Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide, 12.1(22)EA11 and Later
Index
Downloads: This chapterpdf (PDF - 1.13MB) The complete bookPDF (PDF - 18.87MB) | Feedback

Index

Table Of Contents

A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

802.1Q

and trunk ports 10-2

encapsulation 16-14

802.3x flow control 10-13

A

abbreviating commands 2-4

AC (command switch) 6-9

access-class command 28-19

access control entries

See ACEs

access control lists

See ACLs

access control parameter

See ACP

access-denied response, VMPS 16-24

access groups, viewing 28-21, 28-22

accessing

clusters, switch 6-12

command switches 6-10

member switches 6-12

switch clusters 6-12

access lists

See ACLs

access ports

in switch clusters 6-8

access ports defined 10-2

accounting

with IEEE 802.1x 9-6, 9-22

with RADIUS 8-28

with TACACS+ 8-11, 8-16

ACEs

defined 28-2

Ethernet 28-2

IP 28-2

Layer 3 parameters 28-10

Layer 4 parameters 28-10

ACLs

ACEs 28-2

any keyword 28-9

applying

time ranges to 28-14

to management interfaces 28-19

to physical interfaces 28-20

to QoS 29-5

to terminal lines 28-19

classifying traffic for QoS 29-24

comments in 28-16

compiling 28-22

configuration guidelines

management interfaces, applying to 28-6

physical interfaces, applying to 28-5

defined 28-2

displaying interface 28-22

examples of 28-22

extended IP

configuring for QoS classification 29-26

creating 28-10

matching criteria 28-7

host keyword 28-9

IP

creating 28-7

implicit deny 28-9, 28-12, 28-14

implicit masks 28-9

management interfaces, applying to 28-19

matching criteria 28-2, 28-7

named 28-13

physical interfaces, applying to 28-20

undefined 28-18, 28-20

virtual terminal lines, setting on 28-19

MAC extended 28-17

matching 28-7

monitoring 28-20

named 28-13

numbers 28-7

protocol parameters 28-10

standard IP

configuring for QoS classification 29-24

creating 28-9

matching criteria 28-7

time ranges 28-14

unsupported features 28-7

ACP

system-defined mask 28-4

understanding 28-4

user-defined mask 28-4

addresses

displaying the MAC address table 7-25

dynamic

accelerated aging 13-8

changing the aging time 7-21

default aging 13-8

defined 7-19

learning 7-20

removing 7-21

MAC, discovering 7-26

multicast STP address management 13-8

static

adding and removing 7-23

defined 7-19

address resolution 7-26

Address Resolution Protocol

See ARP table

ADSL 1-8

advertisements

CDP 23-1

VTP 16-16, 17-2, 17-3

aggregated ports

See EtherChannel

aging, accelerating 13-8

aging time

accelerated

for MSTP 14-20

for STP 13-8, 13-21

MAC address table 7-21

maximum

for MSTP 14-20, 14-21

for STP 13-21

alarms, RMON 25-3

allowed-VLAN list 16-18

American National Standards Institute

See ANSI

ANSI 1-8

ARP table

address resolution 7-26

managing 7-26

asymmetric digital subscriber line

See ADSL

attributes, RADIUS

vendor-proprietary 8-30

vendor-specific 8-29

authentication

local mode with AAA 8-32

NTP associations 7-4

RADIUS

defined 8-17

key 8-21

login 8-23

TACACS+

defined 8-11

key 8-13

login 8-14

See also port-based authentication

authentication failed VLAN

See restricted VLAN

authoritative time source, described 7-2

authorization

with RADIUS 8-27

with TACACS+ 8-11, 8-16

authorized ports with IEEE 802.1x 9-4

autoconfiguration 4-3, 4-10

automatic discovery

considerations

beyond a noncandidate device 6-8

brand new switches 6-8

connectivity 6-5

management VLANs 6-7

non-CDP-capable devices 6-6

noncluster-capable devices 6-6

in switch clusters 6-5

See also CDP

automatic QoS

See QoS

automatic recovery, clusters 6-9

See also HSRP

autonegotiation

interface configuration guidelines 10-10

mismatches 31-13

auxiliary VLAN

See voice VLAN

B

BackboneFast

described 15-9

enabling 15-19

support for 1-5

banners

configuring

login 7-18

message-of-the-day login 7-17

default configuration 7-17

when displayed 7-17

binding database, DHCP snooping

See DHCP snooping binding database

binding table, DHCP snooping

See DHCP snooping binding database

blocking packets 21-5

booting

boot loader, function of 4-2

boot process 4-1

manually 4-14

specific image 4-15

boot loader

accessing 4-16

described 4-2

environment variables 4-16

prompt 4-16

trap-door mechanism 4-2

BPDU

error-disabled state 15-2

filtering 15-3

RSTP format 14-9

BPDU filtering

described 15-3

enabling 15-16

support for 1-5

BPDU guard

described 15-2

enabling 15-15

support for 1-5

broadcast storm control

See storm control

C

cables, monitoring for unidirectional links 22-1

candidate switch

automatic discovery 6-5

defined 6-4

requirements 6-4

See also command switch, cluster standby group, and member switch

Catalyst 2955

configuring alarm profiles

attaching an alarm profile to a port 3-10

creating or modifying alarm profiles 3-9

configuring switch alarms3-1to 3-11

configuring the FCS bit error rate alarm

setting the FCS error hysteresis threshold 3-8

setting the FCS error threshold 3-8

configuring the power supply alarm

setting the power mode 3-4, 3-5

setting the power supply alarm options 3-5

configuring the temperature alarms

associating the temperature alarms to a relay 3-7

setting a secondary temperature threshold 3-6

default alarm configuration 3-4

displaying Catalyst 2955 switch alarms 3-11

enabling SNMP traps 3-11

FCS error hysteresis threshold 3-2

global status monitoring alarms

power supply alarm 3-2

temperature alarm 3-2

port status monitoring alarms

FCS bit error rate alarm 3-3

link fault alarm 3-3

port is not operating alarm 3-3

port not forwarding alarm 3-3

triggering alarm options

configurable relays 3-3

FCS Bit Error Rate alarm 3-3

methods to trigger 3-3

SNMP traps 3-4

syslog messages 3-4

CDP

and trusted boundary 29-21

automatic discovery in switch clusters 6-5

configuring 23-2

default configuration 23-2

described 23-1

disabling for routing device 23-3, 23-4

enabling and disabling

on an interface 23-4

on a switch 23-3

monitoring 23-4

overview 23-1

transmission timer and holdtime, setting 23-2

updates 23-2

Cisco 575-LRE CPE 1-8

Cisco Access Analog Trunk Gateway 1-20

Cisco CallManager software 1-15, 1-20

Cisco Discovery Protocol

See CDP

Cisco Intelligence Engine 2100 Series Configuration Registrar

See IE2100

Cisco IP Phones 1-15

Cisco LRE 48 POTS Splitter (PS-1M-LRE-48) 1-8, 1-17

Cisco Network Assistant

See Network Assistant

Cisco SoftPhone software 1-15

CiscoWorks 2000 1-10, 27-4

class maps for QoS

configuring 29-28

described 29-6

displaying 29-36

class of service

See CoS

clearing interfaces 10-16

CLI

abbreviating commands 2-4

command modes 2-1

described 1-9

editing features

enabling and disabling 2-6

keystroke editing 2-7

wrapped lines 2-8

error messages 2-5

getting help 2-3

history

changing the buffer size 2-5

described 2-5

disabling 2-6

recalling commands 2-6

no and default forms of commands 2-4

client mode, VTP 17-3

clock

See system clock

clusters, switch

accessing 6-12

automatic discovery 6-5

automatic recovery 6-9

compatibility 6-4

described 6-1

LRE profile considerations 6-13

managing

through SNMP 6-14

planning 6-4

planning considerations

automatic discovery 6-5

automatic recovery 6-9

host names 6-12

IP addresses 6-12

LRE profiles 6-13

passwords 6-12

RADIUS 6-13

SNMP 6-13, 6-14

TACACS+ 6-13

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

cluster standby group

automatic recovery 6-11

considerations 6-10

defined 6-2

requirements 6-3

virtual IP address 6-10

See also HSRP

CNS

Configuration Engine

configID, deviceID, hostname 5-3

configuration service 5-2

described 5-1

event service 5-3

embedded agents

described 5-5

enabling automated configuration 5-7

enabling configuration agent 5-9

enabling event agent 5-8

command-line interface

See CLI

command modes 2-1

commands

abbreviating 2-4

no and default 2-4

setting privilege levels 8-8

command switch

accessing 6-10

active (AC) 6-9

configuration conflicts 31-13

defined 6-2

passive (PC) 6-9

password privilege levels 6-14

priority 6-9

recovery

from command-switch failure 6-9

from failure 31-10

from lost member connectivity 31-13

redundant 6-9

replacing

with another switch 31-12

with cluster member 31-10

requirements 6-2

standby (SC) 6-9

See also candidate switch, cluster standby group, member switch, and standby command switch

