Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, 12.2(37)SG
Index
Downloads: This chapterpdf (PDF - 1.32MB) The complete bookPDF (PDF - 23.75MB) | Feedback

Index         

Table Of Contents

         

Numerics - A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W -

Index         

Numerics

10/100 autonegotiation feature, forced 6-8

10-Gigabit Ethernet port

deploy with Gigabit Ethernet SFP ports 6-6

802.10 SAID (default) 13-4

802.1Q

trunks 17-6

tunneling

compatibility with other features 21-5

defaults 21-4

described 21-2

tunnel ports with other features 21-6

802.1Q VLANs

encapsulation 15-3

trunk restrictions 15-5

802.1s

See MST

802.1w

See MST

802.1X

See port-based authentication

802.1X authentication

for Critical Authentication 32-12

for guest VLANs 32-8

for MAC Authentication Bypass 32-9

for Wake-on-LAN 32-12

RADIUS accounting 32-16

with port security 32-15

with VLAN assignment 32-7

with voice VLAN ports 32-19

802.3ad

See LACP

A

AAA 34-1

abbreviating commands 2-5

access control entries

See ACEs

access control entries and lists 34-1

access list filtering, SPAN enhancement 41-13

access lists

using with WCCP 47-7

access ports

and Layer 2 protocol tunneling 21-9

configure port security 33-6, 33-21

configuring 15-8

access VLANs 15-6

accounting

configuring for 802.1X 32-32

with TACACS+ 3-16, 3-21

ACEs

ACLs 37-2

Ethernet 37-2

IP 37-2

Layer 4 operation restrictions 37-9

ACEs and ACLs 34-1

ACLs

ACEs 37-2

and SPAN 41-5

and TCAM programming 37-6

applying on routed packets 37-22

applying on switched packets 37-21

compatibility on the same switch 37-3

configuring with VLAN maps 37-21

CPU impact 37-11

hardware and software support 37-5

IP, matching criteria for port ACLs 37-4

MAC extended 37-12

matching criteria for router ACLs 37-3

port

and voice VLAN 37-4

defined 37-3

limitations 37-4

processing 37-11

resize the TCAM regions 37-8

troubleshooting 49-4

types supported 37-2

acronyms, list of A-1

active queue management 30-14

adding members to a community 12-8

addresses

displaying the MAC address table 4-30

dynamic

changing the aging time 4-21

defined 4-19

learning 4-20

removing 4-22

MAC, discovering 4-30

See MAC addresses

static

adding and removing 4-27

defined 4-19

address resolution 4-30

adjacency tables

description 26-2

displaying statistics 26-9

advertisements, VTP

See VTP advertisements

aging time

MAC address table 4-21

alarms

major 10-2

minor 10-2

ARP

defined 4-30

table

address resolution 4-30

managing 4-30

asymmetrical links, and 802.1Q tunneling 21-4

audience xxix

authentication

NTP associations 4-4

See also port-based authentication

TACACS+

defined 3-16

key 3-18

login 3-19

Authentication, Authorization, and Accounting (AAA) 34-1

Authentication Failed VLAN assignment

configure with 802.1X 32-39

authentication server

defined 32-3

RADIUS server 32-3

authoritative time source, described 4-2

authorization

with TACACS+ 3-16, 3-21

authorized and unauthorized ports 32-4

authorized ports with 802.1X 32-4

autoconfiguration 3-2

automatic discovery

considerations 12-6

automatic QoS

See QoS

Auto-MDIX on a port

configuring 6-17

displaying the configuration 6-17

overview 6-16

autonegotiation feature

forced 10/100Mbps 6-8

Auto-QoS

configuring 30-17

Autostate

understanding 25-5

auto-sync command 8-7

B

BackboneFast

adding a switch (figure) 18-3

and MST 17-23

configuring 18-15

link failure (figure) 18-13, 18-14

not supported MST 17-23

understanding 18-12

See also STP

banners

configuring

login 4-19

message-of-the-day login 4-18

default configuration 4-18

when displayed 4-17

b command 50-3

b flash command 50-3

BGP 1-7

routing session with multi-VRF CE 29-6

blocking packets 39-1

blocking state (STP)

