Catalyst 3550 Multilayer Switch Software Configuration Guide, 12.1(9)EA1
Index
Downloads: This chapterpdf (PDF - 1.57MB) The complete bookPDF (PDF - 10.01MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

802.1Q

and trunk ports     9-3

configuration limitations     10-20

encapsulation     10-18

native VLAN for untagged traffic     10-25

trunk mode     3-9

tunneling

compatibility with other features     13-5

defaults     13-4

described     13-1

tunnel ports and ACLs     26-3

tunnel ports with other features     13-6

802.1X

See port-based authentication

802.3Z flow control     9-15

A

abbreviating commands     2-3

ABRs     29-35

AC (command switch)     6-14, 6-24

access-class command     26-20

access control entries

See ACEs

access-denied response, VMPS     10-30

access groups

IP     26-21

Layer 3     26-21

viewing     26-42

accessing

clusters, switch     6-17

CMS     3-29

modes     3-30

command switches     6-15

HTTP port     3-30

member switches     6-17

switch clusters     6-17

access levels, CMS     3-30

access lists

See ACLs

access ports

and Layer 2 protocol tunneling     13-9

defined     9-2

in switch clusters     6-13

accounting

with RADIUS     7-27

with TACACS+     7-11, 7-17

ACEs

and QoS     27-7

defined     26-2

Ethernet     26-2

IP     26-2

ACLs

ACEs     26-2

and logging     26-7

any keyword     26-13

applying

on bridged packets     26-38

on multicast packets     26-40

on routed packets     26-39

on switched packets     26-37

ACLs (continued)

applying (continued)

time ranges to     26-17

to Layer 2 and Layer 3 interfaces     26-20

to QoS     27-7

classifying traffic for QoS     27-27

comments in     26-19

compatibility on the same switch     26-2

compiling     26-21

configuration conflict examples     26-45

configuring with VLAN maps     26-36

defined     26-1

displaying interface     26-42

examples, not fitting in hardware     26-46

examples of     26-21, 27-27

extended IP

configuring for QoS classification     27-28

creating     26-11

matching criteria     26-8

feature manager     26-44

hardware and software handling     26-7

hardware support for     26-7

host keyword     26-13

IP

applying to interface     26-19

creating     26-8

defined     26-8

fragments and QoS guidelines     27-20

implicit deny     26-10, 26-14, 26-16

implicit masks     26-10

matching criteria     26-8

matching criteria for port ACLs     26-4

matching criteria for router ACLs     26-3

named     26-15

options and QoS guidelines     27-20

undefined     26-21

violations, logging     26-16

virtual terminal lines, setting on     26-19

ACLs (continued)

limiting actions     26-37

logging messages     26-10

log keyword     26-16

MAC extended     26-26, 27-29

matching     26-8, 26-21, 26-28

merge failure examples     26-47

monitoring     26-41

named     26-15

not fitting in hardware     26-46

number per QoS class map     27-20

numbers     26-8

policy maps and QoS classification     27-20

port

and voice VLAN     26-4

defined     26-2

limitations     26-4

QoS     27-7, 27-27

router     26-2

standard IP

configuring for QoS classification     27-27

creating     26-9

matching criteria     26-8

support for     1-4

time ranges     26-17

undefined     26-28

unsupported features     26-7

using router ACLs with VLAN maps     26-36

VLAN maps

configuration guidelines     26-30

configuring     26-29

defined     26-5

active router     30-1

addresses

displaying the MAC address table     7-58

dynamic

accelerated aging     14-9

changing the aging time     7-54

default aging     14-9

defined     7-52

learning     7-53

preventing frame forwarding     33-5

removing     7-55

filtering frames by MAC address     33-6

multicast

group address range     31-1

STP address management     14-8

static

adding and removing     7-57

defined     7-52

address resolution     29-10

Address Resolution Protocol

See ARP

adjacency tables, with CEF     29-53

administrative distances

defined     29-62

OSPF     29-41

routing protocol defaults     29-56

advertisements

CDP     20-1

IGRP     29-30

RIP     29-25

VTP     10-21, 11-3

aggregated ports

See EtherChannel

aggregate policers     27-37

aggregate policing     1-5

aging, accelerating     14-9

aging time

accelerated

for MSTP     15-20

for STP     14-9, 14-18

bridge table for fallback bridging     33-6

MAC address table     7-54

maximum

for MSTP     15-21

for STP     14-19

alarms, RMON     23-3

allowed-VLAN list     10-24

alternate routes, IGRP     29-31

Apply button     3-28

area border routers

See ABRs

ARP

configuring     29-11

defined     29-10

encapsulation     29-12

static cache configuration     29-11

support for     1-2

ASBRs     29-35

asymmetrical links, and 802.1Q tunneling     13-4

attributes, RADIUS

vendor-proprietary     7-29

vendor-specific     7-28

audience     xxxi

authentication

EIGRP     29-50

HSRP     30-8

local mode with AAA     7-31

NTP associations     7-36

RADIUS

key     7-21

login     7-23

See also port-based authentication

authentication (continued)

TACACS+

defined     7-11

key     7-13

login     7-14

authentication keys, and routing protocols     29-63

authoritative time source, described     7-33

authorization

with RADIUS     7-26

with TACACS+     7-11, 7-16

authorized ports with 802.1X     8-4

autoconfiguration     4-3

automatic discovery

adding member switches     6-22

considerations

beyond a non-candidate device     6-9, 6-10

brand new switches     6-13

connectivity     6-5

different VLANs     6-8

management VLANs     6-9, 6-10

non-CDP-capable devices     6-7

non-cluster-capable devices     6-7

routed ports     6-12

creating a cluster standby group     6-24

in switch clusters     6-5

See also CDP

automatic recovery, clusters     6-14

See also HSRP

autonegotiation

duplex mode     1-2

interface configuration guidelines     9-14

mismatches     34-10

autonomous system boundary routers

See ASBRs

Auto-RP, described     31-8

autosensing, port speed     1-2

auxiliary VLAN

See voice VLAN

B

BackboneFast

described     16-10

enabling     16-19

support for     1-3

bandwidth for QoS

allocating     27-50

described     27-13

bandwidth graphs     3-8

banners

configuring

login     7-52

message-of-the-day login     7-51

default configuration     7-50

when displayed     7-50

binding cluster group and HSRP group     30-9

blocking packets     19-6

booting

boot loader, function of     4-2

boot process     4-1

manually     4-13

specific image     4-14

boot loader

accessing     4-15

described     4-2

environment variables     4-15

prompt     4-15

trap-door mechanism     4-2

bootstrap router (BSR), described     31-8

BPDU

error-disabled state     16-3

filtering     16-3

RSTP format     15-5

BPDU filtering

described     16-3

enabling     16-16

support for     1-3

BPDU guard

described     16-3

enabling     16-15

support for     1-3

bridged packets, ACLs on     26-38

bridge groups

See fallback bridging

bridge protocol data unit

See BPDU

broadcast flooding     29-20

broadcast packets

directed     29-17

flooded     29-17

broadcast storm-control command     19-3

broadcast storms     19-1, 29-17

browser configuration     3-1, 6-1

buttons, CMS     3-28

C

cables, monitoring for unidirectional links     21-1

CAMs, ACLs not loading in     26-46

Cancel button     3-28

candidate switch

adding     6-22

automatic discovery     6-5

defined     6-4

HC     6-24

passwords     6-22

requirements     6-4

standby group     6-24

See also command switch, cluster standby group, and member switch

caution, described     xxxv

CC (command switch)     6-24

CDP

automatic discovery in switch clusters     6-5

configuring     20-2

default configuration     20-2

described     20-1

disabling for routing device     20-3, 20-4

enabling and disabling

on an interface     20-4

on a switch     20-3

Layer 2 protocol tunneling     13-7

monitoring     20-5

overview     20-1

support for     1-2

transmission timer and holdtime, setting     20-2

updates     20-2

CEF     29-53

CGMP

as IGMP snooping learning method     18-6

clearing cached group entries     31-58

enabling server support     31-38

FastLeave feature     31-13

hosts

joining a group     31-12

leaving a group     31-13

joining multicast group     18-2

overview     31-11

server support only     31-11

switch support of     1-2

change notification, CMS     3-31

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco Intelligence Engine 2100 Series Configuration Registrar

