The workaround is to enter a shutdown interface configuration command followed by a no shutdown command on the port in the blocked state. The workaround is to reload the switch stack after the VRF configuration is changed. The workaround when you are forming power stack topologies if the power stack mode is not the default power sharing , you should also configure the power stack mode on the new power stacks by entering the mode redundant power-stack configuration command.
The workaround is to reduce the number of VLANs or trunks. The workaround is to enter the shut and no shut interface configuration commands on the port to reset the authentication status. The workaround is to always enter a non zero value for the timeout value when you enter the boot host retry timeout timeout-value command.
The workaround is to click Yes when you are prompted to accept the certificate. Catalyst X, E, X and E switches internally support up to 16 different control plane queues. Each queue is dedicated to handling specific protocol packets and is assigned a priority level. For example, STP, routed, and logged packets are sent to three different control plane queues, which are prioritized in corresponding order, with STP having the highest priority.
Each queue is allocated a certain amount of processing time based on its priority. The processing-time ratio between low-level functions and high-level functions is allocated as 1-to Therefore, the control plane logic dynamically adjusts the CPU utilization to handle high-level management functions as well as punted traffic up to the maximum CPU processing capacity.
Basic control plane functions, such as the CLI, are not overwhelmed by functions such logging or forwarding of packets. If this message appears, make sure that there is network connectivity between the switch and the ACS.
If this happens, enter the no auto qos voip cisco-phone interface command on all interface with this configuration to delete it. Then enter the auto qos voip cisco-phone command on each of these interfaces to reapply the configuration.
From the Settings window, choose Automatically. Click OK to exit the Internet Options window. If you are not using the default method of authentication the enable password , you need to configure the HTTP server interface with the method of authentication used on the switch. Configure the HTTP server interface for the type of authentication that you want to use. The device manager uses the HTTP protocol the default is port 80 and the default method of authentication the enable password to communicate with the switch through any of its Ethernet ports and to allow switch management from a standard web browser.
You should write down the port number through which you are connected. Use care when changing the switch IP information. The Bug Search Tool BST , which is the online successor to Bug Toolkit, is designed to improve the effectiveness in network risk management and device troubleshooting. The BST allows partners and customers to search for software bugs based on product, release, and keyword, and aggregates key data such as bug details, product, and version.
The tool has a provision to filter bugs based on credentials to provide external and internal bug views for the search input.
To view the details of a caveat listed in this document:. Enter the bug ID in the Search For: field. When Catalyst 3k switch stack is not configured as rep edge and is just part of the ring, it causes convergence of about 4 to 8 seconds for some streams.
In a Smart Install network, when the director is connected between the client and the DHCP server and the server has options configured for image and configuration, then the client does not receive the image and configuration files sent by the DHCP server during an automatic upgrade. Instead the files are overwritten by the director and the client receives the image and configuration that the director sends.
For clients to upgrade using Smart Install, you should configure product-id specific image and configuration files in the director. Mediatrace does not report statistics on the initiator under these conditions:. The workaround is to ensure that the mediatrace ingress and egress connections are on the stack master or to configure a Catalyst E or X as the stack master and then reload the switch stack.
When you enter the copy running-config startup config privileged EXEC command on the switch, the running configuration is not always saved to the startup configuration on the first attempt. If you wait for a few minutes, the configuration is saved when the switch attempts it again. On a switch stack, when an IP phone connected to a member switch has its MAC address authorized using the critical voice VLAN feature, if a master changeover occurs, the voice traffic is dropped.
This occurs because the switch initially drops the voice traffic before reauthenticating critical voice VLAN traffic. The dropped entries are removed when critical voice VLAN authentication occurs.
The dropped entries are removed when the IP phone is reauthenticated. Cisco TrustSec CTS parameters must be configured on both the seed switch and the non-seed switch trunk interfaces. Although the non-seed switch is authenticated and authorized to connect to the network, supplicant devices connected to the non-seed switch might be unable to connect to the network, under these circumstances:.
