- Cisco Network Assistant
- Features and Capabilities
- Cisco Network Assistant facilitates:
- Specifications at a Glance
- Cut Costs, Improve Efficiency
- Cna windows k9 installer
- Installing Network Assistant
- Starting Network Assistant
- Connecting to Network Assistant
- Event Notification
- Release Notes for Cisco Network Assistant 6.0 and Later
- Available Languages
- Download Options
- Table of Contents
- Release Notes for Cisco Network Assistant 6.0 and Later Releases
- Contents
- New Features
- System Requirements
- Installation Requirements
- Devices Supported
- Access Points
- Firewalls
- Legacy Devices
- Cluster Compatibility
- Downloading Network Assistant
- Updating Network Assistant
- Upgrading a Switch by Using Network Assistant
- Minimum Cisco IOS Release Supported by Network Assistant
- Limitations and Restrictions
- Cluster Limitations and Restrictions
- Network Assistant Limitations and Restrictions
- Cisco Catalyst 4500 Series Switches
- Community Limitations
- Cluster Limitations
- Community and Cluster Limitations
- Important Notes
- Switches Running in VSS
- Installation Notes
- Compatibility with Cisco IOS
- Cisco IOS Notes
- Community Notes
- Cluster Notes
- Network Assistant Notes
- Open Caveats
- Resolved Caveats
- Obtaining Documentation and Submitting a Service Request
- Related Documentation
Cisco Network Assistant
Cisco Network Assistant simplifies wired and wireless network management for networks up to 80 devices with its intuitive GUI and a task-based menu. Cisco Network Assistant is free and is optimized to apply common services across Cisco switches, routers, wireless controllers, and access points. Through a direct link to Cisco Active Advisor you can view important information pertaining to the products on your network, such as Warranty and Contract Information, Advisories and End of Life notifications. Cisco Active Advisor will be automatically populated with the devices managed through Cisco Network Assistant.
Features and Capabilities
Network administrators get a centralized view of the network with Cisco Network Assistant. They also have the flexibility to employ its features across Cisco products for small to midsize businesses or branch offices.Download Cisco Network Assistant Software for free.
Cisco Network Assistant facilitates:
- Network discovery and convenient display in a topology map
- Configuration management of Cisco products fitting small and medium businesses
- Single-click Telnet or access to device manager
- Front panel view of devices, clusters and stacks
- Inventory reports and health monitoring
- Troubleshooting of common network issues
- Event notification of network errors and alarm thresholds
- Drag-and-drop Software upgrades saves time in maintaining your network
- Direct access to lifecycle information using Cisco Active Advisor
Specifications at a Glance
Description | Requirements |
---|---|
Operating system | Windows 2000 Professional (SP4), Windows 2003 Server, Windows XP Professional (SP2), Windows Vista Ultimate, Windows 2000 Professional (SP3+), Windows XP Professional (SP1+), Macintosh OS Xt |
Disk space | 50 MB hard drive |
Hardware | PC with 1 GHz processor |
Memory | 1 GB DRAM |
Cut Costs, Improve Efficiency
See how Cisco Network Assistant can save you time and money by simplifying network activities.
Cna windows k9 installer
This chapter describes how to install Cisco Network Assistant and how to connect it to a device or an existing community.
For information about the requirements needed to install Network Assistant, see the Release Notes at: :http://www.cisco.com/en/US/products/ps5931/prod_release_notes_list.html
Installing Network Assistant
To install Network Assistant on your PC, follow these steps:
1. Go to this web address: http://www.cisco.com/go/NetworkAssistant .
You must be a registered Cisco.com user to access this site. You do not need any other access privileges.
2. Find the Network Assistant installer file, cna-windows-k9-installer-5-0-en.exe.
3. Download the Network Assistant installer, and run it. (You can run it directly from the web if your browser offers this choice.)
When you run the installer, follow the displayed instructions. In the final panel, click Finish to complete the Network Assistant installation.
Note Network Assistant is free. There is no charge to download, install, or use it.
Starting Network Assistant
After you install Network Assistant, you will see its icon on your desktop, a Network Assistant shortcut under the Start menu, and a Network Assistant entry under Start > Programs . When you click any of these, you see a partial Network Assistant GUI and the Connect window.
In disconnect mode, Network Assistant is not connected to a device or a community; it cannot manage a standalone device, a community, or the command device of a cluster. Its menu bar and toolbar support only the tasks that customize Network Assistant itself. The feature bar, which usually lists device features, is empty.
Connecting to Network Assistant
Use the Connect window in Network Assistant to connect to a community or cluster. Figure 3-1.shows the Connect window.
To connect Network Assistant to a device:
Step 1 From the Connect window, enter the IP address of the device.
•For an existing community, select its name from the pull-down menu. For an existing cluster, select the IP address.
When you select a community, you can also set the access mode and access level. If you do not set the access mode before connecting to the community, Network Assistant applies the read/write access mode to all the devices in the community.
•For HTTP and Access Mode options, click the Option s button.
–In the HTTP protocol field, select HTTP or HTTPS. To communicate with a clusterered or a standalone device, use HTTPS (secure HTTP) instead of HTTP.
–Select an HTTP port. Use an HTTP port other than 80 on cluster command devices or standalone devices.
–Select an access mode. Read-only access mode is the default.
–Click OK to return to the Connect Window.
•You can also use this window to connect to a new community. For instructions on how to use the Connect to a new community option to create a community, see the «Creating a Community» section.
Note For information about using the HTTPS and HTTP options in a community, see the «Communication Protocols» section.
Because Catalyst 4500 series switches ship with HTTP and HTTPS disabled by default, you must enable them as needed. HTTPS v3.0 is supported in Cisco IOS 12.2(25)SG cryptographic versions and later.
Figure 3-1 Connect Window
Step 2 Click Connect .
When you click Connect , you are either connected to the community directly, or you are prompted for a username and password and then connected. When you connect to a cluster, Network Assistant asks if you want to convert the cluster to a community. For more information on converting a cluster to a community, see the «Converting a Cluster to a Community» section.
When the connection occurs, the Network Assistant window is in connect mode. The toolbar adds icons that represent device features. Similarly, the feature bar fills with menus that list the device features that Network Assistant manages.
Event Notification
Network Assistant informs you of events that it detects by putting an event icon on the status bar and under devices in the Topology view. Clicking an event icon opens a window that describes the event and, whenever possible, connects you to the windows where you can take the needed actions.
Release Notes for Cisco Network Assistant 6.0 and Later
Available Languages
Download Options
Table of Contents
Release Notes for Cisco Network Assistant 6.0 and Later Releases
These release notes include important information about Cisco Network Assistant 6.0 and later releases, and any limitations, restrictions, and caveats that apply to the releases.
Contents
This information is in the release notes:
New Features
With Cisco Network Assistant 6.3, you can manage these devices:
- Cisco Catalyst 2960 switches
– WS-C2960R+24PC
– WS-C2960R+24TC
– WS-C2960R+48TC
– WS-C2960R+48PST
– WS-C2960RX-24PS
– WS-C2960RX-24TS
– WS-C2960RX-48TS
– WS-C2960RX-48FPD
– WS-C2960RX-48FPS
– WS-C2960RX-48LPD
– WS-C2960RX-48LPS
- Cisco Catalyst 3850 switches
– WS-C3850-24S-S
– WS-C3850-24S-E
– WS-C3850-12XS
– WS-C3850-24XS
– WS-C3850R-24T
– WS-C3850R-48P
– WS-C3850R-48T
– WS-C3850R-48U
- Cisco IE 5000 switches
– IE-5000-12S12P-10G
– IE-5000-16S12P
- Cisco 800M Integrated Services Routers
– C841M-4X-JAIS/K9
– C841M-4X-JSEC/K9
– C841M-8X-JAIS/K9
– C841M-4X/K9
- Cisco Aironet 1700 Series Access Point
– AIR-CAP1702I-x-K9
Cisco Network Assistant 6.3 also includes the following enhancements:
- Support for Cisco IOS XE Denali 16.1.x. on Cisco Catalyst 3850 Series Switches and Cisco Catalyst 3650 Series Switches
- Integration of upgrade process with Automated Software Distribution (ASD)
- Support for Japanese version of Cisco Network Assistant
With Cisco Network Assistant 6.2, you can manage these devices:
- Cisco Catalyst 3560-CX switches
– WS-C3560CX-8PC-S
– WS-C3560CX-8TC-S
– WS-C3560CX-12PC-S
– WS-C3560CX-12PD-S
– WS-C3560CX-12TC-S
- Cisco Catalyst 2960-CX switches
– WS-C2960CX-8PC-L
– WS-C2960CX-8TC-L
- Stratix 5400 Ethernet Managed switches
– 1783-HMS4C4CGN
– 1783-HMS8T4CGN
– 1783-HMS8S4CGN
– 1783-HMS4T4E4CGN
– 1783-HMS16T4CGN
– 1783-HMS4S8E4CGN
– 1783-HMS8TG4CGN
– 1783-HMS8SG4CGN
– 1783-HMS4EG8CGN
– 1783-HMS16TG4CGN
– 1783-HMS8TG8EG4CGN
– 1783-HMS4SG8EG4CGN
– 1783-HMS8TG4CGR
– 1783-HMS8SG4CGR
– 1783-HMS4EG8CGR
– 1783-HMS16TG4CGR
– 1783-HMS8TG8EG4CGR
– 1783-HMS4SG8EG4CGR
- Stratix 5410 Ethernet Managed switches
– 1783-IMS28NDC
– 1783-IMS28NAC
– 1783-IMS28RDC
– 1783-IMS28RAC
- Cisco IE 4000 switches
– IE-4000-4TC4G-E
– IE-4000-8T4G-E
– IE-4000-8S4G-E
– IE-4000-4T4P4G-E
– IE-4000-16T4G-E
– IE-4000-4S8P4G-E
– IE-4000-8GT4G-E
– IE-4000-8GS4G-E
– IE-4000-4GC4GP4G-E
– IE-4000-16GT4G-E
– IE-4000-8GT8GP4G-E
– IE-4000-4GS8GP4G-E
With Cisco Network Assistant 6.1.0, you can manage these devices:
- Cisco Catalyst 3650 switches
– WS-C3650-24PS-E, WS-C3650-24PS-L, WS-C3650-24PS-S
– WS-C3650-24TS-E, WS-C3650-24TS-L, WS-C3650-24TS-S
– WS-C3650-48FS-E, WS-C3650-48FS-L, WS-C3650-48FS-S
– WS-C3650-48PS-E, WS-C3650-48PS-L, WS-C3650-48PS-S
– WS-C3650-48TS-E, WS-C3650-48TS-L, WS-C3650-48TS-S
– WS-C3650-24PD-E, WS-C3650-24PD-L, WS-C3650-24PD-S
– WS-C3650-24TD-E, WS-C3650-24TD-L, WS-C3650-24TD-S
– WS-C3650-48FD-E, WS-C3650-48FD-L, WS-C3650-48FD-S
– WS-C3650-48PD-E, WS-C3650-48PD-L, WS-C3650-48PD-S
– WS-C3650-48TD-E, WS-C3650-48TD-L, WS-C3650-48TD-S
– WS-C3650-48FQ-E, WS-C3650-48FQ-L, WS-C3650-48FQ-S
– WS-C3650-48PQ-E, WS-C3650-48PQ-L, WS-C3650-48PQ-S
– WS-C3650-48TQ-E, WS-C3650-48TQ-L, WS-C3650-48TQ-S
- Cisco Small Business 500 Series Managed switches
– SF500-24, SF500-24P, SF500-48, SF500-48P
– SG500-28, SG500-28P, SG500-28MPP, SG500-52, SG500-52P, SG500-52MP, SG500X-24, SG500X-24P, SG500X-48
– SG500X-48P, SG500XG
- Cisco Small Business 300 Series Managed switches
– SF300-08, SF302-08, SF302-08MP, SF302-08P, SF302-08PP, SF302-08MPP, SF300-24, SF300-24P, SF300-24MP
– SF300-24PP, SF300-48, SF300-48P, SF300-48PP
– SG300-10, SG300-10MP, SG300-10MPP, SG300-10SFP, SG300-10P, SG300-10PP, SG300-20, SG300-28, SG300-28P
– SG300-28PP, SG300-28MP, SG300-52, SG300-52P, SG300-52MP
- Cisco Small Business 200 Series Managed switches
– SF200-24, SF200-24P, SF200-24FP, SF200-48, SF200-48P
– SG200-08, SG200-08P, SG200-10FP, SG200-18SG200-26,SG200-26P,SG200-26FP, SG200-50, SG200-50P, SG200-50FP
With Cisco Network Assistant 6.0, you can manage these devices:
- Cisco Catalyst 2960-Plus switches
– WS-C2960+24PC-L
– WS-C2960+24LC-L
– WS-C2960+48TC-L
– WS-C2960+24TC-L
– WS-C2960+48PST-S
– WS-C2960+24PC-S
– WS-C2960+24LC-S
– WS-C2960+48TC-S
– WS-C2960+24TC-S
- Cisco 3700 Access Point Series
– AIR-CAP3702I-X-K9
– AIR-CAP3702E-X-K9
– AIR-CAP3702P-X-K9
- Cisco 2700 Access Point Series
– AIR-CAP2702I-A-K9
– AIR-CAP2702E-A-K9
- Cisco 1500 Access Point Series
– AIR-CAP1532I-A-K9, AIR-CAP1532E-A-K9
– AIR-CAP1532I-C-K9, AIR-CAP1532E-C-K9
– AIR-CAP1532I-D-K9, AIR-CAP1532E-D-K9
– AIR-CAP1532I-E-K9, AIR-CAP1532E-E-K9
– AIR-CAP1532I-F-K9, AIR-CAP1532E-F-K9
– AIR-CAP1532I-H-K9, AIR-CAP1532E-H-K9
– AIR-CAP1532I-K-K9, AIR-CAP1532E-K-K9
– AIR-CAP1532I-M-K9, AIR-CAP1532E-M-K9
– AIR-CAP1532I-N-K9, AIR-CAP1532E-N-K9
– AIR-CAP1532I-Q-K9, AIR-CAP1532E-Q-K9
– AIR-CAP1532I-R-K9, AIR-CAP1532E-R-K9
– AIR-CAP1532I-S-K9, AIR-CAP1532E-S-K9
– AIR-CAP1532I-T-K9, AIR-CAP1532E-T-K9
– AIR-CAP1532I-Z-K9, AIR-CAP1532E-Z-K9
CNA 6.0 also includes these enhancements:
- Multiple credentials can be entered at one single popup window to avoid multiple authentication popup windows while creating a community.