See IE2100

Cisco Networking Services

See IE2100

Cisco Technical Assistance Center     xxxvii

CiscoWorks 2000     1-6, 25-3

classless routing     29-8

class maps for QoS

configuring     27-30

described     27-7

displaying     27-56

class of service

See CoS

clearing interfaces     9-19

CLI

abbreviating commands     2-3

command modes     2-1

described     1-6

editing features

enabling and disabling     2-6

keystroke editing     2-7

wrapped lines     2-8

error messages     2-4

filtering command output     2-9

getting help     2-3

history

changing the buffer size     2-5

described     2-5

disabling     2-6

recalling commands     2-5

managing clusters     6-27

no and default forms of commands     2-4

client mode, VTP     11-3

clock

See system clock

Cluster Management Suite

See CMS

clusters, switch

accessing     6-17

adding member switches     6-22

automatic discovery     6-5

automatic recovery     6-14

benefits     1-7

command switch configuration     6-21

compatibility     6-5

creating     6-20

creating a cluster standby group     6-24

described     6-1

LRE profile considerations     6-20

managing

through CLI     6-27

through SNMP     6-28

planning considerations     6-5

automatic discovery     6-5

automatic recovery     6-14

CLI     6-27

host names     6-18

IP addresses     6-17

LRE profiles     6-20

passwords     6-18

RADIUS     6-19

SNMP     6-18, 6-28

switch-specific features     6-20

TACACS+     6-19

redundancy     6-24

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

troubleshooting     6-26

verifying     6-26

cluster standby group

and HSRP group     30-9

automatic recovery     6-17

considerations     6-15

creating     6-24

cluster standby group (continued)

defined     6-2

requirements     6-3

virtual IP address     6-15

See also HSRP

cluster tree

described     3-5

icons     3-5

CMS

accessing     3-29

access levels     3-30

benefits     1-7

change notification     3-31

cluster tree     3-5

described     1-1, 1-6, 3-1

different versions of     3-32

displaying system messages     3-18

error checking     3-31

features     3-2

Front Panel images     3-6

Front Panel view     3-4

interaction modes     3-25

menu bar     3-14

online help     3-26

privilege level     3-30

requirements     3-29

saving configuration changes     3-31

toolbar     3-20

tool tips     3-26

Topology view     3-9

verifying configuration changes     3-31

window components     3-27

wizards     3-25

Coarse Wave Division Multiplexer GBIC modules

See CWDM GBIC modules

Collapse Cluster view     3-10

command-line interface

See CLI

command modes     2-1

commands

abbreviating     2-3

no and default     2-4

setting privilege levels     7-8

command switch

accessing     6-15

active (AC)     6-14, 6-24

command switch with HSRP disabled (CC)     6-24

configuration conflicts     34-10

defined     6-2

enabling     6-21

passive (PC)     6-14, 6-24

password privilege levels     6-27

priority     6-14

recovery

from failure     34-7

from lost member connectivity     34-10

recovery from command-switch failure     6-14

redundant     6-14, 6-24

replacing

with another switch     34-9

with cluster member     34-7

requirements     6-3

See also candidate switch, cluster standby group, member switch, and standby command switch

standby (SC)     6-14, 6-24

community strings

configuring     6-18, 25-5

for cluster switches     25-3

in clusters     6-18

overview     25-3

SNMP     6-18

config.text     4-12

configuration changes, saving     3-31

configuration conflicts

ACL, displaying     26-44

recovering from lost member connectivity     34-10

configuration examples, network     1-8

configuration files

clearing the startup configuration     B-19

creating using a text editor     B-10

default name     4-12

deleting a stored configuration     B-19

described     B-8

downloading

automatically     4-12

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

guidelines for creating and using     B-9

invalid combinations when copying     B-5

limiting TFTP server access     25-9

obtaining with DHCP     4-7

password recovery disable considerations     7-5

specifying the filename     4-13

system contact and location information     25-9

types and location     B-9

uploading

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-15

using RCP     B-18

using TFTP     B-12

VMPS database     10-31

configuration settings, saving     4-10

configure terminal command     9-7

config-vlan mode     2-2, 10-6

conflicts, configuration     34-10

congestion-avoidance techniques     27-13

congestion-management techniques     27-13, 27-15

connections, secure remote     7-32

connectivity problems     34-11

consistency checks in VTP version 2     11-4

conventions

command     xxxiv

for examples     xxxv

publication     xxxiv

text     xxxiv

CoS

in Layer 2 frames     27-2

override priority     12-5

trust priority     12-6

CoS-to-DSCP map for QoS     27-39

CoS-to-egress-queue map     27-45

counters, clearing interface     9-19

CPU q, in show forward command output     34-17

crashinfo file     34-17

cross-stack UplinkFast, STP

connecting stack ports     16-8

described     16-5

enabling     16-18

fast-convergence events     16-7

Fast Uplink Transition Protocol     16-6

limitations     16-8

normal-convergence events     16-7

Stack Membership Discovery Protocol     16-6

support for     1-3

crypto software image     7-32

CWDM GBIC modules

network example     1-17

wavelength colors on CMS     3-7

CWDM OADM modules     1-17

D

daylight saving time     7-45

debugging

enabling all system diagnostics     34-15

enabling for a specific feature     34-15

redirecting error message output     34-16

using commands     34-14

default commands     2-4

default configuration

802.1Q tunneling     13-4

802.1X     8-6

banners     7-50

booting     4-12

CDP     20-2

DHCP     17-3

DNS     7-49

EIGRP     29-47

EtherChannel     28-7

fallback bridging     33-3

HSRP     30-3

IGMP     31-31

IGMP filtering     18-20

IGMP snooping     18-5

IGRP     29-30

initial switch information     4-3

IP addressing, IP routing     29-4

IP multicast routing     31-13

Layer 2 interfaces     9-13

Layer 2 protocol tunneling     13-9

MAC address table     7-54

MSDP     32-4

MVR     18-15

NTP     7-36

optional spanning-tree features     16-14

OSPF     29-36

password and privilege level     7-3

QoS     27-18

RADIUS     7-20

RIP     29-25

RMON     23-3

RSTP and MSTP     15-12

SNMP     25-4

SPAN     22-7

STP     14-10

system message logging     24-3

system name and prompt     7-47

TACACS+     7-13

default configuration (continued)

UDLD     21-3

VLAN, Layer 2 Ethernet interfaces     10-21

VLANs     10-8

VMPS     10-33

voice VLAN     12-2

VTP     11-6

default gateway     4-10, 29-15

default networks     29-56

default routes     29-56

default routing     29-2

deleting VLANs     10-10

description command     9-17

designing your network, examples     1-8

destination addresses, in ACLs     26-12

detecting indirect link failures, STP     16-10

device discovery protocol     20-1

device icons

Front Panel view     3-5

Topology view     3-11

device labels     3-12

Device Manager     3-2

See also Switch Manager

device pop-up menu

Front Panel view     3-21

Topology view     3-23

DHCP-based autoconfiguration

client request message exchange     4-4

configuring

client side     4-3

DNS     4-6

relay device     4-6

server-side     4-5

TFTP server     4-5

example     4-8

lease options

for IP address information     4-5

for receiving the configuration file     4-5

DHCP-based autoconfiguration (continued)

overview     4-3

relationship to BOOTP     4-3

relay support     1-5

support for     1-2

DHCP option 82

configuration guidelines     17-4

default configuration     17-3

displaying     17-7

enabling

relay agent     17-4

relay agent information option     17-4

example, metropolitan Ethernet network     17-2

forwarding address, specifying     17-5

helper address     17-5

message exchange process     17-2

overview     17-1

policy for reforwarding     17-5

protected ports for subscriber isolation     17-7

reforwarding policy     17-5

subscriber identification     17-2

support for     1-2

suppressing broadcasts     17-7

validating     17-4

Differentiated Services architecture, QoS     27-1

Differentiated Services Code Point     27-2

Diffusing Update Algorithm (DUAL)     29-46

directed unicast requests     1-2

directories

changing     B-3

creating and removing     B-4

displaying the working     B-3

discovery, clusters

See automatic discovery

display options, Topology view     3-13

Disqualification Code option     3-24

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols     29-2

distribute-list command     29-62

DNS

and DHCP-based autoconfiguration     4-6

default configuration     7-49

displaying the configuration     7-50

overview     7-48

setting up     7-49

support for     1-2

documentation

feedback     xxxvi

obtaining

CD-ROM     xxxvi

world wide web     xxxvi

ordering     xxxvi

related     xxxv

document conventions     xxxiv

domain names

DNS     7-48

VTP     11-8

Domain Name System

See DNS

dot1q-tunnel switchport mode     10-19

double-tagged packets

802.1Q tunneling     13-2

Layer 2 protocol tunneling     13-9

downloading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-13

using RCP     B-17

using TFTP     B-11

image files

deleting old image     B-23

preparing     B-22, B-25, B-29

reasons for     B-19

using FTP     B-26

using RCP     B-30

using TFTP     B-22

DSCP     1-4, 27-2

DSCP-to-CoS map for QoS     27-42

DSCP-to-DSCP-mutation map for QoS     27-43

DSCP-to-threshold map for QoS     27-47

DTP     1-3, 10-18

DUAL finite state machine, EIGRP     29-46

duplex mode, configuring     9-14

DVMRP

all-DVMRP-routers multicast group address     31-11

autosummarization

configuring a summary address     31-54

disabling     31-56

connecting PIM domain to DVMRP router     31-46

enabling unicast routing     31-50

interoperability

with Cisco devices     31-44

with IOS software     31-11

mrinfo requests, responding to     31-49

neighbors

advertising the default route to     31-48

discovery with Probe messages     31-11, 31-44

displaying information     31-49

prevent peering with nonpruning     31-52

rejecting nonpruning     31-51

overview     31-11

routes

adding a metric offset     31-56

advertising all     31-56

advertising the default route to neighbors     31-48

caching DVMRP routes learned in report messages     31-50

changing the threshold for syslog messages     31-54

deleting     31-58

displaying     31-58

favoring one over another     31-56

limiting the number injected into MBONE     31-53

limiting unicast route advertisements     31-44

route table, building     31-11

source distribution tree, building     31-11

DVMRP (continued)

support for     1-5

tunnels

configuring     31-46

displaying neighbor information     31-49

dynamic access mode     3-9

dynamic access ports

characteristics     10-3

configuring     10-34

defined     9-3

dynamic addresses

See addresses

dynamic desirable trunking mode     10-19

Dynamic Host Configuration Protocol

See DHCP-based autoconfiguration

dynamic port VLAN membership     10-31

reconfirming     10-35

troubleshooting     10-37

types of connections     10-34

VMPS database configuration file     10-31

dynamic routing     29-2

Dynamic Trunking Protocol

See DTP

E

editing features

enabling and disabling     2-6

keystrokes used     2-7

wrapped lines     2-8

egress q, in show forward command output     34-17

EIGRP

and IGRP     29-48

authentication     29-50

components     29-46

configuring     29-48

default configuration     29-47

definition     29-46

EIGRP (continued)

interface parameters, configuring     29-49

monitoring     29-51

support for     1-5

enable password     7-4

enable secret password     7-4

encrypted software image     7-32

encryption for passwords     7-4

Enhanced IGRP

See EIGRP

environment variables

function of     4-16

location in Flash     4-15

equal-cost routing     1-5, 29-54

error checking, CMS     3-31

error messages

during command entry     2-4

setting the display destination device     24-4

severity levels     24-8

system message format     24-2

EtherChannel

automatic creation of     28-3

channel groups

binding physical and logical interfaces     28-2

numbering of     28-2

configuration guidelines     28-8

configuring

Layer 2 interfaces     28-9

Layer 3 physical interfaces     28-12

Layer 3 port-channel logical interfaces     28-11

default configuration     28-7

destination MAC address forwarding     28-5

displaying status     28-16

forwarding methods     28-5, 28-13

interaction

with STP     28-8

with VLANs     28-8

Layer 3 interface     29-3

load balancing     28-5, 28-13

EtherChannel (continued)

logical interfaces, described     28-2

number of interfaces per     28-1

overview     28-1

PAgP

aggregate-port learners     28-5

compatibility with Catalyst 1900     28-14

displaying status     28-16

interaction with other features     28-5

learn method and priority configuration     28-14

modes     28-4

overview     28-3

silent mode     28-4

support for     1-2

port-channel interfaces

described     28-2

numbering of     28-2

port groups     9-4

source MAC address forwarding     28-5

support for     1-2

Ethernet VLANs

adding     10-8

defaults and ranges     10-8

modifying     10-8

events, RMON     23-3

examples

conventions for     xxxv

network configuration     1-8

Expand Cluster view     3-10

expedite queue for QoS

10/100 Ethernet ports

allocating bandwidth     27-54

configuring     27-54

described     27-15

Gigabit-capable Ethernet ports

allocating bandwidth     27-50

configuring     27-50

described     27-13

expert mode     3-25

extended-range VLANs

configuration guidelines     10-13

configuring     10-12

creating     10-13

defined     10-1

extended system ID

MSTP     15-14

STP     14-4, 14-12

Extensible Authentication Protocol over LAN     8-1

exterior routes, IGRP     29-30

F

fallback bridging

and protected ports     33-4

bridge groups

creating     33-4

described     33-2

displaying     33-12

function of     33-2

number supported     33-4

removing     33-4

bridge table

changing the aging time     33-6

clearing     33-12

displaying     33-12

connecting interfaces with     9-7

default configuration     33-3

described     33-1

frame forwarding

filtering by MAC address     33-6

flooding packets     33-2

for static addresses     33-5

forwarding packets     33-2

preventing for dynamically learned stations     33-5

to static addresses     33-5

overview     33-1

fallback bridging (continued)

STP

disabling on an interface     33-12

forward-delay interval     33-10

hello BPDU interval     33-10

interface priority     33-8

maximum-idle interval     33-11

path cost     33-9

switch priority     33-8

VLAN-bridge STP     33-1, 33-2

support for     1-5

SVIs and routed ports     33-1

VLAN-bridge STP     14-8

fallback VLAN name     10-31

fan fault indication     3-5

Fast Uplink Transition Protocol     16-6

feature manager, ACL     26-44

feedback to Cisco Systems, web     xxxvi

FIB     29-53

fiber-optic, detecting unidirectional links     21-1

files

copying     B-4

crashinfo

description     34-17

displaying the contents of     34-17

location     34-17

deleting     B-5

displaying the contents of     B-8

tar

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

file system

displaying available file systems     B-2

displaying file information     B-3

local file system names     B-1

network file system names     B-4

setting the default     B-3

filtering

in a VLAN     26-29

non-IP traffic     26-26

show and more command output     2-9

with fallback bridging     33-6

filters, IP

See ACLs, IP

Flash device, number of     B-1

flash updates, IGRP     29-31

flooded traffic, blocking     19-6

flow-based packet classification     1-4

flowcharts

QoS classification     27-6

QoS policing and marking     27-10

QoS queueing and scheduling

10/100 ports     27-15

Gigabit-capable ports     27-12

flow control     1-2, 9-15

forward-delay time

MSTP     15-20

STP     14-6, 14-18

Forwarding Information Base

See FIB

forwarding non-routable protocols     33-1

Front Panel images, CMS     3-6

Front Panel view

cluster tree     3-5

described     3-4

pop-up menus     3-21

port icons     3-6

port LEDs     3-8

RPS LED     3-7

switch images     3-6

FTP

accessing MIB files     A-2

configuration files

downloading     B-13

overview     B-12

preparing the server     B-13

uploading     B-15

image files

deleting old image     B-28

downloading     B-26

preparing the server     B-25

uploading     B-28

G

GBICs

1000BASE-LX/LH module     1-10

1000BASE-SX module     1-10

1000BASE-T module     1-10

1000BASE-ZX module     1-10

CWDM module     1-17

GigaStack module     1-9

security and identification     34-11

get-bulk-request operation     25-2

get-next-request operation     25-2, 25-3

get-request operation     25-2, 25-3

get-response operation     25-2

Gigabit GBIC modules

See GBICs

Gigabit Interface Converters

See GBICs

GigaStack GBIC

fast transition of redundant link     16-5

See also GBICs

global configuration mode     2-2

graphs, bandwidth     3-8

guide

audience     xxxi

organization of     xxxii

purpose of     xxxi

guide mode     1-7, 3-25

H

hardware, determining ACL configuration fit     26-46

HC (candidate switch)     6-24

hello time

MSTP     15-19

STP     14-18

help, for the command line     2-3

Help button, CMS     3-28

Help Contents     3-26

history

changing the buffer size     2-5

described     2-5

disabling     2-6

recalling commands     2-5

history table, level and number of syslog messages     24-10

host name list, CMS     3-27

host names

abbreviations appended to     6-24

in clusters     6-18

hosts, limit on dynamic ports     10-37

Hot Standby Router Protocol

See HSRP

HP OpenView     1-6

HSRP

authentication string     30-8

automatic cluster recovery     6-17

binding to cluster group     30-9

cluster standby group considerations     6-15

command-switch redundancy     1-1

configuring     30-3

default configuration     30-3

definition     30-1

HSRP (continued)

monitoring     30-10

overview     30-1

priority     30-6

routing redundancy     1-5

timers     30-8

tracking     30-6

See also clusters, cluster standby group, and standby command switch

HTTP access     3-29, 3-30

Hypertext Transfer Protocol

See HTTP access

I

ICMP

redirect messages     29-15

support for     1-5

time exceeded messages     34-13

traceroute and     34-13

unreachable messages     26-6

unreachables and ACLs     26-7

ICMP ping

executing     34-12

overview     34-11

ICMP Router Discovery Protocol

See IRDP

icons

cluster tree     3-5

colors

cluster tree     3-5

Topology view     3-13

editable table cell     3-28

Front Panel view     3-6

multilink     3-22

sorting     3-28

toolbar     3-20

Topology view     3-11

web link     3-28

IE2100

CNS embedded agents

described     5-5

enabling automated configuration     5-6

enabling configuration agent     5-9

enabling event agent     5-8

Configuration Registrar

configID, deviceID, hostname     5-3

configuration service     5-2

described     5-1

event service     5-3

described     1-6

support for     1-2

IEEE 802.1P     12-1

IFS     1-2

IGMP

configuring the switch

as a member of a group     31-34

statically connected member     31-36

controlling access to groups     31-35

default configuration     31-31

deleting cache entries     31-58

displaying groups     31-58

fast switching     31-37

host-query interval, modifying     31-36

joining multicast group     18-2

join messages     18-2

leave processing, enabling     18-9

leaving multicast group     18-4

multicast reachability     31-34

overview     31-3

queries     18-3

support for     1-2

IGMP (continued)