RSTP comparisons (table) 17-24

boot bootldr command 3-31

boot command 3-27

boot commands 50-3

boot fields

See configuration register boot fields

bootstrap program

See ROM monitor

boot system command 3-26, 3-31

boot system flash command 3-28

Border Gateway Protocol

See BGP

boundary ports

description 17-27

BPDU Guard

and MST 17-23

configuring 18-15

overview 18-7

BPDUs

and media speed 17-2

pseudobridges and 17-25

what they contain 17-3

bridge ID

See STP bridge ID

bridge priority (STP) 17-16

bridge protocol data units

See BPDUs

broadcast storm control

disabling 40-4

BSR

configuration example 27-21

burst rate 30-57

burst size 30-31

C

cache engine clusters xxxi, 47-1

cache engines xxxi, 47-1

cache farms

See cache engine clusters

candidates

automatic discovery 12-6

candidate switch, cluster

defined 12-12

requirements 12-12

cautions for passwords

encrypting 3-22

CDP

and trusted boundary 30-26

automatic discovery in communities 12-6

configuration 22-2

displaying configuration 22-3

enabling on interfaces 22-3

Layer 2 protocol tunneling 21-7

maintaining 22-3

monitoring 22-3

overview 1-2, 22-1

cdp enable command 22-3

CEF

adjacency tables 26-2

and NSF with SSO 9-5

configuring load balancing 26-7

displaying statistics 26-8

enabling 26-6

hardware switching 26-4

load balancing 26-6

overview 26-1

software switching 26-4

CGMP

overview 20-1

channel-group group command 19-7, 19-10

Cisco 7600 series Internet router

enabling SNMP 48-16

Cisco Discovery Protocol

See CDP

Cisco Express Forwarding

See CEF

Cisco Group Management Protocol

See CGMP

Cisco IOS NSF-aware

support 9-2

Cisco IOS NSF-capable support 9-2

Cisco IP Phones

configuring 31-2

sound quality 31-1

CiscoWorks 2000 43-4

CIST

description 17-22

class-map command 30-33

class of service

See CoS

clear cdp counters command 22-4

clear cdp table command 22-3

clear counters command 6-20

clearing

IP multicast table entries 27-20

clear ip eigrp neighbors command 25-13

clear ip flow stats command 44-9

CLI

accessing 2-1

backing out one level 2-5

getting commands 2-5

history substitution 2-3

managing clusters 12-12

modes 2-5

monitoring environments 41-1

ROM monitor 2-7

software basics 2-4

clients

in 802.1X authentication 32-2

clock

See system clock

clustering switches

command switch characteristics 12-11, 12-12

and VTY 12-11

convert to a community 12-9

managing

through CLI 12-12

overview 12-10

planning considerations

CLI 12-12

passwords 12-7

command-line processing 2-3

command modes 2-5

commands

b 50-3

b flash 50-3

boot 50-3

confreg 50-3

dev 50-3

dir device 50-3

frame 50-5

i 50-3

listing 2-5

meminfo 50-5

reset 50-3

ROM monitor50-2to 50-3

ROM monitor debugging 50-5

SNMP 48-16

sysret 50-5

command switch, cluster

requirements 12-11

common and internal spanning tree

See CIST

common spanning tree

See CST

community of switches

access modes in Network Assistant 12-8

adding devices 12-8

candidate characterisitcs 12-6

communication protocols 12-8

community name 12-7

configuration information 12-8

converting from a cluster 12-9

host name 12-7

passwords 12-7

community ports 38-4

community strings

configuring 43-7

overview 43-4

community VLANs 38-3, 38-4

and SPAN features 38-11

configure as a PVLAN 38-13

compiling MIBs 48-16

config-register command 3-28

config terminal command 3-9

configurable leave timer,IGMP 20-3

configuration examples

SNMP 43-16

configuration files

limiting TFTP server access 43-15

obtaining with DHCP 3-6

saving 3-10

system contact and location information 43-15

configuration guidelines

SNMP 43-6

configuration register

boot fields

listing value 3-29

modifying 3-28

changing from ROM monitor 50-3

changing settings3-28to 3-29

configuring 3-26

settings at startup 3-27

configure Layer 3 interfaces

physical 25-6

configure terminal command 3-28, 6-2

confreg command 50-3

console configuration mode 2-5

console download50-4to 50-5

console port

disconnecting user sessions 7-6

monitoring user sessions 7-6

control plane policing

See CoPP

CoPP

applying QoS service policy to control plane 34-3

configuring

ACLs to match traffic 34-3

enabling MLS QoS 34-3

packet classification criteria 34-3

service-policy map 34-3

control plane configuration mode

entering 34-3

displaying

dynamic information 34-7

number of conforming bytes and packets 34-7

rate information 34-7

entering control plane configuration mode 34-3

monitoring statistics 34-7

overview 34-1

copy running-config startup-config command 3-10

copy system:running-config nvram:startup-config command 3-31

CoS

configuring port value 30-53

definition 30-3

figure 30-2

overriding on Cisco IP Phones 31-4

priority 31-4

CoS Mutation

configuring 30-41

CoS-to-DSCP maps 30-58

counters

clearing MFIB 27-20

clearing on interfaces 6-19

CPU hogs, identifying or displaying 49-1

CPU port sniffing 41-10

Critical Authentication

configure with 802.1X 32-36

CST

description 17-25

IST and 17-22

MST and 17-22

customer edge devices 29-2

D

daylight saving time 4-13

debug commands, ROM monitor 50-5

default configuration

802.1X 32-22

auto-QoS 30-17

banners 4-18

DNS 4-16

IGMP filtering 20-18

Layer 2 protocol tunneling 21-9

MAC address table 4-21

multi-VRF CE 29-3

NTP 4-4

private VLANs 38-10

RMON 45-3

SNMP 43-6

SPAN and RSPAN 41-6

system message logging 42-4

system name and prompt 4-15

TACACS+ 3-18

default gateway

configuring 3-11

verifying configuration 3-11

default settings, erase commad 3-31

deploying 10-Gigabit Ethernet and a Gigabit Ethernet SFP ports 6-6

description command 6-10

detecting unidirectional links 23-1

dev command 50-3

DHCP-based autoconfiguration

client request message exchange 3-3

configuring

client side 3-2

DNS 3-5

relay device 3-5

server-side 3-4

TFTP server 3-4

example 3-7

lease options

for IP address information 3-4

for receiving the configuration file 3-4

overview 3-2

relationship to BOOTP 3-3

DHCP snooping

configuring 35-3

default configuration 35-3

displaying binding tables 35-10

displaying configuration 35-11

enabling 35-4

enabling on private VLAN 35-6

enabling the database agent 35-6

monitoring 35-10, 35-14

overview 35-1

Snooping database agent 35-2

DHCP Snooping Database Agent

adding to the database (example) 35-9

enabling (example) 35-7

overview 35-2

reading from a TFTP file (example) 35-8

Diagnostics

online 46-1

troubleshooting 46-2

Power-On-Self-Test

causes of failure 46-13

how it works 46-3

overview 46-3

Power-On-Self-Test for Supervisor Engine V-10GE 46-7

Differentiated Services Code Point values

See DSCP values

DiffServ architecture, QoS 30-2

Digital optical monitoring transceiver support 6-7

dir device command 50-3

disabled state

RSTP comparisons (table) 17-24

disabling

broadcast storm control 40-4

disconnect command 7-6

discovery, clusters

See automatic discovery

DNS

and DHCP-based autoconfiguration 3-5

default configuration 4-16

displaying the configuration 4-17

overview 4-15

setting up 4-16

documentation

organization xxix

related xxxii

domain names

DNS 4-15

Domain Name System

See DNS

double-tagged packets

802.1Q tunneling 21-2

Layer 2 protocol tunneling 21-9

downloading MIBs 48-14, 48-15

drop threshold for Layer 2 protocol packets 21-10

DSCP maps 30-58

DSCP-to-CoS maps

configuring 30-60

DSCP values

configuring maps 30-58

configuring port value 30-54

definition 30-4

IP precedence 30-2

mapping markdown 30-24

mapping to transmit queues 30-55

DTP

VLAN trunks and 15-3

duplex command 6-9

duplex mode

configuring interface 6-8

dynamic ARP inspection

ARP cache poisoning 36-2

configuring

ACLs for non-DHCP environments 36-10

in DHCP environments 36-5

log buffer 36-14

rate limit for incoming ARP packets 36-16

denial-of-service attacks, preventing 36-16

interface trust state, security coverage 36-3

log buffer

configuring 36-14

logging of dropped packets 36-4

overview 36-1

port channels, their behavior 36-4

priority of static bindings 36-4

purpose of 36-2

rate limiting of ARP packets 36-4

configuring 36-16

validation checks, performing 36-19

dynamic buffer limiting

globally 30-27

on specific CoS values 30-29

on specific IP DSCP values 30-28

Dynamic Host Configuration Protocol snooping

See DHCP snooping

dynamic port VLAN membership

example 13-26

limit on hosts 13-25

reconfirming 13-23

troubleshooting 13-25

Dynamic Trunking Protocol

See DTP

E

EAP frames

changing retransmission time 32-44

exchanging (figure) 32-4, 32-6, 32-11

request/identity 32-3

response/identity 32-3

setting retransmission number 32-45

EAPOL frames

802.1X authentication and 32-3

OTP authentication, example (figure) 32-4, 32-11

start 32-3

edge ports

description 17-27

EGP

overview 1-7

EIGRP (Enhanced IGRP)

stub routing

benefits 25-12

configuration tasks 25-13

configuring 25-9

overview 25-9

restrictions 25-12

verifying 25-13

EIGRP (enhanced IGRP)

overview 1-7

eigrp stub command 25-13

Embedded CiscoView

displaying information 4-34

installing and configuring 4-31

overview 4-31

enable command 3-9, 3-28

enable mode 2-5

enabling SNMP 48-16

encapsulation types 15-3

Enhanced Interior Gateway Routing Protocol

See EIGRP

environmental monitoring

LED indications 10-2

SNMP traps 10-2

supervisor engine 10-2

switching modules 10-2

using CLI commands 10-1

EtherChannel

channel-group group command 19-7, 19-10

configuration guidelines 19-5

configuring19-6to 19-14

configuring Layer 2 19-9

configuring Layer 3 19-6

interface port-channel command 19-7

lacp system-priority

command example 19-12

modes 19-3

overview 19-1

PAgP

Understanding 19-3

physical interface configuration 19-7

port-channel interfaces 19-2

port-channel load-balance command 19-12

removing 19-14

removing interfaces 19-13

explicit host tracking

enabling 20-10

extended range VLANs

See VLANs

Extensible Authentication Protocol over LAN 32-1

Exterior Gateway Protocol

See EGP

F

FastDrop

clearing entries 27-20

displaying entries 27-19

overview 27-10

FIB

description 26-2

See also MFIB

filtering

in a VLAN 37-14

non-IP traffic 37-12

flags 27-11

Flash memory

configuring router to boot from 3-30

loading system images from 3-30

security precautions 3-30

flooded traffic, blocking 39-2

flow control, configuring 6-11

forward-delay time (STP)

configuring 17-18

forwarding information base

See FIB

frame command 50-5

G

gateway

See default gateway

get-bulk-request operation 43-3

get-next-request operation 43-3, 43-4

get-request operation 43-3, 43-4

get-response operation 43-3

Gigabit Ethernet SFP ports

deploy with 10-Gigabit Ethernet 6-6

global configuration mode 2-5

Guest-VLANs

configure with 802.1X 32-32, 32-41

H

hardware and software ACL support 37-5

hardware switching 26-5

hello time (STP)

configuring 17-17

high CPU, troubleshooting 49-3

history

CLI 2-3

history table, level and number of syslog messages 42-10

hop counts

configuring MST bridges 17-28

host

configuring host statically 20-10

limit on dynamic port 13-25

host ports

kinds of 38-4

Hot Standby Routing Protocol

See HSRP

HSRP

description 1-6

http

//www.cisco.com/en/US/products/ps6350/products_configuration_guide_chapter09186a008042fbb3.html 1-6

