Wednesday, April 3, 2013

How to Use the Ping Command in the Cisco IOS?

The ping command is irreplaceable when it comes to troubleshooting. At some point, you will undoubtedly use this command to solve a networking problem. But how do you properly use this command in the Cisco IOS?

The Basics of Ping
The ping command works just like on those old submarine movies. You are on one network device and you “ping” another. When you do this, in your head think of the sound that you heard on those old submarine movies- “PPiiiiiiiiiiiing”. The sound would go out and, on the sonar operator’s-screen, he would or would not see the other submarine. This is exactly how the ping-command in networking, works. Your sonar screen is your Cisco router’s command prompt. Usage of the ping command can be as simple as this:


As you can see in this example, I simply typed ping, and the IP address of the host I wanted to ping. In response, I got five exclamation points that told me that I sent 5 ping packets out, and they were all returned (a complete success).

In other words, a ping request is sent out to the remote device, and a ping response is received back, acknowledging the request. As ping uses the ICMP protocol, these packets are technically called ICMP echo request, and ICMP echo reply. ICMP is considered the management protocol for IP. ICMP uses the IP protocol but ICMP is not TCP, or UDP. ICMP does work at Layer 3.

Note that if the ping was not successful, you would have received one of the following (instead of an exclamation point): - “.” = network server timed out - “U” = destination unreachable - “Q” = source quench (destination too busy) - “M” = could not fragment - “?” = unknown packet type - “&” = packet lifetime exceeded Besides the five exclamation points, I was also told that I was sending “5, 100-byte ICMP echoes”. This means that I actually sent five “ping packets” of 100 bytes each. I was told that the timeout was 2 seconds. That means that if a response was not received within 2 seconds, ping would decide that the packet was not going to return at all. This is a safe assumption considering 2 seconds is 2000ms and I am getting pings back in about 36ms. Notice on the last line that the “Success rate is 100 percent”. That is because it says that I sent 5 pings and received 5 ping replies back (that is the “(5/5)”). I was told that the round-trip minimum time for a ping reply to return was 36ms, the average time (of all 5 pings) for a reply to return is 36ms, and the maximum time for a ping reply to return was 40ms. If you have DNS or a local hostname configured, you can use ping with names, like this:


You should know that there are many more types of ICMP traffic other than that used for “pinging” (echo and echo-reply). ICMP is used to redirect hosts to the proper router, to inform hosts that they need to resize their packets, and many types of IP management communications. Each of these types of ICMP packets has a type number (and optionally, a code number). For example, an ICMP echo is type 8. An echo-reply is a type 0. A redirect to another router for an entire network is a type 5, code 0 (with there being possible codes of 0-3). Finally, you can abbreviate ping by only typing “p”. For example: Router# p 1.1.1.1

What Else Can I Do With Ping?
Now that you understand the basics, let’s look at an advanced version of ping. Cisco calls this “extended ping”. Extended ping will ask you many questions and “interactively” configure the options for ping. If you have never seen this before, you may be surprised at how many options the ping command can have. Here is an example:


In typing ping, by itself, I was asked a list of questions. I have put a red arrow by each of the questions for which I typed a response. On other lines, I simply pressed Enter to take the default. In this example, I still ping-ed “Router3”. I stuck with the default of 5 ping packets (but could have changed it). I kept the default of a 100 byte ping packet but could have changed this to a ping packet as large as 18,024 bytes. Next, I chose to use the extended options, where I was able to choose the source interface of my ping packets. I also chose verbose output. With verbose output, I was able to see each reply to each ICMP echo that I sent, and the time it took for that reply to return to my router. One thing you may be surprised by, is the first question that asked what protocol you want to ping with. Yes, you can ping with protocols other than IP (such as Appletalk, DECnet, and IPX), but rarely are those protocols used anymore.

