info?
I asked the question before about how many uplinks you will be using
Since you will be using more that one uplink Matthew suggested using etherchannel which I agree. If you didnt use this then spanning-tree will block one port and you will only be making use of x1 1gb link. There are two main protocols recommended to do this, cisco's PAGP or standardized LACP. What this will do is bundle together both uplinks in to one virtual link. This is called portchannel or etherchannel. Since LACP is a standard, I'll be suggesting the config for this below:
For example if one the 2960 we have gi0/1 and 0/2 using as uplinks to the 4500 on gi1/1 and 1/2 we will do this:
2960:
interface gi0/1
channel-group 1 mode active
interface gi0/2
channel-group 1 mode active
interface Port-channel1
description ## Portchannel to 4500 ## Po1 ##
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1-4
switchport mode trunk
This creates a virtual interface called Po1 - Important! instead of configuring the physical ports, we configure the port-channel interface. If we do not do this and the physical interface is a different configuration then its likely to break and may cause a loop in your network.
You can specify allowed vlans on the trunk, so i have allowed vlans 1 - 4.
You do the same on the other side with the 4500.
when you are connecting to more that one stack of 2960's for example one on floor 1 will be channel-group 1 mode active which will be your port-channel 1 interface.
and the one on floor 2 could be channel-group 2 mode active subsequently it will create port-channel 2
and 3 channel-group 3 mode active and so on...
e.g.
4500:
interface gi1/1
channel-group 1 mode active
interface gi1/2
channel-group 1 mode active
interface Port-channel1
description ## Portchannel to 2960 ## Po1 ##
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1-4
switchport mode trunk
please see
http://www.cisco.com/en/US/docs/switches/lan/catalyst2960/software/release/12.2_55_se/configuration/guide/swethchl.html for config guide and info with regards to this.
You need to create the same for vlans 2 and 3, SVI interfaces on the 4500 and it will be the gateway for your devices.
=============================================================================================
Example config below:
4500:
Enable ip routing on 4500:
conf t
!
ip routing
VTP mode to transparent:
vtp mode transparent
So create the vlans:
vlan 1
name ##CAMERA_VLAN##
!
vlan 2
name ##CLIENT_VLAN##
!
vlan 3
name ##SERVER_VLAN##
!
vlan 4
name ##MANAGEMENT_VLAN##
Now create the SVI's
interface vlan 1
description ## Vlan 1 ## Camera ##
ip address 172.16.31.254 255.255.240.0
no shut
!
interface vlan 2
description ## Vlan 2 ## Client ##
ip address 192.168.1.254 255.255.255.0 (you can change this to what you need)
no shut
!
interface vlan 3
description ## Vlan 3 ## Server ##
ip address 192.168.20.254 255.255.255.0 (you can change this to what you need)
no shut
!
interface vlan 4
description ## Vlan 4 ## MANAGEMENT ##
ip address 10.0.0.1 255.255.255.0 (this will be the address you can SSH or TELNET to for managing remotely)
no shut
Create the DHCP scope for vlan 1:
Ip dhcp pool ##CAMERA##
Network 172.16.16.0 255.255.240.0
Default-router 172.16.31.254
Then finally the trunk and uplinks:
interface gi1/1
channel-group 1 mode active
interface gi1/2
channel-group 1 mode active
interface Port-channel1
description ## Portchannel to 2960 ## Po1 ##
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1-4
switchport mode trunk
Phew! so thats done, and now the 2960
=============================================================================================
2960:
conf t
VTP mode to transparent:
vtp mode transparent
Create the vlans:
vlan 1
name ##CAMERA_VLAN##
!
vlan 2
name ##CLIENT_VLAN##
!
vlan 3
name ##SERVER_VLAN##
!
vlan 4
name ##MANAGEMENT_VLAN##
Create the SVI for MANAGEMENT ONLY:
interface vlan 4
description ## Vlan 4 ## MANAGEMENT ##
ip address 10.0.0.2 255.255.255.0 (this will be the address you can SSH or TELNET to for managing remotely)
no shut
Then finally the trunk and uplinks:
interface gi0/1
channel-group 1 mode active
interface gi0/2
channel-group 1 mode active
interface Port-channel1
description ## Portchannel to 4500 ## Po1 ##
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 1-4
switchport mode trunk
Not to forget the access ports!!!:
int fa0/1
description ## CAMERA ACCESS ##
switchport
switchport mode access
switchport access vlan 1
int fa0/2
description ## SERVER ACCESS ##
switchport
switchport mode access
switchport access vlan 2
int fa0/3
description ## CLIENT ACCESS ##
switchport
switchport mode access
switchport access vlan 3
(Same can be done on the 4500 if you wanted to have an access port in there...
We need to remember to put a default route on the 2960 so you can manage this device:
ip route 0.0.0.0 0.0.0.0 10.0.0.1
=============================================================================================
That should be it, I think I have covered all the configuration that you will need for this.
From your PC you should then be able to configure your devices on
10.0.0.1 (4500)
10.0.0.2 (2960)
You need to set a username and password on them before doing this.
Let me know if you have any more Q's, happy to help
Please rate any helpful posts, thank you
03-22-2013 05:57 PM
Did you manage to verify the VTP info?