The workaround is to reduce the reauthentication time on the seed switch, or enter the shutdown interface configuration command, followed by the no shutdown interface configuration command on the seed switch CTS trunk interface. ASP now uses a device classifier, which determines the type of device that is connected to the switch. As a result, ASP has no control over the protocol type that is used to detect the device.
Therefore, the protocol detection controls are deprecated. When you enter the macro auto global control detection command, the protocol does not show up in the running configuration; however, the filter-spec command is shown in the output. To see the deprecated commands, enter the show running config deprecated global and interface configuration command. The following message may be erroneously displayed during the boot up process.
The workaround is to use the power inline consumption command in interface configuration mode. In a switch stack, multicast traffic can be lost for up to 60 seconds when the master switch is reloaded. Because the platform does not support multicast non-stop-forwarding NSF , the time before traffic reconvergence after a switchover can vary. When the show sdm prefer command is run on the switch, The template displays the number of indirect IPv4 routes as 7.
There is a reduction of 0. When sampled NetFlow is configured with the command ip flow monitor fm-3 in , the sampler tables are not exported to the collector.
The workaround is to use the configuration command ip flow monitor fm-3 sampler s-1 in. While configuring VLAN load balancing using Resilient Ethernet Protocol REP on ether channel interface where bundled interfaces are spread across member stack switches, the MAC address flaps when the ether channel state changes from open to alternate.
Use the Bug Search Toolkit to view the details of a caveat listed in this section. Switch crashes after getnext on the last cafServerAliveAction index. When enable ip source guard, a part of the clients cannot communicate. IPv6 neighbor discovery packet processing behavior. Switch fails while copying a configuration file to running-config using RCP. No warning message when switch configures "ip tcp adjust-mss".
Shutdown is displayed with linkup channel member port on show run. Broadcast packet does not send when port channel changes to normal port. Cannot apply REP config under portchannel after initial boot up. No simulated EAP success message to the client for credential failure.
CX responds to ARP request from management port. Members in a cluster unable to save configuration in IOS Switch crashes with multicast routing enabled when TCN timer expires. Cx expires Mroute when forwarding low traffic rate. Port err-disable after link-flap with "speed nonegotiate" option.
CX stack packet loss on Channel interface when removed backup int. Switch is unable to send packets with payload larger than bytes. Switch sent Failure packet after reboot and caused PC to fail authenticate. Inconsistency on config "privilege" commands as seen in running-config.
EEM Tcl policies fail due to false out of memory error. Telnet sessions that are incompletely established may not time out after a period of inactivity, leading to eventual exhaustion of available VTY lines. It needs to be manually cleared via clear tcp only clear line does not work. The workaround is that it needs to be manually cleared via clear tcp tcb 0xXXXX only clear line does not work. The configuration is as show below:. When rsh command constructs are used within Tclscript, Tcl fails to send the router hostname which causes the rsh command constructs to fail authorization to a remote router.
An EEM script that executes on a syslog event causes the Cisco router to fail with the following error message. Exception to IOS Thread:. It seems that the switch has picked up interface Fa1 macaddress as its engineID. Hardware is RP management port, address is The workaround is to manually configure snmp engineID from cli. The Privilege commands are not appearing in the configuration of a Catalyst switch. When you enter the privilege interface level 3 switchport port-security mac-address sticky command and save the configuration, the command is not visible in neither the startup configuration nor the running configuration.
However, privilege level 3 users can view the command and can use it. If you reload the switch, the command is still is not visible in the configuration and also becomes unavailable to the privilege level 3 users. The workaround is to use the aaa authorization global configuration command to access the commands available for a particular user from the AAA server.
The workaround is to disable https secure communication and use http for HTTP requests. On the Cisco enhanced EtherSwitch service module SM-ESP , running the logging source-interface command, does not set the source interface for syslog messages sent to a syslog server. In a Catalyst X switch stack, the switches experience a slow performance with the following message. Sometimes the switch stops responding and is not recovered until power cycling.
