Catalyst 2950 Desktop Switch Software Configuration Guide, 12.1(6)EA2c
Index
Downloads: This chapterpdf (PDF - 836.0KB) The complete bookPDF (PDF - 4.77MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

802.1Q trunk mode2-9

802.1X

authentication initiation7-3

configuring7-6

changing the quiet period7-11

default7-6

guidelines7-7

manually re-authenticating the client7-11

resetting to default values7-14

switch-to-client retransmission time7-13

switch-to-RADIUS server7-9

device roles7-2

displaying statistics and status7-14

enabling

authentication7-8

multiple hosts7-13

periodic re-authentication7-10

resetting to default values7-14

understanding7-1

802.3Z flow control10-3

A

aaa (authentication, authorization, and accounting)

configuring6-23

managing6-20

aaa accounting command6-22

aaa authorization command6-22

aaa authorization exec tacacs+ local command6-22

aaa new-model command6-21, 6-23

abbreviating commands3-3

abbreviations

char, variable fieldB-2

chars, variable fieldB-2

dec, variable fieldB-2

hex, variable fieldB-2

inet, variable fieldB-2

AC (command switch)5-10, 5-20

access-class command12-15

access control entries

See ACEs

access groups

viewing12-17

accessing

CMS2-30

modes2-31

console port access4-2

HTTP access4-3

member switches8-19

MIBs

files4-5

objects4-4

variables4-5

Telnet access4-2

access levels, CMS2-31

access lists

See ACLs

access ports

in switch clusters5-9

accounting in TACACS+6-20

accounting with RADIUS6-34

ACEs

defined12-2

Ethernet12-2

IP12-2

Layer 3 parameters12-9

Layer 4 parameters12-9

ACLs

ACEs12-2

applying

to an interface12-15

comments in12-14

compiling12-18

defined12-1, 12-7

displaying interface12-17

error messagesA-1

examples of12-18

extended IP

creating12-9

matching criteria12-7

guidelines for configuring12-5

IP

applying to interface12-15

creating12-7

implicit deny12-9, 12-12, 12-14

implicit masks12-9

matching criteria12-2, 12-7

named12-12

undefined12-16, 12-22

virtual terminal lines, setting on12-15

MAC extended12-20

matching12-7

monitoring12-16

named12-12

numbers12-7

protocol parameters12-9

standard IP

creating12-8

matching criteria12-7

unsupported features12-6

ACP

system-defined mask12-4

understanding12-4

user-defined mask12-4

adding

secure addresses6-18

static addresses6-18

VLAN to database8-18

address

count, secure10-7

resolution6-14

security violations10-6

see also addresses

addresses

dynamic

accelerated aging9-9

aging time6-16

default aging9-9

described6-15

removing6-16

MAC

adding secure6-18

aging time6-16

discovering6-15

tables, managing6-15

multicast

STP address management9-8

secure

adding6-18

described6-15, 6-18

removing6-18

static

adding6-18

configuring (EtherChannel)6-19

described6-15, 6-18

Address Resolution Protocol (ARP)

see ARP table

address table

aging time, configuring6-16

dynamic addresses, removing6-16

MAC6-15

secure addresses

adding6-18

removing6-18

advertisements, VTP8-8

aging, accelerating9-9

aging time, changing address6-16

alarms group, in RMON4-4

allowed-VLAN list8-23

AppleTalk Remote Access (ARA)6-22

Apply button2-29

ARP table

address resolution6-14

managing6-14

attributes, RADIUS

vendor-proprietary6-36

vendor-specific6-35

authentication

NTP6-11

RADIUS

key6-27

login6-29

TACACS+6-20

login7-8

authorization, TACACS+6-20

authorization with RADIUS6-33

authorized ports7-4

automatic discovery

adding member switches5-18

considerations

beyond a non-candidate device5-7, 5-8

brand new switches5-9

connectivity5-4

management VLANs5-7, 5-8

non-CDP-capable devices5-6

non-cluster-capable devices5-6

automatic discovery (continued)

creating a cluster standby group5-20

in switch clusters5-4

See also CDP

automatic recovery, clusters5-10

See also HSRP

autonegotiation

connecting to devices without10-2

mismatches14-2

B

BackboneFast9-17, 9-34

bandwidth, graphs2-8

BPDU guard, STP9-10, 9-31

broadcast client mode, configuring6-12

broadcast messages, configuring for6-12

broadcast storm control

disabling10-5

enabling10-4

broadcast traffic and protected ports10-5

browser configuration2-1, 4-1, 5-1

buttons, CMS2-29

C

Cancel button2-29

candidates

changing management VLAN for8-3

candidate switch

adding5-18

automatic discovery5-4

defined5-3

HC5-20

passwords5-18

requirements5-3

standby group5-20

See also command switch, cluster standby group, and member switch

cautionsxix

CC (command switch)5-20

CDP1-3

automatic discovery in switch clusters5-4

configuring6-13, 6-14

disabling for routing device11-2

change notification, CMS2-32

chassis system error messagesB-3

Cisco Access Analog Trunk Gateway1-13

Cisco CallManager software1-12, 1-13

Cisco Discovery Protocol

see CDP

Cisco IP Phones1-12

Cisco SoftPhone software1-12

CiscoWorks 20001-6, 4-5

class maps for QoS

configuring13-17

described13-5

displaying13-25

class of service

See CoS

CLI1-6

accessing3-9

saving changes3-10

client mode, VTP8-8

Cluster Management Suite1-6

See CMS

Cluster Membership Protocol

see CMP system error messagesB-3

clusters, switch

accessing5-13

adding member switches5-18

automatic discovery5-4

automatic recovery5-10

command switch configuration5-17

compatibility5-4

creating5-16

creating a cluster standby group5-20

described5-1

clusters, switch (continued)

LRE profile considerations5-16

management VLAN, changing8-3

managing through CLI5-23

managing through SNMP5-24

planning considerations

automatic discovery5-4

automatic recovery5-10

CLI5-23

described5-4

host names5-14

IP addresses5-13

LRE profiles5-16

management VLAN5-15

passwords5-14

SNMP5-14, 5-24

switch-specific features5-16

TACACS+5-15

redundancy5-20

troubleshooting5-22

verifying5-22

See also candidate switch, command switch, cluster standby group, and member switch

cluster standby group

automatic recovery5-11

considerations5-12

creating5-20

defined5-2

requirements5-3

virtual IP address5-11

See also HSRP

cluster tree

described2-5

icons2-5

CMP system error messagesB-3

CMS

accessing2-30

access levels2-31

advantages1-7

CMS (continued)

change notification2-32

cluster tree2-5

described2-1

different versions of2-33

displaying system messages2-18

error checking2-32

features2-2

Front Panel images2-6

Front Panel view2-4

interaction modes2-25

menu bar2-15

online help2-27

privilege level2-31, 6-10

requirements2-30

saving configuration changes2-32

toolbar2-20

tool tips2-26

Topology view2-10

verifying configuration changes2-32

window components2-28

wizards2-26

Collapse Cluster view2-11

command-line interface

abbreviating commands3-3

command modes3-1

editing features

enabling and disabling3-6

keystroke editing3-6

wrapped lines3-7

error messages3-4

filtering command output3-8

getting help3-3

history

changing the buffer size3-5

described3-5

disabling3-5

recalling commands3-5

managing clusters5-23

command-line interface (continued)

no and default forms of commands3-4

see CLI

command modes3-1

commands

aaa accounting6-22

aaa authorization6-22

aaa authorization exec tacacs+ local6-22

abbreviating3-3

copy running-config startup-config14-4

dir flash14-4

no and default3-4

command switch

active (AC)5-10, 5-20

and management4-4

command switch with HSRP disabled (CC)5-20

configuration conflicts14-5

defined5-2

enabling5-17

passive (PC)5-10, 5-20

password privilege levels5-23

priority5-10

recovery

from failure14-5, 14-8

from failure without HSRP14-8

from lost member connectivity14-5

recovery from command-switch failure5-10

redundant5-10, 5-20

replacing

with another switch14-7

with cluster member14-6

requirements5-2

standby (SC)5-10, 5-20

See also candidate switch, clusters, and cluster standby group

see also candidates, member switches

community strings

configuring5-14, 6-12

in clusters5-14

SNMP5-14

compatibility

feature14-2

config trap6-13

configuration

conflicts, managing14-1, 14-5

default VLAN8-16

file, VMPS database8-29

files, saving to an external server14-4

guidelines

port10-1

VLANs8-16

VMPS8-31

VTP8-10

VTP version8-11

saving to Flash memory14-4

VTP, default8-11

configuration changes, saving2-32

CLI3-10

configuration examples, network1-8

collapsed backbone and switch cluster1-12

design concepts

cost-effective wiring closet1-9

high-performance workgroup1-9

network performance1-8

network services1-8

redundant Gigabit backbone1-9

large campus1-13

small to medium-sized network1-10

configuration files, DHCP6-7

configuring

802.1p class of service8-24

AAA6-23

aging time6-16

broadcast messages6-12

broadcast storm control10-4

configuring (continued)

CDP6-13, 6-14

community strings6-12

date and time6-11

daylight saving time6-11

DNS6-5

duplex10-1, 10-2

dynamic ports on VMPS clients8-32

dynamic VLAN membership8-31

flooding controls10-4

hops6-14

IP information6-1

load sharing8-25

login authentication6-21

management VLAN8-4

multicast router port11-7

native VLANs8-24

NTP6-11

passwords6-10

ports

protected10-5

privilege levels6-10

RMON groups4-4

SNMP6-12

speed10-1, 10-2

static addresses (EtherChannel)6-19

STP

port priorities8-25

TACACS+6-20

trap managers6-12

trunk port8-22

trunks8-21

VLANs8-1, 8-16, 8-17

VTP8-10, 8-12

VTP client mode8-12

VTP server mode8-12

VTP transparent mode8-7, 8-13

conflicts, configuration14-1, 14-5

consistency checks in VTP version 28-9

console port

access4-2

connecting to3-9

default settings4-2

conventions

commandxix

for examplesxix

textxix

copy running-config startup-config command14-4

CoS1-5

configuring13-8

configuring priority queues13-24

defining13-8

CoS-to-DSCP map for QoS13-21

cross-stack UplinkFast, STP

configuring9-33

connecting stack ports9-15

described9-12

fast-convergence events9-14

Fast Uplink Transition Protocol9-13

limitations9-15

normal-convergence events9-14

Stack Membership Discovery Protocol9-13

D

database, VTP8-15, 8-17

date, setting6-11

daylight saving time6-11

debugging

enabling all system diagnostics14-12

enabling for a specific feature14-11

redirecting error message output14-12

using commands14-11

default commands3-4

default configuration

802.1X7-6

EtherChannel10-13

MVR11-10

default configuration (continued)

QoS13-9

RADIUS6-26

STP9-20

VLANs8-16

VMPS8-31

VTP8-11

default settings, changing4-7

deleting VLAN from database8-18

destination addresses, in ACLs12-11

destination-based port groups6-19

device icons

Front Panel view2-5

Topology view2-12

device labels2-13

Device Manager2-2

See also Switch Manager

device pop-up menu

Front Panel view2-21

Topology view2-23

DHCP1-3, 6-2

Client Request Process6-3

configuring DHCP server6-4

configuring domain name and DNS6-5

configuring relay device6-6

configuring TFTP server6-5

example configuration6-8

obtaining configuration files6-7

overview6-3

Differentiated Services architecture, QoS13-2

Differentiated Services Code Point13-3

dir flash command14-4

disabling

broadcast storm control10-5

port security10-8

SNMP6-12

trunking on a port8-22

trunk port8-22

VTP8-13

disabling (continued)

VTP version 28-14

discovery, clusters

See automatic discovery

display options, Topology view2-14

Disqualification Code option2-24

DNS

configuring6-5

described6-5

enabling6-5

documentation, relatedxx

domain name

configuring6-5

described6-5

specifying6-5, 8-10

Domain Name System server

see DNS

domains for VLAN management8-7

DSCP1-5, 13-3

DSCP-to-CoS map for QoS13-22

DTP1-4

duplex

configuration guidelines10-1

configuring10-1, 10-2

dynamic access mode2-9

dynamic-access ports

described8-5

limit on number of hosts8-34

VLAN membership combinations8-6

dynamic addresses

See addresses

Dynamic Host Configuration Protocol

see DHCP

dynamic ports, configuring8-32

dynamic port VLAN membership

configuration example8-34

configuring8-32

example8-34

overview8-29

dynamic port VLAN membership (continued)

reconfirming8-33

troubleshooting8-34

VMPS database configuration file8-29

Dynamic Trunking Protocol

See DTP

dynamic VLAN membership8-31

E

editing features

enabling and disabling3-6

keystrokes used3-6

wrapped lines3-7

egress port scheduling13-8

enable password

see passwords

enabling

broadcast storm control10-4

DNS6-5

NTP authentication6-11

port security10-6, 10-7

SNMP6-12

VTP pruning8-15

VTP version 28-14

encapsulation13-8

environment system error messagesB-4

error checking, CMS2-32

error messages

during command entry3-4

security and QoSA-1

EtherChannel

automatic creation of10-10

configuration guidelines10-14

configuring

Layer 2 interfaces10-14

default configuration10-13

displaying status10-17

forwarding methods10-12, 10-16

EtherChannel (continued)

