Overblog Follow this blog
Administration Create my blog
Cisco & Cisco Network Hardware News and Technology

What Dose Customers Benefit From Cisco 2960-X Switches?

January 23 2014 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Switches - Cisco Firewall

To address these challenges and transform IT, Cisco introduced the Cisco Catalyst 2960-X Series (stackable Gigabit Ethernet access switches) to enable network connectivity for enterprise, midmarket, and branch office locations. These switches enable reliable and highly secure business operations with lower total cost of ownership through a range of innovative features, including Cisco FlexStack Plus, Application Visibility and Control, Power over Ethernet Plus (PoE+), innovative power management, and Catalyst Smart Operations. This highly differentiated and innovative product will help you lock out the competition and win back port share. With these switches you can participate in the huge refresh opportunity from a large installed base that is fully amortized, and increase deal size by creating architectural linkages with other Cisco products, such as Cisco Identity Services Engine (ISE), and Cisco Prime.

What does customer benefit from Cisco 2960-X seriesThe switches are scalable, smart, simple, and secure and at the same time provide investment protection. They also provide Layer3 routing capability and application-aware intelligence, with double the scale of the existing generation. 

Scalable: Catalyst 2960-X Series is scalable to meet growth needs today and in the future. These switches offer high density, with 24 or 48 Gigabit Ethernet ports and 1 and 10 Gigabit Ethernet uplinks for desktop connectivity and are ready for 1-Gbps wireless (802.11ac). They deliver wire-rate performance on all ports to keep up with increasing traffic by exploiting the full capacity of each port. The switches support FlexStack Plus with up to 80 Gbps of stack bandwidth and up to eight members in a stack for 384 Gigabit Ethernet ports, doubling many performance aspects of the existing Cisco Catalyst 2960-S Series Switches. They offer a high-capacity 740W power supply that can power all 48 ports for PoE or 24 ports for PoE+. The benefits of PoE and PoE+ are easy and rapid deployment of IP endpoints, such as IP phones, access points, and cameras, while saving the cost of installing power outlets.

The Cisco Catalyst 2960-X Series is resilient, with control-plane redundancy across FlexStack Plus switches. This feature minimizes traffic disruption if the stack member fails. The Catalyst 2960-XR is also equipped with redundant power supplies for power resilience.

Smart: The Cisco Catalyst 2960-X Series Switches are smart, with intelligent access services, in depth application visibility and control, and best-in-class energy efficiency.

Built with True Stacking: FlexStack Plus enables unified configuration and unified single IP address management across all stack members for simplicity, efficiency, and scalability.  Cross-stack quality of service (QoS) automatically applies the QoS configuration of the master switch to other stack members to ensure QoS consistency, configuration accuracy, and simplicity. Cross-stack high availability provides for automatic election of a new master switch in case of stack master failure for greater resilience.

Built for network programmability: Cisco One Platform Kit (onePK) is an easy-to-use software-defined networking (SDN) toolkit for development, automation, rapid service creation, and more. Catalyst 2960-X Series Switches are onePK ready, enabling customers to build applications to automate and create services across the campus.

Built for application visibility and control: For the first time, the Catalyst 2960-X Series supports NetFlow Lite services that enable IT teams to monitor and record important traffic flows through a packet-sampling mechanism. When combined with Cisco Prime or other NetFlow collectors, it can help IT prioritize business-critical applications.

Built for unified access:

One policy through integration with Cisco ISE

One management through integration with Cisco Prime

Built for green IT—the greenest access switch ever:

Cisco EnergyWise monitors and controls PoE and PoE+ device power consumption to reduce energy costs. It can turn the connected IP devices on or off to reduce power consumption based on predefined policies. For example, the IP phones can be set to turn off automatically after business hours.

Energy-Efficient Ethernet (EEE) enables dynamic power savings on all switch ports, saving about 15W for a 48 port-switch and 8W for a 24 port-switch.

The Catalyst 2960-X Series introduces two new innovative energy-saving sleep modes for the switch. Switch Hibernation mode puts the switch to sleep, consuming as little as 6W, compared to approximately 50W in active mode.

Downlink Hibernation mode shuts down the downlink interface to save 0.5W per port when the connected devices are not in use, even if the devices are not EEE aware. Downlink Hibernation mode also shuts down PoE and PoE+ to save additional energy.

Collectively these features are game changers in green technology that can reduce switch power consumption by up to 80 percent.

Simple: Cisco Catalyst 2960-X Series Switches are simple to deploy, manage, and troubleshoot. As part of the Cisco Unified Access portfolio, the Cisco Catalyst 2960-X Series Switches are fully integrated with Cisco Prime, to offer simple operation from a central location.

