Catalyst 3750 Switch Software Configuration Guide, 12.2(25)SEC
Index
Downloads: This chapterpdf (PDF - 1.76MB) The complete bookPDF (PDF - 12.45MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

10-Gigabit Ethernet interfaces

configuration guidelines     11-16

defined     11-6

A

abbreviating commands     2-4

ABRs     35-25

access-class command     32-20

access control entries

See ACEs

access-denied response, VMPS     13-28

access groups

applying IPv4 ACLs to interfaces     32-21

Layer 2     32-21

Layer 3     32-21

accessing stack members     5-22

access lists

See ACLs

access ports

and Layer 2 protocol tunneling     17-11

defined     11-3

accounting

with 802.1x     10-25

with IEEE 802.1x     10-5

with RADIUS     9-28

with TACACS+     9-11, 9-16

ACEs

and QoS     33-7

defined     32-2

Ethernet     32-2

IP     32-2

ACLs

ACEs     32-2

any keyword     32-12

applying

on bridged packets     32-39

on multicast packets     32-40

on routed packets     32-39

on switched packets     32-38

time ranges to     32-17

to an interface     32-20

to QoS     33-7

classifying traffic for QoS     33-43

comments in     32-19

compiling     32-22

defined     32-1, 32-8

examples of     32-22, 33-43

extended IP

configuring for QoS classification     33-44

extended IPv4

creating     32-11

matching criteria     32-8

hardware and software handling     32-22

host keyword     32-13

ACLs (continued)

IP

creating     32-8

fragments and QoS guidelines     33-33

implicit deny     32-10, 32-14, 32-16

implicit masks     32-10

matching criteria     32-8

undefined     32-21

IPv4

applying to interfaces     32-20

creating     32-8

matching criteria     32-8

named     32-15

numbers     32-8

terminal lines, setting on     32-19

unsupported features     32-7

Layer 4 information in     32-38

logging messages     32-9

MAC extended     32-27, 33-45

matching     32-8, 32-21

monitoring     32-41

named, IPv4     32-15

number per QoS class map     33-33

port     32-2

precedence of     32-2

QoS     33-7, 33-43

resequencing entries     32-15

router     32-2

router ACLs and VLAN map configuration guidelines     32-37

standard IP, configuring for QoS classification     33-43

standard IPv4

creating     32-10

matching criteria     32-8

support for     1-7

support in hardware     32-22

time ranges     32-17

types supported     32-2

unsupported features, IPv4     32-7

ACLs (continued)

using router ACLs with VLAN maps     32-37

VLAN maps

configuration guidelines     32-30

configuring     32-30

active links     21-1

active router     37-1

address aliasing     24-2

addresses

displaying the MAC address table     7-26

dynamic

accelerated aging     18-9

changing the aging time     7-21

default aging     18-9

defined     7-19

learning     7-20

removing     7-22

MAC, discovering     7-27

multicast

group address range     38-3

STP address management     18-9

static

adding and removing     7-24

defined     7-19

address resolution     7-27, 35-9

Address Resolution Protocol

See ARP

adjacency tables, with CEF     35-74

administrative distances

defined     35-86

OSPF     35-31

routing protocol defaults     35-76

advanced IP services image     1-1, 36-1

advertisements

CDP     26-1

RIP     35-20

VTP     13-19, 14-3

aggregatable global unicast addresses     36-3

aggregate addresses, BGP     35-58

aggregated ports

See EtherChannel

aggregate policers     33-59

aggregate policing     1-9

aggregator template     5-9, 8-1

aging, accelerating     18-9

aging time

accelerated

for MSTP     19-23

for STP     18-9, 18-23

MAC address table     7-21

maximum

for MSTP     19-24

for STP     18-23

alarms, RMON     29-3

allowed-VLAN list     13-22

area border routers

See ABRs

ARP

configuring     35-10

defined     1-5, 7-27, 35-10

encapsulation     35-11

static cache configuration     35-10

table

address resolution     7-27

managing     7-27

ASBRs     35-25

AS-path filters, BGP     35-52

asymmetrical links, and IEEE 802.1Q tunneling     17-4

attributes, RADIUS

vendor-proprietary     9-30

vendor-specific     9-29

audience     xxxix

authentication

EIGRP     35-39

HSRP     37-9

local mode with AAA     9-36

NTP associations     7-5

authentication (continued)

RADIUS

key     9-21

login     9-23

TACACS+

defined     9-11

key     9-13

login     9-14

See also port-based authentication

authentication keys, and routing protocols     35-87

authoritative time source, described     7-2

authorization

with RADIUS     9-27

with TACACS+     9-11, 9-16

authorized ports with IEEE 802.1x     10-4

autoconfiguration     3-3

automatic advise (auto-advise) in switch stacks     5-11

automatic copy (auto-copy) in switch stacks     5-11

automatic QoS

See QoS

automatic upgrades (auto-upgrade) in switch stacks     5-11

Auto-MDIX

configuring     11-20

described     11-20

autonegotiation

duplex mode     1-3

interface configuration guidelines     11-17

mismatches     41-12

autonomous system boundary routers

See ASBRs

autonomous systems, in BGP     35-45

Auto-RP, described     38-5

autosensing, port speed     1-3

auxiliary VLAN

See voice VLAN

availability, features     1-6

B

BackboneFast

described     20-7

disabling     20-17

enabling     20-16

support for     1-6

backup interfaces

See Flex Links

backup links     21-1

banners

configuring

login     7-19

message-of-the-day login     7-18

default configuration     7-17

when displayed     7-17

BGP

aggregate addresses     35-58

aggregate routes, configuring     35-58

CIDR     35-58

clear commands     35-62

community filtering     35-55

configuring neighbors     35-56

default configuration     35-43

described     35-42

enabling     35-45

monitoring     35-62

multipath support     35-49

neighbors, types of     35-45

path selection     35-49

peers, configuring     35-56

prefix filtering     35-54

resetting sessions     35-48

route dampening     35-61

route maps     35-51

route reflectors     35-59

routing domain confederation     35-59

routing session with multi-VRF CE     35-68

show commands     35-62

BGP (continued)

supernets     35-58

support for     1-10

Version 4     35-42

binding cluster group and HSRP group     37-11

binding database

address, DHCP server

See DHCP, Cisco IOS server database

DHCP snooping

See DHCP snooping binding database

bindings

address, Cisco IOS DHCP server     22-5

DHCP snooping database     22-6

IP source guard     22-14

binding table, DHCP snooping

See DHCP snooping binding database

blocking packets     25-6

booting

boot loader, function of     3-2

boot process     3-2

manually     3-13

specific image     3-14

boot loader

accessing     3-14

described     3-2

environment variables     3-15

prompt     3-14

trap-door mechanism     3-2

bootstrap router (BSR), described     38-5

Border Gateway Protocol

See BGP

BPDU

error-disabled state     20-3

filtering     20-3

RSTP format     19-12

BPDU filtering

described     20-3

disabling     20-15

enabling     20-14

support for     1-6

BPDU guard

described     20-3

disabling     20-14

enabling     20-13

support for     1-6

bridged packets, ACLs on     32-39

bridge groups

See fallback bridging

bridge protocol data unit

See BPDU

broadcast flooding     35-17

broadcast packets

directed     35-14

flooded     35-14

broadcast storm-control command     25-4

broadcast storms     25-1, 35-14

C

cables, monitoring for unidirectional links     27-1

candidate switch

defined     6-3

requirements     6-3

See also command switch, cluster standby group, and member switch

CA trustpoint

configuring     9-45

defined     9-42

caution, described     xl

CDP

and trusted boundary     33-39

configuring     26-2

default configuration     26-2

described     26-1

disabling for routing device     26-3 to  26-4

enabling and disabling

on an interface     26-4

on a switch     26-3

Layer 2 protocol tunneling     17-8

monitoring     26-5

overview     26-1

power negotiation extensions     11-6

support for     1-5

switch stack considerations     26-2

transmission timer and holdtime, setting     26-2

updates     26-2

CEF

defined     35-74

distributed     35-74

enabling     35-74

IPv6     36-15

CGMP

as IGMP snooping learning method     24-8

clearing cached group entries     38-50

enabling server support     38-33

joining multicast group     24-3

overview     38-8

server support only     38-8

switch support of     1-4

CIDR     35-58

CipherSuites     9-43

Cisco 7960 IP Phone     15-1

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco Intelligence Engine 2100 Series Configuration Registrar

See IE2100

Cisco intelligent power management     11-6

Cisco IOS DHCP server

See DHCP, Cisco IOS DHCP server

Cisco IOS File System

See IFS

Cisco Network Assistant

See Network Assistant

Cisco Networking Services

See IE2100

Cisco StackWise technology     1-3

See also stacks, switch

CiscoWorks 2000     1-5, 31-4

CIST regional root

See MSTP

CIST root

See MSTP

classless interdomain routing

See CIDR

classless routing     35-8

class maps for QoS

configuring     33-46

described     33-7

displaying     33-79

class of service

See CoS

clearing interfaces     11-27

CLI

abbreviating commands     2-4

command modes     2-1

configuration logging     2-5

described     1-4

editing features

enabling and disabling     2-7

keystroke editing     2-8

wrapped lines     2-9

error messages     2-5

CLI (continued)

filtering command output     2-10

getting help     2-3

history

changing the buffer size     2-6

described     2-6

disabling     2-7

recalling commands     2-6

managing clusters     6-4

no and default forms of commands     2-4

client mode, VTP     14-3

clock

See system clock

cluster requirements     xli

clusters, switch

benefits     1-2

described     6-1

managing

through CLI     6-4

through SNMP     6-5

planning considerations

CLI     6-4

SNMP     6-5

See also Getting Started with Cisco Network Assistant

cluster standby group

and HSRP group     37-11

requirements     6-2

Coarse Wave Division Multiplexer

See CWDM SFPs

command-line interface

See CLI

command modes     2-1

commands

abbreviating     2-4

no and default     2-4

commands, setting privilege levels     9-8

command switch

configuration conflicts     41-12

defined     6-2

password privilege levels     6-4

recovery

from command-switch failure     41-8

from lost member connectivity     41-12

replacing

with another switch     41-11

with cluster member     41-9

requirements     6-2

See also candidate switch, cluster standby group, member switch, and standby command switch

community list, BGP     35-55

community ports     16-2

community strings

configuring     31-8

for cluster switches     31-4

overview     31-4

community VLANs     16-2, 16-3

compatibility, feature     25-11

compatibility, software

See stacks, switch

config.text     3-12

configurable leave timer, IGMP     24-5

configuration, initial

defaults     1-11

Express Setup     1-2

See also getting started guide and hardware installation guide

configuration conflicts, recovering from lost member connectivity     41-12

configuration examples, network     1-14

configuration files

clearing the startup configuration     B-19

creating using a text editor     B-10

default name     3-12

deleting a stored configuration     B-19

described     B-8

configuration files (continued)

