Cisco Catalyst 3850 Series and Cisco
Catalyst 3650 Series Switches Best
Practices Guide
First Published: November 30, 2015
Last Updated: December 14, 2015
Cisco Systems, Inc.
www.cisco.com
Cisco has more than 200 offices worldwide.
Addresses, phone numbers, and fax numbers
are listed on the Cisco website at
www.cisco.com/go/offices.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Obtaining Documentation and Submitting a Service Requestviii
Ease of Deployment1-1
Purpose1-1
Configuration Tool1-2
Catalyst Switch Configuration Best Practices1-2
LAN Access Switch Topology1-4
Switch Address Plan1-5
Initial Switch Configuration2-7
Purpose2-7
Prerequisites2-7
Identify Configuration Values2-8
Assign Initial Management Information2-8
Configure the Hostname for Switch Identification2-9
Configure Secure HTTPS and Secure Shell for Secure LAN Management2-9
Configure SNMP for Remote Management2-10
Configure Local Login and Password for Switch Access2-10
Configure Centralized User Authentication Through TACACS+2-10
Assign an IP Address to the Switch2-11
Configure the Management IP Address on an Out-of-Band Interface2-12
Configure the Management IP Address on an In-Band Interface2-14
Create a Management VLAN in Hardware2-15
Verify Basic Switch Configuration2-17
Show Running Configuration for Initial Management Information2-17
Switch Stack Update3-21
Purpose3-21
Prerequisites3-21
Identify Configuration Values3-22
Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series Switches Best Practices Guide
i
Contents
LAN Access Switch Topology with Configured FTP Server3-22
Performing the Stack Update3-23
Obtain the Switch Software Image3-23
Check the Software Version on the Stack Members3-23
Configure the Switch to Run in Install Mode3-24
Download the Switch Image from Cisco.com to a FTP Server3-25
Update the Switch Stack Image3-27
Enable Switch Image Auto-Upgrade3-27
Verify that Stack Members Are Running the Same Software Image3-28
Global System Configuration4-29
Purpose4-29
Prerequisites4-29
Identify Configuration Values4-29
Assign Global Configuration Information4-30
Configure High Availability on the Switch Stack4-31
Configure VTP Transparent Mode4-31
Enable Rapid Per-VLAN Spanning Tree4-32
Configure BPDU Guard for Spanning-Tree PortFast Interfaces4-32
Configure UDLD to Detect Link Failure4-33
Configure an Access List to Limit Switch Access4-33
Configure System Clock and Console Timestamps4-34
Configure DHCP Snooping Security Features4-34
Configure ARP Inspection4-34
Configure EtherChannel Load Balancing4-35
Create Access Layer VLANs4-35
Create IPv6 First Hop Security Policies4-35
Increase the TFTP Block Size4-36
Enable New Members to Automatically Update to the Switch Stack Image4-36
Verify Global Switch Configuration4-37
Show Running Configuration For Global Management Information4-37
Uplink Interface Connectivity5-41
Purpose5-41
Prerequisites5-41
Restrictions5-41
Identify Configuration Values5-42
LAN Access Switch Topology with Uplinks to a Distribution Switch or Distribution Router5-43
Configure Uplink Interface Connectivity5-44
Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series Switches Best Practices Guide
ii
Recommendations for Configuring the Uplink Interface to a Router or Switch5-44
Configure QoS on the Uplink EtherChannel Interfaces5-44
Configure the Uplink Interface as an EtherChannel and as a Trunk5-45
Configure the Uplink Interface to Connect to Distribution VSS or VPC Switches5-45
Configure the Uplink Interface to Connect to Distribution Routers (or Standalone Distribution
Switches)
5-46
Configure Security Features on the Uplink EtherChannel Interfaces5-48
Spanning-Tree Recommendations for Uplink Interfaces Connecting to Distribution Switches5-48
Verify Uplink Interface Configurations5-49
Show Running Configuration for Uplink Interface Connectivity5-49
Access Interface Connectivity6-51
Purpose6-51
Prerequisites6-51
Identify Configuration Values6-51
Contents
LAN Access Switch Topology with Connections to End Devices6-53
Configure Access Interface Connectivity6-53
Recommendations for Configuring Access Interfaces6-53
Configure the Interface for Access Mode6-55
Configure VLAN Membership6-55
Create an Interface Description6-55
Configure Security Features on Access Interfaces6-56
Configure QoS on the Access Interfaces6-57
Verify Access Interface Configurations6-58
Show Running Configuration for Access Interface Connectivity6-61
Access Control on the Wired Network7-65
Purpose7-65
Prerequisites7-65