You may also observe the following messages when the problem occurs. Disabling linecard. Expected during linecard OIR. The issue is observed in switches running It also includes The workaround is to configure a longer logging interval.
For example,. If the issue persists after setting a longer logging interval, you must power cycle the switch. In a switch stack consisting of Catalyst S switches running This issue is observed when the number of member ports is higher than 4.
The workaround is to configure the missing MAC addresses manually. A change in the behaviour of DHCP client is observed between The output is as shown:. When trying to remove the macros by running the command " no macro auto global processing ", the CPU comes back to normal but the master switch crashes. The workaround is to reload the stack. The CPU remains low for a while.
Removing the macros at this time does not cause the master switch to crash. After system reload, ip ssh source-interface shows in startup-config but disappears from. This is seen in both the scenarios as mentioned below. Save the configuration and reload. When around Vlans are configured on a switch running IOS The issue is not seen on switches running IOS The workaround is to disable the device sensor as no macro auto monitor.
When Mar 10 When running show epm session sum , it shows one session cloned multiple times, for example:. Then the number of cloned sessions increases with the time.
Designated port on the Root Bridge experiences a block forward for 30 seconds. This issue occurs because the message-time the period of time a packet is alive in the network is almost equal to max-age the period of time a packet is allowed to stay in the network.
The CDP neighbor devices are discovered initially on the Gi0 interface of the AP and then after a few seconds, the neighbour devices are discovered on the main interface and the sub-interface Gi0 and Gi0.
The workaround is to disable LLDP on the switch interface. When port-security is configured on all ports and when the end host is moved, the mac address table is out of sync. When a PC with The Switch deletes running It makes authentication process fail on the machines which can only complete it in first run. The show env stack command displays the following output:. Temperature Value: 35 Degree Celsius. Yellow Threshold : 46 Degree Celsius.
Red Threshold : 60 Degree Celsius. Temperature Value: 34 Degree Celsius. The following syslog message should be removed or it should not be generated by default:.
The message should be removed because it is seen only if the switch being used is an initiator of a rekey. Also on high speed links the messages appears very often which affects logging buffer. The default rekey intervals are:. Link Speed S Rekey Interval. The other option would be to modify the behaviour and generate such syslog each time when a rekey happens no matter which ends initiate it.
This is because switch expects the packet to arrive on voice vlan from EX, but EX is sending packets on data vlan. All DHCP requests get dropped at the switch. Hence EX is not able to get the ip address. The workaround is to disable one of the following:.
Due to a timing issue, the port channel member port on the slave switch of the stack loops during boot up. The issue occurs only on the member port that is configured as the first port in a cross-stack EtherChannel configuration and when Nexus devices are connected to Cisco devices. Due to Link Aggregation Control Protocol LACP graceful convergence, when both the devices are up and in sync S state, Cisco devices start transmitting even before the devices get onto collecting C state.
This causes the port to be pulled down by the Nexus devices. When this happens during boot up, the EtherChannel hardware programming for the port is cleared even when the port is bundled in the port-channel.
When a switch stack is configured in VTP client mode with VTP password, the show command for the stack master displays the VTP operating mode as client, whereas the member switches display the VTP operating mode as server.
When the interface is lost in a port channel the flow switch over to the backup link is faster for 10G uplink when compared to a 1G uplink.
This is because interface state polling is faster for 10G uplink than 1G uplink. When you reload the first switch, the auto configuration does not start. The workaround is after you configure the SVI, remove the local proxy ARP configuration by entering the no ip local-proxy-arp command, and reconfigure it by entering the ip local-proxy-arp command. A switch configured with login quiet-mode resets when you enter the login block-for or no login block-for commands.
