Catalyst 3550 Multilayer Switch Software Configuration Guide, Release 12.1(20)EA2
Index
Downloads: This chapterpdf (PDF - 1.57MB) The complete bookPDF (PDF - 11.09MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

144-bit Layer 3 TCAM     7-29, 31-68

802.1D

See STP

802.1Q

and trunk ports     10-3

configuration limitations     12-18

encapsulation     12-16

native VLAN for untagged traffic     12-23

tunneling

compatibility with other features     15-5

defaults     15-4

described     15-1

tunnel ports and ACLs     28-3

tunnel ports with other features     15-6

802.1s

See MSTP

802.1w

See RSTP

802.1x

See port-based authentication

802.3z flow control     10-15

A

abbreviating commands     2-3

ABRs     31-29

AC (command switch)     6-11, 6-21

access-class command     28-20

access control entries

See ACEs

access-denied response, VMPS     12-27

access groups

IP     28-21

Layer 3     28-21

accessing

clusters, switch     6-14

command switches     6-12

member switches     6-14

switch clusters     6-14

access lists

See ACLs

access ports

and Layer 2 protocol tunneling     15-10

defined     10-3

in switch clusters     6-10

accounting

with 802.1x     9-5, 9-21

with RADIUS     8-28

with TACACS+     8-11, 8-17

ACEs

and QoS     29-7

defined     28-2

Ethernet     28-2

IP     28-2

ACLs

ACEs     28-2

and logging     28-7

any keyword     28-13

applying

on bridged packets     28-38

on multicast packets     28-39

on routed packets     28-38

on switched packets     28-37

time ranges to     28-17

to Layer 2 and Layer 3 interfaces     28-20

to QoS     29-7

classifying traffic for QoS     29-37

comments in     28-19

compatibility on the same switch     28-2

compiling     28-21

configuration conflict examples     28-43

configuring with VLAN maps     28-36

defined     28-1

examples, not fitting in hardware     28-44

examples of     28-21, 29-37

extended IP

configuring for QoS classification     29-38

creating     28-11

matching criteria     28-8

feature manager     28-42

hardware and software handling     28-6

hardware support for     28-6

host keyword     28-13

IP

applying to interface     28-19

creating     28-8

defined     28-8

fragments and QoS guidelines     29-28

implicit deny     28-10, 28-14, 28-16

implicit masks     28-10

matching criteria     28-8

matching criteria for port ACLs     28-4

matching criteria for router ACLs     28-3

named     28-15

options and QoS guidelines     29-28

undefined     28-21

violations, logging     28-16

virtual terminal lines, setting on     28-19

limiting actions     28-37

logging messages     28-10

log keyword     28-16

MAC extended     28-26, 29-39

matching     28-8, 28-21, 28-28

merge failure examples     28-45

monitoring     28-40

named     28-15

not fitting in hardware     28-44

number per QoS class map     29-28

numbers     28-8

policy maps and QoS classification     29-28

port

and voice VLAN     28-4

defined     28-2

limitations     28-4

QoS     29-7, 29-37

router     28-2

standard IP

configuring for QoS classification     29-37

creating     28-9

matching criteria     28-8

support for     1-5

time ranges     28-17

undefined     28-28

unsupported features     28-7

using router ACLs with VLAN maps     28-36

VLAN maps

configuration guidelines     28-30

configuring     28-29

defined     28-4

active router     32-1

addresses

displaying the MAC address table     7-28

dynamic

accelerated aging     16-8

changing the aging time     7-23

default aging     16-8

defined     7-21

learning     7-22

preventing frame forwarding     36-5

removing     7-24

filtering frames by MAC address     36-6

MAC, discovering     7-32

multicast

group address range     34-1, 34-3

STP address management     16-8

static

adding and removing     7-26

defined     7-21

address resolution     7-32, 31-8

Address Resolution Protocol

See ARP

See ARP table

adjacency tables, with CEF     31-76

administrative distances

defined     31-86

OSPF     31-34

routing protocol defaults     31-78

advertisements

CDP     22-1

IGRP     31-24

RIP     31-19

VTP     12-19, 13-3

aggregate addresses, BGP     31-60

aggregated ports

See EtherChannel

aggregate policers     29-50

aggregate policing     1-6

aging, accelerating     16-8

aging time

accelerated

for MSTP     17-20

for STP     16-8, 16-22

bridge table for fallback bridging     36-6

MAC address table     7-23

maximum

for MSTP     17-21

for STP     16-22

alarms, RMON     25-3

allowed-VLAN list     12-21

alternate routes, IGRP     31-25

area border routers

See ABRs

ARP

configuring     31-9

defined     31-8

encapsulation     31-10

static cache configuration     31-9

support for     1-3

ARP table

address resolution     7-32

managing     7-32

ASBRs     31-29

AS-path filters, BGP     31-54

asymmetrical links, and 802.1Q tunneling     15-4

attributes, RADIUS

vendor-proprietary     8-31

vendor-specific     8-29

audience     xxxv

authentication

EIGRP     31-42

HSRP     32-9

local mode with AAA     8-36

NTP associations     7-4

RADIUS

key     8-21

login     8-23

TACACS+

defined     8-11

key     8-13

login     8-14

See also port-based authentication

authentication keys, and routing protocols     31-87

authoritative time source, described     7-2

authorization

with RADIUS     8-27

with TACACS+     8-11, 8-16

authorized ports with 802.1x     9-4

autoconfiguration     4-3

automatic discovery

adding member switches     6-18

considerations

beyond a non-candidate device     6-8, 6-9

brand new switches     6-10

connectivity     6-5

different VLANs     6-7

management VLANs     6-7, 6-8

non-CDP-capable devices     6-6

non-cluster-capable devices     6-6

routed ports     6-9

creating a cluster standby group     6-20

in switch clusters     6-5

See also CDP

automatic QoS

See QoS

automatic recovery, clusters     6-11

See also HSRP

autonegotiation

duplex mode     1-2

interface configuration guidelines     10-13

mismatches     37-10

autonomous system boundary routers

See ASBRs

autonomous systems, in BGP     31-48

Auto-RP, described     34-5

autosensing, port speed     1-2

auxiliary VLAN

See voice VLAN

B

BackboneFast

described     18-9

enabling     18-19

support for     1-3

bandwidth for QoS

allocating     29-64

described     29-13

banners

configuring

login     7-21

message-of-the-day login     7-20

default configuration     7-19

when displayed     7-19

BGP

aggregate addresses     31-60

aggregate routes, configuring     31-60

CIDR     31-60

clear commands     31-63

community filtering     31-56

configuring neighbors     31-58

default configuration     31-46

described     31-45

enabling     31-48

monitoring     31-63

multipath support     31-51

neighbors, types of     31-48

path selection     31-51

peers, configuring     31-58

prefix filtering     31-55

resetting sessions     31-50

route dampening     31-62

route maps     31-53

route reflectors     31-61

routing domain confederation     31-60

routing session with multi-VRF CE     31-70

show commands     31-63

supernets     31-60

support for     1-6

Version 4     31-45

binding cluster group and HSRP group     32-10

binding database, DHCP snooping

See DHCP snooping binding database

binding table, DHCP snooping

See DHCP snooping binding database

blocking packets     21-6

booting

boot loader, function of     4-2

boot process     4-1

manually     4-12

specific image     4-13

boot loader

accessing     4-14

described     4-2

environment variables     4-14

prompt     4-14

trap-door mechanism     4-2

bootstrap router (BSR), described     34-5

Border Gateway Protocol

See BGP

BPDU

error-disabled state     18-2

filtering     18-3

RSTP format     17-9

BPDU filtering

described     18-3

enabling     18-16

support for     1-4

BPDU guard

described     18-2

enabling     18-15

support for     1-4

bridged packets, ACLs on     28-38

bridge groups

See fallback bridging

bridge protocol data unit

See BPDU

broadcast flooding     31-16

broadcast packets

directed     31-13

flooded     31-13

broadcast storm-control command     21-3

broadcast storms     21-1, 31-13

browser configuration     6-1

C

cables, monitoring for unidirectional links     23-1

cache engines, redirecting traffic to     33-1

CAMs, ACLs not loading in     28-44

candidate switch

adding     6-18

automatic discovery     6-5

defined     6-3

HC     6-21

passwords     6-18

requirements     6-3

standby group     6-20

See also command switch, cluster standby group, and member switch

caution, described     xxxvi

CC (command switch)     6-21

CDP

and trusted boundary     29-33

automatic discovery in switch clusters     6-5

configuring     22-2

default configuration     22-2

described     22-1

disabling for routing device     22-3, 22-4

enabling and disabling

on an interface     22-4

on a switch     22-3

Layer 2 protocol tunneling     15-7

monitoring     22-5

overview     22-1

support for     1-3

transmission timer and holdtime, setting     22-2

updates     22-2

CEF     31-76

CGMP

as IGMP snooping learning method     20-8

clearing cached group entries     34-52

enabling server support     34-32

joining multicast group     20-3

overview     34-8

server support only     34-8

switch support of     1-2

CIDR     31-60

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco Intelligence Engine 2100 Series Configuration Registrar

