Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(31)SGA
Index
Downloads: This chapterpdf (PDF - 1.11MB) | Feedback

Index         

Table Of Contents

         

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index         

Numerics

10/100 autonegotiation feature, forced6-8

10-Gigabit Ethernet port

deploy with Gigabit Ethernet SFP ports6-6

802.10 SAID (default)13-4

802.1Q

trunks17-6

tunneling

compatibility with other features21-5

defaults21-4

described21-2

tunnel ports with other features21-6

802.1Q VLANs

encapsulation15-3

trunk restrictions15-5

802.1s

See MST

802.1w

See MST

802.1X

See port-based authentication

802.1X authentication

for Critical Authentication32-10

for guest VLANs32-8

for MAC Authentication Bypass32-9

for Wake-on-LAN32-11

RADIUS accounting32-15

with port security32-13

with VLAN assignment32-6

with voice VLAN ports32-18

802.3ad

See LACP

A

AAA34-1

abbreviating commands2-5

access control entries

See ACEs

access control entries and lists34-1

access list filtering, SPAN enhancement41-13

access lists

using with WCCP47-7

access ports

and Layer 2 protocol tunneling21-9

configure port security33-6, 33-21

configuring15-8

access VLANs15-6

accounting

configuring for 802.1X32-27

with TACACS+3-16, 3-21

ACEs

ACLs37-2

Ethernet37-2

IP37-2

Layer 4 operation restrictions37-9

ACEs and ACLs34-1

ACLs

ACEs37-2

and SPAN41-5

and TCAM programming37-6

applying on routed packets37-22

applying on switched packets37-21

compatibility on the same switch37-3

configuring with VLAN maps37-21

CPU impact37-11

hardware and software support37-5

IP, matching criteria for port ACLs37-4

MAC extended37-12

matching criteria for router ACLs37-3

port

and voice VLAN37-4

defined37-2

limitations37-4

processing37-11

troubleshooting49-1

types supported37-2

acronyms, list ofA-1

active queue management30-14

adding members to a community12-8

addresses

displaying the MAC address table4-30

dynamic

changing the aging time4-21

defined4-19

learning4-20

removing4-22

MAC, discovering4-30

See MAC addresses

static

adding and removing4-27

defined4-19

address resolution4-30

adjacency tables

description26-2

displaying statistics26-9

advertisements, VTP

See VTP advertisements

aging time

MAC address table4-21

alarms

major10-2

minor10-2

ARP

defined4-30

table

address resolution4-30

managing4-30

asymmetrical links, and 802.1Q tunneling21-4

audiencexxix

authentication

NTP associations4-4

See also port-based authentication

TACACS+

defined3-16

key3-18

login3-19

Authentication, Authorization, and Accounting (AAA)34-1

Authentication Failed VLAN assignment

configure with 802.1X32-35

authentication server

defined32-3

RADIUS server32-3

authoritative time source, described4-2

authorization

with TACACS+3-16, 3-21

authorized and unauthorized ports32-4

authorized ports with 802.1X32-4

automatic discovery

considerations12-6

automatic QoS

See QoS

Auto-MDIX on a port

configuring6-17

displaying the configuration6-17

overview6-16

autonegotiation feature

forced 10/100Mbps6-8

Auto-QoS

configuring30-17

auto-sync command8-7

B

b50-3

BackboneFast

adding a switch (figure)18-3

and MST17-23

configuring18-15

link failure (figure)18-13, 18-14

not supported MST17-23

understanding18-12

See also STP

banners

configuring

login4-19

message-of-the-day login4-18

default configuration4-18

when displayed4-17

b flash command50-3

BGP1-7

routing session with multi-VRF CE29-7

blocking packets39-1

blocking state (STP)

RSTP comparisons (table)17-24

boot bootldr command3-31

boot command3-27

boot commands50-3

boot fields

See configuration register boot fields

bootstrap program

See ROM monitor

boot system command3-26, 3-31

boot system flash command3-28

Border Gateway Protocol

See BGP

boundary ports

description17-27

BPDU Guard

and MST17-23

configuring18-15

overview18-7

BPDUs

and media speed17-2

pseudobridges and17-25

what they contain17-3

bridge ID

See STP bridge ID

bridge priority (STP)17-16

bridge protocol data units

See BPDUs

broadcast storm control

disabling40-4

BSR

configuration example27-21

burst rate30-53

burst size30-28

C

cache engine clustersxxxi, 47-1

cache enginesxxxi, 47-1

cache farms

See cache engine clusters

candidates

automatic discovery12-6

candidate switch, cluster

defined12-12

requirements12-12

cautions for passwords

encrypting3-22

CDP

and trusted boundary30-26

automatic discovery in communities12-6

configuration22-2

displaying configuration22-3

enabling on interfaces22-3

Layer 2 protocol tunneling21-7

maintaining22-3

monitoring22-3

overview1-2, 22-1

cdp enable command22-3

CEF

adjacency tables26-2

and NSF with SSO9-5

configuring load balancing26-7

displaying statistics26-8

enabling26-6

hardware switching26-4

load balancing26-6

overview26-1

software switching26-4

CGMP

overview20-1

channel-group group command19-7, 19-10

Cisco 7600 series Internet router

enabling SNMP48-16

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco IOS NSF-aware

support9-2

Cisco IOS NSF-capable support9-2

Cisco IP Phones

configuring31-2

sound quality31-1

CiscoWorks 200043-4

CIST

description17-22

class-map command30-30

class of service

See CoS

clear cdp counters command22-4

clear cdp table command22-3

clear counters command6-19

clearing

IP multicast table entries27-20

clear ip eigrp neighbors command25-11

clear ip flow stats command44-9

CLI

accessing2-1

backing out one level2-5

getting commands2-5

history substitution2-3

managing clusters12-12

modes2-5

monitoring environments41-1

ROM monitor2-7

software basics2-4

clients

in 802.1X authentication32-2

clock

See system clock

clustering switches

command switch characteristics12-11, 12-12

and VTY12-11

convert to a community12-9

managing

through CLI12-12

overview12-10

planning considerations

CLI12-12

passwords12-7

command-line processing2-3

command modes2-5

commands

b flash50-3

boot50-3

confreg50-3

dev50-3

dir device50-3

frame50-5

i50-3

listing2-5

meminfo50-5

reset50-3

ROM monitor50-2to 50-3

ROM monitor debugging50-5

SNMP48-16

sysret50-5

command switch, cluster

requirements12-11

common and internal spanning tree

See CIST

common spanning tree

See CST

community of switches

access modes in Network Assistant12-8

adding devices12-8

candidate characterisitcs12-6

communication protocols12-8

community name12-7

configuration information12-8

converting from a cluster12-9

host name12-7

passwords12-7

community ports38-4

community strings

configuring43-7

overview43-4

community VLANs38-3, 38-4

and SPAN features38-11

configure as a PVLAN38-12

compiling MIBs48-16

config-register command3-28

config terminal command3-9

configurable leave timer,IGMP20-3

configuration examples

SNMP43-15

configuration files

limiting TFTP server access43-15

obtaining with DHCP3-6

saving3-10

system contact and location information43-14

configuration guidelines

SNMP43-6

configuration register

boot fields

listing value3-29

modifying3-28

changing from ROM monitor50-3

changing settings3-28to 3-29

configuring3-26

settings at startup3-27

configure terminal command3-28, 6-2

confreg command50-3

console configuration mode2-5

console download50-4to 50-5

console port

disconnecting user sessions7-6

monitoring user sessions7-6

control plane policing

See CoPP

CoPP

applying QoS service policy to control plane34-3

configuring

ACLs to match traffic34-3

enabling MLS QoS34-3

packet classification criteria34-3

service-policy map34-3

control plane configuration mode

entering34-3

displaying

dynamic information34-7

number of conforming bytes and packets34-7

rate information34-7

entering control plane configuration mode34-3

monitoring statistics34-7

overview34-1

copy running-config startup-config command3-10

copy system:running-config nvram:startup-config command3-31

CoS

configuring port value30-50

definition30-3

figure30-2

overriding on Cisco IP Phones31-4

priority31-4

CoS Mutation

configuring30-38

CoS-to-DSCP maps30-54

counters

clearing MFIB27-20

clearing on interfaces6-19

CPU port sniffing41-10

Critical Authentication

configure with 802.1X32-32

CST

description17-25

IST and17-22

MST and17-22

customer edge devices29-2

D

daylight saving time4-13

debug commands, ROM monitor50-5

default configuration

802.1X32-20

auto-QoS30-17

banners4-18

DNS4-16

IGMP filtering20-18

Layer 2 protocol tunneling21-9

MAC address table4-21

multi-VRF CE29-4

NTP4-4

private VLANs38-10

RMON45-3

SNMP43-6

SPAN and RSPAN41-6

system message logging42-3

system name and prompt4-15

TACACS+3-18

default gateway

configuring3-11

verifying configuration3-11

default settings, erase commad3-31

deploying 10-Gigabit Ethernet and a Gigabit Ethernet SFP ports6-6

description command6-10

detecting unidirectional links23-1

dev command50-3

DHCP-based autoconfiguration

client request message exchange3-3

configuring

client side3-2

DNS3-5

relay device3-5

server-side3-3

TFTP server3-4

example3-7

lease options

for IP address information3-3

for receiving the configuration file3-4

relationship to BOOTP3-2

DHCP snooping

configuring35-3

default configuration35-3

displaying binding tables35-10

displaying configuration35-11

enabling35-4

enabling on private VLAN35-6

enabling the database agent35-6

monitoring35-10, 35-13, 35-14

overview35-1

Snooping database agent35-2

DHCP Snooping Database Agent

adding to the database (example)35-9

enabling (example)35-7

overview35-2

reading from a TFTP file (example)35-8

Diagnostics

online46-1

troubleshooting46-2

Power-On-Self-Test

causes of failure46-13

how it works46-3

overview46-3

Power-On-Self-Test for Supervisor Engine V-10GE46-7

Differentiated Services Code Point values

See DSCP values

DiffServ architecture, QoS30-2

Digital optical monitoring transceiver support6-7

dir device command50-3

disabled state

RSTP comparisons (table)17-24

disabling

broadcast storm control40-4

disconnect command7-6

discovery, clusters

See automatic discovery

DNS

and DHCP-based autoconfiguration3-5

default configuration4-16

displaying the configuration4-17

overview4-15

setting up4-16

documentation

organizationxxix

relatedxxxii

domain names

DNS4-15

Domain Name System

See DNS

double-tagged packets

802.1Q tunneling21-2

Layer 2 protocol tunneling21-9

downloading MIBs48-14, 48-15

drop threshold for Layer 2 protocol packets21-10

DSCP maps30-54

DSCP-to-CoS maps

configuring30-56

DSCP values

configuring maps30-54

configuring port value30-51

definition30-4

IP precedence30-2

mapping markdown30-24

mapping to transmit queues30-52

DTP

VLAN trunks and15-3

duplex command6-9

duplex mode

configuring interface6-8

dynamic ARP inspection

ARP cache poisoning36-2

configuring

ACLs for non-DHCP environments36-10

in DHCP environments36-5

log buffer36-14

rate limit for incoming ARP packets36-16

denial-of-service attacks, preventing36-16

interface trust state, security coverage36-3

log buffer

configuring36-14

logging of dropped packets36-4

overview36-1

port channels, their behavior36-4

priority of static bindings36-4

purpose of36-2

rate limiting of ARP packets36-4

configuring36-16

validation checks, performing36-18

Dynamic Host Configuration Protocol snooping

See DHCP snooping

dynamic port VLAN membership

example13-26

limit on hosts13-25

reconfirming13-23

troubleshooting13-25

Dynamic Trunking Protocol

See DTP

E

EAP frames

changing retransmission time32-40

exchanging (figure)32-4, 32-6, 32-10

request/identity32-3

response/identity32-3

setting retransmission number32-41

EAPOL frames

802.1X authentication and32-3

OTP authentication, example (figure)32-4, 32-6, 32-10

start32-3

edge ports

description17-27

EGP

overview1-7

EIGRP (Enhanced IGRP)

stub routing

benefits25-10

configuration tasks25-10

configuring25-6

overview25-6

restrictions25-10

verifying25-11

EIGRP (enhanced IGRP)

overview1-7

eigrp stub command25-11

Embedded CiscoView

displaying information4-34

installing and configuring4-31

overview4-31

enable command3-9, 3-28

enable mode2-5

enabling SNMP48-16

encapsulation types15-3

Enhanced Interior Gateway Routing Protocol

See EIGRP

environmental monitoring

LED indications10-2

SNMP traps10-2

supervisor engine10-2

switching modules10-2

using CLI commands10-1

EtherChannel

channel-group group command19-7, 19-10

configuration guidelines19-5

configuring19-6to 19-14

configuring Layer 219-9

configuring Layer 319-6

interface port-channel command19-7

lacp system-priority

command example19-12

modes19-3

overview19-1

PAgP

Understanding19-3

physical interface configuration19-7

port-channel interfaces19-2

port-channel load-balance command19-12

removing19-14

removing interfaces19-13

explicit host tracking

enabling20-10

extended range VLANs

See VLANs

Extensible Authentication Protocol over LAN32-1

Exterior Gateway Protocol

See EGP

F

FastDrop

clearing entries27-20

displaying entries27-19

overview27-10

FIB

description26-2

See also MFIB

filtering

in a VLAN37-14

non-IP traffic37-12

flags27-11

Flash memory

configuring router to boot from3-30

loading system images from3-30

security precautions3-30

flooded traffic, blocking39-2

flow control, configuring6-11

forward-delay time (STP)