How Do I Allow Ping Through An IOS Access-list?
Because ICMP is not TCP or UDP, you must specify ICMP specifically when you create an access-list (ACL). Here is an example: access-list 101 permit icmp any any echo-reply In this ACL, we are permitting ICMP traffic from any source, and any destination, as long as it is a reply to an echo request. Many administrators enter the following ACL and expect ICMP to flow through it: access-list 101 permit ip any any This ACL does NOT allow ICMP traffic. To allow ICMP and IP, you need the following two entries in your ACL: access-list 101 permit ip any any access-list 101 permiticmp any any

In summary, the ping utility is invaluable when it comes to troubleshooting network issues. While just about everyone has “pinged” something at one point or another, most people don’t know that there is more to ping than the simple ping command. Extended ping on Cisco routers and switches is a very powerful troubleshooting utility. While the ping command does use the ICMP protocol, there is much more to ICMP than just “ping”. Finally, don’t forget to save yourself three keystrokes by abbreviating the ping command with “p”. Over the years, those keystrokes add up!

More Related Cisco Networking Tips:
3560 switch, cisco 3560 series switch, catalyst 3560, 3560 series switch

Monday, March 18, 2013

How to Configure Cisco 1242 Wireless AP?



This Cisco 1242 wireless access point (AP), designed for business-grade users, and is ideal if you have a lot of traffic and you need reliability and some advanced features. For a business, I would never install any consumer-grade AP unless I was looking for trouble. The reason is that those consumer-grade APs (the ones you can buy at your local electronics store) just don't have the capabilities, the reliability of connections, the troubleshooting, or the throughput to do what you need them to do.
Here is a photo of the Cisco 1242AG

Here is a photo of the front of the AP:

As you can see, this AP has a power connection port (which goes to an AC/DC adapter), a console port, Ethernet port (to connect to the physical LAN), and indicator lights. You can also power the AP over the Ethernet wire with PoE (802.3af) on this model of AP, you will notice four black rubber covers. These cover the connectors for the wireless antennas (two on the front and two on the back).

On the front of the AP are the two antenna connectors for the 2.4Ghz network, with the right connector being the primary. On the back are the connectors for the 5Ghz network. These antennas can be bought separately and are required only if you want to extend the range in some way or do point-to-point bridging between APs. In a business network, you often want to extend or shape the wireless range, both for coverage and security. In that case, you would want to investigate and use the external antennas.

The Cisco 1242 offers the following:
  • A, B and G wireless protocols in the 2.4Ghz and 5Ghz wireless ranges
  • A long list of security protocols that you won't find in consumer-grade APs
  • Intrusion detection and prevention
  • Hardware-assisted AES encryption
  • Locking mounting bracket and a rugged NEMA metal case
  • Compatibility with Cisco's wireless management applications
  • That Cisco IOS CLI look and feel that we are used to configuring (or a Web browser interface if you so desire)
You can find more specifics on these APs at the Cisco homepage for the Aironet 1242 series.
Configuring the Cisco 1242 wireless AP Step by Step
Here are the steps I took to get my wireless AP functioning on my network:
1. Connect to power and LAN Ethernet
2. AP obtains IP address from DHCP server. I went to my DHCP server and found the IP address that it had obtained:

Alternatively, you can configure a static IP address on the AP using the console port, like this:
3. Point your Web browser to the AP. In my case, the DHCP-obtained IP address was 192.168.1.106. The default login (console or Web) is Cisco and Cisco (not cisco and cisco) for the username and password. Here is what I saw:

Notice how both the 2.4Ghz and 5Ghz radios show to be "down." On APs with version 12.3(4)JA and above, the wireless radio is disabled by default, and there is no SSID configured. This is for security reasons.
Also, note on the menu selections for the interface that there are options for Express Setup and Express Security. If these are available, why not use them?
4. Click on Express Setup. Notice the changes I made in the following screen. Not all of these are required. I changed the AP's name, set it to a static IP, changed the SNMP community string, and took the default of "Access Point" for both radios.

