Index Symbols
!Mini Protocol Analyzer 66-1
Numerics
4K VLANs (support for 4,096 VLANs) 14-2
802.10 SAID (default) 14-6
802.1Q
encapsulation 10-3
Layer 2 protocol tunneling
See Layer 2 protocol tunneling
mapping to ISL VLANs 14-14, 14-17
trunks 10-2
restrictions 10-5
tunneling 17-1
configuration guidelines 17-3
configuring tunnel ports 17-6
802.1Q Ethertype, specifying custom 10-15
802.1X
See port-based authentication
802.3ad
See LACP
802.3X Flow Control 8-12
A
AAA 35-1, 36-1, 43-1
access control entries and lists 35-1, 36-1, 43-1
access-enable host timeout (not supported) 36-2
access interface (IP subscriber) 24-3
access lists, using with WCCP 60-10
access port, configuring 10-13
ACEs and ACLs 35-1, 36-1, 43-1
acronyms, list of A-1, B-1
addresses
IP, see IP addresses
MAC, see MAC addresses
advertisements, VTP 13-3
aggregate label 26-2, 26-4
aggregate policing
see QoS policing
aging time
IP MLS 56-20
maximum
for MSTP 20-47
MSTP accelerated 20-46
MSTP maximum 20-47
alarms
major 59-12
minor 59-12
Allow DHCP Option 82 on Untrusted Port
configuring 44-10
understanding 44-3
any transport over MPLS (AToM) 26-18
compatibility with previous releases of AToM 26-20
Ethernet over MPLS 26-24
ARP spoofing 45-1
AToM 26-18
authentication
See also port-based authentication
Authentication, Authorization, and Accounting
See AAA
Authentication, Authorization, and Accounting (AAA) 43-1
authorized ports with 802.1X 52-4
auto-sync command 7-6
B
BackboneFast
See STP BackboneFast
backup interfaces
See Flex Links
bandwidth-remaining ratio (BRR), IP subscriber 24-5, 24-21, 24-23
binding database, DHCP snooping
See DHCP snooping binding database
binding database, DHCP snooping
See DHCP snooping binding database
blocking floods 47-1
blocking state, STP 20-7
boot bootldr command 2-19
boot command 2-16
boot config command 2-19
boot system command 2-15, 2-19
boot system flash command 2-16
BPDU, RSTP format 20-15
BPDU guard
See STP BPDU guard
Bridge Domain 57-29
Bridged Routed Encapsulation within an Automatic Protection Switching Group 14-8
bridge groups 22-2
bridge ID
See STP bridge ID
bridge priority, STP 20-33
bridge protocol data units
see BPDUs
bridging 22-1
broadcast storms
see traffic-storm control
C
cache engine clusters 60-1
cache engines 60-1
cache farms
See cache engine clusters
Call Home
description 64-1
message format options 64-1
messages
format options 64-1
call home 64-1
alert groups 64-6
configuring e-mail options 64-9
contact information 64-3
default settings 64-18
destination profiles 64-4
displaying information 64-14
mail-server priority 64-10
pattern matching 64-9
periodic notification 64-8
rate limit messages 64-9
severity threshold 64-8
smart call home feature 64-2
SMTP server 64-9
testing communications 64-10
call home alert groups
configuring 64-6
description 64-6
subscribing 64-6
call home contacts
assigning information 64-3
call home destination profiles
attributes 64-4
configuring 64-5
description 64-4
displaying 64-16
call home notifications
full-txt format for syslog 64-28
XML format for syslog 64-29
cautions for passwords
encrypting 2-11
TACACS+ 2-10
CEF
configuring
MSFC2 29-5
supervisor engine 29-4
examples 29-3
Layer 3 switching 29-2
packet rewrite 29-2
certificate authority (CA) 64-3
CGMP 33-8
channel-group group
command 12-9, 12-12
command example 12-9
checking running configuration 2-4
Cisco Cache Engines 60-2
Cisco Express Forwarding 26-3
Cisco Group Management Protocol
See CGMP
Cisco IOS Release 12.2SRB software images C-1
Cisco IOS Unicast Reverse Path Forwarding 35-2
CiscoView 1-2
CIST regional root
See MSTP
CIST root
See MSTP
class command 48-62
classification (QoS) 48-107
class-map command 48-54
class map configuration 48-59
class of service (CoS) 48-107
Committed Access Rate (CAR), not supported 48-2
community ports 15-3
community VLANs 15-2, 15-3
Concurrent routing and bridging (CRB) 22-1
CONFIG_FILE environment variable
configuration file, viewing 2-20
description 2-19
config-register command 2-16, 2-17
config terminal command 2-3
configuration
file, saving 2-5
register
changing settings 2-16 to 2-17
configuration 2-14 to 2-17
settings at startup 2-15
configuration example
EoMPLS port mode 26-25, 26-27
EoMPLS VLAN mode 26-25
configuration register boot field
listing value 2-17
modification tasks 2-16
configure command 2-3
configure terminal command 2-16, 8-2
configuring 48-61
global parameters
sample configuration 2-2
using configuration mode 2-3 to 2-4
Configuring GTP-SLB IPv6 Support 23-4
contact information
assigning for call home 64-3
control plane policing
See CoPP
control plane policing and protection (CoPP)
per-subscriber 24-4
CoPP
applying QoS service policy to control plane 43-31
configuring
ACLs to match traffic 43-31
enabling MLS QoS 43-31
packet classification criteria 43-31
service-policy map 43-31
control plane configuration mode, entering 43-31
displaying
dynamic information 43-33
number of conforming bytes and packets 43-33
rate information 43-33
entering control plane configuration mode 43-31
monitoring statistics 43-33
overview 43-29
packet classification guidelines 43-32
traffic classification
defining 43-38
guidelines 43-39
overview 43-38
sample ACLs 43-39
sample classes 43-38
CoPP. See control plane policing and protection (CoPP)
copy running-config startup-config command 2-5
copy system
running-config nvram
startup-config command 2-19
CoS, override priority 16-7, 16-8
D
data gleaning 41-4
dCEF 29-4, 29-5
debug commands
IP MMLS 31-25
debug fm private-hosts command 39-31
debug private-hosts command 39-32
DEC spanning-tree protocol 22-2
default configuration
802.1X 52-6
dynamic ARP inspection 45-5
Flex Links 11-2
IP MMLS 31-7
LLDP 17-9
MSTP 20-37
supervisor engine 2-1
UDLD 55-3
voice VLAN 16-4
VTP 13-6
default NDE configuration 56-14
default VLAN 10-10
deficit weighted round robin 48-94
denial of service protection
See DoS protection
description command 8-14
destination-ip flow mask 56-3
destination-source-ip flow mask 56-3
device IDs
call home format 64-25
DHCP binding database
See DHCP snooping binding database
DHCP binding table
See DHCP snooping binding database
DHCP option 82
circuit ID suboption 44-5
overview 44-3
packet format, suboption
circuit ID 44-5
remote ID 44-5
remote ID suboption 44-5
DHCP option 82 allow on untrusted port 44-10
DHCP snooping
binding database
See DHCP snooping binding database
configuration guidelines 44-6
configuring 44-8
default configuration 44-6
displaying binding tables 44-18
enabling 44-9, 44-10, 44-11, 44-13
enabling the database agent 44-14
message exchange process 44-4
option 82 data insertion 44-3
overview 44-1
Snooping database agent 44-5
DHCP snooping binding database
described 44-2
entries 44-2
DHCP snooping binding table
See DHCP snooping binding database
DHCP Snooping Database Agent
adding to the database (example) 44-17
enabling (example) 44-15
overview 44-5
reading from a TFTP file (example) 44-16
DHCP snooping increased bindings limit 44-7, 44-15
differentiated services codepoint
See QoS DSCP
Differentiated Services Code Point (DSCP) 48-107
DiffServ
configuring short pipe mode 50-34
configuring uniform mode 50-39
short pipe mode 50-31
uniform mode 50-32
DiffServ tunneling modes 50-4
Disabling PIM Snooping Designated Router Flooding 34-5
distributed Cisco Express Forwarding
See dCEF
documentation, related 1-lxi
document organization 1-lvii
DoS protection
monitoring packet drop statistics
using monitor session commands 43-24
using VACL capture 43-25
PFC configuration guidelines and restrictions 43-23
Supervisor Engine 720 43-10
default configurations 43-22
egress ACL bridget packet rate limiters 43-16
FIB glean rate limiters 43-18
FIB receive rate limiters 43-18
ICMP redirect rate limiters 43-18
IGMP unreachable rate limiters 43-17
ingress ACL bridget packet rate limiters 43-16
IP errors rate limiters 43-20
IPv4 multicast rate limiters 43-20
IPv6 multicast rate limiters 43-21
Layer 2 PDU rate limiters 43-19
Layer 2 protocol tunneling rate limiters 43-19
MTU failure rate limiters 43-19
multicast directyly connected rate limiters 43-20
multicast FIB miss rate limiters 43-20
multicast IGMP snooping rate limiters 43-19
network under SYN attack 43-13
QoS ACLs 43-12
security ACLs 43-11
TCP intercept 43-13
traffic storm control 43-13
TTL failure rate limiter 43-17
uRPF check 43-12
uRPF failure rate limiters 43-17
VACL log rate limiters 43-19
Supervisor Engine 720Layer 3 security features rate limiters 43-18
DSCP
See QoS DSCP
DSCP-based queue mapping 48-86
dual-priority queues
IP subscriber 24-5, 24-25
duplex command 8-7
duplex mode
configuring interface 8-5
DWRR 48-94
dynamic ARP inspection
ARP cache poisoning 45-2
ARP requests, described 45-1
ARP spoofing attack 45-2
clearing
log buffer 45-16
statistics 45-16
configuration guidelines 45-5
configuring
log buffer 45-13, 45-14
logging system messages 45-14
rate limit for incoming ARP packets 45-4, 45-9
default configuration 45-5
denial-of-service attacks, preventing 45-9
described 45-1
DHCP snooping binding database 45-3
displaying
ARP ACLs 45-15
configuration and operating state 45-15
log buffer 45-16
statistics 45-16
trust state and rate limit 45-15
error-disabled state for exceeding rate limit 45-4
function of 45-2
interface trust states 45-3
log buffer
clearing 45-16
configuring 45-13, 45-14
displaying 45-16
logging of dropped packets, described 45-4
logging system messages
configuring 45-14
man-in-the middle attack, described 45-2
network security issues and interface trust states 45-3
priority of ARP ACLs and DHCP snooping entries 45-4
rate limiting of ARP packets
configuring 45-9
described 45-4
error-disabled state 45-4
statistics
clearing 45-16
displaying 45-16
validation checks, performing 45-11
Dynamic Host Configuration Protocol snooping
See DHCP snooping
E
eFSU. See enhanced Fast Software Upgrade (eFSU)
Egress ACL support for remarked DSCP 48-12
egress ACL support for remarked DSCP 48-50
egress replication performance improvement 31-13
e-mail addresses
assigning for call home 64-3
e-mail notifications
Call Home 64-1
Embedded CiscoView 1-2
enable command 2-3, 2-16
enable sticky secure MAC address 54-8
enabling
IP MMLS
on router interfaces 31-11
encapsulation 10-3
encapsulation frame-relay ietf command 57-38
enhanced Fast Software Upgrade (eFSU)
aborting (issu abortversion command) 6-19
accepting the new software version 6-17
commiting the new software to standby RP (issu commitversion command) 6-17
disabling compatibility matrix check 6-10
displaying maximum outage time for line cards 6-14
error handling 6-4
forcing a switchover (issu runversion command) 6-14
issu loadversion command 6-12
loading new software onto standby RP 6-12
memory reservation on line card 6-3
memory reservation on line card, prohibiting 6-3
OIR not supported 6-7
operation 6-2
outage times 6-3
overview 6-1
performing 6-8
SSO, RPR, and RPR+ modes 6-7
steps 6-8
usage guidelines and limitations 6-7
verifying redundancy mode 6-10
enhanced interface range command 8-3
environmental monitoring
LED indications 59-12
SNMP traps 59-12
supervisor engine and switching modules 59-12
Syslog messages 59-12
using CLI commands 59-10
environment variables
CONFIG_FILE 2-19
controlling 2-19
viewing 2-19
EoMPLS 26-18
configuring 26-23
configuring VLAN mode 26-24
guidelines and restrictions 26-19
port mode 26-24
port mode configuration guidelines 26-27
VLAN mode 26-24
erase startup-config command
configuration files cleared with 2-6
ERSPAN 57-1
ERSPAN on EVC 57-29
EtherChannel
channel-group group
command 12-9, 12-12
command example 12-9
configuration guidelines 12-5
configuring
Layer 2 12-8
configuring (tasks) 12-7
interface port-channel
command example 12-8
interface port-channel (command) 12-8
lacp system-priority
command example 12-11
Layer 2, configuring 12-8
load balancing
configuring 12-11
understanding 12-5
modes 12-2
PAgP, understanding 12-3
port-channel interfaces 12-5
port-channel load-balance
command 12-10, 12-11
command example 12-11
STP 12-5
switchport trunk encapsulation dot1q 12-6
understanding 12-1
EtherChannel Guard
See STP EtherChannel Guard
EtherChannel Min-Links 12-12
Ethernet, setting port duplex 8-13
Ethernet over MPLS (EoMPLS) configuration
EoMPLS port mode 26-27
EoMPLS VLAN mode 26-24
EVC 57-29
examples
software configuration register 2-14 to 2-17
EXP mutation 50-4
extended range VLANs 14-2
See VLANs
extended system ID, MSTP 20-40
Extensible Authentication Protocol over LAN 52-1
Extranet MVPN Architecture 28-1
F
fabric switching mode
See switch fabric module
fabric switching-mode allow dcef-only command on Supervisor Engine 720 5-2, 7-4
fall-back bridging 22-2
fiber-optic, detecting unidirectional links 55-1
FIB TCAM 26-3
filters, NDE
destination host filter, specifying 56-28
destination TCP/UDP port, specifying 56-27
overview 56-7
protocol 56-28
source host and destination TCP/UDP port 56-27
Flash memory
configuration process 2-18
configuring router to boot from 2-18
loading system image from 2-18
security precautions 2-18
write protection 2-18
Flex Links 11-1
configuration guidelines 11-2
configuring 11-3
default configuration 11-2
description 11-1
monitoring 11-3
flood blocking 47-1
flow control 8-12
flow masks
IP MLS
destination-ip 56-3
destination-source-ip 56-3
interface-destination-source-ip 56-3
ip-full 56-3
ip-interface-full 56-3
minimum 56-19
overview 56-3
flowmasks
NetFlow (Release 12.2SRA) 56-3
NetFlow (Release 12.2SRB) 56-3
flows
IP MMLS
completely and partially switched 31-3
forward-delay time
MSTP 20-46
forward-delay time, MSTP 20-46
forward-delay time, STP 20-35
frame distribution
See EtherChannel load balancing
G
global parameters, configuring 2-2
GTP-SLB Support for IPv6 23-1
H
hardware Layer 3 switching, guidelines 29-4
hello time, MSTP 20-45
hello time, STP 20-34
High Capacity Power Supply Support 59-4
host ports 15-3
http
//www.cisco.com/en/US/docs/ios/qos/command/reference/qos_book.html 4-5
//www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html 40-8, 57-39, 57-42
I
ICMP unreachable messages 36-1
IDs
serial IDs 64-25
IEEE 802.10 SAID (default) 14-6
IEEE 802.1Q
See 802.1Q
IEEE 802.1Q Ethertype
specifying custom 10-15
IEEE 802.1w
See RSTP
IEEE 802.3ad
See LACP
IEEE 802.3X Flow Control 8-12
IEEE bridging protocol 22-2
IGMP
configuration guidelines 32-7, 33-7
enabling 33-10
Internet Group Management Protocol 33-1
join messages 33-2
leave processing
enabling 33-12
queries 33-3
query interval, configuring 33-11
snooping
fast leave 33-5
joining multicast group 33-2
leaving multicast group 33-4
understanding 33-2
snooping querier
enabling 33-9
understanding 33-2
IGMPv3 31-9
IGMP v3lite 31-9
In Service Software Upgrade (ISSU) 6-1
Integrated routing and bridging (IRB) 22-1
interface
command 2-3
Layer 2 modes 10-4
number 8-1
interface, access (IP subscriber) 24-3
interface access command 24-33
interface-destination-source-ip flow mask 56-3
interface port-channel
command example 12-8
interface port-channel (command) 12-8
interfaces
configuring 8-2
configuring, duplex mode 8-5
configuring, speed 8-5
configururing, overview 8-1
descriptive name, adding 8-14
naming 8-14
range of 8-3
interfaces command 8-2
interfaces range command 8-3
interfaces range macro command 8-4
Internet Group Management Protocol
See IGMP
IP accounting, IP MMLS and 31-8
IP addresses
assigned by BOOTP protocol 2-6
set to default 2-6
IP CEF, topology (figure) 29-3
ip flow-export destination command 56-24
ip flow-export source command 56-23, 56-25, 61-2, 61-3, 61-4
ip-full flow mask 56-3
ip http server 1-1
ip-interface-full flow mask 56-3
IP MLS
aging-time 56-20
flow masks
destination-ip 56-3
destination-source-ip 56-3
interface-destination-source-ip 56-3
ip-full 56-3
ip-interface-full 56-3
minimum 56-19
overview 56-3
NDE
See NDE
IP MMLS
cache, overview 31-2
configuration guideline 31-7
debug commands 31-25
default configuration 31-7
enabling
on router interfaces 31-11
flows
completely and partially switched 31-3
Layer 3 MLS cache 31-2
overview 31-2
packet rewrite 31-3
router
displaying interface information 31-17
enabling globally 31-9
enabling on interfaces 31-11
multicast routing table, displaying 31-20
PIM, enabling 31-10
unsupported features 31-8
IP multicast
IGMP snooping and 33-9
MLDv2 snooping and 32-9
overview 33-1
IP multicast MLS
See IP MMLS
ip multicast-routing command
enabling IP multicast 31-10
IP phone, configuring 16-5
ip pim command
enabling IP PIM 31-10
IP precedence 48-108
IP static routes 2-5
IP subscriber awareness
benefits 24-2
configuration example 24-30
configuration guidelines 24-27
configuring 24-28, 24-29
control plane policing and protection (CoPP) 24-4
interface access command 24-33
IP subscriber interface 24-3
IP subscriber session 24-3
lawful intercept 24-4
overview 24-1
per-subscriber features 24-4
QoS 24-4
bandwidth-remaining ratio (BRR) 24-5, 24-21, 24-23
dual-priority queues 24-5, 24-25
priority-rate propagation 24-5, 24-25, 24-26
QoS recommendations 24-20
Radius accounting 24-4
security ACLs 24-4
unsupported features 24-26
IP unnumbered 22-1
IPv4 Multicast over Point-to-Point GRE Tunnels 1-4
IPv4 Multicast VPN 27-1
IPv6 Multicast PFC3 and DFC3 Layer 3 Switching 30-1
IPv6 Prefix Guard 41-3
IPv6 Source Guard 41-2
ip wccp version command 60-8
ISL encapsulation 10-3
ISL trunks 10-2
isolated port 15-3
isolated VLANs 15-2, 15-3
ISSU, See In Service Software Upgrade (ISSU)
J
join messages, IGMP 33-2
jumbo frames 8-8
L
label edge router 26-2
label switched path 26-23
label switch router 26-2, 26-3
LACP
system ID 12-4
LACP over EVC Port Channel
Verification 23-13
LACP over EVC port channel
configuration commands, configuration steps 18-6, 23-5, 23-8, 68-6, 68-8, 68-9, 68-11
Examples 23-12
lawful intercept, per-subscriber 24-4
Layer 2
configuring interfaces 10-6
access port 10-13
trunk 10-7
defaults 10-5
interface modes 10-4
show interfaces 8-11, 10-7, 10-12
switching 10-1
trunks 10-2
VLAN interface assignment 14-13
Layer 2 interfaces, configuring 10-1
Layer 2 protocol tunneling
configuring Layer 2 tunnels 18-2
overview 18-1
Layer 2 remarking 48-14
Layer 2 Traceroute 62-1
Layer 2 traceroute
and ARP 62-2
and CDP 62-1
described 62-1
IP addresses and subnets 62-2
MAC addresses and VLANs 62-2
multicast traffic 62-2
multiple devices on a port 62-2
unicast traffic 62-1
usage guidelines 62-1
Layer 3
IP MMLS and MLS cache 31-2
Layer 3 switched packet rewrite
CEF 29-2
Layer 3 switching
CEF 29-2
Layer 4 port operations (ACLs) 36-5
leave processing, IGMP
enabling 33-12
leave processing, MLDv2
enabling 32-12
LERs 50-2, 50-6, 50-7
link failure, detecting unidirectional 20-24
link negotiation 8-7
link redundancy
See Flex Links
LLDP
configuring
default configuration 17-9
Load Balancing 26-8
Local Egress Replication 31-13
logical operation unit
See LOU
loop guard
See STP loop guard
LOU
description 36-6
determining maximum number of 36-6
LSRs 50-2, 50-6
M
MAC address
adding to BOOTP configuration file 2-6
MAC address-based blocking 35-1
MAC move (port security) 54-2
macro, interfaces range 8-4
main-cpu command 7-6
mapping 802.1Q VLANs to ISL VLANs 14-14, 14-17
markdown
see QoS markdown
maximum aging time, MSTP 20-47
maximum aging time, STP 20-35
maximum hop count, MSTP 20-47
microflow policing rule
see QoS policing
Min-Links 12-12
MLD report 32-4
MLD snooping
query interval, configuring 32-11
MLDv2 32-1
enabling 32-9
leave processing
enabling 32-12
queries 32-4
snooping
fast leave 32-6
joining multicast group 32-4
leaving multicast group 32-6
understanding 32-1
snooping querier
enabling 32-8
understanding 32-1
MLDv2 Snooping 32-1
MLS
configuring threshold 31-14
MSFC threshold 31-14
mls aging command
configuring IP MLS 56-21
mls flow command
configuring IP MLS 56-19, 56-20
mls ip multicast command
enabling IP MMLS 31-11, 31-12, 31-14, 31-15, 31-16, 31-22, 31-23
mls nde flow command
configuring a host and port filter 56-27
configuring a host flow filter 56-28
configuring a port filter 56-27
configuring a protocol flow filter 56-28
mls nde sender command 56-21
monitoring
Flex Links 11-3
private VLANs 15-16
MPLS 26-2
aggregate label 26-2
any transport over MPLS 26-18
basic configuration 26-8
core 26-3
DiffServ Tunneling Modes 50-31
egress 26-4
experimental field 50-3
guidelines and restrictions 26-7
ingress 26-3
IP to MPLS path 26-3
labels 26-2
Layer 2 VPN load balancing 26-8
MPLS to IP path 26-4
MPLS to MPLS path 26-3
nonaggregate lable 26-2
QoS default configuration 50-15
VPN 50-12
VPN guidelines and restrictions 26-15
mpls l2 transport route command 26-20
MPLS QoS
Classification 50-2
Class of Service 50-2
commands 50-16
configuring a class map 50-20
configuring a policy map 50-23
configuring egress EXP mutation 50-28
configuring EXP Value Maps 50-30
Differentiated Services Code Point 50-2
displaying a policy map 50-27
E-LSP 50-2
enabling QoS globally 50-18
EXP bits 50-2
features 50-3
IP Precedence 50-2
QoS Tags 50-2
queueing-only mode 50-19
MPLS QoS configuration
class map to classify MPLS packets 50-20
MPLS VPN, limitations and restrictions 26-15
MQC 48-1
not supported
CAR 48-2
queuing 48-2
supported
policy maps 48-3
MSTP
boundary ports
configuration guidelines 20-38
described 20-22
CIST, described 20-19
CIST regional root 20-20
CIST root 20-21
configuration guidelines 20-37
configuring
forward-delay time 20-46
link type for rapid convergence 20-47
maximum aging time 20-47
maximum hop count 20-47
MST region 20-38
neighbor type 20-48
path cost 20-43
port priority 20-42
root switch 20-40
secondary root switch 20-41
switch priority 20-44
configuring hello time 20-45
CST
defined 20-19
operations between regions 20-20
default configuration 20-37
displaying status 20-49
enabling the mode 20-38
extended system ID
effects on root switch 20-40
effects on secondary root switch 20-41
unexpected behavior 20-40
IEEE 802.1s
implementation 20-23
port role naming change 20-23
terminology 20-21
interoperability with IEEE 802.1D
described 20-25
restarting migration process 20-49
IST
defined 20-19
master 20-20
operations within a region 20-20
mapping VLANs to MST instance 20-39
MST region
CIST 20-19
configuring 20-38
described 20-18
hop-count mechanism 20-22
IST 20-19
supported spanning-tree instances 20-19
overview 20-17
root switch
configuring 20-40
effects of extended system ID 20-40
unexpected behavior 20-40
status, displaying 20-49
MTU size (default) 14-6
multicast
IGMP snooping and 33-9
MLDv2 snooping and 32-9
NetFlow statistics 56-14
non-RPF 31-5
overview 33-1
PIM snooping 34-3
multicast, displaying routing table 31-20
Multicast enhancement - egress replication performance improvement 31-13
Multicast Enhancement - Replication Mode Detection 31-11
multicast flood blocking 47-1
multicast groups
joining 33-2
leaving 32-6, 33-4
multicast groups, IPv6
joining 32-4
Multicast Listener Discovery version 2
See MLDv2
multicast multilayer switching
See IPv4 MMLS
Multicast Replication Mode Detection enhancement 31-11
multicast RPF 31-2
multicast storms
see traffic-storm control
Multicast VPN 28-1
multilayer switch feature card
see MSFC
multiple path RPF check 35-2
N
native VLAN 10-10
NBAR 48-1
NDE
configuration, displaying 56-29
displaying configuration 56-29
enabling 56-15
filters
destination host, specifying 56-28
destination TCP/UDP port, specifying 56-27
overview 56-7
protocol, specifying 56-28
source host and destination TCP/UDP port, specifying 56-27
multicast 56-14
overview 56-1
specifying
destination host filters 56-28
destination TCP/UDP port filters 56-27
protocol filters 56-28
NDE configuration, default 56-14
NDE version 8 56-10
NetFlow and NDE for Ingress Bridged IP Traffic 56-24
NetFlow Data Export
See NDE
Netflow Multiple Export Destinations 56-24
NetFlow version 9 56-3
Network-Based Application Recognition 48-1
nonaggregate label 26-2, 26-4
non-RPF multicast 31-5
Nonstop Forwarding
See NSF
nonvolatile random-access memory
See NVRAM
normal-range VLANs
See VLANs
NSF 5-1
NSF with SSO does not support IPv6 multicast traffic. 5-1
NVRAM
saving settings 2-5
O
OIR 8-14
online diagnostics
configuring 42-2
diagnostic sanity check 42-11
memory tests 42-10
overview 42-1
running tests 42-6
schedule switchover 42-10
test descriptions A-1
understanding 42-1
online diagnostic tests A-1
online insertion and removal
See OIR
operating system image
See system image
out of profile
see QoS out of profile
P
packet burst 43-16
packet capture 66-1
packet recirculation 48-12
packet rewrite
CEF 29-2
IP MMLS and 31-3
packets
multicast 38-3
PACLs. See private hosts feature
PAgP
understanding 12-3
passwords
configuring
enable password 2-9
enable secret 2-9
line password 2-9
static enable password 2-8
TACACS+ 2-10
TACACS+ (caution) 2-10
encrypting 2-10
(caution) 2-11
recovering lost enable passwords 2-13
path cost
MSTP 20-43
PBR 1-4, 22-4
PFC3BXL
hardware features 26-4
MPLS guidelines and restrictions 26-7
MPLS label switching 26-1
MPLS supported commands 26-7
recirculation 26-4
supported Cisco IOS features 26-5
VPN supported commands 26-16
VPN switching 26-14
PFC compatibility with RSP720 4-1
PIM, IP MMLS and 31-10
PIM snooping
designated router flooding 34-5
enabling globally 34-4
enabling in a VLAN 34-5
overview 34-3
police command 48-65
policing
See QoS policing
policing, QoS (definition) 48-108
policy 48-54
policy-based routing
See PBR
policy map 48-61
attaching to an interface 48-68
policy-map command 48-54, 48-62
Port Aggregation Protocol
see PAgP
port-based ACLs (PACLs). See private hosts feature
port-based authentication
authentication server
defined 52-2
RADIUS server 52-2
client, defined 52-2
configuration guidelines 52-7
configuring
initializing authentication of a client 52-12
manual reauthentication of a client 52-11
quiet period 52-12
RADIUS server 52-10
RADIUS server parameters on the switch 52-9
switch-to-authentication-server retransmission time 52-14
switch-to-client EAP-request frame retransmission time 52-14
switch-to-client frame-retransmission number 52-15
switch-to-client retransmission time 52-13
default configuration 52-6
described 52-1
device roles 52-2
displaying statistics 52-17
EAPOL-start frame 52-3
EAP-request/identity frame 52-3
EAP-response/identity frame 52-3
enabling
802.1X authentication 52-8, 52-9
periodic reauthentication 52-11
encapsulation 52-2
initiation and message exchange 52-3
method lists 52-8
ports
authorization state and dot1x port-control command 52-4
authorized and unauthorized 52-4
resetting to default values 52-16
switch
as proxy 52-2
RADIUS client 52-2
topologies, supported 52-5
port-based QoS features
see QoS
port channel
switchport trunk encapsulation dot1q 12-6
port-channel
see EtherChannel
port-channel load-balance
command 12-10, 12-11
command example 12-11
port cost, STP 20-32
port debounce timer 8-13
PortFast
See STP PortFast
PortFast BPDU filtering
See STP PortFast BPDU filtering
port mode 26-24
port negotiation 8-7
port priority
MSTP 20-42
port priority, STP 20-30
ports
setting the debounce timer 8-13
port security
aging 54-9, 54-10
configuring 54-4
default configuration 54-3
described 54-1
displaying 54-11
enable sticky secure MAC address 54-8
violations 54-2
Port Security is supported on trunks 54-4, 54-7, 54-9
port security MAC move 54-2
port security on PVLAN ports 54-3
Port Security with Sticky Secure MAC Addresses 54-2
power management
enabling/disabling redundancy 59-2
overview 59-1
powering modules up or down 59-3
system power requirements, nine-slot chassis 59-5
primary links 11-1
primary VLANs 15-2
priority
overriding CoS 16-7, 16-8
priority-rate propagation, IP subscriber 24-5, 24-25, 24-26
private-hosts command 39-14
private hosts feature
command reference 39-13
configuration guidelines 39-5, 39-6
configuring (detailed steps) 39-10
configuring (summary) 39-9
debug fm private-hosts command 39-31
debug private-hosts command 39-32
isolating hosts in a VLAN 39-2
multicast operation 39-9
overview 39-1
port ACLs (PACLs) 39-4
port types 39-3
private-hosts command 39-14
private-hosts mac-list command 39-15
private-hosts mode command 39-17
private-hosts promiscuous command 39-19
private-hosts vlan-list command 39-21
protocol-independent MAC ACLs 39-1
restricting traffic flow with PACLs 39-3
show fm private-hosts command 39-23
show private-hosts access-lists command 39-26
show private-hosts configuration command 39-28
show private-hosts interface configuration command 39-29
show private-hosts mac-list command 39-30
spoofing protection 39-9
private-hosts mac-list command 39-15
private-hosts mode command 39-17
private-hosts promiscuous command 39-19
private-hosts vlan-list command 39-21
private VLANs 15-1
across multiple switches 15-5
and SVIs 15-6
benefits of 15-2
community VLANs 15-2, 15-3
configuration guidelines 15-7, 15-9, 15-11
configuring 15-11
host ports 15-14
pomiscuous ports 15-15
routing secondary VLAN ingress traffic 15-13
secondary VLANs with primary VLANs 15-12
VLANs as private 15-11
end station access to 15-4
IP addressing 15-4
isolated VLANs 15-2, 15-3
monitoring 15-16
ports
community 15-3
configuration guidelines 15-9
isolated 15-3
promiscuous 15-3
primary VLANs 15-2
secondary VLANs 15-2
subdomains 15-2
traffic in 15-6
privileges
changing default 2-12
configuring
multiple levels 2-11
privilege level 2-11
exiting 2-12
logging in 2-12
procedures
global parameters, configuring 2-2
using configuration mode 2-3 to 2-4
promiscuous ports 15-3
protocol tunneling
See Layer 2 protocol tunneling 18-1
pruning, VTP
See VTP, pruning
PVLANs
See private VLANs
PVRST
See Rapid-PVST 20-17
Q
QoS
class of service (CoS), definition 48-107
DSCP (definition) 48-107
IP precedence 48-108
marking 48-108
policing 48-108
Type of Service (ToS) 48-108
QoS, per-subscriber 24-4
QoS classification (definition)
QoS
classification 48-107
QoS congestion avoidance
QoS
congestion avoidance 48-107
QoS CoS
and ToS final L3 Switching Engine values 48-11
and ToS final values from L3 Switching Engine 48-11
port value, configuring 48-79
QoS default configuration 48-97, 49-2
QoS DSCP
definition 48-107
internal values 48-9
maps, configuring 48-74
QoS dual transmit queue
thresholds
configuring 48-79, 48-84
QoS enhancements, RSP720 4-4
QoS Ethernet egress port
scheduling 48-97
scheduling, congestion avoidance, and marking 48-11, 48-13
QoS Ethernet ingress port
classification, marking, scheduling, and congestion avoidance 48-6
QoS final L3 Switching Engine CoS and ToS values 48-11
QoS internal DSCP values 48-9
QoS L3 Switching Engine
classification, marking, and policing 48-9
feature summary 48-15
QoS labels (definition) 48-108
QoS mapping
CoS values to DSCP values 48-71, 48-74
DSCP markdown values 48-27, 48-75, 50-16
DSCP mutation 48-70, 50-29
DSCP values to CoS values 48-77
IP precedence values to DSCP values 48-75
QoS markdown 48-20
QoS marking
definition 48-108
trusted ports 48-14
untrusted ports 48-14
QoS MSFC
marking 48-17
QoS multilayer switch feature card 48-17
QoS OSM egress port
feature summary 48-13
QoS out of profile 48-19
QoS policing
definition 48-108
microflow, enabling for nonrouted traffic 48-48
QoS policing rule
aggregate 48-17
creating 48-53
microflow 48-17
QoS port
trust state 48-77
QoS port-based or VLAN-based 48-49
QoS queues
transmit, allocating bandwidth between 48-94
QoS receive queue 48-8, 48-90, 48-92
drop thresholds 48-22
QoS scheduling (definition) 48-108
QoS statistics data export 49-1
configuring 49-2
configuring destination host 49-7
configuring time interval 49-6, 49-9
QoS ToS
and CoS final values from L3 Switching Engine 48-11
definition 48-108
QoS traffic flow through QoS features 48-4
QoS transmit queue
size ratio 48-95, 48-96
QoS transmit queues 48-23, 48-87, 48-88, 48-91
QoS trust-cos
port keyword 48-14, 48-15
QoS trust-dscp
port keyword 48-14, 48-15
QoS trust-ipprec
port keyword 48-14, 48-15
QoS untrusted port keyword 48-14, 48-15
QoS VLAN-based or port-based 48-10, 48-49
queries, IGMP 33-3
queries, MLDv2 32-4
queues
dual-priority (IP subscriber) 24-5, 24-25
R
Radius accounting, per-subscriber 24-4
rapid convergence 20-13
Rapid-PVST
enabling 20-36
overview 20-17
Rapid Spanning Tree
See RSTP
Rapid Spanning Tree Protocol
See RSTP
receive queues
see QoS receive queues
recirculation 26-4, 48-12
reduced MAC address 20-2
redundancy (NSF) 5-1
configuring
BGP 5-13
CEF 5-13
EIGRP 5-18
IS-IS 5-15
OSPF 5-14
configuring multicast NSF with SSO 5-12
configuring supervisor engine 5-10
routing protocols 5-4
redundancy (RPR+) 7-1
configuring 7-6
configuring supervisor engine 7-5
displaying supervisor engine configuration 7-7
redundancy command 7-6
route processor redundancy plus 7-3
redundancy (SSO)
redundancy command 5-11
related documentation 1-lxi
reload command 2-16, 2-17
Remote source-route bridging (RSRB) 22-1
Replication Mode Detection 31-11
report, MLD 32-4
reserved-range VLANs
See VLANs
rewrite, packet
CEF 29-2
IP MMLS 31-3
RIF cache monitoring 8-15
rommon command 2-17
ROM monitor
boot process and 2-14
root bridge, STP 20-28
root guard
See STP root guard
root switch
MSTP 20-40
route processor redundancy
See redundancy (RPR+)
Route Switch Processor 720 (RSP720)
chassis support 4-1
feature support 4-2
flash memory 4-6
hardware components 4-2
high availability 4-3
IPv6 ACL enhancements 4-3
load balancing on GE bundles 4-4
overview 4-1
packet fragmentation over GRE tunnels 4-4
performance improvements 4-2
PFC compatibility 4-1
ports 4-6
QoS enhancements 4-4
rate-limiting of unknown unicast packets 4-3
scalability 4-3
switching modes 4-7
unsupported features 4-5
routing table, multicast 31-20
RPF
failure 31-5
multicast 31-2
non-RPF multicast 31-5
unicast 35-2
RPR+
See redundancy (RPR+)
RPR and RPR+ support IPv6 multicast traffic 7-1
RSTP
active topology 20-12
BPDU
format 20-15
processing 20-16
designated port, defined 20-12
designated switch, defined 20-12
interoperability with IEEE 802.1D
described 20-25
restarting migration process 20-49
topology changes 20-17