- Enhanced SSID creation for multiple access points using the Wireless Quick Start menu.
- Performance improvement in configuring various wireless parameters for multiple autonomous Access Points.
- Cisco logo in the menu bar to launch the Cisco.com website.
- New feedback button for sending feedback to the CNA alias.
System Requirements
The system requirements are described in these sections:
Installation Requirements
The PC on which you install Network Assistant must meet these minimum hardware requirements:
- Processor speed: 1 GHz
- DRAM: 1 GB
- Hard-disk space: 50 MB
- Number of colors: 65536
- Resolution: 1024 x 768
- Font size: small
These operating systems support Network Assistant:
- Windows 7 Enterprise (64-bit and 32-bit)
- Windows 7 Professional (32-bit)
- Windows 8 Professional (32-bit)
- Windows Vista (64-bit and 32-bit)
- Windows XP Professional, Service Pack 3 (64-bit and 32-bit)
- Windows 2008 (64-bit and 32-bit)
- Windows 2003 Server (64-bit and 32-bit)
- Macintosh OS X
Note To run Network Assistant on MAC OS X (10.7 Lion and above), follow these steps:
— From the System Preferences window, select Security and Privacy.
— From the Security and Privacy window, select the General tab and click Anywhere.
Devices Supported
Table 1 lists the devices that Network Assistant supports. It supports the Cisco Catalyst Express 500 devices only as community members; these devices cannot be cluster members.
Table 1 Devices Supported
8 10/100/1000 Power over Ethernet plus (PoE+) ports (PoE budget of 240 W); 2 Gigabit Ethernet and 2 small form-factor pluggable (SFP) module uplink slots.
8 10/100/1000 Ethernet ports; 2 Gigabit Ethernet and 2 small form-factor pluggable (SFP) module uplink slots.
12 10/100/1000 PoE+ ports (PoE budget of 240 W); 2 Gigabit Ethernet and 2 SFP module uplink slots.
12 10/100/1000 PoE+ ports (PoE budget of 240 W); 2 Gigabit Ethernet and 2 SFP+ module uplink slots.
12 10/100/1000 Ethernet ports; 2 Gigabit Ethernet and 2 SFP module uplink slots.
Standalone with Optional Stacking 24 10/100/1000 Ethernet and 4x1G Uplink ports, with 250WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet and 4x1G Uplink ports, with 250WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet PoE+ and 4x1G Uplink ports, with 640WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x1G Uplink ports, with 640WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x1G Uplink ports, with 1025WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet and 4x1G Uplink ports, with 250WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet and 4x1G Uplink ports, with 250WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet PoE+ and 4x1G Uplink ports, with 640WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x1G Uplink ports, with 640WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x1G Uplink ports, with 1025WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet and 4x1G Uplink ports, with 250WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet and 4x1G Uplink ports, with 250WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet PoE+ and 4x1G Uplink ports, with 640WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x1G Uplink ports, with 640WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x1G Uplink ports, with 1025WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet and 2x10G Uplink ports, with 250WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet and 2x10G Uplink ports, with 250WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet PoE+ and 2x10G Uplink ports, with 640WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 2x10G Uplink ports, with 640WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 2x10G Uplink ports, with 1025WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet and 2x10G Uplink ports, with 250WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet and 2x10G Uplink ports, with 250WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet PoE+ and 2x10G Uplink ports, with 640WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 2x10G Uplink ports, with 640WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 2x10G Uplink ports, with 1025WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet and 2x10G Uplink ports, with 250WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet and 2x10G Uplink ports, with 250WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 24 10/100/1000 Ethernet PoE+ and 2x10G Uplink ports, with 640WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 2x10G Uplink ports, with 640WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 2x10G Uplink ports, with 1025WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet and 4x10G Uplink ports, with 250WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x10G Uplink ports, with 640WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x10G Uplink ports, with 1025WAC power supply, 1 RU, LAN Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet and 4x10G Uplink ports, with 250WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x10G Uplink ports, with 640WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x10G Uplink ports, with 1025WAC power supply, 1 RU, IP Base feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet and 4x10G Uplink ports, with 250WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x10G Uplink ports, with 640WAC power supply, 1 RU, IP Services feature set
Standalone with Optional Stacking 48 10/100/1000 Ethernet PoE+ and 4x10G Uplink ports, with 1025WAC power supply, 1 RU, IP Services feature set
Stackable 24 SFP module slots, 1 network module slot, 350 W power supply, IP Base feature set
Stackable 24 SFP module slots, 1 network module slot, 350 W power supply, IP Services feature set
Cisco Catalyst 3850-24T-L
Stackable 24 10/100/1000 Ethernet ports,
1 network module slot, 350-W power supply
Cisco Catalyst 3850-48T-L
Stackable 48 10/100/1000 Ethernet ports,
1 network module slot 350-W power supply
Cisco Catalyst 3850-24P-L
Stackable 24 10/100/1000 PoE+ ports,
1 network module slot, 715-W power supply
Cisco Catalyst 3850-48P-L
Stackable 48 10/100/1000 PoE+ ports,
1 network module slot, 715-W power supply
Cisco Catalyst 3850-48F-L
Stackable 48 10/100/1000 full PoE ports,
1 network module slot, 1100-W power supply
Cisco Catalyst 3850-24T-S
Stackable 24 10/100/1000 Ethernet ports,
1 network module slot, 350-W power supply
Cisco Catalyst 3850-48T-S
Stackable 48 10/100/1000 Ethernet ports,
1 network module slot, 350-W power supply
Cisco Catalyst 3850-24P-S
Stackable 24 10/100/1000 PoE+ ports,
1 network module slot, 715-W power supply
Cisco Catalyst 3850-48P-S
Stackable 48 10/100/1000 PoE+ ports,
1 network module slot, 715-W power supply
Cisco Catalyst 3850-48F-S
Stackable 48 10/100/1000 full PoE ports,
1 network module slot, 1100-W power supply
Cisco Catalyst 3850-24T-E
Stackable 24 10/100/1000 Ethernet ports,
1 network module slot, 350-W power supply
Cisco Catalyst 3850-48T-E
Stackable 48 10/100/1000 Ethernet ports,
1 network module slot, 350-W power supply
Cisco Catalyst 3850-24P-E
Stackable 24 10/100/1000 PoE+ ports,
1 network module slot, 715-W power supply
Stackable 48 10/100/1000 PoE+ ports,
1 network module slot, 715-W power supply
Cisco Catalyst 3850-48F-E
Stackable 48 10/100/1000 full PoE ports,
1 network module slot, 1100-W power supply
Cisco Catalyst 3850-12XS
Stackable 12 SFP+ module slots,
1 network module slot, 350 W power supply
Cisco Catalyst 3850-24XS
Stackable 24 SFP+ module slots,
1 network module slot, 715 W power supply
24 100BASE-FX and 2 SFP module slots
24 10/100 Ethernet ports and 2 SFP module slots
48 10/100 Ethernet ports and 4 SFP module slots
24 10/100/1000 Ethernet ports
24 10/100/1000 Ethernet ports and 4 SFP module slots
24 10/100 PoE ports and 2 SFP module slots
48 10/100 PoE ports and 4 SFP module slots
16 10/100/100 Ethernet ports and 1 10-Gigabit SFP slot
24 10/100/100 PoE ports, 2 SFP module slots, and an integrated wireless controller for up to 12 access points
24 10/100/100 PoE ports, 2 SFP module slots, and an integrated wireless controller for up to 24 access points
48 10/100/100 PoE ports and 4 SFP module slots
48 10/100/100 Ethernet ports and 4 SFP module slots
24 10/100/100 PoE ports and 4 SFP module slots
24 10/100/100 Ethernet ports and 4 SFP module slots
24 10/100/1000 Ethernet ports and 2 10-Gigabit Ethernet module slots
48 10/100/1000 Ethernet ports and 2 10-Gigabit Ethernet module slots
24 10/100/1000 PoE ports and 2 10-Gigabit Ethernet module slots
WS-C3750E-48PD
WS-C3750E-48PD (Full Power)
48 10/100/1000 PoE ports (370 W) and 2 10-Gigabit Ethernet module slots
48 10/100/1000 PoE ports (740 W) and 2 10-Gigabit Ethernet module slots
24 SFP module slots (downlink) and 2 SFP module slots (uplink)
24 10/100 PoE ports and 2 SFP module slots
24 10/100 ports and 2 SFP module slots
48 10/100 PoE ports and 2 SFP module slots
48 10/100 ports and 2 SFP module slots
24 10/100/1000 Ethernet ports (350 W), StackWise Plus, and 1 network module slot
48 10/100/1000 Ethernet ports (350 W), StackWise Plus, and 1 network module slot
24 10/100/1000 PoE+ ports (715 W), StackWise Plus, and 1 network module slot
48 10/100/1000 PoE+ ports (715 W), StackWise Plus, and 1 network module slot
12 SFP module slots, StackWise Plus, StackPower, 1 network module slot, 350 W power supply
24 SFP module slots, StackWise Plus, StackPower, 1 network module slot, 350 W power supply
48 10/100/1000 PoE+ ports (1104 W), StackWise Plus, and 1 network module slot
24 10/100/1000 Ethernet ports (350 W), StackWise Plus, StackPower, and 1 network module slot
48 10/100/1000 Ethernet ports (350 W), StackWise Plus, StackPower, and 1 network module slot
24 10/100/1000 PoE+ ports (715 W), StackWise Plus, StackPower, and 1 network module slot
48 10/100/1000 PoE+ ports (715 W), StackWise Plus, StackPower, and 1 network module slot
48 10/100/1000 PoE+ ports (1100 W), StackWise Plus, StackPower, and 1 network module slot
12 SFP module slots (350 W), StackWise Plus, StackPower, and 1 network module slot
24 SFP module slots (350 W), StackWise Plus, StackPower, and 1 network module slot
24 10/100/1000 Ethernet ports (350 W), StackWise Plus, StackPower, 1 network module slot
48 10/100/1000 Ethernet ports (350 W), StackWise Plus, StackPower, 1 network module slot
24 10/100/1000 PoE+ ports (715 W), StackWise Plus, StackPower, 1 network module slot
48 10/100/1000 PoE+ ports (715 W), StackWise Plus, StackPower, 1 network module slot
48 10/100/1000 PoE+ ports (1100W), StackWise Plus, StackPower, 1 network module slot
8 10/100/1000 PoE+ ports and 2 dual-purpose uplink ports
8 10/100/1000 ports and 2 dual-purpose uplink ports
8 10/100/1000 PoE ports and 2 10/100/1000BASE-T PD uplink copper ports
12 10/100 PoE+ ports and 2 dual-purpose ports
8 10/100 PoE+ ports and 2 dual-purpose ports
8 10/100 PoE ports and 1 dual-purpose port
24 10/100 ports and 2 SFP module slots
48 10/100 ports and 4 SFP module slots
48 10/100 PoE ports and 4 SFP module slots
10-Gigabit Ethernet X2 module slots
12 SFP module slots, 2 10-Gigabit Ethernet X2 module slots and IP services software
feature set (IPS)
12 SFP module slots, 2 10-Gigabit Ethernet X2 module slots and IP base software
feature set (IPB)
24 10/100 PoE ports and 2 SFP module slots
48 10/100/100 PoE ports and 4 SFP module slots
48 10/100/100 Ethernet ports and 4 SFP module slots
24 10/100/100 PoE ports and 4 SFP module slots
24 10/100/100 Ethernet ports and 4 SFP module slots
24 10/100/1000 Ethernet ports and 2 10-Gigabit Ethernet module slots
48 10/100/1000 Ethernet ports and 2 10-Gigabit Ethernet module slots
24 10/100/1000 PoE ports and 2 10-Gigabit Ethernet module slots
WS-C3560E-48PD
WS-C3560E-48PD (Full Power)
48 10/100/1000 PoE ports (370 W) and 2 10-Gigabit Ethernet module slots
48 10/100/1000 PoE ports (740 W) and 2 10-Gigabit Ethernet module slots
12 10/100 PoE ports and 1 dual-purpose port
24 10/100 PoE ports and 2 SFP module slots
24 10/100 ports and 2 SFP module slots
48 10/100 PoE ports and 2 SFP module slots
48 10/100 ports and 2 SFP module slots
24 10/100 ports and 2 SFP module slots
24 10/100/1000 Ethernet ports (350 W) and 1 network module slot
48 10/100/1000 Ethernet ports (350 W) and 1 network module slot
24 10/100/1000 PoE+ ports (715 W) and 1 network module slot
48 10/100/1000 PoE+ ports (715 W) and 1 network module slot
48 10/100/1000 PoE+ ports (1100 W) and 1 network module slot
24 10/100/1000 Ethernet ports (350 W) and 1 network module slot
48 10/100/1000 Ethernet ports (350 W) and 1 network module slot
24 10/100/1000 PoE+ ports (715 W) and 1 network module slot
48 10/100/1000 PoE+ ports (715 W) and 1 network module slot
48 10/100/1000 PoE+ ports (1100 W) and 1 network module slot
24 10/100/1000 Ethernet ports (350 W), 1 network module slot
48 10/100/1000 Ethernet ports (350 W), 1 network module slot
24 10/100/1000 PoE+ ports (715 W), 1 network module slot
48 10/100/1000 PoE+ ports (715 W), 1 network module slot
48 10/100/1000 PoE+ ports (1100 W), 1 network module slot
10 GBIC-based Ethernet port and 2 fixed 10/100/1000BASE-T ports
10 fixed 10/100/1000BASE-T and 2 GBIC-based Ethernet ports
24 Ethernet 10/100 ports and 2 GBIC-based Ethernet ports, DC powered
24 Ethernet 10/100 ports and 2 GBIC-based Ethernet ports
48 Ethernet 10/100 ports and 2 GBIC-based Ethernet ports
24 Ethernet 10/100 ports with integrated inline power and 2 GBIC-based Ethernet ports
24 100FX ports and 2 GBIC-based Ethernet ports
4 10/100BASE-T downlink ports and 2 10/100BASE-T uplink ports
4 10/100BASE-T downlink ports and 2 10/100BASE-T uplink ports
4 10/100BASE-T downlink ports and 2 10/100/1000BASE-T uplink ports
4 10/100BASE-T downlink ports and 2 10/100/1000BASE-T uplink ports
4 10/100BASE-T downlink ports and 2 100 Mb/s SFP module uplink slots
4 10/100BASE-T Ethernet ports and 2 100 Mb/s SFP module uplink slots
4 10/100BASE-T downlink ports and 2 100/1000 Mb/s SFP module uplink slots
4 10/100BASE-T downlink ports and 2 100/1000 Mb/s SFP module uplink slots
8 10/100BASE-T downlink ports and 2 Fast Ethernet dual-purpose uplink ports
8 10/100BASE-T downlink ports and 2 Fast Ethernet dual-purpose uplink ports
8 10/100BASE-T downlink ports and 2 Gigabit Ethernet dual-purpose uplink ports
8 10/100BASE-T downlink ports and 2 Gigabit Ethernet dual-purpose uplink ports
8 10/100BASE-T downlink ports and 2 Gigabit Ethernet dual-purpose uplink ports. Supports the IEEE-1588 standard for synchronizing clocks.
