Catalyst 3550 Multilayer Switch Software Configuration Guide, 12.1(8)EA1
Index
Downloads: This chapterpdf (PDF - 1.31MB) The complete bookPDF (PDF - 8.93MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

802.1Q

and trunk ports     8-3

configuration limitations     9-24

encapsulation     9-22, 9-24

native VLAN for untagged traffic     9-29

802.1Q trunk mode     3-9

802.1X

See port-based authentication

802.3Z flow control     8-16

A

abbreviating commands     2-3

ABRs     22-35

AC (command switch)     5-12, 5-22

access-class command     19-19

access control entries

See ACEs

access-denied response, VMPS     9-33

access groups

IP     19-20

Layer 3     19-20

viewing     19-21

accessing CMS     3-30

access levels, CMS     3-31

access lists

See ACLs

access modes, CMS     3-31

access ports

defined     8-2

in switch clusters     5-11

accounting with RADIUS     6-27

accounting with TACACS+     6-11, 6-17

ACEs

and QoS     20-7

defined     19-2

Ethernet     19-2

IP     19-2

Layer 3 parameters     19-10

Layer 4 parameters     19-10

ACLs

ACEs     19-2

any keyword     19-12

applying

on bridged packets     19-40

on multicast packets     19-42

on routed packets     19-41

on switched packets     19-39

time ranges to     19-15

to an interface     19-18

to QoS     20-7

classifying traffic for QoS     20-27

comments in     19-18

compiling     19-22

configuring with VLAN maps     19-36

defined     19-1, 19-6

determining fit in hardware     19-37

displaying interface     19-22

examples of     19-22, 20-27

extended IP

configuring for QoS classification     20-28

creating     19-9

matching criteria     19-7

hardware and software handling     19-5

host keyword     19-12

IP

applying to interface     19-18

creating     19-6

fragments and QoS guidelines     20-20

implicit deny     19-9, 19-13, 19-15

implicit masks     19-9

matching criteria     19-3, 19-7

named     19-14

options and QoS guidelines     20-20

undefined     19-20

violations, logging     19-15

virtual terminal lines, setting on     19-18

limiting actions     19-37

logging messages     19-9

log keyword     19-15

MAC extended     19-28, 20-29

matching     19-6, 19-20

monitoring     19-20

named     19-14

number per QoS class map     20-20

numbers     19-7

policy maps and QoS classification     20-20

protocol parameters     19-10

QoS     20-7, 20-27

router     19-2

standard IP

configuring for QoS classification     20-27

creating     19-8

matching criteria     19-7

supported features     19-5

support for     1-3

time ranges     19-15

unsupported features     19-6

using router ACLs with VLAN maps     19-36

VLAN maps

configuration guidelines     19-28

configuring     19-27

defined     19-3

active router     23-1

addresses

displaying the MAC address table     6-57

dynamic

accelerated aging     10-10

changing the aging time     6-53

default aging     10-10

defined     6-51

learning     6-52

preventing frame forwarding     26-5

removing     6-54

filtering frames by MAC address     26-6

multicast

group address range     24-1

STP address management     10-8

static

adding and removing     6-56

defined     6-51

address resolution     22-10

Address Resolution Protocol

See ARP

adjacency tables, with CEF     22-53

administrative distances

defined     22-62

OSPF     22-41

routing protocol defaults     22-56

advertisements

CDP     13-1

IGRP     22-30

RIP     22-25

VTP     9-4, 9-5, 9-25

aggregated ports

See EtherChannel

aggregate policers     20-37

aggregate policing     1-4

aging, accelerating     10-10

aging time

accelerated for STP     10-10, 10-29

bridge table for fallback bridging     26-6

MAC address table     6-53

maximum for STP     10-18, 10-30

alarms, RMON     16-3

allowed-VLAN list     9-27

alternate routes, IGRP     22-31

Apply button     3-29

area border routers

See ABRs

ARP

configuring     22-11

defined     22-10

encapsulation     22-12

static cache configuration     22-11

support for     1-2

ASBRs     22-35

attributes, RADIUS

vendor-proprietary     6-29

vendor-specific     6-28

audience     xxvii

authentication

EIGRP     22-50

HSRP     23-8

local mode with AAA     6-31

NTP associations     6-35

RADIUS

key     6-21

login     6-23

See also port-based authentication

TACACS+

defined     6-11

key     6-13

login     6-14

authentication keys, and routing protocols     22-63

authoritative time source, described     6-32

authorization with RADIUS     6-26

authorization with TACACS+     6-11, 6-16

authorized ports with 802.1X     7-4

autoconfiguration     4-3

automatic discovery

adding member switches     5-20

considerations

beyond a non-candidate device     5-8, 5-9

brand new switches     5-11

connectivity     5-4

different VLANs     5-7

management VLANs     5-8, 5-9

non-CDP-capable devices     5-6

non-cluster-capable devices     5-6

routed ports     5-10

creating a cluster standby group     5-22

in switch clusters     5-4

See also CDP

automatic recovery, clusters     5-12

See also HSRP

autonegotiation

duplex mode     1-2

interface configuration guidelines     8-14

mismatches     27-10

autonomous system boundary routers

See ASBRs

Auto-RP, described     24-8

autosensing, port speed     1-2

B

BackboneFast     1-3, 10-18, 10-36

bandwidth, graphs     3-8

bandwidth for QoS

allocating     20-50

described     20-13

banners

configuring

login     6-51

message-of-the-day login     6-50

default configuration     6-49

when displayed     6-49

binding cluster group and HSRP group     23-9

blocking packets     12-6

booting

boot loader, function of     4-2

boot process     4-1

manually     4-13

specific image     4-14

boot loader

accessing     4-15

described     4-2

environment variables     4-15

prompt     4-15

trap-door mechanism     4-2

bootstrap router (BSR), described     24-8

BPDU guard, STP     1-3, 10-11, 10-33

bridged packets, ACLs on     19-40

bridge groups

See fallback bridging

Bridge Protocol Data Unit

See BPDU

broadcast flooding     22-20

broadcast packets

directed     22-17

flooded     22-17

broadcast storm-control command     12-3

broadcast storms     12-1, 22-17

browser configuration     3-1, 5-1

buttons, CMS     3-29

C

cables, monitoring for unidirectional links     14-1

Cancel button     3-29

candidate switch

adding     5-20

automatic discovery     5-4

defined     5-3

HC     5-22

passwords     5-20

requirements     5-3

standby group     5-22

See also command switch, cluster standby group, and member switch

caution, described     xxx

CC (command switch)     5-22

CDP

automatic discovery in switch clusters     5-4

configuring     13-2

default configuration     13-2

described     13-1

disabling for routing device     13-3, 13-4

enabling and disabling on an interface     13-4

enabling and disabling on a switch     13-3

monitoring     13-5

overview     13-1

support for     1-2

transmission timer and holdtime, setting     13-2

updates     13-2

CEF     22-53

CGMP

as IGMP snooping learning method     11-6

clearing cached group entries     24-58

enabling server support     24-38

FastLeave feature     24-13

hosts

joining a group     24-12

leaving a group     24-13

joining multicast group     11-2

overview     24-11

server support only     24-11

switch support of     1-2

change notification, CMS     3-32

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco Technical Assistance Center     xxxiii

