Catalyst 3550 Multilayer Switch Software Configuration Guide, 12.1(13)EA1
Index
Downloads: This chapterpdf (PDF - 1.59MB) The complete bookPDF (PDF - 11.03MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

144-bit Layer 3 TCAM     7-27, 30-68

802.1D

See STP

802.1Q

and trunk ports     10-3

configuration limitations     11-18

encapsulation     11-16

native VLAN for untagged traffic     11-22

trunk mode     3-9

tunneling

compatibility with other features     14-5

defaults     14-4

described     14-1

tunnel ports and ACLs     27-3

tunnel ports with other features     14-6

802.1S

See MSTP

802.1W

See RSTP

802.1X

See port-based authentication

802.3X flow control     10-15

A

abbreviating commands     2-4

ABRs     30-29

AC (command switch)     6-13, 6-22

access-class command     27-20

access control entries

See ACEs

access-denied response, VMPS     11-27

access groups

IP     27-21

Layer 3     27-21

accessing

clusters, switch     6-16

command switches     6-13

member switches     6-16

switch clusters     6-16

access lists

See ACLs

access ports

and Layer 2 protocol tunneling     14-9

defined     10-3

in switch clusters     6-11

accounting

with RADIUS     8-28

with TACACS+     8-11, 8-17

ACEs

and QoS     28-7

defined     27-2

Ethernet     27-2

IP     27-2

ACLs

ACEs     27-2

and logging     27-7

any keyword     27-13

applying

on bridged packets     27-38

on multicast packets     27-40

on routed packets     27-39

on switched packets     27-37

time ranges to     27-17

to Layer 2 and Layer 3 interfaces     27-20

to QoS     28-7

classifying traffic for QoS     28-36

comments in     27-19

compatibility on the same switch     27-2

compiling     27-21

configuration conflict examples     27-44

configuring with VLAN maps     27-36

defined     27-1

examples, not fitting in hardware     27-45

examples of     27-21, 28-36

extended IP

configuring for QoS classification     28-37

creating     27-11

matching criteria     27-8

feature manager     27-43

hardware and software handling     27-6

hardware support for     27-6

host keyword     27-13

IP

applying to interface     27-19

creating     27-8

defined     27-8

fragments and QoS guidelines     28-27

implicit deny     27-10, 27-14, 27-16

implicit masks     27-10

matching criteria     27-8

matching criteria for port ACLs     27-4

matching criteria for router ACLs     27-3

named     27-15

options and QoS guidelines     28-27

undefined     27-21

violations, logging     27-16

virtual terminal lines, setting on     27-19

limiting actions     27-37

logging messages     27-10

log keyword     27-16

MAC extended     27-26, 28-38

matching     27-8, 27-21, 27-28

merge failure examples     27-46

monitoring     27-41

named     27-15

not fitting in hardware     27-45

number per QoS class map     28-27

numbers     27-8

policy maps and QoS classification     28-27

port

and voice VLAN     27-4

defined     27-2

limitations     27-4

QoS     28-7, 28-36

router     27-2

standard IP

configuring for QoS classification     28-36

creating     27-9

matching criteria     27-8

support for     1-4

time ranges     27-17

undefined     27-28

unsupported features     27-7

using router ACLs with VLAN maps     27-36

VLAN maps

configuration guidelines     27-30

configuring     27-29

defined     27-4

active router     31-1

adding secure addresses     7-26

addresses

displaying the MAC address table     7-26

dynamic

accelerated aging     15-9

changing the aging time     7-22

default aging     15-9

defined     7-20

learning     7-21

preventing frame forwarding     35-5

removing     7-23

filtering frames by MAC address     35-6

MAC, adding secure     7-26

multicast

group address range     33-1

STP address management     15-8

secure

adding     7-26

described     7-26

static

adding and removing     7-25

defined     7-20

address resolution     30-8

Address Resolution Protocol

See ARP

address table, adding secure addresses     7-26

adjacency tables, with CEF     30-76

administrative distances

defined     30-87

OSPF     30-34

routing protocol defaults     30-77

advertisements

CDP     21-1

IGRP     30-24

RIP     30-19

VTP     11-19, 12-3

aggregate addresses, BGP     30-60

aggregated ports

See EtherChannel

aggregate policers     28-49

aggregate policing     1-5

aging, accelerating     15-9

aging time

accelerated

for MSTP     16-20

for STP     15-9, 15-19

bridge table for fallback bridging     35-6

MAC address table     7-22

maximum

for MSTP     16-21

for STP     15-19

alarms, RMON     24-3

allowed-VLAN list     11-21

alternate routes, IGRP     30-25

area border routers

See ABRs

ARP

configuring     30-9

defined     30-8

encapsulation     30-10

static cache configuration     30-9

support for     1-2

ASBRs     30-29

AS-path filters, BGP     30-54

asymmetrical links, and 802.1Q tunneling     14-4

attributes, RADIUS

vendor-proprietary     8-31

vendor-specific     8-29

audience     xxxiii

authentication

EIGRP     30-42

HSRP     31-8

local mode with AAA     8-36

NTP associations     7-4

RADIUS

key     8-21

login     8-23

TACACS+

defined     8-11

key     8-13

login     8-14

See also port-based authentication

authentication keys, and routing protocols     30-88

authoritative time source, described     7-2

authorization

with RADIUS     8-27

with TACACS+     8-11, 8-16

authorized ports with 802.1X     9-4

autoconfiguration     4-3

automatic discovery

adding member switches     6-20

considerations

beyond a non-candidate device     6-8, 6-9

brand new switches     6-11

connectivity     6-5

different VLANs     6-7

management VLANs     6-8, 6-9

non-CDP-capable devices     6-6

non-cluster-capable devices     6-6

routed ports     6-10

creating a cluster standby group     6-22

in switch clusters     6-5

See also CDP

automatic QoS

See QoS

automatic recovery, clusters     6-12

See also HSRP

autonegotiation

duplex mode     1-2

interface configuration guidelines     10-13

mismatches     36-10

autonomous system boundary routers

See ASBRs

autonomous systems, in BGP     30-48

Auto-RP, described     33-8

autosensing, port speed     1-2

auxiliary VLAN

See voice VLAN

B

BackboneFast

described     17-10

enabling     17-19

support for     1-3

bandwidth for QoS

allocating     28-63

described     28-13

bandwidth graphs     3-8

banners

configuring

login     7-20

message-of-the-day login     7-19

default configuration     7-18

when displayed     7-18

BGP

aggregate addresses     30-60

aggregate routes, configuring     30-60

CIDR     30-60

clear commands     30-63

community filtering     30-56

configuring neighbors     30-58

default configuration     30-46

described     30-45

enabling     30-48

monitoring     30-63

multipath support     30-51

neighbors, types of     30-48

path selection     30-51

peers, configuring     30-58

prefix filtering     30-55

resetting sessions     30-50

route dampening     30-62

route maps     30-53

route reflectors     30-61

routing domain confederation     30-60

routing session with multi-VRF CE     30-70

show commands     30-63

supernets     30-60

support for     1-5

Version 4     30-45

binding cluster group and HSRP group     31-9

blocking packets     20-6

booting

boot loader, function of     4-2

boot process     4-1

manually     4-13

specific image     4-14

boot loader

accessing     4-15

described     4-2

environment variables     4-15

prompt     4-15

trap-door mechanism     4-2

bootstrap router (BSR), described     33-8

Border Gateway Protocol

See BGP

BPDU

error-disabled state     17-3

filtering     17-3

RSTP format     16-5

BPDU filtering

described     17-3

enabling     17-16

support for     1-3

BPDU guard

described     17-3

enabling     17-15

support for     1-3

bridged packets, ACLs on     27-38

bridge groups

See fallback bridging

bridge protocol data unit

See BPDU

broadcast flooding     30-16

broadcast packets

directed     30-13

flooded     30-13

broadcast storm-control command     20-3

broadcast storms     20-1, 30-13

browser configuration     3-1, 6-1

buttons, CMS     3-28

C

cables, monitoring for unidirectional links     22-1

cache engines, redirecting traffic to     32-1

CAMs, ACLs not loading in     27-45

candidate switch

adding     6-20

automatic discovery     6-5

defined     6-4

HC     6-22

passwords     6-20

requirements     6-4

standby group     6-22

See also command switch, cluster standby group, and member switch

caution, described     xxxiv

CC (command switch)     6-22

CDP

and trusted boundary     28-32

automatic discovery in switch clusters     6-5

configuring     21-2

default configuration     21-2

described     21-1

disabling for routing device     21-3, 21-4

enabling and disabling

on an interface     21-4

on a switch     21-3

Layer 2 protocol tunneling     14-7

monitoring     21-5

overview     21-1

support for     1-2

transmission timer and holdtime, setting     21-2

updates     21-2

CEF     30-75

CGMP

as IGMP snooping learning method     19-6

clearing cached group entries     33-58

enabling server support     33-38

FastLeave feature     33-13

hosts

joining a group     33-12

leaving a group     33-13

joining multicast group     19-2

overview     33-11

server support only     33-11

switch support of     1-2

CIDR     30-60

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco Intelligence Engine 2100 Series Configuration Registrar

See IE2100

Cisco Networking Services

See IE2100

CiscoWorks 2000     1-7, 26-4

classless interdomain routing

See CIDR

classless routing     30-7

class maps for QoS

configuring per physical port     28-39

configuring per-port per-VLAN     28-41

described     28-7

displaying     28-69

class of service

See CoS

clearing interfaces     10-21

CLI

abbreviating commands     2-4

command modes     2-1

described     1-7

editing features

enabling and disabling     2-7

keystroke editing     2-7

wrapped lines     2-8

error messages     2-5

filtering command output     2-9

getting help     2-3

history

changing the buffer size     2-5

described     2-5

disabling     2-6

recalling commands     2-6

managing clusters     6-25

no and default forms of commands     2-4

client mode, VTP     12-3

clock

See system clock

Cluster Management Suite

See CMS

clusters, switch

accessing     6-16

adding member switches     6-20

automatic discovery     6-5

automatic recovery     6-12

benefits     1-7

command switch configuration     6-19

compatibility     6-5

creating     6-18

creating a cluster standby group     6-22

described     6-1

LRE profile considerations     6-18

managing

through CLI     6-25

through SNMP     6-26

planning     6-5

planning considerations

automatic discovery     6-5

automatic recovery     6-12

CLI     6-25

host names     6-16

IP addresses     6-16

LRE profiles     6-18

passwords     6-16

RADIUS     6-17

SNMP     6-17, 6-26

switch-specific features     6-18

TACACS+     6-17

redundancy     6-22

troubleshooting     6-24

verifying     6-24

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

cluster standby group

and HSRP group     31-9

automatic recovery     6-15

considerations     6-13

creating     6-22

defined     6-2

requirements     6-3

virtual IP address     6-13

See also HSRP

cluster tree, described     3-5

CMS

benefits     1-7

cluster tree     3-5

described     1-1, 1-7, 3-1

displaying system messages     3-18

features     3-2

Front Panel images     3-6

Front Panel view     3-3

interaction modes     3-24

menu bar     3-13

online help     3-25

toolbar     3-19

tool tips     3-25

Topology view     3-10

window components     3-26

wizards     3-25

Coarse Wave Division Multiplexer GBIC modules

See CWDM GBIC modules

command-line interface

See CLI

command modes     2-1

commands

abbreviating     2-4

no and default     2-4

setting privilege levels     8-8

command switch

accessing     6-13

active (AC)     6-13, 6-22

command switch with HSRP disabled (CC)     6-22

configuration conflicts     36-10

defined     6-2

enabling     6-19

passive (PC)     6-13, 6-22

password privilege levels     6-25

priority     6-13

recovery

from command-switch failure     6-13

from failure     36-6

from lost member connectivity     36-10

redundant     6-12, 6-22

replacing

with another switch     36-8

with cluster member     36-7

requirements     6-3

standby (SC)     6-13, 6-22

See also candidate switch, cluster standby group, member switch, and standby command switch