overview 20-12
port roles
described 20-12
synchronized 20-14
proposal-agreement handshake process 20-13
rapid convergence
described 20-13
edge ports and Port Fast 20-13
point-to-point links 20-13, 20-47
root ports 20-13
root port, defined 20-12
See also MSTP
S
SAID 14-6
sample configuration 2-4
Sampled NetFlow
description 56-8
saving the configuration file 2-5
scheduling
see QoS
secondary VLANs 15-2
Secure MAC Address Aging Type 54-10
security
configuring 35-1, 36-1, 43-1
security, port 54-1
security ACLs, per-subscriber 24-4
security precautions with Flash memory card 2-18
serial IDs
description 64-25
server IDs
description 64-26
service instance 57-30
service-policy command 48-54
service-policy input command 48-50, 48-68, 48-71, 48-73, 50-29
service-provider network, MSTP and RSTP 20-18
set power redundancy enable/disable command 59-2
short pipe mode, configuring 50-34
show boot command 2-19
show catalyst6000 chassis-mac-address command 20-3
show ciscoview package command 1-3
show ciscoview version command 1-3
show configuration command 8-14
show eobc command 8-15
show fm private-hosts command 39-23
show hardware command 8-2
show ibc command 8-15
show interfaces command 8-2, 8-11, 8-14, 8-15, 10-7, 10-12
displaying, interface type numbers 8-2
displaying, speed and duplex mode 8-8
show ip flow export command
displaying NDE export flow IP address and UDP port 56-26
show ip interface command
displaying IP MMLS interfaces 31-18
show ip mroute command
displaying IP multicast routing table 31-20
show ip pim interface command
displaying IP MMLS router configuration 31-18
show mls aging command 56-21
show mls entry command 29-5
show mls ip multicast group command
displaying IP MMLS group 31-21, 31-24
show mls ip multicast interface command
displaying IP MMLS interface 31-21, 31-24
show mls ip multicast source command
displaying IP MMLS source 31-21, 31-24
show mls ip multicast statistics command
displaying IP MMLS statistics 31-21, 31-24
show mls ip multicast summary
displaying IP MMLS configuration 31-21, 31-24
show mls nde command 56-29
displaying NDE flow IP address 56-26
show mls rp command
displaying IP MLS configuration 56-20
show module command 7-7
show private-hosts access-lists command 39-26
show private-hosts configuration command 39-28
show private-hosts interface configuration command 39-29
show private-hosts mac-list command 39-30
show protocols command 8-15
show rif command 8-15
show running-config command 2-4, 8-14, 8-15
show startup-config command 2-5
show version command 2-3, 2-17, 8-15
slot number, description 8-1
smart call home 64-1
description 64-2
destination profile (note) 64-4
registration requirements 64-2
service contract requirements 64-3
Transport Gateway (TG) aggregation point 64-2
SMARTnet
smart call home registration 64-2
SNMP
support and documentation 1-1
snooping
See IGMP snooping
See MLDv2 snooping
software
upgrading router 6-8
software configuration register functions 2-14 to 2-17
software images, Release 12.2SRB C-1
source IDs
call home event format 64-25
source-only-ip flow mask 56-3
source specific multicast with IGMPv3, IGMP v3lite, and URD 31-9
SPAN
configuration guidelines 57-6
configuring 57-11
sources 57-15, 57-19, 57-25, 57-27
VLAN filtering 57-34
overview 57-1
SPAN Destination Port Permit Lists 57-14
spanning-tree backbonefast
command 21-13
command example 21-13, 21-14
spanning-tree cost
command 20-32
command example 20-32, 20-33
spanning-tree portfast
command 21-8, 21-9
command example 21-8
spanning-tree portfast bpdu-guard
command 21-11
spanning-tree port-priority
command 20-30, 20-31
spanning-tree protocol for bridging 22-2
spanning-tree uplinkfast
command 21-12
command example 21-12
spanning-tree vlan
command 20-27, 20-29, 21-14
command example 20-27, 20-29
spanning-tree vlan cost
command 20-32
spanning-tree vlan forward-time
command 20-35
command example 20-35
spanning-tree vlan hello-time
command 20-34
command example 20-34
spanning-tree vlan max-age
command 20-35
command example 20-36
spanning-tree vlan port-priority
command 20-30
command example 20-31
spanning-tree vlan priority
command 20-33
command example 20-34
speed
configuring interface 8-5
speed command 3-2, 8-6
standby link 11-1
standby links 11-1
static route, configuring 2-5
statistics
802.1X 52-17
Sticky ARP 43-41
sticky ARP 43-41
Sticky secure MAC addresses 54-8, 54-9
storm control
see traffic-storm control
STP
configuring 20-25
bridge priority 20-33
enabling 20-26, 20-28
forward-delay time 20-35
hello time 20-34
maximum aging time 20-35
port cost 20-32
port priority 20-30
root bridge 20-28
secondary root switch 20-29
defaults 20-26
EtherChannel 12-5
understanding 20-1
802.1Q Trunks 20-11
Blocking State 20-7
BPDUs 20-3
disabled state 20-10
forwarding state 20-9
learning state 20-8
listening state 20-7
overview 20-2
port states 20-5
protocol timers 20-4
root bridge election 20-4
topology 20-4
STP BackboneFast
configuring 21-13
figure
adding a switch 21-7
spanning-tree backbonefast
command 21-13
command example 21-13, 21-14
understanding 21-4
STP BPDU Guard
configuring 21-11
spanning-tree portfast bpdu-guard
command 21-11
understanding 21-2
STP bridge ID 20-2
STP EtherChannel guard 21-6
STP loop guard
configuring 21-14
overview 21-6
STP PortFast
BPDU filter
configuring 21-10
BPDU filtering 21-2
configuring 21-8
spanning-tree portfast
command 21-8, 21-9
command example 21-8
understanding 21-2
STP root guard 21-6, 21-14
STP UplinkFast
configuring 21-12
spanning-tree uplinkfast
command 21-12
command example 21-12
understanding 21-3
subdomains, private VLAN 15-2
subscribers. See IP subscriber awareness
supervisor engine
configuring 2-1
default configuration 2-1
environmental monitoring 59-10
redundancy 5-1, 7-1
ROM monitor 2-14
startup configuration 2-13
static routes 2-5
synchronizing configurations 5-19, 7-7
Supervisor Engine 2, no longer supported
Supervisor Engine 32 9-1
flash memory 9-1
ports 9-2
supported chassis 9-1
supervisor engine redundancy
configuring 5-10, 7-5
supervisor engines
displaying redundancy configuration 7-7
Switched Port Analyzer
See SPAN
switch fabric functionality 3-2, 4-6
configuring 3-4, 4-8
monitoring 3-4, 4-9
switchport
configuring 10-13
example 10-12
show interfaces 8-11, 10-7, 10-12
switchport access vlan 10-10, 10-13
example 10-14
switchport mode access 10-4, 10-13
example 10-14
switchport mode dynamic 10-9
switchport mode dynamic auto 10-4
switchport mode dynamic desirable 10-4
default 10-5
example 10-12
switchport mode trunk 10-4, 10-9
switchport nonegotiate 10-4
switchport trunk allowed vlan 10-11
switchport trunk encapsulation 10-8
switchport trunk encapsulation dot1q 10-3
example 10-12
switchport trunk encapsulation isl 10-3
switchport trunk encapsulation negotiate 10-3
default 10-5
switchport trunk native vlan 10-10
switchport trunk pruning vlan 10-11
switch priority
MSTP 20-44
switch TopN reports
foreground execution 61-2
overview 61-1
running 61-2
viewing 61-2
system
configuration register
configuration 2-14 to 2-17
settings at startup 2-15
configuring global parameters 2-2
System Hardware Capacity 59-5
system image
determining if and how to load 2-15
loading from Flash 2-18
T
TACACS+ 35-1, 36-1, 43-1
TCP Intercept 35-2
TDR
checking cable connectivity 8-16
enabling and disabling test 8-16
guidelines 8-16
Time Domain Reflectometer
See TDR
TopN reports
See switch TopN reports
traceroute, Layer 2
and ARP 62-2
and CDP 62-1
described 62-1
IP addresses and subnets 62-2
MAC addresses and VLANs 62-2
multicast traffic 62-2
multiple devices on a port 62-2
unicast traffic 62-1
usage guidelines 62-1
traffic flood blocking 47-1
traffic-storm control
command
broadcast 46-4
described 46-1
monitoring 46-6
thresholds 46-1
traffic suppression
see traffic-storm control
translational bridge numbers (defaults) 14-6
transmit queues
see QoS transmit queues
trunks 10-2
802.1Q Restrictions 10-5
allowed VLANs 10-11
configuring 10-7
default interface configuration 10-7
default VLAN 10-10
different VTP domains 10-3
encapsulation 10-3
native VLAN 10-10
to non-DTP device 10-4
VLAN 1 minimization 10-11
trust-dscp
see QoS trust-dscp
trust-ipprec
see QoS trust-ipprec
trustpoint 64-3
tunneling 50-4, 50-31
tunneling, 802.1Q
See 802.1Q 17-1
Type of Service (ToS) 48-108
U
UDE 25-1
configuration 25-3
overview 25-2
UDE and UDLR 25-1
UDE on ES-20 Line cards
restrictions 24-7, 69-2
UDLD
default configuration 55-3
enabling
globally 55-3
on ports 55-4
overview 55-1
UDLR 25-1
back channel 25-1
configuration 25-6
tunnel
(example) 25-7
ARP and NHRP 25-3
UDLR (unidirectional link routing)
See UDLR
unauthorized ports with 802.1X 52-4
Unicast and Multicast Flood Blocking 47-1
unicast flood blocking 47-1
unicast RPF 35-2
unicast storms
see traffic-storm control
Unidirectional Ethernet
see UDE
unidirectional ethernet
example of setting 25-5
UniDirectional Link Detection Protocol
see UDLD
uniform mode
configuring 50-39
untrusted
see QoS trust-cos
see QoS untrusted
upgrade guidelines 26-20
UplinkFast
See STP UplinkFast
URD 31-9
User-Based Rate Limiting 48-19, 48-66
V
VACLs 38-1
configuring 38-4
examples 38-9
Layer 3 VLAN interfaces 38-8
Layer 4 port operations 36-5
logging
configuration example 38-11
configuring 38-10
restrictions 38-10
MAC address based 38-4
multicast packets 38-3
overview 38-1
SVIs 38-8
WAN interfaces 38-1
version 8 (NDE) 56-10
virtual LAN
See VLANs
vlan
command 14-11, 14-13, 56-18, 57-19
command example 14-12
VLAN-based QoS filtering 48-56
VLAN-bridge spanning-tree protocol 22-2
vlan database
command 14-11, 14-13, 56-18, 57-19
vlan mapping dot1q
command 14-16, 14-17
command example 14-18
VLAN mode 26-24
VLANs
allowed on trunk 10-11
configuration guidelines 14-8
configuring 14-1
configuring (tasks) 14-10
defaults 14-6, 14-8
extended range 14-2
ID (default) 14-6
interface assignment 14-13
name (default) 14-6
normal range 14-2
private
See private VLANs
reserved range 14-2
support for 4,096 VLANs 14-2
token ring 14-3
trunks
understanding 10-2
understanding 14-1
VLAN 1 minimization 10-11
VTP domain 14-2
VLAN translation
command example 14-16, 14-17
VLAN Trunking Protocol
See VTP
voice VLAN
Cisco 7960 phone, port connections 16-1
configuration guidelines 16-4
configuring IP phone for data traffic
override CoS of incoming frame 16-7, 16-8
configuring ports for voice traffic in
802.1Q frames 16-5
connecting to an IP phone 16-5
default configuration 16-4
overview 16-1
VPN
configuration example 26-16
guidelines and restrictions 26-15
VTP
advertisements 13-3
client, configuring 13-11
configuration guidelines 13-6
default configuration 13-6
disabling 13-11
domains 13-2, 70-1
VLANs 14-2
modes
client 13-2
server 13-2
transparent 13-2
monitoring 13-13
overview 13-1, 70-1
pruning
configuration 10-11
configuring 13-9
overview 13-5
server, configuring 13-11
statistics 13-13
transparent mode, configuring 13-11
version 2
enabling 13-10
overview 13-3
W
WCCP
configuring on a router 60-2, 60-14
service groups 60-8
specifying protocol version 60-7
web browser interface 1-1
Web Cache Communication Protocol
See WCCP
web caches
See cache engines
web cache services
description 60-5
web caching
See web cache services
See also WCCP
web scaling 60-1
weighted round robin 48-94
WRR 48-94
X
xconnect command 26-20
Y
Y.1731 Performance Monitoring 74-1
