Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(20)EW
Index
Downloads: This chapterpdf (PDF - 834.0KB) The complete bookPDF (PDF - 6.09MB) | Feedback

Index           

Table Of Contents

           

Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V -

Index           

Symbols

28-12

Numerics

802.10 SAID (default)7-4

802.1Q

trunks11-6

tunneling

compatibility with other features16-5

defaults16-4

described16-2

tunnel ports with other features16-6

802.1Q VLANs

encapsulation9-3

trunk restrictions9-5

802.1s

See MST

802.1w

See MST

802.1X

See port-based authentication

802.1X authentication

RADIUS accounting28-7

support for guest VLANs28-6

using with port security28-6

802.3ad

See LACP

A

AAA

enabling28-12

abbreviating commands2-5

access control entries

See ACEs

access list filtering, SPAN enhancement37-13

access ports

and Layer 2 protocol tunneling16-9

configuring9-8

access VLANs9-6

accounting

configuring for 802.1X28-15

ACEs

ACLs32-2

Ethernet32-2

IP32-2

Layer 4 operation restrictions32-8

ACLs

ACEs32-2

and SPAN37-5

and TCAM programming32-6

applying on routed packets32-21

applying on switched packets32-20

compatibility on the same switch32-3

configuring with VLAN maps32-20

CPU impact32-9

hardware and software support32-5

IP, matching criteria for port ACLs32-4

MAC extended32-11

matching criteria for router ACLs32-3

port

and voice VLAN32-4

defined32-2

limitations32-4

processing32-9

types supported32-2

acronyms, list ofA-1

active queue management26-13

addresses

See MAC addresses

adjacency tables

description21-2

displaying statistics21-9

advertisements, VTP

See VTP advertisements

alarms

major36-2

minor36-2

asymmetrical links, and 802.1Q tunneling16-4

audiencexxi

authentication

See also port-based authentication

authentication server

defined28-3

RADIUS server28-3

authorized and unauthorized ports28-4

authorized ports with 802.1X28-4

autoconfiguration3-2

automatic QoS

See QoS

Auto-QoS

configuring26-15

B

BackboneFast

adding a switch (figure)12-2

and MST13-2

configuring12-15

link failure (figure)12-7, 12-8

not supported MST13-2

understanding12-6

See also STP

BGP1-8

routing session with multi-VRF CE25-6

blocking packets34-1

blocking state (STP)

