N2K-C2232TM-10GE

Hi all

I'm looking for a GE copper switch 24-port 10. After any time, I just N2K-C2232TM-10GE. However, this switch is extensor of fabric, and it is used with the Nexus 5 K series switches.

My question is

Can I use this standalone Nexus 2 K like other is L2?

Thank you

Kind regards.

24-port copper 10 GigE is the type of a command. Most of the people who need 10Gig don't hesitate to go to a somewhat larger switch. Your best options are probably the witch "N3K-C3064TQ-10GT" has 48 ports of 10GbaseT and 4 ports QSFP or the "N5K-C5596T-FA" that comes with 32 ports or 10GbaseT and 16-port SFP +, it has also 3 expansion slots and can extensor of fabric of support if you think that you can at a given time.

Tags: Cisco Network

Similar Questions

  • Cisco FI (v2.5) + (2232PP) = not taken into charge-model FEX

    Hello

    We run a laboratory for a future project "installation program of the bunch" - Cisco fabric interconnect with FEX. Installation of the laboratory is 6120XP version 2.5(2a) and 2232PP FEX, yet it maintains off trowing erros. An error that comes out is F1635 ("Fex N2K-C2232PP-10GE is not supported in this version of UCS Manager"). According to literature UCSM v2.0.2 and more should support FEX on FICs times 6100 and 6200. What I am doing wrong? I appreciate all help.

    Hello

    UCSM 2.5.X is for cartridges of the modular UCS (M series).

    UCSM 2.X.X (for example 2.2.5B) is for the UCS blade/rack servers.

    If you upgrade your UCSM software to be a correct version, you should see is no longer the mistake.

    HTH,

    Wes

  • Force10 S2410-01-10GE - 24 p does support hybrid-mode command?

    Does anyone know if the Force10 S2410-01-10GE switch - 24 p supports a command that is similar to an order for OTF to hybrid mode?

    I'm in the need to have a vlan are supported interfaces also well marked and unmarked. Is there something similar to the AVSTP?

    Version running on this switch of current is 2.4.1.11

    John

    With the AVSTP, I think you need create the VLAN and then enter in the interface VLAN, and then define this VLAN tagged, not marked or PVID. Here is an article on the creation of VLANs and affecting the tag/no identified for VLAN interface.

    http://bit.LY/1cYhbfV

    So, you should be able to define several as tagged VLANs. And then 1 VLAN as the PVID for all traffic not marked. Page 224 of the guide also describes some more detail.

    http://Dell.to/1cgZ6ca

    Hope this helps

  • N5K - N2K design: straight through the Active topology vs mobile comparison

    Hello

    Can anyone provide a comparison on straight through the topology N2K N5K Active mobile vs . In addition need to answer on below

    -Can we send active active traffic using straight through the topology with using VPC at end of server.

    Thanks in advance.

    Kind regards

    Farhad

    Hi Farhad,

    Please see below links where you can find more information on the topologies of vPC straight through, active and improved.

    http://www.Cisco.com/en/us/docs/switches/Datacenter/nexus5000/SW/mkt_ops...

    I don't think that you would be able to send the active traffic just by using straight through topology. You can use VPC and bind the 2 straight through aircraft spread over 2 switches sheets for active traffic however.

    Please find the link as well, where are the topologies supported between Nexus devices and fex below.

    http://www.Cisco.com/c/en/us/support/docs/switches/nexus-2000-series-FAB...

    Kind regards
    Sunil.

  • CTS (effect) and WS - X 6716-10GE (with DFC4)

    Hi, I'm not able to activate the effect (manual CTS) on the WS - X 6716-10GE module. I have a VSS with VS-SUP2T - 10G installed. I am able to activate the effect (manual CTS) on the WS - X 6908 module - 10 G.

    Effect is supported on the WS - X 6716-10GE (DFC4)?