//www.cisco.com/univercd/cc/td/doc/product/software/ios124/124tcr/tcf_r/index.htm 22-1

hw-module module num power command 10-17

I

ICMP

enabling 7-11

ping 7-7

running IP traceroute 7-8

time exceeded messages 7-8

i command 50-3

identifying CPU hogs 49-1

IDS

using with SPAN and RSPAN 41-2

IEEE 802.1s

See MST

IEEE 802.1w

See MST

IEEE 802.3ad

See LACP

IGMP

configurable leave timer

enabling 20-8

configurable-leave timer 20-3

description 27-3

enabling 27-13

explicit host tracking 20-4, 20-10

immediate-leave processing 20-3

overview 20-1

IGMP filtering

configuring 20-18

default configuration 20-18

described 20-18

monitoring 20-21

IGMP groups

setting the maximum number 20-20

IGMP Immediate Leave

configuration guidelines 20-8

IGMP profile

applying 20-19

configuration mode 20-18

configuring 20-19

IGMP snooping

configuration guidelines 20-4

enabling 20-5, 20-6

IP multicast and 27-4

monitoring 20-13

overview 20-1

IGRP

description 1-8

immediate-leave processing

enabling 20-8

IGMP

See fast-leave processing

ingress packets, SPAN enhancement 41-12

inline power

configuring on Cisco IP phones 31-5

insufficient inline power handling for Supervisor Engine II-TS 10-15

Intelligent Power Management 11-4

interface command 3-9, 6-1

interface port-channel command 19-7

interface range command 6-4

interface range macro command 6-5

interfaces

adding descriptive name 6-10

clearing counters 6-19

configuring 6-2

configuring ranges 6-4

displaying information about 6-19

Layer 2 modes 15-4

maintaining 6-19

monitoring 6-19

naming 6-10

numbers 6-2

overview 6-1

restarting 6-20

See also Layer 2 interfaces

Interior Gateway Routing Protocol

See IGRP

Internet Control Message Protocol

See ICMP

Internet Group Management Protocol

See IGMP

Inter-Switch Link encapsulation

See ISL encapsulation

Intrusion Detection System

See IDS

IP

configuring default gateway 3-11

configuring static routes 3-11

displaying statistics 26-8

flow switching cache 44-9

IP addresses

cluster candidate or member 12-12

cluster command switch 12-11

discovering 4-30

ip cef command 26-6

IP Enhanced IGRP

interfaces, displaying 25-14

ip flow-aggregation cache destination-prefix command 44-11

ip flow-aggregation cache prefix command 44-11

ip flow-aggregation cache source-prefix command 44-12

ip flow-export command 44-9

ip icmp rate-limit unreachable command 7-12

ip igmp profile command 20-18

ip igmp snooping tcn flood command 20-12

ip igmp snooping tcn flood query count command 20-12

ip igmp snooping tcn query solicit command 20-13

IP information

assigned

through DHCP-based autoconfiguration 3-2

ip load-sharing per-destination command 26-7

ip local policy route-map command 28-5

ip mask-reply command 7-13

IP multicast

clearing table entries 27-20

configuring 27-12

default configuration 27-13

displaying PIM information 27-15

displaying the routing table information 27-16

enabling 27-13

enabling dense-mode PIM 27-14

enabling sparse-mode 27-14

features not supported 27-12

hardware forwarding 27-8

IGMP snooping and 20-4, 27-4

monitoring 27-15

overview 27-1

routing protocols 27-2

software forwarding 27-8

troubleshooting 49-17, 49-18

See also Auto-RP; IGMP; PIM; RP; RPF

ip multicast-routing command 27-13

IP phones

