hello friend, i am facing problem ,when i inserted 1 older switch to my vtp domain.
what happend is, in my Vtp domain i have 1 server mode switch ,where i m creating 5 vlan say vlan 2 to vlan 6 along with the name also . and one switch for client mode. every thing working perfectly . now my revision number for switch(server) is 12. perfect no issue. but when i insert 1 older switch which have already 10 vlan along with the name , and revisionn number is 20.i connect this switch to my server mode switch also make the trunk between then. now my client switch getting the vlan details for older vlan . when i removed the older switch. at this case my client switch should get the vlan info from server switch its still receiving older switch vlan vlan details.
i m already delete the vlan.dat but its not working any suggestion will be highly appreciate
Before you add any switch to the network change its vtp mode to transparent and back to client, this will set the revision number to 0 and then this switch will obtain its vtp information from the switch with the highest vtp revision number -be it in server or client mode.
Also If you don't want the new switch to inherit any existing vlan configuration then set its vtp mode to transparent .
Sent from Cisco Technical Support iPad App
Please don't forget to rate any posts that have been helpful.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...