07-29-2019 07:21 AM
I tried to use ports not in suppervisor modules for HSRP peers of two 4507r+e switches and could not bring the ports up. can you tell me why? do i have to use ports on the sups.
please provide docs if possible. i could not find any.
thanks,
Alison
07-29-2019 08:24 AM
07-29-2019 08:26 AM - edited 07-29-2019 08:27 AM
You should not see any issue here using other ports, can you post show version and configuration to review.
would be nice to see logs.
07-29-2019 08:51 AM
here is the config on A switch. the B is the same with .3 address.
interface Vlan201
description 2nd FLOOR
ip address 10.80.4.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 201 ip 10.80.4.1
standby 201 priority 110
standby 201 preempt
standby 201 authentication H$h$rP
!
interface Vlan202
description 2nd FLOOR
ip address 10.80.5.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 202 ip 10.80.5.1
standby 202 priority 110
standby 202 preempt
standby 202 authentication H$h$rP
!
interface Vlan203
description 2nd FLOOR
ip address 10.80.6.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 206 ip 10.80.6.1
standby 206 priority 110
standby 206 preempt
standby 206 authentication H$h$rP
!
interface Vlan205
description Controllers & APs
ip address 10.80.25.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 205 ip 10.80.25.1
standby 205 priority 110
standby 205 preempt
standby 205 authentication H$h$rP
!
interface Vlan210
description NET-CLIENT_TEST_01-10.82.255.0/26
ip address 10.82.255.2 255.255.255.192
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 210 ip 10.82.255.1
standby 210 priority 110
standby 210 preempt
standby 210 authentication H$h$rP
!
interface Vlan599
description VC UNITS
ip address 10.80.99.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 99 ip 10.80.99.1
standby 99 priority 110
standby 99 preempt
standby 99 authentication H$h$rP
!
interface Vlan900
description Interswitch VLAN
ip address 10.80.19.53 255.255.255.252
!
interface Vlan1201
description FL2-WESTSIDE-VOIP
ip address 10.80.104.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 104 ip 10.80.104.1
standby 104 priority 110
standby 104 preempt
standby 104 authentication H$h$rP
!
interface Vlan1202
description FL2-EASTSIDE-VOIP
ip address 10.80.105.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 105 ip 10.80.105.1
standby 105 priority 110
standby 105 preempt
standby 105 authentication H$h$rP
!
interface Vlan3909
description L3 Link To 7018-A e17/5
bandwidth 10000000
ip address 10.80.19.18 255.255.255.252
!
interface Vlan3910
description L3 Link To 7018-B e17/5
bandwidth 10000000
ip address 10.80.19.22 255.255.255.252
!
interface Vlan3999
no ip address
shutdown
!
!
router eigrp 2
network 10.0.0.0
passive-interface Vlan201
passive-interface Vlan202
passive-interface Vlan203
passive-interface Vlan1201
passive-interface Vlan1202
passive-interface Vlan599
passive-interface Vlan210
passive-interface Vlan205
eigrp stub connected summary
!
interswitch port:
interface GigabitEthernet5/5
switchport trunk native vlan 99
switchport trunk allowed vlan 201-203,205,210,599,900,1201,1202
switchport mode trunk
US-NYME1-S4507-2A#show ver
Cisco IOS Software, Catalyst 4500 L3 Switch Software (cat4500e-IPBASEK9-M), Version 15.1(2)SG1, RELEASE SOFTWARE (fc3)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Tue 23-Jul-13 08:08 by prod_rel_team
ROM: 12.2(44r)SG10
US-NYME1-S4507-2A uptime is 5 years, 43 weeks, 4 days, 12 hours, 37 minutes
Uptime for this control processor is 2 years, 10 weeks, 13 hours, 46 minutes
System returned to ROM by SSO Switchover
System restarted at 21:37:46 EDT Fri May 19 2017
System image file is "bootflash:cat4500e-ipbasek9-mz.151-2.SG1.bin"
Darkside Revision 4, Nexu Revision 12, Fortooine Revision 1.40
Last reload reason: Reload command
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
cisco WS-C4507R+E (MPC8548) processor (revision 12) with 524288K bytes of memory.
Processor board ID FXS1651Q35X
MPC8548 CPU at 1GHz, Supervisor 6L-E
Last reset from Reload
13 Virtual Ethernet interfaces
248 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
511K bytes of non-volatile configuration memory.