16 10/100BASE-T downlink ports, 2 Fast Ethernet dual-purpose uplink ports, and 2 100 Mb/s SFP module uplink slots
16 10/100BASE-T downlink ports, 2 Fast Ethernet dual-purpose uplink ports, and 2 100 Mb/s SFP module uplink slots.
16 10/100BASE-T downlink ports, 2 Gigabit Ethernet dual-purpose uplink ports, and 2 100 Mb/s SFP module uplink slots.
16 10/100BASE-T downlink ports, Gigabit Ethernet dual-purpose uplink ports, and 2 100 Mb/s SFP module uplink slots. Supports the IEEE-1588 standard for synchronizing clocks.
16 10/100BASE-T downlink ports, 2 Gigabit Ethernet uplink ports, and 2 100 Mb/s SFP
module uplink slots. Supports the IEEE-1588 standard for synchronizing clocks. With 1588 and conformal coat.
12 10/100BASE-T downlink ports, 2 Gigabit Ethernet dual-purpose uplink ports and 4 PoE ports. Supports the IEEE-1588 standard for synchronizing clocks. Can enable NAT by license upgrade.
12 10/100BASE-T downlink ports, 2 Gigabit Ethernet dual-purpose uplink ports, and 4 PoE ports.
12 10/100BASE-T downlink ports, 2 Gigabit Ethernet dual-purpose uplink ports, and 4 PoE ports.
16 10/100BASE-T downlink ports, 2 Gigabit Ethernet dual-purpose uplink ports.
Supports the IEEE-1588 standard for synchronizing clocks and Network Address Translation (NAT).
8 10/100BASE-T downlink ports, 2 Gigabit Ethernet dual-purpose uplink ports.
Supports the IEEE-1588 standard for synchronizing clocks and NAT.
4 10/100BASE-T Ethernet ports and 2 dual-purpose ports. Supports the IEEE-1588 standard for synchronizing clocks.
8 10/100BASE-T Ethernet ports and 2 dual-purpose ports. Supports the IEEE-1588 standard for synchronizing clocks.
Expansion module with 8 10/100BASE-T copper Ethernet ports.
Expansion module with 8 100BASE-FX optical Ethernet ports.
4 10/100BASE-T Ethernet ports and 2 dual-purpose ports (IP services software
feature set). Supports the IEEE-1588 standard for synchronizing clocks.
8 10/100BASE-T Ethernet ports and 2 dual-purpose ports (IP services software
feature set).
24 10/100 FastEthernet ports, 2 dual-purpose ports (2 10/100/1000BASE-T copper ports and 2 SFP module slots), and 2 AC and DC power-supply module slots.
16 100BASE-FX SFP-module slots; 8 10/100 FastEthernet PoE ports, 2 dual-purpose ports (2 10/100/1000BASE-T copper ports and 2 SFP module slots), and 2 AC and DC power-supply module slots.
4 FE Combo DL ports, 4 GE combo UL ports, w/FPGA
8 FE Copper DL ports, 4 GE combo UL ports, w/FPGA
8 FE Fiber DL ports, 4 GE combo UL ports, w/FPGA
4 FE Copper DL ports + 4 FE Copper DL ports with POE, 4 GE combo UL ports, w/FPGA
16 FE Copper DL ports, 4 GE combo UL ports, w/FPGA
4 FE Fiber DL ports + 8 FE Copper DL ports with POE, 4 GE combo UL ports, w/FPGA
8 GE Copper DL ports, 4 GE combo UL ports, w/FPGA
8 GE Fiber DL ports, 4 GE combo UL ports, w/FPGA
4 GE Combo DL ports + 4 GE Copper DL ports with POE, 4 GE combo UL ports, w/FPGA
16 GE Copper DL ports, 4 GE combo UL ports, w/FPGA
8 GE Copper DL ports + 8 GE Copper DL ports with POE, 4 GE combo UL ports, w/FPGA
4 GE Fiber DL ports + 8 GE Copper DL ports with POE, 4 GE combo UL ports, w/FPGA
12 (10/100/1000M) PoE/PoE+ ports, 12 SFP fiber ports, and four1G/10G SFP and SPF Plus optical ports
12 (10/100/1000M) PoE/PoE+ ports, 12 SFP fiber ports, and four1G SFP and SPF Plus optical ports
48 10/100/1000 PoE ports and 4 SFP module slots
24 Ethernet 10/100/1000 ports
24 Ethernet 10/100/1000 ports and 4 SFP module slots
8 10/100 Ethernet ports and 2 dual-purpose uplink ports (LAN base image)
8 10/100/1000 Ethernet ports and 2 dual-purpose ports
8 10/100 PoE ports and 2 10/100/1000BASE-T PD uplink copper ports
8 10/100 Ethernet ports and 2 10/100/1000BASE-T PD uplink copper ports
12 10/100 PoE ports and 2 dual-purpose ports
8 10/100 PoE ports and 2 dual-purpose ports
8 10/100 Ethernet ports and 2 dual-purpose ports
8 10/100/1000 PoE+ ports (PoE budget of 124 W); 2 Gigabit Ethernet and 2 SFP module uplink slots
8 10/100/1000 Ethernet ports; 2 Gigabit Ethernet and 2 SFP module uplink slots
24 Ethernet 10/100 ports and 2 dual-purpose ports (LAN base image)
48 Ethernet 10/100 ports and 2 dual-purpose ports (LAN base image)
24 Ethernet 10/100 ports and 2 10/100/1000 TX ports (LAN base image)
48 Ethernet 10/100 ports and 2 10/100/1000 TX ports (LAN base image)
20 Ethernet 10/100/1000 ports and 4 dual-purpose ports (LAN base image)
44 Ethernet 10/100/1000 ports and 4 dual-purpose ports (LAN base image)
24 Ethernet 10/100 ports and 2 dual-purpose ports (LAN lite image)
48 Ethernet 10/100 ports and 2 dual-purpose ports (LAN lite image)
24 Ethernet 10/100 ports (LAN lite image)
48 Ethernet 10/100 ports and 2 10/100/1000 ports (LAN lite image)
8 Ethernet 10/100 ports, 1 10/100/1000 ports (LAN lite image)
8 10/100 Ethernet ports and 1 dual-purpose port
7 10/100/1000 Ethernet ports and 1 dual-purpose port
24 10/100 ports PoE ports, 2 10/100/1000BASE-T copper ports and 2 SFP module slots
(LAN base image)
8 10/100 ports and 1 10/100/1000 port that receives power
24 10/100 ports (8 of which are PoE) and 2 10/100/1000 ports (LAN base image)
48 10/100 PoE ports, 2 10/100/1000 ports, and 2 SFP module slots (LAN lite image)
24 10/100 PoE ports and 2 dual-purpose ports (LAN lite image)
24 10/100 ports (8 of which are PoE) and 2 dual-purpose ports (LAN lite image)
48 10/100 PoE ports, 1 10/100/1000 ports and 2 SFP module slots (LAN Base image)
48 10/100/1000 PoE+ ports (PoE budget of 740 W) and 2 SFP+ module slots
48 10/100/1000 PoE+ ports (PoE budget of 370 W) and 2 SFP+ module slots
24 10/100/1000 PoE+ ports (PoE budget of 370 W) and 2 SFP+ module slots
48 10/100/1000 ports and 2 SFP+ module slots
24 10/100/1000 ports and 2 SFP+ module slots
48 10/100/1000 PoE+ ports (PoE budget of 740 W) and 4 SFP module slots
48 10/100/1000 PoE+ ports (PoE budget of 370 W) and 4 SFP module slots
24 10/100/1000 PoE+ ports (PoE budget of 370 W) and 4 SFP module slots
48 10/100/1000 ports and 4 SFP module slots
24 10/100/1000 ports and 4 SFP module slots
48 10/100/1000 ports and 2 SFP module slots
24 10/100/1000 ports and 2 SFP module slots
48 10/100 PoE+ ports (PoE budget of 740 W) and 4 SFP module slots
48 10/100 PoE+ ports (PoE budget of 370 W) and 4 SFP module slots
48 10/100 ports and 4 SFP module slots
24 10/100 PoE+ ports (PoE budget of 370 W) and 2 SFP module slots
24 10/100 ports and 2 SFP module slots
48 10/100 ports and 2 SFP module slots
24 10/100 ports and 2 SFP module slots
48 10/100BASE-TX PoE ports, 2 10/100/1000BASE-T copper ports, and
2 SFP module slots (LAN Base image)
24 10/100BASE-TX PoE ports and 2 dual-purpose ports (LAN Base image)
24 10/100BASE-TX ports (8 of which are PoE) and 2 dual-purpose ports (LAN Base image)
48 10/100BASE-TX Ethernet ports and 2 dual-purpose ports (LAN Base image)
24 10/100BASE-TX Ethernet ports and 2 dual-purpose ports (LAN Base image)
48 10/100B SE-TX PoE ports, 2 10/100/1000 ports, and 2 SFP module slots (LAN Lite image)
24 10/100BASE-TX PoE ports and 2 dual-purpose ports (LAN Lite image)
24 10/100BASE-TX ports (8 of which are PoE) and 2 dual-purpose ports, (LAN Lite image)
48 10/100BASE-TX Ethernet ports and 2 dual-purpose ports (no RPS port), (LAN Lite image)
24 10/100BASE-TX Ethernet ports and 2 dual-purpose ports (no RPS port) (LAN Lite image)
48 10/100/1000 PoE+ ports (PoE budget of 740 W) 2 SFP+ module slots, 1025-W power supply.
48 10/100/1000 PoE+ ports (PoE budget of 370 W) 2 SFP+ module slots, 640-W power supply.
48 10/100/1000 PoE+ ports (PoE budget of 370 W) and 4 SFP module slots, 640-W power supply.
48 10/100/1000 PoE+ ports (PoE budget of 740 W) and 4 SFP module slots, 1025-W power supply.
48 10/100/1000 and 4 SFPmodule slots, 250-Wpower supply.
48 10/100/1000 and 2 SFP+ module slots, 250-W power supply.
24 10/100/1000 PoE+ ports (PoE budget of 370 W) 2 SFP+ module slots, 640-W power supply.
24 10/100/1000 and 4 SFPmodule slots, 250-Wpower supply.
24 10/100/1000 PoE+ ports (PoE budget of 370 W) and 4 SFP module slots, 640-W power supply.
24 10/100/1000 and 2 SFP+ module slots, 250-W power supply.
48 10/100/1000 Power over Ethernet Plus (PoE+) ports (PoE budget of 740 W) and 2 small form-factor pluggable (SFP)+ module slots.
48 10/100/1000 PoE+ ports (PoE budget of 370 W) and 2 SFP+ module slots.
24 10/100/1000 PoE+ ports (PoE budget of 370 W) and 2 SFP+ module slots.
48 10/100/1000 ports and 2 SFP+ module slots.
24 10/100/1000 ports and 2 SFP+ module slots.
48 10/100/1000 PoE+ ports (PoE budget of 740 W) and 4 SFP module slots.
48 10/100/1000 PoE+ ports (PoE budget of 370 W) and 4 SFP module slots.
24 10/100/1000 PoE+ ports (PoE budget of 370 W) and 4 SFP module slots.
Cisco Catalyst 2960-X Non-Stackable, fanless, 24 10/100/1000 Ethernet ports, including 8 POE ports (PoE budget of 110 W), two copper module slots, and two SFP module slots.
48 10/100/1000 ports and 4 SFP module slots.
24 10/100/1000 ports and 4 SFP module slots.
48 10/100/1000 ports and 2 SFP module slots.
24 10/100/1000 ports and 2 SFP module slots.