    Magnus

    The WS - X 6716-10 G is CTS aware but not CTS able which means it can include tags for shipping decisions but not add tags.

    http://www.Cisco.com/c/en/us/TD/docs/switches/LAN/catalyst6500/iOS/15-1SY/config_guide/sup2T/15_1_sy_swcg_2T/trustsec.html

    Jon

  • Intel x 520 cards model E10G41BFSR 10GE

    We are buying new hardware (HP DL380s G6 72 GB ram) including new 10GE cards. We are wanting to use new channels firmware of Intel (82599) that are used in their x 520 10GE cards in particular their E10G41BFSR card.  I couldn't find them on the list of hardware supported for VSphere and I was wondering if anyone has tried using these maps?

    A new driver is available that includes support for server adapter Intel Ethernet X 520 series: VMware ESX/ESXi 4.0 for controllers Intel 82598 and 82599 10 Gigabit Ethernet driver CD.

    Mark H

  • 10GE copper Nexus 5 k

    Hi all.

    Small question: what FPS do we need on our Cisco Nexus 5 k to connect to a server to 10 Gigabit Ethernet, if this is going to be connected with a CAT7/RJ-45 UTP cable?

    We have several SFP modules that work with fiber on our Nexus N5K C5596UP, but we have never signed anything with copper, and still less that supports 10G. Someone told us that it has been supported, but check the Cisco documentation we only see cables twinax, nothing else.

    I appreciate all help.

    Thank you.

    Hello

    I don't think that a SFP transceiver-10GBASE-T is available for the Nexus 5 K.

    If you look at the Modules Cisco 10GBASE SFP data sheet , there is no such SFP + transceiver listed.

    A search on OCC for 10GBASE-T transceivers finds only the transmitter/receiver X 2 - 10 GB - T listed in the Cisco 10GBASE X 2 Modules data sheet which is of no use to you.

    There is a plug-in 12-port 10GBASE-T (PID-N55-M12T), which is perhaps overkill for your needs, but also who took in charge only in the Nexus 5596 T chassis according to the Cisco Nexus 5548 P, 5548UP, 5596UP and 5596 T switches data sheet. I don't know why this would be the case given the 596UP and 5596 T are based on the same ASIC, etc.. Perhaps a question to your Cisco sales representative.

    Concerning

  • Multicast flooding all the VLAN Ports

    I have three streaming servers.  We have an affair rising gigabit and the other two 100Mbps devices.  Gigabit streaming chassis produced ~ 230Mbps video stream. The other two 100 Mbps devices generate on 50Mbps each.  All water courses are intended to let the N1548 switch via a 10GE interface.  It works, but video streams multicast are also fed to all other ports on the same VLAN.  For this reason, + 200 Mbps gigabit traffic unit is saturating the other two aircraft video 100Mbps of FastEthernet NIC.  I tried to put all the ports in a single protected switchport group, but this did not seem to prevent floods multicast to peer between ports assigned to the same protection group number.  Is there a way to prevent this multicast traffic to broadcast to all ports in the same VLAN, specifically servers independent multicast group IP multicast?  I understand that protected switchport may provide unicast and broadcast on protection and not multicast.

    You can consult the document "efficient video Distribution networks with Multicast: IGMP Querier and PIM - DM" downloaded here: "".

    http://en.community.Dell.com/TechCenter/networking/p/guides-legacy#PC

    Scenario 2 starting on page 12 shows the steps on how to configure multiple video servers on different VLANS and there are a few test commands to validate the configuration (table 4).

    I hope this helps.

    B

  • Connection of several 6248

    Hello all!

    I have currently 2 x PC6248 which are stacked with stacking YY741 module and 2 x cables Dell F4XF - F4XF 1 m between them and that's all working well.  # See the battery port shows that xg1 and xg2 are used on both switches xg3 xg4 is both down.  It's what I expected.

    I need to add more than two switches, but they will be at a distance.  The first would be about 15 meters and the second would be between 75 and 100 meters.  Can I use cables of F4XF-F4XF that eager to 'stack' switches and if so, where can I find this length cables?  If I can do that, can I go out with just 1 cable to the remote switches?  (Yes, I know that it would be only a 12 GB of interconnection).