configuring17-18

forwarding information base

See FIB

frame command50-5

G

gateway

See default gateway

get-bulk-request operation43-3

get-next-request operation43-3, 43-4

get-request operation43-3, 43-4

get-response operation43-3

Gigabit Ethernet SFP ports

deploy with 10-Gigabit Ethernet6-6

global configuration mode2-5

Guest-VLANs

configure with 802.1X32-28, 32-36

H

hardware and software ACL support37-5

hardware switching26-5

hello time (STP)

configuring17-17

high CPU, troubleshooting49-8

history

CLI2-3

history table, level and number of syslog messages42-9

hop counts

configuring MST bridges17-28

host

configuring host statically20-10

limit on dynamic port13-25

host ports

kinds of38-4

Hot Standby Routing Protocol

See HSRP

HSRP

description1-6

hw-module module num power command10-17

I

ICMP

enabling7-11

ping7-7

running IP traceroute7-8

time exceeded messages7-8

i command50-3

IDS

using with SPAN and RSPAN41-2

IEEE 802.1s

See MST

IEEE 802.1w

See MST

IEEE 802.3ad

See LACP

IGMP

configurable leave timer

enabling20-8

configurable-leave timer20-3

description27-3

enabling27-13

explicit host tracking20-4, 20-10

immediate-leave processing20-3

overview20-1

IGMP filtering

configuring20-18

default configuration20-18

described20-18

monitoring20-21

IGMP groups

setting the maximum number20-20

IGMP Immediate Leave

configuration guidelines20-8

IGMP profile

applying20-19

configuration mode20-18

configuring20-19

IGMP snooping

configuration guidelines20-4

enabling20-5, 20-6

IP multicast and27-4

monitoring20-13

overview20-1

IGRP

description1-7

immediate-leave processing

enabling20-8

IGMP

See fast-leave processing

ingress packets, SPAN enhancement41-12

inline power

configuring on Cisco IP phones31-5

insufficient inline power handling for Supervisor Engine II-TS10-15

Intelligent Power Management11-4

interface command3-9, 6-1

interface port-channel command19-7

interface range command6-4

interface range macro command6-5

interfaces

adding descriptive name6-10

clearing counters6-19

configuring6-2

configuring ranges6-4

displaying information about6-19

Layer 2 modes15-4

maintaining6-18

monitoring6-18

naming6-10

numbers6-2

overview6-1

restarting6-20

See also Layer 2 interfaces

Interior Gateway Routing Protocol

See IGRP

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link encapsulation

See ISL encapsulation

Intrusion Detection System

See IDS

IP

configuring default gateway3-11

configuring static routes3-11

displaying statistics26-8

flow switching cache44-9

IP addresses

cluster candidate or member12-12

cluster command switch12-11

discovering4-30

ip cef command26-6

IP Enhanced IGRP

interfaces, displaying25-11

ip flow-aggregation cache destination-prefix command44-11

ip flow-aggregation cache prefix command44-11

ip flow-aggregation cache source-prefix command44-12

ip flow-export command44-9

ip icmp rate-limit unreachable command7-12

ip igmp profile command20-18

ip igmp snooping tcn flood command20-12

ip igmp snooping tcn flood query count command20-12

ip igmp snooping tcn query solicit command20-13

IP information

assigned

through DHCP-based autoconfiguration3-2

ip load-sharing per-destination command26-7

ip local policy route-map command28-5

ip mask-reply command7-13

IP multicast

clearing table entries27-20

configuring27-12

default configuration27-13

displaying PIM information27-15

displaying the routing table information27-16

enabling27-13

enabling dense-mode PIM27-14

enabling sparse-mode27-14

features not supported27-12

hardware forwarding27-8

IGMP snooping and20-4, 27-4

monitoring27-15

overview27-1

routing protocols27-2

software forwarding27-8

troubleshooting49-9, 49-10

See also Auto-RP; IGMP; PIM; RP; RPF

ip multicast-routing command27-13

IP phones

automatic classification and queueing30-17

configuring voice ports31-3

See Cisco IP Phones31-1

trusted boundary for QoS30-26

ip pim command27-14

ip pim dense-mode command27-14

ip pim sparse-dense-mode command27-15

ip policy route-map command28-4

ip redirects command7-12

ip route-cache flow command44-7

IP routing tables

deleting entries27-20

IP Source Guard

configuring35-12

configuring on private VLANs35-13

displaying35-13, 35-14

overview35-11

IP statistics

displaying26-8

IP traceroute

executing7-8

overview7-8

IP unicast

displaying statistics26-8

troubleshooting49-18

IP Unnumbered support

configuring on a range of Ethernet VLANs14-5

configuring on LAN and VLAN interfaces14-4

configuring with connected host polling14-6

DHCP Option 8214-2

displaying settings14-7

format of agent remote ID suboptions14-3

troubleshooting14-8

with conected host polling14-3

with DHCP server and Relay agent14-2

ip unreachables command7-11

IPX

redistribution of route information with EIGRP1-7

ISL

encapsulation15-3

trunking with 802.1Q tunneling21-4

isolated port38-4

isolated VLANs38-3, 38-4

ISSU

compatibility matrix5-12

compatiblity verification using Cisco Feature Navigator5-13

NSF overview5-3

perform the process

aborting a software upgrade5-24

configuring the rollback timer as a safeguard5-25

displaying a compatibility matrix5-27

loading the new software on the new standby5-22

stopping the rollback timer5-21

switching to the standby5-19

verify the ISSU state5-16

verify the redundancy mode5-14

verify the software installation5-14

vload the new software on standby5-16

prerequisites5-2

process overview5-6

restrictions5-2

SNMP support5-13

SSO overview5-3

versioning capability in software to support5-11

IST

and MST regions17-22

description17-22

master17-27

J

jumbo frames

and ethernet ports6-14

configuring MTU sizes for6-15

ports and linecards that support6-13

VLAN interfaces6-14

K

keyboard shortcuts2-3

L

l2protocol-tunnel command21-11

labels, definition30-3

LACP

system ID19-4

Layer 2 access ports15-8

Layer 2 frames

classification with CoS30-2

Layer 2 interfaces

assigning VLANs13-8

configuring15-5

configuring as PVLAN host ports38-16

configuring as PVLAN promiscuous ports38-14

configuring as PVLAN trunk ports38-17

defaults15-5

disabling configuration15-9

modes15-4

show interfaces command15-7