community strings

configuring 6-13, 27-7

for cluster switches 27-4

in clusters 6-13

overview 27-4

SNMP 6-13

config.text 4-13

configurable leave timer, IGMP 20-5

configuration

controller for LRE upgrade 12-24

global LRE 12-24

configuration examples, network

collapsed backbone and switch cluster 1-15

design concepts

cost-effective wiring closet 1-12

high-performance workgroup 1-12

network performance 1-11

network services 1-11

redundant Gigabit backbone 1-13

hotel network 1-16

large campus 1-20

long-distance, high-bandwidth transport configuration 1-23

service-provider central-office network 1-18

small to medium-sized network 1-14

configuration files

clearing the startup configuration B-17

creating using a text editor B-9

default name 4-13

deleting a stored configuration B-18

described B-7

downloading

automatically 4-13

preparing B-10, B-12, B-15

reasons for B-7

using FTP B-12

using RCP B-16

using TFTP B-10

guidelines for creating and using B-8

invalid combinations when copying B-5

limiting TFTP server access 27-15

obtaining with DHCP 4-8

password recovery disable considerations 8-5

specifying the filename 4-14

system contact and location information 27-14

types and location B-9

uploading

preparing B-10, B-12, B-15

reasons for B-8

using FTP B-13

using RCP B-17

using TFTP B-11

VMPS database 16-24

configuration settings, saving 4-13

configure terminal command 10-5

configuring

duplex mode 12-11

or an LRE upgrade 12-23

LRE ports 12-8

speed on Cisco 575 LRE CPE 12-11

Configuring a Restricted VLAN 9-24

config-vlan mode 2-2, 16-6

conflicts, configuration 31-13

connections, secure remote 8-33

connectivity problems 31-14

consistency checks in VTP version 2 17-4

console port, connecting to 2-9

CoS

configuring 29-7

configuring priority queues 29-35

defining 29-8

described 1-7

override priority 18-5

trust priority 18-5

CoS-to-DSCP map for QoS 29-32

counters, clearing interface 10-16

CPE

described 1-8

Ethernet link guidelines 12-10

Ethernet links

connecting to LRE ports 12-6

considerations for Cisco 575 LRE CPE 12-11

considerations for Cisco 585 LRE CPE 12-11

Ethernet links, described 12-2

hotel network configuration example 1-16, 1-18, 1-19

LRE links 12-2

CPE link, transitioning state 12-6

CPE toggle

configuring 12-21

described 12-6

disabling 12-21

enabling 12-22

crashinfo file 31-21

cross-stack UplinkFast, STP

connecting stack ports 15-8

described 15-5

enabling 15-18

fast-convergence events 15-7

Fast Uplink Transition Protocol 15-6

limitations 15-8

normal-convergence events 15-7

Stack Membership Discovery Protocol 15-6

support for 1-5

cross talk 12-10

customer premises equipment

See CPE

D

daylight saving time 7-12

debugging

enabling all system diagnostics 31-19

enabling for a specific feature 31-19

redirecting error message output 31-20

using commands 31-18

default commands 2-4

default configuration

auto-QoS 29-9

banners 7-17

booting 4-13

CDP 23-2

DHCP 19-5

DHCP option 82 19-6

DHCP snooping 19-6

DNS 7-16

EtherChannel 30-8

IEEE 802.1x 9-12

IGMP filtering 20-21

IGMP snooping 20-7

IGMP throttling 20-22

initial switch information 4-3

Layer 2 interfaces 10-9

MAC address table 7-20

MSTP 14-11

MVR 20-17

NTP 7-4

optional spanning-tree features 15-13

password and privilege level 8-2

port security 21-8

QoS 29-17

RADIUS 8-20

RMON 25-3

RSPAN 24-7

SNMP 27-5

SPAN 24-7

storm control 21-2

STP 13-11

system message logging 26-3

system name and prompt 7-15

TACACS+ 8-13

UDLD 22-4

VLAN, Layer 2 Ethernet interfaces 16-16

VLANs 16-7

VMPS 16-25

voice VLAN 18-2

VTP 17-6

default gateway 4-12

deleting VLANs 16-9

denial-of-service attack 21-1

description command 10-14

destination addresses, in ACLs 28-11

detecting indirect link failures, STP 15-10

device discovery protocol 23-1

device manager described 1-2, 1-9

DHCP-based autoconfiguration

client request message exchange 4-4

configuring

client side 4-4

DNS 4-7

relay device 4-7

server-side 4-5, 19-7

TFTP server 4-6

described 1-4

example 4-9

lease options

for IP address information 4-6

for receiving the configuration file 4-6

overview 4-3, 4-10

relationship to BOOTP 4-4

DHCP binding database

See DHCP snooping binding database

DHCP binding table

See DHCP snooping binding database

DHCP option 82

circuit ID suboption 19-5

configuration guidelines 19-6

default configuration 19-5

displaying 19-8

overview 19-3

packet format, suboption

circuit ID 19-5

remote ID 19-5

remote ID suboption 19-5

DHCP server 19-7

DHCP snooping

accepting untrusted packets form edge switch 19-3, 19-7

binding database

See DHCP snooping binding database

configuration guidelines 19-6

default configuration 19-5

displaying binding tables 19-8

displaying configuration 19-8

message exchange process 19-4

option 82 data insertion 19-3

trusted interface 19-2

untrusted interface 19-2

untrusted messages 19-2

DHCP snooping binding database

described 19-2

displaying 19-8

entries 19-2

DHCP snooping binding table

See DHCP snooping binding database

Differentiated Services architecture, QoS 29-2

Differentiated Services Code Point 29-3

digital telephone networks 1-8

directories

changing B-3

creating and removing B-4

displaying the working B-3

discovery, clusters

See automatic discovery

DNS

and DHCP-based autoconfiguration 4-7

default configuration 7-16

displaying the configuration 7-17

overview 7-15

setting up 7-16

domain names

DNS 7-15

VTP 17-8

Domain Name System

See DNS

downloading

configuration files

preparing B-10, B-12, B-15

reasons for B-7

using FTP B-12

using RCP B-16

using TFTP B-10

image files

deleting old image B-22

preparing B-20, B-23, B-27

reasons for B-18

using FTP B-24

using HTTP 1-3

using Network Assistant 1-3

using RCP B-28

using TFTP B-21

DSCP 1-7, 29-3

DSCP-to-CoS map for QoS 29-33

DTP 1-6, 16-14

duplex mode

configuring 10-10

configuring, LRE 12-11

CPE Ethernet link 12-11

dynamic access ports

