Catalyst 3750 Switch Software Configuration Guide, 12.2(44)SE
Index
Downloads: This chapterpdf (PDF - 1.95MB) The complete bookPDF (PDF - 14.32MB) | Feedback

Index

Table Of Contents

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X -

Index

Numerics

10-Gigabit Ethernet interfaces

configuration guidelines 11-16

defined 11-6

3750G integrated wireless LAN controller switch

configuring the switch A-4

controller and switch interaction A-3

internal ports

configuring A-4

reconfiguring A-5

A

AAA down policy, NAC Layer 2 IP validation 1-11

abbreviating commands 2-4

ABRs 36-25

AC (command switch) 6-10

access-class command 33-20

access control entries

See ACEs

access control entry (ACE) 39-3

access-denied response, VMPS 13-28

access groups

applying IPv4 ACLs to interfaces 33-21

Layer 2 33-21

Layer 3 33-21

accessing

clusters, switch 6-13

command switches 6-11

member switches 6-13

switch clusters 6-13

accessing stack members 5-24

access lists

See ACLs

access ports

and Layer 2 protocol tunneling 17-11

defined 11-3

in switch clusters 6-9

access template 8-1

accounting

with 802.1x 10-35

with IEEE 802.1x 10-9

with RADIUS 9-28

with TACACS+ 9-11, 9-17

ACEs

and QoS 34-7

defined 33-2

Ethernet 33-2

IP 33-2

ACLs

ACEs 33-2

any keyword 33-13

applying

on bridged packets 33-38

on multicast packets 33-40

on routed packets 33-39

on switched packets 33-38

time ranges to 33-17

to an interface 33-20, 39-8

to IPv6 interfaces 39-8

to QoS 34-7

classifying traffic for QoS 34-44

comments in 33-19

compiling 33-22

defined 33-1, 33-8

ACLs (continued)

examples of 33-22, 34-44

extended IP, configuring for QoS classification 34-45

extended IPv4

creating 33-11

matching criteria 33-8

hardware and software handling 33-22

host keyword 33-13

IP

creating 33-8

fragments and QoS guidelines 34-33

implicit deny 33-10, 33-14, 33-16

implicit masks 33-10

matching criteria 33-8

undefined 33-21

IPv4

applying to interfaces 33-20

creating 33-8

matching criteria 33-8

named 33-15

numbers 33-8

terminal lines, setting on 33-19

unsupported features 33-7

IPv6

and stacking 39-4

applying to interfaces 39-8

configuring 39-4, 39-5

displaying 39-9

interactions with other features 39-4

limitations 39-3

matching criteria 39-3

named 39-3

precedence of 39-2

supported 39-3

unsupported features 39-3

Layer 4 information in 33-37

ACLs (continued)

logging messages 33-9

MAC extended 33-27, 34-46

matching 33-8, 33-21, 39-3

monitoring 33-40, 39-9

named, IPv4 33-15

named, IPv6 39-3

names 39-5

number per QoS class map 34-33

port 33-2, 39-2

precedence of 33-2

QoS 34-7, 34-44

resequencing entries 33-15

router 33-2, 39-2

router ACLs and VLAN map configuration guidelines 33-37

standard IP, configuring for QoS classification 34-44

standard IPv4

creating 33-10

matching criteria 33-8

support for 1-9

support in hardware 33-22

time ranges 33-17

types supported 33-2

unsupported features, IPv4 33-7

unsupported features, IPv6 39-3

using router ACLs with VLAN maps 33-36

VLAN maps

configuration guidelines 33-30

configuring 33-29

active link 21-4, 21-5, 21-6

active links 21-2

active router 40-1

active traffic monitoring, IP SLAs 41-1

address aliasing 24-2

addresses

displaying the MAC address table 7-27

dynamic

accelerated aging 18-9

changing the aging time 7-21

default aging 18-9

defined 7-19

learning 7-20

removing 7-22

MAC, discovering 7-27

multicast

group address range 44-3

STP address management 18-9

static

adding and removing 7-24

defined 7-19

address resolution 7-27, 36-9

Address Resolution Protocol

See ARP

adjacency tables, with CEF 36-79

administrative distances

defined 36-91

OSPF 36-32

routing protocol defaults 36-81

advanced IP services image 37-1

advertisements

CDP 26-1

LLDP 27-2

RIP 36-20

VTP 13-19, 14-3

aggregatable global unicast addresses 37-3

aggregate addresses, BGP 36-60

aggregated ports

See EtherChannel

aggregate policers 34-59

aggregate policing 1-12

aggregator template 5-10, 8-1

aging, accelerating 18-9

aging time

accelerated

for MSTP 19-23

for STP 18-9, 18-23

MAC address table 7-21

maximum

for MSTP 19-24

for STP 18-23, 18-24

alarms, RMON 30-3

allowed-VLAN list 13-21

application engines, redirecting traffic to 43-1

area border routers

See ABRs

ARP

configuring 36-10

defined 1-6, 7-27, 36-9

encapsulation 36-11

static cache configuration 36-10

table

address resolution 7-27

managing 7-27

ASBRs 36-25

AS-path filters, BGP 36-54

asymmetrical links, and IEEE 802.1Q tunneling 17-4

attributes, RADIUS

vendor-proprietary 9-31

vendor-specific 9-29

audience xlv

authentication

EIGRP 36-40

HSRP 40-9

local mode with AAA 9-36

NTP associations 7-4

RADIUS

key 9-21

login 9-23

authentication (continued)

TACACS+

defined 9-11

key 9-13

login 9-14

See also port-based authentication

authentication failed VLAN

See restricted VLAN

authentication keys, and routing protocols 36-92

authoritative time source, described 7-2

authorization

with RADIUS 9-27

with TACACS+ 9-11, 9-16

authorized ports with IEEE 802.1x 10-7

autoconfiguration 3-3

automatic advise (auto-advise) in switch stacks 5-12

automatic copy (auto-copy) in switch stacks 5-11

automatic discovery

considerations

beyond a noncandidate device 6-8

brand new switches 6-9

connectivity 6-5

different VLANs 6-7

management VLANs 6-7

non-CDP-capable devices 6-6

noncluster-capable devices 6-6

routed ports 6-8

in switch clusters 6-5

See also CDP

automatic extraction (auto-extract) in switch stacks 5-11

automatic QoS

See QoS

automatic recovery, clusters 6-10

See also HSRP

automatic upgrades (auto-upgrade) in switch stacks 5-11

auto-MDIX

configuring 11-20

described 11-20

autonegotiation

duplex mode 1-4

interface configuration guidelines 11-17

mismatches 47-12

autonomous system boundary routers

See ASBRs

autonomous systems, in BGP 36-48

Auto-RP, described 44-6

autosensing, port speed 1-4

auxiliary VLAN

See voice VLAN

availability, features 1-7

B

BackboneFast

described 20-7

disabling 20-17

enabling 20-16

support for 1-7

backup interfaces

See Flex Links

backup links 21-2

banners

configuring

login 7-19

message-of-the-day login 7-18

default configuration 7-17

when displayed 7-17

Berkeley r-tools replacement 9-49

BGP

aggregate addresses 36-60

aggregate routes, configuring 36-60

CIDR 36-60

clear commands 36-63

community filtering 36-57

configuring neighbors 36-58

default configuration 36-45

described 36-44

BGP (continued)

enabling 36-48

monitoring 36-63

multipath support 36-52

neighbors, types of 36-48

path selection 36-52

peers, configuring 36-58

prefix filtering 36-56

resetting sessions 36-51

route dampening 36-62

route maps 36-54

route reflectors 36-61

routing domain confederation 36-61

routing session with multi-VRF CE 36-74

show commands 36-63

supernets 36-60

support for 1-13

Version 4 36-45

binding cluster group and HSRP group 40-11

binding database

address, DHCP server

See DHCP, Cisco IOS server database

DHCP snooping

See DHCP snooping binding database

bindings

address, Cisco IOS DHCP server 22-6

DHCP snooping database 22-7

IP source guard 22-16

binding table, DHCP snooping

See DHCP snooping binding database

blocking packets 25-7

Boolean expressions in tracked lists 42-4

booting

boot loader, function of 3-2

boot process 3-2

manually 3-18

specific image 3-19

boot loader

accessing 3-19

described 3-2

environment variables 3-19

prompt 3-19

trap-door mechanism 3-2

bootstrap router (BSR), described 44-7

Border Gateway Protocol

See BGP

BPDU

error-disabled state 20-2

filtering 20-3

RSTP format 19-12

BPDU filtering

described 20-3

disabling 20-15

enabling 20-14

support for 1-8

BPDU guard

described 20-2

disabling 20-14

enabling 20-13

support for 1-8

bridged packets, ACLs on 33-38

bridge groups

See fallback bridging

bridge protocol data unit

See BPDU

broadcast flooding 36-17

broadcast packets

directed 36-14

flooded 36-14

broadcast storm-control command 25-4

broadcast storms 25-1, 36-14

C

cables, monitoring for unidirectional links 28-1

candidate switch

automatic discovery 6-5

defined 6-4

requirements 6-4

See also command switch, cluster standby group, and member switch

Catalyst 3750G wireless LAN controller switch

accessing the controller A-6

displaying controller information A-7

features A-2

interaction with the controller A-3

internal port configuration A-4

internal port EtherChannel A-4

internal ports A-3

internal VLAN A-3

reconfiguring the internal ports A-5

switch stacks A-2

CA trustpoint

configuring 9-45

defined 9-43

caution, described xlvi

CDP

and trusted boundary 34-39

automatic discovery in switch clusters 6-5

configuring 26-2

default configuration 26-2

defined with LLDP 27-1

described 26-1

disabling for routing device26-3to 26-4

enabling and disabling

on an interface 26-4

on a switch 26-3

Layer 2 protocol tunneling 17-8

monitoring 26-5

overview 26-1

power negotiation extensions 11-6

CDP (continued)

support for 1-6

switch stack considerations 26-2

transmission timer and holdtime, setting 26-2

updates 26-2

CEF

defined 36-79

distributed 36-79

enabling 36-80

IPv6 37-25

CGMP

as IGMP snooping learning method 24-9

clearing cached group entries 44-61

enabling server support 44-44

joining multicast group 24-3

overview 44-9

server support only 44-9

switch support of 1-4

CIDR 36-60

CipherSuites 9-44

Cisco 7960 IP Phone 15-1

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco intelligent power management 11-6

Cisco IOS DHCP server

See DHCP, Cisco IOS DHCP server

Cisco IOS File System

See IFS

Cisco IOS IP SLAs 41-1

Cisco Network Assistant

See Network Assistant

Cisco StackWise technology 1-3

See also stacks, switch

CiscoWorks 2000 1-5, 32-4

CIST regional root

See MSTP

CIST root

See MSTP

civic location 27-3

classless interdomain routing

See CIDR

classless routing 36-8

class maps for QoS

configuring 34-47

described 34-7

displaying 34-79

class of service

See CoS

clearing interfaces 11-29

CLI

abbreviating commands 2-4

command modes 2-1

configuration logging 2-5

described 1-5

editing features

enabling and disabling 2-7

keystroke editing 2-7

wrapped lines 2-9

error messages 2-5

filtering command output 2-10

getting help 2-3

history

changing the buffer size 2-6

described 2-6

disabling 2-7

recalling commands 2-6

managing clusters 6-16

no and default forms of commands 2-4

client mode, VTP 14-3

client processes, tracking 42-1

clock

See system clock

cluster requirements xlvii

clusters, switch

accessing 6-13

automatic discovery 6-5

automatic recovery 6-10

benefits 1-2

compatibility 6-4

described 6-1

LRE profile considerations 6-16

managing

through CLI 6-16

through SNMP 6-17

planning 6-4

planning considerations

automatic discovery 6-5

automatic recovery 6-10

CLI 6-16

host names 6-13

IP addresses 6-13

LRE profiles 6-16

passwords 6-14

RADIUS 6-16

SNMP 6-14, 6-17

switch stacks 6-14

TACACS+ 6-16

See also candidate switch, command switch, cluster standby group, member switch, and standby command switch

cluster standby group

and HSRP group 40-11

automatic recovery 6-12

considerations 6-11

defined 6-2

requirements 6-3

virtual IP address 6-11

See also HSRP

CNS 1-5

Configuration Engine

configID, deviceID, hostname 4-3

configuration service 4-2

described 4-1

event service 4-3

embedded agents

described 4-5

enabling automated configuration 4-6

enabling configuration agent 4-9

enabling event agent 4-8

management functions 1-5

Coarse Wave Division Multiplexer

See CWDM SFPs

command-line interface

See CLI

command modes 2-1

commands

abbreviating 2-4

no and default 2-4

commands, setting privilege levels 9-8

command switch

accessing 6-11

active (AC) 6-10

configuration conflicts 47-12

defined 6-2

passive (PC) 6-10

password privilege levels 6-17

priority 6-10

recovery

from command-switch failure 6-10, 47-8

from lost member connectivity 47-12

redundant 6-10

replacing

with another switch 47-11

with cluster member 47-9

requirements 6-3

command switch (continued)