downloading

automatically     3-12

preparing     B-11, B-13, B-16

reasons for     B-9

using FTP     B-13

using RCP     B-17

using TFTP     B-11

guidelines for creating and using     B-9

invalid combinations when copying     B-5

limiting TFTP server access     31-15

obtaining with DHCP     3-7

password recovery disable considerations     9-5

specifying the filename     3-12

system contact and location information     31-14

types and location     B-10

uploading

preparing     B-11, B-13, B-16

reasons for     B-9

using FTP     B-14

using RCP     B-18

using TFTP     B-12

configuration guidelines, multi-VRF CE     35-66

configuration logging     2-5

configuration settings, saving     3-10

configure terminal command     11-11

config-vlan mode     2-2, 13-7

conflicts, configuration     41-12

connections, secure remote     9-38

connectivity problems     41-14, 41-16, 41-17

consistency checks in VTP Version 2     14-4

console port, connecting to     2-11

conventions

command     xl

for examples     xl

publication     xl

text     xl

corrupted software, recovery steps with Xmodem     41-2

CoS

in Layer 2 frames     33-2

override priority     15-6

trust priority     15-6

CoS input queue threshold map for QoS     33-16

CoS output queue threshold map for QoS     33-19

CoS-to-DSCP map for QoS     33-61

counters, clearing interface     11-27

crashinfo file     41-24

cross-stack EtherChannel

configuration guidelines     34-12

configuring

on Layer 2 interfaces     34-12

on Layer 3 physical interfaces     34-15

described     34-2

illustration     34-3

support for     1-6

cross-stack UplinkFast, STP

described     20-5

disabling     20-16

enabling     20-16

fast-convergence events     20-7

Fast Uplink Transition Protocol     20-6

normal-convergence events     20-7

support for     1-6

cryptographic software image

Kerberos     9-32

SSH     9-37

SSL     9-42

switch stack considerations     5-2, 5-16, 9-38

customer edge devices     35-64

CWDM SFPs     1-24

D

daylight saving time     7-13

dCEF

in the switch stack     35-74

debugging

enabling all system diagnostics     41-21

enabling for a specific feature     41-20

redirecting error message output     41-21

using commands     41-20

default commands     2-4

default configuration

802.1x     10-13

auto-QoS     33-20

banners     7-17

BGP     35-43

booting     3-12

CDP     26-2

DHCP     22-7

DHCP option 82     22-7

DHCP snooping     22-7

DHCP snooping binding database     22-8

DNS     7-16

dynamic ARP inspection     23-5

EIGRP     35-36

EtherChannel     34-10

Ethernet interfaces     11-15

fallback bridging     40-4

Flex Links     21-2

HSRP     37-5

IEEE 802.1Q tunneling     17-4

IGMP     38-27

IGMP filtering     24-22

IGMP snooping     24-7

IGMP throttling     24-22

initial switch information     3-3

IP addressing, IP routing     35-6

IP multicast routing     38-9

IP source guard     22-15

IPv6     36-11

Layer 2 interfaces     11-15

Layer 2 protocol tunneling     17-11

MAC address table     7-21

MSDP     39-4

default configuration (continued)

MSTP     19-15

multi-VRF CE     35-65

MVR     24-17

NTP     7-4

optional spanning-tree configuration     20-12

OSPF     35-26

password and privilege level     9-2

PIM     38-9

private VLANs     16-6

RADIUS     9-20

RIP     35-21

RMON     29-3

RSPAN     28-11

SDM template     8-5

SNMP     31-6

SPAN     28-11

SSL     9-44

standard QoS     33-31

STP     18-13

switch stacks     5-19

system message logging     31-4

system name and prompt     7-15

TACACS+     9-13

UDLD     27-4

VLAN, Layer 2 Ethernet interfaces     13-19

VLANs     13-8

VMPS     13-29

voice VLAN     15-3

VTP     14-7

default gateway     3-10, 35-12

default networks     35-77

default routes     35-77

default routing     35-3

deleting VLANs     13-10

denial-of-service attack     25-1

description command     11-22

designing your network, examples     1-14

desktop template     5-9, 8-1

destination addresses, in IPv4 ACLs     32-12

destination-IP address-based forwarding, EtherChannel     34-8

destination-MAC address forwarding, EtherChannel     34-8

detecting indirect link failures, STP     20-8

device     B-19

device discovery protocol     26-1

device manager

benefits     1-2

described     1-2, 1-4

in-band management     1-5

requirements     xl

upgrading a switch     B-19

DHCP

Cisco IOS server database

configuring     22-13

default configuration     22-8

described     22-5

enabling

relay agent     22-9

server     22-9

DHCP-based autoconfiguration

client request message exchange     3-4

configuring

client side     3-4

DNS     3-6

relay device     3-7

server side     3-5

server-side     22-9

TFTP server     3-6

example     3-8

lease options

for IP address information     3-5

for receiving the configuration file     3-5

overview     3-3

relationship to BOOTP     3-4

relay support     1-5, 1-10

support for     1-5

DHCP binding database

See DHCP snooping binding database

DHCP binding table

See DHCP snooping binding database

DHCP option 82

circuit ID suboption     22-5

configuration guidelines     22-8

default configuration     22-7

displaying     22-14

forwarding address, specifying     22-10

helper address     22-10

overview     22-3

packet format, suboption

circuit ID     22-5

remote ID     22-5

remote ID suboption     22-5

DHCP snooping

accepting untrusted packets form edge switch     22-3, 22-11

and private VLANs     22-12

binding database

See DHCP snooping binding database

configuration guidelines     22-8

default configuration     22-7

displaying binding tables     22-14

message exchange process     22-4

option 82 data insertion     22-3

trusted interface     22-2

untrusted interface     22-2

untrusted messages     22-2

DHCP snooping binding database

adding bindings     22-13

binding file

format     22-6

location     22-6

bindings     22-6

clearing agent statistics     22-14

configuration guidelines     22-9

configuring     22-13

DHCP snooping binding database (continued)

default configuration     22-7, 22-8

deleting

binding file     22-14

bindings     22-14

database agent     22-14

described     22-5

displaying     22-14

binding entries     22-14

status and statistics     22-14

enabling     22-13

entry     22-6

renewing database     22-14

resetting

delay value     22-14

timeout value     22-14

DHCP snooping binding table

See DHCP snooping binding database

Differentiated Services architecture, QoS     33-2

Differentiated Services Code Point     33-2

Diffusing Update Algorithm (DUAL)     35-34

directed unicast requests     1-5

directories

changing     B-4

creating and removing     B-4

displaying the working     B-4

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols     35-3

distribute-list command     35-85

DNS

and DHCP-based autoconfiguration     3-6

default configuration     7-16

displaying the configuration     7-17

in IPv6     36-4

overview     7-15

setting up     7-16

support for     1-5

documentation, related     xl

document conventions     xl

domain names

DNS     7-15

VTP     14-8

Domain Name System

See DNS

dot1q-tunnel switchport mode     13-18

double-tagged packets

IEEE 802.1Q tunneling     17-2

Layer 2 protocol tunneling     17-10

downloading

configuration files

preparing     B-11, B-13, B-16

reasons for     B-9

using FTP     B-13

using RCP     B-17

using TFTP     B-11

image files

deleting old image     B-23

preparing     B-21, B-25, B-29

reasons for     B-19

using CMS     1-2

using FTP     B-26

using HTTP     1-2, B-19

using RCP     B-31

using TFTP     B-22

using the device manager or Network Assistant     B-19

drop threshold for Layer 2 protocol packets     17-11

DSCP     1-9, 33-2

DSCP input queue threshold map for QoS     33-16

DSCP output queue threshold map for QoS     33-19

DSCP-to-CoS map for QoS     33-64

DSCP-to-DSCP-mutation map for QoS     33-65

DSCP transparency     33-39

DTP     1-7, 13-17

DUAL finite state machine, EIGRP     35-35

dual IPv4 and IPv6 templates     8-2, 36-9

dual protocol stacks

configuring     36-13

IPv4 and IPv6     36-8

SDM templates supporting     36-9

duplex mode, configuring     11-17

DVMRP

autosummarization

configuring a summary address     38-47

disabling     38-49

connecting PIM domain to DVMRP router     38-39

enabling unicast routing     38-43

interoperability

with Cisco devices     38-37

with Cisco IOS software     38-7

mrinfo requests, responding to     38-42

neighbors

advertising the default route to     38-41

discovery with Probe messages     38-37

displaying information     38-42

prevent peering with nonpruning     38-45

rejecting nonpruning     38-43

overview     38-7

routes

adding a metric offset     38-49

advertising all     38-49

advertising the default route to neighbors     38-41

caching DVMRP routes learned in report messages     38-43

changing the threshold for syslog messages     38-46

deleting     38-50

displaying     38-51

favoring one over another     38-49

limiting the number injected into MBONE     38-46

limiting unicast route advertisements     38-37

routing table     38-7

source distribution tree, building     38-7

support for     1-10

DVMRP (continued)

tunnels

configuring     38-39

displaying neighbor information     38-42

dynamic access ports

characteristics     13-3

configuring     13-31

defined     11-3

dynamic addresses

See addresses

dynamic ARP inspection

ARP cache poisoning     23-1

ARP requests, described     23-1

ARP spoofing attack     23-1

clearing

log buffer     23-15

statistics     23-15

configuration guidelines     23-6

configuring

ACLs for non-DHCP environments     23-8

in DHCP environments     23-7

log buffer     23-12

rate limit for incoming ARP packets     23-4, 23-10

default configuration     23-5

denial-of-service attacks, preventing     23-10

described     23-1

DHCP snooping binding database     23-2

displaying

ARP ACLs     23-14

configuration and operating state     23-14

log buffer     23-15

statistics     23-15

trust state and rate limit     23-14

error-disabled state for exceeding rate limit     23-4

function of     23-2

interface trust states     23-3

dynamic ARP inspection (continued)

log buffer

clearing     23-15

configuring     23-12

displaying     23-15

logging of dropped packets, described     23-5

man-in-the middle attack, described     23-2

network security issues and interface trust states     23-3

priority of ARP ACLs and DHCP snooping entries     23-4

rate limiting of ARP packets

configuring     23-10

described     23-4

error-disabled state     23-4

statistics

clearing     23-15

displaying     23-15

validation checks, performing     23-11

dynamic auto trunking mode     13-18

dynamic desirable trunking mode     13-18

Dynamic Host Configuration Protocol

See DHCP-based autoconfiguration

dynamic port VLAN membership

described     13-29

reconfirming     13-31

troubleshooting     13-33

types of connections     13-31

dynamic routing     35-3

Dynamic Trunking Protocol

See DTP

E

EBGP     35-41

editing features

enabling and disabling     2-7

keystrokes used     2-8

wrapped lines     2-9

EIGRP

authentication     35-39

components     35-35

configuring     35-38

default configuration     35-36

definition     35-34

interface parameters, configuring     35-38

monitoring     35-40

support for     1-10

elections

See stack master

enable password     9-3

enable secret password     9-3

encryption, CipherSuite     9-44

encryption for passwords     9-3

Enhanced IGRP

See EIGRP

environment variables, function of     3-15

equal-cost routing     1-10, 35-75

error messages during command entry     2-5

EtherChannel

automatic creation of     34-5, 34-6

channel groups

binding physical and logical interfaces     34-4

numbering of     34-4

configuration guidelines     34-11

configuring

Layer 2 interfaces     34-12

Layer 3 physical interfaces     34-15

Layer 3 port-channel logical interfaces     34-14

default configuration     34-10

described     34-2

displaying status     34-21

forwarding methods     34-7, 34-17

IEEE 802.3ad, described     34-6

interaction

with STP     34-11

with VLANs     34-11

EtherChannel (continued)

LACP

described     34-6

displaying status     34-21

hot-standby ports     34-19

interaction with other features     34-7

modes     34-7

port priority     34-20

system priority     34-20

Layer 3 interface     35-5

load balancing     34-7, 34-17

logical interfaces, described     34-4

PAgP

aggregate-port learners     34-18

compatibility with Catalyst 1900     34-18

described     34-5

displaying status     34-21

interaction with other features     34-6

learn method and priority configuration     34-18

modes     34-5

support for     1-4

port-channel interfaces

described     34-4

numbering of     34-4

port groups     11-5

stack changes, effects of     34-9

support for     1-4

EtherChannel guard

described     20-10

disabling     20-17

enabling     20-17

Ethernet VLANs

adding     13-8

defaults and ranges     13-8

modifying     13-8

EUI     36-3

events, RMON     29-3

examples

conventions for     xl

network configuration     1-14

expedite queue for QoS     33-78

Express Setup     1-2

See also getting started guide

extended-range VLANs

configuration guidelines     13-12

configuring     13-12

creating     13-13

creating with an internal VLAN ID     13-14

defined     13-1

extended system ID

MSTP     19-17

STP     18-4, 18-16

extended universal identifier

See EUI

Extensible Authentication Protocol over LAN     10-1

external BGP

See EBGP

external neighbors, BGP     35-45

F

failover support     1-6

fallback bridging

and protected ports     40-4

bridge groups

creating     40-4

described     40-2

displaying     40-11

function of     40-2

number supported     40-5

removing     40-5

bridge table

clearing     40-11

displaying     40-11

configuration guidelines     40-4

connecting interfaces with     11-9

fallback bridging (continued)

default configuration     40-4

described     40-1

frame forwarding

flooding packets     40-2

forwarding packets     40-2

overview     40-1

protocol, unsupported     40-4

stack changes, effects of     40-3

STP

disabling on an interface     40-11

forward-delay interval     40-10

hello BPDU interval     40-9

interface priority     40-7

keepalive messages     18-2

maximum-idle interval     40-10

path cost     40-8

VLAN-bridge spanning-tree priority     40-7

VLAN-bridge STP     40-2

support for     1-10

SVIs and routed ports     40-1

unsupported protocols     40-4

VLAN-bridge STP     18-11

Fast Uplink Transition Protocol     20-6

features, incompatible     25-11

FIB     35-74

fiber-optic, detecting unidirectional links     27-1

files

copying     B-5

crashinfo

description     41-24

displaying the contents of     41-24

location     41-24

deleting     B-5

displaying the contents of     B-8

files (continued)

tar

creating     B-6

displaying the contents of     B-7

extracting     B-7

image file format     B-20

file system

displaying available file systems     B-2

displaying file information     B-3

local file system names     B-1

network file system names     B-5

setting the default     B-3

filtering

in a VLAN     32-30

non-IP traffic     32-27

show and more command output     2-10

filtering show and more command output     2-10

filters, IP

See ACLs, IP

flash device, number of     B-1

Flex Links

configuration guidelines     21-2

configuring     21-3

default configuration     21-2

description     21-1

monitoring     21-3

flooded traffic, blocking     25-7

flow-based packet classification     1-9

flowcharts

QoS classification     33-6

QoS egress queueing and scheduling     33-17

QoS ingress queueing and scheduling     33-15

QoS policing and marking     33-10

flowcontrol

configuring     11-19

described     11-19

forward-delay time

MSTP     19-23

STP     18-23

Forwarding Information Base

See FIB

forwarding nonroutable protocols     40-1

FTP

accessing MIB files     A-3

configuration files

downloading     B-13

overview     B-12

preparing the server     B-13

uploading     B-14

image files

deleting old image     B-28

downloading     B-26

preparing the server     B-25

uploading     B-28

G

get-bulk-request operation     31-3

get-next-request operation     31-3, 31-4

get-request operation     31-3, 31-4

get-response operation     31-3

Gigabit modules

See SFPs

global configuration mode     2-2

guest VLAN and 802.1x     10-10

guide

audience     xxxix

purpose of     xxxix

guide mode     1-2

GUIs

See device manager and Network Assistant     1-4

H

hardware limitations and Layer 3 interfaces     11-23

hello time

MSTP     19-22

STP     18-22

help, for the command line     2-3

hierarchical policy maps     33-8

configuration guidelines     33-33

configuring     33-52

described     33-11

history

changing the buffer size     2-6

described     2-6

disabling     2-7

recalling commands     2-6

history table, level and number of syslog messages     31-10

host ports

configuring     16-11

kinds of     16-2

hosts, limit on dynamic ports     13-33

Hot Standby Router Protocol

See HSRP

HP OpenView     1-5

HSRP

authentication string     37-9

binding to cluster group     37-11

command-switch redundancy     1-1, 1-6

configuring     37-4

default configuration     37-5

definition     37-1

guidelines     37-5

monitoring     37-11

overview     37-1

priority     37-7

routing redundancy     1-10

support for ICMP redirect messages     37-11

switch stack considerations     37-4

HSRP (continued)

timers     37-9

tracking     37-7

HTTP over SSL

see HTTPS

HTTPS     9-42

configuring     9-46

self-signed certificate     9-43

HTTP secure server     9-42

I

IBPG     35-41

ICMP

IPv6     36-4

redirect messages     35-12

support for     1-10

time-exceeded messages     41-18

traceroute and     41-18

unreachable messages     32-20

unreachables and ACLs     32-22

ICMP ping

executing     41-15

overview     41-14

ICMP Router Discovery Protocol

See IRDP

ICMPv6     36-4

IDS appliances

and ingress RSPAN     28-21

and ingress SPAN     28-14

IE2100

CNS embedded agents

described     4-5

enabling automated configuration     4-6

enabling configuration agent     4-9

enabling event agent     4-8

IE2100 (continued)

Configuration Registrar

configID, deviceID, hostname     4-3

configuration service     4-2

described     4-1

event service     4-3

IEEE 802.1D

See STP

IEEE 802.1p     15-1

IEEE 802.1Q

and trunk ports     11-3

configuration limitations     13-19

encapsulation     13-16

native VLAN for untagged traffic     13-23

tunneling

compatibility with other features     17-6

defaults     17-4

described     17-1

tunnel ports with other features     17-6

IEEE 802.1s

See MSTP

IEEE 802.1w

See RSTP

IEEE 802.1x

See port-based authentication

IEEE 802.3ad

See EtherChannel

IEEE 802.3af

See PoE

IEEE 802.3z flow control     11-19

ifIndex values, SNMP     31-5

IFS     1-5

IGMP

configurable leave timer

described     24-5

enabling     24-11

configuring the switch

as a member of a group     38-27

statically connected member     38-32

IGMP (continued)

controlling access to groups     38-28

default configuration     38-27

deleting cache entries     38-51

displaying groups     38-51

fast switching     38-32

host-query interval, modifying     38-30

joining multicast group     24-3

join messages     24-3

leave processing, enabling     24-10

leaving multicast group     24-5

multicast reachability     38-27

overview     38-2

queries     24-4

report suppression

described     24-6

disabling     24-13

supported versions     24-2

support for     1-4

Version 1

changing to Version 2     38-29

described     38-3

Version 2

changing to Version 1     38-29

described     38-3

maximum query response time value     38-31

pruning groups     38-31

query timeout value     38-31

IGMP filtering

configuring     24-22

default configuration     24-22

described     24-21

monitoring     24-26

support for     1-4

IGMP groups

configuring filtering     24-25

setting the maximum number     24-24

IGMP profile

applying     24-24

configuration mode     24-22

configuring     24-23

IGMP snooping

and address aliasing     24-2

and stack changes     24-6

configuring     24-6

default configuration     24-7

definition     24-1

enabling and disabling     24-7

global configuration     24-7

Immediate Leave     24-5

in the switch stack     24-6

method     24-8

monitoring     24-13

querier

configuration guidelines     24-12

configuring     24-12

supported versions     24-2

support for     1-4

VLAN configuration     24-7

IGMP throttling

configuring     24-25

default configuration     24-22

described     24-22

displaying action     24-26

IGP     35-25

Immediate Leave, IGMP

configuration guidelines     24-10

described     24-5

enabling     24-10

initial configuration

defaults     1-11

Express Setup     1-2

See also getting started guide and hardware installation guide

Intelligence Engine 2100 Series CNS Agents

See IE2100

interface

number     11-10

range macros     11-13

interface command     11-10 to  11-11

interface configuration mode     2-3

interfaces

Auto-MDIX, configuring     11-20

configuration guidelines

10-Gigabit Ethernet     11-16

duplex and speed     11-17

configuring

duplex mode     11-17

procedure     11-11

speed     11-17

configuring for IPv4 and IPv6     36-13

counters, clearing     11-27

default configuration     11-15

described     11-22

descriptive name, adding     11-22

displaying information about     11-26

flow control     11-19

management     1-4

monitoring     11-26

naming     11-22

physical, identifying     11-10

range of     11-11

restarting     11-27

shutting down     11-27

speed and duplex, configuring     11-18

status     11-26

supported     11-10

types of     11-1

interfaces range macro command     11-13

interface types     11-10

Interior Gateway Protocol

See IGP

internal BGP

See IBGP

internal neighbors, BGP     35-45

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Internet Protocol version 6

See IPv6

Inter-Switch Link

See ISL

inter-VLAN routing     1-10, 35-2

Intrusion Detection System

See IDS appliances

IP ACLs

for QoS classification     33-7

implicit deny     32-10, 32-14

implicit masks     32-10

named     32-15

undefined     32-21

IP addresses

128-bit     36-2

candidate or member     6-3

classes of     35-6

command switch     6-2

default configuration     35-6

discovering     7-27

for IP routing     35-5

IPv6     36-2

MAC address association     35-9

monitoring     35-18

See also IP information

IP base image     1-1

IP broadcast address     35-16

ip cef distributed command     35-74

IP directed broadcasts     35-15

ip igmp profile command     24-22

IP information

assigned

manually     3-10

through DHCP-based autoconfiguration     3-3

default configuration     3-3

IP multicast routing

addresses

all-hosts     38-3

all-multicast-routers     38-3

host group address range     38-3

administratively-scoped boundaries, described     38-35

and IGMP snooping     24-1

Auto-RP

adding to an existing sparse-mode cloud     38-14

benefits of     38-14

clearing the cache     38-51

configuration guidelines     38-10

filtering incoming RP announcement messages     38-16

overview     38-5

preventing candidate RP spoofing     38-16

preventing join messages to false RPs     38-16

setting up in a new internetwork     38-14

using with BSR     38-22

bootstrap router

configuration guidelines     38-10

configuring candidate BSRs     38-20

configuring candidate RPs     38-21

defining the IP multicast boundary     38-19

defining the PIM domain border     38-18

overview     38-5

using with Auto-RP     38-22

Cisco implementation     38-2

configuring

basic multicast routing     38-11

IP multicast boundary     38-35

default configuration     38-9

enabling

multicast forwarding     38-11

PIM mode     38-12

group-to-RP mappings

Auto-RP     38-5

BSR     38-5

IP multicast routing (continued)

