Catalyst 3550 Multilayer Switch Software Configuration Guide, 12.1(4)EA1
Index
Downloads: This chapterpdf (PDF - 1.14MB) The complete bookPDF (PDF - 12.48MB) | Feedback

index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - Q - R - S - T - U - V - W - X -

index

Numerics

802.1Q

and trunk ports     7-3

configuration limitations     8-24

encapsulation     8-22, 8-24

native VLAN for untagged traffic     8-29

802.3Z flow control     7-15

A

abbreviating commands     2-3

ABRs     20-36

AC (command switch)     5-11, 5-18

access-class command     17-18

access control entries

See ACEs

access-denied response, VMPS     8-33

access groups

IP     17-19

Layer 3     17-19

viewing     17-21

access lists

See ACLs

access ports

defined     7-2

in switch clusters     5-10

accounting with TACACS+     6-10, 6-16

ACEs

defined     17-2

Ethernet     17-2

IP     17-2

Layer 3 parameters     17-10

Layer 4 parameters     17-10

ACLs

ACEs     17-2

any keyword     17-12

applying

on bridged packets     17-37

on multicast packets     17-39

on routed packets     17-38

on switched packets     17-36

time ranges to     17-15

to an interface     17-18

comments in     17-17

compiling     17-21

configuring with VLAN maps     17-33

defined     17-1, 17-6

determining fit in hardware     17-34

displaying interface     17-21

examples of     17-21

extended IP

creating     17-9

matching criteria     17-7

hardware and software handling     17-5

host keyword     17-12

ACLs (continued)

IP

applying to interface     17-18

creating     17-6

implicit deny     17-8, 17-13, 17-15

implicit masks     17-8

matching criteria     17-3, 17-7

named     17-14

undefined     17-19

violations, logging     17-15

virtual terminal lines, setting on     17-18

limiting actions     17-34

logging messages     17-9

log keyword     17-15

MAC extended     17-27

matching     17-6, 17-19

monitoring     17-20

named     17-14

numbers     17-7

protocol parameters     17-9

QoS     17-2

router     17-2

standard IP

creating     17-8

matching criteria     17-7

supported features     17-5

support for     1-4

time ranges     17-15

unsupported features     17-6

using router ACLs with VLAN maps     17-33

VLAN maps

configuration guidelines     17-27

configuring     17-26

defined     17-3

active router     21-1

addresses

displaying the MAC address table     6-41

dynamic

accelerated aging     9-9

changing the aging time     6-39

default aging     9-9

defined     6-37

learning     6-38

preventing frame forwarding     24-5

removing     6-40

filtering frames by MAC address     24-6

multicast

group address range     22-1

STP address management     9-8

static

adding and removing     6-40

defined     6-37

address resolution     20-10

Address Resolution Protocol

See ARP

adjacency tables, with CEF     20-54

administrative distances

defined     20-62

OSPF     20-42

routing protocol defaults     20-57

advertisements

CDP     12-1

IGRP     20-31

RIP     20-26

VTP     8-4, 8-5, 8-25

aggregated ports

See EtherChannel

aggregate policing     1-4

aging, accelerating     9-9

alarms, RMON     14-3

allowed-VLAN list     8-27

Apply button     3-25

area border routers

See ABRs

ARP

configuring     20-11

definition     20-10

encapsulation     20-12

static cache configuration     20-11

support for     1-2

ASBRs     20-36

audience     xxv

authentication

EIGRP     20-51

HSRP     21-8

NTP associations     6-21

TACACS+

defined     6-10

key     6-13

login     6-13

authentication keys, and routing protocols     20-63

authoritative time source, described     6-18

authorization with TACACS+     6-10, 6-15

autoconfiguration     4-3

automatic discovery

adding member switches     5-16

considerations

beyond a non-candidate device     5-8

brand new switches     5-10

connectivity     5-6

edge device     5-6

management VLANs     5-8

routed ports     5-9

VLANs     5-7

creating a cluster standby group     5-18

in switch clusters     5-4

See also CDP

automatic recovery, clusters     5-11

See also HSRP

autonegotiation

duplex mode     1-2

interface configuration guidelines     7-13

mismatches     25-8

autonomous system boundary routers

See ASBRs

Auto-RP, described     22-8

autosensing, port speed     1-2

B

BackboneFast     1-3, 9-18, 9-35

bandwidth, graphs     3-8

banners

configuring

login     6-37

message-of-the-day login     6-36

default configuration     6-35

when displayed     6-35

binding cluster group and HSRP group     21-9

blocking packets     11-7

booting

boot loader, function of     4-2

boot process     4-1

manually     4-13

specific image     4-14

boot loader

accessing     4-15

described     4-2

environment variables     4-15

prompt     4-15

trap-door mechanism     4-2

bootstrap router (BSR), described     22-8

BPDU     1-4

BPDU guard, STP     9-11, 9-32

bridged packets, ACLs on     17-37

bridge groups

See fallback bridging

Bridge Protocol Data Unit

See BPDU

broadcast flooding     20-21

broadcast packets

directed     20-17

flooded     20-17

broadcast storms     11-1, 20-18

browser configuration     3-1, 5-1

buttons, CMS     3-25

C

cables, monitoring for unidirectional links     13-1

Cancel button     3-25

candidate switch

adding     5-16

automatic discovery     5-4

defined     5-3

HC     5-18

passwords     5-16

requirements     5-3

standby group     5-18

See also command switch, cluster standby group, and member switch

caution, description     xxviii

CC (command switch)     5-18

CDP

automatic discovery in switch clusters     5-4

configuring     12-2

default configuration     12-2

description     12-1

disabling for routing device     12-3, 12-4

enabling and disabling on an interface     12-4

enabling and disabling on a switch     12-3

monitoring     12-5

overview     12-1

support for     1-2

transmission timer and holdtime, setting     12-2

updates     12-2

CEF     20-54

CGMP

as IGMP snooping learning method     10-6

clearing cached group entries     22-57

enabling server support     22-38

FastLeave feature     22-13

hosts

joining a group     22-12

leaving a group     22-13

joining multicast group     10-2

overview     22-11

server support only     22-11

switch support of     1-2

change notification, CMS     3-27

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco Technical Assistance Center     xxxi