RSTP comparisons (table)13-4

boot bootldr command3-24

boot command3-21

boot fields

See configuration register boot fields

boot system command3-19, 3-24

boot system flash command3-21

Border Gateway Protocol

See BGP

boundary ports

description13-6

BPDU Guard

and MST13-2

configuring12-12

overview12-4

BPDUs

and media speed11-2

pseudobridges and13-5

what they contain11-3

bridge ID

See STP bridge ID

bridge priority (STP)11-16

bridge protocol data units

See BPDUs

broadcast storm control

disabling35-4

BSR

configuration example22-21

burst rate26-39

burst size26-26

C

cautions for passwords

encrypting3-16

TACACS+3-15

CDP

and trusted boundary26-24

configuration17-2

displaying configuration17-3

enabling on interfaces17-3

Layer 2 protocol tunneling16-7

maintaining17-3

monitoring17-3

overview1-2, 17-1

cdp enable command17-3

CEF

adjacency tables21-2

configuring load balancing21-7

displaying statistics21-8

enabling21-6

hardware switching21-4

load balancing21-6

overview21-1

software switching21-4

CGMP

overview15-1

channel-group group command14-7, 14-10

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco IP Phones

configuring27-2

Cisco IP phones

sound quality27-1

CiscoView1-12

CIST

description13-2

class-map command26-27

class of service

See CoS

clear cdp counters command17-4

clear cdp table command17-3

clear counters command4-13

clearing

IP multicast table entries22-20

clear ip flow stats command38-6

CLI

accessing2-1

backing out one level2-5

getting commands2-5

history substitution2-3

modes2-5

monitoring environments37-1

ROM monitor2-6

software basics2-4

clients

in 802.1X authentication28-2

command-line processing2-3

command modes2-5

commands

listing2-5

command switches

in VMPS8-1

common and internal spanning tree

See CIST

common spanning tree

See CST

community ports

description33-1

community VLANs

and SPAN features33-4

configure as a PVLAN33-5

description33-1

config-register command3-22

config terminal command3-9

configuration files

obtaining with DHCP3-6

saving3-10

configuration guidelines

for VMPS8-3

configuration register

boot fields

listing value3-22

modifying3-21

changing settings3-22

configuring3-19

settings at startup3-21

configure terminal command3-22, 4-2

console configuration mode2-5

console port

disconnecting user sessions5-5

monitoring user sessions5-4

copy running-config startup-config command3-10

copy system:running-config nvram:startup-config command3-24

CoS

configuring port value26-36

definition26-3

figure26-2

overriding on Cisco IP Phones27-3

priority27-3

CoS-to-DSCP maps26-40

counters

clearing MFIB22-20

clearing on interfaces4-13

CPU port sniffing37-10

CST

description13-5

IST and13-2

MST and13-2

customer edge devices25-2

D

default configuration

802.1X28-11

auto-QoS26-15

IGMP filtering15-17

Layer 2 protocol tunneling16-9

multi-VRF CE25-3

SPAN and RSPAN37-6

default gateway

configuring3-11

verifying configuration3-11

default ports

and support for 802.1X authentication28-12

description command4-9

detecting unidirectional links18-1

DHCP-based autoconfiguration

client request message exchange3-3

configuring

client side3-2

DNS3-5

relay device3-5

server-side3-3

TFTP server3-4

example3-7

lease options

for IP address information3-4

for receiving the configuration file3-4

overview3-2

relationship to BOOTP3-2

DHCP snooping

configuring30-3

default configuration30-3

displaying binding tables30-10

displaying configuration30-10

enabling30-4

enabling on private VLAN30-5

enabling the database agent30-6

monitoring30-9, 30-13, 30-14

overview30-1

Snooping database agent30-2

DHCP Snooping Database Agent

adding to the database (example)30-9

enabling (example)30-6

overview30-2

reading from a TFTP file (example)30-8

Differentiated Services Code Point values

See DSCP values

DiffServ architecture, QoS26-2

disabled state

RSTP comparisons (table)13-4

disabling

broadcast storm control35-4

disconnect command5-5

DNS

and DHCP-based autoconfiguration3-5

documentation

organizationxxi

relatedxxiii

double-tagged packets

802.1Q tunneling16-2

Layer 2 protocol tunneling16-9

drop threshold for Layer 2 protocol packets16-9

DSCP maps26-40

DSCP-to-CoS maps

configuring26-42

DSCP values

configuring maps26-40

configuring port value26-37

definition26-3

IP precedence26-2

mapping markdown26-22

mapping to transmit queues26-38

DTP

VLAN trunks and9-3

duplex command4-8

duplex mode

configuring interface4-7

Dynamic Host Configuration Protocol snooping

See DHCP snooping

dynamic ports

limit on hosts8-8

dynamic port VLAN membership

configuring8-5

overview8-2

reconfirming8-7

troubleshooting8-8

Dynamic Trunking Protocol

See DTP

E

EAP

request/identity frame28-3

response/identity frame28-3

EAP frames

changing retransmission time28-18

exchanging (figure)28-4

setting retransmission number28-19

EAPOL frame

start28-3

EAPOL frames

802.1X authentication and28-2

OTP authentication, example (figure)28-4

edge ports

description13-7

EGP

overview1-8

EIGRP

overview1-8

Embedded CiscoView1-12

enable command3-9, 3-22

enable mode2-5

encapsulation types9-3

Enhanced Interior Gateway Routing Protocol

See EIGRP

environmental monitoring

LED indications36-2

SNMP traps36-2

supervisor engine36-2

switching modules36-2

using CLI commands36-1

EtherChannel

channel-group group command14-7, 14-10

configuration guidelines14-5

configuring14-6to 14-14

configuring Layer 214-9

configuring Layer 314-6

interface port-channel command14-7

lacp system-priority

command example14-12

modes14-3

overview14-1

PAgP

Understanding14-3

physical interface configuration14-7

port-channel interfaces14-2

port-channel load-balance command14-12

removing14-14

removing interfaces14-13

EtherChannel ports

802.1x authentication not supported in28-12

explicit host tracking

enabling15-8

extended range VLANs

See VLANs

Extensible Authentication Protocol over LAN28-2

Exterior Gateway Protocol

See EGP

F

FastDrop

clearing entries22-20

displaying entries22-19

overview22-10

FIB

description21-2

See also MFIB

filtering

in a VLAN32-12

non-IP traffic32-11

flags22-11

Flash memory

configuring router to boot from3-24

loading system images from3-23

security precautions3-24

flooded traffic, blocking34-2

forward-delay time (STP)

configuring11-18

forwarding information base

See FIB

G

gateway

See default gateway

global configuration mode2-5

Guest-VLANs

configure with 802.1X28-16

H

hardware and software ACL support32-5

hardware switching21-5

hello time (STP)