See IE2100

Cisco IOS File System

See IFS

Cisco Networking Services

See IE2100

CiscoWorks 2000     1-8, 27-4

classless interdomain routing

See CIDR

classless routing     31-7

class maps for QoS

configuring per physical port     29-40

configuring per-port per-VLAN     29-42

described     29-7

displaying     29-70

class of service

See CoS

clearing interfaces     10-20

CLI

abbreviating commands     2-3

command modes     2-1

described     1-8

editing features

enabling and disabling     2-6

keystroke editing     2-6

wrapped lines     2-7

error messages     2-4

filtering command output     2-8

getting help     2-3

history

changing the buffer size     2-4

described     2-4

disabling     2-5

recalling commands     2-5

managing clusters     6-23

no and default forms of commands     2-3

client mode, VTP     13-3

clock

See system clock

clusters, switch

accessing     6-14

adding member switches     6-18

automatic discovery     6-5

automatic recovery     6-11

benefits     1-8

command switch configuration     6-17

compatibility     6-4

creating     6-17

creating a cluster standby group     6-20

described     6-1

LRE profile considerations     6-16

managing

through CLI     6-23

through SNMP     6-24

planning     6-4

planning considerations

automatic discovery     6-5

automatic recovery     6-11

CLI     6-23

host names     6-14

IP addresses     6-14

LRE profiles     6-16

passwords     6-15

RADIUS     6-15

SNMP     6-15, 6-24

switch-specific features     6-16

TACACS+     6-15

redundancy     6-20

troubleshooting     6-23

verifying     6-22

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

cluster standby group

and HSRP group     32-10

automatic recovery     6-13

considerations     6-12

creating     6-20

defined     6-2

requirements     6-3

virtual IP address     6-12

See also HSRP

CMS

benefits     1-8

configuration modes     3-5

described     1-1, 1-7

Front Panel view

described     3-2

menu bar, variations     3-4

operating systems and supported browsers     3-8

requirements     3-8 to  3-9

Topology view     3-13

wizards     3-6

Coarse Wave Division Multiplexer GBIC modules

See CWDM GBIC modules

command-line interface

See CLI

command modes     2-1

commands

abbreviating     2-3

no and default     2-3

setting privilege levels     8-8

command switch

accessing     6-12

active (AC)     6-11, 6-21

command switch with HSRP disabled (CC)     6-21

configuration conflicts     37-10

defined     6-2

enabling     6-17

passive (PC)     6-11, 6-21

password privilege levels     6-24

priority     6-11

recovery

from command-switch failure     6-11

from failure     37-6

from lost member connectivity     37-10

redundant     6-11, 6-20

replacing

with another switch     37-9

with cluster member     37-7

requirements     6-3

standby (SC)     6-11, 6-21

See also candidate switch, cluster standby group, member switch, and standby command switch

community list, BGP     31-57

community strings

configuring     6-15, 27-7

for cluster switches     27-4

in clusters     6-15

overview     27-4

SNMP     6-15

config.text     4-11

configuration conflicts

ACL, displaying     28-43

recovering from lost member connectivity     37-10

configuration examples, network     1-9

configuration files

clearing the startup configuration     B-18

creating using a text editor     B-9

default name     4-11

deleting a stored configuration     B-19

described     B-8

downloading

automatically     4-12

preparing     B-10, B-12, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-16

using TFTP     B-11

guidelines for creating and using     B-8

invalid combinations when copying     B-5

limiting TFTP server access     27-15

obtaining with DHCP     4-7

password recovery disable considerations     8-5

specifying the filename     4-12

system contact and location information     27-15

types and location     B-9

uploading

preparing     B-10, B-12, B-16

reasons for     B-8

using FTP     B-14

using RCP     B-17

using TFTP     B-11

VMPS database     12-28

configuration guidelines, multi-VRF CE     31-68

configuration modes, CMS     3-5

configuration settings, saving     4-11

configure terminal command     10-7

configuring inline power     10-14

config-vlan mode     2-2, 12-6

conflicts, configuration     37-10

congestion-avoidance techniques     29-12

congestion-management techniques     29-12, 29-15

connections, secure remote     8-38

connectivity problems     37-11

consistency checks in VTP version 2     13-4

console port, connecting to     2-9

content-routing technology

See WCCP

conventions

command     xxxvi

for examples     xxxvi

publication     xxxvi

text     xxxvi

CoS

in Layer 2 frames     29-2

override priority     14-5

trust priority     14-6

CoS-to-DSCP map for QoS     29-53

CoS-to-egress-queue map     29-58

counters, clearing interface     10-20

CPU q, in show forward command output     37-20

crashinfo file     37-20

cross-stack UplinkFast, STP

connecting stack ports     18-8

described     18-5

enabling     18-18

fast-convergence events     18-7

Fast Uplink Transition Protocol     18-6

limitations     18-8

normal-convergence events     18-7

Stack Membership Discovery Protocol     18-6

support for     1-3

cryptographic software image

Kerberos     8-32

SSH     8-37

customer edge devices     31-65

CWDM GBIC modules, network example     1-17

CWDM OADM modules     1-17

D

daylight saving time     7-14

debugging

enabling all system diagnostics     37-17

enabling for a specific feature     37-16

redirecting error message output     37-17

using commands     37-16

default commands     2-3

default configuration

802.1Q tunneling     15-4

802.1x     9-10

auto-QoS     29-18

banners     7-19

BGP     31-46

booting     4-11

CDP     22-2

DHCP     19-6

DHCP option 82     19-6

DHCP snooping     19-6

DNS     7-18

EIGRP     31-39

EtherChannel     30-8

fallback bridging     36-3

HSRP     32-4

IGMP     34-26

IGMP filtering     20-21

IGMP snooping     20-7

IGMP throttling     20-21

IGRP     31-25

initial switch information     4-3

IP addressing, IP routing     31-4

IP multicast routing     34-8

Layer 2 interfaces     10-12

Layer 2 protocol tunneling     15-10

MAC address table     7-23

MSDP     35-4

MSTP     17-12

multi-VRF CE     31-67

MVR     20-16

NTP     7-4

optional spanning-tree features     18-14

OSPF     31-30

password and privilege level     8-2

RADIUS     8-20

RIP     31-19

RMON     25-3

RSPAN     24-8

SNMP     27-6

SPAN     24-8

standard QoS     29-26

STP     16-11

system message logging     26-3

system name and prompt     7-16

TACACS+     8-13

UDLD     23-4

VLAN, Layer 2 Ethernet interfaces     12-19

VLANs     12-7

VMPS     12-29

voice VLAN     14-2

VTP     13-6

WCCP     33-5

default gateway     4-10, 31-11

default networks     31-78

default routes     31-78

default routing     31-2

deleting VLANs     12-10

description command     10-17

designing your network, examples     1-9

destination addresses, in ACLs     28-12

detecting indirect link failures, STP     18-10

device discovery protocol     22-1

Device Manager     3-9

DHCP-based autoconfiguration

client request message exchange     4-4

configuring

client side     4-3

DNS     4-6

relay device     4-6

server-side     4-5, 19-8

TFTP server     4-6

example     4-8

lease options

for IP address information     4-5

for receiving the configuration file     4-5

overview     4-3

relationship to BOOTP     4-3

relay support     1-7

support for     1-2

DHCP binding database

See DHCP snooping binding database

DHCP binding table

See DHCP snooping binding database

DHCP option 82

circuit ID suboption     19-4

configuration guidelines     19-6

default configuration     19-6

displaying     19-12

enabling

relay agent     19-8

relay agent information option     19-8

forwarding address, specifying     19-10

helper address     19-10

overview     19-3

packet format

circuit ID suboption     19-4

remote ID suboption     19-4

policy for reforwarding     19-9

reforwarding policy     19-9

remote ID suboption     19-4

support for     1-3

validating     19-9

DHCP relay agent     19-8

DHCP server     19-8

DHCP snooping

binding database

See DHCP snooping binding database

configuration guidelines     19-6

default configuration     19-6

displaying binding tables     19-12

displaying configuration     19-13

message exchange process     19-4

option 82 data insertion     19-3

trusted interface     19-2

untrusted interface     19-2

untrusted messages     19-2

DHCP snooping binding database

described     19-2

displaying     19-12

entries     19-2

DHCP snooping binding table

See DHCP snooping binding database

Differentiated Services architecture, QoS     29-2

Differentiated Services Code Point     29-2

Diffusing Update Algorithm (DUAL)     31-38

directed unicast requests     1-3

directories

changing     B-3

creating and removing     B-4

displaying the working     B-3

discovery, clusters

See automatic discovery

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols     31-2

distribute-list command     31-86

DNS

and DHCP-based autoconfiguration     4-6

default configuration     7-18

displaying the configuration     7-19

overview     7-17

setting up     7-18

support for     1-2

documentation, related     xxxvii

document conventions     xxxvi

domain names

DNS     7-17

VTP     13-8

Domain Name System

See DNS

dot1q-tunnel switchport mode     12-17

double-tagged packets

802.1Q tunneling     15-2

Layer 2 protocol tunneling     15-9

downloading

configuration files

preparing     B-10, B-12, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-16

