Cisco catalyst blade switch 3020 hp software configuration guide

cisco catalyst blade switch 3020 hp software configuration guide

Downloads Table Of Contents Cisco Catalyst Blade Switch for HP Getting Started Guide Introduction Taking Out What You Need Cisco Gigabit Ethernet. Cisco Catalyst Blade Switch for HP Software Configuration Guide. OL 5. Configuring Cisco IOS Configuration Engine. This chapter describes how. Cisco Catalyst Blade Switch for HP Software Configuration Guide, Working with the Cisco IOS File System, Configuration Files, and Software Images. WINSCP C# Сообщаю Для вас, что.

You must configure this relay device to forward received broadcast packets on an interface to the destination host. If the relay device is a Cisco router, enable IP routing ip routing global configuration command , and configure helper addresses by using the ip helper-address interface configuration command. For example, in Figure , configure the router interfaces as follows:.

Note I f the switch is acting as the relay device, configure the interface as a routed port. For more information, see the "Routed Ports" section on page and the "Configuring Layer 3 Interfaces" section on page Depending on the availability of the IP address and the configuration filename in the DHCP reserved lease, the switch obtains its configuration information in these ways:.

The switch sends a unicast message to the TFTP server to retrieve the named configuration file from the base directory of the server and upon receipt, it completes its bootup process. The switch sends a broadcast message to a TFTP server to retrieve the named configuration file from the base directory of the server, and upon receipt, it completes its bootup process. The configuration filename is not provided two-file read method.

The switch sends a unicast message to the TFTP server to retrieve the network-confg or cisconet. If the network-confg file cannot be read, the switch reads the cisconet. The default configuration file contains the hostnames-to-IP-address mapping for the switch. The switch fills its host table with the information in the file and obtains its hostname. If the hostname is not found in the file, the switch uses the hostname in the DHCP reply. If the hostname is not specified in the DHCP reply, the switch uses the default Switch as its hostname.

After obtaining its hostname from the default configuration file or the DHCP reply, the switch reads the configuration file that has the same name as its hostname hostname -confg or hostname. If the cisconet. If the switch cannot read the network-confg, cisconet.

If the switch cannot read the router-confg file, it reads the ciscortr. Table shows the configuration of the reserved leases on the DHCP server. This directory contains the network-confg file used in the two-file read method. This file contains the hostname to be assigned to the switch based on its IP address. The base directory also contains a configuration file for each switch switcha-confg , switchb-confg , and so forth as shown in this display:. In Figure , Switch A reads its configuration file as follows:.

Switches B through D retrieve their configuration files and IP addresses in the same way. The client switch is configured to download either a new configuration file or a new configuration file and a new image file. Note The prefix length specifies the number of bits that comprise the address prefix. The prefix is an alternative way of specifying the network mask of the client. In the text file, put the name of the image that you want to download for example, cmipservices-mz.

This image must be a tar and not a bin file. Specify the text file that contains the name of the image file to download. Optional Set the amount of time the system tries to download a configuration file. Note You should only configure and enable the Layer 3 interface.

Note You can also manually assign IP information to a port if you first put the port into Layer 3 mode by using the no switchport interface configuration command. The VLAN range is 1 to The fa0 interface can be used instead of the VLAN interface. Enter the IP address of the next-hop router interface that is directly connected to the switch where a default gateway is being configured. The default gateway receives IP packets with unresolved destination IP addresses from the switch. Once the default gateway is configured, the switch has connectivity to the remote networks with which a host needs to communicate.

Note When your switch is configured to route with IP, it does not need to have a default gateway set. To remove the switch IP address, use the no ip address interface configuration command. If you are removing the address through a Telnet session, your connection to the switch will be lost. To remove the default gateway address, use the no ip default-gateway global configuration command.

For information on setting the switch system name, protecting access to privileged EXEC commands, and setting time and calendar services, see Chapter 5, "Administering the Switch. You can check the configuration settings that you entered or changes that you made by entering this privileged EXEC command:. To store the configuration or changes you have made to your startup configuration in flash memory, enter this privileged EXEC command:.

