How to connect to your Cisco EtherSwitch Network Module

Home > Blogs > Cisco > How to connect to your Cisco EtherSwitch Network Module

How to connect to your Cisco EtherSwitch Network Module

Like This Blog 1 Mark Jacob
Added by September 14, 2015

If you have read my previous postings regarding GNS3 as a practice platform, then you have probably gotten the gist that I am a big supporter. It can even do most of the things that are required, with just a few exceptions. This is typically done by configuring a router with an EtherSwitch module and then typing switch-related commands on that router. However, even in this age of virtualization inroads, occasionally you still have to use a real router with a real EtherSwitch module. In this blog I will show how it is done.

For instructor-led training, check out our complete Cisco CCNA Certification schedule.

I will be using a 2811 router with a 16-port module (NME-16ES-1G-P). Both are completely erased as if I just bought them on Ebay. First I will connect my console cable to the console port and tap the ‘Enter’ key to wake it up. Then I will issue the ‘enable’ command to get to privileged exec mode. Now let’s see some of the nitty gritty details. Let’s check to see on which port the router can ‘see’ the switch module:


Figure 1

This shows me that my router can see the switch module on local interface G1/0. The command to access the EtherSwitch module is shown in Figure 2:


Figure 2

Clearly, in order to be able to access the module, I need to note the error I received when I typed the command a little early. I need to configure a valid IP address in G1/0 before I will be able to reach the switch. I will assign an IP address of with a 24 bit mask on that interface and bring it up. See figure 3:


Figure 3

Now that the interface on the router is properly configured, let’s try again to reach the switch:


Figure 4

Technically I am still consoled into my router, but I can get to my switch, as shown in figure 4. I can get to privileged exec mode and type ‘show run’ as well as configure or anything else a network admin would like to do on this switch. To get back to my originating device (my 2811), I use the three-finger keystroke combination of Ctrl-Shift-6 all at the same time, then I release and quickly hit ‘x’ to get back. Let’s try that:


Figure 5

To verify the session is still active, I use ‘show sessions’ or ‘where.’ Note the result in figure 6:


Figure 6

If I wish to resume that active session, I can type resume {#} where the number in brackets is the connection number, which, as seen in figure 6, is my only connection, and its number is 1. Let’s see what that looks like:


Figure 7

There it is. A bit more involved than an EtherSwitch nodule in GNS3, but who said real life would be easy?!

I hope you found this to be useful information, and if you have comments or suggestions for future blogs, don’t be shy at all.

Mark Jacob
Cisco and CompTIA Network + Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

Cable Testers and How to Use them in Network Environments

0 217 0

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader demonstrates how to use cable testers in network environments. Let’s look at some tools that we can use to test our different cables in our environment. Cable Testers Properly Wired Connectivity … Continue reading Cable Testers and How to Use them in Network Environments

JavaScript for C# Developers – September 24, 2014

0 487 3

Is JavaScript worth taking the time to learn if I’m a server-side .NET developer? How much of C# carries over to JavaScript? In this recorded video from Dan Wahlin’s webinar on September 24,2014, Dan answers these questions and more while also discussing similarities between the languages, key differences, and the future of JavaScript (ES6). If … Continue reading JavaScript for C# Developers – September 24, 2014

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 630 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

See what people are saying...

    Share your thoughts...

    Please fill out the comment form below to post a reply.