MBONE

deleting sdr cache entries     38-51

described     38-34

displaying sdr cache     38-52

enabling sdr listener support     38-34

limiting DVMRP routes advertised     38-46

limiting sdr cache entry lifetime     38-35

SAP packets for conference session announcement     38-34

Session Directory (sdr) tool, described     38-34

monitoring

packet rate loss     38-52

peering devices     38-52

tracing a path     38-52

multicast forwarding, described     38-6

PIMv1 and PIMv2 interoperability     38-9

protocol interaction     38-2

reverse path check (RPF)     38-6

routing table

deleting     38-51

displaying     38-51

RP

assigning manually     38-12

configuring Auto-RP     38-14

configuring PIMv2 BSR     38-18

monitoring mapping information     38-23

using Auto-RP and BSR     38-22

stacking

stack master functions     38-8

stack member functions     38-8

statistics, displaying system and network     38-51

See also CGMP

See also DVMRP

See also IGMP

See also PIM

IP phones

and QoS     15-1

automatic classification and queueing     33-20

configuring     15-4

ensuring port security with QoS     33-38

trusted boundary for QoS     33-38

IP precedence     33-2

IP-precedence-to-DSCP map for QoS     33-62

IP protocols

in ACLs     32-12

routing     1-10

IP routes, monitoring     35-88

IP routing

connecting interfaces with     11-9

disabling     35-19

enabling     35-19

IP services image     1-1

IP source guard

and 802.1x     22-16

and DHCP snooping     22-14

and EtherChannels     22-16

and port security     22-16

and private VLANs     22-16

and routed ports     22-16

and TCAM entries     22-16

and trunk interfaces     22-16

and VRF     22-16

binding configuration

automatic     22-14

manual     22-14

binding table     22-14

configuration guidelines     22-16

default configuration     22-15

described     22-14

disabling     22-17

displaying

bindings     22-18

configuration     22-18

enabling     22-16

IP source guard (continued)

filtering

source IP address     22-15

source IP and MAC address     22-15

source IP address filtering     22-15

source IP and MAC address filtering     22-15

static bindings

adding     22-16

deleting     22-17

IP traceroute

executing     41-18

overview     41-17

IP unicast routing

address resolution     35-9

administrative distances     35-76, 35-86

ARP     35-10

assigning IP addresses to Layer 3 interfaces     35-7

authentication keys     35-87

broadcast

address     35-16

flooding     35-17

packets     35-14

storms     35-14

classless routing     35-8

configuring static routes     35-75

default

addressing configuration     35-6

gateways     35-12

networks     35-77

routes     35-77

routing     35-3

directed broadcasts     35-15

disabling     35-19

dynamic routing     35-3

enabling     35-19

EtherChannel Layer 3 interface     35-5

IGP     35-25

inter-VLAN     35-2

IP unicast routing (continued)

IP addressing

classes     35-6

configuring     35-5

IPv6     36-3

IRDP     35-13

Layer 3 interfaces     35-5

MAC address and IP address     35-9

passive interfaces     35-84

protocols

distance-vector     35-3

dynamic     35-3

link-state     35-3

proxy ARP     35-10

redistribution     35-78

reverse address resolution     35-9

routed ports     35-5

static routing     35-3

steps to configure     35-5

subnet mask     35-7

subnet zero     35-7

supernet     35-8

UDP     35-16

with SVIs     35-5

See also BGP

See also EIGRP

See also OSPF

See also RIP

IPv4 ACLs

applying to interfaces     32-20

extended, creating     32-11

named     32-15

standard, creating     32-10

IPv4 and IPv6

configuring on an interface     36-13

differences     36-1

dual protocol stacks     36-5

IPv6

addresses     36-2

address formats     36-2

advantages     36-2

and switch stacks     36-7

applications     36-5

assigning address     36-11

autoconfiguration     36-5

CEFv6     36-15

configuring static routes     36-16

default configuration     36-11

defined     36-1

enabling     36-11

feature limitations     36-7

features not supported     36-6

ICMP     36-4

ICMP rate limiting     36-15

monitoring     36-22

OSPF     36-20

path MTU discovery     36-4

reasons for     36-1

RIP     36-18

SDM templates     8-2, 36-8

stack master functions     36-8

supported features     36-3

switch limitations     36-7

IRDP

configuring     35-13

definition     35-13

support for     1-10

ISL

and IPv6     36-3

and trunk ports     11-3

encapsulation     1-7, 13-16

trunking with IEEE 802.1 tunneling     17-5

isolated port     16-2

isolated VLANs     16-2, 16-3

J

join messages, IGMP     24-3

K

KDC

described     9-32

See also Kerberos

keepalive messages     18-2

Kerberos

authenticating to

boundary switch     9-35

KDC     9-35

network services     9-35

configuration examples     9-32

configuring     9-36

credentials     9-32

cryptographic software image     9-32

described     9-32

KDC     9-32

operation     9-34

realm     9-33

server     9-33

support for     1-8

switch as trusted third party     9-32

terms     9-33

TGT     9-34

tickets     9-32

key distribution center

See KDC

L

l2protocol-tunnel command     17-13

LACP

Layer 2 protocol tunneling     17-9

See EtherChannel

Layer 2 frames, classification with CoS     33-2

Layer 2 interfaces, default configuration     11-15

Layer 2 protocol tunneling

configuring     17-10

configuring for EtherChannels     17-14

default configuration     17-11

defined     17-8

guidelines     17-11

Layer 2 traceroute

and ARP     41-17

and CDP     41-16

broadcast traffic     41-16

described     41-16

IP addresses and subnets     41-17

MAC addresses and VLANs     41-16

multicast traffic     41-16

multiple devices on a port     41-17

unicast traffic     41-16

usage guidelines     41-16

Layer 3 features     1-10

Layer 3 interfaces

assigning IP addresses to     35-7

assigning IPv4 and IPv6 addresses to     36-13

assigning IPv6 addresses to     36-12

changing from Layer 2 mode     35-7

types of     35-5

Layer 3 packets, classification methods     33-2

LDAP     4-2

LEDs, switch

See hardware installation guide

lightweight directory access protocol

See LDAP

line configuration mode     2-3

Link Aggregation Control Protocol

See EtherChannel

Link Failure

detecting unidirectional     19-8

link local unicast addresses     36-3

link redundancy

See Flex Links

links, unidirectional     27-1

link state advertisements (LSAs)     35-30

link-state protocols     35-3

load balancing     37-3

local SPAN     28-2

logging messages, ACL     32-9

login authentication

with RADIUS     9-23

with TACACS+     9-14

login banners     7-17

log messages

See system message logging

Long-Reach Ethernet (LRE) technology     1-16, 1-23

loop guard

described     20-11

enabling     20-18

support for     1-6

M

MAC addresses

aging time     7-21

and VLAN association     7-20

building the address table     7-20

default configuration     7-21

discovering     7-27

displaying     7-26

displaying in the IP source binding table     22-18

dynamic

learning     7-20

removing     7-22

in ACLs     32-27

IP address association     35-9

static

adding     7-25

allowing     7-26

characteristics of     7-24

dropping     7-26

removing     7-25

MAC address notification, support for     1-11

MAC address-to-VLAN mapping     13-28

MAC extended access lists

applying to Layer 2 interfaces     32-29

configuring for QoS     33-45

creating     32-27

defined     32-27

for QoS classification     33-5

macros

See Smartports macros

magic packet     10-10

manageability features     1-5

management access

in-band

browser session     1-5

CLI session     1-5

device manager     1-5

SNMP     1-5

out-of-band console port connection     1-6

management options

CLI     2-1

clustering     1-3

CNS     4-1

Network Assistant     1-2

overview     1-4

switch stacks     1-3

mapping tables for QoS

configuring

CoS-to-DSCP     33-61

DSCP     33-61

DSCP-to-CoS     33-64

DSCP-to-DSCP-mutation     33-65

IP-precedence-to-DSCP     33-62

policed-DSCP     33-63

described     33-12

marking

action in policy map     33-48

action with aggregate policers     33-59

described     33-4, 33-8

matching, IPv4 ACLs     32-8

maximum aging time

MSTP     19-24

STP     18-23

maximum hop count, MSTP     19-24

maximum-paths command     35-49, 35-75

membership mode, VLAN port     13-3

member switch

defined     6-2

managing     6-4

recovering from lost connectivity     41-12

requirements     6-3

See also candidate switch, cluster standby group, and standby command switch

messages

to users through banners     7-17

messages, to users through banners     7-17

metrics, in BGP     35-50

metric translations, between routing protocols     35-81

metro tags     17-2

MHSRP     37-3

MIBs

accessing files with FTP     A-3

location of files     A-3

overview     31-1

SNMP interaction with     31-4

supported     A-1

mini-point-of-presence

See POP

mirroring traffic for analysis     28-1

mismatches, autonegotiation     41-12

module number     11-10

monitoring

access groups     32-41

BGP     35-62

cables for unidirectional links     27-1

CDP     26-5

CEF     35-74

EIGRP     35-40

monitoring (continued)

fallback bridging     40-11

features     1-11

Flex Links     21-3

HSRP     37-11

IEEE 802.1Q tunneling     17-18

IGMP

filters     24-26

snooping     24-13

interfaces     11-26

IP

address tables     35-18

multicast routing     38-50

routes     35-88

IPv4 ACL configuration     32-41

IPv6     36-22

Layer 2 protocol tunneling     17-18

MSDP peers     39-19

multicast router interfaces     24-14

multi-VRF CE     35-73

MVR     24-21

network traffic for analysis with probe     28-2

OSPF     35-34

port

blocking     25-17

protection     25-17

private VLANs     16-15

RP mapping information     38-23

SFP status     11-26, 41-14

source-active messages     39-19

speed and duplex mode     11-18

traffic flowing among switches     29-1

traffic suppression     25-17

tunneling     17-18

VLAN

filters     32-41

maps     32-41

VLANs     13-15

monitoring (continued)

VMPS     13-32

VTP     14-16

MSDP

benefits of     39-3

clearing MSDP connections and statistics     39-19

controlling source information

forwarded by switch     39-12

originated by switch     39-8

received by switch     39-14

default configuration     39-4

dense-mode regions

sending SA messages to     39-17

specifying the originating address     39-18

filtering

incoming SA messages     39-14

SA messages to a peer     39-12

SA requests from a peer     39-11

join latency, defined     39-6

meshed groups

configuring     39-16

defined     39-16

originating address, changing     39-18

overview     39-1

peer-RPF flooding     39-2

peers

configuring a default     39-4

monitoring     39-19

peering relationship, overview     39-1

requesting source information from     39-8

shutting down     39-16

MSDP (continued)

source-active messages

caching     39-6

clearing cache entries     39-19

defined     39-2

filtering from a peer     39-11

filtering incoming     39-14

filtering to a peer     39-12

limiting data with TTL     39-14

monitoring     39-19

restricting advertised sources     39-9

support for     1-10

MSTP

boundary ports

configuration guidelines     19-16

described     19-6

BPDU filtering

described     20-3

enabling     20-14

BPDU guard

described     20-3

enabling     20-13

CIST, described     19-3

CIST regional root      19-3

CIST root     19-5

configuration guidelines     19-15, 20-12

configuring

forward-delay time     19-23

hello time     19-22

link type for rapid convergence     19-25

maximum aging time     19-24

maximum hop count     19-24

MST region     19-16

neighbor type     19-25

path cost     19-21

port priority     19-20

root switch     19-17

secondary root switch     19-19

switch priority     19-22

MSTP (continued)

