Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide, 12.1(14)EA1
Index
Downloads: This chapterpdf (PDF - 1.2MB) The complete bookPDF (PDF - 8.34MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

802.1D

See STP

802.1Q

and trunk ports11-2

configuration limitations16-16

native VLAN for untagged traffic16-21

trunk mode4-11

802.1S

See MSTP

802.1W

See RSTP

802.1X

See port-based authentication

802.3X flow control11-14

A

abbreviating commands2-4

AC (command switch)7-13, 7-23

access-class command27-20

access control entries

See ACEs

access-denied response, VMPS16-25

access groups, viewing27-23

accessing

clusters, switch7-16

command switches7-13

member switches7-16

switch clusters7-16

access lists

See ACLs

access ports

defined11-2

in switch clusters7-11

accounting

with RADIUS9-28

with TACACS+9-11, 9-17

ACEs

defined27-2

Ethernet27-2

IP27-2

Layer 3 parameters27-10

Layer 4 parameters27-10

ACLs

ACEs27-2

any keyword27-9

applying

time ranges to27-15

to management interfaces27-20

to management VLANs27-20

to physical interfaces27-21

to QoS28-5

to terminal lines27-20

classifying traffic for QoS28-25

comments in27-17

compiling27-23

configuration guidelines

management interfaces, applying to27-6

physical interfaces, applying to27-6

defined27-2

ACLs (continued)

displaying interface27-23

examples of27-23

extended IP

configuring for QoS classification28-26

creating27-10

matching criteria27-7

host keyword27-9

IP

creating27-7

implicit deny27-9, 27-13, 27-15

implicit masks27-9

management interfaces, applying to27-20

matching criteria27-2, 27-7

named27-13

physical interfaces, applying to27-21

undefined27-19, 27-21

virtual terminal lines, setting on27-20

MAC extended27-18

matching27-7

monitoring27-22

named27-13

numbers27-8

protocol parameters27-10

standard IP

configuring for QoS classification28-25

creating27-9

matching criteria27-7

time ranges27-15

unsupported features27-7

ACP

system-defined mask27-4

understanding27-4

user-defined mask27-4

addresses

displaying the MAC address table8-26

dynamic

accelerated aging13-8

changing the aging time8-22

default aging13-8

defined8-20

learning8-21

removing8-23

MAC

discovering8-26

multicast STP address management13-8

static

adding and removing8-25

defined8-20

address resolution8-26

Address Resolution Protocol

See ARP table

ADSL1-7

advertisements

CDP22-1

VTP16-17, 17-3

aggregated ports

See EtherChannel

aging, accelerating13-8

aging time

accelerated

for MSTP14-20

for STP13-8, 13-22

MAC address table8-22

maximum

for MSTP14-21

for STP13-22

alarm indicators4-8

alarms, RMON24-3

allowed-VLAN list16-19

American National Standards Institute

See ANSI

ANSI1-7

ARP table

address resolution8-26

managing8-26

asymmetric digital subscriber line

See ADSL

attributes, RADIUS

vendor-proprietary9-30

vendor-specific9-29

authentication

local mode with AAA9-32

NTP associations8-4

RADIUS

key9-21

login9-23

TACACS+

defined9-11

key9-13

login9-14

See also port-based authentication

authoritative time source, described8-2

authorization

with RADIUS9-27

with TACACS+9-11, 9-16

authorized ports with 802.1X10-4

autoconfiguration5-3

automatic discovery

adding member switches7-21

considerations

beyond a non-candidate device7-8, 7-9

brand new switches7-11

connectivity7-6

management VLANs7-8, 7-9

non-CDP-capable devices7-8

non-cluster-capable devices7-8

automatic discovery (continued)

creating a cluster standby group7-23

in switch clusters7-6

See also CDP

automatic QoS

See QoS

automatic recovery, clusters7-12

See also HSRP

autonegotiation

interface configuration guidelines11-11

mismatches30-14

auxiliary VLAN

See voice VLAN

B

BackboneFast

described15-10

enabling15-20

support for1-4

bandwidth graphs4-9

banners

configuring

login8-20

message-of-the-day login8-19

default configuration8-18

when displayed8-18

blocking packets20-5

booting

boot loader, function of5-2

boot process5-1

manually5-14

specific image5-15

boot loader

accessing5-16

described5-2

environment variables5-16

bootloader (continued)

prompt5-16

trap-door mechanism5-2

BPDU

error-disabled state15-3

filtering15-3

RSTP format14-9

BPDU filtering

described15-3

enabling15-17

support for1-4

BPDU guard

described15-3

enabling15-16

support for1-4

broadcast storm control

configuring20-2

disabling20-3

browser configuration4-1, 7-1

buttons, CMS4-29

C

cables, monitoring for unidirectional links21-1

candidate switch

adding7-21

automatic discovery7-6

defined7-5

HC7-23

passwords7-21

requirements7-5

standby group7-23

See also command switch, cluster standby group, and member switch

Catalyst 2955

configuring alarm profiles

attaching an alarm profile to a port3-11

creating or modifying alarm profiles3-10

Catalyst 2955 (continued)

configuring switch alarms3-1to 3-12

configuring the FCS bit error rate alarm

setting the FCS error hysteresis threshold3-9

setting the FCS error threshold3-8

configuring the power supply alarm

setting the power mode3-5

setting the power supply alarm options3-6

configuring the temperature alarms

associating the temperature alarms to a relay3-7

setting a secondary temperature threshold3-7

default alarm configuration3-4, 3-5

displaying Catalyst 2955 switch alarms3-12

enabling SNMP traps3-12

FCS error hysteresis threshold3-2

global status monitoring alarms

power supply alarm3-2

temperature alarm3-2

port status monitoring alarms

FCS bit error rate alarm3-3

link fault alarm3-3

port is not operating alarm3-3

port not forwarding alarm3-3

triggering alarm options

configurable relays3-4

FCS Bit Error Rate alarm3-3

methods to trigger3-4

SNMP traps3-4

syslog messages3-4

cautionsxxviii

CC (command switch)7-23

CDP

and trusted boundary28-22

automatic discovery in switch clusters7-6

configuring22-2

default configuration22-2

described22-1

CDP (continued)

disabling for routing device22-3, 22-4

enabling and disabling

on an interface22-4

on a switch22-3

monitoring22-5

overview22-1

transmission timer and holdtime, setting22-2

updates22-2

CGMP, joining multicast group19-2

Cisco 575-LRE CPE1-7

Cisco Access Analog Trunk Gateway1-19

Cisco CallManager software1-14, 1-19

Cisco Discovery Protocol

See CDP

Cisco Intelligence Engine 2100 Series Configuration Registrar

See IE2100

Cisco IP Phones1-14

Cisco LRE 48 POTS Splitter (PS-1M-LRE-48)1-7, 1-16

Cisco Networking Services

See IE2100

Cisco SoftPhone software1-14

CiscoWorks 20001-8, 26-4

class maps for QoS

configuring28-28

described28-6

displaying28-37

class of service

See CoS

clearing interfaces11-18

CLI

abbreviating commands2-4

command modes2-1

described1-8

CLI (continued)

editing features

enabling and disabling2-7

keystroke editing2-7

wrapped lines2-8

error messages2-5

getting help2-3

history

changing the buffer size2-5

described2-5

disabling2-6

recalling commands2-6

managing clusters7-25

no and default forms of commands2-4

client mode, VTP17-3

clock

See system clock

Cluster Management Suite

See CMS

clusters, switch

accessing7-16

adding member switches7-21

automatic discovery7-6

automatic recovery7-12

command switch configuration7-20

compatibility7-5

creating7-19

creating a cluster standby group7-23

described7-1

LRE profile considerations7-19

managing

through CLI7-25

through SNMP7-26

planning7-5

clusters, switch (continued)

planning considerations

automatic discovery7-6

automatic recovery7-12

CLI7-25

host names7-16

IP addresses7-16

LRE profiles7-19

management VLAN7-18

passwords7-16

RADIUS7-17

SNMP7-17, 7-26

switch-specific features7-19

TACACS+7-17

redundancy7-23

troubleshooting7-25

verifying7-24

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

cluster standby group

automatic recovery7-15

considerations7-13

creating7-23

defined7-2

requirements7-3

virtual IP address7-13

See also HSRP

cluster tree, described4-6

CMS

advantages1-8

cluster tree4-6

described1-8, 4-1

displaying system messages4-20

features4-3

Front Panel images4-6

Front Panel view4-4

interaction modes4-25

CMS (continued)

menu bar4-15

online help4-27

toolbar4-20

tool tips4-26

Topology view4-11

window components4-28

wizards4-26

Coarse Wave Division Multiplexer

See CWDM GBIC modules

command-line interface

See CLI

command modes2-1

commands

abbreviating2-4

no and default2-4

setting privilege levels9-8

command switch

accessing7-13

active (AC)7-13, 7-23

command switch with HSRP disabled (CC)7-23

configuration conflicts30-14

defined7-2

enabling7-20

passive (PC)7-13, 7-23

password privilege levels7-26

priority7-13

recovery

from command-switch failure7-13

from failure30-10

from lost member connectivity30-14

redundant7-12, 7-23

replacing

with another switch30-13

with cluster member30-11

requirements7-3

standby (SC)7-13, 7-23

See also candidate switch, cluster standby group, member switch, and standby command switch

community strings

configuring7-17, 26-7

for cluster switches26-4

in clusters7-17

overview26-4

SNMP7-17

config.text5-13

configuration

controller for LRE upgrade12-25

global LRE12-25

configuration conflicts, recovering from lost member connectivity30-14

configuration examples, network

collapsed backbone and switch cluster1-14

design concepts

cost-effective wiring closet1-11

high-performance workgroup1-11

network performance1-10

network services1-10

redundant Gigabit backbone1-11

hotel network1-15

large campus1-19

long-distance, high-bandwidth transport configuration1-22

service-provider central-office network1-17

small to medium-sized network1-12

configuration files

clearing the startup configurationB-19

creating using a text editorB-10

default name5-13

deleting a stored configurationB-19

describedB-8

downloading

automatically5-13

preparingB-11, B-13, B-17

reasons forB-8

using FTPB-14

using RCPB-17

using TFTPB-12

configuration files (continued)

guidelines for creating and usingB-9

invalid combinations when copyingB-5

limiting TFTP server access26-14

obtaining with DHCP5-7

password recovery disable considerations9-5

specifying the filename5-14

system contact and location information26-14

types and locationB-10

uploading

preparingB-11, B-13, B-17

reasons forB-9

using FTPB-15

using RCPB-18

using TFTPB-12

VMPS database16-26

configuration settings, saving5-10

configure terminal command11-5

configuring

duplex mode12-11

for an LRE upgrade12-24

LRE ports12-8

speed

on Cisco 575 LRE CPE12-11

config-vlan mode2-2, 16-6

conflicts, configuration30-14

connections, secure remote9-33

connectivity problems30-15

consistency checks in VTP version 217-4

console port, connecting to2-10

conventions

commandxxviii

for examplesxxviii

textxxviii

CoS

configuring28-8

configuring priority queues28-35

defining28-9

described1-6

CoS (continued)

override priority18-5

trust priority18-6

CoS-to-DSCP map for QoS28-33

counters, clearing interface11-18

CPE 1-7

Ethernet link guidelines12-11

Ethernet links12-2, 12-6

considerations for Cisco 575 LRE CPE12-11

considerations for Cisco 585 LRE CPE12-12

hotel network configuration example1-15, 1-17, 1-18

LRE links12-2

CPElink

transitioning state12-7

CPE toggle

configuring12-22

described12-7

disabling12-22

enabling12-22

crashinfo file30-23

cross-stack UplinkFast, STP

connecting stack ports15-8

described15-5

enabling15-19

fast-convergence events15-7

Fast Uplink Transition Protocol15-6

limitations15-8

normal-convergence events15-7

Stack Membership Discovery Protocol15-6

support for1-4

cross talk12-10

cryptographic software image9-33

customer premises equipment

See CPE

CWDM GBIC modules

network example1-22

wavelength colors on CMS4-7

D

daylight saving time8-13

debugging

enabling all system diagnostics30-21

enabling for a specific feature30-20

redirecting error message output30-21

using commands30-20

default commands2-4

default configuration

802.1X10-8

banners8-18

booting5-13

CDP22-2

DNS8-17

EtherChannel29-8

IGMP filtering19-22

IGMP snooping19-6

initial switch information5-3

Layer 2 interfaces11-10

MAC address table8-22

MSTP14-12

MVR19-17

NTP8-4

optional spanning-tree features15-14

password and privilege level9-2

QoS28-16

RADIUS9-20

RMON24-3

RSPAN23-7

SNMP26-6

SPAN23-7

STP13-11

system message logging25-3

system name and prompt8-15

TACACS+9-13

UDLD21-3

VLAN, Layer 2 Ethernet interfaces16-17

VLANs16-7

default configuration (continued)

VMPS16-28

voice VLAN18-2

VTP17-6

default gateway5-10

deleting VLANs16-10

description command11-16

destination addresses, in ACLs27-12

detecting indirect link failures, STP15-10

device discovery protocol22-1

device labels4-13

Device Manager4-5

See also Switch Manager

device pop-up menu, Front Panel view4-22

DHCP1-3

DHCP-based autoconfiguration

client request message exchange5-4

configuring

client side5-3

DNS5-6

relay device5-6

server-side5-5

TFTP server5-5

example5-8

lease options

for IP address information5-5

for receiving the configuration file5-5

overview5-3

relationship to BOOTP5-3

Differentiated Services architecture, QoS28-2

Differentiated Services Code Point28-3

digital telephone networks1-7

directories

changingB-4

creating and removingB-4

displaying the workingB-4

discovery, clusters

See automatic discovery

display options, Topology view4-15

Disqualification Code option4-25

DNS

and DHCP-based autoconfiguration5-6

default configuration8-17

displaying the configuration8-18

overview8-16

setting up8-17

documentation, relatedxxix

domain names

DNS8-16

VTP17-8

Domain Name System

See DNS

downloading

configuration files

preparingB-11, B-13, B-17

reasons forB-8

using FTPB-14

using RCPB-17

using TFTPB-12

image files

deleting old imageB-24

preparingB-22, B-25, B-29

reasons forB-20

using FTPB-26

using RCPB-30

using TFTPB-23

DSCP1-6, 28-3

DSCP-to-CoS map for QoS28-34

DTP1-5, 16-15

duplex mode

configuring12-11

CPE Ethernet link12-11

duplex mode, configuring11-11

dynamic access mode4-11

dynamic access ports

characteristics16-3

configuring16-29

defined11-2

dynamic addresses

See addresses

dynamic desirable trunking mode16-16

dynamic port VLAN membership

described16-26

reconfirming16-30

troubleshooting16-32

types of connections16-29

VMPS database configuration file16-26

Dynamic Trunking Protocol

See DTP

E

editing features

enabling and disabling2-7

keystrokes used2-7

wrapped lines2-8

egress port scheduling28-9

enable password9-4

enable secret password9-4

encapsulation28-8

encryption for passwords9-4

environment variables

function of5-17

location in Flash5-16

error messages

during command entry2-5

setting the display destination device25-4

severity levels25-8

system message format25-2

EtherChannel

automatic creation of29-3

configuration guidelines29-8

default configuration29-8

destination MAC address forwarding29-6

displaying status29-14

EtherChannel (continued)

forwarding methods29-11

interaction with STP29-8

Layer 2 interfaces, configuring29-9

load balancing29-6, 29-11

number of interfaces per29-2

overview29-1

PAgP

aggregate-port learners29-5

compatibility with Catalyst 190029-12

displaying status29-14

interaction with other features29-5

learn method and priority configuration29-12

modes29-3

overview29-3

silent mode29-4

support for1-3

port-channel interfaces

described29-2

numbering of29-2

port groups11-3

source MAC address forwarding29-6

EtherChannel guard

described15-12

enabling15-20

Ethernet VLANs

adding16-8

defaults and ranges16-8

modifying16-8

ETSI1-7

European Telecommunication Standards Institute

See ETSI

events, RMON24-3

examples

conventions forxxviii

network configuration1-9

expedite queue, QoS28-9

expert mode4-26

extended-range VLANs

configuration guidelines16-12

configuring16-12

creating16-12, 16-13

defined16-1

extended system ID

MSTP14-14

STP13-3, 13-14

Extensible Authentication Protocol over LAN10-1

F

fallback VLAN name16-26

fan fault indication4-6

Fast Uplink Transition Protocol15-6

features, IOS1-1

fiber-optic, detecting unidirectional links21-1

files

copyingB-5

deletingB-5

displaying the contents ofB-8

tar

creatingB-6

displaying the contents ofB-7

extractingB-7

image file formatB-21

files, crashinfo

description30-23

displaying the contents of30-23

location30-23

file system

displaying available file systemsB-2

displaying file informationB-3

local file system namesB-1

network file system namesB-5

setting the defaultB-3

filtering show and more command output2-9

filters, IP

See ACLs, IP

Flash device, number ofB-1

flooded traffic, blocking20-6

flow-based packet classification1-6

flow control11-14

forward-delay time

MSTP14-20

STP13-5, 13-22

forwarding

See broadcast storm control

Front Panel images, CMS4-6

Front Panel view

cluster tree4-6

described4-4

pop-up menus4-22

port icons4-7

port LEDs4-9

RPS LED4-8

switch images4-6

FTP

configuration files

downloadingB-14

overviewB-13

preparing the serverB-13

uploadingB-15

image files

deleting old imageB-28

downloadingB-26

preparing the serverB-25

uploadingB-28

FTP, accessing MIB filesA-3

G

GBICs

1000BASE-LX/LH module1-11

1000BASE-SX module1-11

1000BASE-ZX module1-11

CWDM module1-22

GigaStack module1-11

security and identification30-15

get-bulk-request operation26-3

get-next-request operation26-3, 26-4

get-request operation26-3, 26-4

get-response operation26-3

Gigabit Interface Converters

See GBICs

GigaStack GBIC

fast transition of redundant link15-5

See also GBICs

global configuration mode2-2

graphs, bandwidth4-9

guide

audiencexxvii

purposexxvii

guidelines, CPE Ethernet links12-11

guide mode4-25

H

HC (candidate switch)7-23

hello time

MSTP14-19

STP13-21

help, for the command line2-3

Help Contents4-27

history

changing the buffer size2-5

described2-5

disabling2-6

recalling commands2-6

history table, level and number of syslog messages25-10

host name list, CMS4-28

host names

abbreviations appended to7-23

in clusters7-16

hosts, limit on dynamic ports16-32

HP OpenView1-8

HSRP

automatic cluster recovery7-15

cluster standby group considerations7-13

See also clusters, cluster standby group, and standby command switch

I

ICMP ping

executing30-16

overview30-15

icons

colors

cluster tree4-6

Topology view4-14

Front Panel view4-7

toolbar4-20

Topology view4-13

IDS, using with SPAN and RSPAN23-2

IE2100

CNS embedded agents

described6-5

enabling automated configuration6-6

enabling configuration agent6-9

enabling event agent6-8

Configuration Registrar

configID, deviceID, hostname6-3

configuration service6-2

described6-1

event service6-3

described1-8

support for1-3

IEEE 802.1P18-1

IGMP

joining multicast group19-2

join messages19-2

leave processing, enabling19-9

leaving multicast group19-4

queries19-3

IGMP filtering

configuring19-23

default configuration19-22

described19-22

monitoring19-26

IGMP groups, setting the maximum number19-25

IGMP profile

applying19-24

configuration mode19-23

configuring19-23

IGMP snooping

configuring19-5

default configuration19-6

definition19-1

enabling and disabling19-6

global configuration19-6

Immediate Leave19-4

method19-7

monitoring19-12

VLAN configuration19-6

Immediate-Leave, IGMP19-4

ingress port scheduling28-8

Integrated Services Digital Network

See ISDN

Intelligence Engine 2100 Series CNS Agents

See IE2100

interaction modes, CMS4-25

interface

number11-4

range macros11-8

interface command11-4, 11-5

interface configuration mode2-3

interfaces

configuration guidelines11-11

configuring11-5

configuring duplex mode11-11

configuring speed11-11

counters, clearing11-18

described11-16

descriptive name, adding11-16

displaying information about11-16

flow control11-14

IOS supported1-8

monitoring11-16

naming11-16

physical, identifying11-4

range of11-6

restarting11-19

shutting down11-19

supported11-9

types of11-1

interfaces range macro command11-8

interleave delay, LRE12-20

Intrusion Detection System

See IDS

inventory, cluster7-24

IOS command-line interface

See CLI

IP

named extended ACL27-14

named standard ACL27-14

numbered extended ACL27-10

numbered standard ACL27-9

IP ACLs

applying to

management interfaces27-20

physical interfaces27-21

IP ACLs (continued)

extended, creating27-10

for QoS classification28-25

implicit deny27-9, 27-13, 27-15

implicit masks27-9

management interfaces, applying to27-20

named27-13

physical interfaces, applying to27-21

standard, creating27-9

undefined27-19, 27-21

virtual terminal lines, setting on27-20

IP addresses

candidate or member7-5, 7-16

cluster access7-2

command switch7-3, 7-13, 7-16

discovering8-26

management VLAN7-18

redundant clusters7-13

standby command switch7-13, 7-16

See also IP information

ip igmp profile command19-23

IP information

assigned

manually5-10

through DHCP-based autoconfiguration5-3

default configuration5-3

IP multicast routing and IGMP snooping19-1, 19-5

IP phones

and QoS18-1

automatic classification and queueing28-10

configuring18-3

trusted boundary for QoS28-21

IP protocols in ACLs27-12

ISDN1-7

J

Java plug-in configuration4-1, 7-1

join messages, IGMP19-2

L

LACP

See EtherChannel

Layer 2 frames, classification with CoS28-2

Layer 2 interfaces, default configuration11-10

Layer 2 traceroute

and ARP30-18

and CDP30-17

described30-17

IP addresses and subnets30-18

MAC addresses and VLANs30-18

multicast traffic30-18

multiple devices on a port30-18

supported switches30-17

unicast traffic30-17

usage guidelines30-17

Layer 2 trunks16-15

Layer 3 packets, classification methods28-3

Layer 3 parameters of ACEs27-10

Layer 4 parameters of ACEs27-10

LDAP6-2

leave processing, IGMP19-9

LEDs

port4-9

RPS4-8

legend, CMS icons and labels4-20

lightweight directory access protocol

See LDAP

line configuration mode2-3

link

qualification of12-16

SNR12-16

link guidelines, CPE Ethernet12-11

link labels4-13

link monitor, LRE12-20

link pop-up menu, Topology view4-23

links, unidirectional21-1

lists, CMS4-29

login authentication

with RADIUS9-23

with TACACS+9-14

login banners8-18

log messages

See system message logging

loop guard

described15-13

enabling15-21

support for1-4

LRE

message logging12-8

LRE environment12-9

troubleshooting30-18

LRE interleave delay12-20

LRE link

monitor12-20

persistence12-19

LRE links

See LRE ports

LRE ports

configuring12-1, 12-8

assigning a global sequence12-13

assigning a port sequence12-14

assigning a private profile12-13

assigning a public profile12-12

assigning the default profile12-13

CPE Ethernet links

Cisco 575 LRE CPE considerations12-11

Cisco 585 LRE CPE considerations12-12

described12-2, 12-6

duplex mode12-11

flow control12-11

speed12-11

statistics12-7

link qualification12-16

LRE ports (continued)

LRE links

considerations12-9

described12-2

statistics12-11

preventing loss of data12-11

rate selection12-14

sequences12-5

troubleshooting30-18

LRE profiles

assigning

global profiles12-13

port sequences12-14

private profiles12-13

public profiles12-12

considerations12-10

described12-2

rate selection12-14

table of12-3, 12-4

See also LRE ports and CPE

LRE profiles, considerations in switch clusters7-19

lre shutdown command12-6

LRE switch

upgrading firmware12-23

LRE switch firmware upgrade12-23

LRE technology12-1

See also LRE ports and CPE

LRE upstream power back-off12-21

M

MAC addresses

adding

sticky secure20-7

aging time8-22

and VLAN association8-21

building the address table8-21

default configuration8-22

discovering8-26

MAC addresses (continued)

displaying8-26

dynamic

learning8-21

removing8-23

in ACLs27-18

static

adding8-25

characteristics of8-25

removing8-25

MAC address multicast entries, monitoring19-12

MAC address-to-VLAN mapping16-25

MAC extended access lists27-18

management options

benefits

clustering1-8

CMS1-8

CLI2-1

CMS4-1

CNS6-1

overview1-8

management VLAN

changing7-18

considerations in switch clusters7-8, 7-9, 7-18

discovery through different management VLANs7-9

discovery through same management VLAN7-8

IP address7-18

MANs

CWDM configuration example1-22

long-distance, high-bandwidth transport configuration example1-22

mapping tables for QoS

configuring

DSCP28-32

DSCP-to-CoS28-34

described28-5

matching, ACLs27-7

maximum aging time

MSTP14-21

STP13-22

maximum hop count, MSTP14-21

membership mode, VLAN port16-3

member switch

adding7-21

automatic discovery7-6

defined7-2

managing7-25

passwords7-16

recovering from lost connectivity30-14

requirements7-5

See also candidate switch, cluster standby group, and standby command switch

menu bar

described4-15

variations4-15

message logging, LRE12-8

messages

system4-20

to users through banners8-18

metropolitan-area networks

See MANs

MIBs

accessing files with FTPA-3

location of filesA-3

overview26-1

SNMP interaction with26-4

supportedA-1

microfilters, phone1-16, 1-18, 12-10

mini-point-of-presence

See POP

mirroring traffic for analysis23-1

mismatches, autonegotiation30-14

Mode button4-9

modes, port4-9

monitoring

access groups27-23

ACLs27-22

cables for unidirectional links21-1

CDP22-5

IGMP

filters19-26

snooping19-12

interfaces11-16

multicast router interfaces19-12

MVR19-21

network traffic for analysis with probe23-1

port protection20-14

speed and duplex mode11-13

traffic flowing among switches24-1

traffic suppression20-14

VLANs16-14

VMPS16-31

VTP17-15, 17-16

MSTP

boundary ports

configuration guidelines14-13

described14-5

BPDU filtering

described15-3

enabling15-17

BPDU guard

described15-3

enabling15-16

CIST, described14-3

configuration guidelines14-12, 15-14

configuring

forward-delay time14-20

hello time14-19

link type for rapid convergence14-22

maximum aging time14-21

maximum hop count14-21

MSTP (continued)

configuring (continued)

MST region14-13

path cost14-18

port priority14-17

root switch14-14

secondary root switch14-16

switch priority14-19

CST

defined14-3

operations between regions14-4

default configuration14-12

default optional feature configuration15-14

displaying status14-23

enabling the mode14-13

EtherChannel guard

described15-12

enabling15-20

extended system ID

effects on root switch14-14

effects on secondary root switch14-16

unexpected behavior14-15

instances supported13-9

interface state, blocking to forwarding15-2

interoperability and compatibility among modes13-10

interoperability with 802.1D

described14-5

restarting migration process14-22

IST

defined14-3

master14-3

operations within a region14-3

loop guard

described15-13

enabling15-21

mapping VLANs to MST instance14-13

MSTP (continued)

MST region

CIST14-3

configuring14-13

described14-2

hop-count mechanism14-5

IST14-3

supported spanning-tree instances14-2

overview14-2

Port Fast

described15-2

enabling15-15

preventing root switch selection15-12

root guard

described15-12

enabling15-21

root switch

configuring14-15

effects of extended system ID14-14

unexpected behavior14-15

shutdown Port Fast-enabled port15-3

multicast groups

and IGMP snooping19-5

Immediate Leave19-4

joining19-2

leaving19-4

static joins19-8

multicast packets

blocking20-6

multicast router interfaces, monitoring19-12

multicast router ports, adding19-8

Multicast VLAN Registration

See MVR

Multiple Spanning Tree Protocol

See MSTP

MVR

configuring interfaces19-19

default configuration19-17

described19-14

modes19-18

monitoring19-21

setting global parameters19-18

N

named IP ACLs27-13

NameSpace Mapper

See NSM

native VLAN

configuring16-21

default16-21

negotiate trunk mode4-11

network examples

collapsed backbone and switch cluster1-14

design concepts

cost-effective wiring closet1-11

high-performance workgroup1-11

network performance1-10

network services1-10

redundant Gigabit backbone1-11

hotel network1-15

large campus1-19

long-distance, high-bandwidth transport configuration1-22

service-provider central-office network1-17

small to medium-sized network1-12

network management

CDP22-1

RMON24-1

SNMP26-1

Network Time Protocol

See NTP

no commands2-4

nonhomologated POTS splitter

See Cisco LRE POTS Splitter (PS-1M-LRE-48)

nontrunking mode16-16

normal-range VLANs

configuration modes16-6

defined16-1

NSM6-3

NTP

associations

authenticating8-4

defined8-2

enabling broadcast messages8-6

peer8-5

server8-5

default configuration8-4

displaying the configuration8-10

overview8-2

restricting access

creating an access group8-8

disabling NTP services per interface8-9

source IP address, configuring8-9

stratum8-2

synchronizing devices8-5

time

services8-2

synchronizing8-2

O

online help4-27

out-of-profile markdown1-6

overheating indication, switch4-6

P

PAgP

See EtherChannel

pass-through mode28-23

passwords

default configuration9-2

disabling recovery of9-5

encrypting9-4

in clusters7-16, 7-21

overview9-1

recovery of30-2

setting

enable9-3

enable secret9-4

Telnet9-6

with usernames9-7

VTP domain17-8

patch panel1-16

path cost

MSTP14-18

STP13-19

PBX1-15

PC (passive command switch)7-13, 7-23

performing an LRE upgrade12-24

persistence, LRE link12-19

per-VLAN spanning-tree plus

See PVST+

physical ports11-1

PIM-DVMRP, as snooping method19-7

ping

character output description30-16

executing30-16

overview30-15

plain old telephone service

See POTS splitters and POTS telephones

policers

configuring for each matched traffic class28-29

described28-4

number of1-6, 28-7

types of28-7

policing1-6, 28-4

policy maps for QoS

characteristics of28-29

configuring28-29

described28-6

displaying28-37

POP1-20

Port Aggregation Protocol

See EtherChannel

See PAgP

port-based authentication

authentication server

defined10-2

RADIUS server10-2

client, defined10-2

configuration guidelines10-9

configuring

802.1X authentication10-10

guest VLAN10-16

host mode10-16

manual re-authentication of a client10-13

periodic re-authentication10-13

quiet period10-14

RADIUS server10-13

RADIUS server parameters on the switch10-12

switch-to-client frame-retransmission number10-15

switch-to-client retransmission time10-14

default configuration10-8

described10-1

device roles10-2

displaying statistics10-18

EAPOL-start frame10-3

EAP-request/identity frame10-3

EAP-response/identity frame10-3

enabling

802.1X with guest VLAN10-7

802.1X with port security10-5, 10-16

802.1X with VLAN assignment10-6, 10-10

802.1X with voice VLAN10-6

encapsulation10-2

port-based authentication (continued)

initiation and message exchange10-3

method lists10-10

ports

authorization state and dot1x port-control command10-4

authorized and unauthorized10-4

resetting to default values10-17

software upgrade changes10-10

switch

as proxy10-2

RADIUS client10-2

topologies, supported10-4

port blocking20-5

port-channel

See EtherChannel

Port Fast

described15-2

enabling15-15

mode, spanning tree16-28

support for1-4

port icons, Front Panel view4-7

port LEDs

port modes4-9

port membership modes, VLAN16-3

port modes, described4-9

port pop-up menu, Front Panel view4-22

port priority

MSTP14-17

STP13-17

port profile, locking12-15

ports

802.1Q trunk4-11

access11-2

blocking20-5

duplex mode12-11

dynamic access4-11, 16-3

forwarding, resuming20-6

LRE12-1

ports (continued)

negotiate trunk4-11

priority28-8

protected20-4

secure20-7

speed, setting and checking12-11

static-access4-11, 16-3, 16-11

switch11-1

trunks16-15

VLAN assignments16-11

See also CPE

See also LRE ports

port scheduling28-8

port security

aging20-12

configuring20-9

default configuration20-9

described20-7

displaying20-14

sticky learning20-7

violations20-8

with other features20-9

port-shutdown response, VMPS16-25

POTS splitters1-7

homologated1-16

nonhomologated1-16

See also Cisco LRE 48 POTS Splitter (PS-1M-LRE-48)