using TFTP     B-11

image files

deleting old image     B-23

preparing     B-21, B-24, B-28

reasons for     B-19

using CMS     3-15

using FTP     B-25

using RCP     B-29

using TFTP     B-21

drop threshold for Layer 2 protocol packets     15-10

DSCP     1-5, 29-2

DSCP-to-CoS map for QoS     29-55

DSCP-to-DSCP-mutation map for QoS     29-56

DSCP-to-threshold map for QoS     29-61

DTP     1-4, 12-16

DUAL finite state machine, EIGRP     31-38

duplex mode, configuring     10-13

DVMRP

autosummarization

configuring a summary address     34-48

disabling     34-50

connecting PIM domain to DVMRP router     34-40

enabling unicast routing     34-44

interoperability

with Cisco devices     34-38

with IOS software     34-7

mrinfo requests, responding to     34-43

neighbors

advertising the default route to     34-42

discovery with Probe messages     34-38

displaying information     34-43

prevent peering with nonpruning     34-46

rejecting nonpruning     34-45

overview     34-7

routes

adding a metric offset     34-50

advertising all     34-50

advertising the default route to neighbors     34-42

caching DVMRP routes learned in report messages     34-44

changing the threshold for syslog messages     34-47

deleting     34-52

displaying     34-52

favoring one over another     34-50

limiting the number injected into MBONE     34-47

limiting unicast route advertisements     34-38

routing table     34-8

source distribution tree, building     34-8

support for     1-7

tunnels

configuring     34-40

displaying neighbor information     34-43

dynamic access ports

characteristics     12-3

configuring     12-30

defined     10-3

dynamic addresses

See addresses

dynamic desirable trunking mode     12-17

Dynamic Host Configuration Protocol

See DHCP-based autoconfiguration

dynamic port VLAN membership

described     12-28

reconfirming     12-31

troubleshooting     12-33

types of connections     12-30

VMPS database configuration file     12-28

dynamic routing     31-2

Dynamic Trunking Protocol

See DTP

E

EBGP     31-44

editing features

enabling and disabling     2-6

keystrokes used     2-6

wrapped lines     2-7

egress q, in show forward command output     37-19

EIGRP

and IGRP     31-40

authentication     31-42

components     31-38

configuring     31-40

default configuration     31-39

definition     31-38

interface parameters, configuring     31-41

monitoring     31-43

support for     1-6

enable password     8-4

enable secret password     8-4

encryption for passwords     8-4

Enhanced IGRP

See EIGRP

environment variables

function of     4-15

location in Flash     4-14

equal-cost routing     1-6, 31-77

error messages

during command entry     2-4

setting the display destination device     26-4

severity levels     26-8

system message format     26-2

EtherChannel

automatic creation of     30-3

channel groups

binding physical and logical interfaces     30-2

numbering of     30-3

configuration guidelines     30-8

configuring

Layer 2 interfaces     30-9

Layer 3 physical interfaces     30-12

Layer 3 port-channel logical interfaces     30-11

default configuration     30-8

destination MAC address forwarding     30-6

displaying status     30-18

forwarding methods     30-14

interaction

with STP     30-8

with VLANs     30-9

LACP, support for     1-2

Layer 3 interface     31-3

load balancing     30-6, 30-14

logical interfaces, described     30-2

number of interfaces per     30-2

overview     30-1

PAgP

aggregate-port learners     30-5

compatibility with Catalyst 1900     30-15

displaying status     30-18

interaction with other features     30-6

learn method and priority configuration     30-15

modes     30-4

overview     30-3

silent mode     30-4

support for     1-2

port-channel interfaces

described     30-2

numbering of     30-3

port groups     10-5

source MAC address forwarding     30-6

support for     1-2

EtherChannel guard

described     18-11

enabling     18-19

Ethernet VLANs

adding     12-8

defaults and ranges     12-8

modifying     12-8

events, RMON     25-3

examples

conventions for     xxxvi

network configuration     1-9

expedite queue for QoS

10/100 Ethernet ports

allocating bandwidth     29-68

configuring     29-68

described     29-15

Gigabit-capable Ethernet ports

allocating bandwidth     29-64

configuring     29-64

described     29-12

expert mode     3-6

Express Setup     1-1, 3-11

See also hardware installation guide

extended-range VLANs

configuration guidelines     12-12

configuring     12-12

creating     12-12, 12-13

defined     12-1

extended system ID

MSTP     17-14

STP     16-3, 16-14

Extensible Authentication Protocol over LAN     9-1

exterior routes, IGRP     31-24

external BGP

See EBGP

external neighbors, BGP     31-48

F

fallback bridging

and protected ports     36-4

bridge groups

creating     36-4

described     36-2

displaying     36-12

function of     36-2

number supported     36-4

removing     36-4

bridge table

changing the aging time     36-6

clearing     36-12

displaying     36-12

configuration guidelines     36-3

connecting interfaces with     10-7

default configuration     36-3

described     36-1

frame forwarding

filtering by MAC address     36-6

flooding packets     36-2

for static addresses     36-5

forwarding packets     36-2

preventing for dynamically learned stations     36-5

to static addresses     36-5

overview     36-1

protocol, unsupported     36-3

STP

disabling on an interface     36-12

forward-delay interval     36-10

hello BPDU interval     36-10

interface priority     36-8

maximum-idle interval     36-11

path cost     36-9

switch priority     36-8

VLAN-bridge STP     36-1, 36-2

support for     1-6

SVIs and routed ports     36-1

unsupported protocols     36-3

VLAN-bridge STP     16-10

fallback VLAN name     12-28

Fast Uplink Transition Protocol     18-6

feature manager, ACL     28-42

FIB     31-76

fiber-optic, detecting unidirectional links     23-1

files

copying     B-4

crashinfo

description     37-20

displaying the contents of     37-20

location     37-20

deleting     B-5

displaying the contents of     B-7

tar

creating     B-5

displaying the contents of     B-6

extracting     B-7

image file format     B-20

file system

displaying available file systems     B-2

displaying file information     B-3

local file system names     B-1

network file system names     B-4

setting the default     B-3

filtering

in a VLAN     28-29

non-IP traffic     28-26

show and more command output     2-8

with fallback bridging     36-6

filters, IP

See ACLs, IP

flash device, number of     B-1

flash updates, IGRP     31-25

flooded traffic, blocking     21-6

flow-based packet classification     1-5

flowcharts

QoS classification     29-6

QoS policing and marking     29-10

QoS queueing and scheduling

10/100 ports     29-15

Gigabit-capable ports     29-12

flow control     1-2, 10-15

forward-delay time

MSTP     17-20

STP     16-5, 16-22

Forwarding Information Base

See FIB

forwarding non-routable protocols     36-1

FTP

accessing MIB files     A-3

configuration files

downloading     B-13

overview     B-12

preparing the server     B-12

uploading     B-14

image files

deleting old image     B-26

downloading     B-25

preparing the server     B-24

uploading     B-26

G

GBICs

1000BASE-LX/LH module     1-12

1000BASE-SX module     1-12

1000BASE-T module     1-12

1000BASE-ZX module     1-12

CWDM module     1-17

GigaStack module     1-10

security and identification     37-11

get-bulk-request operation     27-3

get-next-request operation     27-3, 27-4

get-request operation     27-3, 27-4

get-response operation     27-3

Gigabit GBIC modules

See GBICs

Gigabit Interface Converters

See GBICs

GigaStack GBIC

fast transition of redundant link     18-5

See also GBICs

global configuration mode     2-2

guide

audience     xxxv

purpose of     xxxv

guide mode     1-9, 3-5

H

hardware, determining ACL configuration fit     28-44

HC (candidate switch)     6-21

hello time

MSTP     17-19

STP     16-21

help, for the command line     2-3

history

changing the buffer size     2-4

described     2-4

disabling     2-5

recalling commands     2-5

history table, level and number of syslog messages     26-10

host names

abbreviations appended to     6-21

in clusters     6-14

hosts, limit on dynamic ports     12-33

Hot Standby Router Protocol

See HSRP

HP OpenView     1-8

HSRP

authentication string     32-9

automatic cluster recovery     6-13

binding to cluster group     32-10

cluster standby group considerations     6-12

command-switch redundancy     1-3

default configuration     32-4

definition     32-1

monitoring     32-11

overview     32-1

priority     32-6

routing redundancy     1-6

timers     32-9

tracking     32-7

See also clusters, cluster standby group, and standby command switch

I

IBPG     31-44

ICMP

redirect messages     31-11

support for     1-6

time exceeded messages     37-13

traceroute and     37-13

unreachable messages     28-6

unreachables and ACLs     28-6

ICMP ping

executing     37-12

overview     37-11

ICMP Router Discovery Protocol

See IRDP

IDS, using with SPAN and RSPAN     24-2

IE2100

CNS embedded agents

described     5-5

enabling automated configuration     5-6

enabling configuration agent     5-9

enabling event agent     5-8

Configuration Registrar

configID, deviceID, hostname     5-3

configuration service     5-2

described     5-1

event service     5-3

described     1-8

support for     1-2

IEEE 802.1p     14-1

IFS     1-3

IGMP

configuring the switch

as a member of a group     34-26

statically connected member     34-31

controlling access to groups     34-27

default configuration     34-26

deleting cache entries     34-52

displaying groups     34-52

fast switching     34-31

host-query interval, modifying     34-29

joining multicast group     20-3

join messages     20-3

leave processing, enabling     20-11

leaving multicast group     20-5

multicast reachability     34-26

overview     34-3

queries     20-3

report suppression

described     20-5

disabling     20-11

support for     1-2

throttling action     20-21

Version 1

changing to Version 2     34-28

described     34-3

Version 2

changing to Version 1     34-28

described     34-3

maximum query response time value     34-30

pruning groups     34-30

query timeout value     34-29

IGMP filtering

configuring     20-21

default configuration     20-21

described     20-20

monitoring     20-26

IGMP groups

configuring the throttling action     20-24

setting the maximum number     20-23

IGMP profile

applying     20-22

configuration mode     20-21

configuring     20-22

IGMP snooping