Version 1

changing to Version 2     31-32

hosts joining a group     31-3

hosts leaving a group     31-3

membership queries     31-3

overview     31-3

query-response model     31-3

Version 2

changing to Version 1     31-32

enhancements over Version 1     31-4

hosts leaving a group     31-4

maximum query response time value     31-33

new features     31-4

overview     31-4

pruning groups     31-33

query timeout value     31-32

IGMP filtering

configuring     18-20

default configuration     18-20

described     18-20

monitoring     18-24

IGMP groups, setting the maximum number     18-23

IGMP profile

applying     18-22

configuration mode     18-20

configuring     18-21

IGMP snooping

configuring     18-5

default configuration     18-5

definition     18-1

enabling and disabling     18-5

global configuration     18-5

Immediate Leave     18-4

method     18-6

monitoring     18-9

support for     1-2

VLAN configuration     18-6

IGP     29-35

IGRP

advertisements     29-30

alternate routes     29-31

configuring     29-32

default configuration     29-30

described     29-30

exterior routes     29-30

flash updates     29-31

interior routes     29-30

load balancing     29-31

poison-reverse updates     29-31

split horizon     29-34

support for     1-5

system routes     29-30

traffic sharing     29-32

unequal-cost load balancing     29-31

Immediate-Leave, IGMP     18-4

Intelligence Engine 2100 Series CNS Agents

See IE2100

interaction modes, CMS     3-25

interface

number     9-7

range macros     9-11

interface command     9-7

interface configuration mode     2-2

interfaces

configuration guidelines     9-14

configuring     9-7

configuring duplex mode     9-14

configuring speed     9-14

counters, clearing     9-19

described     9-17

descriptive name, adding     9-17

displaying information about     9-18

flow control     9-15

management     1-6

monitoring     9-18

naming     9-17

interfaces (continued)

physical, identifying     9-7

range of     9-9

restarting     9-20

shutting down     9-20

supported     9-7

types of     9-1

interfaces range macro command     9-11

Interior Gateway Protocol

See IGP

Interior Gateway Routing Protocol

See IGRP

interior routes, IGRP     29-30

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link

See ISL

inter-VLAN routing     1-5, 29-2

inventory, cluster     6-26

IOS File System

See IFS

ip access-group command     26-21

IP ACLs

applying to an interface     26-19

extended, creating     26-11

for QoS classification     27-7

implicit deny     26-10, 26-14, 26-16

implicit masks     26-10

logging     26-16

named     26-15

standard, creating     26-9

undefined     26-21

virtual terminal lines, setting on     26-19

IP addresses

candidate or member     6-4, 6-17

classes of     29-5

cluster access     6-2

command switch     6-3, 6-15, 6-17

default configuration     29-4

for IP routing     29-4

MAC address association     29-10

monitoring     29-21

redundant clusters     6-15

standby command switch     6-15, 6-17

See also IP information

IP broadcast address     29-20

ip cef command     29-53

IP directed broadcasts     29-17

ip igmp profile command     18-20

IP information

assigned

manually     4-10

through DHCP-based autoconfiguration     4-3

default configuration     4-3

IP multicast routing

addresses

all-hosts     31-1

all-multicast-routers     31-1

all-PIM-routers     31-10

Cisco-RP-Announce     31-8

Cisco-RP-Discovery     31-8

host group address range     31-1

administratively-scoped boundaries, described     31-42

and IGMP snooping     18-1, 18-5

Auto-RP

adding to an existing sparse-mode cloud     31-19

benefits of     31-18

clearing the cache     31-58

configuration guidelines     31-15

IOS release     31-5

overview     31-8

IP multicast routing (continued)

Auto-RP (continued)

preventing candidate RP spoofing     31-21

preventing join messages to false RPs     31-20

setting up in a new internetwork     31-19

using with BSR     31-27

bootstrap router

configuration guidelines     31-15

configuring candidate BSRs     31-25

configuring candidate RPs     31-26

defining the IP multicast boundary     31-24

defining the PIM domain border     31-22

IOS release     31-5

overview     31-8

using with Auto-RP     31-27

Cisco implementation     31-2

configuring

basic multicast routing     31-15

IP multicast boundary     31-42

TTL threshold     31-40

default configuration     31-13

enabling

multicast forwarding     31-15

PIM mode     31-16

group-to-RP mappings

Auto-RP     31-8

BSR     31-8

MBONE

deleting sdr cache entries     31-58

described     31-39

displaying sdr cache     31-59

enabling sdr listener support     31-39

limiting DVMRP routes advertised     31-53

limiting sdr cache entry lifetime     31-39

SAP packets for conference session announcement     31-39

Session Directory (sdr) tool, described     31-39

IP multicast routing (continued)

monitoring

packet rate loss     31-59

peering devices     31-59

tracing a path     31-59

multicast forwarding, described     31-9

PIMv1 and PIMv2 interoperability     31-14

protocol interaction     31-2

reverse path check (RPF)     31-9

routing table

deleting     31-58

displaying     31-58

RP

assigning manually     31-17

configuring Auto-RP     31-18

configuring PIMv2 BSR     31-22

monitoring mapping information     31-27

using Auto-RP and BSR     31-27

statistics, displaying system and network     31-58

TTL thresholds, described     31-40

See also CGMP

See also DVMRP

See also IGMP

See also PIM

IP phone

calls     12-1

configuring     12-3

IP precedence     27-2

IP-precedence-to-DSCP map for QoS     27-40

IP protocols

in ACLs     26-12

routing     1-5

IP routes, monitoring     29-64

IP routing

connecting interfaces with     9-6

enabling     29-24

IP traceroute

executing     34-13

overview     34-13

IP unicast routing

address resolution     29-10

administrative distances     29-56, 29-62

ARP     29-10

assigning IP addresses to Layer 3 interfaces     29-6

authentication keys     29-63

broadcast

address     29-20

flooding     29-20

packets     29-17

storms     29-17

classless routing     29-8

configuring static routes     29-55

default

addressing configuration     29-4

gateways     29-15

networks     29-56

routes     29-56

routing     29-2

directed broadcasts     29-17

dynamic routing     29-2

enabling     29-24

EtherChannel Layer 3 interface     29-3

IGP     29-35

inter-VLAN     29-2

IP addressing

classes     29-5

configuring     29-4

IRDP     29-15

Layer 3 interfaces     29-3

MAC address and IP address     29-10

passive interfaces     29-61

protocols

distance-vector     29-2

dynamic     29-2

link-state     29-2

proxy ARP     29-10

IP unicast routing (continued)

