07-13-2012 01:20 PM - edited 03-07-2019 07:45 AM
With Nikolay Karpyshev
Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about architecture and troubleshooting Access LAN Switches such as Cisco Catalyst 4500E, 3750-X, 3560-X, and 2960 with Cisco Expert Nikolay Karpyshev.
Nikolay Karpyshev is a Customer Support Engineer in the high touch technology support team (HTTS) at Cisco specialized in LAN Switching. Karpyshev supports the Cisco Switches Nexus 7000, Catalyst 6500, 3750, 3560, 4500, 2900, among others, and works as senior and escalation engineer. He was previously a part of Cisco Sales Associate program. He holds a specialist degree in Mathematics and Mechanics from Novosibirsk State University in Russia. Nikolay also holds these Cisco Certifications: CCNP, CCSP, and CCDP.
Remember to use the rating system to let Nikolay know if you have received an adequate response.
Nikolay might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Network Infrastructure sub-community discussion forum shortly after the event. This event lasts through July 27, 2012. Visit this forum often to view responses to your questions and the questions of other community members.
07-15-2012 02:56 AM
Hi Nikolay,
Are there any plans to release a 40 Gbps blade for the 4500E now that the technology is available for the Nexus 7K and 6500 range of switches?
Thanks
Sean
07-15-2012 06:08 PM
Hi Sean,
It is planned yes, but unfortunately I have no exact products or dates to share. Current fabric provides 48 G per slot so for 40G port we can provide only single non-blocking port. I guess it will come with next fabric to have at least 2 non-blocking 40G ports in same card.
Nik
07-15-2012 11:31 AM
Hi Nikolay,
This question has come up here several times, and we have had different dates from Cisco as to when and what IOS will support VSS for the 4500 series. So, can you provide us the latest on this?
Thanks,
Reza
07-15-2012 03:10 PM
when and what IOS will support VSS for the 4500 series.
Hi Reza,
I've seen a Cisco presentation that states that end of 2012 to mid-2013.
07-15-2012 03:15 PM
Hi Leo,
Thanks!
Do you know what version of software?
Reza
07-15-2012 05:51 PM
Hello Guys,
It is planned in new feature release 15.1(2)SG, XE 3.4.0SG along with ISSU. Unfortunately no exact date set and I agree with Leo that those should be in range end of 2012 to mid-2013. We just had one new release XE 3.3.0SG, 15.1(1)SG on CCO.
Nik
07-15-2012 09:28 PM
Do you know what version of software?
Sorry Reza, I ain't THAT good.
Nik's probably the best source.
I'm suspecting it could be a 4.X.X IOS number.
Alot of people who's purchased the Sup7E and the 4500X would be keen to know the release date.
07-16-2012 02:12 AM
Hi Nik,
I have another future release question.
When searching for an IOS for the 4510 I couldn't find any that supported OSPFv3 authentication with IPSEC.
Did I miss one or is this a feature that will be released in the future? If so do you have a timeframe?
Thanks
Sean
07-16-2012 04:10 AM
Hi Sean,
It is supported from the latest feature release
it links to the following config guide:
http://www.cisco.com/en/US/docs/ios/ipv6/configuration/guide/ip6-ospf.html#wp1069880
Feature is also listed now under the release notes for this Feature release:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/release/note/OL_26675-01.html#wp2530114
HTH
Nik
07-16-2012 06:51 AM
Hi Nikolay,
We work on a huge LAN, and one of the responsibilities I have is port security.
If I go through one of our switches and any port isn't connected my job is to shut it down.
Currently I use #sh int count to verify that nothing is on that port, and it is safe to shut down with interfering with a user, (who just happens to have their computer off)
The problem I am running into is that I have not found a proficient way for me to see only ports that have 0s only on their In and Out packet count.
The pipe command hasn't proved to be very useful in this case, and I was just hoping for a very practical tip in this.
Thank you
V/r
Chai
07-16-2012 07:27 AM
Hello Chai,
Not sure if I understood your question correctly but I think you need a command which will show you only the interfaces with 0 In and Out packets.
Well pipe should be working here. The only thing is to build the best expression for it. After pipe you can use different regular expressions. See more about it here:
I was just playing in my lab and came with the following one which match 0 in the middle coulmns of "show int counter":
sh int count | i _0_.|In|Out
it gives smth like:
HTTS-VSS#sh int count | i _0_.|In|Out
Port InOctets InUcastPkts InMcastPkts InBcastPkts
Te1/1/1 0 0 0 0
Te1/1/2 0 0 0 0
Te1/1/3 0 0 0 0
Te1/1/4 0 0 0 0
Gi2/2/1 0 0 0 0
Gi2/2/2 0 0 0 0
Gi2/2/3 0 0 0 0
Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
Te1/1/1 0 0 0 0
Te1/1/2 0 0 0 0
Te1/1/3 0 0 0 0
Te1/1/4 0 0 0 0
Gi2/2/1 0 0 0 0
Gi2/2/2 0 0 0 0
Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
Gi2/2/3 2013885 0 4840 0
It is at least excluding interfaces which had 0 only in last column. You can play with expression to build your own which matching your needs better.
Nik
07-16-2012 07:38 AM
That's perfect thank you!
V/r
Chai
07-17-2012 12:02 AM
Hi Nikolay
.
I have some problem with my cisco asa 8.2. I have to know how shoud i connect 2 inside interfaces. I am writing what i have.
I have 5 network connection on Cisco ASA.
1. Interface Ethernet 0/0 - outside 200.200.200.200 255.255.255.240
2. Interface Ethernet 0/1 - 1_firm 10.0.1.1 255.255.255.0
3. Interface Ethernet 0/2 - 2_firm 192.168.1.1 255.255.255.0
4. Interface Ethernet 0/3 - DMZ-Server 10.10.10.1 255.255.255.0 (Just one Server)
5. Management - no need
I have to connect 2 Interfaces, (1_firm) with Interface (2_firm). I've tried
route 1_firm 192.168.1.0 255.255.255.0 10.0.1.1 ,
but i resiving following error "Cannot add route,connected route exists".
But i have no route configuration. What i have cheking? Or maked i some wrong?
Thanks for your help
07-17-2012 12:19 AM
Hi Elguen,
Basically you will not be able to add static route for this subnet because you have alredy that network configured on the interface Ethernet0/2. This automatically adding that route as connected to the routing table.
I'm not the expert in ASA thus might not be the best resource to answer you in more details. I recomend you to open you query in our Security forum:
https://supportforums.cisco.com/community/netpro/security/firewall
HTH
Nik
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide