Anyone ever come a cross a switch that would not allow a macbook connected to it to copy a folder from a mac server when one of the files in the folder was a PDF file?
We have four switches (1 c3560G, this is the head switch back to server farm and no errors of any kind anywhere on any interfaces & 3 c3550 connected to the 3560)that will copy any folder both directions from mac server to macbook no matter how large the folder unless that folder has a PDF file in it. As soon as the copy encounters the PDF file the copy operation stops.
This only happens on one floor of our 4 floor admin building all of which have 2 or more cisco 3560G or 3550 switches. This same operation works fine on any other floor! The switches on the other floors do not disciminate against PDF files!
These four switches simply will not copy a folder with a PDF file in it!
I did the following test.
I placed a 3560G in the closet with these four switches and connected it to the head switch. We performed the copy with no problem. I then connected my macbook back into the original head switch, started to copy the folder and it stopped when it encountered the PDF file. (running wireshark the whole time as well) While the copy operation was in progress I moved the connection to new switch and the opertion completed!
The c3560's on this problem floor and on the non-problem floors are all running same IOS 12.2(40)SE.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...