cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2913
Views
0
Helpful
3
Replies

C3850-NM-1G port does not light up

robert.meany1
Level 1
Level 1

I have a known working SFP and C3850-NM-1G, known working connection..  We recently installed the new 3850 switch as our core at one of our buildings to replace a 3750.  When connecting the SFP, I am not getting a connection light on the port.  We installed another identical 3850 switch, which I tried the module in and had the same issue.  There was a pre-existing 3850 switch of the same model, which I then tried the NM in and the port lights up fine.  

The only difference I can think of between the pre-existing 3850 switch and the two newly installed ones is the pre-existing switch is running firmware 03.02.03SE while the new switches I upgraded the firmware to 03.06.06E to alleviate an issue with packets getting dropped during inter-vlan routing.

running-config on one of the non-working switches:


!
! Last configuration change at 20:11:32 EST Thu Mar 9 2017 by naugyadmin
! NVRAM config last updated at 20:11:33 EST Thu Mar 9 2017 by naugyadmin
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
service compress-config
service unsupported-transceiver
!
hostname wes-mdf-3850-01
!
boot-start-marker
boot system switch all flash:/running-packages.conf
boot-end-marker
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 5 $1$ySE6$LqxbH6KhiSf3TLAeGFZlk0
!
username naugyadmin privilege 15 password 7 13213F313B18073A727D6378
aaa new-model
!
!
aaa authorization exec default local
aaa authorization network default local
!
!
!
!
!
!
aaa session-id common
clock timezone EST -5 0
clock summer-time EDT recurring
switch 1 provision ws-c3850-48p
!
!
!
!
!
!
ip dhcp excluded-address 10.55.0.1 10.55.0.25
ip dhcp excluded-address 10.55.100.1 10.55.100.25
ip dhcp excluded-address 10.55.250.1 10.55.250.25
ip dhcp excluded-address 10.55.9.1 10.55.9.50
!
!
qos wireless-default-untrust
qos queue-softmax-multiplier 100
!
crypto pki trustpoint TP-self-signed-824874578
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-824874578
revocation-check none
rsakeypair TP-self-signed-824874578
!
!
crypto pki certificate chain TP-self-signed-824874578
certificate self-signed 02
30820245 308201AE A0030201 02020102 300D0609 2A864886 F70D0101 04050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 38323438 37343537 38301E17 0D313730 33303930 39353334
355A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3832 34383734
35373830 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
99E6F468 8CA161F7 18BAE579 0E0D6A91 5C86D7F1 8579FFB0 95F0D22E 381F614D
949410A6 12664956 70E9B6EF D7D0A217 4A5B11A5 B76DC9E1 D352545E 70DCB63F
801A3F53 A541C46E 81436DAD 2BDCE160 10789CCC 5151EFAB 7F03F77A 48EED0D6
45F1BA92 36DC5553 B11E0CBF 5E94E407 D5314981 FA705570 B51BDDC6 8F8ECC21
02030100 01A36F30 6D300F06 03551D13 0101FF04 05300301 01FF301A 0603551D
11041330 11820F77 65732D6D 64662D33 3835302D 3031301F 0603551D 23041830
16801419 C3FFCFD7 A9B6CD54 46BF7EEC 0D5580F5 82A49630 1D060355 1D0E0416
041419C3 FFCFD7A9 B6CD5446 BF7EEC0D 5580F582 A496300D 06092A86 4886F70D
01010405 00038181 0050C1B8 17B021A1 3020C925 41172E3A 22A572C2 9D96421B
ECF6B3DE 6F11D331 4C777C80 7B755543 E9A523E1 D4FA4C68 1D59EDFB 4239FD00
DF496247 BB2CC7E5 3F41612E E06CC723 AF74705D D1B0EC3B 0FFFB640 188BB2A5
162AF421 9C16F938 8BF91B8C F6A23299 A93D43E5 F4BFBAB5 5E6CB308 C148DAA8
486DC5D7 8679BA9B 55
quit
no errdisable detect cause gbic-invalid
diagnostic bootup level minimal
!
spanning-tree mode pvst
spanning-tree extend system-id
spanning-tree vlan 1-1024 priority 4096
hw-switch switch 1 logging onboard message level 3
!
redundancy
mode sso
!
!
!
class-map match-any non-client-nrt-class
!
!
!
!
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
no ip route-cache
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/2
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/3
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/4
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/5
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/6
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/7
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/8
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/9
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/10
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/11
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/12
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/13
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/14
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/15
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/16
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/17
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/18
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/19
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/20
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/21
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/22
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/23
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/24
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/25
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/26
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/27
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/28
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/29
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/30
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/31
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/32
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/33
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/34
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/35
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/36
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/37
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/38
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/39
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/40
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/41
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/42
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/43
switchport access vlan 300
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/44
description < Comcast Edgewater >
switchport access vlan 309
switchport mode access
snmp trap mac-notification change added
snmp trap mac-notification change removed
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/45
description < Downlink >
switchport mode trunk
!
interface GigabitEthernet1/0/46
description < Downlink >
switchport mode trunk
!
interface GigabitEthernet1/0/47
description < Downlink >
switchport mode trunk
!
interface GigabitEthernet1/0/48
description < Downlink >
switchport mode trunk
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
description < Link to High School - ATT >
switchport access vlan 903
switchport mode access
switchport nonegotiate
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface Vlan1
no ip address
no ip route-cache
shutdown
!
interface Vlan200
ip address 10.55.200.13 255.255.255.0
no ip route-cache
!
ip default-gateway 10.55.200.1
ip forward-protocol nd
ip http server
ip http authentication aaa
ip http secure-server
!
!
access-list 50 permit 10.1.10.2
access-list 50 permit 10.100.20.29
access-list 50 deny any
!
snmp-server community ***** RO
snmp-server community ***** RW 50
snmp-server enable traps snmp coldstart warmstart
snmp-server enable traps license
snmp-server enable traps mac-notification change move threshold
snmp-server host 10.1.10.2 *****
snmp-server host 10.100.20.29 ******
!
!
!
!
line con 0
logging synchronous
stopbits 1
line aux 0
stopbits 1
line vty 0 4
transport input ssh
line vty 5 15
!
ntp server 10.100.20.2
wsma agent exec
profile httplistener
profile httpslistener
!
wsma agent config
profile httplistener
profile httpslistener
!
wsma agent filesys
profile httplistener
profile httpslistener
!
wsma agent notify
profile httplistener
profile httpslistener
!
!
wsma profile listener httplistener
transport http
!
wsma profile listener httpslistener
transport https
!
ap dot11 24ghz rrm channel dca add 1
ap dot11 24ghz rrm channel dca add 6
ap dot11 24ghz rrm channel dca add 11
ap dot11 5ghz rrm channel dca add 36
ap dot11 5ghz rrm channel dca add 40
ap dot11 5ghz rrm channel dca add 44
ap dot11 5ghz rrm channel dca add 48
ap dot11 5ghz rrm channel dca add 52
ap dot11 5ghz rrm channel dca add 56
ap dot11 5ghz rrm channel dca add 60
ap dot11 5ghz rrm channel dca add 64
ap dot11 5ghz rrm channel dca add 149
ap dot11 5ghz rrm channel dca add 153
ap dot11 5ghz rrm channel dca add 157
ap dot11 5ghz rrm channel dca add 161
ap group default-group
end