redistribution     29-57

reverse address resolution     29-10

routed ports     29-3

static routing     29-2

steps to configure     29-3

subnet mask     29-5

subnet zero     29-8

supernet     29-8

UDP     29-19

with SVIs     29-3

See also EIGRP

See also IGRP

See also OSPF

See also RIP

ip unreachables command     26-6

IRDP

configuring     29-16

definition     29-15

support for     1-5

ISL

and trunk ports     9-3

encapsulation     1-3, 10-18

trunking with 802.1 tunneling     13-4

trunk mode     3-9

J

Java plug-in configuration     3-1, 6-1

join messages, IGMP     18-2

L

l2protocol-tunnel command     13-10

Layer 2 frames, classification with CoS     27-2

Layer 2 interfaces, default configuration     9-13

Layer 2 protocol tunneling

configuring     13-9

default configuration     13-9

defined     13-7

guidelines     13-10

Layer 2 trunks     10-18

Layer 3 features     1-5

Layer 3 interfaces

assigning IP addresses to     29-6

changing from Layer 2 mode     29-6

types of     29-3

Layer 3 packets, classification methods     27-2

LDAP     5-2

leave processing, IGMP     18-9

LEDs

port     3-8

port modes     3-8

RPS     3-7

legend, CMS icons and labels     3-19

lightweight directory access protocol

See LDAP

line configuration mode     2-2

link icons, Topology view     3-12

link labels     3-12

link pop-up menu, Topology view     3-22

links, unidirectional     21-1

link state advertisements (LSAs)     29-39

link-state protocols     29-2

lists, CMS     3-28

load balancing, IGRP     29-31

logging messages, ACL     26-10

login authentication

with RADIUS     7-23

with TACACS+     7-14

login banners     7-50

log messages

See system message logging

long-distance, high-bandwidth transport configuration example     1-17

Long-Reach Ethernet (LRE) technology     1-9

loop guard

described     16-13

enabling     16-20

support for     1-3

LRE profiles

considerations in switch clusters     6-20

M

mac access-group command     26-28

MAC ACLs and Layer 2 interfaces     26-28

MAC addresses

aging time     7-54

and VLAN association     7-53

building the address table     7-53

default configuration     7-54

displaying     7-58

dynamic

learning     7-53

removing     7-55

in ACLs     26-26

IP address association     29-10

static

adding     7-57

characteristics of     7-57

removing     7-57

MAC address multicast entries, monitoring     18-10

MAC address-to-VLAN mapping     10-30

MAC extended access lists     26-26, 27-4, 27-29

MAN

CWDM configuration example     1-17

long-distance, high-bandwidth transport configuration example     1-17

manageability features     1-2

management options

benefits

clustering     1-7

CMS     1-7

CLI     2-1

CMS     3-1

CNS     5-1

overview     1-6

management VLAN

discovery through different management VLANs     6-10

discovery through same management VLAN     6-9

mapping tables for QoS

configuring

CoS-to-DSCP     27-39

CoS-to-egress-queue     27-45

DSCP     27-39

DSCP-to-CoS     27-42

DSCP-to-DSCP-mutation     27-43

DSCP-to-threshold     27-47

IP-precedence-to-DSCP     27-40

policed-DSCP     27-41

described     27-11

marking

action in policy map     27-32

action with aggregate policers     27-37

described     27-3, 27-8

matching, ACLs     26-8

maximum aging time

MSTP     15-21

STP     14-19

maximum hop count, MSTP     15-21

maximum-paths command     29-54

membership mode, VLAN port     3-9, 10-3

member switch

adding     6-22

automatic discovery     6-5

defined     6-2

managing     6-27

passwords     6-17

recovering from lost connectivity     34-10

requirements     6-4

See also candidate switch, cluster standby group, and standby command switch

memory, optimizing     7-58

menu bar

described     3-14

variations     3-14

messages

logging ACL violations     26-16

system     3-18

to users through banners     7-50

metric translations, between routing protocols     29-60

metropolitan-area networks

See MANs

metro tags     13-2

MIBs

accessing files with FTP     A-2

location of files     A-2

overview     25-1

SNMP interaction with     25-3

supported     A-1

minimum-reserve levels

assigning to a queue     27-15, 27-53

configuring the buffer size     27-16, 27-53

default size     27-15

mini-point-of-presence

See POP

mirroring traffic for analysis     22-1

mismatches, autonegotiation     34-10

Mode button     3-8

modes

access to CMS     3-30

port     3-8

VLAN port membership     3-9

Modify button     3-28

modules, GBIC

1000BASE-LX/LH     1-10

1000BASE-SX     1-10

1000BASE-T     1-10

1000BASE-ZX     1-10

CWDM     1-17

GigaStack     1-9

monitoring

802.1Q tunneling     13-11

access groups     26-41

ACL

configuration     26-41

configuration conflicts     26-44

fit in hardware     26-46

information     26-41

cables for unidirectional links     21-1

CDP     20-5

CEF     29-54

EIGRP     29-51

fallback bridging     33-12

features     1-6

HSRP     30-10

IGMP

filters     18-24

snooping     18-9

interfaces     9-18

IP

address tables     29-21

multicast routing     31-57

routes     29-64

Layer 2 protocol tunneling     13-11

MSDP peers     32-19

multicast router interfaces     18-10

MVR     18-18

monitoring (continued)

network traffic for analysis with probe     22-1

OSPF     29-44

port

blocking     19-13

protection     19-13

RP mapping information     31-27

source-active messages     32-19

speed and duplex mode     9-15

traffic flowing among switches     23-1

traffic suppression     19-13

tunneling     13-11

VLAN

filters     26-43

maps     26-43

VLANs     10-15

VMPS     10-36

VTP     11-16

MSDP

and dense-mode regions

sending SA messages to     32-17

specifying the originating address     32-18

benefits of     32-3

clearing MSDP connections and statistics     32-19

controlling source information

forwarded by switch     32-12

originated by switch     32-8

received by switch     32-14

default configuration     32-4

filtering

incoming SA messages     32-14

SA messages to a peer     32-12

SA requests from a peer     32-11

join latency, defined     32-6

meshed groups

configuring     32-16

defined     32-16

originating address, changing     32-18

overview     32-1

MSDP (continued)

peer-RPF flooding     32-2

peers

configuring a default     32-4

monitoring     32-19

peering relationship, overview     32-1

requesting source information from     32-8

shutting down     32-16

source-active messages

caching     32-6

clearing cache entries     32-19

defined     32-2

filtering from a peer     32-11

filtering incoming     32-14

filtering to a peer     32-12

limiting data with TTL     32-14

monitoring     32-19

restricting advertised sources     32-9

MSTP

boundary ports

configuration guidelines     15-12

described     15-10

BPDU filtering

described     16-3

enabling     16-16

BPDU guard

described     16-3

enabling     16-15

CIST, described     15-8

configuration guidelines     15-12

configuring

forward-delay time     15-20

hello time     15-19

link type for rapid convergence     15-22

maximum aging time     15-21

maximum hop count     15-21

MST region     15-13

path cost     15-18

port priority     15-17

MSTP (continued)

configuring (continued)

root switch     15-14

secondary root switch     15-16

switch priority     15-19

CST

defined     15-8

operations between regions     15-9

default configuration     15-12

default optional feature configuration     16-14

displaying status     15-23

enabling the mode     15-13

extended system ID

affects on root switch     15-14

affects on secondary root switch     15-16

unexpected behavior     15-14

interface state, blocking to forwarding     16-2

interoperability with 802.1D

described     15-11

restarting migration process     15-22

IST

defined     15-8

master     15-8

operations within a region     15-8

loop guard

described     16-13

enabling     16-20

mapping VLANs to MST instance     15-13

MST region

CIST     15-8

configuring     15-13

described     15-7

hop-count mechanism     15-10

IST     15-8

supported spanning-tree instances     15-7

optional features supported     1-3

overview     15-7

MSTP (continued)

Port Fast

described     16-2

enabling     16-14

preventing root switch selection     16-12

root guard

described     16-12

enabling     16-19

root switch

affects of extended system ID     15-14

configuring     15-14

unexpected behavior     15-14

shutdown Port Fast-enabled port     16-3

multicast groups

and IGMP snooping     18-5

Immediate Leave     18-4

joining     18-2

leaving     18-4

static joins     18-8

multicast packets

ACLs on     26-40

blocking     19-6

multicast router interfaces, monitoring     18-10

multicast router ports, adding     18-7

Multicast Source Discovery Protocol

See MSDP

multicast storm-control command     19-3

multicast storms     19-1

Multicast VLAN Registration

See MVR

Multilink Decomposer window     3-22

multilink icon     3-22

Multiple Spanning Tree Protocol

See MSTP

MVR

configuring interfaces     18-16

default configuration     18-15

described     18-12

modes     18-16

monitoring     18-18

setting global parameters     18-15

support for     1-2

N

named IP ACLs     26-15

NameSpace Mapper

See NSM

native VLAN

and 802.1Q tunneling     13-4

configuring     10-25

default     10-25

negotiate trunk mode     3-9

neighbor discovery/recovery, EIGRP     29-46

neighboring devices, types of     3-11

network configuration examples

increasing network performance     1-8

large network     1-14

long-distance, high-bandwidth transport     1-17

providing network services     1-9

small to medium-sized network     1-12

network design

performance     1-8

services     1-9

network management

CDP     20-1

RMON     23-1

SNMP     25-1

Network Time Protocol

See NTP

no commands     2-4

non-IP traffic filtering     26-26

nontrunking mode     10-19

normal-range VLANs

configuration modes     10-6

defined     10-1

no switchport command     9-5

note, described     xxxv

not-so-stubby areas

See NSSA

NSM     5-3

NSSA, OSPF     29-39

NTP

associations

authenticating     7-36

defined     7-34

enabling broadcast messages     7-38

peer     7-37

server     7-37

default configuration     7-36

displaying the configuration     7-42

overview     7-33

restricting access

creating an access group     7-40

disabling NTP services per interface     7-41

source IP address, configuring     7-41

stratum     7-33

support for     1-2

synchronizing devices     7-37

time

services     7-34

synchronizing     7-33

O

OADM modules

See CWDM OADM modules

OK button     3-28

online help     3-26

Open Shortest Path First

See OSPF

optical add/drop multiplexer modules

See CWDM OADM modules

optimizing system resources     7-58

options, management     1-6

OSPF

area parameters, configuring     29-39

configuring     29-37

default configuration

metrics     29-41

route     29-41

settings     29-36

described     29-35

interface parameters, configuring     29-38

LSA group pacing     29-43

monitoring     29-44

router IDs     29-43

route summarization     29-41

support for     1-5

virtual links     29-41

out-of-profile markdown     1-5

output interface, getting information about     34-17

overheating indication, switch     3-5

P

packet modification, with QoS     27-17

PAgP

See EtherChannel

parallel paths, in routing tables     29-54

passive interfaces

configuring     29-61

OSPF     29-42

passwords

default configuration     7-3

disabling recovery of     7-5

encrypting     7-4

for security     1-4

passwords (continued)

in clusters     6-18, 6-22

in CMS     3-29

overview     7-1

recovery of     34-3

setting

enable     7-3

enable secret     7-4

Telnet     7-6

with usernames     7-7

VTP domain     11-8

path cost

MSTP     15-18

STP     14-16

PC (passive command switch)     6-14, 6-24

performance, network design     1-8

performance features     1-2

per-VLAN Spanning Tree (PVST)     14-2

per-VLAN Spanning Tree+ (PVST+)     14-8

physical ports     9-2

PIM

default configuration     31-13

dense mode

(S,G) notation     31-6

graft messages     31-6

overview     31-5

pruning and SPT     31-5

rendezvous point (RP), described     31-7

RPF lookups     31-10

displaying neighbors     31-59

enabling a mode     31-16

neighbor discovery and adjacencies     31-10

overview     31-5

router-query message interval, modifying     31-30

shared tree and source tree, overview     31-28

shortest path tree, delaying the use of     31-29

PIM (continued)

sparse mode

(*,G) notation     31-7

join messages and shared tree     31-7

overview     31-7

prune messages     31-8

RPF lookups     31-10

support for     1-5

versions

interoperability     31-14

supported     31-5

troubleshooting interoperability problems     31-28

v2 improvements     31-5

PIM-DVMRP, as snooping method     18-6

ping

character output description     34-12

executing     34-12

overview     34-11

planning considerations, switch clusters

LRE profiles     6-20

switch-specific features     6-20

poison-reverse updates, IGRP     29-31

policed-DSCP map for QoS     27-41

policers

configuring

for each matched traffic class     27-32

for more than one traffic class     27-37

described     27-3

displaying     27-56

number of     1-5, 27-9

types of     27-8

policing

described     27-3

token bucket algorithm     27-8

policy maps for QoS

characteristics of     27-32

configuring     27-32

described     27-7

displaying     27-56

POP     1-15

port ACLs

and voice VLAN     26-4

defined     26-2

limitations     26-4

Port Aggregation Protocol

See EtherChannel

See PAgP

port-based authentication

authentication server

defined     8-2

RADIUS server     8-2

client, defined     8-2

configuration guidelines     8-7

configuring

manual re-authentication of a client     8-11

quiet period     8-11

RADIUS server     8-10

RADIUS server parameters on the switch     8-9

switch-to-client frame-retransmission number     8-13

switch-to-client retransmission time     8-12

default configuration     8-6

described     8-1

device roles     8-2

displaying statistics     8-14

EAPOL-start frame     8-3

EAP-request/identity frame     8-3

EAP-response/identity frame     8-3

enabling

802.1X authentication     8-8

periodic re-authentication     8-10

encapsulation     8-2

initiation and message exchange     8-3

method lists     8-8

ports

authorization state and dot1x port-control command     8-4

authorized and unauthorized     8-4

resetting to default values     8-14

port-based authentication (continued)

switch

as proxy     8-2

RADIUS client     8-2

topologies, supported     8-4

port blocking     1-2, 19-6

port-channel

See EtherChannel

Port Fast

described     16-2

enabling     16-14

mode, spanning tree     10-33

support for     1-3

port icons, Front Panel view     3-6

port LEDs     3-8

DUPLX     3-8

port modes     3-8

SPEED     3-8

STAT     3-8

port membership modes, VLAN     3-9, 10-3

port modes

described     3-8

LEDs     3-8

port pop-up menu, Front Panel view     3-21

port priority

MSTP     15-17

STP     14-15

ports

802.1Q trunk     3-9

802.1Q tunnel     10-3

access     9-2

blocking     19-6

dynamic access     3-9, 10-3

forwarding, resuming     19-7

ISL trunk     3-9

negotiate trunk     3-9

protected     19-5

routed     9-5

secure     19-8

ports (continued)

static-access     3-9, 10-3, 10-11

switch     9-2

trunks     10-3, 10-18

VLAN assignments     10-11

port security

aging     19-11

configuring     19-9

default configuration     19-9

described     19-8

displaying     19-13

violations     19-8

with other features     19-9

port-shutdown response, VMPS     10-30

preferential treatment of traffic

See QoS

preventing unauthorized access     7-1

priority

HSRP     30-6

overriding CoS     12-5

trusting CoS     12-6

private VLAN edge ports

See protected ports

privileged EXEC mode     2-2

privilege levels

access modes

read-only     3-30

read-write     3-30

changing the default for lines     7-9

CMS     3-30

command switch     6-27

exiting     7-10

logging into     7-10

mapping on member switches     6-27

overview     7-2, 7-8

setting a command with     7-8

protected ports     1-4, 19-5

protocol-dependent modules, EIGRP     29-47

Protocol-Independent Multicast Protocol

See PIM

proxy ARP

configuring     29-13

definition     29-10

with IP routing disabled     29-14

pruning, VTP

enabling     11-14

enabling on a port     10-25

examples     11-5

overview     11-4

pruning-eligible list

changing     10-25

for VTP pruning     11-4

VLANs     11-14

publications, related     xxxv

PVST     10-2

Q

QoS

basic model     27-3

classification

class maps, described     27-7

defined     27-3

flowchart     27-6

forwarding treatment     27-3

in frames and packets     27-2

IP ACLs, described     27-5, 27-7

MAC ACLs, described     27-4, 27-7

policy maps, described     27-7

port default, described     27-4

trust DSCP, described     27-4

trusted CoS, described     27-4

trust IP precedence, described     27-4

types for IP traffic     27-5

types for non-IP traffic     27-4

QoS (continued)

class maps

configuring     27-30

displaying     27-56

configuration examples

common wiring closet     27-57

distribution layer     27-59

intelligent wiring closet     27-58

configuration guidelines     27-20

configuring

aggregate policers     27-37

default port CoS value     27-24

DSCP maps     27-39

DSCP trust states bordering another domain     27-25

egress queues on 10/100 Ethernet ports     27-51

egress queues on Gigabit-capable Ethernet ports     27-44

IP extended ACLs     27-28

IP standard ACLs     27-27

MAC ACLs     27-29

policy maps     27-32

port trust states within the domain     27-22

default configuration     27-18

displaying statistics     27-56

enabling globally     27-21

flowcharts

classification     27-6

policing and marking     27-10

queueing and scheduling     27-12, 27-15

implicit deny     27-7

mapping tables

CoS-to-DSCP     27-39

CoS-to-egress-queue     27-45

displaying     27-56

DSCP-to-CoS     27-42

DSCP-to-DSCP-mutation     27-43

DSCP-to-threshold     27-47

IP-precedence-to-DSCP     27-40

QoS (continued)

mapping tables (continued)

policed-DSCP     27-41

types of     27-11

marked-down actions     27-35

marking, described     27-3, 27-8

overview     27-1

packet modification     27-17

policers

configuring     27-35, 27-37

described     27-8

displaying     27-56

number of     27-9

types of     27-8

policies, attaching to an interface     27-9

policing

described     27-3, 27-8

token bucket algorithm     27-8

policy maps

characteristics of     27-32

configuring     27-32

displaying     27-56

queueing, defined     27-3

queues

CoS-to-egress-queue map     27-45

for 10/100 Ethernet ports     27-15

high priority (expedite)     27-13, 27-50

minimum-reserve levels     27-53

serviced by WRR     27-13, 27-16

size of     27-13, 27-15

size ratios     27-46

tail-drop threshold percentages     27-13, 27-47

WRED drop-percentage thresholds     27-13, 27-48

WRR scheduling     27-50

scheduling

allocating bandwidth on 10/100 Ethernet ports     27-54

allocating bandwidth on Gigabit-capable ports     27-50

defined     27-3

support for     1-4

QoS (continued)

