I have a 6509 running 12.2(18)SXE4 with a 10gig card in slot 9. When I do a show module, or a show run, everything looks fine. i.e. the ports on the 10gig card show in the config as 9/1-9/4. However, when I enter config mode, and try to access Interface config mode I can not access tengig 9/1 but instead must access tengig 9/0/1. On another 6509 running the same software version, they work as expected. i.e. int 10gig 9/1 takes me into interface config mode. Is there a command that can be entered to correct this, or will a reboot be required to correct it?
On both switches slot 9 previously had a different module type implemented.
Is the tengig line card in slot 9 a 6704 or is it a SPA card? Did you have flexwan or SIP card in that slot prior to the tengig linecard? Could be an issue with module provision feature where the config is retained for the removed linecard which maybe causing this, this is a guess. Try resetting the line card see if that corrects the behavior. If reset does not correct it and you indeed have a 6704 in the slot, you should open a TAC case, it maybe a bug.
the command itself is not performance impacting. what module proviosioning does is when the line card is removed from the chassis it allows the IOS to retain the config for that line card, in case it needs to be replaced. When the same line card is inserted as replacement, the config is retained. I was thinking it might be the case in your situation.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...