CiscoWorks 2000     1-6, 16-3

classless routing     20-8

class maps for QoS

configuring     18-25

described     18-7

displaying     18-46

class of service

See CoS

Clear Fault option     3-21

client mode, VTP     8-4

Cluster Management Suite

See CMS

clusters, switch

accessing     5-13

adding member switches     5-16

automatic discovery     5-4

automatic recovery     5-11

benefits     1-7

clusters, switch (continued)

command switch configuration     5-15

compatibility     5-4

creating     5-15

creating a cluster standby group     5-18

described     5-1

managing through CLI     5-20

managing through SNMP     5-21

planning considerations

automatic discovery     5-4

automatic recovery     5-11

CLI     5-20

described     5-4

host names     5-13

IP addresses     5-13

passwords     5-14

SNMP     5-14, 5-21

redundancy     5-18

troubleshooting     5-19

verifying     5-19

See also candidate switch, command switch, cluster standby group, and member switch

cluster standby group

automatic recovery     5-11

considerations     5-12

creating     5-18

defined     5-2

requirements     5-3

virtual IP address     5-11

See also HSRP

cluster standby-group and HSRP group     21-9

cluster tree

described     3-5

icons     3-5

CMS

accessing     3-26

benefits     1-7

change notification     3-27

described     1-1, 1-6, 3-1

different versions of     3-28

error checking     3-27

features     3-2

interaction modes     3-22

menu bar     3-13

online help     3-23

requirements     3-26

saving configuration changes     3-27

toolbar     3-18

verifying configuration changes     3-27

window components     3-24

command-line interface

abbreviating commands     2-3

command modes     2-1

described     1-6

editing features

enabling and disabling     2-6

keystroke editing     2-6

wrapped lines     2-8

error messages     2-4

filtering command output     2-8

getting help     2-3

history

changing the buffer size     2-5

described     2-5

disabling     2-5

recalling commands     2-5

managing clusters     5-20

no and default forms of commands     2-4

command modes     2-1

commands

abbreviating     2-3

no and default     2-4

setting privilege levels     6-7

command switch

active (AC)     5-11, 5-18

command switch with HSRP disabled (CC)     5-18

configuration conflicts     25-7

defined     5-2

enabling     5-15

passive (PC)     5-11, 5-18

password privilege levels     5-20

priority     5-11

recovery

from failure     25-4

from lost member connectivity     25-7

recovery from command-switch failure     5-11

redundant     5-11, 5-18

replacing

with another switch     25-6

with cluster member     25-4

requirements     5-2

standby (SC)     5-11, 5-18

See also candidate switch, clusters, and cluster standby group

community strings

configuring     5-14, 16-5

for cluster switches     16-3

in clusters     5-14

overview     16-3

SNMP     5-14

configuration conflicts, recovering from lost member connectivity     25-7

configuration examples, network     1-8

configuration files

clearing the startup configuration     B-19

creating using a text editor     B-10

deleting a stored configuration     B-19

described     B-8

downloading

automatically     4-12

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

guidelines for creating and using     B-9

invalid combinations when copying     B-5

limiting TFTP server access     16-9

obtaining with DHCP     4-7

specifying the filename     4-13

system contact and location information     16-8

types and location     B-9

uploading

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-15

using RCP     B-18

using TFTP     B-12

VMPS database     8-34

configuration settings, saving     4-10

configure terminal command     7-7

conflicts, configuration     25-7

congestion-avoidance techniques     18-11

congestion-management techniques     18-11

connectivity problems     25-8

consistency checks in VTP version 2     8-6

conventions

command     xxviii

for examples     xxviii

publication     xxviii

text     xxviii

CoS     1-4, 18-2

CoS-to-DSCP map for QoS     18-34

CoS-to-egress-queue map     18-40

counters, clearing interface     7-19

cross-stack UplinkFast, STP

configuring     9-34

connecting stack ports     9-16

described     9-13

fast-convergence events     9-15

Fast Uplink Transition Protocol     9-14

limitations     9-16

normal-convergence events     9-15

Stack Membership Discovery Protocol     9-14

support for     1-3

D

database, VTP     8-15, 8-17

daylight saving time     6-30

debugging

enabling all system diagnostics     25-12

enabling for a specific feature     25-12

redirecting error message output     25-12

using commands     25-11

default commands     2-4

default configuration

banners     6-35

booting     4-12

CDP     12-2

DNS     6-34

EIGRP     20-48

EtherChannel     19-7

fallback bridging     24-3

HSRP     21-3

IGMP     22-31

IGMP snooping     10-5

IGRP     20-31

initial switch information     4-3

IP addressing, IP routing     20-4

default configuration (continued)

