Catalyst 2940 Switch Software Configuration Guide, 12.1(19)EA1
Index
Downloads: This chapterpdf (PDF - 843.0KB) The complete bookPDF (PDF - 5.33MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - L - M - N - P - Q - R - S - T - U - V - W - X -

Index

Numerics

802.1D

See STP

802.1Q

and trunk ports     9-2

configuration limitations     13-13

native VLAN for untagged traffic     13-17

802.1X

See port-based authentication

A

abbreviating commands     2-4

AC (command switch)     5-9, 5-20

access control list

See ACL

access-denied response, VMPS     13-22

accessing

clusters, switch     5-12

command switches     5-9

member switches     5-12

switch clusters     5-12

access list

See ACL

access ports

defined     9-2

in switch clusters     5-7

accounting

with RADIUS     7-27

with TACACS+     7-10, 7-16

ACL     1-4

addresses

displaying the MAC address table     6-26

dynamic

accelerated aging     11-8

changing the aging time     6-22

default aging     11-8

defined     6-20

learning     6-21

removing     6-23

MAC

discovering     6-26

multicast STP address management     11-8

static

adding and removing     6-25

defined     6-20

address resolution     6-26

Address Resolution Protocol

See ARP table

advertisements

CDP     19-1

VTP     13-14, 14-3

aggregated ports

See EtherChannel

aging, accelerating     11-8

aging time

accelerated

for STP     11-8, 11-19

MAC address table     6-22

maximum for STP     11-19

alarms, RMON     21-3

allowed-VLAN list     13-16

ARP table

address resolution     6-26

managing     6-26

attributes, RADIUS

vendor-proprietary     7-29

vendor-specific     7-28

authentication

local mode with AAA     7-31

NTP associations     6-4

RADIUS

key     7-20

login     7-22

TACACS+

defined     7-10

key     7-12

login     7-13

See also port-based authentication

authoritative time source, described     6-2

authorization

with RADIUS     7-26

with TACACS+     7-10, 7-15

authorized ports with 802.1X     8-4

autoconfiguration     4-3

automatic discovery

adding member switches     5-16

considerations

beyond a non-candidate device     5-5, 5-6

brand new switches     5-7

connectivity     5-3

management VLANs     5-5, 5-6

non-CDP-capable devices     5-5

non-cluster-capable devices     5-5

creating a cluster standby group     5-19

in switch clusters     5-3

See also CDP

automatic recovery, clusters     5-8

See also HSRP

autonegotiation

interface configuration guidelines     9-11

mismatches     26-8

auxiliary VLAN

See voice VLAN

B

BackboneFast

described     12-5

enabling     12-13

support for     1-3

banners

configuring

login     6-20

message-of-the-day login     6-19

default configuration     6-18

when displayed     6-18

booting

boot loader, function of     4-1

boot process     4-1

boot loader

described     4-1

trap-door mechanism     4-2

BPDU

error-disabled state     12-2

filtering     12-3

BPDU filtering

described     12-3

enabling     12-11

support for     1-3

BPDU guard

described     12-2

enabling     12-11

support for     1-3

broadcast storm control

configuring     17-2

disabling     17-3

browser configuration     5-1, 5-3

C

cables, monitoring for unidirectional links     18-1

candidate switch

adding     5-16

automatic discovery     5-3

defined     5-3

HC     5-20

passwords     5-18

requirements     5-3

standby group     5-19

See also command switch, cluster standby group, and member switch

cautions     xx

CC (command switch)     5-20

CDP

and trusted boundary     24-7

automatic discovery in switch clusters     5-3

configuring     19-2

default configuration     19-2

described     19-1

disabling for routing device     19-3, 19-4

enabling and disabling

on an interface     19-4

on a switch     19-3

monitoring     19-5

overview     19-1

transmission timer and holdtime, setting     19-2

updates     19-2

CGMP, joining multicast group     16-3

Cisco Access Analog Trunk Gateway     1-10

Cisco CallManager software     1-10

Cisco Discovery Protocol

See CDP

Cisco IOS command-line interface

See CLI

Cisco IP Phones     1-10

Cisco SoftPhone software     1-10

CiscoWorks 2000     1-6, 23-4

clearing interfaces     9-15

CLI

abbreviating commands     2-4

command modes     2-1

described     1-6

editing features

enabling and disabling     2-6

keystroke editing     2-7

wrapped lines     2-8

error messages     2-5

getting help     2-3

history

changing the buffer size     2-5

described     2-5

disabling     2-6

recalling commands     2-6

managing clusters     5-21

no and default forms of commands     2-4

client mode, VTP     14-3

clock

See system clock

clusters, switch

accessing     5-12

adding member switches     5-16

automatic discovery     5-3

automatic recovery     5-8

command switch configuration     5-15

compatibility     5-3

creating     5-15

creating a cluster standby group     5-19

described     5-1

LRE profile considerations     5-15

managing

through CLI     5-21

through SNMP     5-22

planning     5-3

planning considerations

automatic discovery     5-3

automatic recovery     5-8

CLI     5-21

host names     5-12

IP addresses     5-12

LRE profiles     5-15

management VLAN     5-14

passwords     5-12

RADIUS     5-13

SNMP     5-13, 5-22

switch-specific features     5-15

TACACS+     5-13

redundancy     5-19

troubleshooting     5-21

verifying     5-20, 5-21

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

cluster standby group

automatic recovery     5-11

considerations     5-9

creating     5-19

defined     5-2

requirements     5-2

virtual IP address     5-9

See also HSRP

CMS

advantages     1-6

configuration modes     3-5

described     1-6

Front Panel view

described     3-2

operating systems and supported browsers     3-8

requirements     3-7 to  3-9

Topology view     3-14

wizards     3-6

command-line interface

See CLI

command modes     2-1

commands

abbreviating     2-4

no and default     2-4

setting privilege levels     7-7

command switch

accessing     5-9

active (AC)     5-9, 5-20

command switch with HSRP disabled (CC)     5-20

configuration conflicts     26-7

defined     5-1

enabling     5-15

passive (PC)     5-9, 5-20

password privilege levels     5-22

priority     5-9

recovery

from command-switch failure     5-9

from failure     26-4

from lost member connectivity     26-7

redundant     5-8, 5-19

replacing

with another switch     26-6

with cluster member     26-5

requirements     5-2

standby (SC)     5-9, 5-20

See also candidate switch, cluster standby group, member switch, and standby command switch

community strings

configuring     5-13, 23-7

for cluster switches     23-4

in clusters     5-13

overview     23-3

SNMP     5-13

configuration conflicts, recovering from lost member connectivity     26-7

configuration examples, network

collapsed backbone and switch cluster     1-9

design concepts

network performance     1-7

network services     1-7

large campus     1-10

small to medium-sized network     1-8

configuration files

limiting TFTP server access     23-13

obtaining with DHCP     4-7

system contact and location information     23-13

VMPS database     13-23

configuration modes, CMS     3-5

configuration settings, saving     4-10

configure terminal command     9-5

config-vlan mode     2-2, 13-6

conflicts, configuration     26-7

connectivity problems     26-8

consistency checks in VTP version 2     14-4

console port, connecting to     2-9

conventions

command     xx

for examples     xx

text     xx

CoS

configuring     24-2

configuring priority queues     24-9

defining     24-3

override priority     15-5

trust priority     15-5

counters, clearing interface     9-15

crashinfo file     26-13

D

daylight saving time     6-13

debugging

enabling all system diagnostics     26-12

enabling for a specific feature     26-12

redirecting error message output     26-12

using commands     26-11

default commands     2-4

default configuration

802.1X     8-6

banners     6-18

CDP     19-2

DNS     6-17

EtherChannel     25-8

IGMP filtering     16-22

IGMP snooping     16-6

IGMP throttling     16-22

initial switch information     4-2

Layer 2 interfaces     9-10

MAC address table     6-22

MVR     16-16

NTP     6-4

optional spanning-tree features     12-9

password and privilege level     7-2

QoS     24-3

RADIUS     7-19

RMON     21-3

RSPAN     20-5

SNMP     23-5

SPAN     20-5

STP     11-10

system message logging     22-3

system name and prompt     6-15

TACACS+     7-12

UDLD     18-4

VLAN, Layer 2 Ethernet interfaces     13-13

VLANs     13-7

VMPS     13-24

voice VLAN     15-2

VTP     14-6

default gateway     4-9

deleting VLANs     13-9

description command     9-14

detecting indirect link failures, STP     12-5

device discovery protocol     19-1

Device Manager     3-13

See also Switch Manager

DHCP-based autoconfiguration

client request message exchange     4-4

configuring

client side     4-3

DNS     4-6

relay device     4-6

server-side     4-4

TFTP server     4-5

example     4-8

lease options

for IP address information     4-4

for receiving the configuration file     4-5

overview     4-3

relationship to BOOTP     4-3

discovery, clusters

See automatic discovery

DNS

and DHCP-based autoconfiguration     4-6

default configuration     6-17

displaying the configuration     6-18

overview     6-16

setting up     6-17

documentation, related     xxi

domain names

DNS     6-16

VTP     14-8

Domain Name System

See DNS

DTP     1-4, 13-12

duplex mode, configuring     9-11

dynamic access ports

characteristics     13-3

configuring     13-26

defined     9-2

dynamic addresses

See addresses

dynamic desirable trunking mode     13-12

dynamic port VLAN membership

described     13-22

reconfirming     13-27

troubleshooting     13-29

types of connections     13-26

VMPS database configuration file     13-23

Dynamic Trunking Protocol

See DTP

E

editing features

enabling and disabling     2-6

keystrokes used     2-7

wrapped lines     2-8

enable password     7-4

enable secret password     7-4

encapsulation     24-2

encryption for passwords     7-4

error messages

during command entry     2-5

setting the display destination device     22-4

severity levels     22-8

system message format     22-2

EtherChannel

automatic creation of     25-3

configuration guidelines     25-8

default configuration     25-8

destination MAC address forwarding     25-6

displaying status     25-14

forwarding methods     25-11

interaction with STP     25-8

Layer 2 interfaces, configuring     25-9

load balancing     25-6, 25-11

number of interfaces per     25-2

overview     25-1

PAgP

aggregate-port learners     25-5

compatibility with Catalyst 1900     25-12

displaying status     25-14

interaction with other features     25-5

learn method and priority configuration     25-12

modes     25-3

overview     25-3

silent mode     25-4

support for     1-2

port-channel interfaces

described     25-2

numbering of     25-2

port groups     9-3

source MAC address forwarding     25-6

EtherChannel guard

described     12-7

enabling     12-14

Ethernet VLANs

adding     13-7

defaults and ranges     13-7

modifying     13-7

events, RMON     21-3

examples

conventions for     xx

network configuration     1-7

expert mode     3-6

Express Setup     3-11

extended system ID

STP     11-3, 11-12

Extensible Authentication Protocol over LAN     8-1

F

fallback VLAN name     13-23

fiber-optic, detecting unidirectional links     18-1

files, crashinfo

description     26-13

displaying the contents of     26-13

location     26-13

filtering show and more command output     2-9

forward-delay time

STP     11-5, 11-19

forwarding

See broadcast storm control

FTP, accessing MIB files     A-3

G

get-bulk-request operation     23-3

get-next-request operation     23-3, 23-4

get-request operation     23-3, 23-4

get-response operation     23-3

global configuration mode     2-2

guide

audience     xix

purpose     xix

guide mode     3-5

H

HC (candidate switch)     5-20

hello time STP     11-18

help, for the command line     2-3

history

changing the buffer size     2-5

described     2-5

disabling     2-6

recalling commands     2-6

history table, level and number of syslog messages     22-9

host names

abbreviations appended to     5-20

in clusters     5-12

hosts, limit on dynamic ports     13-29

HP OpenView     1-6

HSRP

automatic cluster recovery     5-11

cluster standby group considerations     5-9

See also clusters, cluster standby group, and standby command switch

I

ICMP ping

executing     26-9

overview     26-8

IDS, using with SPAN     20-2

IEEE 802.1P     15-1

IGMP

joining multicast group     16-3

join messages     16-3

leave processing, enabling     16-10

leaving multicast group     16-4

queries     16-3

report suppression

described     16-5

disabling     16-11

IGMP filtering

configuring     16-22

default configuration     16-22

described     16-21

monitoring     16-27

IGMP groups

configuring the filtering action     16-25

setting the maximum number     16-25

IGMP profile

applying     16-23

configuration mode     16-22

configuring     16-23

IGMP snooping

configuring     16-6

default configuration     16-6

definition     16-1

enabling and disabling     16-7

global configuration     16-7

Immediate Leave     16-5

method     16-7

monitoring     16-12

VLAN configuration     16-7

IGMP throttling

configuring     16-25

default configuration     16-22

described     16-21

displaying action     16-27

Immediate-Leave, IGMP     16-5

ingress port scheduling     24-3

interface

number     9-4

range macros     9-8

interface command     9-4, 9-5

interface configuration mode     2-3

interfaces

Cisco IOS supported     1-6

configuration guidelines     9-11

configuring     9-5

configuring duplex mode     9-11

configuring speed     9-11

counters, clearing     9-15

described     9-14

descriptive name, adding     9-14

displaying information about     9-15

IOS supported     1-5

monitoring     9-14

naming     9-14

physical, identifying     9-4

range of     9-6

restarting     9-16

shutting down     9-16

supported     9-10

types of     9-1

interfaces range macro command     9-8

Intrusion Detection System

See IDS

inventory, cluster     5-21

IP addresses

candidate or member     5-3, 5-12

cluster access     5-2

command switch     5-2, 5-9, 5-12

discovering     6-26

management VLAN     5-14

redundant clusters     5-9

standby command switch     5-9, 5-12

See also IP information

ip igmp profile command     16-22

IP information

assigned

manually     4-9

through DHCP-based autoconfiguration     4-3

default configuration     4-2

IP multicast routing and IGMP snooping     16-1, 16-6

IP phones

and QoS     15-1

configuring     15-3

trusted boundary for QoS     24-6

IPv4     1-1

IPv6     1-1

IP version 4     1-1

IP version 6     1-1

J

Java plug-in configuration     5-1, 5-3

join messages, IGMP     16-3

L

LACP

See EtherChannel

Layer 2 frames, classification with CoS     24-1

Layer 2 interfaces, default configuration     9-10

Layer 2 traceroute

and ARP     26-11

and CDP     26-10

described     26-10

IP addresses and subnets     26-11

MAC addresses and VLANs     26-10

multicast traffic     26-10

multiple devices on a port     26-11

unicast traffic     26-10

usage guidelines     26-10

Layer 2 trunks     13-12

leave processing, IGMP     16-10

line configuration mode     2-3

links, unidirectional     18-1

login authentication

with RADIUS     7-22

with TACACS+     7-13

login banners     6-18

log messages

See system message logging

loop guard

described     12-9

enabling     12-15

support for     1-3

LRE profiles, considerations in switch clusters     5-15

M

MAC addresses

adding

sticky secure     17-5

aging time     6-22

and VLAN association     6-21

building the address table     6-21

default configuration     6-22

discovering     6-26

displaying     6-26

dynamic

learning     6-21

removing     6-23

static

adding     6-25

characteristics of     6-25

removing     6-25

MAC address multicast entries, monitoring     16-13

MAC address-to-VLAN mapping     13-22

macros

See SmartPort macros

management options

benefits

clustering     1-6

CMS     1-6

CLI     2-1

overview     1-5, 1-6

management VLAN

changing     5-14

considerations in switch clusters     5-5, 5-6, 5-14

discovery through different management VLANs     5-6

discovery through same management VLAN     5-5

IP address     5-14

maximum aging time

STP     11-19

membership mode, VLAN port     13-3

member switch

adding     5-16

automatic discovery     5-3

defined     5-1

managing     5-21

passwords     5-12

recovering from lost connectivity     26-7

requirements     5-3

See also candidate switch, cluster standby group, and standby command switch

menu bar

variations     3-4

messages

to users through banners     6-18

MIBs

accessing files with FTP     A-3

location of files     A-3

overview     23-1

SNMP interaction with     23-4

supported     A-1

mirroring traffic for analysis     20-1

mismatches, autonegotiation     26-8

monitoring

cables for unidirectional links     18-1

CDP     19-5

IGMP

filters     16-27

snooping     16-12

interfaces     9-14

multicast router interfaces     16-13

MVR     16-20

network traffic for analysis with probe     20-1

port protection     17-12

speed and duplex mode     9-12

traffic flowing among switches     21-1

traffic suppression     17-12

VLANs     13-11

VMPS     13-28

VTP     14-15

MSTP

BPDU filtering

described     12-3

enabling     12-11

BPDU guard

described     12-2

enabling     12-11

configuration guidelines     12-10

default optional feature configuration     12-9

EtherChannel guard

described     12-7

enabling     12-14

instances supported     11-9

interface state, blocking to forwarding     12-1

interoperability and compatibility among modes     11-9

loop guard

described     12-9

enabling     12-15

Port Fast

described     12-1

enabling     12-10

preventing root switch selection     12-8

root guard

described     12-8

enabling     12-14

shutdown Port Fast-enabled port     12-2

multicast groups

and IGMP snooping     16-6

Immediate Leave     16-5

joining     16-3

leaving     16-4

static joins     16-9

multicast router interfaces, monitoring     16-13

multicast router ports, adding     16-8

Multicast VLAN Registration

See MVR

MVR

configuring interfaces     16-18

default configuration     16-16

described     16-14

modes     16-18

monitoring     16-20

setting global parameters     16-17

N

native VLAN

configuring     13-17

default     13-17

network examples

collapsed backbone and switch cluster     1-9

design concepts

network performance     1-7

network services     1-7

large campus     1-10

small to medium-sized network     1-8

network management

CDP     19-1

RMON     21-1

SNMP     23-1

Network Time Protocol

See NTP

no commands     2-4

nontrunking mode     13-12

normal-range VLANs

configuration modes     13-5

defined     13-1

NTP

associations

authenticating     6-4

defined     6-2

enabling broadcast messages     6-6

peer     6-5

server     6-5

default configuration     6-4

displaying the configuration     6-10

overview     6-2

restricting access

creating an access group     6-8

disabling NTP services per interface     6-9

source IP address, configuring     6-9

stratum     6-2

synchronizing devices     6-5

time

services     6-2

synchronizing     6-2

P

PAgP

See EtherChannel

pass-through mode     24-8

passwords

default configuration     7-2

encrypting     7-4

in clusters     5-12, 5-18

overview     7-1

recovery of     26-2

setting

enable     7-3

enable secret     7-4

Telnet     7-5

with usernames     7-6

VTP domain     14-8

path cost

STP     11-16

PC (passive command switch)     5-9, 5-20

per-VLAN Spanning Tree plus (PVST+)     11-16

physical ports     9-1

PIM-DVMRP, as snooping method     16-8

ping

character output description     26-9

executing     26-9

overview     26-8

Port Aggregation Protocol

See EtherChannel

See PAgP

port-based authentication

authentication server

defined     8-2

RADIUS server     8-2

client, defined     8-2

configuration guidelines     8-8

configuring

802.1X authentication     8-9

host mode     8-14

manual re-authentication of a client     8-12

periodic re-authentication     8-11

quiet period     8-12

RADIUS server     8-11

RADIUS server parameters on the switch     8-10

switch-to-client frame-retransmission number     8-14

switch-to-client retransmission time     8-13

default configuration     8-6

described     8-1

device roles     8-2

displaying statistics     8-16

EAPOL-start frame     8-3

EAP-request/identity frame     8-3

EAP-response/identity frame     8-3

enabling

802.1X with port security     8-15

802.1X with voice VLAN     8-5

encapsulation     8-2

initiation and message exchange     8-3

method lists     8-9

ports

authorization state and dot1x port-control command     8-4

authorized and unauthorized     8-4

resetting to default values     8-15

software upgrade changes     8-8

switch

as proxy     8-2

RADIUS client     8-2

topologies, supported     8-4

port-channel

See EtherChannel

Port Fast

described     12-1

enabling     12-10

mode, spanning tree     13-25

support for     1-3

port membership modes, VLAN     13-3

port priority, STP     11-14

ports

access     9-2

dynamic access     13-3

priority     24-2

protected     17-4

secure     17-5

static-access     13-3, 13-10

switch     9-1

trunks     13-11

VLAN assignments     13-10

port security

aging     17-10

configuring     17-7

default configuration     17-7

described     17-5

displaying     17-12

sticky learning     17-5

violations     17-6

with other features     17-7

port-shutdown response, VMPS     13-22

preferential treatment of traffic

See QoS

preventing unauthorized access     7-1

priority

overriding CoS     15-5

port, described     24-2

trusting CoS     15-5

private VLAN edge ports

See protected ports

privileged EXEC mode     2-2

privilege levels

changing the default for lines     7-8

command switch     5-22

exiting     7-9

logging into     7-9

mapping on member switches     5-22

overview     7-2, 7-7

setting a command with     7-7

protected ports     1-2, 17-4

pruning, VTP

enabling     14-13

enabling on a port     13-17

examples     14-5

overview     14-4

pruning-eligible list

changing     13-17

for VTP pruning     14-4

VLANs     14-13

PSTN     1-10

publications, related     xxi

PVST+     13-2

802.1Q trunking interoperability     11-10

described     11-9

instances supported     11-9

Q

QoS

classification

in frames and packets     24-2

pass-through mode, described     24-8

trusted boundary, described     24-6

configuring

CoS and WRR     24-8

default port CoS value     24-6

egress queues     24-8

port trust states within the domain     24-4

trusted boundary     24-7

default configuration     24-3

ingress port scheduling     24-3

IP phones, detection and trusted settings     24-6

overview     24-1

pass-through mode     24-8

support for     1-4

trusted boundary     24-6

understanding     24-1

quality of service

See QoS

queries, IGMP     16-3

R

RADIUS

attributes

vendor-proprietary     7-29

vendor-specific     7-28

configuring

accounting     7-27

authentication     7-22

authorization     7-26

communication, global     7-20, 7-28

communication, per-server     7-19, 7-20

multiple UDP ports     7-20

default configuration     7-19

defining AAA server groups     7-24

displaying the configuration     7-30

identifying the server     7-19

in clusters     5-13

limiting the services to the user     7-26

method list, defined     7-19

operation of     7-18

overview     7-17

suggested network environments     7-17

tracking services accessed by user     7-27

range

macro     9-8

of interfaces     9-7

rapid PVST+

802.1Q trunking interoperability     11-10

rcommand command     5-21

reconfirmation interval, VMPS, changing     13-27

recovery procedures     26-1

redundancy

EtherChannel     25-2

STP

backbone     11-7

path cost     13-20

port priority     13-18

redundant clusters

See cluster standby group

redundant links and UplinkFast     12-12

Remote Authentication Dial-In User Service

See RADIUS

Remote Network Monitoring

See RMON

report suppression, IGMP

described     16-5

disabling     16-11

resetting a UDLD-shutdown interface     18-6

restricting access

NTP services     6-7

overview     7-1

passwords and privilege levels     7-2

RADIUS     7-16

TACACS+     7-9

retry count, VMPS, changing     13-28

RFC

1112, IP multicast and IGMP     16-2

1157, SNMPv1     23-2

1305, NTP     6-2

1757, RMON     21-2

1901, SNMPv2C     23-2

1902 to 1907, SNMPv2     23-2

2236, IP multicast and IGMP     16-2

2273-2275, SNMPv3     23-2

RMON

default configuration     21-3

displaying status     21-6

enabling alarms and events     21-3

groups supported     21-2

overview     21-1

statistics

collecting group Ethernet     21-5