CST

defined     19-3

operations between regions     19-4

default configuration     19-15

default optional feature configuration     20-12

displaying status     19-26

enabling the mode     19-16

EtherChannel guard

described     20-10

enabling     20-17

extended system ID

effects on root switch     19-17

effects on secondary root switch     19-19

unexpected behavior     19-18

IEEE 802.1s

implementation     19-6

port role naming change     19-7

terminology     19-5

instances supported     18-10

interface state, blocking to forwarding     20-2

interoperability and compatibility among modes     18-11

interoperability with IEEE 802.1D

described     19-9

restarting migration process     19-26

IST

defined     19-3

master     19-3

operations within a region     19-3

loop guard

described     20-11

enabling     20-18

mapping VLANs to MST instance     19-16

MSTP (continued)

MST region

CIST     19-3

configuring     19-16

described     19-2

hop-count mechanism     19-5

IST     19-3

supported spanning-tree instances     19-2

optional features supported     1-6

overview     19-2

Port Fast

described     20-2

enabling     20-12

preventing root switch selection     20-10

root guard

described     20-10

enabling     20-17

root switch

configuring     19-18

effects of extended system ID     19-17

unexpected behavior     19-18

shutdown Port Fast-enabled port     20-3

stack changes, effects of     19-8

status, displaying     19-26

multicast groups

Immediate Leave     24-5

joining     24-3

leaving     24-5

static joins     24-10

multicast packets

ACLs on     32-40

blocking     25-7

multicast router interfaces, monitoring     24-14

multicast router ports, adding     24-9

Multicast Source Discovery Protocol

See MSDP

multicast storm     25-1

multicast storm-control command     25-4

multicast television application     24-15

multicast VLAN     24-15

Multicast VLAN Registration

See MVR

Multiple HSRP

See MHSRP

multiple VPN routing/forwarding in customer edge devices

See multi-VRF CE

multi-VRF CE

configuration example     35-69

configuration guidelines     35-66

configuring     35-65

default configuration     35-65

defined     35-63

displaying     35-73

monitoring     35-73

network components     35-65

packet-forwarding process     35-65

support for     1-10

MVR

and address aliasing     24-18

and IGMPv3     24-18

configuration guidelines     24-17

configuring interfaces     24-19

default configuration     24-17

described     24-15

example application     24-15

in the switch stack     24-17

modes     24-19

monitoring     24-21

multicast television application     24-15

setting global parameters     24-18

support for     1-4

N

named IPv4 ACLs     32-15

NameSpace Mapper

See NSM

native VLAN

and IEEE 802.1Q tunneling     17-4

configuring     13-23

default     13-23

neighbor discovery/recovery, EIGRP     35-35

neighbors, BGP     35-56

Network Assistant

benefits     1-2

described     1-4

downloading image files     1-2

guide mode     1-2

management options     1-2

managing switch stacks     5-2, 5-15

requirements     xl

upgrading a switch     B-19

wizards     1-2

network configuration examples

cost-effective wiring closet     1-16

high-performance wiring closet     1-16

increasing network performance     1-14

large network     1-21

long-distance, high-bandwidth transport     1-24

multidwelling network     1-23

providing network services     1-15

redundant Gigabit backbone     1-17

server aggregation and Linux server cluster     1-18

small to medium-sized network     1-19

network design

performance     1-15

services     1-15

network management

CDP     26-1

RMON     29-1

SNMP     31-1

Network Time Protocol

See NTP

no commands     2-4

nonhierarchical policy maps

configuration guidelines     33-33

configuring     33-48

described     33-9

non-IP traffic filtering     32-27

nontrunking mode     13-18

normal-range VLANs     13-4

configuration guidelines     13-6

configuration modes     13-7

configuring     13-4

defined     13-1

no switchport command     11-4

note, described     xl

not-so-stubby areas

See NSSA

NSM     4-3

NSSA, OSPF     35-30

NTP

associations

authenticating     7-5

defined     7-2

enabling broadcast messages     7-7

peer     7-6

server     7-6

default configuration     7-4

displaying the configuration     7-11

overview     7-2

restricting access

creating an access group     7-9

disabling NTP services per interface     7-10

source IP address, configuring     7-10

stratum     7-2

support for     1-5

synchronizing devices     7-6

NTP (continued)

time

services     7-2

synchronizing     7-2

O

offline configuration for switch stacks     5-7

Open Shortest Path First

See OSPF

optimizing system resources     8-1

options, management     1-4

OSPF

area parameters, configuring     35-30

configuring     35-28

default configuration

metrics     35-31

route     35-31

settings     35-26

described     35-25

for IPv6     36-20

interface parameters, configuring     35-28

LSA group pacing     35-33

monitoring     35-34

router IDs     35-33

route summarization     35-31

support for     1-10

virtual links     35-31

out-of-profile markdown     1-9

P

packet modification, with QoS     33-19

PAgP

Layer 2 protocol tunneling     17-9

See EtherChannel

parallel paths, in routing tables     35-75

passive interfaces

configuring     35-84

OSPF     35-31

passwords

default configuration     9-2

disabling recovery of     9-5

encrypting     9-3

for security     1-7

overview     9-1

recovery of     41-3

setting

enable     9-3

enable secret     9-3

Telnet     9-6

with usernames     9-6

VTP domain     14-8

path cost

MSTP     19-21

STP     18-19

path MTU discovery     36-4

PBR

defined     35-81

enabling     35-83

fast-switched policy-based routing     35-84

local policy-based routing     35-84

peers, BGP     35-56

performance, network design     1-14

performance features     1-3

persistent self-signed certificate     9-43

per-VLAN spanning-tree plus

See PVST+

PE to CE routing, configuring     35-68

physical ports     11-2

PIM

default configuration     38-9

dense mode

overview     38-4

rendezvous point (RP), described     38-4

RPF lookups     38-7

PIM (continued)

displaying neighbors     38-51

enabling a mode     38-12

overview     38-3

router-query message interval, modifying     38-26

shared tree and source tree, overview     38-24

shortest path tree, delaying the use of     38-25

sparse mode

join messages and shared tree     38-4

overview     38-4

prune messages     38-5

RPF lookups     38-7

support for     1-10

versions

interoperability     38-9

troubleshooting interoperability problems     38-23

v2 improvements     38-4

PIM-DVMRP, as snooping method     24-8

ping

character output description     41-15

executing     41-15

overview     41-14

PoE

auto mode     11-8

CDP with power consumption, described     11-6

CDP with power negotiation, described     11-6

Cisco intelligent power management     11-6

configuring     11-21

devices supported     11-6

high-power devices operating in low-power mode     11-6

IEEE power classification levels     11-7

powered-device detection and initial power allocation     11-7

power management modes     11-8

power negotiation extensions to CDP     11-6

standards supported     11-6

static mode     11-8

supported watts per port     11-6

troubleshooting     41-13

policed-DSCP map for QoS     33-63

policers

configuring

for each matched traffic class     33-48

for more than one traffic class     33-59

described     33-4

displaying     33-79

number of     33-34

types of     33-9

policing

described     33-4

hierarchical

See hierarchical policy maps

token-bucket algorithm     33-9

policy-based routing

See PBR

policy maps for QoS

characteristics of     33-48

described     33-7

displaying     33-80

hierarchical     33-8

hierarchical on SVIs

configuration guidelines     33-33

configuring     33-52

described     33-11

nonhierarchical on physical ports

configuration guidelines     33-33

configuring     33-48

described     33-9

POP     1-23

port ACLs

defined     32-2

types of     32-3

Port Aggregation Protocol

See EtherChannel

port-based authentication

accounting     10-5

authentication server

defined     10-2

RADIUS server     10-2

client, defined     10-2

configuration guidelines     10-14

configuring

802.1x authentication     10-16

guest VLAN     10-23

host mode     10-23

manual re-authentication of a client     10-20

periodic re-authentication     10-19

quiet period     10-20

RADIUS server     10-18

RADIUS server parameters on the switch     10-17

switch-to-client frame-retransmission number     10-21, 10-22

switch-to-client retransmission time     10-21

default configuration     10-13

described     10-1

device roles     10-2

displaying statistics     10-26

EAPOL-start frame     10-3

EAP-request/identity frame     10-3

EAP-response/identity frame     10-3

encapsulation     10-3

guest VLAN

configuration guidelines     10-10

described     10-10

host mode     10-6

initiation and message exchange     10-3

magic packet     10-10

method lists     10-16

multiple-hosts mode, described     10-6

port-based authentication (continued)

per-user ACLs

AAA authorization     10-16

configuration tasks     10-12

described     10-11

RADIUS server attributes     10-11

ports

authorization state and dot1x port-control command     10-4

authorized and unauthorized     10-4

voice VLAN     10-8

port security

and voice VLAN     10-7

described     10-7

interactions     10-7

multiple-hosts mode     10-6

resetting to default values     10-25

stack changes, effects of     10-12

statistics, displaying     10-26

switch

as proxy     10-2

RADIUS client     10-3

upgrading from a previous release     10-15, 33-26

VLAN assignment

AAA authorization     10-16

characteristics     10-9

configuration tasks     10-9

described     10-8

voice VLAN

described     10-8

PVID     10-8

VVID     10-8

wake-on-LAN, described     10-10

port blocking     1-4, 25-6

port-channel

See EtherChannel

Port Fast

described     20-2

enabling     20-12

mode, spanning tree     13-29

support for     1-6

port membership modes, VLAN     13-3

port priority

MSTP     19-20

STP     18-18

ports

10-Gigabit Ethernet module     11-6

access     11-3

blocking     25-6

dynamic access     13-3

IEEE 802.1Q tunnel     13-4

protected     25-5

routed     11-4

secure     25-7

static-access     13-3, 13-11

switch     11-2

trunks     13-3, 13-16

VLAN assignments     13-11

port security

aging     25-15

and QoS trusted boundary     33-38

and stacking     25-16

configuring     25-12

default configuration     25-10

described     25-7

displaying     25-17

on trunk ports     25-13

sticky learning     25-8

violations     25-9

with other features     25-10

port-shutdown response, VMPS     13-28

Power over Ethernet

See PoE

preferential treatment of traffic

See QoS

prefix lists, BGP     35-54

preventing unauthorized access     9-1

primary links     21-1

primary VLANs     16-1, 16-3

priority

HSRP     37-7

overriding CoS     15-6

trusting CoS     15-6

private VLAN edge ports

See protected ports

private VLANs

across multiple switches     16-4

and SDM template     16-4

and SVIs     16-5

and switch stacks     16-5

benefits of     16-1

community ports     16-2

community VLANs     16-2, 16-3

configuration guidelines     16-7, 16-8

configuration tasks     16-6

configuring     16-10

default configuration     16-6

end station access to     16-3

IP addressing     16-3

isolated port     16-2

isolated VLANs     16-2, 16-3

mapping     16-14

monitoring     16-15

ports

community     16-2

configuration guidelines     16-8

configuring host ports     16-11

configuring promiscuous ports     16-13

described     13-4

isolated     16-2

promiscuous     16-2

primary VLANs     16-1, 16-3

promiscuous ports     16-2

secondary VLANs     16-2

private VLANs (continued)