IP multicast routing     22-13

Layer 2 interfaces     7-12

MAC address table     6-39

MSDP     23-4

MVR     10-15

NTP     6-20

OSPF     20-37

password and privilege level     6-3

QoS     18-14

RIP     20-26

RMON     14-3

SNMP     16-4

STP     9-21

system message logging     15-3

system name and prompt     6-32

TACACS+     6-12

UDLD     13-3

VLAN, Layer 2 Ethernet interfaces     8-24

VLANs     8-15

VMPS     8-36

VTP     8-8

default gateway     4-10, 20-15

default networks     20-57

default routes     20-57

default routing     20-2

deleting VLAN from database     8-18

description command     7-16

designing your network, examples     1-8

destination addresses, in ACLs     17-11

device discovery protocol     12-1

device labels     3-12

Device Manager     3-2

See also Switch Manager

device pop-up menu

Front Panel view     3-19

Topology view     3-20

DHCP

autoconfiguration example     4-8

client request message exchange     4-4

configuring

client side     4-3

DNS     4-6

relay device     4-6

server-side     4-5

TFTP server     4-5

lease options

for IP address information     4-5

for receiving the configuration file     4-5

overview     4-3

relationship to BOOTP     4-3

support for     1-2

DHCP relay     1-5

Differentiated Services architecture, QoS     18-1

Differentiated Services Code Point     18-2

Diffusing Update Algorithm (DUAL)     20-47

directed unicast requests     1-2

directories

changing     B-3

creating and removing     B-4

displaying the working     B-3

discovery, clusters

See automatic discovery

Disqualification Code option     3-21

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols     20-2

distribute-list command     20-62

DNS

and DHCP-based autoconfiguration     4-6

default configuration     6-34

displaying the configuration     6-35

overview     6-33

setting up     6-34

support for     1-2

documentation

feedback     xxx

obtaining

CD-ROM     xxix

world wide web     xxix

ordering     xxx

related     xxix

document conventions     xxviii

domain names     6-33

domain names, VTP     8-9

Domain Name System

See DNS

downloading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

image files

deleting old image     B-23

preparing     B-22, B-25, B-29

reasons for     B-19

using FTP     B-26

using RCP     B-30

using TFTP     B-22

DSCP     1-4, 18-2

DSCP-to-CoS map for QoS     18-37

DSCP-to-DSCP-mutation map for QoS     18-38

DSCP-to-threshold map     18-42

DTP     1-3, 8-22

DUAL finite state machine, EIGRP     20-47

duplex mode, configuring     7-14

DVMRP

all-DVMRP-routers multicast group address     22-11

autosummarization

configuring a summary address     22-54

disabling     22-56

connecting PIM domain to DVMRP router     22-46

enabling unicast routing     22-50

interoperability

with Cisco devices     22-44

with IOS software     22-11

mrinfo requests, responding to     22-49

neighbors

advertising the default route to     22-48

discovery with Probe messages     22-11, 22-44

displaying information     22-49

prevent peering with nonpruning     22-52

rejecting nonpruning     22-51

overview     22-11

routes

adding a metric offset     22-56

advertising all     22-56

advertising the default route to neighbors     22-48

caching DVMRP routes learned in report messages     22-50

changing the threshold for syslog messages     22-54

deleting     22-57

displaying     22-58

favoring one over another     22-56

limiting the number injected into MBONE     22-53

limiting unicast route advertisements     22-44

route table, building     22-11

source distribution tree, building     22-11

support for     1-5

tunnels

configuring     22-46

displaying neighbor information     22-49

dynamic access ports

characteristics     8-3

configuring     8-38

defined     7-2

limit on number of hosts     8-40

dynamic addresses

See addresses

Dynamic Host Configuration Protocol

See DHCP

dynamic port VLAN membership

configuration example     8-40

overview     8-34

reconfirming     8-38, 8-39

troubleshooting     8-40

types of connections     8-38

VMPS database configuration file     8-34

dynamic routing     20-2

Dynamic Trunking Protocol

See DTP

E

editing features

enabling and disabling     2-6

keystrokes used     2-6

wrapped lines     2-8

EIGRP

and IGRP     20-49

authentication     20-51

components     20-47

configuring     20-49

default configuration     20-48

definition     20-47

interface parameters, configuring     20-50

monitoring     20-52

support for     1-5

enable password     6-4

enable secret password     6-4

encapsulation types, Ethernet trunk     8-24

encryption for passwords     6-4

Enhanced IGRP

See EIGRP

environment variables

function of     4-16

location in Flash     4-15

equal-cost routing     1-5, 20-55

error checking, CMS     3-27

error messages

during command entry     2-4

setting the display destination device     15-4

severity levels     15-8

system message format     15-2

EtherChannel

automatic creation of     19-3

configuration guidelines     19-8

configuring

Layer 2 interfaces     19-9

Layer 3 physical interfaces     19-12

Layer 3 port-channel logical interfaces     19-11

default configuration     19-7

displaying status     19-16

forwarding methods     19-5, 19-13

interaction

with STP     19-8

with VLANs     19-8

Layer 3 interface     20-3

load balancing     19-5, 19-13

logical interfaces     19-2

overview     19-1

EtherChannel (continued)

PAgP

aggregate-port learners     19-5

compatibility with Catalyst 1900     19-14

displaying status     19-16

interaction with other features     19-5

learn method and priority configuration     19-14

modes     19-4

overview     19-3

physical learners     19-5

silent mode     19-4

support for     1-2

port-channel interfaces     19-2

port groups     7-3

support for     1-2

Ethernet VLAN

defaults and ranges     8-16

modifying     8-18

events, RMON     14-3

examples

conventions for     xxviii

network configuration     1-8

expert mode     3-22

exterior routes, IGRP     20-31

F

fallback bridging

bridge groups

creating     24-4

described     24-2

displaying     24-12

number supported     24-4

removing     24-4

bridge table

changing the aging time     24-5

clearing     24-12

displaying     24-12

fallback bridging (continued)

connecting interfaces with     7-6

default configuration     24-3

described     24-1

frame forwarding

filtering by MAC address     24-6

flooding packets     24-2

for static addresses     24-5

forwarding packets     24-2

preventing for dynamically learned stations     24-5

to static addresses     24-5

overview     24-1

STP

disabling on an interface     24-12

forward-delay interval     24-10

hello BPDU interval     24-10

interface priority     24-8

maximum-idle interval     24-11

path cost     24-9

switch priority     24-8

VLAN-bridge STP     24-1, 24-2

support for     1-5

SVIs and routed ports     24-1

VLAN-bridge STP     9-8

fallback VLAN name     8-34

fan fault indication     3-5

Fast Uplink Transition Protocol     9-14

feedback to Cisco Systems, web     xxx

FIB     20-54

fiber-optic, detecting unidirectional links     13-1

files

copying     B-4

deleting     B-5

displaying the contents of     B-8

tar

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

file system

displaying available file systems     B-2

displaying file information     B-3

local file system names     B-1

network file system names     B-4

setting the default     B-3

filtering in a VLAN     17-26

filtering non-IP traffic     17-27

filtering show and more command output     2-8

filters, IP

See ACLs, IP

Flash device, number of     B-1

flash updates, IGRP     20-32

flooded traffic, blocking     11-7

flow-based packet classification     1-4

flow control     1-2, 7-15

forward-delay time, STP     9-6, 9-28

Forwarding Information Base

See FIB

forwarding non-routable protocols     24-1

front-panel images

described     3-6

port icons     3-6

port LEDs     3-8

RPS LED     3-7

system LED     3-6

Front Panel view

cluster tree     3-5

described     3-3

pop-up menus     3-19

switch images     3-6

FTP

accessing MIB files     A-2

configuration files

downloading     B-13

overview     B-12

preparing the server     B-13

uploading     B-15

FTP (continued)

image files

deleting old image     B-28

downloading     B-26

preparing the server     B-25

uploading     B-28

G

GBICs

1000BASE-LX/LH module     1-10

1000BASE-SX module     1-10

1000BASE-T module     1-10

1000BASE-ZX module     1-10

GigaStack     1-10

get-next-request operation     16-2, 16-3

get-request operation     16-2, 16-3

get-response operation     16-2

Gigabit GBIC modules

See GBICs

Gigabit Interface Converters

See GBICs

GigaStack GBIC

fast transition of redundant link     9-13

See GBICs

global configuration mode     2-2

graphs, bandwidth     3-8

guide

audience     xxv

organization of     xxvi

purpose of     xxv

guide mode     1-7, 3-22

H

hardware, determining ACL configuration fit     17-34

HC (candidate switch)     5-18

hello time, STP     9-28

help, for the command line     2-3

Help button     3-25

Help Contents     3-23

history

changing the buffer size     2-5

described     2-5

disabling     2-5

recalling commands     2-5

history table, level and number of syslog messages     15-10

host name list, CMS     3-25

host names

abbreviations appended to     5-18

in clusters     5-13

hosts, limit on dynamic ports     8-40

Hot Standby Router Protocol

See HSRP

HP OpenView     1-6

HP Probe     20-10

HP Probe Proxy     20-14

HSRP

authentication string     21-8

automatic cluster recovery     5-11

binding to cluster group     21-9

cluster standby group considerations     5-12

command-switch redundancy     1-1

configuring     21-3

default configuration     21-3

definition     21-1

monitoring     21-10

overview     21-1

priority     21-6

routing redundancy     1-5

timers     21-8

tracking     21-6

See also clusters, cluster standby group, and standby command switch

HTTP

CMS access     3-26

port     3-26

Hypertext Transfer Protocol

See HTTP

I

ICMP

redirect messages     20-15

support for     1-5

time exceeded messages     25-10

traceroute and     25-10

unreachable messages     17-5

unreachables and ACLs     17-5

ICMP ping

executing     25-9

overview     25-8

ICMP Router Discovery Protocol

See IRDP

icons

front-panel images     3-6

toolbar     3-18

topology     3-11

IFS     1-2

IGMP

configuring the switch

as a member of a group     22-34

statically connected member     22-36

controlling access to groups     22-35

default configuration     22-31

deleting cache entries     22-57

displaying groups     22-58

fast switching     22-37

host-query interval, modifying     22-36

joining multicast group     10-2

join messages     10-2

leave processing, enabling     10-8

leaving multicast group     10-4

multicast reachability     22-34

overview     22-3

queries     10-2

IGMP (continued)