12 Ethernet 10/100 ports and 2 fixed 10/100/1000BASE-T ports
12 Ethernet 10/100 ports and 2 fixed 100BASE-FX ports
12 Ethernet 10/100 ports and 2 fixed 1000BASE-LX ports
12 Ethernet 10/100 ports (SI)
24 Ethernet 10/100 ports (SI)
24 Ethernet 10/100 ports and 2 fixed 100BASE-FX ports (EI)
12 Ethernet 10/100 ports and 2 GBIC-based Gigabit Ethernet ports (EI)
24 Ethernet 10/100 ports and 2 GBIC-based Gigabit Ethernet ports (EI)
48 Ethernet 10/100 ports and 2 GBIC-based Gigabit Ethernet ports (EI)
24 Ethernet 10/100 ports and 2 GBIC-based Gigabit Ethernet ports, DC powered (EI)
24 Ethernet 10/100 ports and 2 fixed 1000BASE-SX ports (SI)
48 Ethernet 10/100 ports and 2 fixed 1000BASE-SX ports (SI)
24 Ethernet 10/100 ports and 2 fixed 10/100/1000BASE-T ports (EI)
48 Ethernet 10/100 ports and 2 fixed 10/100/1000BASE-T ports (EI)
8 LRE ports, 2 10/100/1000 ports, and 2 SFP module slots
24 LRE ports, 2 10/100/1000 ports, and 2 SFP module slots
8 Ethernet 10/100 ports and 1 fixed 10/100/1000BASE-T port
8 Ethernet 10/100 ports,1 fixed 100BASE-FX, and 1 fixed
1000BASE-X SFP module port
24 10/100 BASE-TX Ethernet ports (8 of which are PoE) and 2 dual-purpose ports
24 10/100 BASE-TX Ethernet ports and 2 dual-purpose ports
48 10/100 BASE-TX Ethernet ports and 2 dual-purpose ports
24 10/100 BASE-TX Ethernet ports and 2 10/100/1000BASE-T copper ports
24 10/100BASE-TX Ethernet ports and 2 dual-purpose ports
48 10/100 BASE-TX Ethernet ports and 2 10/100/1000BASE-T copper uplink ports
48 10/100BASE-TX Ethernet ports and 2 dual-purpose ports
48 10/100/1000 Ethernet ports, 2 10-Gigabit Ethernet X2 module slots, AC power
48 10/100/1000 Ethernet ports, 2 10-Gigabit Ethernet X2 module slots, DC power
48 10/100/1000 ports and 4 SFP+ module slots
18 internal Gigabit Ethernet 1000BASE-X ports, 4 Gigabit Ethernet (RJ-45) uplink ports, 4 RJ-45 SFP module slots and 1 Ethernet management port
18 internal Gigabit Ethernet 1000BASE-X ports, 4 Gigabit Ethernet (RJ-45) uplink ports, 4 RJ-45 SFP module slots, 2 10-Gigabit Ethernet X2 module slots and 1 Ethernet management ports
4 external 10/100/1000BASE-T Ethernet ports, 14 internal 1000BASE-X Ethernet downlink ports, 1 internal 100BASE-T Ethernet management port, 2 StackWise Plus ports
1 external 10-Gigabit Ethernet module slot, 14 internal 1000BASE-X Ethernet downlink ports, 1 internal 100BASE-T Ethernet management port, 2 StackWise Plus ports
4 external 10/100/1000BASE-T Ethernet ports, 14 internal 1000BASE-X Ethernet downlink ports, 1 internal 100BASE-T Ethernet management port
16 internal 1000BASE-X ports, 8 10/100/100 copper ports and 4 shared SFP module slots
10 internal 1000BASE-X ports, 2 external 10/100/1000 copper ports, and 4 SFP module slots
10 internal 1000BASE-X ports, 2 external 10/100/1000 copper ports, and 4 SFP module slots
14 internal 1000BASE-X ports and 4 external 10/100/1000 copper ports
18 internal Gigabit Ethernet 1000BASE-X ports, 4 Gigabit Ethernet (RJ-45) uplink ports, 4 RJ-45 SFP module slots and 1 Ethernet management port
18 internal Gigabit Ethernet 1000BASE-X ports, 4 Gigabit Ethernet (RJ-45) uplink ports, 4 RJ-45 SFP module slots, 2 10-Gigabit Ethernet X2 module slots and 1 Ethernet management port
WS-CBS3032-DEL (non-stackable)
WS-CBS3032-DEL-F (non-stackable)
WS-CBS3130-G-S
WS-CBS3130-G-S-F
16 Ethernet 10/100/1000 ports, 4 fixed 1-Gigabit Ethernet SFP ports, and 1 fixed 100BASE-T Ethernet port
16 Ethernet 10/100/1000 ports, 4 fixed 1-Gigabit Ethernet SFP ports,
2 10-Gigabit Ethernet X2 module slots, and 1 fixed 100BASE-T Ethernet port
24 Ethernet 10/100 ports and 2 10/100/1000BASE-T ports
20 Ethernet 10/100 ports, 4 10/100 PoE, and 2 10/100/1000BASE-T ports or SFP module ports
24 10/100 PoE ports and 2 10/100/1000BASE-T ports or SFP module ports
8 10/100/1000BASE-T ports and 4 10/100/1000BASE-T ports or SFP module ports
8 10/100 access ports with PoE and 1 10/100/1000BASE-T or SFP module slots
24 10/100 access ports and 2 10/100/1000BASE-T ports
20 10/100 access ports, 4 10/100 access ports with PoE ports, and 2 10/100/1000BASE-T or SFP module slots
24 10/100 access ports with PoE and 2 10/100/1000BASE-T or SFP module slots
24 10/100/1000BASE-T ports and 2 10/100/1000BASE-T or SFP module slots
Cisco Catalyst 4503; 3-slot modular chassis
Cisco Catalyst 4506; 6-slot modular chassis
Cisco Catalyst 4507R; 7-slot modular chassis
Cisco Catalyst 4510R; 10-slot modular chassis
Cisco Catalyst 4503-E; 3-slot modular chassis with CenterFlex technology
Cisco Catalyst 4506-E; 6-slot modular chassis with CenterFlex technology
Cisco Catalyst 4507R-E; 7-slot modular chassis with CenterFlex technology
Cisco Catalyst 4510R-E; 10-slot modular chassis with CenterFlex technology
Cisco Catalyst 4500E; 10-slot chassis for 48 Gb/s per slot
Cisco Catalyst 4500E; 7-slot chassis for 48 Gb/s per slot
32 1G or 10G Ethernet ports (requires either SFP or SFP+ transceivers)
16 1G or 10G Ethernet ports (requires either SFP or SFP+ transceivers)
Cisco Catalyst 4948; 44 Ethernet 10/100/1000 ports, 4 ports alternative-wired SFP module
48 fixed 10/100/1000BASE-T ports and 2 ports X2-based
Cisco Catalyst 4900M partially fixed and partially modular switch
48 10/100/1000 ports, 4 10-Gigabit Ethernet SFP+ module slots
48 10/100/1000 ports, 4 10-Gigabit Ethernet SFP+ module slots, Back-to-Front airflow
Cisco Catalyst 4500 Series Supervisor Engine II-Plus-10GE
Cisco Catalyst 4500 Series Supervisor Engine II-Plus TS
Cisco Catalyst 4500 Series Supervisor Engine II-Plus
Cisco Catalyst 4500 Supervisor Engine IV
Cisco Catalyst 4516 Supervisor Engine V
Cisco Catalyst 4516 10-Gigabit Supervisor Engine V with 2 ports X2-based or 4 ports alternative-wired SFP module
Cisco Catalyst 4500 E-Series Supervisor Engine 6-E
Cisco Catalyst 4500 E-Series Supervisor Engine 6L-E
Cisco Catalyst 4500E Supervisor Engine 7-E
Cisco Catalyst 4500E Supervisor Engine 7L-E
Cisco Catalyst 4500E Supervisor Engine 8-E
NetFlow Services daughter card
Cisco Redundant Power Supply 2300 for the Cisco Catalyst 3750-E and Cisco Catalyst 3560-E switches
FRU power supply module for the Cisco Catalyst 3750-E and Cisco Catalyst 3560-E switches and for the Cisco Redundant Power System 2300
FRU power supply module for the Cisco Catalyst 3750-E and Cisco Catalyst 3560-E switches and for the Cisco Redundant Power System 2300
FRU power supply module for the Cisco Catalyst 3750-E and Cisco Catalyst 3560-E switches.
FRU power supply module for the Cisco Catalyst 3750-E and Cisco Catalyst 3560-E switches
FRU power supply module for the Cisco Catalyst 3750-X and Cisco Catalyst 3560-X switches.
FRU power supply module for the Cisco Catalyst 3750-X and Cisco Catalyst 3560-X switches.
FRU power supply module for the Cisco Catalyst 3750-X and Cisco Catalyst 3560-X switches.
FRU power supply module for the Cisco Catalyst 3750-X and Cisco Catalyst 3560-X switches.
1000-W AC power supply (data only)
1300-W AC power supply (data and PoE)
1400-W AC power supply
1400-W DC power supply with integrated PEM
2800-W AC power supply (data and PoE)
4200-W AC power supply with integrated PoE
Cisco Catalyst 4500 Series Switch 6000 W AC power supply
Cisco Catalyst 4500 Series Switch 9000 W AC power supply
24-port 10/100 with RJ-45 connectors
24-port Fast Ethernet 100BASE-FX, multimode fiber with MT-RJ connectors
48-port Fast Ethernet 100BASE-FX, multimode fiber with MT-RJ connectors
48-port Fast Ethernet 100BASE-LX10, single-mode fiber with MT-RJ connectors
48-port 10/100 with RJ-45 connectors
48-port Ethernet 10/100-Mb/s with 4 telco connectors
48-port Ethernet 10/100-Mb/s inline power
24-port 10/100 PoE IEEE 802.3af-compliant with RJ-45 connectors
32-port Ethernet 10/100 and 2 GBIC uplinks
48-port 10/100 PoE IEEE 802.3af-compliant with telco connectors
48-port 10/100 PoE IEEE 802.3af-compliant with RJ-45 connectors
24-port 10/100/1000 with RJ-45 connectors
48-port Ethernet 10/100/100 with RJ-45 connectors
48-port 1000BASE-X, SFP-based with LC connectors (SFP optics included)
48-port 1000BASE-X ports, SFP-based with LC connectors
Enhanced 48-port 10/100/1000 with RJ-45 connectors
24-port 10/100/1000 PoE IEEE 802.3af-compliant with RJ-45 connectors
48-port 10/100/1000 PoE IEEE 802.3af-compliant with RJ-45 connectors
6-port 10/100/1000 PoE IEEE 802.3af-compliant or SFP-module based
48-port RJ-45 IEEE 802.3af PoE 10/100/1000
48-port 10/100/1000 line card nonblocking PoE 802.3at providing up to 30 Watts power/port
48-Port Premium PoE 10/100/1000
6-port 10-Gigabit Ethernet X2
24-port 1000BASE-X ports, SFP-based with LC connectors
48-port 100BASE-X ports, SFP-based with LC connectors
WS-X4624-SFP-E (Cisco Catalyst 4500 E-series switches)
WS-X4248-FE-SFP (Cisco Catalyst 4500 series switches)
48-port 10/100/1000 Premium PoE line card
48-port 10/100/1000BASE-T Gigabit Ethernet switching module
12-port 10 Gigabit Ethernet (SFP+) line card
12-port 1000BASE-X SFP module slots
48-port intelligent 60 W PoE per port (maximum of 1500 W per module). 10/100/1000 Ethernet module. Module supports 48 ports at 30 W per port simultaneously, or 24 ports at 60 W per port simultaneously.
8-port 1-Gigabit/10-Gigabit BASE-X module.
20-port 10/100/1000 half card with RJ-45 connectors
4-port 10-Gigabit Ethernet X2 half card
8-port 10-Gigabit Ethernet X2 half card
8-port 10-Gigabit BASE-T half card with RJ-45 connectors
48 10/100 ports, 2 SFP module slots
48 10/100 PoE ports, 2 SFP module slots
48 10/100/1000 PoE ports, 2 SFP module slots
15 10/100 PoE ports, 1 10/100/1000 PoE ports
23 10/100 ports, 1 10/100/1000 port
Layer 2-capable, 23 10/100 ports PoE ports, 1 10/100/1000 PoE ports
15 10/100 PoE ports, 1 10/100/1000 port PoE ports
23 10/100 ports PoE ports, 1 10/100/100 PoE ports
16 10/100/1000 PoE ports
24 10/100/1000 PoE ports
Cisco 800 Series Small Office Home Office Routers: C-831, C-836, C-837, C-851, C-857, C-876, C-877, C-878, 877M
Cisco 1800 Series Integrated Services Routers: C1801, C1801W, C1802, C1802W, C1803, C1803W, C1811, C1811W, C1812, C1812W, C1841, C1861
Cisco 2600 Series Multiservice Platforms: C2610XM, C2611XM, C2620XM, C2621XM, C2650XM, C2651, C2651XM, C2691
Cisco 2800 Series Integrated Services Routers: C2801, C2811, C2821, C2851
Cisco 3700 Series Multiservice Access Routers: 3725, 3745
Cisco 3800 Series Integrated Services Routers: 3825, 3845
Cisco 800M Series Integrated Services Routers: C841M-4X-JAIS/K9, C841M-4X-JSEC/K9, C841M-8X-JAIS/K9, C841M-4X/K9, C841M-8X/K9
Cisco 1900 branch routers: 1921/K9, 1941/K9, 1941-SEC-SRE/K9, 1941-SEC/K9. 1941W-A/K9, 1941W-E/K9, 1941W-P/K9, 1941W-N/K9, 1941-2.5G/K9, 1921-SEC/K9, 1921-T1SEC/K9, 1921-ADSL2-M/K9, and 1921-ADSL2/K9.