configuring     20-6

default configuration     20-7

definition     20-2

enabling and disabling     20-7

global configuration     20-7

Immediate Leave     20-5

method     20-8

monitoring     20-12

support for     1-2

VLAN configuration     20-7

IGMP throttling

configuring     20-24

default configuration     20-21

described     20-21

displaying action     20-26

IGP     31-29

IGRP

advertisements     31-24

alternate routes     31-25

configuring     31-26

default configuration     31-25

described     31-24

exterior routes     31-24

flash updates     31-25

interior routes     31-24

load balancing     31-25

poison-reverse updates     31-25

split horizon     31-28

support for     1-6

system routes     31-24

traffic sharing     31-26

unequal-cost load balancing     31-25

Immediate-Leave, IGMP     20-5

Intelligence Engine 2100 Series CNS Agents

See IE2100

interface

number     10-7

range macros     10-10

interface command     10-7

interface configuration mode     2-2

interfaces

configuration guidelines     10-13

configuring     10-7

configuring duplex mode     10-13

configuring speed     10-13

counters, clearing     10-20

described     10-17

descriptive name, adding     10-17

displaying information about     10-19

flow control     10-15

management     1-7

monitoring     10-19

naming     10-17

physical, identifying     10-7

range of     10-8

restarting     10-20

shutting down     10-20

supported     10-7

types of     10-1

interfaces range macro command     10-10

Interior Gateway Protocol

See IGP

Interior Gateway Routing Protocol

See IGRP

interior routes, IGRP     31-24

internal BGP

See IBGP

internal neighbors, BGP     31-48

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link

See ISL

inter-VLAN routing     1-6, 31-2

Intrusion Detection System

See IDS

inventory, cluster     6-22

IOS File System

See IFS

ip access-group command     28-21

IP ACLs

applying to an interface     28-19

extended, creating     28-11

for QoS classification     29-7

implicit deny     28-10, 28-14, 28-16

implicit masks     28-10

logging     28-16

named     28-15

standard, creating     28-9

undefined     28-21

virtual terminal lines, setting on     28-19

IP addresses

candidate or member     6-3, 6-14

classes of     31-5

cluster access     6-2

command switch     6-3, 6-12, 6-14

default configuration     31-4

discovering     7-32

for IP routing     31-4

MAC address association     31-8

monitoring     31-17

redundant clusters     6-12

standby command switch     6-12, 6-14

See also IP information

IP broadcast address     31-15

ip cef command     31-76

IP directed broadcasts     31-13

ip igmp profile command     20-21

IP information

assigned

manually     4-10

through DHCP-based autoconfiguration     4-3

default configuration     4-3

IP multicast routing

addresses

all-hosts     34-1, 34-3

all-multicast-routers     34-1, 34-3

host group address range     34-1, 34-3

administratively-scoped boundaries, described     34-36

and IGMP snooping     20-2, 20-6

Auto-RP

adding to an existing sparse-mode cloud     34-14

benefits of     34-13

clearing the cache     34-52

configuration guidelines     34-10

filtering incoming RP announcement messages     34-16

overview     34-5

preventing candidate RP spoofing     34-16

preventing join messages to false RPs     34-15

setting up in a new internetwork     34-14

using with BSR     34-21

bootstrap router

configuration guidelines     34-10

configuring candidate BSRs     34-19

configuring candidate RPs     34-20

defining the IP multicast boundary     34-18

defining the PIM domain border     34-17

overview     34-5

using with Auto-RP     34-21

Cisco implementation     34-2

configuring

basic multicast routing     34-10

IP multicast boundary     34-36

TTL threshold     34-34

default configuration     34-8

enabling

multicast forwarding     34-11

PIM mode     34-11

group-to-RP mappings

Auto-RP     34-5

BSR     34-5

MBONE

deleting sdr cache entries     34-52

described     34-33

displaying sdr cache     34-53

enabling sdr listener support     34-33

limiting DVMRP routes advertised     34-47

limiting sdr cache entry lifetime     34-33

SAP packets for conference session announcement     34-33

Session Directory (sdr) tool, described     34-33

monitoring

packet rate loss     34-53

peering devices     34-53

tracing a path     34-53

multicast forwarding, described     34-6

PIMv1 and PIMv2 interoperability     34-9

protocol interaction     34-2

reverse path check (RPF)     34-6

routing table

deleting     34-52

displaying     34-52

RP

assigning manually     34-12

configuring Auto-RP     34-13

configuring PIMv2 BSR     34-17

monitoring mapping information     34-22

using Auto-RP and BSR     34-21

statistics, displaying system and network     34-52

TTL thresholds, described     34-34

See also CGMP

See also DVMRP

See also IGMP

See also PIM

IP phones

and QoS     14-1

automatic classification and queueing     29-17

configuring     14-3

trusted boundary for QoS     29-33

IP precedence     29-2

IP-precedence-to-DSCP map for QoS     29-53

IP protocols

in ACLs     28-12

routing     1-6

IP routes, monitoring     31-88

IP routing

connecting interfaces with     10-6

enabling     31-18

IP traceroute

executing     37-13

overview     37-13

IP unicast routing

address resolution     31-8

administrative distances     31-78, 31-86

ARP     31-8

assigning IP addresses to Layer 3 interfaces     31-6

authentication keys     31-87

broadcast

address     31-15

flooding     31-16

packets     31-13

storms     31-13

classless routing     31-7

configuring static routes     31-77

default

addressing configuration     31-4

gateways     31-11

networks     31-78

routes     31-78

routing     31-2

directed broadcasts     31-13

dynamic routing     31-2

enabling     31-18

EtherChannel Layer 3 interface     31-3

IGP     31-29

inter-VLAN     31-2

IP addressing

classes     31-5

configuring     31-4

IRDP     31-12

Layer 3 interfaces     31-3

MAC address and IP address     31-8

passive interfaces     31-85

protocols

distance-vector     31-2

dynamic     31-2

link-state     31-2

proxy ARP     31-8

redistribution     31-79

reverse address resolution     31-8

routed ports     31-3

static routing     31-2

steps to configure     31-3

subnet mask     31-5

subnet zero     31-6

supernet     31-7

UDP     31-15

with SVIs     31-3

See also BGP

See also EIGRP

See also IGRP

See also OSPF

See also RIP

ip unreachables command     28-6

IRDP

configuring     31-12

definition     31-12

support for     1-6

ISL

and trunk ports     10-3

encapsulation     1-4, 12-16

trunking with 802.1 tunneling     15-4

J

Java plug-in configuration     6-1

join messages, IGMP     20-3

K

KDC

described     8-32

See also Kerberos

Kerberos

authenticating to

boundary switch     8-35

KDC     8-35

network services     8-35

configuration examples     8-32

configuring     8-35

credentials     8-32

cryptographic software image     8-32

described     8-32

KDC     8-32

operation     8-34

realm     8-33

server     8-34

switch as trusted third party     8-32

terms     8-33

TGT     8-34

tickets     8-32

key distribution center

See KDC

L

l2protocol-tunnel command     15-11

LACP

Layer 2 protocol tunneling     15-9

See EtherChannel

Layer 2 frames, classification with CoS     29-2

Layer 2 interfaces, default configuration     10-12

Layer 2 protocol tunneling

configuring     15-9

configuring for EtherChannels     15-13

default configuration     15-10

defined     15-7

guidelines     15-10

Layer 2 traceroute

and ARP     37-15

and CDP     37-15

described     37-14

IP addresses and subnets     37-15

MAC addresses and VLANs     37-15

multicast traffic     37-15

multiple devices on a port     37-16

unicast traffic     37-14

usage guidelines     37-15

Layer 3 features     1-6

Layer 3 interfaces

assigning IP addresses to     31-6

changing from Layer 2 mode     31-6

types of     31-3

Layer 3 packets, classification methods     29-2

LDAP     5-2

leave processing, IGMP     20-11

lightweight directory access protocol

See LDAP

line configuration mode     2-2

Link Aggregation Control Protocol

See EtherChannel

links, unidirectional     23-1

link state advertisements (LSAs)     31-33

link-state protocols     31-2

load balancing, IGRP     31-25

logging messages, ACL     28-10

login authentication

with RADIUS     8-23

with TACACS+     8-14

login banners     7-19

log messages

See system message logging

long-distance, high-bandwidth transport configuration example     1-17

Long-Reach Ethernet (LRE) technology     1-10

loop guard

described     18-13

enabling     18-21

support for     1-4

LRE profiles, considerations in switch clusters     6-16

M

mac access-group command     28-28

MAC ACLs and Layer 2 interfaces     28-28

MAC addresses

aging time     7-23

and VLAN association     7-22

building the address table     7-22

default configuration     7-23

discovering     7-32

displaying     7-28

displaying in DHCP snooping binding table     19-13

dynamic

learning     7-22

removing     7-24

in ACLs     28-26

IP address association     31-8

static

adding     7-26

allowing     7-28

characteristics of     7-26

dropping     7-27

removing     7-26

sticky secure, adding     21-8

MAC address multicast entries, monitoring     20-13

MAC address-to-VLAN mapping     12-27

MAC extended access lists     28-26, 29-5, 29-39

macros

See Smartports macros

manageability features     1-2

management options

benefits

clustering     1-8

CMS     1-8

CLI     2-1

CNS     5-1

overview     1-7

management VLAN

considerations in switch clusters     6-7, 6-8

discovery through different management VLANs     6-8

discovery through same management VLAN     6-7

MANs

CWDM configuration example     1-17

long-distance, high-bandwidth transport configuration example     1-17

mapping tables for QoS

configuring

CoS-to-DSCP     29-53

CoS-to-egress-queue     29-58

DSCP     29-52

DSCP-to-CoS     29-55

DSCP-to-DSCP-mutation     29-56

DSCP-to-threshold     29-61

IP-precedence-to-DSCP     29-53

policed-DSCP     29-54

described     29-10

marking

action in policy map     29-44

action with aggregate policers     29-50

described     29-4, 29-8

matching, ACLs     28-8

maximum aging time

MSTP     17-21

STP     16-22

maximum hop count, MSTP     17-21

maximum-paths command     31-51, 31-77

membership mode, VLAN port     12-3

member switch

adding     6-18

automatic discovery     6-5

defined     6-2

managing     6-23

passwords     6-14

recovering from lost connectivity     37-10

requirements     6-3

See also candidate switch, cluster standby group, and standby command switch

