Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(20)EWA
Index
Downloads: This chapterpdf (PDF - 872.0KB) The complete bookPDF (PDF - 6.51MB) | Feedback

Index           

Table Of Contents

           

Symbols - Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V -

Index           

Symbols

29-13

Numerics

10/100 autonegotiation feature, forced4-7

802.10 SAID (default)8-4

802.1Q

trunks12-6

tunneling

compatibility with other features17-5

defaults17-4

described17-2

tunnel ports with other features17-6

802.1Q VLANs

encapsulation10-3

trunk restrictions10-5

802.1s

See MST

802.1w

See MST

802.1X

See port-based authentication

802.1X authentication

for guest VLANs29-6

RADIUS accounting29-7

with port security29-6

with VLAN assignment29-5

with voice VLAN ports29-10

802.3ad

See LACP

A

AAA

enabling29-13

abbreviating commands2-5

access control entries

See ACEs

access list filtering, SPAN enhancement38-13

access ports

and Layer 2 protocol tunneling17-9

configuring10-8

access VLANs10-6

accounting

configuring for 802.1X29-16

ACEs

ACLs33-2

Ethernet33-2

IP33-2

Layer 4 operation restrictions33-8

ACLs

ACEs33-2

and SPAN38-5

and TCAM programming33-6

applying on routed packets33-21

applying on switched packets33-20

compatibility on the same switch33-3

configuring with VLAN maps33-20

CPU impact33-9

hardware and software support33-5

IP, matching criteria for port ACLs33-4

MAC extended33-11

matching criteria for router ACLs33-3

port

and voice VLAN33-4

defined33-2

limitations33-4

processing33-9

types supported33-2

acronyms, list ofA-1

active queue management27-13

addresses

See MAC addresses

adjacency tables

description22-2

displaying statistics22-9

advertisements, VTP

See VTP advertisements

alarms

major37-2

minor37-2

asymmetrical links, and 802.1Q tunneling17-4

audiencexxi

authentication

See also port-based authentication

authentication server

defined29-3

RADIUS server29-3

authorized and unauthorized ports29-4

authorized ports with 802.1X29-4

autoconfiguration3-2

automatic QoS

See QoS

autonegotiation feature

forced 10/100Mbps4-7

Auto-QoS

configuring27-16

auto-sync command6-8

B

BackboneFast

adding a switch (figure)13-2

and MST14-2

configuring13-15

link failure (figure)13-7, 13-8

not supported MST14-2

understanding13-6

See also STP

BGP1-8

routing session with multi-VRF CE26-6

blocking packets35-1

blocking state (STP)

RSTP comparisons (table)14-4

boot bootldr command3-24

boot command3-21

boot fields

See configuration register boot fields

boot system command3-19, 3-24

boot system flash command3-21

Border Gateway Protocol

See BGP

boundary ports

description14-6

BPDU Guard

and MST14-2

configuring13-12

overview13-4

BPDUs

and media speed12-2

pseudobridges and14-5

what they contain12-3

bridge ID

See STP bridge ID

bridge priority (STP)12-16

bridge protocol data units

See BPDUs

broadcast storm control

disabling36-4

BSR

configuration example23-21

burst rate27-40

burst size27-27

C

candidate switch

defined7-12

requirements7-12

See also command switch and member switch

cautions for passwords

encrypting3-16

TACACS+3-15

CDP

and trusted boundary27-25

configuration18-2

displaying configuration18-3

enabling on interfaces18-3

Layer 2 protocol tunneling17-7

maintaining18-3

monitoring18-3

overview1-2, 18-1

cdp enable command18-3

CEF

adjacency tables22-2

configuring load balancing22-7

displaying statistics22-8

enabling22-6

hardware switching22-4

load balancing22-6

overview22-1

software switching22-4

CGMP

overview16-1

channel-group group command15-7, 15-10

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco IOS NSF-awareness support6-2

Cisco IP Phones

configuring28-2

Cisco IP phones

sound quality28-1

CIST

description14-2

class-map command27-28

class of service

See CoS

clear cdp counters command18-4

clear cdp table command18-3

clear counters command4-14

clearing

IP multicast table entries23-20

clear ip flow stats command39-6

CLI

accessing2-1

backing out one level2-5

getting commands2-5

history substitution2-3

managing clusters7-12

modes2-5

monitoring environments38-1

ROM monitor2-6

software basics2-4

clients

in 802.1X authentication29-2

clustering switches

command switch characteristics7-11, 7-12

and VTY7-12

managing

through CLI7-12

overview7-11

planning considerations

CLI7-12

clusters, switch

See also Getting Started with Cisco Network Assistant

command-line processing2-3

command modes2-5

commands

listing2-5

command switch

defined7-11

requirements7-11

See also candidate switch, cluster standby group, member switch, and standby command switch

common and internal spanning tree

See CIST

common spanning tree

See CST

community ports

description34-1

community VLANs

and SPAN features34-4

configure as a PVLAN34-5

description34-1

config-register command3-22

config terminal command3-9

configuration files

obtaining with DHCP3-6

saving3-10

configuration register

boot fields

listing value3-22

modifying3-21

changing settings3-21to 3-22

configuring3-19

settings at startup3-20

configure terminal command3-22, 4-2

console configuration mode2-5

console port

disconnecting user sessions5-5

monitoring user sessions5-4

copy running-config startup-config command3-10

copy system:running-config nvram:startup-config command3-24

CoS

configuring port value27-37

definition27-3

figure27-2

overriding on Cisco IP Phones28-3

priority28-3

CoS-to-DSCP maps27-41

counters

clearing MFIB23-20

clearing on interfaces4-14

CPU port sniffing38-10

CST

description14-5

IST and14-2

MST and14-2

customer edge devices26-2

D

default configuration

802.1X29-12

auto-QoS27-16

IGMP filtering16-17

Layer 2 protocol tunneling17-9

multi-VRF CE26-3

SPAN and RSPAN38-6

default gateway

configuring3-11

verifying configuration3-11

default ports

and support for 802.1X authentication29-13

description command4-9

detecting unidirectional links19-1

DHCP-based autoconfiguration

client request message exchange3-3

configuring

client side3-2

DNS3-5

relay device3-5

server-side3-3

TFTP server3-4

example3-7

lease options

for IP address information3-4

for receiving the configuration file3-4

overview3-2

relationship to BOOTP3-2

DHCP snooping

configuring31-3

default configuration31-3

displaying binding tables31-10

displaying configuration31-10

enabling31-4

enabling on private VLAN31-5

enabling the database agent31-6

monitoring31-9, 31-13, 31-14

overview31-1

Snooping database agent31-2

DHCP Snooping Database Agent

adding to the database (example)31-9

enabling (example)31-6

overview31-2

reading from a TFTP file (example)31-8

Differentiated Services Code Point values

See DSCP values

DiffServ architecture, QoS27-2

disabled state

RSTP comparisons (table)14-4

disabling

broadcast storm control36-4

disconnect command5-5

DNS

and DHCP-based autoconfiguration3-5

documentation

organizationxxi

relatedxxiii

double-tagged packets

802.1Q tunneling17-2

Layer 2 protocol tunneling17-9

drop threshold for Layer 2 protocol packets17-9

DSCP maps27-41

DSCP-to-CoS maps

configuring27-43

DSCP values

configuring maps27-41

configuring port value27-38

definition27-3

IP precedence27-2

mapping markdown27-23

mapping to transmit queues27-39

DTP

VLAN trunks and10-3

duplex command4-8

duplex mode

configuring interface4-7

Dynamic Host Configuration Protocol snooping

See DHCP snooping

dynamic port VLAN membership

limit on hosts9-9

reconfirming9-7

troubleshooting9-9

Dynamic Trunking Protocol

See DTP

E

EAP

request/identity frame29-3

response/identity frame29-3

EAP frames

changing retransmission time29-20

exchanging (figure)29-4

setting retransmission number29-21

EAPOL frame

start29-3

EAPOL frames

802.1X authentication and29-2

OTP authentication, example (figure)29-4

edge ports

description14-7

EGP

overview1-8

EIGRP

overview1-8

Embedded CiscoView

displaying information1-16

installing and configuring1-14

overview1-13

enable command3-9, 3-21

enable mode2-5

encapsulation types10-3

Enhanced Interior Gateway Routing Protocol

See EIGRP

environmental monitoring

LED indications37-2

SNMP traps37-2

supervisor engine37-2

switching modules37-2

using CLI commands37-1

EtherChannel

channel-group group command15-7, 15-10

configuration guidelines15-5

configuring15-6to 15-14

configuring Layer 215-9

configuring Layer 315-6

interface port-channel command15-7

lacp system-priority

command example15-12

modes15-3

overview15-1

PAgP

Understanding15-3

physical interface configuration15-7

port-channel interfaces15-2

port-channel load-balance command15-12

removing15-14

removing interfaces15-13

EtherChannel ports

802.1X authentication not supported in29-13

explicit host tracking

enabling16-8

extended range VLANs

See VLANs

Extensible Authentication Protocol over LAN29-2

Exterior Gateway Protocol

See EGP

F

FastDrop

clearing entries23-20

displaying entries23-19

overview23-10

FIB

description22-2

See also MFIB

filtering

in a VLAN33-12

non-IP traffic33-11

flags23-11

Flash memory

configuring router to boot from3-24

loading system images from3-23

security precautions3-23

flooded traffic, blocking35-2

For9-4

forward-delay time (STP)

configuring12-18

forwarding information base

See FIB

G

gateway

See default gateway

global configuration mode2-5

Guest-VLANs

configure with 802.1X29-17, 29-18

H

hardware and software ACL support33-5

hardware switching22-5

hello time (STP)

configuring12-17

history

CLI2-3

hop counts

configuring MST bridges14-7

host

configuring host statically16-8

limit on dynamic port9-9

Hot Standby Routing Protocol

See HSRP

HSRP

description1-6

hw-module module num power command37-15

I

ICMP

enabling5-10

ping5-5

running IP traceroute5-7

time exceeded messages5-7

IDS

using with SPAN and RSPAN38-2

IEEE 802.1s

See MST

IEEE 802.1w

See MST

IEEE 802.3ad

See LACP

IGMP

description23-3

enabling23-13

explicit host tracking16-3, 16-8

immediate-leave processing16-3

overview16-1

IGMP filtering

configuring16-17

default configuration16-17

described16-16

monitoring16-20

IGMP groups

setting the maximum number16-19

IGMP profile

applying16-18

configuration mode16-17

configuring16-17

IGMP snooping

configuration guidelines16-4

enabling16-5

IP multicast and23-4

monitoring16-11

overview16-1

IGRP

description1-8

immediate-leave processing

enabling16-7

IGMP

See fast-leave processing

ingress packets, SPAN enhancement38-12

inline power

configuring on Cisco IP phones28-4

See PoE

Intelligent Power Management37-17, 37-20

interface command3-9, 4-1

interface port-channel command15-7

interface range command4-4

interface range macro command4-5

interfaces

adding descriptive name4-9

clearing counters4-14

configuring4-2

configuring ranges4-4

displaying information about4-13

Layer 2 modes10-4

maintaining4-13

monitoring4-13

naming4-9

numbers4-2

overview4-1

restarting4-14

See also Layer 2 interfaces

Interior Gateway Routing Protocol

See IGRP

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link encapsulation

See ISL encapsulation

Intrusion Detection System

See IDS

IP

configuring default gateway3-11

configuring static routes3-11

displaying statistics22-8

flow switching cache39-6

IP addresses

candidate or member7-12

command switch7-11

See also IP information

ip cef command22-6

ip flow-aggregation cache destination-prefix command39-8

ip flow-aggregation cache prefix command39-8

ip flow-aggregation cache source-prefix command39-8

ip flow-export command39-6

ip icmp rate-limit unreachable command5-11

ip igmp profile command16-17

ip igmp snooping tcn flood command16-10

ip igmp snooping tcn flood query count command16-10

ip igmp snooping tcn query solicit command16-11

IP information

assigned

through DHCP-based autoconfiguration3-2

ip load-sharing per-destination command22-7

ip local policy route-map command24-5

ip mask-reply command5-12

IP multicast

clearing table entries23-20

configuring23-12

default configuration23-13

displaying PIM information23-15

displaying the routing table information23-16

enabling23-13

enabling dense-mode PIM23-14

enabling sparse-mode23-14

features not supported23-12

hardware forwarding23-8

IGMP snooping and16-4, 23-4

monitoring23-15

overview23-1

routing protocols23-2

software forwarding23-8

See also Auto-RP; IGMP; PIM; RP; RPF

ip multicast-routing command23-13

IP phones

automatic classification and queueing27-16

configuring voice ports28-2

See Cisco IP Phones28-1

trusted boundary for QoS27-25

ip pim command23-14

ip pim dense-mode command23-14

ip pim sparse-dense-mode command23-15

ip policy route-map command24-4

ip redirects command5-11

ip route-cache flow command39-5

IP routing tables

deleting entries23-20

IP Source Guard

configuring31-11

configuring on private VLANs31-12

displaying31-13, 31-14

overview31-10

IP statistics

displaying22-8

IP traceroute

executing5-7

overview5-7

IP unicast

displaying statistics22-8

ip unreachables command5-10

IPX

redistribution of route information with EIGRP1-8

ISL

encapsulation10-3

trunking with 802.1Q tunneling17-4

isolated ports

description34-1

isolated VLANs

description34-1

IST

description14-2

MST regions and14-2

IST master

description14-7

J

jumbo frames

and ethernet ports4-11

configuring MTU sizes for4-12

ports and linecards that support4-10

VLAN interfaces4-11

K

keyboard shortcuts2-3

L

l2protocol-tunnel command17-11

labels

definition27-3

LACP

system ID15-4

Layer 2 access ports10-8

Layer 2 frames

classification with CoS27-2

Layer 2 interfaces

assigning VLANs8-8

configuring10-5

configuring as PVLAN host ports34-8

configuring as PVLAN promiscuous ports34-7

configuring as PVLAN trunk ports34-9

defaults10-5

disabling configuration10-9

modes10-4

show interfaces command10-7

Layer 2 interface type

resetting34-12

setting34-12

Layer 2 protocol tunneling

configuring17-9

default configuration17-9

defined17-7

guidelines17-10

Layer 2 switching

overview10-1

Layer 2 Traceroute

and ARP5-9

and CDP5-8

described5-8

host-to-host paths5-8

IP addresses and subnets5-9

MAC addresses and VLANs5-9

multicast traffic5-9

multiple devices on a port5-9

unicast traffic1-3, 5-8

usage guidelines5-8

Layer 2 trunks

configuring10-6

overview10-3

Layer 3 packets

classification methods27-2

Layer 4 port operations

configuration guidelines33-8

restrictions33-8

LEDs

description (table)37-2

listening state (STP)