support for     1-2

Version 1

changing to Version 2     22-32

hosts joining a group     22-3

hosts leaving a group     22-3

membership queries     22-3

overview     22-3

query-response model     22-3

Version 2

changing to Version 1     22-32

enhancements over Version 1     22-4

hosts leaving a group     22-4

maximum query response time value     22-33

new features     22-4

overview     22-4

pruning groups     22-33

query timeout value     22-33

IGMP snooping

configuring     10-4

default configuration     10-5

definition     10-1

enabling and disabling     10-5

global configuration     10-5

Immediate Leave     10-4

method     10-6

monitoring     10-9

support for     1-2

VLAN configuration     10-5

IGP     20-36

IGRP

advertisements     20-31

configuring     20-33

default configuration     20-31

description     20-31

exterior routes     20-31

flash updates     20-32

interior routes     20-31

load balancing     20-32

IGRP (continued)

poison-reverse updates     20-32

split horizon     20-35

support for     1-5

system routes     20-31

traffic sharing     20-33

Immediate-Leave, IGMP     10-4

implicit forward in VLAN maps     17-27

interaction modes, CMS     3-22

interface

number     7-7

range macros     7-11

interface command     7-7

interface configuration mode     2-2

interfaces

configuration guidelines     7-13

configuring     7-7

configuring duplex mode     7-14

configuring speed     7-14

counters, clearing     7-19

description     7-16

descriptive name, adding     7-16

displaying information about     7-17

flow control     7-15

management     1-6

monitoring     7-16

naming     7-16

physical, identifying     7-7

range of     7-9

restarting     7-19

shutting down     7-19

supported     7-7

types of     7-1

interfaces range macro command     7-11

Interior Gateway Protocol

See IGP

Interior Gateway Routing Protocol

See IGRP

interior routes, IGRP     20-31

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link

See ISL

inter-VLAN routing     1-5, 20-2

inventory, cluster     5-19

IOS File System

See IFS

ip access group command     17-19

IP ACLs

applying to an interface     17-18

extended, creating     17-9

implicit deny     17-8, 17-13, 17-15

implicit masks     17-8

logging     17-15

named     17-14

standard, creating     17-8

undefined     17-19

virtual terminal lines, setting on     17-18

IP addresses

candidate or member     5-3, 5-13

classes of     20-5

cluster access     5-2

command switch     5-2, 5-11, 5-13

default configuration     20-4

for IP routing     20-4

MAC address association     20-10

monitoring     20-22

redundant clusters     5-11

standby command switch     5-11, 5-13

See also IP information

IP broadcast address     20-20

ip cef command     20-54

IP directed broadcasts     20-18

IP information

assigned

manually     4-10

through DHCP-based autoconfiguration     4-3

default configuration     4-3

IP multicast routing

addresses

all-hosts     22-1

all-multicast-routers     22-1

all-PIM-routers     22-10

Cisco-RP-Announce     22-8

Cisco-RP-Discovery     22-8

host group address range     22-1

administratively-scoped boundaries, described     22-42

and IGMP snooping     10-1, 10-4

Auto-RP

adding to an existing sparse-mode cloud     22-19

benefits of     22-18

clearing the cache     22-58

configuration guidelines     22-15

IOS release     22-5

overview     22-8

preventing candidate RP spoofing     22-21

preventing join messages to false RPs     22-20

setting up in a new internetwork     22-19

using with BSR     22-27

bootstrap router

configuration guidelines     22-15

configuring candidate BSRs     22-25

configuring candidate RPs     22-26

defining the IP multicast boundary     22-24

defining the PIM domain border     22-22

IOS release     22-5

overview     22-8

using with Auto-RP     22-27

Cisco implementation     22-2

IP multicast routing (continued)

configuring

basic multicast routing     22-15

IP multicast boundary     22-42

TTL threshold     22-40

default configuration     22-13

enabling

multicast forwarding     22-15

PIM mode     22-16

group-to-RP mappings

Auto-RP     22-8

BSR     22-8

MBONE

deleting sdr cache entries     22-58

described     22-39

displaying sdr cache     22-58

enabling sdr listener support     22-39

limiting DVMRP routes advertised     22-53

limiting sdr cache entry lifetime     22-39

SAP packets for conference session announcement     22-39

Session Directory (sdr) tool, described     22-39

monitoring

packet rate loss     22-59

peering devices     22-59

tracing a path     22-59

multicast forwarding, described     22-9

PIMv1 and PIMv2 interoperability     22-14

protocol interaction     22-2

reverse path check (RPF)     22-9

routing table

deleting     22-58

displaying     22-58

RP

assigning manually     22-17

configuring Auto-RP     22-18

configuring PIMv2 BSR     22-22

monitoring mapping information     22-27

using Auto-RP and BSR     22-27

IP multicast routing (continued)

statistics, displaying system and network     22-58

TTL thresholds, described     22-40

See also CGMP

See also DVMRP

See also IGMP

See also PIM

IP precedence     18-2

IP-precedence-to-DSCP map for QoS     18-35

IP protocols

in ACLs     17-11

routing     1-5

IP routes, monitoring     20-64

IP routing

connecting interfaces with     7-6

enabling     20-25

IP traceroute

executing     25-10

overview     25-10

IP unicast routing

address resolution     20-10

administrative distances     20-57, 20-62

ARP     20-10

assigning IP addresses to Layer 3 interfaces     20-6

authentication keys     20-63

broadcast address     20-20

broadcast flooding     20-21

broadcast packets     20-17

broadcast storms     20-18

classless routing     20-8

configuring static routes     20-56

default addressing configuration     20-4

default gateways     20-15

default networks     20-57

default routes     20-57

default routing     20-2

directed broadcasts     20-18

dynamic routing     20-2

enabling     20-25

IP unicast routing (continued)