POTS telephones1-15, 1-18, 12-10

precedence12-15

preferential treatment of traffic

See QoS

preventing unauthorized access9-1

priority

overriding CoS18-5

port, described28-8

trusting CoS18-6

private branch exchange

See PBX

private LRE profiles

assigning12-13

private VLAN edge ports

See protected ports

privileged EXEC mode2-2

privilege levels

changing the default for lines9-9

command switch7-26

exiting9-10

logging into9-10

mapping on member switches7-26

overview9-2, 9-8

setting a command with9-8

profile acquisition, automatic12-14

profile locking12-15

profiles, LRE

considerations12-10

default, assigning12-13

described12-2

private, assigning12-13

public, assigning12-12

rate selection12-14

See also LRE ports and CPE

protected ports1-3, 20-4

pruning, VTP

enabling17-14

enabling on a port16-20

examples17-5

overview17-4

pruning-eligible list

changing16-20

for VTP pruning17-4

VLANs17-14

PSTN1-7, 1-16, 1-19

publications, relatedxxix

public LRE profiles, assigning12-12

Public Switched Telephone Network

See PSTN

PVRST+16-2

PVST+16-2

802.1Q trunking interoperability13-10

described13-9

instances supported13-9

Q

QoS

auto-QoS

configuration and defaults display28-13

displaying28-13

effects on NVRAM configuration28-12

example, configuration28-14

basic model28-4

classification

class maps, described28-6

defined28-4

in frames and packets28-3

IP ACLs, described28-5

MAC ACLs, described28-5

pass-through mode, described28-23

policy maps, described28-6

port default, described28-5

trust DSCP, described28-5

trusted boundary, described28-21

trusted CoS, described28-5

types for IP traffic28-5

types for non-IP traffic28-5

class maps

configuring28-28

displaying28-37

QoS (continued)

configuration examples

auto-QoS28-14

common wiring closet28-38

intelligent wiring closet28-39

configuration guidelines28-17

configuring

class maps28-28

CoS and WRR28-35

default port CoS value28-21

egress queues28-35

IP extended ACLs28-26

IP standard ACLs28-25

MAC ACLs28-27

policy maps28-29

port trust states within the domain28-18

QoS policy28-24

trusted boundary28-22

default configuration28-16

displaying statistics28-37

egress port scheduling28-9

enabling expedite queue28-36

expedite queue

described28-9

enabling28-36

ingress port scheduling28-8, 28-9

IP phones

automatic classification and queueing28-10

detection and trusted settings28-10

IP phones, detection and trusted settings28-21

mapping tables

CoS-to-DSCP28-33

displaying28-37

DSCP-to-CoS28-34

types of28-5

marked-down actions28-31

marking, described28-4, 28-7

QoS (continued)

overview28-2

pass-through mode28-23

policers

configuring28-31

described28-7

number of28-7

types of28-7

policing, described28-4, 28-7

policy maps

characteristics of28-29

configuring28-29

displaying28-37

queueing, defined28-4

scheduling, defined28-4

support for1-6

trusted bounday28-21

trust states28-5

understanding28-2

qualification, link12-16

quality of service

See QoS

queries, IGMP19-3

R

RADIUS

attributes

vendor-proprietary9-30

vendor-specific9-29

configuring

accounting9-28

authentication9-23

authorization9-27

communication, global9-21, 9-29

communication, per-server9-20, 9-21

multiple UDP ports9-21

RADIUS (continued)

default configuration9-20

defining AAA server groups9-25

displaying the configuration9-31

identifying the server9-20

in clusters7-17

limiting the services to the user9-27

method list, defined9-20

operation of9-19

overview9-18

suggested network environments9-18

tracking services accessed by user9-28

range

macro11-8

of interfaces11-6

rapid convergence14-7

rapid per-VLAN spanning-tree plus

See rapid PVST+

rapid PVST+

802.1Q trunking interoperability13-10

described13-9

instances supported13-9

rapid-PVST+16-2

Rapid Spanning Tree Protocol

See RSTP

rate selection

definition of12-14

sequences12-5

rate selections

list of sequences12-5, 12-6

rcommand command7-25

RCP

configuration files

downloadingB-17

overviewB-16

preparing the serverB-17

uploadingB-18

RCP (continued)

image files

deleting old imageB-32

downloadingB-30

preparing the serverB-29

uploadingB-32

reconfirmation interval, VMPS, changing16-30

recovery procedures30-1

redundancy

EtherChannel29-2

STP

backbone13-7

multidrop backbone15-5

path cost16-23

port priority16-22

redundant clusters

See cluster standby group

redundant links and UplinkFast15-18

reloading software5-18

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

remote monitoring

see RMON

Remote Network Monitoring

See RMON

resetting a UDLD-shutdown interface21-5

restricting access

NTP services8-7

overview9-1

passwords and privilege levels9-2

RADIUS9-18

TACACS+9-10

retry count, VMPS, changing16-31

RFC

1112, IP multicast and IGMP19-2

1157, SNMPv126-2

1305, NTP8-2

1757, RMON24-2

1901, SNMPv2C26-2

1902 to 1907, SNMPv226-2

2236, IP multicast and IGMP19-2

2273-2275, SNMPv326-2

RMON

default configuration24-3

displaying status24-6

enabling alarms and events24-3

groups supported24-2

overview24-1

statistics

collecting group Ethernet24-5

collecting group history24-5

root guard

described15-12

enabling15-21

support for1-4

root switch

MSTP14-14

STP13-14

RPS LED 4-8

RSPAN

configuration guidelines23-12

default configuration23-7

destination ports23-4

displaying status23-16

IDS23-2

interaction with other features23-6

monitored ports23-4

monitoring ports23-4

RSPAN (continued)

overview1-6, 23-1

received traffic23-3

reflector port23-4

session limits23-6

sessions

creating23-13

defined23-3

removing source (monitored) ports23-15

specifying monitored ports23-13

source ports23-4

transmitted traffic23-3

RSTP

active topology, determining14-6

BPDU

format14-9

processing14-10

designated port, defined14-6

designated switch, defined14-6

interoperability with 802.1D

described14-5

restarting migration process14-22

topology changes14-10

overview14-6

port roles

described14-6

synchronized14-8

proposal-agreement handshake process14-7

rapid convergence

described14-7

edge ports and Port Fast14-7

point-to-point links14-7, 14-22

root ports14-7

root port, defined14-6

See also MSTP

running configuration, saving5-10

S

SC (standby command switch)7-13, 7-23

scheduled reloads5-18

secure ports, configuring20-7

secure remote connections9-33

Secure Shell

See SSH

security, port20-7

sequence numbers in log messages25-8

sequences12-5

table of12-5, 12-6

sequences, LRE

global

assigning12-13

specific port

assigning12-14

server mode, VTP17-3

servers, BOOTP1-3

service-provider network, MSTP and RSTP14-1

set-request operation26-4

settings

duplex mode12-11

speed12-11

set-top box, television1-15, 1-18

setup program, failed command switch replacement30-11, 30-13

severity levels, defining in system messages25-8

show and more command output, filtering2-9

show cdp traffic command22-5

show cluster members command7-25

show configuration command11-16

show controllers ethernet-controller command12-7

show controllers lre commands12-11, 12-12, 12-13, 12-14

show controllers lre profile mapping3-7, 3-10, 3-11, 3-12, 12-13, 12-14, 12-16, 12-19, 12-21, 12-22