Restrictions7-65
Identify Configuration Values7-66
LAN Access Switch Topology with IEEE 802.1x Secure Access Control7-67
Provision IEEE 802.1x for Wired LAN7-67
Recommendations for Configuring Security on a Wired LAN7-67
Provision Common Wired Security Access7-68
Provision in Monitor Mode7-71
Provision in Low Impact Mode7-72
Provision in High Impact Mode7-73
Verify Secure Access Control on the Switch7-74
Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series Switches Best Practices Guide
iii
Contents
Show Running Configuration for Provisioning Modes7-74
Monitoring IEEE 802.1x Status and Statistics7-77
Converged Wired and Wireless Access8-81
Purpose8-81
Prerequisites8-81
Restrictions8-82
Identify Configuration Values8-82
LAN Access Switch Topology with Wireless Connectivity8-83
Enable the Switch as a Wireless Controller8-84
Install Access Point Licenses on the Switch8-84
Verify AP-Count License Installation8-85
Configure a Wireless Management VLAN8-86
Configure Service Connectivity8-86
Enable Wireless Controller Functionality8-87
Change a Switch to Run in Mobility Controller Mode8-87
Enable the Access Point Connections8-88
Enable a Client VLAN8-89
Provisioning a Small Branch WLAN8-90
Provision in Easy-RADIUS8-90
Disable Authentication to Enable Easy-RADIUS8-90
Configure QoS to Secure the WLAN8-91
Verify Client Connectivity in RADIUS8-91
Provision in Secure Mode8-93
Enable the AAA RADIUS Server8-93
Configure the WLAN with IEEE 802.1x Authentication8-94
Configure QoS Service Policies for an Open WLAN8-94
Obtain WLAN Client IP Addresses8-95
Manage Radio Frequency and Channel Settings8-95
Disable Low Data Rates8-96
Enable Clean Air8-97
Enable Dynamic Channel Assignment8-97
Associate WLAN Clients8-98
Verify WLAN Client Connectivity8-98
Verify the Converged Access Configuration on the Switch8-99
Show Running Configuration for Wireless LAN Converged Access8-99
iv
System Health Monitoring9-103
Purpose9-103
Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series Switches Best Practices Guide
I
NDEX
Contents
Prerequisites9-103
Show Running Status9-103
Run a System Baseline for Core Resources9-104
Obtain CPU and Core Processor Usage9-104
Obtain Switch Memory Usage9-106
Monitor File Systems Usage9-106
Run a System Baseline for Environmental Resources9-107
Other System Monitoring Considerations9-108
Spanning Tree Monitoring9-108
Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series Switches Best Practices Guide
v
Contents
vi
Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series Switches Best Practices Guide
Preface
Audience
This document is written for managing the Cisco Catalyst 3850 Series Switches and the Cisco 3650
Series switches and switch stacks in their network. A basic understanding of Ethernet networking is
expected. Cisco Certified Network Associate level (CCNA) knowledge is helpful, but not required.
Conventions
This document uses the following conventions:
ConventionIndication
italic blue fontExample configuration values that are replaced with reader values.
bold fontCommands and keywords and user-entered CLI appear in bold font.
italic fontDocument titles, new or emphasized terms, and arguments for which you supply values are in italic
font.
[ ]
• Default responses to system prompts are in square brackets.
• Elements in square brackets are optional.
{x | y | z}Required alternative keywords are grouped in braces and separated by vertical bars.
[x | y | z]Optional alternative keywords are grouped in brackets and separated by vertical bars.
stringA nonquoted set of characters. Do not use quotation marks around the string, or the string will include
the quotation marks.
courier fontTerminal sessions and information the system displays appear in courier font.
< >Nonprinting characters such as passwords are in angle brackets.
!, #An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line.
NoteMeans reader take note. Notes contain helpful suggestions or references to material that is not covered
in the manual.
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
vii
Audience
TipThe tips information might not be troubleshooting or even an action, but could be useful information,
similar to a Timesaver.
TimesaverYou can save time by performing the action described in the paragraph.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a
service request, and gathering additional information, see What’s New in Cisco Product Documentation
at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html.
