Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(18)EW
Index
Downloads: This chapterpdf (PDF - 820.0KB) The complete bookPDF (PDF - 5.71MB) | Feedback

Index      

Table Of Contents

      

Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V -

Index      

Symbols

28-12

Numerics

802.10 SAID (default)8-4

802.1Q

trunks12-6

tunneling

compatibility with other features14-5

defaults14-4

described14-1

tunnel ports with other features14-6

802.1Q VLANs

encapsulation6-3

trunk restrictions6-5

802.1s

See MST

802.1w

See MST

802.1x

See port-based authentication

802.1x authentication

RADIUS accounting28-7

support for guest VLANs28-6

using with port security28-6

802.3ad

See LACP

A

AAA

enabling28-12

abbreviating commands2-5

access control entries

See ACEs

access ports

and Layer 2 protocol tunneling14-9

configuring6-8

access VLANs6-6

accounting

configuring for 802.1x28-15

ACEs

ACLs26-2

Ethernet26-2

IP26-2

Layer 4 operation restrictions26-6

ACLs

ACEs26-2

applying on routed packets26-19

applying on switched packets26-19

compatibility on the same switch26-3

configuring with VLAN maps26-18

CPU impact26-8

IP,matching criteria for port ACLs26-4

MAC extended26-9

matching criteria for router ACLs26-3

port

and voice VLAN26-4

defined26-2

limitations26-4

processing26-8

types supported26-2

acronyms, list ofA-1

active queue management32-14

addresses

See MAC addresses

adjacency tables

description22-2

displaying statistics22-9

advertisements, VTP

See VTP advertisements

alarms

major35-2

minor35-2

asymmetrical links, and 802.1Q tunneling14-4

audiencexxi

authentication

See also port-based authentication

authentication server

defined28-3

RADIUS server28-3

authorized and unauthorized ports28-4

authorized ports with 802.1X28-4

automatic QoS

See QoS

Auto-QoS

configuring32-16

B

BackboneFast

adding a switch (figure)13-2

and MST15-2

configuring13-15

link failure (figure)13-7, 13-8

not supported MST15-2

understanding13-6

See also STP

BGP1-8

routing session with multi-VRF CE23-6

blocking packets30-1

blocking state (STP)