characteristics 16-3

configuring 16-26

defined 10-2

dynamic addresses

See addresses

dynamic desirable trunking mode 16-15

dynamic port VLAN membership

described 16-24

reconfirming 16-27

troubleshooting 16-29

types of connections 16-26

VMPS database configuration file 16-24

Dynamic Trunking Protocol

See DTP

E

editing features

enabling and disabling 2-6

keystrokes used 2-7

wrapped lines 2-8

egress port scheduling 29-8

enable password 8-4

enable secret password 8-4

encapsulation 29-8

encryption for passwords 8-4

environment variables

function of 4-17

location in Flash 4-16

error messages

during command entry 2-5

setting the display destination device 26-4

severity levels 26-8

system message format 26-2

EtherChannel

automatic creation of 30-3

configuration guidelines 30-8

default configuration 30-8

destination MAC address forwarding 30-6

displaying status 30-14

forwarding methods 30-11

interaction with STP 30-8

Layer 2 interfaces, configuring 30-9

load balancing 30-6, 30-11

number of interfaces per 30-2

overview 30-1

PAgP

aggregate-port learners 30-5

compatibility with Catalyst 1900 30-12

displaying status 30-14

interaction with other features 30-5

learn method and priority configuration 30-12

modes 30-4

overview 30-3

silent mode 30-4

support for 1-4

port-channel interfaces

described 30-3

numbering of 30-3

port groups 10-3

source MAC address forwarding 30-6

EtherChannel guard

described 15-11

enabling 15-19

Ethernet VLANs

adding 16-8

defaults and ranges 16-7

modifying 16-8

ETSI 1-8

European Telecommunication Standards Institute

See ETSI

events, RMON 25-3

examples

network configuration 1-11

expedite queue, QoS 29-8

Express Setup 1-2

extended-range VLANs

configuration guidelines 16-11

configuring 16-11

creating 16-11, 16-12

extended system ID

MSTP 14-14

STP 13-3, 13-14

Extensible Authentication Protocol over LAN 9-1

F

fallback VLAN name 16-25

Fast Uplink Transition Protocol 15-6

features, Cisco IOS 1-2

fiber-optic, detecting unidirectional links 22-1

files

copying B-4

deleting B-5

displaying the contents of B-7

tar

creating B-5

displaying the contents of B-6

extracting B-7

image file format B-19

files, crashinfo

description 31-21

displaying the contents of 31-22

file system

displaying available file systems B-2

displaying file information B-3

local file system names B-1

network file system names B-4

setting the default B-3

filters, IP

See ACLs, IP

flash device, number of B-1

flooded traffic, blocking 21-5

flow-based packet classification 1-7

flow control 10-13

forward-delay time

MSTP 14-20

STP 13-5, 13-21

forwarding

See storm control

FTP

accessing MIB files A-3

configuration files

downloading B-12

overview B-11

preparing the server B-12

uploading B-13

image files

deleting old image B-25

downloading B-24

preparing the server B-23

uploading B-25

G

GBICs

1000BASE-LX/LH module 1-12

1000BASE-SX module 1-12

1000BASE-ZX module 1-12

GigaStack module 1-12

security and identification 31-14

get-bulk-request operation 27-3

get-next-request operation 27-3, 27-4

get-request operation 27-3, 27-4

get-response operation 27-3

Gigabit Interface Converters

See GBICs

GigaStack GBIC

fast transition of redundant link 15-5

See also GBICs

global configuration mode 2-2

guide mode 1-3

GUIs

See device manager 1-9

See Network Assistant 1-9

H

hello time

MSTP 14-19

STP 13-20

help, for the command line 2-3

history

changing the buffer size 2-5

described 2-5

disabling 2-6

recalling commands 2-6

history table, level and number of syslog messages 26-9

host names

in clusters 6-12

hosts, limit on dynamic ports 16-29

HP OpenView 1-10

HSRP

automatic cluster recovery 6-11

cluster standby group considerations 6-10

See also clusters, cluster standby group, and standby command switch

I

ICMP ping

executing 31-15

overview 31-14

IE2100

described 1-9

support for 1-4

IEEE 802.1D

See STP

IEEE 802.1p 18-1

IEEE 802.1Q

configuration limitations 16-15

native VLAN for untagged traffic 16-19

IEEE 802.1s

See MSTP

IEEE 802.1w

See RSTP

IEEE 802.1x

See port-based authentication

IGMP

configurable leave timer, procedures 20-10

joining multicast group 20-3

join messages 20-3

leave processing, enabling 20-10

leaving multicast group 20-4

queries 20-3

report suppression

described 20-5

disabling 20-11

throttling action 20-21

IGMP configurable leave timer, described 20-5

IGMP filtering

configuring 20-22

default configuration 20-21

described 20-21

monitoring 20-26

IGMP groups

configuring the throttling action 20-24

setting the maximum number 20-24

IGMP profile

applying 20-23

configuration mode 20-22

configuring 20-22

IGMP snooping

configuring 20-6

default configuration 20-7

definition 20-1

enabling and disabling 20-7

global configuration 20-7

Immediate Leave 20-5

method 20-8

monitoring 20-13

VLAN configuration 20-7

IGMP throttling

configuring 20-24

default configuration 20-22

described 20-21

displaying action 20-25

Immediate-Leave, IGMP 20-5

ingress port scheduling 29-8

Integrated Services Digital Network

See ISDN

interface

number 10-4

range macros 10-7

interface command 10-4, 10-5

interface configuration mode 2-3

interfaces

Cisco IOS supported 1-9

configuration guidelines 10-10

configuring 10-5

configuring duplex mode 10-10

configuring speed 10-10

counters, clearing 10-16

described 10-14

descriptive name, adding 10-14

displaying information about 10-16

flow control 10-13

monitoring 10-15

naming 10-14

physical, identifying 10-4

range of 10-5

restarting 10-17

shutting down 10-17

supported 10-8

types of 10-1

interfaces range macro command 10-7

interleave delay, LRE 12-19

Intrusion Detection System

See IDS

IOS command-line interface

See CLI

IP

named extended ACL 28-13

named standard ACL 28-13

numbered extended ACL 28-10

numbered standard ACL 28-9

IP ACLs

applying to

management interfaces 28-19

physical interfaces 28-20