tail drop

configuring drop threshold percentages     27-47

described     27-13

trust states     27-4

WRED

configuring drop-percentage thresholds     27-48

described     27-14

WRR scheduling     27-50

quality of service

See QoS

queries, IGMP     18-3

R

RADIUS

attributes

vendor-proprietary     7-29

vendor-specific     7-28

configuring

accounting     7-27

authentication     7-23

authorization     7-26

communication, global     7-21, 7-28

communication, per-server     7-20, 7-21

multiple UDP ports     7-20

default configuration     7-20

defining AAA server groups     7-24

displaying the configuration     7-30

identifying the server     7-20

in clusters     6-19

limiting the services to the user     7-26

method list, defined     7-19

operation of     7-19

overview     7-18

suggested network environments     7-18

tracking services accessed by user     7-27

Random Early Detection, described     27-14

range

macro     9-11

of interfaces     9-9

Rapid Spanning Tree Protocol

See RSTP

RARP     29-10

rcommand command     6-27

RCP

configuration files

downloading     B-17

overview     B-16

preparing the server     B-16

uploading     B-18

image files

deleting old image     B-32

downloading     B-30

preparing the server     B-29

uploading     B-32

read-only access mode     3-30

read-write access mode     3-30

reconfirmation interval, VMPS, changing     10-35

recovery procedures     34-1

redundancy

EtherChannel     28-1

features     1-3

HSRP     30-1

STP

backbone     14-9

multidrop backbone     16-5

path cost     10-28

port priority     10-26

redundant clusters

See cluster standby group

redundant links and UplinkFast     16-17

redundant power system

See RPS

Refresh button     3-28

reliable transport protocol, EIGRP     29-46

reloading software     4-17

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

resetting a UDLD-shutdown interface     21-4

restricting access

NTP services     7-39

overview     7-1

passwords and privilege levels     7-2

RADIUS     7-17

TACACS+     7-10

retry count, VMPS, changing     10-36

reverse address resolution     29-10

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP     29-25

1112, IP multicast and IGMP     18-2

1157, SNMPv1     25-2

1166, IP addresses     29-5

1253, OSPF     29-35

1305, NTP     7-33

1587, NSSAs     29-35

1757, RMON     23-2

1901, SNMPv2C     25-2

1902 to 1907, SNMPv2     25-2

2236, IP multicast and IGMP     18-2

RIP

advertisements     29-25

authentication     29-28

configuring     29-26

default configuration     29-25

described     29-25

hop counts     29-25

split horizon     29-29

summary addresses     29-29

support for     1-5

RMON

default configuration     23-3

displaying status     23-6

enabling alarms and events     23-3

groups supported     23-2

overview     23-1

statistics

collecting group Ethernet     23-5

collecting group history     23-5

support for     1-6

root guard

described     16-12

enabling     16-19

support for     1-3

root switch

MSTP     15-14

STP     14-12

route calculation timers, OSPF     29-42

routed packets, ACLs on     26-39

routed ports

configuring     29-3

defined     9-5

in switch clusters     6-12

IP addresses on     9-21, 29-3

router ACLs     26-2

router ID, OSPF     29-43

route summarization, OSPF     29-41

routing

default     29-2

dynamic     29-2

redistribution of information     29-57

static     29-2

Routing Information Protocol

See RIP

routing protocol administrative distances     29-56

RPS LED      3-7

RSTP

active topology, determining     15-2

BPDU

format     15-5

processing     15-6

configuration guidelines     15-12

designated port, defined     15-2

designated switch, defined     15-2

interoperability with 802.1D

described     15-11

restarting migration process     15-22

topology changes     15-6

overview     15-2

port roles

described     15-2

synchronized     15-4

proposal-agreement handshake process     15-3

rapid convergence

edge ports and Port Fast     15-3

point-to-point links     15-3, 15-22

root ports     15-3

root port, defined     15-2

See also MSTP

running configuration, saving     4-10

S

saving changes in CMS     3-31

SC (standby command switch)     6-14, 6-24

scheduled reloads     4-17

SDM

configuring     7-60

described     7-58

templates

number of     7-58

resources used for Fast Ethernet switches     7-59

resources used for Gigabit Ethernet switches     7-59

secure ports, configuring     19-8

secure remote connections     7-32

Secure Shell

See SSH

security, port     19-8

security features     1-4

sequence numbers in log messages     24-8

server mode, VTP     11-3

service-provider network

DHCP option 82     17-1

MSTP and RSTP     15-1

service-provider networks

and 802.1Q tunneling     13-1

and customer VLANs     13-2

Layer 2 protocols across     13-7

set-request operation     25-3

setup program, failed command switch replacement     34-7, 34-9

severity levels, defining in system messages     24-8

show access-lists hw-summary command     26-7

show cdp traffic command     20-5

show cluster members command     6-27

show configuration command     9-17

show fm command     26-44

show forward command     34-16

show interfaces command     9-15, 9-17

show l2protocol command     13-11

show mac access-group command     26-28

show running-config command

displaying ACLs     26-20, 26-30, 26-33

interface description in     9-17

show tcam command     26-44

shutdown command on interfaces     9-20

shutdown threshold for Layer 2 protocol packets     13-9

Simple Network Management Protocol

See SNMP

SNAP     20-1

SNMP

accessing MIB variables with     25-3

agent

described     25-3

disabling     25-5

community strings

configuring     25-5

for cluster switches     25-3

overview     25-3

configuration examples     25-10

default configuration     25-4

in-band management     1-2

in clusters     6-18

limiting access by TFTP servers     25-9

limiting system log messages to NMS     24-10

manager functions     1-6, 25-2

managing clusters with     6-28

MIBs

location of     A-2

supported     A-1

overview     25-1, 25-3

status, displaying     25-10

system contact and location     25-9

trap manager, configuring     25-8

traps

described     25-2

enabling     25-7

enabling MAC address notification     7-55

overview     25-1, 25-3

types of     25-7

versions supported     25-2

snooping, IGMP     18-1

software images

location in Flash     B-20

recovery procedures     34-2

scheduling reloads     4-17

tar file format, described     B-20

See also downloading and uploading

source addresses, in ACLs     26-12

SPAN

configuration guidelines     22-7

default configuration     22-7

destination ports     22-4

displaying status     22-13

interaction with other features     22-5

monitored ports     22-4

monitoring ports     22-4

overview     1-6, 22-1

received traffic     22-3

sessions

creating     22-8

defined     22-2

limiting source traffic to specific VLANs     22-12

monitoring VLANs     22-11

removing destination (monitoring) ports     22-10

removing source (monitored) ports     22-10

specifying monitored ports     22-8

source ports     22-4

transmitted traffic     22-3

VLAN-based     22-5

spanning tree and native VLANs     10-20

Spanning Tree Protocol

See STP

speed, configuring on interfaces     9-14

split horizon

IGRP     29-34

RIP     29-29

SSH

configuring     7-32

crypto software image     7-32

described     7-32

displaying settings     7-32

Stack Membership Discovery Protocol     16-6

Standby Command Configuration window     6-25

standby command switch

configuring      6-24

considerations     6-15

defined     6-2

priority     6-14

requirements     6-3

virtual IP address     6-15

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

standby ip command     30-4

standby router     30-1

standby timers, HSRP     30-8

startup configuration

booting

manually     4-13

specific image     4-14

clearing     B-19

configuration file

automatically downloading     4-12

specifying the filename     4-13

default boot configuration     4-12

static access mode     3-9

static access ports

assigning to VLAN     10-11

defined     9-3, 10-3

static addresses

See addresses

static IP routing     1-5

static MAC addressing     1-4

static routes, configuring     29-55

static routing     29-2

static VLAN membership     10-2

statistics

802.1X     8-14

CDP     20-5

interface     9-18

IP multicast routing     31-58

OSPF     29-44

statistics (continued)

QoS ingress and egress     27-56

RMON group Ethernet     23-5

RMON group history     23-5

SNMP input and output     25-10

VTP     11-16

status bar

change notification     3-31

error notification     3-31

storm control

configuring     19-3

described     19-1

displaying     19-13

thresholds     19-1

STP

accelerating root port selection     16-4

BackboneFast

described     16-10

enabling     16-19

BPDU filtering

described     16-3

enabling     16-16

BPDU guard

described     16-3

enabling     16-15

BPDU message exchange     14-2

configuration guidelines     14-11

configuring

forward-delay time     14-18

hello time     14-18

in cascaded stack     14-19

maximum aging time     14-19

path cost     14-16

port priority     14-15, 15-17

root switch     14-12

secondary root switch     14-14

switch priority     14-17

STP (continued)

cross-stack UplinkFast

described     16-5

enabling     16-18

default configuration     14-10

default optional feature configuration     16-14

designated port, defined     14-3

designated switch, defined     14-3

detecting indirect link failures     16-10

disabling     14-12

displaying status     14-20

extended system ID

affects on root switch     14-12

affects on the secondary root switch     14-14

overview     14-4

unexpected behavior     14-13

features supported     1-3

inferior BPDU     14-3

interface state, blocking to forwarding     16-2

interface states

blocking     14-7

disabled     14-8

forwarding     14-6, 14-7

learning     14-7

listening     14-7

overview     14-5

Layer 2 protocol tunneling     13-7

limitations with 802.1Q trunks     14-8

load sharing

overview     10-26

using path costs     10-28

using port priorities     10-26

loop guard

described     16-13

enabling     16-20

multicast addresses, affect of     14-8

optional features supported     1-3

overview     14-2

path costs     10-28, 10-29

STP (continued)

Port Fast

described     16-2

enabling     16-14

port priorities     10-27

preventing root switch selection     16-12

redundant connectivity     14-9

root guard

described     16-12

enabling     16-19

root port, defined     14-3

root switch

affects of extended system ID     14-4, 14-12

configuring     14-12

election     14-3

unexpected behavior     14-13

settings in a cascaded stack     14-19

shutdown Port Fast-enabled port     16-3

superior BPDU     14-3

supported number of spanning-tree instances     14-2

timers, described     14-4

UplinkFast

described     16-4

enabling     16-17

VLAN-bridge     14-8

stratum, NTP     7-33

stub areas, OSPF     29-39

subnet mask     29-5

subnet zero     29-8

summer time     7-45

SunNet Manager     1-6

supernet     29-8

SVIs

and IP unicast routing     29-3

and router ACLs     26-3

connecting VLANs     9-6

defined     9-4

routing between VLANs     10-2

switch clustering technology     6-1

See clusters, switch

switch console port     1-3

switched packets, ACLs on     26-37

switched ports     9-2

Switch Manager     3-2, 3-32

See also Device Manager

switchport block multicast command     19-6

switchport block unicast command     19-6

switchport command     9-12

switchport mode dot1q-tunnel command     13-6

switchport protected command     19-5

switch priority

MSTP     15-19

STP     14-17

switch software features     1-1

switch virtual interface

See SVI

syslog

See system message logging

system clock

configuring

daylight saving time     7-45

manually     7-43

summer time     7-45

time zones     7-44

displaying the time and date     7-43

overview     7-33

See also NTP

System Database Management

See SDM

system message logging

default configuration     24-3

defining error message severity levels     24-8

disabling     24-4

displaying the configuration     24-12

enabling     24-4

facility keywords, described     24-12

level keywords, described     24-9

system message logging (continued)