standby (SC) 6-10

See also candidate switch, cluster standby group, member switch, and standby command switch

community list, BGP 36-57

community ports 16-2

community strings

configuring 6-14, 32-8

for cluster switches 32-4

in clusters 6-14

overview 32-4

SNMP 6-14

community VLANs 16-2, 16-3

compatibility, feature 25-12

compatibility, software

See stacks, switch

config.text 3-17

configurable leave timer, IGMP 24-6

configuration, initial

defaults 1-14

Express Setup 1-2

See also getting started guide and hardware installation guide

configuration changes, logging 31-11

configuration conflicts, recovering from lost member connectivity 47-12

configuration examples, network 1-17

configuration files

archiving C-20

clearing the startup configuration C-19

creating using a text editor C-10

default name 3-17

deleting a stored configuration C-19

described C-8

configuration files (continued)

downloading

automatically 3-17

preparing C-10, C-13, C-16

reasons for C-8

using FTP C-13

using RCP C-17

using TFTP C-11

guidelines for creating and using C-9

guidelines for replacing and rolling back C-21

invalid combinations when copying C-5

limiting TFTP server access 32-16

obtaining with DHCP 3-9

password recovery disable considerations 9-5

replacing a running configuration C-19, C-20

rolling back a running configuration C-19, C-20

specifying the filename 3-17

system contact and location information 32-16

types and location C-10

uploading

preparing C-10, C-13, C-16

reasons for C-9

using FTP C-14

using RCP C-18

using TFTP C-12

configuration guidelines, multi-VRF CE 36-67

configuration logger 31-11

configuration logging 2-5

configuration replacement C-19

configuration rollback C-19, C-20

configuration settings, saving 3-15

configure terminal command 11-11

configuring small-frame arrival rate 25-5

config-vlan mode 2-2, 13-7

conflicts, configuration 47-12

connections, secure remote 9-38

connectivity problems 47-14, 47-16, 47-17

consistency checks in VTP Version 2 14-4

console port, connecting to 2-11

content-routing technology

See WCCP

control protocol, IP SLAs 41-4

conventions

command xlvi

for examples xlvi

publication xlvi

text xlvi

corrupted software, recovery steps with Xmodem 47-2

CoS

in Layer 2 frames 34-2

override priority 15-6

trust priority 15-6

CoS input queue threshold map for QoS 34-16

CoS output queue threshold map for QoS 34-19

CoS-to-DSCP map for QoS 34-61

counters, clearing interface 11-29

crashinfo file 47-24

critical authentication, IEEE 802.1x 10-39

cross-stack EtherChannel

configuration guidelines 35-13

configuring

on Layer 2 interfaces 35-13

on Layer 3 physical interfaces 35-16

described 35-3

illustration 35-4

support for 1-7

cross-stack UplinkFast, STP

described 20-5

disabling 20-16

enabling 20-16

fast-convergence events 20-7

Fast Uplink Transition Protocol 20-6

normal-convergence events 20-7

support for 1-7

cryptographic software image

Kerberos 9-32

SSH 9-37

cryptographic software image (continued)

SSL 9-42

switch stack considerations 5-2, 5-16, 9-38

customer edge devices 36-65

CWDM SFPs 1-27

D

daylight saving time 7-13

dCEF, in the switch stack 36-79

debugging

enabling all system diagnostics 47-21

enabling for a specific feature 47-20

redirecting error message output 47-21

using commands 47-20

default commands 2-4

default configuration

802.1x 10-23

auto-QoS 34-21

banners 7-17

BGP 36-45

booting 3-17

CDP 26-2

DHCP 22-8

DHCP option 82 22-9

DHCP snooping 22-9

DHCP snooping binding database 22-9

DNS 7-16

dynamic ARP inspection 23-5

EIGRP 36-36

EtherChannel 35-11

Ethernet interfaces 11-15

fallback bridging 46-4

Flex Links 21-7, 21-8

HSRP 40-5

IEEE 802.1Q tunneling 17-4

IGMP 44-38

IGMP filtering 24-25

IGMP snooping 24-7, 38-5, 38-6

default configuration (continued)

IGMP throttling 24-25

initial switch information 3-3

IP addressing, IP routing 36-6

IP multicast routing 44-10

IP SLAs 41-6

IP source guard 22-17

IPv6 37-20

Layer 2 interfaces 11-15

Layer 2 protocol tunneling 17-11

LLDP 27-3

MAC address table 7-21

MAC address-table move update 21-8

MSDP 45-4

MSTP 19-15

multi-VRF CE 36-67

MVR 24-20

NTP 7-4

optional spanning-tree configuration 20-12

OSPF 36-26

password and privilege level 9-2

PIM 44-10

private VLANs 16-7

RADIUS 9-20

RIP 36-20

RMON 30-3

RSPAN 29-11

SDM template 8-5

SNMP 32-7

SPAN 29-11

SSL 9-45

standard QoS 34-31

STP 18-13

switch stacks 5-19

system message logging 31-4

system name and prompt 7-15

TACACS+ 9-13

UDLD 28-4

VLAN, Layer 2 Ethernet interfaces 13-19

default configuration (continued)

VLANs 13-8

VMPS 13-29

voice VLAN 15-3

VTP 14-7

WCCP 43-5

default gateway 3-15, 36-12

default networks 36-82

default routes 36-82

default routing 36-3

deleting VLANs 13-10

denial-of-service attack 25-1

description command 11-24

designing your network, examples 1-17

desktop template 5-10, 8-1

destination addresses

in IPv4 ACLs 33-12

in IPv6 ACLs 39-6

destination-IP address-based forwarding, EtherChannel 35-9

destination-MAC address forwarding, EtherChannel 35-8

detecting indirect link failures, STP 20-8

device C-23

device discovery protocol 26-1, 27-1

device manager

benefits 1-2

described 1-2, 1-5

in-band management 1-6

requirements xlvi

upgrading a switch C-23

DHCP

Cisco IOS server database

configuring 22-14

default configuration 22-9

described 22-6

enabling

relay agent 22-11

server 22-10

DHCP-based autoconfiguration

client request message exchange 3-4

configuring

client side 3-4

DNS 3-7

relay device 3-8

server side 3-6

server-side 22-10

TFTP server 3-7

example 3-10

lease options

for IP address information 3-6

for receiving the configuration file 3-7

overview 3-3

relationship to BOOTP 3-4

relay support 1-6, 1-13

support for 1-6

DHCP-based autoconfiguration and image update

configuring3-11to 3-14

understanding3-5to 3-6

DHCP binding database

See DHCP snooping binding database

DHCP binding table

See DHCP snooping binding database

DHCP option 82

circuit ID suboption 22-5

configuration guidelines 22-9

default configuration 22-8

displaying 22-16

forwarding address, specifying 22-11

helper address 22-11

overview 22-3

packet format, suboption

circuit ID 22-5

remote ID 22-5

remote ID suboption 22-5

DHCP snooping

accepting untrusted packets form edge switch 22-3, 22-13

and private VLANs 22-14

binding database

See DHCP snooping binding database

configuration guidelines 22-9

default configuration 22-8

displaying binding tables 22-16

message exchange process 22-4

option 82 data insertion 22-3

trusted interface 22-2

untrusted interface 22-2

untrusted messages 22-2

DHCP snooping binding database

adding bindings 22-15

binding file

format 22-7

location 22-7

bindings 22-7

clearing agent statistics 22-15

configuration guidelines 22-10

configuring 22-15

default configuration 22-8, 22-9

deleting

binding file 22-15

bindings 22-15

database agent 22-15

described 22-7

displaying 22-16

binding entries 22-16

status and statistics 22-16

enabling 22-15

entry 22-7

renewing database 22-15

resetting

delay value 22-15

timeout value 22-15

DHCP snooping binding table

See DHCP snooping binding database

Differentiated Services architecture, QoS 34-2

Differentiated Services Code Point 34-2

Diffusing Update Algorithm (DUAL) 36-35

directed unicast requests 1-6

directories

changing C-4

creating and removing C-4

displaying the working C-4

discovery, clusters

See automatic discovery

Distance Vector Multicast Routing Protocol

See DVMRP

distance-vector protocols 36-3

distribute-list command 36-91

DNS

and DHCP-based autoconfiguration 3-7

default configuration 7-16

displaying the configuration 7-17

in IPv6 37-4

overview 7-15

setting up 7-16

support for 1-6

DNS-based SSM mapping 44-19, 44-21

documentation, related xlvi

document conventions xlvi

domain names

DNS 7-15

VTP 14-8

Domain Name System

See DNS

dot1q-tunnel switchport mode 13-18

double-tagged packets

IEEE 802.1Q tunneling 17-2

Layer 2 protocol tunneling 17-10

downloading

configuration files

preparing C-10, C-13, C-16

reasons for C-8

using FTP C-13

using RCP C-17

using TFTP C-11

image files

deleting old image C-27

preparing C-26, C-29, C-33

reasons for C-23

using CMS 1-3

using FTP C-30

using HTTP 1-3, C-23

using RCP C-35

using TFTP C-26

using the device manager or Network Assistant C-23

drop threshold for Layer 2 protocol packets 17-11

DSCP 1-11, 34-2

DSCP input queue threshold map for QoS 34-16

DSCP output queue threshold map for QoS 34-19

DSCP-to-CoS map for QoS 34-64

DSCP-to-DSCP-mutation map for QoS 34-65

DSCP transparency 34-40

DTP 1-8, 13-17

DUAL finite state machine, EIGRP 36-35

Dual IPv4-and-IPv6 SDM Templates 37-19

dual IPv4 and IPv6 templates 8-2, 37-1, 37-18

dual protocol stacks

configuring 37-23

IPv4 and IPv6 37-18

SDM templates supporting 37-19

DVMRP

autosummarization

configuring a summary address 44-58

disabling 44-60

connecting PIM domain to DVMRP router 44-51

enabling unicast routing 44-54

DVRMP (continued)

interoperability

with Cisco devices 44-49

with Cisco IOS software 44-9

mrinfo requests, responding to 44-53

neighbors

advertising the default route to 44-52

discovery with Probe messages 44-49

displaying information 44-53

prevent peering with nonpruning 44-56

rejecting nonpruning 44-55

overview 44-8

routes

adding a metric offset 44-60

advertising all 44-60

advertising the default route to neighbors 44-52

caching DVMRP routes learned in report messages 44-54

changing the threshold for syslog messages 44-57

deleting 44-61

displaying 44-62

favoring one over another 44-60

limiting the number injected into MBONE 44-57

limiting unicast route advertisements 44-49

routing table 44-9

source distribution tree, building 44-9

support for 1-13

tunnels

configuring 44-51

displaying neighbor information 44-53

dynamic access ports

characteristics 13-3

configuring 13-30

defined 11-3

dynamic addresses

See addresses

dynamic ARP inspection

ARP cache poisoning 23-1

ARP requests, described 23-1

dynamic ARP inspection (continued)

ARP spoofing attack 23-1

clearing

log buffer 23-16

statistics 23-15

configuration guidelines 23-6

configuring

ACLs for non-DHCP environments 23-8

in DHCP environments 23-7

log buffer 23-13

rate limit for incoming ARP packets 23-4, 23-11

default configuration 23-5

denial-of-service attacks, preventing 23-11

described 23-1

DHCP snooping binding database 23-2

displaying

ARP ACLs 23-15

configuration and operating state 23-15

log buffer 23-16

statistics 23-15

trust state and rate limit 23-15

error-disabled state for exceeding rate limit 23-4

function of 23-2

interface trust states 23-3

log buffer

clearing 23-16

configuring 23-13

displaying 23-16

logging of dropped packets, described 23-5

man-in-the middle attack, described 23-2

network security issues and interface trust states 23-3

priority of ARP ACLs and DHCP snooping entries 23-4

rate limiting of ARP packets

configuring 23-11

described 23-4

error-disabled state 23-4

dynamic ARP inspection (continued)

statistics

clearing 23-15

displaying 23-15

validation checks, performing 23-12

dynamic auto trunking mode 13-18

dynamic desirable trunking mode 13-18

Dynamic Host Configuration Protocol

See DHCP-based autoconfiguration

dynamic port VLAN membership

described 13-28

reconfirming 13-31

troubleshooting 13-33

types of connections 13-30

dynamic routing 36-3

Dynamic Trunking Protocol

See DTP

E

EBGP 36-43

editing features

enabling and disabling 2-7

keystrokes used 2-7

wrapped lines 2-9

EIGRP

authentication 36-40

components 36-35

configuring 36-39

default configuration 36-36

definition 36-35

interface parameters, configuring 36-40

monitoring 36-43

stub routing 36-42

elections

See stack master

ELIN location 27-3

enable password 9-3

enable secret password 9-3

encryption, CipherSuite 9-44

encryption for passwords 9-3

Enhanced IGRP

See EIGRP

enhanced object tracking

commands 42-1

defined 42-1

HSRP 42-7

IP routing state 42-2

IP SLAs 42-9

line-protocol state 42-2

tracked lists 42-3

environment variables, function of 3-20

equal-cost routing 1-13, 36-80

error-disabled state, BPDU 20-2

error messages during command entry 2-5

EtherChannel

automatic creation of 35-5, 35-7

channel groups

binding physical and logical interfaces 35-4

numbering of 35-4

configuration guidelines 35-12

configuring

Layer 2 interfaces 35-13

Layer 3 physical interfaces 35-16

Layer 3 port-channel logical interfaces 35-15

default configuration 35-11

described 35-2

displaying status 35-23

forwarding methods 35-8, 35-18

IEEE 802.3ad, described 35-7

interaction

with STP 35-12

with VLANs 35-12

EtherChannel (continued)