configuring11-17

history

CLI2-3

hop counts

configuring MST bridges13-7

host

configuring host statically15-8

limit on dynamic port8-8

Hot Standby Routing Protocol

See HSRP

HSRP

description1-6

hw-module module num power command36-21

I

ICMP

enabling5-10

ping5-5

running IP traceroute5-7

time exceeded messages5-7

IDS

using with SPAN and RSPAN37-2

IEEE 802.1s

See MST

IEEE 802.1w

See MST

IEEE 802.3ad

See LACP

IGMP

description22-3

enabling22-13

explicit host tracking15-3, 15-8

immediate-leave processing15-3

overview15-1

IGMP filtering

configuring15-17

default configuration15-17

described15-16

monitoring15-20

IGMP groups

setting the maximum number15-19

IGMP profile

applying15-18

configuration mode15-17

configuring15-17

IGMP snooping

configuration guidelines15-4

enabling15-5

IP multicast and22-4

monitoring15-11

overview15-1

IGRP

description1-7

immediate-leave processing

enabling15-7

IGMP

See fast-leave processing

ingress packets, SPAN enhancement37-12

inline power

configuring on Cisco IP phones27-4

See PoE

Intelligent Power Management36-20

interface command3-9, 4-1

interface port-channel command14-7

interface range command4-4

interface range macro command4-5

interfaces

adding descriptive name4-9

clearing counters4-13

configuring4-2

configuring ranges4-4

displaying information about4-13

Layer 2 modes9-4

maintaining4-13

monitoring4-13

naming4-9

numbers4-2

overview4-1

restarting4-14

See also Layer 2 interfaces

Interior Gateway Routing Protocol

See IGRP

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link encapsulation

See ISL encapsulation

Intrusion Detection System

See IDS

IP

configuring default gateway3-11

configuring static routes3-11

displaying statistics21-8

flow switching cache38-6

ip cef command21-6

ip flow-aggregation cache destination-prefix command38-8

ip flow-aggregation cache prefix command38-8

ip flow-aggregation cache source-prefix command38-8

ip flow-export command38-6

ip icmp rate-limit unreachable command5-11

ip igmp profile command15-17

ip igmp snooping tcn flood command15-10

ip igmp snooping tcn flood query count command15-10

ip igmp snooping tcn query solicit command15-11

IP information

assigned

through DHCP-based autoconfiguration3-2

ip load-sharing per-destination command21-7

ip local policy route-map command23-5

ip mask-reply command5-12

IP multicast

clearing table entries22-20

configuring22-12

default configuration22-13

displaying PIM information22-15

displaying the routing table information22-16

enabling22-13

enabling dense-mode PIM22-14

enabling sparse-mode22-14

features not supported22-12

hardware forwarding22-8

IGMP snooping and15-4, 22-4

monitoring22-15

overview22-1

routing protocols22-2

software forwarding22-8

See also Auto-RP; IGMP; PIM; RP; RPF

ip multicast-routing command22-13

IP phones

automatic classification and queueing26-15

configuring voice ports27-2

See Cisco IP Phones27-1

trusted boundary for QoS26-24

ip pim command22-14

ip pim dense-mode command22-14

ip pim sparse-dense-mode command22-15

ip policy route-map command23-4

ip redirects command5-11

ip route-cache flow command38-5

IP routing tables

deleting entries22-20

IP Source Guard

configuring30-11

configuring on private VLANs30-12

displaying30-13, 30-14

overview30-10

IP statistics

displaying21-8

IP traceroute

executing5-7

overview5-7

IP unicast

displaying statistics21-8

ip unreachables command5-10

IPX

redistribution of route information with EIGRP1-8

ISL

encapsulation9-3

trunking with 802.1Q tunneling16-4

isolated ports

description33-1

isolated VLANs

description33-1

IST

description13-2

MST regions and13-2

IST master

description13-7

J

jumbo frames

and ethernet ports4-10

configuring MTU sizes for4-11

ports and linecards that support4-10

VLAN interfaces4-11

K

keyboard shortcuts2-3

L

l2protocol-tunnel command16-11

labels

definition26-3

LACP

system ID14-4

Layer 2 access ports9-8

Layer 2 frames

classification with CoS26-2

Layer 2 interfaces

assigning VLANs7-8

configuring9-5

configuring as PVLAN host ports33-8

configuring as PVLAN promiscuous ports33-7

configuring as PVLAN trunk ports33-9

defaults9-5

disabling configuration9-9

modes9-4

show interfaces command9-7

Layer 2 interface type