interaction

with STP10-14

with VLANs10-14

load balancing10-12, 10-16

overview10-8

PAgP

aggregate-port learners10-11

compatibility with Catalyst 190010-17

displaying status10-17

interaction with other features10-12

learn method and priority configuration10-17

modes10-10

overview10-10

physical learners10-11

silent mode10-11

support for1-2

port-channel interfaces10-9

EtherChannel port groups

configuring static address for6-19

Ethernet VLAN, defaults and ranges8-17

events group, in RMON4-4

examples

conventions forxix

network configuration1-8

Expand Cluster view2-11

expert mode2-25

extended discovery6-14

F

facility codesB-1

descriptionB-1

tableB-1

fan fault indication2-5

Fast Ethernet trunks8-20

Fast Uplink Transition Protocol9-13

features

configuration conflicts between8-1, 10-1

conflicting port14-1

default settings4-6

incompatible14-2

IOS1-1

File Transfer Protocol

see FTP, accessing MIB files

filtering show and more command output3-8

filters, IP

See ACLs, IP

Flash memory, files in14-4

flooding controls, configuring10-4

flow-based packet classification1-5

flow control10-3

forward-delay time, STP9-6, 9-27

forwarding

see also broadcast storm control

forwarding, static address6-18

Front Panel images, CMS2-6

Front Panel view

cluster tree2-5

described2-4

pop-up menus2-21

port icons2-6

port LEDs2-8

RPS LED2-7

switch images2-6

FTP, accessing MIB files4-5

G

GBICs

1000BASE-LX/LH module1-9

1000BASE-SX module1-9

1000BASE-ZX module1-9

GigaStack1-9

get-next-request operation4-6

get-request operation4-6

get-response operation4-6

Gigabit Ethernet

port settings10-1

settings10-1, 10-2

trunks8-20

Gigabit Interface Converter

see GBICs

GigaStack GBIC

fast transition of redundant link9-12

GigaStack system error messagesB-4

global configuration mode3-2

graphs

bandwidth2-8

poll result4-5

guide mode2-25

H

HC (candidate switch)5-20

hello time, STP9-27

help, for the command line3-3

Help button, CMS2-29

Help Contents2-27

history

changing the buffer size3-5

described3-5

disabling3-5

recalling commands3-5

history group, in RMON4-4

hops, configuring6-14

host name list, CMS2-28

host names

abbreviations appended to5-20

in clusters5-14

to address mappings6-5

hosts, limit on dynamic ports8-34

HP OpenView1-6, 1-7

HSRP

automatic cluster recovery5-11

cluster standby group considerations5-12

See also clusters, cluster standby group, and standby command switch

HTTP access2-30, 4-3

I

icons

cluster tree2-5

colors

cluster tree2-5

Topology view2-14

editable table cell2-29

Front Panel view2-6

multilink2-22

sorting2-29

toolbar2-20

Topology view2-12

web link2-29

IEEE 802.1Q

configuration considerations8-21

interaction with other features8-21

native VLAN for untagged traffic8-24

overview8-20

IEEE 802.1Q trunks8-21

IGMP snooping11-1

configuring a multicast router port11-4

disabling11-2

enabling11-2

joining a multicast group11-4

leaving a multicast group11-6

Immediate Leave11-3

defined11-3

disable11-3

enable11-3

ingress port scheduling13-8

interaction modes, CMS2-25

interface configuration mode3-2

interfaces

flow control10-3

IOS supported1-6

Internet Group Management Protocol

see IGMP snooping

inventory, cluster5-22

IOS command-line interface

see CLI

IP

numbered extended ACL12-9

numbered standard ACL12-8

IP ACLs

applying to an interface12-15

extended, creating12-9

implicit deny12-9, 12-12, 12-14

implicit masks12-9

named12-12

standard, creating12-8

undefined12-16, 12-22

virtual terminal lines, setting on12-15

IP addresses

candidate or member5-3, 5-13

cluster access5-2

command switch5-2, 5-11, 5-13

discovering6-15

management VLAN5-15, 8-3

redundant clusters5-11

removing6-2

standby command switch5-11, 5-13

See also IP information

IP connectivity to the switch4-1

IP information

assigning6-2

configuring6-1

removing6-2

IP protocols

in ACLs12-11

J

Java plug-in configuration2-1, 4-1, 5-1

L

Layer 2 frames, classification with CoS13-2

Layer 3 packets, classification methods13-2

Layer 3 parameters of ACEs12-9

Layer 4 parameters of ACEs12-9

LEDs

port2-8

port modes2-8

RPS2-7

legend, CMS icons and labels2-19

line configuration mode3-2

link icons, Topology view2-13

link labels2-13

link pop-up menu, Topology view2-22

link system error messagesB-5

lists, CMS2-29

load sharing

STP, described8-24

using STP path cost8-27

using STP port priorities8-25

login authentication, configuring6-21

login authentication with RADIUS6-29

login authentication with TACACS+7-8

LRE ports

profiles

switch clusters5-16

M

MAC addresses

adding secure6-18

aging time6-16

allocation for STP9-8

discovering6-15

MAC addresses (continued)

in ACLs12-20

notification6-17

mac address notification6-17

MAC address tables, managing6-15

MAC extended access lists12-20

management options1-6

benefits

clustering1-7

CMS1-7

CMS2-1

management VLAN

changes, understanding8-3

changing5-16, 8-3

configuring8-4

IP address5-15, 8-3

switch clusters5-15

management VLANs, considerations in clusters5-7, 5-8

map

see topology

mapping tables for QoS

configuring

DSCP13-21

DSCP-to-CoS13-22

described13-7

matching, ACLs12-7

maximum aging time, STP9-28

membership mode, VLAN port2-9, 8-5

member switch

adding5-18

automatic discovery5-4

defined5-2

managing5-23

passwords5-13

requirements5-3

See also candidate switch, clusters, cluster standby group, and command switch

member switches

accessing8-19

recovering from lost connectivity14-5

menu bar

described2-15

variations2-15

messages

system2-18

system errorB-1

message severity levels

descriptionB-2

tableB-2

MIBs, accessing

files4-5

objects4-4

variables4-5

mirroring traffic for analysis10-18

mismatches, autonegotiation14-2

mnemonic codeB-2

Mode button2-8

modes

access to CMS2-31

port2-8

VLAN port membership2-9, 8-4

VTP

see VTP modes

Modify button2-29

monitoring

access groups12-17

ACLs12-16

MVR11-14

network traffic for analysis with probe10-18

VMPS8-34

VTP8-15

multicast groups

Immediate Leave11-3

joining11-4

leaving11-6

multicast traffic and protected ports10-5

Multicast VLAN Registration

See MVR

Multilink Decomposer window2-22

multilink icon2-22

multi-VLAN ports

VLAN membership combinations8-6

MVR

configuring interfaces11-12

default configuration11-10

description11-7

modes11-11

monitoring11-14

setting global parameters11-10

N

named IP ACLs12-12

native VLANs8-24

NCPs6-22

negotiate trunk mode2-9

neighboring devices, types of2-12

network configuration examples1-8

Network Control Protocols (NCPs)6-22

network examples1-8

collapsed backbone and switch cluster1-12

design concepts

cost-effective wiring closet1-9

high-performance workgroup1-9

network performance1-8

network services1-8

redundant Gigabit backbone1-9

large campus1-13

small to medium-sized network1-10

Network Management System

see NMS

Network Time Protocol

see NTP

NMS4-5

no commands3-4

nontrunking mode8-20

NTP

authentication6-11

broadcast-client mode6-12

client6-11

configuring6-11

described6-11

O

OK button2-29

online help2-27

out-of-profile markdown1-5

overheating indication, switch2-5

P

PAgP

See EtherChannel

parallel links8-24

passwords

changing6-10

community strings6-12

in clusters5-14, 5-18

in CMS2-30

recovery of14-8, 14-9

setting6-10

TACACS+ server6-20

VTP domain8-10

path cost8-27

path cost, STP9-25

PC (passive command switch)5-10, 5-20

per-VLAN Spanning Tree (PVST)9-2

per-VLAN Spanning Tree+ (PVST+)9-8

planning considerations, switch clusters

LRE profiles5-16

management VLAN5-15

switch-specific features5-16

policers

configuring

for each matched traffic class13-18

described13-4

number of1-5, 13-7

types of13-6

policing1-5, 13-4

policy maps for QoS

characteristics of13-18

configuring13-18

described13-5

displaying13-25

poll results, graphing4-5

Port Aggregation Protocol

See EtherChannel

See PAgP

port-channel

See EtherChannel

Port Fast, STP9-10, 9-30

port groups

and trunks8-21

configuring static addresses (EtherChannel)6-19

destination-based6-19

source-based6-19

see also ports

port icons, Front Panel view2-6

port LEDs2-8

DUPLX2-8

port modes2-8

SPEED2-8

STAT2-8

port membership modes

VLAN8-4

port membership modes, VLAN2-9

port modes

described2-8

LEDs2-8

port pop-up menu, Front Panel view2-21

port priority, STP9-24

ports

802.1Q trunk2-9

802.1X7-8

configuration guidelines10-1

configuring

protected10-5

trunk8-22

dynamic

configuring8-32

see also dynamic port VLAN membership

dynamic access2-9

hosts on8-34

mode8-5

and VLAN combinations8-6

dynamic VLAN membership

reconfirming8-33

features, conflicting14-1

Gigabit Ethernet

settings10-1

negotiate trunk2-9

priority8-25, 13-8

protected10-5

secure8-21, 10-7

security

described10-6

disabling10-8

enabling10-7

speed, setting and checking10-1

static-access2-9, 8-5, 8-6, 8-7, 8-19

trunk

configuring8-22

disabling8-22

trunks8-5, 8-20

VLAN assignments8-7, 8-19

port scheduling13-8

preferential treatment of traffic

See QoS

priority

port

described13-8

private VLAN edge ports

see protected ports

privileged EXEC mode3-2

privilege levels

access modes

read-only2-31

read-write2-31

CMS2-31

command switch5-23

mapping on member switches5-23

setting6-10

specifying6-10

protected ports1-2, 10-5

pruning

eligible list8-23

enabling on a port8-23

enabling on the switch8-15

overview8-9

PSTN1-13

publications, relatedxx

Q

QoS

basic model13-3

classification

class maps, described13-5

defined13-3

in frames and packets13-3

IP ACLs, described13-5

MAC ACLs, described13-5

policy maps, described13-5

port default, described13-6

trust DSCP, described13-6

trusted CoS, described13-6

types for IP traffic13-7

QoS (continued)

classification (continued)