show controllers lre profile mapping command12-12, 12-13

show interfaces command11-13, 11-16

show running-config command

displaying ACLs27-19, 27-20, 27-21

interface description in11-16

shutdown command on interfaces11-19

signal to noise ratio12-16

Simple Network Management Protocol

See SNMP

SNAP22-1

SNMP

accessing MIB variables with26-4

agent

described26-4

disabling26-7

community strings

configuring26-7

for cluster switches26-4

overview26-4

configuration examples26-15

default configuration26-6

groups26-9

in clusters7-17

informs

and trap keyword26-11

described26-5

differences from traps26-5

enabling26-13

limiting access by TFTP servers26-14

limiting system log messages to NMS25-10

manager functions26-3

managing clusters with7-26

MIBs

location ofA-3

supportedA-1

notifications26-5

overview26-1, 26-4

status, displaying26-16

SNMP (continued)

system contact and location26-14

trap manager, configuring26-12

traps

described26-3, 26-5

differences from informs26-5

enabling26-11

enabling MAC address notification8-23

overview26-1, 26-4

types of26-11

users26-9

versions supported26-2

snooping, IGMP19-1

SNR

definition of12-16

downstream rate requirements12-16, 12-18

margins12-16

upstream rate requirements12-17, 12-18

software, VLAN considerations17-8

software images

location in FlashB-20

recovery procedures30-2

scheduling reloads5-18

tar file format, describedB-21

See also downloading and uploading

source addresses, in ACLs27-12

SPAN

configuration guidelines23-7

default configuration23-7

destination ports23-4

displaying status23-16

IDS23-2

interaction with other features23-6

monitored ports23-4

monitoring ports23-4

overview1-6, 23-1

received traffic23-3

session limits23-6

SPAN (continued)

sessions

creating23-8

defined23-3

removing destination (monitoring) ports23-11

removing source (monitored) ports23-11

specifying monitored ports23-8

source ports23-4

transmitted traffic23-3

spanning tree and native VLANs16-17

Spanning Tree Protocol

See STP

speed, configuring on interfaces11-11

speed, setting12-11

SSH

configuring9-34

cryptographic software image9-33

described9-33

displaying settings9-34

Stack Membership Discovery Protocol15-6

Standby Command Configuration window7-24

standby command switch

configuring 7-23

considerations7-13

defined7-2

priority7-13

requirements7-3

virtual IP address7-13

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

startup configuration

booting

manually5-14

specific image5-15

clearingB-19

startup configuration (continued)

configuration file

automatically downloading5-13

specifying the filename5-14

default boot configuration5-13

static access mode4-11

static access ports

assigning to VLAN16-11

defined11-2, 16-3

static addresses

See addresses

static VLAN membership16-2

statistics

802.1X10-18

CDP22-5

interface11-17

QoS ingress and egress28-37

RMON group Ethernet24-5

RMON group history24-5

SNMP input and output26-16

VTP17-15

sticky learning

configuration file20-7

defined20-7

disabling20-7

enabling20-7

saving addresses20-7

storm control

described20-1

displaying20-14

STP

accelerating root port selection15-4

BackboneFast

described15-10

enabling15-20

BPDU filtering

described15-3

enabling15-17

STP (continued)

BPDU guard

described15-3

enabling15-16

BPDU message exchange13-2

configuration guidelines13-11, 15-14

configuring

forward-delay time13-22

hello time13-21

in cascaded stack13-23

maximum aging time13-22

path cost13-19

port priority13-17

root switch13-14

secondary root switch13-16

spanning-tree mode13-12

switch priority13-20

counters, clearing13-24

cross-stack UplinkFast

described15-5

enabling15-19

default configuration13-11

default optional feature configuration15-14

designated port, defined13-3

designated switch, defined13-3

detecting indirect link failures15-10

disabling13-13

displaying status13-24

EtherChannel guard

described15-12

enabling15-20

extended system ID

affects on root switch13-14

affects on the secondary root switch13-16

overview13-3

unexpected behavior13-15

STP (continued)

features supported1-4

inferior BPDU13-3

instances supported13-9

interface state, blocking to forwarding15-2

interface states

blocking13-5

disabled13-6

forwarding13-5, 13-6

learning13-6

listening13-6

overview13-4

interoperability and compatibility among modes13-10

limitations with 802.1Q trunks13-10

load sharing

overview16-21

using path costs16-23

using port priorities16-22

loop guard

described15-13

enabling15-21

modes supported13-9

multicast addresses, affect of13-8

overview13-2

path costs16-23, 16-24

Port Fast

described15-2

enabling15-15

port priorities16-22

preventing root switch selection15-12

protocols supported13-9

redundant connectivity13-7

root guard

described15-12

enabling15-21

root port, defined13-3

STP (continued)