RSTP comparisons (table)14-4

load balancing

configuring for CEF22-7

configuring for EtherChannel15-12

overview15-5, 22-6

per-destination22-7

login timer

changing5-4

logoutwarning command5-4

loop guard

and MST14-2

configuring13-9

overview13-2

M

MAC addresses

allocating12-5

building tables10-2

convert dynamic to sticky secure30-2

displaying5-3

displaying in DHCP snooping binding table31-10

in ACLs33-11

sticky30-2

sticky secure, adding30-2

MAC extended access lists33-11

macros

See SmartPort macros

main-cpu command6-8

mapping

DSCP markdown values27-23

DSCP values to transmit queues27-39

mapping tables

configuring DSCP27-41

described27-13

mask destination command39-8

mask source command39-8

match ip address command24-3

maximum aging time (STP)

configuring12-18

member switch

defined7-11

managing7-12

requirements7-12

See also candidate switch, cluster standby group, and standby command switch

metro tags17-2

MFIB

CEF23-5

displaying23-18

overview23-11

modules

checking status5-1

powering down37-15

monitoring

802.1Q tunneling17-12

ACL information33-28

IGMP filters16-20

IGMP snooping16-11

Layer 2 protocol tunneling17-12

multi-VRF CE26-11

tunneling17-12

VLAN filters33-19

VLAN maps33-19

M-record14-2

MST

and multiple spanning trees1-4, 14-2

boundary ports14-6

BPDUs14-2

configuration parameters14-5

configuring14-9

displaying configurations14-13

edge ports14-7

enabling14-9

hop count14-7

instances

configuring parameters14-12

description14-2

number supported14-5

interoperability with PVST+14-2

link type14-7

master14-7

message age14-7

regions14-5, 14-6

restrictions14-8

to-SST interoperability14-4

MSTP

M-record14-2

M-tree14-2

M-tree14-2

MTU size

configuring4-12

MTU size (default)8-4

multicast

See IP multicast

multicast packets

blocking35-2

multicast routers

displaying routing tables23-16

flood suppression16-9

Multicast Storm Control

overview36-6

suppression on WS-X401436-7

suppression on WS-X401636-6

multiple forwarding paths1-4, 14-2

Multiple Spanning Tree

See MST

multiple VPN routing/forwarding in customer edge devices

See multi-VRF CE

multi-VRF CE

components26-3

configuration example26-7

default configuration26-3

defined26-1

displaying26-11

monitoring26-11

network components26-3

packet-forwarding process26-3

N

native VLAN

and 802.1Q tunneling17-4

specifying10-6

NetFlow

aggregation

minimum mask,default value39-8

destination-prefix aggregation

configuration (example)39-13

minimum mask, configuring39-8

IP

flow switching cache39-6

prefix aggregation

configuration (example)39-10

minimum mask, configuring39-8

source-prefix aggregation

minimum mask, configuring39-8

switching

configuration (example)39-9

configuring39-5

exporting cache entries39-6

statistics39-6

NetFlow statistics

caveats on supervisor39-4

configuring collection39-4

implementing collection39-4

overview of collection39-1

Network Assistant

and VTY7-12

configure

display configuration7-9

enable communication with switch7-4

enable inter-cluster communication7-7

connect to a device7-10

default configuration7-3

installation requirements7-2

installing7-3

launch7-10

overview of CLI commands7-4

software and hardware requirements7-2

understanding7-1

network fault tolerance1-4, 14-2

network management

configuring18-1

Next Hop Resolution Protocol

See NHRP

NFFC/NFFC II

IGMP snooping and16-4

NHRP

support1-8

non-IP traffic filtering33-11

non-RPF traffic

description23-9

in redundant configurations (figure)23-10

nonvolatile random-access memory

See NVRAM

normal-range VLANs

See VLANs

NSF-awareness support6-2

NVRAM

saving settings3-10

O

OIR

overview4-13

online insertion and removal

See OIR

Open Shortest Path First

See OSPF

operating system images

See system images

OSPF

area concept1-7

description1-7

P

packets

modifying27-15

software processed

and QoS27-15

packet type filtering38-14

packet type filtering, SPAN enhancement38-14

PAgP

understanding15-3

passwords

configuring enable password3-14

configuring enable secret password3-14

encrypting3-15

recovering lost enable password3-18

setting line password3-14

setting TACACS+3-15

PBR (policy-based routing)