Configuration register is 0x2102
US-NYME1-S4507-2A#
07-29-2019 08:51 AM
here is the config on A switch. the B is the same with .3 address.
interface Vlan201
description 2nd FLOOR
ip address 10.80.4.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 201 ip 10.80.4.1
standby 201 priority 110
standby 201 preempt
standby 201 authentication H$h$rP
!
interface Vlan202
description 2nd FLOOR
ip address 10.80.5.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 202 ip 10.80.5.1
standby 202 priority 110
standby 202 preempt
standby 202 authentication H$h$rP
!
interface Vlan203
description 2nd FLOOR
ip address 10.80.6.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 206 ip 10.80.6.1
standby 206 priority 110
standby 206 preempt
standby 206 authentication H$h$rP
!
interface Vlan205
description Controllers & APs
ip address 10.80.25.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 205 ip 10.80.25.1
standby 205 priority 110
standby 205 preempt
standby 205 authentication H$h$rP
!
interface Vlan210
description NET-CLIENT_TEST_01-10.82.255.0/26
ip address 10.82.255.2 255.255.255.192
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 210 ip 10.82.255.1
standby 210 priority 110
standby 210 preempt
standby 210 authentication H$h$rP
!
interface Vlan599
description VC UNITS
ip address 10.80.99.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 99 ip 10.80.99.1
standby 99 priority 110
standby 99 preempt
standby 99 authentication H$h$rP
!
interface Vlan900
description Interswitch VLAN
ip address 10.80.19.53 255.255.255.252
!
interface Vlan1201
description FL2-WESTSIDE-VOIP
ip address 10.80.104.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 104 ip 10.80.104.1
standby 104 priority 110
standby 104 preempt
standby 104 authentication H$h$rP
!
interface Vlan1202
description FL2-EASTSIDE-VOIP
ip address 10.80.105.2 255.255.255.0
ip helper-address 10.80.13.22
ip helper-address 10.80.13.21
ip helper-address 10.18.6.23
ip helper-address 10.18.6.27
standby 105 ip 10.80.105.1
standby 105 priority 110
standby 105 preempt
standby 105 authentication H$h$rP
!
interface Vlan3909
description L3 Link To 7018-A e17/5
bandwidth 10000000
ip address 10.80.19.18 255.255.255.252
!
interface Vlan3910
description L3 Link To 7018-B e17/5
bandwidth 10000000
ip address 10.80.19.22 255.255.255.252
!
interface Vlan3999
no ip address
shutdown
!
!
router eigrp 2
network 10.0.0.0
passive-interface Vlan201
passive-interface Vlan202
passive-interface Vlan203
passive-interface Vlan1201
passive-interface Vlan1202
passive-interface Vlan599
passive-interface Vlan210
passive-interface Vlan205
eigrp stub connected summary
!
interswitch port:
interface GigabitEthernet5/5
switchport trunk native vlan 99
switchport trunk allowed vlan 201-203,205,210,599,900,1201,1202
switchport mode trunk
US-NYME1-S4507-2A#show ver
Cisco IOS Software, Catalyst 4500 L3 Switch Software (cat4500e-IPBASEK9-M), Version 15.1(2)SG1, RELEASE SOFTWARE (fc3)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Tue 23-Jul-13 08:08 by prod_rel_team
ROM: 12.2(44r)SG10
US-NYME1-S4507-2A uptime is 5 years, 43 weeks, 4 days, 12 hours, 37 minutes
Uptime for this control processor is 2 years, 10 weeks, 13 hours, 46 minutes
System returned to ROM by SSO Switchover
System restarted at 21:37:46 EDT Fri May 19 2017
System image file is "bootflash:cat4500e-ipbasek9-mz.151-2.SG1.bin"
Darkside Revision 4, Nexu Revision 12, Fortooine Revision 1.40
Last reload reason: Reload command
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
cisco WS-C4507R+E (MPC8548) processor (revision 12) with 524288K bytes of memory.
Processor board ID FXS1651Q35X
MPC8548 CPU at 1GHz, Supervisor 6L-E
Last reset from Reload
13 Virtual Ethernet interfaces
248 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
511K bytes of non-volatile configuration memory.
Configuration register is 0x2102
US-NYME1-S4507-2A#
07-30-2019 12:08 AM
07-30-2019 07:29 AM
During my change on Saturday, i tried to use g5/5 (WS-X4548-GB-RJ45V) on both switches, but could not bring them up, i tried to change cables and another port g7/20, nothing worked. Both ports were shown down and down. So I changed to T4/1 which was one of the sup ports, than it worked. The currect state is good with port T4/1s as trunk ports on both side. HSRP configuration is not issue.
I was wandering why the HSRP peers could not be brought up using non sup ports.
Do you have a live network with HSRP configured using non-sup ports?
thanks,
07-30-2019 07:39 AM
07-30-2019 08:12 AM
07-30-2019 09:02 AM
thank you for confirming. i will setup a lab to test it.
Alison
07-30-2019 08:14 AM
what does "the layer 2 setup is not being blocked inpath between the devices" mean?
thanks,
Alison
07-30-2019 08:47 AM
07-30-2019 09:39 AM
it is very helpful, Mark. i will check them out after i make sure the physical is up.
i think i might figure out why the ports showed dead. Now I remeber we did have spanning-tree bpdugard enable in global. I think the peer ports could be err-disabled as soon as I connected them. Even though i disable bpdugard, but the interfaces were disabled, i think...
thanks,
07-30-2019 11:16 AM
07-30-2019 09:40 AM
it is very helpful, Mark. i will check them out after i make sure the physical is up.
i think i might figure out why the ports showed dead. Now I remeber we did have spanning-tree bpdugard enable in global. I think the peer ports could be err-disabled as soon as I connected them. Even though i disable bpdugard, but the interfaces were disabled, i think...
thanks,
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide