SlideShare a Scribd company logo
1 of 12
Download to read offline
C H A PT E R           5




        Troubleshooting
        This chapter describes how to identify and resolve software problems related to the IOS
        software. Depending on the nature of the problem, you can use the command-line interface
        (CLI) or Cisco Visual Switch Manager (CVSM) to identify and resolve the problem.
        This chapter describes how to perform the following tasks:
        •   Identify an autonegotiation mismatch
        •   Recover from corrupted software
        •   Recover from a lost or forgotten password
        •   Recover from a failed command switch
        •   Maintain connectivity with cluster members



Autonegotiation Mismatches
        The IEEE 802.3u autonegotiation protocol manages the switch settings for speed (10 Mbps
        or 100 Mbps) and duplex (half or full). There are situations when this protocol can
        incorrectly align these settings, reducing performance. A mismatch occurs under these
        circumstances:
        •   A manually-set speed or duplex parameter is different from the manually set speed or
            duplex parameter on the connected port.
        •   A port is in autonegotiate and the connected port is set to full duplex with no
            autonegotiation.
        To maximize switch performance and ensure a link, follow one of these guidelines when
        changing the settings for duplex and speed:




                                                                               Troubleshooting 5-1
Identifying an Autonegotiation Mismatch




                •   Let both ports autonegotiate both speed and duplex.
                •   Manually set the speed and duplex parameters for the ports on both ends of the
                    connection.



Identifying an Autonegotiation Mismatch
                An autonegotiation mismatch can occur under these circumstances:
                •   A manually set duplex parameter is different from that set on the connected port.
                •   A port is set to autonegotiate and the connected port is set to full duplex with no
                    autonegotiation.
                The result of a mismatch on Fast Ethernet ports is reduced performance or link errors. For
                Gigabit Ethernet ports, the link does not come up, and no statistics are reported.
                To identify and confirm an autonegotiation mismatch when the Fast Ethernet port is in
                half-duplex mode:
                Step 1     Start CVSM and select Port>Port Configuration from the menu bar.
                Step 2     In the Statistics column, click View for the port. Check for late-collision errors.
                           A high number of late collisions could mean the port is connected to a port set
                           to full-duplex mode.
                Step 3     Check the port to which this port is connected. If it is in full-duplex mode, a
                           mismatch exists.
                Step 4     Return to the Port Configuration page, and click View to check for Frame Check
                           Sequence (FCS) errors on the full-duplex port.
                Step 5     Compare your findings with the following rules:
                           •   Late collisions or no link errors indicate that the half-duplex port is
                               connected to a port set to full-duplex.
                           •   FCS errors indicate that the full-duplex port is connected to a port set to half
                               duplex.




5-2     Cisco IOS Desktop Switching Software Configuration Guide
Recovery Procedures




          To correct mismatched port settings, follow one of these guidelines:
          •   Let both ports autonegotiate both speed and duplex.
          •   Manually set the speed and duplex parameters for the ports on both ends of the
              connection.


          Note If a remote Fast Ethernet device does not autonegotiate, configure the duplex
          settings on the two ports to match. The speed parameter can adjust itself even if the
          connected port does not autonegotiate. To connect to a remote Gigabit Ethernet device that
          does not autonegotiate, disable autonegotiation on the local device, and set the duplex and
          flow control parameters to be compatible with the remote device.



Recovery Procedures
          The recovery procedures in this section require that you have physical access to the switch.
          Recovery procedures include the following topics:
          •   Recovering from corrupted software
          •   Recovering from a lost or forgotten password
          •   Recovering from a command-switch failure


Recovering from Corrupted Software
          Switch software can be corrupted during an upgrade, and it is also possible to download the
          wrong file. In both cases, the switch does not pass POST, and there is no connectivity.
          The following procedure uses the XMODEM Protocol to recover from a corrupt or wrong
          image file. This procedure is largely dependent on the emulation software you are using.
          Step 1     Connect a PC with terminal emulation software supporting the XMODEM
                     Protocol to the switch console port.
          Step 2     Set the line speed on the emulation software to 9600 baud.
          Step 3     Unplug the switch power cord.




                                                                                 Troubleshooting 5-3
Recovery Procedures




               Step 4    Reconnect the power cord to the switch.
                         The software image does not load. The switch starts in boot loader mode, which
                         is indicated by the switch: prompt
               Step 5    Use the boot loader to enter commands, and start the transfer.
                         switch: copy xmodem: flash:image_filename

               Step 6    When the XMODEM request appears, use the appropriate command on the
                         terminal-emulation software to start the transfer and copy the software image
                         into Flash memory.


Recovering from a Lost or Forgotten Password
               Follow the steps in this procedure if you have forgotten or lost the switch password.
               Step 1    Connect a terminal or PC with terminal emulation software to the console port.
                         For more information, refer to the switch installation guide.


                         Note You can configure your switch for Telnet by following the procedure in
                         “Configuring the Switch for Telnet” section on page 2-36.


               Step 2    Set the line speed on the emulation software to 9600 baud.
               Step 3    Unplug the switch power cord.
               Step 4    Hold the Mode button, and at the same time reconnect the power cord to the
                         switch.