configuration (example)24-5

enabling24-3

features24-2

overview24-1

route maps24-2

when to use24-2

per-port and VLAN Access Control List31-10

Per-VLAN Rapid Spanning Tree12-6

enabling12-20

overview12-6

PE to CE routing, configuring26-6

PIM

configuring dense mode23-14

configuring sparse mode23-14

displaying information23-15

displaying statistics23-20

enabling sparse-dense mode23-14, 23-15

overview23-3

PIM-DM23-3

PIM-SM23-3

ping

executing5-6

overview5-5

ping command5-6, 23-15

PoE37-21

configuring37-15

configuring power consumption for single device37-19

configuring power consumption for switch37-18

power consumption for powered devices

Intelligent Power Management37-20

overview37-17

powering down a module37-15

power management modes37-16

show interface status37-20

point-to-point

in 802.1X authentication (figure)29-2, 29-8

police command27-32

policed-DSCP map27-42

policers

description27-5

number of27-10

types of27-9

policies

See QoS policies

policing

See QoS policing

policy-map command27-29, 27-31

policy maps

attaching to interfaces27-34

configuring27-30

port ACLs

and voice VLAN33-4

defined33-2

limitations33-4

Port Aggregation Protocol

see PAgP

port-based authentication

changing the quiet period29-19

client, defined29-2

configuration guidelines29-13

configure 802.1X accounting29-16

configure switch-to-RADIUS server communication29-15

configure with Guest-VLANs29-17, 29-18

configuring Guest-VLAN29-15

configuring manual re-authentication of a client29-19

controlling authorization state29-4

default configuration29-12

described29-2

device roles29-2

disabling29-14

displaying statistics29-22

enabling29-13

802.1X with voice VLAN29-10

enabling multiple hosts29-21

enabling periodic re-authentication29-18

encapsulation29-2

initiation and message exchange29-3

method lists29-13

ports not supported29-4

resetting to default values29-22

setting retransmission number29-21

setting retransmission time29-20

topologies, supported29-10

using with port security29-6

with VLAN assignment29-5

port-based QoS features

See QoS

port-channel interfaces

See also EtherChannel

creating15-6

overview15-2

port-channel load-balance

command15-12

command example15-12

port-channel load-balance command15-12

port cost (STP)

configuring12-15

PortFast

and MST14-2

BPDU filter, configuring13-12

configuring or enabling13-11

overview13-3

PortFast BPDU filtering

and MST14-2

enabling13-12

overview13-4

port priority

configuring MST instances14-12

configuring STP12-13

ports

blocking35-1

checking status5-2

community34-1

dynamic VLAN membership

reconfirming9-7

forwarding, resuming35-3

isolated34-1

PVLAN types34-1

secure30-1

See also interfaces

port security

aging30-6

and QoS trusted boundary27-25

configuring30-4

default configuration30-3

described30-1

displaying30-7

RADIUS accounting29-7

sticky learning30-2

using with 802.1X29-6

violations30-2

with other features30-3

port states

description12-5

port trust state

See trust states

power, inline28-4

power dc input command37-11

power inline command37-16

power inline consumption command37-18, 37-19

power management

1+1 redundancy mode37-11

2+1 redundancy mode37-11

Catalyst 4006 switch37-11

Catalyst 4500 series37-4

Catalyst 4500 Series power supplies37-9

Catalyst 4948 series37-3

combined mode37-5

configuring combined mode37-8

configuring redundant mode37-7

overview37-1

redundancy37-11

redundant mode37-5

power over Ethernet

See PoE

power redundancy

setting on Catalyst 400637-14

power redundancy-mode command37-8

power supplies

fixed37-4

variable37-3, 37-4

power supplies required command37-14

primary VLANs

associating with secondary VLANs34-6

configuring as a PVLAN34-5

description34-1

priority

overriding CoS of incoming frames28-3

privileged EXEC mode2-5

privileges

changing default3-17

configuring levels3-16

exiting3-17

logging in3-17

promiscuous ports

configuring PVLAN34-7

description34-1

setting mode34-12

protocol timers12-4

provider edge devices26-2

pruning, VTP

See VTP pruning

pseudobridges

description14-5

PVACL31-10

PVID (port VLAN ID)

