Solved

Adding new 48 port blade to Cisco 4507R-E

Posted on 2011-02-11
5
1,375 Views
Last Modified: 2012-08-14
Hi Experts,

We currently have a Cisco 4507R-E with 6 blades configured. We need to add a new blade which will have 48 RJ-45 ports. What is the process to add this new blade in terms of IOS and physically adding it as well?

TIA
0
Comment
Question by:abhijitm00
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 10

Assisted Solution

by:scriven_j
scriven_j earned 250 total points
ID: 34870713
Physically they are hot swappable, so you can just plug it in.
0
 
LVL 10

Expert Comment

by:scriven_j
ID: 34870719
IOS would depend on how your current blades are configured.
0
 
LVL 10

Accepted Solution

by:
scriven_j earned 250 total points
ID: 34870761
Would be something like

!
interface GigabitEthernet<bladenumber>/<portnumber>
 switchport access vlan <vlannumber>
 switchport mode access
!

or

!
interface FastEthernet<bladenumber>/<portnumber>
 switchport access vlan <vlannumber>
 switchport mode access
!

This depends on the type of blade (provide your config for more detail).

<these are places where you need to put config specific information>
0
 

Assisted Solution

by:manni78
manni78 earned 125 total points
ID: 34871294
Its plug-n-play device. so insert the card in empty slot, wait for green/active light and its ready to use.
TA
0
 
LVL 12

Assisted Solution

by:Fidelius
Fidelius earned 125 total points
ID: 34873975
Hello,

You will find all instructions regarding installing modules in 4500 here:
http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/hardware/module/guide/03instal.html#wp1015639

0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
Use of TCL script on Cisco devices:  - create file and merge it with running configuration to apply configuration changes
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question