CiscoWorks 2000     1-6, 18-3

classless routing     22-8

class maps for QoS

configuring     20-30

described     20-7

displaying     20-56

class of service

See CoS

clearing interfaces     8-20

CLI, managing clusters in     5-25

client mode, VTP     9-4

clock

See system clock

Cluster Management Suite

See CMS

clusters, switch

accessing     5-15

adding member switches     5-20

automatic discovery     5-4

automatic recovery     5-12

benefits     1-6

command switch configuration     5-19

compatibility     5-4

creating     5-18

creating a cluster standby group     5-22

described     5-1

LRE profile considerations     5-17

managing

through CLI     5-25

through SNMP     5-26

planning considerations

automatic discovery     5-4

automatic recovery     5-12

CLI     5-25

described     5-4

host names     5-16

IP addresses     5-15

LRE profiles     5-17

passwords     5-16

SNMP     5-16, 5-26

switch-specific features     5-18

TACACS+     5-17

redundancy     5-22

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

troubleshooting     5-24

verifying     5-24

cluster standby group

automatic recovery     5-13

considerations     5-14

creating     5-22

defined     5-2

requirements     5-3

virtual IP address     5-13

See also HSRP

cluster standby-group and HSRP group     23-9

cluster tree

described     3-5

icons     3-5

CMS

accessing     3-30

access levels     3-31

benefits     1-6

change notification     3-32

cluster tree     3-5

described     1-1, 1-5, 3-1

different versions of     3-33

CMS

displaying system messages     3-19

error checking     3-32

features     3-2

Front Panel images     3-6

Front Panel view     3-4

interaction modes     3-26

menu bar     3-15

privilege level     3-31

requirements     3-30

saving configuration changes     3-32

toolbar     3-21

tool tips     3-27

Topology view     3-10

verifying configuration changes     3-32

window components     3-28

wizards     3-26

CMS online help     3-27

Collapse Cluster view     3-11

command-line interface

abbreviating commands     2-3

command modes     2-1

described     1-5

editing features

enabling and disabling     2-6

keystroke editing     2-6

wrapped lines     2-8

error messages     2-4

filtering command output     2-8

getting help     2-3

history

changing the buffer size     2-5

described     2-5

disabling     2-5

recalling commands     2-5

no and default forms of commands     2-4

command modes     2-1

commands

abbreviating     2-3

no and default     2-4

setting privilege levels     6-8

command switch

active (AC)     5-12, 5-22

command switch with HSRP disabled (CC)     5-22

configuration conflicts     27-10

defined     5-2

enabling     5-19

passive (PC)     5-12, 5-22

password privilege levels     5-25

priority     5-12

recovery

from failure     27-7

from lost member connectivity     27-10

recovery from command-switch failure     5-12

redundant     5-12, 5-22

replacing

with another switch     27-9

with cluster member     27-7

requirements     5-2

See also candidate switch, cluster standby group, member switch, and standby command switch