community list, BGP     30-57

community strings

configuring     6-17, 26-7

for cluster switches     26-4

in clusters     6-17

overview     26-4

SNMP     6-17

config.text     4-12

configuration conflicts

ACL, displaying     27-44

recovering from lost member connectivity     36-10

configuration conflicts, recovering from lost member connectivity     36-10

configuration examples, network     1-8

configuration files

clearing the startup configuration     B-19

creating using a text editor     B-10

default name     4-12

deleting a stored configuration     B-19

described     B-8

downloading

automatically     4-12

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

guidelines for creating and using     B-9

invalid combinations when copying     B-5

limiting TFTP server access     26-14

obtaining with DHCP     4-7

password recovery disable considerations     8-5

specifying the filename     4-13

system contact and location information     26-14

types and location     B-9

uploading

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-15

using RCP     B-18

using TFTP     B-12

VMPS database     11-28

configuration guidelines, multi-VRF CE     30-68

configuration settings, saving     4-10

configure terminal command     10-7

configuring inline power     10-14

config-vlan mode     2-2, 11-6

conflicts, configuration     36-10

congestion-avoidance techniques     28-12

congestion-management techniques     28-12, 28-15

connections, secure remote     8-37

connectivity problems     36-11

consistency checks in VTP version 2     12-4

console port, connecting to     2-10

content-routing technology

See WCCP

conventions

command     xxxiv

for examples     xxxiv

publication     xxxiv

text     xxxiv

CoS

in Layer 2 frames     28-2

override priority     13-5

trust priority     13-6

CoS-to-DSCP map for QoS     28-52

CoS-to-egress-queue map     28-57

counters, clearing interface     10-21

CPU q, in show forward command output     36-20

crashinfo file     36-20

cross-stack UplinkFast, STP

connecting stack ports     17-8

described     17-5

enabling     17-18

fast-convergence events     17-7

Fast Uplink Transition Protocol     17-6

limitations     17-8

normal-convergence events     17-7

Stack Membership Discovery Protocol     17-6

support for     1-3

cryptographic software image     8-37

customer edge devices     30-65

CWDM GBIC modules

network example     1-17

wavelength colors on CMS     3-6

CWDM OADM modules     1-17

D

daylight saving time     7-13

debugging

enabling all system diagnostics     36-17

enabling for a specific feature     36-17

redirecting error message output     36-18

using commands     36-16

default commands     2-4

default configuration

802.1Q tunneling     14-4

802.1X     9-9

auto-QoS     28-18

banners     7-18

BGP     30-46

booting     4-12

CDP     21-2

DHCP     18-3

DNS     7-17

EIGRP     30-39

EtherChannel     29-8

fallback bridging     35-3

HSRP     31-3

IGMP     33-31

IGMP filtering     19-20

IGMP snooping     19-5

IGRP     30-25

initial switch information     4-3

IP addressing, IP routing     30-4

IP multicast routing     33-13

Layer 2 interfaces     10-12

Layer 2 protocol tunneling     14-9

MAC address table     7-22

MSDP     34-4

multi-VRF CE     30-67

MVR     19-14

NTP     7-4

optional spanning-tree features     17-14

OSPF     30-30

password and privilege level     8-2

RADIUS     8-20

RIP     30-19

RMON     24-3

RSPAN     23-8

RSTP and MSTP     16-12

SNMP     26-6

SPAN     23-8

standard QoS     28-25

STP     15-10

system message logging     25-3

system name and prompt     7-15

TACACS+     8-13

UDLD     22-3

VLAN, Layer 2 Ethernet interfaces     11-18

VLANs     11-7

VMPS     11-30

voice VLAN     13-2

VTP     12-6

WCCP     32-5

default gateway     4-10, 30-11

default networks     30-78

default routes     30-78

default routing     30-2

deleting VLANs     11-10

description command     10-17

designing your network, examples     1-8

destination addresses, in ACLs     27-12

detecting indirect link failures, STP     17-10

device discovery protocol     21-1

device labels     3-12

Device Manager     3-4

See also Switch Manager

device pop-up menu, Front Panel view     3-20

DHCP-based autoconfiguration

client request message exchange     4-4

configuring

client side     4-3

DNS     4-6

relay device     4-6

server-side     4-5

TFTP server     4-5

example     4-8

lease options

for IP address information     4-5

for receiving the configuration file     4-5

overview     4-3

relationship to BOOTP     4-3

relay support     1-6

support for     1-2

DHCP option 82

configuration guidelines     18-4

default configuration     18-3

displaying     18-7

enabling

relay agent     18-4

relay agent information option     18-4

example, metropolitan Ethernet network     18-2

forwarding address, specifying     18-5

helper address     18-6

message exchange process     18-2

overview     18-1

policy for reforwarding     18-5

protected ports for subscriber isolation     18-7

reforwarding policy     18-5

subscriber identification     18-2

support for     1-2

suppressing broadcasts     18-7

validating     18-4

Differentiated Services architecture, QoS     28-2

Differentiated Services Code Point     28-2

Diffusing Update Algorithm (DUAL)     30-38

directed unicast requests     1-2

directories

changing     B-3

creating and removing     B-4

displaying the working     B-3

discovery, clusters

See automatic discovery

display options, Topology view     3-13

Disqualification Code option     3-24

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols     30-2

distribute-list command     30-86

DNS

and DHCP-based autoconfiguration     4-6

default configuration     7-17

displaying the configuration     7-18

overview     7-16

setting up     7-17

support for     1-2

documentation

related     xxxiv

document conventions     xxxiv

domain names

DNS     7-16

VTP     12-8

Domain Name System

See DNS

dot1q-tunnel switchport mode     11-17

double-tagged packets

802.1Q tunneling     14-2

Layer 2 protocol tunneling     14-9

downloading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

image files

deleting old image     B-23

preparing     B-21, B-25, B-29

reasons for     B-19

using FTP     B-26

using RCP     B-30

using TFTP     B-22

drop threshold for Layer 2 protocol packets     14-10

DSCP     1-5, 28-2

DSCP-to-CoS map for QoS     28-54

DSCP-to-DSCP-mutation map for QoS     28-55

DSCP-to-threshold map for QoS     28-60

DTP     1-4, 11-16

DUAL finite state machine, EIGRP     30-38

duplex mode, configuring     10-13

DVMRP

all-DVMRP-routers multicast group address     33-11

autosummarization

configuring a summary address     33-54

disabling     33-56

connecting PIM domain to DVMRP router     33-46

enabling unicast routing     33-50

interoperability

with Cisco devices     33-44

with IOS software     33-11

mrinfo requests, responding to     33-49

neighbors

advertising the default route to     33-48

discovery with Probe messages     33-11, 33-44

displaying information     33-49

prevent peering with nonpruning     33-52

rejecting nonpruning     33-51

overview     33-11

routes

adding a metric offset     33-56

advertising all     33-56

advertising the default route to neighbors     33-48

caching DVMRP routes learned in report messages     33-50

changing the threshold for syslog messages     33-54

deleting     33-58

displaying     33-58

favoring one over another     33-56

limiting the number injected into MBONE     33-53

limiting unicast route advertisements     33-44

route table, building     33-11

source distribution tree, building     33-11

support for     1-6

tunnels

configuring     33-46

displaying neighbor information     33-49

dynamic access mode     3-9

dynamic access ports

characteristics     11-3

configuring     11-31

defined     10-3

dynamic addresses

See addresses

dynamic desirable trunking mode     11-17

Dynamic Host Configuration Protocol

See DHCP-based autoconfiguration

dynamic port VLAN membership

described     11-28

reconfirming     11-32

troubleshooting     11-34

types of connections     11-31

VMPS database configuration file     11-28

dynamic routing     30-2

Dynamic Trunking Protocol

See DTP

E

EBGP     30-44

editing features

enabling and disabling     2-7

keystrokes used     2-7

wrapped lines     2-8

egress q, in show forward command output     36-20

EIGRP

and IGRP     30-40

authentication     30-42

components     30-38

configuring     30-40

default configuration     30-39

definition     30-38

interface parameters, configuring     30-41

monitoring     30-43

support for     1-5

enable password     8-4

enable secret password     8-4

encryption for passwords     8-4

Enhanced IGRP

See EIGRP

environment variables

function of     4-16

location in Flash     4-15

equal-cost routing     1-6, 30-76

error messages

during command entry     2-5

setting the display destination device     25-4

severity levels     25-8

system message format     25-2

EtherChannel

automatic creation of     29-3

channel groups

binding physical and logical interfaces     29-2

numbering of     29-3

configuration guidelines     29-8

configuring

Layer 2 interfaces     29-9

Layer 3 physical interfaces     29-12

Layer 3 port-channel logical interfaces     29-11

default configuration     29-8

destination MAC address forwarding     29-6

displaying status     29-18

forwarding methods     29-14

interaction

with STP     29-8

with VLANs     29-9

LACP, support for     1-2

Layer 3 interface     30-3

load balancing     29-6, 29-14

logical interfaces, described     29-2

number of interfaces per     29-2

overview     29-1

PAgP

aggregate-port learners     29-5

compatibility with Catalyst 1900     29-15

displaying status     29-18

interaction with other features     29-6

learn method and priority configuration     29-15

modes     29-4

overview     29-3

silent mode     29-4

support for     1-2

port-channel interfaces

described     29-2

numbering of     29-3

port groups     10-5

source MAC address forwarding     29-6

support for     1-2

EtherChannel guard

described     17-12

enabling     17-19

Ethernet VLANs

adding     11-8

defaults and ranges     11-8

modifying     11-8

events, RMON     24-3

examples

conventions for     xxxiv

network configuration     1-8

expedite queue for QoS

10/100 Ethernet ports

allocating bandwidth     28-67

configuring     28-66

described     28-15

Gigabit-capable Ethernet ports

allocating bandwidth     28-63

configuring     28-62

described     28-12

expert mode     3-24

extended-range VLANs

configuration guidelines     11-12

configuring     11-12

creating     11-12, 11-13

defined     11-1

extended system ID

MSTP     16-14

STP     15-4, 15-12

Extensible Authentication Protocol over LAN     9-1

exterior routes, IGRP     30-24

external BGP

See EBGP

external neighbors, BGP     30-48

F

fallback bridging

and protected ports     35-4

bridge groups

creating     35-4

described     35-1

displaying     35-12

function of     35-2

number supported     35-4

removing     35-4

bridge table

changing the aging time     35-6

clearing     35-12

displaying     35-12

configuration guidelines     35-3

connecting interfaces with     10-7

default configuration     35-3

described     35-1

frame forwarding

filtering by MAC address     35-6

flooding packets     35-2

for static addresses     35-5

forwarding packets     35-2

preventing for dynamically learned stations     35-5

to static addresses     35-5

overview     35-1

STP

disabling on an interface     35-12

forward-delay interval     35-10

hello BPDU interval     35-10

interface priority     35-8

maximum-idle interval     35-11

path cost     35-9

switch priority     35-8

VLAN-bridge STP     35-1, 35-2

support for     1-6

SVIs and routed ports     35-1

VLAN-bridge STP     15-8

fallback VLAN name     11-28

fan fault indication     3-5

Fast Uplink Transition Protocol     17-6

feature manager, ACL     27-43

FIB     30-76

fiber-optic, detecting unidirectional links     22-1

files

copying     B-4

crashinfo

description     36-20

displaying the contents of     36-20

location     36-20

deleting     B-5

displaying the contents of     B-8

tar

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

file system

displaying available file systems     B-2

displaying file information     B-3

local file system names     B-1

network file system names     B-4

setting the default     B-3

filtering

in a VLAN     27-29

non-IP traffic     27-26

show and more command output     2-9

with fallback bridging     35-6

filters, IP

See ACLs, IP

Flash device, number of     B-1

flash updates, IGRP     30-25

flooded traffic, blocking     20-6

flow-based packet classification     1-5

flowcharts

QoS classification     28-6

QoS policing and marking     28-10

QoS queueing and scheduling

10/100 ports     28-15

Gigabit-capable ports     28-12

flow control     1-2, 10-15

forward-delay time

MSTP     16-20

STP     15-6, 15-19

Forwarding Information Base

See FIB

forwarding non-routable protocols     35-1

Front Panel images, CMS     3-6

Front Panel view

cluster tree     3-5

described     3-3

pop-up menus     3-20

port icons     3-6

port LEDs     3-8

RPS LED     3-7

switch images     3-6

FTP

accessing MIB files     A-3

configuration files

downloading     B-13

overview     B-12

preparing the server     B-13

uploading     B-15

image files

deleting old image     B-28

downloading     B-26

preparing the server     B-25

uploading     B-28

G

GBICs

1000BASE-LX/LH module     1-10

1000BASE-SX module     1-10

1000BASE-T module     1-10

1000BASE-ZX module     1-10

CWDM module     1-17

GigaStack module     1-10

security and identification     36-10

get-bulk-request operation     26-3

get-next-request operation     26-3, 26-4

get-request operation     26-3, 26-4

get-response operation     26-3

Gigabit GBIC modules

See GBICs

Gigabit Interface Converters

See GBICs

GigaStack GBIC

fast transition of redundant link     17-5

See also GBICs

global configuration mode     2-2

graphs, bandwidth     3-8

guide

audience     xxxiii

purpose of     xxxiii

guide mode     1-8, 3-24

H

hardware, determining ACL configuration fit     27-45

HC (candidate switch)     6-22

hello time

MSTP     16-19

STP     15-18

help, for the command line     2-3

Help Contents     3-25

history

changing the buffer size     2-5

described     2-5

disabling     2-6

recalling commands     2-6

history table, level and number of syslog messages     25-10

host name list, CMS     3-27

host names

abbreviations appended to     6-22

in clusters     6-16

hosts, limit on dynamic ports     11-34

Hot Standby Router Protocol

See HSRP

HP OpenView     1-7

HSRP

authentication string     31-8

automatic cluster recovery     6-15

binding to cluster group     31-9

cluster standby group considerations     6-13

command-switch redundancy     1-3

configuring     31-3

default configuration     31-3

definition     31-1

monitoring     31-10

overview     31-1

priority     31-6

routing redundancy     1-5

timers     31-8

tracking     31-6

See also clusters, cluster standby group, and standby command switch

I

IBPG     30-44

ICMP

redirect messages     30-11

support for     1-6

time exceeded messages     36-13

traceroute and     36-13

unreachable messages     27-6

unreachables and ACLs     27-6

ICMP ping

executing     36-11

overview     36-11

ICMP Router Discovery Protocol

See IRDP

icons

colors

cluster tree     3-5

Topology view     3-12

Front Panel view     3-6

toolbar     3-19

Topology view     3-11

IDS, using with SPAN and RSPAN     23-2

IE2100

CNS embedded agents

described     5-5

enabling automated configuration     5-6

enabling configuration agent     5-9

enabling event agent     5-8

Configuration Registrar

configID, deviceID, hostname     5-3

configuration service     5-2

described     5-1

event service     5-3

described     1-7

support for     1-2

IEEE 802.1P     13-1

IFS     1-2

IGMP

configuring the switch

as a member of a group     33-34

statically connected member     33-36

controlling access to groups     33-35

default configuration     33-31

deleting cache entries     33-58

displaying groups     33-58

fast switching     33-37

host-query interval, modifying     33-36

joining multicast group     19-2

join messages     19-2

leave processing, enabling     19-9

leaving multicast group     19-4

multicast reachability     33-34

overview     33-3

queries     19-3

support for     1-2

Version 1

changing to Version 2     33-32

hosts joining a group     33-3

hosts leaving a group     33-3

membership queries     33-3

overview     33-3

query-response model     33-3

Version 2

changing to Version 1     33-32

enhancements over Version 1     33-4

hosts leaving a group     33-4

maximum query response time value     33-33

new features     33-4

overview     33-4

pruning groups     33-33

query timeout value     33-32

IGMP filtering

configuring     19-20

default configuration     19-20

described     19-20

monitoring     19-23

IGMP groups, setting the maximum number     19-22

IGMP profile

applying     19-21

configuration mode     19-20

configuring     19-20

IGMP snooping

configuring     19-5

default configuration     19-5

definition     19-1

enabling and disabling     19-5

global configuration     19-5

Immediate Leave     19-4

method     19-6

monitoring     19-9

support for     1-2

VLAN configuration     19-6

IGP     30-29

IGRP

advertisements     30-24

alternate routes     30-25

configuring     30-26

default configuration     30-25

described     30-24

exterior routes     30-24

flash updates     30-25

interior routes     30-24

load balancing     30-25

poison-reverse updates     30-25

split horizon     30-28

support for     1-5

system routes     30-24

traffic sharing     30-26

unequal-cost load balancing     30-25

Immediate-Leave, IGMP     19-4

Intelligence Engine 2100 Series CNS Agents

See IE2100

interaction modes, CMS     3-24

interface

number     10-7

range macros     10-10

interface command     10-7

interface configuration mode     2-3

interfaces

configuration guidelines     10-13

configuring     10-7

configuring duplex mode     10-13

configuring speed     10-13

counters, clearing     10-21

described     10-17

descriptive name, adding     10-17

displaying information about     10-19

flow control     10-15

management     1-7

monitoring     10-19

naming     10-17

physical, identifying     10-7

range of     10-8

restarting     10-22

shutting down     10-22

supported     10-7

types of     10-1

interfaces range macro command     10-10

Interior Gateway Protocol

See IGP

Interior Gateway Routing Protocol

See IGRP

interior routes, IGRP     30-24

internal BGP

See IBGP

internal neighbors, BGP     30-48

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link

See ISL

inter-VLAN routing     1-6, 30-2

Intrusion Detection System

See IDS

inventory, cluster     6-24

IOS File System

See IFS

ip access-group command     27-21

IP ACLs

applying to an interface     27-19

extended, creating     27-11

for QoS classification     28-7

implicit deny     27-10, 27-14, 27-16

implicit masks     27-10

logging     27-16

named     27-15

standard, creating     27-9

undefined     27-21

virtual terminal lines, setting on     27-19

IP addresses

candidate or member     6-4, 6-16

classes of     30-5

cluster access     6-2

command switch     6-3, 6-13, 6-16

default configuration     30-4

for IP routing     30-4

MAC address association     30-8

monitoring     30-17

redundant clusters     6-13

standby command switch     6-13, 6-16

See also IP information

IP broadcast address     30-15

ip cef command     30-76

IP directed broadcasts     30-13

ip igmp profile command     19-20

IP information

assigned

manually     4-10

through DHCP-based autoconfiguration     4-3

default configuration     4-3

IP multicast routing

addresses

all-hosts     33-1

all-multicast-routers     33-1

all-PIM-routers     33-10

Cisco-RP-Announce     33-8

Cisco-RP-Discovery     33-8

host group address range     33-1

administratively-scoped boundaries, described     33-42

and IGMP snooping     19-1, 19-5

Auto-RP

adding to an existing sparse-mode cloud     33-19

benefits of     33-18

clearing the cache     33-58

configuration guidelines     33-15

IOS release     33-5

overview     33-8

preventing candidate RP spoofing     33-21

preventing join messages to false RPs     33-20

setting up in a new internetwork     33-19

using with BSR     33-27

bootstrap router

configuration guidelines     33-15

configuring candidate BSRs     33-25

configuring candidate RPs     33-26

defining the IP multicast boundary     33-24

defining the PIM domain border     33-22

IOS release     33-5

overview     33-8

using with Auto-RP     33-27

Cisco implementation     33-2

configuring

basic multicast routing     33-15

IP multicast boundary     33-42

TTL threshold     33-40

default configuration     33-13

enabling

multicast forwarding     33-15

PIM mode     33-16

group-to-RP mappings

Auto-RP     33-8

BSR     33-8

MBONE

deleting sdr cache entries     33-58

described     33-39

displaying sdr cache     33-59

enabling sdr listener support     33-39

limiting DVMRP routes advertised     33-53

limiting sdr cache entry lifetime     33-39

SAP packets for conference session announcement     33-39

Session Directory (sdr) tool, described     33-39

monitoring

packet rate loss     33-59

peering devices     33-59

tracing a path     33-59

multicast forwarding, described     33-9

PIMv1 and PIMv2 interoperability     33-14

protocol interaction     33-2

reverse path check (RPF)     33-9

routing table

deleting     33-58

displaying     33-58

RP

assigning manually     33-17

configuring Auto-RP     33-18

configuring PIMv2 BSR     33-22

monitoring mapping information     33-27

using Auto-RP and BSR     33-27

statistics, displaying system and network     33-58

TTL thresholds, described     33-40

See also CGMP

See also DVMRP

See also IGMP

See also PIM

IP phones

and QoS     13-1

automatic classification and queueing     28-17

configuring     13-3

trusted boundary for QoS     28-32

IP precedence     28-2

IP-precedence-to-DSCP map for QoS     28-52

IP protocols

in ACLs     27-12

routing     1-5

IP routes, monitoring     30-89

IP routing

connecting interfaces with     10-6

enabling     30-18

IP traceroute

executing     36-13

overview     36-13

IP unicast routing

address resolution     30-8

administrative distances     30-77, 30-87

ARP     30-8

assigning IP addresses to Layer 3 interfaces     30-6

authentication keys     30-88

broadcast

address     30-15

flooding     30-16

packets     30-13

storms     30-13

classless routing     30-7

configuring static routes     30-77

default

addressing configuration     30-4

gateways     30-11

networks     30-78

routes     30-78

routing     30-2

directed broadcasts     30-13

dynamic routing     30-2

enabling     30-18

EtherChannel Layer 3 interface     30-3

IGP     30-29

inter-VLAN     30-2

IP addressing

classes     30-5

configuring     30-4

IRDP     30-12

Layer 3 interfaces     30-3

MAC address and IP address     30-8

passive interfaces     30-85

protocols

distance-vector     30-2

dynamic     30-2

link-state     30-2

proxy ARP     30-8

redistribution     30-79

reverse address resolution     30-8

routed ports     30-3

static routing     30-2

steps to configure     30-3

subnet mask     30-5

subnet zero     30-6

supernet     30-7

UDP     30-15

with SVIs     30-3

See also BGP

See also EIGRP

See also IGRP

See also OSPF

See also RIP

ip unreachables command     27-6

IRDP

configuring     30-12

definition     30-12

support for     1-6

ISL

and trunk ports     10-3

encapsulation     1-4, 11-16

trunking with 802.1 tunneling     14-4

trunk mode     3-9

J

Java plug-in configuration     3-1, 6-1

join messages, IGMP     19-2

K

KDC

described     8-32

See also Kerberos

Kerberos

authenticating to

boundary switch     8-35

KDC     8-35

network services     8-35

configuration examples     8-32

configuring     8-35

credentials     8-32

described     8-32

KDC     8-32

operation     8-34

realm     8-33

server     8-33

switch as trusted third party     8-32

terms     8-33

TGT     8-34

tickets     8-32

key distribution center

See KDC

L

l2protocol-tunnel command     14-11

LACP

See EtherChannel

Layer 2 frames, classification with CoS     28-2

Layer 2 interfaces, default configuration     10-12

Layer 2 protocol tunneling

configuring     14-9

default configuration     14-9

defined     14-7

guidelines     14-10

Layer 2 traceroute

and ARP     36-16

and CDP     36-15

described     36-15

IP addresses and subnets     36-16

MAC addresses and VLANs     36-15

multicast traffic     36-15

multiple devices on a port     36-16

supported switches     36-15

unicast traffic     36-15

usage guidelines     36-15

Layer 2 trunks     11-16

Layer 3 features     1-5

Layer 3 interfaces

assigning IP addresses to     30-6

changing from Layer 2 mode     30-6

types of     30-3

Layer 3 packets, classification methods     28-2

LDAP     5-2

leave processing, IGMP     19-9

LEDs

port     3-8

RPS     3-7

legend, CMS icons and labels     3-19

lightweight directory access protocol

See LDAP

line configuration mode     2-3

Link Aggregation Control Protocol

See LACP

link labels     3-12

link pop-up menu, Topology view     3-21

links, unidirectional     22-1

link state advertisements (LSAs)     30-33

link-state protocols     30-2

lists, CMS     3-28

load balancing, IGRP     30-25

logging messages, ACL     27-10

login authentication

with RADIUS     8-23

with TACACS+     8-14

login banners     7-18

log messages

See system message logging

long-distance, high-bandwidth transport configuration example     1-17

Long-Reach Ethernet (LRE) technology     1-10

loop guard

described     17-13

enabling     17-20

support for     1-3

LRE profiles, considerations in switch clusters     6-18

M

mac access-group command     27-28

MAC ACLs and Layer 2 interfaces     27-28

MAC addresses

adding

secure     7-26

sticky secure     20-8

aging time     7-22

and VLAN association     7-21

building the address table     7-21

default configuration     7-22

displaying     7-26

dynamic

learning     7-21

removing     7-23

in ACLs     27-26

IP address association     30-8

static

adding     7-25

characteristics of     7-25

removing     7-25

MAC address multicast entries, monitoring     19-10

MAC address-to-VLAN mapping     11-27

MAC extended access lists     27-26, 28-5, 28-38

MAN

CWDM configuration example     1-17

long-distance, high-bandwidth transport configuration example     1-17

manageability features     1-2

management options

benefits

clustering     1-7

CMS     1-7

CLI     2-1

CMS     3-1

CNS     5-1

overview     1-7

management VLAN

considerations in switch clusters     6-8, 6-9

discovery through different management VLANs     6-9

discovery through same management VLAN     6-8

mapping tables for QoS

configuring

CoS-to-DSCP     28-52

CoS-to-egress-queue     28-57

DSCP     28-51

DSCP-to-CoS     28-54

DSCP-to-DSCP-mutation     28-55

DSCP-to-threshold     28-60

IP-precedence-to-DSCP     28-52

policed-DSCP     28-53

described     28-10

marking

action in policy map     28-43

action with aggregate policers     28-49

described     28-4, 28-8

matching, ACLs     27-8

maximum aging time

MSTP     16-21

STP     15-19

maximum hop count, MSTP     16-21

maximum-paths command     30-51, 30-76

membership mode, VLAN port     11-3

member switch

adding     6-20

automatic discovery     6-5

defined     6-2

managing     6-25

passwords     6-16

recovering from lost connectivity     36-10

requirements     6-4

See also candidate switch, cluster standby group, and standby command switch

memory, optimizing     7-27

menu bar

described     3-13

variations     3-14

messages

logging ACL violations     27-16

system     3-18

to users through banners     7-18

metrics, in BGP     30-52

metric translations, between routing protocols     30-82

metropolitan-area networks

See MANs

metro tags     14-2

MIBs

accessing files with FTP     A-3

location of files     A-3

overview     26-1

SNMP interaction with     26-4

supported     A-1

minimum-reserve levels

assigning to a queue     28-15, 28-66

configuring the buffer size     28-16, 28-65

default size     28-15

mini-point-of-presence

See POP

mirroring traffic for analysis     23-1

mismatches, autonegotiation     36-10

Mode button     3-8

modes, port     3-8

modules, GBIC

1000BASE-LX/LH     1-10

1000BASE-SX     1-10

1000BASE-T     1-10

1000BASE-ZX     1-10

CWDM     1-17

GigaStack     1-10

monitoring

802.1Q tunneling     14-12

access groups     27-41

ACL

configuration     27-41

configuration conflicts     27-44

fit in hardware     27-45

information     27-41

BGP     30-63

cables for unidirectional links     22-1

CDP     21-5

CEF     30-76

EIGRP     30-43

fallback bridging     35-12

features     1-6

HSRP     31-10

IGMP

filters     19-23

snooping     19-9

interfaces     10-19

IP

address tables     30-17

multicast routing     33-57

routes     30-89

Layer 2 protocol tunneling     14-12

MSDP peers     34-19

multicast router interfaces     19-10

multi-VRF CE     30-75

MVR     19-18

network traffic for analysis with probe     23-1

OSPF     30-37

port

blocking     20-14

protection     20-14

RP mapping information     33-27

source-active messages     34-19

speed and duplex mode     10-14

traffic flowing among switches     24-1

traffic suppression     20-14

tunneling     14-12

VLAN

filters     27-42

maps     27-42

VLANs     11-15

VMPS     11-33

VTP     12-15

MSDP

and dense-mode regions

sending SA messages to     34-17

specifying the originating address     34-18

benefits of     34-3

clearing MSDP connections and statistics     34-19

controlling source information

forwarded by switch     34-12

originated by switch     34-8

received by switch     34-14

default configuration     34-4

filtering

incoming SA messages     34-14

SA messages to a peer     34-12

SA requests from a peer     34-11

join latency, defined     34-6

meshed groups

configuring     34-16

defined     34-16

originating address, changing     34-18

overview     34-1

peer-RPF flooding     34-2

peers

configuring a default     34-4

monitoring     34-19

peering relationship, overview     34-1

requesting source information from     34-8

shutting down     34-16

source-active messages

caching     34-6

clearing cache entries     34-19

defined     34-2

filtering from a peer     34-11

filtering incoming     34-14

filtering to a peer     34-12

limiting data with TTL     34-14

monitoring     34-19

restricting advertised sources     34-9

MSTP

boundary ports

configuration guidelines     16-13

described     16-10

BPDU filtering

described     17-3

enabling     17-16

BPDU guard

described     17-3

enabling     17-15

CIST, described     16-8

configuration guidelines     16-12

configuring

forward-delay time     16-20

hello time     16-19

link type for rapid convergence     16-22

maximum aging time     16-21

maximum hop count     16-21

MST region     16-13

path cost     16-18

port priority     16-17

root switch     16-14

secondary root switch     16-16

switch priority     16-19

CST

defined     16-8

operations between regions     16-9

default configuration     16-12

default optional feature configuration     17-14

displaying status     16-23

enabling the mode     16-13

EtherChannel guard

described     17-12

enabling     17-19

extended system ID

affects on root switch     16-14

affects on secondary root switch     16-16

unexpected behavior     16-15

interface state, blocking to forwarding     17-2

interoperability with 802.1D

described     16-11

restarting migration process     16-22

IST

defined     16-8

master     16-8

operations within a region     16-8

loop guard

described     17-13

enabling     17-20

mapping VLANs to MST instance     16-13

MST region

CIST     16-8

configuring     16-13

described     16-7

hop-count mechanism     16-10

IST     16-8

supported spanning-tree instances     16-7

optional features supported     1-3

overview     16-7

Port Fast

described     17-2

enabling     17-14

preventing root switch selection     17-12

root guard

described     17-12

enabling     17-20

root switch

affects of extended system ID     16-14

configuring     16-15

unexpected behavior     16-15

shutdown Port Fast-enabled port     17-3

multicast groups

and IGMP snooping     19-5

Immediate Leave     19-4

joining     19-2

leaving     19-4

static joins     19-8

multicast packets

ACLs on     27-40

blocking     20-6

multicast router interfaces, monitoring     19-10

multicast router ports, adding     19-7

Multicast Source Discovery Protocol

See MSDP

multicast storm-control command     20-3

multicast storms     20-1

Multicast VLAN Registration

See MVR

Multiple Spanning Tree Protocol

See MSTP

multiple VPN routing/forwarding in customer edge devices

See multi-VRF CE

multi-VRF CE

configuration example     30-71

configuration guidelines     30-68

configuring     30-67

default configuration     30-67

defined     30-65

displaying     30-75

monitoring     30-75

network components     30-67

packet-forwarding process     30-67

support for     1-6

MVR

configuring interfaces     19-16

default configuration     19-14

described     19-12

modes     19-16

monitoring     19-18

setting global parameters     19-15

support for     1-2

N

named IP ACLs     27-15

NameSpace Mapper

See NSM

native VLAN

and 802.1Q tunneling     14-4

configuring     11-22

default     11-22

negotiate trunk mode     3-9

neighbor discovery/recovery, EIGRP     30-38

neighbors, BGP     30-58

network configuration examples

increasing network performance     1-9

large network     1-14

long-distance, high-bandwidth transport     1-17

providing network services     1-9

small to medium-sized network     1-12

network design

performance     1-9

services     1-9

network management

CDP     21-1

RMON     24-1

SNMP     26-1

Network Time Protocol

See NTP

no commands     2-4

non-IP traffic filtering     27-26

nontrunking mode     11-17

normal-range VLANs

configuration modes     11-6

defined     11-1

no switchport command     10-5

note, described     xxxiv

not-so-stubby areas

See NSSA

NSM     5-3

NSSA, OSPF     30-33

NTP

associations

authenticating     7-4

defined     7-2

enabling broadcast messages     7-6

peer     7-5

server     7-5

default configuration     7-4

displaying the configuration     7-10

overview     7-2

restricting access

creating an access group     7-8

disabling NTP services per interface     7-9

source IP address, configuring     7-9

stratum     7-2

support for     1-2

synchronizing devices     7-5

time

services     7-2

synchronizing     7-2

