Solved

PBR on Cisco Switch 3750

Posted on 2013-02-07
2
615 Views
Last Modified: 2013-02-07
Hello Guys,

I am trying to run "ip policy" syntax on a Cisco Switch 3750 but it seems my switch doesnt have that command.

I have researched and found that I needed to change switch image and layout. Both things are done,

System image file is "flash:c3750-ipservicesk9-mz.122-25.SEB4.bin"

 The current template is "desktop routing" template.

But I still dont see "policy" option under ip command inside interface.

br-spo-mtx-acc12(config-if)#ip ?
Interface IP configuration subcommands:
  access-group  Specify access control for packets
  arp           Configure ARP features
  dhcp          DHCP
  igmp          IGMP interface commands
  verify        verify

Any ideas ?
0
Comment
Question by:maxihost
2 Comments
 
LVL 6

Accepted Solution

by:
RustyZ32 earned 500 total points
ID: 38865575
you need the advanced services image, your image is layer2 only, you need layer3 for PBR.
0
 
LVL 24

Expert Comment

by:Ken Boone
ID: 38865587
After you changed the switch to have the routing sum i.e.
sdm prefer routing

Did you reboot the switch?

It is required.  

Issue a show sdm prefer command and look at the option titled:

number of policy based routing aces

Once you reboot it should not be 0.
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Network Switches Keep Failing 8 89
Switch ports not working 8 35
How difficult is it to migrate from Cisco ACS to Cisco ISE? 2 21
Public IP Address - Subnet 4 18
Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question