collecting group history     21-5

root guard

described     12-8

enabling     12-14

support for     1-3

root switch

STP     11-12

RSPAN

default configuration     20-5

destination ports     20-3

displaying status     20-10

interaction with other features     20-4

monitored ports     20-3

monitoring ports     20-3

overview     20-1

received traffic     20-3

session limits     20-5

sessions, defined     20-2

source ports     20-3

transmitted traffic     20-3

running configuration, saving     4-10

S

SC (standby command switch)     5-9, 5-20

secure ports, configuring     17-5

security, port     17-5

sequence numbers in log messages     22-7

server mode, VTP     14-3

set-request operation     23-4

setup program, failed command switch replacement     26-5, 26-6

severity levels, defining in system messages     22-8

show and more command output, filtering     2-9

show cdp traffic command     19-5

show cluster members command     5-21

show configuration command     9-14

show interfaces command     9-12, 9-14

show running-config command

interface description in     9-14

shutdown command on interfaces     9-16

Simple Network Management Protocol

See SNMP

SmartPort macros

configuration guidelines     10-2

creating and applying     10-2

default configuration     10-2

defined     10-1

displaying     10-4

tracing     10-2

SNAP     19-1

SNMP

accessing MIB variables with     23-4

agent

described     23-3

disabling     23-7

community strings

configuring     23-7

for cluster switches     23-4

overview     23-3

configuration examples     23-14

default configuration     23-5

groups     23-8

in clusters     5-13

informs

and trap keyword     23-10

described     23-4

differences from traps     23-5

enabling     23-12

limiting access by TFTP servers     23-13

limiting system log messages to NMS     22-9

manager functions     23-3

managing clusters with     5-22

MIBs

location of     A-3

supported     A-1

notifications     23-4

overview     23-1, 23-4

status, displaying     23-15

system contact and location     23-13

trap manager, configuring     23-11

traps

described     23-3, 23-4

differences from informs     23-5

enabling     23-10

enabling MAC address notification     6-23

overview     23-1, 23-4

types of     23-10

users     23-8

versions supported     23-2

snooping, IGMP     16-1

software images

recovery procedures     26-2

See also downloading and uploading

SPAN

configuration guidelines     20-6

default configuration     20-5

destination ports     20-3

displaying status     20-10

IDS     20-2

interaction with other features     20-4

monitored ports     20-3

monitoring ports     20-3

overview     1-5, 20-1

received traffic     20-3

session limits     20-5

sessions

creating     20-6

defined     20-2

removing destination (monitoring) ports     20-9

removing source (monitored) ports     20-9

specifying monitored ports     20-6

source ports     20-3

transmitted traffic     20-3

spanning tree and native VLANs     13-13

Spanning Tree Protocol

See STP

speed, configuring on interfaces     9-11

Standby Command Configuration window     5-19

standby command switch

configuring      5-19

considerations     5-9

defined     5-2

priority     5-9

requirements     5-2

virtual IP address     5-9

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

static access ports

assigning to VLAN     13-10

defined     9-2, 13-3

static addresses

See addresses

static VLAN membership     13-2

statistics

802.1X     8-16

CDP     19-5

interface     9-15

RMON group Ethernet     21-5

RMON group history     21-5

SNMP input and output     23-15

VTP     14-15

sticky learning

configuration file     17-6

defined     17-5

disabling     17-6

enabling     17-5

saving addresses     17-6

storm control

described     17-1

displaying     17-12

STP

accelerating root port selection     12-4

BackboneFast

described     12-5

enabling     12-13

BPDU filtering

described     12-3

enabling     12-11

BPDU guard

described     12-2

enabling     12-11

BPDU message exchange     11-2

configuration guidelines     11-11, 12-10

configuring

forward-delay time     11-19

hello time     11-18

maximum aging time     11-19

path cost     11-16

port priority     11-14

root switch     11-12

secondary root switch     11-14

switch priority     11-17

default configuration     11-10

default optional feature configuration     12-9

designated port, defined     11-3

designated switch, defined     11-3

detecting indirect link failures     12-5

displaying status     11-20

EtherChannel guard

described     12-7

enabling     12-14

extended system ID