Next, I clicked Apply. I was redirected to the new IP address of the AP and I had to log in again.
5. Next, I clicked on Express Security and set the SSID, the SSID to be broadcast, and 40bit WEP encryption with a static key (basic, I know -- but just an example).

6. There are two important things still left to do -- change the admin password and enable the radios. To enable the radios, I clicked in Network Interfaces, on the left. In my case, I was only using the 2.4Ghz radio so I clicked on Radio0-802.11G, then on the Settings tab. I clicked on Enable for the radio and took all the other default settings.

At the bottom of the page, I clicked "Apply."
7. Finally, let's change the admin password so that no one else can get into our AP. To do this, I clicked on Security on the left hand side, then Admin Access. From here, I changed the default Authentication password and clicked Apply. I had to reauthenticate to the AP.
Then I created a new account called Admin with a secure password, and Read-Write capability (clicked Apply). After that, I deleted the default Cisco account (clicked Apply).
Here is what it looked like:

Note that we still have a single global password for all users. You may want to change this so that individual users will have their own passwords.
8. At this point, I could see the wireless network from my Windows computer and could successfully connect to it using the configured WEP key. My computer received a DHCP IP address from my DHCP server.

More Related Cisco Aironet 1240 AG Series
1900 cisco modules, 1900 cisco card, cisco 1900 interfaces, 1900 cisco interfaces

Friday, March 15, 2013

From Technical User: Open Port 873 on Cisco 1921



Caskibum’s Problem of Opening Port 873 on Cisco 1921
I have a Cisco 1921 and need to open ports 22 (SSH) and 873 (rsync) to run an rsync server on my network and the rest of the network needs standard "internet" access.  I am fairly new to Cisco ACLs and so I expect I'm doing something stupid but not sure what.When I add the ip access-group XXX in / out to the gig0/0 interface, I lose all www functionality at that point.Here is my current (working) config with the ACLs listed (101 and 102) but not enabled on the gig0/0 interface.I have tried the "established" statement at the start and end of the 101 list, no difference.Thanks for any help!
Router#show run
Building configuration...
Current configuration : 2675 bytes
!
! Last configuration change at 15:03:45 UTC Sun Dec 18 2011 by
!
version 15.0
service timestamps debug datetimemsec
service timestamps log datetimemsec
service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$Sx2k$wiHT8Af585IB/HsSZkwC61
enable password 7 073E325F19190C1D47
!
noaaa new-model
!
no ipv6 cef
ip source-route
ipcef
!
!
noipdhcp use vrf connected
ipdhcp excluded-address 10.1.0.1 10.1.0.149
ipdhcp excluded-address 10.1.0.200 10.1.0.254
!
ipdhcp pool net_dhcp
   import all
   network 10.1.0.0 255.255.255.0
   default-router 10.1.0.1
   lease 0 0 5
!
!
noip
domain lookup
ip
domain name treeskier.ca
multilink bundle-name authenticated
!
!
!
licenseudipid CISCO1921/K9 sn FGL15092836
!
!
username blah password blahblah
!
!        
ipssh version 2
!
!
!
!
interface GigabitEthernet0/0
 description Internet
 ipdhcp client update dns
 ip address dhcp
 ipnat outside
! ip access-group 101 in
! ip access-group 102 out
! once I turn these on, it all dies.
 ip virtual-reassembly
 duplex auto
 speed auto
 no cdp enable
 no mop enabled
!
interface GigabitEthernet0/1
 description internal
 ip address 10.1.0.1 255.255.255.0
 ipnat inside
 ip virtual-reassembly
 duplex auto
 speed auto
 no mop enabled
!
ip forward-protocol nd
!
ip http server
ip http authentication local
no ip http secure-server
!
ipnat inside source list 1 interface GigabitEthernet0/0 overload
ipnat inside source static tcp 10.1.0.102 873 interface GigabitEthernet0/0 873
ipnat inside source static tcp 10.1.0.102 22 interface GigabitEthernet0/0 22
!
access-list 1 permit 10.1.0.0 0.0.0.255
access-list 1 remark INSIDE_IF=gig0/1
access-list 101 permit tcp any 10.1.0.0 0.0.0.255 established
access-list 101 permit tcp any host 10.1.0.102 eq 22
access-list 101 permit udp any host 10.1.0.102 eq 22
access-list 101 permit tcp any host 10.1.0.102 eq 873
access-list 101 permit udp any host 10.1.0.102 eq 873
access-list 102 permit tcp 10.1.0.0 0.0.0.255 any
access-list 102 permit udp 10.1.0.0 0.0.0.255 any
dialer-list 1 protocol ip permit
!
!        
!
control-plane
!
banner login ^C**************************^C
!
CON and VTY setup
!
scheduler allocate 20000 1000
end
A bit of really basic troubleshooting:
Router#sh access-lists
Standard IP access list 1
    10 permit 10.1.0.0, wildcard bits 0.0.0.255 (9854736 matches)
Extended IP access list 101
    10 permit tcp any 10.1.0.0 0.0.0.255 established
    20 permit tcp any host 10.1.0.102 eq 22
    30 permit udp any host 10.1.0.102 eq 22
    40 permit tcp any host 10.1.0.102 eq 873
    50 permit udp any host 10.1.0.102 eq 873
Extended IP access list 102
    10 permit tcp 10.1.0.0 0.0.0.255 any
    20 permit udp 10.1.0.0 0.0.0.255 any