EtherChannel Layer 3 interface     20-3

HP Probe     20-10

IGP     20-36

inter-VLAN     20-2

IP addressing

classes     20-5

configuring     20-4

IRDP     20-16

Layer 3 interfaces     20-3

MAC address and IP address     20-10

passive interfaces     20-61

protocols

distance-vector     20-2

dynamic     20-2

link-state     20-2

proxy ARP     20-10

redistribution     20-58

reverse address resolution     20-10

routed ports     20-3

static routing     20-2

steps to configure     20-3

subnet mask     20-5

subnet zero     20-8

supernet     20-8

UDP     20-19

with SVIs     20-3

See also EIGRP

See also IGRP

See also OSPF

See also RIP

ip unreachables command     17-5

IRDP

configuring     20-16

definition     20-16

support for     1-5

ISL

and trunk ports     7-3

encapsulation     1-3, 8-22, 8-24

J

Java plug-in configuration     3-1, 5-1

join messages, IGMP     10-2

L

Layer 2 frames, classification with CoS     18-2

Layer 2 interfaces, default configuration     7-12

Layer 2 trunks     8-22

Layer 3 features     1-5

Layer 3 interfaces

assigning IP addresses to     20-6

changing from Layer 2 mode     20-6

types of     20-3

Layer 3 packets, classification methods     18-2

Layer 3 parameters of ACEs     17-10

Layer 4 parameters of ACEs     17-10

leave processing, IGMP     10-8

LEDs

port     3-8

RPS     3-7

system     3-6

legend, CMS icons and labels     3-17

line configuration mode     2-2

link pop-up menu, Topology view     3-20

link state advertisements (LSAs)     20-40

link-state protocols     20-2

lists, CMS     3-25

load balancing, IGRP     20-32

logging messages, ACL     17-9

login authentication with TACACS+     6-13

login banners     6-35

log messages

See system message logging

Long-Reach Ethernet (LRE) technology     1-9, 3-5

M

MAC address

aging time     6-39

allocation for STP     9-8

and VLAN association     6-38

building the address table     6-38

default configuration     6-39

displaying     6-41

dynamic

learning     6-38

removing     6-40

in ACLs     17-27

IP address association     20-10

static

adding     6-40

characteristics of     6-40

removing     6-41

MAC address multicast entries, monitoring     10-11

MAC address-to-VLAN mapping     8-33

MAC extended access lists     17-27

manageability features     1-2

management

interfaces     1-6

options     1-6

management VLANs, considerations in clusters     5-8

mapping tables for QoS

configuring

CoS-to-egress-queue     18-40

DSCP     18-33

DSCP-to-threshold     18-42

described     18-10

matching, ACLs     17-6

maximum aging time, STP     9-29

maximum-paths command     20-55

membership mode, VLAN port     8-3

member switch

adding     5-16

automatic discovery     5-4

defined     5-2

managing     5-20

passwords     5-13

recovering from lost connectivity     25-7

requirements     5-3

See also candidate switch, clusters, cluster standby group, and command switch

menu bar

described     3-13

variations     3-13

messages, logging ACL violations     17-15

messages to users through banners     6-35

metric translations, between routing protocols     20-60

MIBs

accessing files with FTP     A-2

location of files     A-2

overview     16-1

SNMP interaction with     16-3

supported     A-1

mismatches, autonegotiation     25-8

Mode button     3-8

modes, port     3-8

Modify button     3-25

modules, GBIC

1000BASE-LX/LH     1-10

1000BASE-SX     1-10

1000BASE-T     1-10

1000BASE-ZX     1-10

GigaStack     1-10

monitoring

access groups     17-20

ACLs     17-20

cables for unidirectional links     13-1

CDP     12-5

EIGRP     20-52

fallback bridging     24-12

monitoring (continued)

features     1-5

HSRP     21-10

IGMP snooping     10-9

interfaces     7-16

IP address tables     20-22

IP multicast routing     22-57

IP routes     20-64

MSDP peers     23-18

multicast router interfaces     10-10

MVR     10-19

OSPF     20-45

RP mapping information     22-27

source-active messages     23-18

speed and duplex mode     7-14

traffic flowing among switches     14-1

traffic suppression     11-5

VLAN

filters     17-30

maps     17-30

VMPS     8-40

VTP     8-13

VTP database     8-20

MSDP

and dense-mode regions

sending SA messages to     23-16

specifying the originating address     23-17

benefits of     23-3

clearing MSDP connections and statistics     23-18

controlling source information

forwarded by switch     23-11

originated by switch     23-8

received by switch     23-13

default configuration     23-4

filtering

incoming SA messages     23-14

SA messages to a peer     23-12

SA requests from a peer     23-10

join latency, defined     23-6

MSDP (continued)

meshed groups

configuring     23-15

defined     23-15

originating address, changing     23-17

overview     23-1

peer-RPF flooding     23-2

peers

configuring a default     23-4

monitoring     23-18

peering relationship, overview     23-1

requesting source information from     23-8

shutting down     23-16

source-active messages

caching     23-6

clearing cache entries     23-18

defined     23-2

filtering from a peer     23-10

filtering incoming     23-14

filtering to a peer     23-12

limiting data with TTL     23-13

monitoring     23-18

restricting advertised sources     23-9

multicast groups

and IGMP snooping     10-4

Immediate Leave     10-4

joining     10-2

leaving     10-4

static joins     10-7

multicast packets

ACLs on     17-39

blocking     11-7

multicast router interfaces, monitoring     10-10

multicast router ports, adding     10-7

Multicast Source Discovery Protocol

See MSDP

multicast storms     11-1

Multicast VLAN Registration

See MVR

Multilink Decomposer window     3-20

MVR

configuring interfaces     10-17

default configuration     10-15

description     10-12

modes     10-16

monitoring     10-19

setting global parameters     10-16

support for     1-2

N

named IP ACLs     17-14

native VLANs     8-29

neighbor discovery/recovery, EIGRP     20-47

network configuration examples     1-8

increasing network performance     1-8

large network     1-14

providing network services     1-9

small to medium-sized network     1-12

network design

performance     1-8

services     1-9

network management

configuring CDP     12-1

configuring RMON     14-1

configuring SNMP     16-1

Network Time Protocol

See NTP

no commands     2-4

non-IP traffic filtering     17-27

nontrunking mode     8-23

no switchport command     7-4

note, description     xxviii

not-so-stubby areas

See NSSA

NSSA, OSPF     20-40

NTP

associations

authenticating     6-21

defined     6-18

enabling broadcast messages     6-23

peer     6-22

server     6-22

default configuration     6-20

displaying the configuration     6-27

overview     6-18

restricting access

creating an access group     6-25

disabling NTP services per interface     6-26

source IP address, configuring     6-27

stratum     6-18

support for     1-2

synchronizing devices     6-22

time

services     6-18

synchronizing     6-18

O

OK button     3-25

online help     3-23

Open Shortest Path First

See OSPF

options, management     1-6

OSPF

area parameters, configuring     20-40

configuring     20-38

default configuration

metrics     20-42

route     20-42

settings     20-37

description     20-36

interface parameters, configuring     20-39

LSA group pacing     20-44

monitoring     20-45

OSPF (continued)