Layer 2 interface type

resetting38-21

setting38-21

Layer 2 protocol tunneling

default configuration21-9

guidelines21-10

Layer 2 switching

overview15-1

Layer 2 Traceroute

and ARP7-10

and CDP7-9

host-to-host paths7-9

IP addresses and subnets7-10

MAC addresses and VLANs7-10

multicast traffic7-10

multiple devices on a port7-10

unicast traffic1-18, 7-9

usage guidelines7-9

Layer 2 trunks

configuring15-6

overview15-3

Layer 3 packets

classification methods30-2

Layer 4 port operations

configuration guidelines37-10

restrictions37-9

LEDs

description (table)10-2

listening state (STP)

RSTP comparisons (table)17-24

load balancing

configuring for CEF26-7

configuring for EtherChannel19-12

overview19-4, 26-6

per-destination26-7

login authentication

with TACACS+3-19

login banners4-17

login timer

changing7-5

log messages

See system message logging

logoutwarning command7-6

loop guard

and MST17-23

configuring18-4

overview18-3

M

MAC addresses

aging time4-21

allocating17-5

and VLAN association4-20

building tables4-20, 15-2

convert dynamic to sticky secure33-5

default configuration4-21

discovering4-30

displaying4-30, 7-3

displaying in DHCP snooping binding table35-11

dynamic

learning4-20

removing4-22

in ACLs37-12

static

adding4-28

allowing4-29

characteristics of4-27

dropping4-29

removing4-28

sticky33-4

sticky secure, adding33-5

MAC Authentication Bypass

configure with 802.1X32-31

MAC extended access lists37-12

macros

See Smartports macros

main-cpu command8-7

management options

SNMP43-1

mapping

DSCP markdown values30-24

DSCP values to transmit queues30-52

mapping tables

configuring DSCP30-54

described30-14

mask destination command44-11

mask source command44-11, 44-12

Match CoS for non-IPV4 traffic

configuring30-32

match ip address command28-3

maximum aging time (STP)

configuring17-18

members

automatic discovery12-6

member switch

managing12-12

member switch, cluster

defined12-11

requirements12-12

meminfo command50-5

messages, to users through banners4-17

metro tags21-2

MFIB

CEF27-5

displaying27-18

overview27-11

MIBs

compiling48-16

downloading48-14, 48-15

overview43-1

related information48-15

SNMP interaction with43-4

modules

checking status7-1

powering down10-17

monitoring

802.1Q tunneling21-12

ACL information37-29

IGMP filters20-21

IGMP snooping20-13

Layer 2 protocol tunneling21-12

multi-VRF CE29-12

private VLANs38-21

traffic flowing among switches45-1

tunneling21-12

VLAN filters37-20

VLAN maps37-20

M-record17-23

MST

and multiple spanning trees1-3, 17-22

boundary ports17-27

BPDUs17-23

configuration parameters17-26

configuring17-29

displaying configurations17-34

edge ports17-27

enabling17-29

hop count17-28

instances

configuring parameters17-33

description17-22

number supported17-26

interoperability with PVST+17-23

link type17-28

master17-27

message age17-28

regions17-26

restrictions17-29

to-SST interoperability17-24

MSTP

M-record17-23

M-tree17-23

M-tree17-23

MTU size

configuring6-15, 6-21

default13-4

multicast

See IP multicast

multicast packets

blocking39-2

multicast routers

displaying routing tables27-16

flood suppression20-10

Multicast Storm Control

overview40-6

suppression on WS-X401440-7

suppression on WS-X401640-6

multiple forwarding paths1-3, 17-22

Multiple Spanning Tree

See MST

multiple VPN routing/forwarding

See multi-VRF CE

multi-VRF CE

components29-4

configuration example29-8

default configuration29-4

defined29-1

displaying29-12

monitoring29-12

network components29-4

packet-forwarding process29-4

N

native VLAN

and 802.1Q tunneling21-4

specifying15-6

NetFlow

aggregation

minimum mask,default value44-11

destination-prefix aggregation

configuration (example)44-16

minimum mask, configuring44-11

IP

flow switching cache44-9

prefix aggregation

configuration (example)44-14

minimum mask, configuring44-11

source-prefix aggregation

minimum mask, configuring44-11

switching

checking for required hardware44-6

configuration (example)44-13

configuring switched IP flows44-8

enabling Collection44-7

exporting cache entries44-9

statistics44-9

NetFlow statistics

caveats on supervisor44-6

checking for required hardware44-6

configuring collection44-6

enabling Collection44-7

exporting cache entries44-9

overview of collection44-2

switched/bridged IP flows44-8

Network Assistant

and VTY12-11

configure

enable communication with switch12-13, 12-17

default configuration12-2

overview of CLI commands12-2

network fault tolerance1-3, 17-22

network management

configuring22-1

RMON45-1

SNMP43-1

Network Time Protocol

See NTP

New Software Features in Release 7.7

TDR7-3

Next Hop Resolution Protocol

See NHRP

NFFC/NFFC II

IGMP snooping and20-4

NHRP

support1-7

non-IP traffic filtering37-12

non-RPF traffic

description27-9

in redundant configurations (figure)27-10

Nonstop Forwarding

See NSF

nonvolatile random-access memory

See NVRAM

normal-range VLANs

See VLANs

NSF

defined9-1

guidelines and restrictions9-9

operation9-4

NSF-aware

supervisor engines9-3

support9-2

NSF-capable

supervisor engines9-3

support9-2

NSF with SSO supervisor engine redundancy

and CEF9-5

overview9-4

SSO operation9-4

NTP

associations

authenticating4-4

defined4-2

enabling broadcast messages4-7

peer4-6

server4-6

default configuration4-4

displaying the configuration4-11

overview4-2

restricting access

creating an access group4-9

disabling NTP services per interface4-10

source IP address, configuring4-10

stratum4-2

synchronizing devices4-6

time

services4-2

synchronizing4-2

NVRAM

saving settings3-10

O

OIR

overview6-18

Online Diagnostics46-1

online insertion and removal

See OIR

Open Shortest Path First

See OSPF

operating system images

See system images

OSPF

area concept1-8

description1-8

P

packets

modifying30-16

software processed

and QoS30-16

packet type filtering

overview41-15

SPAN enhancement41-15

PAgP

understanding19-3

passwords

configuring enable password3-14

configuring enable secret password3-14

encrypting3-22

in clusters12-7

recovering lost enable password3-24

setting line password3-14

PBR (policy-based routing)

configuration (example)28-5

enabling28-3

features28-2

overview28-1

route maps28-2

when to use28-2

PeerResetReason environmental variable

tracking supervisor engine resets49-24

per-port and VLAN Access Control List35-11

per-port per-VLAN QoS

enabling30-45

overview30-16

Per-VLAN Rapid Spanning Tree17-6

enabling17-20

overview17-6

PE to CE routing, configuring29-7

PIM

configuring dense mode27-14

configuring sparse mode27-14

displaying information27-15

displaying statistics27-20

enabling sparse-dense mode27-14, 27-15

overview27-3

PIM-DM27-3

PIM-SM27-3

ping

executing7-7

overview7-7

ping command7-7, 27-15

PoE11-8

configuring power consumption for single device11-5

configuring power consumption for switch11-5

power consumption for powered devices

Intelligent Power Management11-4

overview11-4

supported cabling topology11-6

powering down a module10-17

power management modes11-2

show interface status11-7

point-to-point

in 802.1X authentication (figure)32-2, 32-16

police command30-34

policed-DSCP map30-55

policers

description30-5

types of30-10

policies

See QoS policies

policing

See QoS policing

policy-map command30-30, 30-33

policy maps

attaching to interfaces30-37

configuring30-32

port ACLs

and voice VLAN37-4

defined37-2

limitations37-4

Port Aggregation Protocol

see PAgP

port-based authentication

802.1X with voice VLAN32-18

changing the quiet period32-39

client, defined32-2

configuration guidelines32-21

configure 802.1X accounting32-27

configure switch-to-RADIUS server communication32-24

configure with Authentication Failed VLAN assignment32-35

configure with Critical Authentication32-32

configure with Guest-VLANs32-28, 32-36

configure with MAC Authentication Bypass32-31

configure with Wake-on-LAN32-34

configuring Guest-VLAN32-24

configuring manual re-authentication of a client32-42

controlling authorization state32-4

default configuration32-20

described32-1

device roles32-2

displaying statistics32-43

enabling32-21

enabling multiple hosts32-38

enabling periodic re-authentication32-37

encapsulation32-3

initiation and message exchange32-3

method lists32-21

ports not supported32-4

resetting to default values32-43

setting retransmission number32-41

setting retransmission time32-40

topologies, supported32-19

using with port security32-13

with Critical Authentication32-10

with Guest VLANs32-8

with MAC Authentication Bypass32-9

with VLAN assignment32-6

port-based QoS features

See QoS

port-channel interfaces

See also EtherChannel

creating19-6

overview19-2

port-channel load-balance

command19-12

command example19-12

port-channel load-balance command19-12

port cost (STP)

configuring17-15

PortFast

and MST17-23

BPDU filter, configuring18-8

configuring or enabling18-15

overview18-5

PortFast BPDU filtering

and MST17-23

enabling18-8

overview18-8

port priority

configuring MST instances17-33

configuring STP17-13

ports

blocking39-1

checking status7-2

dynamic VLAN membership

example13-26

reconfirming13-23

forwarding, resuming39-3

See also interfaces

port security

aging33-5

and QoS trusted boundary30-26

configuring33-7

displaying33-26

guidelines and restrictions33-31

on access ports33-6, 33-21

on private VLAN33-13

host33-14

over Layer 2 EtherChannel33-31

promiscuous33-15

topology33-14, 33-17, 33-31

on trunk port33-16

guidelines and restrictions33-14, 33-17, 33-20, 33-31

port mode changes33-21

on voice ports33-21

RADIUS accounting32-15

sticky learning33-5

troubleshooting

common system error messages33-34

verifying that an address is secure33-32

using with 802.1X32-13

violations33-5

with 802.1X Authentication33-30

with DHCP and IP Source Guard33-30

with other features33-31

port states

description17-5

port trust state

See trust states

power

inline31-5

power dc input command10-14

power handling for Supervisor Engine II-TS11-12

power inline command11-3

power inline consumption command11-5

power management

Catalyst 4500 series10-3

Catalyst 4500 Series power supplies10-9

Catalyst 4948 series10-17

combined mode10-5

configuring combined mode10-8

configuring redundant mode10-7

overview10-1

redundancy10-3

redundant mode10-5

Power-On-Self-Test diagnostics46-3, 46-13

Power-On-Self-Test for Supervisor Engine V-10GE46-7

power redundancy-mode command10-8

power supplies

fixed10-4

variable10-4, 10-17

primary VLANs38-2, 38-4

associating with secondary VLANs38-13

configuring as a PVLAN38-12

priority

overriding CoS of incoming frames31-4

private VLAN

configure port security33-14

private VLANs

across multiple switches38-5

and SVIs38-9

benefits of38-2

community ports38-4

community VLANs38-3, 38-4

default configuration38-10

end station access to38-3

isolated port38-4

isolated VLANs38-3, 38-4

monitoring38-21

ports

community38-4

isolated38-4

promiscuous38-5

primary VLANs38-2, 38-4

promiscuous ports38-5

secondary VLANs38-3

subdomains38-2

traffic in38-8

troubleshooting

common system error messages38-23

verifying that an address is secure38-23

privileged EXEC mode2-5

privileges

changing default3-23

configuring levels3-23

exiting3-24

logging in3-23

promiscuous ports

configuring PVLAN38-14

defined38-5

setting mode38-21

protocol timers17-4

provider edge devices29-2

pruning, VTP

See VTP pruning

pseudobridges

description17-25

PVACL35-11

PVID (port VLAN ID)