O

OADM modules

See CWDM OADM modules

online help     3-25

Open Shortest Path First

See OSPF

optical add/drop multiplexer modules

See CWDM OADM modules

optimizing system resources     7-27

options, management     1-7

OSPF

area parameters, configuring     30-33

configuring     30-31

default configuration

metrics     30-34

route     30-34

settings     30-30

described     30-29

interface parameters, configuring     30-32

LSA group pacing     30-36

monitoring     30-37

router IDs     30-36

route summarization     30-34

support for     1-5

virtual links     30-34

out-of-profile markdown     1-5

output interface, getting information about     36-20

overheating indication, switch     3-5

P

packet modification, with QoS     28-17

PAgP

See EtherChannel

parallel paths, in routing tables     30-76

passive interfaces

configuring     30-85

OSPF     30-34

pass-through mode     28-33

passwords

default configuration     8-2

disabling recovery of     8-5

encrypting     8-4

for security     1-4

in clusters     6-16, 6-20

overview     8-1

recovery of     36-2

setting

enable     8-3

enable secret     8-4

Telnet     8-6

with usernames     8-7

VTP domain     12-8

path cost

MSTP     16-18

STP     15-16

PBR

defined     30-82

enabling     30-84

fast-switched policy-based routing     30-84

local policy-based routing     30-84

support for     1-6

PC (passive command switch)     6-13, 6-22

peers, BGP     30-58

performance, network design     1-9

performance features     1-2

per-VLAN rapid Spanning Tree (PVRST)     16-2

per-VLAN Spanning Tree (PVST)     15-2

PE to CE routing, configuring     30-70

physical ports     10-2

PIM

default configuration     33-13

dense mode

(S,G) notation     33-6

graft messages     33-6

overview     33-5

pruning and SPT     33-5

rendezvous point (RP), described     33-7

RPF lookups     33-10

displaying neighbors     33-59

enabling a mode     33-16

neighbor discovery and adjacencies     33-10

overview     33-5

router-query message interval, modifying     33-30

shared tree and source tree, overview     33-28

shortest path tree, delaying the use of     33-29

sparse mode

(*,G) notation     33-7

join messages and shared tree     33-7

overview     33-7

prune messages     33-8

RPF lookups     33-10

support for     1-6

versions

interoperability     33-14

supported     33-5

troubleshooting interoperability problems     33-28

v2 improvements     33-5

PIM-DVMRP, as snooping method     19-6

ping

character output description     36-12

executing     36-11

overview     36-11

poison-reverse updates, IGRP     30-25

policed-DSCP map for QoS     28-53

policers

configuring

for each matched traffic class     28-43

for more than one traffic class     28-49

described     28-4

displaying     28-69

number of     1-5, 28-9

types of     28-8

policing

described     28-4

token bucket algorithm     28-8

policy-based routing

See PBR

policy maps for QoS

characteristics of     28-43

configuring     28-43

described     28-7

displaying     28-69

POP     1-15

port ACLs

and voice VLAN     27-4

defined     27-2

limitations     27-4

Port Aggregation Protocol

See EtherChannel

See PAgP

port-based authentication

authentication server

defined     9-2

RADIUS server     9-2

client, defined     9-2

configuration guidelines     9-10

configuring

manual re-authentication of a client     9-14

quiet period     9-14

RADIUS server     9-13

RADIUS server parameters on the switch     9-12

switch-to-client frame-retransmission number     9-15

switch-to-client retransmission time     9-15

default configuration     9-9

described     9-1

device roles     9-2

displaying statistics     9-17

EAPOL-start frame     9-3

EAP-request/identity frame     9-3

EAP-response/identity frame     9-3

enabling

802.1X authentication     9-10

802.1X with port security     9-16

periodic re-authentication     9-13

per-user ACLs     9-10

VLAN assignment     9-10

encapsulation     9-2

initiation and message exchange     9-3

method lists     9-10

ports

authorization state and dot1x port-control command     9-4

authorized and unauthorized     9-4

voice VLAN     9-5

resetting to default values     9-17

support for     1-4

switch

as proxy     9-2

RADIUS client     9-2

topologies, supported     9-8

with per-user ACLs     9-6

with port security     9-5

with VLAN assignment     9-7

port blocking     1-2, 20-6

port-channel

See EtherChannel

Port Fast

described     17-2

enabling     17-14

mode, spanning tree     11-30

support for     1-3

port icons, Front Panel view     3-6

port LEDs

port modes     3-8

port membership modes, VLAN     11-3

port modes, described     3-8

port pop-up menu, Front Panel view     3-21

port priority

MSTP     16-17

STP     15-15

ports

802.1Q trunk     3-9

802.1Q tunnel     11-3

access     10-3

blocking     20-6

dynamic access     3-9, 11-3

forwarding, resuming     20-7

ISL trunk     3-9

negotiate trunk     3-9

protected     20-5

routed     10-4

secure     20-7

static-access     3-9, 11-3, 11-11

switch     10-2

trunks     11-3, 11-16

VLAN assignments     11-11

port security

aging     20-12

and QoS trusted boundary     28-32

configuring     20-10

default configuration     20-9

described     20-7

displaying     20-14

sticky learning     20-8

violations     20-8

with other features     20-9

port-shutdown response, VMPS     11-27

power, inline     10-14

preferential treatment of traffic

See QoS

prefix lists, BGP     30-55

preventing unauthorized access     8-1

priority

HSRP     31-6

overriding CoS     13-5

trusting CoS     13-6

private VLAN edge ports

See protected ports

privileged EXEC mode     2-2

privilege levels

changing the default for lines     8-9

command switch     6-25

exiting     8-10

logging into     8-10

mapping on member switches     6-25

overview     8-2, 8-8

setting a command with     8-8

protected ports     1-4, 20-5

protocol-dependent modules, EIGRP     30-39

Protocol-Independent Multicast Protocol

See PIM

provider edge devices     30-65

proxy ARP

configuring     30-10

definition     30-8

with IP routing disabled     30-11

pruning, VTP

enabling     12-13

enabling on a port     11-22

examples     12-5

overview     12-4

pruning-eligible list

changing     11-22

for VTP pruning     12-4

VLANs     12-14

publications, related     xxxiv

PVRST     11-2

PVST     11-2

Q

QoS

auto-QoS

categorizing traffic     28-18

configuration and defaults display     28-22

configuration guidelines     28-20

described     28-17

displaying     28-22

effects on NVRAM configuration     28-20

egress queue defaults     28-18

enabling for VoIP     28-21

basic model     28-4

classification

class maps, described     28-7

defined     28-4

flowchart     28-6

forwarding treatment     28-3

in frames and packets     28-3

IP ACLs, described     28-5, 28-7

MAC ACLs, described     28-5, 28-7

pass-through mode, described     28-33

per physical port     28-39

per-port per-VLAN     28-41

policy maps, described     28-7

port default, described     28-5

trust DSCP, described     28-5

trusted CoS, described     28-5

trust IP precedence, described     28-5

types for IP traffic     28-5

types for non-IP traffic     28-5

class maps

configuring per physical port     28-39

configuring per-port per-VLAN     28-41

displaying     28-69

configuration examples

distribution layer     28-72

existing wiring closet     28-70

intelligent wiring closet     28-71

configuration guidelines

auto-QoS     28-20

standard QoS     28-26

configuring

aggregate policers     28-49

auto-QoS     28-17

default port CoS value     28-31

DSCP maps     28-51

DSCP trust states bordering another domain     28-34

egress queues on 10/100 Ethernet ports     28-64

egress queues on Gigabit-capable Ethernet ports     28-57

IP extended ACLs     28-37

IP standard ACLs     28-36

MAC ACLs     28-38

pass-through mode     28-33

policy maps     28-43

port trust states within the domain     28-29

trusted boundary     28-32

default auto configuration     28-18

default standard configuration     28-25

displaying statistics     28-69

enabling globally     28-28

flowcharts

classification     28-6

policing and marking     28-10

queueing and scheduling     28-12, 28-15

implicit deny     28-7

IP phones

automatic classification and queueing     28-17

detection and trusted settings     28-17, 28-32

mapping tables

CoS-to-DSCP     28-52

CoS-to-egress-queue     28-57

displaying     28-69

DSCP-to-CoS     28-54

DSCP-to-DSCP-mutation     28-55

DSCP-to-threshold     28-60

IP-precedence-to-DSCP     28-52

policed-DSCP     28-53

types of     28-10

marked-down actions     28-46

marking, described     28-4, 28-8

overview     28-2

packet modification     28-17

pass-through mode     28-33

policers

configuring     28-46, 28-49

described     28-8

displaying     28-69

number of     28-9

types of     28-8

policies, attaching to an interface     28-9

policing

described     28-4, 28-8

token bucket algorithm     28-8

policy maps

characteristics of     28-43

configuring     28-43

displaying     28-69

queueing, defined     28-4

queues

CoS-to-egress-queue map     28-57

for 10/100 Ethernet ports     28-15

high priority (expedite)     28-13, 28-62

minimum-reserve levels     28-65

serviced by WRR     28-13, 28-16

size of     28-12, 28-15

size ratios     28-58

tail-drop threshold percentages     28-13, 28-59

WRED drop-percentage thresholds     28-13, 28-61

WRR scheduling     28-63

scheduling

allocating bandwidth on 10/100 Ethernet ports     28-67

allocating bandwidth on Gigabit-capable ports     28-63

defined     28-4

support for     1-5

tail drop

configuring drop threshold percentages     28-59

described     28-13

trust states

bordering another domain     28-34

described     28-5

trusted device     28-32

within the domain     28-29

WRED

configuring drop-percentage thresholds     28-61

described     28-14

WRR scheduling     28-63

quality of service

See QoS

queries, IGMP     19-3

R

RADIUS

attributes

vendor-proprietary     8-31

vendor-specific     8-29

configuring

accounting     8-28

authentication     8-23

authorization     8-27

communication, global     8-21, 8-29

communication, per-server     8-20, 8-21

multiple UDP ports     8-21

default configuration     8-20

defining AAA server groups     8-25

displaying the configuration     8-31

identifying the server     8-20

in clusters     6-17

limiting the services to the user     8-27

method list, defined     8-20

operation of     8-19

overview     8-18

suggested network environments     8-18

tracking services accessed by user     8-28

Random Early Detection, described     28-14

range

macro     10-10

of interfaces     10-8

Rapid Spanning Tree Protocol

See RSTP

RARP     30-8

rcommand command     6-25

RCP

configuration files

downloading     B-17

overview     B-16

preparing the server     B-16

uploading     B-18

image files

deleting old image     B-32

downloading     B-30

preparing the server     B-29

uploading     B-32

reconfirmation interval, VMPS, changing     11-32

recovery procedures     36-1

redundancy

EtherChannel     29-2

features     1-3

HSRP     31-1

STP

backbone     15-9

multidrop backbone     17-5

path cost     11-25

port priority     11-24

redundant clusters

See cluster standby group

redundant links and UplinkFast     17-17

reliable transport protocol, EIGRP     30-38

reloading software     4-17

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

removing secure addresses     7-26

resets, in BGP     30-50

resetting a UDLD-shutdown interface     22-5

restricting access

NTP services     7-7

overview     8-1