They can also be managed by Cisco Network Assistant, which features an intuitive GUI with which users can easily apply common services across Cisco switches, routers, and access points.

Cisco Catalyst 2960-X Series Switches offer Catalyst Smart Operations features to lower the total cost of ownership:

Smart Install automatically downloads Cisco IOS Software and configures the switches for zero-touch deployment.

Auto Smart Ports automatically configures (for example, VLAN, security, and QoS settings) ports based on device type (such as IP phones, printers, and access points) for simplified configuration and rapid deployment.

Smart Call Home offers proactive diagnostics and remediation of hardware and software issues.

 

Secure: Cisco Catalyst 2960-X Series Switches offer security features to help ensure easy and highly secure network deployment and access. The security policies can be set consistently across the network by Cisco ISE.

Unlike competitors’ switches, Catalyst 2960-X Series Switches preserve customer investment by allowing mixed stacking with existing Catalyst 2960-S and 2960-SF switches. Customers can grow their access networks by adding the new 2960-X switches to their existing 2960-S and 2960-SF stacks.

What customers can Cisco recommend this product? The following points tell you the users who need the Cisco 2960-X series:

Simplify the management of their unified wired and wireless infrastructure

Build resilient converged network infrastructure to deploy BYOD, video, cloud applications, and 1-Gbps wireless solutions

Improve the user experience and have granular control over policy

Address more traffic in the future, including increasing numbers of devices (of all kinds)

Scale its business for a larger amount of traffic and devices in the unified wired and wireless network

Protect their investments in network infrastructure and build for future expansion

Table1 lists the Cisco solutions applicable to various customer deployments and needs. /When to Sell Catalyst 2960-X Series Switches

When-to-Sell-Catalyst-2960-X-Series-Switches.jpg

Table2 shows how the features of the Catalyst 2960-X Series compare to competitors’ switches.

Table2 Comparison of the Catalyst 2960-X Series to Competitors’ Switches

Comparison-of-the-Catalyst-2960-X-Series-to-Competitors--.jpg

Comparison-of-the-Catalyst-2960-X-Series-to-Competi-copy-1.jpg

More Cisco 2960 Topics:

Cisco 2960 vs. Catalyst 3560

How to Configure the Voice VLAN Feature on the Catalyst 2960 and 2960-S Switches?

Cisco Catalyst 2960-X Series Switches Debut at Cisco Partner Summit

More Popular Topics Related to Cisco Catalyst 2960-S FlexStack

 

Read more

How to Make Serial Cable to Connect PC to CTS-PHD1080P4XS1 A.k.A. Sangam Camera?

January 16 2014 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Modules - Cisco Cables - Cisco Memory

Sometimes it is required to investigate camera problems by connecting a serial cable from a DB9 PC/MAC serial port to the RJ45 camera connector. This article describes the pinouts used on the camera RJ45 and pinouts used on DB9 PC/MAC side so people can make their own cable.

DB 9 pin layout

A PC/MAC with a normal DB9 serial connector presenting itself as a DTE is shown in the picture below.

DB9_DTE.png

Camera RJ45 pinout

The camera RJ45 pinout can be found in this PDF file. Copy of the layout is below. It shows the normal cable we use to hookup camera to the codec. The DB9 side of the connector is standard DTE presentation. The RJ45 side is non-standard.

RJ45_camera_layout.png

How to make your own cable?

Using above information we can build our own cable using RJ45 to DB9 connector wired as follows:

RJ 45                            DB 9
========================================================
   7     GND           GND         5
   6      TX            RX         2
   3      RX            TX         3

Reference from https://supportforums.cisco.com/docs/DOC-27285

 

More Topics Related to Cisco Console Cable:

How to Create a Console Cable & Make a Console Connection?

Ethernet Crossover Cable vs Ethernet LAN Cable

Cisco Console Cables, Popular Types You Used

How to Select the Right Serial Cables for Your Network?

Read more

How to Configure Cisco ASA Failover into Active/Standby Mode?

January 10 2014 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Switches - Cisco Firewall

In this article we will share how to configure Cisco ASA Failover into Active/Standby mode, firstly, assume that your primary Cisco ASA is configured and working.

