As you all know, the ports in the 3550s comes with DTP enabled. I have gone through the messages posted in this group in last Nov. 23rd. The recommended solution to configure the port to "switchport nonegotiate" didn't work. I do get the message "Command rejected: Conflict between 'nonegotiate' and 'dynamic' status"
Please see the initial config. and the response to the command"-
switchport access vlan 20
switchport mode dynamic desirable
Enter configuration commands, one per line. End with CNTL/Z.
Command rejected: Conflict between 'nonegotiate' and 'dynamic' status.
If you want to disable DTP, you have to first specify the trunking status on a port manually: either "switchport mode access" or "switchport mode trunk". Then you can issue the "switchport nonegotiate" command.
The "switchport nonegotiate" command is valid only when the interface switchport mode is access or trunk. This command returns an error message if you attempt to execute it in dynamic (auto or desirable) mode.
When you use the "switchport mode dynamic desirable" or "switchport mode dynamic auto" commands on an interface, you are telling the switch to autonegotiate the trunk status on that interface. Trunk negotiation is managed by the Dynamic Trunking Protocol (DTP).
When you try to run "switchport nonegotiate" on a dynamic trunking port, you're telling the switch to NOT use DTP, the protocol that it needs to use to determine trunking status. That's why you get the error.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...