and 802.1X with voice VLAN ports32-18

PVLAN promiscuous trunk port

configuring38-2, 38-15, 38-18

PVLANs

802.1q support38-12

across multiple switches38-5

configuration guidelines38-10

configure port security33-13, 33-15, 33-17

configure port security in a wireless setting33-31

configure port security over Layer 2 EtherChannel33-31

configuring38-9

configuring a VLAN38-12

configuring promiscuous ports38-14

host ports

configuring a Layer 2 interface38-16

setting38-21

overview38-1

permitting routing, example38-20

promiscuous mode

setting38-21

setting

interface mode38-21

Q

QoS

allocating bandwidth30-53

and software processed packets30-16

auto-QoS

configuration and defaults display30-20

configuration guidelines30-18

described30-17

displaying30-20

effects on NVRAM configuration30-18

enabling for VoIP30-19

basic model30-5

burst size30-28

classification30-6to 30-10

configuration guidelines30-25

auto-QoS30-18

configuring

auto-QoS30-17

DSCP maps30-54

traffic shaping30-53

trusted boundary30-26

VLAN-based30-48

configuring UBRL30-39

creating policing rules30-29

default auto configuration30-17

default configuration30-23

definitions30-3

disabling on interfaces30-37

enabling and disabling30-47

enabling on interfaces30-37

enabling per-port per-VLAN30-45

flowcharts30-8, 30-12

IP phones

automatic classification and queueing30-17

detection and trusted settings30-17, 30-26

overview30-1

overview of per-port per-VLAN30-16

packet modification30-16

port-based30-48

priority30-15

traffic shaping30-15

transmit rate30-53

trust states

trusted device30-26

VLAN-based30-48

See also COS; DSCP values; transmit queues

QoS active queue management

tracking queue length30-14

QoS labels

definition30-3

QoS mapping tables

CoS-to-DSCP30-54

DSCP-to-CoS30-56

policed-DSCP30-55

types30-14

QoS marking

description30-5

QoS policers

burst size30-28

types of30-10

QoS policing

definition30-5

described30-5, 30-10

QoS policy

attaching to interfaces30-11

overview of configuration30-30

QoS transmit queues

allocating bandwidth30-53

burst30-15

configuring30-51

configuring traffic shaping30-53

mapping DHCP values to30-52

maximum rate30-15

overview30-14

sharing link bandwidth30-15

Quality of service

See QoS

queueing30-5, 30-14

R

RADIUS server

configure to-Switch communication32-24

configuring settings32-26

parameters on the switch32-24

range command6-4

range macros

defining6-5

ranges of interfaces

configuring6-4

Rapid Spanning Tree

See RSTP

rcommand command12-12

re-authentication of a client

configuring manual32-42

enabling periodic32-37

reduced MAC address17-2

redundancy

configuring8-7

guidelines and restrictions8-5

changes made through SNMP8-11

NSF-aware support9-2

NSF-capable support9-2

overview8-2

redundancy command8-7

understanding synchronization8-4

redundancy (NSF)9-1

configuring

BGP9-11

CEF9-11

EIGRP9-16

IS-IS9-14

OSPF9-13

routing protocols9-5

redundancy (RPR)

route processor redundancy8-3

synchronization8-5

redundancy (SSO)