subdomains     16-1

traffic in     16-5

privileged EXEC mode     2-2

privilege levels

changing the default for lines     9-9

command switch     6-4

exiting     9-9

logging into     9-9

mapping on member switches     6-4

overview     9-2, 9-7

setting a command with     9-8

promiscuous ports

configuring     16-13

defined     16-2

protected ports     1-7, 25-5

protocol-dependent modules, EIGRP     35-35

Protocol-Independent Multicast Protocol

See PIM

provider edge devices     35-64

provisioning new members for a switch stack     5-7

proxy ARP

configuring     35-12

definition     35-10

with IP routing disabled     35-12

pruning, VTP

disabling

in VTP domain     14-14

on a port     13-23

enabling

in VTP domain     14-14

on a port     13-23

examples     14-5

overview     14-4

pruning-eligible list

changing     13-23

for VTP pruning     14-5

VLANs     14-14

PVST+

described     18-10

IEEE 802.1Q trunking interoperability     18-11

instances supported     18-10

Q

QoS

and MQC commands     33-1

auto-QoS

categorizing traffic     33-20

configuration and defaults display     33-30

configuration guidelines     33-25

described     33-20

disabling     33-27

displaying generated commands     33-27

displaying the initial configuration     33-30

effects on running configuration     33-25

egress queue defaults     33-21

enabling for VoIP     33-27

example configuration     33-28

ingress queue defaults     33-21

list of generated commands     33-22

basic model     33-4

classification

class maps, described     33-7

defined     33-4

DSCP transparency, described     33-39

flowchart     33-6

forwarding treatment     33-3

in frames and packets     33-3

IP ACLs, described     33-5, 33-7

MAC ACLs, described     33-5, 33-7

options for IP traffic     33-5

options for non-IP traffic     33-5

policy maps, described     33-7

trust DSCP, described     33-5

trusted CoS, described     33-5

trust IP precedence, described     33-5

QoS (continued)

class maps

configuring     33-46

displaying     33-79

configuration guidelines

auto-QoS     33-25

standard QoS     33-33

configuring

aggregate policers     33-59

auto-QoS     33-20

default port CoS value     33-37

DSCP maps     33-61

DSCP transparency     33-39

DSCP trust states bordering another domain     33-40

egress queue characteristics     33-72

ingress queue characteristics     33-67

IP extended ACLs     33-44

IP standard ACLs     33-43

MAC ACLs     33-45

policy maps, hierarchical     33-52

policy maps on physical ports     33-48

port trust states within the domain     33-36

trusted boundary     33-38

default auto configuration     33-20

default standard configuration     33-31

displaying statistics     33-79

DSCP transparency     33-39

egress queues

allocating buffer space     33-72

buffer allocation scheme, described     33-18

configuring shaped weights for SRR     33-76

configuring shared weights for SRR     33-77

described     33-4

displaying the threshold map     33-75

flowchart     33-17

mapping DSCP or CoS values     33-74

scheduling, described     33-4

setting WTD thresholds     33-72

WTD, described     33-19

QoS (continued)

enabling globally     33-35

flowcharts

classification     33-6

egress queueing and scheduling     33-17

ingress queueing and scheduling     33-15

policing and marking     33-10

implicit deny     33-7

ingress queues

allocating bandwidth     33-70

allocating buffer space     33-69

buffer and bandwidth allocation, described     33-16

configuring shared weights for SRR     33-70

configuring the priority queue     33-71

described     33-4

displaying the threshold map     33-68

flowchart     33-15

mapping DSCP or CoS values     33-68

priority queue, described     33-16

scheduling, described     33-4

setting WTD thresholds     33-68

WTD, described     33-16

IP phones

automatic classification and queueing     33-20

detection and trusted settings     33-20, 33-38

limiting bandwidth on egress interface     33-78

mapping tables

CoS-to-DSCP     33-61

displaying     33-79

DSCP-to-CoS     33-64

DSCP-to-DSCP-mutation     33-65

IP-precedence-to-DSCP     33-62

policed-DSCP     33-63

types of     33-12

marked-down actions     33-50, 33-56

marking, described     33-4, 33-8

overview     33-2

packet modification     33-19

QoS (continued)

policers

configuring     33-50, 33-56, 33-59

described     33-8

displaying     33-79

number of     33-34

types of     33-9

policies, attaching to an interface     33-9

policing

described     33-4, 33-8

token bucket algorithm     33-9

policy maps

characteristics of     33-48

displaying     33-80

hierarchical     33-8

hierarchical on SVIs     33-52

nonhierarchical on physical ports     33-48

QoS label, defined     33-4

queues

configuring egress characteristics     33-72

configuring ingress characteristics     33-67

high priority (expedite)     33-19, 33-78

location of     33-13

SRR, described     33-14

WTD, described     33-13

rewrites     33-19

support for     1-8

trust states

bordering another domain     33-40

described     33-5

trusted device     33-38

within the domain     33-36

quality of service

See QoS

queries, IGMP     24-4

R

RADIUS

attributes

vendor-proprietary     9-30

vendor-specific     9-29

configuring

accounting     9-28

authentication     9-23

authorization     9-27

communication, global     9-21, 9-29

communication, per-server     9-20, 9-21

multiple UDP ports     9-20

default configuration     9-20

defining AAA server groups     9-25

displaying the configuration     9-31

identifying the server     9-20

limiting the services to the user     9-27

method list, defined     9-20

operation of     9-19

overview     9-17

suggested network environments     9-18

support for     1-8

tracking services accessed by user     9-28

range

macro     11-13

of interfaces     11-12

rapid convergence     19-10

rapid per-VLAN spanning-tree plus

See rapid PVST+

rapid PVST+

described     18-10

IEEE 802.1Q trunking interoperability     18-11

instances supported     18-10

Rapid Spanning Tree Protocol

See RSTP

RARP     35-10

rcommand command     6-4

RCP

configuration files

downloading     B-17

overview     B-15

preparing the server     B-16

uploading     B-18

image files

deleting old image     B-33

downloading     B-31

preparing the server     B-29

uploading     B-33

reconfirmation interval, VMPS, changing     13-31

reconfirming dynamic VLAN membership     13-31

recovery procedures     41-1

redundancy

EtherChannel     34-2

HSRP     37-1

STP

backbone     18-8

multidrop backbone     20-5

path cost     13-26

port priority     13-24

redundant links and UplinkFast     20-15

reliable transport protocol, EIGRP     35-35

reloading software     3-16

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

Remote SPAN

See RSPAN

remote SPAN     28-3

report suppression, IGMP

described     24-6

disabling     24-13

requirements

cluster     xli

device manager     xl

Network Assistant     xl

resequencing ACL entries     32-15

resets, in BGP     35-48

resetting a UDLD-shutdown interface     27-6

restricting access

NTP services     7-8

overview     9-1

passwords and privilege levels     9-2

RADIUS     9-17

TACACS+     9-9

retry count, VMPS, changing     13-32

reverse address resolution     35-9

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP     35-20

1112, IP multicast and IGMP     24-2

1157, SNMPv1     31-2

1163, BGP     35-41

1166, IP addresses     35-6

1253, OSPF     35-25

1267, BGP     35-41

1305, NTP     7-2

1587, NSSAs     35-25

1757, RMON     29-2

1771, BGP     35-41

1901, SNMPv2C     31-2

1902 to 1907, SNMPv2     31-2

2236, IP multicast and IGMP     24-2

2273-2275, SNMPv3     31-2

RIP

advertisements     35-20

authentication     35-23

configuring     35-21

default configuration     35-21

described     35-20

RIP (continued)

for IPv6     36-18

hop counts     35-20

split horizon     35-23

summary addresses     35-23

support for     1-10

RMON

default configuration     29-3

displaying status     29-6

enabling alarms and events     29-3

groups supported     29-2

overview     29-1

statistics

collecting group Ethernet     29-6

collecting group history     29-5

support for     1-11

root guard

described     20-10

enabling     20-17

support for     1-6

root switch

MSTP     19-17

STP     18-16

route calculation timers, OSPF     35-31

route dampening, BGP     35-61

routed packets, ACLs on     32-39

routed ports

configuring     35-5

defined     11-4

IP addresses on     11-23, 35-5

route-map command     35-83

route maps

BGP     35-51

policy-based routing     35-81

router ACLs

defined     32-2

types of     32-4

route reflectors, BGP     35-59

router ID, OSPF     35-33

route selection, BGP     35-49

route summarization, OSPF     35-31

route targets, VPN     35-65

routing

default     35-3

dynamic     35-3

redistribution of information     35-78

static     35-3

routing domain confederation, BGP     35-59

Routing Information Protocol

See RIP

routing protocol administrative distances     35-76

RSPAN     28-3

and stack changes     28-10

characteristics     28-9

configuration guidelines     28-17

default configuration     28-11

destination ports     28-7

displaying status     28-24

in a switch stack     28-2

interaction with other features     28-9

monitored ports     28-6

monitoring ports     28-7

overview     1-11, 28-1

received traffic     28-5

session limits     28-11

sessions

creating     28-18

defined     28-4

limiting source traffic to specific VLANs     28-23

specifying monitored ports     28-18

with ingress traffic enabled     28-21

source ports     28-6

transmitted traffic     28-6

VLAN-based     28-7

RSTP

active topology     19-10

BPDU

format     19-12

processing     19-13

designated port, defined     19-9

designated switch, defined     19-9

interoperability with IEEE 802.1D

described     19-9

restarting migration process     19-26

topology changes     19-13

overview     19-9

port roles

described     19-9

synchronized     19-11

proposal-agreement handshake process     19-10

rapid convergence

cross-stack rapid convergence     19-11

described     19-10

edge ports and Port Fast     19-10

point-to-point links     19-10, 19-25

root ports     19-10

root port, defined     19-9

See also MSTP

running configuration, saving     3-10

S

scheduled reloads     3-16

SDM

described     8-1

switch stack consideration     5-9

templates

configuring     8-6

number of     8-1

SDM mismatch mode     5-9, 8-4

SDM template

aggregator     8-1

configuration guidelines     8-5

configuring     8-5

desktop     8-1

dual IPv4 and IPv6     8-2

types of     8-1

secondary VLANs     16-2

secure HTTP client

configuring     9-47

displaying     9-48

secure HTTP server

configuring     9-46

displaying     9-48

secure MAC addresses

and switch stacks     25-17

deleting     25-14

maximum number of     25-9

types of     25-8

secure ports

and switch stacks     25-16

configuring     25-7

secure remote connections     9-38

Secure Shell

See SSH

Secure Socket Layer

See SSL

security, port     25-7

security features     1-7

sequence numbers in log messages     31-8

server mode, VTP     14-3

service-provider network, MSTP and RSTP     19-1

service-provider networks

and customer VLANs     17-2

and IEEE 802.1Q tunneling     17-1

Layer 2 protocols across     17-8

Layer 2 protocol tunneling for EtherChannels     17-9

set-request operation     31-4

setup program

failed command switch replacement     41-11

replacing failed command switch     41-9

severity levels, defining in system messages     31-9

SFPs

monitoring status of     11-26, 41-14

numbering of     11-11

security and identification     41-13

status, displaying     41-14

shaped round robin

See SRR

show access-lists hw-summary command     32-22

show and more command output, filtering     2-10

show cdp traffic command     26-5

show cluster members command     6-4

show configuration command     11-22

show forward command     41-22

show interfaces command     11-18, 11-22

show l2protocol command     17-14, 17-16

show platform forward command     41-22

show running-config command

displaying ACLs     32-20, 32-21, 32-32, 32-34

interface description in     11-22

shutdown command on interfaces     11-27

shutdown threshold for Layer 2 protocol packets     17-11

Simple Network Management Protocol

See SNMP

small form-factor pluggable modules

See SFPs

Smartports macros

applying Cisco-default macros     12-6

applying global parameter values     12-5, 12-6

applying macros     12-5

applying parameter values     12-5, 12-7

configuration guidelines     12-3

creating     12-4

default configuration     12-2

defined     12-1

displaying     12-8

Smartports macros (continued)