standby (SC)     5-12, 5-22

community strings

configuring     5-16, 18-5

for cluster switches     18-3

in clusters     5-16

overview     18-3

SNMP     5-16

config.text     4-12

configuration changes, saving     3-32

configuration conflicts, recovering from lost member connectivity     27-10

configuration examples, network     1-7

configuration files

clearing the startup configuration     B-19

creating using a text editor     B-10

default name     4-12

deleting a stored configuration     B-19

described     B-8

downloading

automatically     4-12

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

guidelines for creating and using     B-9

invalid combinations when copying     B-5

limiting TFTP server access     18-9

obtaining with DHCP     4-7

password recovery disable considerations     6-5

specifying the filename     4-13

system contact and location information     18-9

types and location     B-9

uploading

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-15

using RCP     B-18

using TFTP     B-12

VMPS database     9-34

configuration settings, saving     4-10

configure terminal command     8-7

conflicts, configuration     27-10

congestion-avoidance techniques     20-13

congestion-management techniques     20-13, 20-15

connectivity problems     27-11

consistency checks in VTP version 2     9-6

conventions

command     xxx

for examples     xxx

publication     xxx

text     xxx

CoS     1-4, 20-2

CoS-to-DSCP map for QoS     20-39

CoS-to-egress-queue map     20-45

counters, clearing interface     8-20

Cpu q, in show forward command output     27-16

crashinfo file     27-17

cross-stack UplinkFast, STP

configuring     10-35

connecting stack ports     10-16

described     10-13

fast-convergence events     10-15

Fast Uplink Transition Protocol     10-14

limitations     10-16

normal-convergence events     10-15

Stack Membership Discovery Protocol     10-14

support for     1-3

D

database, VTP     9-15, 9-17

daylight saving time     6-44

debugging

enabling all system diagnostics     27-15

enabling for a specific feature     27-14

redirecting error message output     27-15

using commands     27-14

default commands     2-4

default configuration

802.1X     7-6

banners     6-49

booting     4-12

CDP     13-2

DNS     6-48

EIGRP     22-47

EtherChannel     21-7

fallback bridging     26-3

HSRP     23-3

IGMP     24-31

IGMP filtering     11-20

IGMP snooping     11-5

IGRP     22-30

initial switch information     4-3

IP addressing, IP routing     22-4

IP multicast routing     24-13

Layer 2 interfaces     8-13

MAC address table     6-53

MSDP     25-4

MVR     11-15

NTP     6-35

OSPF     22-36

password and privilege level     6-3

QoS     20-18

RADIUS     6-20

RIP     22-25

RMON     16-3

SNMP     18-4

SPAN     15-7

STP     10-21

system message logging     17-3

system name and prompt     6-46

TACACS+     6-13

UDLD     14-3

VLAN, Layer 2 Ethernet interfaces     9-24

VLANs     9-15

VMPS     9-37

VTP     9-8

default gateway     4-10, 22-15

default networks     22-56

default routes     22-56

default routing     22-2

deleting VLAN from database     9-18

description command     8-17

designing your network, examples     1-7

destination addresses, in ACLs     19-11

device discovery protocol     13-1

device icons

Front Panel view     3-5

Topology view     3-12

device labels     3-13

Device Manager     3-2

See also Switch Manager

device pop-up menu

Front Panel view     3-22

Topology view     3-24

DHCP

autoconfiguration example     4-8

client request message exchange     4-4

configuring

client side     4-3

DNS     4-6

relay device     4-6

server-side     4-5

TFTP server     4-5

lease options

for IP address information     4-5

for receiving the configuration file     4-5

overview     4-3

relationship to BOOTP     4-3

support for     1-2

DHCP relay     1-5

Differentiated Services architecture, QoS     20-1

Differentiated Services Code Point     20-2

Diffusing Update Algorithm (DUAL)     22-46

directed unicast requests     1-2

directories

changing     B-3

creating and removing     B-4

displaying the working     B-3

discovery, clusters

See automatic discovery

display options, Topology view     3-14

Disqualification Code option     3-25

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols     22-2

distribute-list command     22-62

DNS

and DHCP-based autoconfiguration     4-6

default configuration     6-48

displaying the configuration     6-49

overview     6-47

setting up     6-48

support for     1-2

documentation

feedback     xxxii

obtaining

CD-ROM     xxxi

world wide web     xxxi

ordering     xxxii

related     xxxi

document conventions     xxx

domain names

DNS     6-47

VTP     9-8

Domain Name System

See DNS

downloading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

image files

deleting old image     B-23

preparing     B-22, B-25, B-29

reasons for     B-19

using FTP     B-26

using RCP     B-30

using TFTP     B-22

DSCP     1-4, 20-2

DSCP-to-CoS map for QoS     20-42

DSCP-to-DSCP-mutation map for QoS     20-43

DSCP-to-threshold map for QoS     20-47

DTP     1-3, 9-22

DUAL finite state machine, EIGRP     22-46

duplex mode, configuring     8-14

DVMRP

all-DVMRP-routers multicast group address     24-11

autosummarization

configuring a summary address     24-54

disabling     24-56

connecting PIM domain to DVMRP router     24-46

enabling unicast routing     24-50

interoperability

with Cisco devices     24-44

with IOS software     24-11

mrinfo requests, responding to     24-49

neighbors

advertising the default route to     24-48

discovery with Probe messages     24-11, 24-44

displaying information     24-49

prevent peering with nonpruning     24-52

rejecting nonpruning     24-51

overview     24-11

routes

adding a metric offset     24-56

advertising all     24-56

advertising the default route to neighbors     24-48

caching DVMRP routes learned in report messages     24-50

changing the threshold for syslog messages     24-54

deleting     24-58

displaying     24-58

favoring one over another     24-56

limiting the number injected into MBONE     24-53

limiting unicast route advertisements     24-44

route table, building     24-11

source distribution tree, building     24-11

support for     1-5

tunnels

configuring     24-46

displaying neighbor information     24-49

dynamic access mode     3-9

dynamic access ports

characteristics     9-3

configuring     9-38

defined     8-2

limit on number of hosts     9-40

dynamic addresses

See addresses

Dynamic Host Configuration Protocol

See DHCP

dynamic port VLAN membership

configuration example     9-40

overview     9-34

reconfirming     9-39

troubleshooting     9-40

types of connections     9-38

VMPS database configuration file     9-34

dynamic routing     22-2

Dynamic Trunking Protocol

See DTP

E

editing features

enabling and disabling     2-6

keystrokes used     2-6

wrapped lines     2-8

Egress q, in show forward command output     27-16

EIGRP

and IGRP     22-48

authentication     22-50

components     22-46

configuring     22-48

default configuration     22-47

definition     22-46

interface parameters, configuring     22-49

monitoring     22-51

support for     1-4

enable password     6-4

enable secret password     6-4

encapsulation types, Ethernet trunk     9-24

encryption for passwords     6-4

Enhanced IGRP

See EIGRP

environment variables

function of     4-16

location in Flash     4-15

equal-cost routing     1-4, 22-54

error checking, CMS     3-32

error messages

during command entry     2-4

setting the display destination device     17-4

severity levels     17-8

system message format     17-2

EtherChannel

automatic creation of     21-3

channel groups

binding physical and logical interfaces     21-2

numbering of     21-2

configuration guidelines     21-8

configuring

Layer 2 interfaces     21-9

Layer 3 physical interfaces     21-12

Layer 3 port-channel logical interfaces     21-11

default configuration     21-7

destination MAC address forwarding     21-5

detecting misconfigurations     10-37

displaying status     21-16

forwarding methods     21-5, 21-13

interaction

with STP     21-8

with VLANs     21-8

Layer 3 interface     22-3

load balancing     21-5, 21-13

logical interfaces, described     21-2

number of interfaces per     21-1

overview     21-1

PAgP

aggregate-port learners     21-5

compatibility with Catalyst 1900     21-14

displaying status     21-16

interaction with other features     21-5

learn method and priority configuration     21-14

modes     21-4

overview     21-3

silent mode     21-4

support for     1-2

port-channel interfaces

described     21-2

numbering of     21-2

port groups     8-3

source MAC address forwarding     21-5

support for     1-2

Ethernet VLAN

defaults and ranges     9-16

modifying     9-18

events, RMON     16-3

examples

conventions for     xxx

network configuration     1-7

Expand Cluster view     3-11

expedite queue for QoS

10/100 Ethernet ports

allocating bandwidth     20-54

configuring     20-54

described     20-15

Gigabit-capable Ethernet ports

allocating bandwidth     20-50

configuring     20-50

described     20-13

expert mode     3-26

extended system ID for STP     10-3, 10-23

Extensible Authentication Protocol over LAN     7-1

exterior routes, IGRP     22-30

F

fallback bridging

and protected ports     26-4

bridge groups

creating     26-4

described     26-2

displaying     26-12