5-4    Cisco IOS Desktop Switching Software Configuration Guide
Recovering from a Lost or Forgotten Password




         You can release the Mode button a second or two after the LED above port 1X
         goes off. Several lines of information about the software appear, as do
         instructions:
         The system has been interrupted prior to initializing the flash
         file system. The following commands will initialize the flash file
         system, and finish loading the operating system software:

         flash_init
         load_helper
         boot

Step 5   Initialize the Flash file system:
         switch: flash_init

Step 6   If you had set the console port speed to anything other than 9600, it has been
         reset to that particular speed. Change the emulation software line speed to match
         that of the switch console port.
Step 7   Load any helper files:
         switch: load_helper

Step 8   Display the contents of Flash memory:
         switch: dir flash:

         The switch file system is displayed:
         Directory of flash:

           2   -rwx        843947      Mar   01   1993   00:02:18 C2900XL-h-mz-112.8-SA
           4   drwx          3776      Mar   01   1993   01:23:24 html
          66   -rwx           130      Jan   01   1970   00:01:19 env_vars
          68   -rwx          1296      Mar   01   1993   06:55:51 config.text

         1728000 bytes total (456704 bytes free)

Step 9   Rename the configuration file to config.text.old.
         This file contains the password definition.
         switch: rename flash:config.text flash:config.text.old




                                                                     Troubleshooting 5-5
Recovery Procedures




               Step 10   Boot the system:
                         switch: boot

                         You are prompted to start the setup program. Enter N at the prompt:
                         Continue with the configuration dialog? [yes/no]: N

               Step 11   At the switch prompt, change to privileged EXEC mode:
                         switch> enable

               Step 12   Rename the configuration file to its original name:
                         switch# rename flash:config.text.old flash:config.text

               Step 13   Copy the configuration file into memory:
                         switch# copy flash:config.text system:running-config
                         Source filename [config.text]?
                         Destination filename [running-config]?

                         Press Return in response to the confirmation prompts.
                         The configuration file is now reloaded, and you can use the normal commands
                         to change the password.
               Step 14   Enter global configuration mode:
                         switch# config terminal

               Step 15   Change the password:
                         switch(config)# enable password <password>

                         or
                         switch(config)# enable secret <password>

               Step 16   Return to privileged EXEC mode.
                         switch(config)# end
                         switch#
               Step 17   Write the running configuration to the startup configuration file:
                         switch# copy running-config startup-config

               The new password is now included in the startup configuration.




5-6    Cisco IOS Desktop Switching Software Configuration Guide
Recovering from a Command Switch Failure




Recovering from a Command Switch Failure
             If a command switch loses power or fails in some other way, management contact with the
             member switches is lost and a new command switch must be installed. However,
             connectivity between switches that are still connected is not affected, and the member
             switches forward packets as usual. You can manage the members as standalone switches
             through the console port or, if they have IP addresses, through the other management
             interfaces.
             You can prepare for a command switch failure by assigning an IP address to a member
             switch or another switch that is command capable, making a note of the command-switch
             password, and cabling your cluster to provide redundant connectivity between the member
             switches and the replacement command switch. This section describes two solutions for
             replacing a failed command switch:
             •   Replacing a failed command switch with a cluster member
             •   Replace a failed command switch with another switch
             For information on command-capable switches, see the “Supported Hardware” section on
             page 1-3.


Replacing a Failed Command Switch with a Cluster Member
             Follow these steps to replace a failed command switch with a command-capable member
             of the same cluster:
             Step 1     Remove the failed switch from the cluster.
             Step 2     Insert the member switch in place of the failed command switch, and duplicate
                        its connections to the cluster members.
             Step 3     Start a CLI session on the new command switch.
                        You can access the CLI by using the console port or, if an IP address has been
                        assigned to the switch, by using Telnet. For details about using the console port,
                        refer to the switch installation guide.
             Step 4     At the switch prompt, change to privileged EXEC mode:
                        Switch> enable
                        Switch#




                                                                                    Troubleshooting 5-7
Recovery Procedures




               Step 5    Enter the password of the failed command switch.
               Step 6    From privileged EXEC mode, enter global configuration mode.
                         Switch# config terminal
                         Enter configuration commands, one per line.            End with CNTL/Z.
               Step 7    From global configuration mode, remove the member switch from the cluster.
                         Switch(config)# no cluster commander-address
               Step 8    Return to privileged EXEC mode.
                         Switch(config)# exit
                         Switch#
               Step 9    Use the setup program to configure the switch IP information.
                         This program prompts you for an IP address, subnet mask, default gateway, and
                         password. From privileged EXEC mode, enter setup and press Return.
                         Switch# setup
                                   --- System Configuration Dialog ---
                         At any point you may enter a question mark '?' for help.
                         Use ctrl-c to abort configuration dialog at any prompt.
                         Default settings are in square brackets '[]'.
                         Continue with configuration dialog? [yes/no]:
               Step 10   Enter Y at the first prompt:
                         Continue with configuration dialog? [yes/no]: y
                         If this prompt does not appear, enter enable, and press Return. Enter setup and
                         press Return to start the setup program.
               Step 11   Enter the switch IP address, and press Return:
                         Enter IP address: ip_address
               Step 12   Enter the subnet mask (IP netmask) address, and press Return:
                         Enter IP netmask: ip_netmask

               Step 13   Enter Y to enter a default gateway (router) address:
                         Would you like to enter a default gateway address? [yes]: y
               Step 14   Enter the IP address of the default gateway (router), and press Return:
                         Enter router IP address: IP_address




5-8    Cisco IOS Desktop Switching Software Configuration Guide
Recovering from a Command Switch Failure




Step 15   Enter a host name, and press Return:
          Enter host name: host_name
Step 16   Enter the password of the failed command switch again, and press Return:
          Enter enable secret password: secret_password

          The initial configuration displays:
          The following configuration command script was created:

          interface VLAN1
          ip address IP_address IP_netmask
          ip default-gateway IP_address
          enable secret 5 $1$jJql$VA6U.6uTjsa56Xx2yy/t30
          snmp community private rw
          snmp community public ro
          !
          end
          !
          Use this configuration? [yes/no]:
Step 17   Verify that the addresses are correct.
Step 18   Enter Y, and press Return if the displayed information is correct.
          If this information is not correct, enter N, press Return, and begin again at
          Step 9.
Step 19   Start your browser, and enter the IP address you just entered for the switch.
Step 20   Display the CVSM Home page for the switch, and select Enabled from the
          Command Switch drop-down list.
Step 21   Click Cluster Management and display Cluster Builder.
          It prompts you to add candidate switches. The password of the failed command
          switch is still valid for the cluster, and you should enter it when candidate
          switches are proposed for cluster membership.


