Numerics -
A -
B -
C -
D -
E -
F -
G -
H -
I -
J -
K -
L -
M -
N -
O -
P -
Q -
R -
S -
T -
U -
V -
W -
X -
Index
Numerics
10-Gigabit Ethernet interfaces
configuration guidelines 11-16
defined 11-6
802.1D
See STP
802.1Q
and trunk ports 11-3
configuration limitations 13-19
encapsulation 13-16
native VLAN for untagged traffic 13-23
tunneling
compatibility with other features 17-6
defaults 17-4
described 17-1
tunnel ports with other features 17-6
802.1s
See MSTP
802.1w
See RSTP
802.1x
See port-based authentication
802.3ad
See EtherChannel
802.3af
See PoE
802.3z flow control 11-19
A
abbreviating commands 2-3
ABRs 35-25
access-class command 32-20
access control entries
See ACEs
access-denied response, VMPS 13-28
access groups
applying ACLs to interfaces 32-21
IP 32-21
Layer 2 32-21
Layer 3 32-21
accessing stack members 5-23
access lists
See ACLs
access ports
and Layer 2 protocol tunneling 17-11
defined 11-3
accounting
with 802.1x 10-5, 10-22
with RADIUS 9-28
with TACACS+ 9-11, 9-17
ACEs
and QoS 33-7
defined 32-2
Ethernet 32-2
IP 32-2
ACLs
ACEs 32-2
any keyword 32-13
applying
on bridged packets 32-39
on multicast packets 32-40
on routed packets 32-39
on switched packets 32-38
time ranges to 32-17
applying (continued)
to an interface 32-20
to QoS 33-7
classifying traffic for QoS 33-43
comments in 32-19
compiling 32-22
configuring with VLAN maps 32-37
defined 32-1, 32-8
examples of 32-22, 33-43
extended IP
configuring for QoS classification 33-45
creating 32-10
matching criteria 32-8
hardware and software handling 32-22
host keyword 32-13
IP
applying to interfaces 32-20
creating 32-8
fragments and QoS guidelines 33-34
implicit deny 32-10, 32-14, 32-16
implicit masks 32-10
matching criteria 32-8
named 32-15
terminal lines, setting on 32-19
undefined 32-21
violations, logging 32-16
limiting actions 32-38
logging messages 32-10
log keyword 32-16
MAC extended 32-27, 33-46
matching 32-8, 32-21
monitoring 32-41
named 32-15
number per QoS class map 33-34
numbers 32-8
port 32-2
precedence of 32-2
QoS 33-7, 33-43
resequencing entries 32-15
router 32-2
standard IP
configuring for QoS classification 33-44
creating 32-9
matching criteria 32-8
supported features 32-22
support for 1-7
time ranges 32-17
unsupported features 32-7
using router ACLs with VLAN maps 32-37
VLAN maps
configuration guidelines 32-31
configuring 32-30
active links 21-1
active router 37-1
address aliasing 24-2
addresses
displaying the MAC address table 7-27
dynamic
accelerated aging 18-9
changing the aging time 7-22
default aging 18-9
defined 7-20
learning 7-21
removing 7-23
MAC, discovering 7-27
multicast
group address range 38-3
STP address management 18-9
static
adding and removing 7-25
defined 7-20
address resolution 7-27, 35-9
Address Resolution Protocol
See ARP
adjacency tables, with CEF 35-61
administrative distances
defined 35-72
OSPF 35-31
routing protocol defaults 35-63
advanced IP services image 1-1, 36-1
advertisements
CDP 26-1
RIP 35-20
VTP 13-19, 14-3
aggregatable global unicast addresses 36-3
aggregate addresses, BGP 35-55
aggregated ports
See EtherChannel
aggregate policers 33-59
aggregate policing 1-8
aggregator template 5-10, 8-1
aging, accelerating 18-9
aging time
accelerated
for MSTP 19-21
for STP 18-9, 18-23
MAC address table 7-22
maximum
for MSTP 19-22
for STP 18-23
alarms, RMON 29-3
allowed-VLAN list 13-21
area border routers
See ABRs
ARP
configuring 35-10
defined 1-5, 7-27, 35-10
encapsulation 35-11
static cache configuration 35-10
table
address resolution 7-27
managing 7-27
ASBRs 35-25
AS-path filters, BGP 35-50
asymmetrical links, and 802.1Q tunneling 17-4
attributes, RADIUS
vendor-proprietary 9-31
vendor-specific 9-29
audience xxix
authentication
EIGRP 35-38
HSRP 37-9
local mode with AAA 9-36
NTP associations 7-5
RADIUS
key 9-21
login 9-23
TACACS+
defined 9-11
key 9-13
login 9-14
See also port-based authentication
authentication keys, and routing protocols 35-73
authoritative time source, described 7-2
authorization
with RADIUS 9-27
with TACACS+ 9-11, 9-16
authorized ports with 802.1x 10-4
autoconfiguration 3-3
automatic advise (auto-advise) in switch stacks 5-12
automatic copy (auto-copy) in switch stacks 5-12
automatic QoS
See QoS
automatic upgrades (auto-upgrade) in switch stacks 5-12
autonegotiation
duplex mode 1-3
interface configuration guidelines 11-17
mismatches 41-12
autonomous system boundary routers
See ASBRs
autonomous systems, in BGP 35-44
Auto-RP, described 38-5
autosensing, port speed 1-3
auxiliary VLAN
See voice VLAN
availability, features 1-5
B
BackboneFast
described 20-7
disabling 20-17
enabling 20-16
support for 1-6
backup interfaces
See Flex Links
backup links 21-1
banners
configuring
login 7-19
message-of-the-day login 7-18
default configuration 7-18
when displayed 7-18
BGP
aggregate addresses 35-55
aggregate routes, configuring 35-55
CIDR 35-55
clear commands 35-59
community filtering 35-52
configuring neighbors 35-54
default configuration 35-42
described 35-41
enabling 35-44
monitoring 35-59
multipath support 35-47
neighbors, types of 35-44
path selection 35-47
peers, configuring 35-54
prefix filtering 35-51
resetting sessions 35-46
route dampening 35-58
route maps 35-49
route reflectors 35-57
routing domain confederation 35-56
show commands 35-59
supernets 35-55
support for 1-9
Version 4 35-41
binding cluster group and HSRP group 37-11
binding database
address, DHCP server
See DHCP, Cisco IOS server database
DHCP snooping
See DHCP snooping binding database
bindings
address, Cisco IOS DHCP server 22-5
DHCP snooping database 22-6
IP source guard 22-15
binding table, DHCP snooping
See DHCP snooping binding database
blocking packets 25-6
booting
boot loader, function of 3-2
boot process 3-2
manually 3-13
specific image 3-13
boot loader
accessing 3-14
described 3-2
environment variables 3-14
prompt 3-14
trap-door mechanism 3-2
bootstrap router (BSR), described 38-5
Border Gateway Protocol
See BGP
BPDU
error-disabled state 20-3
filtering 20-3
RSTP format 19-10
BPDU filtering
described 20-3
disabling 20-15
enabling 20-14
support for 1-6
BPDU guard
described 20-3
disabling 20-14
enabling 20-13
support for 1-6
bridged packets, ACLs on 32-39
bridge groups
See fallback bridging
bridge protocol data unit
See BPDU
broadcast flooding 35-17
broadcast packets
directed 35-14
flooded 35-14
broadcast storm-control command 25-4
broadcast storms 25-1, 35-14
C
cables, monitoring for unidirectional links 27-1
candidate switch
defined 6-3
requirements 6-3
See also command switch, cluster standby group, and member switch
CA trustpoint
configuring 9-45
defined 9-42
caution, described xxx
CDP
and trusted boundary 33-40
configuring 26-2
default configuration 26-2
described 26-1
disabling for routing device 26-3 to 26-4
enabling and disabling
on an interface 26-4
on a switch 26-3
Layer 2 protocol tunneling 17-8
monitoring 26-5
overview 26-1
power negotiation extensions 11-6
support for 1-5
switch stack considerations 26-2
transmission timer and holdtime, setting 26-2
updates 26-2
CEF
defined 35-60
distributed 35-61
enabling 35-61
IPv6 36-15
CGMP
as IGMP snooping learning method 24-8
clearing cached group entries 38-50
enabling server support 38-33
joining multicast group 24-3
overview 38-7
server support only 38-7
switch support of 1-4
CIDR 35-55
CipherSuites 9-43
Cisco 7960 IP Phone 16-1
Cisco Discovery Protocol
See CDP
Cisco Express Forwarding
See CEF
Cisco Group Management Protocol
See CGMP
Cisco intelligent power management 11-6
Cisco IOS DHCP server
See DHCP, Cisco IOS DHCP server
Cisco IOS File System
See IFS
Cisco Network Assistant
See Network Assistant
Cisco Networking Services
See IE2100
Cisco StackWise technology 1-3
See also stacks, switch
CiscoWorks 2000 1-4, 31-4
classless interdomain routing
See CIDR
classless routing 35-8
class maps for QoS
configuring 33-47
described 33-7
displaying 33-79
class of service
See CoS
clearing interfaces 11-27
CLI
abbreviating commands 2-3
command modes 2-1
described 1-4
editing features
enabling and disabling 2-6
keystroke editing 2-6
wrapped lines 2-8
error messages 2-4
filtering command output 2-8
getting help 2-3
history
changing the buffer size 2-5
described 2-4
disabling 2-5
recalling commands 2-5
managing clusters 6-4
no and default forms of commands 2-4
client mode, VTP 14-3
clock
See system clock
cluster requirements xxxi
clusters, switch
benefits 1-2
described 6-1
managing
through CLI 6-4
through SNMP 6-5
planning considerations
CLI 6-4
SNMP 6-5
See also Getting Started with Cisco Network Assistant
cluster standby group
and HSRP group 37-11
requirements 6-2
Coarse Wave Division Multiplexer
See CWDM SFPs
command-line interface
See CLI
command modes 2-1
commands
abbreviating 2-3
no and default 2-4
commands, setting privilege levels 9-8
command switch
configuration conflicts 41-12
defined 6-2
password privilege levels 6-4
recovery
from command-switch failure 41-8
from lost member connectivity 41-12
replacing
with another switch 41-11
with cluster member 41-9
requirements 6-2
See also candidate switch, cluster standby group, member switch, and standby command switch
community list, BGP 35-53
community ports 15-2
community strings
configuring 31-8
for cluster switches 31-4
overview 31-4
community VLANs 15-2, 15-3
compatibility, feature 25-11
compatibility, software
See stacks, switch
config.text 3-12
configuration, initial
defaults 1-11
Express Setup 1-2
See also getting started guide and hardware installation guide
configuration conflicts, recovering from lost member connectivity 41-12
configuration examples, network 1-13
configuration files
clearing the startup configuration B-19
creating using a text editor B-10
default name 3-12
deleting a stored configuration B-19
described B-8
downloading
automatically 3-12
preparing B-10, B-13, B-16
reasons for B-8
using FTP B-13
using RCP B-17
using TFTP B-11
guidelines for creating and using B-9
invalid combinations when copying B-5
limiting TFTP server access 31-15
obtaining with DHCP 3-7
