Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide, 12.1(19)EA1
Index
Downloads: This chapterpdf (PDF - 1.18MB) The complete bookPDF (PDF - 8.32MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

802.1D

See STP

802.1Q

and trunk ports11-2

configuration limitations17-16

native VLAN for untagged traffic17-21

802.1S

See MSTP

802.1W

See RSTP

802.1X

See port-based authentication

802.3X flow control11-14

A

abbreviating commands2-4

AC (command switch)7-13, 7-24

access-class command29-20

access control entries

See ACEs

access control lists

See ACLs

access control parameter

See ACP

access-denied response, VMPS17-25

access groups, viewing29-23

accessing

clusters, switch7-16

command switches7-13

member switches7-16

switch clusters7-16

access lists

See ACLs

access ports

defined11-2

in switch clusters7-11

accounting

with RADIUS9-28

with TACACS+9-11, 9-17

ACEs

defined29-2

Ethernet29-2

IP29-2

Layer 3 parameters29-10

Layer 4 parameters29-10

ACLs

ACEs29-2

any keyword29-9

applying

time ranges to29-15

to management interfaces29-20

to management VLANs29-20

to physical interfaces29-21

to QoS30-5

to terminal lines29-20

classifying traffic for QoS30-25

comments in29-17

compiling29-23

ACLs (continued)

configuration guidelines

management interfaces, applying to29-6

physical interfaces, applying to29-6

defined29-2

displaying interface29-23

examples of29-23

extended IP

configuring for QoS classification30-26

creating29-10

matching criteria29-7

host keyword29-9

IP

creating29-7

implicit deny29-9, 29-13, 29-15

implicit masks29-9

management interfaces, applying to29-20

matching criteria29-2, 29-7

named29-13

physical interfaces, applying to29-21

undefined29-19, 29-21

virtual terminal lines, setting on29-20

MAC extended29-18

matching29-7

monitoring29-22

named29-13

numbers29-8

protocol parameters29-10

standard IP

configuring for QoS classification30-25

creating29-9

matching criteria29-7

time ranges29-15

unsupported features29-7

ACP

system-defined mask29-4

understanding29-4

user-defined mask29-4

addresses

displaying the MAC address table8-28

dynamic

accelerated aging14-8

changing the aging time8-23

default aging14-8

defined8-21

learning8-22

removing8-24

MAC, discovering8-28

multicast STP address management14-8

static

adding and removing8-26

defined8-21

address resolution8-28

Address Resolution Protocol

See ARP table

ADSL1-8

advertisements

CDP24-1

VTP17-17, 18-3

aggregated ports

See EtherChannel

aging, accelerating14-8

aging time

accelerated

for MSTP15-20

for STP14-8, 14-22

MAC address table8-23

maximum

for MSTP15-21

for STP14-22

alarms, RMON26-3

allowed-VLAN list17-19

American National Standards Institute

See ANSI

ANSI1-8

ARP table

address resolution8-28

managing8-28

asymmetric digital subscriber line

See ADSL

attributes, RADIUS

vendor-proprietary9-30

vendor-specific9-29

authentication

local mode with AAA9-31

NTP associations8-4

RADIUS

key9-21

login9-23

TACACS+

defined9-11

key9-13

login9-14

See also port-based authentication

authoritative time source, described8-2

authorization

with RADIUS9-27

with TACACS+9-11, 9-16

authorized ports with 802.1X10-4

autoconfiguration5-3

automatic discovery

adding member switches7-21

considerations

beyond a non-candidate device7-8, 7-10

brand new switches7-11

connectivity7-6

management VLANs7-8, 7-10

non-CDP-capable devices7-8

noncluster-capable devices7-8

automatic discovery (continued)

creating a cluster standby group7-23

in switch clusters7-6

See also CDP

automatic QoS

See QoS

automatic recovery, clusters7-12

See also HSRP

autonegotiation

interface configuration guidelines11-11

mismatches32-14

auxiliary VLAN

See voice VLAN

B

BackboneFast

described16-10

enabling16-20

support for1-5

banners

configuring

login8-21

message-of-the-day login8-20

default configuration8-19

when displayed8-19

blocking packets22-5

booting

boot loader, function of5-2

boot process5-1

manually5-14

specific image5-15

boot loader

accessing5-16

described5-2

environment variables5-16

prompt5-16

trap-door mechanism5-2

BPDU

error-disabled state16-3

RSTP format15-9

BPDU filtering

described16-3

enabling16-17

support for1-5

BPDU guard

described16-3

enabling16-16

support for1-5

broadcast storm control

configuring22-2

disabling22-3

browser configuration7-1

C

cables, monitoring for unidirectional links23-1

candidate switch

adding7-21

automatic discovery7-6

defined7-5

HC7-24

passwords7-21

requirements7-5

standby group7-23

See also command switch, cluster standby group, and member switch

Catalyst 2955

configuring alarm profiles

attaching an alarm profile to a port3-11

creating or modifying alarm profiles3-10

configuring switch alarms3-1to 3-12

configuring the FCS bit error rate alarm

setting the FCS error hysteresis threshold3-9

setting the FCS error threshold3-8

Catalyst 2955 (continued)

configuring the power supply alarm

setting the power mode3-5

setting the power supply alarm options3-6

configuring the temperature alarms

associating the temperature alarms to a relay3-7

setting a secondary temperature threshold3-7

default alarm configuration3-4, 3-5

displaying Catalyst 2955 switch alarms3-12

enabling SNMP traps3-12

FCS error hysteresis threshold3-2

global status monitoring alarms

power supply alarm3-2

temperature alarm3-2

port status monitoring alarms

FCS bit error rate alarm3-3

link fault alarm3-3

port is not operating alarm3-3

port not forwarding alarm3-3

triggering alarm options

configurable relays3-4

FCS Bit Error Rate alarm3-3

methods to trigger3-4

SNMP traps3-4

syslog messages3-4

cautionsxxviii

CC (command switch)7-24

CDP

and trusted boundary30-22

automatic discovery in switch clusters7-6

configuring24-2

default configuration24-2

described24-1

disabling for routing device24-3, 24-4

enabling and disabling

on an interface24-4

on a switch24-3

CDP (continued)