Subscribe to What’s New in Cisco Product Documentation, which lists all new and revised
Cisco technical documentation as an RSS feed and deliver content directly to your desktop using a reader
application. The RSS feeds are a free service.
viii
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
OL-xxxxx-xx
Ease of Deployment
This document describes best practices for deploying your Cisco Catalyst 3850 Series and Cisco
Catalyst 3650 Series switches.
NoteUnless otherwise noted, the term switch refers to a standalone Catalyst 3850 switch, a Catalyst 3650
switch, or a switch stack.
A Cisco switch deployment best practice is a preferred configuration method to employ on your Catalyst
switches. It is a proven and tested way to improve network security, performance, and availability.
A best practice configuration includes an explanation of why you should perform a given task and a
sample snapshot of a full running configuration that you can extrapolate for your specific scenario.
TipUse the configuration recommendations in this document as a template for your switch deployments.
NoteMany Cisco documents are available that define best practices for a variety of features and solutions.
There will be some overlap between the information provided in this guide and other best practices and
deployment guides. When relevant, this document references other existing documents so the reader can
get a deeper understanding of an aspect of the 3850 operation. Otherwise, this document is
self-contained, and provides complete best practice configuration.
Configuration Tool
The configuration examples in this document use the Cisco IOS CLI configuration tool, which is the
most common tool used to configure a switch.
However, you do have the flexibility to use a different tool to perform switch configuration. Other
configuration tools are the Express Setup, Device Manager, and Cisco Prime.
The examples provided in this document show the CLI commands that you should execute on your
switch. You must replace the blue italicized example values with your own values.
Cisco Systems, Inc.
www.cisco.com
LAN Access Switch Topology
set system location Building 1, San Jose, CA
Dual redundant switches
in distribution layer running
VSS (Cat6500/6800/4500),
or VPC (Nexus 7000)
Desktop user
direct connect
Desktop user
Printer
Wireless access
Catalyst 3850 stack in access
Voice VLAN 11
Data VLAN 10
Data VLAN 10
Data VLAN 10
Switch management
VLAN 100
Access point VLAN 12
Trunk link
Native VLAN 999
All VLANs included
LAN Access Switch Topology
The workflows described in this document assume that a switch is deployed as a LAN access switch.
Unless noted otherwise, a switch that is in the LAN access layer is configured as a Layer 2 switch, with
all Layer 3 services provided by the directly connected distribution switch or router.
This document assumes that the switches are stacked together to form a switch stack (a common
switching unit). We recommend that you use switch stacks because of built-in redundancy. We also
recommend the use of using switch stacks when deploying switches in converged access mode (wireless
mode) and connecting access points to different stack members.
A switch deployed at the LAN access layer provides high-bandwidth connections to devices through
10/100/1000 Ethernet, with both Gigabit and 10-Gigabit uplink connectivity options.
When a switch is deployed in access mode, it enables end devices, such as IP phones, wireless access
points, and desktops to gain access to the network. The Power over Ethernet (PoE) switch models
support PoE+ (30 W) and UPoE (60 W) to power IP phones, wireless access points, and IP cameras. The
field-replaceable uplink module from the switch enables different uplink connectivity types.
Ease of Deployment
Figure 1 shows an enterprise campus deployment, where the switch is connected to a distribution layer
switch (such as a Catalyst 6500,6800,4500 or a Nexus 7000 switch).
Figure 1LAN Access Switch Topology with Distribution Switch
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
2
Ease of Deployment
Cisco Catalyst Switch Configuration Workflow
Figure 2 shows a branch deployment, where the switch is connected to a router (ISR). Because the switch
operates as a Layer 2 switch, not many differences occur in the configuration between the campus or
branch deployment cases. Differences in the configuration are noted in the best practice procedures.
Figure 2LAN Access Switch Topology with Distribution Router
Voice VLAN 11
Data VLAN 10
Desktop user
behind IP phone
Data VLAN 10
Desktop user
direct connect
Data VLAN 10
Printer
Wireless access
Catalyst 3850 stack in access
Switch management
VLAN 100
Trunk link
Native VLAN 999
All VLANs included
Access point VLAN 12
Cisco Catalyst Switch Configuration Workflow
This document focuses on configuring a switch network and is organized in a workflow pattern,
beginning with the initial configuration of a switch after it is racked, mounted, connected, and powered
on, and ending with monitoring system health.