RSTP comparisons (table)15-4

boot bootldr command3-18

boot command3-15

boot fields

See configuration register boot fields

boot system command3-13, 3-18

boot system flash command3-15

Border Gateway Protocol

See BGP

boundary ports

description15-6

BPDU Guard

and MST15-2

configuring13-12

overview13-4

BPDUs

and media speed12-2

pseudobridges and15-5

what they contain12-3

bridge ID

See STP bridge ID

bridge priority (STP)12-16

bridge protocol data units

See BPDUs

broadcast storm control

disabling31-4

BSR

configuration example25-21

burst rate32-40

burst size32-27

C

cautions for passwords

encrypting3-9

TACACS+3-9

CDP

and trusted boundary32-25

configuration17-2

displaying configuration17-3

enabling on interfaces17-3

Layer 2 protocol tunneling14-7

maintaining17-3

monitoring17-3

overview1-2, 17-1

cdp enable command17-3

CEF

adjacency tables22-2

configuring load balancing22-7

displaying statistics22-8

enabling22-6

hardware switching22-4

load balancing22-6

overview22-1

software switching22-4

CGMP

overview16-1

channel-group group command18-7, 18-9

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco IP Phones

configuring37-2

Cisco IP phones

sound quality37-1

CiscoView1-12

CIST

description15-2

class-map command32-28

class of service

See CoS

clear cdp counters command17-4

clear cdp table command17-3

clear counters command4-13

clearing

IP multicast table entries25-20

clear ip flow stats command33-6

CLI

accessing2-1

backing out one level2-5

getting commands2-5

history substitution2-3

modes2-5

monitoring environments34-1

ROM monitor2-6

software basics2-4

clients

in 802.1x authentication28-2

command-line processing2-3

command modes2-5

commands

listing2-5

command switches

in VMPS9-1

common and internal spanning tree

See CIST

common spanning tree

See CST

community ports

description10-1

community VLANs

description10-2

config-register command3-16

config terminal command3-2

configuration files

saving3-3

configuration guidelines

for VMPS9-3

configuration register

boot fields

listing value3-16

modifying3-15

changing settings3-15to 3-16

configuring3-13

settings at startup3-14

configure terminal command3-15, 4-2

console configuration mode2-5

console port

disconnecting user sessions5-5

monitoring user sessions5-4

copy running-config startup-config command3-3

copy system:running-config nvram:startup-config command3-18

CoS

configuring port value32-37

definition32-3

figure32-2

overriding on Cisco IP Phones37-3

priority37-3

CoS-to-DSCP maps32-41

counters

clearing MFIB25-20

clearing on interfaces4-13

CPU port sniffing34-10

CST

description15-5

IST and15-2

MST and15-2

customer edge devices23-2

D

default configuration

802.1X28-11

auto-QoS32-16

IGMP filtering16-17

Layer 2 protocol tunneling14-9

multi-VRF CE23-3

SPAN and RSPAN34-6

default gateway

configuring3-4

verifying configuration3-5

default ports

and support for 802.1x authentication28-12

description command4-9

detecting unidirectional links19-1

DHCP snooping

configuration guidelines20-3

configuring20-3

default configuration20-3

displaying binding tables20-10

displaying configuration20-10

enabling20-4

enabling on private VLAN20-5

enabling the database agent20-6

monitoring20-10, 20-13, 20-14

overview20-1

Snooping database agent20-2

DHCP Snooping Database Agent

adding to the database (example)20-9

enabling (example)20-6

overview20-2

reading from a TFTP file (example)20-8

Differentiated Services Code Point values

See DSCP values

DiffServ architecture, QoS32-2

disabled state

RSTP comparisons (table)15-4

disabling

broadcast storm control31-4

disconnect command5-5

documentation

organizationxxi

relatedxxiii

double-tagged packets

802.1Q tunneling14-2

Layer 2 protocol tunneling14-9

drop threshold for Layer 2 protocol packets14-9

DSCP maps32-41

DSCP-to-CoS maps

configuring32-43

DSCP values

configuring maps32-41

configuring port value32-38

definition32-4

IP precedence32-2

mapping markdown32-23

mapping to transmit queues32-39

DTP

VLAN trunks and6-3

duplex command4-8

duplex mode

configuring interface4-6

Dynamic Host Configuration Protocol snooping

See DHCP snooping

dynamic ports

limit on hosts9-8

dynamic port VLAN membership

configuring9-5

overview9-2

reconfirming9-7

troubleshooting9-8

Dynamic Trunking Protocol

See DTP

E

EAP

request/identity frame28-3

response/identity frame28-3

EAP frames

changing retransmission time28-18

exchanging (figure)28-4

setting retransmission number28-19

EAPOL frame

start28-3

EAPOL frames

802.1x authentication and28-2

OTP authentication, example (figure)28-4

edge ports

description15-7

EGP

overview1-8

EIGRP

overview1-8

Embedded CiscoView1-12

enable command3-2, 3-15

enable mode2-5

encapsulation types6-3

Enhanced Interior Gateway Routing Protocol

See EIGRP

environmental monitoring

LED indications35-2

SNMP traps35-2

supervisor engine35-2

switching modules35-2

using CLI commands35-1

EtherChannel

channel-group group command18-7, 18-9

configuration guidelines18-5

configuring18-6to 18-14

configuring Layer 218-9

configuring Layer 318-6

interface port-channel command18-7

lacp system-priority

command example18-12

modes18-3

overview18-1

PAgP

Understanding18-3

physical interface configuration18-7

port-channel interfaces18-2

port-channel load-balance command18-12

removing18-13

removing interfaces18-13

EtherChannel ports

802.1x authentication not supported in28-12

explicit host tracking

enabling16-8

extended range VLANs

See VLANs

Extensible Authentication Protocol over LAN28-2

Exterior Gateway Protocol

See EGP

F

FastDrop

clearing entries25-20

displaying entries25-19

overview25-10

FIB

description22-2

See also MFIB

filtering

in a VLAN26-10

non-IP traffic26-9

flags25-11

Flash memory

configuring router to boot from3-17

loading system images from3-17

security precautions3-17

flooded traffic, blocking30-2

forward-delay time (STP)

configuring12-18

forwarding information base

See FIB

G

gateway

See default gateway

global configuration mode2-5

Guest-VLANs

configure with 802.1x28-16

H

hardware switching22-5

hello time (STP)