LACP

described 35-7

displaying status 35-23

hot-standby ports 35-20

interaction with other features 35-7

modes 35-7

port priority 35-22

system priority 35-21

Layer 3 interface 36-5

load balancing 35-8, 35-18

logical interfaces, described 35-4

PAgP

aggregate-port learners 35-19

compatibility with Catalyst 1900 35-19

described 35-5

displaying status 35-23

interaction with other features 35-6

learn method and priority configuration 35-19

modes 35-6

support for 1-4

port-channel interfaces

described 35-4

numbering of 35-4

port groups 11-5

stack changes, effects of 35-10

support for 1-4

EtherChannel guard

described 20-10

disabling 20-17

enabling 20-17

Ethernet VLANs

adding 13-9

defaults and ranges 13-8

modifying 13-9

EUI 37-4

events, RMON 30-3

examples

conventions for xlvi

network configuration 1-17

expedite queue for QoS 34-78

Express Setup 1-2

See also getting started guide

extended crashinfo file 47-24

extended-range VLANs

configuration guidelines 13-13

configuring 13-12

creating 13-14

creating with an internal VLAN ID 13-15

defined 13-1

extended system ID

MSTP 19-17

STP 18-4, 18-16

extended universal identifier

See EUI

Extensible Authentication Protocol over LAN 10-1

external BGP

See EBGP

external neighbors, BGP 36-48

F

fa0 interface 1-6

failover support 1-7

fallback bridging

and protected ports 46-4

bridge groups

creating 46-4

described 46-2

displaying 46-11

function of 46-2

number supported 46-5

removing 46-5

fallback bridging (continued)

bridge table

clearing 46-11

displaying 46-11

configuration guidelines 46-4

connecting interfaces with 11-10

default configuration 46-4

described 46-1

frame forwarding

flooding packets 46-2

forwarding packets 46-2

overview 46-1

protocol, unsupported 46-4

stack changes, effects of 46-3

STP

disabling on an interface 46-10

forward-delay interval 46-9

hello BPDU interval 46-9

interface priority 46-7

keepalive messages 18-2

maximum-idle interval 46-10

path cost 46-8

VLAN-bridge spanning-tree priority 46-6

VLAN-bridge STP 46-2

support for 1-13

SVIs and routed ports 46-2

unsupported protocols 46-4

VLAN-bridge STP 18-11

Fast Convergence 21-3

Fast Uplink Transition Protocol 20-6

features, incompatible 25-12

FIB 36-79

fiber-optic, detecting unidirectional links 28-1

files

basic crashinfo

description 47-24

location 47-24

copying C-5

crashinfo, description 47-24

files (continued)

deleting C-5

displaying the contents of C-8

extended crashinfo

description 47-25

location 47-25

tar

creating C-6

displaying the contents of C-7

extracting C-7

image file format C-24

file system

displaying available file systems C-2

displaying file information C-3

local file system names C-1

network file system names C-5

setting the default C-3

filtering

in a VLAN 33-29

IPv6 traffic 39-4, 39-8

non-IP traffic 33-27

show and more command output 2-10

filtering show and more command output 2-10

filters, IP

See ACLs, IP

flash device, number of C-1

Flex Link Multicast Fast Convergence 21-3

Flex Links

configuration guidelines 21-8

configuring 21-8, 21-9

configuring preferred VLAN 21-11

configuring VLAN load balancing 21-10

default configuration 21-7

description 21-1

link load balancing 21-2

monitoring 21-14

VLANs 21-2

flooded traffic, blocking 25-8

flow-based packet classification 1-11

flowcharts

QoS classification 34-6

QoS egress queueing and scheduling 34-17

QoS ingress queueing and scheduling 34-15

QoS policing and marking 34-10

flowcontrol

configuring 11-19

described 11-19

forward-delay time

MSTP 19-23

STP 18-23

Forwarding Information Base

See FIB

forwarding nonroutable protocols 46-1

FTP

accessing MIB files B-3

configuration files

downloading C-13

overview C-12

preparing the server C-13

uploading C-14

image files

deleting old image C-31

downloading C-30

preparing the server C-29

uploading C-31

G

general query 21-5

Generating IGMP Reports 21-3

get-bulk-request operation 32-3

get-next-request operation 32-3, 32-5

get-request operation 32-3, 32-5

get-response operation 32-3

Gigabit modules

See SFPs

global configuration mode 2-2

global leave, IGMP 24-13

guest VLAN and 802.1x 10-13

guide

audience xlv

purpose of xlv

guide mode 1-3

GUIs

See device manager and Network Assistant

H

hardware limitations and Layer 3 interfaces 11-25

hello time

MSTP 19-22

STP 18-22

help, for the command line 2-3

hierarchical policy maps 34-8

configuration guidelines 34-33

configuring 34-53

described 34-11

history

changing the buffer size 2-6

described 2-6

disabling 2-7

recalling commands 2-6

history table, level and number of syslog messages 31-10

host names, in clusters 6-13

host ports

configuring 16-12

kinds of 16-2

hosts, limit on dynamic ports 13-33

Hot Standby Router Protocol

See HSRP

HP OpenView 1-5

HSRP

authentication string 40-9

automatic cluster recovery 6-12

binding to cluster group 40-11

cluster standby group considerations 6-11

command-switch redundancy 1-1, 1-7

HSRP (continued)

configuring 40-4

default configuration 40-5

definition 40-1

guidelines 40-5

monitoring 40-11

object tracking 42-7

overview 40-1

priority 40-7

routing redundancy 1-12

support for ICMP redirect messages 40-11

switch stack considerations 40-4

timers 40-9

tracking 40-7

See also clusters, cluster standby group, and standby command switch

HTTP over SSL

see HTTPS

HTTPS 9-43

configuring 9-46

self-signed certificate 9-43

HTTP secure server 9-43

I

IBPG 36-43

ICMP

IPv6 37-4

redirect messages 36-12

support for 1-13

time-exceeded messages 47-18

traceroute and 47-18

unreachable messages 33-20

unreachable messages and IPv6 39-4

unreachables and ACLs 33-22

ICMP Echo operation

configuring 41-12

IP SLAs 41-11

ICMP ping

executing 47-15

overview 47-14

ICMP Router Discovery Protocol

See IRDP

ICMPv6 37-4

IDS appliances

and ingress RSPAN 29-22

and ingress SPAN 29-15

IEEE 802.1D

See STP

IEEE 802.1p 15-1

IEEE 802.1Q

and trunk ports 11-3

configuration limitations 13-19

encapsulation 13-16

native VLAN for untagged traffic 13-23

tunneling

compatibility with other features 17-6

defaults 17-4

described 17-1

tunnel ports with other features 17-6

IEEE 802.1s

See MSTP

IEEE 802.1w

See RSTP

IEEE 802.1x

See port-based authentication

IEEE 802.3ad

See EtherChannel

IEEE 802.3af

See PoE

IEEE 802.3x flow control 11-19

ifIndex values, SNMP 32-6

IFS 1-6

IGMP

configurable leave timer

described 24-6

enabling 24-11

configuring the switch

as a member of a group 44-39

statically connected member 44-43

controlling access to groups 44-40

default configuration 44-38

deleting cache entries 44-62

displaying groups 44-62

fast switching 44-43

flooded multicast traffic

controlling the length of time 24-12

disabling on an interface 24-13

global leave 24-13

query solicitation 24-13

recovering from flood mode 24-13

host-query interval, modifying 44-41

joining multicast group 24-3

join messages 24-3

leave processing, enabling 24-11, 38-9

leaving multicast group 24-5

multicast reachability 44-39

overview 44-3

queries 24-4

report suppression

described 24-6

disabling 24-16, 38-11

supported versions 24-3

support for 1-4

Version 1

changing to Version 2 44-41

described 44-3

IGMP (continued)

Version 2

changing to Version 1 44-41

described 44-3

maximum query response time value 44-43

pruning groups 44-43

query timeout value 44-42

IGMP filtering

configuring 24-25

default configuration 24-25

described 24-24

monitoring 24-29

support for 1-4

IGMP groups

configuring filtering 24-28

setting the maximum number 24-27

IGMP helper 1-4, 44-6

IGMP Immediate Leave

configuration guidelines 24-11

described 24-5

enabling 24-11

IGMP profile

applying 24-26

configuration mode 24-25

configuring 24-26

IGMP snooping

and address aliasing 24-2

and stack changes 24-7

configuring 24-7

default configuration 24-7, 38-5, 38-6

definition 24-2

enabling and disabling 24-8, 38-6

global configuration 24-8

Immediate Leave 24-5

in the switch stack 24-6

method 24-8

monitoring 24-16, 38-11

IGMP snooping (continued)

querier

configuration guidelines 24-14

configuring 24-14

supported versions 24-3

support for 1-4

VLAN configuration 24-8

IGMP throttling

configuring 24-28

default configuration 24-25

described 24-25

displaying action 24-29

IGP 36-25

Immediate Leave, IGMP 24-5

enabling 38-9

inaccessible authentication bypass 10-15

initial configuration

defaults 1-14

Express Setup 1-2

See also getting started guide and hardware installation guide

integrated wireless LAN controller switch

see 3750G integrated wireless LAN controller switch

interface

number 11-10

range macros 11-13

interface command11-10to 11-11

interface configuration mode 2-3

interfaces

auto-MDIX, configuring 11-20

configuration guidelines

10-Gigabit Ethernet 11-16

duplex and speed 11-17

configuring

for IPv4 and IPv6 37-23

procedure 11-11

counters, clearing 11-29

default configuration 11-15

described 11-24

interfaces (continued)

descriptive name, adding 11-24

displaying information about 11-28

flow control 11-19

management 1-5

monitoring 11-28

naming 11-24

physical, identifying 11-10

range of 11-12

restarting 11-29, 11-30

shutting down 11-29

speed and duplex, configuring 11-18

status 11-28

supported 11-10

types of 11-1

interfaces range macro command 11-13

interface types 11-10

Interior Gateway Protocol

See IGP

internal BGP

See IBGP

internal neighbors, BGP 36-48

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Internet Protocol version 6

See IPv6

Inter-Switch Link

See ISL

inter-VLAN routing 1-13, 36-2

Intrusion Detection System

See IDS appliances

inventory management TLV 27-3, 27-6

IP ACLs

for QoS classification 34-7

implicit deny 33-10, 33-14

implicit masks 33-10

IP ACLs (continued)

named 33-15

undefined 33-21

IP addresses

128-bit 37-2

candidate or member 6-4, 6-13

classes of 36-7

cluster access 6-2

command switch 6-3, 6-11, 6-13

default configuration 36-6

discovering 7-27

for IP routing 36-5

IPv6 37-2

MAC address association 36-9

monitoring 36-18

redundant clusters 6-11

standby command switch 6-11, 6-13

See also IP information

IP base image 1-1

IP broadcast address 36-16

ip cef distributed command 36-79

IP directed broadcasts 36-14

ip igmp profile command 24-25

IP information

assigned

manually 3-14

through DHCP-based autoconfiguration 3-3

default configuration 3-3

IP multicast routing

addresses

all-hosts 44-3

all-multicast-routers 44-3

host group address range 44-3

administratively-scoped boundaries, described 44-47

and IGMP snooping 24-2

IP multicast routing (continued)

Auto-RP

adding to an existing sparse-mode cloud 44-26

benefits of 44-26

clearing the cache 44-62

configuration guidelines 44-12

filtering incoming RP announcement messages 44-29

overview 44-6

preventing candidate RP spoofing 44-29

preventing join messages to false RPs 44-28

setting up in a new internetwork 44-26

using with BSR 44-34

bootstrap router

configuration guidelines 44-12

configuring candidate BSRs 44-32

configuring candidate RPs 44-33

defining the IP multicast boundary 44-31

defining the PIM domain border 44-30

overview 44-7

using with Auto-RP 44-34

Cisco implementation 44-2

configuring

basic multicast routing 44-12

IP multicast boundary 44-47

default configuration 44-10

enabling

multicast forwarding 44-13

PIM mode 44-13

group-to-RP mappings

Auto-RP 44-6

BSR 44-7

MBONE

deleting sdr cache entries 44-62

described 44-45

displaying sdr cache 44-63

enabling sdr listener support 44-46

limiting DVMRP routes advertised 44-57

limiting sdr cache entry lifetime 44-46

IP multicast routing (continued)

MBONE (continued)

SAP packets for conference session announcement 44-45

Session Directory (sdr) tool, described 44-45

monitoring

packet rate loss 44-63

peering devices 44-63

tracing a path 44-63

multicast forwarding, described 44-7

PIMv1 and PIMv2 interoperability 44-11

protocol interaction 44-2

reverse path check (RPF) 44-7

routing table

deleting 44-62

displaying 44-62

RP

assigning manually 44-24

configuring Auto-RP 44-26

configuring PIMv2 BSR 44-30

monitoring mapping information 44-34

using Auto-RP and BSR 44-34

stacking

stack master functions 44-9

stack member functions 44-10

statistics, displaying system and network 44-62

See also CGMP

See also DVMRP

See also IGMP

See also PIM

IP phones

and QoS 15-1

automatic classification and queueing 34-20

configuring 15-4

ensuring port security with QoS 34-39

trusted boundary for QoS 34-39

IP precedence 34-2

IP-precedence-to-DSCP map for QoS 34-62

IP protocols

in ACLs 33-12

routing 1-12

IP routes, monitoring 36-93

IP routing

connecting interfaces with 11-9

disabling 36-19

enabling 36-19

IP Service Level Agreements

See IP SLAs

IP service levels, analyzing 41-1

IP services image 1-1

IP SLAs

benefits 41-2

configuration guidelines 41-6

configuring object tracking 42-9

Control Protocol 41-4

default configuration 41-6

definition 41-1

ICMP echo operation 41-11

measuring network performance 41-3

monitoring 41-14

multioperations scheduling 41-5

object tracking 42-9

operation 41-3

reachability tracking 42-9

responder

described 41-4

enabling 41-8

response time 41-4

scheduling 41-5

SNMP support 41-2

supported metrics 41-2

threshold monitoring 41-6

track state 42-9

UDP jitter operation 41-8

IP source guard

and 802.1x 22-18

and DHCP snooping 22-16

and EtherChannels 22-18

and port security 22-18

and private VLANs 22-18

and routed ports 22-17

and TCAM entries 22-18

and trunk interfaces 22-18

and VRF 22-18

binding configuration

automatic 22-16

manual 22-16

binding table 22-16

configuration guidelines 22-17

default configuration 22-17

described 22-16

disabling 22-19

displaying

bindings 22-20

configuration 22-20

enabling 22-18

filtering

source IP address 22-17

source IP and MAC address 22-17

on provisioned switches 22-18

source IP address filtering 22-17

source IP and MAC address filtering 22-17

static bindings

adding 22-18

deleting 22-19

IP traceroute

executing 47-18

overview 47-17

IP unicast routing

address resolution 36-9

administrative distances 36-81, 36-91

ARP 36-9

assigning IP addresses to Layer 3 interfaces 36-7

IP unicast routing (continued)

authentication keys 36-92

broadcast

address 36-16

flooding 36-17

packets 36-14

storms 36-14

classless routing 36-8

configuring static routes 36-81

default

addressing configuration 36-6

gateways 36-12

networks 36-82

routes 36-82

routing 36-3

directed broadcasts 36-14

disabling 36-19

dynamic routing 36-3

enabling 36-19

EtherChannel Layer 3 interface 36-5

IGP 36-25

inter-VLAN 36-2

IP addressing

classes 36-7

configuring 36-5

IPv6 37-3

IRDP 36-12

Layer 3 interfaces 36-5

MAC address and IP address 36-9

passive interfaces 36-90

protocols

distance-vector 36-3

dynamic 36-3

link-state 36-3

proxy ARP 36-9

redistribution 36-83

reverse address resolution 36-9

routed ports 36-5

static routing 36-3

IP unicast routing (continued)

steps to configure 36-5

subnet mask 36-7

subnet zero 36-7

supernet 36-8

UDP 36-15

with SVIs 36-5

See also BGP

See also EIGRP

See also OSPF

See also RIP

IPv4 ACLs

applying to interfaces 33-20

extended, creating 33-11

named 33-15

standard, creating 33-10

IPv4 and IPv6

configuring on an interface 37-23

differences 37-2

dual protocol stacks 37-10

IPv6

ACLs

displaying 39-9

limitations 39-3

matching criteria 39-3

port 39-2

precedence 39-2

router 39-2

supported 39-3

addresses 37-2

address formats 37-3

advantages 37-2

and switch stacks 37-17

applications 37-10

assigning address 37-21

autoconfiguration 37-5

autogenerated address 37-6

CEFv6 37-25

configuring static routes 37-26

IPv6 (continued)

default configuration 37-20

defined 37-1

duplicate-address detection 37-5

enabling 37-21

Enhanced Interior Gateway Routing Protocol (EIGRP) IPv6 37-11

EIGRP IPv6 Commands 37-12

Passive Interfaces 37-12

Prefix Lists 37-12

Router ID 37-12

feature limitations 37-16

features not supported 37-16

global prefixes 37-5

ICMP 37-4

ICMP rate limiting 37-25

link-local address 37-5, 37-6

monitoring 37-32

neighbor discovery 37-4

OSPF 37-30

path MTU discovery 37-4

reasons for 37-1

RIP 37-28

router advertisement messages 37-5

router advertisements 37-6

SDM templates 8-2, 37-18, 38-1, 39-1

stack master functions 37-18

Stateless Autoconfiguration 37-5

supported features 37-3

switch limitations 37-16

IPv6 traffic, filtering 39-4

IRDP

configuring 36-13

definition 36-12

support for 1-13

ISL

and IPv6 37-3

and trunk ports 11-3

encapsulation 1-8, 13-16

trunking with IEEE 802.1 tunneling 17-5

isolated port 16-2

isolated VLANs 16-2, 16-3

J

join messages, IGMP 24-3

K

KDC

described 9-32

See also Kerberos

keepalive messages 18-2

Kerberos

authenticating to

boundary switch 9-34

KDC 9-34

network services 9-35

configuration examples 9-32

configuring 9-35

credentials 9-32

cryptographic software image 9-32

described 9-32

KDC 9-32

operation 9-34

realm 9-33

server 9-33

support for 1-11

switch as trusted third party 9-32

terms 9-33

TGT 9-34

tickets 9-32

key distribution center

See KDC

L

l2protocol-tunnel command 17-13

LACP

Layer 2 protocol tunneling 17-9

See EtherChannel

LAN base image 39-1

Layer 2 frames, classification with CoS 34-2

Layer 2 interfaces, default configuration 11-15

Layer 2 protocol tunneling

configuring 17-10

configuring for EtherChannels 17-14

default configuration 17-11

defined 17-8

guidelines 17-12

Layer 2 traceroute

and ARP 47-17

and CDP 47-16

broadcast traffic 47-16

described 47-16

IP addresses and subnets 47-17

MAC addresses and VLANs 47-16

multicast traffic 47-16

multiple devices on a port 47-17

unicast traffic 47-16

usage guidelines 47-16

Layer 3 features 1-12

Layer 3 interfaces

assigning IP addresses to 36-7

assigning IPv4 and IPv6 addresses to 37-23

assigning IPv6 addresses to 37-22

changing from Layer 2 mode 36-7, 36-71, 36-72

types of 36-5

Layer 3 packets, classification methods 34-2

LDAP 4-2

Leaking IGMP Reports 21-4

LEDs, switch

See hardware installation guide

lightweight directory access protocol

See LDAP

line configuration mode 2-3

Link Aggregation Control Protocol

See EtherChannel

link failure, detecting unidirectional 19-8

Link Layer Discovery Protocol

See CDP

link local unicast addresses 37-4

link redundancy

See Flex Links

links, unidirectional 28-1

link state advertisements (LSAs) 36-30

link-state protocols 36-3

link-state tracking

configuring 35-25

described 35-23

LLDP

configuring 27-3

characteristics 27-4

default configuration 27-3

disabling and enabling

globally 27-5

on an interface 27-5

monitoring and maintaining 27-7

overview 27-1

supported TLVs 27-2

switch stack considerations 27-2

transmission timer and holdtime, setting 27-4

LLDP-MED

configuring

procedures 27-3

TLVs 27-6

monitoring and maintaining 27-7

overview 27-1, 27-2

supported TLVs 27-2

LLDP Media Endpoint Discovery

See LLDP-MED

load balancing 40-3

local SPAN 29-2

location TLV 27-3, 27-6

logging messages, ACL 33-9

login authentication

with RADIUS 9-23

with TACACS+ 9-14

login banners 7-17

log messages

See system message logging

Long-Reach Ethernet (LRE) technology 1-19, 1-26

loop guard

described 20-11

enabling 20-18

support for 1-8

LRE profiles, considerations in switch clusters 6-16

M

MAB aging timer 1-9

MAB inactivity timer

default setting 10-24

range 10-26

MAC/PHY configuration status TLV 27-2

MAC addresses

aging time 7-21

and VLAN association 7-20

building the address table 7-20

default configuration 7-21

discovering 7-27

displaying 7-27

displaying in the IP source binding table 22-20

dynamic

learning 7-20

removing 7-22

in ACLs 33-27

IP address association 36-9

MAC addresses (continued)

static

adding 7-25

allowing 7-26

characteristics of 7-24

dropping 7-26

removing 7-25

MAC address notification, support for 1-14

MAC address-table move update

configuration guidelines 21-8

configuring 21-12

default configuration 21-8

description 21-6

monitoring 21-14

MAC address-to-VLAN mapping 13-28

MAC authentication bypass 10-10

See MAB

MAC extended access lists

applying to Layer 2 interfaces 33-28

configuring for QoS 34-46

creating 33-27

defined 33-27

for QoS classification 34-5

macros

See Smartports macros

magic packet 10-18

manageability features 1-5

management access

in-band

browser session 1-6

CLI session 1-6

device manager 1-6

SNMP 1-6

out-of-band console port connection 1-6

management address TLV 27-2

management options

CLI 2-1

clustering 1-3

CNS 4-1

management (continued)

Network Assistant 1-2

overview 1-5

switch stacks 1-3

management VLAN

considerations in switch clusters 6-7

discovery through different management VLANs 6-7

mapping tables for QoS

configuring

CoS-to-DSCP 34-61

DSCP 34-61

DSCP-to-CoS 34-64

DSCP-to-DSCP-mutation 34-65

IP-precedence-to-DSCP 34-62

policed-DSCP 34-63

described 34-12

marking

action with aggregate policers 34-59

described 34-4, 34-8

matching

IPv6 ACLs 39-3

matching, IPv4 ACLs 33-8

maximum aging time

MSTP 19-24

STP 18-23

maximum hop count, MSTP 19-24

maximum-paths command 36-52, 36-80

MDA

configuration guidelines10-20to 10-21

described 1-10, 10-20

exceptions with authentication process 10-4

membership mode, VLAN port 13-3

member switch

automatic discovery 6-5

defined 6-2

managing 6-16

passwords 6-13

recovering from lost connectivity 47-12

member switch (continued)

requirements 6-4

See also candidate switch, cluster standby group, and standby command switch

messages, to users through banners 7-17

metrics, in BGP 36-52

metric translations, between routing protocols 36-86

metro tags 17-2

MHSRP 40-3

MIBs

accessing files with FTP B-3

location of files B-3

overview 32-1

SNMP interaction with 32-4

supported B-1

mini-point-of-presence

See POP

mirroring traffic for analysis 29-1

mismatches, autonegotiation 47-12

module number 11-10

monitoring

access groups 33-40

BGP 36-63

cables for unidirectional links 28-1

CDP 26-5

CEF 36-80

EIGRP 36-43

fallback bridging 46-11

features 1-14

Flex Links 21-14

HSRP 40-11

IEEE 802.1Q tunneling 17-18

IGMP

filters 24-29

snooping 24-16, 38-11

interfaces 11-28

monitoring (continued)