password recovery disable considerations 9-5
specifying the filename 3-12
system contact and location information 31-15
types and location B-9
configuration files (continued)
uploading
preparing B-10, B-13, B-16
reasons for B-8
using FTP B-14
using RCP B-18
using TFTP B-11
configuration settings, saving 3-10
configure terminal command 11-11
config-vlan mode 2-2, 13-7
conflicts, configuration 41-12
connections, secure remote 9-38
connectivity problems 41-14, 41-16, 41-17
consistency checks in VTP Version 2 14-4
console port, connecting to 2-9
conventions
command xxx
for examples xxx
publication xxx
text xxx
corrupted software, recovery steps with Xmodem 41-2
CoS
in Layer 2 frames 33-2
override priority 16-6
trust priority 16-6
CoS input queue threshold map for QoS 33-17
CoS output queue threshold map for QoS 33-20
CoS-to-DSCP map for QoS 33-61
counters, clearing interface 11-27
crashinfo file 41-24
cross-stack EtherChannel
configuration guidelines 34-12
configuring
on Layer 2 interfaces 34-12
on Layer 3 physical interfaces 34-16
described 34-2
illustration 34-3
support for 1-5
cross-stack UplinkFast, STP
described 20-5
disabling 20-16
enabling 20-16
fast-convergence events 20-7
Fast Uplink Transition Protocol 20-6
normal-convergence events 20-7
support for 1-6
cryptographic software image
Kerberos 9-32
SSH 9-37
SSL 9-42
switch stack considerations 5-2, 5-17, 9-38
CWDM SFPs 1-24
D
daylight saving time 7-13
dCEF
in the switch stack 35-60
debugging
enabling all system diagnostics 41-21
enabling for a specific feature 41-20
redirecting error message output 41-21
using commands 41-20
default commands 2-4
default configuration
802.1Q tunneling 17-4
802.1x 10-11
auto-QoS 33-21
banners 7-18
BGP 35-42
booting 3-12
CDP 26-2
DHCP 22-7
DHCP option 82 22-7
DHCP snooping 22-7
DHCP snooping binding database 22-8
DNS 7-17
default configuration (continued)
dynamic ARP inspection 23-5
EIGRP 35-35
EtherChannel 34-10
fallback bridging 40-4
Flex Links 21-2
HSRP 37-5
IGMP 38-27
IGMP filtering 24-21
IGMP snooping 24-7
IGMP throttling 24-21
initial switch information 3-3
IP addressing, IP routing 35-6
IP multicast routing 38-8
IP source guard 22-16
IPv6 36-10
Layer 2 interfaces 11-15
Layer 2 protocol tunneling 17-11
MAC address table 7-22
MSDP 39-4
MSTP 19-13
MVR 24-16
NTP 7-4
optional spanning-tree configuration 20-12
OSPF 35-26
password and privilege level 9-2
PIM 38-8
private VLANs 15-7
RADIUS 9-20
RIP 35-21
RMON 29-3
RSPAN 28-11
SDM template 8-5
SNMP 31-6
SPAN 28-11
SSL 9-44
standard QoS 33-32
STP 18-13
switch stacks 5-20
default configuration (continued)
system message logging 30-4
system name and prompt 7-15
TACACS+ 9-13
UDLD 27-4
VLAN, Layer 2 Ethernet interfaces 13-19
VLANs 13-8
VMPS 13-29
voice VLAN 16-3
VTP 14-7
default gateway 3-10, 35-12
default networks 35-63
default routes 35-63
default routing 35-3
deleting VLANs 13-10
description command 11-22
designing your network, examples 1-13
desktop template 5-10, 8-1
destination addresses, in ACLs 32-12
destination-IP address-based forwarding, EtherChannel 34-8
destination-MAC address forwarding, EtherChannel 34-8
detecting indirect link failures, STP 20-8
device B-19
device discovery protocol 26-1
device manager
benefits 1-2
described 1-2, 1-4
in-band management 1-5
requirements xxx
upgrading a switch B-19
DHCP
Cisco IOS server database
configuring 22-13
default configuration 22-7
described 22-5
enabling
relay agent 22-9
server 22-9
DHCP-based autoconfiguration
client request message exchange 3-4
configuring
client side 3-4
DNS 3-6
relay device 3-7
server side 3-5
server-side 22-9
TFTP server 3-6
example 3-8
lease options
for IP address information 3-5
for receiving the configuration file 3-5
overview 3-3
relationship to BOOTP 3-4
relay support 1-5, 1-10
support for 1-5
DHCP binding database
See DHCP snooping binding database
DHCP binding table
See DHCP snooping binding database
DHCP option 82
circuit ID suboption 22-5
configuration guidelines 22-8
default configuration 22-7
displaying 22-14
forwarding address, specifying 22-10
helper address 22-10
overview 22-3
packet format, suboption
circuit ID 22-5
remote ID 22-5
remote ID suboption 22-5
DHCP snooping
accepting untrusted packets form edge switch 22-3, 22-11
and private VLANs 22-12
binding database
See DHCP snooping binding database
DHCP snooping (continued)
configuration guidelines 22-8
default configuration 22-7
displaying binding tables 22-14
message exchange process 22-4
option 82 data insertion 22-3
trusted interface 22-2
untrusted interface 22-2
untrusted messages 22-2
DHCP snooping binding database
adding bindings 22-13
binding file
format 22-6
location 22-6
bindings 22-6
clearing agent statistics 22-14
configuration guidelines 22-9
configuring 22-13
default configuration 22-7, 22-8
deleting
binding file 22-13
bindings 22-14
database agent 22-13
described 22-5
displaying 22-14
binding entries 22-14
status and statistics 22-14
enabling 22-13
entry 22-6
renewing database 22-14
resetting
delay value 22-13
timeout value 22-13
updating process 22-6
DHCP snooping binding table
See DHCP snooping binding database
Differentiated Services architecture, QoS 33-2
Differentiated Services Code Point 33-2
Diffusing Update Algorithm (DUAL) 35-34
directed unicast requests 1-5
directories
changing B-4
creating and removing B-4
displaying the working B-4
Distance Vector Multicast Routing Protocol
See DVMRP
distance-vector protocols 35-3
distribute-list command 35-71
DNS
and DHCP-based autoconfiguration 3-6
default configuration 7-17
displaying the configuration 7-18
in IPv6 36-4
overview 7-16
setting up 7-17
support for 1-5
documentation, related xxx
document conventions xxx
domain names
DNS 7-16
VTP 14-8
Domain Name System
See DNS
dot1q-tunnel switchport mode 13-18
double-tagged packets
802.1Q tunneling 17-2
Layer 2 protocol tunneling 17-10
downloading
configuration files
preparing B-10, B-13, B-16
reasons for B-8
using FTP B-13
using RCP B-17
using TFTP B-11
image files
deleting old image B-23
preparing B-22, B-25, B-29
reasons for B-19
using CMS 1-2
using FTP B-26
using HTTP 1-2, B-19
using Network Assistant 1-2
using RCP B-31
using TFTP B-22
using the device manager or Network Assistant B-19
drop threshold for Layer 2 protocol packets 17-11
DSCP 1-8, 33-2
DSCP input queue threshold map for QoS 33-17
DSCP output queue threshold map for QoS 33-20
DSCP-to-CoS map for QoS 33-64
DSCP-to-DSCP-mutation map for QoS 33-65
DSCP transparency 33-40
DTP 1-6, 13-17
DUAL finite state machine, EIGRP 35-34
dual IPv4 and IPv6 templates 8-2, 36-9
dual protocol stacks
configuring 36-13
IPv4 and IPv6 36-9
SDM templates supporting 36-9
duplex mode, configuring 11-17
DVMRP
autosummarization
configuring a summary address 38-47
disabling 38-49
connecting PIM domain to DVMRP router 38-39
enabling unicast routing 38-43
interoperability
with Cisco devices 38-37
with Cisco IOS software 38-7
mrinfo requests, responding to 38-42
neighbors
advertising the default route to 38-41
discovery with Probe messages 38-37
displaying information 38-42
prevent peering with nonpruning 38-45
rejecting nonpruning 38-43
overview 38-7
routes
adding a metric offset 38-49
advertising all 38-49
advertising the default route to neighbors 38-41
caching DVMRP routes learned in report messages 38-43
changing the threshold for syslog messages 38-46
deleting 38-50
displaying 38-51
favoring one over another 38-49
limiting the number injected into MBONE 38-46
limiting unicast route advertisements 38-37
routing table 38-7
source distribution tree, building 38-7
support for 1-10
tunnels
configuring 38-39
displaying neighbor information 38-42
dynamic access ports
characteristics 13-3
configuring 13-30
defined 11-3
dynamic addresses
See addresses
dynamic ARP inspection
ARP cache poisoning 23-1
ARP requests, described 23-1
ARP spoofing attack 23-1
dynamic ARP inspection (continued)
clearing
log buffer 23-15
statistics 23-15
configuration guidelines 23-6
configuring
ACLs for non-DHCP environments 23-8
in DHCP environments 23-7
log buffer 23-12
rate limit for incoming ARP packets 23-4, 23-10
default configuration 23-5
denial-of-service attacks, preventing 23-10
described 23-1
DHCP snooping binding database 23-2
displaying
ARP ACLs 23-14
configuration and operating state 23-14
log buffer 23-15
statistics 23-15
trust state and rate limit 23-14
error-disabled state for exceeding rate limit 23-4
function of 23-2
interface trust states 23-3
log buffer
clearing 23-15
configuring 23-12
displaying 23-15
logging of dropped packets, described 23-5
man-in-the middle attack, described 23-2
network security issues and interface trust states 23-3
priority of ARP ACLs and DHCP snooping entries 23-4
rate limiting of ARP packets
configuring 23-10
described 23-4
error-disabled state 23-4
statistics
clearing 23-15
displaying 23-15
validation checks, performing 23-11
dynamic auto trunking mode 13-18
dynamic desirable trunking mode 13-18
Dynamic Host Configuration Protocol
See DHCP-based autoconfiguration
dynamic port VLAN membership
described 13-28
reconfirming 13-31
troubleshooting 13-33
types of connections 13-30
dynamic routing 35-3
Dynamic Trunking Protocol
See DTP
E
EBGP 35-40
editing features
enabling and disabling 2-6
keystrokes used 2-6
wrapped lines 2-8
EIGRP
authentication 35-38
components 35-34
configuring 35-36
default configuration 35-35
definition 35-34
interface parameters, configuring 35-37
monitoring 35-39
support for 1-9
elections
See stack master
EMI 1-1
enable password 9-4
enable secret password 9-4
encryption, CipherSuite 9-44
encryption for passwords 9-4
Enhanced IGRP
See EIGRP
enhanced multilayer image
See EMI
environment variables, function of 3-15
equal-cost routing 1-9, 35-62
error messages during command entry 2-4
EtherChannel
802.3ad, described 34-6
automatic creation of 34-5, 34-6
channel groups
binding physical and logical interfaces 34-4
numbering of 34-4
configuration guidelines 34-11
configuring
Layer 2 interfaces 34-12
Layer 3 physical interfaces 34-16
Layer 3 port-channel logical interfaces 34-15
default configuration 34-10
described 34-2
displaying status 34-23
forwarding methods 34-7, 34-18
interaction
with STP 34-11
with VLANs 34-12
LACP
described 34-6
displaying status 34-23
hot-standby ports 34-20
interaction with other features 34-7
modes 34-6
port priority 34-22
system priority 34-21
Layer 3 interface 35-5
load balancing 34-7, 34-18
logical interfaces, described 34-4
PAgP
aggregate-port learners 34-19
compatibility with Catalyst 1900 34-19
described 34-5
displaying status 34-23
interaction with other features 34-6
learn method and priority configuration 34-19
modes 34-5
support for 1-4
port-channel interfaces
described 34-4
numbering of 34-4
port groups 11-5
stack changes, effects of 34-9
support for 1-4
EtherChannel guard
described 20-10
disabling 20-17
enabling 20-17
Ethernet VLANs
adding 13-9
defaults and ranges 13-8
modifying 13-9
EUI 36-3
events, RMON 29-3
examples
conventions for xxx
network configuration 1-13
expedite queue for QoS 33-78
Express Setup 1-2
See also getting started guide
extended-range VLANs
configuration guidelines 13-13
configuring 13-12
creating 13-14
defined 13-1
extended system ID
MSTP 19-15
STP 18-4, 18-16
extended universal identifier
See EUI
Extensible Authentication Protocol over LAN 10-1
external BGP
See EBGP
external neighbors, BGP 35-44
F
failover support 1-5
fallback bridging
and protected ports 40-4
bridge groups
creating 40-4
described 40-2
displaying 40-11
function of 40-2
number supported 40-5
removing 40-5
bridge table
clearing 40-11
displaying 40-11
configuration guidelines 40-4
connecting interfaces with 11-9
default configuration 40-4
described 40-1
frame forwarding
flooding packets 40-2
forwarding packets 40-2
overview 40-1
protocol, unsupported 40-4
stack changes, effects of 40-3
STP
disabling on an interface 40-11
forward-delay interval 40-10
hello BPDU interval 40-9
fallback bridging (continued)
STP (continued)
interface priority 40-7
keepalive messages 18-2
maximum-idle interval 40-10
path cost 40-8
VLAN-bridge spanning-tree priority 40-7
VLAN-bridge STP 40-2
support for 1-9
SVIs and routed ports 40-1
unsupported protocols 40-4
VLAN-bridge STP 18-12
Fast Uplink Transition Protocol 20-6
features, incompatible 25-11
FIB 35-60
fiber-optic, detecting unidirectional links 27-1
files
copying B-5
crashinfo
description 41-24
displaying the contents of 41-24
location 41-24
deleting B-5
displaying the contents of B-8
tar
creating B-6
displaying the contents of B-6
extracting B-7
image file format B-20
file system
displaying available file systems B-2
displaying file information B-3
local file system names B-1
network file system names B-5
setting the default B-3
filtering
in a VLAN 32-30
non-IP traffic 32-27
show and more command output 2-8
filtering show and more command output 2-8
filters, IP
See ACLs, IP
flash device, number of B-1
Flex Links
configuration guidelines 21-2
configuring 21-3
default configuration 21-2
description 21-1
monitoring 21-3
flooded traffic, blocking 25-7
flow-based packet classification 1-8
flowcharts
QoS classification 33-6
QoS egress queueing and scheduling 33-18
QoS ingress queueing and scheduling 33-16
QoS policing and marking 33-10
flow control 1-3, 11-19
forward-delay time
MSTP 19-21
STP 18-23
Forwarding Information Base
See FIB
forwarding nonroutable protocols 40-1
FTP
accessing MIB files A-3
configuration files
downloading B-13
overview B-12
preparing the server B-13
uploading B-14
image files
deleting old image B-28
downloading B-26
preparing the server B-25
uploading B-28
G
get-bulk-request operation 31-3
get-next-request operation 31-3, 31-4
get-request operation 31-3, 31-4
get-response operation 31-3
Gigabit modules
See SFPs
global configuration mode 2-2
guest VLAN and 802.1x 10-8
guide
audience xxix
purpose of xxix
guide mode 1-2
GUIs
See device manager and Network Assistant 1-4
H
hardware limitations and Layer 3 interfaces 11-24
hello time
MSTP 19-20
STP 18-22
help, for the command line 2-3
hierarchical policy maps 33-8
configuration guidelines 33-34
configuring 33-52
described 33-11
history
changing the buffer size 2-5
described 2-4
disabling 2-5
recalling commands 2-5
history table, level and number of syslog messages 30-10
host ports
configuring 15-12
kinds of 15-2
hosts, limit on dynamic ports 13-33
Hot Standby Router Protocol
See HSRP
HP OpenView 1-4
HSRP
authentication string 37-9
binding to cluster group 37-11
command-switch redundancy 1-1, 1-5
configuring 37-4
default configuration 37-5
definition 37-1
guidelines 37-5
monitoring 37-11
overview 37-1
priority 37-7
routing redundancy 1-9
support for ICMP redirect messages 37-11
switch stack considerations 37-4
timers 37-9
tracking 37-7
HTTP over SSL
see HTTPS
HTTPS 9-42
configuring 9-45
self-signed certificate 9-43
HTTP secure server 9-42
I
IBPG 35-40
ICMP
IPv6 36-4
redirect messages 35-12
support for 1-9
time-exceeded messages 41-18
traceroute and 41-18
unreachable messages 32-20
unreachables and ACLs 32-22
ICMP ping
executing 41-15
overview 41-14
ICMP Router Discovery Protocol
See IRDP
ICMPv6 36-4
IDS appliances
and ingress RSPAN 28-22
and ingress SPAN 28-15
IE2100
CNS embedded agents
described 4-5
enabling automated configuration 4-6
enabling configuration agent 4-9
enabling event agent 4-8
Configuration Registrar
configID, deviceID, hostname 4-3
configuration service 4-2
described 4-1
event service 4-3
IEEE 802.1p 16-1
ifIndex values, SNMP 31-5
IFS 1-5
IGMP
configuring the switch
as a member of a group 38-27
statically connected member 38-32
controlling access to groups 38-28
default configuration 38-27
deleting cache entries 38-51
displaying groups 38-51
fast switching 38-32
host-query interval, modifying 38-30
joining multicast group 24-3
join messages 24-3
leave processing, enabling 24-10
leaving multicast group 24-5
multicast reachability 38-27
overview 38-2
queries 24-4
report suppression
described 24-5
disabling 24-12
support for 1-4
Version 1
changing to Version 2 38-29
described 38-3
Version 2
changing to Version 1 38-29
described 38-3
maximum query response time value 38-31
pruning groups 38-31
query timeout value 38-31
IGMP filtering
configuring 24-21
default configuration 24-21
described 24-20
monitoring 24-25
support for 1-4
IGMP groups
configuring filtering 24-24
setting the maximum number 24-23
IGMP profile
applying 24-22
configuration mode 24-21
configuring 24-22
IGMP snooping
and address aliasing 24-2
and stack changes 24-6
configuring 24-6
default configuration 24-7
definition 24-1
enabling and disabling 24-7
global configuration 24-7
Immediate Leave 24-5
in the switch stack 24-6
method 24-8
IGMP snooping (continued)
monitoring 24-13
querier
configuring 24-11
guidelines and restrictions 24-6
support for 1-4
VLAN configuration 24-8
IGMP throttling
configuring 24-24
default configuration 24-21
described 24-21
displaying action 24-25
IGP 35-25
Immediate Leave, IGMP
described 24-5
enabling 24-10
initial configuration
defaults 1-11
Express Setup 1-2
See also getting started guide and hardware installation guide
Intelligence Engine 2100 Series CNS Agents
See IE2100
interface
number 11-10
range macros 11-13
interface command 11-10 to 11-11
interface configuration mode 2-2
interfaces
configuration guidelines
10-Gigabit Ethernet 11-16
duplex and speed 11-17
configuring
duplex mode 11-17
procedure 11-11
speed 11-17
configuring for IPv4 and IPv6 36-13
counters, clearing 11-27
described 11-22
descriptive name, adding 11-22
displaying information about 11-26
flow control 11-19
management 1-4
monitoring 11-26
naming 11-22
physical, identifying 11-10
range of 11-11
restarting 11-27, 11-28
shutting down 11-27
status 11-26
supported 11-10
types of 11-1
interfaces range macro command 11-13
interface types 11-10
Interior Gateway Protocol
See IGP
internal BGP
See IBGP
internal neighbors, BGP 35-44
Internet Control Message Protocol
See ICMP
Internet Group Management Protocol
See IGMP
Internet Protocol version 6
See IPv6
Inter-Switch Link
See ISL
inter-VLAN routing 1-9, 35-2
Intrusion Detection System
See IDS appliances
ip access group command 32-21
IP ACLs
extended, creating 32-10
for QoS classification 33-7
implicit deny 32-10, 32-14, 32-16
implicit masks 32-10
logging 32-16
named 32-15
standard, creating 32-9
undefined 32-21
virtual terminal lines, setting on 32-19
IP addresses
128-bit 36-2
candidate or member 6-3
classes of 35-6
command switch 6-2
default configuration 35-6
discovering 7-27
for IP routing 35-5
IPv6 36-2
MAC address association 35-9
monitoring 35-18
See also IP information
IP broadcast address 35-17
ip cef distributed command 35-61
IP directed broadcasts 35-15
ip igmp profile command 24-21
IP information
assigned
manually 3-10
through DHCP-based autoconfiguration 3-3
default configuration 3-3
IP multicast routing
addresses
all-hosts 38-3
all-multicast-routers 38-3
host group address range 38-3
administratively-scoped boundaries, described 38-35
and IGMP snooping 24-1
Auto-RP
adding to an existing sparse-mode cloud 38-14
benefits of 38-14
clearing the cache 38-51
configuration guidelines 38-10
filtering incoming RP announcement messages 38-17
IP multicast routing (continued)
Auto_RP (continued)
overview 38-5
preventing candidate RP spoofing 38-17
preventing join messages to false RPs 38-16
setting up in a new internetwork 38-14
using with BSR 38-22
bootstrap router
configuration guidelines 38-10
configuring candidate BSRs 38-20
configuring candidate RPs 38-21
defining the IP multicast boundary 38-19
defining the PIM domain border 38-18
overview 38-5
using with Auto-RP 38-22
Cisco implementation 38-2
configuring
basic multicast routing 38-10
IP multicast boundary 38-35
default configuration 38-8
enabling
multicast forwarding 38-11
PIM mode 38-11
group-to-RP mappings
Auto-RP 38-5
BSR 38-5
MBONE
deleting sdr cache entries 38-51
described 38-34
displaying sdr cache 38-52
enabling sdr listener support 38-34
limiting DVMRP routes advertised 38-46