and 802.1X with voice VLAN ports29-10

PVLANs

802.1q support34-5

configuration guidelines34-3

configuring34-3

configuring a VLAN as34-5

configuring promiscuous ports34-7

host port

configuring a Layer 2 interface34-8

host ports

setting34-12

isolated VLANs34-1

overview34-1

permitting routing, example34-11

promiscuous mode

setting34-12

setting

interface mode34-12

Q

QoS

allocating bandwidth27-40

and software processed packets27-15

auto-QoS

configuration and defaults display27-19

configuration guidelines27-18

described27-16

displaying27-19

effects on NVRAM configuration27-17

enabling for VoIP27-18

basic model27-5

burst size27-27

classification27-5to 27-9

configuration guidelines27-24

auto-QoS27-18

configuring

auto-QoS27-16

DSCP maps27-41

traffic shaping27-40

trusted boundary27-25

VLAN-based27-35

creating policing rules27-28

default auto configuration27-16

default configuration27-22

definitions27-3

disabling on interfaces27-34

enabling on interfaces27-34

flowcharts27-7, 27-11

IP phones

automatic classification and queueing27-16

detection and trusted settings27-16, 27-25

overview27-1

packet modification27-15

port-based27-35

priority27-14

traffic shaping27-14

transmit rate27-40

trust states

trusted device27-25

VLAN-based27-35

See also COS; DSCP values; transmit queues

QoS active queue management

tracking queue length27-13

QoS labels

definition27-3

QoS mapping tables

CoS-to-DSCP27-41

DSCP-to-CoS27-43

policed-DSCP27-42

types27-13

QoS marking

description27-4

QoS policers

burst size27-27

numbers of27-10

types of27-9

QoS policing

definition27-4

described27-5, 27-9

QoS policy

attaching to interfaces27-10

overview of configuration27-28

QoS transmit queues

allocating bandwidth27-40

burst27-14

configuring27-39

configuring traffic shaping27-40

mapping DHCP values to27-39

maximum rate27-14

overview27-13

sharing link bandwidth27-14

Quality of service

See QoS

queueing27-5, 27-13

R

RADIUS server

configure to-Switch communication29-15

configuring settings29-16

parameters on the switch29-15

range command4-4

range macros

defining4-5

ranges of interfaces

configuring4-4

Rapid Spanning Tree

See RSTP

rcommand command7-12

re-authentication of a client

configuring manual29-19

enabling periodic29-18

reduced MAC address12-2

redundancy

configuring6-8

guidelines and restrictions6-7

changes made through SNMP6-8, 6-11

NSF-awareness support6-2

overview6-3

redundancy command6-8

understanding synchronization6-6

redundancy(RPR)

route processor redundancy6-4

synchronization6-6

redundancy(SSO)