Index
Symbols
!Mini Protocol Analyzer 66-1
Numerics
4K VLANs (support for 4,096 VLANs) 14-2
802.10 SAID (default) 14-6
802.1Q
encapsulation 10-3
Layer 2 protocol tunneling
See Layer 2 protocol tunneling
mapping to ISL VLANs 14-14, 14-17
trunks 10-2
restrictions 10-5
tunneling 17-1
configuration guidelines 17-3
configuring tunnel ports 17-6
802.1Q Ethertype, specifying custom 10-15
802.1X
See port-based authentication
802.3ad
See LACP
802.3X Flow Control 8-12
A
AAA 35-1, 36-1, 43-1
access control entries and lists 35-1, 36-1, 43-1
access-enable host timeout (not supported) 36-2
access interface (IP subscriber) 24-3
access lists, using with WCCP 60-10
access port, configuring 10-13
ACEs and ACLs 35-1, 36-1, 43-1
acronyms, list of A-1, B-1
addresses
IP, see IP addresses
MAC, see MAC addresses
advertisements, VTP 13-3
aggregate label 26-2, 26-4
aggregate policing
see QoS policing
aging time
IP MLS 56-20
maximum
for MSTP 20-47
MSTP accelerated 20-46
MSTP maximum 20-47
alarms
major 59-12
minor 59-12
Allow DHCP Option 82 on Untrusted Port
configuring 44-10
understanding 44-3
any transport over MPLS (AToM) 26-18
compatibility with previous releases of AToM 26-20
Ethernet over MPLS 26-24
ARP spoofing 45-1
AToM 26-18
authentication
See also port-based authentication
Authentication, Authorization, and Accounting
See AAA
Authentication, Authorization, and Accounting (AAA) 43-1
authorized ports with 802.1X 52-4
auto-sync command 7-6
B
BackboneFast
See STP BackboneFast
backup interfaces
See Flex Links
bandwidth-remaining ratio (BRR), IP subscriber 24-5, 24-21, 24-23
binding database, DHCP snooping
See DHCP snooping binding database
binding database, DHCP snooping
See DHCP snooping binding database
blocking floods 47-1
blocking state, STP 20-7
boot bootldr command 2-19
boot command 2-16
boot config command 2-19
boot system command 2-15, 2-19
boot system flash command 2-16
BPDU, RSTP format 20-15
BPDU guard
See STP BPDU guard
Bridge Domain 57-29
Bridged Routed Encapsulation within an Automatic Protection Switching Group 14-8
bridge groups 22-2
bridge ID
See STP bridge ID
bridge priority, STP 20-33
bridge protocol data units
see BPDUs
bridging 22-1
broadcast storms
see traffic-storm control
C
cache engine clusters 60-1
cache engines 60-1
cache farms
See cache engine clusters
Call Home
description 64-1
message format options 64-1
messages
format options 64-1
call home 64-1
alert groups 64-6
configuring e-mail options 64-9
contact information 64-3
default settings 64-18
destination profiles 64-4
displaying information 64-14
mail-server priority 64-10
pattern matching 64-9
periodic notification 64-8
rate limit messages 64-9
severity threshold 64-8
smart call home feature 64-2
SMTP server 64-9
testing communications 64-10
call home alert groups
configuring 64-6
description 64-6
subscribing 64-6
call home contacts
assigning information 64-3
call home destination profiles
attributes 64-4
configuring 64-5
description 64-4
displaying 64-16
call home notifications
full-txt format for syslog 64-28
XML format for syslog 64-29
cautions for passwords
encrypting 2-11
TACACS+ 2-10
CEF
configuring
MSFC2 29-5
supervisor engine 29-4
examples 29-3
Layer 3 switching 29-2
packet rewrite 29-2
certificate authority (CA) 64-3
CGMP 33-8
channel-group group
command 12-9, 12-12
command example 12-9
checking running configuration 2-4
Cisco Cache Engines 60-2
Cisco Express Forwarding 26-3
Cisco Group Management Protocol
See CGMP
Cisco IOS Release 12.2SRB software images C-1
Cisco IOS Unicast Reverse Path Forwarding 35-2
CiscoView 1-2
CIST regional root
See MSTP
CIST root
See MSTP
class command 48-62
classification (QoS) 48-107
class-map command 48-54
class map configuration 48-59
class of service (CoS) 48-107
Committed Access Rate (CAR), not supported 48-2
community ports 15-3
community VLANs 15-2, 15-3
Concurrent routing and bridging (CRB) 22-1
CONFIG_FILE environment variable
configuration file, viewing 2-20
description 2-19
config-register command 2-16, 2-17
config terminal command 2-3
configuration
file, saving 2-5
register
changing settings 2-16 to 2-17
configuration 2-14 to 2-17
settings at startup 2-15
configuration example
EoMPLS port mode 26-25, 26-27
EoMPLS VLAN mode 26-25
configuration register boot field
listing value 2-17
modification tasks 2-16
configure command 2-3
configure terminal command 2-16, 8-2
configuring 48-61
global parameters
sample configuration 2-2
using configuration mode 2-3 to 2-4
Configuring GTP-SLB IPv6 Support 23-4
contact information
assigning for call home 64-3
control plane policing
See CoPP
control plane policing and protection (CoPP)
per-subscriber 24-4
CoPP
applying QoS service policy to control plane 43-31
configuring
ACLs to match traffic 43-31
enabling MLS QoS 43-31
packet classification criteria 43-31
service-policy map 43-31
control plane configuration mode, entering 43-31
displaying
dynamic information 43-33
number of conforming bytes and packets 43-33
rate information 43-33
entering control plane configuration mode 43-31
monitoring statistics 43-33
overview 43-29
packet classification guidelines 43-32
traffic classification
defining 43-38
guidelines 43-39
overview 43-38
sample ACLs 43-39
sample classes 43-38
CoPP. See control plane policing and protection (CoPP)
copy running-config startup-config command 2-5
copy system
running-config nvram
startup-config command 2-19
CoS, override priority 16-7, 16-8
D
data gleaning 41-4
dCEF 29-4, 29-5
debug commands
IP MMLS 31-25
debug fm private-hosts command 39-31
debug private-hosts command 39-32
DEC spanning-tree protocol 22-2
default configuration
802.1X 52-6
dynamic ARP inspection 45-5
Flex Links 11-2
IP MMLS 31-7
LLDP 17-9
MSTP 20-37
supervisor engine 2-1
UDLD 55-3
voice VLAN 16-4
VTP 13-6
default NDE configuration 56-14
default VLAN 10-10
deficit weighted round robin 48-94
denial of service protection
See DoS protection
description command 8-14
destination-ip flow mask 56-3
destination-source-ip flow mask 56-3
device IDs
call home format 64-25
DHCP binding database
See DHCP snooping binding database
DHCP binding table
See DHCP snooping binding database
DHCP option 82
circuit ID suboption 44-5
overview 44-3
packet format, suboption
circuit ID 44-5
remote ID 44-5
remote ID suboption 44-5
DHCP option 82 allow on untrusted port 44-10
DHCP snooping
binding database
See DHCP snooping binding database
configuration guidelines 44-6
configuring 44-8
default configuration 44-6
displaying binding tables 44-18
enabling 44-9, 44-10, 44-11, 44-13
enabling the database agent 44-14
message exchange process 44-4
option 82 data insertion 44-3
overview 44-1
Snooping database agent 44-5
DHCP snooping binding database
described 44-2
entries 44-2
DHCP snooping binding table
See DHCP snooping binding database
DHCP Snooping Database Agent
adding to the database (example) 44-17
enabling (example) 44-15
overview 44-5
reading from a TFTP file (example) 44-16
DHCP snooping increased bindings limit 44-7, 44-15
differentiated services codepoint
See QoS DSCP
Differentiated Services Code Point (DSCP) 48-107
DiffServ
configuring short pipe mode 50-34
configuring uniform mode 50-39
short pipe mode 50-31
uniform mode 50-32
DiffServ tunneling modes 50-4
Disabling PIM Snooping Designated Router Flooding 34-5
distributed Cisco Express Forwarding
See dCEF
documentation, related 1-lxi
document organization 1-lvii
DoS protection
monitoring packet drop statistics
using monitor session commands 43-24
using VACL capture 43-25
PFC configuration guidelines and restrictions 43-23
Supervisor Engine 720 43-10
default configurations 43-22
egress ACL bridget packet rate limiters 43-16
FIB glean rate limiters 43-18
FIB receive rate limiters 43-18
ICMP redirect rate limiters 43-18
IGMP unreachable rate limiters 43-17
ingress ACL bridget packet rate limiters 43-16
IP errors rate limiters 43-20
IPv4 multicast rate limiters 43-20
IPv6 multicast rate limiters 43-21
Layer 2 PDU rate limiters 43-19
Layer 2 protocol tunneling rate limiters 43-19
MTU failure rate limiters 43-19
multicast directyly connected rate limiters 43-20
multicast FIB miss rate limiters 43-20
multicast IGMP snooping rate limiters 43-19
network under SYN attack 43-13
QoS ACLs 43-12
security ACLs 43-11
TCP intercept 43-13
traffic storm control 43-13
TTL failure rate limiter 43-17
uRPF check 43-12
uRPF failure rate limiters 43-17
VACL log rate limiters 43-19
Supervisor Engine 720Layer 3 security features rate limiters 43-18
DSCP
See QoS DSCP
DSCP-based queue mapping 48-86
dual-priority queues
IP subscriber 24-5, 24-25
duplex command 8-7
duplex mode
configuring interface 8-5
DWRR 48-94
dynamic ARP inspection
ARP cache poisoning 45-2
ARP requests, described 45-1
ARP spoofing attack 45-2
clearing
log buffer 45-16
statistics 45-16
configuration guidelines 45-5
configuring
log buffer 45-13, 45-14
logging system messages 45-14
rate limit for incoming ARP packets 45-4, 45-9
default configuration 45-5
denial-of-service attacks, preventing 45-9
described 45-1
DHCP snooping binding database 45-3
displaying
ARP ACLs 45-15
configuration and operating state 45-15
log buffer 45-16
statistics 45-16
trust state and rate limit 45-15
error-disabled state for exceeding rate limit 45-4
function of 45-2
interface trust states 45-3
log buffer
clearing 45-16
configuring 45-13, 45-14
displaying 45-16
logging of dropped packets, described 45-4
logging system messages
configuring 45-14
man-in-the middle attack, described 45-2
network security issues and interface trust states 45-3
priority of ARP ACLs and DHCP snooping entries 45-4
rate limiting of ARP packets
configuring 45-9
described 45-4
error-disabled state 45-4
statistics
clearing 45-16
displaying 45-16
validation checks, performing 45-11
Dynamic Host Configuration Protocol snooping
See DHCP snooping
E
eFSU. See enhanced Fast Software Upgrade (eFSU)
Egress ACL support for remarked DSCP 48-12
egress ACL support for remarked DSCP 48-50
egress replication performance improvement 31-13
e-mail addresses
assigning for call home 64-3
e-mail notifications
Call Home 64-1
Embedded CiscoView 1-2
enable command 2-3, 2-16
enable sticky secure MAC address 54-8
enabling
IP MMLS
on router interfaces 31-11
encapsulation 10-3
encapsulation frame-relay ietf command 57-38
enhanced Fast Software Upgrade (eFSU)
aborting (issu abortversion command) 6-19
accepting the new software version 6-17
commiting the new software to standby RP (issu commitversion command) 6-17
disabling compatibility matrix check 6-10
displaying maximum outage time for line cards 6-14
error handling 6-4
forcing a switchover (issu runversion command) 6-14
issu loadversion command 6-12
loading new software onto standby RP 6-12
memory reservation on line card 6-3
memory reservation on line card, prohibiting 6-3
OIR not supported 6-7
operation 6-2
outage times 6-3
overview 6-1
performing 6-8
SSO, RPR, and RPR+ modes 6-7
steps 6-8
usage guidelines and limitations 6-7
verifying redundancy mode 6-10
enhanced interface range command 8-3
environmental monitoring
LED indications 59-12
SNMP traps 59-12
supervisor engine and switching modules 59-12
Syslog messages 59-12
using CLI commands 59-10
environment variables
CONFIG_FILE 2-19
controlling 2-19
viewing 2-19
EoMPLS 26-18
configuring 26-23