limiting sdr cache entry lifetime 38-35
SAP packets for conference session announcement 38-34
Session Directory (sdr) tool, described 38-34
IP multicast routing (continued)
monitoring
packet rate loss 38-52
peering devices 38-52
tracing a path 38-52
multicast forwarding, described 38-6
PIMv1 and PIMv2 interoperability 38-9
protocol interaction 38-2
reverse path check (RPF) 38-6
routing table
deleting 38-51
displaying 38-51
RP
assigning manually 38-12
configuring Auto-RP 38-14
configuring PIMv2 BSR 38-18
monitoring mapping information 38-23
using Auto-RP and BSR 38-22
stacking
stack master functions 38-8
stack member functions 38-8
statistics, displaying system and network 38-51
See also CGMP
See also DVMRP
See also IGMP
See also PIM
IP phones
and QoS 16-1
automatic classification and queueing 33-21
configuring 16-4
ensuring port security with QoS 33-39
trusted boundary for QoS 33-39
IP precedence 33-2
IP-precedence-to-DSCP map for QoS 33-62
IP protocols
in ACLs 32-12
routing 1-9
IP routes, monitoring 35-74
IP routing
connecting interfaces with 11-9
disabling 35-19
enabling 35-19
IP source guard
and 802.1x 22-16
and DHCP snooping 22-15
and EtherChannels 22-16
and port security 22-16
and private VLANs 22-16
and routed ports 22-16
and TCAM entries 22-16
and trunk interfaces 22-16
and VRF 22-16
binding configuration
automatic 22-15
manual 22-15
binding table 22-15
configuration guidelines 22-16
default configuration 22-16
described 22-14
disabling 22-17
displaying
bindings 22-17
configuration 22-17
enabling 22-16
filtering
source IP address 22-15
source IP and MAC address 22-15
source IP address filtering 22-15
source IP and MAC address filtering 22-15
static bindings
adding 22-16
deleting 22-17
IP traceroute
executing 41-18
overview 41-17
IP unicast routing
address resolution 35-9
administrative distances 35-63, 35-72
ARP 35-10
assigning IP addresses to Layer 3 interfaces 35-7
authentication keys 35-73
broadcast
address 35-17
flooding 35-17
packets 35-14
storms 35-14
classless routing 35-8
configuring static routes 35-62
default
addressing configuration 35-6
gateways 35-12
networks 35-63
routes 35-63
routing 35-3
directed broadcasts 35-15
disabling 35-19
dynamic routing 35-3
enabling 35-19
EtherChannel Layer 3 interface 35-5
IGP 35-25
inter-VLAN 35-2
IP addressing
classes 35-6
configuring 35-5
IPv6 36-3
IRDP 35-13
Layer 3 interfaces 35-5
MAC address and IP address 35-9
passive interfaces 35-70
protocols
distance-vector 35-3
dynamic 35-3
link-state 35-3
proxy ARP 35-10
IP unicast routing (continued)
redistribution 35-64
reverse address resolution 35-9
routed ports 35-5
static routing 35-3
steps to configure 35-5
subnet mask 35-7
subnet zero 35-7
supernet 35-8
UDP 35-16
with SVIs 35-5
See also BGP
See also EIGRP
See also OSPF
See also RIP
IPv4 and IPv6
configuring on an interface 36-13
differences 36-1
dual protocol stacks 36-5
IPv6
addresses 36-2
address formats 36-2
advantages 36-2
and switch stacks 36-7
applications 36-5
assigning address 36-11
autoconfiguration 36-4
CEFv6 36-15
configuring static routes 36-16
default configuration 36-10
defined 36-1
enabling 36-11
feature limitations 36-7
features not supported 36-6
ICMP 36-4
ICMP rate limiting 36-14
monitoring 36-22
OSPF 36-20
path MTU discovery 36-4
reasons for 36-1
RIP 36-18
SDM templates 8-2, 36-8
stack master functions 36-8
supported features 36-3
switch limitations 36-6
IRDP
configuring 35-13
definition 35-13
support for 1-9
ISL
and IPv6 36-3
and trunk ports 11-3
encapsulation 1-6, 13-16
trunking with 802.1 tunneling 17-5
isolated port 15-2
isolated VLANs 15-2, 15-3
J
join messages, IGMP 24-3
K
KDC
described 9-32
See also Kerberos
keepalive messages 18-2
Kerberos
authenticating to
boundary switch 9-35
KDC 9-35
network services 9-35
configuration examples 9-32
configuring 9-36
credentials 9-32
cryptographic software image 9-32
described 9-32
KDC 9-32
operation 9-34
realm 9-33
server 9-33
support for 1-8
switch as trusted third party 9-32
terms 9-33
TGT 9-34
tickets 9-32
key distribution center
See KDC
L
l2protocol-tunnel command 17-13
LACP
Layer 2 protocol tunneling 17-9
See EtherChannel
Layer 2 frames, classification with CoS 33-2
Layer 2 interfaces, default configuration 11-15
Layer 2 protocol tunneling
configuring 17-10
configuring for EtherChannels 17-14
default configuration 17-11
defined 17-8
guidelines 17-11
Layer 2 traceroute
and ARP 41-17
and CDP 41-16
broadcast traffic 41-16
described 41-16
IP addresses and subnets 41-17
MAC addresses and VLANs 41-16
multicast traffic 41-16
multiple devices on a port 41-17
unicast traffic 41-16
usage guidelines 41-16
Layer 2 trunks 13-17
Layer 3 features 1-9
Layer 3 interfaces
assigning IP addresses to 35-7
assigning IPv4 and IPv6 addresses to 36-13
assigning IPv6 addresses to 36-11
changing from Layer 2 mode 35-7
types of 35-5
Layer 3 packets, classification methods 33-2
LDAP 4-2
LEDs, switch
See hardware installation guide
lightweight directory access protocol
See LDAP
line configuration mode 2-2
Link Aggregation Control Protocol
See EtherChannel
link local unicast addresses 36-3
link redundancy
See Flex Links
links, unidirectional 27-1
link state advertisements (LSAs) 35-29
link-state protocols 35-3
load balancing 37-3
logging messages, ACL 32-10
login authentication
with RADIUS 9-23
with TACACS+ 9-14
login banners 7-18
log messages
See system message logging
Long-Reach Ethernet (LRE) technology 1-15, 1-23
loop guard
described 20-11
enabling 20-18
support for 1-6
M
MAC addresses
aging time 7-22
and VLAN association 7-21
building the address table 7-21
default configuration 7-22
discovering 7-27
displaying 7-27
displaying in the IP source binding table 22-17
dynamic
learning 7-21
removing 7-23
in ACLs 32-27
IP address association 35-9
static
adding 7-25
allowing 7-27
characteristics of 7-25
dropping 7-26
removing 7-25
MAC address notification, support for 1-10
MAC address-to-VLAN mapping 13-28
MAC extended access lists
applying to Layer 2 interfaces 32-29
configuring for QoS 33-46
creating 32-27
defined 32-27
for QoS classification 33-5
macros
See Smartports macros
manageability features 1-5
management access
in-band
browser session 1-5
CLI session 1-5
device manager 1-5
SNMP 1-5
out-of-band console port connection 1-5
management options
CLI 2-1
clustering 1-3
CNS 4-1
Network Assistant 1-2
overview 1-4
switch stacks 1-3
mapping tables for QoS
configuring
CoS-to-DSCP 33-61
DSCP 33-61
DSCP-to-CoS 33-64
DSCP-to-DSCP-mutation 33-65
IP-precedence-to-DSCP 33-62
policed-DSCP 33-63
described 33-13
marking
action in policy map 33-49
action with aggregate policers 33-59
described 33-4, 33-8
matching, ACLs 32-8
maximum aging time
MSTP 19-22
STP 18-23
maximum hop count, MSTP 19-22
maximum-paths command 35-47, 35-62
membership mode, VLAN port 13-3
member switch
defined 6-2
managing 6-4
recovering from lost connectivity 41-12
requirements 6-3
See also candidate switch, cluster standby group, and standby command switch
messages
logging ACL violations 32-16
to users through banners 7-18
messages, to users through banners 7-18
metrics, in BGP 35-48
metric translations, between routing protocols 35-67
metro tags 17-2
MHSRP 37-3
MIBs
accessing files with FTP A-3
location of files A-3
overview 31-1
SNMP interaction with 31-4
supported A-1
mini-point-of-presence
See POP
mirroring traffic for analysis 28-1
mismatches, autonegotiation 41-12
module number 11-10
monitoring
802.1Q tunneling 17-18
access groups 32-41
ACL configuration 32-41
BGP 35-59
cables for unidirectional links 27-1
CDP 26-5
CEF 35-61
EIGRP 35-39
fallback bridging 40-11
features 1-10
Flex Links 21-3
HSRP 37-11
IGMP
filters 24-25
snooping 24-13
interfaces 11-26
IP
address tables 35-18
multicast routing 38-50
routes 35-74
IPv6 36-22
Layer 2 protocol tunneling 17-18
MSDP peers 39-19
multicast router interfaces 24-13
MVR 24-20
network traffic for analysis with probe 28-2
OSPF 35-33
port
blocking 25-16
protection 25-16
private VLANs 15-15
RP mapping information 38-23
SFP status 1-10, 11-27, 41-14
source-active messages 39-19
speed and duplex mode 11-19
traffic flowing among switches 29-1
traffic suppression 25-16
tunneling 17-18
VLAN
filters 32-41
maps 32-41
VLANs 13-16
VMPS 13-32
VTP 14-16
MSDP
benefits of 39-3
clearing MSDP connections and statistics 39-19
controlling source information
forwarded by switch 39-12
originated by switch 39-9
received by switch 39-14
default configuration 39-4
dense-mode regions
sending SA messages to 39-17
specifying the originating address 39-18
filtering
incoming SA messages 39-14
SA messages to a peer 39-12
SA requests from a peer 39-11
join latency, defined 39-6
meshed groups
configuring 39-16
defined 39-16
originating address, changing 39-18
overview 39-1
peer-RPF flooding 39-2
peers
configuring a default 39-4
monitoring 39-19
peering relationship, overview 39-1
requesting source information from 39-8
shutting down 39-16
source-active messages
caching 39-6
clearing cache entries 39-19
defined 39-2
filtering from a peer 39-11
filtering incoming 39-14
filtering to a peer 39-12
limiting data with TTL 39-14
monitoring 39-19
restricting advertised sources 39-9
support for 1-9
MSTP
boundary ports
configuration guidelines 19-14
described 19-5
BPDU filtering
described 20-3
enabling 20-14
BPDU guard
described 20-3
enabling 20-13
CIST, described 19-3
configuration guidelines 19-13, 20-12
configuring
forward-delay time 19-21
hello time 19-20
link type for rapid convergence 19-23
maximum aging time 19-22
maximum hop count 19-22
MST region 19-14
path cost 19-19
port priority 19-18
root switch 19-15
secondary root switch 19-17
switch priority 19-20
CST
defined 19-3
operations between regions 19-4
default configuration 19-13
default optional feature configuration 20-12
displaying status 19-24
enabling the mode 19-14
EtherChannel guard
described 20-10
enabling 20-17
extended system ID
effects on root switch 19-15
effects on secondary root switch 19-17
unexpected behavior 19-16