passwords and privilege levels     8-2

RADIUS     8-18

TACACS+     8-10

retry count, VMPS, changing     11-33

reverse address resolution     30-8

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP     30-19

1112, IP multicast and IGMP     19-2

1157, SNMPv1     26-2

1163, BGP     30-44

1166, IP addresses     30-5

1253, OSPF     30-29

1267, BGP     30-44

1305, NTP     7-2

1587, NSSAs     30-29

1757, RMON     24-2

1771, BGP     30-44

1901, SNMPv2C     26-2

1902 to 1907, SNMPv2     26-2

2236, IP multicast and IGMP     19-2

2273-2275, SNMPv3     26-2

RIP

advertisements     30-19

authentication     30-22

configuring     30-20

default configuration     30-19

described     30-19

hop counts     30-19

split horizon     30-22

summary addresses     30-22

support for     1-5

RMON

default configuration     24-3

displaying status     24-6

enabling alarms and events     24-3

groups supported     24-2

overview     24-1

statistics

collecting group Ethernet     24-5

collecting group history     24-5

support for     1-6

root guard

described     17-12

enabling     17-20

support for     1-3

root switch

MSTP     16-14

STP     15-12

route calculation timers, OSPF     30-35

route dampening, BGP     30-62

routed packets, ACLs on     27-39

routed ports

configuring     30-3

defined     10-4

in switch clusters     6-10

IP addresses on     10-18, 30-3

route-map command

for policy-based routing     30-84

route maps

policy-based routing, defined     30-83

route maps, BGP     30-53

router ACLs     27-2

route reflectors, BGP     30-61

router ID, OSPF     30-36

route selection, BGP     30-51

route summarization, OSPF     30-34

route targets, VPN     30-67

routing

default     30-2

dynamic     30-2

redistribution of information     30-79

static     30-2

routing domain confederation, BGP     30-60

Routing Information Protocol

See RIP

routing protocol administrative distances     30-77

RPS LED      3-7

RSPAN

configuration guidelines     23-16

default configuration     23-8

destination ports     23-5

displaying status     23-23

IDS     23-2

interaction with other features     23-7

monitored ports     23-4

monitoring ports     23-5

overview     1-6, 23-1

received traffic     23-3

reflector port     23-5

session limits     23-8

sessions

creating     23-17

defined     23-3

limiting source traffic to specific VLANs     23-22

monitoring VLANs     23-21

removing source (monitored) ports     23-20

specifying monitored ports     23-17

source ports     23-4

transmitted traffic     23-4

VLAN-based     23-6

RSTP

active topology, determining     16-2

BPDU

format     16-5

processing     16-6

configuration guidelines     16-12

designated port, defined     16-2

designated switch, defined     16-2

interoperability with 802.1D

described     16-11

restarting migration process     16-22

topology changes     16-6

overview     16-2

port roles

described     16-2

synchronized     16-4

proposal-agreement handshake process     16-3

rapid convergence

edge ports and Port Fast     16-3

point-to-point links     16-3, 16-22

root ports     16-3

root port, defined     16-2

See also MSTP

running configuration, saving     4-10

S

SC (standby command switch)     6-13, 6-22

scheduled reloads     4-17

SDM

configuring     7-29

described     7-27

templates

number of     7-27

resources used for Fast Ethernet switches     7-28

resources used for Gigabit Ethernet switches     7-28

sdm prefer extended-match command     30-68

secure addresses

adding     7-26

described     7-26

secure ports, configuring     20-7

secure remote connections     8-37

Secure Shell

See SSH

security, port     20-7

security features     1-4

sequence numbers in log messages     25-8

server mode, VTP     12-3

service-provider network

DHCP option 82     18-1

MSTP and RSTP     16-1

service-provider networks

and 802.1Q tunneling     14-1

and customer VLANs     14-2

Layer 2 protocols across     14-7

set-request operation     26-4

setup program, failed command switch replacement     36-7, 36-8

severity levels, defining in system messages     25-8

show access-lists hw-summary command     27-7

show cdp traffic command     21-5

show cluster members command     6-25

show configuration command     10-17

show fm command     27-43

show forward command     36-19

show interfaces command     10-14, 10-17

show l2protocol command     14-11

show mac access-group command     27-28

show running-config command

displaying ACLs     27-20, 27-30, 27-33

interface description in     10-17

show tcam command     27-43

shutdown command on interfaces     10-22

shutdown threshold for Layer 2 protocol packets     14-9

Simple Network Management Protocol

See SNMP

SNAP     21-1

SNMP

accessing MIB variables with     26-4

agent

described     26-4

disabling     26-7

community strings

configuring     26-7

for cluster switches     26-4

overview     26-4

configuration examples     26-15

default configuration     26-6

groups     26-9

in-band management     1-3

in clusters     6-17

informs

and trap keyword     26-11

described     26-5

differences from traps     26-5

enabling     26-13

limiting access by TFTP servers     26-14

limiting system log messages to NMS     25-10

manager functions     1-7, 26-3

managing clusters with     6-26

MIBs

location of     A-3

supported     A-1

notifications     26-5

overview     26-1, 26-4

status, displaying     26-16

system contact and location     26-14

trap manager, configuring     26-12

traps

described     26-3, 26-5

differences from informs     26-5

enabling     26-11

enabling MAC address notification     7-23

overview     26-1, 26-4

types of     26-11

users     26-9

versions supported     26-2

snooping, IGMP     19-1

software images

location in Flash     B-20

recovery procedures     36-2

scheduling reloads     4-17

tar file format, described     B-20

See also downloading and uploading

source addresses, in ACLs     27-12

SPAN

configuration guidelines     23-9

default configuration     23-8

destination ports     23-5

displaying status     23-23

IDS     23-2

interaction with other features     23-7

monitored ports     23-4

monitoring ports     23-5

overview     1-6, 23-1

received traffic     23-3

session limits     23-8

sessions

creating     23-10

defined     23-3

limiting source traffic to specific VLANs     23-15

monitoring VLANs     23-14

removing destination (monitoring) ports     23-13

removing source (monitored) ports     23-13

specifying monitored ports     23-10

source ports     23-4

transmitted traffic     23-4

VLAN-based     23-6

spanning tree and native VLANs     11-18

Spanning Tree Protocol

See STP

speed, configuring on interfaces     10-13

split horizon

IGRP     30-28

RIP     30-22

SSH

configuring     8-38

cryptographic software image     8-37

described     8-37

displaying settings     8-38

Stack Membership Discovery Protocol     17-6

Standby Command Configuration window     6-23

standby command switch

configuring      6-22

considerations     6-13

defined     6-2

priority     6-13

requirements     6-3

virtual IP address     6-13

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

standby ip command     31-4

standby router     31-1

standby timers, HSRP     31-8

startup configuration

booting

manually     4-13

specific image     4-14

clearing     B-19

configuration file

automatically downloading     4-12

specifying the filename     4-13

default boot configuration     4-12

static access mode     3-9

static access ports

assigning to VLAN     11-11

defined     10-3, 11-3

static addresses

See addresses

static IP routing     1-6

static MAC addressing     1-4

static routes, configuring     30-77

static routing     30-2

static VLAN membership     11-2

statistics

802.1X     9-17

CDP     21-5

interface     10-20

IP multicast routing     33-58

OSPF     30-37

QoS ingress and egress     28-69

RMON group Ethernet     24-5

RMON group history     24-5

SNMP input and output     26-16

VTP     12-15

sticky learning

configuration file     20-8

defined     20-8

disabling     20-8

enabling     20-8

saving addresses     20-8

storm control

configuring     20-3

described     20-1

displaying     20-14

thresholds     20-2

STP

accelerating root port selection     17-4

BackboneFast

described     17-10

enabling     17-19

BPDU filtering

described     17-3

enabling     17-16

BPDU guard

described     17-3

enabling     17-15

BPDU message exchange     15-2

configuration guidelines     15-11

configuring

forward-delay time     15-19

hello time     15-18

in cascaded stack     15-20

maximum aging time     15-19

path cost     15-16

port priority     15-15, 16-17

root switch     15-12

secondary root switch     15-14

switch priority     15-17

cross-stack UplinkFast

described     17-5

enabling     17-18

default configuration     15-10

default optional feature configuration     17-14

designated port, defined     15-3

designated switch, defined     15-3

detecting indirect link failures     17-10

disabling     15-11

displaying status     15-20

EtherChannel guard

described     17-12

enabling     17-19

extended system ID

affects on root switch     15-12

affects on the secondary root switch     15-14

overview     15-4

unexpected behavior     15-13

features supported     1-3

inferior BPDU     15-3

interface state, blocking to forwarding     17-2

interface states

blocking     15-7

disabled     15-8

forwarding     15-6, 15-7

learning     15-7

listening     15-7

overview     15-5

Layer 2 protocol tunneling     14-7

limitations with 802.1Q trunks     15-8

load sharing

overview     11-23

using path costs     11-25

using port priorities     11-24

loop guard

described     17-13

enabling     17-20

multicast addresses, affect of     15-8

optional features supported     1-3

overview     15-2

path costs     11-25, 11-26

Port Fast

described     17-2

enabling     17-14

port priorities     11-24

preventing root switch selection     17-12

redundant connectivity     15-9

root guard

described     17-12

enabling     17-20

root port, defined     15-3

root switch

affects of extended system ID     15-4, 15-12

configuring     15-12

election     15-3

unexpected behavior     15-13

settings in a cascaded stack     15-20

shutdown Port Fast-enabled port     17-3

superior BPDU     15-3

supported number of spanning-tree instances     15-2

timers, described     15-4

UplinkFast

described     17-4

enabling     17-17

VLAN-bridge     15-8

stratum, NTP     7-2

stub areas, OSPF     30-33

subnet mask     30-5

subnet zero     30-6

summer time     7-13

SunNet Manager     1-7

supernet     30-7

SVIs

and IP unicast routing     30-3

and router ACLs     27-3

connecting VLANs     10-6

defined     10-4

routing between VLANs     11-2

switch clustering technology

See clusters, switch

switch console port     1-3

switched packets, ACLs on     27-37

switched ports     10-2

Switch Manager     3-4

See also Device Manager

switchport block multicast command     20-6

switchport block unicast command     20-6

switchport command     10-11

switchport mode dot1q-tunnel command     14-6

switchport protected command     20-5

switch priority

MSTP     16-19

STP     15-17

switch software features     1-1

switch virtual interface

See SVI

synchronization, BGP     30-48

syslog

See system message logging

system clock

configuring

daylight saving time     7-13

manually     7-11

summer time     7-13

time zones     7-12

displaying the time and date     7-11

overview     7-1

See also NTP

System Database Management

See SDM

system message logging

default configuration     25-3