configuring VLAN mode 26-24
guidelines and restrictions 26-19
port mode 26-24
port mode configuration guidelines 26-27
VLAN mode 26-24
erase startup-config command
configuration files cleared with 2-6
ERSPAN 57-1
ERSPAN on EVC 57-29
EtherChannel
channel-group group
command 12-9, 12-12
command example 12-9
configuration guidelines 12-5
configuring
Layer 2 12-8
configuring (tasks) 12-7
interface port-channel
command example 12-8
interface port-channel (command) 12-8
lacp system-priority
command example 12-11
Layer 2, configuring 12-8
load balancing
configuring 12-11
understanding 12-5
modes 12-2
PAgP, understanding 12-3
port-channel interfaces 12-5
port-channel load-balance
command 12-10, 12-11
command example 12-11
STP 12-5
switchport trunk encapsulation dot1q 12-6
understanding 12-1
EtherChannel Guard
See STP EtherChannel Guard
EtherChannel Min-Links 12-12
Ethernet, setting port duplex 8-13
Ethernet over MPLS (EoMPLS) configuration
EoMPLS port mode 26-27
EoMPLS VLAN mode 26-24
EVC 57-29
examples
software configuration register 2-14 to 2-17
EXP mutation 50-4
extended range VLANs 14-2
See VLANs
extended system ID, MSTP 20-40
Extensible Authentication Protocol over LAN 52-1
Extranet MVPN Architecture 28-1
F
fabric switching mode
See switch fabric module
fabric switching-mode allow dcef-only command on Supervisor Engine 720 5-2, 7-4
fall-back bridging 22-2
fiber-optic, detecting unidirectional links 55-1
FIB TCAM 26-3
filters, NDE
destination host filter, specifying 56-28
destination TCP/UDP port, specifying 56-27
overview 56-7
protocol 56-28
source host and destination TCP/UDP port 56-27
Flash memory
configuration process 2-18
configuring router to boot from 2-18
loading system image from 2-18
security precautions 2-18
write protection 2-18
Flex Links 11-1
configuration guidelines 11-2
configuring 11-3
default configuration 11-2
description 11-1
monitoring 11-3
flood blocking 47-1
flow control 8-12
flow masks
IP MLS
destination-ip 56-3
destination-source-ip 56-3
interface-destination-source-ip 56-3
ip-full 56-3
ip-interface-full 56-3
minimum 56-19
overview 56-3
flowmasks
NetFlow (Release 12.2SRA) 56-3
NetFlow (Release 12.2SRB) 56-3
flows
IP MMLS
completely and partially switched 31-3
forward-delay time
MSTP 20-46
forward-delay time, MSTP 20-46
forward-delay time, STP 20-35
frame distribution
See EtherChannel load balancing
G
global parameters, configuring 2-2
GTP-SLB Support for IPv6 23-1
H
hardware Layer 3 switching, guidelines 29-4
hello time, MSTP 20-45
hello time, STP 20-34
High Capacity Power Supply Support 59-4
host ports 15-3
http
//www.cisco.com/en/US/docs/ios/qos/command/reference/qos_book.html 4-5
//www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html 40-8, 57-39, 57-42
I
ICMP unreachable messages 36-1
IDs
serial IDs 64-25
IEEE 802.10 SAID (default) 14-6
IEEE 802.1Q
See 802.1Q
IEEE 802.1Q Ethertype
specifying custom 10-15
IEEE 802.1w
See RSTP
IEEE 802.3ad
See LACP
IEEE 802.3X Flow Control 8-12
IEEE bridging protocol 22-2
IGMP
configuration guidelines 32-7, 33-7
enabling 33-10
Internet Group Management Protocol 33-1
join messages 33-2
leave processing
enabling 33-12
queries 33-3
query interval, configuring 33-11
snooping
fast leave 33-5
joining multicast group 33-2
leaving multicast group 33-4
understanding 33-2
snooping querier
enabling 33-9
understanding 33-2
IGMPv3 31-9
IGMP v3lite 31-9
In Service Software Upgrade (ISSU) 6-1
Integrated routing and bridging (IRB) 22-1
interface
command 2-3
Layer 2 modes 10-4
number 8-1
interface, access (IP subscriber) 24-3
interface access command 24-33
interface-destination-source-ip flow mask 56-3
interface port-channel
command example 12-8
interface port-channel (command) 12-8
interfaces
configuring 8-2
configuring, duplex mode 8-5
configuring, speed 8-5
configururing, overview 8-1
descriptive name, adding 8-14
naming 8-14
range of 8-3
interfaces command 8-2
interfaces range command 8-3
interfaces range macro command 8-4
Internet Group Management Protocol
See IGMP
IP accounting, IP MMLS and 31-8
IP addresses
assigned by BOOTP protocol 2-6
set to default 2-6
IP CEF, topology (figure) 29-3
ip flow-export destination command 56-24
ip flow-export source command 56-23, 56-25, 61-2, 61-3, 61-4
ip-full flow mask 56-3
ip http server 1-1
ip-interface-full flow mask 56-3
IP MLS
aging-time 56-20
flow masks
destination-ip 56-3
destination-source-ip 56-3
interface-destination-source-ip 56-3
ip-full 56-3
ip-interface-full 56-3
minimum 56-19
overview 56-3
NDE
See NDE
IP MMLS
cache, overview 31-2
configuration guideline 31-7
debug commands 31-25
default configuration 31-7
enabling
on router interfaces 31-11
flows
completely and partially switched 31-3
Layer 3 MLS cache 31-2
overview 31-2
packet rewrite 31-3
router
displaying interface information 31-17
enabling globally 31-9
enabling on interfaces 31-11
multicast routing table, displaying 31-20
PIM, enabling 31-10
unsupported features 31-8
IP multicast
IGMP snooping and 33-9
MLDv2 snooping and 32-9
overview 33-1
IP multicast MLS
See IP MMLS
ip multicast-routing command
enabling IP multicast 31-10
IP phone, configuring 16-5
ip pim command
enabling IP PIM 31-10
IP precedence 48-108
IP static routes 2-5
IP subscriber awareness
benefits 24-2
configuration example 24-30
configuration guidelines 24-27
configuring 24-28, 24-29
control plane policing and protection (CoPP) 24-4
interface access command 24-33
IP subscriber interface 24-3
IP subscriber session 24-3
lawful intercept 24-4
overview 24-1
per-subscriber features 24-4
QoS 24-4
bandwidth-remaining ratio (BRR) 24-5, 24-21, 24-23
dual-priority queues 24-5, 24-25
priority-rate propagation 24-5, 24-25, 24-26
QoS recommendations 24-20
Radius accounting 24-4
security ACLs 24-4
unsupported features 24-26
IP unnumbered 22-1
IPv4 Multicast over Point-to-Point GRE Tunnels 1-4
IPv4 Multicast VPN 27-1
IPv6 Multicast PFC3 and DFC3 Layer 3 Switching 30-1
IPv6 Prefix Guard 41-3
IPv6 Source Guard 41-2
ip wccp version command 60-8
ISL encapsulation 10-3
ISL trunks 10-2
isolated port 15-3
isolated VLANs 15-2, 15-3
ISSU, See In Service Software Upgrade (ISSU)
J
join messages, IGMP 33-2
jumbo frames 8-8
L
label edge router 26-2
label switched path 26-23
label switch router 26-2, 26-3
LACP
system ID 12-4
LACP over EVC Port Channel
Verification 23-13
LACP over EVC port channel
configuration commands, configuration steps 18-6, 23-5, 23-8, 68-6, 68-8, 68-9, 68-11
Examples 23-12
lawful intercept, per-subscriber 24-4
Layer 2
configuring interfaces 10-6
access port 10-13
trunk 10-7
defaults 10-5
interface modes 10-4
show interfaces 8-11, 10-7, 10-12
switching 10-1
trunks 10-2
VLAN interface assignment 14-13
Layer 2 interfaces, configuring 10-1
Layer 2 protocol tunneling
configuring Layer 2 tunnels 18-2
overview 18-1
Layer 2 remarking 48-14
Layer 2 Traceroute 62-1
Layer 2 traceroute
and ARP 62-2
and CDP 62-1
described 62-1
IP addresses and subnets 62-2
MAC addresses and VLANs 62-2
multicast traffic 62-2
multiple devices on a port 62-2
unicast traffic 62-1
usage guidelines 62-1
Layer 3
IP MMLS and MLS cache 31-2
Layer 3 switched packet rewrite
CEF 29-2
Layer 3 switching
CEF 29-2
Layer 4 port operations (ACLs) 36-5
leave processing, IGMP
enabling 33-12
leave processing, MLDv2
enabling 32-12
LERs 50-2, 50-6, 50-7
link failure, detecting unidirectional 20-24
link negotiation 8-7
link redundancy
See Flex Links
LLDP
configuring
default configuration 17-9
Load Balancing 26-8
Local Egress Replication 31-13
logical operation unit
See LOU
loop guard
See STP loop guard
LOU
description 36-6
determining maximum number of 36-6
LSRs 50-2, 50-6
M
MAC address
adding to BOOTP configuration file 2-6
MAC address-based blocking 35-1
MAC move (port security) 54-2
macro, interfaces range 8-4
main-cpu command 7-6
mapping 802.1Q VLANs to ISL VLANs 14-14, 14-17
markdown
see QoS markdown
maximum aging time, MSTP 20-47
maximum aging time, STP 20-35
maximum hop count, MSTP 20-47
microflow policing rule
see QoS policing
Min-Links 12-12
MLD report 32-4
MLD snooping
query interval, configuring 32-11
MLDv2 32-1
enabling 32-9
leave processing
enabling 32-12
queries 32-4
snooping
fast leave 32-6
joining multicast group 32-4
leaving multicast group 32-6
understanding 32-1
snooping querier
enabling 32-8
understanding 32-1
MLDv2 Snooping 32-1
MLS
configuring threshold 31-14
MSFC threshold 31-14
mls aging command
configuring IP MLS 56-21
mls flow command
configuring IP MLS 56-19, 56-20
mls ip multicast command
enabling IP MMLS 31-11, 31-12, 31-14, 31-15, 31-16, 31-22, 31-23
mls nde flow command
configuring a host and port filter 56-27
configuring a host flow filter 56-28
configuring a port filter 56-27
configuring a protocol flow filter 56-28
mls nde sender command 56-21
monitoring
Flex Links 11-3
private VLANs 15-16
MPLS 26-2
aggregate label 26-2
any transport over MPLS 26-18
basic configuration 26-8
core 26-3
DiffServ Tunneling Modes 50-31
egress 26-4
experimental field 50-3
guidelines and restrictions 26-7
ingress 26-3
IP to MPLS path 26-3
labels 26-2
Layer 2 VPN load balancing 26-8
MPLS to IP path 26-4
MPLS to MPLS path 26-3
nonaggregate lable 26-2
QoS default configuration 50-15
VPN 50-12
VPN guidelines and restrictions 26-15
mpls l2 transport route command 26-20
MPLS QoS
Classification 50-2
Class of Service 50-2
commands 50-16
configuring a class map 50-20
configuring a policy map 50-23
configuring egress EXP mutation 50-28
configuring EXP Value Maps 50-30
Differentiated Services Code Point 50-2
displaying a policy map 50-27
E-LSP 50-2
enabling QoS globally 50-18
EXP bits 50-2
features 50-3
IP Precedence 50-2
QoS Tags 50-2
queueing-only mode 50-19
MPLS QoS configuration
class map to classify MPLS packets 50-20
MPLS VPN, limitations and restrictions 26-15
MQC 48-1
not supported
CAR 48-2
queuing 48-2
supported
policy maps 48-3
MSTP
boundary ports
configuration guidelines 20-38
described 20-22
CIST, described 20-19
CIST regional root 20-20
CIST root 20-21
configuration guidelines 20-37
configuring
forward-delay time 20-46
link type for rapid convergence 20-47
maximum aging time 20-47
maximum hop count 20-47
MST region 20-38
neighbor type 20-48
path cost 20-43
port priority 20-42
root switch 20-40
secondary root switch 20-41
switch priority 20-44
configuring hello time 20-45
CST
defined 20-19
operations between regions 20-20
default configuration 20-37
displaying status 20-49
enabling the mode 20-38
extended system ID
effects on root switch 20-40
effects on secondary root switch 20-41
unexpected behavior 20-40
IEEE 802.1s
implementation 20-23
port role naming change 20-23
terminology 20-21
interoperability with IEEE 802.1D
described 20-25
restarting migration process 20-49
IST
defined 20-19
master 20-20
operations within a region 20-20
mapping VLANs to MST instance 20-39
MST region
CIST 20-19
configuring 20-38
described 20-18
hop-count mechanism 20-22
IST 20-19
supported spanning-tree instances 20-19
overview 20-17
root switch
configuring 20-40
effects of extended system ID 20-40
unexpected behavior 20-40
status, displaying 20-49
MTU size (default) 14-6
multicast
IGMP snooping and 33-9
MLDv2 snooping and 32-9
NetFlow statistics 56-14
non-RPF 31-5
overview 33-1
PIM snooping 34-3
multicast, displaying routing table 31-20
Multicast enhancement - egress replication performance improvement 31-13