I don't have output from sho inv because the NM is no longer installed, but when I did run it, it had detected the NM and the SFP correctly and said they were installed and running.  The ports were *not* in err-disable state.  It was just not detecting that the fiber was connected for some reason...

I tested the SFP in other ports as well, that were *not* configured with nonegotiate and that made no difference.

3 Replies 3

Hi

It could be a compatibility problem, please verify your if your module is compatible with your switch, also check the internal pins in order to see if they are not a hardware damage:

Table 2.       Network Module Numbers and Descriptions

Product Number

Product Description

WS-C3850-24XU

WS-C3850-12X48U

WS-C3850-12XS

WS-C3850-24XS

C3850-NM-4-1G

4 x Gigabit Ethernet network modules

Supported

Not supported

C3850-NM-2-10G

4 x Gigabit Ethernet/2 x 10 Gigabit Ethernet network modules

Supported

Not supported

C3850-NM-4-10G

4 x Gigabit Ethernet/4 x 10 Gigabit Ethernet network modules

Supported

Supported

C3850-NM-8-10G

8 x Gigabit Ethernet/8 x 10 Gigabit Ethernet network modules

Supported

See note

C3850-NM-2-40G

2 x 40 Gigabit Ethernet network modules

Supported

See note

Table 3.       Network Module Compatibility Matrix

Models

Network Modules

WS-C3850-24T

C3850-NM-4-1G, C3850-NM-2-10G

WS-C3850-48T

C3850-NM-4-1G, C3850-NM-2-10G, C3850-NM-4-10G

WS-C3850-24P

C3850-NM-4-1G, C3850-NM-2-10G

WS-C3850-48P

C3850-NM-4-1G, C3850-NM-2-10G, C3850-NM-4-10G

WS-C3850-48F

C3850-NM-4-1G, C3850-NM-2-10G, C3850-NM-4-10G

WS-C3850-24U

C3850-NM-4-1G, C3850-NM-2-10G

WS-C3850-48U

C3850-NM-4-1G, C3850-NM-2-10G, C3850-NM-4-10G

WS-C3850-24XU

C3850-NM-4-1G, C3850-NM-2-10G, C3850-NM-4-10G, C3850-NM-8-10G, C3850-NM-2-40G

WS-C3850-12X48U

C3850-NM-4-1G, C3850-NM-2-10G, C3850-NM-4-10G, C3850-NM-8-10G, C3850-NM-2-40G

WS-C3850-12S

C3850-NM-4-1G, C3850-NM-2-10G

WS-C3850-24S

C3850-NM-4-1G, C3850-NM-2-10G

WS-C3850-12XS

C3850-NM-4-10G

WS-C3850-24XS

C3850-NM-4-10G, C3850-NM-8-10G, C3850-NM-2-40G

WS-C3850-48XS

None

Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-3850-series-switches/data_sheet_c78-720918.html

Please rate the comment if it is useful

:-)




>> Marcar como útil o contestado, si la respuesta resolvió la duda, esto ayuda a futuras consultas de otros miembros de la comunidad. <<

It is compatible..  

Turns out I had to set 'speed nonegotiate' on the interface  .. The device the fiber is connected to on the other end I do not have access to, so I am not sure why speed nonegotiate on the interface is required, but it worked.

Good to know Robert, thanks. 




>> Marcar como útil o contestado, si la respuesta resolvió la duda, esto ayuda a futuras consultas de otros miembros de la comunidad. <<
Review Cisco Networking for a $25 gift card