Router#shipnat translations
Pro Inside global         Inside local          Outside local         Outside global
tcp 192.168.0.10:22       10.1.0.102:22         ---                   ---
tcp 192.168.0.10:873      10.1.0.102:873        ---                   ---
tcp 192.168.0.10:54693    10.1.0.150:54693      208.88.180.96:80      208.88.180.96:80
tcp 192.168.0.10:54695    10.1.0.150:54695      208.88.180.96:80      208.88.180.96:80
tcp 192.168.0.10:54696    10.1.0.150:54696      208.88.180.106:5222   208.88.180.106:5222
tcp 192.168.0.10:54699    10.1.0.150:54699      208.88.181.46:1935    208.88.181.46:1935
tcp 192.168.0.10:54700    10.1.0.150:54700      208.88.180.96:80      208.88.180.96:80
... (more dynamic NAT at work)

Reply to Caskibum from Imbadatthis
You aren't allowing DNS in .
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_configuration_example09186a0080100548.shtml#allowdns
also a nice to know:
http://www.cisco.com/en/US/tech/tk648/tk361/technologies_configuration_example09186a0080100548.shtml#debugtraffic

After Imbadatthis‘s Reply
Caskibumsolved problems like this:
Thanks for the response. 
I actually sorted it out last night, my "new" cable modem was blocking the port forwarding before it got to the router.  So once I set up the NAT port forwarding on the cable modem, all good now.
Just FYI, I've ended up with a much simpler ACL and NAT setup:
!
ipnat inside source list nat-acl interface GigabitEthernet0/0 overload
ipnat inside source static tcp 10.1.0.101 873 interface GigabitEthernet0/0 873
ipnat inside source static tcp 10.1.0.101 22 interface GigabitEthernet0/0 22
!
ip access-list extended nat-acl
permitip 10.1.0.0 0.0.0.255 any
permittcp any host 10.1.0.101 eq 22
permittcp any host 10.1.0.101 eq 873
!
!
Best Regards

More discussion between these two buddies to talk about Opening port 873 on Cisco 1921
Imbadatthis: So you've removed both acl 101 and 102?

Caskibum:
Yep, the only ACL is the named extended list, which is applied on the outside interface in the overload command.I could have probably left them in place, I found this "alternate" solution with the named extended list as it is now, and then after that didn't work either I went to the cable modem and found the source of the problem.  I expect the 101 / 102 acls are fine if I were to use them.Then the two static NAT commands to handle the traffic direction.Seems to be working.I'm no security expert so if this leaves some gaping hole please let me know and I'll rework it.
Cheers!