    If the answer above is no, then I can put 2 x gbic ports xg3/xg4 on both the existing switches and and 4 x gbic in xg1 - xg4 on new switches and connect interconnect two new switches on optical fiber LC - LC, going to this length?  (Yes, I know/xg1 xg2 are not usable in the existing stack).  If I can do it this way, what gbic would I get?  Can I use any LC - LC gbic or are there specific gbic, should I use?  And how to configure all switches?  I have several VLANs in the existing stack.  My config is attached below (if you see errors, feel free to say yes lol), it's pretty basic.  All chassis #1 ports are in use with some on chassis #2.  Currently, with only 2 switches in the battery, everything works perfectly.

    console #show run
    ! Current configuration:
    ! Description of the system "PowerConnect 6248, 3.3.13.1, VxWorks 6.5.
    ! 3.3.13.1 system software version
    ! Passage mode is configured as disabled
    !
    Configure
    database of VLAN
    VLAN 2-3, 252, 254
    VLAN 1 1 routing
    VLAN routing 2 254
    VLAN 3 3 routing
    VLAN routing 252 4
    VLAN routing 2 5
    subnet of VLAN association 192.168.0.0 255.255.255.0 1
    subnet of VLAN association 192.168.1.0 255.255.255.0 2
    subnet of VLAN association 192.168.2.0 255.255.255.0 3
    subnet of VLAN association 192.168.252.0 255.255.255.0 252
    subnet of VLAN association 192.168.254.0 255.255.255.252 254
    output
    unicast SNTP client enable
    192.168.0.2 SNTP server

    clock timezone-7 minutes 0 area "MST".
    battery
    1 2 Member
    2 2 Member
    output
    IP 192.168.254.1 255.255.255.252
    IP - lhcfun.local domain name
    8.8.8.8 IP name-server
    IP-server names 8.8.4.4
    name of the IP-server 198.105.254.17
    name-server IP 192.168.0.2
    IP routing
    IP route 0.0.0.0 0.0.0.0 192.168.1.2
    IP helper-address 192.168.0.2 dhcp
    IP helper-address 192.168.0.2 ntp
    interface vlan 1
    Routing
    the IP 192.168.0.1 255.255.255.0
    output
    interface vlan 2
    the name "Firewall."

    Routing
    IP 192.168.1.1 255.255.255.0
    output
    interface vlan 3
    name "iSCSI".
    Routing
    IP 192.168.2.1 255.255.255.0
    output
    interface vlan 252
    name of the "Ports Console"
    Routing
    IP 192.168.252.1 255.255.255.0
    IP helper-address 192.168.0.2 dhcp
    output
    interface vlan 254
    name of "management".
    Routing
    output
    level of 20b269eca6cf2aa9fb7ff4f4d0460dad user name 'admin' password encrypted 15
    spanning tree priority 0
    l2relay DHCP

    !
    interface ethernet 1/g1
    switchport access vlan 252
    output
    !
    interface ethernet 1/g2
    Auto mode channel-group 2
    output
    !
    interface ethernet 1/g3
    Auto mode channel-group 2
    output
    !
    interface ethernet 1/g4
    Auto mode channel-group 1
    output
    !
    interface ethernet 1/g5
    Auto mode channel-group 1
    output
    !

    interface ethernet 1/g6
    Auto mode channel-group 1
    output
    !
    interface ethernet 1/g7
    Auto mode channel-group 1
    output
    !
    interface ethernet 1/g8
    switchport access vlan 252
    output
    !
    interface ethernet 1/g11
    Auto mode channel-group 3
    output
    !
    interface ethernet 1/g12
    Auto mode channel-group 3
    output
    !
    interface ethernet 1/g13