extended, creating 28-10

for QoS classification 29-24

implicit deny 28-9, 28-12, 28-14

implicit masks 28-9

management interfaces, applying to 28-19

named 28-13

physical interfaces, applying to 28-20

standard, creating 28-9

undefined 28-18, 28-20

virtual terminal lines, setting on 28-19

IP addresses

candidate or member 6-4, 6-12

cluster access 6-2

command switch 6-3, 6-10, 6-12

discovering 7-26

redundant clusters 6-10

standby command switch 6-10, 6-12

See also IP information

ip igmp profile command 20-22

IP information

assigned

manually 4-12

through DHCP-based autoconfiguration 4-3

default configuration 4-3

IP phones

and IEEE 802.1x authentication 9-10

and QoS 18-1

automatic classification and queueing 29-9

configuring 18-3

trusted boundary for QoS 29-21

IP protocols in ACLs 28-11

IPv4 1-1

IPv6 1-1

IP version 4 1-1

IP version 6 1-1

ISDN 1-8

J

join messages, IGMP 20-3

L

LACP

See EtherChannel

Layer 2 frames, classification with CoS 29-2

Layer 2 interfaces, default configuration 10-9

Layer 2 traceroute

and ARP 31-16

and CDP 31-16

described 31-16

IP addresses and subnets 31-16

MAC addresses and VLANs 31-16

multicast traffic 31-16

multiple devices on a port 31-17

unicast traffic 31-16

usage guidelines 31-16

Layer 3 packets, classification methods 29-2

Layer 3 parameters of ACEs 28-10

Layer 4 parameters of ACEs 28-10

LDAP 5-3

leave processing, IGMP 20-10

lightweight directory access protocol

See LDAP

line configuration mode 2-3

link

qualification of 12-16

SNR 12-16

Link Aggregation Control Protocol

See EtherChannel

link guidelines, CPE Ethernet 12-10

link monitor, LRE 12-19

links, unidirectional 22-1

login authentication

with RADIUS 8-23

with TACACS+ 8-14

login banners 7-17

log messages

See system message logging

loopback detection

configuring 10-15

loop guard

described 15-13

enabling 15-20

support for 1-5

LRE environment

guidelines 12-9

troubleshooting 31-17

LRE interleave delay 12-19

LRE link

monitor 12-19

persistence 12-19

LRE links

See LRE ports

LRE message logging 12-7

LRE ports

configuring

assigning a global sequence 12-13

assigning a port sequence 12-13

assigning a private profile 12-12

assigning a public profile 12-12

assigning the default profile 12-12

CPE Ethernet links

Cisco 575 LRE CPE considerations 12-11

Cisco 585 LRE CPE considerations 12-11

described 12-2, 12-6

duplex mode 12-11

flow control 12-11

speed 12-11

statistics 12-7

described 12-1

link qualification 12-16

LRE links

considerations 12-9

described 12-2

statistics 12-10

preventing loss of data 12-11

rate selection

described 12-14

sequences 12-5

troubleshooting 31-17

LRE profiles

assigning

global profiles 12-13

port sequences 12-13

private profiles 12-12

public profiles 12-12

considerations 12-10

described 12-2

rate selection 12-14

table of 12-3

See also LRE ports and CPE

LRE profiles, considerations in switch clusters 6-13

lre shutdown command 12-6

LRE switch, upgrading firmware 12-23

LRE technology 12-1

See also LRE ports and CPE

LRE upstream power back-off 12-20

M

MAC addresses

aging time 7-21

and VLAN association 7-20

building the address table 7-20

default configuration 7-20

discovering 7-26

displaying 7-25

displaying in DHCP snooping binding table 19-8

dynamic

learning 7-20

removing 7-21

in ACLs 28-17

static

adding 7-24

allowing 7-25

characteristics of 7-23

dropping 7-25

removing 7-24

sticky secure, adding 21-7

MAC address multicast entries, monitoring 20-14

MAC address-to-VLAN mapping 16-23

MAC extended access lists 28-17

macros

See Smartports macros

magic packet 9-11

management options

benefits

clustering 1-10

Network Assistant 1-10

CLI 2-1

CNS 5-1

overview 1-9

management VLAN

considerations in switch clusters 6-7

discovery through different management VLANs 6-7

MANs

CWDM configuration example 1-23

long-distance, high-bandwidth transport configuration example 1-23

mapping tables for QoS

configuring

DSCP 29-32

DSCP-to-CoS 29-33

described 29-5

matching, ACLs 28-7

maximum aging time

MSTP 14-20

STP 13-21

maximum hop count, MSTP 14-21

membership mode, VLAN port 16-3

member switch

automatic discovery 6-5

defined 6-2

passwords 6-12

recovering from lost connectivity 31-13

requirements 6-4

See also candidate switch, cluster standby group, and standby command switch

message logging, LRE 12-7

metropolitan-area networks

See MANs

MIBs

accessing files with FTP A-3

location of files A-3

overview 27-1

SNMP interaction with 27-4

supported A-1

microfilters, phone 1-17, 1-19, 12-10

mini-point-of-presence

See POP

mirroring traffic for analysis 24-1

mismatches, autonegotiation 31-13

monitoring

access groups 28-21

ACLs 28-20

cables for unidirectional links 22-1

CDP 23-4

IGMP

filters 20-26

snooping 20-13

interfaces 10-15

multicast router ports 20-14

MVR 20-20

network traffic for analysis with probe 24-1

port protection 21-13

speed and duplex mode 10-12

traffic flowing among switches 25-1

traffic suppression 21-13

VLANs 16-13

VMPS 16-28

VTP 17-15, 17-16

MSTP

boundary ports

configuration guidelines 14-12

described 14-5

BPDU filtering

described 15-3

enabling 15-16

BPDU guard

described 15-2

enabling 15-15

CIST, described 14-3

configuration guidelines 14-12, 15-14

configuring

forward-delay time 14-20

hello time 14-19

link type for rapid convergence 14-21

maximum aging time 14-20

maximum hop count 14-21

MST region 14-13

path cost 14-17

port priority 14-16

root switch 14-14

secondary root switch 14-15

switch priority 14-18

CST

defined 14-3

operations between regions 14-3

default configuration 14-11

default optional feature configuration 15-13

described 14-2

displaying status 14-22

enabling the mode 14-13

EtherChannel guard

described 15-11

enabling 15-19

extended system ID

effects on root switch 14-14

effects on secondary root switch 14-15

unexpected behavior 14-14

instances supported 13-9

interface state, blocking to forwarding 15-2