More Related Discussion on Open port 873 on Cisco 1921at tek-tips.com
More Cisco News and Cisco Hardware Tips you can visit: 

Wednesday, October 10, 2012

How to Take Part in this Big Party for Router-switch.com’s 10th Anniversary?



Router-switch.com, ten years old, happy birthday! 2012 marks the tenth anniversary of router-switch.com, which is an exciting moment for all router-switch’s staff and clients.


In 2012, router-switch.com welcomes its 10th anniversary. For router-switch.com, it has been a worldwide leading Cisco supplier during the past 10 years. To celebrate 10 years, it prepares big gifts for its regulars and new clients, such as Cisco AIR-AP1131AG-A-K9, limited edition T-shirts and 20PC U disk. Some popular Cisco products(including Cisco routers: Cisco 2900&3900 Routers, Cisco switches: Catalyst 3560x Series, Cisco Catalyst 3750x Series, Catalyst 3560V2/3750V2Cisco firewall, Cisco Access Points and network cards) will have big discounts (up to 75% off).The activity date is from September to October. Wow, if you wanna buy Cisco equipment, don’t miss it.
 
How the Router-switch.com Became the World’s Leading Cisco Supplier?
During the past ten years, from 2002 to 2012, router-switch.com has grown up into a global leading Cisco supplier. Indeed, it has experienced several vital moment. Here let’s share some router-switch.com’s big events:
2002, Router-switch.com was founded.
2003, Router-switch.com has experienced a rapid development.
2004, CCIE technical support team was built.
2005, The sales volume maintains 70% growth per year.
2006, Staff in company increased to 20.
2007, Router-switch.com established its marketing department. It attained its reputation in providing timely information of Cisco for clients and Cisco users.
2008, Router-switch.com adopted necessary advanced management tools to improve its service for clients.
2009, Router-switch.com upgraded warehouses in Hongkong and Mainland China. Its inventory is worth over $5 million.
2010, The sales of Router-switch.com have zoomed to $ 30 million.
2011, Router-switch.com released the new version to update service. It supplies free CCIE support. Social network platforms were opened to communicate with customers and clients well.
2012, New Office of router-switch.com landed in US to offer professional local service.

Nowadays, router-switch.com is becoming the world’s largest Cisco reseller online.  It believes that router-switch.com will bemore professional, more reliable and stronger with your support.
Note:A letter from CEO of router-switch.com to thank its customers and sharetheir progress.

More about Router-switch.com:
Router-switch.com, also called YejianTechnologies Co., Ltd, is the worldwide leader in delivering new, used, refurbished Cisco hardware, including Cisco routers, Cisco switches, firewall security, Cisco IP Phones VoIP, wireless AP, Cisco modules & cards, memory, and optical cables, SFP, GBIC, XENPK , etc. It carries over $5 million in inventory of Ciscohardware and Cisco equipment that can meet SOHO, small, midsized and large businesses of all sizes. Also Router-Switch.com owns more than 8,000 customers worldwide, not only because of its original Cisco products with reliable quality and competitive price, but also due to professionalservice, huge inventory, flexible payment and shipment. More information about router-switch.com can be found at http://www.router-switch.com/. For ongoing Cisco info, please go to
Blog.router-switch.com---News, tutorials, tips, info & thoughts on Developments in the Cisco, Cisco network, IT, Software & Network Hardware Industry

More Related Router-switch.com News:
Router-switch.com Announced Its Newly Redesigned Website
“Router Switch”, Our New Company Landing in U.S.—Professional Cisco Supply Service is Around You
Router-switch.com: A Batch of New Cisco Network Equipment Surprises the Coming Christmas Day

Friday, March 9, 2012

How to Configure a DHCP Relay on a Cisco Catalyst 4500 Switch?

