Solved

VLAN - Created a new vlan but not showing in "Show VLans"

Posted on 2013-11-24
2
300 Views
Last Modified: 2013-11-24
I created the following vlan on one of my cisco WS-C6504-E switches.

 
interface Vlan352
description SecurInfra
ip address 10.14.36.2 255.255.255.0
ip helper-address 172.17.40.40
ip flow ingress
ip flow egress


 
When i do a no shutdown and type "show vlan" to see the list, it is not listed?
This switch is in VTP server mode, so i was able to create it no problem.
am i over looking something?

 
Thanks
0
Comment
Question by:Gamehendge
2 Comments
 
LVL 31

Accepted Solution

by:
Gareth Gudger earned 500 total points
ID: 39673663
You also need to do "Vlan352" from the CLI. Then it should show up with a Show VLANs. It's because its not in the VLAN database yet.
0
 

Author Closing Comment

by:Gamehendge
ID: 39673684
Thanks , I created this at L3 but not L2.  That is why it didnt show up on the Show Vlans output.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Tagging ports on a managed switch 6 59
Read-only SNMP string example ? 7 91
Switch Migration 8 51
HP Procurve and AAA authentication 2 29
Broadband over Power Lines Broadband over Power Lines is the technology of transmitting computer data through power lines. This method of connectivity allows the user to have access to the internet without having to rely on additional cables, suc…
I eventually solved a perplexing problem setting up telnet for a new switch.  I installed a new Cisco WS-03560X-24P switch connected to an existing Cisco 4506 running a WS-X4013-10GE Sup II-Plus. After configuring vlans and trunking,  I could no…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

823 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question