Thanks for the response, might be able to after hours. But the strange thing is, i have to WC at my site, WC1 has computer connected and they auth no issues, its just WC2 that is giving these auth errors and they both point to the same Radius and LDAP/DHC. I am thinking about rebooting the WC after hours but not sure if that will help.
... View more
I have some 6500 switches and would like to set up an isolation vlan, where ports on this vlan can only talk to a few servers on my network and unable to talk to anything else on the vlan or my network. Is this possible on the switch level and if so how could i restrict access to a vlan to say 3 servers only? Thanks
... View more
Thx, is the Sup32 card IOS what i need if i want to upgrade the IOS on my switch, there are so many choices to pick from on the Cisco site, I just wanted to make sure that is the main IOS that controls the switch and the feautres suchs as MAC traps, etc that the switch can be configured to do.
... View more
I need to upgrade my IOS since my current IOS on this switch doesnt support MAC Traps. The folloing is information off my switch as it stands today. IOS (tm) s3223_rp Software (s3223_rp-ADVIPSERVICESK9_WAN-VM), Version 12.2(18)SX F10, RELEASE SOFTWARE (fc1) ROM: System Bootstrap, Version 12.2(17r)SX3, RELEASE SOFTWARE (fc1) Supervisor Engine 32 8GE (Active) WS-SUP32-GE-3B cisco WS-C6509-E (R7000) processor (revision 1.4) with 491520K/32768K bytes of memory __________________-- When i goto the Cisco website i goto the following: Downloads Home ProductsSwitchesCampus LAN Switches - Core and DistributionCatalyst 6500 Series SwitchesCatalyst 6509-E Switch ..... Seleced ->Catalyst 6500 Supervisor Engine 32 the IOS ROMMON Software from the choices below. Select a Software Type: CatOS ROMMON / CatOS Software / IOS ROMMON Software Catalyst 6000 SUP32 ROMMON image Version 12.2(18r)SX9 --upgradable portion c6ksup32-rm2.srec.122-18r.SX9 30 May2008 Is this correct ISO upgrade? Cisco hasnt put out an update since 2008? Thanks
... View more
Thanks for the info, guess i will move forward with update of the IOS. Its been a while since i have done an IOS upgrade, on the cisco site would i grab the Cat 6500 Supervisor Engine 32? It looks like the latest ISO here is from 30 may 2008.
... View more
I have a few 65xx and having some issues with getting "snmp traps mac-note change add/remove:on the ports On my switch running IOS v12.2(33) SXH1 / ROM V12.2(17r) SX 3 i can enter the added/removed command on a range of ports no issues. On my swithces running IOS V12.2 (18) SXF10 / ROM V12.2(17r) SX 3 i am unable, only commands is Link-Status when i enter ? I am guessing this is due to the ISO version being different on the switches, is there a way to enable traps on the ports (snmp traps mac-note change added/remove) like on the other switch without having to upgrade the IOS?
... View more
Rick, thanks for the response and sorry for the confusion. I meant to add it to my existing config. So if I understand you correctly, I should just add the following to my existing config with is currently set up for AD/Radius: aaa authentication login default group radius local username SSHUser priv 15 sec SSHUser <- create the new local user account) and this would allow me to have both AD/Radius and local auth for SSH access correct? I am just trying to confirm the CLI for what I would need to add to my current setup to allow both AD/radius & local log in.
... View more
The switch currently has the following config: aaa auth login defualt group radius aaa auth login console line aaa auth enable default enable aaa auth default group radius aaa auth exe console none radius-server host 10.x.x.x auth-post xxxx acc-post xxxx key FAxxxxx. I didnt know if i could just add the following to my switch and it would allow both AD and local logins or if entering the following CLI would break my AD/Raduis. aaa new-model aaa authentication login default local enable username jdoe privilege 15 password cisco line vty 0 4 login local
... View more
Thanks for the reply. So would i just do the normal local config for the local account if i set it up to verify local first then AD? aaa new-model aaa authentication login default local enable username jdoe privilege 15 password cisco line vty 0 4 login local
... View more
I spoke to my NAC vendor, they want a Lay3 private vlan, they want the vlan to talk with the NAC appliance, so i can put that NAC IP in for the SVI. So do i create a normal Lay2 vlan with the NAV IP, how do i make this private vlan so i cannot talk to my network or to the internet? Thanks
... View more
Hello I have a few Cisco switchs at my site, 37xx and 65xx's and they all auth to my network AD for access. I want to set up a local SSH account with Priv 15 on the switches as well for local log in incase AD is down or if for some reason the switch is unable to access my AD. My question is how do I create this local account for SSH Priv15 without affecting the AD authification? Thanks
... View more
Thanks for the feedback. Yes, overall that is what I am trying to do, I don't want anything that get put on this new isolated vlan to communicate with anything on my existing vlans. So are you saying I should just create a new L2 vlan and not configure the vlan interface (which is at L3) for this new vlan so I cannot communicate with any of my existing vlans therefore isolating the new vlan? thanks
... View more
Hello I have many Cisco switches 65xx, 37xx at my company with a lot of vlans already configured. I need to create a new isolation vlan that will not be able to communicate with my other existing vlans. We are setting up a NAC solution at my company and we want a vlan that we can send ports to if the computer or device is compromised and cannot talk or risk the existing network (other vlans). What is the best method to make this happen? I have created VLANs in the past but this is my first dealing with private/isolated vlans and would be grateful for any guidance on how I should implement this.
... View more