Cisco 2900 branch routers: 2901/K9, 2911/K9, 2921/K9, 2951/K9, 2901-SEC/K9, 2911-SEC/K9, 2921-SEC/K9, 2951-SEC/K9, 2901-V/K9, 2911-V/K9, 2921-V/K9, 2951-V/K9, 2901-VSEC/K9, 2911-VSEC/K9, 2921-VSEC/K9, and 2951-VSEC/K9.
Cisco 3900 branch routers: 3925/K9, 3945/K9, 3925-SEC/K9, 3925-V/K9, 3925-VSEC-SRE/K9, 3925-VSEC/K9, 3925-CME-SRST/K9, 3945-V/K9, 3945-SEC/K9, 3945-VSEC-SRE/K9, 3945-VSEC/K9, 3945-CME-SRST/K9, 3945E-VSEC-SRE/K9, 3925E-VSEC-SRE/K9, 3945E-VSEC/K9, 3925E-VSEC/K9, 3945E-CME-SRST/K9, 3945E-V/K9, 3925E-V/K9, 3925-VSEC-CUBE/K9, 3925E-VSEC-CUBEK9, 3945-VSEC-CUBE/K9, 3945E-VSEC-CUBEK9, 3945E-SEC/K9, 3925E-SEC/K9, 3945E/K9, and 3925E/K9.
EtherSwitch Service Modules on Cisco 2800 Series and Cisco 3800 Series Integrated Services Routers
Stratix 8000 and 8300 Ethernet Managed Switches
Stratix 5400 Ethernet Managed switches (1783-HMS4C4CGN, 1783-HMS8T4CGN, 1783-HMS8S4CGN, 1783-HMS4T4E4CGN, 1783-HMS16T4CGN, 1783-HMS4S8E4CGN, 1783-HMS8TG4CGN, 1783-HMS8SG4CGN, 1783-HMS4EG8CGN, 1783-HMS16TG4CGN, 1783-HMS8TG8EG4CGN, 1783-HMS4SG8EG4CGN, 1783-HMS8TG4CGR, 1783-HMS8SG4CGR, 1783-HMS4EG8CGR, 1783-HMS16TG4CGR, 1783-HMS8TG8EG4CGR, and 1783-HMS4SG8EG4CGR)
Stratix 5410 Ethernet Managed switches (1783-IMS28NDC, 1783-IMS28NAC, 1783-IMS28RDC, and 1783-IMS28RAC)
Stratix 5700 Ethernet Managed Switches (1783-BMS06SL, 1783-BMS06SA, 1783-BMS06TL,1783-BMS06TA, 1783-BMS06SGL, 1783-BMS06SGA, 1783-BMS06TGL,1783-BMS06TGA, 1783-BMS10CL,1783-BMS10CA, 1783-BMS10CGL, 1783-BMS10CGA, 1783-BMS10CGP, 1783-BMS10CGN, 1783-BMS20CL, 1783-BMS20CA, 1783-BMS20CGL, 1783-BMS20CGP, 1783-BMS20CGPK, and 1783-BMS20CGN)
Rockwell Automation switches (1783-BMS12T4E2CGL, 1783-BMS12T4E2CGNK, 1783-BMS12T4E2CGP, 1783-BMS10CGN)
Cisco Catalyst 6500 Series Switch with the Cisco Catalyst 6500 Supervisor Engine 32, WS-C6509-E switch
PIX-501, PIX-506, PIX-506E, PIX-515, PIX-515E, PIX-525, and PIX-535 firewalls
ASA 5505, ASA 5510, ASA 5520, and ASA 5540 Adaptive Security Appliances
All Cisco IP phones
Aironet 350 Series Access Point: AIR-AP350
Aironet 700 Series Access Points: AIR-CAP702I, AIR-SAP702I
Aironet 1040 Series Access Points:
- AIR-AP1041N-A-K9, AIR-AP1041N-E-K9, AIR-AP1041N-P-K9
- AIR-AP1042-AK9-5, AIR-AP1042-CK9-5, AIR-AP1042-IK9-5, AIR-AP1042-KK9-5, AIR-AP1042-NK9-5, AIR-AP1042-PK9-5, AIR-AP1042-RK9-5, AIR-AP1042-SK9-5, AIR-AP1042-TK9-5
- AIR-AP1042N-A-K9, AIR-AP1042N-C-K9, AIR-AP1042N-I-K9, AIR-AP1042N-K-K9, AIR-AP1042N-N-K9, AIR-AP1042N-P-K9, AIR-AP1042N-R-K9, AIR-AP1042N-S-K9, AIR-AP1042N-T-K9
- AIR-LAP1041N-A-K9, AIR-LAP1041N-E-K9, AIR-LAP1041N-P-K9
- AIR-LAP1042N-A-K9, AIR-LAP1042N-C-K9, AIR-LAP1042N-I-K9, AIR-LAP1042N-K-K9, AIR-LAP1042N-N-K9, AIR-LAP1042N-P-K9, AIR-LAP1042N-R-K9, AIR-LAP1042N-S-K9, AIR-LAP1042N-T-K9
- AIR-LAP1042-AK9-10, AIR-LAP1042-CK9-10, AIR-LAP1042-IK9-10, AIR-LAP1042-KK9-10, AIR-LAP1042-NK9-10, AIR-LAP1042-PK9-10, AIR-LAP1042-RK9-10, AIR-LAP1042-SK9-10, AIR-LAP1042-TK9-10
Aironet 1100 Series Access Points:
- AIR-AP1120B-E-K9, AIR-AP1120B-I-K9, AP1120B-J-K9
- AIR-AP1121G-A-K9, AIR-AP1121G-E-K9, AIR-AP1121G-J-K9
- AIR-AP1131AG-A-K9, AIR-AP1131AG-C-K9, AIR-AP1131AG-E-K9, AIR-AP1131AG-J-K9, AIR-AP1131AG-N-K9, AIR-AP1131AG-K-K9, AIR-AP1131AG-P-K9, AIR-AP1131AG-S-K9, AIR-AP1131AG-T-K9
Aironet 1140 Series Access Points:
- AIR-AP1141N-A-K9, AIR-AP1141N-E-K9, AIR-AP1141N-P-K9
- AIR-AP1142N-A-K9, AIR-AP1142N-C-K9, AIR-AP1142N-E-K9, AIR-AP1142N-I-K9, AIR-AP1142N-K-K9, AIR-AP1142N-N-K9, AIR-AP1142N-P-K9, AIR-AP1142N-S-K9, AIR-AP1142N-T-K9
- AIR-AP1142-AK9-5PR, AIR-AP1142-CK9-5PR, AIR-AP1142-EK9-5PR, AIR-AP1142-IK9-5PR, AIR-AP1142-KK9-5PR, AIR-AP1142-NK9-5PR, AIR-AP1142-PK9-5PR, AIR-AP1142-SK9-5PR, AIR-AP1142-TK9-5PR
- AIR-LAP1141N-A-K9, AIR-LAP1141N-E-K9, AIR-LAP1141N-P-K9
- AIR-LAP1142N-A-K9, AIR-LAP1142N-C-K9, AIR-LAP1142N-E-K9, AIR-LAP1142N-I-K9, AIR-LAP1142N-K-K9, AIR-LAP1142N-N-K9, AIR-LAP1142N-P-K9, AIR-LAP1142N-S-K9, AIR-LAP1142N-T-K9
- AIR-LAP1142-AK9-PR, AIR-LAP1142-CK9-PR, AIR-LAP1142-EK9-PR, AIR-LAP1142-IK9-PR, AIR-LAP1142-KK9-PR, AIR-LAP1142-NK9-PR, AIR-LAP1142-PK9-PR, AIR-LAP1142-SK9-PR, AIR-LAP1142-TK9-PR
- AIR-LAP1142-AK9-10, AIR-LAP1142-CK9-10, AIR-LAP1142-EK9-10, AIR-LAP1142-IK9-10, AIR-LAP1142-KK9-10, AIR-LAP1142-NK9-10, AIR-LAP1142-PK9-10, AIR-LAP1142-SK9-10, AIR-LAP1142-TK9-10
Aironet 1200 Series Access Points:
- AIR-A12P10B-A-K9
- AIR-AP1200
- AIR-AP1210
- AIR-AP1220, AIR-AP1220A-A-K9, AIR-AP1220A-J-K9
- AIR-AP1220B-A-K9, AIR-AP1220B-E-K9, AIR-AP1220B-J-K9
- AIR-AP1230A-A-K9, AIR-AP1230A-J-K9, AIR-AP1230A-T-K9, AIR-AP1230B-A-K9, AIR-AP1230B-E-K9, AIR-AP1230B-J-K9
- AIR-AP1231G-A-K9, AIR-AP1231G-E-K9, AIR-AP1231G-I-K9, AIR-AP1231G-J-K9
- AIR-AP1232AG-A-K9, AIR-AP1232AG-E-K9, AIR-AP1232AG-J-K9, AIR-AP1232AG-N-K9, AIR-AP1232AG-C-K9, AIR-AP1232AG-P-K9, AIR-AP1232AG-S-K9, AIR-AP1232AG-T-K9
- AIR-AP1242AG-A-K9, AIR-AP1242AG-E-K9, AIR-AP1242AG-I-K9, AIR-AP1242AG-J-K9, AIR-AP1242AG-N-K9, AIR-AP1242AG-C-K9, AIR-AP1242AG-P-K9, AIR-AP1242AG-S-K9, AIR-AP1242AG-T-K9, AIR-AP1242AG-K-K9, AIR-AP1242G-A-K9, AIR-AP1242G-E-K9, AIR-AP1242G-P-K9
- AIR-AP1252AG-A-K9, AIR-AP1252AG-C-K9, AIR-AP1252AG-E-K9, AIR-AP1252AG-I-K9, AIR-AP1252AG-K-K9, AIR-AP1252AG-N-K9, AIR-AP1252AG-P-K9, AIR-AP1252AG-S-K9, AIR-AP1252AG-T-K9, AIR-AP1252G-A-K9, AIR-AP1252G-E-K9, AIR-AP1252G-P-K9
Aironet 1260 Series Access Points:
- AIR-AP1261N
- AIR-AP1261N-A-K9
- AIR-AP1262N
- AIR-AP1262N-E-K9
- AIR-LAP1261N
- AIR-LAP1262N
- AIR-LAP1262N-E-K9
Aironet 1500 Series Access Points:
- AIR-CAP1532I-A-K9, AIR-CAP1532I-C-K9, AIR-CAP1532I-D-K9, AIR-CAP1532I-E-K9, AIR-CAP1532I-F-K9, AIR-CAP1532I-H-K9, AIR-CAP1532I-K-K9, AIR-CAP1532I-M-K9, AIR-CAP1532I-N-K9, AIR-CAP1532I-Q-K9, AIR-CAP1532I-R-K9, AIR-CAP1532I-S-K9, AIR-CAP1532I-T-K9, AIR-CAP1532I-Z-K9,
- AIR-CAP1532E-A-K9, AIR-CAP1532E-C-K9, AIR-CAP1532E-D-K9, AIR-CAP1532E-E-K9, AIR-CAP1532E-F-K9, AIR-CAP1532E-H-K9, AIR-CAP1532E-K-K9, AIR-CAP1532E-M-K9, AIR-CAP1532E-N-K9, AIR-CAP1532E-Q-K9, AIR-CAP1532E-R-K9, AIR-CAP1532E-S-K9, AIR-CAP1532E-T-K9, AIR-CAP1532E-Z-K9,
Aironet 1530 Series Access Points:
- AIR-CAP1532E, AIR-CAP1532I
- AIR-SAP1532E, AIR-SAP1532I
Aironet 1550 Series Access Points:
- AIR-CAP1552C, AIR-CAP1552CU, AIR-CAP1552E, AIR-CAP1552EU, AIR-CAP1552H, AIR-CAP1552I,
- AIR-SAP1552C, AIR-SAP1552CU, AIR-SAP1552E, AIR-SAP1552EU, AIR-SAP1552H, AIR-SAP1552I
Aironet 1600 Series Access Points:
- AIR-CAP1602E, AIR-CAP1602I
- AIR-SAP1602E, AIR-SAP1602I
Aironet 1700 Series Access Point: AIR-CAP1702I-x-K9
Aironet 2600 Series Access Points:
- AIR-CAP2602E, AIR-CAP2602I
- AIR-SAP2602E, AIR-SAP2602I
Aironet 2700 Series Access Points: AIR-CAP2702E-A-K9, AIR-CAP2702I-A-K9
Aironet 3500 Series Access Points:
- AIR-CAP3501E, AIR-CAP3501I,
- AIR-CAP3502E, AIR-CAP3502I, AIR-CAP3502P
- AIR-SAP3502E, AIR-SAP3502I
Aironet 3600 Series Access Points:
- AIR-CAP3602E, AIR-CAP3602I
- AIR-SAP3602E, AIR-SAP3602I
Cisco Wireless Controllers:
- Cisco 2500 series (AIR-CT2504-5-K9, AIR-CT2504-15-K9, AIR-CT2504-25-K9, and AIR-CT2504-50-K9)
- Cisco 4400 series (AIR-WLC4404-12-K9, AIR-WLC4404-25-K9, AIR-WLC4404-50-K9, and AIR-WLC4404-100-K9)
- Cisco 5500 series (AIR-CT5508-12-K9, AIR-CT5508-25-K9, AIR-CT5508-50-K9, AIR-CT5508-100-K9, AIR-CT5508-250-K9, AIR-CT5508-500-K9, AIR-CT5508-500-2PK, AIR-CT5508-HA-K9, and AIR-CT5508-K9)
- Cisco 5760 series (AIR-CT5760-25-K9, AIR-CT5760-50-K9, AIR-CT5760-100-K9, AIR-CT5760-250-K9, AIR-CT5760-500-K9, AIR-CT5760-1K-K9, AIR-CT5760-HA-K9)
- Cisco 7500 series (AIR-CT7510-300-K9, AIR-CT7510-500-K9, AIR-CT7510-1K-K9, AIR-CT7510-2K-K9, AIR-CT7510-3K-K9, AIR-CT7510-6K-K9, and AIR-CT7510-HA-K9)
Cisco Small Business switches
- 500 Series Managed switches
– SF500-24, SF500-24P, SF500-48, SF500-48P
– SG500-28, SG500-28P, SG500-28MPP, SG500-52, SG500-52P, SG500-52MP, SG500X-24, SG500X-24P, SG500X-48
– SG500X-48P, SG500XG
- 300 Series Managed switches
– SF300-08, SF302-08, SF302-08MP, SF302-08P, SF302-08PP, SF302-08MPP, SF300-24, SF300-24P, SF300-24MP
– SF300-24PP, SF300-48, SF300-48P, SF300-48PP
– SG300-10, SG300-10MP, SG300-10MPP, SG300-10SFP, SG300-10P, SG300-10PP, SG300-20, SG300-28, SG300-28P
– SG300-28PP, SG300-28MP, SG300-52, SG300-52P, SG300-52MP
- 200 Series Managed switches
– SF200-24, SF200-24P, SF200-24FP, SF200-48, SF200-48P
– SG200-08, SG200-08P, SG200-10FP, SG200-18SG200-26, SG200-26P,SG200-26FP, SG200-50, SG200-50P, SG200-50FP
Note The Topology view of Network Assistant supports Cisco Catalyst 65 00 switches. You cannot add these devices to a community or cluster, but you can start Device Manager for them from the Topology view.