Dynamic Host Configuration Protocol (DHCP) is a protocol for assigning dynamic IP addresses to hosts on a local network. WS-C3560E-12D-S DHCP also delivers TCP/IP configuration parameters such as the subnet mask and the default router. DHCP simplifies network administration because the DHCP server keeps track of IP addresses rather than requiring an administrator to manage the task manually.

For DHCP to operate correctly, all host computers need to contact the DHCP server. Routers by default do not forward host broadcasts beyond their own subnet. A DHCP relay agent forwards DHCP packets over routers that do not support the forwarding of these types of packets. A DHCP relay agent is a type of routing protocol that enables DHCP hosts to obtain IP addresses from a DHCP server on a different subnet.

A DHCP relay agent is usually run on a router. The Cisco Catalyst 4500 series switches have routing capabilities. Therefore a Cisco Catalyst 4500 is the appropriate place to run a DHCP relay agent.

How to Configure a DHCP Relay on a WS-C3560E-12D-E Catalyst 4500 Switch?
1. Log in to the Cisco device using an interactive text-oriented communications facility via a virtual terminal application, such as SSH or Telnet. When a login has succeeded, a read-only command-line prompt appears, such as "Switch>."

2. Type the command "enable" at the "Switch>" prompt. Type the password into the switch. The command-line changes to a enabled prompt, such as "Switch#."

3. Type the command "config terminal" at the "Switch#" prompt, and press the "Return" key. The "config terminal" command modifies the prompt to "Router (config) #."

4. Type the command "interface WS-C3560E-12SD-E FastEthernet<slot/port>" at the "Router(config)#" prompt, and press the "Return" key. This command modifies the prompt to "Router(config-if)#."

5. Type the command "ip helper-address <IP address>" at the "Router(config-if)#" prompt. This command enables the forwarding of DHCP packets to a different subnet.

6. Hold down the "Control" and "Z" keys simultaneously at the "Router(config-if)#" prompt. This takes the router back to the "Router#" prompt. The DHCP relay agent is now configured to support forwarding of DHCP packets.

Monday, January 16, 2012

Guide to Set an IP through a Console Connection on a Cisco 2960 Switch

Cisco Catalyst 2960 network switches supports the assignment of IP addresses on all network interfaces. Adding an IP address to the configuration is a necessary step to enable remote administration of the switch from any location on the network (which is preferred over the alternative administration method that requires physical connection to the serial console port on the switch). Configuring an IP address on the Cisco Catalyst 2960 using a serial console connection is a straightforward process that is the same for all interfaces on the switch.
Things you’ll need as follows:
a.Cisco Catalyst serial console cable
b.Windows XP computer with 9 pin serial port
c.Privileged exec password for the
d.IP address and subnet mask for the switch
How toSet an IP through a Console Connection on a 2960 reset cisco switch
1. Run a Cisco serial console cable from the Cisco Catalyst 2960 serial console port to the to the serial port on a Windows XP computer.
2.Open the "Hyperterminal" program by selecting the "Start" button and click "Run" and type "hypertrm" in the "Run" box that appears, and then press the "Enter" key.
3. Type "Cisco 2960" in the "HyperTerminal" window "Name:" field that appears and press the "Enter" button.
4.Select the "Connect using:" drop down box and then in the menu that appears click the "Com port" that connects the Windows XP computer to the and press the "Enter" key.
5.Click the "Bits per second:" drop-down option and select the "9600" setting in the menu. Then click the "Flow Control" drop-down option and select "None" in the menu and press the "Enter" key.
6.Touch the "Enter" key a few times and the command prompt will display. Type "enable" and press the "Enter" key and then type the password and press "Enter" again if requested.
7.Type "config terminal" and tap the "Enter" key. Then type "interface Vlan1" and tap the "Enter" key and the command prompt will move into "Interface Configuration Mode".
8. Enter "ip address x.x.x.xy.y.y.y", cisco catalyst substituting the "x.x.x.xy.y.y.y" with the assigned IP address and subnet mask for the switch and tap the "Enter" key. Then type "exit" and tap the "Enter" key to leave "Interface Configuration Mode" then type "ip default-gateway g.g.g.g", substituting "g.g.g.g" with the gateway IP address for the network and tap the "Enter" key.
9. Type "end" and tap the "Enter" key and then type "copy running-config startup-config" and tap the "Enter" key. Type "exit" and tap the "Enter" key.