This command saves the configuration settings that you made. If you fail to do this, your configuration will be lost the next time you reload the system. Table shows the default bootup configuration. The switch attempts to automatically boot up the system using information in the BOOT environment variable. If the variable is not set, the switch attempts to load and execute the first executable image it can by performing a recursive, depth-first search throughout the flash file system.

The Cisco IOS image is stored in a directory that has the same name as the image file excluding the. In a depth-first search of a directory, each encountered subdirectory is completely searched before continuing the search in the original directory.

Configured switches use the config. You can automatically download a configuration file to your switch by using the DHCP-based autoconfiguration feature. By default, the Cisco IOS software uses the file config. However, you can specify a different filename, which will be loaded during the next bootup cycle. Beginning in privileged EXEC mode, follow these steps to specify a different configuration filename:.

For file-url , specify the path directory and the configuration filename. To return to the default setting, use the no boot config-file global configuration command. By default, the switch automatically boots up; however, you can configure it to manually boot up. Beginning in privileged EXEC mode, follow these steps to configure the switch to manually boot up during the next bootup cycle:.

The next time you reboot the system, the switch is in bootloader mode, shown by the switch: prompt. To disable manual booting up, use the no boot manual global configuration command. By default, the switch attempts to automatically boot up the system using information in the BOOT environment variable.

If this variable is not set, the switch attempts to load and execute the first executable image it can by performing a recursive, depth-first search throughout the flash file system. However, you can specify a specific image with which to boot up the switch. Beginning in privileged EXEC mode, follow these steps to configure the switch to boot up a specific image during the next bootup cycle:.

Configure the switch to boot up a specific image in flash memory during the next bootup cycle. The boot system global command changes the setting of the BOOT environment variable. During the next bootup cycle, the switch attempts to automatically boot up the system using information in the BOOT environment variable. To return to the default setting, use the no boot system global configuration command.

With a normally operating switch, you enter the boot loader mode only through a switch console connection configured for bps. Unplug the switch power cord, and press the switch Mode button while reconnecting the power cord. You can release the Mode button a second or two after the LED above port 1 turns off. Then the boot loader switch: prompt appears. The switch bootloader software provides support for nonvolatile environment variables, which can be used to control how the bootloader, or any other software running on the system, behaves.

Environment variables that have values are stored in flash memory outside of the flash file system. Each line in these files contains an environment variable name and an equal sign followed by the value of the variable.

A variable has no value if it is not listed in this file; it has a value if it is listed in the file even if the value is a null string. A variable that is set to a null string for example, " " is a variable with a value. Many environment variables are predefined and have default values. For example, the name of a bootloader helper file, which extends or patches the functionality of the bootloader can be stored as an environment variable.

For example, the name of the Cisco IOS configuration file can be stored as an environment variable. You can change the settings of the environment variables by accessing the bootloader or by using Cisco IOS commands. Under normal circumstances, it is not necessary to alter the setting of the environment variables. Note For complete syntax and usage information for the bootloader commands and environment variables, see the command reference for this release. Table describes the function of the most common environment variables.

A semicolon-separated list of executable files to try to load and execute when automatically booting up the switch. If the BOOT environment variable is not set, the system attempts to load and execute the first executable image it can find by using a recursive, depth-first search through the flash file system. If the BOOT variable is set but the specified images cannot be loaded, the system attempts to boot up the first bootable file that it can find in the flash file system. Specifies the Cisco IOS image to load during the next bootup cycle.

This command changes the setting of the BOOT environment variable. Valid values are 1, yes, 0, and no. If it is set to no or 0, the bootloader attempts to automatically boot up the system. If it is set to anything else, you must manually boot up the switch from the bootloader mode. The next time you reboot the system, the switch is in bootloader mode. Changes the filename that Cisco IOS uses to read and write a nonvolatile copy of the system configuration.

Specifies the filename that Cisco IOS uses to read and write a nonvolatile copy of the system configuration. You can schedule a reload of the software image to occur on the switch at a later time for example, late at night or during the weekend when the switch is used less , or you can synchronize a reload network-wide for example, to perform a software upgrade on all switches in the network. Note A scheduled reload must take place within approximately 24 days. To configure your switch to reload the software image at a later time, use one of these commands in privileged EXEC mode:.

This command schedules a reload of the software to take affect in the specified minutes or hours and minutes. The reload must take place within approximately 24 days. You can specify the reason for the reload in a string up to characters in length.