interoperability and compatibility among modes 13-10

interoperability with IEEE 802.1D

described 14-5

restarting migration process 14-22

IST

defined 14-2

operations within a region 14-3

loop guard

described 15-13

enabling 15-20

mapping VLANs to MST instance 14-13

MST region

described 14-2

hop-count mechanism 14-4

supported spanning-tree instances 14-2

Port Fast

described 15-2

enabling 15-14

preventing root switch selection 15-12

root guard

described 15-12

enabling 15-20

root switch

configuring 14-14

effects of extended system ID 14-14

unexpected behavior 14-14

shutdown Port Fast-enabled port 15-2

multicast groups

and IGMP snooping 20-6

Immediate Leave 20-5

joining 20-3

leaving 20-4

static joins 20-9

multicast packets, blocking 21-5

multicast router ports

adding 20-9

monitoring 20-14

multicast storm control

See storm control

Multicast VLAN Registration

See MVR

Multiple Spanning Tree Protocol

See MSTP

MVR

configuring interfaces 20-19

default configuration 20-17

described 20-14

modes 20-18

monitoring 20-20

setting global parameters 20-18

N

NAC

IEEE 802.1x authentication using a RADIUS server 9-27

IEEE 802.1x validation using RADIUS server 9-27

Layer 2 IEEE 802.1x validation 9-27

NAC Layer 2 IEEE 802.1x validation 1-7

named IP ACLs 28-13

NameSpace Mapper

See NSM

native VLAN

configuring 16-19

default 16-19

Network Admission Control

See NAC Layer 2 IEEE 802.1x validation

Network Assistant

advantages with clustering 1-10

described 1-9

guide mode 1-3

management options 1-2

wizards 1-3

network examples

collapsed backbone and switch cluster 1-15

design concepts

cost-effective wiring closet 1-12

high-performance workgroup 1-12

network performance 1-11

network services 1-11

redundant Gigabit backbone 1-13

hotel network 1-16

large campus 1-20

long-distance, high-bandwidth transport configuration 1-23

service-provider central-office network 1-18

small to medium-sized network 1-14

network management

CDP 23-1

RMON 25-1

SNMP 27-1

Network Time Protocol

See NTP

no commands 2-4

nonhomologated POTS splitter

See Cisco LRE POTS Splitter (PS-1M-LRE-48)

nontrunking mode 16-15

normal-range VLANs

configuration modes 16-6

defined 16-1

NSM 5-3

NTP

associations

authenticating 7-4

defined 7-2

enabling broadcast messages 7-6

peer 7-5

server 7-5

default configuration 7-4

displaying the configuration 7-10

overview 7-2

restricting access

creating an access group 7-8

disabling NTP services per interface 7-9

source IP address, configuring 7-10

stratum 7-2

synchronizing devices 7-5

time

services 7-2

synchronizing 7-2

O

out-of-profile markdown 1-7

P

PAgP

See EtherChannel

pass-through mode 29-23

passwords

default configuration 8-2

disabling recovery of 8-5

encrypting 8-4

in clusters 6-12

overview 8-1

recovery of 31-2

setting

enable 8-3

enable secret 8-4

Telnet 8-6

with usernames 8-7

VTP domain 17-8

patch panel 1-17

path cost

MSTP 14-17

STP 13-18

PBX 1-16

PC (passive command switch) 6-9

performing an LRE upgrade 12-23, 12-24

persistence, LRE link 12-19

per-VLAN spanning-tree plus

See PVST+

physical ports 10-1

PIM-DVMRP, as snooping method 20-8

ping

character output description 31-15

executing 31-15

overview 31-14

plain old telephone service

See POTS splitters and POTS telephones

policers

configuring for each matched traffic class 29-29

described 29-3

number of 1-7, 29-7

types of 29-6

policing 1-7, 29-3

policy maps for QoS

characteristics of 29-29

configuring 29-29

described 29-6

displaying 29-36

POP 1-21

Port Aggregation Protocol

See EtherChannel

port-based authentication

accounting 9-6

accounting services 1-6

authentication server

defined 9-2

RADIUS server 9-2

client, defined 9-2

configuration guidelines 9-13

configuring

guest VLAN 9-23

host mode 9-18

IEEE 802.1x accounting 9-22

IEEE 802.1x authentication 9-15

manual re-authentication of a client 9-19

periodic re-authentication 9-19

quiet period 9-20

RADIUS server 9-18

RADIUS server parameters on the switch 9-17

restricted VLAN 9-24

switch-to-client frame-retransmission number 9-21

switch-to-client retransmission time 9-20

default configuration 9-12

described 9-1

device roles 9-2

displaying statistics 9-28

EAPOL-start frame 9-3

EAP-request/identity frame 9-3

EAP-response/identity frame 9-3

enabling

IEEE 802.1x with guest VLAN 9-8

IEEE 802.1x with port security 9-10

IEEE 802.1x with restricted VLAN 9-9

IEEE 802.1x with VLAN assignment 9-7

IEEE 802.1x with voice VLAN 9-10

encapsulation 9-3

guest VLAN

configuration guidelines 9-8, 9-9

host mode 9-5

initiation and message exchange 9-3

magic packet 9-11

method lists 9-15

multiple-hosts mode, described 9-5

ports

authorization state and dot1x port-control command 9-4

authorized and unauthorized 9-4

port security, multiple-hosts mode 9-5

resetting to default values 9-28

software upgrade changes 9-15

switch

as proxy 9-2

RADIUS client 9-3

upgrading from a previous release 29-12

VLAN assignment, AAA authorization 9-15

wake-on-LAN, described 9-11

port blocking 21-5

port-channel

See EtherChannel

Port Fast

described 15-2

enabling 15-14

mode, spanning tree 16-25

support for 1-5

port membership modes, VLAN 16-3

port priority

MSTP 14-16

STP 13-17

port profile, locking 12-15

ports

blocking 21-5

duplex mode 12-11

dynamic access 16-3

forwarding, resuming 21-6

LRE 12-1

priority 29-8

protected 21-4

secure 21-6

speed, setting and checking 12-11

static-access 16-3, 16-10

switch 10-1

trunks 16-14

VLAN assignments 16-10

See also CPE

See also LRE ports

port scheduling 29-8

port security

aging 21-11

configuration guidelines 21-8

configuring 21-9

default configuration 21-8

described 21-6

displaying 21-13

sticky learning 21-7

violations 21-7

with other features 21-8

port-shutdown response, VMPS 16-24

POTS splitters

homologated 1-17

nonhomologated 1-17

See also Cisco LRE 48 POTS Splitter (PS-1M-LRE-48)