redundancy command9-10

route processor redundancy8-3

synchronization8-5

related documentationxxxii

reload command3-28, 3-29

Remote Network Monitoring

See RMON

replication

description27-8

reserved-range VLANs

See VLANs

reset command50-3

resetting a switch to defaults3-31

restricting access

NTP services4-8

TACACS+3-15

retransmission number

setting in 802.1X authentication32-41

retransmission time

changing in 802.1X authentication32-40

RFC

1157, SNMPv143-2

1305, NTP4-2

1757, RMON45-2

1901, SNMPv2C43-2

1902 to 1907, SNMPv243-2

2273-2275, SNMPv343-2

RIP

description1-8

RMON

default configuration45-3

displaying status45-6

enabling alarms and events45-3

groups supported45-2

overview45-1

ROM monitor

boot process and3-25

CLI2-7

commands50-2to 50-3

debug commands50-5

entering50-2

exiting50-6

overview50-1

root bridge

configuring17-9

selecting in MST17-22

root guard

and MST17-23

enabling18-2

overview18-2

routed packets

ACLs37-22

route-map (IP) command28-3

route maps

defining28-3

PBR28-2

router ACLs

description37-2

using with VLAN maps37-21

route targets

VPN29-4

Routing Information Protocol

See RIP

RSPAN

configuration guidelines41-16

destination ports41-5

IDS41-2

monitored ports41-4

monitoring ports41-5

received traffic41-3

sessions

creating41-17

defined41-3

limiting source traffic to specific VLANs41-23

monitoring VLANs41-22

removing source (monitored) ports41-21

specifying monitored ports41-17

source ports41-4

transmitted traffic41-4

VLAN-based41-5

RSTP

compatibility17-23

description17-22

port roles17-23

port states17-24

S

SAID

See 802.10 SAID

scheduling30-14

defined30-5

overview30-6

secondary root switch17-12

secondary VLANs38-3

associating with primary38-13

permitting routing38-20

security

configuring34-1

Security Association Identifier

See 802.10 SAID

sequence numbers in log messages42-7

servers, VTP

See VTP servers

service-policy command30-30

service-policy input command24-2, 30-37

service-provider networks

and customer VLANs21-2

set default interface command28-4

set interface command28-4

set ip default next-hop command28-4

set ip next-hop command28-4

set-request operation43-4

severity levels, defining in system messages42-8

sharing adjacencies

troubleshooting49-20

show adjacency command26-9

show boot command3-31

show catalyst4000 chassis-mac-address command17-3

show cdp command22-2, 22-3

show cdp entry command22-4

show cdp interface command22-3

show cdp neighbors command22-4

show cdp traffic command22-4

show ciscoview package command4-34

show ciscoview version command4-34

show cluster members command12-12

show configuration command6-10

show debugging command22-4

show environment command10-2

show history command2-4

show interfaces command6-15, 6-19, 6-21

show interfaces status command7-2

show ip cache flow aggregation destination-prefix command44-12

show ip cache flow aggregation prefix command44-12

show ip cache flow aggregation source-prefix command44-12

show ip cache flow command44-9

show ip cef command26-8

show ip eigrp interfaces command25-11

show ip eigrp neighbors command25-11

show ip eigrp topology command25-11

show ip eigrp traffic command25-11

show ip interface command27-15

show ip local policy command28-5

show ip mroute command27-15

show ip pim interface command27-15

show l2protocol command21-12

show mac-address-table address command7-3

show mac-address-table interface command7-3

show mls entry command26-8

show module command7-1, 17-5

show PoE consumed11-8

show power inline command11-7

show power inline consumption command11-5

show power supplies command10-8

show protocols command6-19

show running-config command

adding description for an interface6-10

checking your settings3-9

displaying ACLs37-15, 37-17, 37-24, 37-25

show startup-config command3-10

show users command7-6

show version command3-28, 3-29

shutdown, command6-20

shutdown threshold for Layer 2 protocol packets21-9

shutting down

interfaces6-20

Simple Network Management Protocol

See SNMP

single spanning tree

See SST

slot numbers, description6-2

Smartports macros

applying global parameter values16-8

applying macros16-8

applying parameter values16-9

configuration guidelines16-6

configuring16-2

creating16-8

default configuration16-4

defined16-1

displaying16-13

tracing16-7

website16-2

SNMP

accessing MIB variables with43-4

agent

described43-4

disabling43-7

authentication level43-10

community strings

configuring43-7

overview43-4

configuration examples43-15

configuration guidelines43-6

default configuration43-6

enabling48-16

engine ID43-6

groups43-6, 43-9

host43-6

informs

and trap keyword43-11

described43-5

differences from traps43-5

enabling43-14

limiting access by TFTP servers43-15

limiting system log messages to NMS42-9

manager functions43-3

notifications43-5

overview43-1, 43-4

status, displaying43-16

system contact and location43-14

trap manager, configuring43-13

traps

described43-3, 43-5

differences from informs43-5

enabling43-11

enabling MAC address notification4-22

enabling MAC move notification4-24

enabling MAC threshold notification4-26

overview43-1, 43-4

types of43-11

users43-6, 43-9

versions supported43-2

SNMP commands48-16

SNMPv143-2

SNMPv2C43-2

SNMPv343-2

software

upgrading8-13

software configuration register3-26

software switching

description26-5

interfaces26-6

key data structures used27-7

SPAN

and ACLs41-5

configuration guidelines41-7

configuring41-6to 41-10

destination ports41-5

IDS41-2

monitored port, defined41-4

monitoring port, defined41-5

received traffic41-3

sessions

defined41-3

source ports41-4

transmitted traffic41-4

VLAN-based41-5

SPAN and RSPAN

concepts and terminology41-3

default configuration41-6

displaying status41-25

overview41-1

session limits41-6

SPAN enhancements

access list filtering41-13

configuration example41-15

CPU port sniffing41-10

encapsulation configuration41-12

ingress packets41-12

packet type filtering41-15

spanning-tree backbonefast command18-15

spanning-tree cost command17-15

spanning-tree guard root command18-2

spanning-tree portfast bpdu-guard command18-7

spanning-tree portfast command18-6

spanning-tree port-priority command17-13

spanning-tree uplinkfast command18-11

spanning-tree vlan

command17-9

command example17-9

spanning-tree vlan command17-8

spanning-tree vlan cost command17-15

spanning-tree vlan forward-time command17-19

spanning-tree vlan hello-time command17-17

spanning-tree vlan max-age command17-18

spanning-tree vlan port-priority command17-13

spanning-tree vlan priority command17-17

spanning-tree vlan root primary command17-10

spanning-tree vlan root secondary command17-12

speed

configuring interface6-8

speed command6-8

SSO

configuring9-10

SSO operation9-4

SST

description17-22

interoperability17-24

static addresses

See addresses

static routes

configuring3-11

verifying3-12

statistics

displaying 802.1X32-43

displaying PIM27-20

NetFlow accounting44-9

SNMP input and output43-16

sticky learning

configuration file33-5

defined33-5

disabling33-5

enabling33-5

saving addresses33-5

sticky MAC addresses

configuring33-7

defined33-4

Storm Control

disabling40-4

displaying40-5

enabling40-3

hardware-based, implementing40-2

overview40-1

STP

bridge ID17-2

configuring17-7to 17-20

creating topology17-4

defaults17-6

disabling17-19

enabling17-7

enabling extended system ID17-8

enabling Per-VLAN Rapid Spanning Tree17-20

forward-delay time17-18

hello time17-17

Layer 2 protocol tunneling21-7

maximum aging time17-18

overview17-1, 17-3

per-VLAN rapid spanning tree17-6

port cost17-15

port priority17-13

root bridge17-9

stratum, NTP4-2

stub routing (EIGRP)

