Trunking is your only option. You can't stack switches across families, only within them (so you can stack different versions of the 6610).
Don't do router-on-a-stick.Registered here after reading the OP. Just took delivery of an ICX6610. I've loved getting it setup and learning on it so far. Now I'm debating using L3 on it, or sticking with a router-on-a-stick topology with OPNSense for my home.
Thanks for everything!
SSH@ioburger#show interface e 1/2/3
10GigabitEthernet 1/2/3 is down, line protocol is down
Port down for 1 hour(s) 47 minute(s) 8 second(s)
Hardware is 10GigabitEthernet , address is cc4e.243b.ec14 (bia cc4e.243b.ec47)
Configured speed 10Gbit, actual unknown, configured duplex fdx, actual unknown
Configured mdi mode AUTO, actual unknown
Member of L2 VLAN ID 1, port is untagged, port state is BLOCKING
BPDU guard is Disabled, ROOT protect is Disabled, Designated protect is Disabled
Link Error Dampening is Disabled
STP configured to ON, priority is level0, mac-learning is enabled
Openflow is Disabled, Openflow Hybrid mode is Disabled, Flow Control is config enabled, oper enabled, negotiation disabled
Mirror disabled, Monitor disabled
Mac-notification is disabled
Not member of any active trunks
Not member of any configured trunks
Port name is owc2
MTU 1500 bytes, encapsulation ethernet
300 second input rate: 0 bits/sec, 0 packets/sec, 0.00% utilization
300 second output rate: 0 bits/sec, 0 packets/sec, 0.00% utilization
43530328 packets input, 56998726541 bytes, 0 no buffer
Received 3946 broadcasts, 704676 multicasts, 42821706 unicasts
3 input errors, 3 CRC, 0 frame, 0 ignored
0 runts, 0 giants
22315910 packets output, 12573297677 bytes, 0 underruns
Transmitted 98428 broadcasts, 293779 multicasts, 21923703 unicasts
0 output errors, 0 collisions
Relay Agent Information option: Disabled
Egress queues:
Queue counters Queued packets Dropped Packets
0 22287511 0
1 0 0
2 0 0
3 28357 0
4 0 0
5 42 0
6 0 0
7 0 0
its going to depend on the what fdti cable you have. some of them are only 3.3v logic and all though you can "see" the output from the switch you can't actually send any commands because the high to low is only 3.3v and not enough to actually trigger a signal. pleanty of people have posted about this but the tl;dr is use a standard cisco console cable, use either a rj45 keystone jack (i used a rj45 breakout adapter as an alternative) to connect the green, white & black usb wires. from there you should be able to interacte and "talk" to the switch.Hi hi quick question on whether I've just a defective unit or I'm missing something in the setup guide. I'm trying to setup the 6450-48P.
Following Fohdeesha's guide, I have the master zip downloaded and I had PuTTy set up to connect to the switch. I have a USB to serial adapter cable hooked up to the serial port, and a standard Cat 6 ethernet cable to the existing router. After booting several times with the PuTTy settings in the guide (I turned off Flow control), the output in the image showed up. After waiting several minutes, It briefly flashed some messages about loading PoE and restarted. However, since then I haven't been able to get any serial output, and can't set the values to the factory default. I've tried using the reset button on the front of the switch but to no avail. Mashing or holding the B button doesn't seem to be able to stop the bootloader, though with no output I have no clue whether it's even loading anything.
Essentially I'm just wondering if it's borked. It starts up and has a period of high fan load before slowing down, so the behaviour seems to be the same as before. The cable I'm using is a FTDI cable and I've installed their drivers for it.
Many thanks in advance.
Set up an ACL on the VE that you wish to prevent SSH access on.Hi - is it possible to have SSH available only vlan of choice?
My 7250 has two IP's
Vlan 10 - 192.168.10.10
Vlan 20 - 192.168.20.20
Is it possible to allow SSH access only on vlan 20 but not on vlan 10?