monitoring24-5

overview24-1

transmission timer and holdtime, setting24-2

updates24-2

CGMP, joining multicast group21-3

Cisco 575-LRE CPE1-8

Cisco Access Analog Trunk Gateway1-20

Cisco CallManager software1-15, 1-20

Cisco Discovery Protocol

See CDP

Cisco Intelligence Engine 2100 Series Configuration Registrar

See IE2100

Cisco IP Phones1-15

Cisco LRE 48 POTS Splitter (PS-1M-LRE-48)1-8, 1-17

Cisco Networking Services

See IE2100

Cisco SoftPhone software1-15

CiscoWorks 20001-9, 28-4

class maps for QoS

configuring30-28

described30-6

displaying30-37

class of service

See CoS

clearing interfaces11-19

CLI

abbreviating commands2-4

command modes2-1

described1-9

editing features

enabling and disabling2-7

keystroke editing2-7

wrapped lines2-8

error messages2-5

getting help2-3

CLI (continued)

history

changing the buffer size2-5

described2-5

disabling2-6

recalling commands2-6

managing clusters7-26

no and default forms of commands2-4

client mode, VTP18-3

clock

See system clock

clusters, switch

accessing7-16

adding member switches7-21

automatic discovery7-6

automatic recovery7-12

command switch configuration7-20

compatibility7-5

creating7-20

creating a cluster standby group7-23

described7-1

LRE profile considerations7-19

managing

through CLI7-26

through SNMP7-27

planning7-5

planning considerations

automatic discovery7-6

automatic recovery7-12

CLI7-26

host names7-16

IP addresses7-16

LRE profiles7-19

management VLAN7-19

passwords7-17

RADIUS7-18

SNMP7-17, 7-27

clusters, switch (continued)

planning considerations (continued)

switch-specific features7-20

TACACS+7-18

redundancy7-23

troubleshooting7-26

verifying7-25

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

cluster standby group

automatic recovery7-15

considerations7-14

creating7-23

defined7-2

requirements7-3

virtual IP address7-14

See also HSRP

CMS

advantages1-9

configuration modes4-5

described1-9

Front Panel view

described4-2

operating systems and supported browsers4-8

requirements4-9

Topology view4-14

wizards4-6

command-line interface

See CLI

command modes2-1

commands

abbreviating2-4

no and default2-4

setting privilege levels9-8

command switch

accessing7-13

active (AC)7-13, 7-24

command switch with HSRP disabled (CC)7-24

configuration conflicts32-14

defined7-2

enabling7-20

passive (PC)7-13, 7-24

password privilege levels7-27

priority7-13

recovery

from command-switch failure7-13

from failure32-10

from lost member connectivity32-14

redundant7-12, 7-23

replacing

with another switch32-13

with cluster member32-11

requirements7-3

standby (SC)7-13, 7-24

See also candidate switch, cluster standby group, member switch, and standby command switch

community strings

configuring7-17, 28-7

for cluster switches28-4

in clusters7-17

overview28-4

SNMP7-17

config.text5-13

configuration

controller for LRE upgrade13-25

global LRE13-25

configuration conflicts, recovering from lost member connectivity32-14

configuration examples, network

collapsed backbone and switch cluster1-15

design concepts

cost-effective wiring closet1-12

high-performance workgroup1-12

network performance1-11

network services1-11

redundant Gigabit backbone1-12

hotel network1-16

large campus1-20

long-distance, high-bandwidth transport configuration1-23

service-provider central-office network1-18

small to medium-sized network1-13

configuration files

clearing the startup configurationB-19

creating using a text editorB-10

default name5-13

deleting a stored configurationB-19

describedB-8

downloading

automatically5-13

preparingB-11, B-13, B-16

reasons forB-8

using FTPB-14

using RCPB-17

using TFTPB-11

guidelines for creating and usingB-9

invalid combinations when copyingB-5

limiting TFTP server access28-14

obtaining with DHCP5-7

password recovery disable considerations9-5

specifying the filename5-14

system contact and location information28-14

types and locationB-10

configuration files (continued)

uploading

preparingB-11, B-13, B-16

reasons forB-8

using FTPB-15

using RCPB-18

using TFTPB-12

VMPS database17-26

configuration modes, CMS4-5

configuration settings, saving5-10

configure terminal command11-5

configuring

duplex mode13-11

for an LRE upgrade13-24

LRE ports13-8

speed on Cisco 575 LRE CPE13-11

config-vlan mode2-2, 17-6

conflicts, configuration32-14

connections, secure remote9-33

connectivity problems32-15

consistency checks in VTP version 218-4

console port, connecting to2-10

conventions

commandxxviii

for examplesxxviii

textxxviii

CoS

configuring30-8

configuring priority queues30-35

defining30-9

described1-7

override priority19-5

trust priority19-6

CoS-to-DSCP map for QoS30-33

counters, clearing interface11-19

CPE 1-8

Ethernet link guidelines13-11

Ethernet links

connecting to LRE ports13-6

considerations for Cisco 575 LRE CPE13-11

considerations for Cisco 585 LRE CPE13-12

Ethernet links, described13-2

hotel network configuration example1-16, 1-18, 1-19

LRE links13-2

CPE link, transitioning state13-7

CPE toggle

configuring13-22

described13-7

disabling13-22

enabling13-22

crashinfo file32-22

cross-stack UplinkFast, STP

connecting stack ports16-8

described16-5

enabling16-19

fast-convergence events16-7

Fast Uplink Transition Protocol16-6

limitations16-8

normal-convergence events16-7

Stack Membership Discovery Protocol16-6

support for1-5

cross talk13-10

cryptographic software image9-32

customer premises equipment

See CPE

D

daylight saving time8-14

debugging

enabling all system diagnostics32-20

enabling for a specific feature32-20

redirecting error message output32-21

using commands32-19

default commands2-4

default configuration

802.1X10-8

banners8-19

booting5-13

CDP24-2

DHCP20-3

DNS8-18

EtherChannel31-8

IGMP filtering21-23

IGMP snooping21-6

IGMP throttling21-23

initial switch information5-3

Layer 2 interfaces11-10

MAC address table8-23

MSTP15-12

MVR21-17

NTP8-4

optional spanning-tree features16-14

password and privilege level9-2

QoS30-16

RADIUS9-20

RMON26-3

RSPAN25-7

SNMP28-6

SPAN25-7

STP14-11

system message logging27-3

system name and prompt8-16

TACACS+9-13

UDLD23-4

VLAN, Layer 2 Ethernet interfaces17-17

VLANs17-7

VMPS17-28

voice VLAN19-2

VTP18-6

default gateway5-10

deleting VLANs17-10

description command11-16

destination addresses, in ACLs29-12

detecting indirect link failures, STP16-10

device discovery protocol24-1

Device Manager4-14

See also Switch Manager

DHCP1-4

DHCP-based autoconfiguration

client request message exchange5-4

configuring

client side5-3

DNS5-6

relay device5-6

server-side5-5

TFTP server5-6

example5-8

lease options

for IP address information5-5

for receiving the configuration file5-5

overview5-3

relationship to BOOTP5-3

DHCP option 82

configuration guidelines20-3

default configuration20-3

displaying20-5

overview20-2

DHCP snooping

configuration guidelines20-3

default configuration20-3

displaying binding tables20-5

displaying configuration20-5

message exchange process20-2

option 82 data insertion20-2

Differentiated Services architecture, QoS30-2

Differentiated Services Code Point30-3

digital telephone networks1-8

directories

changingB-4

creating and removingB-4

displaying the workingB-4

discovery, clusters

See automatic discovery

DNS

and DHCP-based autoconfiguration5-6

default configuration8-18

displaying the configuration8-19

overview8-17

setting up8-18

documentation, relatedxxix

domain names

DNS8-17

VTP18-8

Domain Name System

See DNS

downloading

configuration files

preparingB-11, B-13, B-16

reasons forB-8

using FTPB-14

using RCPB-17

using TFTPB-11

image files

deleting old imageB-23

preparingB-21, B-25, B-29

reasons forB-19

using FTPB-26

using RCPB-30

using TFTPB-22

DSCP1-7, 30-3

DSCP-to-CoS map for QoS30-34

DTP1-5, 17-15

duplex mode

configuring13-11

CPE Ethernet link13-11

duplex mode, configuring11-11

dynamic access ports

characteristics17-3

configuring17-29

defined11-2

dynamic addresses

See addresses

dynamic desirable trunking mode17-16

dynamic port VLAN membership

described17-26

reconfirming17-30

troubleshooting17-32

types of connections17-29

VMPS database configuration file17-26

Dynamic Trunking Protocol

See DTP

E

editing features

enabling and disabling2-7

keystrokes used2-7

wrapped lines2-8

egress port scheduling30-9

enable password9-4

enable secret password9-4

encapsulation30-8

encryption for passwords9-4

environment variables

function of5-17

location in Flash5-16

error messages

during command entry2-5

setting the display destination device27-4

severity levels27-8

system message format27-2

EtherChannel

automatic creation of31-3

configuration guidelines31-8

default configuration31-8

destination MAC address forwarding31-6

displaying status31-14

forwarding methods31-11

interaction with STP31-8

EtherChannel (continued)

Layer 2 interfaces, configuring31-9

load balancing31-6, 31-11

number of interfaces per31-2

overview31-1

PAgP

aggregate-port learners31-5

compatibility with Catalyst 190031-12

displaying status31-14

interaction with other features31-6

learn method and priority configuration31-12

modes31-3

overview31-3

silent mode31-4

support for1-3

port-channel interfaces

described31-2

numbering of31-2

port groups11-3

source MAC address forwarding31-6

EtherChannel guard

described16-12

enabling16-20

Ethernet VLANs

adding17-8

defaults and ranges17-8

modifying17-8

ETSI1-8

European Telecommunication Standards Institute

See ETSI

events, RMON26-3

examples

conventions forxxviii

network configuration1-10

expedite queue, QoS30-9

expert mode4-6

Express Setup4-11

extended-range VLANs

configuration guidelines17-12

configuring17-12

creating17-12, 17-13

defined17-1

extended system ID

MSTP15-14

STP14-3, 14-14

Extensible Authentication Protocol over LAN10-1

F

fallback VLAN name17-26

Fast Uplink Transition Protocol16-6

features, Cisco IOS1-2

fiber-optic, detecting unidirectional links23-1

files

copyingB-5

deletingB-5

displaying the contents ofB-8

tar

creatingB-6

displaying the contents ofB-7

extractingB-7

image file formatB-20

files, crashinfo

description32-22

displaying the contents of32-23

location32-23

file system

displaying available file systemsB-2

displaying file informationB-3

local file system namesB-1

network file system namesB-5

setting the defaultB-3

filtering show and more command output2-9

filters, IP

See ACLs, IP

Flash device, number ofB-1

flooded traffic, blocking22-6

flow-based packet classification1-7

flow control11-14

forward-delay time

MSTP15-20

STP14-5, 14-22

forwarding

See broadcast storm control

FTP

configuration files

downloadingB-14

overviewB-12

preparing the serverB-13

uploadingB-15

image files

deleting old imageB-27

downloadingB-26

preparing the serverB-25

uploadingB-27

FTP, accessing MIB filesA-3

G

GBICs

1000BASE-LX/LH module1-12

1000BASE-SX module1-12

1000BASE-ZX module1-12

GigaStack module1-12

security and identification32-15

get-bulk-request operation28-3

get-next-request operation28-3, 28-4

get-request operation28-3, 28-4

get-response operation28-3

Gigabit Interface Converters

See GBICs

GigaStack GBIC

fast transition of redundant link16-5

See also GBICs

global configuration mode2-2

guide

audiencexxvii

purposexxvii

guide mode4-5

H

HC (candidate switch)7-24

hello time

MSTP15-19

STP14-21

help, for the command line2-3

history

changing the buffer size2-5

described2-5

disabling2-6

recalling commands2-6

history table, level and number of syslog messages27-10

host names

abbreviations appended to7-24

in clusters7-16

hosts, limit on dynamic ports17-32

HP OpenView1-9

HSRP

automatic cluster recovery7-15

cluster standby group considerations7-14

See also clusters, cluster standby group, and standby command switch

I

ICMP ping

executing32-16

overview32-15

IDS, using with SPAN and RSPAN25-2

IE2100

CNS embedded agents

described6-5

enabling automated configuration6-6

enabling configuration agent6-9

enabling event agent6-8

Configuration Registrar

configID, deviceID, hostname6-3

configuration service6-2

described6-1

event service6-3

described1-9

support for1-4

IEEE 802.1P19-1

IGMP

joining multicast group21-3

join messages21-3

leave processing, enabling21-10

leaving multicast group21-4

queries21-3

report suppression

described21-5

disabling21-11

throttling action21-22

IGMP filtering

configuring21-23

default configuration21-23

described21-22

monitoring21-27

IGMP groups

configuring the throttling action21-26

setting the maximum number21-25

IGMP profile

applying21-24

configuration mode21-23

configuring21-23

IGMP snooping

configuring21-6

default configuration21-6

definition21-1

enabling and disabling21-7

global configuration21-7

Immediate Leave21-5

method21-8

monitoring21-13

VLAN configuration21-7

IGMP throttling

configuring21-26

default configuration21-23

described21-22

displaying action21-27

Immediate-Leave, IGMP21-5

ingress port scheduling30-8

Integrated Services Digital Network

See ISDN

Intelligence Engine 2100 Series CNS Agents

See IE2100

interface

number11-4

range macros11-8

interface command11-4, 11-5

interface configuration mode2-3

interfaces

Cisco IOS supported1-9

configuration guidelines11-11

configuring11-5

configuring duplex mode11-11

configuring speed11-11

counters, clearing11-19

described11-16

descriptive name, adding11-16

displaying information about11-17

flow control11-14

interfaces (continued)

monitoring11-16

naming11-16

physical, identifying11-4

range of11-6

restarting11-19

shutting down11-19

supported11-9

types of11-1

interfaces range macro command11-8

interleave delay, LRE13-20

Intrusion Detection System

See IDS

inventory, cluster7-25

IOS command-line interface

See CLI

IP

named extended ACL29-14

named standard ACL29-14

numbered extended ACL29-10

numbered standard ACL29-9

IP ACLs

applying to

management interfaces29-20

physical interfaces29-21

extended, creating29-10

for QoS classification30-25

implicit deny29-9, 29-13, 29-15

implicit masks29-9

management interfaces, applying to29-20

named29-13

physical interfaces, applying to29-21

standard, creating29-9

undefined29-19, 29-21

virtual terminal lines, setting on29-20

IP addresses

candidate or member7-5, 7-16

cluster access7-2

command switch7-3, 7-13, 7-16

discovering8-28

management VLAN7-19

redundant clusters7-13

standby command switch7-13, 7-16

See also IP information

ip igmp profile command21-23

IP information

assigned

manually5-10

through DHCP-based autoconfiguration5-3

default configuration5-3

IP multicast routing and IGMP snooping21-1, 21-6

IP phones

and QoS19-1

automatic classification and queueing30-10

configuring19-3

trusted boundary for QoS30-21

IP protocols in ACLs29-12

IPv41-1

IPv61-1

IP version 41-1

IP version 61-1

ISDN1-8

J

Java plug-in configuration7-1

join messages, IGMP21-3

L

LACP

See EtherChannel

Layer 2 frames, classification with CoS30-2

Layer 2 interfaces, default configuration11-10

Layer 2 traceroute

and ARP32-17

and CDP32-17

described32-17

IP addresses and subnets32-17

MAC addresses and VLANs32-17

multicast traffic32-17

multiple devices on a port32-18

unicast traffic32-17

usage guidelines32-17

Layer 2 trunks17-15

Layer 3 packets, classification methods30-3

Layer 3 parameters of ACEs29-10

Layer 4 parameters of ACEs29-10

LDAP6-2

leave processing, IGMP21-10

lightweight directory access protocol

See LDAP

line configuration mode2-3

link

qualification of13-16

SNR13-16

link guidelines, CPE Ethernet13-11

link monitor, LRE13-20

links, unidirectional23-1

login authentication

with RADIUS9-23

with TACACS+9-14

login banners8-19

log messages

See system message logging

loop guard

described16-13

enabling16-21

support for1-5

LRE environment

guidelines13-9

troubleshooting32-18

LRE interleave delay13-20

LRE link

monitor13-20

persistence13-19

LRE links

See LRE ports

LRE message logging13-8

LRE ports

configuring

assigning a global sequence13-13

assigning a port sequence13-14

assigning a private profile13-13

assigning a public profile13-12

assigning the default profile13-13

CPE Ethernet links

Cisco 575 LRE CPE considerations13-11

Cisco 585 LRE CPE considerations13-12

described13-2, 13-6

duplex mode13-11

flow control13-11

speed13-11

statistics13-7

described13-1

link qualification13-16

LRE links

considerations13-9

described13-2

statistics13-11

preventing loss of data13-11

rate selection

described13-14

sequences13-5

troubleshooting32-18

LRE profiles

assigning

global profiles13-13

port sequences13-14

private profiles13-13

public profiles13-12

considerations13-10

described13-2

rate selection13-14

table of13-3, 13-4

See also LRE ports and CPE

LRE profiles, considerations in switch clusters7-19

lre shutdown command13-6

LRE switch, upgrading firmware13-23

LRE technology13-1

See also LRE ports and CPE

LRE upstream power back-off13-21

M

MAC addresses

aging time8-23

and VLAN association8-22

building the address table8-22

default configuration8-23

discovering8-28

displaying8-28

displaying in DHCP snooping binding table20-5

dynamic

learning8-22

removing8-24

in ACLs29-18

static

adding8-26

allowing8-27

characteristics of8-26

dropping8-27

removing8-26

sticky secure, adding22-7

MAC address multicast entries, monitoring21-14

MAC address-to-VLAN mapping17-25

MAC extended access lists29-18

macros

See SmartPort macros

management options

benefits

clustering1-9

CMS1-9

CLI2-1

CNS6-1

overview1-9

management VLAN

changing7-19

considerations in switch clusters7-8, 7-10, 7-19

discovery through different management VLANs7-10

discovery through same management VLAN7-8

IP address7-19

MANs

CWDM configuration example1-23

long-distance, high-bandwidth transport configuration example1-23

mapping tables for QoS

configuring

DSCP30-32

DSCP-to-CoS30-34

described30-5

matching, ACLs29-7

maximum aging time

MSTP15-21

STP14-22

maximum hop count, MSTP15-21

membership mode, VLAN port17-3

member switch

adding7-21

automatic discovery7-6

defined7-2

member switch (continued)

managing7-26

passwords7-16

recovering from lost connectivity32-14

requirements7-5

See also candidate switch, cluster standby group, and standby command switch

menu bar, variations4-4

message logging, LRE13-8

messages to users through banners8-19

metropolitan-area networks

See MANs

MIBs

accessing files with FTPA-3

location of filesA-3

overview28-1

SNMP interaction with28-4

supportedA-1

microfilters, phone1-17, 1-19, 13-10

mini-point-of-presence

See POP

mirroring traffic for analysis25-1

mismatches, autonegotiation32-14

monitoring

access groups29-23

ACLs29-22

cables for unidirectional links23-1

CDP24-5

IGMP

filters21-27

snooping21-13

interfaces11-16

multicast router interfaces21-13

MVR21-21

network traffic for analysis with probe25-1

port protection22-14

speed and duplex mode11-13

traffic flowing among switches26-1

traffic suppression22-14

monitoring (continued)

VLANs17-14

VMPS17-31

VTP18-15, 18-16

MSTP

boundary ports

configuration guidelines15-13

described15-5

BPDU filtering

described16-3

enabling16-17

BPDU guard

described16-3

enabling16-16

CIST, described15-3

configuration guidelines15-12, 16-14

configuring

forward-delay time15-20

hello time15-19

link type for rapid convergence15-22

maximum aging time15-21

maximum hop count15-21

MST region15-13

path cost15-18

port priority15-17

root switch15-14

secondary root switch15-16

switch priority15-19

CST

defined15-3

operations between regions15-4

default configuration15-12

default optional feature configuration16-14

displaying status15-23

enabling the mode15-13

EtherChannel guard

described16-12

enabling16-20

MSTP (continued)

extended system ID

effects on root switch15-14

effects on secondary root switch15-16

unexpected behavior15-15

instances supported14-9

interface state, blocking to forwarding16-2

interoperability and compatibility among modes14-10

interoperability with 802.1D

described15-5

restarting migration process15-22

IST

defined15-3

master15-3

operations within a region15-3

loop guard

described16-13

enabling16-21

mapping VLANs to MST instance15-13

MST region

CIST15-3

configuring15-13

described15-2

hop-count mechanism15-5

IST15-3

supported spanning-tree instances15-2

overview15-2

Port Fast

described16-2

enabling16-15

preventing root switch selection16-12

root guard

described16-12

enabling16-21

root switch

configuring15-15

effects of extended system ID15-14

unexpected behavior15-15

shutting down Port Fast-enabled port16-16

multicast groups

and IGMP snooping21-6

Immediate Leave21-5

joining21-3

leaving21-4

static joins21-9

multicast packets

blocking22-6

multicast router interfaces, monitoring21-13

multicast router ports, adding21-9

Multicast VLAN Registration

See MVR

Multiple Spanning Tree Protocol

See MSTP

MVR

configuring interfaces21-19

default configuration21-17

described21-14

modes21-18

monitoring21-21

setting global parameters21-18

N

named IP ACLs29-13

NameSpace Mapper

See NSM

native VLAN

configuring17-21

default17-21

network examples

collapsed backbone and switch cluster1-15

design concepts

cost-effective wiring closet1-12

high-performance workgroup1-12

network performance1-11

network services1-11

redundant Gigabit backbone1-12

hotel network1-16

network examples (continued)

large campus1-20

long-distance, high-bandwidth transport configuration1-23

service-provider central-office network1-18

small to medium-sized network1-13

network management

CDP24-1

RMON26-1

SNMP28-1

Network Time Protocol

See NTP

no commands2-4

nonhomologated POTS splitter

See Cisco LRE POTS Splitter (PS-1M-LRE-48)

nontrunking mode17-16

normal-range VLANs

configuration modes17-6

defined17-1

NSM6-3

NTP

associations

authenticating8-4

defined8-2

enabling broadcast messages8-7

peer8-6

server8-6

default configuration8-4

displaying the configuration8-11

overview8-2

restricting access

creating an access group8-9

disabling NTP services per interface8-10

source IP address, configuring8-10

stratum8-2

synchronizing devices8-6

time

services8-2

synchronizing8-2

O

out-of-profile markdown1-7

P

PAgP

See EtherChannel

pass-through mode30-23

passwords

default configuration9-2

disabling recovery of9-5

encrypting9-4

in clusters7-17, 7-21

overview9-1

recovery of32-2

setting

enable9-3

enable secret9-4

Telnet9-6

with usernames9-7

VTP domain18-8

patch panel1-17

path cost

MSTP15-18

STP14-19

PBX1-16

PC (passive command switch)7-13, 7-24

performing an LRE upgrade13-24

persistence, LRE link13-19

per-VLAN spanning-tree plus

See PVST+

physical ports11-1

PIM-DVMRP, as snooping method21-8

ping

character output description32-16

executing32-16

overview32-15

plain old telephone service

See POTS splitters and POTS telephones

policers

configuring for each matched traffic class30-29

described30-4

number of1-7, 30-7

types of30-7

policing1-7, 30-4

policy maps for QoS

characteristics of30-29

configuring30-29

described30-6

displaying30-37

POP1-21

Port Aggregation Protocol

See EtherChannel

See PAgP

port-based authentication

authentication server

defined10-2

RADIUS server10-2

client, defined10-2

configuration guidelines10-9

configuring

802.1X authentication10-10

guest VLAN10-16

host mode10-16

manual re-authentication of a client10-13

periodic re-authentication10-13

quiet period10-14

RADIUS server10-13

RADIUS server parameters on the switch10-12

switch-to-client frame-retransmission number10-15

switch-to-client retransmission time10-14

default configuration10-8

described10-1

device roles10-2

displaying statistics10-18

EAPOL-start frame10-3

port-based authentication (continued)

EAP-request/identity frame10-3

EAP-response/identity frame10-3

enabling

802.1X with guest VLAN10-7

802.1X with port security10-5, 10-16

802.1X with VLAN assignment10-6, 10-10

802.1X with voice VLAN10-6

encapsulation10-2

initiation and message exchange10-3

method lists10-10

ports

authorization state and dot1x port-control command10-4

authorized and unauthorized10-4

resetting to default values10-17

software upgrade changes10-10

switch

as proxy10-2

RADIUS client10-2

topologies, supported10-4

port blocking22-5

port-channel

See EtherChannel

Port Fast

described16-2

enabling16-15

mode, spanning tree17-28

support for1-5

port membership modes, VLAN17-3

port priority

MSTP15-17

STP14-17

port profile, locking13-15

ports

access11-2

blocking22-5

duplex mode13-11

dynamic access17-3

forwarding, resuming22-6

LRE13-1

priority30-8

protected22-4

secure22-7

speed, setting and checking13-11

static-access17-3, 17-11

switch11-1

trunks17-15

VLAN assignments17-11

See also CPE

See also LRE ports

port scheduling30-8

port security

aging22-12

configuring22-10

default configuration22-9

described22-7

displaying22-14

sticky learning22-7

violations22-8

with other features22-9

port-shutdown response, VMPS17-25

POTS splitters

homologated1-17

nonhomologated1-17

See also Cisco LRE 48 POTS Splitter (PS-1M-LRE-48)

POTS telephones1-16, 1-19, 13-10

precedence13-15

preferential treatment of traffic

See QoS

preventing unauthorized access9-1

priority

overriding CoS19-5

port, described30-8

trusting CoS19-6

private branch exchange

See PBX

private LRE profiles, assigning13-13

private VLAN edge ports

See protected ports

privileged EXEC mode2-2

privilege levels

changing the default for lines9-9

command switch7-27

exiting9-10

logging into9-10

mapping on member switches7-27

overview9-2, 9-8

setting a command with9-8

profile acquisition, automatic13-14

profile locking13-15

profiles, LRE

considerations13-10

default, assigning13-13

described13-2

private, assigning13-13

public, assigning13-12

rate selection13-14

See also LRE ports and CPE

protected ports1-3, 22-4

pruning, VTP

enabling18-14

enabling on a port17-20

examples18-5

overview18-4

pruning-eligible list

changing17-20

for VTP pruning18-4

VLANs18-14

PSTN1-8, 1-17, 1-20

publications, relatedxxix

public LRE profiles, assigning13-12

Public Switched Telephone Network

See PSTN

PVST+

802.1Q trunking interoperability14-10

described14-9

instances supported14-9

Q

QoS

auto-QoS

configuration and defaults display30-13

displaying30-13

effects on NVRAM configuration30-12

example, configuration30-14

basic model30-4

classification

class maps, described30-6

defined30-4

in frames and packets30-3

IP ACLs, described30-5

MAC ACLs, described30-5

pass-through mode, described30-23

policy maps, described30-6

port default, described30-5

trust DSCP, described30-5

trusted boundary, described30-21

trusted CoS, described30-5

types for IP traffic30-5

types for non-IP traffic30-5

class maps

configuring30-28

displaying30-37

QoS (continued)

configuration examples

auto-QoS30-14

common wiring closet30-38

intelligent wiring closet30-39

configuration guidelines30-17

configuring

class maps30-28

CoS and WRR30-35

default port CoS value30-21

egress queues30-35

IP extended ACLs30-26

IP standard ACLs30-25

MAC ACLs30-27

policy maps30-29

port trust states within the domain30-18

QoS policy30-24

trusted boundary30-22

default configuration30-16

displaying statistics30-37

egress port scheduling30-9

enabling expedite queue30-36

expedite queue

described30-9

enabling30-36

ingress port scheduling30-8, 30-9

IP phones

automatic classification and queueing30-10

detection and trusted settings30-10

IP phones, detection and trusted settings30-21

mapping tables

CoS-to-DSCP30-33

displaying30-37

DSCP-to-CoS30-34

types of30-5

marked-down actions30-31

marking, described30-4, 30-7

overview30-2

pass-through mode30-23

QoS (continued)

policers

configuring30-31

described30-7

number of30-7

types of30-7

policing, described30-4, 30-7

policy maps

characteristics of30-29

configuring30-29

displaying30-37

queueing, defined30-4

scheduling, defined30-4

support for1-7

trusted bounday30-21

trust states30-5

understanding30-2

qualification, link13-16

quality of service

See QoS

queries, IGMP21-3

R

RADIUS

attributes

vendor-proprietary9-30

vendor-specific9-29

configuring

accounting9-28

authentication9-23

authorization9-27

communication, global9-21, 9-29

communication, per-server9-20, 9-21

multiple UDP ports9-21

default configuration9-20

defining AAA server groups9-25

displaying the configuration9-31

identifying the server9-20

RADIUS (continued)

in clusters7-18

limiting the services to the user9-27

method list, defined9-20

operation of9-19

overview9-18

suggested network environments9-18

tracking services accessed by user9-28

range

macro11-8

of interfaces11-6

rapid convergence15-7

rapid per-VLAN spanning-tree plus

See rapid PVST+

rapid PVST+

802.1Q trunking interoperability14-10

described14-9

instances supported14-9

rapid-PVST+17-2

Rapid Spanning Tree Protocol

See RSTP

rate selection

definition of13-14

sequences13-5

rate selections, list of sequences13-5, 13-6

rcommand command7-26

RCP

configuration files

downloadingB-17

overviewB-16

preparing the serverB-16

uploadingB-18

image files

deleting old imageB-32

downloadingB-30

preparing the serverB-29

uploadingB-32

reconfirmation interval, VMPS, changing17-30

recovery procedures32-1

redundancy

EtherChannel31-2

STP

backbone14-7

multidrop backbone16-5

path cost17-23

port priority17-22

redundant clusters

See cluster standby group

redundant links and UplinkFast16-18

reloading software5-18

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

remote monitoring

see RMON

Remote Network Monitoring

See RMON

report suppression, IGMP

described21-5

disabling21-11

resetting a UDLD-shutdown interface23-6

restricting access

NTP services8-8

overview9-1

passwords and privilege levels9-2

RADIUS9-18

TACACS+9-10

retry count, VMPS, changing17-31

RFC

1112, IP multicast and IGMP21-2

1157, SNMPv128-2

1305, NTP8-2

1757, RMON26-2

1901, SNMPv2C28-2

1902 to 1907, SNMPv228-2

2236, IP multicast and IGMP21-2

2273-2275, SNMPv328-2

RMON

default configuration26-3

displaying status26-6

enabling alarms and events26-3

groups supported26-2

overview26-1

statistics

collecting group Ethernet26-5

collecting group history26-5

root guard

described16-12

enabling16-21

support for1-5

root switch

MSTP15-14

STP14-14

RSPAN

configuration guidelines25-12

default configuration25-7

destination ports25-4

displaying status25-17

IDS25-2

interaction with other features25-6

monitored ports25-4

monitoring ports25-4

overview1-7, 25-1

received traffic25-3

reflector port25-5

session limits25-7

sessions

creating25-13

defined25-3

removing source (monitored) ports25-16

specifying monitored ports25-13

source ports25-4

transmitted traffic25-3

RSTP

active topology, determining15-6

BPDU

format15-9

processing15-10

designated port, defined15-6

designated switch, defined15-6

interoperability with 802.1D

described15-5

restarting migration process15-22

topology changes15-10

overview15-6

port roles

described15-6

synchronized15-8

proposal-agreement handshake process15-7

rapid convergence

described15-7

edge ports and Port Fast15-7

point-to-point links15-7, 15-22

root ports15-7

root port, defined15-6

See also MSTP

running configuration, saving5-10

S

SC (standby command switch)7-13, 7-24

scheduled reloads5-18

secure ports, configuring22-7

secure remote connections9-33

Secure Shell

See SSH

security, port22-7

sequence numbers in log messages27-8

sequences, LRE

global, assigning13-13

specific port, assigning13-14

sequences, table of13-5, 13-6

server mode, VTP18-3

servers, BOOTP1-4

service-provider network, MSTP and RSTP15-1

set-request operation28-4

settings

duplex mode13-11

speed13-11

set-top box, television1-16, 1-19

setup program, failed command switch replacement32-11, 32-13

severity levels, defining in system messages27-8

show and more command output, filtering2-9

show cdp traffic command24-5

show cluster members command7-26

show configuration command11-16

show controllers ethernet-controller command13-7

show controllers lre commands13-11, 13-12, 13-13, 13-14

show controllers lre profile mapping3-7, 3-10, 3-11, 3-12, 13-13, 13-14, 13-16, 13-19, 13-21, 13-22