function of     26-2

number supported     26-4

removing     26-4

bridge table

changing the aging time     26-6

clearing     26-12

displaying     26-12

connecting interfaces with     8-6

default configuration     26-3

described     26-1

frame forwarding

filtering by MAC address     26-6

flooding packets     26-2

for static addresses     26-5

forwarding packets     26-2

preventing for dynamically learned stations     26-5

to static addresses     26-5

overview     26-1

STP

disabling on an interface     26-12

forward-delay interval     26-10

hello BPDU interval     26-10

interface priority     26-8

maximum-idle interval     26-11

path cost     26-9

switch priority     26-8

VLAN-bridge STP     26-1, 26-2

support for     1-4

SVIs and routed ports     26-1

VLAN-bridge STP     10-9

fallback VLAN name     9-34

fan fault indication     3-5

Fast Uplink Transition Protocol     10-14

feedback to Cisco Systems, web     xxxii

FIB     22-53

fiber-optic, detecting unidirectional links     14-1

files

copying     B-4

crashinfo

description     27-17

displaying the contents of     27-17

location     27-17

deleting     B-5

displaying the contents of     B-8

tar

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

file system

displaying available file systems     B-2

displaying file information     B-3

local file system names     B-1

network file system names     B-4

setting the default     B-3

filtering

in a VLAN     19-27

non-IP traffic     19-28

show and more command output     2-8

with fallback bridging     26-6

filters, IP

See ACLs, IP

Flash device, number of     B-1

flash updates, IGRP     22-31

flooded traffic, blocking     12-6

flow-based packet classification     1-4

flowcharts

QoS classification     20-6

QoS policing and marking     20-10

QoS queueing and scheduling

10/100 ports     20-15

Gigabit-capable ports     20-12

flow control     1-2, 8-16

forward-delay time, STP     10-7, 10-29

Forwarding Information Base

See FIB

forwarding non-routable protocols     26-1

Front Panel images, CMS     3-6

Front Panel view

cluster tree     3-5

described     3-4

pop-up menus     3-22

port icons     3-6

port LEDs     3-8

RPS LED     3-7

switch images     3-6

FTP

accessing MIB files     A-2

configuration files

downloading     B-13

overview     B-12

preparing the server     B-13

uploading     B-15

FTP

image files

deleting old image     B-28

downloading     B-26

preparing the server     B-25

uploading     B-28

G

GBICs

1000BASE-LX/LH module     1-9

1000BASE-SX module     1-9

1000BASE-T module     1-9

1000BASE-ZX module     1-9

GigaStack     1-9

get-bulk-request operation     18-2

get-next-request operation     18-2, 18-3

get-request operation     18-2, 18-3

get-response operation     18-2

Gigabit GBIC modules

See GBICs

Gigabit Interface Converters

See GBICs

GigaStack GBIC

fast transition of redundant link     10-13

See also GBICs

global configuration mode     2-2

graphs, bandwidth     3-8

guide

audience     xxvii

organization of     xxviii

purpose of     xxvii

guide mode     1-6, 3-26

H

hardware, determining ACL configuration fit     19-37

HC (candidate switch)     5-22

hello time, STP     10-29

help, for the command line     2-3

Help button, CMS     3-29

Help Contents     3-27

history

changing the buffer size     2-5

described     2-5

disabling     2-5

recalling commands     2-5

history table, level and number of syslog messages     17-10

host name list, CMS     3-28

host names

abbreviations appended to     5-22

in clusters     5-16

hosts, limit on dynamic ports     9-40

Hot Standby Router Protocol

See HSRP

HP OpenView     1-6

HSRP

authentication string     23-8

automatic cluster recovery     5-13

binding to cluster group     23-9

cluster standby group considerations     5-14

command-switch redundancy     1-1

configuring     23-3

default configuration     23-3

definition     23-1

monitoring     23-10

overview     23-1

priority     23-6

routing redundancy     1-4

timers     23-8

tracking     23-6

See also clusters, cluster standby group, and standby command switch

HTTP access     3-30, 3-31

Hypertext Transfer Protocol

See HTTP access

I

ICMP

redirect messages     22-15

support for     1-5

time exceeded messages     27-12

traceroute and     27-12

unreachable messages     19-5

unreachables and ACLs     19-6

ICMP ping

executing     27-11

overview     27-11

ICMP Router Discovery Protocol

See IRDP

icons

cluster tree     3-5

colors

cluster tree     3-5

Topology view     3-14

editable table cell     3-29

Front Panel view     3-6

multilink     3-23

sorting     3-29

toolbar     3-21

Topology view     3-12

web link     3-29

IFS     1-2

IGMP

configuring the switch

as a member of a group     24-34

statically connected member     24-36

controlling access to groups     24-35

default configuration     24-31

deleting cache entries     24-58

displaying groups     24-58

fast switching     24-37

host-query interval, modifying     24-36

joining multicast group     11-2

join messages     11-2

leave processing, enabling     11-9

leaving multicast group     11-4

multicast reachability     24-34

overview     24-3

queries     11-3

support for     1-2

Version 1

changing to Version 2     24-32

hosts joining a group     24-3

hosts leaving a group     24-3

membership queries     24-3

overview     24-3

query-response model     24-3

Version 2

changing to Version 1     24-32

enhancements over Version 1     24-4

hosts leaving a group     24-4

maximum query response time value     24-33

new features     24-4

overview     24-4

pruning groups     24-33

query timeout value     24-32

IGMP filtering

configuring     11-20

default configuration     11-20

described     11-20

monitoring     11-24

IGMP groups, setting the maximum number     11-23

IGMP profile

applying     11-22

configuration mode     11-20

configuring     11-21

IGMP snooping

configuring     11-5

default configuration     11-5

definition     11-1

enabling and disabling     11-5

global configuration     11-5

Immediate Leave     11-4

method     11-6

monitoring     11-9

support for     1-2

VLAN configuration     11-6

IGP     22-35

IGRP

advertisements     22-30

alternate routes     22-31

configuring     22-32

default configuration     22-30

described     22-30

exterior routes     22-30

flash updates     22-31

interior routes     22-30

load balancing     22-31

poison-reverse updates     22-31

split horizon     22-34

support for     1-4

system routes     22-30

traffic sharing     22-32

unequal-cost load balancing     22-31

Immediate-Leave, IGMP     11-4

interaction modes, CMS     3-26

interface

number     8-7

range macros     8-11

interface command     8-7

interface configuration mode     2-2

interfaces

configuration guidelines     8-14

configuring     8-7

configuring duplex mode     8-14

configuring speed     8-14

counters, clearing     8-20

described     8-17

descriptive name, adding     8-17

displaying information about     8-18

flow control     8-16

management     1-5

monitoring     8-18

naming     8-17

physical, identifying     8-7

range of     8-9

restarting     8-21

shutting down     8-21

supported     8-6

types of     8-1

interfaces range macro command     8-11

Interior Gateway Protocol

See IGP

Interior Gateway Routing Protocol

See IGRP

interior routes, IGRP     22-30

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link

See ISL

inter-VLAN routing     1-4, 22-2

inventory, cluster     5-24

IOS File System

See IFS

ip access group command     19-20

IP ACLs

applying to an interface     19-18

extended, creating     19-9

for QoS classification     20-7

implicit deny     19-9, 19-13, 19-15

implicit masks     19-9

logging     19-15

named     19-14

standard, creating     19-8

undefined     19-20

virtual terminal lines, setting on     19-18

IP addresses

candidate or member     5-3, 5-15

classes of     22-5

cluster access     5-2

command switch     5-2, 5-13, 5-15

default configuration     22-4

for IP routing     22-4

MAC address association     22-10

monitoring     22-21

redundant clusters     5-13

standby command switch     5-13, 5-15

See also IP information

IP broadcast address     22-20

ip cef command     22-53

IP directed broadcasts     22-17

ip igmp profile command     11-20

IP information

assigned

manually     4-10

through DHCP-based autoconfiguration     4-3

default configuration     4-3

IP multicast routing

addresses

all-hosts     24-1

all-multicast-routers     24-1

all-PIM-routers     24-10

Cisco-RP-Announce     24-8

Cisco-RP-Discovery     24-8

host group address range     24-1

administratively-scoped boundaries, described     24-42

and IGMP snooping     11-1, 11-5

Auto-RP

adding to an existing sparse-mode cloud     24-19

benefits of     24-18

clearing the cache     24-58

configuration guidelines     24-15

IOS release     24-5

overview     24-8

preventing candidate RP spoofing     24-21

preventing join messages to false RPs     24-20

setting up in a new internetwork     24-19

using with BSR     24-27

bootstrap router

configuration guidelines     24-15

configuring candidate BSRs     24-25

configuring candidate RPs     24-26

defining the IP multicast boundary     24-24

defining the PIM domain border     24-22

IOS release     24-5

overview     24-8

using with Auto-RP     24-27

Cisco implementation     24-2

configuring

basic multicast routing     24-15

IP multicast boundary     24-42

TTL threshold     24-40