Figure 3 shows the best-practice configurations described in this document.
See the Switch Hardware Installation Guide for information on how to install a switch.
Dual redundant
routers running
HSRP
391638
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
4
Ease of Deployment
Switch Address Plan
The VLAN IDs and IP addresses designated for a switch and used throughout this document are not a
component of practices; they are only specified for the configuration examples. Your deployment will
have an IP address plan that suits your specific network.
In this document, all IP address ranges are /24 for the sake of simplicity. We recommend that VLAN IDs
be reused across the access switches deployed.
For example, in the access layer, VLAN 10 is always used for data, and VLAN 11 is always used for
voice. The IP subnets for those VLANs are different across the access switches, but the VLAN IDs are
the same. This type of address plan makes it easier to operate the network because the same VLAN IDs
are consistent.
Table 1IP Address Plan
VLAN IDIP Address ServerDescription
100192.168.1.0/24—Switch in-band management VLAN.
10192.168.10.0/24Upstream deviceAccess data VLAN for end devices
11192.168.11.0/24Upstream deviceAccess voice VLAN for IP phones
12192.168.12.0/24Catalyst 3850 switchAccess point VLAN and subnet.
200192.168.13.0/24Upstream deviceWireless client VLAN and subnet.
—192.168.254.0—IP address range for all central
Switch Address Plan
and subnet.
and subnet.
services. The services are not
physically adjacent to the switch.
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
5
Switch Address Plan
Ease of Deployment
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
6
Switch Stack Update
This workflow explains how to update all members of a switch stack with the same software image.
Before proceeding with global and advanced configurations on a switch stack, all stack members must
be running the same Cisco IOS XE release to avoid mismatch issues. In addition, any new switch that
needs to join the switch stack must also be running the same Cisco IOS XE release; otherwise, the switch
stack will not converge and the new switch will remain in a standalone state.
NoteUpdating a Catalyst 3850 or 3650 switch stack is different from updating a Catalyst 3750 switch stack.
Simply changing the boot statement to the desired .bin file is not recommended for Catalyst 3850 and
3650 switch stacks. The update process for Catalyst 3850 and 3650 switch stacks includes a series of
package files, which are extracted from the .bin file and loaded into flash.
Prerequisites
• Obtain a valid Cisco Connection Online (CCO) account with entitled credentials.
• The process to install the new IOS version will use either FTP or TFTP. This requires a FTP or TFTP
• Install and configure the TFTP or FTP before you begin.
• Verify that the TFTP block size is set at the maximum value of 8192, as described in the “Increase
server be available to host the 3850 IOS Software, and the server reachable over an IP network.
the TFTP Block Size” section.
Cisco Systems, Inc.
www.cisco.com
Identify Configuration Values
Identify Configuration Values
We recommend that you identify certain switch configuration values in advance so that you are ready to
proceed with this section without interruption. As you follow the configuration sequence, replace the
values in column B with your values in column C.
NoteIn the configuration examples, you must replace the blue italicized example values with your own values.
Table 1 Switch Stack Update Configuration Values
A. Value NameB. Example Value NamesC. Your Value
hostname
TFTP server
Flash file
Switch Stack Update
3850-access-Bld1Flr1
192.168.254.12
cat3k_caa-universalk9.SSA
.16.1.0.EFT3-1.bin
NoteConfiguration examples begin in global configuration mode unless noted otherwise.
LAN Access Switch Topology with Configured TFTP Server
Figure 1LAN Access Switch Topology with Configured TFTP Server
Voice VLAN 11
Data VLAN 10
Desktop user
Data VLAN 10
Desktop user
direct connect
Data VLAN 10
Printer
Catalyst 3850 stack in access
Switch management
VLAN 100
Dual redundant switches
in distribution layer running
VSS (Cat6500/6800/4500),
or VPC (Nexus 7000)
Trunk link
Native VLAN 999
All VLANs included
FTP SERVER
172.18.121.121
Access point VLAN 12
Wireless access
Performing the Stack Update
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
23
391700
Switch Stack Update
• Obtain the Switch Software Image
• Check the Software Version on the Stack Members
• Configure the Switch to Run in Install Mode
• Installing IOS image from local TFTP/FTP server
• Update the Switch Stack Image
•
NoteThe following tasks are to be performed in a sequence that is listed here.
Obtain the Switch Software Image
We recommend that you review the appropriate switch release notes before installation to ensure
compatibility with your network topology. Each platform on Cisco.com has a Cisco-suggested release
based on software quality, stability, and longevity, which is designated by the symbol, as displayed
in Appendix 2, “Cisco Catalyst 3850-48P-S Switch”
Performing the Stack Update
Step 1Download the desired .bin file from Cisco.com to the switch flash storage.
NoteThe purpose of this example is only to show you how the Cisco-suggested release symbol is designated,
and not to give you recommended release versions because those change over time.
.
Figure 2Cisco Catalyst 3850-48P-S Switch
Check the Software Version on the Stack Members
Step 2Verify the running software version.
Configure the Switch to Run in Install Mode
Your switches should run in install mode while in production. This mode is not a requirement, but the
update procedure is different if your switches are running in a mode other than install mode.
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Step 3If your switch stack is running in bundle mode, use the request platform software package expand
switch file to flash command to convert it to install mode.
Step 4After the .bin file has successfully extracted to flash, change the boot statement and boot to the
packages.conf file.
Switch Stack Update
NoteSince the format of the pacakges.conf file has changed in Cisco IOS XE Release Denali 16.1, overwrite
the old packages.conf with the new packages.conf file. Perform the above step for eachswitch in your
stack. If you have a 3 member stack, it will need to be done on flash:, flash-2:, and flash-3.
NoteMake sure the tftp server is reachable. To improve performance, increase the tftp block size to 8192. Use
the ip tftp blocksize bytes command in global configuration mode.
25
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Switch Stack Update
Switch# show version
Cisco IOS Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version
Denali 16.1.1, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2015 by Cisco Systems, Inc.
Compiled Thu 12-Nov-15 16:23 by mcpre
Step 5Confirm that the switch stack is now running in install mode.
Performing the Stack Update
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
26
Performing the Stack Update
# show run | inc block
ip tftp blocksize 8192
ping 192.168.254.12
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.254.12, timeout is 2 seconds: !!!!
Installing IOS image from local TFTP/FTP server
You can use any file transfer method that you are familiar with, but we recommend TFTP or FTP.
Step 6Confirm the block size config using the following command:
We recommend that you use a TFTP block size of 8192 (maximum allowed value) before attempting to
use TFTP or FTP to transfer a file to the switch. Refer to the “Increase the TFTP Block Size” section in
the “Global System Configuration” workflow for details.
Step 7Make sure that there is connectivity to the TFTP server.
In this example, a TFTP server is used that is accessible through the in-band network.
Switch Stack Update
Step 8After verifying connectivity, make sure that there is enough room in flash on all the switch stack
members.
Step 9If you determine that files must be purged from flash, run the request platform clean switch command
to erase unneeded files within flash on all the stack members.
We recommend using the request platform clean switch command instead of individually deleting
files. The command provides a list of the files to purge so that you understand what files are deleted when
you confirm deletion.
NoteUse switch all option to clean up all switches in your stack.
NoteThe request platform clean switch command also deletes the .bin file that is used to install the new
Cisco IOS software. After the .bin is extracted, you no longer need it.
27
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Switch Stack Update
Device# request platform software package clean switch all file flash:
Running command on switch 1
Cleaning up unnecessary package files
Scanning boot directory for packages ... done.
Preparing packages list to delete ...
done.
Running command on switch 2
Cleaning up unnecessary package files
Scanning boot directory for packages ... done.
Preparing packages list to delete ...
done.
The following files will be deleted:
[1]:
/flash/cat3k_caa-rpbase.BLD_V161_0_THROTTLE_LATEST_20151116_230450.SSA.pkg
/flash/cat3k_caa-srdriver.BLD_V161_0_THROTTLE_LATEST_20151116_230450.SSA.pkg
/flash/cat3k_caa-universalk9.BLD_V161_0_THROTTLE_LATEST_20151116_230450.SSA.bin
/flash/cat3k_caa-wcm.BLD_V161_0_THROTTLE_LATEST_20151116_230450.SSA.pkg
/flash/cat3k_caa-webui.BLD_V161_0_THROTTLE_LATEST_20151116_230450.SSA.pkg
/flash/packages.conf
/flash/packages.conf.00/flash/packages.conf.01/flash/packages.conf.02-
[1 2]: Do you want to proceed with reload? [yes/no]
Switch Stack Update
Step 10Copy the switch image to the TFTP server using the copy tftp://flash command.