          Note You can also add switches to the cluster by using the CLI. For the
          complete instructions, see the “CLI Procedure for Creating the Cluster” section
          on page 4-11.




                                                                     Troubleshooting 5-9
Recovery Procedures




Replacing a Failed Command Switch with Another Switch
               Follow these steps when you are replacing a failed command switch with a switch that is
               command capable but not part of the cluster:
               Step 1    Insert the new switch in place of the failed command switch, and duplicate its
                         connections to the cluster members.
               Step 2    Start a CLI session on the new command switch.
                         You can access the CLI by using the console port or, if an IP address has been
                         assigned to the switch, by using Telnet. For details about using the console port,
                         refer to the switch installation guide.
               Step 3    At the switch prompt, change to privileged EXEC mode:
                         Switch> enable
                         Switch#
               Step 4    Enter the password of the failed command switch.
               Step 5    Use the setup program to configure the switch IP information.
                         This program prompts you for an IP address, subnet mask, default gateway, and
                         password. From privileged EXEC mode, enter setup and press Return.
                         Switch# setup
                                    --- System Configuration Dialog ---
                         At any point you may enter a question mark '?' for help.
                         Use ctrl-c to abort configuration dialog at any prompt.
                         Default settings are in square brackets '[]'.
                         Continue with configuration dialog? [yes/no]:
               Step 6    Enter Y at the first prompt:
                         Continue with configuration dialog? [yes/no]: y
                         If this prompt does not appear, enter enable, and press Return. Enter setup and
                         press Return to start the setup program.
               Step 7    Enter the switch IP address, and press Return:
                         Enter IP address: ip_address
               Step 8    Enter the subnet mask (IP netmask) address, and press Return:
                         Enter IP netmask: ip_netmask




5-10   Cisco IOS Desktop Switching Software Configuration Guide
Recovering from a Command Switch Failure




Step 9    Enter Y to enter a default gateway (router) address:
          Would you like to enter a default gateway address? [yes]: y
Step 10   Enter the IP address of the default gateway (router), and press Return:
          Enter router IP address: IP_address
Step 11   Enter a host name, and press Return:
          Enter host name: host_name
Step 12   Enter the password of the failed command switch again, and press Return:
          Enter enable secret password: secret_password

          The initial configuration displays:
          The following configuration command script was created:

          interface VLAN1
          ip address IP_address IP_netmask
          ip default-gateway IP_address
          enable secret 5 $1$jJql$VA6U.6uTjsa56Xx2yy/t30
          snmp community private rw
          snmp community public ro
          !
          end
          !
          Use this configuration? [yes/no]:
Step 13   Verify that the addresses are correct.
Step 14   Enter Y, and press Return if the displayed information is correct.
          If this information is not correct, enter N, press Return, and begin again at
          Step 5.
Step 15   Start your browser, and enter the IP address you just entered for the switch.
Step 16   Display the CVSM Home page for the switch, and select Enabled from the
          Command Switch drop-down list.
Step 17   Click Cluster Management and display Cluster Builder.
          It prompts you to add the candidate switches. The password of the failed
          command switch is still valid for the cluster. Enter it when candidate switches
          are proposed for cluster membership, and click OK.




                                                                    Troubleshooting 5-11
Recovery Procedures




                          Note You can also add switches to the cluster by using the CLI. For the
                          complete instructions, see the “CLI Procedure for Creating the Cluster” section
                          on page 4-11.



Recovering from Lost Member Connectivity
               Some configurations can prevent the command switch from maintaining contact with
               member switches. If you are unable to maintain management contact with a member, and
               the member switch is forwarding packets normally, check for the following
               port-configuration conflicts:
               •   Member switches cannot connect to the command switch through a port that is defined
                   as a network port. For information on the network port feature, see the “Enabling a
                   Network Port” section on page 3-33.
               •   Member switches must connect to the command switch through a port that belongs to
                   the management VLAN. On existing clusters, you must manually configure the
                   management VLAN on each member, candidate, and command switch to be the same
                   by using the CLI through a console connection. For more information, see the
                   “Changing the Management VLAN on an Existing Cluster” section on page 4-4 and
                   “Changing the Management VLAN on Candidate Switches” section on page 4-5.
               •   Member switches connected to the command switch through a secured port can lose
                   connectivity if the port is disabled due to a security violation. Secured ports are
                   described in the “Enabling Port Security” section on page 3-76.




5-12   Cisco IOS Desktop Switching Software Configuration Guide

More Related Content

What's hot

Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemBetselove
 
Huawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setupHuawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setupIPMAX s.r.l.
 
0393 1 qs_emea_eng_print
0393 1 qs_emea_eng_print0393 1 qs_emea_eng_print
0393 1 qs_emea_eng_printDavid Reyes
 
20088 1 ccna3 3.1-06 switch configurations
20088 1 ccna3 3.1-06 switch configurations20088 1 ccna3 3.1-06 switch configurations
20088 1 ccna3 3.1-06 switch configurationsDipak Misra
 
8. internal components of router
8. internal components of router8. internal components of router
8. internal components of routerSwarndeep Singh
 
Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 33c telecom
 
Router configuration
Router configurationRouter configuration
Router configuration97148881557
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSanilinvns
 
Pandora FMS: Hyper V Plugin
Pandora FMS: Hyper V PluginPandora FMS: Hyper V Plugin
Pandora FMS: Hyper V PluginPandora FMS
 