affects on root switch     11-12

affects on the secondary root switch     11-14

overview     11-3

unexpected behavior     11-12

features supported     1-3

inferior BPDU     11-3

instances supported     11-9

interface state, blocking to forwarding     12-1

interface states

blocking     11-5

disabled     11-6

forwarding     11-5, 11-6

learning     11-6

listening     11-6

overview     11-4

interoperability and compatibility among modes     11-9

limitations with 802.1Q trunks     11-9

load sharing

overview     13-18

using path costs     13-20

using port priorities     13-18

loop guard

described     12-9

enabling     12-15

modes supported     11-9

multicast addresses, affect of     11-8

overview     11-2

path costs     13-20, 13-21

Port Fast

described     12-1

enabling     12-10

port priorities     13-19

preventing root switch selection     12-8

protocols supported     11-9

redundant connectivity     11-7

root guard

described     12-8

enabling     12-14

root port, defined     11-3

root switch

affects of extended system ID     11-3, 11-12

configuring     11-12

election     11-3

unexpected behavior     11-12

shutdown Port Fast-enabled port     12-2

superior BPDU     11-3

timers, described     11-18

UplinkFast

described     12-3

enabling     12-12

stratum, NTP     6-2

summer time     6-13

SunNet Manager     1-6

switch clustering technology

See clusters, switch

switched ports     9-1

Switch Manager     3-13

See also Device Manager

switchport protected command     17-4

switch priority STP     11-17

syslog

See system message logging

system clock

configuring

daylight saving time     6-13

manually     6-11

summer time     6-13

time zones     6-12

displaying the time and date     6-11

overview     6-1

See also NTP

system message logging

default configuration     22-3

defining error message severity levels     22-8

disabling     22-4

displaying the configuration     22-12

enabling     22-4

facility keywords, described     22-11

level keywords, described     22-8

limiting messages     22-9

message format     22-2

overview     22-1

sequence numbers, enabling and disabling     22-7

setting the display destination device     22-4

synchronizing log messages     22-5

time stamps, enabling and disabling     22-7

UNIX syslog servers

configuring the daemon     22-10

configuring the logging facility     22-11

facilities supported     22-11

system name

default configuration     6-15

default setting     6-15

manual configuration     6-15

See also DNS

system prompt

default setting     6-14, 6-15

manual configuration     6-16

T

TACACS+

accounting, defined     7-10

authentication, defined     7-10

authorization, defined     7-10

configuring

accounting     7-16

authentication key     7-12

authorization     7-15

login authentication     7-13

default configuration     7-12

displaying the configuration     7-16

identifying the server     7-12

in clusters     5-13

limiting the services to the user     7-15

operation of     7-11

overview     7-9

tracking services accessed by user     7-16

Telnet

accessing management interfaces     2-9

accessing the CLI     1-6

from a browser     2-10

setting a password     7-5

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password     7-5

TFTP

configuration files in base directory     4-5

configuring for autoconfiguration     4-5

limiting access by servers     23-13

time

See NTP and system clock

time stamps in log messages     22-7

time zones     6-12

Token Ring VLANs

support for     13-5

VTP support     14-4

Topology view

described     3-2, 3-14

traceroute, Layer 2

and ARP     26-11

and CDP     26-10

described     26-10

IP addresses and subnets     26-11

MAC addresses and VLANs     26-10

multicast traffic     26-10

multiple devices on a port     26-11

unicast traffic     26-10

usage guidelines     26-10

transparent mode, VTP     14-3, 14-11

trap-door mechanism     4-2

traps

configuring MAC address notification     6-23

configuring managers     23-10

defined     23-3

enabling     6-23, 23-10

notification types     23-10

overview     23-1, 23-4

troubleshooting

connectivity problems     26-8

detecting unidirectional links     18-1

displaying crash information     26-13

with CiscoWorks     23-4

with debug commands     26-11

with ping     26-8

with system message logging     22-1

trunk ports

configuring     13-14

defined     9-2

trunks

allowed-VLAN list     13-16

load sharing

setting STP path costs     13-20

using STP port priorities     13-18, 13-19

native VLAN for untagged traffic     13-17

parallel     13-20