default configuration     24-13

enabling

multicast forwarding     24-15

PIM mode     24-16

group-to-RP mappings

Auto-RP     24-8

BSR     24-8

MBONE

deleting sdr cache entries     24-58

described     24-39

displaying sdr cache     24-59

enabling sdr listener support     24-39

limiting DVMRP routes advertised     24-53

limiting sdr cache entry lifetime     24-39

SAP packets for conference session announcement     24-39

Session Directory (sdr) tool, described     24-39

monitoring

packet rate loss     24-59

peering devices     24-59

tracing a path     24-59

multicast forwarding, described     24-9

PIMv1 and PIMv2 interoperability     24-14

protocol interaction     24-2

reverse path check (RPF)     24-9

routing table

deleting     24-58

displaying     24-58

RP

assigning manually     24-17

configuring Auto-RP     24-18

configuring PIMv2 BSR     24-22

monitoring mapping information     24-27

using Auto-RP and BSR     24-27

statistics, displaying system and network     24-58

TTL thresholds, described     24-40

See also CGMP

See also DVMRP

See also IGMP

See also PIM

IP precedence     20-2

IP-precedence-to-DSCP map for QoS     20-40

IP protocols

in ACLs     19-11

routing     1-4

IP routes, monitoring     22-64

IP routing

connecting interfaces with     8-6

enabling     22-24

IP traceroute

executing     27-13

overview     27-12

IP unicast routing

address resolution     22-10

administrative distances     22-56, 22-62

ARP     22-10

assigning IP addresses to Layer 3 interfaces     22-6

authentication keys     22-63

broadcast address     22-20

broadcast flooding     22-20

broadcast packets     22-17

broadcast storms     22-17

classless routing     22-8

configuring static routes     22-55

default addressing configuration     22-4

default gateways     22-15

default networks     22-56

default routes     22-56

default routing     22-2

directed broadcasts     22-17

dynamic routing     22-2

enabling     22-24

EtherChannel Layer 3 interface     22-3

IGP     22-35

inter-VLAN     22-2

IP addressing

classes     22-5

configuring     22-4

IRDP     22-15

Layer 3 interfaces     22-3

MAC address and IP address     22-10

passive interfaces     22-61

protocols

distance-vector     22-2

dynamic     22-2

link-state     22-2

proxy ARP     22-10

redistribution     22-57

reverse address resolution     22-10

routed ports     22-3

static routing     22-2

steps to configure     22-3

subnet mask     22-5

subnet zero     22-8

supernet     22-8

UDP     22-19

with SVIs     22-3

See also EIGRP

See also IGRP

See also OSPF

See also RIP

ip unreachables command     19-5

IRDP

configuring     22-16

definition     22-15

support for     1-5

ISL

and trunk ports     8-3

encapsulation     1-3, 9-22, 9-24

ISL trunk mode     3-9

J

Java plug-in configuration     3-1, 5-1

join messages, IGMP     11-2

L

Layer 2 frames, classification with CoS     20-2

Layer 2 interfaces, default configuration     8-13

Layer 2 trunks     9-22

Layer 3 features     1-4

Layer 3 interfaces

assigning IP addresses to     22-6

changing from Layer 2 mode     22-6

types of     22-3

Layer 3 packets, classification methods     20-2

Layer 3 parameters of ACEs     19-10

Layer 4 parameters of ACEs     19-10

leave processing, IGMP     11-9

LEDs

port     3-8

port modes     3-8

RPS     3-7

legend, CMS icons and labels     3-20

line configuration mode     2-2

link icons, Topology view     3-13

link labels     3-13

link pop-up menu, Topology view     3-23

links, unidirectional     14-1

link state advertisements (LSAs)     22-39

link-state protocols     22-2

lists, CMS     3-29

load balancing, IGRP     22-31

logging messages, ACL     19-9

login authentication with RADIUS     6-23

login authentication with TACACS+     6-14

login banners     6-49

log messages

See system message logging

Long-Reach Ethernet (LRE) technology     1-8

M

MAC addresses

aging time     6-53

and VLAN association     6-52

building the address table     6-52

default configuration     6-53

displaying     6-57

dynamic

learning     6-52

removing     6-54

in ACLs     19-28

IP address association     22-10

static

adding     6-56

characteristics of     6-56

removing     6-56

MAC address multicast entries, monitoring     11-10

MAC address-to-VLAN mapping     9-33

MAC extended access lists     19-28, 20-4, 20-29

manageability features     1-2

management

interfaces     1-5

options     1-5

management options, CMS     3-1

management VLAN

considerations in clusters     5-8, 5-9

mapping tables for QoS

configuring

CoS-to-DSCP     20-39

CoS-to-egress-queue     20-45

DSCP     20-39

DSCP-to-CoS     20-42

DSCP-to-DSCP-mutation     20-43

DSCP-to-threshold     20-47

IP-precedence-to-DSCP     20-40

policed-DSCP     20-41

described     20-11

marking

action in policy map     20-32

action with aggregate policers     20-37

described     20-3, 20-8

matching, ACLs     19-6

maximum aging time, STP     10-30

maximum-paths command     22-54

membership mode, VLAN port     3-9, 9-3

member switch

adding     5-20

automatic discovery     5-4

defined     5-2

managing     5-25

passwords     5-15

recovering from lost connectivity     27-10

requirements     5-3

See also candidate switch, cluster standby group, and standby command switch

memory, optimizing     6-57

menu bar

described     3-15

variations     3-15

messages

logging ACL violations     19-15

system     3-19

to users through banners     6-49

metric translations, between routing protocols     22-60

MIBs

accessing files with FTP     A-2

location of files     A-2

overview     18-1

SNMP interaction with     18-3

supported     A-1

minimum-reserve levels

assigning to a queue     20-15, 20-53

configuring the buffer size     20-16, 20-53

default size     20-15

mini-point-of-presence

See POP

mirroring traffic for analysis     15-1

mismatches, autonegotiation     27-10

Mode button     3-8

modes

access to CMS     3-31

port     3-8

VLAN port membership     3-9

Modify button     3-29

modules, GBIC

1000BASE-LX/LH     1-9

1000BASE-SX     1-9

1000BASE-T     1-9

1000BASE-ZX     1-9

GigaStack     1-9

monitoring

access groups     19-20

ACLs     19-20

cables for unidirectional links     14-1

CDP     13-5

CEF     22-54

EIGRP     22-51

fallback bridging     26-12

features     1-5

HSRP     23-10

IGMP filters     11-24

IGMP snooping     11-9

interfaces     8-18

IP address tables     22-21

IP multicast routing     24-57

IP routes     22-64

MSDP peers     25-19

multicast router interfaces     11-10

MVR     11-18

network traffic for analysis with probe     15-1

OSPF     22-44

port blocking     12-11

port protection     12-11

RP mapping information     24-27

source-active messages     25-19

speed and duplex mode     8-15

traffic flowing among switches     16-1

traffic suppression     12-11

VLAN

filters     19-33

maps     19-33

VMPS     9-40

VTP     9-13

VTP database     9-21

MSDP

and dense-mode regions

sending SA messages to     25-17

specifying the originating address     25-18

benefits of     25-3

clearing MSDP connections and statistics     25-19

controlling source information

forwarded by switch     25-12

originated by switch     25-8

received by switch     25-14

default configuration     25-4

filtering

incoming SA messages     25-14

SA messages to a peer     25-12

SA requests from a peer     25-11

join latency, defined     25-6

meshed groups

configuring     25-16

defined     25-16

originating address, changing     25-18

overview     25-1

peer-RPF flooding     25-2

peers

configuring a default     25-4

monitoring     25-19

peering relationship, overview     25-1

requesting source information from     25-8

shutting down     25-16

source-active messages

caching     25-6

clearing cache entries     25-19

defined     25-2

filtering from a peer     25-11

filtering incoming     25-14

filtering to a peer     25-12

limiting data with TTL     25-14

monitoring     25-19

restricting advertised sources     25-9

multicast groups

and IGMP snooping     11-5

Immediate Leave     11-4

joining     11-2

leaving     11-4

static joins     11-8

multicast packets

ACLs on     19-42

blocking     12-6

multicast router interfaces, monitoring     11-10

multicast router ports, adding     11-7

Multicast Source Discovery Protocol

See MSDP

multicast storm-control command     12-3

multicast storms     12-1

Multicast VLAN Registration

See MVR

Multilink Decomposer window     3-23

multilink icon     3-23

MVR

configuring interfaces     11-16

default configuration     11-15

described     11-12

modes     11-16

monitoring     11-18

setting global parameters     11-15

support for     1-2

N

named IP ACLs     19-14

native VLANs     9-29

negotiate trunk mode     3-9

neighbor discovery/recovery, EIGRP     22-46

neighboring devices, types of     3-12

network configuration examples

increasing network performance     1-7

large network     1-13

providing network services     1-8

small to medium-sized network     1-11

network design

performance     1-7

services     1-8

network management

configuring CDP     13-1

configuring RMON     16-1

configuring SNMP     18-1

Network Time Protocol

See NTP

no commands     2-4

non-IP traffic filtering     19-28

nontrunking mode     9-23

no switchport command     8-4

note, described     xxx

not-so-stubby areas

See NSSA

NSSA, OSPF     22-39

NTP

associations

authenticating     6-35

defined     6-33

enabling broadcast messages     6-37

