Solved

Cisco managed to unmanaged

Posted on 2016-08-04
5
45 Views
Last Modified: 2016-08-05
is it possible to turn a managed Cisco switch to unmanaged?  ours are WS-C2970G-24TS-E.
0
Comment
Question by:GalaxyTechService
5 Comments
 
LVL 57

Expert Comment

by:giltjr
ID: 41743304
Why would you want to do this?

Not really.  I mean you could always change the passwords by closing your eyes and then typing in something random so you have no clue what it is.  Then in order to do anything to it, you would need to use the password recovery steps.
1
 

Author Comment

by:GalaxyTechService
ID: 41743308
our client is under the impression that all of there managed switches were at one point unmanaged.  if a switch failed they could just replace it with another one and not load any configurations in to it.
0
 
LVL 5

Accepted Solution

by:
foochar earned 500 total points
ID: 41743361
The cisco managed switches I'm familiar with will all "work" out of the box without any configuration, although I've not used the 2970 series switches.  That being said you won't have access to any of the "advanced" features that you normally would be using these switches for such as vLANs (all traffic will default to VLAN1).
0
 
LVL 57

Expert Comment

by:giltjr
ID: 41743386
foochar is correct.  If you put no configuration on the switch at all, they are "plug and play."

However, if you are not going to use any of the extra features that a managed switch gets you, then save money and by unmanged switches.

However with unmanged switches you loose things.  In addition to no VLANs, you also can't monitor for port traffic utilization, you can't mirror ports for sniffing traffic, no Etherchannels to add bandwidth between switches, and probably a few other things.
1
 
LVL 50

Expert Comment

by:Don Johnston
ID: 41743754
And another big difference in unmanaged switches is no spanning-tree.  So loops can create... interesting events.
1

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Creating an OSPF network that automatically (dynamically) reroutes network traffic over other connections to prevent network downtime.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now