IP

address tables 36-18

multicast routing 44-61

routes 36-93

IP SLAs operations 41-14

IPv4 ACL configuration 33-40

IPv6 37-32

IPv6 ACL configuration 39-9

Layer 2 protocol tunneling 17-18

MAC address-table move update 21-14

MSDP peers 45-18

multicast router interfaces 24-17, 38-12

multi-VRF CE 36-78

MVR 24-24

network traffic for analysis with probe 29-2

object tracking 42-10

OSPF 36-34

port

blocking 25-20

protection 25-20

private VLANs 16-15

RP mapping information 44-34

SFP status 11-29, 47-14

source-active messages 45-18

speed and duplex mode 11-18

SSM mapping 44-22

traffic flowing among switches 30-1

traffic suppression 25-20

tunneling 17-18

VLAN

filters 33-41

maps 33-41

VLANs 13-16

VMPS 13-32

VTP 14-16

mrouter Port 21-3

mrouter port 21-5

MSDP

benefits of 45-3

clearing MSDP connections and statistics 45-18

controlling source information

forwarded by switch 45-11

originated by switch 45-9

received by switch 45-13

default configuration 45-4

dense-mode regions

sending SA messages to 45-16

specifying the originating address 45-17

filtering

incoming SA messages 45-14

SA messages to a peer 45-12

SA requests from a peer 45-10

join latency, defined 45-6

meshed groups

configuring 45-15

defined 45-15

originating address, changing 45-17

overview 45-1

peer-RPF flooding 45-2

peers

configuring a default 45-4

monitoring 45-18

peering relationship, overview 45-1

requesting source information from 45-8

shutting down 45-15

source-active messages

caching 45-6

clearing cache entries 45-18

defined 45-2

filtering from a peer 45-10

filtering incoming 45-14

filtering to a peer 45-12

limiting data with TTL 45-13

monitoring 45-18

restricting advertised sources 45-9

support for 1-13

MSTP

boundary ports

configuration guidelines 19-16

described 19-6

BPDU filtering

described 20-3

enabling 20-14

BPDU guard

described 20-2

enabling 20-13

CIST, described 19-3

CIST regional root 19-3

CIST root 19-5

configuration guidelines 19-15, 20-12

configuring

forward-delay time 19-23

hello time 19-22

link type for rapid convergence 19-24

maximum aging time 19-24

maximum hop count 19-24

MST region 19-16

neighbor type 19-25

path cost 19-21

port priority 19-19

root switch 19-17

secondary root switch 19-19

switch priority 19-22

CST

defined 19-3

operations between regions 19-4

default configuration 19-15

default optional feature configuration 20-12

displaying status 19-26

enabling the mode 19-16

EtherChannel guard

described 20-10

enabling 20-17

MSTP (continued)

extended system ID

effects on root switch 19-17

effects on secondary root switch 19-19

unexpected behavior 19-18

IEEE 802.1s

implementation 19-6

port role naming change 19-7

terminology 19-5

instances supported 18-10

interface state, blocking to forwarding 20-2

interoperability and compatibility among modes 18-11

interoperability with IEEE 802.1D

described 19-9

restarting migration process 19-26

IST

defined 19-3

master 19-3

operations within a region 19-3

loop guard

described 20-11

enabling 20-18

mapping VLANs to MST instance 19-16

MST region

CIST 19-3

configuring 19-16

described 19-2

hop-count mechanism 19-5

IST 19-3

supported spanning-tree instances 19-2

optional features supported 1-7

overview 19-2

Port Fast

described 20-2

enabling 20-12

preventing root switch selection 20-10

MSTP (continued)

root guard

described 20-10

enabling 20-18

root switch

configuring 19-18

effects of extended system ID 19-17

unexpected behavior 19-18

shutdown Port Fast-enabled port 20-2

stack changes, effects of 19-8

status, displaying 19-26

multicast groups

Immediate Leave 24-5

joining 24-3

leaving 24-5

static joins 24-10, 38-8

multicast packets

ACLs on 33-40

blocking 25-8

multicast router interfaces, monitoring 24-17, 38-12

multicast router ports, adding 24-9, 38-8

Multicast Source Discovery Protocol

See MSDP

multicast storm 25-1

multicast storm-control command 25-4

multicast television application 24-18

multicast VLAN 24-17

Multicast VLAN Registration

See MVR

multidomain authentication

See MDA

multioperations scheduling, IP SLAs 41-5

Multiple HSRP

See MHSRP

multiple VPN routing/forwarding in customer edge devices

See multi-VRF CE

multi-VRF CE

configuration example 36-74

configuration guidelines 36-67

configuring 36-66

default configuration 36-67

defined 36-64

displaying 36-78

monitoring 36-78

network components 36-66

packet-forwarding process 36-66

support for 1-13

MVR

and address aliasing 24-21

and IGMPv3 24-21

configuration guidelines 24-20

configuring interfaces 24-22

default configuration 24-20

described 24-17

example application 24-18

in the switch stack 24-20

modes 24-21

monitoring 24-24

multicast television application 24-18

setting global parameters 24-21

support for 1-4

N

NAC

AAA down policy 1-11

critical authentication 10-15, 10-39

IEEE 802.1x authentication using a RADIUS server 10-43

IEEE 802.1x validation using RADIUS server 10-43

inaccessible authentication bypass 1-11, 10-39

Layer 2 IEEE 802.1x validation 1-11, 10-20, 10-43

Layer 2 IP validation 1-11

named IPv4 ACLs 33-15

NameSpace Mapper

See NSM

native VLAN

and IEEE 802.1Q tunneling 17-4

configuring 13-23

default 13-23

neighbor discovery, IPv6 37-4

neighbor discovery/recovery, EIGRP 36-35

neighbors, BGP 36-58

Network Admission Control

NAC

Network Admission Control Software Configuration Guide 10-45, 10-46

Network Assistant

benefits 1-2

described 1-5

downloading image files 1-3

guide mode 1-3

management options 1-2

managing switch stacks 5-2, 5-16

requirements xlvi

upgrading a switch C-23

wizards 1-3

network configuration examples

cost-effective wiring closet 1-19

high-performance wiring closet 1-20

increasing network performance 1-17

large network 1-24

long-distance, high-bandwidth transport 1-27

multidwelling network 1-26

providing network services 1-18

redundant Gigabit backbone 1-20

server aggregation and Linux server cluster 1-21

small to medium-sized network 1-22

network design

performance 1-18

services 1-18

network management

CDP 26-1

RMON 30-1

SNMP 32-1

network performance, measuring with IP SLAs 41-3

network policy TLV 27-2, 27-6

Network Time Protocol

See NTP

no commands 2-4

nonhierarchical policy maps

configuration guidelines 34-33

described 34-9

non-IP traffic filtering 33-27

nontrunking mode 13-18

normal-range VLANs 13-4

configuration guidelines 13-6

configuration modes 13-7

configuring 13-4

defined 13-1

no switchport command 11-4

note, described xlvi

not-so-stubby areas

See NSSA

NSM 4-3

NSSA, OSPF 36-30

NTP

associations

authenticating 7-4

defined 7-2

enabling broadcast messages 7-6

peer 7-5

server 7-5

default configuration 7-4

displaying the configuration 7-11

overview 7-2

restricting access

creating an access group 7-8

disabling NTP services per interface 7-10

source IP address, configuring 7-10

NTP (continued)

stratum 7-2

support for 1-6

synchronizing devices 7-5

time

services 7-2

synchronizing 7-2

O

object tracking

HSRP 42-7

IP SLAs 42-9

IP SLAs, configuring 42-9

monitoring 42-10

offline configuration for switch stacks 5-7

online diagnostics

overview 48-1

running tests 48-3

understanding 48-1

Open Shortest Path First

See OSPF

optimizing system resources 8-1

options, management 1-5

OSPF

area parameters, configuring 36-30

configuring 36-28

default configuration

metrics 36-32

route 36-31

settings 36-26

described 36-25

for IPv6 37-30

interface parameters, configuring 36-29

LSA group pacing 36-33

monitoring 36-34

router IDs 36-33

route summarization 36-31

OSPF (continued)

support for 1-12

virtual links 36-31

out-of-profile markdown 1-12

P

packet modification, with QoS 34-19

PAgP

Layer 2 protocol tunneling 17-9

See EtherChannel

parallel paths, in routing tables 36-80

passive interfaces

configuring 36-90

OSPF 36-32

passwords

default configuration 9-2

disabling recovery of 9-5

encrypting 9-3

for security 1-9

in clusters 6-14

overview 9-1

recovery of 47-3

setting

enable 9-3

enable secret 9-3

Telnet 9-6

with usernames 9-6

VTP domain 14-8

path cost

MSTP 19-21

STP 18-20

path MTU discovery 37-4

PBR

defined 36-86

enabling 36-88

fast-switched policy-based routing 36-89

local policy-based routing 36-89

PC (passive command switch) 6-10

peers, BGP 36-58

percentage thresholds in tracked lists 42-6

performance, network design 1-17

performance features 1-4

persistent self-signed certificate 9-43

per-VLAN spanning-tree plus

See PVST+

PE to CE routing, configuring 36-74

physical ports 11-2

PIM

default configuration 44-10

dense mode

overview 44-4

rendezvous point (RP), described 44-5

RPF lookups 44-8

displaying neighbors 44-62

enabling a mode 44-13

overview 44-4

router-query message interval, modifying 44-37

shared tree and source tree, overview 44-35

shortest path tree, delaying the use of 44-36

sparse mode

join messages and shared tree 44-5

overview 44-5

prune messages 44-5

RPF lookups 44-8

stub routing

configuration guidelines 44-23

displaying 44-62

enabling 44-23

overview 44-5

support for 1-13

versions

interoperability 44-11

troubleshooting interoperability problems 44-35

v2 improvements 44-4

PIM-DVMRP, as snooping method 24-9

ping

character output description 47-15

executing 47-15

overview 47-14

PoE

auto mode 11-8

CDP with power consumption, described 11-6

CDP with power negotiation, described 11-6

Cisco intelligent power management 11-6

configuring 11-21

devices supported 11-6

high-power devices operating in low-power mode 11-7

IEEE power classification levels 11-7

power budgeting 11-22

power consumption 11-22

powered-device detection and initial power allocation 11-7

power management modes 11-8

power negotiation extensions to CDP 11-6

standards supported 11-6

static mode 11-8

supported watts per port 11-6

troubleshooting 47-13

policed-DSCP map for QoS 34-63

policers

configuring

for each matched traffic class 34-49

for more than one traffic class 34-59

described 34-4

displaying 34-79

number of 34-34

types of 34-9

policing

described 34-4

hierarchical

See hierarchical policy maps

token-bucket algorithm 34-9

policy-based routing

See PBR

policy maps for QoS

characteristics of 34-49

described 34-7

displaying 34-80

hierarchical 34-8

hierarchical on SVIs

configuration guidelines 34-33

configuring 34-53

described 34-11

nonhierarchical on physical ports

configuration guidelines 34-33

described 34-9

POP 1-26

port ACLs

defined 33-2

types of 33-3

Port Aggregation Protocol

See EtherChannel

port-based authentication

accounting 10-9

authentication server

defined 10-3

RADIUS server 10-3

client, defined 10-2

configuration guidelines 10-24

configuring

802.1x authentication 10-28

guest VLAN 10-36

host mode 10-31

inaccessible authentication bypass 10-39

manual re-authentication of a client 10-32

periodic re-authentication 10-32

quiet period 10-33

RADIUS server 10-30

RADIUS server parameters on the switch 10-29

restricted VLAN 10-37

port-based authentication (continued)

configuring (continued)

switch-to-client frame-retransmission number 10-34

switch-to-client retransmission time 10-33

default configuration 10-23

described 10-1

device roles 10-2

displaying statistics 10-47

EAPOL-start frame 10-5

EAP-request/identity frame 10-5

EAP-response/identity frame 10-5

encapsulation 10-3

guest VLAN

configuration guidelines 10-14, 10-15

described 10-13

host mode 10-8

inaccessible authentication bypass

configuring 10-39

described 10-15

guidelines 10-26

initiation and message exchange 10-5

magic packet 10-18

method lists 10-28

multiple-hosts mode, described 10-8

per-user ACLs

AAA authorization 10-28

configuration tasks 10-13

described 10-12

RADIUS server attributes 10-12

ports

authorization state and dot1x port-control command 10-7

authorized and unauthorized 10-7

critical 10-15

voice VLAN 10-16

port-based authentication (continued)