configuring12-17

history

CLI2-3

hop counts

configuring MST bridges15-7

host

configuring host statically16-8

limit on dynamic port9-8

Hot Standby Routing Protocol

See HSRP

HSRP

description1-6

hw-module module num power command35-21

I

ICMP

enabling5-10

ping5-5

running IP traceroute5-7

time exceeded messages5-7

IDS

using with SPAN and RSPAN34-2

IEEE 802.1s

See MST

IEEE 802.1w

See MST

IEEE 802.3ad

See LACP

IGMP

description25-3

enabling25-13

explicit host tracking16-3, 16-8

immediate-leave processing16-3

overview16-1

IGMP filtering

configuring16-17

default configuration16-17

described16-16

monitoring16-20

IGMP groups

setting the maximum number16-19

IGMP profile

applying16-18

configuration mode16-17

configuring16-17

IGMP snooping

configuration guidelines16-4

enabling16-5

IP multicast and25-4

monitoring16-11

overview16-1

IGRP

description1-7

immediate-leave processing

enabling16-7

IGMP

See fast-leave processing

ingress packets, SPAN enhancement34-12

inline power

configuring on Cisco IP phones37-4

See PoE

Intelligent Power Management35-20

interface command3-2, 4-1

interface port-channel command18-6, 18-7

interface range command4-4

interface range macro command4-5

interfaces

adding descriptive name4-8

clearing counters4-13

configuring4-2

configuring ranges4-4

displaying information about4-12

Layer 2 modes6-4

maintaining4-12

monitoring4-12

naming4-8

numbers4-2

overview4-1

restarting4-13

See also Layer 2 interfaces

Interior Gateway Routing Protocol

See IGRP

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link encapsulation

See ISL encapsulation

Intrusion Detection System

See IDS

IP

configuring default gateway3-4

configuring static routes3-5

displaying statistics22-8

flow switching cache33-6

ip cef command22-6

ip flow-aggregation cache destination-prefix command33-8

ip flow-aggregation cache prefix command33-8

ip flow-aggregation cache source-prefix command33-8

ip flow-export command33-6

ip icmp rate-limit unreachable command5-11

ip igmp profile command16-17

ip igmp snooping tcn flood command16-10

ip igmp snooping tcn flood query count command16-10

ip igmp snooping tcn query solicit command16-11

ip load-sharing per-destination command22-7

ip local policy route-map command24-5

ip mask-reply command5-12

IP multicast

clearing table entries25-20

configuring25-12

default configuration25-13

displaying PIM information25-15

displaying the routing table information25-16

enabling25-13

enabling dense-mode PIM25-14

enabling sparse-mode25-14

features not supported25-12

hardware forwarding25-8

IGMP snooping and16-4, 25-4

monitoring25-15

overview25-1

routing protocols25-2

software forwarding25-8

See also Auto-RP; IGMP; PIM; RP; RPF

ip multicast-routing command25-13

IP phones

automatic classification and queueing32-16

configuring voice ports37-2

See Cisco IP Phones37-1

trusted boundary for QoS32-24

ip pim command25-14

ip pim dense-mode command25-14

ip pim sparse-dense-mode command25-15

ip policy route-map command24-4

ip redirects command5-11

ip route-cache flow command33-5

IP routing tables

deleting entries25-20

IP Source Guard

configuring20-11

configuring on private VLANs20-13

displaying20-13, 20-14

overview20-11

IP statistics

displaying22-8

IP traceroute

executing5-7

overview5-7

IP unicast

displaying statistics22-8

ip unreachables command5-10

IPX

redistribution of route information with EIGRP1-8

ISL

encapsulation6-3

trunking with 802.1Q tunneling14-4

isolated ports

description10-1

isolated VLANs

description10-2

IST

description15-2

MST regions and15-2

IST master

description15-7

J

jumbo frames

and ethernet ports4-10

configuring MTU sizes for4-11

ports and linecards that support4-9

VLAN interfaces4-10

K

keyboard shortcuts2-3

L

l2protocol-tunnel command14-11

labels

definition32-3

LACP

system ID18-4

Layer 2 access ports6-8

Layer 2 frames

classification with CoS32-2

Layer 2 interfaces

assigning VLANs8-8

configuring6-5

configuring as PVLAN host ports10-8

configuring as PVLAN promiscuous ports10-7

configuring as PVLAN trunk ports10-9

defaults6-5

disabling configuration6-9

modes6-4

show interfaces command6-7

Layer 2 interface type

resetting10-11

setting10-11

Layer 2 protocol tunneling

configuring14-9

default configuration14-9

defined14-7

guidelines14-10

Layer 2 switching

overview6-1

Layer 2 Traceroute

and ARP5-9

and CDP5-8

described5-8

host-to-host paths5-8

IP addresses and subnets5-9

MAC addresses and VLANs5-9

multicast traffic5-9

multiple devices on a port5-9

unicast traffic1-3, 5-8

usage guidelines5-8

Layer 2 trunks

configuring6-6

overview6-3

Layer 3 packets

classification methods32-2

Layer 4 port operations

configuration guidelines26-6

restrictions26-6

LEDs

description (table)35-2

listening state (STP)