root switch

affects of extended system ID13-3, 13-14

configuring13-14

election13-3

unexpected behavior13-15

settings in a cascaded stack13-23

shutdown Port Fast-enabled port15-3

superior BPDU13-3

timers, described13-21

UplinkFast

described15-4

enabling15-18

stratum, NTP8-2

summer time8-13

SunNet Manager1-8

switch clustering technology

See clusters, switch

switched ports11-1

Switch Manager4-5

See also Device Manager

switchport block multicast command20-6

switchport block unicast command20-6

switchport protected command20-4

switch priority

MSTP14-19

STP13-20

syslog

See system message logging

syslog export

and LRE logging12-8

described12-8

disabling12-23

enabling12-22

system clock

configuring

daylight saving time8-13

manually8-11

summer time8-13

time zones8-12

displaying the time and date8-11

overview8-1

See also NTP

system message logging

default configuration25-3

defining error message severity levels25-8

disabling25-4

displaying the configuration25-12

enabling25-4

facility keywords, described25-12

level keywords, described25-9

limiting messages25-10

message format25-2

overview25-1

sequence numbers, enabling and disabling25-8

setting the display destination device25-4

synchronizing log messages25-6

timestamps, enabling and disabling25-7

UNIX syslog servers

configuring the daemon25-11

configuring the logging facility25-11

facilities supported25-12

system messages on CMS4-20

system name

default configuration8-15

default setting8-15

manual configuration8-15

See also DNS

system prompt

default setting8-15

manual configuration8-16

T

tables, CMS4-29

tabs, CMS4-29

TACACS+

accounting, defined9-11

authentication, defined9-11

authorization, defined9-11

configuring

accounting9-17

authentication key9-13

authorization9-16

login authentication9-14

default configuration9-13

displaying the configuration9-17

identifying the server9-13

in clusters7-17

limiting the services to the user9-16

operation of9-12

overview9-10

tracking services accessed by user9-17

tar files

creatingB-6

displaying the contents ofB-7

extractingB-7

image file formatB-21

Telnet

accessing management interfaces2-10

accessing the CLI1-8

from a browser2-10

setting a password9-6

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password9-6

TFTP

configuration files

downloadingB-12

preparing the serverB-11

uploadingB-12

configuration files in base directory5-6

configuring for autoconfiguration5-5

image files

deletingB-24

downloadingB-23

preparing the serverB-22

uploadingB-24

limiting access by servers26-14

time

See NTP and system clock

time-range command27-15

time ranges in ACLs27-15

timestamps in log messages25-7

time zones8-12

Token Ring VLANs

support for16-5

VTP support17-4

toolbar4-20

tool tips4-26

Topology view

described4-3, 4-11

device icons4-14

device labels4-13

display options4-15

icons4-13

link labels4-13

TOS1-6

traceroute, Layer 2

and ARP30-18

and CDP30-17

described30-17

IP addresses and subnets30-18

MAC addresses and VLANs30-18

multicast traffic30-18

multiple devices on a port30-18

supported switches30-17

unicast traffic30-17

usage guidelines30-17

traffic

blocking flooded20-5

fragmented27-3

unfragmented27-3

traffic policing1-6

transparent mode, VTP17-3, 17-12

trap-door mechanism5-2

traps

configuring MAC address notification8-23

configuring managers26-11

defined26-3

enabling8-23, 26-11

notification types26-11

overview26-1, 26-4

troubleshooting

connectivity problems30-15

detecting unidirectional links21-1

displaying crash information30-23

GBIC security and identification30-15

LRE ports30-18

with CiscoWorks26-4

with debug commands30-20

with ping30-15

with system message logging25-1

trunk ports

configuring16-18

defined11-2

trunks

allowed-VLAN list16-19

load sharing

setting STP path costs16-23

using STP port priorities16-22

native VLAN for untagged traffic16-21

parallel16-23

pruning-eligible list16-20

to non-DTP device16-15

understanding16-15

VLAN 1 minimization16-19

trusted boundary28-21

twisted-pair Ethernet, detecting unidirectional links21-1

type-of-service

See TOS

U

UDLD

default configuration21-3

echoing detection mechanism21-2

enabling

globally21-4

per interface21-4

link-detection mechanism21-1

neighbor database21-2

overview21-1

resetting an interface21-5

status, displaying21-6

unauthorized ports with 802.1X10-4

unicast traffic, blocking20-6

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration25-11

facilities supported25-12

message logging configuration25-11

unrecognized Type-Length-Value (TLV) support17-4

upgrade12-23

behavior details12-26

configuring for12-24

conrtoller configuration12-25

example12-26

global configuration12-25

performing12-24

upgrading software, VLAN considerations17-8

upgrading software images

See downloading

UplinkFast

described15-4

enabling15-18

support for1-4

uploading

configuration files

preparingB-11, B-13, B-17

reasons forB-9

using FTPB-15

using RCPB-18

using TFTPB-12

image files

preparingB-22, B-25, B-29

reasons forB-20

using FTPB-28

using RCPB-32

using TFTPB-24

upstream power back-off1-7, 12-21

user EXEC mode2-2

username-based authentication9-7

V

version-dependent transparent mode17-4

virtual IP address

cluster standby group7-13, 7-23

command switch7-13, 7-23

See also IP addresses

vlan.dat file16-4

VLAN 1 minimization, support for1-5

VLAN configuration

at bootup16-7

saving16-7

VLAN configuration mode2-2, 16-6

VLAN database

and startup configuration file16-7

and VTP17-1

VLAN configuration saved in16-7

VLANs saved in16-4

vlan database command16-6

vlan global configuration command16-6

VLAN ID, discovering8-26

VLAN management domain17-2

VLAN Management Policy Server

See VMPS

VLAN membership

confirming16-30

modes16-3

VLAN Query Protocol

See VQP

VLANs

adding16-8

adding to VLAN database16-8

aging dynamic addresses13-8

allowed on trunk16-19

and spanning-tree instances16-2, 16-6, 16-13

configuration guidelines, normal-range VLANs16-5

configuration options16-6

configuring16-1

configuring IDs 1006 to 409416-12

creating in config-vlan mode16-8

creating in VLAN configuration mode16-9

default configuration16-7

deleting16-10

described11-3, 16-1

displaying16-14

extended-range16-1, 16-12

illustrated16-2

VLANs (continued)

modifying16-8

native, configuring16-21

normal-range16-1, 16-4

parameters16-4

port membership modes16-3

static-access ports16-11

STP and 802.1Q trunks13-10

supported16-2

Token Ring16-5

trunks, VLAN 1 minimization16-19

VTP modes17-3

VLAN Trunking Protocol

See VTP

VLAN trunks16-15

VMPS

administering16-31

configuration example16-32

configuration guidelines16-28

default configuration16-28

description16-25

dynamic port membership

described16-26

reconfirming16-30

troubleshooting16-32

entering server address16-29

mapping MAC addresses to VLANs16-25

monitoring16-31

reconfirmation interval, changing16-30

reconfirming membership16-30

retry count, changing16-31

voice VLAN

Cisco 7960 phone, port connections18-1

configuration guidelines18-3

voice VLAN (continued)

configuring IP phones for data traffic

override CoS of incoming frame18-5

trust CoS priority of incoming frame18-6

configuring ports for voice traffic in

802.1P priority tagged frames18-4

802.1Q frames18-4

connecting to an IP phone18-3

default configuration18-2

described18-1

displaying18-6

VQP16-25

VTP

adding a client to a domain17-14

advertisements16-17, 17-3

and extended-range VLANs17-1

and normal-range VLANs17-1

client mode, configuring17-11

configuration

global configuration mode17-7

guidelines17-8

privileged EXEC mode17-7

requirements17-9

saving17-7

VLAN configuration mode17-7

configuration mode options17-7

configuration requirements17-9

configuration revision number

guideline17-14

resetting17-15

configuring

client mode17-11

server mode17-9

transparent mode17-12

consistency checks17-4

VTP (continued)

default configuration17-6

described17-1

disabling17-12

domain names17-8

domains17-2

modes

client17-3, 17-11

server17-3, 17-9

transitions17-3

transparent17-3, 17-12

monitoring17-15

passwords17-8

pruning

disabling17-14

enabling17-14

examples17-5

overview17-4

pruning-eligible list, changing16-20

server mode, configuring17-9

statistics17-15

Token Ring support17-4

transparent mode, configuring17-12

using17-1

version, guidelines17-9

version 117-4

version 2

configuration guidelines17-9

disabling17-13

enabling17-13

overview17-4

W

warningsxxviii

web-based management software

See CMS

Weighted Round Robin

See WRR

window components, CMS4-28

wizards4-26

WRR

configuring28-36

defining28-9

description28-9

X

XMODEM protocol30-2