benefits25-10

configuration tasks25-10

configuring25-6

overview25-6

restrictions25-10

verifying25-11

subdomains, private VLAN38-2

summer time4-13

supervisor engine

accessing the redundant8-14

configuring3-8to 3-13

copying files to standby8-14

default configuration3-1

default gateways3-11

environmental monitoring10-1

redundancy9-1

ROM monitor3-25

startup configuration3-25

static routes3-11

synchronizing configurations8-11

Supervisor Engine II-TS

insufficient inline power handling10-15, 11-12

SVIs

and router ACLs37-3

switched packets

and ACLs37-21

Switched Port Analyzer

See SPAN

switching, NetFlow

checking for required hardware44-6

configuration (example)44-13

configuring switched IP flows44-8

enabling Collection44-7

exporting cache entries44-9

switchport

show interfaces6-15, 6-21

switchport access vlan command15-6, 15-8

switchport block multicast command39-2

switchport block unicast command39-2

switchport mode access command15-8

switchport mode dot1q-tunnel command21-6

switchport mode dynamic command15-6

switchport mode trunk command15-6

switch ports

See access ports

switchport trunk allowed vlan command15-6

switchport trunk encapsulation command15-6

switchport trunk encapsulation dot1q command15-3

switchport trunk encapsulation isl command15-3

switchport trunk encapsulation negotiate command15-3

switchport trunk native vlan command15-6

switchport trunk pruning vlan command15-6

switch-to-RADIUS server communication

configuring32-24

syslog

See system message logging

syslog messages10-2

sysret command50-5

system

reviewing configuration3-10

settings at startup3-27

system clock

configuring

daylight saving time4-13

manually4-11

summer time4-13

time zones4-12

displaying the time and date4-12

overview4-2

See also NTP

system images

loading from Flash memory3-30

modifying boot field3-27

specifying3-29

system message logging

default configuration42-3

defining error message severity levels42-8

disabling42-4

displaying the configuration42-12

enabling42-4

facility keywords, described42-12

level keywords, described42-8

limiting messages42-9

message format42-2

overview42-1

sequence numbers, enabling and disabling42-7

setting the display destination device42-4

synchronizing log messages42-5

timestamps, enabling and disabling42-7

UNIX syslog servers

configuring the daemon42-10

configuring the logging facility42-11

facilities supported42-12

system MTU

802.1Q tunneling21-5

maximums21-5

system name

default configuration4-15

default setting4-15

manual configuration4-15

See also DNS

system prompt, default setting4-14, 4-15

T

TACACS+34-1

accounting, defined3-16

authentication, defined3-16

authorization, defined3-16

configuring

accounting3-21

authentication key3-18

authorization3-21

login authentication3-19

default configuration3-18

displaying the configuration3-22

identifying the server3-18

limiting the services to the user3-21

operation of3-17

overview3-15

tracking services accessed by user3-21

tagged packets

802.1Q21-3

Layer 2 protocol21-7

TCAM programming and ACLs37-6

TCAMs, troubleshooting49-4

TDR

checking cable connectivity7-3

enabling and disabling test7-3

guidelines7-3

Telnet

accessing CLI2-2

disconnecting user sessions7-6

executing7-5

monitoring user sessions7-6

telnet command7-5

Terminal Access Controller Access Control System Plus

See TACACS+

TFTP

configuration files in base directory3-4

configuring for autoconfiguration3-4

limiting access by servers43-15

TFTP download

See also console download

time

See NTP and system clock

Time Domain Reflectometer

See TDR

time exceeded messages7-8

timer

See login timer

timestamps in log messages42-7

time zones4-12

Token Ring

media not supported (note)13-4, 13-10

TOS

description30-4

trace command7-9

traceroute

See IP traceroute

See Layer 2 Traceroute

traceroute mac command7-10

traceroute mac ip command7-10

traffic

blocking flooded39-2

traffic control

using ACLs (figure)37-4

using VLAN maps (figure)37-5

traffic shaping30-15

translational bridge numbers (defaults)13-4

transmit queues

See QoS transmit queues

transmit rate30-53

traps

configuring MAC address notification4-22

configuring MAC move notification4-24

configuring MAC threshold notification4-26

configuring managers43-11

defined43-3

enabling4-22, 4-24, 4-26, 43-11

notification types43-11

overview43-1, 43-4

troubleshooting

ACLs49-1

high CPU49-8

IP multicast

overview49-9

PIM and IGMP protocols49-9

topology and configuration49-10

IP unicast49-18

sharing adjacencies49-20

verifying a router's MAC address49-24

TCAMs

ACL optimization49-5

Layer 4 operators49-6

overview49-4

static49-7

structure of the input and output CAMs49-4

tracking supervisor engine resets through PeerResetReason variable49-24

with CiscoWorks43-4

with system message logging42-1

with traceroute7-8

trunk ports

configure port security33-16

configuring PVLAN38-17to 38-18

trunks

802.1Q restrictions15-5

configuring15-6

configuring access VLANs15-6

configuring allowed VLANs15-6

default interface configuration15-6

different VTP domains15-3

enabling to non-DTP device15-4

encapsulation15-3

specifying native VLAN15-6

understanding15-3

trusted boundary for QoS30-26

trust states

configuring30-49

tunneling

defined21-1

tunnel ports

802.1Q, configuring21-6

described21-2

incompatibilities with other features21-5

type of service

See TOS

U

UDLD

default configuration23-2

disabling23-3

enabling23-3

overview23-1

unauthorized ports with 802.1X32-4

unicast

See IP unicast

unicast flood blocking

configuring39-1

unicast MAC address filtering

and adding static addresses4-29

and broadcast MAC addresses4-28

and CPU packets4-28

and multicast addresses4-28

and router MAC addresses4-28

configuration guidelines4-28

described4-28

unicast traffic

blocking39-2

unidirectional ethernet

enabling24-2

example of setting24-2

overview24-1

UniDirectional Link Detection Protocol

See UDLD

UNIX syslog servers

daemon configuration42-10

facilities supported42-12

message logging configuration42-11

UplinkFast

and MST17-23

enabling18-15

MST and17-23

overview18-10

User Based Rate Limiting

configuring30-39

overview30-39

user EXEC mode2-5

user sessions

disconnecting7-6

monitoring7-6

V

VACLs

Layer 4 port operations37-9

virtual configuration register50-3

virtual LANs

See VLANs

Virtual Private Network

See VPN

VLAN ACLs

See VLAN maps

vlan command13-6, 13-7

vlan database command13-7

vlan dot1q tag native command21-4

VLAN ID, discovering4-30

VLAN Management Policy Server

See VMPS

VLAN maps

applying37-17, 37-25

common uses for37-18

configuration example37-18

configuration guidelines37-14

configuring37-13

creating entries37-15

defined37-3

denying access example37-19

denying packets37-15

displaying37-20

examples37-19

order of entries37-14

permitting packets37-15

router ACLs and37-21

using (figure)37-5

VLANs

allowed on trunk15-6

configuration guidelines13-3

configuring13-4

customer numbering in service-provider networks21-3

default configuration13-4

description1-5

extended range13-3

IDs (default)13-4

interface assignment13-8

limiting source traffic with RSPAN41-23

monitoring with RSPAN41-22

name (default)13-4

normal range13-3

overview13-1

reserved range13-3

See also PVLANs

VLAN Trunking Protocol

See VTP

VLAN trunks

overview15-3

VMPS

configuration file example13-29

configuring dynamic access ports on client13-22

configuring retry interval13-24

database configuration file13-29

dynamic port membership

example13-26

reconfirming13-23

reconfirming assignments13-23

reconfirming membership interval13-23

server overview13-17

VMPS client

administering and monitoring13-24

configure switch

configure reconfirmation interval13-23

dynamic ports13-22

entering IP VMPS address13-21

reconfirmation interval13-24

reconfirm VLAM membership13-23

default configuration13-21

dynamic VLAN membership overview13-20

troubleshooting dynamic port VLAN membership13-25

VMPS server

fall-back VLAN13-19

illegal VMPS client requests13-20

overview13-17

security modes

multiple13-19

open13-18

secure13-19

voice interfaces

configuring31-1

Voice over IP

configuring31-1

voice ports

configuring VVID31-3

voice traffic11-2, 31-5

voice VLAN

IP phone data traffic, described31-2

IP phone voice traffic, described31-2

voice VLAN ports

using 802.1X32-18

VPN

configuring routing in29-6

forwarding29-4

in service provider networks29-1

routes29-2

routing and forwarding table

See VRF

VRF

defining29-4

tables29-1

VTP

configuration guidelines13-12

configuring13-13to 13-17

configuring transparent mode13-16

default configuration13-12

disabling13-16

Layer 2 protocol tunneling21-7

monitoring13-16

overview13-8

See also VTP version 2

VTP advertisements

description13-9

VTP clients

configuring13-15

VTP domains

description13-9

VTP modes13-9

VTP pruning

enabling13-13

overview13-10

VTP servers

configuring13-14

VTP statistics

displaying13-16

VTP version 2

enabling13-14

overview13-10

See also VTP

VTY and Network Assistant12-11

VVID (voice VLAN ID)

and 802.1X authentication32-18

configuring31-3

W

Wake-on-LAN

configure with 802.1X32-34

WCCP

configuration examples47-8

configuring on a router47-2, 47-10

features47-4

restrictions47-5

service groups47-6

Web Cache Communication Protocol

See WCCPxxxi, 47-1

web caches

See cache engines

web cache services

description47-4

web caching

See web cache services

See also WCCP

web scaling47-1