How to configure inband management for huawei ma5616
How to configure inband management for huawei ma5616How to configure inband management for huawei ma5616
How to configure inband management for huawei ma5616Huanetwork
 
How to Configure QinQ?
How to Configure QinQ?How to Configure QinQ?
How to Configure QinQ?Huanetwork
 
At8000 s configuracao de gerenciamento
At8000 s configuracao de gerenciamentoAt8000 s configuracao de gerenciamento
At8000 s configuracao de gerenciamentoNetPlus
 
CSM Storage Debugging
CSM Storage DebuggingCSM Storage Debugging
CSM Storage DebuggingzOSCommserver
 
Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Netwax Lab
 

What's hot (20)

Multi wanversion1.2
Multi wanversion1.2Multi wanversion1.2
Multi wanversion1.2
 
Cis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystemCis81 ccna1v5-2-configuring networkoperatingsystem
Cis81 ccna1v5-2-configuring networkoperatingsystem
 
Modes of router
Modes of routerModes of router
Modes of router
 
Huawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setupHuawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setup
 
0393 1 qs_emea_eng_print
0393 1 qs_emea_eng_print0393 1 qs_emea_eng_print
0393 1 qs_emea_eng_print
 
Router commands
Router commandsRouter commands
Router commands
 
20088 1 ccna3 3.1-06 switch configurations
20088 1 ccna3 3.1-06 switch configurations20088 1 ccna3 3.1-06 switch configurations
20088 1 ccna3 3.1-06 switch configurations
 
8. internal components of router
8. internal components of router8. internal components of router
8. internal components of router
 
Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3Hướng dẫn cài đặt switch planet layer 3
Hướng dẫn cài đặt switch planet layer 3
 
Router configuration
Router configurationRouter configuration
Router configuration
 
524049 Manual
524049 Manual524049 Manual
524049 Manual
 
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERSDay 1 INTRODUCTION TO IOS AND CISCO ROUTERS
Day 1 INTRODUCTION TO IOS AND CISCO ROUTERS
 
Pandora FMS: Hyper V Plugin
Pandora FMS: Hyper V PluginPandora FMS: Hyper V Plugin
Pandora FMS: Hyper V Plugin
 
How to configure inband management for huawei ma5616
How to configure inband management for huawei ma5616How to configure inband management for huawei ma5616
How to configure inband management for huawei ma5616
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
 
How to Configure QinQ?
How to Configure QinQ?How to Configure QinQ?
How to Configure QinQ?
 
Basic Configurations on Router
Basic Configurations on RouterBasic Configurations on Router
Basic Configurations on Router
 
At8000 s configuracao de gerenciamento
At8000 s configuracao de gerenciamentoAt8000 s configuracao de gerenciamento
At8000 s configuracao de gerenciamento
 
CSM Storage Debugging
CSM Storage DebuggingCSM Storage Debugging
CSM Storage Debugging
 
Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)Cisco IOS (internetworking operating system)
Cisco IOS (internetworking operating system)
 

Viewers also liked

Notas clase java ii
Notas clase java iiNotas clase java ii
Notas clase java ii1 2d
 
Vlan truks
Vlan truksVlan truks
Vlan truks1 2d
 
Comandos ospf
Comandos ospfComandos ospf
Comandos ospf1 2d
 
Spantree
SpantreeSpantree
Spantree1 2d
 
5. administracioìn de claves y certificados
5. administracioìn de claves y certificados5. administracioìn de claves y certificados
5. administracioìn de claves y certificados1 2d
 
Notas clase
Notas claseNotas clase
Notas clase1 2d
 
J2me
J2meJ2me
J2me1 2d
 
Led switch
Led switchLed switch
Led switch1 2d
 

Viewers also liked (9)

Notas clase java ii
Notas clase java iiNotas clase java ii
Notas clase java ii
 
Vlan truks
Vlan truksVlan truks
Vlan truks
 
7
77
7
 
Comandos ospf
Comandos ospfComandos ospf
Comandos ospf
 
Spantree
SpantreeSpantree
Spantree
 
5. administracioìn de claves y certificados
5. administracioìn de claves y certificados5. administracioìn de claves y certificados
5. administracioìn de claves y certificados
 
Notas clase
Notas claseNotas clase
Notas clase
 
J2me
J2meJ2me
J2me
 
Led switch
Led switchLed switch
Led switch
 

Similar to 6

Module 1 Basic Device Configuration.pptx
Module 1 Basic Device Configuration.pptxModule 1 Basic Device Configuration.pptx
Module 1 Basic Device Configuration.pptxJabirAlHujaifa
 
Configuring the cisco switch with the cli based setup program
Configuring the cisco switch with the cli based setup programConfiguring the cisco switch with the cli based setup program
Configuring the cisco switch with the cli based setup program3Anetwork com
 
Aruba os 6.3.x quick start guide
Aruba os 6.3.x quick start guideAruba os 6.3.x quick start guide
Aruba os 6.3.x quick start guideDave Norris
 
Ccna icnd1-labs - exercices
Ccna icnd1-labs - exercicesCcna icnd1-labs - exercices
Ccna icnd1-labs - exercicessaqrjareh
 
Interconnecting cisco networking devices part-1
Interconnecting cisco networking devices part-1Interconnecting cisco networking devices part-1
Interconnecting cisco networking devices part-1DAVID RAUDALES
 
fabric os password recovery
fabric os password recoveryfabric os password recovery
fabric os password recoverygrega4age
 
Basic switching concepts and configuration
Basic switching concepts and configurationBasic switching concepts and configuration
Basic switching concepts and configurationMohammedseleim
 
Bluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaBluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaDcube Tech Ventures
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1Tai Lam
 
ESM High Availability Module User's Guide
ESM High Availability Module User's GuideESM High Availability Module User's Guide
ESM High Availability Module User's GuideProtect724gopi
 
ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014Đồng Quốc Vương
 
Informix HA Best Practices
Informix HA Best Practices Informix HA Best Practices
Informix HA Best Practices Scott Lashley
 
Always on high availability best practices for informix
Always on high availability best practices for informixAlways on high availability best practices for informix
Always on high availability best practices for informixIBM_Info_Management
 
Mvi56 e mcmr quickstart
Mvi56 e mcmr quickstartMvi56 e mcmr quickstart
Mvi56 e mcmr quickstartSEICO
 

Similar to 6 (20)

Module 1 Basic Device Configuration.pptx
Module 1 Basic Device Configuration.pptxModule 1 Basic Device Configuration.pptx
Module 1 Basic Device Configuration.pptx
 
Basic Divice.pptx
Basic Divice.pptxBasic Divice.pptx
Basic Divice.pptx
 
Configuring the cisco switch with the cli based setup program
Configuring the cisco switch with the cli based setup programConfiguring the cisco switch with the cli based setup program
Configuring the cisco switch with the cli based setup program
 
ArubaOS 6.3.x Quick Start Guide
ArubaOS 6.3.x Quick Start GuideArubaOS 6.3.x Quick Start Guide
ArubaOS 6.3.x Quick Start Guide
 
Aruba os 6.3.x quick start guide
Aruba os 6.3.x quick start guideAruba os 6.3.x quick start guide
Aruba os 6.3.x quick start guide
 
Ccna icnd1-labs - exercices
Ccna icnd1-labs - exercicesCcna icnd1-labs - exercices
Ccna icnd1-labs - exercices
 
Interconnecting cisco networking devices part-1
Interconnecting cisco networking devices part-1Interconnecting cisco networking devices part-1
Interconnecting cisco networking devices part-1
 
fabric os password recovery
fabric os password recoveryfabric os password recovery
fabric os password recovery
 
Basic switching concepts and configuration
Basic switching concepts and configurationBasic switching concepts and configuration
Basic switching concepts and configuration
 
PC LEESOON 6.pptx
PC LEESOON 6.pptxPC LEESOON 6.pptx
PC LEESOON 6.pptx
 
Bluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything IndiaBluetooth quick start_guide / Controlanything India
Bluetooth quick start_guide / Controlanything India
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1
 
ESM High Availability Module User's Guide
ESM High Availability Module User's GuideESM High Availability Module User's Guide
ESM High Availability Module User's Guide
 
PLC: Easy PLC User manual
PLC: Easy PLC User manualPLC: Easy PLC User manual
PLC: Easy PLC User manual
 
Bsd routers
Bsd routersBsd routers
Bsd routers
 
ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014ccna 1 chapter 2 v5.0 exam answers 2014
ccna 1 chapter 2 v5.0 exam answers 2014
 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 
Informix HA Best Practices
Informix HA Best Practices Informix HA Best Practices
Informix HA Best Practices
 
Always on high availability best practices for informix
Always on high availability best practices for informixAlways on high availability best practices for informix
Always on high availability best practices for informix
 
Mvi56 e mcmr quickstart
Mvi56 e mcmr quickstartMvi56 e mcmr quickstart
Mvi56 e mcmr quickstart
 

More from 1 2d

6. control de acceso
6. control de acceso6. control de acceso
6. control de acceso1 2d
 
4. certificados digitales
4. certificados digitales4. certificados digitales
4. certificados digitales1 2d
 
3. boletines de mensajes y firmas digitales
3. boletines de mensajes y firmas digitales3. boletines de mensajes y firmas digitales
3. boletines de mensajes y firmas digitales1 2d
 
2. criptografiìa con java
2. criptografiìa con java2. criptografiìa con java
2. criptografiìa con java1 2d
 
1. introduccioìn a la seguridad
1. introduccioìn a la seguridad1. introduccioìn a la seguridad
1. introduccioìn a la seguridad1 2d
 
1046 pdfsam opos informatica
1046 pdfsam opos informatica1046 pdfsam opos informatica
1046 pdfsam opos informatica1 2d
 
1203 pdfsam opos informatica
1203 pdfsam opos informatica1203 pdfsam opos informatica
1203 pdfsam opos informatica1 2d
 
878 pdfsam opos informatica
878 pdfsam opos informatica878 pdfsam opos informatica
878 pdfsam opos informatica1 2d
 
516 pdfsam opos informatica
516 pdfsam opos informatica516 pdfsam opos informatica
516 pdfsam opos informatica1 2d
 
1704 pdfsam opos informatica
1704 pdfsam opos informatica1704 pdfsam opos informatica
1704 pdfsam opos informatica1 2d
 
1893 pdfsam opos informatica
1893 pdfsam opos informatica1893 pdfsam opos informatica
1893 pdfsam opos informatica1 2d
 
516 pdfsam opos informatica
516 pdfsam opos informatica516 pdfsam opos informatica
516 pdfsam opos informatica1 2d
 
706 pdfsam opos informatica
706 pdfsam opos informatica706 pdfsam opos informatica
706 pdfsam opos informatica1 2d
 
330 pdfsam opos informatica
330 pdfsam opos informatica330 pdfsam opos informatica
330 pdfsam opos informatica1 2d
 
1 pdfsam opos informatica
1 pdfsam opos informatica1 pdfsam opos informatica
1 pdfsam opos informatica1 2d
 
1379 pdfsam opos informatica
1379 pdfsam opos informatica1379 pdfsam opos informatica
1379 pdfsam opos informatica1 2d
 
706 pdfsam opos informatica
706 pdfsam opos informatica706 pdfsam opos informatica
706 pdfsam opos informatica1 2d
 
Guia del-en roo-tador-2.8
Guia del-en roo-tador-2.8Guia del-en roo-tador-2.8
Guia del-en roo-tador-2.81 2d
 