memory, optimizing     7-29

menu bar,variations     3-4

messages

logging ACL violations     28-16

messages to users through banners     7-19

metrics, in BGP     31-52

metric translations, between routing protocols     31-82

metropolitan-area networks

See MANs

metro tags     15-2

MIBs

accessing files with FTP     A-3

location of files     A-3

overview     27-1

SNMP interaction with     27-4

supported     A-1

minimum-reserve levels

assigning to a queue     29-15, 29-67

configuring the buffer size     29-16, 29-67

default size     29-15

mini-point-of-presence

See POP

mirroring traffic for analysis     24-1

mismatches, autonegotiation     37-10

modules, GBIC

1000BASE-LX/LH     1-12

1000BASE-SX     1-12

1000BASE-T     1-12

1000BASE-ZX     1-12

CWDM     1-17

GigaStack     1-10

monitoring

802.1Q tunneling     15-17

access groups     28-40

ACL

configuration     28-40

configuration conflicts     28-43

fit in hardware     28-44

information     28-40

BGP     31-63

cables for unidirectional links     23-1

CDP     22-5

CEF     31-76

EIGRP     31-43

fallback bridging     36-12

features     1-7

HSRP     32-11

IGMP

filters     20-26

snooping     20-12

interfaces     10-19

IP

address tables     31-17

multicast routing     34-51

routes     31-88

Layer 2 protocol tunneling     15-17

MSDP peers     35-19

multicast router interfaces     20-12

multi-VRF CE     31-75

MVR     20-20

network traffic for analysis with probe     24-1

OSPF     31-37

port

blocking     21-14

protection     21-14

port protection     21-14

RP mapping information     34-22

source-active messages     35-19

speed and duplex mode     10-14

traffic flowing among switches     25-1

traffic suppression     21-14

tunneling     15-17

VLAN

filters     28-41

maps     28-41

VLANs     12-15

VMPS     12-32

VTP     13-16

MSDP

and dense-mode regions

sending SA messages to     35-17

specifying the originating address     35-18

benefits of     35-3

clearing MSDP connections and statistics     35-19

controlling source information

forwarded by switch     35-12

originated by switch     35-8

received by switch     35-14

default configuration     35-4

filtering

incoming SA messages     35-14

SA messages to a peer     35-12

SA requests from a peer     35-11

join latency, defined     35-6

meshed groups

configuring     35-16

defined     35-16

originating address, changing     35-18

overview     35-1

peer-RPF flooding     35-2

peers

configuring a default     35-4

monitoring     35-19

peering relationship, overview     35-1

requesting source information from     35-8

shutting down     35-16

source-active messages

caching     35-6

clearing cache entries     35-19

defined     35-2

filtering from a peer     35-11

filtering incoming     35-14

filtering to a peer     35-12

limiting data with TTL     35-14

monitoring     35-19

restricting advertised sources     35-9

MSTP

boundary ports

configuration guidelines     17-13

described     17-5

BPDU filtering

described     18-3

enabling     18-16

BPDU guard

described     18-2

enabling     18-15

CIST, described     17-3

configuration guidelines     17-12, 18-14

configuring

forward-delay time     17-20

hello time     17-19

link type for rapid convergence     17-22

maximum aging time     17-21

maximum hop count     17-21

MST region     17-13

path cost     17-18

port priority     17-17

root switch     17-14

secondary root switch     17-16

switch priority     17-19

CST

defined     17-3

operations between regions     17-3

default configuration     17-12

default optional feature configuration     18-14

displaying status     17-23

enabling the mode     17-13

EtherChannel guard

described     18-11

enabling     18-19

extended system ID

effects on root switch     17-14

effects on secondary root switch     17-16

unexpected behavior     17-15

instances supported     16-9

interface state, blocking to forwarding     18-2

interoperability and compatibility among modes     16-10

interoperability with 802.1D

described     17-5

restarting migration process     17-22

IST

defined     17-2

master     17-3

operations within a region     17-3

loop guard

described     18-13

enabling     18-21

mapping VLANs to MST instance     17-13

MST region

CIST     17-3

configuring     17-13

described     17-2

hop-count mechanism     17-4

IST     17-2

supported spanning-tree instances     17-2

optional features supported     1-4

overview     17-2

Port Fast

described     18-2

enabling     18-14

preventing root switch selection     18-12

root guard

described     18-12

enabling     18-20

root switch

configuring     17-15

effects of extended system ID     17-14

unexpected behavior     17-15

shutdown Port Fast-enabled port     18-2

multicast groups

and IGMP snooping     20-6

Immediate Leave     20-5

joining     20-3

leaving     20-5

static joins     20-10

multicast packets

ACLs on     28-39

blocking     21-6

multicast router interfaces, monitoring     20-12

multicast router ports, adding     20-9

Multicast Source Discovery Protocol

See MSDP

multicast storm-control command     21-3

multicast storms     21-1

Multicast VLAN Registration

See MVR

Multiple Spanning Tree Protocol

See MSTP

multiple VPN routing/forwarding in customer edge devices

See multi-VRF CE

multi-VRF CE

configuration example     31-71

configuration guidelines     31-68

configuring     31-67

default configuration     31-67

defined     31-65

displaying     31-75

monitoring     31-75

network components     31-67

packet-forwarding process     31-67

support for     1-6

MVR

configuring interfaces     20-18

default configuration     20-16

described     20-13

modes     20-17

monitoring     20-20

setting global parameters     20-17

support for     1-2

N

named IP ACLs     28-15

NameSpace Mapper

See NSM

native VLAN

and 802.1Q tunneling     15-4

configuring     12-23

default     12-23

neighbor discovery/recovery, EIGRP     31-38

neighbors, BGP     31-58

network configuration examples

increasing network performance     1-9

large network     1-14

long-distance, high-bandwidth transport     1-17

providing network services     1-10

small to medium-sized network     1-12

network design

performance     1-9

services     1-10

network management

CDP     22-1

RMON     25-1

SNMP     27-1

Network Time Protocol

See NTP

no commands     2-3

non-IP traffic filtering     28-26

nontrunking mode     12-17

normal-range VLANs

configuration modes     12-6

defined     12-1

no switchport command     10-5

note, described     xxxvi

not-so-stubby areas

See NSSA

NSM     5-3

NSSA, OSPF     31-33

NTP

associations

authenticating     7-4

defined     7-2

enabling broadcast messages     7-7

peer     7-6

server     7-6

default configuration     7-4

displaying the configuration     7-11

overview     7-2

restricting access

creating an access group     7-9

disabling NTP services per interface     7-10

source IP address, configuring     7-10

stratum     7-2

support for     1-3

synchronizing devices     7-6

time

services     7-2

synchronizing     7-2

O

OADM modules

See CWDM OADM modules

Open Shortest Path First

See OSPF

optical add/drop multiplexer modules

See CWDM OADM modules

optimizing system resources     7-29

options, management     1-7

OSPF

area parameters, configuring     31-33

configuring     31-31

default configuration

metrics     31-34

route     31-34

settings     31-30

described     31-29

interface parameters, configuring     31-32

LSA group pacing     31-36

monitoring     31-37

router IDs     31-36

route summarization     31-34

support for     1-6

virtual links     31-34

out-of-profile markdown     1-6

output interface, getting information about     37-19

P

packet modification, with QoS     29-17

PAgP

Layer 2 protocol tunneling     15-9

See EtherChannel

parallel paths, in routing tables     31-77

passive interfaces

configuring     31-85

OSPF     31-34

pass-through mode     29-34

passwords

default configuration     8-2

disabling recovery of     8-5

encrypting     8-4

for security     1-4

in clusters     6-15, 6-18

overview     8-1

setting

enable     8-3

enable secret     8-4

Telnet     8-6

with usernames     8-7

VTP domain     13-8

path cost

MSTP     17-18

STP     16-18

PBR

defined     31-82

enabling     31-84

fast-switched policy-based routing     31-84

local policy-based routing     31-84

support for     1-6

PC (passive command switch)     6-11, 6-21

peers, BGP     31-58

performance, network design     1-9

performance features     1-2

per-VLAN spanning-tree plus

See PVST+

PE to CE routing, configuring     31-70

physical ports     10-2

PIM

default configuration     34-8

dense mode

overview     34-4

rendezvous point (RP), described     34-5

RPF lookups     34-7

displaying neighbors     34-53

enabling a mode     34-11

overview     34-4

router-query message interval, modifying     34-25

shared tree and source tree, overview     34-23

shortest path tree, delaying the use of     34-24

sparse mode

join messages and shared tree     34-5

overview     34-5

prune messages     34-5

RPF lookups     34-7

support for     1-6

versions

interoperability     34-9

troubleshooting interoperability problems     34-22

v2 improvements     34-4

PIM-DVMRP, as snooping method     20-8

ping

character output description     37-12

executing     37-12

overview     37-11

poison-reverse updates, IGRP     31-25

policed-DSCP map for QoS     29-54

policers

configuring

for each matched traffic class     29-44

for more than one traffic class     29-50

described     29-4

displaying     29-70

number of     1-6, 29-9

types of     29-8

policing

described     29-4

token bucket algorithm     29-8

policy-based routing

See PBR

policy maps for QoS

characteristics of     29-44

configuring     29-44

described     29-7

displaying     29-70

POP     1-15

port ACLs

and voice VLAN     28-4

defined     28-2

limitations     28-4

Port Aggregation Protocol

See EtherChannel

port-based authentication

accounting services     1-5

accounting     9-5

authentication server

defined     9-2

RADIUS server     9-2

client, defined     9-2

configuration guidelines     9-11

configuring

802.1x authentication     9-12, 9-20

guest VLAN     9-19

host mode     9-18

manual re-authentication of a client     9-16

periodic re-authentication     9-15

quiet period     9-16

RADIUS server     9-15

RADIUS server parameters on the switch     9-14

switch-to-client frame-retransmission number     9-17

switch-to-client retransmission time     9-16

default configuration     9-10

described     9-1

device roles     9-2

displaying statistics     9-22

EAPOL-start frame     9-3