resetting33-11

setting33-11

Layer 2 protocol tunneling

configuring16-9

default configuration16-9

defined16-7

guidelines16-10

Layer 2 switching

overview9-1

Layer 2 Traceroute

and ARP5-9

and CDP5-8

described5-8

host-to-host paths5-8

IP addresses and subnets5-9

MAC addresses and VLANs5-9

multicast traffic5-9

multiple devices on a port5-9

unicast traffic1-3, 5-8

usage guidelines5-8

Layer 2 trunks

configuring9-6

overview9-3

Layer 3 packets

classification methods26-2

Layer 4 port operations

configuration guidelines32-8

restrictions32-8

LEDs

description (table)36-2

listening state (STP)

RSTP comparisons (table)13-4

load balancing

configuring for CEF21-7

configuring for EtherChannel14-12

overview14-5, 21-6

per-destination21-7

login timer

changing5-4

logoutwarning command5-4

loop guard

and MST13-2

configuring12-9

overview12-2

M

MAC addresses

allocating11-5

building tables9-2

convert dynamic to sticky secure29-2

displaying5-3

displaying in DHCP snooping binding table30-10

in ACLs32-11

sticky29-2

sticky secure, adding29-2

MAC extended access lists32-11

macros

See SmartPort macros

mapping

DSCP markdown values26-22

DSCP values to transmit queues26-38

mapping tables

configuring DSCP26-40

described26-13

mask destination command38-8

mask source command38-8

match ip address command23-3

maximum aging time (STP)

configuring11-18

member switches

in VMPS8-1

metro tags16-2

MFIB

CEF22-5

displaying22-18

overview22-11

modules

checking status5-1

powering down36-21

monitoring

802.1Q tunneling16-12

ACL information32-28

IGMP filters15-20

IGMP snooping15-11

Layer 2 protocol tunneling16-12

multi-VRF CE25-11

tunneling16-12

VLAN filters32-19

VLAN maps32-19

M-record13-2

MST

and multiple spanning trees1-4, 13-2

boundary ports13-6

BPDUs13-2

configuration parameters13-5

configuring13-9

displaying configurations13-13

edge ports13-7

enabling13-9

hop count13-7

instances

configuring parameters13-12

description13-2

number supported13-5

interoperability with PVST+13-2

link type13-7

master13-7

message age13-7

regions13-5, 13-6

restrictions13-8

to-SST interoperability13-4

MSTP

M-record13-2

M-tree13-2

M-tree13-2

MTU size

configuring4-11

MTU size (default)7-4

multicast

See IP multicast

multicast packets

blocking34-2

multicast routers

displaying routing tables22-16

flood suppression15-9

Multicast Storm Control

overview35-6

suppression on WS-X401435-7

suppression on WS-X401635-6

multiple forwarding paths1-4, 13-2

Multiple Spanning Tree

See MST

multiple VPN routing/forwarding in customer edge devices

See multi-VRF CE

multi-VRF CE

components25-3

configuration example25-7

default configuration25-3

defined25-1

displaying25-11

monitoring25-11

network components25-3

packet-forwarding process25-3

N

native VLAN

and 802.1Q tunneling16-4

specifying9-6

NetFlow

aggregation

minimum mask,default value38-8

destination-prefix aggregation

configuration (example)38-13

minimum mask, configuring38-8

IP

flow switching cache38-6

prefix aggregation

configuration (example)38-10

minimum mask, configuring38-8

source-prefix aggregation

minimum mask, configuring38-8

switching

configuration (example)38-9

configuring38-5

exporting cache entries38-6

statistics38-6

NetFlow statistics

caveats on supervisor38-4

configuring collection38-4

implementing collection38-4

overview of collection38-1

network fault tolerance1-4, 13-2

network management

configuring17-1

Next Hop Resolution Protocol

See NHRP

NFFC/NFFC II

IGMP snooping and15-4

NHRP

support1-8

non-IP traffic filtering32-11

non-RPF traffic

description22-9

in redundant configurations (figure)22-10

nonvolatile random-access memory

See NVRAM

normal-range VLANs

See VLANs

NVRAM

saving settings3-10

O

OIR

overview4-12

online insertion and removal

See OIR

Open Shortest Path First

See OSPF

operating system images

See system images

OSPF

area concept1-7

description1-7

P

packets

modifying26-14

packet type filtering37-14

packet type filtering, SPAN enhancement37-14

PAgP

understanding14-3

passwords

configuring enable password3-14

configuring enable secret password3-14

encrypting3-15

recovering lost enable password3-18

setting line password3-14

setting TACACS+3-15

PBR (policy-based routing)