instances supported 18-10
interface state, blocking to forwarding 20-2
interoperability and compatibility among modes 18-11
interoperability with 802.1D
described 19-6
restarting migration process 19-23
IST
defined 19-3
master 19-3
operations within a region 19-3
loop guard
described 20-11
enabling 20-18
mapping VLANs to MST instance 19-14
MST region
CIST 19-3
configuring 19-14
described 19-2
hop-count mechanism 19-5
IST 19-3
supported spanning-tree instances 19-2
optional features supported 1-6
overview 19-2
Port Fast
described 20-2
enabling 20-12
preventing root switch selection 20-10
root guard
described 20-10
enabling 20-17
root switch
configuring 19-16
effects of extended system ID 19-15
unexpected behavior 19-16
shutdown Port Fast-enabled port 20-3
stack changes, effects of 19-6
status, displaying 19-24
multicast groups
Immediate Leave 24-5
joining 24-3
leaving 24-5
static joins 24-10
multicast packets
ACLs on 32-40
blocking 25-7
multicast router interfaces, monitoring 24-13
multicast router ports, adding 24-9
Multicast Source Discovery Protocol
See MSDP
multicast storm 25-1
multicast storm-control command 25-4
Multicast VLAN Registration
See MVR
Multiple HSRP
See MHSRP
MVR
and address aliasing 24-17
configuring interfaces 24-18
default configuration 24-16
described 24-14
in the switch stack 24-16
modes 24-18
monitoring 24-20
setting global parameters 24-17
support for 1-4
N
named IP ACLs 32-15
NameSpace Mapper
See NSM
native VLAN
and 802.1Q tunneling 17-4
configuring 13-23
default 13-23
neighbor discovery/recovery, EIGRP 35-34
neighbors, BGP 35-54
Network Assistant
benefits 1-2
described 1-4
downloading image files 1-2
guide mode 1-2
management options 1-2
managing switch stacks 5-2, 5-16
requirements xxx
Network Assistant (continued)
upgrading a switch B-19
wizards 1-2
network configuration examples
cost-effective wiring closet 1-15
high-performance wiring closet 1-16
increasing network performance 1-14
large network 1-21
long-distance, high-bandwidth transport 1-24
multidwelling network 1-23
providing network services 1-15
redundant Gigabit backbone 1-17
server aggregation and Linux server cluster 1-17
small to medium-sized network 1-19
network design
performance 1-14
services 1-15
network management
CDP 26-1
RMON 29-1
SNMP 31-1
Network Time Protocol
See NTP
no commands 2-4
nonhierarchical policy maps
configuration guidelines 33-34
configuring 33-49
described 33-9
non-IP traffic filtering 32-27
nontrunking mode 13-18
normal-range VLANs
configuration modes 13-7
defined 13-1
no switchport command 11-4
note, described xxx
not-so-stubby areas
See NSSA
NSM 4-3
NSSA, OSPF 35-29
NTP
associations
authenticating 7-5
defined 7-2
enabling broadcast messages 7-7
peer 7-6
server 7-6
default configuration 7-4
displaying the configuration 7-11
overview 7-2
restricting access
creating an access group 7-9
disabling NTP services per interface 7-10
source IP address, configuring 7-10
stratum 7-2
support for 1-5
synchronizing devices 7-6
time
services 7-2
synchronizing 7-2
O
offline configuration for switch stacks 5-7
Open Shortest Path First
See OSPF
optimizing system resources 8-1
options, management 1-4
OSPF
area parameters, configuring 35-29
configuring 35-27
default configuration
metrics 35-31
route 35-31
settings 35-26
described 35-25
for IPv6 36-20
interface parameters, configuring 35-28
LSA group pacing 35-32
monitoring 35-33
router IDs 35-32
route summarization 35-30
support for 1-9
virtual links 35-30
out-of-profile markdown 1-8
P
packet modification, with QoS 33-20
PAgP
Layer 2 protocol tunneling 17-9
See EtherChannel
parallel paths, in routing tables 35-62
passive interfaces
configuring 35-70
OSPF 35-31
passwords
default configuration 9-2
disabling recovery of 9-5
encrypting 9-4
for security 1-7
overview 9-1
recovery of 41-3
setting
enable 9-3
enable secret 9-4
Telnet 9-6
with usernames 9-7
VTP domain 14-8
path cost
MSTP 19-19
STP 18-20
path MTU discovery 36-4
PBR
defined 35-67
enabling 35-69
fast-switched policy-based routing 35-70
local policy-based routing 35-70
peers, BGP 35-54
performance, network design 1-14
performance features 1-3
persistent self-signed certificate 9-43
per-VLAN spanning-tree plus
See PVST+
physical ports 11-2
PIM
default configuration 38-8
dense mode
overview 38-4
rendezvous point (RP), described 38-4
RPF lookups 38-7
displaying neighbors 38-51
enabling a mode 38-11
overview 38-3
router-query message interval, modifying 38-26
shared tree and source tree, overview 38-23
shortest path tree, delaying the use of 38-25
sparse mode
join messages and shared tree 38-4
overview 38-4
prune messages 38-5
RPF lookups 38-7
support for 1-9
versions
interoperability 38-9
troubleshooting interoperability problems 38-23
v2 improvements 38-4
PIM-DVMRP, as snooping method 24-8
ping
character output description 41-15
executing 41-15
overview 41-14
PoE
auto mode 11-8
CDP with power consumption, described 11-6
CDP with power negotiation, described 11-6
Cisco intelligent power management 11-6
configuring 11-21
devices supported 11-6
high-power devices operating in low-power mode 11-6
IEEE power classification levels 11-7
powered-device detection and initial power allocation 11-7
power management modes 11-8
power negotiation extensions to CDP 11-6
standards supported 11-6
static mode 11-8
supported watts per port 11-6
troubleshooting 41-13
policed-DSCP map for QoS 33-63
policers
configuring
for each matched traffic class 33-49
for more than one traffic class 33-59
described 33-4
displaying 33-79
number of 33-34
types of 33-9
policing
described 33-4
hierarchical
See hierarchical policy maps
token-bucket algorithm 33-9
policy-based routing
See PBR
policy maps
hierarchical 33-8
policy maps for QoS
characteristics of 33-49
described 33-7
displaying 33-80
hierarchical on SVIs
configuration guidelines 33-34
configuring 33-52
described 33-11
nonhierarchical on physical ports
configuration guidelines 33-34
configuring 33-49
described 33-9
POP 1-23
port ACLs
defined 32-2
types of 32-3
Port Aggregation Protocol
See EtherChannel
port-based authentication
accounting 10-5
authentication server
defined 10-2
RADIUS server 10-2
client, defined 10-2
configuration guidelines 10-12
configuring
802.1x authentication 10-14
guest VLAN 10-20
host mode 10-19
manual re-authentication of a client 10-17
periodic re-authentication 10-16
quiet period 10-17
RADIUS server 10-16
RADIUS server parameters on the switch 10-15
switch-to-client frame-retransmission number 10-18, 10-19
switch-to-client retransmission time 10-17
port-based authentication (continued)
default configuration 10-11
described 10-1
device roles 10-2
displaying statistics 10-23
EAPOL-start frame 10-3
EAP-request/identity frame 10-3
EAP-response/identity frame 10-3
encapsulation 10-3
guest VLAN
configuration guidelines 10-9
described 10-8
host mode 10-5
initiation and message exchange 10-3
method lists 10-14
multiple-hosts mode, described 10-5
per-user ACLs
AAA authorization 10-14
configuration tasks 10-10
described 10-9
RADIUS server attributes 10-9
ports
authorization state and dot1x port-control command 10-4
authorized and unauthorized 10-4
voice VLAN 10-7
port security
and voice VLAN 10-6
described 10-6
interactions 10-6
multiple-hosts mode 10-5
resetting to default values 10-22
stack changes, effects of 10-10
statistics, displaying 10-23
switch
as proxy 10-2
RADIUS client 10-2
upgrading from a previous release 10-13, 33-27
port-based authentication (continued)
VLAN assignment
AAA authorization 10-14
characteristics 10-8
configuration tasks 10-8
described 10-7
voice VLAN
described 10-7
PVID 10-7
VVID 10-7
port blocking 1-4, 25-6
port-channel
See EtherChannel
Port Fast
described 20-2
enabling 20-12
mode, spanning tree 13-29
support for 1-6
port membership modes, VLAN 13-3
port priority
MSTP 19-18
STP 18-18
ports
10-Gigabit Ethernet module 11-6
802.1Q tunnel 13-4
access 11-3
blocking 25-6
dynamic access 13-3
protected 25-5
routed 11-4
secure 25-7
static-access 13-3, 13-11
switch 11-2
trunks 13-3, 13-16
VLAN assignments 13-11
port security
aging 25-15
and QoS trusted boundary 33-39
and stacking 25-16
configuring 25-12
default configuration 25-10
described 25-7
displaying 25-16
on trunk ports 25-13
sticky learning 25-8
violations 25-9
with other features 25-10
port-shutdown response, VMPS 13-28
Power over Ethernet
See PoE
preferential treatment of traffic
See QoS
prefix lists, BGP 35-51
preventing unauthorized access 9-1
primary links 21-1
primary VLANs 15-1, 15-3
priority
HSRP 37-7
overriding CoS 16-6
trusting CoS 16-6
private VLAN edge ports
See protected ports
private VLANs
across multiple switches 15-4
and SDM template 15-4
and SVIs 15-5
and switch stacks 15-6
benefits of 15-1
community ports 15-2
community VLANs 15-2, 15-3
configuration guidelines 15-7, 15-9
configuration tasks 15-6
configuring 15-10
default configuration 15-7
private VLANs (continued)
end station access to 15-3
IP addressing 15-3
isolated port 15-2
isolated VLANs 15-2, 15-3
mapping 15-14
monitoring 15-15
ports
community 15-2
configuration guidelines 15-9
configuring host ports 15-12
configuring promiscuous ports 15-13
described 13-4
isolated 15-2
promiscuous 15-2
primary VLANs 15-1, 15-3
promiscuous ports 15-2
secondary VLANs 15-2
subdomains 15-1
traffic in 15-5
privileged EXEC mode 2-2
privilege levels
changing the default for lines 9-9
command switch 6-4
exiting 9-10
logging into 9-10
mapping on member switches 6-4
overview 9-2, 9-8
setting a command with 9-8
promiscuous ports
configuring 15-13
defined 15-2
protected ports 1-7, 25-5
protocol-dependent modules, EIGRP 35-35
Protocol-Independent Multicast Protocol
See PIM
provisioning new members for a switch stack 5-7
proxy ARP
configuring 35-12
definition 35-10
with IP routing disabled 35-12
pruning, VTP
disabling
in VTP domain 14-14
on a port 13-23
enabling
in VTP domain 14-14
on a port 13-22
examples 14-5
overview 14-4
pruning-eligible list
changing 13-22
for VTP pruning 14-5
VLANs 14-14
PVST+