    Auto mode channel-group 3
    output
    !
    interface ethernet 1/g14
    Auto mode channel-group 3
    output
    !
    interface ethernet 1/g15
    switchport access vlan 252
    output
    !
    interface ethernet 1/g18
    Auto mode channel-group 4
    output
    !
    interface ethernet 1/g19
    Auto mode channel-group 4
    output
    !
    interface ethernet 1/g20
    Auto mode channel-group 4

    output
    !
    interface ethernet 1/g21
    Auto mode channel-group 4
    output
    !
    interface ethernet 1/g22
    switchport access vlan 252
    output
    !
    interface ethernet 1/g23
    Auto mode channel-group 5
    output
    !
    interface ethernet 1/g24
    Auto mode channel-group 5
    output
    !
    interface ethernet 1/g25
    Auto mode channel-group 6
    switchport access vlan 3

    output
    !
    interface ethernet 1/g26
    Auto mode channel-group 6
    switchport access vlan 3
    output
    !
    interface ethernet 1/g27
    Auto mode channel-group 6
    switchport access vlan 3
    output
    !
    interface ethernet 1/g28
    Auto mode channel-group 6
    switchport access vlan 3
    output
    !
    interface ethernet 1/g29
    switchport access vlan 252
    output
    !

    interface ethernet 1/g32
    Auto mode channel-group 7
    output
    !
    interface ethernet 1/g33
    Auto mode channel-group 7
    output
    !
    interface ethernet 1/g34
    Auto mode channel-group 7
    output
    !
    interface ethernet 1/g35
    Auto mode channel-group 7
    output
    !
    interface ethernet 1/g36
    switchport access vlan 252
    output
    !
    interface ethernet 1/g39

    Auto mode channel-group 8
    output
    !
    interface ethernet 1/g40
    Auto mode channel-group 8
    output
    !
    interface ethernet 1/g41
    Auto mode channel-group 8
    output
    !
    interface ethernet 1/g42
    Auto mode channel-group 8
    output
    !
    interface ethernet 1/g43
    switchport access vlan 252
    output
    !
    interface ethernet 1/g44
    Auto mode channel-group 9

    output
    !
    interface ethernet 1/g45
    Auto mode channel-group 9
    output
    !
    interface ethernet 1/g46
    switchport access vlan 252
    output
    !
    interface ethernet 2/g47
    switchport access vlan 252
    output
    !
    interface ethernet 2/g48
    switchport access vlan 2
    output
    !
    interface port-channel 1
    Description "nas20".
    spanning tree portfast

    output
    !
    interface port-channel 2
    Description "nas20port22".
    spanning tree portfast
    output
    !
    interface port-channel 3
    Description "vmw16".
    spanning tree portfast
    output
    !
    interface port-channel 4
    Description "vmw18".
    spanning tree portfast
    output
    !
    interface port-channel 5
    Description "nas24".
    spanning tree portfast
    output

    !
    interface port-channel 6
    Description "nas24iscsi vlan 3.
    spanning tree portfast
    switchport access vlan 3
    output
    !
    interface port-channel 7
    Description "vmw28".
    spanning tree portfast
    output
    !
    interface port-channel 8
    Description "vmw30".
    spanning tree portfast
    output
    !
    interface port-channel 9
    Description "tsm32".
    spanning tree portfast
    output

    output

    This distance is too far for stacking. Module stacking both 10GE CX4 module can be configured for each role (Ethernet or stacking). By default, each module works according to its module ID. Change the role of a module, a reboot is necessary for the change to take effect. However, I believe that the distance for stacking cables max is about 3 meters. And the limit of CX4 cable is 15 meters.

    Other modules for the back of the switch are a 10GBase-T, part # X901C. The 10GBase-T module settle only in 2 Bay (right when viewing the back Bay). And a module SFP + 10GE, part # U691D.

    Combo on the front of the switch ports ports SFP 1 GB. Combo ports have a combined input and output of the PHY chip. Only the optical port or RJ-45 port ACR be used individually, but not at the same time. Any cable is connected will first use the port PHY.

    The fiber option that should meet your needs is a SFP - 1 G - SX transceiver. This transceiver uses the LC multimode fiber and it is good to 550 m. part # 407 - BOU

    http://Dell.to/1Rok1wO

    Here is a document that passes on the available module options.

    http://Dell.to/1OtQmfD

    With switch connections involving several VLANs, you will want to use connections in Trunk mode. For the switch connections you do not use portfast.

    # interface port-channel 1

    # switchport mode Trunk

    # switchport Trunk letter vlan add 2,3,4,5,6

    I hope this helps answer some of your questions.