configuration (example)23-5

enabling23-3

features23-2

overview23-1

route maps23-2

when to use23-2

per-port and VLAN Access Control List30-10

Per-VLAN Rapid Spanning Tree11-6

enabling11-20

overview11-6

PE to CE routing, configuring25-6

PIM

configuring dense mode22-14

configuring sparse mode22-14

displaying information22-15

displaying statistics22-20

enabling sparse-dense mode22-14, 22-15

overview22-3

PIM-DM22-3

PIM-SM22-3

ping

executing5-6

overview5-5

ping command5-6, 22-15

PoE36-22

configuring36-16

configuring power consumption for single device36-20

configuring power consumption for switch36-19

power consumption for powered devices

Intelligent Power Management36-20

powering down a module36-21

power management modes36-16

show interface status36-21

point-to-point

in 802.1X authentication (figure)28-2, 28-8

police command26-31

policed-DSCP map26-41

policers

description26-5

number of26-10

types of26-9

policies

See QoS policies

policing

See QoS policing

policy-map command26-28, 26-30

policy maps

attaching to interfaces26-33

configuring26-29

port ACLs

and voice VLAN32-4

defined32-2

limitations32-4

Port Aggregation Protocol

see PAgP

port-based authentication

changing the quiet period28-17

client, defined28-2

configuration guidelines28-12

configure 802.1X accounting28-15

configure switch-to-RADIUS server communication28-14

configure with Guest-VLANs28-16

configuring Guest-VLAN28-14

configuring manual re-authentication of a client28-17

controlling authorization state28-4

default configuration28-11

described28-2

device roles28-2

disabling28-13

displaying statistics28-21

enabling28-12

enabling multiple hosts28-20

enabling periodic re-authentication28-16

encapsulation28-2

initiation and message exchange28-3

method lists28-12

ports not supported28-4

resetting to default values28-20

setting retransmission number28-19

setting retransmission time28-18

topologies, supported28-9

using with port security28-6

with VLAN assignment28-5

port-based QoS features

See QoS

port-channel interfaces

See also EtherChannel

creating14-6

overview14-2

port-channel load-balance

command14-12

command example14-12

port-channel load-balance command14-12

port cost (STP)