defining error message severity levels     25-8

disabling     25-4

displaying the configuration     25-12

enabling     25-4

facility keywords, described     25-12

level keywords, described     25-9

limiting messages     25-10

message format     25-2

overview     25-1

sequence numbers, enabling and disabling     25-8

setting the display destination device     25-4

synchronizing log messages     25-6

syslog facility     1-6

timestamps, enabling and disabling     25-7

UNIX syslog servers

configuring the daemon     25-11

configuring the logging facility     25-11

facilities supported     25-12

system messages on CMS     3-18

system MTU

802.1Q tunneling     14-5

maximums     14-5

system name

default configuration     7-15

default setting     7-15

manual configuration     7-15

See also DNS

system prompt

default setting     7-15

manual configuration     7-16

system resource templates     7-27

system routes, IGRP     30-24

T

tables, CMS     3-28

tabs, CMS     3-28

TACACS+

accounting, defined     8-11

authentication, defined     8-11

authorization, defined     8-11

configuring

accounting     8-17

authentication key     8-13

authorization     8-16

login authentication     8-14

default configuration     8-13

displaying the configuration     8-17

identifying the server     8-13

in clusters     6-17

limiting the services to the user     8-16

operation of     8-12

overview     8-10

support for     1-4

tracking services accessed by user     8-17

tagged packets

802.1Q     14-3

Layer 2 protocol     14-7

tail drop

described     28-13

support for     1-5

tar files

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

TCAMs

ACL regions     27-47

ACLs not loading in     27-45

allocations, monitoring     27-48

monitoring usage     27-47

Telnet

accessing management interfaces     2-10

from a browser     2-10

number of connections     1-2

setting a password     8-6

templates, system resources     7-27

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password     8-6

ternary content addressable memory. See TCAM

TFTP

configuration files

downloading     B-11

preparing the server     B-10

uploading     B-12

configuration files in base directory     4-6

configuring for autoconfiguration     4-5

image files

deleting     B-23

downloading     B-22

preparing the server     B-21

uploading     B-24

limiting access by servers     26-14

TFTP server     1-2

threshold, traffic level     20-2

time

See NTP and system clock

time-range command     27-17

time ranges in ACLs     27-17

timestamps in log messages     25-7

time zones     7-12

Token Ring VLANs

support for     11-5

VTP support     12-4

toolbar     3-19

tool tips     3-25

Topology view

described     3-2, 3-10

device icons     3-12

device labels     3-12

display options     3-13

icons     3-11

link labels     3-12

TOS     1-5

traceroute, Layer 2

and ARP     36-16

and CDP     36-15

described     36-15

IP addresses and subnets     36-16

MAC addresses and VLANs     36-15

multicast traffic     36-15

multiple devices on a port     36-16

supported switches     36-15

unicast traffic     36-15

usage guidelines     36-15

traceroute command     36-13

See also IP traceroute

traffic

blocking flooded     20-6

fragmented     27-5

unfragmented     27-5

traffic policing     1-5

traffic suppression     20-2

transparent mode, VTP     12-3, 12-11

trap-door mechanism     4-2

traps

configuring MAC address notification     7-23

configuring managers     26-11

defined     26-3

enabling     7-23, 26-11

notification types     26-11

overview     26-1, 26-4

troubleshooting

connectivity problems     36-11

detecting unidirectional links     22-1

determining packet disposition     36-19

displaying crash information     36-20

GBIC security and identification     36-10

PIMv1 and PIMv2 interoperability problems     33-28

show forward command     36-19

with CiscoWorks     26-4

with debug commands     36-16

with ping     36-11

with system message logging     25-1

with traceroute     36-13

trunking encapsulation     1-4

trunk ports

configuring     11-20

defined     10-3, 11-3

encapsulation     11-20, 11-25, 11-26

trunks

allowed-VLAN list     11-21

configuring     11-20, 11-25, 11-26

ISL     11-16

load sharing

setting STP path costs     11-25

using STP port priorities     11-24

native VLAN for untagged traffic     11-22

parallel     11-25

pruning-eligible list     11-22

to non-DTP device     11-16

understanding     11-16

trusted boundary for QoS     28-32

tunneling

802.1Q     14-1

defined     14-1

Layer 2 protocol     14-7

tunnel ports

802.1Q, configuring     14-6

802.1Q and ACLs     27-3

defined     11-3

described     10-4, 14-1

incompatibilities with other features     14-5

twisted-pair Ethernet, detecting unidirectional links     22-1

type-of-service

See TOS

U

UDLD

default configuration     22-3

echoing detection mechanism     22-2

enabling

globally     22-4

per interface     22-4

link-detection mechanism     22-1

neighbor database     22-2

overview     22-1

resetting an interface     22-5

status, displaying     22-6

support for     1-3

UDP, configuring     30-15

unauthorized ports with 802.1X     9-4

unequal-cost load balancing, IGRP     30-25

unicast storm control command     20-3

unicast storms     20-1

unicast traffic, blocking     20-6

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration     25-11

facilities supported     25-12

message logging configuration     25-11

unrecognized Type-Length-Value (TLV) support     12-4

upgrading software images

See downloading

UplinkFast

described     17-4

enabling     17-17

support for     1-3

uploading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-15

using RCP     B-18

using TFTP     B-12

image files

preparing     B-21, B-25, B-29

reasons for     B-19

using FTP     B-28

using RCP     B-32

using TFTP     B-24

User Datagram Protocol

See UDP

user EXEC mode     2-2

username-based authentication     8-7

V

version-dependent transparent mode     12-4

virtual IP address

cluster standby group     6-13, 6-22

command switch     6-13, 6-22

See also IP addresses

Virtual Private Network

See VPN

virtual router     31-1, 31-2

vlan.dat file     11-4

VLAN ACLs

See VLAN maps

VLAN configuration

at bootup     11-7

saving     11-7

VLAN configuration mode     2-2, 11-6

VLAN database

and startup configuration file     11-7

and VTP     12-1

VLAN configuration saved in     11-7

VLANs saved in     11-4

vlan database command     11-6

vlan dot1q tag native command     14-4

vlan global configuration command     11-6

VLAN management domain     12-2

VLAN Management Policy Server

See VMPS

VLAN map entries, order of     27-30

VLAN maps

applying     27-33

common uses for     27-33

configuration example     27-34

configuration guidelines     27-30

configuring     27-29

creating     27-30

defined     27-2

denying access example     27-35

denying and permitting packets     27-31

displaying     27-42

examples     27-35

support for     1-4

usage     27-4

VLAN membership

confirming     11-32

modes     11-3

VLAN Query Protocol

See VQP

VLANs

adding     11-8

adding to VLAN database     11-8

aging dynamic addresses     15-9

allowed on trunk     11-21

and spanning-tree instances     11-2, 11-6, 11-13

configuration guidelines, normal-range VLANs     11-5

configuration options     11-6

configuring     11-1

configuring IDs 1006 to 4094     11-12

connecting through SVIs     10-6

creating in config-vlan mode     11-8

creating in VLAN configuration mode     11-9

customer numbering in service-provider networks     14-3

default configuration     11-7

deleting     11-10

described     10-2, 11-1

displaying     11-15

extended-range     11-1, 11-12

features     1-3

illustrated     11-2

internal     11-13

limiting source traffic with RSPAN     23-22

limiting source traffic with SPAN     23-15

modifying     11-8

monitoring with RSPAN     23-21

monitoring with SPAN     23-14

native, configuring     11-22

normal-range     11-1, 11-4

number supported     1-3

parameters     11-4

port membership modes     11-3

static-access ports     11-11

STP and 802.1Q trunks     15-8

supported     11-2

Token Ring     11-5

traffic between     11-2

VLAN-bridge STP     15-8, 35-1

VTP modes     12-3

VLAN Trunking Protocol

See VTP

VLAN trunks     11-16

VMPS

administering     11-33

configuration example     11-34

configuration guidelines     11-30

default configuration     11-30

description     11-27

dynamic port membership

described     11-28

reconfirming     11-32

troubleshooting     11-34

entering server address     11-31

mapping MAC addresses to VLANs     11-27

monitoring     11-33

reconfirmation interval, changing     11-32

reconfirming membership     11-32

retry count, changing     11-33

voice VLAN

Cisco 7960 phone, port connections     13-1

configuration guidelines     13-3

configuring IP phones for data traffic

override CoS of incoming frame     13-5

trust CoS priority of incoming frame     13-6

configuring ports for voice traffic in

802.1P priority tagged frames     13-4

802.1Q frames     13-4

connecting to an IP phone     13-3

default configuration     13-2

described     13-1

displaying     13-6

VPN

configuring routing in     30-70

forwarding     30-67

in service provider networks     30-65

routes     30-65

VPN routing and forwarding table

See VRF

VQP     1-3, 11-27

VRF

defining     30-67

tables     30-65

VTP

adding a client to a domain     12-14

advertisements     11-19, 12-3

and extended-range VLANs     12-1

and normal-range VLANs     12-1

client mode, configuring     12-10

configuration

global configuration mode     12-7

guidelines     12-8

privileged EXEC mode     12-7

requirements     12-9

saving     12-7

VLAN configuration mode     12-7

configuration mode options     12-7

configuration requirements     12-9

configuration revision number

guideline     12-14

resetting     12-14

configuring

client mode     12-10

server mode     12-9

transparent mode     12-11

consistency checks     12-4

default configuration     12-6

described     12-1

disabling     12-11

domain names     12-8

domains     12-2

Layer 2 protocol tunneling     14-7

modes

client     12-3, 12-10

server     12-3, 12-9

transitions     12-3

transparent     12-3, 12-11

monitoring     12-15

passwords     12-8

pruning

disabling     12-13

enabling     12-13

examples     12-5

overview     12-4

support for     1-4

pruning-eligible list, changing     11-22

server mode, configuring     12-9

statistics     12-15

support for     1-4

Token Ring support     12-4

transparent mode, configuring     12-11

using     12-1

version, guidelines     12-8

version 1     12-4

version 2

configuration guidelines     12-8

disabling     12-13

enabling     12-12

overview     12-4

W

WCCP

authentication     32-4

configuration guidelines     32-5

default configuration     32-5

described     32-2

displaying     32-9

enabling     32-6

features unsupported     32-4

forwarding method     32-3

Layer-2 header rewrite     32-3

MD5 security     32-4

message exchange     32-3

monitoring and maintaining     32-9

negotiation     32-3

packet redirection     32-4

packet-return method     32-3

redirecting traffic received from a client     32-6

setting the password     32-6

unsupported WCCPv2 features     32-4

web-based management software

See CMS

Web Cache Communication Protocol

See WCCP

Weighted Random Early Detection

See WRED

Weighted Round Robin

See WRR

weighted round robin, described     28-4

window components, CMS     3-26

wizards     1-8, 3-25

WRED     1-5, 28-14

WRR     1-5, 28-4

X

XMODEM protocol     36-2