POTS telephones 1-16, 1-19, 12-10

precedence 12-15

preferential treatment of traffic

See QoS

preventing unauthorized access 8-1

priority

overriding CoS 18-5

port, described 29-8

trusting CoS 18-5

private branch exchange

See PBX

private LRE profiles, assigning 12-12

private VLAN edge ports

See protected ports

privileged EXEC mode 2-2

privilege levels

changing the default for lines 8-9

command switch 6-14

exiting 8-10

logging into 8-10

mapping on member switches 6-14

overview 8-2, 8-8

setting a command with 8-8

profile acquisition, automatic 12-14

profile locking 12-15

profiles, LRE

considerations 12-10

default, assigning 12-12

described 12-2

private, assigning 12-12

public, assigning 12-12

rate selection 12-14

See also LRE ports and CPE

protected ports 1-4, 21-4

pruning, VTP

enabling 17-14

enabling on a port 16-19

examples 17-5

overview 17-4

pruning-eligible list

changing 16-19

for VTP pruning 17-4

VLANs 17-14

PSTN 1-8, 1-17, 1-20

public LRE profiles, assigning 12-12

Public Switched Telephone Network

See PSTN

PVST+

described 13-9

IEEE 802.1Q trunking interoperability 13-10

instances supported 13-9

Q

QoS

and MQC commands 29-1

auto-QoS

categorizing traffic 29-9

configuration and defaults display 29-14

configuration guidelines 29-12

described 29-9

displaying 29-14

effects on NVRAM configuration 29-11

egress queue defaults 29-10

enabling for VoIP 29-13

example, configuration 29-14

generated commands 29-10

basic model 29-3

classification

class maps, described 29-6

defined 29-3

in frames and packets 29-3

IP ACLs, described 29-5

MAC ACLs, described 29-5

pass-through mode, described 29-23

policy maps, described 29-6

port default, described 29-4

trust DSCP, described 29-5

trusted boundary, described 29-21

trusted CoS, described 29-4

types for IP traffic 29-5

types for non-IP traffic 29-4

class maps

configuring 29-28

displaying 29-36

configuration examples

auto-QoS 29-14

common wiring closet 29-38

intelligent wiring closet 29-39

configuration guidelines 29-17

QoS

configuring

auto-QoS 29-9

class maps 29-28

CoS and WRR 29-35

default port CoS value 29-20

egress queues 29-35

IP extended ACLs 29-26

IP standard ACLs 29-24

MAC ACLs 29-27

policy maps 29-29

port trust states within the domain 29-19

QoS policy 29-24

trusted boundary 29-22

default auto configuration 29-9

default configuration 29-17

described 29-2

displaying statistics 29-37

egress port scheduling 29-8

enabling expedite queue 29-36

expedite queue

described 29-8

enabling 29-36

ingress port scheduling 29-8

IP phones

automatic classification and queueing 29-9

detection and trusted settings 29-9, 29-21

mapping tables

CoS-to-DSCP 29-32

displaying 29-37

DSCP-to-CoS 29-33

types of 29-5

marked-down actions 29-31

marking, described 29-4, 29-6

pass-through mode 29-23

QoS

policers

configuring 29-31

described 29-6

number of 29-7

types of 29-6

policing, described 29-3, 29-6

policy maps

characteristics of 29-29

configuring 29-29

displaying 29-36

queueing, defined 29-4

scheduling, defined 29-4

support for 1-7

trusted boundary 29-21

trust states 29-4

understanding 29-2

qualification, link 12-16

quality of service

See QoS

queries, IGMP 20-3

R

RADIUS

attributes

vendor-proprietary 8-30

vendor-specific 8-29

configuring

accounting 8-28

authentication 8-23

authorization 8-27

communication, global 8-21, 8-28

communication, per-server 8-20, 8-21

multiple UDP ports 8-20

default configuration 8-20

defining AAA server groups 8-25

described 8-17

displaying the configuration 8-31

identifying the server 8-20

in clusters 6-13

limiting the services to the user 8-27

method list, defined 8-20

operation of 8-19

suggested network environments 8-18

tracking services accessed by user 8-28

range

macro 10-7

of interfaces 10-6

rapid convergence 14-7

rapid per-VLAN spanning-tree plus

See rapid PVST+

rapid PVST+

described 13-9

IEEE 802.1Q trunking interoperability 13-10

instances supported 13-9

Rapid Spanning Tree Protocol

See RSTP

rate selection

definition of 12-14

sequences 12-5

rate selections, list of sequences 12-5

rcommand command 6-13

RCP

configuration files

downloading B-16

overview B-14

preparing the server B-15

uploading B-17

image files

deleting old image B-30

downloading B-28

preparing the server B-27

uploading B-30

reconfirmation interval, VMPS, changing 16-27

recovery procedures 31-1

redundancy

EtherChannel 30-2

STP

backbone 13-7

multidrop backbone 15-5

path cost 16-22

port priority 16-20

redundant links and UplinkFast 15-17

reloading software 4-17

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

remote monitoring

see RMON

Remote Network Monitoring

See RMON

report suppression, IGMP

described 20-5

disabling 20-11

resetting a UDLD-shutdown interface 22-6

restricted VLAN

configuring 9-24

using with port-based authentication 9-9

restricting access

NTP services 7-8

overview 8-1

passwords and privilege levels 8-2

RADIUS 8-17

TACACS+ 8-10

retry count, VMPS, changing 16-28

RFC

1112, IP multicast and IGMP 20-2

1157, SNMPv1 27-2

1305, NTP 7-2

1757, RMON 25-2

1901, SNMPv2C 27-2

1902 to 1907, SNMPv2 27-2

RFC

2236, IP multicast and IGMP 20-2

2273-2275, SNMPv3 27-2

RMON

default configuration 25-3

displaying status 25-6

enabling alarms and events 25-3

groups supported 25-2

overview 25-1

statistics

collecting group Ethernet 25-5

collecting group history 25-5

root guard

described 15-12

enabling 15-20

support for 1-5

root switch

MSTP 14-14

STP 13-14

RSPAN

configuration guidelines 24-11

default configuration 24-7

destination ports 24-4

displaying status 24-16

interaction with other features 24-5

monitored ports 24-4

monitoring ports 24-4

overview 1-8, 24-1

reflector port 24-5

session limits 24-6

sessions

creating 24-12

defined 24-3

removing source (monitored) ports 24-15

specifying monitored ports 24-12

source ports 24-4

transmitted traffic 24-3

RSTP

active topology, determining 14-6

BPDU

format 14-9

processing 14-10

designated port, defined 14-6

designated switch, defined 14-6

interoperability with IEEE 802.1D

described 14-5

restarting migration process 14-22

topology changes 14-10

overview 14-6

port roles

described 14-6

synchronized 14-8

proposal-agreement handshake process 14-7

rapid convergence

described 14-7

edge ports and Port Fast 14-7

point-to-point links 14-7, 14-21

root ports 14-7

root port, defined 14-6

See also MSTP

running configuration, saving 4-12

S

SC (standby command switch) 6-9

scheduled reloads 4-17

secure ports, configuring 21-6

secure remote connections 8-33

Secure Shell

See SSH

security, port 21-6

sequence numbers in log messages 26-7

sequences, LRE

global, assigning 12-13

specific port, assigning 12-13

sequences, table of 12-5

server mode, VTP 17-2

servers, BOOTP 1-4

service-provider network, MSTP and RSTP 14-1

set-request operation 27-4

settings

duplex mode 12-11

speed 12-11

set-top box, television 1-16, 1-19

setup program, failed command switch replacement 31-10, 31-12

severity levels, defining in system messages 26-8

show alarm commands 3-6, 3-9, 3-10, 3-11

