Cisco 7600 Series Router Software Configuration Guide, Cisco IOS Release 15S
Index
Downloads: This chapterpdf (PDF - 882.0KB) The complete bookPDF (PDF - 14.63MB) | Feedback

Index

Symbols

!Mini Protocol Analyzer 66-1

Numerics

4K VLANs (support for 4,096 VLANs) 14-2

802.10 SAID (default) 14-6

802.1Q

encapsulation 10-3

Layer 2 protocol tunneling

See Layer 2 protocol tunneling

mapping to ISL VLANs 14-14, 14-17

trunks 10-2

restrictions 10-5

tunneling 17-1

configuration guidelines 17-3

configuring tunnel ports 17-6

802.1Q Ethertype, specifying custom 10-15

802.1X

See port-based authentication

802.3ad

See LACP

802.3X Flow Control 8-12

A

AAA 35-1, 36-1, 43-1

access control entries and lists 35-1, 36-1, 43-1

access-enable host timeout (not supported) 36-2

access interface (IP subscriber) 24-3

access lists, using with WCCP 60-10

access port, configuring 10-13

ACEs and ACLs 35-1, 36-1, 43-1

acronyms, list of A-1, B-1

addresses

IP, see IP addresses

MAC, see MAC addresses

advertisements, VTP 13-3

aggregate label 26-2, 26-4

aggregate policing

see QoS policing

aging time

IP MLS 56-20

maximum

for MSTP 20-47

MSTP accelerated 20-46

MSTP maximum 20-47

alarms

major 59-12

minor 59-12

Allow DHCP Option 82 on Untrusted Port

configuring 44-10

understanding 44-3

any transport over MPLS (AToM) 26-18

compatibility with previous releases of AToM 26-20

Ethernet over MPLS 26-24

ARP spoofing 45-1

AToM 26-18

authentication

See also port-based authentication

Authentication, Authorization, and Accounting

See AAA

Authentication, Authorization, and Accounting (AAA) 43-1

authorized ports with 802.1X 52-4

auto-sync command 7-6

B

BackboneFast

See STP BackboneFast

backup interfaces

See Flex Links

bandwidth-remaining ratio (BRR), IP subscriber 24-5, 24-21, 24-23

binding database, DHCP snooping

See DHCP snooping binding database

binding database, DHCP snooping

See DHCP snooping binding database

blocking floods 47-1

blocking state, STP 20-7

boot bootldr command 2-19

boot command 2-16

boot config command 2-19

boot system command 2-15, 2-19

boot system flash command 2-16

BPDU, RSTP format 20-15

BPDU guard

See STP BPDU guard

Bridge Domain 57-29

Bridged Routed Encapsulation within an Automatic Protection Switching Group 14-8

bridge groups 22-2

bridge ID

See STP bridge ID

bridge priority, STP 20-33

bridge protocol data units

see BPDUs

bridging 22-1

broadcast storms

see traffic-storm control

C

cache engine clusters 60-1

cache engines 60-1

cache farms

See cache engine clusters

Call Home

description 64-1

message format options 64-1

messages

format options 64-1

call home 64-1

alert groups 64-6

configuring e-mail options 64-9

contact information 64-3

default settings 64-18

destination profiles 64-4

displaying information 64-14

mail-server priority 64-10

pattern matching 64-9

periodic notification 64-8

rate limit messages 64-9

severity threshold 64-8

smart call home feature 64-2

SMTP server 64-9

testing communications 64-10

call home alert groups

configuring 64-6

description 64-6

subscribing 64-6

call home contacts

assigning information 64-3

call home destination profiles

attributes 64-4

configuring 64-5

description 64-4

displaying 64-16

call home notifications

full-txt format for syslog 64-28

XML format for syslog 64-29

cautions for passwords

encrypting 2-11

TACACS+ 2-10

CEF

configuring

MSFC2 29-5

supervisor engine 29-4

examples 29-3

Layer 3 switching 29-2

packet rewrite 29-2

certificate authority (CA) 64-3

CGMP 33-8

channel-group group

command 12-9, 12-12

command example 12-9

checking running configuration 2-4

Cisco Cache Engines 60-2

Cisco Express Forwarding 26-3

Cisco Group Management Protocol

See CGMP

Cisco IOS Release 12.2SRB software images C-1

Cisco IOS Unicast Reverse Path Forwarding 35-2

CiscoView 1-2

CIST regional root

See MSTP

CIST root

See MSTP

class command 48-62

classification (QoS) 48-107

class-map command 48-54

class map configuration 48-59

class of service (CoS) 48-107

Committed Access Rate (CAR), not supported 48-2

community ports 15-3

community VLANs 15-2, 15-3

Concurrent routing and bridging (CRB) 22-1

CONFIG_FILE environment variable

configuration file, viewing 2-20

description 2-19

config-register command 2-16, 2-17

config terminal command 2-3

configuration

file, saving 2-5

register

changing settings 2-16 to 2-17

configuration 2-14 to 2-17

settings at startup 2-15

configuration example

EoMPLS port mode 26-25, 26-27

EoMPLS VLAN mode 26-25

configuration register boot field

listing value 2-17

modification tasks 2-16

configure command 2-3

configure terminal command 2-16, 8-2

configuring 48-61

global parameters

sample configuration 2-2

using configuration mode 2-3 to 2-4

Configuring GTP-SLB IPv6 Support 23-4

contact information

assigning for call home 64-3

control plane policing

See CoPP

control plane policing and protection (CoPP)

per-subscriber 24-4

CoPP

applying QoS service policy to control plane 43-31

configuring

ACLs to match traffic 43-31

enabling MLS QoS 43-31

packet classification criteria 43-31

service-policy map 43-31

control plane configuration mode, entering 43-31

displaying

dynamic information 43-33

number of conforming bytes and packets 43-33

rate information 43-33

entering control plane configuration mode 43-31

monitoring statistics 43-33

overview 43-29

packet classification guidelines 43-32

traffic classification

defining 43-38

guidelines 43-39

overview 43-38

sample ACLs 43-39

sample classes 43-38

CoPP. See control plane policing and protection (CoPP)

copy running-config startup-config command 2-5

copy system

running-config nvram

startup-config command 2-19

CoS, override priority 16-7, 16-8

D

data gleaning 41-4

dCEF 29-4, 29-5

debug commands

IP MMLS 31-25

debug fm private-hosts command 39-31

debug private-hosts command 39-32

DEC spanning-tree protocol 22-2

default configuration

802.1X 52-6

dynamic ARP inspection 45-5

Flex Links 11-2

IP MMLS 31-7

LLDP 17-9

MSTP 20-37

supervisor engine 2-1

UDLD 55-3

voice VLAN 16-4

VTP 13-6

default NDE configuration 56-14

default VLAN 10-10

deficit weighted round robin 48-94

denial of service protection

See DoS protection

description command 8-14

destination-ip flow mask 56-3

destination-source-ip flow mask 56-3

device IDs

call home format 64-25

DHCP binding database

See DHCP snooping binding database

DHCP binding table

See DHCP snooping binding database

DHCP option 82

circuit ID suboption 44-5

overview 44-3

packet format, suboption

circuit ID 44-5

remote ID 44-5

remote ID suboption 44-5

DHCP option 82 allow on untrusted port 44-10

DHCP snooping

binding database

See DHCP snooping binding database

configuration guidelines 44-6

configuring 44-8

default configuration 44-6

displaying binding tables 44-18

enabling 44-9, 44-10, 44-11, 44-13

enabling the database agent 44-14

message exchange process 44-4

option 82 data insertion 44-3

overview 44-1

Snooping database agent 44-5

DHCP snooping binding database

described 44-2

entries 44-2

DHCP snooping binding table

See DHCP snooping binding database

DHCP Snooping Database Agent

adding to the database (example) 44-17

enabling (example) 44-15

overview 44-5

reading from a TFTP file (example) 44-16

DHCP snooping increased bindings limit 44-7, 44-15

differentiated services codepoint

See QoS DSCP

Differentiated Services Code Point (DSCP) 48-107

DiffServ

configuring short pipe mode 50-34

configuring uniform mode 50-39

short pipe mode 50-31

uniform mode 50-32

DiffServ tunneling modes 50-4

Disabling PIM Snooping Designated Router Flooding 34-5

distributed Cisco Express Forwarding

See dCEF

documentation, related 1-lx

document organization 1-lvi

DoS protection

monitoring packet drop statistics

using monitor session commands 43-24

using VACL capture 43-25

PFC configuration guidelines and restrictions 43-23

Supervisor Engine 720 43-10

default configurations 43-22

egress ACL bridget packet rate limiters 43-16

FIB glean rate limiters 43-18

FIB receive rate limiters 43-18

ICMP redirect rate limiters 43-18

IGMP unreachable rate limiters 43-17

ingress ACL bridget packet rate limiters 43-16

IP errors rate limiters 43-20

IPv4 multicast rate limiters 43-20

IPv6 multicast rate limiters 43-21

Layer 2 PDU rate limiters 43-19

Layer 2 protocol tunneling rate limiters 43-19

MTU failure rate limiters 43-19

multicast directyly connected rate limiters 43-20

multicast FIB miss rate limiters 43-20

multicast IGMP snooping rate limiters 43-19

network under SYN attack 43-13

QoS ACLs 43-12

security ACLs 43-11

TCP intercept 43-13

traffic storm control 43-13

TTL failure rate limiter 43-17

uRPF check 43-12

uRPF failure rate limiters 43-17

VACL log rate limiters 43-19

Supervisor Engine 720Layer 3 security features rate limiters 43-18

DSCP

See QoS DSCP

DSCP-based queue mapping 48-86

dual-priority queues

IP subscriber 24-5, 24-25

duplex command 8-7

duplex mode

configuring interface 8-5

DWRR 48-94

dynamic ARP inspection

ARP cache poisoning 45-2

ARP requests, described 45-1

ARP spoofing attack 45-2

clearing

log buffer 45-16

statistics 45-16

configuration guidelines 45-5

configuring

log buffer 45-13, 45-14

logging system messages 45-14

rate limit for incoming ARP packets 45-4, 45-9

default configuration 45-5

denial-of-service attacks, preventing 45-9

described 45-1

DHCP snooping binding database 45-3

displaying

ARP ACLs 45-15

configuration and operating state 45-15

log buffer 45-16

statistics 45-16

trust state and rate limit 45-15

error-disabled state for exceeding rate limit 45-4

function of 45-2

interface trust states 45-3

log buffer

clearing 45-16

configuring 45-13, 45-14

displaying 45-16

logging of dropped packets, described 45-4

logging system messages

configuring 45-14

man-in-the middle attack, described 45-2

network security issues and interface trust states 45-3

priority of ARP ACLs and DHCP snooping entries 45-4

rate limiting of ARP packets

configuring 45-9

described 45-4

error-disabled state 45-4

statistics

clearing 45-16

displaying 45-16

validation checks, performing 45-11

Dynamic Host Configuration Protocol snooping

See DHCP snooping

E

eFSU. See enhanced Fast Software Upgrade (eFSU)

Egress ACL support for remarked DSCP 48-12

egress ACL support for remarked DSCP 48-50

egress replication performance improvement 31-13

e-mail addresses

assigning for call home 64-3

e-mail notifications

Call Home 64-1

Embedded CiscoView 1-2

enable command 2-3, 2-16

enable sticky secure MAC address 54-8

enabling

IP MMLS

on router interfaces 31-11

encapsulation 10-3

encapsulation frame-relay ietf command 57-38

enhanced Fast Software Upgrade (eFSU)

aborting (issu abortversion command) 6-19

accepting the new software version 6-17

commiting the new software to standby RP (issu commitversion command) 6-17

disabling compatibility matrix check 6-10

displaying maximum outage time for line cards 6-14

error handling 6-4

forcing a switchover (issu runversion command) 6-14

issu loadversion command 6-12

loading new software onto standby RP 6-12

memory reservation on line card 6-3

memory reservation on line card, prohibiting 6-3

OIR not supported 6-7

operation 6-2

outage times 6-3

overview 6-1

performing 6-8

SSO, RPR, and RPR+ modes 6-7

steps 6-8

usage guidelines and limitations 6-7

verifying redundancy mode 6-10

enhanced interface range command 8-3

environmental monitoring

LED indications 59-12

SNMP traps 59-12

supervisor engine and switching modules 59-12

Syslog messages 59-12

using CLI commands 59-10

environment variables

CONFIG_FILE 2-19

controlling 2-19

viewing 2-19

EoMPLS 26-18

configuring 26-23

configuring VLAN mode 26-24

guidelines and restrictions 26-19

port mode 26-24

port mode configuration guidelines 26-27

VLAN mode 26-24

erase startup-config command

configuration files cleared with 2-6

ERSPAN 57-1

ERSPAN on EVC 57-29

EtherChannel

channel-group group

command 12-9, 12-12

command example 12-9

configuration guidelines 12-5

configuring

Layer 2 12-8

configuring (tasks) 12-7

interface port-channel

command example 12-8

interface port-channel (command) 12-8

lacp system-priority

command example 12-11

Layer 2, configuring 12-8

load balancing

configuring 12-11

understanding 12-5

modes 12-2

PAgP, understanding 12-3

port-channel interfaces 12-5

port-channel load-balance

command 12-10, 12-11

command example 12-11

STP 12-5

switchport trunk encapsulation dot1q 12-6

understanding 12-1

EtherChannel Guard

See STP EtherChannel Guard

EtherChannel Min-Links 12-12

Ethernet, setting port duplex 8-13

Ethernet over MPLS (EoMPLS) configuration

EoMPLS port mode 26-27

EoMPLS VLAN mode 26-24

EVC 57-29

examples

software configuration register 2-14 to 2-17

EXP mutation 50-4

extended range VLANs 14-2

See VLANs

extended system ID, MSTP 20-40

Extensible Authentication Protocol over LAN 52-1

Extranet MVPN Architecture 28-1

F

fabric switching mode

See switch fabric module

fabric switching-mode allow dcef-only command on Supervisor Engine 720 5-2, 7-4

fall-back bridging 22-2

fiber-optic, detecting unidirectional links 55-1

FIB TCAM 26-3

filters, NDE

destination host filter, specifying 56-28

destination TCP/UDP port, specifying 56-27

overview 56-7

protocol 56-28

source host and destination TCP/UDP port 56-27

Flash memory

configuration process 2-18

configuring router to boot from 2-18

loading system image from 2-18

security precautions 2-18

write protection 2-18

Flex Links 11-1

configuration guidelines 11-2

configuring 11-3

default configuration 11-2

description 11-1

monitoring 11-3

flood blocking 47-1

flow control 8-12

flow masks

IP MLS

destination-ip 56-3

destination-source-ip 56-3

interface-destination-source-ip 56-3

ip-full 56-3

ip-interface-full 56-3

minimum 56-19

overview 56-3

flowmasks

NetFlow (Release 12.2SRA) 56-3

NetFlow (Release 12.2SRB) 56-3

flows

IP MMLS

completely and partially switched 31-3

forward-delay time

MSTP 20-46

forward-delay time, MSTP 20-46

forward-delay time, STP 20-35

frame distribution

See EtherChannel load balancing

G

global parameters, configuring 2-2

GTP-SLB Support for IPv6 23-1

H

hardware Layer 3 switching, guidelines 29-4

hello time, MSTP 20-45

hello time, STP 20-34

High Capacity Power Supply Support 59-4

host ports 15-3

http

//www.cisco.com/en/US/docs/ios/qos/command/reference/qos_book.html 4-5

//www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.html 40-8, 57-39, 57-42

I

ICMP unreachable messages 36-1

IDs

serial IDs 64-25

IEEE 802.10 SAID (default) 14-6

IEEE 802.1Q

See 802.1Q

IEEE 802.1Q Ethertype

specifying custom 10-15

IEEE 802.1w

See RSTP

IEEE 802.3ad

See LACP

IEEE 802.3X Flow Control 8-12

IEEE bridging protocol 22-2

IGMP

configuration guidelines 32-7, 33-7

enabling 33-10

Internet Group Management Protocol 33-1

join messages 33-2

leave processing

enabling 33-12

queries 33-3

query interval, configuring 33-11

snooping

fast leave 33-5

joining multicast group 33-2

leaving multicast group 33-4

understanding 33-2

snooping querier

enabling 33-9

understanding 33-2

IGMPv3 31-9

IGMP v3lite 31-9

In Service Software Upgrade (ISSU) 6-1

Integrated routing and bridging (IRB) 22-1

interface

command 2-3

Layer 2 modes 10-4

number 8-1

interface, access (IP subscriber) 24-3

interface access command 24-33

interface-destination-source-ip flow mask 56-3

interface port-channel

command example 12-8

interface port-channel (command) 12-8

interfaces

configuring 8-2

configuring, duplex mode 8-5

configuring, speed 8-5

configururing, overview 8-1

descriptive name, adding 8-14

naming 8-14

range of 8-3

interfaces command 8-2

interfaces range command 8-3

interfaces range macro command 8-4

Internet Group Management Protocol

See IGMP

IP accounting, IP MMLS and 31-8

IP addresses

assigned by BOOTP protocol 2-6

set to default 2-6

IP CEF, topology (figure) 29-3

ip flow-export destination command 56-24

ip flow-export source command 56-23, 56-25, 61-2, 61-3, 61-4

ip-full flow mask 56-3

ip http server 1-1

ip-interface-full flow mask 56-3

IP MLS

aging-time 56-20

flow masks

destination-ip 56-3

destination-source-ip 56-3

interface-destination-source-ip 56-3

ip-full 56-3

ip-interface-full 56-3

minimum 56-19

overview 56-3

NDE

See NDE

IP MMLS

cache, overview 31-2

configuration guideline 31-7

debug commands 31-25

default configuration 31-7

enabling

on router interfaces 31-11

flows

completely and partially switched 31-3

Layer 3 MLS cache 31-2

overview 31-2

packet rewrite 31-3

router

displaying interface information 31-17

enabling globally 31-9

enabling on interfaces 31-11

multicast routing table, displaying 31-20

PIM, enabling 31-10

unsupported features 31-8

IP multicast

IGMP snooping and 33-9

MLDv2 snooping and 32-9

overview 33-1

IP multicast MLS

See IP MMLS

ip multicast-routing command

enabling IP multicast 31-10

IP phone, configuring 16-5

ip pim command

enabling IP PIM 31-10

IP precedence 48-108

IP static routes 2-5

IP subscriber awareness

benefits 24-2

configuration example 24-30

configuration guidelines 24-27

configuring 24-28, 24-29

control plane policing and protection (CoPP) 24-4

interface access command 24-33

IP subscriber interface 24-3

IP subscriber session 24-3

lawful intercept 24-4

overview 24-1

per-subscriber features 24-4

QoS 24-4

bandwidth-remaining ratio (BRR) 24-5, 24-21, 24-23

dual-priority queues 24-5, 24-25

priority-rate propagation 24-5, 24-25, 24-26

QoS recommendations 24-20

Radius accounting 24-4

security ACLs 24-4

unsupported features 24-26

IP unnumbered 22-1

IPv4 Multicast over Point-to-Point GRE Tunnels 1-4

IPv4 Multicast VPN 27-1

IPv6 Multicast PFC3 and DFC3 Layer 3 Switching 30-1

IPv6 Prefix Guard 41-3

IPv6 Source Guard 41-2

ip wccp version command 60-8

ISL encapsulation 10-3

ISL trunks 10-2

isolated port 15-3

isolated VLANs 15-2, 15-3

ISSU, See In Service Software Upgrade (ISSU)

J

join messages, IGMP 33-2

jumbo frames 8-8

L

label edge router 26-2

label switched path 26-23

label switch router 26-2, 26-3

LACP

system ID 12-4

LACP over EVC Port Channel

Verification 23-13

LACP over EVC port channel

configuration commands, configuration steps 18-6, 23-5, 23-8, 68-6, 68-8, 68-9, 68-11

Examples 23-12

lawful intercept, per-subscriber 24-4

Layer 2

configuring interfaces 10-6

access port 10-13

trunk 10-7

defaults 10-5

interface modes 10-4

show interfaces 8-11, 10-7, 10-12

switching 10-1

trunks 10-2

VLAN interface assignment 14-13

Layer 2 interfaces, configuring 10-1

Layer 2 protocol tunneling

configuring Layer 2 tunnels 18-2

overview 18-1

Layer 2 remarking 48-14

Layer 2 Traceroute 62-1

Layer 2 traceroute

and ARP 62-2

and CDP 62-1

described 62-1

IP addresses and subnets 62-2

MAC addresses and VLANs 62-2

multicast traffic 62-2

multiple devices on a port 62-2

unicast traffic 62-1

usage guidelines 62-1

Layer 3

IP MMLS and MLS cache 31-2

Layer 3 switched packet rewrite

CEF 29-2

Layer 3 switching

CEF 29-2

Layer 4 port operations (ACLs) 36-5

leave processing, IGMP

enabling 33-12

leave processing, MLDv2

enabling 32-12

LERs 50-2, 50-6, 50-7

link failure, detecting unidirectional 20-24

link negotiation 8-7

link redundancy

See Flex Links

LLDP

configuring

default configuration 17-9

Load Balancing 26-8

Local Egress Replication 31-13

logical operation unit

See LOU

loop guard

See STP loop guard

LOU

description 36-6

determining maximum number of 36-6

LSRs 50-2, 50-6

M

MAC address

adding to BOOTP configuration file 2-6

MAC address-based blocking 35-1

MAC move (port security) 54-2

macro, interfaces range 8-4

main-cpu command 7-6

mapping 802.1Q VLANs to ISL VLANs 14-14, 14-17

markdown

see QoS markdown

maximum aging time, MSTP 20-47

maximum aging time, STP 20-35

maximum hop count, MSTP 20-47

microflow policing rule

see QoS policing

Min-Links 12-12

MLD report 32-4

MLD snooping

query interval, configuring 32-11

MLDv2 32-1

enabling 32-9

leave processing

enabling 32-12

queries 32-4

snooping

fast leave 32-6

joining multicast group 32-4

leaving multicast group 32-6

understanding 32-1

snooping querier

enabling 32-8

understanding 32-1

MLDv2 Snooping 32-1

MLS

configuring threshold 31-14

MSFC threshold 31-14

mls aging command

configuring IP MLS 56-21

mls flow command

configuring IP MLS 56-19, 56-20

mls ip multicast command

enabling IP MMLS 31-11, 31-12, 31-14, 31-15, 31-16, 31-22, 31-23

mls nde flow command

configuring a host and port filter 56-27

configuring a host flow filter 56-28

configuring a port filter 56-27

configuring a protocol flow filter 56-28

mls nde sender command 56-21

monitoring

Flex Links 11-3

private VLANs 15-16

MPLS 26-2

aggregate label 26-2

any transport over MPLS 26-18

basic configuration 26-8

core 26-3

DiffServ Tunneling Modes 50-31

egress 26-4

experimental field 50-3

guidelines and restrictions 26-7

ingress 26-3

IP to MPLS path 26-3

labels 26-2

Layer 2 VPN load balancing 26-8

MPLS to IP path 26-4

MPLS to MPLS path 26-3

nonaggregate lable 26-2

QoS default configuration 50-15

VPN 50-12

VPN guidelines and restrictions 26-15

mpls l2 transport route command 26-20

MPLS QoS

Classification 50-2

Class of Service 50-2

commands 50-16

configuring a class map 50-20

configuring a policy map 50-23

configuring egress EXP mutation 50-28

configuring EXP Value Maps 50-30

Differentiated Services Code Point 50-2

displaying a policy map 50-27

E-LSP 50-2

enabling QoS globally 50-18

EXP bits 50-2

features 50-3

IP Precedence 50-2

QoS Tags 50-2

queueing-only mode 50-19

MPLS QoS configuration

class map to classify MPLS packets 50-20

MPLS VPN, limitations and restrictions 26-15

MQC 48-1

not supported

CAR 48-2

queuing 48-2

supported

policy maps 48-3

MSTP

boundary ports

configuration guidelines 20-38

described 20-22

CIST, described 20-19

CIST regional root 20-20

CIST root 20-21

configuration guidelines 20-37

configuring

forward-delay time 20-46

link type for rapid convergence 20-47

maximum aging time 20-47

maximum hop count 20-47

MST region 20-38

neighbor type 20-48

path cost 20-43

port priority 20-42

root switch 20-40

secondary root switch 20-41

switch priority 20-44

configuring hello time 20-45

CST

defined 20-19

operations between regions 20-20

default configuration 20-37

displaying status 20-49

enabling the mode 20-38

extended system ID

effects on root switch 20-40

effects on secondary root switch 20-41

unexpected behavior 20-40

IEEE 802.1s

implementation 20-23

port role naming change 20-23

terminology 20-21

interoperability with IEEE 802.1D

described 20-25

restarting migration process 20-49

IST

defined 20-19

master 20-20

operations within a region 20-20

mapping VLANs to MST instance 20-39

MST region

CIST 20-19

configuring 20-38

described 20-18

hop-count mechanism 20-22

IST 20-19

supported spanning-tree instances 20-19

overview 20-17

root switch

configuring 20-40

effects of extended system ID 20-40

unexpected behavior 20-40

status, displaying 20-49

MTU size (default) 14-6

multicast

IGMP snooping and 33-9

MLDv2 snooping and 32-9

NetFlow statistics 56-14

non-RPF 31-5

overview 33-1

PIM snooping 34-3

multicast, displaying routing table 31-20

Multicast enhancement - egress replication performance improvement 31-13

Multicast Enhancement - Replication Mode Detection 31-11

multicast flood blocking 47-1

multicast groups

joining 33-2

leaving 32-6, 33-4

multicast groups, IPv6

joining 32-4

Multicast Listener Discovery version 2

See MLDv2

multicast multilayer switching

See IPv4 MMLS

Multicast Replication Mode Detection enhancement 31-11

multicast RPF 31-2

multicast storms

see traffic-storm control

Multicast VPN 28-1

multilayer switch feature card

see MSFC

multiple path RPF check 35-2

N

native VLAN 10-10

NBAR 48-1

NDE

configuration, displaying 56-29

displaying configuration 56-29

enabling 56-15

filters

destination host, specifying 56-28

destination TCP/UDP port, specifying 56-27

overview 56-7

protocol, specifying 56-28

source host and destination TCP/UDP port, specifying 56-27

multicast 56-14

overview 56-1

specifying

destination host filters 56-28

destination TCP/UDP port filters 56-27

protocol filters 56-28

NDE configuration, default 56-14

NDE version 8 56-10

NetFlow and NDE for Ingress Bridged IP Traffic 56-24

NetFlow Data Export

See NDE

Netflow Multiple Export Destinations 56-24

NetFlow version 9 56-3

Network-Based Application Recognition 48-1

nonaggregate label 26-2, 26-4

non-RPF multicast 31-5

Nonstop Forwarding

See NSF

nonvolatile random-access memory

See NVRAM

normal-range VLANs

See VLANs

NSF 5-1

NSF with SSO does not support IPv6 multicast traffic. 5-1

NVRAM

saving settings 2-5

O

OIR 8-14

online diagnostics

configuring 42-2

diagnostic sanity check 42-11

memory tests 42-10

overview 42-1

running tests 42-6

schedule switchover 42-10

test descriptions A-1

understanding 42-1

online diagnostic tests A-1

online insertion and removal

See OIR

operating system image

See system image

out of profile

see QoS out of profile

P

packet burst 43-16

packet capture 66-1

packet recirculation 48-12

packet rewrite

CEF 29-2

IP MMLS and 31-3

packets

multicast 38-3

PACLs. See private hosts feature

PAgP

understanding 12-3

passwords

configuring

enable password 2-9

enable secret 2-9

line password 2-9

static enable password 2-8

TACACS+ 2-10

TACACS+ (caution) 2-10

encrypting 2-10

(caution) 2-11

recovering lost enable passwords 2-13

path cost

MSTP 20-43

PBR 1-4, 22-4

PFC3BXL

hardware features 26-4

MPLS guidelines and restrictions 26-7

MPLS label switching 26-1

MPLS supported commands 26-7

recirculation 26-4

supported Cisco IOS features 26-5

VPN supported commands 26-16

VPN switching 26-14

PFC compatibility with RSP720 4-1

PIM, IP MMLS and 31-10

PIM snooping

designated router flooding 34-5

enabling globally 34-4

enabling in a VLAN 34-5

overview 34-3

police command 48-65

policing

See QoS policing

policing, QoS (definition) 48-108

policy 48-54

policy-based routing

See PBR

policy map 48-61

attaching to an interface 48-68

policy-map command 48-54, 48-62

Port Aggregation Protocol

see PAgP

port-based ACLs (PACLs). See private hosts feature

port-based authentication

authentication server

defined 52-2

RADIUS server 52-2

client, defined 52-2

configuration guidelines 52-7

configuring

initializing authentication of a client 52-12

manual reauthentication of a client 52-11

quiet period 52-12

RADIUS server 52-10

RADIUS server parameters on the switch 52-9

switch-to-authentication-server retransmission time 52-14

switch-to-client EAP-request frame retransmission time 52-14

switch-to-client frame-retransmission number 52-15

switch-to-client retransmission time 52-13

default configuration 52-6

described 52-1

device roles 52-2

displaying statistics 52-17

EAPOL-start frame 52-3

EAP-request/identity frame 52-3

EAP-response/identity frame 52-3

enabling

802.1X authentication 52-8, 52-9

periodic reauthentication 52-11

encapsulation 52-2

initiation and message exchange 52-3

method lists 52-8

ports

authorization state and dot1x port-control command 52-4

authorized and unauthorized 52-4

resetting to default values 52-16

switch

as proxy 52-2

RADIUS client 52-2

topologies, supported 52-5

port-based QoS features

see QoS

port channel

switchport trunk encapsulation dot1q 12-6

port-channel

see EtherChannel

port-channel load-balance

command 12-10, 12-11

command example 12-11

port cost, STP 20-32

port debounce timer 8-13

PortFast

See STP PortFast

PortFast BPDU filtering

See STP PortFast BPDU filtering

port mode 26-24

port negotiation 8-7

port priority

MSTP 20-42

port priority, STP 20-30

ports

setting the debounce timer 8-13

port security

aging 54-9, 54-10

configuring 54-4

default configuration 54-3

described 54-1

displaying 54-11

enable sticky secure MAC address 54-8

violations 54-2

Port Security is supported on trunks 54-4, 54-7, 54-9

port security MAC move 54-2

port security on PVLAN ports 54-3

Port Security with Sticky Secure MAC Addresses 54-2

power management

enabling/disabling redundancy 59-2

overview 59-1

powering modules up or down 59-3

system power requirements, nine-slot chassis 59-5

primary links 11-1

primary VLANs 15-2

priority

overriding CoS 16-7, 16-8

priority-rate propagation, IP subscriber 24-5, 24-25, 24-26

private-hosts command 39-14

private hosts feature

command reference 39-13

configuration guidelines 39-5, 39-6

configuring (detailed steps) 39-10

configuring (summary) 39-9

debug fm private-hosts command 39-31

debug private-hosts command 39-32

isolating hosts in a VLAN 39-2

multicast operation 39-9

overview 39-1

port ACLs (PACLs) 39-4

port types 39-3

private-hosts command 39-14

private-hosts mac-list command 39-15

private-hosts mode command 39-17

private-hosts promiscuous command 39-19

private-hosts vlan-list command 39-21

protocol-independent MAC ACLs 39-1

restricting traffic flow with PACLs 39-3

