I got a feeling the 2950s don't support MAC AUTH BYPASS. I went to the configuration guides for 12.1(22)EA11 and later and it showed nothing of this feature in the dot1x section and generally it would be located there. By the way, this is the most updated IOS for this switch as of now. See for...
You would want to kill it in order to work in almost all normal circumstances. Try it and see. For a detailed explanation refer to the link I provided, it'll explain that option and all others.
NAT is a highly complex subject in terms of the amount of options that are available. Not sure how to address what you are specifically referring to. Likely there are many options that will work. For a good guide as to what can be done with NAT, check out this page...
Yeah, I think unclerico is probably right. That information option is on by default and is many circumstances needs to be turned off. For the rest of the DHCP snooping commands or arguments look here...
There are some things to keep in mind when looking at using the 6500s for WAN connectivity. Yes they will indeed work but by definition the 6500 is a switch line and the SUP720s VSS or regular do not always support the types of interfaces you may need to front end that WAN connectivity.
For...
Its free. There is no need to purchase. Did you go to the links? You may need a Cisco login but that is free too if you want just guest access.
As for this specific feature, beleive me, if you look at the documentation there is info on pretty much every feature. So much so that...
It is indeed well documented as well as everything else BGP related/IGP related, and all routing protocol and operation. You just aren;t looking in the right place.
For any Cisco related documentation questions, always start with what was recently referred to as the DOC-CD. Today it is...
Simple answer is don't use tags to set traffic. If you are going into BGP from an IGP use communities (make sure your service provider preserves them across their network). If it is from BGP to an IGP, I beleive you should be able to use route tags (although it may depend on the IGP)...
Well, good news for you. You don't really have to worry about routes looping around within your local networks and then coming back up through for a destination in the service provider's WAN. Reason being is that one of BGP's main loop prevention mechanisms is AS-PATH. For your case the...
I agre CCIP is the way to go. Especially if you ever plan to go for CCIE routing and Switching. Its almost mandatory for that in my opinion as pretty much all the CCIP topics are covered in depth.
As for it being easier than the CCNP, I'm not so sure about that. I though QoS was easy and...
The exam certification guide is excellent. I used it exclusively about 2 years back when I took the test. Granted a few things may have changed since then but I found QoS to be the easiest of any professional level test I've ever taken through Cisco. Granted I have a lot of experience with...
You're lucky it only messed up 1 vlan which means at least you are running some type of per-vlan spanning tree. Also suprised it didn't negatively affect the entire layer 2 topology the switches were connected.
I was unaware of that fact that the 6509s have reached EOL. However, I would be extremely suprised if the 6509-E series is chassis is also EOL. Any of the cards you have in the 6509s should work in the 6509-E series chassis as well.
If your link is a trunk, more than likely it is carrying vlan 14 on it in addition to multiple other vlans. This vlan (14) apparently according to the output above did have a temporary loop. Remember that depending on your spanning tree topology there may be many virtual instances of spanning...
Try going to the individual interfaces that will comprise the port channel and run the following command:
channel-group 61 mode xxxx
Where the xxx refers to the type of etherchannel you wish to create (on|LACP|PaGP). This should in theory create the port channel for you. Then you should also...
Whats your default login method? You don't have one other than a password on the VTY lines. SSH would require a username and password. You could set one up locally on the device and then use login local under the VTY lines or you could use AAA and setup an ACS server for authentication.
Follow this link:
http://www.cisco.com/en/US/customer/docs/ios/ipaddr/configuration/guide/iadnat_addr_consv_ps6350_TSD_Products_Configuration_Guide_Chapter.html
You will need to have a Cisco login in order to see it. There are so many ways to configure NAT and many differentr circumstances...
I wouldn't reccomend static routing for this solution, but it would work. If you are running across a service provider's MPLS cloud you would be undoubtedly peering with their routers on either side. In such a case you may want to check and see if they offer the ability for ppp multilink or...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.