RSTP comparisons (table)15-4

load balancing

configuring for CEF22-7

configuring for EtherChannel18-12

overview18-5, 22-6

per-destination22-7

login timer

changing5-4

logoutwarning command5-4

loop guard

and MST15-2

configuring13-9

overview13-2

M

MAC addresses

allocating12-5

building tables6-2

convert dynamic to sticky secure27-2

displaying5-3

displaying in DHCP snooping binding table20-10

in ACLs26-9

sticky27-2

sticky secure, adding27-2

MAC extended access lists26-9

macros

See SmartPort macros

mapping

DSCP markdown values32-23

DSCP values to transmit queues32-39

mapping tables

configuring DSCP32-41

described32-13

mask destination command33-8

mask source command33-8

match ip address command24-3

maximum aging time (STP)

configuring12-18

member switches

in VMPS9-1

metro tags14-2

MFIB

CEF25-5

displaying25-18

overview25-11

modules

checking status5-1

powering down35-21

monitoring

802.1Q tunneling14-12

ACL information26-26

IGMP filters16-20

IGMP snooping16-11

Layer 2 protocol tunneling14-12

multi-VRF CE23-11

tunneling14-12

VLAN filters26-17

VLAN maps26-17

M-record15-2

MST

and multiple spanning trees1-4, 15-2

boundary ports15-6

BPDUs15-2

configuration parameters15-5

configuring15-9

displaying configurations15-13

edge ports15-7

enabling15-9

hop count15-7

instances

configuring parameters15-12

description15-2

number supported15-5

interoperability with PVST+15-2

link type15-7

master15-7

message age15-7

regions15-5, 15-6

restrictions15-8

to-SST interoperability15-4

MSTP

M-record15-2

M-tree15-2

M-tree15-2

MTU size

configuring4-11

MTU size (default)8-4

multicast

See IP multicast

multicast packets

blocking30-2

multicast routers

displaying routing tables25-16

flood suppression16-9

Multicast Storm Control

overview31-6

suppression on WS-X401431-7

suppression on WS-X401631-6

multiple forwarding paths1-4, 15-2

Multiple Spanning Tree

See MST

multiple VPN routing/forwarding in customer edge devices

See multi-VRF CE

multi-VRF CE

components23-3

configuration example23-7

default configuration23-3

defined23-1

displaying23-11

monitoring23-11

network components23-3

packet-forwarding process23-3

N

native VLAN

and 802.1Q tunneling14-4

specifying6-6

NetFlow

aggregation

minimum mask,default value33-8

destination-prefix aggregation

configuration (example)33-13

minimum mask, configuring33-8

IP

flow switching cache33-6

prefix aggregation

configuration (example)33-10

minimum mask, configuring33-8

source-prefix aggregation

minimum mask, configuring33-8

switching

configuration (example)33-9

configuring33-5

exporting cache entries33-6

statistics33-6

NetFlow statistics

caveats on supervisor33-4

configuring collection33-4

implementing collection33-4

overview of collection33-1

network fault tolerance1-4, 15-2

network management

configuring17-1

Next Hop Resolution Protocol

See NHRP

NFFC/NFFC II

IGMP snooping and16-4

NHRP

support1-8

non-IP traffic filtering26-9

non-RPF traffic

description25-9

in redundant configurations (figure)25-10

nonvolatile random-access memory

See NVRAM

normal-range VLANs

See VLANs

NVRAM

saving settings3-3

O

OIR

overview4-12

online insertion and removal

See OIR

Open Shortest Path First

See OSPF

operating system images

See system images

OSPF

area concept1-7

description1-7

P

packets

modifying32-15

packet type filtering34-13

PAgP

understanding18-3

passwords

configuring enable password3-7

configuring enable secret password3-7

encrypting3-9

recovering lost enable password3-12

setting line password3-8

setting TACACS+3-8

PBR (policy-based routing)