route processor redundancy6-4

synchronization6-7

related documentationxxiii

reload command3-21, 3-22

replication

description23-8

reserved-range VLANs

See VLANs

retransmission number

setting in 802.1X authentication29-21

retransmission time

changing in 802.1X authentication29-20

RIP

description1-7

ROM monitor

boot process and3-19

CLI2-6

root bridge

configuring12-9

selecting in MST14-2

root guard

and MST14-2

enabling13-8

overview13-2

routed packets

ACLs33-21

route-map (IP) command24-3

route maps

defining24-3

PBR24-2

router ACLs

description33-2

using with VLAN maps33-20

route targets

VPN26-3

Routing Information Protocol

See RIP

RSPAN

configuration guidelines38-16

destination ports38-5

IDS38-2

monitored ports38-4

monitoring ports38-5

received traffic38-3

sessions

creating38-17

defined38-3

limiting source traffic to specific VLANs38-23

monitoring VLANs38-22

removing source (monitored) ports38-21

specifying monitored ports38-17

source ports38-4

transmitted traffic38-4

VLAN-based38-5

RSTP

compatibility14-3

description14-2

port roles14-3

port states14-4

S

SAID

See 802.10 SAID

scheduling27-13

defined27-4

overview27-5

secondary root switch12-12

secondary VLANs

associating with primary34-6

description34-2

permitting routing34-11

secure ports, configuring30-1

Security Association Identifier

See 802.10 SAID

servers, VTP

See VTP servers

service-policy command27-29

service-policy input command20-1, 27-34

service-provider networks

and customer VLANs17-2

Layer 2 protocols across17-7

set default interface command24-4

set interface command24-4

set ip default next-hop command24-4

set ip next-hop command24-4

show adjacency command22-9

show boot command3-24

show catalyst4000 chassis-mac-address command12-3

show cdp command18-2, 18-3

show cdp entry command18-4

show cdp interface command18-3

show cdp neighbors command18-4

show cdp traffic command18-4

show ciscoview package command1-16

show ciscoview version command1-16

show cluster members command7-12

show configuration command4-9

show debugging command18-4

show environment command37-1

show history command2-4

show interfaces command4-12, 4-13

show interfaces status command5-2

show ip cache flow aggregation destination-prefix command39-9

show ip cache flow aggregation prefix command39-9

show ip cache flow aggregation source-prefix command39-9

show ip cache flow command39-6

show ip cef command22-8

show ip interface command23-15

show ip local policy command24-5

show ip mroute command23-15

show ip pim interface command23-15

show l2protocol command17-11

show mac-address-table address command5-3

show mac-address-table interface command5-3

show mls entry command22-8

show module command5-1, 12-5

show PoE consumed37-21

show power command37-14

show power inline command37-20

show power inline consumption command37-19

show power supplies command37-8

show protocols command4-13

show running-config command

adding description for an interface4-9

checking your settings3-9

displaying ACLs33-14, 33-16, 33-23, 33-24

show startup-config command3-10

show users command5-4

show version command3-22

shutdown, command4-14

shutdown threshold for Layer 2 protocol packets17-9

shutting down

interfaces4-14

single spanning tree

See SST

slot numbers, description4-2

SmartPort macros

configuration guidelines11-4

configuring11-2

creating and applying11-4

default configuration11-2

defined11-1

displaying11-8

tracing11-4

SNMP

documentation1-12

support1-12

software

upgrading6-12

software configuration register3-19

software switching

description22-5

interfaces22-6

key data structures used23-7

SPAN

and ACLs38-5

configuration guidelines38-7

configuring38-6to 38-10

destination ports38-5

IDS38-2

monitored port, defined38-4

monitoring port, defined38-5

received traffic38-3

sessions

defined38-3

source ports38-4

transmitted traffic38-4

VLAN-based38-5

SPAN and RSPAN

concepts and terminology38-3

default configuration38-6

displaying status38-24

overview38-1

session limits38-6

SPAN destination ports

802.1X authentication not supported29-13

SPAN enhancements

access list filtering38-13

configuration example38-15

CPU port sniffing38-10

encapsulation configuration38-12

ingress packets38-12

packet type filtering38-14

spanning-tree backbonefast command13-15

spanning-tree cost command12-15

spanning-tree guard root command13-8

spanning-tree portfast bpdu-guard command13-12

spanning-tree portfast command13-11

spanning-tree port-priority command12-13

spanning-tree uplinkfast command13-14

spanning-tree vlan

command12-9

command example12-9

spanning-tree vlan command12-8

spanning-tree vlan cost command12-15

spanning-tree vlan forward-time command12-19

spanning-tree vlan hello-time command12-17

spanning-tree vlan max-age command12-18

spanning-tree vlan port-priority command12-13

spanning-tree vlan priority command12-17

spanning-tree vlan root primary command12-10

spanning-tree vlan root secondary command12-12

speed

configuring interface4-7

speed command4-7

SST

description14-2

interoperability14-4

static routes

configuring3-11

verifying3-12

statistics

displaying 802.1X29-22

displaying PIM23-20

NetFlow accounting39-6

sticky learning

configuration file30-2

defined30-2

disabling30-2

enabling30-2

saving addresses30-2

sticky MAC addresses

configuring30-4

defined30-2

Storm Control

disabling36-4

displaying36-4

enabling36-3

hardware-based, implementing36-2

overview36-1

STP

bridge ID12-2

configuring12-7to 12-20

creating topology12-4

defaults12-6

disabling12-19

enabling12-7

enabling extended system ID12-8

enabling Per-VLAN Rapid Spanning Tree12-20

forward-delay time12-18

hello time12-17

Layer 2 protocol tunneling17-7

maximum aging time12-18

overview12-1, 12-3

per-VLAN rapid spanning tree12-6

port cost12-15

port priority12-13

root bridge12-9