This command schedules a reload of the software to take place at the specified time using a hour clock. If you specify the month and day, the reload is scheduled to take place at the specified time and date. If you do not specify the month and day, the reload takes place at the specified time on the current day if the specified time is later than the current time or on the next day if the specified time is earlier than the current time.

Specifying schedules the reload for midnight. Note Use the at keyword only if the switch system clock has been set through Network Time Protocol NTP , the hardware calendar, or manually. The time is relative to the configured time zone on the switch. To schedule reloads across several switches to occur simultaneously, the time on each switch must be synchronized with NTP.

The reload command halts the system. If the system is not set to manually boot up, it reboots itself. Use the reload command after you save the switch configuration information to the startup configuration copy running-config startup-config. If your switch is configured for manual booting up, do not reload it from a virtual terminal. This restriction prevents the switch from entering the bootloader mode and thereby taking it from the remote user's control. If you modify your configuration file, the switch prompts you to save the configuration before reloading.

If you proceed in this situation, the system enters setup mode upon reload. This example shows how to reload the software on the switch on the current day at p. To cancel a previously scheduled reload, use the reload cancel privileged EXEC command. To display information about a previously scheduled reload or to find out if a reload has been scheduled on the switch, use the show reload privileged EXEC command. It displays reload information including the time the reload is scheduled to occur and the reason for the reload if it was specified when the reload was scheduled.

Skip to content Skip to search Skip to footer. Book Contents Book Contents. Find Matches in This Book. Log in to Save Content. PDF - Complete Book Updated: February 15, Assigning the Switch IP Address and Default Gateway This chapter describes how to create the initial switch configuration for example, assigning the IP address and default gateway information by using a variety of automatic and manual methods.

Understanding the Bootup Process To start your switch, you need to follow the procedures in the getting started guide or the hardware installation guide for installing the switch and setting up the initial switch configuration IP address, subnet mask, default gateway, secret and Telnet passwords, and so forth. Default gateway No default gateway is defined. In all of these cases, the switch does not pass the power-on self-test POST , and there is no connectivity.

This procedure uses the Xmodem Protocol to recover from a corrupt or wrong image file. There are many software packages that support the Xmodem Protocol, and this procedure is largely dependent on the emulation software that you are using. The Cisco IOS image is stored as a bin file in a directory in the tar file.

For information about locating the software image files on Cisco. Step 2 Extract the bin file from the tar file. Use the zip program to navigate to and extract the bin file. Step 3 Connect your PC with terminal-emulation software supporting the Xmodem Protocol to the switch console port. Step 4 Set the line speed on the emulation software to baud. Step 5 Push the release latch on the front of the switch to the open position. Step 6 Pull the switch partially out of the module bay until the power disconnects, and then push it in again.

The switch restarts when it reseats in the server chassis. The switch performs POST after power is applied. Step 7 Push the release latch on the front of the switch to the closed position. Step 8 Press the Mode button. You can release the Mode button a second or two after the LED above port 1 goes off. Several lines of information about the software appear along with instructions:.

Note Initialize the flash file system:. Step 9 If you had set the console port speed to anything other than , it has been reset to that particular speed. Change the emulation software line speed to match that of the switch console port.

Step 10 Load any helper files:. Step 11 Start the file transfer by using the Xmodem Protocol. Step 12 After the Xmodem request appears, use the appropriate command on the terminal-emulation software to start the transfer and to copy the software image into flash memory. Step 14 Use the archive download-sw privileged EXEC command to download the software image to the switch. Step 15 Use the reload privileged EXEC command to restart the switch and to verify that the new software image is operating properly.

The default configuration for the switch allows an end user with physical access to the switch to recover from a lost password by interrupting the bootup process during power-on and by entering a new password. These recovery procedures require that you have physical access to the switch. Note On these switches, a system administrator can disable some of the functionality of this feature by allowing an end user to reset a password only by agreeing to return to the default configuration.

If you are an end user trying to reset a password when password recovery has been disabled, a status message shows this during the recovery process. You enable or disable password recovery by using the service password-recovery global configuration command. Follow the steps in this procedure if you have forgotten or lost the switch password.