Primary Cisco ASA

Setup your failover interface on Primary Cisco ASA

enable

config t

failover lan unit primary

interface gigabitEthernet 0/3

no shutdown

Assign the failover IP Address on your Primary Cisco ASA

failover lan interface FAILOVER gigabitethernet0/3

failover interfaces ip FAILOVER 10.10.10.1 255.255.255.0 standby 10.10.10.2

failover key YourSecretKey

failover link FAILOVER

Assign standby Outside IP Address on Primary Cisco ASA

Assign your Cisco ASA standby External IP Address, add “standby {SECONDARY ASA IP ADDRESS}”

interface gigabitEthernet 0/0

ip address 1.1.1.1 255.255.255.224 standby 1.1.1.2

Assign standby Internal IP Address on Primary Cisco ASA

Assign Internal IP Address as you did for the External IP Address with the “standby {SECONDARY ASA IP ADDRESS}”

interface gigabitEthernet 0/1

ip address 172.16.10.1 255.255.255.0 standby 172.16.10.2

Enable monitoring on SubInterfaces on Primary Cisco ASA (optional)

By default, monitoring physical interfaces is enabled and monitoring subinterfaces is disabled. You can monitor up to 250 interfaces on a unit. You can control which interfaces affect your failover policy by disabling the monitoring of specific interfaces and enabling the monitoring of others. This lets you exclude interfaces attached to less critical networks from affecting your failover policy.

monitor-interface if_name

You can turn off monitoring the management interface:

no monitor management

Enable failover

conf t

failover

Verify your Cisco ASA Failover

show failover

Secondary Cisco ASA

Setup failover interface on Secondary Cisco ASA

config t

no failover

failover lan unit secondary

interface gigabitEthernet 0/3

no nameif

no shutdown

failover lan interface FAILOVER gigabitEthernet0/3

Assign your failover IP Address on Secondary ASA using FAILOVER

failover interface ip FAILOVER 10.10.10.1 255.255.255.0 standby 10.10.10.2

failover key YourSecretKey

failover link FAILOVER

failover

Automatic Configuration Copy from Primary to Secondary Cisco ASA

The device configurations are automatically copied from the primary Cisco ASA device to the secondary Cisco ASA device using the following commands:

config t

interface gigabitEthernet 0/3

no shutdown

Verify your Cisco ASA Failover

 

show failover

More about ASA Failover Configuration

Enter privileged EXEC mode.

asa>enable

Enter global configuration mode.

asa#configure terminal

Designate the ASA as the primary or secondary unit (default is secondary).

asa(config)#failover lan unit [primary |secondary]

Configure the ASA link that will be used as the failover link.

Notes: The if_name is used to assign the name of the interface (don't use thenameif command).

The interface_id can be a physical interface, subinterface, or redundant interface; or an EtherChannel interface ID. On the ASA 5505, the interface_idspecifies a VLAN ID.

asa(config)#failover lan interfaceif_name interface_id

Configure the primary and secondary IP addresses.

Note: Both the primary and secondary IP addresses must be in the same subnet.

asa(config)#failover interface ip if_name ip_address netmask standby ip_address

Configure the ASA link that will be used as the stateful failover link.

Notes: The if_name is used to assign the name of the interface; this is the same as the failover link if_name if they are being shared. The interface_id can be a physical interface, subinterface, or redundant interface; or an EtherChannel interface ID. On the ASA 5505, the interface_idspecifies a VLAN ID. This command is optional and is required only if stateful failover is being configured.

asa(config)#failover link if_name interface_id

Configure the primary and secondary IP address for the state interface.

Note: This step is required only if the link that is being used for the stateful failover link is different from the failover link. If it is being shared with the failover link, the information configured in Step 5 is used.

asa(config)#failover interface ip if_name ip_address netmask standby ip_address

Configure the use of IPsec on the LAN-to-LAN failover links (failover and stateful failover, if configured).

Notes: The key parameter can be up to 128 characters in lengthThis is the preferred method to be used to encrypt information over these links.

OR Configure a failover key.

Notes: The key parameter when used with the hex keyword is 32 characters. When it is used without it, it can be a string from 1 to 63 characters. This is a depreciated method of encrypting on these links, and it is not recommended in favor of the IPsec option above.

asa(config)#failover key {hex key | key}

Create a failover group.

Notes: By default, group 1 is assigned to the primary failover unit (as configured in Step 3).

This command is used only when configuring an active/active failover.

asa(config)#failover group {2}

Assign the group to a unit.

Notes: Typically, group 1 is assigned to the primary unit (the default), and group 2 is assigned to the secondary unit). This command is used only when configuring active/active failover.

asa(config-fover-group)#primary OR asa(config-fover-group)#secondary

Enter context configuration mode.

Note: This command is used only when configuring active/active failover.

asa(config)#context name

Configure the context to be a member of a failover group.

Notes: All unassigned contexts are assigned into failover group 1. The admin context is always configured into failover group 1. This command is used only when configuring active/active failover.

asa(config-ctx)#join-failover-group {2}

Enable the use of failover on the ASA.

 

asa(config)#failover

More Cisco ASA Topics:

Cisco ASA Failover, Failover Modes & ASA Failover Configuration

Cisco ASA IPS Module Configuration

How to Configure New ASA 5510 in Transparent Mode?