supervisor engine

accessing the redundant6-15

configuring3-8to 3-13

copying files to standby6-15

default configuration3-1

default gateways3-11

environmental monitoring37-1

ROM monitor3-19

startup configuration3-18

static routes3-11

synchronizing configurations6-10

SVIs

and router ACLs33-3

switched packets

and ACLs33-20

Switched Port Analyzer

See SPAN

switching

NetFlow

configuration (example)39-9

configuring39-5

exporting cache entries39-6

switchport

show interfaces4-12

switchport access vlan command10-6, 10-8

switchport block multicast command35-2

switchport block unicast command35-2

switchport mode access command10-8

switchport mode dot1q-tunnel command17-6

switchport mode dynamic command10-6

switchport mode trunk command10-6

switch ports

See access ports

switchport trunk allowed vlan command10-6

switchport trunk encapsulation command10-6

switchport trunk encapsulation dot1q command10-3

switchport trunk encapsulation isl command10-3

switchport trunk encapsulation negotiate command10-3

switchport trunk native vlan command10-6

switchport trunk pruning vlan command10-6

switch-to-RADIUS server communication

configuring29-15

syslog messages37-2

system

reviewing configuration3-10

settings at startup3-20

system images

loading from Flash memory3-23

modifying boot field3-20

specifying3-23

system MTU

802.1Q tunneling17-5

maximums17-5

T

TACACS+

setting passwords3-15

tagged packets

802.1Q17-3

Layer 2 protocol17-7

TCAM programming and ACLs33-6

Telnet

accessing CLI2-2

disconnecting user sessions5-5

executing5-3

monitoring user sessions5-4

telnet command5-4

TFTP

configuration files in base directory3-5

configuring for autoconfiguration3-4

time exceeded messages5-7

timer

See login timer

Token Ring

media not supported (note)8-4, 25-3

TOS

description27-3

trace command5-7

traceroute

See IP traceroute

See Layer 2 Traceroute

traceroute mac command5-9

traceroute mac ip command5-9

traffic

blocking flooded35-2

traffic control

using ACLs (figure)33-4

using VLAN maps (figure)33-5

traffic shaping27-14

translational bridge numbers (defaults)8-4

transmit queues

See QoS transmit queues

transmit rate27-40

troubleshooting

with traceroute5-7

trunk ports

802.1X authentication not supported on29-13

configuring PVLAN34-9to 34-11

trunks

802.1Q restrictions10-5

configuring10-6

configuring access VLANs10-6

configuring allowed VLANs10-6

default interface configuration10-6

different VTP domains10-3

enabling to non-DTP device10-4

encapsulation10-3

specifying native VLAN10-6

understanding10-3

trusted boundary for QoS27-25

trust states

configuring27-36

tunneling

defined17-1

Layer 2 protocol17-7

tunnel ports

802.1Q, configuring17-6

described17-2

incompatibilities with other features17-5

type of service

See TOS

U

UDLD

default configuration19-2

disabling19-3

enabling19-3

overview19-1, 32-1

unauthorized ports with 802.1X29-4

unicast

See IP unicast

unicast flood blocking

configuring35-1

unicast traffic

blocking35-2

unidirectional ethernet

enabling20-1

example of setting20-2

overview20-1

UniDirectional Link Detection Protocol

See UDLD

UplinkFast

and MST14-2

enabling13-14

MST and14-3

overview13-5

user EXEC mode2-5

user sessions

disconnecting5-5

monitoring5-4

V

VACLs

Layer 4 port operations33-7

virtual LANs

See VLANs

Virtual Private Network

See VPN

VLAN ACLs

See VLAN maps

vlan command8-6, 8-7

vlan database command8-7

vlan dot1q tag native command17-4

VLAN Management Policy Server

See VMPS

VLAN maps

applying33-16, 33-24

common uses for33-16

configuration example33-17

configuration guidelines33-13

configuring33-12

creating entries33-13

defined33-3

denying access example33-18

denying packets33-14

displaying33-19

examples33-18

order of entries33-13

permitting packets33-14

router ACLs and33-20

using (figure)33-5

VLANs

allowed on trunk10-6

configuration guidelines8-3

configuring8-4

customer numbering in service-provider networks17-3

default configuration8-4

description1-5

extended range8-3

IDs (default)8-4

interface assignment8-8

limiting source traffic with RSPAN38-23

monitoring with RSPAN38-22

name (default)8-4

normal range8-3

overview8-1

reserved range8-3

See also PVLANs

VLAN Trunking Protocol

See VTP

VLAN trunks

overview10-3

VMPS

configuring dynamic access ports on client9-6

configuring retry interval9-8

dynamic port membership

reconfirming9-7

reconfirming assignments9-7

reconfirming membership interval9-7

server overview9-1

VMPS client

administering and monitoring9-8

configure switch

configure reconfirmation interval9-7

dynamic ports9-6

entering IP VMPS address9-5

reconfirmation interval9-8

reconfirm VLAM membership9-7

default configuration9-4

dynamic VLAN membership overview9-4

troubleshooting dynamic port VLAN membership9-9

VMPS server

fall-back VLAN9-3

illegal VMPS client requests9-3

overview9-1

security modes

multiple9-3

open9-2

secure9-3

voice interfaces

configuring28-1

Voice over IP

configuring28-1

voice ports

configuring VVID28-2

voice traffic28-4, 37-15

voice VLAN ports

using 802.1X29-10

VPN

configuring routing in26-5

forwarding26-3

in service provider networks26-1

routes26-2

routing and forwarding table

See VRF

VRF

defining26-3

tables26-1

VTP

configuration guidelines25-5

configuring25-6to 25-10

configuring transparent mode25-9

default configuration25-5

disabling25-9

Layer 2 protocol tunneling17-7

monitoring25-10

overview25-1

See also VTP version 2

VTP advertisements

description25-3

VTP clients

configuring25-8

VTP domains

description25-2

VTP modes25-2

VTP pruning

enabling25-6

overview25-3

VTP servers

configuring25-7

VTP statistics

displaying25-10

VTP version 2

enabling25-7

overview25-3

See also VTP

VTY and Network Assistant7-12

VVID (voice VLAN ID)

and 802.1X authentication29-10

configuring28-2