pruning-eligible list     13-17

to non-DTP device     13-12

understanding     13-12

trusted boundary     24-6

twisted-pair Ethernet, detecting unidirectional links     18-1

U

UDLD

default configuration     18-4

echoing detection mechanism     18-3

enabling

globally     18-5

per interface     18-5

link-detection mechanism     18-1

neighbor database     18-2

overview     18-1

resetting an interface     18-6

status, displaying     18-7

unauthorized ports with 802.1X     8-4

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration     22-10

facilities supported     22-11

message logging configuration     22-11

unrecognized Type-Length-Value (TLV) support     14-4

UplinkFast

described     12-3

enabling     12-12

support for     1-3

user EXEC mode     2-2

username-based authentication     7-6

V

version-dependent transparent mode     14-4

virtual IP address

cluster standby group     5-9, 5-20

command switch     5-9, 5-20

See also IP addresses

vlan.dat file     13-4

VLAN 1 minimization, support for     1-3, 1-4

VLAN configuration

at bootup     13-6

saving     13-6

VLAN configuration mode     2-2, 13-6

VLAN database

and startup configuration file     13-6

and VTP     14-1

VLAN configuration saved in     13-6

VLANs saved in     13-4

vlan database command     13-6

vlan global configuration command     13-6

VLAN ID, discovering     6-26

VLAN management domain     14-2

VLAN Management Policy Server

See VMPS

VLAN membership

confirming     13-27

modes     13-3

VLAN Query Protocol

See VQP

VLANs

adding     13-7

adding to VLAN database     13-7

aging dynamic addresses     11-8

allowed on trunk     13-16

and spanning-tree instances     13-2

configuration guidelines, normal-range VLANs     13-5

configuration options     13-5

configuring     13-1

creating in config-vlan mode     13-7

creating in VLAN configuration mode     13-8

default configuration     13-7

deleting     13-9

described     9-3, 13-1

displaying     13-11

illustrated     13-2

modifying     13-7

native, configuring     13-17

normal-range     13-1, 13-4

parameters     13-4

port membership modes     13-3

static-access ports     13-10

STP and 802.1Q trunks     11-9

supported     13-2

Token Ring     13-5

VTP modes     14-3

VLAN Trunking Protocol

See VTP

VLAN trunks     13-11, 13-12

VMPS

administering     13-28

configuration example     13-29

configuration guidelines     13-25

default configuration     13-24

description     13-21

dynamic port membership

described     13-22

reconfirming     13-27

troubleshooting     13-29

entering server address     13-25

mapping MAC addresses to VLANs     13-22

monitoring     13-28

reconfirmation interval, changing     13-27

reconfirming membership     13-27

retry count, changing     13-28

voice VLAN

Cisco 7960 phone, port connections     15-1

configuration guidelines     15-3

configuring IP phones for data traffic

override CoS of incoming frame     15-5

trust CoS priority of incoming frame     15-5

configuring ports for voice traffic in

802.1P priority tagged frames     15-4

802.1Q frames     15-4

connecting to an IP phone     15-3

default configuration     15-2

described     15-1

displaying     15-6

VQP     13-21

VTP

adding a client to a domain     14-13

advertisements     13-14, 14-3

and normal-range VLANs     14-1

client mode, configuring     14-10

configuration

global configuration mode     14-7

guidelines     14-8

privileged EXEC mode     14-7

requirements     14-9

saving     14-7

VLAN configuration mode     14-7

configuration mode options     14-7

configuration requirements     14-9

configuration revision number

guideline     14-13

resetting     14-14

configuring

client mode     14-10

server mode     14-9

transparent mode     14-11

consistency checks     14-4

default configuration     14-6

described     14-1

disabling     14-11

domain names     14-8

domains     14-2

modes

client     14-3, 14-10

server     14-3, 14-9

transitions     14-3

transparent     14-3, 14-11

monitoring     14-15

passwords     14-8

pruning

disabling     14-13

enabling     14-13

examples     14-5

overview     14-4

pruning-eligible list, changing     13-17

server mode, configuring     14-9

statistics     14-15

Token Ring support     14-4

transparent mode, configuring     14-11

using     14-1

version, guidelines     14-8

version 1     14-4

version 2

configuration guidelines     14-8

disabling     14-12

enabling     14-12

overview     14-4

W

warnings     xx

Weighted Round Robin

See WRR

wizards     3-6

WRR

configuring     24-9

defining     24-3

description     24-3

X

XMODEM protocol     26-2