configuring11-15

PortFast

and MST13-2

BPDU filter, configuring12-12

configuring or enabling12-11

overview12-3

PortFast BPDU filtering

and MST13-2

enabling12-12

overview12-4

PortFast STP parameter8-3

port priority

configuring MST instances13-12

configuring STP11-13

ports

blocking34-1

checking status5-2

community33-1

dynamic VLAN membership

configuring8-5

overview8-2

reconfirming8-7

forwarding, resuming34-3

isolated33-1

PVLAN types33-1

secure29-1

See also interfaces

port security

aging29-6

and QoS trusted boundary26-24

configuring29-4

default configuration29-3

described29-1

displaying29-7

RADIUS accounting28-7

sticky learning29-2

using with 802.1X28-6

violations29-2

with other features29-3

port states

description11-5

port trust state

See trust states

power, inline27-4

power dc input command36-10

power inline command36-17

power inline consumption command36-19, 36-20

power management

1+1 redundancy mode36-11

2+1 redundancy mode36-11

Catalyst 4006 switch36-10

Catalyst 4500 series36-3

Catalyst 4500 Series power supplies36-9

combined mode36-4

configuring combined mode36-8

configuring redundant mode36-7

overview36-1

redundancy36-10

redundant mode36-4

power over Ethernet

See PoE

power redundancy

setting on Catalyst 400636-13

power redundancy-mode command36-7

power supplies

fixed36-3

variable36-4

power supplies required command36-13

primary VLANs

associating with secondary VLANs33-6

configuring as a PVLAN33-5

description33-1

priority

overriding CoS of incoming frames27-3

privileged EXEC mode2-5

privileges

changing default3-17

configuring levels3-16

exiting3-17

logging in3-17

promiscuous ports

configuring PVLAN33-7

description33-1

setting mode33-11

protocol timers11-4

provider edge devices25-2

pruning, VTP

See VTP pruning

pseudobridges

description13-5

PVACL30-10

PVLANs

802.1q support33-5

configuration guidelines33-3

configuring33-3

configuring a VLAN as33-5

configuring promiscuous ports33-7

host port

configuring a Layer 2 interface33-8

host ports

setting33-11

isolated VLANs33-1

overview33-1

permitting routing, example33-11

promiscuous mode

setting33-11

setting

interface mode33-11

Q

QoS

allocating bandwidth26-39

auto-QoS

configuration and defaults display26-18

configuration guidelines26-17

described26-15

displaying26-18

effects on NVRAM configuration26-16

enabling for VoIP26-17

basic model26-5

burst size26-26

classification26-5to 26-9

configuration guidelines26-23

auto-QoS26-17

configuring

auto-QoS26-15

DSCP maps26-40

traffic shaping26-39

trusted boundary26-24

VLAN-based26-34

creating policing rules26-27

default auto configuration26-15

default configuration26-21

definitions26-3

disabling on interfaces26-33

enabling on interfaces26-33

flowcharts26-7, 26-11

IP phones

automatic classification and queueing26-15

detection and trusted settings26-15, 26-24

overview26-1

packet modification26-14

port-based26-34

priority26-14

traffic shaping26-14

transmit rate26-39

trust states

trusted device26-24

VLAN-based26-34

See also COS; DSCP values; transmit queues

QoS active queue management

tracking queue length26-13

QoS labels

definition26-3

QoS mapping tables

CoS-to-DSCP26-40

DSCP-to-CoS26-42

policed-DSCP26-41

types26-13

QoS marking

description26-4

QoS policers

burst size26-26

numbers of26-10

types of26-9

QoS policing

definition26-4

described26-5, 26-9

QoS policy

attaching to interfaces26-10

overview of configuration26-27

QoS transmit queues

allocating bandwidth26-39

burst26-14

configuring26-38

configuring traffic shaping26-39

mapping DHCP values to26-38

maximum rate26-14

overview26-13

sharing link bandwidth26-14

Quality of service

See QoS

queueing26-5, 26-13

R

RADIUS server

configure to-Switch communication28-14

configuring settings28-15

parameters on the switch28-14

range command4-4

range macros

defining4-5

ranges of interfaces

configuring4-4

Rapid Spanning Tree

See RSTP

re-authentication of a client

configuring manual28-17

enabling periodic28-16

reduced MAC address11-2

redundancy (RPR)

configuring6-4

route processor redundancy6-3

supervisor engine and Cisco IOS software6-4

related documentationxxiii

reload command3-22

replication

description22-8

reserved-range VLANs

See VLANs

retransmission number

setting in 802.1X authentication28-19

retransmission time

changing in 802.1X authentication28-18

RIP

description1-7

ROM monitor

boot process and3-19

CLI2-6

root bridge

configuring11-9

selecting in MST13-2

root guard

and MST13-2

enabling12-8

overview12-2

routed packets

ACLs32-21

route-map (IP) command23-3

route maps

defining23-3

PBR23-2

route processor redundancy

See redundancy (RPR+)

router ACLs

description32-2

using with VLAN maps32-20

route targets

VPN25-3

Routing Information Protocol

See RIP

RPR+

See redundancy (RPR+)