limiting messages     24-10

message format     24-2

overview     24-1

sequence numbers, enabling and disabling     24-8

setting the display destination device     24-4

synchronizing log messages     24-6

syslog facility     1-6

timestamps, enabling and disabling     24-7

UNIX syslog servers

configuring the daemon     24-11

configuring the logging facility     24-11

facilities supported     24-12

system messages on CMS     3-18

system MTU

802.1Q tunneling     13-5

maximums     13-5

system name

default configuration     7-47

default setting     7-47

manual configuration     7-47

See also DNS

system prompt

default setting     7-47

manual configuration     7-48

system resource templates     7-58

system routes, IGRP     29-30

T

tables, CMS     3-28

tabs, CMS     3-28

TAC

inquiries     xxxvii

toll-free telephone numbers     xxxviii

website     xxxviii

TACACS+

accounting, defined     7-11

authentication, defined     7-11

authorization, defined     7-11

configuring

accounting     7-17

authentication key     7-13

authorization     7-16

login authentication     7-14

default configuration     7-13

displaying the configuration     7-17

identifying the server     7-13

in clusters     6-19

limiting the services to the user     7-16

operation of     7-12

overview     7-10

support for     1-4

tracking services accessed by user     7-17

tagged packets

802.1Q     13-3

Layer 2 protocol     13-7

tail drop

described     27-13

support for     1-5

tar files

creating     B-6

displaying the contents of     B-6

extracting     B-7

image file format     B-20

TCAMs

ACL regions     26-48

ACLs not loading in     26-46

allocations, monitoring     26-49

monitoring usage     26-48

technical assistance

Cisco.com     xxxvii

TAC     xxxvii

TAC website     xxxviii

toll-free telephone numbers     xxxviii

Telnet

number of connections     1-2

setting a password     7-6

templates, system resources     7-58

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password     7-6

ternary content addressable memory. See TCAM

TFTP

configuration files

downloading     B-11

preparing the server     B-10

uploading     B-12

configuration files in base directory     4-6

configuring for autoconfiguration     4-5

image files

deleting     B-23

downloading     B-22

preparing the server     B-22

uploading     B-24

limiting access by servers     25-9

TFTP server     1-2

threshold, traffic level     19-2

time

See NTP and system clock

time-range command     26-17

time ranges in ACLs     26-17

timestamps in log messages     24-7

time zones     7-44

Token Ring VLANs

support for     10-5

VTP support     11-4

toolbar     3-20

tool tips     3-26

Topology view

Collapse Cluster view     3-10

described     3-9

device icons     3-11, 3-13

device labels     3-12

display options     3-13

Expand Cluster view     3-10

icons     3-11

link icons     3-12

link labels     3-12

multilink icon     3-22

neighboring devices     3-11

pop-up menus     3-22

TOS     1-4

traceroute command     34-13

See also IP traceroute

traffic

blocking flooded     19-6

fragmented     26-5

unfragmented     26-5

traffic policing     1-5

traffic suppression     19-1

transparent mode, VTP     11-3, 11-12

trap-door mechanism     4-2

traps

configuring MAC address notification     7-55

configuring managers     25-7

defined     25-2

enabling     7-55, 25-7

notification types     25-7

overview     25-1, 25-3

troubleshooting

connectivity problems     34-11

detecting unidirectional links     21-1

determining packet disposition     34-16

displaying crash information     34-17

GBIC security and identification     34-11

troubleshooting (continued)

PIMv1 and PIMv2 interoperability problems     31-28

show forward command     34-16

with CiscoWorks     25-3

with debug commands     34-14

with ping     34-11

with system message logging     24-1

with traceroute     34-13

trunking encapsulation     1-3

trunk ports

configuring     10-22

defined     9-3, 10-3

encapsulation     10-22, 10-27, 10-29

trunks

allowed-VLAN list     10-24

configuring     10-22, 10-27, 10-29

ISL     10-18

load sharing

setting STP path costs     10-28

using STP port priorities     10-26, 10-27

native VLAN for untagged traffic     10-25

parallel     10-28

pruning-eligible list     10-25

to non-DTP device     10-18

understanding     10-18

tunneling

802.1Q     13-1

defined     13-1

Layer 2 protocol     13-7

tunnel ports

802.1Q, configuring     13-6

802.1Q and ACLs     26-3

defined     10-3

described     9-3, 13-1

routing not supported on     13-5

twisted-pair Ethernet, detecting unidirectional links     21-1

type-of-service

See TOS

U

UDLD

default configuration     21-3

echoing detection mechanism     21-2

enabling

globally     21-3

per interface     21-4

link-detection mechanism     21-1

neighbor database     21-2

overview     21-1

resetting an interface     21-4

status, displaying     21-5

support for     1-3

UDP, configuring     29-19

unauthorized ports with 802.1X     8-4

unequal-cost load balancing, IGRP     29-31

unicast storm control command     19-3

unicast storms     19-1

unicast traffic, blocking     19-6

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration     24-11

facilities supported     24-12

message logging configuration     24-11

unrecognized Type-Length-Value (TLV) support     11-4

upgrading software images

See downloading

UplinkFast

described     16-4

enabling     16-17

support for     1-3

uploading

configuration files

preparing     B-10, B-13, B-16

reasons for     B-8

using FTP     B-15

using RCP     B-18

using TFTP     B-12

image files

preparing     B-22, B-25, B-29

reasons for     B-19

using FTP     B-28

using RCP     B-32

using TFTP     B-24

URLs, Cisco     xxxvi

User Datagram Protocol

See UDP

user EXEC mode     2-2

username-based authentication     7-7

V

verifying changes in CMS     3-31

version-dependent transparent mode     11-4

virtual IP address

cluster standby group     6-15, 6-24

command switch     6-15, 6-24

See also IP addresses

virtual router     30-1, 30-2

vlan.dat file     10-4

VLAN ACLs

See VLAN maps

VLAN configuration

at bootup     10-7

saving     10-7

VLAN configuration mode     2-2, 10-6

VLAN database

and startup configuration file     10-7

and VTP     11-1

VLAN configuration saved in     10-7

VLANs saved in     10-4

vlan database command     10-6

vlan dot1q tag native command     13-4

vlan global configuration command     10-6

VLAN management domain     11-2

VLAN Management Policy Server

See VMPS

VLAN map entries, order of     26-30

VLAN maps

applying     26-33

common uses for     26-33

configuration example     26-34

configuration guidelines     26-30

configuring     26-29

creating     26-30

defined     26-2

denying access example     26-35

denying and permitting packets     26-31

displaying     26-43

examples     26-35

support for     1-4

usage     26-5

VLAN membership

confirming     10-35

modes     3-9, 10-3

VLAN Query Protocol (VQP)     10-30

VLANs

adding     10-8

adding to VLAN database     10-8

aging dynamic addresses     14-9

allowed on trunk     10-24

and spanning-tree instances     10-2, 10-6, 10-13

VLANs (continued)

configuration guidelines, normal-range VLANs     10-5

configuration options     10-6

configuring     10-1

configuring IDs 1006 to 4094     10-13

connecting through SVIs     9-6

creating in config-vlan mode     10-9

creating in VLAN configuration mode     10-9

customer numbering in service-provider networks     13-3

default configuration     10-8

deleting     10-10

described     9-2, 10-1

displaying     10-15

extended-range     10-1, 10-12

features     1-3

illustrated     10-2

internal     10-13

limiting source traffic with SPAN     22-12

modifying     10-8

monitoring with SPAN     22-11

native, configuring     10-25

normal-range     10-1, 10-4

number supported     1-3

parameters     10-4

port membership modes     3-9, 10-3

static-access ports     10-11

STP and 802.1Q trunks     14-8

supported     10-2

Token Ring     10-5

traffic between     10-2

VLAN-bridge STP     14-8, 33-1

VTP modes     11-3

VLAN Trunking Protocol

See VTP

VLAN trunks     10-18

VMPS

administering     10-36

configuration example     10-37

configuration guidelines     10-33

default configuration     10-33

description     10-30

dynamic port membership

described     10-31

reconfirming     10-35

troubleshooting     10-37

entering server address     10-34

mapping MAC addresses to VLANs     10-30

monitoring     10-36

reconfirmation interval, changing     10-35

reconfirming membership     10-35

retry count, changing     10-36

voice VLAN

Cisco 7960 phone, port connections     12-1

configuration guidelines     12-3

configuring IP phone for data traffic

override CoS of incoming frame     12-5

trust CoS priority of incoming frame     12-6

configuring ports for voice traffic in

802.1P priority tagged frames     12-4

802.1Q frames     12-4

connecting to an IP phone     12-3

default configuration     12-2

described     12-1

displaying     12-6

VQP     1-3

VTP

adding a client to a domain     11-15

advertisements     10-21, 11-3

and extended-range VLANs     11-1

and normal-range VLANs     11-1

client mode, configuring     11-11

VTP (continued)

configuration

global configuration mode     11-7

guidelines     11-8

privileged EXEC mode     11-7

requirements     11-9

saving     11-7

VLAN configuration mode     11-7

configuration mode options     11-7

configuration requirements     11-9

configuration revision number

guideline     11-15

resetting     11-15

configuring

client mode     11-11

server mode     11-9

transparent mode     11-12

consistency checks     11-4

default configuration     11-6

described     11-1

disabling     11-12

domain names     11-8

domains     11-2

Layer 2 protocol tunneling     13-7

modes

client     11-3, 11-11

server     11-3, 11-9

transitions     11-3

transparent     11-3, 11-12

monitoring     11-16

passwords     11-8

pruning

disabling     11-14

enabling     11-14

examples     11-5

overview     11-4

support for     1-4

pruning-eligible list, changing     10-25

server mode, configuring     11-9

VTP (continued)

statistics     11-16

support for     1-4

Token Ring support     11-4

transparent mode, configuring     11-12

using     11-1

version, guidelines     11-9

version 1     11-4

version 2

configuration guidelines     11-9

disabling     11-13

enabling     11-13

overview     11-4

W

web-based management software

See CMS

Weighted Random Early Detection

See WRED

Weighted Round Robin

See WRR

weighted round robin, described     27-3

window components, CMS     3-27

wizards     1-7, 3-25

WRED     1-5, 27-14

WRR     1-5, 27-3

X

XMODEM protocol     34-2