Multicast Enhancement - Replication Mode Detection 31-11
multicast flood blocking 47-1
multicast groups
joining 33-2
leaving 32-6, 33-4
multicast groups, IPv6
joining 32-4
Multicast Listener Discovery version 2
See MLDv2
multicast multilayer switching
See IPv4 MMLS
Multicast Replication Mode Detection enhancement 31-11
multicast RPF 31-2
multicast storms
see traffic-storm control
Multicast VPN 28-1
multilayer switch feature card
see MSFC
multiple path RPF check 35-2
N
native VLAN 10-10
NBAR 48-1
NDE
configuration, displaying 56-29
displaying configuration 56-29
enabling 56-15
filters
destination host, specifying 56-28
destination TCP/UDP port, specifying 56-27
overview 56-7
protocol, specifying 56-28
source host and destination TCP/UDP port, specifying 56-27
multicast 56-14
overview 56-1
specifying
destination host filters 56-28
destination TCP/UDP port filters 56-27
protocol filters 56-28
NDE configuration, default 56-14
NDE version 8 56-10
NetFlow and NDE for Ingress Bridged IP Traffic 56-24
NetFlow Data Export
See NDE
Netflow Multiple Export Destinations 56-24
NetFlow version 9 56-3
Network-Based Application Recognition 48-1
nonaggregate label 26-2, 26-4
non-RPF multicast 31-5
Nonstop Forwarding
See NSF
nonvolatile random-access memory
See NVRAM
normal-range VLANs
See VLANs
NSF 5-1
NSF with SSO does not support IPv6 multicast traffic. 5-1
NVRAM
saving settings 2-5
O
OIR 8-14
online diagnostics
configuring 42-2
diagnostic sanity check 42-11
memory tests 42-10
overview 42-1
running tests 42-6
schedule switchover 42-10
test descriptions A-1
understanding 42-1
online diagnostic tests A-1
online insertion and removal
See OIR
operating system image
See system image
out of profile
see QoS out of profile
P
packet burst 43-16
packet capture 66-1
packet recirculation 48-12
packet rewrite
CEF 29-2
IP MMLS and 31-3
packets
multicast 38-3
PACLs. See private hosts feature
PAgP
understanding 12-3
passwords
configuring
enable password 2-9
enable secret 2-9
line password 2-9
static enable password 2-8
TACACS+ 2-10
TACACS+ (caution) 2-10
encrypting 2-10
(caution) 2-11
recovering lost enable passwords 2-13
path cost
MSTP 20-43
PBR 1-4, 22-4
PFC3BXL
hardware features 26-4
MPLS guidelines and restrictions 26-7
MPLS label switching 26-1
MPLS supported commands 26-7
recirculation 26-4
supported Cisco IOS features 26-5
VPN supported commands 26-16
VPN switching 26-14
PFC compatibility with RSP720 4-1
PIM, IP MMLS and 31-10
PIM snooping
designated router flooding 34-5
enabling globally 34-4
enabling in a VLAN 34-5
overview 34-3
police command 48-65
policing
See QoS policing
policing, QoS (definition) 48-108
policy 48-54
policy-based routing
See PBR
policy map 48-61
attaching to an interface 48-68
policy-map command 48-54, 48-62
Port Aggregation Protocol
see PAgP
port-based ACLs (PACLs). See private hosts feature
port-based authentication
authentication server
defined 52-2
RADIUS server 52-2
client, defined 52-2
configuration guidelines 52-7
configuring
initializing authentication of a client 52-12
manual reauthentication of a client 52-11
quiet period 52-12
RADIUS server 52-10
RADIUS server parameters on the switch 52-9
switch-to-authentication-server retransmission time 52-14
switch-to-client EAP-request frame retransmission time 52-14
switch-to-client frame-retransmission number 52-15
switch-to-client retransmission time 52-13
default configuration 52-6
described 52-1
device roles 52-2
displaying statistics 52-17
EAPOL-start frame 52-3
EAP-request/identity frame 52-3
EAP-response/identity frame 52-3
enabling
802.1X authentication 52-8, 52-9
periodic reauthentication 52-11
encapsulation 52-2
initiation and message exchange 52-3
method lists 52-8
ports
authorization state and dot1x port-control command 52-4
authorized and unauthorized 52-4
resetting to default values 52-16
switch
as proxy 52-2
RADIUS client 52-2
topologies, supported 52-5
port-based QoS features
see QoS
port channel
switchport trunk encapsulation dot1q 12-6
port-channel
see EtherChannel
port-channel load-balance
command 12-10, 12-11
command example 12-11
port cost, STP 20-32
port debounce timer 8-13
PortFast
See STP PortFast
PortFast BPDU filtering
See STP PortFast BPDU filtering
port mode 26-24
port negotiation 8-7
port priority
MSTP 20-42
port priority, STP 20-30
ports
setting the debounce timer 8-13
port security
aging 54-9, 54-10
configuring 54-4
default configuration 54-3
described 54-1
displaying 54-11
enable sticky secure MAC address 54-8
violations 54-2
Port Security is supported on trunks 54-4, 54-7, 54-9
port security MAC move 54-2
port security on PVLAN ports 54-3
Port Security with Sticky Secure MAC Addresses 54-2
power management
enabling/disabling redundancy 59-2
overview 59-1
powering modules up or down 59-3
system power requirements, nine-slot chassis 59-5
primary links 11-1
primary VLANs 15-2
priority
overriding CoS 16-7, 16-8
priority-rate propagation, IP subscriber 24-5, 24-25, 24-26
private-hosts command 39-14
private hosts feature
command reference 39-13
configuration guidelines 39-5, 39-6
configuring (detailed steps) 39-10
configuring (summary) 39-9
debug fm private-hosts command 39-31
debug private-hosts command 39-32
isolating hosts in a VLAN 39-2
multicast operation 39-9
overview 39-1
port ACLs (PACLs) 39-4
port types 39-3
private-hosts command 39-14
private-hosts mac-list command 39-15
private-hosts mode command 39-17
private-hosts promiscuous command 39-19
private-hosts vlan-list command 39-21
protocol-independent MAC ACLs 39-1
restricting traffic flow with PACLs 39-3
show fm private-hosts command 39-23
show private-hosts access-lists command 39-26
show private-hosts configuration command 39-28
show private-hosts interface configuration command 39-29
show private-hosts mac-list command 39-30
spoofing protection 39-9
private-hosts mac-list command 39-15
private-hosts mode command 39-17
private-hosts promiscuous command 39-19
private-hosts vlan-list command 39-21
private VLANs 15-1
across multiple switches 15-5
and SVIs 15-6
benefits of 15-2
community VLANs 15-2, 15-3
configuration guidelines 15-7, 15-9, 15-11
configuring 15-11
host ports 15-14
pomiscuous ports 15-15
routing secondary VLAN ingress traffic 15-13
secondary VLANs with primary VLANs 15-12
VLANs as private 15-11
end station access to 15-4
IP addressing 15-4
isolated VLANs 15-2, 15-3
monitoring 15-16
ports
community 15-3
configuration guidelines 15-9
isolated 15-3
promiscuous 15-3
primary VLANs 15-2
secondary VLANs 15-2
subdomains 15-2
traffic in 15-6
privileges
changing default 2-12
configuring
multiple levels 2-11
privilege level 2-11
exiting 2-12
logging in 2-12
procedures
global parameters, configuring 2-2
using configuration mode 2-3 to 2-4
promiscuous ports 15-3
protocol tunneling
See Layer 2 protocol tunneling 18-1
pruning, VTP
See VTP, pruning
PVLANs
See private VLANs
PVRST
See Rapid-PVST 20-17
Q
QoS
class of service (CoS), definition 48-107
DSCP (definition) 48-107
IP precedence 48-108
marking 48-108
policing 48-108
Type of Service (ToS) 48-108
QoS, per-subscriber 24-4
QoS classification (definition)
QoS
classification 48-107
QoS congestion avoidance
QoS
congestion avoidance 48-107
QoS CoS
and ToS final L3 Switching Engine values 48-11
and ToS final values from L3 Switching Engine 48-11
port value, configuring 48-79
QoS default configuration 48-97, 49-2
QoS DSCP
definition 48-107
internal values 48-9
maps, configuring 48-74
QoS dual transmit queue
thresholds
configuring 48-79, 48-84
QoS enhancements, RSP720 4-4
QoS Ethernet egress port
scheduling 48-97
scheduling, congestion avoidance, and marking 48-11, 48-13
QoS Ethernet ingress port
classification, marking, scheduling, and congestion avoidance 48-6
QoS final L3 Switching Engine CoS and ToS values 48-11
QoS internal DSCP values 48-9
QoS L3 Switching Engine
classification, marking, and policing 48-9
feature summary 48-15
QoS labels (definition) 48-108
QoS mapping
CoS values to DSCP values 48-71, 48-74
DSCP markdown values 48-27, 48-75, 50-16
DSCP mutation 48-70, 50-29
DSCP values to CoS values 48-77
IP precedence values to DSCP values 48-75
QoS markdown 48-20
QoS marking
definition 48-108
trusted ports 48-14
untrusted ports 48-14
QoS MSFC
marking 48-17
QoS multilayer switch feature card 48-17
QoS OSM egress port
feature summary 48-13
QoS out of profile 48-19
QoS policing
definition 48-108
microflow, enabling for nonrouted traffic 48-48
QoS policing rule
aggregate 48-17
creating 48-53
microflow 48-17
QoS port
trust state 48-77
QoS port-based or VLAN-based 48-49
QoS queues
transmit, allocating bandwidth between 48-94
QoS receive queue 48-8, 48-90, 48-92
drop thresholds 48-22
QoS scheduling (definition) 48-108
QoS statistics data export 49-1
configuring 49-2
configuring destination host 49-7
configuring time interval 49-6, 49-9
QoS ToS
and CoS final values from L3 Switching Engine 48-11
definition 48-108
QoS traffic flow through QoS features 48-4
QoS transmit queue
size ratio 48-95, 48-96
QoS transmit queues 48-23, 48-87, 48-88, 48-91
QoS trust-cos
port keyword 48-14, 48-15
QoS trust-dscp
port keyword 48-14, 48-15
QoS trust-ipprec
port keyword 48-14, 48-15
QoS untrusted port keyword 48-14, 48-15
QoS VLAN-based or port-based 48-10, 48-49
queries, IGMP 33-3
queries, MLDv2 32-4
queues
dual-priority (IP subscriber) 24-5, 24-25
R
Radius accounting, per-subscriber 24-4
rapid convergence 20-13
Rapid-PVST
enabling 20-36
overview 20-17
Rapid Spanning Tree
See RSTP
Rapid Spanning Tree Protocol
See RSTP
receive queues
see QoS receive queues
recirculation 26-4, 48-12
reduced MAC address 20-2
redundancy (NSF) 5-1
configuring
BGP 5-13
CEF 5-13
EIGRP 5-18
IS-IS 5-15
OSPF 5-14
configuring multicast NSF with SSO 5-12
configuring supervisor engine 5-10
routing protocols 5-4
redundancy (RPR+) 7-1
configuring 7-6
configuring supervisor engine 7-5
displaying supervisor engine configuration 7-7
redundancy command 7-6
route processor redundancy plus 7-3
redundancy (SSO)
redundancy command 5-11
related documentation 1-lxi
reload command 2-16, 2-17
Remote source-route bridging (RSRB) 22-1
Replication Mode Detection 31-11
report, MLD 32-4
reserved-range VLANs
See VLANs
rewrite, packet
CEF 29-2
IP MMLS 31-3
RIF cache monitoring 8-15
rommon command 2-17
ROM monitor
boot process and 2-14
root bridge, STP 20-28
root guard
See STP root guard
root switch
MSTP 20-40
route processor redundancy
See redundancy (RPR+)
Route Switch Processor 720 (RSP720)
chassis support 4-1
feature support 4-2
flash memory 4-6
hardware components 4-2
high availability 4-3
IPv6 ACL enhancements 4-3
load balancing on GE bundles 4-4
overview 4-1
packet fragmentation over GRE tunnels 4-4
performance improvements 4-2
PFC compatibility 4-1
ports 4-6
QoS enhancements 4-4
rate-limiting of unknown unicast packets 4-3
scalability 4-3
switching modes 4-7
unsupported features 4-5
routing table, multicast 31-20
RPF
failure 31-5
multicast 31-2
non-RPF multicast 31-5
unicast 35-2
RPR+
See redundancy (RPR+)
RPR and RPR+ support IPv6 multicast traffic 7-1
RSTP
active topology 20-12
BPDU
format 20-15
processing 20-16
designated port, defined 20-12
designated switch, defined 20-12
interoperability with IEEE 802.1D
described 20-25
restarting migration process 20-49
topology changes 20-17