types for non-IP traffic13-6

class maps

configuring13-17

displaying13-25

configuration examples

common wiring closet13-26

intelligent wiring closet13-27

configuration guidelines13-10

configuring

class maps13-17

CoS and WRR13-23

default port CoS value13-13

IP extended ACLs13-15

IP standard ACLs13-14

MAC ACLs13-16

policy maps13-18

port trust states within the domain13-11

QoS policy13-13

default configuration13-9

displaying statistics13-25

egress port scheduling13-8

error messagesA-1

ingress port scheduling13-8, 13-9

mapping tables

CoS-to-DSCP13-21

displaying13-25

DSCP-to-CoS13-22

types of13-7

marked-down actions13-20

marking, described13-4, 13-6

overview13-2

policers

configuring13-20

described13-6

number of13-7

types of13-6

policing, described13-4, 13-6

policy maps

characteristics of13-18

configuring13-18

displaying13-25

queueing, defined13-4

scheduling

defined13-4

support for1-5

trust states13-6

understanding13-2

quality of service

See QoS

R

RADIUS

attributes

vendor-proprietary6-36

vendor-specific6-35

configuring

accounting6-34

authentication6-29

authorization6-33

communication, global6-27, 6-35

communication, per-server6-27

multiple UDP ports6-27

default configuration6-26

defining AAA server groups6-31

displaying the configuration6-37

identifying the server6-27

limiting the services to the user6-33

method list, defined6-26

operation of6-25

overview6-24

suggested network environments6-24

tracking services accessed by user6-34

rcommand command5-23

read-only access mode2-31

read-write access mode2-31

reconfirmation interval, changing8-33

recovery procedures14-5

redundancy

EtherChannel10-8

STP

backbone9-8

multidrop backbone9-12

path cost8-27

port priority8-25

redundant clusters

See cluster standby group

redundant power system

See RPS

Refresh button2-29

relay device, configuring6-6

releases, switch software4-2

Remote Authentication Dial-In User Service

See RADIUS

remote devices without autonegotiation, connecting to10-2

remote monitoring

see RMON

removing

dynamic address entries6-16

IP information6-2

secure addresses6-18

static addresses6-18

restricting access

RADIUS6-24

retry count, changing8-33

RMON, supported groups4-4

root guard, STP9-19, 9-34

root switch, STP9-21

RPS LED

RTD error messagesB-5

Runtime Diagnostic

see RTD error messages

S

saving changes in CMS2-32

SC (standby command switch)5-10, 5-20

secure address count10-7

secure addresses

adding6-18

described6-18

removing6-18

secure ports

address-security violations10-6

disabling10-8

enabling10-6, 10-7

maximum secure address count10-7

and trunks8-21

security

port10-6

TACACS+6-20

violations, address10-6

Serial Line Internet Protocol

see SLIP

server, domain name6-5

server mode, VTP8-8

servers, BOOTP1-3, 6-3

set-request operation4-6

settings

default, changing4-7

duplex10-1, 10-2

Gigabit Ethernet port10-1

speed10-2

setup program, failed command switch replacement14-6, 14-7

severity levels

descriptionB-2

tableB-2

show cluster members command5-23

show running-config command

displaying ACLs12-15, 12-16, 12-21

Simple Network Management Protocol

see SNMP

SLIP6-22

SNMP

accessing MIB variables with4-5

community strings

configuring6-12

configuring for

single switches6-12

enabling and disabling6-12

in clusters5-14

management, using4-4

managing clusters with5-24

network management platforms4-4

RMON groups4-4

trap managers, configuring6-12

trap types6-13

software

recovery procedures14-10

VLAN considerations8-11

see also upgrading

software releases4-2

source addresses, in ACLs12-11

source-based port groups6-19

SPAN

configuration guidelines10-22

destination ports10-20

displaying status10-25

interaction with other features10-21

monitored ports10-20

monitoring ports10-20

overview10-18

ports, restrictions14-2

received traffic10-19

sessions

creating10-23

defined10-19

removing destination (monitoring) ports10-24

SPAN (continued)

sessions (continued)

removing source (monitored) ports10-24

specifying monitored ports10-23

source ports10-20

transmitted traffic10-19

Spanning Tree Protocol

See STP

speed, setting10-1, 10-2

Stack Membership Discovery Protocol9-13

Standby Command Configuration window5-21

standby command switch

configuring 5-20

considerations5-12

defined5-2

priority5-10

requirements5-3

virtual IP address5-11

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

static access mode2-9

static-access ports

assigning to VLAN8-7, 8-19

described8-7

VLAN membership combinations8-6

static addresses

adding6-18

configuring for EtherChannel port groups6-19

described6-15, 6-18

see also static address

static address forwarding6-18

statistics

QoS ingress and egress13-25

statistics, VTP8-15

statistics group, in RMON4-4

STP

accelerating root port selection9-11

BackboneFast, described9-17

BPDU guard, described9-10

BPDU message exchange9-3

configuring

BackboneFast9-34

BPDU guard9-31

cross-stack UplinkFast9-33

disable9-21

forward-delay time9-27

hello time9-27

in cascaded cluster9-28

maximum aging time9-28

path cost9-25

Port Fast9-30

port priority9-24

root guard9-34

root switch9-21

secondary root switch9-23

switch priority9-26

UplinkFast with redundant links9-32

cross-stack UplinkFast, described9-12

default configuration9-20

designated switch, defined9-4

detecting indirect link failures9-17

displaying status9-29

interface state, blocking to forwarding9-10

interface states

blocking9-6

disabled9-7

forwarding9-6, 9-7

learning9-7

listening9-7

overview9-5

limitations with 802.1Q trunks9-8

STP (continued)