  • Question of the 6248P fiber port legacy.

    Hello

    I inherited two switches 6248P outgoing Manager (I arrived after his departure) and would like to know if the switch can add a port for a 10GBASE-SR fiber connection.  One of the switches is in place and in the course of execution attached to a 3COM older who manages currently one end of the fiber and the second unit was still in the box but has a Module SFP + 10GE (2-port) plugged into the back of it.

    Is - this module fiber or cable? Is it possible to get the fiber for this device? And what role do we need?

    Any help is appreciated.

    Page 11 of this document shows different switches 62xx expansion modules.

    i.dell.com/.../Expansion-Modules-for-Dell-PowerConnect-Switches-January2012.pdf

    Page 59 of the user guide also talks expansion modules.

    FTP.Dell.com/.../PowerConnect-6248p_User%27s%20Guide_en-US.pdf

    It looks like the module you have.

    accessories.dell.com/.../PopupProductDetail.aspx

    It provides 2 SFP + ports capable of supporting optical transceivers 10 G-BaseSR, BaseLR - 10 G and 10 G - BaseLRM. In addition, it also supports Active and Passive Direct Attach Copper cables SCXI.

    I hope this information helps.

    Thank you

  • BBM how to retrieve BBM be hacked or how to catch the pirate?

    Hello everyone, I have a few requests here as member of my family comes from live be hacked:
    -can I know if we provide BBN, PIN, could we know email ID used to register?
    -How to retrieve the BBM be hacked?
    -How to catch the pirate?
    Thanks in advance!

    Most likely you allowed someone to get your credentials BBID, or you have been deceived into giving them upward.

    This is the management of Blackberry users who have their BBID diversion...

    -------------
    In these scenarios, the user must email\contact our office of privacy protection
     
    http://CA.BlackBerry.com/legal/privacy-policy.html
     
     
    10. questions or concerns? How to contact us
    BlackBerry welcomes your questions or comments about this privacy policy and the way in which we treat your personal information. If you have any questions, concerns, or you want to request access to your personal information under the privacy or data protection laws, please communicate with BlackBerry, either by e-mail or in writing and we will use commercially reasonable efforts to respond:
    email: [email protected], or
    write to one of the following offices of the nearest BlackBerry you:
    BlackBerry Privacy Office c/o BlackBerry (attention Legal Department), 2200 University Avenue East, Waterloo, Ontario, Canada N2K 0 to 7
    BlackBerry Privacy Office c/o BlackBerry (attention Legal Department), 200 Bath Road, Slough, Berkshire, United Kingdom SL1 3XE
    BlackBerry Privacy Office c/o BlackBerry (attention Legal Department), 1 International Business Park, The Synergy Building, 2nd Floor, Singapore 609917
    ------------

  • Using SNMP to monitor Cisco Nexus 5000

    Hello

    I would like to know what specific OID to use to monitor the following using SNMP on a Nexus 5000:

    -L' total CPU usage

    -Power supply status

    -Status of Fan chassis

    The Nexus is quite different from other devices Cisco - any help will be appreciated!

    CPU: oid to use is: 1.3.6.1.4.1.9.9.305.1.1.1 (cseSysCPUUtilization) is a part of the MIB:

    CISCO-SYSTEM-EXT-MIB

    It displays the value as a percentage of the processor.

    ME-TestBed-A (nxos) # display system resources

    Load average: 1 minute: 0.26 5 minutes: 0.41 15 minutes: 0.43

    Process: 393 1 total, running

    CPU States: inactive user of 1.0%, 4.0% of the kernel, 95.0%

    Memory usage: total 3634820K, 1728600K used, 1906220K free

    81256K buffers, 1037176K cache

    DHCP-171-69-89-49: ~ lulu-mbp$ snmpwalk - public - Cabarrus 2 c 172.25.180.5

    1.3.6.1.4.1.9.9.305.1.1.1

    SNMPv2-SMI::enterprises.9.9.305.1.1.1.0 = Gauge32 : 5

    As you can see, show sys resources indicates 95% idle, valuation is 5% cpu and the snmp poster value.