peer     6-36

server     6-36

default configuration     6-35

displaying the configuration     6-41

overview     6-32

NTP

restricting access

creating an access group     6-39

disabling NTP services per interface     6-40

source IP address, configuring     6-40

stratum     6-32

support for     1-2

synchronizing devices     6-36

time

services     6-33

synchronizing     6-32

O

OK button     3-29

online help     3-27

Open Shortest Path First

See OSPF

optimizing system resources     6-57

options, management     1-5

OSPF

area parameters, configuring     22-39

configuring     22-37

default configuration

metrics     22-41

route     22-41

settings     22-36

described     22-35

interface parameters, configuring     22-38

LSA group pacing     22-43

monitoring     22-44

router IDs     22-43

route summarization     22-41

support for     1-4

virtual links     22-41

out-of-profile markdown     1-4

output interface, getting information about     27-16

overheating indication, switch     3-5

P

packet modification, with QoS     20-17

PAgP

See EtherChannel

parallel links     9-29

parallel paths, in routing tables     22-54

passive interfaces

configuring     22-61

OSPF     22-42

passwords

default configuration     6-3

disabling recovery of     6-5

encrypting     6-4

for security     1-3

in clusters     5-16, 5-20

in CMS     3-30

overview     6-1

recovery of     27-3

setting

enable     6-3

enable secret     6-4

Telnet     6-6

with usernames     6-7

VTP domain     9-9

path cost, STP     10-27

PC (passive command switch)     5-12, 5-22

performance, network design     1-7

performance features     1-2

per-VLAN Spanning Tree (PVST)     1-3, 10-2

per-VLAN Spanning Tree+ (PVST+)     10-8

physical ports     8-2

PIM

default configuration     24-13

dense mode

(S,G) notation     24-6

graft messages     24-6

overview     24-5

pruning and SPT     24-5

rendezvous point (RP), described     24-7

RPF lookups     24-10

displaying neighbors     24-59

enabling a mode     24-16

neighbor discovery and adjacencies     24-10

overview     24-5

router-query message interval, modifying     24-30

shared tree and source tree, overview     24-28

shortest path tree, delaying the use of     24-29

sparse mode

(*,G) notation     24-7

join messages and shared tree     24-7

overview     24-7

prune messages     24-8

RPF lookups     24-10

support for     1-5

versions

interoperability     24-14

supported     24-5

troubleshooting interoperability problems     24-28

v2 improvements     24-5

PIM-DVMRP, as snooping method     11-6

ping

character output description     27-12

executing     27-11

overview     27-11

planning considerations, switch clusters

LRE profiles     5-17

switch-specific features     5-18

poison-reverse updates, IGRP     22-31

policed-DSCP map for QoS     20-41

policers

configuring

for each matched traffic class     20-32

for more than one traffic class     20-37

described     20-3

displaying     20-56

number of     1-4, 20-9

types of     20-8

policing

described     20-3

token bucket algorithm     20-8

policy maps for QoS

characteristics of     20-32

configuring     20-32

described     20-7

displaying     20-56

POP     1-14

Port Aggregation Protocol

See EtherChannel

See PAgP

port-based authentication

authentication server

defined     7-2

RADIUS server     7-2

client, defined     7-2

configuration guidelines     7-7

configuring

manual re-authentication of a client     7-11

quiet period     7-11

RADIUS server     7-10

RADIUS server parameters on the switch     7-9

switch-to-client frame-retransmission number     7-13

switch-to-client retransmission time     7-12

default configuration     7-6

described     7-1

device roles     7-2

displaying statistics     7-14

EAPOL-start frame     7-3

EAP-request/identity frame     7-3

EAP-response/identity frame     7-3

enabling

802.1X authentication     7-8

periodic re-authentication     7-10

encapsulation     7-2

initiation and message exchange     7-3

method lists     7-8

ports

authorization state and dot1x port-control command     7-4

authorized and unauthorized     7-4

resetting to default values     7-14

switch

as proxy     7-2

RADIUS client     7-2

topologies, supported     7-4

port blocking     1-2, 12-6

port-channel

See EtherChannel

Port Fast, STP     9-36, 10-10, 10-32

Port Fast mode     1-3

port icons, Front Panel view     3-6

port LEDs     3-8

DUPLX     3-8

port modes     3-8

SPEED     3-8

STAT     3-8

port membership modes, VLAN     3-9, 9-3

port modes

described     3-8

LEDs     3-8

port pop-up menu, Front Panel view     3-22

port priority, STP     10-26

ports

802.1Q trunk     3-9

access     8-2

blocking     12-6

dynamic access     3-9, 9-3

dynamic VLAN membership, reconfirming     9-39

forwarding, resuming     12-7

ISL trunk     3-9

negotiate trunk     3-9

protected     12-5

routed     8-4

secure     12-8

static-access     3-9, 9-3, 9-19

switch     8-2

trunks     9-3, 9-22

VLAN assignments     9-19

port security

configuring     12-9

default configuration     12-9

described     12-8

displaying     12-11

violations     12-8

with other features     12-9

port-shutdown response, VMPS     9-33

preferential treatment of traffic

See QoS

preventing unauthorized access     6-1

priority, HSRP     23-6

private VLAN edge ports

See protected ports

privileged EXEC mode     2-2

privilege levels

access modes

read-only     3-31

read-write     3-31

changing the default for lines     6-9

CMS     3-31

command switch     5-25

exiting     6-10

logging into     6-10

mapping on member switches     5-25

overview     6-2, 6-8

setting a command with     6-8

protected ports     1-3, 12-5

protocol-dependent modules, EIGRP     22-47

Protocol-Independent Multicast Protocol

See PIM

proxy ARP

configuring     22-13

definition     22-10

with IP routing disabled     22-14

pruning, VTP

enabling     9-13

enabling on a port     9-28

examples     9-7

overview     9-6

pruning-eligible list

changing     9-28

VLANs     9-13

publications, related     xxxi

PVST     1-3

Q

QoS

basic model     20-3

classification

class maps, described     20-7

defined     20-3

flowchart     20-6

forwarding treatment     20-3

in frames and packets     20-2

IP ACLs, described     20-5, 20-7

MAC ACLs, described     20-4, 20-7

policy maps, described     20-7

port default, described     20-4

trust DSCP, described     20-4

trusted CoS, described     20-4

trust IP precedence, described     20-4

types for IP traffic     20-5

types for non-IP traffic     20-4

QoS

class maps

configuring     20-30

displaying     20-56

configuration examples

common wiring closet     20-57

distribution layer     20-59

intelligent wiring closet     20-58

configuration guidelines     20-20

configuring

aggregate policers     20-37

default port CoS value     20-24

DSCP maps     20-39

DSCP trust states bordering another domain     20-25

egress queues on 10/100 Ethernet ports     20-51

egress queues on Gigabit-capable Ethernet ports     20-44

IP extended ACLs     20-28

IP standard ACLs     20-27

MAC ACLs     20-29

policy maps     20-32

port trust states within the domain     20-22

default configuration     20-18

displaying statistics     20-56

enabling globally     20-21

flowcharts

classification     20-6

policing and marking     20-10

queueing and scheduling     20-12, 20-15

implicit deny     20-7

QoS

mapping tables

CoS-to-DSCP     20-39

CoS-to-egress-queue     20-45

displaying     20-56

DSCP-to-CoS     20-42

DSCP-to-DSCP-mutation     20-43

DSCP-to-threshold     20-47

IP-precedence-to-DSCP     20-40

policed-DSCP     20-41

types of     20-11

marked-down actions     20-35

marking, described     20-3, 20-8

overview     20-1

packet modification     20-17

policers

configuring     20-35, 20-37

described     20-8

displaying     20-56

number of     20-9

types of     20-8

policies, attaching to an interface     20-9

policing

described     20-3, 20-8

token bucket algorithm     20-8

policy maps

characteristics of     20-32

configuring     20-32

displaying     20-56

queueing, defined     20-3

QoS

queues

CoS-to-egress-queue map     20-45

for 10/100 Ethernet ports     20-15

high priority (expedite)     20-13, 20-50

minimum-reserve levels     20-53

serviced by WRR     20-13, 20-16

size of     20-13, 20-15

size ratios     20-46

tail-drop threshold percentages     20-13, 20-47

WRED drop-percentage thresholds     20-13, 20-48

WRR scheduling     20-50

scheduling

allocating bandwidth on 10/100 Ethernet ports     20-54

allocating bandwidth on Gigabit-capable ports     20-50

defined     20-3

support for     1-4

tail drop

configuring drop threshold percentages     20-47

described     20-13

trust states     20-4

WRED

configuring drop-percentage thresholds     20-48

described     20-14

WRR scheduling     20-50

quality of service

See QoS

queries, IGMP     11-3

R

RADIUS

attributes

vendor-proprietary     6-29

vendor-specific     6-28

configuring

accounting     6-27

authentication     6-23

authorization     6-26

communication, global     6-21, 6-28

communication, per-server     6-20, 6-21

multiple UDP ports     6-20

default configuration     6-20

defining AAA server groups     6-24

displaying the configuration     6-30

identifying the server     6-20

limiting the services to the user     6-26

method list, defined     6-19

operation of     6-19

overview     6-18

suggested network environments     6-18