Nevertheless, to avoid a reset, do not enter the login block or no login block-for commands. When you configure Flex Link on stacks containing interfaces from different switches, the interfaces start flapping continuously. The workaround is to remove the Flex Link configuration from the interfaces. Port-channel interface flaps while adding or removing a VLAN from the trunk on a port-channel interface if one or more port members are not in P or D states.
The workaround is to reload the switch and reduce the traffic rate to less than Mbps. The workaround is to configure enable secret command on an IOS device without Type 4 support, copy the resulting Type 5 password, and paste it into the appropriate command on the upgraded IOS device. In a stack of Catalyst x switches, port security enabled ports block all the network traffic through them.
Using the sh mac address-table command shows that the mac address is learned as static on the master switch, whereas the member switches do not have this mac address on their mac address table. The workaround is to perform any one of the following steps:. The workaround is to use the CLI to get the correct values. Memory leak occurs when the show macsec interface command is entered on the inactive Wall-E interfaces.
The workaround is to not to enter the show macsec interface command on the inactive Wall-E interfaces. The switch port goes in to the err-disabled state due to port security violations. The workaround is to run the no switchport command on the interface.
Device under test DUT fails with traceback when you enter the configure replace target-url command. In a switch stack, if a stack member is connected to a Meru access point that requires The stacked switch setup fails when you change or remove an existing password while the relayed console waits for the authentication prompt. The workaround is to reduce the number of changes to the password in the console or VTY when the relayed console waits for the authentication prompt. The issue occurs after reloading the stack members or after online insertion and removal OIR of the transceivers that are DOM capable.
The sh env fan command does not detect faulty power supply fans on a switch. When the source starts sending traffic to the multicast group, an S,G is created and some of the initial packets sent by the source are lost. Once the S,G is programmed for the traffic sent by the source, all the subsequent multicast traffic reaches the receiver. This issue takes place only in stack configurations. The workaround is to use vrf definition command instead of ip vrf command to configure per-VRF.
After performing a shut or no shut on the ports of a Catalyst Switch, the status of some of the ports are displayed as Not Connected , even if they are connected to a remote device.
The workaround is to perform a shut or no shut on the affected ports. The switch reboots if the shutdown and no shutdown commands are repeatedly entered for the alternating ports in an 8-node Resilient Ethernet Protocol REP ring segment.
The following error message is displayed:. The workaround is to bounce the forwarding REP port on the switch stack. The workaround is to downgrade the switch to When you repeatedly run the shut and no shut command in the alternating ports on a 8 node REP ring, the stack member with REP secondary edge port drops the multicast traffic for 20 to 50 seconds.
When IPV6 MLD Snooping is enabled on a switch and the switch is restarted, the packets that are destined to Solicited-Node multicast address are not forwarded in some rare instances. This feature, which previously showed errors, is now functioning properly.
As a result, connectivity is not possible even though the client machine has a valid IP address, and dACLs downloadable ACLs are not applied on the interface.
The workaround is to configure authentication as open so that traffic is allowed only after authentication is successful. If the channel goes down, there is no message output displayed on the stack switch. Netflow cache is not created after applying a flow monitor to the interface on the member switch. The workaround is to either disable multicast fast convergence or configure IGMP version 3 on switch virtual interface.
The workaround is to enter a shutdown command followed by the no shutdown command on the ports of the service module. The workaround is to enter a shutdown command followed by the no shutdown command on the port. CTS environment-data download failed on non-seed device after reboot. The workaround is to check if the displayed VLANs are internal and then to hide them. The workaround is to implement SNMP view using the following commands:. As a result, egress traffic to another router on an SSH connection is blocked.
The device connected to the switch crashes when a CDP data frame is processed. The workaround is to disable CDP using the no cdp run global configuration command.
This workaround is not applicable if the connected device relies on or supports a phone or voice network. The workaround is to apply protocol filters to the device sensor output by entering the following global configuration commands:. Spurious traps observed periodically on removal of power to RPS. STP loop occurs on Flexstack connected by parallel links when a link state is changed on Flexlink port.
