I have upgraded catalyst 6500 IOS to new version (s72033-ipservicesk9-mz.122-33.SXH.bin) and than, all the module SFM-capable 48-port 10/100 Mbps RJ45 have some strange problem.
The ports on the module will have many input errors, and CRC; the server behind the ports also will lose real connection to the network. However, if you do âshow int statusâ on the cat6500, it still connected, and if you log into the server (which linked to the port) on console, it still recons the connection available.
I have also found I can easily fix the problem by shut/noshut on the port. But, the problem will occur later. And also, there is always some CPU intensive sometime before with no reason.
Could anyone give me some tip what problem it is? And what I can do with the problem?
It sounds like you have a duplex mismatch problem as a result of autonegotiation.
Do one of two things:
1. Hardcode both the server NIC and the switch port for speed and duplex (example: 100/full or 1000/full).
2. Set both the server NIC and the switchport to "auto". Sometimes, though, the server NIC's autonegotiation protocol may have added proprietary features that the Cisco switch does not support -- and that may cause both sides to lose sync when the periodic renegotiation takes place. The industry has had a problem standardizing the Autonegotiation protocol.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...