tracking services accessed by user     6-27

Random Early Detection, described     20-14

range

macro     8-11

of interfaces     8-9

RARP     22-10

rcommand command     5-25

RCP

configuration files

downloading     B-17

overview     B-16

preparing the server     B-16

uploading     B-18

image files

deleting old image     B-32

downloading     B-30

preparing the server     B-29

uploading     B-32

read-only access mode     3-31

read-write access mode     3-31

reconfirmation interval, VMPS, changing     9-39

recovery procedures     27-1

redundancy

EtherChannel     21-1

features     1-3

HSRP     23-1

STP

backbone     10-9

multidrop backbone     10-13

path cost     9-32

port priority     9-30

redundant clusters

See cluster standby group

redundant power system

See RPS

Refresh button     3-29

reliable transport protocol, EIGRP     22-46

reloading software     4-17

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

remove vlan-list parameter     9-27

resetting a UDLD-shutdown interface     14-4

restricting access

NTP services     6-38

overview     6-1

passwords and privilege levels     6-2

RADIUS     6-17

TACACS+     6-10

retry count, VMPS, changing     9-39

reverse address resolution     22-10

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP     22-25

1112, IP multicast and IGMP     11-2

1157, SNMPv1     18-2

1166, IP addresses     22-5

RFC

1253, OSPF     22-35

1305, NTP     6-32

1587, NSSAs     22-35

1757, RMON     16-2

1901, SNMPv2C     18-2

1902 to 1907, SNMPv2     18-2

2236, IP multicast and IGMP     11-2

RIP

advertisements     22-25

authentication     22-28

configuring     22-26

default configuration     22-25

described     22-25

hop counts     22-25

split horizon     22-29

summary addresses     22-29

support for     1-4

RMON

default configuration     16-3

displaying status     16-6

enabling alarms and events     16-3

groups supported     16-2

overview     16-1

statistics

collecting group Ethernet     16-5

collecting group history     16-5

support for     1-5

root guard, STP     1-3, 10-20, 10-36

root switch, STP     10-22

route calculation timers, OSPF     22-42

routed packets, ACLs on     19-41

routed ports

configuring     22-3

defined     8-4

in switch clusters     5-10

routed ports, IP addresses on     8-22, 22-3

router ACLs     19-2

router ID, OSPF     22-43

route summarization, OSPF     22-41

routing

default     22-2

dynamic     22-2

redistribution of information     22-57

static     22-2

Routing Information Protocol

See RIP

routing protocol administrative distances     22-56

RPS LED     3-7

running configuration, saving     4-10

S

saving changes in CMS     3-32

SC (standby command switch)     5-12, 5-22

scheduled reloads     4-17

SDM

configuring     6-59

described     6-57

templates

number of     6-57

resources used for Fast Ethernet switches     6-58

resources used for Gigabit Ethernet switches     6-58

secure ports, configuring     12-8

security, port     12-8

security features     1-3

sequence numbers in log messages     17-8

server mode, VTP     9-4

set-request operation     18-3

setup program, failed command switch replacement     27-7, 27-9

severity levels, defining in system messages     17-8

show access-lists hw-summary command     19-6

show cdp traffic command     13-5

show cluster members command     5-25

show configuration command     8-17

show fm commands     19-37

show forward command     27-15

show interfaces command     8-15, 8-17

show running-config command

displaying ACLs     19-19, 19-30, 19-32

interface description in     8-17

shutdown command on interfaces     8-21

Simple Network Management Protocol

See SNMP

SNAP     13-1

SNMP

accessing MIB variables with     18-3

agent

described     18-3

disabling     18-5

community strings

configuring     18-5

for cluster switches     18-3

overview     18-3

configuration examples     18-10

default configuration     18-4

in-band management     1-2

in clusters     5-16

limiting access by TFTP servers     18-9

limiting system log messages to NMS     17-10

manager functions     1-6, 18-2

managing clusters with     5-26

MIBs

location of     A-2

supported     A-1

overview     18-1, 18-3

status, displaying     18-10

system contact and location     18-9

trap manager, configuring     18-8

traps

described     18-2

enabling     18-7

enabling MAC address notification     6-54

overview     18-1, 18-3

types of     18-7

versions supported     18-2

snooping, IGMP     11-1

software images

location in Flash     B-20

recovery procedures     27-2

scheduling reloads     4-17

tar file format, described     B-20

See also downloading and uploading

source addresses, in ACLs     19-11

SPAN

configuration guidelines     15-7

default configuration     15-7

destination ports     15-4

displaying status     15-13

interaction with other features     15-5

monitored ports     15-4

monitoring ports     15-4

overview     1-5, 15-1

received traffic     15-3

sessions

creating     15-8

defined     15-2

limiting source traffic to specific VLANs     15-12

monitoring VLANs     15-11

removing destination (monitoring) ports     15-10

removing source (monitored) ports     15-10

specifying monitored ports     15-8

source ports     15-4

transmitted traffic     15-3

VLAN-based     15-5

Spanning Tree Protocol

See STP

speed, configuring on interfaces     8-14

split horizon

IGRP     22-34

RIP     22-29

Stack Membership Discovery Protocol     10-14

Standby Command Configuration window     5-23

standby command switch

configuring      5-22

considerations     5-14

defined     5-2

priority     5-12

requirements     5-3

virtual IP address     5-13

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

standby ip command     23-4

standby router     23-1

standby timers, HSRP     23-8

startup configuration

booting

manually     4-13

specific image     4-14

clearing     B-19

configuration file

automatically downloading     4-12

specifying the filename     4-13

default boot configuration     4-12

static access mode     3-9

static access ports

assigning to VLAN     9-19

defined     8-2, 9-3

static addresses

See addresses

static IP routing     1-4

static MAC addressing     1-3

static routes, configuring     22-55

static routing     22-2

static VLAN membership     9-2

statistics

802.1X     7-14

CDP     13-5

interface     8-18

IP multicast routing     24-58

OSPF     22-44

QoS ingress and egress     20-56

RMON group Ethernet     16-5

RMON group history     16-5

SNMP input and output     18-10

VTP     9-13

storm control

configuring     12-3

definition     12-1

displaying     12-11

thresholds     12-1

STP

accelerating root port selection     10-12

BackboneFast, described     10-18

BPDU guard, described     10-11

BPDU message exchange     10-4

configuring

BackboneFast     10-36

BPDU guard     10-33

cross-stack UplinkFast     10-35

disable     10-22

forward-delay time     10-29

hello time     10-29

in cascaded stack     10-30

maximum aging time     10-30

path cost     10-27

Port Fast     10-32

port priority     10-26

root guard     10-36

root switch     10-22

secondary root switch     10-24

switch priority     10-28

UplinkFast with redundant links     10-34

cross-stack UplinkFast, described     10-13

default configuration     10-21

designated switch, defined     10-4

detecting indirect link failures     10-18

displaying status     10-31

STP

EtherChannel guard

described     10-20

enabling     10-37

extended system ID

affects on root switch     10-23

affects on the secondary root switch     10-24

overview     10-3

unexpected behavior     10-23

features     1-3

interface state, blocking to forwarding     10-10

interface states

blocking     10-7

disabled     10-8

forwarding     10-7, 10-8

learning     10-7

listening     10-7

overview     10-6

limitations with 802.1Q trunks     10-8

load sharing

overview     9-29

using path costs     9-32

using port priorities     9-30

loops     9-24

multicast addresses, affect of     10-8

overview     10-2

path costs     9-32

Port Fast

configuring     10-32

described     10-10

mode     9-36

port priorities     9-30

preventing root switch selection     10-20

redundant connectivity     10-9

root guard, described     1-3, 10-20

root port, defined     10-4

STP

root switch

affects of extended system ID     10-3, 10-23

configuring     10-23

election     10-3

unexpected behavior     10-23

settings in a cascaded stack     10-30

shutdown Port Fast-configured interface     10-11

supported number of spanning-tree instances     10-2

timers, described     10-5

UplinkFast, described     10-12

VLAN-bridge     10-9

stratum, NTP     6-32

stub areas, OSPF     22-39

subnet mask     22-5

subnet zero     22-8

summer time     6-44

SunNet Manager     1-6

supernet     22-8

SVIs

and IP unicast routing     22-3

and router ACLs     19-2

connecting VLANs     8-5

defined     8-4

routing between VLANs     9-2

switch clustering technology     1-1, 1-6, 5-1

See also CMS and clusters

switch clusters, planning considerations

LRE profiles     5-17

switch-specific features     5-18

switch console port     1-2

switched packets, ACLs on     19-39

switched ports     8-2

Switch Manager     3-2, 3-33

See also Device Manager

switchport block multicast command     12-6

switchport block unicast command     12-6

switchport command     8-12

switchport protected command     12-5

switch priority, STP     10-28

switch software features     1-1