Step 1 Connect a terminal or PC with terminal-emulation software to the switch console port. Step 2 Set the line speed on the emulation software to baud. Step 3 Push the release latch on the front of the switch to the open position. Step 4 Pull the switch partially out of the module bay until the power disconnects, and then push it in again. Step 5 Push the release latch on the front of the switch to the closed position. Continue pressing the Mode button until the System LED turns briefly amber and then solid green; then release the Mode button.

Several lines of information about the software appear with instructions, informing you if the password recovery procedure has been disabled or not. Step 1 Initialize the flash file system:. Step 2 If you had set the console port speed to anything other than , it has been reset to that particular speed. Step 3 Load any helper files:. Step 4 Display the contents of flash memory:. Step 5 Rename the configuration file to config. Step 6 Boot up the system:.

You are prompted to start the setup program. Enter N at the prompt:. Step 8 Rename the configuration file to its original name:. Step 9 Copy the configuration file into memory:. Press Return in response to the confirmation prompts. Step 10 Enter global configuration mode:. Step 11 Change the password:. The secret password can be from 1 to 25 alphanumeric characters, can start with a number, is case sensitive, and allows spaces but ignores leading spaces.

Step 13 Write the running configuration to the startup configuration file:. Note This procedure is likely to leave your switch virtual interface in a shutdown state. You can see which interface is in this state by entering the show running-config privileged EXEC command. To re-enable the interface, enter the interface vlan vlan-id global configuration command, and specify the VLAN ID of the shutdown interface. With the switch in interface configuration mode, enter the no shutdown command. Step 14 Reload the switch:.

You see the message:. When the default configuration loads, you can reset the password. Step 1 Elect to continue with password recovery and lose the existing configuration:. Step 2 Load any helper files:. Step 3 Display the contents of flash memory:. Step 4 Boot up the system:. To continue with password recovery, enter N at the prompt:.

Step 6 Enter global configuration mode:. Step 7 Change the password:. Step 9 Write the running configuration to the startup configuration file:. Step 10 You must now reconfigure the switch. If the system administrator has the backup switch and VLAN configuration files available, you should use those. Step 11 Reload the switch:.

The IEEE There are situations when this protocol can incorrectly align these settings, reducing performance. A mismatch occurs under these circumstances:. To maximize switch performance and ensure a link, follow one of these guidelines when changing the settings for duplex and speed:. Note If a remote device does not autonegotiate, configure the duplex settings on the two ports to match. The speed parameter can adjust itself even if the connected port does not autonegotiate. If the serial number, the vendor name or vendor ID, the security code, or CRC is invalid, the software generates a security error message and places the interface in an error-disabled state.

Although the error message text refers to GBIC interfaces and modules, the security messages actually refer to the SFP modules and module interfaces. For more information about error messages, see the system message guide for this release. After inserting a Cisco SFP module, use the errdisable recovery cause gbic-invalid global configuration command to verify the port status, and enter a time interval for recovering from the error-disabled state.

After the elapsed interval, the switch brings the interface out of the error-disabled state and retries the operation. For more information about the errdisable recovery command, see the command reference for this release. If the module is identified as a Cisco SFP module, but the system is unable to read vendor-data information to verify its accuracy, an SFP module error message is generated.

In this case, you should remove and re-insert the SFP module. If it continues to fail, the SFP module might be defective. This command shows the operational status, such as the temperature and the current for an SFP module on a specific interface and the alarm status. You can also use the command to check the speed and the duplex settings on an SFP module. For more information, see the show interfaces transceiver command in the command reference for this release.

Use the show env temperature status privileged EXEC command to display the temperature value, state, and thresholds. The temperature value is the temperature in the switch not the external temperature.

You can configure only the yellow threshold level in Celsius by using the system env temperature threshold yellow value global configuration command to set the difference between the yellow and red thresholds. You cannot configure the green or red thresholds.

For more information, see the command reference for this release. The switch supports IP ping, which you can use to test connectivity to remote hosts. Ping sends an echo request packet to an address and waits for a reply. Ping returns one of these responses:. If you attempt to ping a host in a different IP subnetwork, you must define a static route to the network or have IP routing configured to route between those subnets.