port security

and voice VLAN 10-18

described 10-17

interactions 10-17

multiple-hosts mode 10-8

readiness check

configuring 10-27

described 10-10, 10-27

resetting to default values 10-47

stack changes, effects of 10-7

statistics, displaying 10-47

switch

as proxy 10-3

RADIUS client 10-3

upgrading from a previous release 10-26, 34-26

VLAN assignment

AAA authorization 10-28

characteristics 10-11

configuration tasks 10-11

described 10-10

voice VLAN

described 10-16

PVID 10-16

VVID 10-16

wake-on-LAN, described 10-18

port blocking 1-4, 25-7

port-channel

See EtherChannel

port description TLV 27-2

Port Fast

described 20-2

enabling 20-12

mode, spanning tree 13-29

support for 1-7

port membership modes, VLAN 13-3

port priority

MSTP 19-19

STP 18-18

ports

10-Gigabit Ethernet module 11-6

access 11-3

blocking 25-7

dynamic access 13-3

IEEE 802.1Q tunnel 13-4

protected 25-6

routed 11-4

secure 25-8

static-access 13-3, 13-11

switch 11-2

trunks 13-3, 13-16

VLAN assignments 13-11

port security

aging 25-17

and private VLANs 25-19

and QoS trusted boundary 34-39

and stacking 25-19

configuring 25-13

default configuration 25-11

described 25-8

displaying 25-20

enabling 25-19

on trunk ports 25-14

sticky learning 25-9

violations 25-10

with other features 25-11

port-shutdown response, VMPS 13-28

port VLAN ID TLV 27-2

power management TLV 27-2, 27-6

Power over Ethernet

See PoE

preemption, default configuration 21-7

preemption delay, default configuration 21-8

preferential treatment of traffic

See QoS

prefix lists, BGP 36-56

preventing unauthorized access 9-1

primary links 21-2

primary VLANs 16-1, 16-3

priority

HSRP 40-7

overriding CoS 15-6

trusting CoS 15-6

private VLAN edge ports

See protected ports

private VLANs

across multiple switches 16-4

and SDM template 16-4

and SVIs 16-5

and switch stacks 16-6

benefits of 16-1

community ports 16-2

community VLANs 16-2, 16-3

configuration guidelines 16-7, 16-9

configuration tasks 16-6

configuring 16-10

default configuration 16-7

end station access to 16-3

IP addressing 16-3

isolated port 16-2

isolated VLANs 16-2, 16-3

mapping 16-14

monitoring 16-15

ports

community 16-2

configuration guidelines 16-9

configuring host ports 16-12

configuring promiscuous ports 16-13

described 13-4

isolated 16-2

promiscuous 16-2

primary VLANs 16-1, 16-3

promiscuous ports 16-2

secondary VLANs 16-2

subdomains 16-1

traffic in 16-5

privileged EXEC mode 2-2

privilege levels

changing the default for lines 9-9

command switch 6-17

exiting 9-9

logging into 9-9

mapping on member switches 6-17

overview 9-2, 9-7

setting a command with 9-8

promiscuous ports

configuring 16-13

defined 16-2

protected ports 1-9, 25-6

protocol-dependent modules, EIGRP 36-36

Protocol-Independent Multicast Protocol

See PIM

provider edge devices 36-65

provisioned switches and IP source guard 22-18

provisioning new members for a switch stack 5-7

proxy ARP

configuring 36-11

definition 36-9

with IP routing disabled 36-12

proxy reports 21-3

pruning, VTP

disabling

in VTP domain 14-14

on a port 13-23

enabling

in VTP domain 14-14

on a port 13-22

examples 14-5

overview 14-4

pruning-eligible list

changing 13-22

for VTP pruning 14-5

VLANs 14-14

PVST+

described 18-10

IEEE 802.1Q trunking interoperability 18-11

instances supported 18-10

Q

QoS

and MQC commands 34-1

auto-QoS

categorizing traffic 34-21

configuration and defaults display 34-30

configuration guidelines 34-25

described 34-20

disabling 34-27

displaying generated commands 34-27

displaying the initial configuration 34-30

effects on running configuration 34-25

egress queue defaults 34-21

enabling for VoIP 34-27

example configuration 34-28

ingress queue defaults 34-21

list of generated commands 34-22

basic model 34-4

classification

class maps, described 34-7

defined 34-4

DSCP transparency, described 34-40

flowchart 34-6

forwarding treatment 34-3

in frames and packets 34-3

IP ACLs, described 34-5, 34-7

MAC ACLs, described 34-5, 34-7

options for IP traffic 34-5

options for non-IP traffic 34-5

policy maps, described 34-7

trust DSCP, described 34-5

trusted CoS, described 34-5

trust IP precedence, described 34-5

QoS (continued)

class maps

configuring 34-47

displaying 34-79

configuration guidelines

auto-QoS 34-25

standard QoS 34-33

configuring

aggregate policers 34-59

auto-QoS 34-20

default port CoS value 34-38

DSCP maps 34-61

DSCP transparency 34-40

DSCP trust states bordering another domain 34-41

egress queue characteristics 34-71

ingress queue characteristics 34-67

IP extended ACLs 34-45

IP standard ACLs 34-44

MAC ACLs 34-46

policy maps, hierarchical 34-53

port trust states within the domain 34-36

trusted boundary 34-39

default auto configuration 34-21

default standard configuration 34-31

displaying statistics 34-79

DSCP transparency 34-40

egress queues

allocating buffer space 34-72

buffer allocation scheme, described 34-18

configuring shaped weights for SRR 34-76

configuring shared weights for SRR 34-77

described 34-4

displaying the threshold map 34-75

flowchart 34-17

mapping DSCP or CoS values 34-74

scheduling, described 34-4

setting WTD thresholds 34-72

WTD, described 34-19

QoS (continued)

enabling globally 34-35

flowcharts

classification 34-6

egress queueing and scheduling 34-17

ingress queueing and scheduling 34-15

policing and marking 34-10

implicit deny 34-7

ingress queues

allocating bandwidth 34-69

allocating buffer space 34-69

buffer and bandwidth allocation, described 34-16

configuring shared weights for SRR 34-69

configuring the priority queue 34-70

described 34-4

displaying the threshold map 34-68

flowchart 34-15

mapping DSCP or CoS values 34-68

priority queue, described 34-16

scheduling, described 34-4

setting WTD thresholds 34-68

WTD, described 34-16

IP phones

automatic classification and queueing 34-20

detection and trusted settings 34-20, 34-39

limiting bandwidth on egress interface 34-78

mapping tables

CoS-to-DSCP 34-61

displaying 34-79

DSCP-to-CoS 34-64

DSCP-to-DSCP-mutation 34-65

IP-precedence-to-DSCP 34-62

policed-DSCP 34-63

types of 34-12

marked-down actions 34-51, 34-56

marking, described 34-4, 34-8

overview 34-2

packet modification 34-19

QoS (continued)

policers

configuring 34-51, 34-56, 34-59

described 34-8

displaying 34-79

number of 34-34

types of 34-9

policies, attaching to an interface 34-9

policing

described 34-4, 34-8

token bucket algorithm 34-9

policy maps

characteristics of 34-49

displaying 34-80

hierarchical 34-8

hierarchical on SVIs 34-53

nonhierarchical on physical ports 34-49

QoS label, defined 34-4

queues

configuring egress characteristics 34-71

configuring ingress characteristics 34-67

high priority (expedite) 34-19, 34-78

location of 34-13

SRR, described 34-14

WTD, described 34-13

rewrites 34-19

support for 1-11

trust states

bordering another domain 34-41

described 34-5

trusted device 34-39

within the domain 34-36

quality of service

See QoS

queries, IGMP 24-4

query solicitation, IGMP 24-13

R

RADIUS

attributes

vendor-proprietary 9-31

vendor-specific 9-29

configuring

accounting 9-28

authentication 9-23

authorization 9-27

communication, global 9-21, 9-29

communication, per-server 9-20, 9-21

multiple UDP ports 9-20

default configuration 9-20

defining AAA server groups 9-25

displaying the configuration 9-31

identifying the server 9-20

in clusters 6-16

limiting the services to the user 9-27

method list, defined 9-19

operation of 9-19

overview 9-18

suggested network environments 9-18

support for 1-11

tracking services accessed by user 9-28

range

macro 11-13

of interfaces 11-12

rapid convergence 19-10

rapid per-VLAN spanning-tree plus

See rapid PVST+

rapid PVST+

described 18-10

IEEE 802.1Q trunking interoperability 18-11

instances supported 18-10

Rapid Spanning Tree Protocol

See RSTP

RARP 36-9

rcommand command 6-16

RCP

configuration files

downloading C-17

overview C-15

preparing the server C-16

uploading C-18

image files

deleting old image C-36

downloading C-35

preparing the server C-33

uploading C-37

reachability, tracking IP SLAs IP host 42-9

readiness check

port-based authentication

configuring 10-27

described 10-10, 10-27

reconfirmation interval, VMPS, changing 13-31

reconfirming dynamic VLAN membership 13-31

recovery procedures 47-1

redundancy

EtherChannel 35-3

HSRP 40-1

STP

backbone 18-9

multidrop backbone 20-5

path cost 13-26

port priority 13-24

redundant links and UplinkFast 20-15

reliable transport protocol, EIGRP 36-35

reloading software 3-21

Remote Authentication Dial-In User Service

See RADIUS

Remote Copy Protocol

See RCP

Remote Network Monitoring

See RMON

Remote SPAN

See RSPAN

remote SPAN 29-3

report suppression, IGMP

described 24-6

disabling 24-16, 38-11

requirements

cluster xlvii

device manager xlvi

Network Assistant xlvi

resequencing ACL entries 33-15

resets, in BGP 36-51

resetting a UDLD-shutdown interface 28-6

responder, IP SLAs

described 41-4

enabling 41-8

response time, measuring with IP SLAs 41-4

restricted VLAN

configuring 10-37

described 10-14

using with IEEE 802.1x 10-14

restricting access

NTP services 7-8

overview 9-1

passwords and privilege levels 9-2

RADIUS 9-17

TACACS+ 9-10

retry count, VMPS, changing 13-32

reverse address resolution 36-9

Reverse Address Resolution Protocol

See RARP

RFC

1058, RIP 36-19

1112, IP multicast and IGMP 24-2

1157, SNMPv1 32-2

1163, BGP 36-43

1166, IP addresses 36-7

1253, OSPF 36-25

1267, BGP 36-43

1305, NTP 7-2

1587, NSSAs 36-25

1757, RMON 30-2

RFC (continued)

1771, BGP 36-43

1901, SNMPv2C 32-2

1902 to 1907, SNMPv2 32-2

2236, IP multicast and IGMP 24-2

2273-2275, SNMPv3 32-2

RIP

advertisements 36-20

authentication 36-22

configuring 36-21

default configuration 36-20

described 36-20

for IPv6 37-28

hop counts 36-20

split horizon 36-23

summary addresses 36-23

support for 1-12

RMON

default configuration 30-3

displaying status 30-6

enabling alarms and events 30-3

groups supported 30-2

overview 30-1

statistics

collecting group Ethernet 30-5

collecting group history 30-5

support for 1-14

root guard

described 20-10

enabling 20-18

support for 1-8

root switch

MSTP 19-17

STP 18-16

route calculation timers, OSPF 36-32

route dampening, BGP 36-62

routed packets, ACLs on 33-39

routed ports

configuring 36-5

defined 11-4

in switch clusters 6-8

IP addresses on 11-25, 36-5

route-map command 36-89

route maps

BGP 36-54

policy-based routing 36-87

router ACLs

defined 33-2

types of 33-4

route reflectors, BGP 36-61

router ID, OSPF 36-33

route selection, BGP 36-52

route summarization, OSPF 36-31

route targets, VPN 36-66

routing

default 36-3

dynamic 36-3

redistribution of information 36-83

static 36-3

routing domain confederation, BGP 36-61

Routing Information Protocol

See RIP

routing protocol administrative distances 36-81

RSPAN

and stack changes 29-10

characteristics 29-9

configuration guidelines 29-18

default configuration 29-11

defined 29-3

destination ports 29-8

displaying status 29-25

in a switch stack 29-2

interaction with other features 29-9

monitored ports 29-6

monitoring ports 29-8

overview 1-14, 29-1

RSPAN (continued)

received traffic 29-5

session limits 29-11

sessions

creating 29-19

defined 29-4

limiting source traffic to specific VLANs 29-24

specifying monitored ports 29-19

with ingress traffic enabled 29-22

source ports 29-6

transmitted traffic 29-6

VLAN-based 29-7

RSTP

active topology 19-10

BPDU

format 19-12

processing 19-13

designated port, defined 19-9

designated switch, defined 19-9

interoperability with IEEE 802.1D

described 19-9

restarting migration process 19-26

topology changes 19-13

overview 19-9

port roles

described 19-9

synchronized 19-11

proposal-agreement handshake process 19-10

rapid convergence

cross-stack rapid convergence 19-11

described 19-10

edge ports and Port Fast 19-10

point-to-point links 19-10, 19-24

root ports 19-10

root port, defined 19-9

See also MSTP

running configuration

replacing C-19, C-20

rolling back C-19, C-20

running configuration, saving 3-15

S

SC (standby command switch) 6-10

scheduled reloads 3-21

scheduling, IP SLAs operations 41-5

SCP

and SSH 9-49

configuring 9-49

SDM

described 8-1

switch stack consideration 5-10

templates

configuring 8-5

number of 8-1

SDM mismatch mode 5-10, 8-4

SDM template 39-4

aggregator 8-1

configuration guidelines 8-5

configuring 8-4

desktop 8-1

dual IPv4 and IPv6 8-2

types of 8-1

secondary VLANs 16-2

Secure Copy Protocol

secure HTTP client

configuring 9-48

displaying 9-48

secure HTTP server

configuring 9-46

displaying 9-48

secure MAC addresses

and switch stacks 25-19

deleting 25-16

maximum number of 25-10

types of 25-9

secure ports

and switch stacks 25-19

configuring 25-8

secure remote connections 9-38

Secure Shell

See SSH

Secure Socket Layer

See SSL

security, port 25-8

security features 1-9

See SCP

sequence numbers in log messages 31-8

server mode, VTP 14-3

service-provider network, MSTP and RSTP 19-1

service-provider networks

and customer VLANs 17-2

and IEEE 802.1Q tunneling 17-1

Layer 2 protocols across 17-8

Layer 2 protocol tunneling for EtherChannels 17-9

set-request operation 32-5

setup program

failed command switch replacement 47-11

replacing failed command switch 47-9

severity levels, defining in system messages 31-9

SFPs

monitoring status of 11-29, 47-14

numbering of 11-11

security and identification 47-13

status, displaying 47-14

shaped round robin

See SRR

show access-lists hw-summary command 33-22

show and more command output, filtering 2-10

show cdp traffic command 26-5

show cluster members command 6-16

show configuration command 11-24

show forward command 47-22

show interfaces command 11-18, 11-24

show interfaces switchport 21-4

show l2protocol command 17-13, 17-15, 17-16

show lldp traffic command 27-8

show platform forward command 47-22

show running-config command

displaying ACLs 33-20, 33-21, 33-31, 33-34

interface description in 11-24

shutdown command on interfaces 11-29

shutdown threshold for Layer 2 protocol packets 17-11

Simple Network Management Protocol

See SNMP

small form-factor pluggable modules

See SFPs

small-frame arrival rate, configuring 25-5

Smartports macros

applying Cisco-default macros 12-6

applying global parameter values 12-5, 12-6

applying macros 12-5

applying parameter values 12-5, 12-7

configuration guidelines 12-2

creating 12-4

default configuration 12-2

defined 12-1

displaying 12-8

tracing 12-3

website 12-2

SNAP 26-1

SNMP

accessing MIB variables with 32-4

agent

described 32-4

disabling 32-8

and IP SLAs 41-2

authentication level 32-11

SNMP (continued)