802.1Q trunking interoperability 18-11
described 18-10
instances supported 18-10
Q
QoS
and MQC commands 33-1
auto-QoS
categorizing traffic 33-21
configuration and defaults display 33-31
configuration guidelines 33-26
described 33-21
disabling 33-28
displaying generated commands 33-28
displaying the initial configuration 33-31
effects on running configuration 33-26
egress queue defaults 33-22
enabling for VoIP 33-28
example configuration 33-29
auto-QoS (continued)
ingress queue defaults 33-22
list of generated commands 33-23
basic model 33-4
classification
class maps, described 33-7
defined 33-4
DSCP transparency, described 33-40
flowchart 33-6
forwarding treatment 33-3
in frames and packets 33-3
IP ACLs, described 33-5, 33-7
MAC ACLs, described 33-5, 33-7
options for IP traffic 33-5
options for non-IP traffic 33-5
policy maps, described 33-7
trust DSCP, described 33-5
trusted CoS, described 33-5
trust IP precedence, described 33-5
class maps
configuring 33-47
displaying 33-79
configuration guidelines
auto-QoS 33-26
standard QoS 33-34
configuring
aggregate policers 33-59
auto-QoS 33-21
default port CoS value 33-38
DSCP maps 33-61
DSCP transparency 33-40
DSCP trust states bordering another domain 33-41
egress queue characteristics 33-72
ingress queue characteristics 33-67
IP extended ACLs 33-45
IP standard ACLs 33-43
MAC ACLs 33-46
configuring (continued)
policy maps, hierarchical 33-52
policy maps on physical ports 33-49
port trust states within the domain 33-36
trusted boundary 33-39
default auto configuration 33-21
default standard configuration 33-32
displaying statistics 33-79
DSCP transparency 33-40
egress queues
allocating buffer space 33-72
buffer allocation scheme, described 33-19
configuring shaped weights for SRR 33-76
configuring shared weights for SRR 33-77
described 33-4
displaying the threshold map 33-75
flowchart 33-18
mapping DSCP or CoS values 33-74
scheduling, described 33-4
setting WTD thresholds 33-72
WTD, described 33-20
enabling globally 33-35
flowcharts
classification 33-6
egress queueing and scheduling 33-18
ingress queueing and scheduling 33-16
policing and marking 33-10
implicit deny 33-7
ingress queues
allocating bandwidth 33-70
allocating buffer space 33-69
buffer and bandwidth allocation, described 33-17
configuring shared weights for SRR 33-70
configuring the priority queue 33-71
described 33-4
displaying the threshold map 33-68
flowchart 33-16
mapping DSCP or CoS values 33-68
ingress queues (continued)
priority queue, described 33-17
scheduling, described 33-4
setting WTD thresholds 33-68
WTD, described 33-17
IP phones
automatic classification and queueing 33-21
detection and trusted settings 33-21, 33-39
limiting bandwidth on egress interface 33-78
mapping tables
CoS-to-DSCP 33-61
displaying 33-79
DSCP-to-CoS 33-64
DSCP-to-DSCP-mutation 33-65
IP-precedence-to-DSCP 33-62
policed-DSCP 33-63
types of 33-13
marked-down actions 33-51, 33-56
marking, described 33-4, 33-8
overview 33-2
packet modification 33-20
policers
configuring 33-51, 33-56, 33-59
described 33-8
displaying 33-79
number of 33-34
types of 33-9
policies, attaching to an interface 33-8
policing
described 33-4, 33-8
token bucket algorithm 33-9
policy maps
characteristics of 33-49
displaying 33-80
hierarchical 33-8
hierarchical on SVIs 33-52
nonhierarchical on physical ports 33-49
QoS label, defined 33-4
queues
configuring egress characteristics 33-72
configuring ingress characteristics 33-67
high priority (expedite) 33-20, 33-78
location of 33-14
SRR, described 33-15
WTD, described 33-14
rewrites 33-20
support for 1-8
trust states
bordering another domain 33-41
described 33-5
trusted device 33-39
within the domain 33-36
quality of service
See QoS
queries, IGMP 24-4
R
RADIUS
attributes
vendor-proprietary 9-31
vendor-specific 9-29
configuring
accounting 9-28
authentication 9-23
authorization 9-27
communication, global 9-21, 9-29
communication, per-server 9-20, 9-21
multiple UDP ports 9-21
default configuration 9-20
defining AAA server groups 9-25
displaying the configuration 9-31
identifying the server 9-20
limiting the services to the user 9-27
method list, defined 9-20
operation of 9-19
overview 9-18
suggested network environments 9-18
support for 1-8
tracking services accessed by user 9-28
range
macro 11-13
of interfaces 11-12
rapid convergence 19-8
rapid per-VLAN spanning-tree plus
See rapid PVST+
rapid PVST+
802.1Q trunking interoperability 18-11
described 18-10
instances supported 18-10
Rapid Spanning Tree Protocol
See RSTP
RARP 35-10
rcommand command 6-4
RCP
configuration files
downloading B-17
overview B-15
preparing the server B-16
uploading B-18
image files
deleting old image B-32
downloading B-31
preparing the server B-29
uploading B-33
reconfirmation interval, VMPS, changing 13-31
recovery procedures 41-1
redundancy
EtherChannel 34-2
HSRP 37-1
STP
backbone 18-9
multidrop backbone 20-5
path cost 13-26
port priority 13-24
redundant links and UplinkFast 20-15
reliable transport protocol, EIGRP 35-34
reloading software 3-16
Remote Authentication Dial-In User Service
See RADIUS
Remote Copy Protocol
See RCP
Remote Network Monitoring
See RMON
Remote SPAN
See RSPAN
report suppression, IGMP
described 24-5
disabling 24-12
requirements
cluster xxxi
device manager xxx
Network Assistant xxx
resequencing ACL entries 32-15
resets, in BGP 35-46
resetting a UDLD-shutdown interface 27-6
restricting access
NTP services 7-8
overview 9-1
passwords and privilege levels 9-2
RADIUS 9-17
TACACS+ 9-10
retry count, VMPS, changing 13-32
reverse address resolution 35-9
Reverse Address Resolution Protocol
See RARP
RFC
1058, RIP 35-20
1112, IP multicast and IGMP 24-2
1157, SNMPv1 31-2
1163, BGP 35-40
1166, IP addresses 35-6
1253, OSPF 35-25
1267, BGP 35-40
1305, NTP 7-2
1587, NSSAs 35-25
1757, RMON 29-2
1771, BGP 35-40
1901, SNMPv2C 31-2
1902 to 1907, SNMPv2 31-2
2236, IP multicast and IGMP 24-2
2273-2275, SNMPv3 31-2
RIP
advertisements 35-20
authentication 35-23
configuring 35-21
default configuration 35-21
described 35-20
for IPv6 36-18
hop counts 35-20
split horizon 35-23
summary addresses 35-23
support for 1-9
RMON
default configuration 29-3
displaying status 29-6
enabling alarms and events 29-3
groups supported 29-2
overview 29-1
statistics
collecting group Ethernet 29-6
collecting group history 29-5
support for 1-10
root guard
described 20-10
enabling 20-17
support for 1-6
root switch
MSTP 19-15
STP 18-16
route calculation timers, OSPF 35-31
route dampening, BGP 35-58
routed packets, ACLs on 32-39
routed ports
configuring 35-5
defined 11-4
IP addresses on 11-23, 35-5
route-map command 35-69
route maps
BGP 35-49
policy-based routing 35-68
router ACLs
defined 32-2
types of 32-4
route reflectors, BGP 35-57
router ID, OSPF 35-32
route selection, BGP 35-47
route summarization, OSPF 35-30
routing
default 35-3
dynamic 35-3
redistribution of information 35-64
static 35-3
routing domain confederation, BGP 35-56
Routing Information Protocol
See RIP
routing protocol administrative distances 35-63
RSPAN
and stack changes 28-10
characteristics 28-9
configuration guidelines 28-17
default configuration 28-11
destination ports 28-7
displaying status 28-25
in a switch stack 28-2
interaction with other features 28-9
monitored ports 28-6
monitoring ports 28-7
overview 1-10, 28-1
received traffic 28-5
session limits 28-11
sessions
creating 28-18
defined 28-4
limiting source traffic to specific VLANs 28-24
specifying monitored ports 28-18
with ingress traffic enabled 28-22
source ports 28-6
transmitted traffic 28-6
VLAN-based 28-7
RSTP
active topology 19-7
BPDU
format 19-10
processing 19-11
designated port, defined 19-7
designated switch, defined 19-7
interoperability with 802.1D
described 19-6
restarting migration process 19-23
topology changes 19-11
overview 19-6
port roles
described 19-7
synchronized 19-9
proposal-agreement handshake process 19-8
rapid convergence
cross-stack rapid convergence 19-8
described 19-8
edge ports and Port Fast 19-8
point-to-point links 19-8, 19-23
root ports 19-8
root port, defined 19-7
See also MSTP
running configuration, saving 3-10
S
scheduled reloads 3-16
SDM
described 8-1
switch stack consideration 5-10
templates
configuring 8-6
number of 8-1
SDM mismatch mode 5-10, 8-4
SDM template
aggregator 8-1
configuration guidelines 8-5
configuring 8-5
desktop 8-1
dual IPv4 and IPv6 8-2
types of 8-1
secondary VLANs 15-2
secure HTTP client
configuring 9-47
displaying 9-48
secure HTTP server
configuring 9-46
displaying 9-48
secure MAC addresses
and switch stacks 25-16
deleting 25-14
maximum number of 25-8
types of 25-8
secure ports
and switch stacks 25-16
configuring 25-7
secure remote connections 9-38
Secure Shell
See SSH
Secure Socket Layer
See SSL
security, port 25-7
security features 1-7
sequence numbers in log messages 30-8
server mode, VTP 14-3
service-provider network, MSTP and RSTP 19-1
service-provider networks
and 802.1Q tunneling 17-1
and customer VLANs 17-2
Layer 2 protocols across 17-8
Layer 2 protocol tunneling for EtherChannels 17-9
set-request operation 31-4
setup program
failed command switch replacement 41-11
replacing failed command switch 41-9
severity levels, defining in system messages 30-9
SFPs
monitoring status of 1-10, 11-27, 41-14
numbering of 11-11
security and identification 41-13
status, displaying 1-10
shaped round robin
See SRR
show access-lists hw-summary command 32-22
show and more command output, filtering 2-8
show cdp traffic command 26-5
show cluster members command 6-4
show configuration command 11-22
show forward command 41-22
show interfaces command 11-19, 11-22
show l2protocol command 17-14, 17-16
show platform forward command 41-22
show running-config command
displaying ACLs 32-20, 32-21, 32-32, 32-34
interface description in 11-22
shutdown command on interfaces 11-27
shutdown threshold for Layer 2 protocol packets 17-11
Simple Network Management Protocol
See SNMP
small form-factor pluggable modules
See SFPs
Smartports macros
applying Cisco-default macros 12-6