IP routing is disabled by default on all switches. Beginning in privileged EXEC mode, use this command to ping another device on the network from the switch:. Ping a remote host through IP or by supplying the hostname or network address. Note Though other protocol keywords are available with the ping command, they are not supported in this release.

Table describes the possible ping character output. Simultaneously press and release the Ctrl , Shift , and 6 keys and then press the X key. The Layer 2 traceroute feature allows the switch to identify the physical path that a packet takes from a source device to a destination device. Layer 2 traceroute supports only unicast source and destination MAC addresses.

It finds the path by using the MAC address tables of the switches in the path. When the switch detects a device in the path that does not support Layer 2 traceroute, the switch continues to send Layer 2 trace queries and lets them time out. The switch can only identify the path from the source device to the destination device. It cannot identify the path that a packet takes from source host to the source device or from the destination device to the destination host.

For Layer 2 traceroute to function properly, do not disable CDP. For a list of switches that support Layer 2 traceroute, see the "Usage Guidelines" section. If any devices in the physical path are transparent to CDP, the switch cannot identify the path through these devices. All switches in the physical path must be reachable from each other. All switches in the path must be reachable from this switch.

If the VLAN is not specified, the path is not identified, and an error message appears. If the IP address is not resolved, the path is not identified, and an error message appears. When more than one CDP neighbor is detected on a port, the Layer 2 path is not identified, and an error message appears.

You can display the physical path that a packet takes from a source device to a destination device by using one of these privileged EXEC commands:. You can use IP traceroute to identify the path that packets take through the network on a hop-by-hop basis. The command output displays all network layer Layer 3 devices, such as routers, that the traffic passes through on the way to the destination. Your switches can participate as the source or destination of the traceroute privileged EXEC command and might or might not appear as a hop in the traceroute command output.

If the switch is the destination of the traceroute, it is displayed as the final destination in the traceroute output. Intermediate switches do not show up in the traceroute output if they are only bridging the packet from one port to another within the same VLAN.

However, if the intermediate switch is a multilayer switch that is routing a particular packet, this switch shows up as a hop in the traceroute output. Traceroute finds the address of the first hop by examining the source address field of the ICMP time-to-live-exceeded message. The first router decrements the TTL field by 1 and sends the datagram to the next router. The second router sees a TTL value of 1, discards the datagram, and returns the time-to-live-exceeded message to the source. This process continues until the TTL is incremented to a value large enough for the datagram to reach the destination host or until the maximum TTL is reached.

To learn when a datagram reaches its destination, traceroute sets the UDP destination port number in the datagram to a very large value that the destination host is unlikely to be using. When a host receives a datagram destined to itself containing a destination port number that is unused locally, it sends an ICMP port-unreachable error to the source.

Because all errors except port-unreachable errors come from intermediate hops, the receipt of a port-unreachable error means that this message was sent by the destination port. Beginning in privileged EXEC mode, follow this step to trace the path that packets take through the network:.

Cisco catalyst blade switch 3020 hp software configuration guide heidisql ubuntu wine software

STOP TIGHTVNC STARTUP

Сообщаю Для вас, что.

Сообщаю Для вас, что.

Cisco catalyst blade switch 3020 hp software configuration guide ultravnc linux rpm

How to Initially Configure a Cisco Switch Tutorial cisco catalyst blade switch 3020 hp software configuration guide

RESTART VNC SERVER REDHAT

Сообщаю Для вас, что.

Сообщаю Для вас, что.

Cisco catalyst blade switch 3020 hp software configuration guide vnc server start scripture

HP Blade switch 6125XLG část 1 - nastavení IRF vir

Thanks You comodo monitoring speaking, would

Something is. download zoom screen share excellent phrase

Следующая статья download asdm cisco software

Другие материалы по теме

  • Black thunderbird pickguard
  • Software cisco vpn client v 5 0 32 bit xp vista seven
  • Fortinet phase 2 hung
  • 4 комментариев к “Cisco catalyst blade switch 3020 hp software configuration guide”

    1. Mazahn :

      download zoom on a mac

    2. Fenrinris :

      dlink smart console software for cisco

    3. Shakora :

      brute force vnc server not accepting

    4. Mezijind :

      openssh winscp download


    Оставить отзыв