Cisco Security Advisory: Multiple Vulnerabilities in Cisco ASA Software

Cisco ASA SNMP Polling Via VPN Site-to-Site Tunnel

Create IPv6 LAN-to-LAN VPN Tunnel on Cisco ASAs

Read more

To Make Your Network Device Smarter

January 3 2014 , Written by Cisco & Cisco Router, Network Switch Published on #Networking

Cisco is always focusing on making network devices smarter and providing more intelligent and safer networking solutions for customers.

One of typical examples is Cisco Adaptive Security Appliance (ASA).  When it encounters a critical unrecoverable error condition, it reloads itself and then automatically sends in the error report.  This report is analyzed by Cisco and compared against all known issues.  If Cisco has seen this issue before, we will:

  • Alert the customer via e-mail that their device encountered a problem
  • Include the bug ID and Headline of the problem the device experienced
  • Indicate what versions contain a fix to this issue

 

This provides you with everything you need to know about the problem.

How-Smart-is-your-Network-Device.png

How is that for Smart? 
The Cisco ASA also detects other error conditions, these (i.e.: fan failures, interface failures, other environmental alerts, etc…) and securely reports those back to Cisco. For critical events, it will automatically open a TAC case and start working on the problem. That may be initiating an RMA and shipping the part on-site, or it could be that a TAC engineer will call you to alert you to the problem and what the next steps are. For non-critical events, you will receive an e-mail to alert you to the problem and include guidance on the next steps.

In addition to this, we are investing in big data initiatives to mine the data being sent in and obtain insights on how we can better improve our software quality, or to quickly be alerted to any critical issue affecting multiple customers-all in an automated fashion.

Note: Find out how to enable SCH on the ASA here. You can also check out the Smart Call Home Support Forums Community, and see Cisco's full list of Smart enabled devices.

Reference From: https://supportforums.cisco.com/docs/DOC-35118

More networking topics you can visit: http://blog.router-switch.com/category/networking-2/

Read more

How to Recover the Password on Cisco Catalyst 3850?

January 2 2014 , Written by Cisco & Cisco Router, Network Switch Published on #Cisco Switches - Cisco Firewall

How to recover the password on a Cisco 3850 switch when you lost or forgot it? It is easy to solve it for it’s so common for a network user. Here we list some tips and basic steps to help you recover password on catalyst 3850 again.

Tips and Steps to Recover the Password on Cisco Catalyst 3850

On a switch, power off the standalone switch or the entire switch stack. Reconnect the power cord to the active switch. Within 15 seconds, press the Mode button while the System LED is still flashing green. Continue pressing the Mode button until all the system LEDs turn on and remain solid; then release the Mode button.

Several lines of information about the software appear with instructions, informing you if the password recovery procedure has been disabled or not.

If you see a message that begins with this:

The system has been interrupted prior to initializing the flash file system.

The following commands will initialize the flash file system proceed to the below steps

Step1 Initialize the flash file system.

Switch: flash_init 

Step2 Ignore the startup configuration with the following command:

Switch: SWITCH_IGNORE_STARTUP_CFG=1

Step3 Boot the switch with the packages.conf file from flash.

Switch: boot flash:packages.conf

Step4 Terminate the initial configuration dialog by answering No.

Would you like to enter the initial configuration dialog? [yes/no]: No

Step5 At the switch prompt, enter privileged EXEC mode.

Switch> enable     

Switch#  

Step 6 Copy the startup configuration to running configuration.

Switch# copy startup-config running-config Destination filename [running-config]?

Press Return in response to the confirmation prompts. The configuration file is now reloaded, and you can change the password.

Step7 Enter global configuration mode and change the enable password.

Switch# configure terminalSwitch(config)# 

Step8 Write the running configuration to the startup configuration file.

Switch# copy running-config startup-config     

Step9 Confirm that manual boot mode is enabled.

Switch# show boot

BOOT variable = flash:packages.conf;

Manual Boot = yes

Enable Break = yes 

Step10 Reload the switch.

Switch# reload

Step11 Return the Bootloader parameters (previously changed in Steps 2 and 3) to their original values.

Switch: SWITCH_DISABLE_PASSWORD_RECOVERY=1 

Switch: switch: SWITCH_IGNORE_STARTUP_CFG=0

Step12 Boot the switch with the packages.conf file from flash.

Switch: boot flash:packages.conf

Step13 After the switch boots up, disable manual boot on the switch.

 Switch(config)# no boot manual

Refer to https://supportforums.cisco.com/docs/DOC-35289

More Cisco 3850 Tips:

Cisco Catalyst 3850 Series- the Industry’s first Fixed, Stackable GE Switch

More Cisco switch review, news and Topics you can see at: http://blog.router-switch.com/category/reviews/cisco-switches/

Read more