Access Points
Cisco Aironet 350, 1100, 1200, and 1242 series. Network Assistant supports them only if they run a Cisco IOS image.
Note Network Assistant supports only autonomous access points. Access points that are managed by a wireless LAN controller are not supported.
Firewalls
Cisco PIX 515E firewalls. PIX firewalls do not support the Cisco Discovery Protocol, so they are not automatically shown as neighbors in the Topology view. They are shown only after you add them to a community by using a Create Community or Modify Community window. To see a PIX firewall link to another community member, you must add the link manually by selecting Add Link in a Topology popup menu.
Legacy Devices
These devices are not supported by Network Assistant:
- Cisco Catalyst 2900 XL switches
- Cisco Catalyst 3500 XL switches
- C1700 Series Modular Access Routers
Cluster Compatibility
This section describes how to choose command and standby command devices when a cluster consists of a mixture of Cisco Catalyst switches. When creating a device cluster or adding a devices to a cluster, follow these guidelines:
- When you create a device cluster, we recommend configuring the highest end device in your cluster as the command device.
- If you are managing the cluster through Network Assistant, the device that has the latest software release should be the command device.
- The standby command device must be the same type as the command device. For example, if the command device is a Cisco Catalyst 3750 switch, all standby command devices must be Cisco Catalyst 3750 switches.
Note Cisco Catalyst 4500 series switches cannot be configured as standby command devices.
Downloading Network Assistant
Note The Application Updates feature is currently not available.
To download a new version of CNA, follow these steps:
1. Go to this Web address: http://www.cisco.com/en/US/products/ps5931/index.html
2. You must be a registered Cisco.com user, but you need no other access privileges.
3. Click the Download Software link, and select the version you want to download.
4. Find the Network Assistant installer.
5. Download the Network Assistant installer, and run it. (You can run it directly from the Web if your browser offers this choice.)
6. When you run the installer, follow the instructions. In the final panel, click Finish.
For information on installing, starting, and connecting to Network Assistant, see Getting Started with Cisco Network Assistant at this site:
Updating Network Assistant
To update Network Assistant to a later release, follow these steps:
1. Start Network Assistant.
2. Choose Applications > Application Updates.
3. In the Authentication window, enter your Cisco.com username and password, and then click OK.
4. If an upgrade version is available, Network Assistant prompts you to confirm if you want to install the updates.
5. If the K9 agreement dialog box displays, accept the agreement and click OK.
6. In the Cisco End User License Agreement dialog box, click Yes to proceed.
7. In the EULA Details dialog box, click Accept, and then click OK. A dialog box displaying the progress of update is displayed.
8. In the Application Updates window, select Yes to install the latest updates.
9. In the Authentication window, enter your Cisco.com username and password.
10. When the update is complete, click Restart to restart Network Assistant.
Upgrading a Switch by Using Network Assistant
You can upgrade switch software in two ways by using Network Assistant:
Note Prior to doing a software upgrade, check if there is enough memory space is available to upgrade the device.
- Drag and drop a software-image file from your PC, mapped drive, or network drive to a device icon in the Topology View.
- Select Maintenance > Software Upgrade from the feature bar.
For detailed instructions, click Help.
Minimum Cisco IOS Release Supported by Network Assistant
See the switch release notes for the minimum Cisco IOS software release for the devices that Network Assistant manages.
Limitations and Restrictions
You should review this section before you begin working with the device. These are known limitations that will not be fixed, and there is not always a workaround. Some features might not work as documented, and some features could be affected by recent changes to the device hardware or software.
These sections describe the limitations and restrictions:
Cluster Limitations and Restrictions
These limitations apply only to the Cisco Catalyst 4500 series switches:
- By default, clustering is disabled on the Cisco Catalyst 4500 series switches.
- You must assign an IP address to the Cisco Catalyst 4500 series switch if it is a cluster command switch candidate. If the switch is a cluster member candidate, you might not need to assign an IP address.
- By default, the HTTP server is disabled on the Cisco Catalyst 4500 series switch. To connect the switch to Network Assistant, you must enable the HTTP server on all cluster members.
- The HTTP port number on Network Assistant and the Cisco Catalyst 4500 series switch must match.
- A Cisco Catalyst 4500 switch can be a cluster member only if another Cisco Catalyst 4500 switch is the command device.
- By default, the Cisco Catalyst 4500 series switch is configured with five vty lines. If the switch (such as a cluster command device with multiple cluster members) is connected to Network Assistant, you must configure at least eight + n vty lines, where n is the number of vty lines used by other applications. You can configure a maximum of 16 vty lines.
- Create a switch virtual interface (SVI) to use for intracluster communication. The SVI must be in the no shut state.
This limitation applies only to the Cisco Catalyst 4500 series and Cisco Catalyst 3750, Cisco Catalyst 3560, Cisco Catalyst 3550, and Cisco Catalyst 2970 switches:
- If a Cisco Catalyst 2900 XL or Cisco Catalyst3500 XL cluster command device is connected to a Cisco Catalyst 3550 or a Cisco Catalyst 3750 switch, the command device does not find any cluster candidates other than the Cisco Catalyst 3550 or the Cisco Catalyst 3750 switch candidates. You must add the Cisco Catalyst 3550 or the Cisco Catalyst 3750 switch to the cluster to see other cluster candidates. (CSCdt09918)
This limitation applies only to the Cisco Catalyst 4500 series and Cisco Catalyst 3750, Cisco Catalyst 3560, Cisco Catalyst 3550, and Cisco Catalyst 2970 switches:
- If both the active command device and the standby command device fail at the same time, the cluster is not automatically recreated. Even if there is a third passive command device, it might not recreate all cluster members because it might not have all the latest cluster configuration information. You must manually recreate the cluster if both the active and standby command devices simultaneously fail. (CSCdt43501)
- When the active device fails in a device cluster that uses Hot Standby Routing Protocol (HSRP) redundancy, the new active device might not contain a full cluster member list.
The workaround is to ensure that the ports on the standby cluster members are not in the Spanning Tree Protocol (STP) blocking state. See the “Configuring STP” chapter in the software configuration guide for more information about verifying port status. (CSCec31495)
This limitation applies only to the Cisco Catalyst 3750 and Cisco Catalyst 3750-E switches:
On Cisco Catalyst 3750 and Cisco Catalyst 3750-E switches, when running on-demand diagnostic tests on both the stack master and stack member switches, sometimes the tests execute only on the stack master.
Use one of these workarounds:
– Execute the tests on the stack members first, and then run the tests separately on the stack master.
– Schedule the tests to run once on both the stack master and stack member switches.
This limitation applies only to the Cisco Catalyst 2955, Cisco Catalyst 2950, and Cisco Catalyst 2940 switches:
- When a cluster of devices have Network Time Protocol (NTP) configured, the command device is not synchronized with the rest of the devices. (CSCdz88305)
Network Assistant Limitations and Restrictions
These limitations apply to all the devices described in the “Devices Supported” section:
- Health Metrics feature is now available for multi core supported devices also. But, the metrics are still displayed for the single core only.
- CNA supports the standard ASCII character set. Do not enter characters from extended ASCII character sets in GUI fields for feature options.
- When CNA is managed over a VPN, the device data upload fails to appear on the Customer Active Advisor even though internet access is allowed. The device data upload fails only when the user skips the CCO user authentication process before connecting to the device in CNA.
- A red border appears around the text-entering area of some Network Assistant windows. The color of the border changes to green when text is entered. The colored border does not prevent you from entering text. (CSCdv82352)
- You cannot switch modes (for example, from guide mode to expert mode) for an open Network Assistant window. The workaround is to close the open window, select the mode that you want, and then reopen the Network Assistant window. For the mode change to take effect on any other Network Assistant window that is open, you need to close that window and then reopen it after you select the new mode. (CSCdw87550)
- If you open a window in which you can enter text, open another window, and return to the first window, right-clicking in the text field might make the cursor in this field disappear. You can still enter text in the field. (CSCdy44189)
- When the active device fails in a device cluster that uses HSRP redundancy, the new active device might not contain a full cluster member list.
The workaround is to ensure that the ports on the standby cluster members are not in the STP blocking state. See the «Configuring STP» chapter in the software configuration guide for information about verifying port status. (CSCec31495)
- In the Port Settings window, you must apply a change to some speed settings before you can change a duplex setting.
After you configure a speed setting, click Apply, and then configure a duplex setting. (CSCeh43889)
- When there are more than one neighbor devices of the same device type and they have same hostname, the Topology view displays only one neighbor device instead of displaying all the neighbor devices.
The workaround is to not have same hostname for more than one device. (CSCsb50280).
The Smartports window shows the NME-XD-24ES-1S-P EtherSwitch service module with two Mode buttons instead of one.
There is no workaround.
In the Modify VLAN window if you switch the vlan IDs of the isolated VLAN and the community VLAN and then click OK and Apply, these changes do not appear in the VLANs window.
The workaround is to do the same steps again. This time the changes take place.
Cisco Catalyst 4500 Series Switches
On Cisco Catalyst 4500 series switches, Network Assistant supports only the features shown in Table 2 .
Table 2 Features Supported by Cisco Catalyst 4500 Series Switches
Smartports, Power Supplies, and Save Configuration
Port Settings and EtherChannel
Security Wizard, Port Security, DHCP Snooping, DAI, and
IP Source Guard
VLANs, MAC Addresses, and Voice VLAN
Enable/Disable, Protocols, and Inter-VLAN Routing Wizard
Configure > Device Properties
IP Addresses, Hostname, System Time, HTTP Port, Users and Passwords, and SNMP
Cluster Conversion Wizard, Create Cluster, Delete Cluster, Add To Cluster, Remove From Cluster, and Hop Count
Health, Event Notification, System Messages, and Search
Inventory, Bandwidth Graphs, Link Graphs, ARP, and Router Reports
Front Panel and Topology
Ping and Trace and Diagnostics
Software Upgrade, File Management, Configuration Archive, Restart/Reset, and Telnet
These limitations apply to the Cisco Catalyst 4500 Series switches:
- In Network Assistant, some windows, such as VLAN, Hostname, and so on, might not open from the Front Panel view popup menu for Cisco Catalyst 4500 series switches.
The workaround is to close Network Assistant and restart it. (CSCef67553)
- You cannot see the PoE columns in the Port Settings window for Cisco Catalyst 4503, Cisco Catalyst 4506, or Cisco Catalyst 4507R switches that run Cisco IOS 12.2(20)EWA and have a WS-4548, WS-4524, or WS-4506-GB-T PoE line card.
The workaround is to upgrade the software on the switch to a later version of Cisco IOS. (CSCeh75133)
Community Limitations
These limitations apply only to communities:
- A community can contain up to 40 devices. This limit is enforced whenever you add devices to a community.
- CSCsd04956
The Topology view does not show the internal Gigabit Ethernet link between routers and the EtherSwitch service modules NME-16ES-1G and NME-X-23ES-1G.
There is no workaround.
- Changes to the topology or the network do not propagate across all open Network Assistant sessions connected to the same community. You see this inconsistency when multiple Network Assistant sessions are open on one desktop and they are pointing to the same community.
Open one Network Assistant session per desktop per community. (CSCeh53619)
- In the Topology view, the redundant link for an HSRP group is not shown. There is no workaround. (CSCeh54526)
- If a community has members that are connected to a member through a hub or a Gigastack module, the Topology view shows all the connections. However, if nonmembers are connected to a community member through a hub or a Gigastack module, the Topology view shows only the connection of the first nonmember.
- Accessing a community through a router running Network Address Translation (NAT) is not supported.
- When a device with a device ID that exceeds 40 characters is added to the community, its link disappears. The device ID is usually the hostname, but if a domain name is specified, the device ID is in the form hostname.domain-name. There is no workaround, other than to limit the size of the device ID to 40 characters or less. (CSCsi77210)
Cluster Limitations
These limitations apply only to clusters:
- When you add a new member with a username and password that is different from the existing cluster member usernames and passwords, Network Assistant produces an exception error because of an authentication failure.
The workaround is to add the new member without a username and password. When the new member is added to the cluster, remove the existing username and password from the Username and Password fields, enter a new username and password, and then apply it to all cluster members. (CSCdz07957)
- Changing the password or current authentication while Network Assistant is running causes HTTP requests to fail.
The workaround is to close all Network Assistant sessions and then to restart it. (CSCeb33995)
- When TACACS authentication is enabled only on a command device, member devices cannot be configured.