configuration (example)24-5

enabling24-3

features24-2

overview24-1

route maps24-2

when to use24-2

per-port and VLAN Access Control List20-11

Per-VLAN Rapid Spanning Tree12-6

enabling12-20

overview12-6

PE to CE routing, configuring23-6

PIM

configuring dense mode25-14

configuring sparse mode25-14

displaying information25-15

displaying statistics25-20

enabling sparse-dense mode25-14, 25-15

overview25-3

PIM-DM25-3

PIM-SM25-3

ping

executing5-6

overview5-5

ping command5-6, 25-15

PoE35-22

configuring35-16

configuring power consumption for single device35-20

configuring power consumption for switch35-19

power consumption for powered devices

Intelligent Power Management35-20

powering down a module35-21

power management modes35-16

show interface status35-21

point-to-point

in 802.1x authentication (figure)28-2, 28-8

police command32-32

policed-DSCP map32-42

policers

description32-5

number of32-11

types of32-10

policies

See QoS policies

policing

See QoS policing

policy-map command32-29, 32-31

policy maps

attaching to interfaces32-34

configuring32-30

port ACLs

and voice VLAN26-4

defined26-2

limitations26-4

Port Aggregation Protocol

see PAgP

port-based authentication

changing the quiet period28-17

client, defined28-2

configuration guidelines28-12

configure 802.1x accounting28-15

configure switch-to-RADIUS server communication28-14

configure with Guest-VLANs28-16

configuring Guest-VLAN28-14

configuring manual re-authentication of a client28-17

controlling authorization state28-4

default configuration28-11

described28-2

device roles28-2

disabling28-13

displaying statistics28-21

enabling28-12

enabling multiple hosts28-20

enabling periodic re-authentication28-16

encapsulation28-2

initiation and message exchange28-3

method lists28-12

ports not supported28-4

resetting to default values28-20

setting retransmission number28-19

setting retransmission time28-18

topologies, supported28-9

using with port security28-6

with VLAN assignment28-5

port-based QoS features

See QoS

port-channel interfaces

See also EtherChannel

creating18-6

overview18-2

port-channel load-balance

command18-11

command example18-12

port-channel load-balance command18-12

port cost (STP)