overview 20-12
port roles
described 20-12
synchronized 20-14
proposal-agreement handshake process 20-13
rapid convergence
described 20-13
edge ports and Port Fast 20-13
point-to-point links 20-13, 20-47
root ports 20-13
root port, defined 20-12
See also MSTP
S
SAID 14-6
sample configuration 2-4
Sampled NetFlow
description 56-8
saving the configuration file 2-5
scheduling
see QoS
secondary VLANs 15-2
Secure MAC Address Aging Type 54-10
security
configuring 35-1, 36-1, 43-1
security, port 54-1
security ACLs, per-subscriber 24-4
security precautions with Flash memory card 2-18
serial IDs
description 64-25
server IDs
description 64-26
service instance 57-30
service-policy command 48-54
service-policy input command 48-50, 48-68, 48-71, 48-73, 50-29
service-provider network, MSTP and RSTP 20-18
set power redundancy enable/disable command 59-2
short pipe mode, configuring 50-34
show boot command 2-19
show catalyst6000 chassis-mac-address command 20-3
show ciscoview package command 1-3
show ciscoview version command 1-3
show configuration command 8-14
show eobc command 8-15
show fm private-hosts command 39-23
show hardware command 8-2
show ibc command 8-15
show interfaces command 8-2, 8-11, 8-14, 8-15, 10-7, 10-12
displaying, interface type numbers 8-2
displaying, speed and duplex mode 8-8
show ip flow export command
displaying NDE export flow IP address and UDP port 56-26
show ip interface command
displaying IP MMLS interfaces 31-18
show ip mroute command
displaying IP multicast routing table 31-20
show ip pim interface command
displaying IP MMLS router configuration 31-18
show mls aging command 56-21
show mls entry command 29-5
show mls ip multicast group command
displaying IP MMLS group 31-21, 31-24
show mls ip multicast interface command
displaying IP MMLS interface 31-21, 31-24
show mls ip multicast source command
displaying IP MMLS source 31-21, 31-24
show mls ip multicast statistics command
displaying IP MMLS statistics 31-21, 31-24
show mls ip multicast summary
displaying IP MMLS configuration 31-21, 31-24
show mls nde command 56-29
displaying NDE flow IP address 56-26
show mls rp command
displaying IP MLS configuration 56-20
show module command 7-7
show private-hosts access-lists command 39-26
show private-hosts configuration command 39-28
show private-hosts interface configuration command 39-29
show private-hosts mac-list command 39-30
show protocols command 8-15
show rif command 8-15
show running-config command 2-4, 8-14, 8-15
show startup-config command 2-5
show version command 2-3, 2-17, 8-15
slot number, description 8-1
smart call home 64-1
description 64-2
destination profile (note) 64-4
registration requirements 64-2
service contract requirements 64-3
Transport Gateway (TG) aggregation point 64-2
SMARTnet
smart call home registration 64-2
SNMP
support and documentation 1-1
snooping
See IGMP snooping
See MLDv2 snooping
software
upgrading router 6-8
software configuration register functions 2-14 to 2-17
software images, Release 12.2SRB C-1
source IDs
call home event format 64-25
source-only-ip flow mask 56-3
source specific multicast with IGMPv3, IGMP v3lite, and URD 31-9
SPAN
configuration guidelines 57-6
configuring 57-11
sources 57-15, 57-19, 57-25, 57-27
VLAN filtering 57-34
overview 57-1
SPAN Destination Port Permit Lists 57-14
spanning-tree backbonefast
command 21-13
command example 21-13, 21-14
spanning-tree cost
command 20-32
command example 20-32, 20-33
spanning-tree portfast
command 21-8, 21-9
command example 21-8
spanning-tree portfast bpdu-guard
command 21-11
spanning-tree port-priority
command 20-30, 20-31
spanning-tree protocol for bridging 22-2
spanning-tree uplinkfast
command 21-12
command example 21-12
spanning-tree vlan
command 20-27, 20-29, 21-14
command example 20-27, 20-29
spanning-tree vlan cost
command 20-32
spanning-tree vlan forward-time
command 20-35
command example 20-35
spanning-tree vlan hello-time
command 20-34
command example 20-34
spanning-tree vlan max-age
command 20-35
command example 20-36
spanning-tree vlan port-priority
command 20-30
command example 20-31
spanning-tree vlan priority
command 20-33
command example 20-34
speed
configuring interface 8-5
speed command 3-2, 8-6
standby link 11-1
standby links 11-1
static route, configuring 2-5
statistics
802.1X 52-17
Sticky ARP 43-41
sticky ARP 43-41
Sticky secure MAC addresses 54-8, 54-9
storm control
see traffic-storm control
STP
configuring 20-25
bridge priority 20-33
enabling 20-26, 20-28
forward-delay time 20-35
hello time 20-34
maximum aging time 20-35
port cost 20-32
port priority 20-30
root bridge 20-28
secondary root switch 20-29
defaults 20-26
EtherChannel 12-5
understanding 20-1
802.1Q Trunks 20-11
Blocking State 20-7
BPDUs 20-3
disabled state 20-10
forwarding state 20-9
learning state 20-8
listening state 20-7
overview 20-2
port states 20-5
protocol timers 20-4
root bridge election 20-4
topology 20-4
STP BackboneFast
configuring 21-13
figure
adding a switch 21-7
spanning-tree backbonefast
command 21-13
command example 21-13, 21-14
understanding 21-4
STP BPDU Guard
configuring 21-11
spanning-tree portfast bpdu-guard
command 21-11
understanding 21-2
STP bridge ID 20-2
STP EtherChannel guard 21-6
STP loop guard
configuring 21-14
overview 21-6
STP PortFast
BPDU filter
configuring 21-10
BPDU filtering 21-2
configuring 21-8
spanning-tree portfast
command 21-8, 21-9
command example 21-8
understanding 21-2
STP root guard 21-6, 21-14
STP UplinkFast
configuring 21-12
spanning-tree uplinkfast
command 21-12
command example 21-12
understanding 21-3
subdomains, private VLAN 15-2
subscribers. See IP subscriber awareness
supervisor engine
configuring 2-1
default configuration 2-1
environmental monitoring 59-10
redundancy 5-1, 7-1
ROM monitor 2-14
startup configuration 2-13
static routes 2-5
synchronizing configurations 5-19, 7-7
Supervisor Engine 2, no longer supported
Supervisor Engine 32 9-1
flash memory 9-1
ports 9-2
supported chassis 9-1
supervisor engine redundancy
configuring 5-10, 7-5
supervisor engines
displaying redundancy configuration 7-7
Switched Port Analyzer
See SPAN
switch fabric functionality 3-2, 4-6
configuring 3-4, 4-8
monitoring 3-4, 4-9
switchport
configuring 10-13
example 10-12
show interfaces 8-11, 10-7, 10-12
switchport access vlan 10-10, 10-13
example 10-14
switchport mode access 10-4, 10-13
example 10-14
switchport mode dynamic 10-9
switchport mode dynamic auto 10-4
switchport mode dynamic desirable 10-4
default 10-5
example 10-12
switchport mode trunk 10-4, 10-9
switchport nonegotiate 10-4
switchport trunk allowed vlan 10-11
switchport trunk encapsulation 10-8
switchport trunk encapsulation dot1q 10-3
example 10-12
switchport trunk encapsulation isl 10-3
switchport trunk encapsulation negotiate 10-3
default 10-5
switchport trunk native vlan 10-10
switchport trunk pruning vlan 10-11
switch priority
MSTP 20-44
switch TopN reports
foreground execution 61-2
overview 61-1
running 61-2
viewing 61-2
system
configuration register
configuration 2-14 to 2-17
settings at startup 2-15
configuring global parameters 2-2
System Hardware Capacity 59-5
system image
determining if and how to load 2-15
loading from Flash 2-18
T
TACACS+ 35-1, 36-1, 43-1
TCP Intercept 35-2
TDR
checking cable connectivity 8-16
enabling and disabling test 8-16
guidelines 8-16
Time Domain Reflectometer
See TDR
TopN reports
See switch TopN reports
traceroute, Layer 2
and ARP 62-2
and CDP 62-1
described 62-1
IP addresses and subnets 62-2
MAC addresses and VLANs 62-2
multicast traffic 62-2
multiple devices on a port 62-2
unicast traffic 62-1
usage guidelines 62-1
traffic flood blocking 47-1
traffic-storm control
command
broadcast 46-4
described 46-1
monitoring 46-6
thresholds 46-1
traffic suppression
see traffic-storm control
translational bridge numbers (defaults) 14-6
transmit queues
see QoS transmit queues
trunks 10-2
802.1Q Restrictions 10-5
allowed VLANs 10-11
configuring 10-7
default interface configuration 10-7
default VLAN 10-10
different VTP domains 10-3
encapsulation 10-3
native VLAN 10-10
to non-DTP device 10-4
VLAN 1 minimization 10-11
trust-dscp
see QoS trust-dscp
trust-ipprec
see QoS trust-ipprec
trustpoint 64-3
tunneling 50-4, 50-31
tunneling, 802.1Q
See 802.1Q 17-1
Type of Service (ToS) 48-108
U
UDE 25-1
configuration 25-3
overview 25-2
UDE and UDLR 25-1
UDE on ES-20 Line cards
restrictions 24-7, 69-2
UDLD
default configuration 55-3
enabling
globally 55-3
on ports 55-4
overview 55-1
UDLR 25-1
back channel 25-1
configuration 25-6
tunnel
(example) 25-7
ARP and NHRP 25-3
UDLR (unidirectional link routing)
See UDLR
unauthorized ports with 802.1X 52-4
Unicast and Multicast Flood Blocking 47-1
unicast flood blocking 47-1
unicast RPF 35-2
unicast storms
see traffic-storm control
Unidirectional Ethernet
see UDE
unidirectional ethernet
example of setting 25-5
UniDirectional Link Detection Protocol
see UDLD
uniform mode
configuring 50-39
untrusted
see QoS trust-cos
see QoS untrusted
upgrade guidelines 26-20
UplinkFast
See STP UplinkFast
URD 31-9
User-Based Rate Limiting 48-19, 48-66
V
VACLs 38-1
configuring 38-4
examples 38-9
Layer 3 VLAN interfaces 38-8
Layer 4 port operations 36-5
logging
configuration example 38-11
configuring 38-10
restrictions 38-10
MAC address based 38-4
multicast packets 38-3
overview 38-1
SVIs 38-8
WAN interfaces 38-1
version 8 (NDE) 56-10
virtual LAN
See VLANs
vlan
command 14-11, 14-13, 56-18, 57-19
command example 14-12
VLAN-based QoS filtering 48-56
VLAN-bridge spanning-tree protocol 22-2
vlan database
command 14-11, 14-13, 56-18, 57-19
vlan mapping dot1q
command 14-16, 14-17
command example 14-18
VLAN mode 26-24
VLANs
allowed on trunk 10-11
configuration guidelines 14-8
configuring 14-1
configuring (tasks) 14-10
defaults 14-6, 14-8
extended range 14-2
ID (default) 14-6
interface assignment 14-13
name (default) 14-6
normal range 14-2
private
See private VLANs
reserved range 14-2
support for 4,096 VLANs 14-2
token ring 14-3
trunks
understanding 10-2
understanding 14-1
VLAN 1 minimization 10-11
VTP domain 14-2
VLAN translation
command example 14-16, 14-17
VLAN Trunking Protocol
See VTP
voice VLAN
Cisco 7960 phone, port connections 16-1
configuration guidelines 16-4
configuring IP phone for data traffic
override CoS of incoming frame 16-7, 16-8
configuring ports for voice traffic in
802.1Q frames 16-5
connecting to an IP phone 16-5
default configuration 16-4
overview 16-1
VPN
configuration example 26-16
guidelines and restrictions 26-15
VTP
advertisements 13-3
client, configuring 13-11
configuration guidelines 13-6
default configuration 13-6
disabling 13-11
domains 13-2, 70-1
VLANs 14-2
modes
client 13-2
server 13-2
transparent 13-2
monitoring 13-13
overview 13-1, 70-1
pruning
configuration 10-11
configuring 13-9
overview 13-5
server, configuring 13-11
statistics 13-13
transparent mode, configuring 13-11
version 2
enabling 13-10
overview 13-3
W
WCCP
configuring on a router 60-2, 60-14
service groups 60-8
specifying protocol version 60-7
web browser interface 1-1
Web Cache Communication Protocol
See WCCP
web caches
See cache engines
web cache services
description 60-5
web caching
See web cache services
See also WCCP
web scaling 60-1
weighted round robin 48-94
WRR 48-94
X
xconnect command 26-20
Y
Y.1731 Performance Monitoring 74-1