The workaround is to enable TACACS authentication on the member devices. (CSCed27723)
- When there are Cisco Catalyst 2950 and Cisco Catalyst 2955 devices in a cluster, and you open the QoS Queue window to configure the devices, and then try to view the settings for other devices by using the device selection menu, Network Assistant halts after 20 to 30 selections.
The workaround is to close and then to restart Network Assistant. (CSCed39693)
- A Java exception error occurs when Network Assistant is in read-only mode and you start the Port Settings window. This only occurs on Cisco Catalyst 3500 XL, Cisco Catalyst 2950 LRE, and Cisco Catalyst 2900 XL switches.
The workaround is to open the Port Settings window with Network Assistant in read-write mode. (CSCee25870)
- After a cluster member loses connectivity, the connect icon in the status bar incorrectly displays a connect status instead of a disconnect status.
There is no workaround. (CSCee93695)
- If a Cisco Catalyst 2970 switch is a cluster command device and a Cisco Catalyst 3750 or Cisco Catalyst 3550 switch is a cluster member, enabling IGRP on a network on the Cisco Catalyst 3750 or Cisco Catalyst 3550 switch creates a Premature EOF error.
There is no workaround. Make the Cisco Catalyst 3750 or Cisco Catalyst 3550 switch the command device.
After you click Finish, you see the commands that are actually applied to the device. (CSCeg60365)
- Zooming in or zooming out on the time axis of a bandwidth graph when the axis approaches noon or midnight might cause the time increments to be incorrectly labeled.
Close the Bandwidth Graph window, reopen it, and zoom in or out again. (CSCej02776)
Community and Cluster Limitations
These limitations apply to both communities and clusters:
- When the Link Graphs application has run for hours displaying packet drop and error information, sometimes the X-axis crosses the Y-axis at a negative Y value instead of at Y= 0. This condition occurs with all supported operating systems, browsers, and Java plug-ins. There is no workaround. (CSCdz32584)
- After you click Apply or Refresh in the Simple Network Management Protocol (SNMP) window, the window size changes. (CSCdz75666, CSCdz84255)
- When you enable log scaling for Link Graphs, the Y-axis scale becomes illegible. There is no workaround. (CSCdz81086)
- If an access control list (ACL) is deleted from a device, all QoS classes on Cisco Catalyst 2970 and Cisco Catalyst 3750 switches that use this ACL for traffic classification become unusable. The modification of these classes to use any other traffic classification (match statement) fails. The workaround is to delete the QoS class that uses the undefined ACL and then, recreate it with the intended traffic classification (match statement). (CSCed40866)
- When an Open Shortest Path First (OSPF) summary address is added for a 10.x.x.x network, a Windows exception error sometimes occurs.
The workaround is to add the address by using the router ospf process-id, area area-id, and range address mask configuration commands. (CSCed87031)
- Hostnames and Domain Name System (DNS) server names with commas for a cluster command device, member device, or candidate device can cause Network Assistant to behave unexpectedly.
You can correct this by not using commas in hostnames or DNS names. Do not enter commas when also entering multiple DNS names in the IP Configuration tab of the IP Management window in Network Assistant.
- Access control entries (ACEs) that contain the host keyword precede all other ACEs in standard ACLs. You can reposition the ACEs in a standard ACL with one restriction: No ACE with the any keyword or a wildcard mask can precede an ACE with the host keyword.
- If Network Assistant loses IP connectivity to the switch and an action is performed in the IP Address window, a Java exception error occurs.
The workaround is to close and to reopen the IP Address window when connectivity is restored. (CSCee91784)
- When you reload a device by using Network Assistant, it saves the running configuration. If you want to reload without saving the running configuration, use the CLI. (CSCeh24259)
- If a dual-media port on a Cisco Catalyst 4500 switch, model WS-C4948 or model WS-X4506-GB-T, is configured to RJ-45 and you apply a Smartports port role, the port is changed to SFP, the default setting. The connection to the port is lost.
The workaround is to reconfigure the media type to RJ-45 through the Port Settings window. (CSCeh31699)
- If you open the Modify Port Settings or the Modify Port Mode window twice in succession from the Front Panel view by right-clicking a port, selecting Port Settings or VLAN from the popup menu, and repeating these actions for another port, the windows display the settings for the port that you selected first.
The workaround is to ensure that the Interface field in these windows applies to the port that you selected. Be sure to close these windows between port selections. (CSCei17154)
- After you perform a search, the TAB key moves the focus in the search results. If you press the TAB key enough to reach the end of the results, the next TAB keystroke moves the focus out of the search results and into the next-in-focus window on the Network Assistant desktop.
The workaround is to Press ALT-s to return to the search results. (CSCei68648)
- Network Assistant does not verify whether the VLAN and the native VLAN are the same on the access point and the switch port that is connected to the access point. VLAN differences might cause wireless connectivity problems when you use the Secure Wireless feature.
The workaround is to ensure that the VLANs and the native VLAN are the same on the access point and the switch port. (CSCsb77434)
Important Notes
These sections contain important notes related to Network Assistant:
Switches Running in VSS
Network Assistant does not manage switches that are running in VSS (Virtual Switching System). If a device is discovered running in VSS, Network Assistant won’t support the configuration of any features, and you might see unexpected results if you try to configure any features.
Installation Notes
These are the installation notes that apply to Network Assistant:
- When you start Network Assistant, Java determines whether the resources it needs are available. If they are not, Java displays the message Could not create Java Virtual machine, and the session ends. To overcome this problem, open the file C:\Program Files\Cisco Systems\CiscoSMB\Cisco Network Assistant\startup\startup.properties (the default installation path), and modify this entry:
Replace 1024m with a lower setting that does not exceed the available RAM. There is no way to foresee what value will work. Try 512m, and lower it further if necessary. You can use the dial peer tag range 2500 to 2999 out-of-band to define your own dial peers.
- If the Network Assistant InstallShield wizard fails to start, it is likely that the temporary folder location defined through the environment variables TMP and TEMP has some problem. Assigning a correct temporary folder location can fix such problems.
Compatibility with Cisco IOS
If you run Cisco IOS 12.2(25)SEE or later, Cisco IOS 12.2(25)SEG or later, or Cisco IOS 12.1(22)EA7 or later, you must run Network Assistant 4.0 or later.
Cisco IOS Notes
- When upgrading IOS on a switch stack using Network Assistant, one of the member switches reboots after the upgrade even if you select No when prompted to reload the switch after the image upgrade. With the latest available Cisco Catalyst 2960S switch image (Cisco IOS Release 15.2(2)E5), this issue is resolved and the switch does not reload when you choose No on the prompt to reload after an image upgrade.
Workaround is to use archive download-sw /overwrite command to manually configure it or use the image version Cisco IOS Release 15.2(2)E or later.
- Network Assistant fails when a device is running the cryptographic software image and the vty lines have been configured with the transport input ssh and line vty 0 15 global configuration commands only use SSH.
The workaround is to use the transport input ssh telnet and line vty 0 15 global configuration commands to allow SSH and Telnet access through the vty lines. After you upgrade to Cisco IOS 12.2(25)SE or higher, you can enable HTTP or HTTPS separately from Telnet. (CSCdz01037)
- Cisco Catalyst 3750 or Cisco Catalyst 3560 switches with a 16-MB flash memory can experience problems due to flash memory constraints, especially if they are using larger size images, such as c3750-ipservicesk9-tar, c3560-ipservicesk9-tar, c3750-ipbasek9-tar. or c3750-ipbasek9-tar images. These are the affected switches:
Cisco Catalyst 3560: WS-C3560-24PS and WS-C3560-48PS
Cisco Catalyst 3750: WS-C3750-24PS, WS-C3750-24TS, WS-C3750-48PS, WS-C3750-48TS, WS-3750G-24T, WS-C3750G-12S, WS-C3750G-24WS, WS-C3750G-24TS, WS-C3750G-16TD
The workaround for these switches is to use the corresponding lm images, such as the c3750-ipserviceslmk9-tar or c3560-ipserviceslmk9-tar images, which require less memory. In future releases, images are expected to grow more in size, requiring more need for the lm images.
Community Notes
- Config Export: If you want to use and manage the same community on multiple devices, you can copy your community xml file (for example EnergyWiseTest.xml) from one device to another. This file is stored in the following location:
– For OS X: $HOME/.networkassistant/communities
– For Windows: C:\Documents and Settings\ \.networkassistant\communities
- This note applies to a community on all the devices described in the “Devices Supported” section.
All the devices for the topology of a community are derived from the “Cisco IOS CDP (Cisco Discovery Protocol)” table. Therefore, the Topology view shows duplicate devices when CDP discovers duplicate devices. This happens for a single device when you enter the show cdp neighbor command. Two devices appear: one with the actual hostname (for example, abc), the other with hostname.domainname (for example, abc.cisco.com).
Cluster Notes
This note applies to cluster configuration only on the Cisco Catalyst 3550 switches:
The cluster setup privileged EXEC command and the standby mac-address interface configuration command have been removed from the command-line interface (CLI) and the documentation because they did not function correctly.
Network Assistant Notes
These notes apply to Network Assistant configuration on all the devices described in the “Devices Supported” section:
- Java applet must be disabled on Mac OS for CNA to work. Navigate to «/Library/Internet Plug-Ins» to locate the «JavaAppletPlugin.plugin» file and move it to «/Library/Internet Plug-Ins/Disabled Plug-Ins».
- To run Network Assistant on MAC OS X (10.7 Lion), follow these steps:
– From the System Preferences window, select Security and Privacy.
– From the Security and Privacy window, select the General tab and click Anywhere.
- The HTTP server interface must be enabled to display the network assistant. By default, the HTTP server is enabled on the switch. Use the show running-config privileged EXEC command to see if the HTTP server is enabled or disabled.
If you are not using the default method of authentication (the enable password), you need to configure the HTTP server interface with the method of authentication used on the switch.
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
Enter global configuration mode.
ip http authentication < aaa| enable | local>
Configure the HTTP server interface for the type of authentication that you want to use.
- aaa —Enable the authentication, authorization, and accounting feature. You must enter the aaa new-model interface configuration command for the aaa keyword to appear.
- enable—Enable password, which is the default method of HTTP server user authentication, is used.
- local—Local user database, as defined on the Cisco router or access server, is used.
Return to privileged EXEC mode.
Verify your entries.
The network assistant uses the HTTP protocol (the default is port 80) and the default method of authentication (the enable password) to communicate with the switch through any of its Ethernet ports and to allow switch management from a standard web browser.
If you change the HTTP port, you must include the new port number when you enter the IP address in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new HTTP port number). You should write down the port number through which you are connected. Use care when changing the switch IP information.
- If you use Network Assistant on Windows 2000, it might not apply configuration changes if the enable password is changed from the CLI during your Network Assistant session. You have to restart Network Assistant and enter the new password when prompted. Platforms other than Windows 2000 prompt you for the new enable password when it is changed.
- Network Assistant does not display QoS classes that are created through the CLI if these classes have multiple match statements. When using Network Assistant, you cannot create classes that match more than one match statement. Network Assistant does not display policies that have such classes.1
- Within an ACL, you can change the sequence of ACEs that have the host keyword. However, because such ACEs are independent of each other, the change has no effect on the way the ACL filters traffic.
- In the Front Panel view or Topology view, Network Assistant does not display error messages in read-only mode for these devices:
– Cisco Catalyst 3550 member switches running Cisco IOS Release 12.1(6)EA1 or earlier
– Cisco Catalyst 2950 member switches running Cisco IOS Release 12.0(5)WC2 or earlier
– Cisco Catalyst 2900 XL or 3500 XL member switches running Cisco IOS Release 12.0(5)WC2 or earlier
In the Front Panel View, if the device is running one of the software releases listed previously, the device LEDs do not appear. In Topology View, if the member is an LRE switch, the CPE devices that are connected to the switch do not appear. The Bandwidth and Link graphs also do not appear in these views.
- To use the Network Assistant on Windows Vista, you must first install the Telnet utility. Unlike earlier versions of Microsoft Windows, Telnet is not installed by default. You install Telnet as you would other Window components, from the programs folder in the control panel. (CSCsj37409)
- To successfully install and use the Network Assistant on Windows Vista, install the Network Assistant application in a folder that has full access privileges for the Network Assistant user. Otherwise, unexpected behavior can occur. (CSCsj50074)
- After installing the Network Assistant on Windows Vista, a warning message might appear that says the program might not have installed correctly. If this occurs, perform the following steps:
1. Click What settings are applied?
2. Click What is program compatibility ?
3. Click Click to open the Program Compatibility Wizard ; then click Next.
4. Click I want to choose from a list of programs.
5. Click Cisco Network Assistant ; then click Next.
6. Click Do not apply a compatibility mode ; then click Next.
7. Check Disable visual themes ; then click Next. This option assures that the minimize, maximize, and close buttons display correctly. (CSCsj26429)
8. Click Next again.
Windows Vista launches the Network Assistant and asks if the program ran properly. If the program did not run correctly, select No, and follow the onscreen prompts.
9. If the Network Assistant opened correctly, click This program installed correctly. Otherwise, select No, and follow the onscreen prompts.
- You should now be able to remove both access and data VLAN entries using Network Assistant. Earlier, removing either access or data VLAN entries (CSCvb89752) were not supported.
- Network Assistant now supports connecting to a device through HTTPS using TLS protocol. Earlier, Network Assistant could not connect to devices (TLS supported IOS) through HTTPS (CSCvb89695, CSCvf57426 and CSCvi29047).
- With CNA Release 6.3.4, Network Assistant connects TLS enabled devices through HTTPS for Mac OS also. Earlier, Network Assistant connects TLS enabled devices through HTTPS only on Windows OS.
Open Caveats
These sections describe the open caveats that could create possibly unexpected activity in this software release.
Unless otherwise noted, these caveats apply to all the devices described in the “Devices Supported” section:
The software upgrade on the Cisco Catalyst 3750-X switch might fail if you use Network Assistant to upgrade the switch.