configuring12-15

PortFast

and MST15-2

BPDU filter,configuring13-12

configuring or enabling13-11

overview13-3

PortFast BPDU filtering

and MST15-2

enabling13-12

overview13-4

PortFast STP parameter9-3

port priority

configuring MST instances15-12

configuring STP12-13

ports

blocking30-1

checking status5-2

community10-1

dynamic VLAN membership

configuring9-5

overview9-2

reconfirming9-7

forwarding, resuming30-3

isolated10-1

PVLAN types10-1

secure27-1

See also interfaces

port security

aging27-6

and QoS trusted boundary32-24

configuring27-4

default configuration27-3

described27-1

displaying27-7

RADIUS accounting28-7

sticky learning27-2

using with 802.1x28-6

violations27-2

with other features27-3

port states

description12-5

port trust state

See trust states

power, inline37-4

power dc input command35-10

power inline command35-17

power inline consumption command35-19, 35-20

power management

1+1 redundancy mode35-11

2+1 redundancy mode35-11

Catalyst 4006 switch35-10

Catalyst 4500 series35-3

Catalyst 4500 Series power supplies35-9

combined mode35-4

configuring combined mode35-8

configuring redundant mode35-7

overview35-1

redundancy35-10

redundant mode35-4

power over Ethernet

See PoE

power redundancy

setting on Catalyst 400635-13

power redundancy-mode comand35-7

power supplies

fixed35-3

variable35-4

power supplies required command35-13

primary VLANs

associating with secondary VLANs10-6

description10-1

priority

overriding CoS of incoming frames37-3

privileged EXEC mode2-5

privileges

changing default3-10

configuring levels3-10

exiting3-11

logging in3-11

promiscuous ports

configuring PVLAN10-7

description10-1

setting mode10-11

protocol timers12-4

provider edge devices23-2

pruning, VTP

See VTP pruning

pseudobridges

description15-5

PVACL20-11

PVLANs

802.1q support10-3

configuration guidelines10-4

configuring10-4

configuring promiscuous ports10-7

host ports

setting10-11

isolated VLANs10-2

overview10-1

permitting routing, example10-10

promiscuous mode

setting10-11

setting

interface mode10-11

Q

QoS

allocating bandwidth32-40

auto-QoS

configuration and defaults display32-19

configuration guidelines32-17

described32-16

displaying32-19

effects on NVRAM configuration32-17

enabling for VoIP32-18

basic model32-5

burst size32-27

classification32-6to 32-10

configuration guidelines32-23

auto-QoS32-17

configuring

auto-QoS32-16

DSCP maps32-41

traffic shaping32-40

trusted boundary32-24

VLAN-based32-35

creating policing rules32-28

default auto configuration32-16

default configuration32-22

definitions32-3

disabling on interfaces32-34

enabling on interfaces32-34

flowcharts32-8, 32-12

IP phones

automatic classification and queueing32-16

detection and trusted settings32-16, 32-24

overview32-1

packet modification32-15

port-based32-35

priority32-15

traffic shaping32-15

transmit rate32-40

trust states

trusted device32-24

VLAN-based32-35

See also COS; DSCP values; transmit queues

QoS active queue management

tracking queue length32-14

QoS labels

definition32-3

QoS mapping tables

CoS-to-DSCP32-41

DSCP-to-CoS32-43

policed-DSCP32-42

types32-13

QoS marking

description32-5

QoS policers

burst size32-27

numbers of32-11

types of32-10

QoS policing

definition32-5

described32-5, 32-10

QoS policy

attaching to interfaces32-11

overview of configuration32-28

QoS transmit queues

allocating bandwidth32-40

burst32-15

configuring32-38

configuring traffic shaping32-40

mapping DHCP values to32-39

maximum rate32-15

overview32-14

sharing link bandwidth32-14

Quality of service

See QoS

queueing32-6, 32-14

R

RADIUS server

configure to-Switch communication28-14

configuring settings28-15

parameters on the switch28-14

range command4-4

range macros

defining4-5

ranges of interfaces

configuring4-4

Rapid Spanning Tree

See RSTP

re-authentication of a client

configuring manual28-17

enabling periodic28-16

reduced MAC address12-2

redundancy (RPR)

configuring36-4

route processor redundancy36-2

supervisor engine and Cisco IOS software36-3

related documentationxxiii

reload command3-15, 3-16

replication

description25-8

reserved-range VLANs

See VLANs

retransmission number

setting in 802.1x authentication28-19

retransmission time

changing in 802.1x authentication28-18

RIP

description1-7

ROM monitor

boot process and3-13

CLI2-6

root bridge

configuring12-9

selecting in MST15-2

root guard

and MST15-2

enabling13-8

overview13-2

routed packets

ACLs26-19

route-map (IP) command24-3

route maps

defining24-3

PBR24-2

route processor redundancy

See redundancy (RPR+)

router ACLs

description26-2

using with VLAN maps26-18

route targets

VPN23-3

Routing Information Protocol

See RIP

RPR+

See redundancy (RPR+)

