Solved

Cisco 3500,2900,5020,3700 macro

Posted on 2011-09-23
6
280 Views
Last Modified: 2012-05-12
I'm curiouse if it is possible to use a macro on another switch. Say switch A has a macro called unused ports. If i hooked up switch B and networked it so switch A can talk to B. Can I use the macro from switch A to run on switch B without making the macro on Switch B? Am I jsut greedy here?
0
Comment
Question by:Paktusjet
  • 4
6 Comments
 
LVL 16

Expert Comment

by:SteveJ
ID: 36593578
Probably not if in fact you are referring to EEM scripts. When you say "macro" what are you talking about? Abut your example, are you really trying to hsve a single box keep track of unused ports on more than one box? If so, that IS possible.

Good luck,
Steve
0
 
LVL 22

Accepted Solution

by:
eeRoot earned 500 total points
ID: 36597126
If you are referring to port macros, then no.  They have to be in the running config of the switch.
0
 
LVL 2

Author Comment

by:Paktusjet
ID: 36600609
@Steve

macros is a correct command on almost any cisco device. heres an example:

SwitchA has a macro setup that when applied will put a range of ports all in vlan 100 with spanning tree on with a description Users. Instead of me having to enter in all the coimmands per port I just apply one which is "macro apply users". I understand I can just copy and paste but I'm doing this for more of a management reason. What I'm wanting is if SwitchA has this macro and I'm logged into SwitchB I want to be able to call that macro so I can run it on SwitchB without having to create the macro on SwitchB manually.

@eeRoot

I kind of figured that, but was hoping someone knew something I didn't if you don't mind I'm going to leave this post up for a little longer to see if anyone might have an idea we didn't think of :) But in the end you just might be right lol..
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 2

Author Closing Comment

by:Paktusjet
ID: 36948272
I wish this wasn't true :) would be a big help if it was allowed lol. Thanks for the help guys :)
0
 
LVL 2

Author Comment

by:Paktusjet
ID: 36948282
I wanted to split the points guys, give me a bit to fix it. sorry
0
 
LVL 2

Author Comment

by:Paktusjet
ID: 36948291
anyone know how :)
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Let’s list some of the technologies that enable smooth teleworking. 
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now