The workaround is to change the switch to root bridge. The traffic continues to take failed PBR path instead of the next available best path. On running show interface command, incorrect value is displayed in input error counter.
You can ignore the results of on-demand diagnostics if POST succeeds on boot up. The configuration recovers automatically. If a policy map attached to the switch interface is modified then the corresponding QoS policy works incorrectly. The workaround is to delete the policy map, create a new policy map and then attach it to the interface. This issue occurs when the WCCP cache engine is shut down and the cache is not cleared.
When native VLAN is configured on the trunk or when switchport trunk native vlan 99 is configured on the interface, spanning-tree instance is not created for native VLAN.
The workaround is to keep VLAN1 as a native on the trunk. To disable dot1x internally, run the no macro auto monitor command. The stp instance is created for native vlan 99 after running the show and no show command on the interface. The workaround is to remove the WCCP redirects command from the interface and then add them back on the interface. On the Catalyst S switch stack, when the login block command is configured and the running config is saved using the wr command on the master, it makes the master down.
When the running config is saved on the new master, the following lines are displayed on entering the show running-config command. When the secret password is configured, the password is not saved. The default password is used as the secret password. The workaround is to use the default password to login and then change the password. A vulnerability in the Service Module could allow an authenticated, local attacker to gain root access to the kernel running on the Service Module.
The attacker can use the default credentials to log on to the Service Module and take complete control of the operating system running on the Service Module. This symptom is observed in Cisco IOS The known workaround is to enter the no service dhcp command if the switch is not a DHCP server and configure the device sensor as follows:.
The work around is to perform any of the following action:. The suggestion is to make less use of the show macsec int command on the interfaces when SFP is not present.
When reloading a switch in a stack that contains a service module inside a member switch, the links on the service module does not show up after reloading the member switch. The known workaround is to restore the link by entering shut and no shut commands on the ports in the service module. When a client fails to authenticate in the multi-auth mode, the session continues to be active indefinitely.
The workaround is to enter the clear authentication sessions privileged EXEC command to clear information for all authentication manager sessions. The down-when-looped interface configuration command is not supported with default speed or with BaseT advertisements on the gigabit medium independent interface GMII interface. This is because the down-when-looped feature and BaseT advertisements both make use of the "next page" function as defined in IEEE This delays the switch boot time.
This behavior is also seen when using the force-ucode-reload option. FRU Power Supply is not responding. This message does not indicate a hardware failure of any kind.
Cisco has released free software updates that address this vulnerability. There are no workarounds available to mitigate this vulnerability. The Cisco IOS Software implementation of the virtual routing and forwarding VRF aware network address translation NAT feature contains a vulnerability when translating IP packets that could allow an unauthenticated, remote attacker to cause a denial of service DoS condition.
Workarounds that mitigate this vulnerability are not available. When two traps are generated by two separate processes, the switch fails if one process is suspended while the other process updates variables used by the first process. If a redundant power supply RSP switchover occurs during a bulk configuration synchronization, some of the line configurations might disappear.
The workaround is to reapply the line configurations. This restriction has been removed, and several IP addresses can now be mapped to a single MAC address. The show ip dhcp pool command displays a large number of leased addresses. The workaround is to turn off ip dhcp remember and reload the switch.
The secure copy feature copy: source-filename scp: destination-filename command does not work. NetFlow Data Export NDE packets might be dropped when virtual routing and forwarding VRF is configured on the switch and the exported traffic has conflicting information from the VRF tables and the routing information base.
This problem occurs when the Enterprise Policy Manager EPM for a device connected to an interface is authorized in closed mode and no policies are configured or downloaded. If another device is connected to this device, restricted VLAN authentication event interface configuration command is enabled on the port.
The workaround is to perform the following actions:. When the ip rsvp snooping command is enabled on a Layer 2 environment, the switch stops forwarding the metadata packets. When the master switch Switch A is reloaded or loses power and rejoins the stack as a member switch, any traffic stream that exits Switch A is dropped because the newly joined member is not able to establish an Address Resolution Protocol ARP entry for the next hop router or switch.