load sharing

overview8-24

using path costs8-27

using port priorities8-25

MAC address allocation9-8

multicast addresses, affect of9-8

overview9-2

path cost

configuring8-27

Port Fast

described9-10

port grouping parameters8-21

port priority8-25

preventing root switch selection9-19

redundant connectivity9-8

root guard, described9-19

root port, defined9-4

root switch election9-3

settings in a cascaded cluster9-28

shutdown Port Fast-configured interface9-10

supported number of spanning-tree instances8-1, 9-2

timers, described9-4

UplinkFast, described9-11

SunNet Manager1-7

switch clustering technology5-1

switch clusters

planning considerations

LRE profiles5-16

management VLAN5-15

switch-specific features5-16

Switch Manager2-2, 2-33

See also Device Manager

Switch Port Analyzer

see SPAN

switchport command8-22

switch ports, configuring10-1

switch priority, STP9-26

switch software releases4-2

switch-to-client frame retransmission number7-13

system date and time6-11

system error messagesB-1

chassisB-3

CMPB-3

environmentB-4

GigaStackB-4

how to readB-1

linkB-5

list ofB-3

recovery proceduresB-3

RTDB-5

traceback reportsB-3

system messages2-18

on CMS2-18

T

tables

message severity levelsB-2

variable fieldsB-2

tables, CMS2-29

tabs, CMS2-29

TACACS+

AAA accounting commands6-22

AAA authorization commands6-22

configuring6-20

login authentication7-8

in clusters5-15

initializing6-21

server, creating6-20

starting accounting6-22

tacacs-server host command6-20, 6-21

tacacs-server retransmit command6-21, 6-23

tacacs-server timeout command6-21

Telnet

access4-2

accessing management interfaces3-9

accessing the CLI1-6

from a browser3-9

TFTP server, configuring6-5

time

daylight saving6-11

setting6-11

zones6-11

TLV support8-9

Token Ring VLANs

overview8-16

TRBRF8-9

TRCRF8-9

toolbar2-20

tool tips2-26

Topology view

Collapse Cluster view2-11

described2-10

device icons2-12

colors2-14

device labels2-13

display options2-14

Expand Cluster view2-11

icons2-12

link icons2-13

link labels2-13

multilink icon2-22

neighboring devices2-12

pop-up menus2-22

TOS1-5

traceback reportsB-3

traffic

forwarding, and protected ports10-5

fragmented12-3

reducing flooded10-4

unfragmented12-3

traffic policing1-5

transparent mode, VTP8-8, 8-13

trap managers

adding6-12

configuring6-12

traps4-6, 6-13

troubleshooting14-1

with CiscoWorks20004-5

with debug commands14-11

trunk ports

configuring8-22

disabling8-22

trunks

allowed-VLAN list8-23

disabling8-22

IEEE 802.1Q8-21

interacting with other features8-21

load sharing using

STP path costs8-27

STP port priorities8-25

native VLAN for untagged traffic8-24

overview8-20

parallel8-27

pruning-eligible list8-23

to non-DTP device8-20

VLAN, overview8-20

VLAN membership combinations8-6