switch virtual interface

See SVI

syslog

See system message logging

system clock

configuring

daylight saving time     6-44

manually     6-42

summer time     6-44

time zones     6-43

displaying the time and date     6-42

overview     6-32

See also NTP

System Database Management

See SDM

system message logging

default configuration     17-3

defining error message severity levels     17-8

disabling     17-4

displaying the configuration     17-12

enabling     17-4

facility keywords, described     17-12

level keywords, described     17-9

limiting messages     17-10

message format     17-2

overview     17-1

sequence numbers, enabling and disabling     17-8

setting the display destination device     17-4

synchronizing log messages     17-6

syslog facility     1-5

timestamps, enabling and disabling     17-7

UNIX syslog servers

configuring the daemon     17-11

configuring the logging facility     17-11

facilities supported     17-12

system messages     3-19

system name

default configuration     6-46

default setting     6-46

manual configuration     6-46

See also DNS

system prompt

default setting     6-46

manual configuration     6-47

system resource templates     6-57

system routes, IGRP     22-30

T

tables, CMS     3-29

tabs, CMS     3-29

TAC

inquiries     xxxiii

toll-free telephone numbers     xxxiv

website     xxxiii

TACACS+

accounting, defined     6-11

authentication, defined     6-11

authorization, defined     6-11

configuring

accounting     6-17

authentication key     6-13

authorization     6-16

login authentication     6-14

default configuration     6-13

displaying the configuration     6-17

identifying the server     6-13

in clusters     5-17

limiting the services to the user     6-16

operation of     6-12

overview     6-10

support for     1-4

tracking services accessed by user     6-17

tail drop

described     20-13

support for     1-4

tar files

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

technical assistance

Cisco.com     xxxiii

TAC     xxxiii

TAC website     xxxiii

toll-free telephone numbers     xxxiv

Telnet

number of connections     1-2

setting a password     6-6

templates, system resources     6-57

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password     6-6

TFTP

configuration files

downloading     B-11

preparing the server     B-10

uploading     B-12

configuration files in base directory     4-6

configuring for autoconfiguration     4-5

image files

deleting     B-23

downloading     B-22

preparing the server     B-22

uploading     B-24

limiting access by servers     18-9

TFTP server     1-2

threshold, traffic level     12-2

time

See NTP and system clock

time-range command     19-15

time ranges in ACLs     19-15

timestamps in log messages     17-7

time zones     6-43

Token Ring VLANs

support for     9-15

TrCRF and TrBRF     9-6

toolbar     3-21

tool tips     3-27

Topology view

Collapse Cluster view     3-11

colors     3-14

described     3-10

device icons     3-12

device labels     3-13

display options     3-14

Expand Cluster view     3-11

icons     3-12

link icons     3-13

link labels     3-13

multilink icon     3-23

neighboring devices     3-12

pop-up menus     3-23

TOS     1-4

traceroute command     27-13

See also IP traceroute

traffic

blocking flooded     12-6

fragmented     19-4

unfragmented     19-4

traffic policing     1-4

traffic suppression     12-1

transparent mode, VTP     9-4, 9-11

trap-door mechanism     4-2

traps

configuring MAC address notification     6-54

configuring managers     18-7

defined     18-2

enabling     6-54, 18-7

notification types     18-7

overview     18-1, 18-3

troubleshooting

connectivity problems     27-11

detecting

EtherChannel misconfigurations     10-37

unidirectional links     14-1

determining packet disposition     27-15

displaying crash information     27-17

PIMv1 and PIMv2 interoperability problems     24-28

show forward command     27-15

with CiscoWorks     18-3

with debug commands     27-14

with ping     27-11

with system message logging     17-1

with traceroute     27-12

trunking encapsulation     1-3

trunk ports

configuring     9-25

defined     8-3, 9-3

encapsulation     9-25, 9-31, 9-32

trunks

allowed-VLAN list     9-27

configuring     9-25, 9-31, 9-32

encapsulation     9-24

Fast Ethernet     9-22

Gigabit Ethernet     9-22

interacting with other features     9-24

ISL     9-22

load sharing

setting STP path costs     9-32

using STP port priorities     9-30

native VLAN for untagged traffic     9-29

parallel     9-32

pruning-eligible list     9-28

to non-DTP device     9-23

understanding     9-22

twisted-pair Ethernet, detecting unidirectional links     14-1

type-of-service

See TOS

U

UDLD

default configuration     14-3

echoing detection mechanism     14-2

enabling

globally     14-3

per interface     14-4

link-detection mechanism     14-1

neighbor database     14-2

overview     14-1

resetting an interface     14-4

status, displaying     14-5

support for     1-3

UDP, configuring     22-19

unauthorized ports with 802.1X     7-4

unequal-cost load balancing, IGRP     22-31

unicast storm control command     12-3

unicast storms     12-1

unicast traffic, blocking     12-6

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration     17-11

facilities supported     17-12

message logging configuration     17-11

unrecognized Type-Length-Value (TLV) support     9-6

upgrading software images

See downloading

UplinkFast

described     10-12

redundant links     10-34

support for     1-3

uploading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-15

using RCP     B-18

using TFTP     B-12

image files

preparing     B-22, B-25, B-29

reasons for     B-19

using FTP     B-28

using RCP     B-32

using TFTP     B-24

URLs, Cisco     xxxi

User Datagram Protocol

See UDP

user EXEC mode     2-2

username-based authentication     6-7

V

verifying changes in CMS     3-32

version-dependent transparent mode     9-6

virtual IP address

cluster standby group     5-13, 5-22

command switch     5-13, 5-22

See also IP addresses

virtual router     23-1, 23-2

VLAN ACLs

See VLAN maps

VLAN configuration mode     2-2

VLAN management domain     9-4

VLAN Management Policy Server

See VMPS

VLAN map entries, order of     19-28

VLAN maps

applying     19-32

common uses for     19-33

configuration example     19-34

configuration guidelines     19-28

configuring     19-27

creating     19-30

defined     19-2

denying access example     19-35

denying and permitting packets     19-30

displaying     19-33

examples     19-35

support for     1-3

usage     19-3

with router ACLs     19-42

VLAN membership

confirming     9-39

modes     3-9, 9-3

VLAN port membership modes     3-9

VLAN Query Protocol (VQP)     9-33

VLANs

adding to VTP database     9-17

aging dynamic addresses     10-10

allowed on trunk     9-27

changing     9-18

configuration guidelines     9-16

configuring     9-1

configuring in VTP database     9-17

connecting through SVIs     8-5

default configuration     9-15

deleting from VTP database     9-18

described     8-2, 9-1

features     1-3

illustrated     9-2

in the VTP database     9-17

ISL     9-22

limiting source traffic with SPAN     15-12

modifying     9-18

monitoring with SPAN     15-11

native, configuring     9-29

number supported     1-3, 9-2

port membership modes     9-3

static-access ports     9-18, 9-19

STP and 802.1Q trunks     10-8

supported     9-2

Token Ring     9-15

VLAN-bridge STP     10-9, 26-1

VTP database and     9-15

VTP modes     9-4

VLAN Trunking Protocol

See VTP

VLAN trunks     9-22

VMPS

administering     9-40

configuration guidelines     9-36

default configuration     9-37

dynamic port membership

example     9-40

overview     9-34

reconfirming     9-39

troubleshooting     9-40

entering server address     9-37

mapping MAC addresses to VLANs     9-33

monitoring     9-40

reconfirmation interval, changing     9-39

reconfirming membership     9-39

retry count, changing     9-39

voice VLANs

See VVIDs

VQP     1-3

VTP

advertisements     9-5, 9-25

client mode, configuring     9-11

configuration

guidelines     9-8

requirements     9-9

VTP

configuration requirements     9-9

configuring

client mode     9-11

server mode     9-10

transparent mode     9-11

consistency checks     9-6

database     9-17

configuring VLANs     9-17

displaying     9-21

parameters     9-15

default configuration     9-8

described     9-3

disabling     9-11

domain names     9-8

domains     9-4

modes

client     9-4, 9-11

server     9-4, 9-10

transitions     9-4

transparent     9-4, 9-11

monitoring     9-13

passwords     9-9

pruning

disabling     9-13

enabling     9-13

examples     9-7

overview     9-6

pruning-eligible list, changing     9-28

server mode, configuring     9-10

statistics     9-13

support for     1-3

Token Ring support     9-6

transparent mode, configuring     9-11

using     9-3

version, guidelines     9-9

version 1     9-6

VTP

version 2

configuration guidelines     9-9

disabling     9-12

enabling     9-12

overview     9-6

VLAN parameters     9-15

VTP monitoring     9-13

VTP pruning     1-3

VVIDs     1-8

W

web-based management software

See CMS

Weighted Random Early Detection

See WRED

Weighted Round Robin

See WRR

weighted round robin, described     20-3

window components, CMS     3-28

wizards     1-6, 3-26

WRED     1-4, 20-14

WRR     1-4, 20-3

X

XMODEM protocol     27-2