show cdp traffic command 23-5

show cluster members command 6-13

show configuration command 10-14

show controllers ethernet-controller command 12-7

show controllers lre profile commands 12-12, 12-13, 12-15, 12-18, 12-19

show controllers lre profile mapping 3-7

show controllers lre status commands 12-10, 12-13, 12-14, 12-20, 12-21

show interfaces command 10-12, 10-14

show running-config command

displaying ACLs 28-18, 28-19, 28-20

interface description in 10-14

shutdown command on interfaces 10-17

signal to noise ratio 12-16

Simple Network Management Protocol

See SNMP

Smartports macros

applying Cisco-default macros 11-6

applying global parameter values 11-5, 11-6

applying macros 11-5

applying parameter values 11-5, 11-7

configuration guidelines 11-3

creating 11-4

default configuration 11-2

defined 11-1

displaying 11-8

tracing 11-3

website 11-2

SNAP 23-1

SNMP

accessing MIB variables with 27-4

agent

described 27-3

disabling 27-7

community strings

configuring 27-7

for cluster switches 27-4

overview 27-4

configuration examples 27-15

default configuration 27-5

groups 27-9

in clusters 6-13

informs

and trap keyword 27-11

described 27-5

differences from traps 27-5

enabling 27-14

limiting access by TFTP servers 27-15

limiting system log messages to NMS 26-9

manager functions 27-3

managing clusters with 6-14

MIBs

location of A-3

supported A-1

notifications 27-5

overview 27-1, 27-4

status, displaying 27-16

system contact and location 27-14

trap manager, configuring 27-12

traps

described 27-3, 27-5

differences from informs 27-5

enabling 27-11

enabling MAC address notification 7-21

overview 27-1, 27-4

types of 27-11

users 27-9

versions supported 27-2

snooping, IGMP 20-1

SNR

definition of 12-16

downstream rate requirements 12-16, 12-17

margins 12-16

upstream rate requirements 12-17, 12-18

software, VLAN considerations 17-8

software images

location in flash B-18

recovery procedures 31-2

scheduling reloads 4-18

tar file format, described B-19

See also downloading and uploading

source addresses, in ACLs 28-11

SPAN

configuration guidelines 24-7

default configuration 24-7

destination ports 24-4

displaying status 24-16

interaction with other features 24-5

monitored ports 24-4

monitoring ports 24-4

overview 1-8, 24-1

ports, restrictions 21-9

received traffic 24-3

session limits 24-6

sessions

creating 24-8

defined 24-3

removing destination (monitoring) ports 24-10

removing source (monitored) ports 24-10

specifying monitored ports 24-8

source ports 24-4

transmitted traffic 24-3

spanning tree and native VLANs 16-15

Spanning Tree Protocol

See STP

speed

configuring on interfaces 10-10

setting on CPE devices 12-11

SSH

configuring 8-34

cryptographic software image 8-33

described 8-33

encryption methods 8-33

user authentication methods, supported 8-33

Stack Membership Discovery Protocol 15-6

standby command switch

configuring

considerations 6-10

defined 6-2

priority 6-9

requirements 6-3

virtual IP address 6-10

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

startup configuration

booting

manually 4-14

specific image 4-15

clearing B-17

configuration file

automatically downloading 4-13

specifying the filename 4-14

default boot configuration 4-13

static access ports

assigning to VLAN 16-10

defined 10-2, 16-3

static addresses

See addresses

static VLAN membership 16-2

statistics

CDP 23-4

IEEE 802.1x 9-28

interface 10-16

QoS ingress and egress 29-37

RMON group Ethernet 25-5

RMON group history 25-5

SNMP input and output 27-16

VTP 17-15

sticky learning

configuration file 21-7

defined 21-7

disabling 21-7

enabling 21-7

saving addresses 21-7

storm control

configuring 21-2

default configuration 21-2

described 21-1

disabling 21-3

displaying 21-13

STP

accelerating root port selection 15-4

BackboneFast

described 15-9

enabling 15-19

BPDU filtering

described 15-3

enabling 15-16

BPDU guard

described 15-2

enabling 15-15

BPDU message exchange 13-2

configuration guidelines 13-11, 15-14

STP

configuring

forward-delay time 13-21

hello time 13-20

in cascaded stack 13-22

maximum aging time 13-21

path cost 13-18

port priority 13-17

root switch 13-14

secondary root switch 13-16

spanning-tree mode 13-12

switch priority 13-19

counters, clearing 13-23

cross-stack UplinkFast

described 15-5

enabling 15-18

default configuration 13-11

default optional feature configuration 15-13

designated port, defined 13-3

designated switch, defined 13-3

detecting indirect link failures 15-10

disabling 13-13

displaying status 13-23

EtherChannel guard

described 15-11

enabling 15-19

extended system ID

affects on root switch 13-14

affects on the secondary root switch 13-16

overview 13-3

unexpected behavior 13-15

features supported 1-5

inferior BPDU 13-3

instances supported 13-9

interface state, blocking to forwarding 15-2

STP

interface states

blocking 13-5

disabled 13-6

forwarding 13-5, 13-6

learning 13-6

listening 13-6

overview 13-4

interoperability and compatibility among modes 13-10

limitations with IEEE 802.1Q trunks 13-10

load sharing

overview 16-20

using path costs 16-22

using port priorities 16-20

loop guard

described 15-13

enabling 15-20

modes supported 13-9

multicast addresses, affect of 13-8

overview 13-2

path costs 16-22

Port Fast

described 15-2

enabling 15-14

port priorities 16-21

preventing root switch selection 15-12

protocols supported 13-9

redundant connectivity 13-7

root guard

described 15-12

enabling 15-20

root port, defined 13-3

root switch

affects of extended system ID 13-3, 13-14

configuring 13-14

election 13-3

unexpected behavior 13-15

settings in a cascaded stack 13-22

STP

shutdown Port Fast-enabled port 15-2

superior BPDU 13-3

timers, described 13-20

UplinkFast

described 15-3

enabling 15-17

stratum, NTP 7-2

summer time 7-12

SunNet Manager 1-10

switch clustering technology 6-1

switched ports 10-1

switchport block multicast command 21-5

switchport block unicast command 21-5

switchport protected command 21-4

switch priority

MSTP 14-18

STP 13-19

syslog

See system message logging

syslog export

and LRE logging 12-7

described 12-8

disabling 12-22

enabling 12-22

system clock

configuring

daylight saving time 7-12

manually 7-11

summer time 7-12

time zones 7-12

displaying the time and date 7-11

overview 7-1

See also NTP

system message logging

default configuration 26-3

defining error message severity levels 26-8

disabling 26-3

displaying the configuration 26-12

enabling 26-3

facility keywords, described 26-11

level keywords, described 26-8

limiting messages 26-9

message format 26-2

overview 26-1

sequence numbers, enabling and disabling 26-7

setting the display destination device 26-4

synchronizing log messages 26-5

timestamps, enabling and disabling 26-6

UNIX syslog servers

configuring the daemon 26-10

configuring the logging facility 26-11

facilities supported 26-11

system name

default configuration 7-15

default setting 7-15

manual configuration 7-15

See also DNS

system prompt

default setting 7-14, 7-15

T

TACACS+

accounting, defined 8-11

authentication, defined 8-11