TTY traps6-13

type-of-service

See TOS

U

UDLD10-18

unauthorized ports7-4

unicast traffic and protected ports10-5

UniDirectional Link Detection

see UDLD

Unrecognized Type-Length-Value

see TLV support8-9

upgrading software4-1

VLAN considerations8-11

UplinkFast

described9-11

redundant links9-32

user EXEC mode3-2

V

variable fields

definitionB-2

tableB-2

verifying changes in CMS2-32

version-dependent transparent mode8-9

virtual IP address

cluster standby group5-11, 5-20

command switch5-11, 5-20

See also IP addresses

VLAN

adding to database8-18

modifying8-18

port membership modes2-9, 8-4

trunks, overview8-20

VLAN configuration mode3-2

VLAN ID, discovering6-15

VLAN Management Policy Server

see VMPS

VLAN membership

combinations8-6

confirming8-33

modes2-9, 8-5

traps6-13

see also dynamic VLAN membership

VLAN Query Protocol

see VQP

VLANs

802.1Q considerations8-21

adding to database8-18

aging dynamic addresses9-9

allowed on trunk8-23

changing8-18

configuration guidelines8-16

configuring8-1, 8-17

default configuration8-16

deleting from database8-18

described8-1

illustrated8-2

MAC addresses6-15

modifying8-18

native, configuring8-24

number supported8-2

overview8-1

static-access ports8-7, 8-18, 8-19

STP and 802.1Q trunks9-8

supported VLANs8-2

Token Ring8-16

trunking8-2

trunks configured with other features8-21

see also trunks

VTP database and8-15

VTP modes8-7

see also management VLAN

VMPS

administering8-34

configuration guidelines8-31

database configuration file example8-29

default configuration8-31

dynamic port membership

configuring8-32

example8-34

overview8-29

reconfirming8-33

troubleshooting8-34

VMPS (continued)

mapping MAC addresses to VLANs8-28

monitoring8-34

overview8-28

reconfirmation interval, changing8-33

reconfirming membership8-33

retry count, changing8-33

server address, entering on client8-31

VQP8-28

VTP

advertisements8-8

configuration guidelines8-10

configuring8-12

consistency checks8-9

database8-15, 8-17

default configuration8-11

described8-7

disabling8-13

domain names8-10

domains8-7

modes

client8-8

configurations affecting mode changes8-8

configuring8-12

server8-8, 8-12

transitions8-7

transparent8-7, 8-8, 8-13

monitoring8-15

pruning

enabling8-15

overview8-9

pruning-eligible list, changing8-23

statistics8-15

Token Ring support8-9

transparent mode, configuring8-13

traps6-13

using8-7

version, determining8-11

version 18-9

VTP (continued)

version 2

configuration guidelines8-11

disabling8-14

enabling8-14

overview8-9

VLAN parameters8-15

W

warningsxix

web-based management software

See CMS

Weighted Round Robin

see WRR

window components, CMS2-28

wizards2-26

WRR

configuring13-24

defining13-8

description13-9

X

Xmodem protocol14-10