show fm private-hosts command 39-23

show private-hosts access-lists command 39-26

show private-hosts configuration command 39-28

show private-hosts interface configuration command 39-29

show private-hosts mac-list command 39-30

spoofing protection 39-9

private-hosts mac-list command 39-15

private-hosts mode command 39-17

private-hosts promiscuous command 39-19

private-hosts vlan-list command 39-21

private VLANs 15-1

across multiple switches 15-5

and SVIs 15-6

benefits of 15-2

community VLANs 15-2, 15-3

configuration guidelines 15-7, 15-9, 15-11

configuring 15-11

host ports 15-14

pomiscuous ports 15-15

routing secondary VLAN ingress traffic 15-13

secondary VLANs with primary VLANs 15-12

VLANs as private 15-11

end station access to 15-4

IP addressing 15-4

isolated VLANs 15-2, 15-3

monitoring 15-16

ports

community 15-3

configuration guidelines 15-9

isolated 15-3

promiscuous 15-3

primary VLANs 15-2

secondary VLANs 15-2

subdomains 15-2

traffic in 15-6

privileges

changing default 2-12

configuring

multiple levels 2-11

privilege level 2-11

exiting 2-12

logging in 2-12

procedures

global parameters, configuring 2-2

using configuration mode 2-3 to 2-4

promiscuous ports 15-3

protocol tunneling

See Layer 2 protocol tunneling 18-1

pruning, VTP

See VTP, pruning

PVLANs

See private VLANs

PVRST

See Rapid-PVST 20-17

Q

QoS

class of service (CoS), definition 48-107

DSCP (definition) 48-107

IP precedence 48-108

marking 48-108

policing 48-108

Type of Service (ToS) 48-108

QoS, per-subscriber 24-4

QoS classification (definition)

QoS

classification 48-107

QoS congestion avoidance

QoS

congestion avoidance 48-107

QoS CoS

and ToS final L3 Switching Engine values 48-11

and ToS final values from L3 Switching Engine 48-11

port value, configuring 48-79

QoS default configuration 48-97, 49-2

QoS DSCP

definition 48-107

internal values 48-9

maps, configuring 48-74

QoS dual transmit queue

thresholds

configuring 48-79, 48-84

QoS enhancements, RSP720 4-4

QoS Ethernet egress port

scheduling 48-97

scheduling, congestion avoidance, and marking 48-11, 48-13

QoS Ethernet ingress port

classification, marking, scheduling, and congestion avoidance 48-6

QoS final L3 Switching Engine CoS and ToS values 48-11

QoS internal DSCP values 48-9

QoS L3 Switching Engine

classification, marking, and policing 48-9

feature summary 48-15

QoS labels (definition) 48-108

QoS mapping

CoS values to DSCP values 48-71, 48-74

DSCP markdown values 48-27, 48-75, 50-16

DSCP mutation 48-70, 50-29

DSCP values to CoS values 48-77

IP precedence values to DSCP values 48-75

QoS markdown 48-20

QoS marking

definition 48-108

trusted ports 48-14

untrusted ports 48-14

QoS MSFC

marking 48-17

QoS multilayer switch feature card 48-17

QoS OSM egress port

feature summary 48-13

QoS out of profile 48-19

QoS policing

definition 48-108

microflow, enabling for nonrouted traffic 48-48

QoS policing rule

aggregate 48-17

creating 48-53

microflow 48-17

QoS port

trust state 48-77

QoS port-based or VLAN-based 48-49

QoS queues

transmit, allocating bandwidth between 48-94

QoS receive queue 48-8, 48-90, 48-92

drop thresholds 48-22

QoS scheduling (definition) 48-108

QoS statistics data export 49-1

configuring 49-2

configuring destination host 49-7

configuring time interval 49-6, 49-9

QoS ToS

and CoS final values from L3 Switching Engine 48-11

definition 48-108

QoS traffic flow through QoS features 48-4

QoS transmit queue

size ratio 48-95, 48-96

QoS transmit queues 48-23, 48-87, 48-88, 48-91

QoS trust-cos

port keyword 48-14, 48-15

QoS trust-dscp

port keyword 48-14, 48-15

QoS trust-ipprec

port keyword 48-14, 48-15

QoS untrusted port keyword 48-14, 48-15

QoS VLAN-based or port-based 48-10, 48-49

queries, IGMP 33-3

queries, MLDv2 32-4

queues

dual-priority (IP subscriber) 24-5, 24-25

R

Radius accounting, per-subscriber 24-4

rapid convergence 20-13

Rapid-PVST

enabling 20-36

overview 20-17

Rapid Spanning Tree

See RSTP

Rapid Spanning Tree Protocol

See RSTP

receive queues

see QoS receive queues

recirculation 26-4, 48-12

reduced MAC address 20-2

redundancy (NSF) 5-1

configuring

BGP 5-13

CEF 5-13

EIGRP 5-18

IS-IS 5-15

OSPF 5-14

configuring multicast NSF with SSO 5-12

configuring supervisor engine 5-10

routing protocols 5-4

redundancy (RPR+) 7-1

configuring 7-6

configuring supervisor engine 7-5

displaying supervisor engine configuration 7-7

redundancy command 7-6

route processor redundancy plus 7-3

redundancy (SSO)

redundancy command 5-11

related documentation 1-lx

reload command 2-16, 2-17

Remote source-route bridging (RSRB) 22-1

Replication Mode Detection 31-11

report, MLD 32-4

reserved-range VLANs

See VLANs

rewrite, packet

CEF 29-2

IP MMLS 31-3

RIF cache monitoring 8-15

rommon command 2-17

ROM monitor

boot process and 2-14

root bridge, STP 20-28

root guard

See STP root guard

root switch

MSTP 20-40

route processor redundancy

See redundancy (RPR+)

Route Switch Processor 720 (RSP720)

chassis support 4-1

feature support 4-2

flash memory 4-6

hardware components 4-2

high availability 4-3

IPv6 ACL enhancements 4-3

load balancing on GE bundles 4-4

overview 4-1

packet fragmentation over GRE tunnels 4-4

performance improvements 4-2

PFC compatibility 4-1

ports 4-6

QoS enhancements 4-4

rate-limiting of unknown unicast packets 4-3

scalability 4-3

switching modes 4-7

unsupported features 4-5

routing table, multicast 31-20

RPF

failure 31-5

multicast 31-2

non-RPF multicast 31-5

unicast 35-2

RPR+

See redundancy (RPR+)