authorization, defined 8-11

configuring

accounting 8-16

authentication key 8-13

authorization 8-16

login authentication 8-14

default configuration 8-13

displaying the configuration 8-17

identifying the server 8-13

in clusters 6-13

limiting the services to the user 8-16

operation of 8-12

overview 8-10

tracking services accessed by user 8-16

tar files

creating B-5

displaying the contents of B-6

extracting B-7

image file format B-19

Telnet

accessing management interfaces 2-9

accessing the CLI 1-9

setting a password 8-6

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password 8-6

TFTP

configuration files

downloading B-10

preparing the server B-10

uploading B-11

configuration files in base directory 4-6

configuring for autoconfiguration 4-6

image files

deleting B-22

downloading B-21

preparing the server B-20

uploading B-22

limiting access by servers 27-15

time

See NTP and system clock

time-range command 28-14

time ranges in ACLs 28-14

timestamps in log messages 26-6

time zones 7-12

Token Ring VLANs

support for 16-5

VTP support 17-4

TOS 1-7

traceroute, Layer 2

and ARP 31-16

and CDP 31-16

described 31-16

IP addresses and subnets 31-16

MAC addresses and VLANs 31-16

multicast traffic 31-16

multiple devices on a port 31-17

unicast traffic 31-16

usage guidelines 31-16

traffic

blocking flooded 21-5

fragmented 28-3

unfragmented 28-3

traffic policing 1-7

transparent mode, VTP 17-3, 17-12

trap-door mechanism 4-2

traps

configuring MAC address notification 7-21

configuring managers 27-11

defined 27-3

enabling 7-21, 27-11

notification types 27-11

overview 27-1, 27-4

troubleshooting

connectivity problems 31-14

detecting unidirectional links 22-1

displaying crash information 31-21

GBIC security and identification 31-14

LRE ports 31-17

with CiscoWorks 27-4

with debug commands 31-18

with ping 31-14

with system message logging 26-1

trunk ports

configuring 16-17

defined 10-2

trunks

allowed-VLAN list 16-18

load sharing

setting STP path costs 16-22

using STP port priorities 16-20, 16-21

native VLAN for untagged traffic 16-19

parallel 16-22

pruning-eligible list 16-19

to non-DTP device 16-14

VLAN 1 minimization 16-18

trusted boundary 29-21

twisted-pair Ethernet, detecting unidirectional links 22-1

type-of-service

See TOS

U

UDLD

default configuration 22-4

echoing detection mechanism 22-2

enabling

globally 22-5

per interface 22-5

link-detection mechanism 22-1

neighbor database 22-2

overview 22-1

resetting an interface 22-6

status, displaying 22-7

unauthorized ports with IEEE 802.1x 9-4

unicast MAC address filtering

and adding static addresses 7-25

and broadcast MAC addresses 7-24

and CPU packets 7-24

and multicast addresses 7-24

and router MAC addresses 7-24

configuration guidelines 7-24

described 7-24

unicast storm control

See storm control

unicast traffic, blocking 21-5

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration 26-10

facilities supported 26-11

message logging configuration 26-11

unrecognized Type-Length-Value (TLV) support 17-4

upgrade

behavior details 12-25

configuring for 12-23

controller configuration 12-24

example 12-26

global configuration 12-24

LRE switch firmware upgrade 12-23

performing 12-23, 12-24

upgrading software, VLAN considerations 17-8

upgrading software images

See downloading

UplinkFast

described 15-3

enabling 15-17

support for 1-5

uploading

configuration files

preparing B-10, B-12, B-15

reasons for B-8

using FTP B-13

using RCP B-17

using TFTP B-11

image files

preparing B-20, B-23, B-27

reasons for B-18

using FTP B-25

using RCP B-30

using TFTP B-22

upstream power back-off 1-9, 12-20

user EXEC mode 2-2

username-based authentication 8-7

V

version-dependent transparent mode 17-4

virtual IP address

cluster standby group 6-10

command switch 6-10

vlan.dat file 16-4

VLAN 1 minimization, support for 1-6

VLAN configuration

at bootup 16-7

saving 16-7

VLAN configuration mode 2-2, 16-6

VLAN database

and startup configuration file 16-7

and VTP 17-1

VLAN configuration saved in 16-6

VLANs saved in 16-4

vlan database command 16-6

vlan global configuration command 16-6

VLAN ID, discovering 7-26

VLAN management domain 17-2

VLAN Management Policy Server

See VMPS

VLAN membership

confirming 16-27

modes 16-3

VLAN Query Protocol

See VQP

VLANs

adding 16-8

adding to VLAN database 16-8

aging dynamic addresses 13-8

allowed on trunk 16-18

and spanning-tree instances 16-2, 16-6, 16-12

configuration guidelines, normal-range VLANs 16-5

configuration options 16-6

configuring 16-1

configuring IDs 1006 to 4094 16-11

creating in config-vlan mode 16-8

creating in VLAN configuration mode 16-9

default configuration 16-7

deleting 16-9

described 10-3, 16-1

displaying 16-13

extended-range 16-11

illustrated 16-2

modifying 16-8

native, configuring 16-19

normal-range 16-1, 16-4

parameters 16-4

port membership modes 16-3

static-access ports 16-10

STP and IEEE 802.1Q trunks 13-10

supported 16-2

Token Ring 16-5

trunks, VLAN 1 minimization 16-18

VTP modes 17-2

VLAN Trunking Protocol

See VTP

VLAN trunks 16-14

VMPS

administering 16-28

configuration example 16-29

configuration guidelines 16-25

default configuration 16-25

description 16-23

dynamic port membership

described 16-24

reconfirming 16-27

troubleshooting 16-29

entering server address 16-26

mapping MAC addresses to VLANs 16-23

monitoring 16-28

reconfirmation interval, changing 16-27

reconfirming membership 16-27

retry count, changing 16-28

voice VLAN

Cisco 7960 phone, port connections 18-1

configuration guidelines 18-3

configuring IP phones for data traffic

override CoS of incoming frame 18-5

trust CoS priority of incoming frame 18-5

configuring ports for voice traffic in

802.1p priority tagged frames 18-4

802.1Q frames 18-4

connecting to an IP phone 18-3

default configuration 18-2

described 18-1

displaying 18-6

VQP 16-23

VTP

adding a client to a domain 17-14

advertisements 16-16, 17-3

and extended-range VLANs 17-1

and normal-range VLANs 17-1

client mode, configuring 17-11

configuration

global configuration mode 17-7

guidelines 17-8

privileged EXEC mode 17-7

requirements 17-9

saving 17-7

VLAN configuration mode 17-7

configuration mode options 17-6

configuration requirements 17-9

configuration revision number

guideline 17-14

resetting 17-15

configuring

client mode 17-11

server mode 17-9

transparent mode 17-12

consistency checks 17-4

default configuration 17-6

described 17-1

VTP

disabling 17-12

domain names 17-8

domains 17-2

modes

client 17-3, 17-11

server 17-2, 17-9

transitions 17-2

transparent 17-3, 17-12

monitoring 17-15

passwords 17-8

pruning

disabling 17-14

enabling 17-14

examples 17-5

overview 17-4

pruning-eligible list, changing 16-19

server mode, configuring 17-9

statistics 17-15

Token Ring support 17-4

transparent mode, configuring 17-12

using 17-1

version, guidelines 17-9

version 1 17-4

version 2

configuration guidelines 17-9

disabling 17-13

enabling 17-13

overview 17-4

W

Weighted Round Robin

See WRR

wizards 1-3

WRR

configuring 29-35

defining 29-8

description 29-8

X

Xmodem protocol 31-2