    -------------

    Power and Fans, it is fairly limited

    The cisco mib envmon is not yet supported on the 5K, looks like.

    This leaves us with the FRU mib: 1.3.6.1.4.1.9.9.117 ftp://ftp.cisco.com/pub/mibs/oid/CISCO-ENTITY-FRU-CONTROL-MIB.oid

    The index values will come from oid: entPhysicalTable)

    1.3.6.1.2.1.47.1.1.1) is part of the ENTITY-MIB

    DHCP-171-69-89-49: ~ lulu-mbp$ snmpwalk - public - Cabarrus 2 c 172.25.180.5

    1.3.6.1.4.1.9.9.117

    SNMPv2-SMI::enterprises.9.9.117.1.1.1.1.1.470 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.1.1.1.1.1000470 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.1.1.1.2.470 = STRING : « CentiAmps @ 12V »

    SNMPv2-SMI::enterprises.9.9.117.1.1.1.1.2.1000470 = STRING : « CentiAmps @

    12V.

    SNMPv2-SMI::enterprises.9.9.117.1.1.1.1.3.470 = INTEGER : 4538

    SNMPv2-SMI::enterprises.9.9.117.1.1.1.1.3.1000470 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.1.1.1.4.470 = INTEGER : 29

    SNMPv2-SMI::enterprises.9.9.117.1.1.1.1.4.1000470 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.1.22 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.1.23 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.1.470 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.1.1000022 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.1.1000470 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.1.3000022 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.2.22 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.2.23 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.2.470 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.2.1000022 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.2.1000470 = INTEGER : 4

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.2.3000022 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.3.22 = ENTIER :-2910

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.3.23 = INTEGER : -83

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.3.470 = INTEGER : 29

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.3.1000022 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.3.1000470 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.3.3000022 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.1.3.0 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.1.22 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.1.23 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.1.1000022 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.1.3000022 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.2.22 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.2.23 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.2.1000022 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.2.3000022 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.3.22 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.3.23 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.3.1000022 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.3.3000022 = INTEGER : 0

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.4.22 = Timeticks : 0:00:10.27 (1027)

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.4.23 = Timeticks : 0:01:25.20 (8520)

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.4.1000022 = Timeticks :

    (41634711) 4 days, 19:39:07.11

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.4.3000022 = Timeticks :

    (41634712) 4 days, 19:39:07.12

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.5.22 = Timeticks : (0) 0:00:00.00

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.5.23 = Timeticks : (0) 0:00:00.00

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.5.1000022 = Timeticks : (0)

    0:00:00.00

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.5.3000022 = Timeticks : (0)

    0:00:00.00

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.6.22 = « »

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.6.23 = « »

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.6.1000022 = « »

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.6.3000022 = « »

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.8.22 = Gauge32 : 0

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.8.23 = Gauge32 : 0

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.8.1000022 = Gauge32 : 0

    SNMPv2-SMI::enterprises.9.9.117.1.2.1.1.8.3000022 = Gauge32 : 0

    SNMPv2-SMI::enterprises.9.9.117.1.3.1.0 = ENTIER : 1

    SNMPv2-SMI::enterprises.9.9.117.1.4.1.1.1.534 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.4.1.1.1.535 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.4.1.1.1.536 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.4.1.1.1.537 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.10 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.22 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.23 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.149 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.214 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.215 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.278 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.279 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.342 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.343 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.470 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.534 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.535 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.536 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.537 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4950 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4951 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4952 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4953 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4954 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4955 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4956 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4957 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4958 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4959 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4960 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4961 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4962 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4963 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4964 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4965 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4966 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4967 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4968 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.4969 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.5206 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.5207 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.5208 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.5209 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.5210 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.5211 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.5212 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.5213 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.21590 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.21591 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.21592 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.21593 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.21594 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.21595 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.21596 = INTEGER : 2

    SNMPv2-SMI::enterprises.9.9.117.1.5.1.1.1.21602 = INTEGER : 2

    You can read in:

    FTP://FTP.Cisco.com/pub/MIBs/v1/Cisco-entity-FRU-control-MIB-V1SMI.my

    that means values integer by OID.