The workaround is to add a static ARP. Local web authorization and HTTP services on the switch do not respond because of a web authorization resource limitation in the system. These are possible workarounds and are not guaranteed to solve the problem:. After reconfiguring the flow monitor in the switch interface, the show flow monitor shows that NAM3 is active. The workaround is to reconfigure the flow monitor in the switch interface.
The macro is applied to devices such as PCs, laptops, and printers. You do not need to configure MAC operationally unique identifier OUI -based triggers and map these triggers to a macro for these devices.
The Smart Install client feature in Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service DoS condition on an affected device. Affected devices that are configured as Smart Install clients are vulnerable. There are no workarounds for devices that have the Smart Install client feature enabled.
The SAP preshared key configured for Cisco TrustSec manual mode is saved and displayed in the configuration file as clear text. Heavy traffic load conditions may cause the loop guard protection function to be automatically activated and almost immediately deactivated. These conditions can be caused by entering the shutdown and no shutdown interface configuration commands or by interface link flaps on more than forty ports.
These log messages appear:. When quality of service QoS is disabled on the switch, fragmented IP packets that are sent to the switch are queued in the wrong egress queue Queue 1. This situation causes a high number of output drops since the default buffers for Queue 1 do not have the capacity to handle data traffic.
The workaround is to enable QoS and modify queue buffers. This leads to a convergence time of more than 5 seconds. The problem appears under these conditions:. This problem has been fixed now. No action is required.
When you configure and save the monitor session source interface, the configuration is not saved after reboot. A bidirectional port on a stack member returns an incorrect status.
The workaround is to reconfigure the Cisco TrustSec link layer security. You can do this in the When traffic is routed between two VLANS, multicast packets on the switch are lost for a few seconds. This happens only when the multicast source routes traffic to a group that already has a receiver on it. When you configure FlexLinks on the service modules and you plug the link into the port, the following syslog error message appears repeatedly:.
If an interface is configured with the switchport port-security maximum 1 vlan command, the following error message is displayed:. The flash memory is corrupted when you format the flash manually. The workaround is to reload the switch. If the Performance Monitor cache is displayed using the show performance monitor cache command and you attempt to stop the command output display by entering the q keyword, there is an unusually long delay before the output is stopped.
The workaround is to enter the term len 0 privileged EXEC command so that all command outputs are displayed without any breaks.
There is a memory loss when routing entries are updated in the table, because the switch is not releasing previously allocated memory when system resource allocation fails. After a master switchover on a switch stack, IPV6 multicast routing fails. The workaround is to avoid configuring IPv6 multicast routing on larger stacks.
We recommend enabling IPv6 multicast routing on stacks with five or fewer members. When the show epm session summary or show epm command is entered from an SSH or telnet session and another command is entered from the console, the switch might unexpectedly reset and generate crash information.
The switch might occasionally reload after experiencing a CPU overload, regardless of what process is overloading the CPU. A Catalyst X or X switch port might stop forwarding traffic. The packet counters increment for sent packets, but not for received packets. The workaround, to bring up the port, is to save the configuration and to restart the switch. The switch downloads the running IOS image from the TFTP server and reboots even though the same image is currently loaded and running.
An attacker could exploit this vulnerability by sending a crafted request to an affected device that has the DHCP version 6 DHCPv6 server feature enabled, causing a reload.
This advisory is available at the following link:. When an interface is configured with the mls qos command, traffic is not matched by port-based QoS ACLs that use the range option. The workaround is to is to configure the switch using the single port eq keyword. Alternatively, you can configure the trust under class-default setting for the same policy-map that uses the acl-range option.