router IDs     20-44

route summarization     20-42

support for     1-5

virtual links     20-42

out-of-profile markdown     1-4

overheating indication, switch     3-5

P

packet modification, with QoS     18-13

PAgP

See EtherChannel

parallel links     8-29

parallel paths, in routing tables     20-55

passive interfaces

configuring     20-61

OSPF     20-43

passwords

default configuration     6-3

encrypting     6-4

for security     1-4

in clusters     5-14, 5-16

in CMS     3-26

overview     6-1

recovery of     25-2

setting

enable     6-3

enable secret     6-4

Telnet     6-5

with usernames     6-6

VTP domain     8-9

path cost, STP     9-26

PC (passive command switch)     5-11, 5-18

performance, network design     1-8

performance features     1-2

per-VLAN Spanning Tree (PVST)     1-3, 9-2

per-VLAN Spanning Tree+ (PVST+)     9-8

physical ports     7-2

PIM

default configuration     22-13

dense mode

(S,G) notation     22-6

graft messages     22-6

overview     22-5

pruning and SPT     22-5

rendezvous point (RP), described     22-7

RPF lookups     22-10

displaying neighbors     22-58

enabling a mode     22-16

neighbor discovery and adjacencies     22-10

overview     22-5

router-query message interval, modifying     22-30

shared tree and source tree, overview     22-28

shortest path tree, delaying the use of     22-29

sparse mode

(*,G) notation     22-7

join messages and shared tree     22-7

overview     22-7

prune messages     22-8

RPF lookups     22-10

support for     1-5

versions

interoperability     22-14

supported     22-5

troubleshooting interoperability problems     22-28

v2 improvements     22-5

PIM-DVMRP, as snooping method     10-6

ping

character output description     25-9

executing     25-9

overview     25-8

poison-reverse updates, IGRP     20-32

policed-DSCP map for QoS     18-36

policers

configuring

for each matched traffic class     18-27

for more than one traffic class     18-31

described     18-3

displaying     18-46

number of     1-4, 18-9

types of     18-8

policing     18-3

policy maps for QoS

characteristics of     18-27

configuring     18-27

described     18-7

displaying     18-46

Port Aggregation Protocol

See EtherChannel

See PAgP

port blocking     1-2

port-channel

See EtherChannel

Port Fast, STP     8-36, 9-10, 9-31

Port Fast mode     1-3

port icons, front-panel image     3-6

port LEDs

DUPLX     3-8

port modes     3-8

SPEED     3-8

STAT     3-8

port membership modes, VLAN     8-3

port modes

described     3-8

LEDs     3-8

port pop-up menu, Front Panel view     3-19

port priority, STP     9-25

ports

access     7-2

blocking     11-7

dynamic access     8-3

dynamic VLAN membership, reconfirming     8-38

forwarding, resuming     11-8

protected     11-6

routed     7-4

static-access     8-3, 8-19

switch     7-2

trunks     8-3, 8-22

VLAN assignments     8-19

port-shutdown response, VMPS     8-33

preferential treatment of traffic

See QoS

preventing unauthorized access     6-1

priority, HSRP     21-6

private VLAN edge ports

See protected ports

privileged EXEC mode     2-2

privilege levels

changing the default for lines     6-8

command switch     5-20

exiting     6-9

logging into     6-9

mapping on member switches     5-20

overview     6-2, 6-7

setting a command with     6-7

protected ports     1-4, 11-6

protocol-dependent modules, EIGRP     20-48

Protocol-Independent Multicast Protocol

See PIM

proxy ARP

configuring     20-13

definition     20-10

with IP routing disabled     20-15

pruning, VTP

enabling     8-13

enabling on a port     8-28

examples     8-7

overview     8-6

pruning-eligible list

changing     8-28

VLANs     8-13

publications, related     xxix

PVST     1-3

Q

QoS

ACLs     17-2

basic model     18-3

classification

class maps, described     18-7

defined     18-3

flowchart     18-6

forwarding treatment     18-3

in frames and packets     18-2

IP ACLs, described     18-5, 18-7

MAC ACLs, described     18-4, 18-7

policy maps, described     18-7

port default, described     18-4

trust DSCP, described     18-4

trusted CoS, described     18-4

trust IP precedence, described     18-4

types for IP traffic     18-5

types for non-IP traffic     18-4

class maps

configuring     18-25

displaying     18-46

configuration examples

common wiring closet     18-47

distribution layer     18-49

intelligent wiring closet     18-48

QoS (continued)

configuration guidelines     18-15

configuring

aggregate policers     18-31

default port CoS value     18-19

DSCP maps     18-33

DSCP trust states bordering another domain     18-20

egress queues on Gigabit-capable Ethernet ports     18-39

IP extended ACLs     18-23

IP standard ACLs     18-22

MAC ACLs     18-24

policy maps     18-27

port trust states within the domain     18-17

default configuration     18-14

displaying statistics     18-46

enabling globally     18-16

flowcharts

classification     18-6

policing and marking     18-9

queueing and scheduling     18-11

mapping tables

CoS-to-DSCP     18-34

CoS-to-egress-queue     18-40

displaying     18-46

DSCP-to-CoS     18-37

DSCP-to-DSCP-mutation     18-38

DSCP-to-threshold     18-42

IP-precedence-to-DSCP     18-35

policed-DSCP     18-36

types of     18-10

marked-down actions     18-29

marking, described     18-3, 18-8

overview     18-1

packet modification     18-13

QoS (continued)