RPR and RPR+ support IPv6 multicast traffic 7-1

RSTP

active topology 20-12

BPDU

format 20-15

processing 20-16

designated port, defined 20-12

designated switch, defined 20-12

interoperability with IEEE 802.1D

described 20-25

restarting migration process 20-49

topology changes 20-17

overview 20-12

port roles

described 20-12

synchronized 20-14

proposal-agreement handshake process 20-13

rapid convergence

described 20-13

edge ports and Port Fast 20-13

point-to-point links 20-13, 20-47

root ports 20-13

root port, defined 20-12

See also MSTP

S

SAID 14-6

sample configuration 2-4

Sampled NetFlow

description 56-8

saving the configuration file 2-5

scheduling

see QoS

secondary VLANs 15-2

Secure MAC Address Aging Type 54-10

security

configuring 35-1, 36-1, 43-1

security, port 54-1

security ACLs, per-subscriber 24-4

security precautions with Flash memory card 2-18

serial IDs

description 64-25

server IDs

description 64-26

service instance 57-30

service-policy command 48-54

service-policy input command 48-50, 48-68, 48-71, 48-73, 50-29

service-provider network, MSTP and RSTP 20-18

set power redundancy enable/disable command 59-2

short pipe mode, configuring 50-34

show boot command 2-19

show catalyst6000 chassis-mac-address command 20-3

show ciscoview package command 1-3

show ciscoview version command 1-3

show configuration command 8-14

show eobc command 8-15

show fm private-hosts command 39-23

show hardware command 8-2

show ibc command 8-15

show interfaces command 8-2, 8-11, 8-14, 8-15, 10-7, 10-12

displaying, interface type numbers 8-2

displaying, speed and duplex mode 8-8

show ip flow export command

displaying NDE export flow IP address and UDP port 56-26

show ip interface command

displaying IP MMLS interfaces 31-18

show ip mroute command

displaying IP multicast routing table 31-20

show ip pim interface command

displaying IP MMLS router configuration 31-18

show mls aging command 56-21

show mls entry command 29-5

show mls ip multicast group command

displaying IP MMLS group 31-21, 31-24

show mls ip multicast interface command

displaying IP MMLS interface 31-21, 31-24

show mls ip multicast source command

displaying IP MMLS source 31-21, 31-24

show mls ip multicast statistics command

displaying IP MMLS statistics 31-21, 31-24

show mls ip multicast summary

displaying IP MMLS configuration 31-21, 31-24

show mls nde command 56-29

displaying NDE flow IP address 56-26

show mls rp command

displaying IP MLS configuration 56-20

show module command 7-7

show private-hosts access-lists command 39-26

show private-hosts configuration command 39-28

show private-hosts interface configuration command 39-29

show private-hosts mac-list command 39-30

show protocols command 8-15

show rif command 8-15

show running-config command 2-4, 8-14, 8-15

show startup-config command 2-5

show version command 2-3, 2-17, 8-15

slot number, description 8-1

smart call home 64-1

description 64-2

destination profile (note) 64-4

registration requirements 64-2

service contract requirements 64-3

Transport Gateway (TG) aggregation point 64-2

SMARTnet

smart call home registration 64-2

SNMP

support and documentation 1-1

snooping

See IGMP snooping

See MLDv2 snooping

software

upgrading router 6-8

software configuration register functions 2-14 to 2-17

software images, Release 12.2SRB C-1

source IDs

call home event format 64-25

source-only-ip flow mask 56-3

source specific multicast with IGMPv3, IGMP v3lite, and URD 31-9

SPAN

configuration guidelines 57-6

configuring 57-11

sources 57-15, 57-19, 57-25, 57-27

VLAN filtering 57-34

overview 57-1

SPAN Destination Port Permit Lists 57-14

spanning-tree backbonefast

command 21-13

command example 21-13, 21-14

spanning-tree cost

command 20-32

command example 20-32, 20-33

spanning-tree portfast

command 21-8, 21-9

command example 21-8

spanning-tree portfast bpdu-guard

command 21-11

spanning-tree port-priority

command 20-30, 20-31

spanning-tree protocol for bridging 22-2

spanning-tree uplinkfast

command 21-12

command example 21-12

spanning-tree vlan

command 20-27, 20-29, 21-14

command example 20-27, 20-29

spanning-tree vlan cost

command 20-32

spanning-tree vlan forward-time

command 20-35

command example 20-35

spanning-tree vlan hello-time

command 20-34

command example 20-34

spanning-tree vlan max-age

command 20-35

command example 20-36

spanning-tree vlan port-priority

command 20-30

command example 20-31

spanning-tree vlan priority

command 20-33

command example 20-34

speed

configuring interface 8-5

speed command 3-2, 8-6

standby link 11-1

standby links 11-1

static route, configuring 2-5

statistics

802.1X 52-17

Sticky ARP 43-41

sticky ARP 43-41

Sticky secure MAC addresses 54-8, 54-9

storm control

see traffic-storm control

STP

configuring 20-25

bridge priority 20-33

enabling 20-26, 20-28

forward-delay time 20-35

hello time 20-34

maximum aging time 20-35

port cost 20-32

port priority 20-30

root bridge 20-28

secondary root switch 20-29

defaults 20-26

EtherChannel 12-5

understanding 20-1

802.1Q Trunks 20-11

Blocking State 20-7

BPDUs 20-3

disabled state 20-10

forwarding state 20-9

learning state 20-8

listening state 20-7

overview 20-2

port states 20-5

protocol timers 20-4

root bridge election 20-4

topology 20-4

STP BackboneFast

configuring 21-13

figure

adding a switch 21-7

spanning-tree backbonefast

command 21-13

command example 21-13, 21-14

understanding 21-4

STP BPDU Guard

configuring 21-11

spanning-tree portfast bpdu-guard

command 21-11

understanding 21-2

STP bridge ID 20-2

STP EtherChannel guard 21-6

STP loop guard

configuring 21-14

overview 21-6

STP PortFast

BPDU filter

configuring 21-10

BPDU filtering 21-2

configuring 21-8

spanning-tree portfast

command 21-8, 21-9

command example 21-8

understanding 21-2

STP root guard 21-6, 21-14

STP UplinkFast

configuring 21-12

spanning-tree uplinkfast

command 21-12