Tlk
TlkTlk
Tlk1 2d
 
Conf basica switch-p1
Conf basica switch-p1Conf basica switch-p1
Conf basica switch-p11 2d
 

More from 1 2d (20)

6. control de acceso
6. control de acceso6. control de acceso
6. control de acceso
 
4. certificados digitales
4. certificados digitales4. certificados digitales
4. certificados digitales
 
3. boletines de mensajes y firmas digitales
3. boletines de mensajes y firmas digitales3. boletines de mensajes y firmas digitales
3. boletines de mensajes y firmas digitales
 
2. criptografiìa con java
2. criptografiìa con java2. criptografiìa con java
2. criptografiìa con java
 
1. introduccioìn a la seguridad
1. introduccioìn a la seguridad1. introduccioìn a la seguridad
1. introduccioìn a la seguridad
 
1046 pdfsam opos informatica
1046 pdfsam opos informatica1046 pdfsam opos informatica
1046 pdfsam opos informatica
 
1203 pdfsam opos informatica
1203 pdfsam opos informatica1203 pdfsam opos informatica
1203 pdfsam opos informatica
 
878 pdfsam opos informatica
878 pdfsam opos informatica878 pdfsam opos informatica
878 pdfsam opos informatica
 
516 pdfsam opos informatica
516 pdfsam opos informatica516 pdfsam opos informatica
516 pdfsam opos informatica
 
1704 pdfsam opos informatica
1704 pdfsam opos informatica1704 pdfsam opos informatica
1704 pdfsam opos informatica
 
1893 pdfsam opos informatica
1893 pdfsam opos informatica1893 pdfsam opos informatica
1893 pdfsam opos informatica
 
516 pdfsam opos informatica
516 pdfsam opos informatica516 pdfsam opos informatica
516 pdfsam opos informatica
 
706 pdfsam opos informatica
706 pdfsam opos informatica706 pdfsam opos informatica
706 pdfsam opos informatica
 
330 pdfsam opos informatica
330 pdfsam opos informatica330 pdfsam opos informatica
330 pdfsam opos informatica
 
1 pdfsam opos informatica
1 pdfsam opos informatica1 pdfsam opos informatica
1 pdfsam opos informatica
 
1379 pdfsam opos informatica
1379 pdfsam opos informatica1379 pdfsam opos informatica
1379 pdfsam opos informatica
 
706 pdfsam opos informatica
706 pdfsam opos informatica706 pdfsam opos informatica
706 pdfsam opos informatica
 
Guia del-en roo-tador-2.8
Guia del-en roo-tador-2.8Guia del-en roo-tador-2.8
Guia del-en roo-tador-2.8
 
Tlk
TlkTlk
Tlk
 
Conf basica switch-p1
Conf basica switch-p1Conf basica switch-p1
Conf basica switch-p1
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