policers

configuring     18-29, 18-31

described     18-8

displaying     18-46

number of     18-9

types of     18-8

policies, attaching to an interface     18-9

policing, described     18-3, 18-8

policy maps

characteristics of     18-27

configuring     18-27

displaying     18-46

queueing, defined     18-3

queues

CoS-to-egress-queue map     18-40

serviced by WRR     18-12

size of     18-11

size ratios     18-41

tail-drop percentage thresholds     18-12

tail-drop threshold percentages     18-42

WRED drop percentage thresholds     18-12

WRED drop threshold percentages     18-43

WRR scheduling     18-45

scheduling

allocating bandwidth on Gigabit-capable ports     18-45

defined     18-3

support for     1-4

tail drop

configuring drop threshold percentages     18-42

described     18-12

trust states     18-4

WRED

configuring drop threshold percentages     18-43

described     18-12

WRR scheduling     18-45

quality of service

See QoS

queries, IGMP     10-2

R

Random Early Detection, described     18-12

range

macro     7-11

of interfaces     7-9

RARP     20-10

rcommand command     5-20

RCP

configuration files

downloading     B-17

overview     B-16

preparing the server     B-16

uploading     B-18

image files

deleting old image     B-32

downloading     B-30

preparing the server     B-29

uploading     B-32

reconfirmation interval, VMPS, changing     8-39

recovery procedures     25-1

redundancy

EtherChannel     19-1

features     1-3

HSRP     21-1

STP

backbone     9-9

multidrop backbone     9-13

path cost     8-32

port priority     8-29

redundant clusters

See cluster standby group

redundant power system

See RPS

Refresh button     3-25

reliable transport protocol, EIGRP     20-47

reloading software     4-17

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

remove vlan-list parameter     8-27

resetting a UDLD-shutdown interface     13-4

restricting access

NTP services     6-24

overview     6-1

passwords and privilege levels     6-2

TACACS+     6-9

retry count, VMPS, changing     8-39

reverse address resolution     20-10

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP     20-26

1112, IP multicast and IGMP     10-1

1157, SNMPv1     16-2

1166, IP addresses     20-5

1253, OSPF     20-36

1305, NTP     6-18

1587, NSSAs     20-36

1757, RMON     14-2

1901, SNMPv2C     16-2

1902 to 1907, SNMPv2     16-2

2236, IP multicast and IGMP     10-1

RIP

advertisements     20-26

authentication     20-29

configuring     20-27

default configuration     20-26

description     20-26

hop counts     20-26

split horizon     20-30

summary addresses     20-30

support for     1-5

RMON

default configuration     14-3

displaying status     14-6

enabling alarms and events     14-3

groups supported     14-2

overview     14-1

statistics

collecting group Ethernet     14-5

collecting group history     14-5

support for     1-5

root guard, STP     1-3, 9-20, 9-35

root switch, STP     9-22

route calculation timers, OSPF     20-43

routed packets, ACLs on     17-38

routed ports

configuring     20-3

defined     7-4

in switch clusters     5-9

router ACLs     17-2

router ID, OSPF     20-44

route summarization, OSPF     20-42

routing

default     20-2

dynamic     20-2

redistribution of information     20-58

static     20-2

Routing Information Protocol

See RIP

routing protocol administrative distances     20-57

RPS LED     3-7

running configuration, saving     4-10

S

saving changes in CMS     3-27

SC (standby command switch)     5-11, 5-18

scheduled reloads     4-17

SDM     1-2

security features     1-4

sequence numbers in log messages     15-8

server mode, VTP     8-4

set-request operation     16-3

setup program, failed command switch replacement     25-4, 25-6

severity levels, defining in system messages     15-8

show access-lists hw-summary command     17-6

show cdp traffic command     12-5

show cluster members command     5-20

show configuration command     7-16

show fm commands     17-34

show interfaces command     7-14, 7-16

show running-config command

displaying ACLs     17-18, 17-19, 17-29, 17-30

interface description in     7-16

shutdown command on interfaces     7-19

Simple Network Management Protocol

See SNMP

SNAP     12-1

SNMP

accessing MIB variables with     16-3

agent

description     16-3

disabling     16-5

community strings

configuring     16-5

for cluster switches     16-3

overview     16-3

configuration examples     16-9

default configuration     16-4

in clusters     5-14

limiting access by TFTP servers     16-9

limiting system log messages to NMS     15-10

manager functions     1-6, 16-2

managing clusters with     5-21

MIBs

location of     A-2

supported     A-1

overview     16-1, 16-3

SNMP (continued)

requests     1-2

status, displaying     16-10

system contact and location     16-8

trap manager, configuring     16-7

traps

defined     16-2

enabling     16-6

overview     16-1, 16-3

types of     16-7

versions supported     16-2

snooping, IGMP     10-1

software images

location in Flash     B-20

recovery procedures     25-1

scheduling reloads     4-17

tar file format, described     B-20

See also downloading and uploading

source addresses, in ACLs     17-11

Spanning Tree Protocol

See STP

speed, configuring on interfaces     7-14

split horizon

IGRP     20-35

RIP     20-30

Stack Membership Discovery Protocol     9-14

Standby Command Configuration window     5-18

standby command switch

configuring      5-18

considerations     5-12

defined     5-2

priority     5-11

requirements     5-3

virtual IP address     5-11

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

standby ip command     21-4

standby router     21-1

standby timers, HSRP     21-8

startup configuration

booting

manually     4-13

specific image     4-14

clearing     B-19

configuration file

automatically downloading     4-12

specifying the filename     4-13

default boot configuration     4-12

static access ports

assigning to VLAN     8-19

defined     7-2, 8-3

static addresses

See addresses

static IP routing     1-5

static MAC addressing     1-4

static routes, configuring     20-56

static routing     20-2

static VLAN membership     8-2

statistics

CDP     12-5

interface     7-17

IP multicast routing     22-58

OSPF     20-45

QoS ingress and egress     18-46

RMON group Ethernet     14-5

RMON group history     14-5

SNMP input and output     16-10

traffic suppression     11-5

VTP     8-13

storm control     1-2, 11-1

STP

accelerating root port selection     9-12

BackboneFast, described     9-18

BPDU guard, described     9-11

BPDU message exchange     9-3

configuring

BackboneFast     9-35

BPDU guard     9-32

cross-stack UplinkFast     9-34

disable     9-22

forward-delay time     9-28

hello time     9-28

in cascaded cluster     9-29

maximum aging time     9-29

path cost     9-26

Port Fast     9-31

port priority     9-25

root guard     9-35

root switch     9-22

secondary root switch     9-24

switch priority     9-27

UplinkFast with redundant links     9-33

cross-stack UplinkFast, described     9-13

default configuration     9-21

designated switch, defined     9-4

detecting indirect link failures     9-18

displaying status     9-30

features     1-3

interface state, blocking to forwarding     9-10

interface states

blocking     9-6

disabled     9-7

forwarding     9-6, 9-7

learning     9-7

listening     9-7

overview     9-5

limitations with 802.1Q trunks     9-8

STP (continued)