More detailed notes:
Catalyst 2960 refurbished cisco switch Software Configuration Guide
http://www.cisco.com/en/US/docs/switches/lan/catalyst2960/software/release/12.2_25_see/configuration/guide/swipaddr.html

Thursday, December 15, 2011

Cisco 3560 Switches Vs.Cisco 3750 Series


“Is a Cisco 3560G switch capable of L3 operation (inter-VLAN IP routing), like a 3750 and 6500 can?”Of course, 3750G is much better.cisco 3560 ws c3560g 24ps e
“Can a Cisco 3750 switch apply access lists to inter-vlan routing, if so, how?”

The Cisco Catalyst 3750is usually being asked and compared with Cisco 3560 series. Both have their own user fans. Which is better, more suitable?

Let’s find answer from users’ comments:
The similarity:Both have comparable chassis configurations; support PoE; have similar MLS capabilities; have similar backplanes and throughput performance.

The only thing that really comes to mind is that multiple 3750's can be stacked.Cisco pitches both these switches as medium/enterprise level access switches. In my opinion though, they are perfectly adequate as a distribution switch in the right environment.

The ws c3560g 24ps e catalyst 3560 is an ideal access layer switch for small enterprise wiring closets or branch office environments that are using their LAN infrastructure for the deployment of new products and applications such as IP telephones, wireless access points, video surveillance, building management systems, and remote video kiosks. Customers can deploy network-wide intelligent services, such as advanced QoS, rate limiting, access control lists (ACLs), multicast management, and high-performance IP routing - while maintaining the simplicity of traditional LAN switching. Embedded in the Catalyst 3560 is the Cisco Cluster Management Suite (CMS) Software, which allows users to simultaneously configure and troubleshoot multiple Cisco Catalyst desktop switches using a standard Web browser. Cisco CMS Software provides configuration wizards that greatly simplify the implementation of converged networks and intelligent network services.
Product Details
Device Type Switch - 24 ports - L3 - Managed
Enclosure Type Desktop - 1U
Ports 24 x 10/100/1000 + 4 x Gigabit SFP
Performance Forwarding performance (64-byte packet size) : 38.7 mpps
MAC Address Table Size 12K entries
Routing Protocol RIP-1, RIP-2, HSRP, static IP routing, RIPng
Remote Management Protocol SNMP 1, RMON 1, RMON 2, RMON 3, RMON 9, Telnet, SNMP 3, SNMP 2c, HTTP, SSH-2
Features Full duplex capability, Layer 3 switching, Layer 2 switching, auto-sensing per device, IP-routing, DHCP support, auto-negotiation, ARP support, trunking, MPLS support, VLAN support, auto-uplink (auto MDI/MDI-X), IGMP snooping, traffic shaping, manageable, Spanning Tree Protocol (STP) support, Rapid Spanning Tree Protocol (RSTP) support, Multiple Spanning Tree Protocol (MSTP) support, DHCP snooping, Dynamic Trunking Protocol (DTP) support, Port Aggregation Protocol (PAgP) support, Trivial File Transfer Protocol (TFTP) support, Access Control List (ACL) support, Quality of Service (QoS), DHCP server, Virtual Route Forwarding-Lite (VRF-Lite), MLD snooping, Dynamic ARP Inspection (DAI), Time Domain Reflectometry (TDR), Per-VLAN Spanning Tree Plus (PVST+), Cisco EnergyWise technology, Uni-Directional Link Detection (UDLD), Link Aggregation Control Protocol (LACP)
Compliant Standards IEEE 802.3, IEEE 802.3u, IEEE 802.3z, IEEE 802.1D, IEEE 802.1Q, IEEE 802.3ab, IEEE 802.1p, IEEE 802.3x, IEEE 802.3ad (LACP), IEEE 802.1w, IEEE 802.1x, IEEE 802.1s
Power AC 120/230 V ( 50/60 Hz )
Dimensions (WxDxH) 44.5 cm x 37.8 cm x 4.4 cm
Weight 5.4 kg
Manufacturer Warranty Limited lifetime warranty