tracing     12-3

website     12-2

SNAP     26-1

SNMP

accessing MIB variables with     31-4

agent

described     31-4

disabling     31-8

authentication level     31-10

community strings

configuring     31-8

for cluster switches     31-4

overview     31-4

configuration examples     31-15

default configuration     31-6

engine ID     31-7

groups     31-7, 31-9

host     31-7

ifIndex values     31-5

in-band management     1-5

informs

and trap keyword     31-11

described     31-5

differences from traps     31-5

disabling     31-14

enabling     31-14

limiting access by TFTP servers     31-15

limiting system log messages to NMS     31-10

manager functions     1-5, 31-3

managing clusters with     6-5

MIBs

location of     A-3

supported     A-1

notifications     31-5

overview     31-1, 31-4

security levels     31-3

status, displaying     31-16

system contact and location     31-14

SNMP (continued)

trap manager, configuring     31-13

traps

described     31-3, 31-5

differences from informs     31-5

disabling     31-14

enabling     31-11

enabling MAC address notification     7-22

overview     31-1, 31-4

types of     31-11

users     31-7, 31-9

versions supported     31-2

SNMPv1     31-2

SNMPv2C     31-2

SNMPv3     31-2

snooping, IGMP     24-1

software compatibility

See stacks, switch

software images

location in flash     B-20

recovery procedures     41-2

scheduling reloads     3-16

tar file format, described     B-20

See also downloading and uploading

source addresses, in IPv4 ACLs     32-12

source-and-destination-IP address based forwarding, EtherChannel     34-8

source-and-destination MAC address forwarding, EtherChannel     34-8

source-IP address based forwarding, EtherChannel     34-8

source-MAC address forwarding, EtherChannel     34-8

SPAN

and stack changes     28-10

configuration guidelines     28-11

default configuration     28-11

destination ports     28-7

displaying status     28-24

interaction with other features     28-9

monitored ports     28-6

SPAN (continued)

monitoring ports     28-7

overview     1-11, 28-1

ports, restrictions     25-11

received traffic     28-5

session limits     28-11

sessions

configuring ingress forwarding     28-15, 28-22

creating     28-12

defined     28-4

limiting source traffic to specific VLANs     28-16

removing destination (monitoring) ports     28-14

specifying monitored ports     28-12

with ingress traffic enabled     28-14

source ports     28-6

transmitted traffic     28-6

VLAN-based     28-7

spanning tree and native VLANs     13-19

Spanning Tree Protocol

See STP

SPAN traffic     28-5

speed, configuring on interfaces     11-17

split horizon, RIP     35-23

SRR

configuring

shaped weights on egress queues     33-76

shared weights on egress queues     33-77

shared weights on ingress queues     33-70

described     33-14

shaped mode     33-14

shared mode     33-14

support for     1-9

SSH

configuring     9-39

cryptographic software image     9-37

described     1-5, 9-38

encryption methods     9-38

switch stack considerations     5-16, 9-38

user authentication methods, supported     9-38

SSL

configuration guidelines     9-44

configuring a secure HTTP client     9-47

configuring a secure HTTP server     9-46

cryptographic software image     9-42

described     9-41

monitoring     9-48

stack, switch

MAC address of     5-19

stack changes

effects on

IPv6 routing     36-7

stack changes, effects on

802.1x port-based authentication     10-12

ACL configuration     32-7

CDP     26-2

cross-stack EtherChannel     34-12

EtherChannel     34-9

fallback bridging     40-3

HSRP     37-4

IGMP snooping     24-6

IP routing     35-4

MAC address tables     7-21

MSTP     19-8

multicast routing     38-8

MVR     24-15

port security     25-16

SDM template selection     8-4

SNMP     31-1

SPAN and RSPAN     28-10

STP     18-12

system message log     31-2

VLANs     13-6

VTP     14-6

stack master

bridge ID (MAC address)     5-5

defined     5-1

election     5-4

IPv6     36-8

re-election     5-4

See also stacks, switch

stack member

accessing CLI of specific member     5-22

configuring

member number     5-20

priority value     5-21

defined     5-1

displaying information of     5-22

IPv6     36-8

number     5-6

priority value     5-7

provisioning a new member     5-21

replacing     5-14

See also stacks, switch

stack member number     11-10

stack protocol version     5-10

stacks, switch

accessing CLI of specific member     5-22

assigning information

member number     5-20

priority value     5-21

provisioning a new member     5-21

auto-advise     5-11

auto-copy     5-11

auto-upgrade     5-11

benefits     1-2

bridge ID     5-5

CDP considerations     26-2

compatibility, software     5-10

configuration file     5-14

configuration scenarios     5-17

copying an image file from one member to another     B-34

default configuration     5-19

stacks, switch (continued)

description of     5-1

displaying information of     5-22

enabling persistent MAC address timer     5-19

hardware compatibility and SDM mismatch mode     5-9

HSRP considerations     37-4

incompatible software and image upgrades     5-14, B-34

IPv6 on     36-7

MAC address considerations     7-21

management connectivity     5-15

managing     5-1

membership     5-3

merged     5-3

MSTP instances supported     18-10

multicast routing, stack master and member roles     38-8

offline configuration

described     5-7

effects of adding a provisioned switch     5-7

effects of removing a provisioned switch     5-9

effects of replacing a provisioned switch     5-9

provisioned configuration, defined     5-7

provisioned switch, defined     5-7

provisioning a new member     5-21

partitioned     5-3, 41-8

provisioned switch

adding     5-7

removing     5-9

replacing     5-9

replacing a failed member     5-14

software compatibility     5-10

software image version     5-10

stack protocol version     5-10

STP

bridge ID     18-3

instances supported     18-10

root port selection     18-3

stack root switch election     18-3

stacks, switch (continued)

system messages

hostnames in the display     31-1

remotely monitoring     31-2

system prompt consideration     7-14

system-wide configuration considerations     5-15

upgrading     B-34

version-mismatch (VM) mode

automatic upgrades with auto-upgrade     5-11

described     5-10

examples     5-12

manual upgrades with auto-advise     5-11

See also stack master and stack member

StackWise technology, Cisco     1-3

See also stacks, switch

standby command switch, requirements     6-2

standby ip command     37-5

standby links     21-1

standby router     37-1

standby timers, HSRP     37-9

startup configuration

booting

manually     3-13

specific image     3-14

clearing     B-19

configuration file

automatically downloading     3-12

specifying the filename     3-12

default boot configuration     3-12

stateless autoconfiguration     36-5

static access ports

assigning to VLAN     13-11

defined     11-3, 13-3

static addresses

See addresses

static IP routing     1-10

static MAC addressing     1-7

static routes

configuring     35-75

configuring for IPv6     36-16

static routing     35-3

static VLAN membership     13-2

statistics

802.1x     10-26

CDP     26-5

interface     11-26

IP multicast routing     38-51

OSPF     35-34

QoS ingress and egress     33-79

RMON group Ethernet     29-6

RMON group history     29-5

SNMP input and output     31-16

VTP     14-16

sticky learning     25-8

storm control

configuring     25-3

described     25-1

disabling     25-5

displaying     25-17

support for     1-4

thresholds     25-1

STP

accelerating root port selection     20-4

BackboneFast

described     20-7

disabling     20-17

enabling     20-16

BPDU filtering

described     20-3

disabling     20-15

enabling     20-14

BPDU guard

described     20-3

disabling     20-14

enabling     20-13

BPDU message exchange     18-3

STP (continued)

configuration guidelines     18-13, 20-12

configuring

forward-delay time     18-23

hello time     18-22

maximum aging time     18-23

path cost     18-19

port priority     18-18

root switch     18-16

secondary root switch     18-17

spanning-tree mode     18-14

switch priority     18-21

counters, clearing     18-24

cross-stack UplinkFast

described     20-5

enabling     20-16

default configuration     18-13

default optional feature configuration     20-12

designated port, defined     18-4

designated switch, defined     18-4

detecting indirect link failures     20-8

disabling     18-15

displaying status     18-24

EtherChannel guard

described     20-10

disabling     20-17

enabling     20-17

extended system ID

effects on root switch     18-16

effects on the secondary root switch     18-17

overview     18-4

unexpected behavior     18-16

features supported     1-6

IEEE 802.1D and bridge ID     18-4

IEEE 802.1D and multicast addresses     18-9

IEEE 802.1t and VLAN identifier     18-4

inferior BPDU     18-3

instances supported     18-10

interface state, blocking to forwarding     20-2

STP (continued)

interface states

blocking     18-6

disabled     18-7

forwarding     18-6, 18-7

learning     18-7

listening     18-7

overview     18-5

interoperability and compatibility among modes     18-11

keepalive messages     18-2

Layer 2 protocol tunneling     17-8

limitations with IEEE 802.1Q trunks     18-11

load sharing

overview     13-24

using path costs     13-26

using port priorities     13-25

loop guard

described     20-11

enabling     20-18

modes supported     18-10

multicast addresses, effect of     18-9

optional features supported     1-6

overview     18-2

path costs     13-26, 13-27

Port Fast

described     20-2

enabling     20-12

port priorities     13-25

preventing root switch selection     20-10

protocols supported     18-10

redundant connectivity     18-8

root guard

described     20-10

enabling     20-17

root port, defined     18-3

root port selection on a switch stack     18-3

STP (continued)

root switch

configuring     18-16

effects of extended system ID     18-4, 18-16

election     18-3

unexpected behavior     18-16

shutdown Port Fast-enabled port     20-3

stack changes, effects of     18-12

status, displaying     18-24

superior BPDU     18-3

timers, described     18-22

UplinkFast

described     20-4

enabling     20-15

VLAN-bridge     18-11

stratum, NTP     7-2

stub areas, OSPF     35-30

subdomains, private VLAN     16-1

subnet mask     35-7

subnet zero     35-7

success response, VMPS     13-28

summer time     7-13

SunNet Manager     1-5

supernet     35-8

SVIs

and IP unicast routing     35-5

and router ACLs     32-4

connecting VLANs     11-9

defined     11-5

routing between VLANs     13-2

switch clustering technology     6-1

See also clusters, switch

switch console port     1-6

Switch Database Management

See SDM

switched packets, ACLs on     32-38

Switched Port Analyzer

See SPAN

switched ports     11-2

switchport block multicast command     25-7

switchport block unicast command     25-7

switchport command     11-15

switchport mode dot1q-tunnel command     17-6

switchport protected command     25-6

switch priority

MSTP     19-22

STP     18-21

switch software features     1-1

switch virtual interface

See SVI

synchronization, BGP     35-45

syslog

See system message logging

system clock

configuring

daylight saving time     7-13

manually     7-11

summer time     7-13

time zones     7-12

displaying the time and date     7-12

overview     7-2

See also NTP

system message logging

default configuration     31-4

defining error message severity levels     31-9

disabling     31-4

displaying the configuration     31-13

enabling     31-5

facility keywords, described     31-13

level keywords, described     31-10

limiting messages     31-10

message format     31-2

overview     31-1

sequence numbers, enabling and disabling     31-8

setting the display destination device     31-5

stack changes, effects of     31-2

synchronizing log messages     31-6

syslog facility     1-11

system message logging (continued)