command example 21-12

understanding 21-3

subdomains, private VLAN 15-2

subscribers. See IP subscriber awareness

supervisor engine

configuring 2-1

default configuration 2-1

environmental monitoring 59-10

redundancy 5-1, 7-1

ROM monitor 2-14

startup configuration 2-13

static routes 2-5

synchronizing configurations 5-19, 7-7

Supervisor Engine 2, no longer supported

Supervisor Engine 32 9-1

flash memory 9-1

ports 9-2

supported chassis 9-1

supervisor engine redundancy

configuring 5-10, 7-5

supervisor engines

displaying redundancy configuration 7-7

Switched Port Analyzer

See SPAN

switch fabric functionality 3-2, 4-6

configuring 3-4, 4-8

monitoring 3-4, 4-9

switchport

configuring 10-13

example 10-12

show interfaces 8-11, 10-7, 10-12

switchport access vlan 10-10, 10-13

example 10-14

switchport mode access 10-4, 10-13

example 10-14

switchport mode dynamic 10-9

switchport mode dynamic auto 10-4

switchport mode dynamic desirable 10-4

default 10-5

example 10-12

switchport mode trunk 10-4, 10-9

switchport nonegotiate 10-4

switchport trunk allowed vlan 10-11

switchport trunk encapsulation 10-8

switchport trunk encapsulation dot1q 10-3

example 10-12

switchport trunk encapsulation isl 10-3

switchport trunk encapsulation negotiate 10-3

default 10-5

switchport trunk native vlan 10-10

switchport trunk pruning vlan 10-11

switch priority

MSTP 20-44

switch TopN reports

foreground execution 61-2

overview 61-1

running 61-2

viewing 61-2

system

configuration register

configuration 2-14 to 2-17

settings at startup 2-15

configuring global parameters 2-2

System Hardware Capacity 59-5

system image

determining if and how to load 2-15

loading from Flash 2-18

T

TACACS+ 35-1, 36-1, 43-1

TCP Intercept 35-2

TDR

checking cable connectivity 8-16

enabling and disabling test 8-16

guidelines 8-16

Time Domain Reflectometer

See TDR

TopN reports

See switch TopN reports

traceroute, Layer 2

and ARP 62-2

and CDP 62-1

described 62-1

IP addresses and subnets 62-2

MAC addresses and VLANs 62-2

multicast traffic 62-2

multiple devices on a port 62-2

unicast traffic 62-1

usage guidelines 62-1

traffic flood blocking 47-1

traffic-storm control

command

broadcast 46-4

described 46-1

monitoring 46-6

thresholds 46-1

traffic suppression

see traffic-storm control

translational bridge numbers (defaults) 14-6

transmit queues

see QoS transmit queues

trunks 10-2

802.1Q Restrictions 10-5

allowed VLANs 10-11

configuring 10-7

default interface configuration 10-7

default VLAN 10-10

different VTP domains 10-3

encapsulation 10-3

native VLAN 10-10

to non-DTP device 10-4

VLAN 1 minimization 10-11

trust-dscp

see QoS trust-dscp

trust-ipprec

see QoS trust-ipprec

trustpoint 64-3

tunneling 50-4, 50-31

tunneling, 802.1Q

See 802.1Q 17-1

Type of Service (ToS) 48-108

U

UDE 25-1

configuration 25-3

overview 25-2

UDE and UDLR 25-1

UDE on ES-20 Line cards

restrictions 24-7, 69-2

UDLD

default configuration 55-3

enabling

globally 55-3

on ports 55-4

overview 55-1

UDLR 25-1

back channel 25-1

configuration 25-6

tunnel

(example) 25-7

ARP and NHRP 25-3

UDLR (unidirectional link routing)

See UDLR

unauthorized ports with 802.1X 52-4

Unicast and Multicast Flood Blocking 47-1

unicast flood blocking 47-1

unicast RPF 35-2

unicast storms

see traffic-storm control

Unidirectional Ethernet

see UDE

unidirectional ethernet

example of setting 25-5

UniDirectional Link Detection Protocol

see UDLD

uniform mode

configuring 50-39

untrusted

see QoS trust-cos

see QoS untrusted

upgrade guidelines 26-20

UplinkFast

See STP UplinkFast

URD 31-9

User-Based Rate Limiting 48-19, 48-66

V

VACLs 38-1

configuring 38-4

examples 38-9

Layer 3 VLAN interfaces 38-8

Layer 4 port operations 36-5

logging

configuration example 38-11

configuring 38-10

restrictions 38-10

MAC address based 38-4

multicast packets 38-3

overview 38-1

SVIs 38-8

WAN interfaces 38-1

version 8 (NDE) 56-10

virtual LAN

See VLANs

vlan

command 14-11, 14-13, 56-18, 57-19

command example 14-12

VLAN-based QoS filtering 48-56

VLAN-bridge spanning-tree protocol 22-2

vlan database

command 14-11, 14-13, 56-18, 57-19

vlan mapping dot1q

command 14-16, 14-17

command example 14-18

VLAN mode 26-24

VLANs

allowed on trunk 10-11

configuration guidelines 14-8

configuring 14-1

configuring (tasks) 14-10

defaults 14-6, 14-8

extended range 14-2

ID (default) 14-6

interface assignment 14-13

name (default) 14-6

normal range 14-2

private

See private VLANs

reserved range 14-2

support for 4,096 VLANs 14-2

token ring 14-3

trunks

understanding 10-2

understanding 14-1

VLAN 1 minimization 10-11

VTP domain 14-2

VLAN translation

command example 14-16, 14-17

VLAN Trunking Protocol

See VTP

voice VLAN

Cisco 7960 phone, port connections 16-1

configuration guidelines 16-4

configuring IP phone for data traffic

override CoS of incoming frame 16-7, 16-8

configuring ports for voice traffic in

802.1Q frames 16-5

connecting to an IP phone 16-5

default configuration 16-4

overview 16-1

VPN

configuration example 26-16

guidelines and restrictions 26-15

VTP

advertisements 13-3

client, configuring 13-11

configuration guidelines 13-6

default configuration 13-6

disabling 13-11

domains 13-2, 70-1

VLANs 14-2

modes

client 13-2

server 13-2

transparent 13-2

monitoring 13-13

overview 13-1, 70-1

pruning

configuration 10-11

configuring 13-9

overview 13-5

server, configuring 13-11

statistics 13-13

transparent mode, configuring 13-11

version 2

enabling 13-10

overview 13-3

W

WCCP

configuring on a router 60-2, 60-14

service groups 60-8

specifying protocol version 60-7

web browser interface 1-1

Web Cache Communication Protocol

See WCCP

web caches

See cache engines

web cache services

description 60-5

web caching

See web cache services

See also WCCP

web scaling 60-1

weighted round robin 48-94

WRR 48-94

X

xconnect command 26-20

Y

Y.1731 Performance Monitoring 74-1