EAP-request/identity frame     9-3

EAP-response/identity frame     9-3

enabling

802.1x with guest VLAN     9-8

802.1x with per-user ACLs     9-9, 9-12

802.1x with port security     9-6, 9-18

802.1x with VLAN assignment     9-7, 9-12

802.1x with voice VLAN     9-7

encapsulation     9-3

initiation and message exchange     9-3

method lists     9-12, 9-20

per-user ACLs

AAA authorization     9-20

ports

authorization state and dot1x port-control command     9-4

authorized and unauthorized     9-4

resetting to default values     9-19

software upgrade changes     9-12

support for     1-5

switch

as proxy     9-2

RADIUS client     9-2

topologies, supported     9-5

upgrading from a previous release     29-22

VLAN assignment

AAA authorization     9-20

port blocking     1-2, 21-6

port-channel

See EtherChannel

Port Fast

described     18-2

enabling     18-14

mode, spanning tree     12-29

support for     1-4

port membership modes, VLAN     12-3

port priority

MSTP     17-17

STP     16-17

ports

802.1Q tunnel     12-3

access     10-3

blocking     21-6

dynamic access     12-3

forwarding, resuming     21-7

protected     21-5

routed     10-4

secure     21-7

static-access     12-3, 12-11

switch     10-2

trunks     12-3, 12-16

VLAN assignments     12-11

port security

aging     21-13

and QoS trusted boundary     29-33

and trunk ports     21-10

configuring     21-10

default configuration     21-9

described     21-7

displaying     21-14

sticky learning     21-8

violations     21-8

with other features     21-9

port-shutdown response, VMPS     12-27

power, inline     10-14

preferential treatment of traffic

See QoS

prefix lists, BGP     31-55

preventing unauthorized access     8-1

priority

HSRP     32-6

overriding CoS     14-5

trusting CoS     14-6

private VLAN edge ports

See protected ports

privileged EXEC mode     2-2

privilege levels

changing the default for lines     8-9

command switch     6-24

exiting     8-10

logging into     8-10

mapping on member switches     6-24

overview     8-2, 8-8

setting a command with     8-8

protected ports     1-4, 21-5

protocol-dependent modules, EIGRP     31-39

Protocol-Independent Multicast Protocol

See PIM

provider edge devices     31-65

proxy ARP

configuring     31-10

definition     31-8

with IP routing disabled     31-11

pruning, VTP

enabling     13-14

enabling on a port     12-22

examples     13-5

overview     13-4

pruning-eligible list

changing     12-22

for VTP pruning     13-4

VLANs     13-14

publications, related     xxxvii

PVST+

802.1Q trunking interoperability     16-10

described     16-9

instances supported     16-9

Q

QoS

and MQC commands     29-1

auto-QoS

categorizing traffic     29-18

configuration and defaults display     29-23

configuration guidelines     29-21

described     29-17

displaying     29-23

effects on NVRAM configuration     29-21

egress queue defaults     29-18

enabling for VoIP     29-22

generated commands     29-19

basic model     29-4

classification

class maps, described     29-7

defined     29-4

flowchart     29-6

forwarding treatment     29-3

in frames and packets     29-3

IP ACLs, described     29-5, 29-7

MAC ACLs, described     29-5, 29-7

pass-through mode, described     29-34

per physical port     29-40

per-port per-VLAN     29-42

policy maps, described     29-7

port default, described     29-5

trust DSCP, described     29-5

trusted CoS, described     29-5

trust IP precedence, described     29-5

types for IP traffic     29-5

types for non-IP traffic     29-5

class maps

configuring per physical port     29-40

configuring per-port per-VLAN     29-42

displaying     29-70

configuration examples

distribution layer     29-73

existing wiring closet     29-71

intelligent wiring closet     29-72

configuration guidelines

auto-QoS     29-21

standard QoS     29-27

configuring

aggregate policers     29-50

auto-QoS     29-17

default port CoS value     29-32

DSCP maps     29-52

DSCP trust states bordering another domain     29-35

egress queues on 10/100 Ethernet ports     29-65

egress queues on Gigabit-capable Ethernet ports     29-58

IP extended ACLs     29-38

IP standard ACLs     29-37

MAC ACLs     29-39

pass-through mode     29-34

policy maps     29-44

port trust states within the domain     29-30

trusted boundary     29-33

default auto configuration     29-18

default standard configuration     29-26

displaying statistics     29-70

enabling globally     29-29

flowcharts

classification     29-6

policing and marking     29-10

queueing and scheduling     29-12, 29-15

implicit deny     29-7

IP phones

automatic classification and queueing     29-17

detection and trusted settings     29-17, 29-33

mapping tables

CoS-to-DSCP     29-53

CoS-to-egress-queue     29-58

displaying     29-70

DSCP-to-CoS     29-55

DSCP-to-DSCP-mutation     29-56

DSCP-to-threshold     29-61

IP-precedence-to-DSCP     29-53

policed-DSCP     29-54

types of     29-10

marked-down actions     29-47

marking, described     29-4, 29-8

overview     29-2

packet modification     29-17

pass-through mode     29-34

policers

configuring     29-47, 29-50

described     29-8

displaying     29-70

number of     29-9

types of     29-8

policies, attaching to an interface     29-9

policing

described     29-4, 29-8

token bucket algorithm     29-8

policy maps

characteristics of     29-44

configuring     29-44

displaying     29-70

queueing, defined     29-4

queues

CoS-to-egress-queue map     29-58

for 10/100 Ethernet ports     29-15

high priority (expedite)     29-13, 29-64

minimum-reserve levels     29-67

serviced by WRR     29-13, 29-16

size of     29-12, 29-15

size ratios     29-59

tail-drop threshold percentages     29-13, 29-60

WRED drop-percentage thresholds     29-13, 29-62

WRR scheduling     29-64

scheduling

allocating bandwidth on 10/100 Ethernet ports     29-68

allocating bandwidth on Gigabit-capable ports     29-64

defined     29-4

support for     1-5

tail drop

configuring drop threshold percentages     29-60

described     29-13

trust states

bordering another domain     29-35

described     29-5

trusted device     29-33

within the domain     29-30

WRED

configuring drop-percentage thresholds     29-62

described     29-14

WRR scheduling     29-64

quality of service

See QoS

queries, IGMP     20-3

R

RADIUS

attributes

vendor-proprietary     8-31

vendor-specific     8-29

configuring

accounting     8-28

authentication     8-23

authorization     8-27

communication, global     8-21, 8-29

communication, per-server     8-20, 8-21

multiple UDP ports     8-21

default configuration     8-20

defining AAA server groups     8-25

displaying the configuration     8-31

identifying the server     8-20

in clusters     6-15

limiting the services to the user     8-27

method list, defined     8-20

operation of     8-19

overview     8-18

suggested network environments     8-18

tracking services accessed by user     8-28

Random Early Detection, described     29-14

range

macro     10-10

of interfaces     10-8

rapid convergence     17-7

rapid per-VLAN spanning-tree plus

See rapid PVST+

rapid PVST+

802.1Q trunking interoperability     16-10

described     16-9

instances supported     16-9

rapid-PVST+     12-2

Rapid Spanning Tree Protocol

See RSTP

RARP     31-8

rcommand command     6-23

RCP

configuration files

downloading     B-16

overview     B-15

preparing the server     B-16

uploading     B-17

image files

deleting old image     B-31

downloading     B-29

preparing the server     B-28

uploading     B-31

reconfirmation interval, VMPS, changing     12-31

recovery procedures     37-1

redundancy

EtherChannel     30-2

features     1-3

HSRP     32-1

STP

backbone     16-7

multidrop backbone     18-5

path cost     12-25

port priority     12-24

redundant clusters

See cluster standby group

redundant links and UplinkFast     18-17

reliable transport protocol, EIGRP     31-38

reloading software     4-16

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

report suppression, IGMP

described     20-5

disabling     20-11

resets, in BGP     31-50

resetting a UDLD-shutdown interface     23-6

restricting access

NTP services     7-8

overview     8-1

passwords and privilege levels     8-2

RADIUS     8-18

TACACS+     8-10

retry count, VMPS, changing     12-32

reverse address resolution     31-8

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP     31-19

1112, IP multicast and IGMP     20-2

1157, SNMPv1     27-2

1163, BGP     31-44

1166, IP addresses     31-5

1253, OSPF     31-29

1267, BGP     31-44

1305, NTP     7-2

1587, NSSAs     31-29

1757, RMON     25-2

1771, BGP     31-44

1901, SNMPv2C     27-2

1902 to 1907, SNMPv2     27-2

2236, IP multicast and IGMP     20-2

2273-2275, SNMPv3     27-2

RIP

advertisements     31-19

authentication     31-22

configuring     31-20

default configuration     31-19

described     31-19

hop counts     31-19

split horizon     31-22

summary addresses     31-22

support for     1-6

RMON

default configuration     25-3

displaying status     25-6

enabling alarms and events     25-3

groups supported     25-2

overview     25-1

statistics

collecting group Ethernet     25-5

collecting group history     25-5

support for     1-7

root guard

described     18-12

enabling     18-20

support for     1-4

root switch

MSTP     17-14

STP     16-14

route calculation timers, OSPF     31-35

route dampening, BGP     31-62

routed packets, ACLs on     28-38

routed ports

configuring     31-3

defined     10-4

in switch clusters     6-9

IP addresses on     10-18, 31-3

route-map command

for policy-based routing     31-84

route maps

policy-based routing, defined     31-83

route maps, BGP     31-53

router ACLs     28-2

route reflectors, BGP     31-61

router ID, OSPF     31-36

route selection, BGP     31-51

route summarization, OSPF     31-34

route targets, VPN     31-67

routing

default     31-2

dynamic     31-2

redistribution of information     31-79

static     31-2

routing domain confederation, BGP     31-60

Routing Information Protocol

See RIP

routing protocol administrative distances     31-78

RSPAN

configuration guidelines     24-16

default configuration     24-8

destination ports     24-5

displaying status     24-24

IDS     24-2

interaction with other features     24-7

monitored ports     24-4

monitoring ports     24-5

overview     1-7, 24-1

received traffic     24-3

reflector port     24-5

session limits     24-8

sessions

creating     24-17

defined     24-3

limiting source traffic to specific VLANs     24-23

monitoring VLANs     24-22

removing source (monitored) ports     24-21

specifying monitored ports     24-17

source ports     24-4