The workaround is to upgrade the switch by using the CLI through the console.
On a Cisco Catalyst 3750-X switch, you cannot delete a directory containing hundreds of files by using the Files tab of the Maintenance > File Management window.
The workaround is to delete the files individually or in groups of 100 or less.
In Configuration Settings tab of the Configure > Ports > Port Settings window, you cannot set the speed for SFP+ ports on Catalyst 3750-X and 3560-X switches. The ports operate at 10 Gb/s.
The upgrade fails when you try to upgrade the WS-C3560CPD-8PT-S switch from Cisco IOS Release 12.2(55)EX2 to IOS Release 12.2(55)EX3 by using the Software Upgrade > Upgrade Settings window and selecting the Standard Mode.
The workaround is to select the Remote TFTP Mode option from the Software Upgrade> Upgrade Settings window.
When you select the Trap Managers tab of the Configure > Device Properties > SNMP Management window and check Enable SNMP, Enable Traps, and Send All Traps, and apply the changes, the changes are not saved. In this case it adds all the available types of traps.
The workaround is to create a trap manager with limited types of traps to send and you need to uncheck the Send All Traps checkbox.
When you use the Configure > Ports > EtherChannels > Create EtherChannels window to create an EtherChannel on an interface that has voice VLAN enabled, an error message is displayed, and the EtherChannel is saved without the interface details.
The workaround is to use the Configure > Switching > Voice VLAN window to change the setting to None on the specific interface before you create the EtherChannel.CSCtu42125
The cluster to community conversion feature does not work when the password store feature is enabled.
The workaround is to disable the password store feature.
The Sync Stored Credentials with Cisco CCO window fails to display if you enter the wrong old credentials more than four times under these conditions:
1. You reset your CCO credentials on Cisco.com and launch Network Assistant.
2. You enter the new credentials in the Authenticate to Cisco CCO window, and the Sync Stored Credentials with Cisco CCO is displayed.
3. You then enter the community name in the Connect window, and click OK. If you exit and launch Network Assistant again, the Sync Stored Credentials with Cisco CCO window does not appear.
The workaround is to enter the valid device credentials, or to re-create your communities.
- CSCtx72944 (Applies to the Cisco Catalyst 3750-X and Cisco Catalyst 3560-X switches)
You cannot enable or disable the Routing Information Protocol (RIP) protocol by using the RIP tab in the Configure > Routing > Protocols window.
The workaround is to enable or disable RIP by using the CLI.
- CSCtx76912 (Applies to the Cisco Catalyst 3750-X and Cisco Catalyst 3560-C switches)
The software upgrade fails when you try to upgrade the switch by using the Software Upgrade > Upgrade Settings window and selecting the Standard mode.
The workaround is to upgrade the switch by using the CLI. See the switch release notes for information on upgrading the switch by using the CLI.
- CSCtx76921 (Applies to the Cisco Catalyst 3750-X, Cisco Catalyst 3560-C, and Cisco Catalyst 2960-C switches)
The software upgrade fails when you try to upgrade the switch by using the Software Upgrade > Upgrade Settings window and selecting the Remote TFTP Server mode.
The workaround is to upgrade the switch by using the CLI. See the switch release notes for information on upgrading the switch by using the CLI.
The output displayed in the uploaded configuration file for the show snmp command does not match actual CLI output.
There is no workaround.
- CSCtz31273 (Applies to devices that support the routing protocols)
Network Assistant produces an exception error when you try to configure MAC addresses by using the Configure > Switching > MAC Addresses window.
The workaround is to configure MAC addresses by using the CLI. See the switch software configuration guide for information.
- CSCtz31327 (Applies to devices that support the routing protocols)
Network Assistant produces an exception error when you try to configure the Enhanced IGRP (EIGRP) and Open Shortest Path First (OSPF) protocols by selecting the EIGRP tab and the OSPF tab in the Configure > Routing > Protocols window.
The workaround is to configure the EIGRP and OSPF protocols by using the CLI. See the switch software configuration guide for information.
- CSCtz31357 (Applies to devices that support the routing protocols)
If the EIGRP and OSPF protocols are not configured, and you click the Advanced button in the EIGRP tab of the Configure > Routing > Protocols window, the system stops responding.
There is no workaround.
You cannot upgrade the Cisco Catalyst 3850 switches by using the Software Upgrade> Upgrade Settings window and selecting the Standard Mode.
The workaround is to upgrade the switch by selecting the Remote TFTP Mode option from the Software Upgrade> Upgrade Settings window.
- CSCuj05900 (Applies to access points)
The online help does not appear in the VLAN windows when you access the VLAN feature in guide mode ( Switching > VLANs).
The workaround is to use the VLAN feature in expert mode if you want to view the online help.
You cannot enter the TFTP server path when you use the Software Upgrade> Upgrade Settings window and select the Remote TFTP Mode option.
The workaround to use the TFTP mode in the Upgrade Settings window, is to run the TFTP server in the local machine.
The software upgrade using Cisco Network Assistant fails on Cisco Catalyst 3650 switches when using the Standard mode as well as the Remote TFTP Server mode. On Small Business switches, the upgrade fails when using the Standard mode.
The workaround is to upgrade the Small Business switches using the TFTP mode and the Cisco Catalyst 3650 switches using the CLI.
When upgrading the IOS on a switch stack using Network Assistant, one of the member switches reboots after the upgrade even if you select No in the dialog box that prompts you to reload the upgraded devices.
The workaround is to upgrade the switch by using the CLI through the console.
When you try to uninstall Network Assistant, the application prompts to navigate to the location where Java executable is available.
The work around is to locate the Java executable during the uninstallation process.
These caveats apply to Cisco EtherSwitch service modules:
The Front Panel view on EtherSwitch service modules NME-16ES-1G-P, NME-X-23ES-1G-P, NME-XD-24ES-1S-P, and NME-XD-48ES-2S-P shows the EN-LED as not enabled.
There is no workaround.
When running Network Assistant with Cisco IOS Release 12.2(40) SE and later, you cannot enable EIGRP routing protocols using the IP Routing Protocols window in Network Assistant.
The workaround is to configure EIRGP by using the CLI.
- CSCup44097 (Applies to Cisco IE 2000 and IE 3000 devices)
You cannot upgrade the switch using.tar files by selecting the Remote TFTP Mode option from the Software Upgrade> Upgrade Settings window.
Resolved Caveats
These caveats were resolved in Network Assistant 6.3:
- CSCum09576 (Applies to the Cisco Catalyst 2960-X switch)
The LEDs on the Front Panel view of a Cisco Catalyst 2960-X switch display correctly now. Also, the software upgrade on the switch completes successfully.
All the switch members in a stack now display the LED port status accordingly.
- CSCut28654 (Applies to Cisco Catalyst 2960-X and Cisco Catalyst 3560-CX switches)
Configuring VLAN using Network Assistant is resolved in Cisco IOS XE Release 3.6.6E, Cisco IOS XE Release 16.5.1 and Cisco IOS releases 15.2(5)E1, 15.2(6)E or later.
The Front Panel view of a Cisco Catalyst 2960-X-24TS-LL switch now displays on Network Assistant.
- CSCuz85908 (Applies to the WS-C2960X-24PSQ-L switch)
Network Assistant saves the port settings without any errors.
You can now remove both Data and Voice vlan MAC address from the Secure Address tab of the Configure > Security > Port Security window.
Network Assistant can now access devices through HTTPS with TLS protocol. The latest Cisco IOS images has TLS support.
Using Network Assistant, you can delete sticky MAC address for data VLAN on interfaces that are not configured with voice VLAN for a Cisco Catalyst 2960-X switch (WS-C2960X-48FPS-L).
Using Network Assistant, you can remove sticky VLAN, access and data VLAN entries.
The LED mode display on the Front Panel view of a WS-C2960X-24PD-L device displays LEDs correctly for connected ports.
The Reports > Inventory window now displays the software versions of a device with the following configuration (Model: WS-C2960-48TC-L, IOS version: Cisco IOS Release 12.2(55)SE11, Image: C2960-LANBASEK9-M).
The Modify Port Settings window now displays the details of a Cisco Catalyst 2960-X switch properly. On the Front Panel view of a WS-C2960X-24PD-L switch, right-click on the port and click Port Settings to open the Modify Port Settings window.
Network Assistant now supports Russian switch models for the Cisco Catalyst 3850 switch (WS-C3850R-48T, WS-C3850R-24T, WS-C3850R-48U, C3850R-48P)
MAC Addresses tables in the Configure > Switching > MAC Addresses window open without errors for a WS-C3560G-48TS-S switch.
The Smartports feature is now available under Configure menu.
Smartports feature is available for Cisco Catalyst 3850-XE switch.
The VLAN name for a Cisco Catalyst 3850 switch can be changed with Cisco IOS XE Release 3.6.7E and Cisco IOS releases 15.2(4)E5, 15.2(2)E7 & 15.2(6)E or later.
The uplink ports (Gigabit Ethernet interfaces) are now displaying properly in the list when trying to assign an ACL (Security > ACL) to the interfaces of a Cisco Catalyst 2960-X switch (WS-C2960X-48TS-L).
Network Assistant now supports WS-C4900M models.
Health Metrics feature is now available for multi core supported devices also.
From CNA Release 6.3.4, the startup screen no longer flickers, when the Network Assistant launches.
Network Assistant in Mac requires Java Runtime Environment 1.7 or later version to enable TLS protocol for HTTPS connection.
- CSCve51432 (Applies to WS-C4507R+E chassis)
Network Assistant supports new supervisor engine model (WS-X45-SUP8-E).
- CSCve51459 (Applies to WS-C4507R+E chassis)
Network Assistant supports new power supply model (PWR-C45-9000ACV).
Network Assistant now supports Topology view.
Network Assistant connects TLS enabled devices through HTTPS protocol only using Windows OS. This feature is not enabled on Mac OS.
TLS v1.2 support has been verified using the below models and software versions:
Model: Cisco Catalyst 2960X-24TS-L, IOS version: Cisco IOS XE Release15.2.6E
Model: Cisco Catalyst 3850-48T-S and Cisco Catalyst 3850-24T-E, IOS version: Cisco IOS XE Release 16.3.5b
The front panel view of the Cisco IE 3000 / Stratix 8000 switch in Network Assistant displays the live or LED status appropriately.
Network Assistant supports Cisco Catalyst 3850-48PS with Cisco IOS XE Denali 16.3.3.
Network Assistant displays the LED status and port settings correctly for the Cisco Catalyst 3850 switch.
Network Assistant now supports WS-C3850-24XS models.
Network Assistant now allows user to discover and add Aironet 1600i AP to community. Earlier Network Assistant displays “Unsupported Device Type: AIR-SAP1602I-S-K9 and cannot add the device to community” error message when the user tries to discover and add Aironet 1600i AP to community.
Network Assistant connects TLS v1 enabled devices through HTTPS protocol using legacy IOS or XE versions whereas the SSL protocol is disabled.
TLS v1 support has been verified using the below device types and software versions:
Model: Cisco Catalyst 3750 V2 24PS, IOS version: Cisco IOS Release15.0(2)SE11
Model: Cisco Catalyst 3850 48P, IOS version: Cisco IOS XE Release 3.7.4.E
Model: Aironet 1600i, IOS version: Cisco IOS Release 15.3(3)JF1
Network Assistant now supports Russian switch models for the Cisco Catalyst 2960 switch (WS-C2960R+24TC, WS-C2960R+24PC, WS-C2960R+48TC, WS-C2960R+48PST, WS-C2960RX-48FPS, WS-C2960RX-48LPS, WS-C2960RX-48FPD, WS-C2960RX-48LPD, WS-C2960RX-48TS, WS-C2960RX-24TS, WS-C2960RX-24PS).
Network Assistant now supports WS-C3850-12XS models.
- CSCvk05851 (Applies to Cisco Catalyst 3850 switch, CNA release 3.6.6)
Network Assistant can now change VLAN name for Cisco Catalyst 3850 switch in Cisco IOS XE Release 3.6.6.
- CSCvk09966 (Applies to Cisco Catalyst 3850 switch, IOS-XE version 3.6.8E)
In CNA 6.3.4, user can change port’s VLAN for Cisco Catalyst 3850 switch, version 3.6.8E
- CSCvm97623 (Applies to Cisco Catalyst 2960X switch)
In CNA 6.3.4, user can modify a VLAN in Front Panel View and configure ports with Cisco Catalyst 2960X.
- CSCvn41684 (Applies to Cisco Catalyst 3650 switch)
Connected ports are displayed as green in all stackable Cisco Catalyst 3650 switch.
These caveats were resolved in Network Assistant 6.0:
- CSCub21087 (Applies to the Cisco IE 2000 switches)
The software upgrade now works when you try to upgrade the switch by using the Software Upgrade > Upgrade Settings window and selecting the Standard mode.
- CSCud99837 (Applies to the WS-C2960X-48FPD-L switch)
In the Front Panel view, the port numbers are no longer jumbled, and the connected ports are indicated by the green color.
These access points are now supported:
– AIR-AP1262N-E-K9
– AIR-LAP1262N-E-K9
- CSCuo38468 (Applies to the Cisco IE-3000-4TC and IE-3000-8TC devices)
The software upgrade now works when you try to upgrade the switch by using the Software Upgrade > Upgrade Settings window and selecting the Standard mode or Remote TF.TP Server mode.
Network Assistant now allows you to configure more than one address in the Maximum Address Count field under Port Security.
- CSCuo60679 (Applies to Cisco Catalyst 3850 stack)
When you use the Configure > Switching > Stack Settings window, change the priority, and save the configurations, the new values take effect.
The WS-C2960X-24PSQ-L switch is now supported.
Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.
Related Documentation
This online document provides complete information about Network Assistant:
Getting Started with Cisco Network Assistant