Not yet. I'm configuring these from scratch. There are some configs on switches now but I'm going to do a write erase and start a new config. Will write erase give me a clean slate or am I missing another command? All switches are running IOS 12.2.
when you are connecting to more that one stack of 2960's for example one on floor 1 will be channel-group 1 mode active which will be your port-channel 1 interface.
and the one on floor 2 could be channel-group 2 mode active subsequently it will create port-channel 2
and 3 channel-group 3 mode active and so on...
I have 8 stacks of access switches with two 1GB uplinks each going to core. What's the max number of channel-groups, will it go up too 8?
VTP mode to transparent:
I did some research on VTP modes but still undecisive. Will continue to look into.
VTP Mode | Description |
---|---|
VTP Server | The default mode for all switches supporting VTP. You can create, modify, and delete VLANs and VTP servers advertise their VLAN configurations to other switches in the same VTP domain and synchronize their VLAN configurations with other switches based on advertisements received over trunk |
VTP Client | Behaves like a VTP server, but you cannot create, change, or delete VLANs on a VTP client. VLAN configurations are saved in NVRAM. |
VTP Transparent | Does not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received advertisements. However, they will forward VTP advertisements as they are received from other switches. You can create, modify, and delete VLANs on a switch in VTP transparent mode. VLAN configurations are saved in NVRAM, but they are not advertised to other switches. |
We need to remember to put a default route on the 2960 so you can manage this device:
ip route 0.0.0.0 0.0.0.0 10.0.0.1
On 2960 I should set up ip route 0.0.0.0 0.0.0.0 10.0.0.2 correct?
and 4506 do I need to set up ip route for management vlan or will just creating the SVI for vlan 4 be good?
Int fa 0/1
Switchport
Switchport mode access
Switchport access vlan 1
Spanning-tree portfast
So with this configuration command you explained earlier in thread, I won't need spanning-tree portfast anymore and why?
Thanks again Bilal!
03-23-2013 05:11 AM
If you want to factory reset a switch device you can do a 'write erase' however, this wont necessarily remove the vlans back to factory settings.
For that, you will need to delete a file in flash: called 'vlan.dat' - if you do a 'show flash' you should be able to see this file. This file contains the vlans that have been created on the switch.
To delete it, use the command delete flash:vlan.dat
Please see http://www.cisco.com/en/US/products/hw/switches/ps607/products_tech_note09186a00800c4546.shtml for more details.
With the 4500 you can do up to 64 etherchannels I think - in my production environment i have around 16, so you should be safe! And with the 2960's you will only be using one etherchannel per stack, so you will be fine with more than enough room to expand.
The limit is the number on physical interfaces in one etherchannel, so thats 8 physical ports combined in one etherchannel.
So all in all on the 4500 you will have a total of 8 etherchannels as I understand.
Using the VTP protocol is very handy if you have many vlans and a whole estate of switches. But in this case since you only have a total of 9 (1x 4500 & 8x 2960) in my opinion it's not worth the thought and risk.
The risk is, if you were to attach a switch to the network and it so happens to be in server mode, it could erase all vlans in your entire estate, and I have seen this happen in a live environment. This is my opinion on it anyway. Not sure if others would agree?
No. On the 2960 (since its not a router) you need to tell it that your default gateway is the 4500 because it will be hosting all the SVI's and will allow your pc to ssh to that address being routed.
So the IP route command will be: ip route 0.0.0.0 0.0.0.0 10.0.0.1
Just creating the SVI and enable ip routing will be enough on the 4500
Lastly, it was down to human error that I had missed out the spanning-tree portfast command. I must have forgotten it.
Links below tell you how to enable passwords and vty ssh access.
For SSH you need to put your device in a domain i.e.
ip domain-name xxxxx
then you need to generate a key for SSH encryption.
crypto generate key rsa
Then it will ask you what length/bit you want the key to be. I normally go for 1024 bit key but as long as you have one it will be encrypted.
After this is done you should enable ip ssh version 2 with the command:
ip ssh version 2
http://www.cisco.com/en/US/tech/tk583/tk617/technologies_tech_note09186a00800949e2.shtml
Hopefully I have covered all the configuration required in the attached...
Hope this helps!
Please rate any helpful posts, thank you
03-23-2013 11:24 AM
2960
interface gi0/1
channel-group 1 mode active
!
interface gi0/2
channel-group 1 mode active
I remember trying to set up etherchannel on 2960 a few weeks ago and when I got to 7th stack channel-group 7, it wouldn't take maxed out at 6?? Maybe I did something wrong.. I'll try again this week..
ip domain-name xxxxxxx
What name is recommended for ip domain-name xxxxxxxx is this similar to hostname?
Thanks for all your help I'll rate you top notch! Very useful information...
03-23-2013 12:07 PM
When you mean stack, I dont quite understand what you are saying here:
ruckessbx1 wrote:
I remember trying to set up etherchannel on 2960 a few weeks ago and when I got to 7th stack channel-group 7, it wouldn't take maxed out at 6?? Maybe I did something wrong.. I'll try again this week..
Was it the 4500 that had the limitation?
I know the stacking technology but I dont think there should have been anything stopping you from creating another etherchannel.
How did you have the physicals plugged in?
The ip domain-name xxxxxx is needed to enable SSH - can be anything really. I normally have the organisations domain. Its not the hostname.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide