Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Unable to set encapsulation on Cisco 4507R switch

Posted on 2011-03-11
2
Medium Priority
?
1,998 Views
Last Modified: 2012-08-13
Hi

I have a 4507R-E switch and I am unable to set the encapsulation for a trunk port to 802.1Q. I have looked at the commands reference for the IOS version i have installed and it clearly states the command is as follows
 switchport trunk encapsulation dot1q

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.2/54sg/command/reference/OL_22172.pdf

When i try the same command  it does not work, in fact the only options i get are for the 'switchport trunk' command are 'allowed, native and pruning'

I am running IOS version 12.2(54)

What am i missing??

Thanks


0
Comment
Question by:BESKEE
2 Comments
 
LVL 50

Accepted Solution

by:
Don Johnston earned 2000 total points
ID: 35108083
I believe that based on the supervisor your running, 802.1q is the ONLY trunking protocol supported. So you can't specify it.
0
 
LVL 18

Expert Comment

by:jmeggers
ID: 35108133
Are you in interface configuration mode?
0

Featured Post

New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The worst thing when starting a new job is when the previous Network Administrator left behind no documentation. How do you get into the devices? If you've been in this situation or just accidently mistyped your password, this article will hopefully…
In this article, the configuration steps in Zabbix to monitor devices via SNMP will be discussed with some real examples on Cisco Router/Switch, Catalyst Switch, NAS Synology device.
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question