In a switch stack, you cannot establish a console session with a member switch when an ACL is applied to the VTY lines. The workaround is to use the following procedure when you apply an ACL to line vty 0 4 and line vty 5 Create the vty ACL and permit the network. Append the vrf-also keyword to the configured access-class inbound. In a switch stack, the show interface command shows incorrect values for output drops. The workaround is to use the show platform port-asic stats drops command to see the correct values.
A static route that has the next hop set to null0 is removed when the master switch is changed in a switch stack configuration. This situation occurs when the switch is stacked and the static route is advertised by the network 0. The workaround is to use the ip summary-address eigrp as-number ip-address mask command to set the IP summary aggregate address for the interface through which the next hop can be found. When a device is moved from one port to another in a switch stack, the SNMP data generated for the move event is incorrect.
Users connecting to the network through a device configured for web proxy authentication may experience a web authentication failure. Using the dot1x default command on a port disables access control on the port and resets the values of the authentication host-mode and authentication timer reauthenticate commands to the default values. The workaround is to avoid using the dot1x default command and set various dot1x parameters individually. You can also reconfigure the parameters that were changed after you entered the dot1x default command.
The workaround is to flap the ingress physical interface, the SVI, or the port channel. In a switch stack setup after you reload a member switch, a multilayer switching MLS class of service CoS configuration command with a specified value such as mls qos cos 7 on the slave switch does not function anymore.
This situation impacts untagged IP and Layer 2 packets. The workaround is to ensure that when you configure a service policy on an interface, an interface default level CoS is also configured. You can use mls trust qos cos command in interface configuration mode. When using the switchport port-security maximum 1 vlan access command, if an IP-phone with a personal computer connected to it is connected to an access port with port security, a security violation will occur on the interface.
This type of message is displayed on the console:. The workaround is to remove the line switchport port-security maximum 1 vlan access.
The switch does not correctly detect a loopback when the switch port on an authenticated IP phone is looped to a port configured and authenticated with dot1x security, even when bpduguard is configured on the interface. This situation can result in percent CPU utilization and degraded switch performance.
The workaround is to configure the interface with the authentication open command or to configure authentication mac-move permit on the switch. The Catalyst E series switch with Supervisor Engine 7L-E contains a denial of service DoS vulnerability when processing specially crafted packets that can cause a reload of the device.
The workaround is to save the configuration and reload the switch. Alternatively, configure the switch by entering the no macro auto monitor command followed by the macro auto monitor command after the port is bundled for the first time. These documents provide complete information about the switches:.
SFP compatibility matrix documents are available from this Cisco. For other information about related products, see these documents:. These documents have information about the Cisco enhanced EtherSwitch service modules:. Finally, we specify the location of the new image. Cisco makes it easy and allows you to download the file, uncompress it, and reload the switch with one command.
When the system finishes starting up, your IOS upgrade is complete! You can verify this with a show version. In this case, it was similar to upgrading an IOS on a router. All you have to do is simply copy the. We saved our changes and verified them with a show boot command. After a reload, the switch will use the new IOS. Using the copy command, copy it from the flash to your tftp in case you need to rollback. In addition, once the system has started, you are able to delete the.
This is useful when you have an existing image that is taking up most of the room on your flash and you are copying a new one that requires more space than you have available. Great guide! Luckily the switches were still operational, so i could issue the archive download-sw command from the console and this time the upgrade went through without a problem. However, I found one mistake in the IOS upgrade procedure for a. So: Switch configure terminal Switch config boot system flash:cipservicesk9-mz.
One minor note that i found when upgrading the To change the boot file, you need to enter configuration mode first — eg:. Switch configure terminal Switch config boot system flash:cipservicesk9-mz.
You are commenting using your WordPress. You are commenting using your Google account. You are commenting using your Twitter account. You are commenting using your Facebook account. Notify me of new comments via email. Notify me of new posts via email.
Home About. The Networking Corner. Share this: Share Reddit Facebook Email. Like this: Like Loading You taught me something new with the. Jose Martinez November 16, at am Thanks for the comments!
Zsolt Kardos May 23, at am Great guide!
0コメント