community strings

configuring 32-8

for cluster switches 32-4

overview 32-4

configuration examples 32-17

default configuration 32-7

engine ID 32-7

groups 32-7, 32-10

host 32-7

ifIndex values 32-6

in-band management 1-6

in clusters 6-14

informs

and trap keyword 32-12

described 32-5

differences from traps 32-5

disabling 32-16

enabling 32-15

limiting access by TFTP servers 32-16

limiting system log messages to NMS 31-10

manager functions 1-5, 32-3

managing clusters with 6-17

MIBs

location of B-3

supported B-1

notifications 32-5

overview 32-1, 32-4

security levels 32-3

status, displaying 32-18

system contact and location 32-16

trap manager, configuring 32-14

traps

described 32-3, 32-5

differences from informs 32-5

disabling 32-16

enabling 32-12

SNMP (continued)

traps (continued)

enabling MAC address notification 7-22

overview 32-1, 32-5

types of 32-12

users 32-7, 32-10

versions supported 32-2

SNMP and Syslog Over IPv6 37-14

SNMPv1 32-2

SNMPv2C 32-2

SNMPv3 32-3

snooping, IGMP 24-2

software compatibility

See stacks, switch

software images

location in flash C-24

recovery procedures 47-2

scheduling reloads 3-21

tar file format, described C-24

See also downloading and uploading

source addresses

in IPv4 ACLs 33-12

in IPv6 ACLs 39-6

source-and-destination-IP address based forwarding, EtherChannel 35-9

source-and-destination MAC address forwarding, EtherChannel 35-8

source-IP address based forwarding, EtherChannel 35-9

source-MAC address forwarding, EtherChannel 35-8

Source-specific multicast

See SSM

SPAN

and stack changes 29-10

configuration guidelines 29-11

default configuration 29-11

destination ports 29-8

displaying status 29-25

interaction with other features 29-9

monitored ports 29-6

SPAN (continued)

monitoring ports 29-8

overview 1-14, 29-1

ports, restrictions 25-12

received traffic 29-5

session limits 29-11

sessions

configuring ingress forwarding 29-16, 29-23

creating 29-12

defined 29-4

limiting source traffic to specific VLANs 29-16

removing destination (monitoring) ports 29-14

specifying monitored ports 29-12

with ingress traffic enabled 29-15

source ports 29-6

transmitted traffic 29-6

VLAN-based 29-7

spanning tree and native VLANs 13-19

Spanning Tree Protocol

See STP

SPAN traffic 29-5

split horizon, RIP 36-23

SRR

configuring

shaped weights on egress queues 34-76

shared weights on egress queues 34-77

shared weights on ingress queues 34-69

described 34-14

shaped mode 34-14

shared mode 34-14

support for 1-12

SSH

configuring 9-39

cryptographic software image 9-37

described 1-6, 9-38

encryption methods 9-38

switch stack considerations 5-16, 9-38

user authentication methods, supported 9-39

SSL

configuration guidelines 9-45

configuring a secure HTTP client 9-48

configuring a secure HTTP server 9-46

cryptographic software image 9-42

described 9-42

monitoring 9-48

SSM

address management restrictions 44-16

CGMP limitations 44-16

components 44-14

configuration guidelines 44-16

configuring 44-14, 44-17

differs from Internet standard multicast 44-14

IGMP snooping 44-16

IGMPv3 44-14

IGMPv3 Host Signalling 44-15

IP address range 44-15

monitoring 44-17

operations 44-15

PIM 44-14

state maintenance limitations 44-16

SSM mapping 44-17

configuration guidelines 44-18

configuring 44-17, 44-20

DNS-based 44-19, 44-21

monitoring 44-22

overview 44-18

restrictions 44-18

static 44-19, 44-20

static traffic forwarding 44-21

stack, switch

MAC address of 5-19

stack changes

effects on

IPv6 routing 37-17

stack changes, effects on

802.1x port-based authentication 10-7

ACL configuration 33-7

CDP 26-2

cross-stack EtherChannel 35-13

EtherChannel 35-10

fallback bridging 46-3

HSRP 40-4

IGMP snooping 24-6

IP routing 36-4

IPv6 ACLs 39-4

MAC address tables 7-21

MSTP 19-8

multicast routing 44-10

MVR 24-18

port security 25-19

SDM template selection 8-3

SNMP 32-1

SPAN and RSPAN 29-10

STP 18-12

switch clusters 6-14

system message log 31-2

VLANs 13-6

VTP 14-6

stack master

bridge ID (MAC address) 5-6

defined 5-1

election 5-4

IPv6 37-18

re-election 5-4

See also stacks, switch

stack member

accessing CLI of specific member 5-24

configuring

member number 5-22

priority value 5-22

defined 5-1

displaying information of 5-24

IPv6 37-18

stack member (continued)

number 5-6

priority value 5-7

provisioning a new member 5-23

replacing 5-15

See also stacks, switch

stack member number 11-10

stack protocol version 5-10

stacks, switch

accessing CLI of specific member 5-24

assigning information

member number 5-22

priority value 5-22

provisioning a new member 5-23

auto-advise 5-12

auto-copy 5-11

auto-extract 5-11

auto-upgrade 5-11

benefits 1-2

bridge ID 5-6

CDP considerations 26-2

compatibility, software 5-10

configuration file 5-14

configuration scenarios 5-17

copying an image file from one member to another C-38

default configuration 5-19

description of 5-1

displaying information of 5-24

enabling persistent MAC address timer 5-19

hardware compatibility and SDM mismatch mode 5-10

HSRP considerations 40-4

in clusters 6-14

incompatible software and image upgrades 5-14, C-38

IPv6 on 37-17

stacks, switch (continued)

MAC address considerations 7-21

management connectivity 5-16

managing 5-1

membership 5-3

merged 5-3

MSTP instances supported 18-10

multicast routing, stack master and member roles 44-9

offline configuration

described 5-7

effects of adding a provisioned switch 5-8

effects of removing a provisioned switch 5-9

effects of replacing a provisioned switch 5-9

provisioned configuration, defined 5-7

provisioned switch, defined 5-7

provisioning a new member 5-23

partitioned 5-3, 47-8

provisioned switch

adding 5-8

removing 5-9

replacing 5-9

replacing a failed member 5-15

software compatibility 5-10

software image version 5-10

stack protocol version 5-10

STP

bridge ID 18-3

instances supported 18-10

root port selection 18-3

stack root switch election 18-3

system messages

hostnames in the display 31-1

remotely monitoring 31-2

system prompt consideration 7-14

system-wide configuration considerations 5-15

upgrading C-38

stacks, switch (continued)

version-mismatch (VM) mode

automatic upgrades with auto-upgrade 5-11

described 5-11

examples 5-12

manual upgrades with auto-advise 5-12

upgrades with auto-extract 5-11

See also stack master and stack member

StackWise technology, Cisco 1-3

See also stacks, switch

standby command switch

configuring

considerations 6-11

defined 6-2

priority 6-10

requirements 6-3

virtual IP address 6-11

See also cluster standby group and HSRP

standby group, cluster

See cluster standby group and HSRP

standby ip command 40-5

standby links 21-2

standby router 40-1

standby timers, HSRP 40-9

startup configuration

booting

manually 3-18

specific image 3-19

clearing C-19

configuration file

automatically downloading 3-17

specifying the filename 3-17

default boot configuration 3-17

static access ports

assigning to VLAN 13-11

defined 11-3, 13-3

static addresses

See addresses

static IP routing 1-13

static MAC addressing 1-9

static routes

configuring 36-81

configuring for IPv6 37-26

static routing 36-3

static SSM mapping 44-19, 44-20

static traffic forwarding 44-21

static VLAN membership 13-2

statistics

802.1x 10-47

CDP 26-5

interface 11-28

IP multicast routing 44-62

LLDP 27-7

LLDP-MED 27-7

OSPF 36-34

QoS ingress and egress 34-79

RMON group Ethernet 30-5

RMON group history 30-5

SNMP input and output 32-18

VTP 14-16

sticky learning 25-9

storm control

configuring 25-3

described 25-1

disabling 25-5

displaying 25-20

support for 1-4

thresholds 25-1

STP

accelerating root port selection 20-4

BackboneFast

described 20-7

disabling 20-17

enabling 20-16

BPDU filtering

described 20-3

disabling 20-15

enabling 20-14

STP (continued)

BPDU guard

described 20-2

disabling 20-14

enabling 20-13

BPDU message exchange 18-3

configuration guidelines 18-13, 20-12

configuring

forward-delay time 18-23

hello time 18-22

maximum aging time 18-23

path cost 18-20

port priority 18-18

root switch 18-16

secondary root switch 18-18

spanning-tree mode 18-15

switch priority 18-21

transmit hold-count 18-24

counters, clearing 18-24

cross-stack UplinkFast

described 20-5

enabling 20-16

default configuration 18-13

default optional feature configuration 20-12

designated port, defined 18-4

designated switch, defined 18-4

detecting indirect link failures 20-8

disabling 18-16

displaying status 18-24

EtherChannel guard

described 20-10

disabling 20-17

enabling 20-17

extended system ID

effects on root switch 18-16

effects on the secondary root switch 18-18

overview 18-4

unexpected behavior 18-16

features supported 1-7

STP (continued)

IEEE 802.1D and bridge ID 18-4

IEEE 802.1D and multicast addresses 18-9

IEEE 802.1t and VLAN identifier 18-5

inferior BPDU 18-3

instances supported 18-10

interface state, blocking to forwarding 20-2

interface states

blocking 18-7

disabled 18-8

forwarding 18-6, 18-7

learning 18-7

listening 18-7

overview 18-5

interoperability and compatibility among modes 18-11

keepalive messages 18-2

Layer 2 protocol tunneling 17-8

limitations with IEEE 802.1Q trunks 18-11

load sharing

overview 13-24

using path costs 13-26

using port priorities 13-24

loop guard

described 20-11

enabling 20-18

modes supported 18-10

multicast addresses, effect of 18-9

optional features supported 1-7

overview 18-2

path costs 13-26, 13-27

Port Fast

described 20-2

enabling 20-12

port priorities 13-25

preventing root switch selection 20-10

protocols supported 18-10

redundant connectivity 18-9

STP (continued)

root guard

described 20-10

enabling 20-18

root port, defined 18-3

root port selection on a switch stack 18-3

root switch

configuring 18-16

effects of extended system ID 18-4, 18-16

election 18-3

unexpected behavior 18-16

shutdown Port Fast-enabled port 20-2

stack changes, effects of 18-12

status, displaying 18-24

superior BPDU 18-3

timers, described 18-22

UplinkFast

described 20-3

enabling 20-15

VLAN-bridge 18-11

stratum, NTP 7-2

stub areas, OSPF 36-30

stub routing, EIGRP 36-42

subdomains, private VLAN 16-1

subnet mask 36-7

subnet zero 36-7

success response, VMPS 13-28

summer time 7-13

SunNet Manager 1-5

supernet 36-8

SVIs

and IP unicast routing 36-5

and router ACLs 33-4

connecting VLANs 11-9

defined 11-5

routing between VLANs 13-2

switch clustering technology 6-1

See also clusters, switch

switch console port 1-6

Switch Database Management

See SDM

switched packets, ACLs on 33-38

Switched Port Analyzer

See SPAN

switched ports 11-2

switchport backup interface 21-4, 21-5

switchport block multicast command 25-8

switchport block unicast command 25-8

switchport command 11-15

switchport mode dot1q-tunnel command 17-6

switchport protected command 25-7

switch priority

MSTP 19-22

STP 18-21

switch software features 1-1

switch stacks

Catalyst 3750G wireless LAN controller switch A-2

switch virtual interface

See SVI

synchronization, BGP 36-48

syslog

See system message logging

Syslog Over IPv6 37-15

system capabilities TLV 27-2

system clock

configuring

daylight saving time 7-13

manually 7-11

summer time 7-13

time zones 7-12

displaying the time and date 7-12

overview 7-1

See also NTP

system description TLV 27-2

system message logging

default configuration 31-4

defining error message severity levels 31-9

disabling 31-4

displaying the configuration 31-14

enabling 31-5

facility keywords, described 31-14

level keywords, described 31-10

limiting messages 31-10

message format 31-2

overview 31-1

sequence numbers, enabling and disabling 31-8

setting the display destination device 31-5

stack changes, effects of 31-2

synchronizing log messages 31-6

syslog facility 1-14

time stamps, enabling and disabling 31-8

UNIX syslog servers

configuring the daemon 31-12

configuring the logging facility 31-13

facilities supported 31-14

system MTU and IEEE 802.1Q tunneling 17-5

system name

default configuration 7-15

default setting 7-15

manual configuration 7-15

See also DNS

system name TLV 27-2

system prompt, default setting 7-14, 7-15

system resources, optimizing 8-1

T

TACACS+

accounting, defined 9-11

authentication, defined 9-11

authorization, defined 9-11

TACACS+ (continued)

