Skip to main content

Enabling Third Party SFP to use in Cisco Devices

You could faced with your Cisco Devices when you tried to use with non-cisco product third party SFP Module.
But I believe you will think about that SFP Module itself is not functioning properly or your Device Port is not functional at first time experience.

Well...it is not. Your Cisco Device will prompt you with below Log Message in the console.

%PHY-4-UNSUPPORTED_TRANSCEIVER: Unsupported transceiver found in Gi1/0/52
%GBIC_SECURITY_CRYPT-4-VN_DATA_CRC_ERROR: GBIC in port 65538 has bad crc

This log message says that the port attached with third party SFP Module just disabled.

So, we need to workaround to work that. Just need to type two commane line as below,

switch>configure terminal
switch(config)#service unsupported-transceiver
switch(config)#no errdisable detect cause gbic-invalid

You should see Warning Message after you key-in "service unsupported-transceiver " that prompt Cisco Warranty will not cover if you use Third Party SFP Module.

no errdisable detect cause gbic-invalid means you are telling to Devices that do not disable the Port for the use of Third Party SFP Module.

One more thing, you will not able to find the document in Help of Cisco for "service unsupported-transceiver".

Your IOS must be at 12.2(25)SE and later to use that command.

OK, done.

Be happy working with Third Party SFP Modules.

May you all be happy.
(Be knowledgeable, pass it on then)


Comments

  1. You are providing good knowledge. It is really helpful and factual information for us and everyone to increase knowledge. Continue sharing your data. Thank you. Dark Fiber MPLS IP VPN leasing in Myanmar

    ReplyDelete
  2. Excellent job, this is important information which is shared by you. This information is meaningful and factual for us to increase our knowledge about it. Always keep sharing this type of information. Thanks. cloud computing houston tx

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
  4. I was searching for bare metal data center. I want to store my data so that i can safe my data properly.

    ReplyDelete
  5. Yes very good information, this information is essential, important and needy for everyone. I am thankful to you for providing this kind of information. Thanks once again for sharing it. Swaraj Tractor

    ReplyDelete

Post a Comment

Popular posts from this blog

Link Aggregating with Synology NAS and Cisco Switch

I’d like to share how to setup Link Aggregating between Synology NAS and Cisco Switch. I’ve got one Synology NAS with 4 Network Ports and I’m going to use 2 of them. Both Network Port to be as one Logical Link, Fault Tolerance and Load Balancing. To do that, I need to configure Link Aggregating on Synology NAS and EtherChannel with LACP on Cisco Switch. Below is brief steps to do to meet with my requirements. - Get connected Synology NAS and Cisco Switch as shown in picture. - Bonding two Network Ports of Synology NAS and assign IP Address - Configure EtherChannel with LACP in Cisco Switch and add two physical ports as Member. OK. Let’s begin from Synology NAS. - Login to the Synology and go to Control Panel>Network>Create>Create Bond - Select IEEE 802.3ad to get Fault Tolerance and Load Balancing Featureyou’re your switch not support 802.3ad you can only select Fault Tolerance only feature). After that click “Next”. - Choose the network port f

Fortigate guide for Begineer - 6

I would like to explaine how to troubleshoot the Fortigate Unit configured by Transparent Mode in step by step this time. Let's assume, you have one Fortigate Unit that configured as Transparent Mode. But devices from Internal/Private Network unable to access Internet/Public Network through your Fortigate Unit. OK. Let's troubleshoot with following steps, 1) Check the physical network connections between the network and the FortiGate unit, and between the FortiGate unit and the Internet. 2) Check the router and ISP-supplied equipment to make sure it is operating correctly. 3) Verify that you can connect to the internal interface by connecting to the management IP address of the FortiGate unit from the Internal network. From the internal network, attempt to ping the management IP address. If you cannot connect to the internal interface, verify the IP configuration of the PC and make sure the cables are connected and all switches and other devices on the network are powered on a

How to check the vpn user list and session in Cisco ASA 5520?

You've deployed Cisco ASA Firewall and setup Local AAA Server to create useraccount for IPSec VPN usage. As a network administrator, you've responsibility to check and monitor the list of vpn user and active session for security and audit purpose. You can use ASDM GUI to do such task but its handy to do. So, it is better to user CLI for that. Below are some useful commands to check user list and active vpn user sessions. To check user list, use below commands - show run | grep username - show aaa local user To check active vpn user list and sessions, use below commands - show vpn-sessiondb remote | grep Username (This command result will let you know how many user are active) - show vpn-sessiondb remote filter name username (This filter command will let you know details of vpn session user by inserting active vpn username in "username" ) Yes. That's all. Here I show you with Cisco ASA 5520 and its software version is 8.2 (5). May