show controllers lre profile mapping command13-12, 13-13

show interfaces command11-13, 11-16

show running-config command

displaying ACLs29-19, 29-20, 29-21

interface description in11-16

shutdown command on interfaces11-19

signal to noise ratio13-16

Simple Network Management Protocol

See SNMP

SmartPort macros

configuration guidelines12-2

creating and applying12-3

default configuration12-2

defined12-1

displaying12-4

tracing12-2

SNAP24-1

SNMP

accessing MIB variables with28-4

agent

described28-4

disabling28-7

community strings

configuring28-7

for cluster switches28-4

overview28-4

configuration examples28-15

default configuration28-6

groups28-9

in clusters7-17

informs

and trap keyword28-11

described28-5

differences from traps28-5

enabling28-13

limiting access by TFTP servers28-14

limiting system log messages to NMS27-10

manager functions28-3

managing clusters with7-27

MIBs

location ofA-3

supportedA-1

notifications28-5

overview28-1, 28-4

status, displaying28-16

system contact and location28-14

trap manager, configuring28-12

traps

described28-3, 28-5

differences from informs28-5

enabling28-11

enabling MAC address notification8-24

overview28-1, 28-4

types of28-11

users28-9

versions supported28-2

snooping, IGMP21-1

SNR

definition of13-16

downstream rate requirements13-16, 13-18

margins13-16

upstream rate requirements13-17, 13-18

software, VLAN considerations18-8

software images

location in FlashB-20

recovery procedures32-2

scheduling reloads5-18

tar file format, describedB-20

See also downloading and uploading

source addresses, in ACLs29-12

SPAN

configuration guidelines25-8

default configuration25-7

destination ports25-4

displaying status25-17

IDS25-2

interaction with other features25-6

monitored ports25-4

monitoring ports25-4

overview1-7, 25-1

received traffic25-3

session limits25-7

sessions

creating25-8

defined25-3

removing destination (monitoring) ports25-11

removing source (monitored) ports25-11

specifying monitored ports25-8

source ports25-4

transmitted traffic25-3

spanning tree and native VLANs17-17

Spanning Tree Protocol

See STP

speed

configuring on interfaces11-11

setting on CPE devices13-11

SSH

configuring9-34

cryptographic software image9-32

described9-33

encryption methods9-33

user authentication methods, supported9-33

Stack Membership Discovery Protocol16-6

Standby Command Configuration window7-25

standby command switch

configuring 7-23

considerations7-14

defined7-2

priority7-13

requirements7-3

virtual IP address7-14

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

startup configuration

booting

manually5-14

specific image5-15

clearingB-19

configuration file

automatically downloading5-13

specifying the filename5-14

default boot configuration5-13

static access ports

assigning to VLAN17-11

defined11-2, 17-3

static addresses

See addresses

static VLAN membership17-2

statistics

802.1X10-18

CDP24-5

interface11-17

QoS ingress and egress30-37

RMON group Ethernet26-5

RMON group history26-5

SNMP input and output28-16

VTP18-15

sticky learning

configuration file22-7

defined22-7

disabling22-7

enabling22-7

saving addresses22-7

storm control

described22-1

displaying22-14

STP

accelerating root port selection16-4

BackboneFast

described16-10

enabling16-20

BPDU filtering

described16-3

enabling16-17

BPDU guard

described16-3

enabling16-16

BPDU message exchange14-2

configuration guidelines14-11, 16-14

configuring

forward-delay time14-22

hello time14-21

in cascaded stack14-23

maximum aging time14-22

path cost14-19

port priority14-17

root switch14-14

STP (continued)

configuring (continued)

secondary root switch14-16

spanning-tree mode14-12

switch priority14-20

counters, clearing14-24

cross-stack UplinkFast

described16-5

enabling16-19

default configuration14-11

default optional feature configuration16-14

designated port, defined14-3

designated switch, defined14-3

detecting indirect link failures16-10

disabling14-13

displaying status14-24

EtherChannel guard

described16-12

enabling16-20

extended system ID

affects on root switch14-14

affects on the secondary root switch14-16

overview14-3

unexpected behavior14-15

features supported1-5

inferior BPDU14-3

instances supported14-9

interface state, blocking to forwarding16-2

interface states

blocking14-5

disabled14-6

forwarding14-5, 14-6

learning14-6

listening14-6

overview14-4

interoperability and compatibility among modes14-10

limitations with 802.1Q trunks14-10

STP (continued)

load sharing

overview17-21

using path costs17-23

using port priorities17-22

loop guard

described16-13

enabling16-21

modes supported14-9

multicast addresses, affect of14-8

overview14-2

path costs17-23, 17-24

Port Fast

described16-2

enabling16-15

port priorities17-22

preventing root switch selection16-12

protocols supported14-9

redundant connectivity14-7

root guard

described16-12

enabling16-21

root port, defined14-3

root switch

affects of extended system ID14-3, 14-14

configuring14-14

election14-3

unexpected behavior14-15

settings in a cascaded stack14-23

shutting down Port Fast-enabled port16-16

superior BPDU14-3

timers, described14-21

UplinkFast

described16-4

enabling16-18

stratum, NTP8-2

summer time8-14

SunNet Manager1-9

switch clustering technology

See clusters, switch

switched ports11-1

Switch Manager4-14

See also Device Manager

switchport block multicast command22-6

switchport block unicast command22-6

switchport protected command22-4

switch priority

MSTP15-19

STP14-20

syslog

See system message logging

syslog export

and LRE logging13-8

described13-8

disabling13-23

enabling13-22

system clock

configuring

daylight saving time8-14

manually8-12

summer time8-14

time zones8-13

displaying the time and date8-12

overview8-1

See also NTP

system message logging

default configuration27-3

defining error message severity levels27-8

disabling27-4

displaying the configuration27-12

enabling27-4

facility keywords, described27-12

level keywords, described27-9

limiting messages27-10

message format27-2

overview27-1

sequence numbers, enabling and disabling27-8

system message logging (continued)