6

  • 1. C H A PT E R 5 Troubleshooting This chapter describes how to identify and resolve software problems related to the IOS software. Depending on the nature of the problem, you can use the command-line interface (CLI) or Cisco Visual Switch Manager (CVSM) to identify and resolve the problem. This chapter describes how to perform the following tasks: • Identify an autonegotiation mismatch • Recover from corrupted software • Recover from a lost or forgotten password • Recover from a failed command switch • Maintain connectivity with cluster members Autonegotiation Mismatches The IEEE 802.3u autonegotiation protocol manages the switch settings for speed (10 Mbps or 100 Mbps) and duplex (half or full). There are situations when this protocol can incorrectly align these settings, reducing performance. A mismatch occurs under these circumstances: • A manually-set speed or duplex parameter is different from the manually set speed or duplex parameter on the connected port. • A port is in autonegotiate and the connected port is set to full duplex with no autonegotiation. To maximize switch performance and ensure a link, follow one of these guidelines when changing the settings for duplex and speed: Troubleshooting 5-1
  • 2. Identifying an Autonegotiation Mismatch • Let both ports autonegotiate both speed and duplex. • Manually set the speed and duplex parameters for the ports on both ends of the connection. Identifying an Autonegotiation Mismatch An autonegotiation mismatch can occur under these circumstances: • A manually set duplex parameter is different from that set on the connected port. • A port is set to autonegotiate and the connected port is set to full duplex with no autonegotiation. The result of a mismatch on Fast Ethernet ports is reduced performance or link errors. For Gigabit Ethernet ports, the link does not come up, and no statistics are reported. To identify and confirm an autonegotiation mismatch when the Fast Ethernet port is in half-duplex mode: Step 1 Start CVSM and select Port>Port Configuration from the menu bar. Step 2 In the Statistics column, click View for the port. Check for late-collision errors. A high number of late collisions could mean the port is connected to a port set to full-duplex mode. Step 3 Check the port to which this port is connected. If it is in full-duplex mode, a mismatch exists. Step 4 Return to the Port Configuration page, and click View to check for Frame Check Sequence (FCS) errors on the full-duplex port. Step 5 Compare your findings with the following rules: • Late collisions or no link errors indicate that the half-duplex port is connected to a port set to full-duplex. • FCS errors indicate that the full-duplex port is connected to a port set to half duplex. 5-2 Cisco IOS Desktop Switching Software Configuration Guide
  • 3. Recovery Procedures To correct mismatched port settings, follow one of these guidelines: • Let both ports autonegotiate both speed and duplex. • Manually set the speed and duplex parameters for the ports on both ends of the connection. Note If a remote Fast Ethernet device does not autonegotiate, configure the duplex settings on the two ports to match. The speed parameter can adjust itself even if the connected port does not autonegotiate. To connect to a remote Gigabit Ethernet device that does not autonegotiate, disable autonegotiation on the local device, and set the duplex and flow control parameters to be compatible with the remote device. Recovery Procedures The recovery procedures in this section require that you have physical access to the switch. Recovery procedures include the following topics: • Recovering from corrupted software • Recovering from a lost or forgotten password • Recovering from a command-switch failure Recovering from Corrupted Software Switch software can be corrupted during an upgrade, and it is also possible to download the wrong file. In both cases, the switch does not pass POST, and there is no connectivity. The following procedure uses the XMODEM Protocol to recover from a corrupt or wrong image file. This procedure is largely dependent on the emulation software you are using. Step 1 Connect a PC with terminal emulation software supporting the XMODEM Protocol to the switch console port. Step 2 Set the line speed on the emulation software to 9600 baud. Step 3 Unplug the switch power cord. Troubleshooting 5-3
  • 4. Recovery Procedures Step 4 Reconnect the power cord to the switch. The software image does not load. The switch starts in boot loader mode, which is indicated by the switch: prompt Step 5 Use the boot loader to enter commands, and start the transfer. switch: copy xmodem: flash:image_filename Step 6 When the XMODEM request appears, use the appropriate command on the terminal-emulation software to start the transfer and copy the software image into Flash memory. Recovering from a Lost or Forgotten Password Follow the steps in this procedure if you have forgotten or lost the switch password. Step 1 Connect a terminal or PC with terminal emulation software to the console port. For more information, refer to the switch installation guide. Note You can configure your switch for Telnet by following the procedure in “Configuring the Switch for Telnet” section on page 2-36. Step 2 Set the line speed on the emulation software to 9600 baud. Step 3 Unplug the switch power cord. Step 4 Hold the Mode button, and at the same time reconnect the power cord to the switch. 5-4 Cisco IOS Desktop Switching Software Configuration Guide
  • 5. Recovering from a Lost or Forgotten Password You can release the Mode button a second or two after the LED above port 1X goes off. Several lines of information about the software appear, as do instructions: The system has been interrupted prior to initializing the flash file system. The following commands will initialize the flash file system, and finish loading the operating system software: flash_init load_helper boot Step 5 Initialize the Flash file system: switch: flash_init Step 6 If you had set the console port speed to anything other than 9600, it has been reset to that particular speed. Change the emulation software line speed to match that of the switch console port. Step 7 Load any helper files: switch: load_helper Step 8 Display the contents of Flash memory: switch: dir flash: The switch file system is displayed: Directory of flash: 2 -rwx 843947 Mar 01 1993 00:02:18 C2900XL-h-mz-112.8-SA 4 drwx 3776 Mar 01 1993 01:23:24 html 66 -rwx 130 Jan 01 1970 00:01:19 env_vars 68 -rwx 1296 Mar 01 1993 06:55:51 config.text 1728000 bytes total (456704 bytes free) Step 9 Rename the configuration file to config.text.old. This file contains the password definition. switch: rename flash:config.text flash:config.text.old Troubleshooting 5-5
  • 6. Recovery Procedures Step 10 Boot the system: switch: boot You are prompted to start the setup program. Enter N at the prompt: Continue with the configuration dialog? [yes/no]: N Step 11 At the switch prompt, change to privileged EXEC mode: switch> enable Step 12 Rename the configuration file to its original name: switch# rename flash:config.text.old flash:config.text Step 13 Copy the configuration file into memory: switch# copy flash:config.text system:running-config Source filename [config.text]? Destination filename [running-config]? Press Return in response to the confirmation prompts. The configuration file is now reloaded, and you can use the normal commands to change the password. Step 14 Enter global configuration mode: switch# config terminal Step 15 Change the password: switch(config)# enable password <password> or switch(config)# enable secret <password> Step 16 Return to privileged EXEC mode. switch(config)# end switch# Step 17 Write the running configuration to the startup configuration file: switch# copy running-config startup-config The new password is now included in the startup configuration. 5-6 Cisco IOS Desktop Switching Software Configuration Guide