The new Cisco Catalyst 3750 Series switches are an innovative product line that improves LAN operating efficiency by combining industry-leading ease of use and the highest resiliency available for stackable switches. This new product series represents the next generation in desktop switches, and features Cisco StackWise technology, a 32-Gbps stack interconnect that allows customers to build a unified, highly resilient switching system - one switch at a time. For mid-sized organizations and enterprise branch offices, the Cisco ws c3560g 24ps e poe Series eases deployment of converged applications and adapts to changing business needs by providing configuration flexibility, support for converged network patterns, and automation of intelligent network-services configurations. In addition, the Cisco Catalyst 3750 Series is optimized for high-density Gigabit Ethernet deployments and includes a diverse range of switches that meet access, aggregation, or small-network backbone-connectivity requirements.PRODUCT FEATURES:24 Ethernet 10/100/1000 ports;32-Gbps, high-speed stacking bus;Innovative stacking technology;1 RU stackable, multilayer switch;Enterprise-class intelligent services delivered to the network edge;SMIinstalled;Basic RIP and static routing, upgradeable to full dynamic IP routing.

Product Details
Device Type Switch - 24 ports - L3 - Managed - stackable
Enclosure Type Rack-mountable - 1U
Ports 24 x 10/100/1000
Performance Switching capacity : 32 Gbps ¦ Forwarding performance : 35.7 Mpps
MAC Address Table Size 12K entries
Jumbo Frame Support Yes
Routing Protocol RIP-1, RIP-2, HSRP, static IP routing, RIPng
Remote Management Protocol SNMP 1, RMON 1, RMON 2, RMON 3, RMON 9, Telnet, SNMP 3, SNMP 2c, SSH, CLI
Features Flow control, full duplex capability, Layer 3 switching, auto-sensing per device, IP-routing, DHCP support, auto-negotiation, ARP support, VLAN support, auto-uplink (auto MDI/MDI-X), IGMP snooping, traffic shaping, stackable, Spanning Tree Protocol (STP) support, Rapid Spanning Tree Protocol (RSTP) support, Multiple Spanning Tree Protocol (MSTP) support, Dynamic Trunking Protocol (DTP) support, Port Aggregation Protocol (PAgP) support, Trivial File Transfer Protocol (TFTP) support, Access Control List (ACL) support, Quality of Service (QoS), RADIUS support, Jumbo Frames support, Cisco StackWise Technology, Cisco 3560 series EnergyWise technology, Uni-Directional Link Detection (UDLD), Rapid Per-VLAN Spanning Tree Plus (PVRST+), Link Aggregation Control Protocol (LACP), Remote Switch Port Analyzer (RSPAN)
Compliant Standards IEEE 802.3, IEEE 802.3u, IEEE 802.3z, IEEE 802.1D, IEEE 802.1Q, IEEE 802.3ab, IEEE 802.1p, IEEE 802.3x, IEEE 802.3ad (LACP), IEEE 802.1w, IEEE 802.1x, IEEE 802.3ae, IEEE 802.1s
Power AC 120/230 V ( 50/60 Hz )
Dimensions (WxDxH) 44.5 cm x 32.6 cm x 4.4 cm
Weight 4.6 kg
Manufacturer Warranty Limited lifetime warranty