load sharing

overview     8-29

using path costs     8-32

using port priorities     8-30

loops     8-24

MAC address allocation     9-8

multicast addresses, affect of     9-8

overview     9-2

path costs     8-32

Port Fast

described     9-10

mode     8-36

port priorities     8-30

preventing root switch selection     9-20

redundant connectivity     9-9

root guard     1-3

root guard, described     9-20

root port, defined     9-4

root switch election     9-3

settings in a cascaded cluster     9-29

shutdown Port Fast-configured interface     9-11

supported number of spanning-tree instances     9-2

timers, described     9-4

UplinkFast, described     9-12

VLAN-bridge     9-8

stratum, NTP     6-18

stub areas, OSPF     20-40

subnet mask     20-5

subnet zero     20-8

summer time     6-30

SunNet Manager     1-6

supernet     20-8

SVIs

and IP unicast routing     20-3

and router ACLs     17-2

connecting VLANs     7-5

defined     7-4

number supported     7-5, 7-21, 20-3

routing between VLANs     8-2

switch clustering technology     1-1, 1-7, 5-1

See also CMS and clusters

switch console port     1-2

switched packets, ACLs on     17-36

switched ports     7-2

Switch Manager     3-2, 3-28

See also Device Manager

switchport block multicast command     11-7

switchport block unicast command     11-7

switchport broadcast command     11-3

switchport command     7-12

switchport multicast command     11-3

switchport protected command     11-6

switchport unicast command     11-3

switch priority, STP     9-27

switch software features     1-1

switch virtual interface

See SVI

syslog

See system message logging

system clock

configuring

daylight saving time     6-30

manually     6-28

summer time     6-30

time zones     6-29

displaying the time and date     6-28

overview     6-18

See also NTP

System Database Management

See SDM

System LED     3-6

system message logging

default configuration     15-3

defining error message severity levels     15-8

disabling and enabling     15-4

displaying     15-12

limiting messages     15-10

message format     15-2

overview     15-1

sequence numbers, enabling and disabling     15-8

setting the display destination device     15-4

synchronizing log messages     15-6

syslog facility     1-5

timestamps, enabling and disabling     15-7

UNIX syslog servers

configuring the daemon     15-11

configuring the logging facility     15-11

facilities supported     15-12

system name

default configuration     6-32

manual configuration     6-32

See also DNS

system prompt

default setting     6-32

manual configuration     6-33

system resource templates     6-41

system routes, IGRP     20-31

T

tables, CMS     3-25

tabs, CMS     3-25

TAC     xxxi

TACACS+

accounting, defined     6-10

authentication, defined     6-10

authorization, defined     6-10

configuring

accounting     6-16

authentication key     6-13

authorization     6-15

local authentication and authorization     6-16

login authentication     6-13

default configuration     6-12

displaying the configuration     6-17

identifying the server     6-13

limiting the services to the user     6-15

operation of     6-11

overview     6-9

support for     1-4

tracking services accessed by user     6-16

tail drop, described     18-12

tail drop, support for     1-4

tar files

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

technical assistance

Cisco.com     xxxi

TAC     xxxi

TAC website     xxxi

toll-free telephone numbers     xxxii

Telnet

number of connections     1-2

setting a password     6-5

templates, system resources     6-41

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password     6-5

TFTP

configuration files

downloading     B-11

preparing the server     B-10

uploading     B-12

configuration files in base directory     4-6

configuring for autoconfiguration     4-5

image files

deleting     B-23

downloading     B-22

preparing the server     B-22

uploading     B-24

limiting access by servers     16-9

TFTP server     1-2

threshold, traffic level     11-1

time

See NTP and system clock

time-range command     17-15

time ranges in ACLs     17-15

timestamps in log messages     15-7

time zones     6-29

TLV     8-6

Token Ring VLANs

support for     8-15

TrCRF and TrBRF     8-6

toolbar     3-18

Topology view

described     3-9

device labels     3-12

icons     3-11

pop-up menus     3-20

TOS     1-4

traceroute command     25-10

See also IP traceroute

traffic

blocking flooded     11-7

fragmented     17-4

unfragmented     17-4

traffic policing     1-4

traffic suppression

configuring     11-3

definition     11-1

transparent mode, VTP     8-4, 8-11

trap-door mechanism     4-2

traps

configuring managers     16-6

defined     16-2

enabling     16-6

notification types     16-7

overview     16-1, 16-3

troubleshooting

connectivity problems     25-8

detecting unidirectional links     13-1

PIMv1 and PIMv2 interoperability problems     22-28

with CiscoWorks     16-3

with debug commands     25-11

with ping     25-8

with system message logging     15-1

with traceroute     25-10

trunking encapsulation     1-3

trunk ports

configuring     8-25

defined     7-3, 8-3

encapsulation     8-25, 8-30, 8-32

trunks

allowed-VLAN list     8-27

configuring     8-25, 8-30, 8-32

encapsulation     8-24

Gigabit Ethernet     8-22

interacting with other features     8-24

ISL     8-22

trunks (continued)

load sharing

setting STP path costs     8-32

using STP port priorities     8-29, 8-30

native VLAN for untagged traffic     8-29

parallel     8-32

pruning-eligible list     8-28

to non-DTP device     8-23

understanding     8-22

twisted-pair Ethernet, detecting unidirectional links     13-1

type-of-service

See TOS

U

UDLD

default configuration     13-3

echoing detection mechanism     13-2

enabling

globally     13-3

per interface     13-4

link-detection mechanism     13-1

neighbor database     13-2

overview     13-1

resetting an interface     13-4

status, displaying     13-5

support for     1-3

UDP, configuring     20-19

unicast storms     11-1

unicast traffic, blocking     11-7

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration     15-11

facilities supported     15-12

message logging configuration     15-11

Unrecognized Type-Length-Value (TLV) support     8-6

upgrading software images

See downloading

UplinkFast

described     9-12

redundant links     9-33

support for     1-3

uploading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-15

using RCP     B-18

using TFTP     B-12

image files

preparing     B-22, B-25, B-29

reasons for     B-19

using FTP     B-28

using RCP     B-32

using TFTP     B-24

URLs, Cisco     xxix

User Datagram Protocol

See UDP

user EXEC mode     2-2

username-based authentication     6-6

V

verifying changes in CMS     3-27

version-dependent transparent mode     8-6

virtual IP address

cluster standby group     5-11, 5-18

command switch     5-11, 5-18

See also IP addresses

virtual router     21-1, 21-2

VLAN ACLs

See VLAN maps

VLAN configuration mode     2-2

VLAN management domain     8-4

VLAN Management Policy Server

See VMPS

VLAN map entries, order of     17-27

VLAN maps

applying     17-30

common uses for     17-31

configuration example     17-32

configuration guidelines     17-27

configuring     17-26

creating     17-29

defined     17-2

denying access example     17-32

denying and permitting packets     17-29

displaying     17-30

examples     17-32

implicit forward     17-27

support for     1-4

usage     17-3

with router ACLs     17-39

VLAN membership

confirming     8-38

modes     8-3

VLAN Membership Policy Server

See VMPS

VLAN Query Protocol (VQP)     8-33

VLANs

adding to VTP database     8-17

aging dynamic addresses     9-9

allowed on trunk     8-27

changing     8-18

configuration guidelines     8-16

configuring     8-1

configuring in VTP database     8-17

connecting through SVIs     7-5

default configuration     8-15

defined     7-2

deleting from VTP database     8-18

description     8-1

features     1-3

illustrated     8-2

in the VTP database     8-17

ISL     8-22

VLANs (continued)

modifying     8-18

native, configuring     8-29

number supported     1-3, 8-3

port membership modes     8-3

static-access ports     8-18, 8-19

STP and 802.1Q trunks     9-8

supported     8-3

Token Ring     8-15

VLAN-bridge STP     9-8, 24-1

VTP database and     8-15

VTP modes     8-4

VLAN Trunk Protocol

See VTP

VLAN trunks     8-22

VMPS

administering     8-40

configuration guidelines     8-36

default configuration     8-36

dynamic port membership

example     8-40

overview     8-34

reconfirming     8-38, 8-39

troubleshooting     8-40

entering server address     8-37

mapping MAC addresses to VLANs     8-33

monitoring     8-40

reconfirmation interval, changing     8-39

reconfirming membership     8-38

retry count, changing     8-39

support for     1-3

voice VLANs

See VVIDs

VQP     1-3

VTP

advertisements     8-5, 8-25

client mode, configuring     8-11

configuration guidelines     8-9

configuration requirements     8-10

configuring client mode     8-11

configuring server mode     8-10

configuring transparent mode     8-11

consistency checks     8-6

database     8-17

configuring VLANs     8-17

displaying     8-20

parameters     8-15

default configuration     8-8

described     8-4

disabling     8-11

domain names     8-9

domains     8-4

modes

client     8-4, 8-11

server     8-4, 8-10

transitions     8-4

transparent     8-4, 8-11

monitoring     8-13

passwords     8-9

pruning

disabling     8-13

enabling     8-13

examples     8-7

overview     8-6

pruning-eligible list, changing     8-28

server mode, configuring     8-10

statistics     8-13

support for     1-3

Token Ring support     8-6

transparent mode, configuring     8-11

VTP (continued)

using     8-4

version, guidelines     8-9

version 1     8-6

version 2

configuration guidelines     8-9

disabling     8-12

enabling     8-12

overview     8-6

VLAN parameters     8-15

VTP pruning     1-3

VVIDs     1-9

W

web-based management software

See CMS

Weighted Random Early Detection

See WRED

Weighted Round Robin

See WRR

weighted round robin, described     18-3

window components, CMS     3-24

wizards     1-7, 3-22

WRED     1-4, 18-12

WRR     1-4, 18-3

X

XMODEM protocol     25-1