The following example shows that the TFTP server (192.168.254.12) requires a user name (admin) and
password (cisco), which can easily be integrated into the copy command:
Update the Switch Stack Image
29
Step 11Upload the image to the stack members, and then reload the switch.
The image download and installation can be performed while the stack is in-service, but to complete the
update install, you must perform a switch reload, which causes a service outage.
Step 12After the reload completes, run the request platform software package clean switch all file flash
command.
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Switch Stack Update
request platform software package clean switch all file flash
Device# request platform software package clean switch all file flash:
Running command on switch 1
Cleaning up unnecessary package files
Scanning boot directory for packages ... done.
Preparing packages list to delete ...
done.
Running command on switch 2
Cleaning up unnecessary package files
Scanning boot directory for packages ... done.
Preparing packages list to delete ...
done.
software auto-upgrade enable
end
Performing the Stack Update
.
To verify that stack members are using the same software, use the show version command on all
members of the switch stack.
Enable Switch Image Auto-Upgrade
Step 13Enable auto-upgrade so that new or replacement stack members are automatically upgraded with the
software running on the switch stack.
If you are adding a new member, or replacing a stack member, we recommend that you enable the auto
upgrade feature within the stack. This feature helps to avoid stack mismatch issues and ensures that any
new switches are upgraded to the version currently running on the stack and also converts a member in
bundle mode to install mode.
The auto-upgrade feature automatically installs the software packages from an existing stack member to
the stack member that is running incompatible software.
NoteAuto-upgrade is disabled by default.
NoteThe rolling-upgrade feature is not supported.
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
30
Performing the Stack Update
Switch Stack Update
31
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Initial Switch Configuration
This workflow explains how to configure the basic settings on a switch.
Whether the configuration deployment of a switch is completed all at once or done in phases, the basic
switch settings must first be configured. The initial management configuration includes setting IP
addresses, passwords, and VLANs, which the prerequisites for future feature configuration.
Prerequisites for Initial Switch configuration
Refer to the switch Hardware Installation Guide to complete the following tasks:
1. Rack-mount the switch.
2. Connect the StackWise cables.
3. Connect the switch ports.
4. Perform power on.
5. Provision your upstream switch.
6. Connect at least one Ethernet cable from the uplink interface on the switch to the upstream switch
or router.
Identify Configuration Values
We recommend that you identify certain switch configuration values in advance so that you can proceed
with this section without interruption. We recommend that you take a print out of Table 2, and, as you
follow the configuration sequence, replace the values in column B with your values in column C.
NoteReplace the blue italicized example values with your own values.
Cisco Systems, Inc.
www.cisco.com
Assign Initial Management Information
Table 3 Initial Configuration Values
A. Value NameB. Example Value NamesC. Your Value
Hostname3850-access-Bld1Flr1
SNMP community strings for
read-only and read-write access
Management VLAN ID100
In-band management IP address
and mask
Default gateway192.168.1.1
Secret passwordmy-secret-password
TACAS server IP address192.168.254.10
TACAS server secret keycisco123
Uplink interface ID
Management VRF IP address for
out-of-band interface
Mgmt-VRF default route next
hop
Native VLAN 999, dummy
Initial Switch Configuration
my-SNMP-RO-name
my-SNMP-RW-name
192.168.1.2 255.255.255.0
GigabitEthernet 1/1/1
Mgmt-vrf 192.168.128.5
255.255.255.0
192.168.128.1
NoteThe configuration examples provided in this document begin in global configuration mode, unless noted
otherwise.
Assign Initial Management Information
• The following configurations should be performed in the same sequence in which they are listed
here.
• Users can now proceed to the Configure Secure HTTPS ans Secure Shell for Secure LAN
Management section.
• Configure SNMP for Remote Management
• Configure Local Login and Password for Switch Access
• Configure Centralized User Authentication Through TACACS+
• Configure a Management IP Address on an Out-of-Band Interface
• Configure a Management IP Address on an In-Band Interface
• Create a Management VLAN in Hardware
• Enter the show running-configuration command to display the initial management information for
the switch.
18
NoteThe following configurations should be performed in the same sequence in which they are listed here.
Best Practice User Guide for the Catalyst 3850 and Catalyst 3650 Switch Series
Loading...
+ 90 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.