RSPAN

configuration guidelines37-16

destination ports37-5

IDS37-2

monitored ports37-4

monitoring ports37-5

received traffic37-3

sessions

creating37-17

defined37-3

limiting source traffic to specific VLANs37-23

monitoring VLANs37-22

removing source (monitored) ports37-21

specifying monitored ports37-17

source ports37-4

transmitted traffic37-4

VLAN-based37-5

RSTP

compatibility13-3

description13-2

port roles13-3

port states13-4

S

SAID

See 802.10 SAID

scheduling26-13

defined26-4

overview26-5

secondary root switch11-12

secondary VLANs

associating with primary33-6

description33-2

permitting routing33-11

secure ports, configuring29-1

Security Association Identifier

See 802.10 SAID

servers, VTP

See VTP servers

service-policy command26-28

service-policy input command19-1, 26-33

service-provider networks

and customer VLANs16-2

Layer 2 protocols across16-7

set default interface command23-4

set interface command23-4

set ip default next-hop command23-4

set ip next-hop command23-4

show adjacency command21-9

show boot command3-24

show catalyst4000 chassis-mac-address command11-3

show cdp command17-2, 17-3

show cdp entry command17-4

show cdp interface command17-3

show cdp neighbors command17-4

show cdp traffic command17-4

show ciscoview package command1-15

show ciscoview version command1-15

show configuration command4-9

show debugging command17-4

show environment command36-1

show history command2-4

show interfaces command4-11, 4-13

show interfaces status command5-2

show ip cache flow aggregation destination-prefix command38-9

show ip cache flow aggregation prefix command38-9

show ip cache flow aggregation source-prefix command38-9

show ip cache flow command38-6

show ip cef command21-8

show ip interface command22-15

show ip local policy command23-5

show ip mroute command22-15

show ip pim interface command22-15

show l2protocol command16-11

show mac-address-table address command5-3

show mac-address-table interface command5-3

show mls entry command21-8

show module command5-1, 11-5

show PoE consumed36-22

show power command36-13

show power inline command36-21

show power inline consumption command36-19

show power supplies command36-7

show protocols command4-13

show running-config command

adding description for an interface4-9

checking your settings3-9

displaying ACLs32-14, 32-16, 32-23, 32-24

show startup-config command3-10

show users command5-4

show version command3-22

shutdown, command4-14

shutdown threshold for Layer 2 protocol packets16-9

shutting down

interfaces4-14

single spanning tree

See SST

slot numbers, description4-2

SmartPort macros

configuration guidelines10-4

configuring10-2

creating and applying10-4

default configuration10-2

defined10-1

displaying10-8

tracing10-4

SNMP

documentation1-12

support1-12

software

upgrading6-6

software configuration register3-19

software switching

description21-5

interfaces21-6

key data structures used22-7

SPAN

and ACLs37-5

configuration guidelines37-7

configuring37-6to 37-10

destination ports37-5

IDS37-2

monitored port, defined37-4

monitoring port, defined37-5

received traffic37-3

sessions

defined37-3

source ports37-4

transmitted traffic37-4

VLAN-based37-5

SPAN and RSPAN

concepts and terminology37-3

default configuration37-6

displaying status37-24

overview37-1

session limits37-6

SPAN destination ports

802.1X authentication not supported28-12

SPAN enhancements

access list filtering37-13

configuration example37-15

CPU port sniffing37-10

encapsulation configuration37-12

ingress packets37-12

packet type filtering37-14

spanning-tree backbonefast command12-15

spanning-tree cost command11-15

spanning-tree guard root command12-8

spanning-tree portfast bpdu-guard command12-12

spanning-tree portfast command12-11

spanning-tree port-priority command11-13

spanning-tree uplinkfast command12-14

spanning-tree vlan

command11-9

command example11-9

spanning-tree vlan command11-8

spanning-tree vlan cost command11-15

spanning-tree vlan forward-time command11-19

spanning-tree vlan hello-time command11-17

spanning-tree vlan max-age command11-18

spanning-tree vlan port-priority command11-13

spanning-tree vlan priority command11-17

spanning-tree vlan root primary command11-10

spanning-tree vlan root secondary command11-12

speed

configuring interface4-7

speed command4-7

SST

description13-2

interoperability13-4

static routes

configuring3-11

verifying3-12

statistics

displaying 802.1X28-21

displaying PIM22-20

NetFlow accounting38-6

sticky learning

configuration file29-2

defined29-2

disabling29-2

enabling29-2

saving addresses29-2

sticky MAC addresses

configuring29-4

defined29-2

Storm Control

disabling35-4

displaying35-4

enabling35-3

hardware-based, implementing35-2

overview35-1

STP

bridge ID11-2

configuring11-7to 11-20

creating topology11-4

defaults11-6

disabling11-19

enabling11-7

enabling extended system ID11-8

enabling Per-VLAN Rapid Spanning Tree11-20

forward-delay time11-18

hello time11-17

Layer 2 protocol tunneling16-7

maximum aging time11-18

overview11-1, 11-3

per-VLAN rapid spanning tree11-6

port cost11-15

Port Fast parameter8-3

port priority11-13

root bridge11-9

supervisor engine

configuring3-8to 3-13