RSPAN

configuration guidelines34-14

destination ports34-5

IDS34-2

monitored ports34-4

monitoring ports34-5

received traffic34-3

sessions

creating34-15

defined34-3

limiting source traffic to specific VLANs34-21

monitoring VLANs34-20

removing source (monitored) ports34-19

specifying monitored ports34-15

source ports34-4

transmitted traffic34-4

VLAN-based34-5

RSTP

compatibility15-3

description15-2

port roles15-3

port states15-4

S

SAID

See 802.10 SAID

scheduling32-14

defined32-5

overview32-6

secondary root switch12-12

secondary VLANs

associating with primary10-6

description10-2

permitting routing10-10

secure ports, configuring27-1

Security Association Identifier

See 802.10 SAID

servers, VTP

See VTP servers

service-policy command32-29

service-policy input command7-1, 32-34

service-provider networks

and customer VLANs14-2

Layer 2 protocols across14-7

set default interface command24-4

set interface command24-4

set ip default next-hop command24-4

set ip next-hop command24-4

show adjacency command22-9

show boot command3-18

show catalyst4000 chassis-mac-address command12-3

show cdp command17-2, 17-3

show cdp entry command17-4

show cdp interface command17-3

show cdp neighbors command17-4

show cdp traffic command17-4

show ciscoview package command1-15

show ciscoview version command1-15

show configuration command4-8

show debugging command17-4

show environment command35-1

show history command2-4

show interfaces command4-11, 4-12

show interfaces status command5-2

show ip cache flow aggregation destination-prefix command33-9

show ip cache flow aggregation prefix command33-9

show ip cache flow aggregation source-prefix command33-9

show ip cache flow command33-6

show ip cef command22-8

show ip interface command25-15

show ip local policy command24-5

show ip mroute command25-15

show ip pim interface command25-15

show l2protocol command14-11

show mac-address-table address command5-3

show mac-address-table interface command5-3

show mls entry command22-8

show module command5-1, 12-5

show PoE consumed35-22

show power command35-13

show power inline command35-21

show power inline consumption command35-19

show power supplies command35-7

show protocols command4-12

show running-config command

adding description for an interface4-8

checking your settings3-3

displaying ACLs26-12, 26-14, 26-21, 26-22

show startup-config command3-4

show users command5-4

show version command3-16

shutdown, command4-13

shutdown threshold for Layer 2 protocol packets14-9

shutting down

interfaces4-13

single spanning tree

See SST

slot numbers, description4-1

SmartPort macros

configuration guidelines38-4

configuring38-2

creating and applying38-4

default configuration38-2

defined38-1

displaying38-8

tracing38-4

SNMP

documentation1-12

support1-12

software

upgrading36-5

software configuration register3-13

software switching

description22-5

interfaces22-6

key data structures used25-7

SPAN

configuration guidelines34-7

configuring34-6to 34-10

destination ports34-5

IDS34-2

monitored port, defined34-4

monitoring port, defined34-5

received traffic34-3

sessions

defined34-3

source ports34-4

transmitted traffic34-4

VLAN-based34-5

SPAN and RSPAN

concepts and terminology34-3

default configuration34-6

displaying status34-23

overview34-1

session limits34-6

SPAN destination ports

802.1x authentication not supported28-12

SPAN enhancements

configuration example34-14

CPU port sniffing34-10

encapsulation configuration34-12

ingress packets34-12

packet type filtering34-13

spanning-tree backbonefast command13-15

spanning-tree cost command12-15

spanning-tree guard root command13-8

spanning-tree portfast bpdu-guard command13-12

spanning-tree portfast command13-11

spanning-tree port-priority command12-13

spanning-tree uplinkfast command13-14

spanning-tree vlan

command12-9

command example12-9

spanning-tree vlan command12-8

spanning-tree vlan cost command12-15

spanning-tree vlan forward-time command12-19

spanning-tree vlan hello-time command12-17

spanning-tree vlan max-age command12-18

spanning-tree vlan port-priority command12-13

spanning-tree vlan priority command12-17

spanning-tree vlan root primary command12-10

spanning-tree vlan root secondary command12-12

speed

configuring interface4-6

speed command4-7

SST

description15-2

interoperability15-4

static routes

configuring3-5

verifying3-6

statistics

displaying 802.1X28-21

displaying PIM25-20

NetFlow accounting33-6

sticky learning

configuration file27-2

defined27-2

disabling27-2

enabling27-2

saving addresses27-2

sticky MAC addresses

configuring27-4

defined27-2

Storm Control

disabling31-4

displaying31-4

enabling31-3

hardware-based, implementing31-2

overview31-1

STP

bridge ID12-2

configuring12-7to 12-20

creating topology12-4

defaults12-6

disabling12-19

enabling12-7

enabling extended system ID12-8

enabling Per-VLAN Rapid Spanning Tree12-20

forward-delay time12-18

hello time12-17

Layer 2 protocol tunneling14-7

maximum aging time12-18

overview12-1, 12-3

per-VLAN rapid spanning tree12-6

port cost12-15

Port Fast parameter9-3

port priority12-13

root bridge12-9

supervisor engine

