Forum,
I am working at a client site today and am configuring some new 3850 switches that they have purchased.
I am currently configuring a 48 port switch, which to no surprise, has 48 physical RJ45 ports on the front of the switch.
On CLI, I see these ports as G1/0/1 thru G1/0/48.
Here's the twist... there is also a G0/0 interface! Here is what it looks like natively:
LOUSERSWT#sho run int G0/0 Building configuration...
Current configuration : 94 bytes ! interface GigabitEthernet0/0 vrf forwarding Mgmt-vrf no ip address negotiation auto end
I was curious as to what spefically this interface is used for?
Thanks in advance..
Kevin
... View more
Forum,
I was working at a client site today and I came across what looks to me as a very unusual configuration on a switch port.
Typically we do not see switch ports which are configured both as a trunk port and an access port.
In all actuality, I would say this is an illegal configuration, but the switch allows it. See the configuration below:
interface GigabitEthernet1/0/2 description LA WiFi switchport access vlan 34 switchport trunk encapsulation dot1q switchport trunk native vlan 34 switchport mode trunk speed 100 duplex full spanning-tree portfast
I am not sure exactly how this configuration would even work. I brought it to the customers attention, and the customer response was that it functions as an access port.
Is this configuration legal?
Thanks for any comments or input here...
Kevin
... View more
Forum,
I watched a Meraki product launch Webcast earlier today. One of the new access points to be available soon will have a 4th radio in it, which is a bluetooth radio.
Can someone provide a real life scenario where a bluetooth radio would be needed in a Wireless Access Point?
Thank You,
Kevin
... View more
Paul
I do like your answer "The default metric (weights) is a catch all - meaning the value you specify here is the default for the entire eigrp routing process".
Catch-all is the takeaway here.
thanks for your response.
... View more
As I am preparing to recertify my CCNP, and am preparing for the route exam, a question came up.
IF a routing protocol, for example OSPF, is redistributed into EIGRP, the metric is defined after "redistribute ospf <process ID>" is configured in the EIGRP AS.
But there is also a "default-metric" command.
Can someone explain why both exist as configurable options in EIGRP?
Thank You.
... View more
Forum I wanted to determine if there was an IOS command that could be run in order to view the configured tcp window size on a router. I know the command to change the window size, but do not know how to look at what the window size is set to... Thank You!
... View more
Team I was early performing a "sho env" on a Cat 6506 and i see certain values entitled "CFM". Here is an example: chassis per slot cooling capacity: 94 cfm ambient temperature: < 55C module 1 cooling requirement: 84 cfm module 2 cooling requirement: 84 cfm module 3 cooling requirement: 70 cfm module 4 cooling requirement: 70 cfm module 5 cooling requirement: 35 cfm module 6 cooling requirement: 70 cfm what does the "cfm" stand for / represent in this context?.. Thank You.
... View more
Forum I am working on an NTP project at a client site today. I have been using NTP authentication with trusted Keys. I seem to be having success, but quite frankly, I am unable to tell. when I perform a sho ntp status, I see the clocks syncing to the Masters. What I do not know is: How can NTP authentication be verified? I would like to verify whether or not the clients are using the trusted keys. Is there a way to accomplish this? Thank You
... View more
Forum I wanted to get some insight on the difference between Transform sets being used in IPSEC tunnels vs. the IKE policies themselves. It gets a bit confusing trying to keep both separate in understanding, especially since the transform sets seem to use some of the same values that the IKE policies do. Here is an example of what I am talking about: Lets say I create the following IKE policy: Lifetime 86400 Hash SHA1 Encryption: 3DES Authentication: Preshare Group : 2 Then on to the Transform set: crypto IPsec transform set MYSET esp-3DES esp-MD5-hmac My questions are these: 1. what is the transform set transforming specifically? 2. Is it correct to say that the Transfrom set, in addition to the IKE policy, uses 3DES encryption. 3. What are the differences between the transform set and the IKE policy? Thank You
... View more
Jon Nice to hear from You. I figured out last Friday that this is exactly what I need to do. I am simply moving the gateway to the ASA interface. Hope you are well! Kevin
... View more
Forum I am at a client site today where I am tasked with separating a specific VLAN's traffic away from all the other traffic. It is for VLAN 33 which is our PCI scope traffic. The client uses a 4506 with a Sup II plus, which I just found out from Cisco TAC does not support PBR. The current configuration consists of a switch fabric with 25 switches and approximately 50 Vlans which all route back to the Core 4506. It is the router on a stick model, wherein each VLAN for example VLAN 5 has an L3 Gateway of 192.168.5.1 on the Core box, and that is the GW for everything in VLAN 5. All Vlans route back to the Core. Leaving Core and heading towards the Internet Edge, we pass thru a Cisco IPS 4240, then thru an ASA 5515x, and then a Border Router. I have a separate Interface Pair on the IPS for the VLAN 33 PCI traffic, and also had a separate interface on the ASA for it as well. I am not sure now how to ship the vlan 33 traffic off of Core to the Edge without PBR being supported here. Any recommendations would be welcome. Thank You in advance.
... View more
Hi David So does that mean that I will have to not have a Security level on the physical? Is this like the IP address being on a subinterface and therefore IP's are not tacked up to the physical? Also is it an option to have several sub-interfaces with the same security level of 100? I ask this because these will all be inside interfaces for different vlans... Thank You!
... View more
Forum I am working for a client today whom has a legacy ASA 5510 platform. I am configuring sub interfaces on the interfaces on the appliance. Do the subinterfaces that I create inheret the security level of the parent physical interface? In other words, if I have G0/2 physical interface on the ASA set to a security level of 99, will all of the subinterfaces underneath of that physical interface inheret the security level configured on the physical interface? Thank You!
... View more