copying files to standby6-7

default configuration3-1

default gateways3-11

environmental monitoring36-1

redundancy6-1

ROM monitor3-19

startup configuration3-18

static routes3-11

synchronizing configurations6-5

SVIs

and router ACLs32-3

switched packets

and ACLs32-20

Switched Port Analyzer

See SPAN

switching

NetFlow

configuration (example)38-9

configuring38-5

exporting cache entries38-6

switchport

show interfaces4-11

switchport access vlan command9-6, 9-8

switchport block multicast command34-2

switchport block unicast command34-2

switchport mode access command9-8

switchport mode dot1q-tunnel command16-6

switchport mode dynamic command9-6

switchport mode trunk command9-6

switch ports

See access ports

switchport trunk allowed vlan command9-6

switchport trunk encapsulation command9-6

switchport trunk encapsulation dot1q command9-3

switchport trunk encapsulation isl command9-3

switchport trunk encapsulation negotiate command9-3

switchport trunk native vlan command9-6

switchport trunk pruning vlan command9-6

switch-to-RADIUS server communication

configuring28-14

syslog messages36-2

system

reviewing configuration3-10

settings at startup3-21

system images

loading from Flash memory3-23

modifying boot field3-21

specifying3-23

system MTU

802.1Q tunneling16-5

maximums16-5

T

TACACS+

setting passwords3-15

tagged packets

802.1Q16-3

Layer 2 protocol16-7

TCAM programming and ACLs32-6

Telnet

accessing CLI2-2

disconnecting user sessions5-5

executing5-3

monitoring user sessions5-4

telnet command5-4

TFTP

configuration files in base directory3-5

configuring for autoconfiguration3-4

time exceeded messages5-7

timer

See login timer

Token Ring

media not supported (note)7-4, 24-3

TOS

description26-3

trace command5-7

traceroute

See IP traceroute

See Layer 2 Traceroute

traceroute mac command5-9

traceroute mac ip command5-9

traffic

blocking flooded34-2

traffic control

using ACLs (figure)32-4

using VLAN maps (figure)32-5

traffic shaping26-14

translational bridge numbers (defaults)7-4

transmit queues

See QoS transmit queues

transmit rate26-39

troubleshooting

with traceroute5-7

trunk ports

802.1x authentication not supported on28-12

configuring PVLAN33-9to 33-10

trunks

802.1Q restrictions9-5

configuring9-6

configuring access VLANs9-6

configuring allowed VLANs9-6

default interface configuration9-6

different VTP domains9-3

enabling to non-DTP device9-4

encapsulation9-3

specifying native VLAN9-6

understanding9-3

trusted boundary for QoS26-24

trust states

configuring26-35

tunneling

defined16-1

Layer 2 protocol16-7

tunnel ports

802.1Q, configuring16-6

described16-2

incompatibilities with other features16-5

type of service

See TOS

U

UDLD

default configuration18-2

disabling18-3

enabling18-3

overview18-1, 31-1

unauthorized ports with 802.1X28-4

unicast

See IP unicast

unicast flood blocking

configuring34-1

unicast traffic

blocking34-2

unidirectional ethernet

enabling19-1

example of setting19-2

overview19-1

UniDirectional Link Detection Protocol

See UDLD

UplinkFast

and MST13-2

enabling12-14

MST and13-3

overview12-5

user EXEC mode2-5

user sessions

disconnecting5-5

monitoring5-4

V

VACLs

Layer 4 port operations32-7

virtual LANs

See VLANs

Virtual Private Network

See VPN

VLAN ACLs

See VLAN maps

vlan command7-6, 7-7

vlan database command7-7

vlan dot1q tag native command16-4

VLAN Management Policy Server

See VMPS

VLAN maps

applying32-16, 32-24

common uses for32-16

configuration example32-17

configuration guidelines32-13

configuring32-12

creating entries32-13

defined32-3

denying access example32-18

denying packets32-14

displaying32-19

examples32-18

order of entries32-13

permitting packets32-14

router ACLs and32-20

using (figure)32-5

VLAN Query Protocol (VQP)8-1

VLANs

allowed on trunk9-6

configuration guidelines7-3

configuring7-4

customer numbering in service-provider networks16-3

default configuration7-4

description1-5

extended range7-3

IDs (default)7-4

interface assignment7-8

limiting source traffic with RSPAN37-23

monitoring with RSPAN37-22

name (default)7-4

normal range7-3

overview7-1

reserved range7-3

See also PVLANs

VLAN Trunking Protocol

See VTP

VLAN trunks

overview9-3

VMPS

administering8-5

dynamic port membership

configuring8-5

overview8-2

reconfirming8-7

in a cluster of switches8-1

monitoring8-5

overview8-1

reconfirming assignments8-7

reconfirming membership interval8-7

voice interfaces

configuring27-1

Voice over IP

configuring27-1

voice ports

configuring VVID27-2

voice traffic27-4, 36-16

VPN

configuring routing in25-5

forwarding25-3

in service provider networks25-1

routes25-2

routing and forwarding table

See VRF

VRF

defining25-3

tables25-1

VTP

configuration guidelines24-5

configuring24-6to 24-10

configuring transparent mode24-9

default configuration24-5

disabling24-9

Layer 2 protocol tunneling16-7

monitoring24-10

overview24-1

See also VTP version 2

VTP advertisements

description24-3

VTP clients

configuring24-8

VTP domains

description24-2

VTP modes24-2

VTP pruning

enabling24-6

overview24-3

VTP servers

configuring24-7

VTP statistics

displaying24-10

VTP version 2

enabling24-7

overview24-3

See also VTP

VVID

configuring27-2