time stamps, enabling and disabling     31-8

UNIX syslog servers

configuring the daemon     31-12

configuring the logging facility     31-12

facilities supported     31-13

system MTU and IEEE 802.1Q tunneling     17-5

system name

default configuration     7-15

default setting     7-15

manual configuration     7-15

See also DNS

system prompt, default setting     7-14, 7-15

system resources, optimizing     8-1

T

TACACS+

accounting, defined     9-11

authentication, defined     9-11

authorization, defined     9-11

configuring

accounting     9-16

authentication key     9-13

authorization     9-16

login authentication     9-14

default configuration     9-13

displaying the configuration     9-17

identifying the server     9-13

limiting the services to the user     9-16

operation of     9-12

overview     9-10

support for     1-8

tracking services accessed by user     9-16

tagged packets

IEEE 802.1Q     17-3

Layer 2 protocol     17-8

tar files

creating     B-6

displaying the contents of     B-7

extracting     B-7

image file format     B-20

TDR     1-11

Telnet

accessing management interfaces     2-11

number of connections     1-5

setting a password     9-6

templates, SDM     8-1

temporary self-signed certificate     9-43

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password     9-6

TFTP

configuration files

downloading     B-11

preparing the server     B-11

uploading     B-12

configuration files in base directory     3-6

configuring for autoconfiguration     3-6

image files

deleting     B-23

downloading     B-22

preparing the server     B-21

uploading     B-24

limiting access by servers     31-15

TFTP server     1-5

threshold, traffic level     25-2

time

See NTP and system clock

Time Domain Reflector

See TDR

time-range command     32-17

time ranges in ACLs     32-17

time stamps in log messages     31-8

time zones     7-12

Token Ring VLANs

support for     13-6

VTP support     14-4

ToS     1-9

traceroute, Layer 2

and ARP     41-17

and CDP     41-16

broadcast traffic     41-16

described     41-16

IP addresses and subnets     41-17

MAC addresses and VLANs     41-16

multicast traffic     41-16

multiple devices on a port     41-17

unicast traffic     41-16

usage guidelines     41-16

traceroute command     41-18

See also IP traceroute

traffic

blocking flooded     25-7

fragmented     32-5

unfragmented     32-5

traffic policing     1-9

traffic suppression     25-1

transparent mode, VTP     14-3, 14-12

trap-door mechanism     3-2

traps

configuring MAC address notification     7-22

configuring managers     31-11

defined     31-3

enabling     7-22, 31-11

notification types     31-11

overview     31-1, 31-4

troubleshooting

connectivity problems     41-14, 41-16, 41-17

detecting unidirectional links     27-1

displaying crash information     41-24

PIMv1 and PIMv2 interoperability problems     38-23

setting packet forwarding     41-22

SFP security and identification     41-13

troubleshooting (continued)

show forward command     41-22

with CiscoWorks     31-4

with debug commands     41-20

with ping     41-14

with system message logging     31-1

with traceroute     41-17

trunking encapsulation     1-7

trunk ports

configuring     13-21

defined     11-3, 13-3

encapsulation     13-21, 13-26, 13-27

trunks

allowed-VLAN list     13-22

configuring     13-21, 13-26, 13-27

ISL     13-16

load sharing

setting STP path costs     13-26

using STP port priorities     13-24, 13-25

native VLAN for untagged traffic     13-23

parallel     13-26

pruning-eligible list     13-23

to non-DTP device     13-17

trusted boundary for QoS     33-38

trusted port states

between QoS domains     33-40

classification options     33-5

ensuring port security for IP phones     33-38

support for     1-9

within a QoS domain     33-36

trustpoints, CA     9-42

tunneling

defined     17-1

IEEE 802.1Q     17-1

Layer 2 protocol     17-8

tunnel ports

defined     13-4

described     11-4, 17-1

tunnel ports (continued)

IEEE 802.1Q, configuring     17-6

incompatibilities with other features     17-6

twisted-pair Ethernet, detecting unidirectional links     27-1

type of service

See ToS

U

UDLD

configuration guidelines     27-4

default configuration     27-4

disabling

globally     27-5

on fiber-optic interfaces     27-5

per interface     27-6

echoing detection mechanism     27-3

enabling

globally     27-5

per interface     27-6

Layer 2 protocol tunneling     17-10

link-detection mechanism     27-1

neighbor database     27-2

overview     27-1

resetting an interface     27-6

status, displaying     27-7

support for     1-6

UDP, configuring     35-16

unauthorized ports with IEEE 802.1x     10-4

unicast MAC address filtering     1-5

and adding static addresses     7-25

and broadcast MAC addresses     7-25

and CPU packets     7-25

and multicast addresses     7-25

and router MAC addresses     7-25

configuration guidelines     7-25

described     7-25

unicast storm     25-1

unicast storm control command     25-4

unicast traffic, blocking     25-7

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration     31-12

facilities supported     31-13

message logging configuration     31-12

unrecognized Type-Length-Value (TLV) support     14-4

upgrading information

See release notes

upgrading software images

See downloading

UplinkFast

described     20-4

disabling     20-16

enabling     20-15

support for     1-6

uploading

configuration files

preparing     B-11, B-13, B-16

reasons for     B-9

using FTP     B-14

using RCP     B-18

using TFTP     B-12

image files

preparing     B-21, B-25, B-29

reasons for     B-19

using FTP     B-28

using RCP     B-33

using TFTP     B-24

User Datagram Protocol

See UDP

user EXEC mode     2-2

username-based authentication     9-6

V

version-dependent transparent mode     14-4

version-mismatch (VM) mode

automatic upgrades with auto-upgrade     5-11

described     5-10

displaying     5-11

manual upgrades with auto-advise     5-11

Virtual Private Network

See VPN

virtual router     37-1, 37-2

vlan.dat file     13-5

VLAN 1, disabling on a trunk port     13-22

VLAN 1 minimization     13-22

VLAN ACLs

See VLAN maps

vlan-assignment response, VMPS     13-28

VLAN configuration

at bootup     13-7

saving     13-7

VLAN configuration mode     2-2, 13-7

VLAN database

and startup configuration file     13-7

and VTP     14-1

VLAN configuration saved in     13-7

VLANs saved in     13-4

vlan database command     13-7

vlan dot1q tag native command     17-5

VLAN filtering and SPAN     28-7

vlan global configuration command     13-7

VLAN ID, discovering     7-27

VLAN management domain     14-2

VLAN Management Policy Server

See VMPS

VLAN map entries, order of     32-30

VLAN maps

applying     32-34

common uses for     32-34

configuration guidelines     32-30

configuring     32-30

creating     32-31

defined     32-2

denying access to a server example     32-36

denying and permitting packets     32-32

displaying     32-41

examples of ACLs and VLAN maps     32-32

removing     32-34

support for     1-7

wiring closet configuration example     32-35

VLAN membership

confirming     13-31

modes     13-3

VLAN Query Protocol

See VQP

VLANs

adding     13-8

adding to VLAN database     13-8

aging dynamic addresses     18-9

allowed on trunk     13-22

and spanning-tree instances     13-3, 13-6, 13-13

configuration guidelines, extended-range VLANs     13-12

configuration guidelines, normal-range VLANs     13-6

configuration options     13-7

configuring     13-1

configuring IDs 1006 to 4094     13-12

connecting through SVIs     11-9

creating in config-vlan mode     13-9

creating in VLAN configuration mode     13-10

customer numbering in service-provider networks     17-3

default configuration     13-8

deleting     13-10

described     11-2, 13-1

displaying     13-15

extended-range     13-1, 13-12

VLANs (continued)

features     1-7

illustrated     13-2

internal     13-13

in the switch stack     13-6

limiting source traffic with RSPAN     28-23

limiting source traffic with SPAN     28-16

modifying     13-8

multicast     24-15

native, configuring     13-23

normal-range     13-1, 13-4

number supported     1-7

parameters     13-5

port membership modes     13-3

static-access ports     13-11

STP and IEEE 802.1Q trunks     18-11

supported     13-2

Token Ring     13-6

traffic between     13-2

VLAN-bridge STP     18-11, 40-2

VTP modes     14-3

VLAN Trunking Protocol

See VTP

VLAN trunks     13-16

VMPS

administering     13-32

configuration example     13-33

configuration guidelines     13-29

default configuration     13-29

description     13-28

dynamic port membership

described     13-29

reconfirming     13-31

troubleshooting     13-33

entering server address     13-30

mapping MAC addresses to VLANs     13-28

monitoring     13-32

VMPS (continued)

reconfirmation interval, changing     13-31

reconfirming membership     13-31

retry count, changing     13-32

voice-over-IP     15-1

voice VLAN

Cisco 7960 phone, port connections     15-1

configuration guidelines     15-3

configuring IP phones for data traffic

override CoS of incoming frame     15-6

trust CoS priority of incoming frame     15-6

configuring ports for voice traffic in

802.1p priority tagged frames     15-5

802.1Q frames     15-5

connecting to an IP phone     15-4

default configuration     15-3

described     15-1

displaying     15-6

IP phone data traffic, described     15-2

IP phone voice traffic, described     15-2

VPN

configuring routing in     35-67

forwarding     35-65

in service provider networks     35-63

routes     35-64

VPN routing and forwarding table

See VRF

VQP     1-7, 13-28

VRF

defining     35-65

tables     35-63

VTP

adding a client to a domain     14-14

advertisements     13-19, 14-3

and extended-range VLANs     14-2

and normal-range VLANs     14-2

client mode, configuring     14-11

VTP (continued)

configuration

global configuration mode     14-7

guidelines     14-8

privileged EXEC mode     14-7

requirements     14-9

saving     14-7

VLAN configuration mode     14-8

configuration mode options     14-7

configuration requirements     14-9

configuration revision number

guideline     14-14

resetting     14-15

configuring

client mode     14-11

server mode     14-9

transparent mode     14-12

consistency checks     14-4

default configuration     14-7

described     14-1

disabling     14-12

domain names     14-8

domains     14-2

Layer 2 protocol tunneling     17-8

modes

client     14-3, 14-11

server     14-3, 14-9

transitions     14-3

transparent     14-3, 14-12

monitoring     14-16

passwords     14-8

pruning

disabling     14-14

enabling     14-14

examples     14-5

overview     14-4

support for     1-7

pruning-eligible list, changing     13-23

server mode, configuring     14-9

VTP (continued)

statistics     14-16

support for     1-7

Token Ring support     14-4

transparent mode, configuring     14-12

using     14-1

version, guidelines     14-9

Version 1     14-4

Version 2

configuration guidelines     14-9

disabling     14-13

enabling     14-13

overview     14-4

W

weighted tail drop

See WTD

wizards     1-2

WTD

described     33-13

setting thresholds

egress queue-sets     33-72

ingress queues     33-68

support for     1-9

X

Xmodem protocol     41-2