transmitted traffic     24-4

VLAN-based     24-6

RSTP

active topology, determining     17-6

BPDU

format     17-9

processing     17-10

designated port, defined     17-6

designated switch, defined     17-6

interoperability with 802.1D

described     17-5

restarting migration process     17-22

topology changes     17-10

overview     17-6

port roles

described     17-6

synchronized     17-8

proposal-agreement handshake process     17-7

rapid convergence

described     17-7

edge ports and Port Fast     17-7

point-to-point links     17-7, 17-22

root ports     17-7

root port, defined     17-6

See also MSTP

running configuration, saving     4-11

S

SC (standby command switch)     6-11, 6-21

scheduled reloads     4-16

SDM

configuring     7-31

described     7-29

templates

number of     7-29

resources used for Fast Ethernet switches     7-30

resources used for Gigabit Ethernet switches     7-30

sdm prefer extended-match command     31-68

secure ports, configuring     21-7

secure remote connections     8-38

Secure Shell

See SSH

security, port     21-7

security features     1-4

sequence numbers in log messages     26-8

server mode, VTP     13-3

service-provider networks

and 802.1Q tunneling     15-1

and customer VLANs     15-2

Layer 2 protocols across     15-7

Layer 2 protocol tunneling for EtherChannels     15-9

MSTP and RSTP     17-1

set-request operation     27-4

setup program, failed command switch replacement     37-7, 37-9

severity levels, defining in system messages     26-8

show access-lists hw-summary command     28-7

show cdp traffic command     22-5

show cluster members command     6-23

show configuration command     10-17

show fm command     28-42

show forward command     37-19

show interfaces command     10-14, 10-17

show l2protocol command     15-12, 15-14, 15-15

show mac access-group command     28-28

show running-config command

displaying ACLs     28-20, 28-30, 28-33

interface description in     10-17

show tcam command     28-42

shutdown command on interfaces     10-20

shutdown threshold for Layer 2 protocol packets     15-10

Simple Network Management Protocol

See SNMP

Smartports macros

applying Cisco-default macros     11-6

applying global parameter values     11-5, 11-6

applying macros     11-5

applying parameter values     11-5, 11-7

configuration guidelines     11-3

creating     11-4

default configuration     11-2

defined     11-1

displaying     11-8

tracing     11-3

website     11-2

SNAP     22-1

SNMP

accessing MIB variables with     27-4

agent

described     27-4

disabling     27-7

community strings

configuring     27-7

for cluster switches     27-4

overview     27-4

configuration examples     27-16

default configuration     27-6

groups     27-9

in-band management     1-3

in clusters     6-15

informs

and trap keyword     27-11

described     27-5

differences from traps     27-5

enabling     27-13

limiting access by TFTP servers     27-15

limiting system log messages to NMS     26-10

manager functions     1-8, 27-3

managing clusters with     6-24

MIBs

location of     A-3

supported     A-1

notifications     27-5

overview     27-1, 27-4

status, displaying     27-17

system contact and location     27-15

trap manager, configuring     27-12, 27-14

traps

described     27-3, 27-5

differences from informs     27-5

enabling     27-11, 27-14

enabling MAC address notification     7-24

overview     27-1, 27-4

types of     27-11

users     27-9

versions supported     27-2

snooping, IGMP     20-2

software images

location in flash     B-19

recovery procedures     37-2

scheduling reloads     4-16

tar file format, described     B-20

See also downloading and uploading

source addresses, in ACLs     28-12

SPAN

configuration guidelines     24-9

default configuration     24-8

destination ports     24-5

displaying status     24-24

IDS     24-2

interaction with other features     24-7

monitored ports     24-4

monitoring ports     24-5

overview     1-7, 24-1

received traffic     24-3

session limits     24-8

sessions

creating     24-10

defined     24-3

limiting source traffic to specific VLANs     24-15

monitoring VLANs     24-14

removing destination (monitoring) ports     24-13

removing source (monitored) ports     24-13

specifying monitored ports     24-10

source ports     24-4

transmitted traffic     24-4

VLAN-based     24-6

spanning tree and native VLANs     12-18

Spanning Tree Protocol

See STP

speed, configuring on interfaces     10-13

split horizon

IGRP     31-28

RIP     31-22

SSH

configuring     8-39

cryptographic software image     8-37

described     8-38

encryption methods     8-38

user authentication methods, supported     8-38

Stack Membership Discovery Protocol     18-6

Standby Command Configuration window     6-22

standby command switch

configuring      6-20

considerations     6-12

defined     6-2

priority     6-11

requirements     6-3

virtual IP address     6-12

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

standby ip command     32-5

standby router     32-1

standby timers, HSRP     32-9

startup configuration

booting

manually     4-12

specific image     4-13

clearing     B-18

configuration file

automatically downloading     4-12

specifying the filename     4-12

default boot configuration     4-11

static access ports

assigning to VLAN     12-11

defined     10-3, 12-3

static addresses

See addresses

static IP routing     1-6

static MAC addressing     1-4

static routes, configuring     31-77

static routing     31-2

static VLAN membership     12-2

statistics

802.1x     9-22

CDP     22-5

interface     10-19

IP multicast routing     34-52

OSPF     31-37

QoS ingress and egress     29-70

RMON group Ethernet     25-5

RMON group history     25-5

SNMP input and output     27-17

VTP     13-16

sticky learning

configuration file     21-8

defined     21-8

disabling     21-8

enabling     21-8

saving addresses     21-8

storm control

configuring     21-3

described     21-1

displaying     21-14

thresholds     21-2

STP

accelerating root port selection     18-4

BackboneFast

described     18-9

enabling     18-19

BPDU filtering

described     18-3

enabling     18-16

BPDU guard

described     18-2

enabling     18-15

BPDU message exchange     16-2

configuration guidelines     16-12, 18-14

configuring

forward-delay time     16-22

hello time     16-21

in cascaded stack     16-23

maximum aging time     16-22

path cost     16-18

port priority     16-17

root switch     16-14

secondary root switch     16-16

spanning-tree mode     16-13

switch priority     16-20

counters, clearing     16-24

cross-stack UplinkFast

described     18-5

enabling     18-18

default configuration     16-11

default optional feature configuration     18-14

designated port, defined     16-3

designated switch, defined     16-3

detecting indirect link failures     18-10

disabling     16-14

displaying status     16-23

EtherChannel guard

described     18-11

enabling     18-19

extended system ID

affects on root switch     16-14

affects on the secondary root switch     16-16

overview     16-3

unexpected behavior     16-15

features supported     1-3

inferior BPDU     16-3

instances supported     16-9

interface state, blocking to forwarding     18-2

interface states

blocking     16-5

disabled     16-6

forwarding     16-5, 16-6

learning     16-6

listening     16-6

overview     16-4

interoperability and compatibility among modes     16-10

Layer 2 protocol tunneling     15-7

limitations with 802.1Q trunks     16-10

load sharing

overview     12-23

using path costs     12-25

using port priorities     12-24

loop guard

described     18-13

enabling     18-21

modes supported     16-9

multicast addresses, affect of     16-8

optional features supported     1-4

overview     16-2

path costs     12-25, 12-26

Port Fast

described     18-2

enabling     18-14

port priorities     12-24

preventing root switch selection     18-12

protocols supported     16-9

redundant connectivity     16-7

root guard

described     18-12

enabling     18-20

root port, defined     16-3

root switch

affects of extended system ID     16-3, 16-14

configuring     16-14

election     16-3

unexpected behavior     16-15

settings in a cascaded stack     16-23

shutdown Port Fast-enabled port     18-2

superior BPDU     16-3

timers, described     16-21

UplinkFast

described     18-3

enabling     18-17

VLAN-bridge     16-10

stratum, NTP     7-2

stub areas, OSPF     31-33

subnet mask     31-5

subnet zero     31-6

summer time     7-14

SunNet Manager     1-8

supernet     31-7

SVIs

and IP unicast routing     31-3

and router ACLs     28-3

connecting VLANs     10-6

defined     10-4

routing between VLANs     12-2

switch clustering technology

See clusters, switch

switch console port     1-3

switched packets, ACLs on     28-37

switched ports     10-2

Switch Manager     3-9

switchport block multicast command     21-6

switchport block unicast command     21-6

switchport command     10-11

switchport mode dot1q-tunnel command     15-6

switchport protected command     21-5

switch priority

MSTP     17-19

STP     16-20

switch software features     1-1

switch virtual interface

See SVI

synchronization, BGP     31-48

syslog

See system message logging

system clock

configuring

daylight saving time     7-14

manually     7-12

summer time     7-14

time zones     7-13

displaying the time and date     7-12

overview     7-1

See also NTP

System Database Management

See SDM

system message logging

default configuration     26-3

defining error message severity levels     26-8

disabling     26-4

displaying the configuration     26-12

enabling     26-4

facility keywords, described     26-12

level keywords, described     26-9

limiting messages     26-10

message format     26-2

overview     26-1

sequence numbers, enabling and disabling     26-8

setting the display destination device     26-4

synchronizing log messages     26-6

syslog facility     1-7

timestamps, enabling and disabling     26-7

UNIX syslog servers

configuring the daemon     26-11

configuring the logging facility     26-11

facilities supported     26-12

system MTU

802.1Q tunneling     15-5

maximums     15-5

system name

default configuration     7-16

default setting     7-16

manual configuration     7-16

See also DNS

system prompt

default setting     7-16

manual configuration     7-17

system resource templates     7-29

system routes, IGRP     31-24

T

TACACS+

accounting, defined     8-11

authentication, defined     8-11

authorization, defined     8-11

configuring

accounting     8-17

authentication key     8-13

authorization     8-16

login authentication     8-14