applying global parameter values 12-5, 12-6
applying macros 12-5
applying parameter values 12-5, 12-7
configuration guidelines 12-3
creating 12-4
default configuration 12-2
defined 12-1
displaying 12-8
tracing 12-3
website 12-2
SMI 1-1
SNAP 26-1
SNMP
accessing MIB variables with 31-4
agent
described 31-4
disabling 31-8
authentication level 31-10
community strings
configuring 31-8
for cluster switches 31-4
overview 31-4
configuration examples 31-16
default configuration 31-6
engine ID 31-7
groups 31-7, 31-9
host 31-7
ifIndex values 31-5
in-band management 1-5
informs
and trap keyword 31-11
described 31-5
differences from traps 31-5
disabling 31-14
enabling 31-14
limiting access by TFTP servers 31-15
limiting system log messages to NMS 30-10
manager functions 1-4, 31-3
managing clusters with 6-5
MIBs
location of A-3
supported A-1
notifications 31-5
overview 31-1, 31-4
security levels 31-3
status, displaying 31-17
system contact and location 31-15
trap manager, configuring 31-13
traps
described 31-3, 31-5
differences from informs 31-5
disabling 31-14
enabling 31-11
traps (continued)
enabling MAC address notification 7-23
overview 31-1, 31-4
types of 31-11
users 31-7, 31-9
versions supported 31-2
SNMPv1 31-2
SNMPv2C 31-2
SNMPv3 31-2
snooping, IGMP 24-1
software compatibility
See stacks, switch
software images
location in flash B-20
recovery procedures 41-2
scheduling reloads 3-16
tar file format, described B-20
See also downloading and uploading
source addresses, in ACLs 32-12
source-and-destination-IP address based forwarding, EtherChannel 34-8
source-and-destination MAC address forwarding, EtherChannel 34-8
source-IP address based forwarding, EtherChannel 34-8
source-MAC address forwarding, EtherChannel 34-7
SPAN
and stack changes 28-10
configuration guidelines 28-11
default configuration 28-11
destination ports 28-7
displaying status 28-25
interaction with other features 28-9
monitored ports 28-6
monitoring ports 28-7
overview 1-10, 28-1
ports, restrictions 25-11
received traffic 28-5
session limits 28-11
sessions
configuring ingress forwarding 28-16, 28-23
creating 28-12
defined 28-4
limiting source traffic to specific VLANs 28-16
removing destination (monitoring) ports 28-14
specifying monitored ports 28-12
with ingress traffic enabled 28-15
source ports 28-6
transmitted traffic 28-6
VLAN-based 28-7
spanning tree and native VLANs 13-19
Spanning Tree Protocol
See STP
SPAN traffic 28-5
speed, configuring on interfaces 11-17
split horizon, RIP 35-23
SRR
configuring
shaped weights on egress queues 33-76
shared weights on egress queues 33-77
shared weights on ingress queues 33-70
described 33-15
shaped mode 33-15
shared mode 33-15
support for 1-9
SSH
configuring 9-39
cryptographic software image 9-37
described 1-5, 9-38
encryption methods 9-38
switch stack considerations 5-17, 9-38
user authentication methods, supported 9-38
SSL
configuration guidelines 9-44
configuring a secure HTTP client 9-47
configuring a secure HTTP server 9-45
cryptographic software image 9-42
described 9-41
monitoring 9-48
stack changes
effects on
IPv6 routing 36-7
stack changes, effects on
802.1x port-based authentication 10-10
ACL configuration 32-7
CDP 26-2
cross-stack EtherChannel 34-12
EtherChannel 34-9
fallback bridging 40-3
HSRP 37-4
IGMP snooping 24-6
IP routing 35-4
MAC address tables 7-21
MSTP 19-6
multicast routing 38-8
MVR 24-14
port security 25-16
SDM template selection 8-4
SNMP 31-1
SPAN and RSPAN 28-10
STP 18-12
system message log 30-2
VLANs 13-6
VTP 14-6
stack master
bridge ID (MAC address) 5-5
defined 5-1
election 5-4
IPv6 36-8
re-election 5-4
See also stacks, switch
stack member
accessing CLI of specific member 5-23
configuring
member number 5-21
priority value 5-22
defined 5-1
displaying information of 5-23
IPv6 36-8
number 5-6
priority value 5-7
provisioning a new member 5-22
replacing 5-15
See also stacks, switch
stack member number 11-10
stack protocol version 5-11
stacks, switch
accessing CLI of specific member 5-23
assigning information
member number 5-21
priority value 5-22
provisioning a new member 5-22
auto-advise 5-12
auto-copy 5-12
auto-upgrade 5-12
benefits 1-2
bridge ID 5-5
CDP considerations 26-2
compatibility, software 5-10
configuration file 5-15
configuration scenarios 5-17
copying an image file from one member to another B-34
default configuration 5-20
description of 5-1
displaying information of 5-23
hardware compatibility and SDM mismatch mode 5-10
HSRP considerations 37-4
incompatible software and image upgrades 5-15, B-34
IPv6 on 36-7
MAC address considerations 7-21
stacks, switch (continued)
management connectivity 5-16
managing 5-1
membership 5-3
merged 5-3
MSTP instances supported 18-10
multicast routing, stack master and member roles 38-8
offline configuration
described 5-7
effects of adding a provisioned switch 5-8
effects of removing a provisioned switch 5-10
effects of replacing a provisioned switch 5-10
provisioned configuration, defined 5-7
provisioned switch, defined 5-7
provisioning a new member 5-22
partitioned 5-3, 41-8
provisioned switch
adding 5-8
removing 5-10
replacing 5-10
replacing a failed member 5-15
software compatibility 5-10
software image version 5-10
stack protocol version 5-11
STP
bridge ID 18-3
instances supported 18-10
root port selection 18-3
stack root switch election 18-3
system messages
hostnames in the display 30-1
remotely monitoring 30-2
system prompt consideration 7-14
system-wide configuration considerations 5-16
upgrading B-34
stacks, switch (continued)
version-mismatch (VM) mode
automatic upgrades with auto-upgrade 5-12
described 5-12
examples 5-13
manual upgrades with auto-advise 5-12
See also stack master and stack member
StackWise technology, Cisco 1-3
See also stacks, switch
standard multilayer image
See SMI
standby command switch, requirements 6-2
standby ip command 37-5
standby links 21-1
standby router 37-1
standby timers, HSRP 37-9
startup configuration
booting
manually 3-13
specific image 3-13
clearing B-19
configuration file
automatically downloading 3-12
specifying the filename 3-12
default boot configuration 3-12
stateless autoconfiguration 36-4
static access ports
assigning to VLAN 13-11
defined 11-3, 13-3
static addresses
See addresses
static IP routing 1-9
static MAC addressing 1-7
static routes
configuring 35-62
configuring for IPv6 36-16
static routing 35-3
static VLAN membership 13-2
statistics
802.1x 10-23
CDP 26-5
interface 11-26
IP multicast routing 38-51
OSPF 35-33
QoS ingress and egress 33-79
RMON group Ethernet 29-6
RMON group history 29-5
SNMP input and output 31-17
VTP 14-16
sticky learning 25-8
storm control
configuring 25-3
described 25-1
disabling 25-5
displaying 25-16
support for 1-4
thresholds 25-1
STP
802.1D and bridge ID 18-4
802.1D and multicast addresses 18-9
802.1t and VLAN identifier 18-4
accelerating root port selection 20-4
BackboneFast
described 20-7
disabling 20-17
enabling 20-16
BPDU filtering
described 20-3
disabling 20-15
enabling 20-14
BPDU guard
described 20-3
disabling 20-14
enabling 20-13
BPDU message exchange 18-3
configuration guidelines 18-13, 20-12
configuring
forward-delay time 18-23
hello time 18-22
maximum aging time 18-23
path cost 18-20
port priority 18-18
root switch 18-16
secondary root switch 18-18
spanning-tree mode 18-15
switch priority 18-21
counters, clearing 18-24
cross-stack UplinkFast
described 20-5
enabling 20-16
default configuration 18-13
default optional feature configuration 20-12
designated port, defined 18-4
designated switch, defined 18-4
detecting indirect link failures 20-8
disabling 18-16
displaying status 18-24
EtherChannel guard
described 20-10
disabling 20-17
enabling 20-17
extended system ID
effects on root switch 18-16
effects on the secondary root switch 18-18
overview 18-4
unexpected behavior 18-16
features supported 1-6
inferior BPDU 18-3
instances supported 18-10
interface state, blocking to forwarding 20-2
interface states
blocking 18-7
disabled 18-8
forwarding 18-6, 18-7
learning 18-7
listening 18-7
overview 18-5
interoperability and compatibility among modes 18-11
keepalive messages 18-2
Layer 2 protocol tunneling 17-8
limitations with 802.1Q trunks 18-11
load sharing
overview 13-24
using path costs 13-26
using port priorities 13-24
loop guard
described 20-11
enabling 20-18
modes supported 18-10
multicast addresses, effect of 18-9
optional features supported 1-6
overview 18-2
path costs 13-26, 13-27
Port Fast
described 20-2
enabling 20-12
port priorities 13-25
preventing root switch selection 20-10
protocols supported 18-10
redundant connectivity 18-9
root guard
described 20-10
enabling 20-17
root port, defined 18-3
root port selection on a switch stack 18-3
root switch
configuring 18-16
effects of extended system ID 18-4, 18-16
election 18-3
unexpected behavior 18-16
shutdown Port Fast-enabled port 20-3
stack changes, effects of 18-12
status, displaying 18-24
superior BPDU 18-3
timers, described 18-22
UplinkFast
described 20-4
enabling 20-15
VLAN-bridge 18-12
stratum, NTP 7-2
stub areas, OSPF 35-29
subdomains, private VLAN 15-1
subnet mask 35-7
subnet zero 35-7
success response, VMPS 13-28
summer time 7-13
SunNet Manager 1-4
supernet 35-8
SVIs
and IP unicast routing 35-5
and router ACLs 32-4
connecting VLANs 11-9
defined 11-5
routing between VLANs 13-2
switch clustering technology 6-1
See also clusters, switch
switch console port 1-5
Switch Database Management
See SDM
switched packets, ACLs on 32-38
Switched Port Analyzer
See SPAN
switched ports 11-2
switchport block multicast command 25-7
switchport block unicast command 25-7
switchport command 11-15
switchport mode dot1q-tunnel command 17-6
switchport protected command 25-6
switch priority
MSTP 19-20
STP 18-21
switch software features 1-1
switch virtual interface
See SVI
synchronization, BGP 35-44
syslog
See system message logging
system clock
configuring
daylight saving time 7-13
manually 7-11
summer time 7-13
time zones 7-12
displaying the time and date 7-12
