Generate SSH Keys before :
crypto key generate rsa general-keys modulus 1024
Run the Software install for the new firmware
software install file flash:/cat3k_caa-universalk9.16.12.07.SPA.bin switch 1-2 verbose new force
loading...
loading...
Generate SSH Keys before :
crypto key generate rsa general-keys modulus 1024
Run the Software install for the new firmware
software install file flash:/cat3k_caa-universalk9.16.12.07.SPA.bin switch 1-2 verbose new force
Recently I was trying to setup an LAG LCAP bond between a SG500X Cisco Stack and a HP Procurve Aruba Stack.
HP
trunk 1/A1 trk2 trunk lacp
Upon plugging the ports in , the Cisco Port Light would go Active and start flashing , the HP Port would briefly go sold on the Mode light for 2-3 Seconds then go Off
Status of both ports in config were both Off ( even though the Cisco port light was flashing )
After much trial and error , messing with STP and LAG settings , we moved to another port and it worked straight off , so it was a Dud port Cisco END!
Problem Description:
UCS-FI-M-6324
UCSM:Package-Vers: 3.1(3a)A
Action Taken:
+ Tried changing the power cap policy from Chassis level to blade level and back to chassis level, fault did not clear.
Rebooted FI-IOM B, all faults are cleared.
Recently I had to tag some Access points to a new Vlan on a Cisco switch , the cisco support website is the worst readability so notes for future reference
Find the Port of the Access point by getting the Mac address then listing all the Macs on the switch via
show mac address-table
Ok next we change the port from an access port on the default Vlan ( 1 ) to a trunk to it can carry multiple Vlans in this case 1,5. Warning this will drop the network device for a few pings
conf t
int gi1/0/21
Switchport mode trunk
Switchport trunk allowed vlan 1,5
If it doesn’t work you can always wipe the config via
default interface gi1/0/21
switchport access vlan
Go to Security Appliance then Addressing & VLANs
Next setup the Subnet ID ( Number ) for your Vlans and the Address of the Router in each Vlan
Next Change the Uplink to the Switch to a VLAN and set the Native Vlan ( this is the default usually 1 ) and the other Vlans which will pass down this trunk. The Native VLAN will need to be the same on both sides of Meraki and Cisco Switch
Go to Security Appliance then DHCP
What device will be the DHCP on this new Subnet? You can set the Meraki or if its a Windows Network point the IP Helper to your main DHCP server
On the uplink of your switch to the Meraki set e.g. GigabitEthernet1/0/1
conf t
int gi1/0/1
switchport trunk native vlan 1
switchport trunk allowed vlan 1,5
switchport mode trunk
end
You might see the native vlan 1 not showing in the config , this is because 1 is always the native vlan
This changes the port to use Vlan 5
conf t
int gi1/0/2
switchport acccess vlan 5
switchport mode access
end
Connect to http://wired.meraki.com/#configure on a PC/Server connect to the meraki. The default username is the serial number of the device which can be got from the Cloud Dashboard and password is blank
The following will restart the Meraki so make sure you arrange downtime.
Change Port 2 to Internet from LAN and add the IP details and click Save
Make sure all ethernets are set to Auto for Negotiation
By default the Meraki will put the connections on Active / Passive , to enable Active / Active
Login to your Meraki Cloud Dashboard and Enable Load Balancing :
This will spread both inbound and outbound via both links
To force one port e.g. to a specific Link , add an Internet Traffic Flow setting
e.g.
Switch-A(config)#interface port-channel 1
Switch-A(config-if)#switchport trunk encapsulation dot1q
Switch-A(config-if)#switchport mode trunk
Switch-A(config-if)#speed nonegotiate
Switch-A(config)#interface GigabitEthernet1/1/1
Switch-A(config-if)#switchport mode trunk
Switch-A(config-if)#speed nonegotiate
Switch-A(config-if)#channel-group 1 mode active
Switch-A(config)#interface GigabitEthernet2/1/1
Switch-A(config-if)#switchport mode trunk
Switch-A(config-if)#speed nonegotiate
Switch-A(config-if)#channel-group 1 mode active
——————————————————-
Switch-B(config)#interface port-channel 1
Switch-B(config-if)#switchport trunk encapsulation dot1q
Switch-B(config-if)#switchport mode trunk
Switch-B(config-if)#speed nonegotiate
Switch-B(config)#interface GigabitEthernet1/1/1
Switch-B(config-if)#switchport mode trunk
Switch-B(config-if)#speed nonegotiate
Switch-B(config-if)#channel-group 1 mode active
Switch-B(config)#interface GigabitEthernet2/1/1
Switch-B(config-if)#switchport mode trunk
Switch-B(config-if)#speed nonegotiate
Switch-B(config-if)#channel-group 1 mode active
Trying to enable LCAP on a Cross Stack Cisco Switch via EtherChannel.
On Enabling this I got an error on juw5 one side of the LACP Switch :
suspended: LACP currently not enabled on the remote port.
I broke the Port Channel , and set it back to switch mode trunk
Then re-enabled the Portchannel in order
Switch 1 Port One
Switch 2 Port One
Switch 2 Port Two
Switch 1 Port Two
Recently a client had ordered some 10GB SFP+ for his new and old Cisco 3650 Switches , however his old ones only have 4 x 1GB Ports. The 10GB SFP+’s cannot downgrade to 1GB speed on the old or new devices!