Thanks,
Rich
its going to depend on the what fdti cable you have. some of them are only 3.3v logic and all though you can "see" the output from the switch you can't actually send any commands because the high to low is only 3.3v and not enough to actually trigger a signal. pleanty of people have posted about this but the tl;dr is use a standard cisco console cable, use either a rj45 keystone jack (i used a rj45 breakout adapter as an alternative) to connect the green, white & black usb wires. from there you should be able to interacte and "talk" to the switch.
on second glance i saw you mentioned you had the 6450 (rj45 console), not 7250 ("usb" console), so disregard the comments on needing the custom cable. a couple things of note, these switches take a small eternity to boot so you may just need to wait longer. the older images seem to have less output during the boot process compaired to the newer ufi images. secondly did this switch ever fully boot? it might be possible it doesn't have a valid image to load. i'd suggest restart the switch and smash thatYeah and that's what I had bought from here:
Cisco Console Cable USB to RJ45 Cable FTDI for Windows 8, 7, Vista,MAC, Linux RS232 6 Ft (Blue) : Amazon.co.uk: Computers & Accessories
Free delivery and returns on eligible orders. Buy Cisco Console Cable USB to RJ45 Cable FTDI for Windows 8, 7, Vista,MAC, Linux RS232 6 Ft (Blue) at Amazon UK.www.amazon.co.uk
I'd seen that others had similar problems so I'd hoped that this cable was appropriate. It seemed to match the solution that other users had, and I did have console control briefly in that screenshot, so I'm optimistic about the cable, just not sure about the switch itself since it's not spitting any console output anymore.
Im not 100% sure but:Set up an ACL on the VE that you wish to prevent SSH access on.
ip access-list extended noadmin4
remark DENY ADMIN ACCESS TO SWITCH
deny tcp any host 192.168.10.1 eq ssh log
deny tcp any host 192.168.10.1 eq telnet log
deny tcp any host 192.168.10.1 eq http log
deny tcp any host 192.168.10.1 eq ssl log
remark PERMIT REMAINING TRAFFIC
permit ip any any
enable-accounting
exit
ipv6 access-list noadmin6
logging-enable
remark DENY ADMIN ACCESS TO SWITCH
remark LINK-LOCAL
deny tcp any host fe80::768e:f8ff:fe3e:b28a eq ssh log
deny tcp any host fe80::768e:f8ff:fe3e:b28a eq telnet log
deny tcp any host fe80::768e:f8ff:fe3e:b28a eq http log
deny tcp any host fe80::768e:f8ff:fe3e:b28a eq ssl log
remark ULA
deny tcp any host fdc6:3916:1234:10::1 eq ssh log
deny tcp any host fdc6:3916:1234:10::1 eq telnet log
deny tcp any host fdc6:3916:1234:10::1 eq http log
deny tcp any host fdc6:3916:1234:10::1 eq ssl log
remark GUA
deny tcp any host 2603:6018:3393:1610::1 eq ssh log
deny tcp any host 2603:6018:3393:1610::1 eq telnet log
deny tcp any host 2603:6018:3393:1610::1 eq http log
deny tcp any host 2603:6018:3393:1610::1 eq ssl log
remark ALLOW REMAINING TRAFFIC
permit ipv6 any any
enable-accounting
exit
interface ve 10
ip access-group noadmin4 in
ipv6 traffic-filter noadmin6 in
exit
EDIT - Sorry I missed that you already purchased the transceivers. If you can return them then...Has anyone found a source for 40gb transceivers that are LC? I purchased some Arista 40g transceivers only to find that the fiber cables are pricy. I need about 15M of length so the DAC's will not work. Or a source for cheap MPO fiber cabling?
Thanks
Have you checked fs.com?Has anyone found a source for 40gb transceivers that are LC? I purchased some Arista 40g transceivers only to find that the fiber cables are pricy. I need about 15M of length so the DAC's will not work. Or a source for cheap MPO fiber cabling?
Thanks
Nice. That's about $30 cheaper than the Fiber cables I was looking at. And because I messed up already... I can use these as stack links or uplinks correct?Have you looked at AOC? If you are in the united states then pricing might be right.
for example: NEW Mellanox MC2206310-015 15 Meter 40GB 40 Gb QSFP to QSFP AOC Fiber Cable 9782206310015 | eBay
Yes I did look at FS and about choked. I figured 40G was all LC or breakout. I did not even think to check.Have you checked fs.com?
A 40Gb using LC is going to be a BiDi, so not cheap compared to normal home budgets and pricing for a MTP/MPO type.