  • 7. Recovering from a Command Switch Failure Recovering from a Command Switch Failure If a command switch loses power or fails in some other way, management contact with the member switches is lost and a new command switch must be installed. However, connectivity between switches that are still connected is not affected, and the member switches forward packets as usual. You can manage the members as standalone switches through the console port or, if they have IP addresses, through the other management interfaces. You can prepare for a command switch failure by assigning an IP address to a member switch or another switch that is command capable, making a note of the command-switch password, and cabling your cluster to provide redundant connectivity between the member switches and the replacement command switch. This section describes two solutions for replacing a failed command switch: • Replacing a failed command switch with a cluster member • Replace a failed command switch with another switch For information on command-capable switches, see the “Supported Hardware” section on page 1-3. Replacing a Failed Command Switch with a Cluster Member Follow these steps to replace a failed command switch with a command-capable member of the same cluster: Step 1 Remove the failed switch from the cluster. Step 2 Insert the member switch in place of the failed command switch, and duplicate its connections to the cluster members. Step 3 Start a CLI session on the new command switch. You can access the CLI by using the console port or, if an IP address has been assigned to the switch, by using Telnet. For details about using the console port, refer to the switch installation guide. Step 4 At the switch prompt, change to privileged EXEC mode: Switch> enable Switch# Troubleshooting 5-7
  • 8. Recovery Procedures Step 5 Enter the password of the failed command switch. Step 6 From privileged EXEC mode, enter global configuration mode. Switch# config terminal Enter configuration commands, one per line. End with CNTL/Z. Step 7 From global configuration mode, remove the member switch from the cluster. Switch(config)# no cluster commander-address Step 8 Return to privileged EXEC mode. Switch(config)# exit Switch# Step 9 Use the setup program to configure the switch IP information. This program prompts you for an IP address, subnet mask, default gateway, and password. From privileged EXEC mode, enter setup and press Return. Switch# setup --- System Configuration Dialog --- At any point you may enter a question mark '?' for help. Use ctrl-c to abort configuration dialog at any prompt. Default settings are in square brackets '[]'. Continue with configuration dialog? [yes/no]: Step 10 Enter Y at the first prompt: Continue with configuration dialog? [yes/no]: y If this prompt does not appear, enter enable, and press Return. Enter setup and press Return to start the setup program. Step 11 Enter the switch IP address, and press Return: Enter IP address: ip_address Step 12 Enter the subnet mask (IP netmask) address, and press Return: Enter IP netmask: ip_netmask Step 13 Enter Y to enter a default gateway (router) address: Would you like to enter a default gateway address? [yes]: y Step 14 Enter the IP address of the default gateway (router), and press Return: Enter router IP address: IP_address 5-8 Cisco IOS Desktop Switching Software Configuration Guide
  • 9. Recovering from a Command Switch Failure Step 15 Enter a host name, and press Return: Enter host name: host_name Step 16 Enter the password of the failed command switch again, and press Return: Enter enable secret password: secret_password The initial configuration displays: The following configuration command script was created: interface VLAN1 ip address IP_address IP_netmask ip default-gateway IP_address enable secret 5 $1$jJql$VA6U.6uTjsa56Xx2yy/t30 snmp community private rw snmp community public ro ! end ! Use this configuration? [yes/no]: Step 17 Verify that the addresses are correct. Step 18 Enter Y, and press Return if the displayed information is correct. If this information is not correct, enter N, press Return, and begin again at Step 9. Step 19 Start your browser, and enter the IP address you just entered for the switch. Step 20 Display the CVSM Home page for the switch, and select Enabled from the Command Switch drop-down list. Step 21 Click Cluster Management and display Cluster Builder. It prompts you to add candidate switches. The password of the failed command switch is still valid for the cluster, and you should enter it when candidate switches are proposed for cluster membership. Note You can also add switches to the cluster by using the CLI. For the complete instructions, see the “CLI Procedure for Creating the Cluster” section on page 4-11. Troubleshooting 5-9
  • 10. Recovery Procedures Replacing a Failed Command Switch with Another Switch Follow these steps when you are replacing a failed command switch with a switch that is command capable but not part of the cluster: Step 1 Insert the new switch in place of the failed command switch, and duplicate its connections to the cluster members. Step 2 Start a CLI session on the new command switch. You can access the CLI by using the console port or, if an IP address has been assigned to the switch, by using Telnet. For details about using the console port, refer to the switch installation guide. Step 3 At the switch prompt, change to privileged EXEC mode: Switch> enable Switch# Step 4 Enter the password of the failed command switch. Step 5 Use the setup program to configure the switch IP information. This program prompts you for an IP address, subnet mask, default gateway, and password. From privileged EXEC mode, enter setup and press Return. Switch# setup --- System Configuration Dialog --- At any point you may enter a question mark '?' for help. Use ctrl-c to abort configuration dialog at any prompt. Default settings are in square brackets '[]'. Continue with configuration dialog? [yes/no]: Step 6 Enter Y at the first prompt: Continue with configuration dialog? [yes/no]: y If this prompt does not appear, enter enable, and press Return. Enter setup and press Return to start the setup program. Step 7 Enter the switch IP address, and press Return: Enter IP address: ip_address Step 8 Enter the subnet mask (IP netmask) address, and press Return: Enter IP netmask: ip_netmask 5-10 Cisco IOS Desktop Switching Software Configuration Guide
  • 11. Recovering from a Command Switch Failure Step 9 Enter Y to enter a default gateway (router) address: Would you like to enter a default gateway address? [yes]: y Step 10 Enter the IP address of the default gateway (router), and press Return: Enter router IP address: IP_address Step 11 Enter a host name, and press Return: Enter host name: host_name Step 12 Enter the password of the failed command switch again, and press Return: Enter enable secret password: secret_password The initial configuration displays: The following configuration command script was created: interface VLAN1 ip address IP_address IP_netmask ip default-gateway IP_address enable secret 5 $1$jJql$VA6U.6uTjsa56Xx2yy/t30 snmp community private rw snmp community public ro ! end ! Use this configuration? [yes/no]: Step 13 Verify that the addresses are correct. Step 14 Enter Y, and press Return if the displayed information is correct. If this information is not correct, enter N, press Return, and begin again at Step 5. Step 15 Start your browser, and enter the IP address you just entered for the switch. Step 16 Display the CVSM Home page for the switch, and select Enabled from the Command Switch drop-down list. Step 17 Click Cluster Management and display Cluster Builder. It prompts you to add the candidate switches. The password of the failed command switch is still valid for the cluster. Enter it when candidate switches are proposed for cluster membership, and click OK. Troubleshooting 5-11
  • 12. Recovery Procedures Note You can also add switches to the cluster by using the CLI. For the complete instructions, see the “CLI Procedure for Creating the Cluster” section on page 4-11. Recovering from Lost Member Connectivity Some configurations can prevent the command switch from maintaining contact with member switches. If you are unable to maintain management contact with a member, and the member switch is forwarding packets normally, check for the following port-configuration conflicts: • Member switches cannot connect to the command switch through a port that is defined as a network port. For information on the network port feature, see the “Enabling a Network Port” section on page 3-33. • Member switches must connect to the command switch through a port that belongs to the management VLAN. On existing clusters, you must manually configure the management VLAN on each member, candidate, and command switch to be the same by using the CLI through a console connection. For more information, see the “Changing the Management VLAN on an Existing Cluster” section on page 4-4 and “Changing the Management VLAN on Candidate Switches” section on page 4-5. • Member switches connected to the command switch through a secured port can lose connectivity if the port is disabled due to a security violation. Secured ports are described in the “Enabling Port Security” section on page 3-76. 5-12 Cisco IOS Desktop Switching Software Configuration Guide