setting the display destination device27-4

synchronizing log messages27-6

time stamps, enabling and disabling27-7

UNIX syslog servers

configuring the daemon27-11

configuring the logging facility27-11

facilities supported27-12

system name

default configuration8-16

default setting8-16

manual configuration8-16

See also DNS

system prompt

default setting8-16

manual configuration8-17

T

TACACS+

accounting, defined9-11

authentication, defined9-11

authorization, defined9-11

configuring

accounting9-17

authentication key9-13

authorization9-16

login authentication9-14

default configuration9-13

displaying the configuration9-17

identifying the server9-13

in clusters7-18

limiting the services to the user9-16

operation of9-12

overview9-10

tracking services accessed by user9-17

tar files

creatingB-6

displaying the contents ofB-7

extractingB-7

image file formatB-20

Telnet

accessing management interfaces2-10

accessing the CLI1-9

from a browser2-10

setting a password9-6

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password9-6

TFTP

configuration files

downloadingB-11

preparing the serverB-11

uploadingB-12

configuration files in base directory5-6

configuring for autoconfiguration5-6

image files

deletingB-23

downloadingB-22

preparing the serverB-21

uploadingB-24

limiting access by servers28-14

time

See NTP and system clock

time-range command29-15

time ranges in ACLs29-15

time stamps in log messages27-7

time zones8-13

Token Ring VLANs

support for17-5

VTP support18-4

Topology view

described4-2, 4-14

TOS1-7

traceroute, Layer 2

and ARP32-17

and CDP32-17

described32-17

IP addresses and subnets32-17

MAC addresses and VLANs32-17

multicast traffic32-17

multiple devices on a port32-18

unicast traffic32-17

usage guidelines32-17

traffic

blocking flooded22-5

fragmented29-3

unfragmented29-3

traffic policing1-7

transparent mode, VTP18-3, 18-12

trap-door mechanism5-2

traps

configuring MAC address notification8-24

configuring managers28-11

defined28-3

enabling8-24, 28-11

notification types28-11

overview28-1, 28-4

troubleshooting

connectivity problems32-15

detecting unidirectional links23-1

displaying crash information32-22

GBIC security and identification32-15

LRE ports32-18

with CiscoWorks28-4

with debug commands32-19

with ping32-15

with system message logging27-1

trunk ports

configuring17-18

defined11-2

trunks

allowed-VLAN list17-19

load sharing

setting STP path costs17-23

using STP port priorities17-22

native VLAN for untagged traffic17-21

parallel17-23

pruning-eligible list17-20

to non-DTP device17-15

understanding17-15

VLAN 1 minimization17-19

trusted boundary30-21

twisted-pair Ethernet, detecting unidirectional links23-1

type-of-service

See TOS

U

UDLD

default configuration23-4

echoing detection mechanism23-3

enabling

globally23-5

per interface23-5

link-detection mechanism23-1

neighbor database23-2

overview23-1

resetting an interface23-6

status, displaying23-7

unauthorized ports with 802.1X10-4

unicast MAC address filtering

and adding static addresses8-27

and broadcast MAC addresses8-27

and CPU packets8-27

and multicast addresses8-27

and router MAC addresses8-27

configuration guidelines8-27

described8-27

unicast traffic, blocking22-6

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration27-11

facilities supported27-12

message logging configuration27-11

unrecognized Type-Length-Value (TLV) support18-4

upgrade

behavior details13-26

configuring for13-24

conrtoller configuration13-25

example13-26

global configuration13-25

LRE switch firmware upgrade13-23

performing13-24

upgrading software, VLAN considerations18-8

upgrading software images

See downloading

UplinkFast

described16-4

enabling16-18

support for1-5

uploading

configuration files

preparingB-11, B-13, B-16

reasons forB-8

using FTPB-15

using RCPB-18

using TFTPB-12

image files

preparingB-21, B-25, B-29

reasons forB-19

using FTPB-27

using RCPB-32

using TFTPB-24

upstream power back-off1-8, 13-21

user EXEC mode2-2

username-based authentication9-7

V

version-dependent transparent mode18-4

virtual IP address

cluster standby group7-14, 7-24

command switch7-14, 7-24

See also IP addresses

vlan.dat file17-4

VLAN 1 minimization, support for1-6

VLAN configuration

at bootup17-7

saving17-7

VLAN configuration mode2-2, 17-6

VLAN database

and startup configuration file17-7

and VTP18-1

VLAN configuration saved in17-7

VLANs saved in17-4

vlan database command17-6

vlan global configuration command17-6

VLAN ID, discovering8-28

VLAN management domain18-2

VLAN Management Policy Server

See VMPS

VLAN membership

confirming17-30

modes17-3

VLAN Query Protocol

See VQP

VLANs

adding17-8

adding to VLAN database17-8

aging dynamic addresses14-8

allowed on trunk17-19

and spanning-tree instances17-2, 17-6, 17-13

configuration guidelines, normal-range VLANs17-5

configuration options17-6

configuring17-1

configuring IDs 1006 to 409417-12

VLANs (continued)

creating in config-vlan mode17-8

creating in VLAN configuration mode17-9

default configuration17-7

deleting17-10

described11-3, 17-1

displaying17-14

extended-range17-1, 17-12

illustrated17-2

modifying17-8

native, configuring17-21

normal-range17-1, 17-4

parameters17-4

port membership modes17-3

static-access ports17-11

STP and 802.1Q trunks14-10

supported17-2

Token Ring17-5

trunks, VLAN 1 minimization17-19

VTP modes18-3

VLAN Trunking Protocol

See VTP

VLAN trunks17-15

VMPS

administering17-31

configuration example17-32

configuration guidelines17-28

default configuration17-28

description17-25

dynamic port membership

described17-26

reconfirming17-30

troubleshooting17-32

entering server address17-29

mapping MAC addresses to VLANs17-25

monitoring17-31

reconfirmation interval, changing17-30

reconfirming membership17-30

retry count, changing17-31

voice VLAN

Cisco 7960 phone, port connections19-1

configuration guidelines19-3

configuring IP phones for data traffic

override CoS of incoming frame19-5

trust CoS priority of incoming frame19-6

configuring ports for voice traffic in

802.1P priority tagged frames19-4

802.1Q frames19-4

connecting to an IP phone19-3

default configuration19-2

described19-1

displaying19-6

VQP17-25

VTP

adding a client to a domain18-14

advertisements17-17, 18-3

and extended-range VLANs18-1

and normal-range VLANs18-1

client mode, configuring18-11

configuration

global configuration mode18-7

guidelines18-8

privileged EXEC mode18-7

requirements18-9

saving18-7

VLAN configuration mode18-7

configuration mode options18-7

configuration requirements18-9

configuration revision number

guideline18-14

resetting18-15

configuring

client mode18-11

server mode18-9

transparent mode18-12

consistency checks18-4

default configuration18-6

described18-1

VTP (continued)

disabling18-12

domain names18-8

domains18-2

modes

client18-3, 18-11

server18-3, 18-9

transitions18-3

transparent18-3, 18-12

monitoring18-15

passwords18-8

pruning

disabling18-14

enabling18-14

examples18-5

overview18-4

pruning-eligible list, changing17-20

server mode, configuring18-9

statistics18-15

Token Ring support18-4

transparent mode, configuring18-12

using18-1

version, guidelines18-9

version 118-4

version 2

configuration guidelines18-9

disabling18-13

enabling18-13

overview18-4

W

warningsxxviii

Weighted Round Robin

See WRR

wizards4-6

WRR

configuring30-36

defining30-9

description30-9

X

XMODEM protocol32-2