default configuration     8-13

displaying the configuration     8-17

identifying the server     8-13

in clusters     6-15

limiting the services to the user     8-16

operation of     8-12

overview     8-10

tracking services accessed by user     8-17

tagged packets

802.1Q     15-3

Layer 2 protocol     15-7

tail drop

described     29-13

support for     1-6

tar files

creating     B-5

displaying the contents of     B-6

extracting     B-7

image file format     B-20

TCAMs

ACL regions     28-46

ACLs not loading in     28-44

allocations, monitoring     28-47

monitoring usage     28-46

Telnet

accessing management interfaces     2-9

from a browser     2-9

number of connections     1-3

setting a password     8-6

templates, system resources     7-29

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password     8-6

ternary content addressable memory. See TCAM

TFTP

configuration files

downloading     B-11

preparing the server     B-10

uploading     B-11

configuration files in base directory     4-6

configuring for autoconfiguration     4-6

image files

deleting     B-23

downloading     B-21

preparing the server     B-21

uploading     B-23

limiting access by servers     27-15

TFTP server     1-2

threshold, traffic level     21-2

time

See NTP and system clock

time-range command     28-17

time ranges in ACLs     28-17

timestamps in log messages     26-7

time zones     7-13

Token Ring VLANs

support for     12-5

VTP support     13-4

Topology view

described     3-2, 3-13

TOS     1-5

traceroute, Layer 2

and ARP     37-15

and CDP     37-15

described     37-14

IP addresses and subnets     37-15

MAC addresses and VLANs     37-15

multicast traffic     37-15

multiple devices on a port     37-16

unicast traffic     37-14

usage guidelines     37-15

traceroute command     37-13

See also IP traceroute

traffic

blocking flooded     21-6

fragmented     28-5

unfragmented     28-5

traffic policing     1-6

traffic suppression     21-2

transparent mode, VTP     13-3, 13-12

trap-door mechanism     4-2

traps

configuring MAC address notification     7-24

configuring managers     27-11, 27-14

defined     27-3

enabling     7-24, 27-11, 27-14

notification types     27-11

overview     27-1, 27-4

troubleshooting

connectivity problems     37-11

detecting unidirectional links     23-1

determining packet disposition     37-19

displaying crash information     37-20

GBIC security and identification     37-11

PIMv1 and PIMv2 interoperability problems     34-22

show forward command     37-19

with CiscoWorks     27-4

with debug commands     37-16

with ping     37-11

with system message logging     26-1

with traceroute     37-13

trunking encapsulation     1-4

trunk ports

configuring     12-20

defined     10-3, 12-3

encapsulation     12-20, 12-25, 12-26

trunks

allowed-VLAN list     12-21

configuring     12-20, 12-25, 12-26

ISL     12-16

load sharing

setting STP path costs     12-25

using STP port priorities     12-24

native VLAN for untagged traffic     12-23

parallel     12-25

pruning-eligible list     12-22

to non-DTP device     12-16

VLAN 1 minimization     12-21

trusted boundary for QoS     29-33

tunneling

802.1Q     15-1

defined     15-1

Layer 2 protocol     15-7

tunnel ports

802.1Q, configuring     15-6

802.1Q and ACLs     28-3

defined     12-3

described     10-4, 15-1

incompatibilities with other features     15-5

twisted-pair Ethernet, detecting unidirectional links     23-1

type of service

See TOS

U

UDLD

default configuration     23-4

echoing detection mechanism     23-3

enabling

globally     23-5

per interface     23-5

Layer 2 protocol tunneling     15-9

link-detection mechanism     23-1

neighbor database     23-2

overview     23-1

resetting an interface     23-6

status, displaying     23-7

support for     1-3

UDP, configuring     31-15

unauthorized ports with 802.1x     9-4

unequal-cost load balancing, IGRP     31-25

unicast MAC address filtering

and adding static addresses     7-27

and broadcast MAC addresses     7-27

and CPU packets     7-27

and multicast addresses     7-27

and router MAC addresses     7-27

configuration guidelines     7-27

described     7-27

unicast storm control command     21-3

unicast storms     21-1

unicast traffic, blocking     21-6

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration     26-11

facilities supported     26-12

message logging configuration     26-11

unrecognized Type-Length-Value (TLV) support     13-4

upgrading software images

See downloading

UplinkFast

described     18-3

enabling     18-17

support for     1-3

uploading

configuration files

preparing     B-10, B-12, B-16

reasons for     B-8

using FTP     B-14

using RCP     B-17

using TFTP     B-11

image files

preparing     B-21, B-24, B-28

reasons for     B-19

using FTP     B-26

using RCP     B-31

using TFTP     B-23

User Datagram Protocol

See UDP

user EXEC mode     2-2

username-based authentication     8-7

V

version-dependent transparent mode     13-4

virtual IP address

cluster standby group     6-12, 6-21

command switch     6-12, 6-21

See also IP addresses

Virtual Private Network

See VPN

virtual router     32-1, 32-3

vlan.dat file     12-4

VLAN 1 minimization, support for     1-4

VLAN ACLs

See VLAN maps

VLAN configuration

at bootup     12-7

saving     12-7

VLAN configuration mode     2-2, 12-6

VLAN database

and startup configuration file     12-7

and VTP     13-1

VLAN configuration saved in     12-7

VLANs saved in     12-4

vlan database command     12-6

vlan dot1q tag native command     15-4

vlan global configuration command     12-6

VLAN ID, discovering     7-32

VLAN management domain     13-2

VLAN Management Policy Server

See VMPS

VLAN map entries, order of     28-30

VLAN maps

applying     28-33

common uses for     28-33

configuration example     28-34

configuration guidelines     28-30

configuring     28-29

creating     28-30

defined     28-2

denying access example     28-35

denying and permitting packets     28-31

displaying     28-41

examples     28-35

support for     1-5

usage     28-4

VLAN membership

confirming     12-31

modes     12-3

VLAN Query Protocol

See VQP

VLANs

adding     12-8

adding to VLAN database     12-8

aging dynamic addresses     16-8

allowed on trunk     12-21

and spanning-tree instances     12-2, 12-6, 12-13

configuration guidelines, normal-range VLANs     12-5

configuration options     12-6

configuring     12-1

configuring IDs 1006 to 4094     12-12

connecting through SVIs     10-6

creating in config-vlan mode     12-8

creating in VLAN configuration mode     12-9

customer numbering in service-provider networks     15-3

default configuration     12-7

deleting     12-10

described     10-2, 12-1

displaying     12-15

extended-range     12-1, 12-12

features     1-4

illustrated     12-2

internal     12-13

limiting source traffic with RSPAN     24-23

limiting source traffic with SPAN     24-15

modifying     12-8

monitoring with RSPAN     24-22

monitoring with SPAN     24-14

native, configuring     12-23

normal-range     12-1, 12-4

number supported     1-4

parameters     12-4

port membership modes     12-3

static-access ports     12-11

STP and 802.1Q trunks     16-10

supported     12-2

Token Ring     12-5

traffic between     12-2

trunks, VLAN 1 minimization     12-21

VLAN-bridge STP     16-10, 36-1

VTP modes     13-3

VLAN Trunking Protocol

See VTP

VLAN trunks     12-16

VMPS

administering     12-32

configuration example     12-33

configuration guidelines     12-29

default configuration     12-29

description     12-27

dynamic port membership

described     12-28

reconfirming     12-31

troubleshooting     12-33

entering server address     12-30

mapping MAC addresses to VLANs     12-27

monitoring     12-32

reconfirmation interval, changing     12-31

reconfirming membership     12-31

retry count, changing     12-32

voice VLAN

Cisco 7960 phone, port connections     14-1

configuration guidelines     14-3

configuring IP phones for data traffic

override CoS of incoming frame     14-5

trust CoS priority of incoming frame     14-6

configuring ports for voice traffic in

802.1p priority tagged frames     14-4

802.1Q frames     14-4

connecting to an IP phone     14-3

default configuration     14-2

described     14-1

displaying     14-6

VPN

configuring routing in     31-70

forwarding     31-67

in service provider networks     31-65

routes     31-65

VPN routing and forwarding table

See VRF

VQP     1-4, 12-27

VRF

defining     31-67

tables     31-65

VTP

adding a client to a domain     13-14

advertisements     12-19, 13-3

and extended-range VLANs     13-1

and normal-range VLANs     13-1

client mode, configuring     13-11

configuration

global configuration mode     13-7

guidelines     13-8

privileged EXEC mode     13-7

requirements     13-9

saving     13-7

VLAN configuration mode     13-7

configuration mode options     13-7

configuration requirements     13-9

configuration revision number

guideline     13-14

resetting     13-15

configuring

client mode     13-11

server mode     13-9

transparent mode     13-12

consistency checks     13-4

default configuration     13-6

described     13-1

disabling     13-12

domain names     13-8

domains     13-2

Layer 2 protocol tunneling     15-7

modes

client     13-3, 13-11

server     13-3, 13-9

transitions     13-3

transparent     13-3, 13-12

monitoring     13-16

passwords     13-8

pruning

disabling     13-14

enabling     13-14

examples     13-5

overview     13-4

support for     1-4

pruning-eligible list, changing     12-22

server mode, configuring     13-9

statistics     13-16

support for     1-4

Token Ring support     13-4

transparent mode, configuring     13-12

using     13-1

version, guidelines     13-8

version 1     13-4

version 2

configuration guidelines     13-8

disabling     13-13

enabling     13-13

overview     13-4

W

WCCP

authentication     33-4

configuration guidelines     33-5

default configuration     33-5

described     33-2

displaying     33-9

enabling     33-6

features unsupported     33-4

forwarding method     33-3

Layer-2 header rewrite     33-3

MD5 security     33-4

message exchange     33-3

monitoring and maintaining     33-9

negotiation     33-3

packet redirection     33-4

packet-return method     33-3

redirecting traffic received from a client     33-6

setting the password     33-6

unsupported WCCPv2 features     33-4

Web Cache Communication Protocol

See WCCP

Weighted Random Early Detection

See WRED

Weighted Round Robin

See WRR

weighted round robin, described     29-4

wizards     1-9, 3-6

WRED     1-6, 29-14

WRR     1-6, 29-4

X

Xmodem protocol     37-2