I'm adding a 3560G to my existing 3548-XL stack as a VTP client because I want it to get the VLAN config. After the basic config the switch is not getting VTP info from the server so I have three questions:
1. I have to connect the 3560 to my existing 3548 through the a switch port because the 3548 doesn't have SFP ports. Do I have to change the mode of the switch ports that are connecting the two switches to something special?
2. I added the 3560 to the VTP domain (hsf) but I'm not sure if there is a VTP password set which may be causing the issue. All these switches were in place when I cam on-board and I haven't had to mess with them much. SH VTP PASSWORD doesn't exist on the 3548 so I can't see what the password may be. Should I change the VTP password on all the existing switches so I know what it is? Will this hurt the existing VTP clients? Is there a better way to do this?
3. I'm I going about this wrong? Is there something else I need to change or configure to get it working?
You were correct about the default to ISL, thanks. The new 3560 is receiving VTP updates now and has all the correct VLAN info but now I can't reach the switch on the management VLAN IP. I can't ping from one switch to the other either.
Attached is my SH VLAN for clarification. VLAN 10 (HSF) is where all the ports on all the switches reside because we have a flat network currently.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...