    Take for example (look at the file

    ( ftp://ftp.cisco.com/pub/mibs/oid/CISCO-ENTITY-FRU-CONTROL-MIB.oid)

    cefcFRUPowerOperStatus: 1.3.6.1.4.1.9.9.117.1.1.2.1.2 for one of the

    index:

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.2.22 = INTEGER : 2

    We now need to find 22-year-old:

    SNMPv2-SMI::mib-2.47.1.1.1.1.7.22 = STRING : « 20 port 10GE SFP + / superviseur

    in the Module fixed-1"

    That means now the INTEGER 2 from:

    SNMPv2-SMI::enterprises.9.9.117.1.1.2.1.2.22 = INTEGER : 2

    Lets look at: CISCO-ENTITY-FRU-CONTROL-MIB-V1SMI.my, section

    cefcFRUPowerOperStatus, if you are looking for in this file you will find: we (2),

    That measn this controller is actually turned on and powered.

  • Cable passive to connect the FET - 40 G and FET - 10 G

    Hello

    I'll get right to the subject. The Cisco Nexus 2348TQ have an affair rising SKU N2K-F40G-F10G option, which consists of the following:

    TRANSMITTER-RECEIVER 2xFET - 40G (with DFO-12 connector)

    TRANSMITTER-RECEIVER 8xFET - 10G (with LC connector)

    Maybe we could assume that there should be two "male 1xMPO12 > female 4xLC" passive extension cable included in the package, but the tricky part is that there is no included cable, and I am unable to find any mentions of these objects being available to Cisco.

    The question itself is if the cisco have these available passive extension cables and if yes - what are their credentials?

    Halp? Please? It makes me crazy already...

    Yes, that's correct.

  • XR - 10 GB - SR replaceable hot

    I have a 4507R-E.  10GE slots 3 and 4 have Sup 6 L - E (X 2) supervisor, 1000BaseX modules (SFP) installed.

    This device is powered in a production environment.  Documentation does not explicitly specify if we can install X 2 - 10 GB - SR GBIC into the uninhabited GBIC slots on the Sup 6 L - E, while the power is on.

    So I think as the GBIC slots are not configured and are uninhabited.

    Someone at - it had harmful effects by installation X 2 - 10 GB - SR GBIC in the empty slots of Sup6L-E on a live production camera?

    Yes they are hot-swappable. Deletion and insertion online is supported. The only affect on the rest of the device is that because of the connection or the removal of the interface (routing or convergence tree etc.).

    A link confirming:

    http://www.Cisco.com/c/en/us/TD/docs/switches/LAN/catalyst4500/hardware/...

  • Compatibility with the CWDM module

    Hello

    We have an old device 6513 with WS - X 6502-10GE and 10GBase-ER one module (not sure, but it seems that this module is WS-G6483).  10GBase-ER module is connected to CWDM-MUX-8 has. This device will be migrated to WS-6513-E with a WS - X 6704-10GE and XENPAK-10 GB - ER +. The problem is that I can't find any instruction (on the Cisco web site) it is possible to use XENPAK - 10 GB - ER + with CWDM Technology. I know as XENPAK-10 GB - ER + is module official replacement for WS-G6483, so it looks good, but someone can advice you to use XENPAK-10 GB - ER + with CWDM is possible?

    Any response is appreciated.

    Kind regards

    Zdenek

    Zdenek,

    The CWDM / DWDM transceivers are designed with optical components with a narrower range of frequency of use than a standard transceiver (like an emergency room).  If you were using a wideband WDM Multiplexer (2 channels, one at 1310nm and the other to 1550 m, ER transceiver could be used (although the link would be limited by the length of optical link supported by the transceiver 1310nm).)

    If your Cisco line cards support optical transceiver modules DWDM 10 Gbps, the range of products Enhanced Cisco Wavelength Division Multiplexing (specifically the EWDM-MUX8 = Multiplexer) may be the solution for you.  At that time, Cisco has no 10 Gbit/s CWDM optical transceivers.

    I hope this helps!

Maybe you are looking for