configuring

accounting 9-17

authentication key 9-13

authorization 9-16

login authentication 9-14

default configuration 9-13

displaying the configuration 9-17

identifying the server 9-13

in clusters 6-16

limiting the services to the user 9-16

operation of 9-12

overview 9-10

support for 1-11

tracking services accessed by user 9-17

tagged packets

IEEE 802.1Q 17-3

Layer 2 protocol 17-8

tar files

creating C-6

displaying the contents of C-7

extracting C-7

image file format C-24

TDR 1-14

Telnet

accessing management interfaces 2-11

number of connections 1-6

setting a password 9-6

templates, SDM 8-2

temporary self-signed certificate 9-43

Terminal Access Controller Access Control System Plus

See TACACS+

terminal lines, setting a password 9-6

TFTP

configuration files

downloading C-11

preparing the server C-10

uploading C-12

configuration files in base directory 3-7

TFTP (continued)

configuring for autoconfiguration 3-7

image files

deleting C-27

downloading C-26

preparing the server C-26

uploading C-28

limiting access by servers 32-16

TFTP server 1-6

threshold, traffic level 25-2

threshold monitoring, IP SLAs 41-6

time

See NTP and system clock

Time Domain Reflector

See TDR

time-range command 33-17

time ranges in ACLs 33-17

time stamps in log messages 31-8

time zones 7-12

TLVs

defined 27-2

LLDP 27-2

LLDP-MED 27-2

Token Ring VLANs

support for 13-6

VTP support 14-4

ToS 1-11

traceroute, Layer 2

and ARP 47-17

and CDP 47-16

broadcast traffic 47-16

described 47-16

IP addresses and subnets 47-17

MAC addresses and VLANs 47-16

multicast traffic 47-16

multiple devices on a port 47-17

unicast traffic 47-16

usage guidelines 47-16

traceroute command 47-18

See also IP traceroute

tracked lists

configuring 42-3

types 42-3

tracked objects

by Boolean expression 42-4

by threshold percentage 42-6

by threshold weight 42-5

tracking interface line-protocol state 42-2

tracking IP routing state 42-2

tracking objects 42-1

tracking process 42-1

track state, tracking IP SLAs 42-9

traffic

blocking flooded 25-8

fragmented 33-5

fragmented IPv6 39-3

unfragmented 33-5

traffic policing 1-12

traffic suppression 25-1

transmit hold-count

see STP

transparent mode, VTP 14-3, 14-12

trap-door mechanism 3-2

traps

configuring MAC address notification 7-22

configuring managers 32-12

defined 32-3

enabling 7-22, 32-12

notification types 32-12

overview 32-1, 32-5

troubleshooting

connectivity problems 47-14, 47-16, 47-17

detecting unidirectional links 28-1

displaying crash information 47-24

PIMv1 and PIMv2 interoperability problems 44-35

setting packet forwarding 47-22

SFP security and identification 47-13

troubleshooting (continued)

show forward command 47-22

with CiscoWorks 32-4

with debug commands 47-20

with ping 47-14

with system message logging 31-1

with traceroute 47-17

trunk failover

See link-state tracking

trunking encapsulation 1-8

trunk ports

configuring 13-20

defined 11-3, 13-3

encapsulation 13-20, 13-25, 13-27

trunks

allowed-VLAN list 13-21

configuring 13-20, 13-25, 13-27

ISL 13-16

load sharing

setting STP path costs 13-26

using STP port priorities 13-24, 13-25

native VLAN for untagged traffic 13-23

parallel 13-26

pruning-eligible list 13-22

to non-DTP device 13-17

trusted boundary for QoS 34-39

trusted port states

between QoS domains 34-41

classification options 34-5

ensuring port security for IP phones 34-39

support for 1-12

within a QoS domain 34-36

trustpoints, CA 9-43

tunneling

defined 17-1

IEEE 802.1Q 17-1

Layer 2 protocol 17-8

tunnel ports

defined 13-4

described 11-4, 17-1

IEEE 802.1Q, configuring 17-6

incompatibilities with other features 17-6

twisted-pair Ethernet, detecting unidirectional links 28-1

type of service

See ToS

U

UDLD

configuration guidelines 28-4

default configuration 28-4

disabling

globally 28-5

on fiber-optic interfaces 28-5

per interface 28-6

echoing detection mechanism 28-3

enabling

globally 28-5

per interface 28-6

Layer 2 protocol tunneling 17-10

link-detection mechanism 28-1

neighbor database 28-2

overview 28-1

resetting an interface 28-6

status, displaying 28-7

support for 1-7

UDP, configuring 36-15

UDP jitter, configuring 41-9

UDP jitter operation, IP SLAs 41-8

unauthorized ports with IEEE 802.1x 10-7

unicast MAC address filtering 1-6

and adding static addresses 7-26

and broadcast MAC addresses 7-25

and CPU packets 7-25

and multicast addresses 7-25

and router MAC addresses 7-25

unicast MAC address filtering (continued)

configuration guidelines 7-25

described 7-25

unicast storm 25-1

unicast storm control command 25-4

unicast traffic, blocking 25-8

UniDirectional Link Detection protocol

See UDLD

UNIX syslog servers

daemon configuration 31-12

facilities supported 31-14

message logging configuration 31-13

unrecognized Type-Length-Value (TLV) support 14-4

upgrading information

See release notes

upgrading software images

See downloading

UplinkFast

described 20-3

disabling 20-16

enabling 20-15

support for 1-7

uploading

configuration files

preparing C-10, C-13, C-16

reasons for C-9

using FTP C-14

using RCP C-18

using TFTP C-12

image files

preparing C-26, C-29, C-33

reasons for C-23

using FTP C-31

using RCP C-37

using TFTP C-28

User Datagram Protocol

See UDP

user EXEC mode 2-2

username-based authentication 9-6

V

version-dependent transparent mode 14-4

version-mismatch (VM) mode

automatic upgrades with auto-upgrade 5-11

described 5-11

displaying 5-11

manual upgrades with auto-advise 5-12

upgrades with auto-extract 5-11

virtual IP address

cluster standby group 6-11

command switch 6-11

Virtual Private Network

See VPN

virtual router 40-1, 40-2

vlan.dat file 13-5

VLAN 1, disabling on a trunk port 13-22

VLAN 1 minimization 13-21

VLAN ACLs

See VLAN maps

vlan-assignment response, VMPS 13-28

VLAN configuration

at bootup 13-8

saving 13-8

VLAN configuration mode 2-2, 13-7

VLAN database

and startup configuration file 13-8

and VTP 14-1

VLAN configuration saved in 13-7

VLANs saved in 13-4

vlan database command 13-7

vlan dot1q tag native command 17-5

VLAN filtering and SPAN 29-7

vlan global configuration command 13-7

VLAN ID, discovering 7-27

VLAN load balancing on flex links 21-2

configuration guidelines 21-8

VLAN management domain 14-2

VLAN Management Policy Server

See VMPS

VLAN map entries, order of 33-30

VLAN maps

applying 33-34

common uses for 33-34

configuration guidelines 33-30

configuring 33-29

creating 33-31

defined 33-2

denying access to a server example 33-35

denying and permitting packets 33-31

displaying 33-41

examples of ACLs and VLAN maps 33-32

removing 33-34

support for 1-9

wiring closet configuration example 33-35

VLAN membership

confirming 13-31

modes 13-3

VLAN Query Protocol

See VQP

VLANs

adding 13-9

adding to VLAN database 13-9

aging dynamic addresses 18-10

allowed on trunk 13-21

and spanning-tree instances 13-3, 13-6, 13-13

configuration guidelines, extended-range VLANs 13-13

configuration guidelines, normal-range VLANs 13-6

configuration options 13-7

configuring 13-1

configuring IDs 1006 to 4094 13-13

connecting through SVIs 11-9

creating in config-vlan mode 13-9

creating in VLAN configuration mode 13-10

customer numbering in service-provider networks 17-3

VLANs (continued)

default configuration 13-8

deleting 13-10

described 11-2, 13-1

displaying 13-16

extended-range 13-1, 13-12

features 1-8

illustrated 13-2

internal 13-13

in the switch stack 13-6

limiting source traffic with RSPAN 29-24

limiting source traffic with SPAN 29-16

modifying 13-9

multicast 24-17

native, configuring 13-23

normal-range 13-1, 13-4

number supported 1-8

parameters 13-5

port membership modes 13-3

static-access ports 13-11

STP and IEEE 802.1Q trunks 18-11

supported 13-2

Token Ring 13-6

traffic between 13-2

VLAN-bridge STP 18-11, 46-2

VTP modes 14-3

VLAN Trunking Protocol

See VTP

VLAN trunks 13-16

VMPS

administering 13-32

configuration example 13-33

configuration guidelines 13-29

default configuration 13-29

description 13-27

dynamic port membership

described 13-28

reconfirming 13-31

troubleshooting 13-33

VMPS (continued)

entering server address 13-30

mapping MAC addresses to VLANs 13-28

monitoring 13-32

reconfirmation interval, changing 13-31

reconfirming membership 13-31

retry count, changing 13-32

voice-over-IP 15-1

voice VLAN

Cisco 7960 phone, port connections 15-1

configuration guidelines 15-3

configuring IP phones for data traffic

override CoS of incoming frame 15-6

trust CoS priority of incoming frame 15-6

configuring ports for voice traffic in

802.1p priority tagged frames 15-5

802.1Q frames 15-5

connecting to an IP phone 15-4

default configuration 15-3

described 15-1

displaying 15-7

IP phone data traffic, described 15-2

IP phone voice traffic, described 15-2

VPN

configuring routing in 36-73

forwarding 36-66

in service provider networks 36-64

routes 36-65

VPN routing and forwarding table

See VRF

VQP 1-8, 13-27

VRF

defining 36-66

tables 36-64

VRF-aware services

ARP 36-70

configuring 36-70

ftp 36-72

HSRP 36-71

VRF-aware services (continued)

ping 36-70

SNMP 36-71

syslog 36-72

tftp 36-72

traceroute 36-72

uRPF 36-71

VTP

adding a client to a domain 14-14

advertisements 13-19, 14-3

and extended-range VLANs 14-2

and normal-range VLANs 14-2

client mode, configuring 14-11

configuration

global configuration mode 14-7

guidelines 14-8

privileged EXEC mode 14-7

requirements 14-9

saving 14-7

VLAN configuration mode 14-8

configuration mode options 14-7

configuration requirements 14-9

configuration revision number

guideline 14-14

resetting 14-15

configuring

client mode 14-11

server mode 14-9

transparent mode 14-12

consistency checks 14-4

default configuration 14-7

described 14-1

disabling 14-12

domain names 14-8

domains 14-2

Layer 2 protocol tunneling 17-8

VTP (continued)

modes

client 14-3, 14-11

server 14-3, 14-9

transitions 14-3

transparent 14-3, 14-12

monitoring 14-16

passwords 14-8

pruning

disabling 14-14

enabling 14-14

examples 14-5

overview 14-4

support for 1-8

pruning-eligible list, changing 13-22

server mode, configuring 14-9

statistics 14-16

support for 1-8

Token Ring support 14-4

transparent mode, configuring 14-12

using 14-1

version, guidelines 14-9

Version 1 14-4

Version 2

configuration guidelines 14-9

disabling 14-13

enabling 14-13

overview 14-4

W

WCCP

authentication 43-3

configuration guidelines 43-5

default configuration 43-5

described 43-1

displaying 43-10

dynamic service groups 43-3

enabling 43-6

WCCP (continued)

features unsupported 43-5

forwarding method 43-3

Layer-2 header rewrite 43-3

MD5 security 43-3

message exchange 43-2

monitoring and maintaining 43-10

negotiation 43-3

packet redirection 43-3

packet-return method 43-3

redirecting traffic received from a client 43-6

setting the password 43-7

unsupported WCCPv2 features 43-5

web authentication 10-10

configuring10-44to 10-46

described 1-9, 10-21

fallback for IEEE 802.1x 10-45

Web Cache Communication Protocol

See WCCP

weighted tail drop

See WTD

weight thresholds in tracked lists 42-5

wireless LAN controller A-1, A-3

wizards 1-3

WTD

described 34-13

setting thresholds

egress queue-sets 34-72

ingress queues 34-68

support for 1-12

X

Xmodem protocol 47-2