overview 7-2
See also NTP
system message logging
default configuration 30-4
defining error message severity levels 30-9
disabling 30-4
displaying the configuration 30-13
enabling 30-5
facility keywords, described 30-13
level keywords, described 30-10
limiting messages 30-10
message format 30-2
overview 30-1
sequence numbers, enabling and disabling 30-8
setting the display destination device 30-5
stack changes, effects of 30-2
synchronizing log messages 30-6
system message logging (continued)
syslog facility 1-10
time stamps, enabling and disabling 30-8
UNIX syslog servers
configuring the daemon 30-12
configuring the logging facility 30-12
facilities supported 30-13
system MTU and 802.1Q tunneling 17-5
system name
default configuration 7-15
default setting 7-15
manual configuration 7-15
See also DNS
system prompt
default setting 7-14 to 7-15
manual configuration 7-16
system resources, optimizing 8-1
T
TACACS+
accounting, defined 9-11
authentication, defined 9-11
authorization, defined 9-11
configuring
accounting 9-17
authentication key 9-13
authorization 9-16
login authentication 9-14
default configuration 9-13
displaying the configuration 9-17
identifying the server 9-13
limiting the services to the user 9-16
operation of 9-12
overview 9-10
support for 1-8
tracking services accessed by user 9-17
tagged packets
802.1Q 17-3
Layer 2 protocol 17-8
tar files
creating B-6
displaying the contents of B-6
extracting B-7
image file format B-20
TDR 1-10
Telnet
accessing management interfaces 2-9
number of connections 1-5
setting a password 9-6
templates, SDM 8-1
temporary self-signed certificate 9-43
Terminal Access Controller Access Control System Plus
See TACACS+
terminal lines, setting a password 9-6
TFTP
configuration files
downloading B-11
preparing the server B-10
uploading B-11
configuration files in base directory 3-6
configuring for autoconfiguration 3-6
image files
deleting B-23
downloading B-22
preparing the server B-22
uploading B-24
limiting access by servers 31-15
TFTP server 1-5
threshold, traffic level 25-2
time
See NTP and system clock
Time Domain Reflector
See TDR
time-range command 32-17
time ranges in ACLs 32-17
time stamps in log messages 30-8
time zones 7-12
Token Ring VLANs
support for 13-6
VTP support 14-4
ToS 1-8
traceroute, Layer 2
and ARP 41-17
and CDP 41-16
broadcast traffic 41-16
described 41-16
IP addresses and subnets 41-17
MAC addresses and VLANs 41-16
multicast traffic 41-16
multiple devices on a port 41-17
unicast traffic 41-16
usage guidelines 41-16
traceroute command 41-18
See also IP traceroute
traffic
blocking flooded 25-6
fragmented 32-5
unfragmented 32-5
traffic policing 1-8
traffic suppression 25-1
transparent mode, VTP 14-3, 14-12
trap-door mechanism 3-2
traps
configuring MAC address notification 7-23
configuring managers 31-11
defined 31-3
enabling 7-23, 31-11
notification types 31-11
overview 31-1, 31-4
troubleshooting
connectivity problems 41-14, 41-16, 41-17
detecting unidirectional links 27-1
displaying crash information 41-24
PIMv1 and PIMv2 interoperability problems 38-23
troubleshooting (continued)
setting packet forwarding 41-22
SFP security and identification 41-13
show forward command 41-22
with CiscoWorks 31-4
with debug commands 41-20
with ping 41-14
with system message logging 30-1
with traceroute 41-17
trunking encapsulation 1-6
trunk ports
configuring 13-20
defined 11-3, 13-3
encapsulation 13-20, 13-25, 13-27
secure MAC addresses on 25-12
trunks
allowed-VLAN list 13-21
configuring 13-20, 13-25, 13-27
ISL 13-16
load sharing
setting STP path costs 13-26
using STP port priorities 13-24, 13-25
native VLAN for untagged traffic 13-23
parallel 13-26
pruning-eligible list 13-22
to non-DTP device 13-17
understanding 13-17
trusted boundary for QoS 33-39
trusted port states
between QoS domains 33-41
classification options 33-5
ensuring port security for IP phones 33-39
support for 1-8
within a QoS domain 33-36
trustpoints, CA 9-42
tunneling
802.1Q 17-1
defined 17-1
Layer 2 protocol 17-8
tunnel ports
802.1Q, configuring 17-6
defined 13-4
described 11-4, 17-1
incompatibilities with other features 17-6
twisted-pair Ethernet, detecting unidirectional links 27-1
type of service
See ToS
U
UDLD
default configuration 27-4
disabling
fiber-optic interfaces 27-5
globally 27-5
per interface 27-6
echoing detection mechanism 27-3
enabling
globally 27-5
per interface 27-6
Layer 2 protocol tunneling 17-10
link-detection mechanism 27-1
neighbor database 27-2
overview 27-1
resetting an interface 27-6
status, displaying 27-7
support for 1-6
UDP, configuring 35-16
unauthorized ports with 802.1x 10-4
unicast MAC address filtering 1-5
and adding static addresses 7-26
and broadcast MAC addresses 7-26
and CPU packets 7-26
and multicast addresses 7-26
and router MAC addresses 7-26
configuration guidelines 7-26
described 7-26
unicast storm 25-1
unicast storm control command 25-4
unicast traffic, blocking 25-7
UniDirectional Link Detection protocol
See UDLD
UNIX syslog servers
daemon configuration 30-12
facilities supported 30-13
message logging configuration 30-12
unrecognized Type-Length-Value (TLV) support 14-4
upgrading information
See release notes
upgrading software images
See downloading
UplinkFast
described 20-4
disabling 20-16
enabling 20-15
support for 1-6
uploading
configuration files
preparing B-10, B-13, B-16
reasons for B-8
using FTP B-14
using RCP B-18
using TFTP B-11
image files
preparing B-22, B-25, B-29
reasons for B-19
using FTP B-28
using RCP B-33
using TFTP B-24
User Datagram Protocol
See UDP
user EXEC mode 2-2
username-based authentication 9-7
V
version-dependent transparent mode 14-4
version-mismatch (VM) mode
automatic upgrades with auto-upgrade 5-12
described 5-12
displaying 5-12
manual upgrades with auto-advise 5-12
virtual router 37-1, 37-2
vlan.dat file 13-5
VLAN 1, disabling on a trunk port 13-22
VLAN 1 minimization 13-21
VLAN ACLs
See VLAN maps
vlan-assignment response, VMPS 13-28
VLAN configuration
at bootup 13-8
saving 13-8
VLAN configuration mode 2-2, 13-7
VLAN database
and startup configuration file 13-8
and VTP 14-1
VLAN configuration saved in 13-7
VLANs saved in 13-4
vlan database command 13-7
vlan dot1q tag native command 17-5
VLAN filtering and SPAN 28-7
vlan global configuration command 13-7
VLAN ID, discovering 7-27
VLAN management domain 14-2
VLAN Management Policy Server
See VMPS
VLAN map entries, order of 32-31
VLAN maps
applying 32-34
common uses for 32-35
configuration example 32-35
configuration guidelines 32-31
configuring 32-30
creating 32-32
defined 32-2
denying access example 32-36
denying and permitting packets 32-32
displaying 32-41
examples 32-36
removing 32-34
support for 1-7
with router ACLs 32-41
VLAN membership
confirming 13-31
modes 13-3
VLAN Query Protocol
See VQP
VLANs
adding 13-9
adding to VLAN database 13-9
aging dynamic addresses 18-10
allowed on trunk 13-21
and spanning-tree instances 13-3, 13-6, 13-13
configuration guidelines, extended-range VLANs 13-13
configuration guidelines, normal-range VLANs 13-6
configuration options 13-7
configuring 13-1
configuring IDs 1006 to 4094 13-13
connecting through SVIs 11-9
creating in config-vlan mode 13-9
creating in VLAN configuration mode 13-10
customer numbering in service-provider networks 17-3
default configuration 13-8
deleting 13-10
described 11-2, 13-1
displaying 13-16
extended-range 13-1, 13-12
features 1-6
illustrated 13-2
internal 13-13
in the switch stack 13-6
limiting source traffic with RSPAN 28-24
limiting source traffic with SPAN 28-16
modifying 13-9
native, configuring 13-23
normal-range 13-1, 13-4
number supported 1-6
parameters 13-5
port membership modes 13-3
static-access ports 13-11
STP and 802.1Q trunks 18-11
supported 13-2
Token Ring 13-6
traffic between 13-2
VLAN-bridge STP 18-12, 40-2
VTP modes 14-3
VLAN Trunking Protocol
See VTP
VLAN trunks 13-16, 13-17
VMPS
administering 13-32
configuration example 13-33
configuration guidelines 13-29
default configuration 13-29
description 13-27
dynamic port membership
described 13-28
reconfirming 13-31
troubleshooting 13-33
entering server address 13-30
mapping MAC addresses to VLANs 13-28
monitoring 13-32
reconfirmation interval, changing 13-31
reconfirming membership 13-31
retry count, changing 13-32
voice-over-IP 16-1
voice VLAN
Cisco 7960 phone, port connections 16-1
configuration guidelines 16-3
configuring IP phones for data traffic
override CoS of incoming frame 16-6
trust CoS priority of incoming frame 16-6
configuring ports for voice traffic in
802.1p priority tagged frames 16-5
802.1Q frames 16-5
connecting to an IP phone 16-4
default configuration 16-3
described 16-1
displaying 16-6
VQP 1-6, 13-27
VTP
adding a client to a domain 14-14
advertisements 13-19, 14-3
and extended-range VLANs 14-2
and normal-range VLANs 14-2
client mode, configuring 14-11
configuration
global configuration mode 14-7
guidelines 14-8
privileged EXEC mode 14-7
requirements 14-9
saving 14-7
VLAN configuration mode 14-8
configuration mode options 14-7
configuration requirements 14-9
configuration revision number
guideline 14-14
resetting 14-15
configuring
client mode 14-11
server mode 14-9
transparent mode 14-12
consistency checks 14-4
default configuration 14-7
described 14-1
disabling 14-12
domain names 14-8
domains 14-2
Layer 2 protocol tunneling 17-8
modes
client 14-3, 14-11
server 14-3, 14-9
transitions 14-3
transparent 14-3, 14-12
monitoring 14-16
passwords 14-8
pruning
disabling 14-14
enabling 14-14
examples 14-5
overview 14-4
support for 1-7
pruning-eligible list, changing 13-22
server mode, configuring 14-9
statistics 14-16
support for 1-7
Token Ring support 14-4
transparent mode, configuring 14-12
using 14-1
version, guidelines 14-9
Version 1 14-4
Version 2
configuration guidelines 14-9
disabling 14-13
enabling 14-13
overview 14-4
W
weighted tail drop
See WTD
wizards 1-2
WTD
described 33-14
setting thresholds
egress queue-sets 33-72
ingress queues 33-68
support for 1-9
X
Xmodem protocol 41-2