configuring3-2to 3-6

copying files to standby36-7

default configuration3-1

default gateways3-4

environmental monitoring35-1

redundancy36-1

ROM monitor3-13

startup configuration3-12

static routes3-5

synchronizing configurations36-4

SVIs

and router ACLs26-3

switched packets

and ACLs26-19

Switched Port Analyzer

See SPAN

switching

NetFlow

configuration (example)33-9

configuring33-5

exporting cache entries33-6

switchport

show interfaces4-11

switchport access vlan command6-6, 6-8

switchport block multicast command30-2

switchport block unicast command30-2

switchport mode access command6-8

switchport mode dot1q-tunnel command14-6

switchport mode dynamic command6-6

switchport mode trunk command6-6

switch ports

See access ports

switchport trunk allowed vlan command6-6

switchport trunk encapsulation command6-6

switchport trunk encapsulation dot1q command6-3

switchport trunk encapsulation isl command6-3

switchport trunk encapsulation negotiate command6-3

switchport trunk native vlan command6-6

switchport trunk pruning vlan command6-6

switch-to-RADIUS server communication

configuring28-14

syslog messages35-2

system

reviewing configuration3-4

settings at startup3-14

system images

loading from Flash memory3-17

modifying boot field3-14

specifying3-17

system MTU

802.1Q tunneling14-5

maximums14-5

T

TACACS+

setting passwords3-8

tagged packets

802.1Q14-3

Layer 2 protocol14-7

Telnet

accessing CLI2-2

disconnecting user sessions5-5

executing5-3

monitoring user sessions5-4

telnet command5-4

time exceeded messages5-7

timer

See login timer

Token Ring

media not supported (note)8-4, 11-3

TOS

description32-4

trace command5-7

traceroute

See IP traceroute

See Layer 2 Traceroute

traceroute mac command5-9

traceroute mac ip command5-9

traffic

blocking flooded30-2

traffic control

using ACLs (figure)26-4

using VLAN maps (figure)26-5

traffic shaping32-15

translational bridge numbers (defaults)8-4

transmit queues

See QoS transmit queues

transmit rate32-40

troubleshooting

with traceroute5-7

trunk ports

802.1x authentication not supported on28-12

configuring PVLAN10-9to 10-10

trunks

802.1Q restrictions6-5

configuring6-6

configuring access VLANs6-6

configuring allowed VLANs6-6

default interface configuration6-6

different VTP domains6-3

enabling to non-DTP device6-4

encapsulation6-3

specifying native VLAN6-6

understanding6-3

trusted boundary for QoS32-24

trust states

configuring32-36

tunneling

defined14-1

Layer 2 protocol14-7

tunnel ports

802.1Q, configuring14-6

described14-1

incompatibilities with other features14-5

type of service

See TOS

U

UDLD

default configuration19-2

disabling19-3

enabling19-3

overview19-1, 29-1

unauthorized ports with 802.1X28-4

unicast

See IP unicast

unicast flood blocking

configuring30-1

unicast traffic

blocking30-2

unidirectional ethernet

enabling7-1

example of setting7-2

overview7-1

UniDirectional Link Detection Protocol

See UDLD

UplinkFast

and MST15-2

enabling13-14

MST and15-3

overview13-5

user EXEC mode2-5

user sessions

disconnecting5-5

monitoring5-4

V

VACLs

Layer 4 port operations26-6

virtual LANs

See VLANs

Virtual Private Network

See VPN

VLAN ACLs

See VLAN maps

vlan command8-6, 8-7

vlan database command8-7

vlan dot1q tag native command14-4

VLAN Management Policy Server

see VMPS

VLAN maps

applying26-14, 26-22

common uses for26-15

configuration example26-15

configuration guidelines26-11

configuring26-10

creating entries26-12

defined26-3

denying access example26-16

denying packets26-12

displaying26-17

examples26-16

order of entries26-11

permitting packets26-12

router ACLs and26-18

using (figure)26-5

VLAN Query Protocol (VQP)9-1

VLANs

allowed on trunk6-6

configuration guidelines8-3

configuring8-4

customer numbering in service-provider networks14-3

default configuration8-4

description1-5

extended range8-3

IDs (default)8-4

interface assignment8-8

limiting source traffic with RSPAN34-21

monitoring with RSPAN34-20

name (default)8-4

normal range8-3

overview8-1

reserved range8-3

See also PVLANs

VLAN Trunking Protocol

See VTP

VLAN trunks

overview6-3

VMPS

administering9-5

dynamic port membership

configuring9-5

overview9-2

reconfirming9-7

in a cluster of switches9-1

monitoring9-5

overview9-1

reconfirming assignments9-7

reconfirming membership interval9-7

voice interfaces

configuring37-1

Voice over IP

configuring37-1

voice ports

configuring VVID37-2

voice traffic35-16, 37-4

VPN

configuring routing in23-5

forwarding23-3

in service provider networks23-1

routes23-2

routing and forwarding table

See VRF

VRF

defining23-3

tables23-1

VTP

configuration guidelines11-5

configuring11-6to 11-10

configuring transparent mode11-9

default configuration11-5

disabling11-9

Layer 2 protocol tunneling14-7

monitoring11-10

overview11-1

See also VTP version 2

VTP advertisements

description11-3

VTP clients

configuring11-8

VTP domains

description11-2

VTP modes11-2

VTP pruning

enabling11-6

overview11-3

VTP servers

configuring11-7

VTP statistics

displaying11-10

VTP version 2

enabling11-7

overview11-3

See also VTP

VVID

configuring37-2