automatic classification and queueing 30-17

configuring voice ports 31-3

See Cisco IP Phones 31-1

trusted boundary for QoS 30-26

ip pim command 27-14

ip pim dense-mode command 27-14

ip pim sparse-dense-mode command 27-15

ip policy route-map command 28-4

IP Port Security for Static Hosts

on a Layer 2 access port 35-16

on a PVLAN host port 35-19

overview 35-15

ip redirects command 7-12

ip route-cache flow command 44-7

IP routing tables

deleting entries 27-20

IP Source Guard

configuring 35-12

configuring on private VLANs 35-13

displaying 35-13, 35-14

overview 35-11

IP statistics

displaying 26-8

IP traceroute

executing 7-8

overview 7-8

IP unicast

displaying statistics 26-8

troubleshooting 49-27

IP Unnumbered support

configuring on a range of Ethernet VLANs 14-5

configuring on LAN and VLAN interfaces 14-4

configuring with connected host polling 14-6

DHCP Option 82 14-2

displaying settings 14-7

format of agent remote ID suboptions 14-3

troubleshooting 14-8

with conected host polling 14-3

with DHCP server and Relay agent 14-2

ip unreachables command 7-11

IPX

redistribution of route information with EIGRP 1-7

ISL

encapsulation 15-3

trunking with 802.1Q tunneling 21-4

isolated port 38-4

isolated VLANs 38-3, 38-4

ISSU

compatibility matrix 5-12

compatiblity verification using Cisco Feature Navigator 5-13

NSF overview 5-3

perform the process

aborting a software upgrade 5-25

configuring the rollback timer as a safeguard 5-26

displaying a compatibility matrix 5-27

loading the new software on the new standby 5-23

stopping the rollback timer 5-22

switching to the standby 5-19

verify the ISSU state 5-16

verify the redundancy mode 5-15

verify the software installation 5-14

vload the new software on standby 5-16

prerequisites 5-2

process overview 5-6

restrictions 5-2

SNMP support 5-13

SSO overview 5-3

troubleshooting 49-10

versioning capability in software to support 5-11

IST

and MST regions 17-22

description 17-22

master 17-27

J

jumbo frames

and ethernet ports 6-14

configuring MTU sizes for 6-15

ports and linecards that support 6-13

VLAN interfaces 6-14

K

keyboard shortcuts 2-3

L

l2protocol-tunnel command 21-11

labels, definition 30-3

LACP

system ID 19-4

Layer 2 access ports 15-8

Layer 2 frames

classification with CoS 30-2

Layer 2 interfaces

assigning VLANs 13-8

configuring 15-5

configuring as PVLAN host ports 38-16

configuring as PVLAN promiscuous ports 38-15

configuring as PVLAN trunk ports 38-17

defaults 15-5

disabling configuration 15-9

modes 15-4

show interfaces command 15-7

Layer 2 interface type

resetting 38-21

setting 38-21

Layer 2 protocol tunneling

default configuration 21-9

guidelines 21-10

Layer 2 switching

overview 15-1

Layer 2 Traceroute

and ARP 7-10

and CDP 7-9

host-to-host paths 7-9

IP addresses and subnets 7-10

MAC addresses and VLANs 7-10

multicast traffic 7-10

multiple devices on a port 7-10

unicast traffic 1-19, 7-9

usage guidelines 7-9

Layer 2 trunks

configuring 15-6

overview 15-3

Layer 3 interfaces

configuration guidelines 25-3

EIGRP stub routing 25-8

logical VLAN 25-3

overview 25-1

logical 25-2

physical 25-2

VLANs as interfaces 25-4

Layer 3 packets

classification methods 30-2

Layer 4 port operations

configuration guidelines 37-10

restrictions 37-9

LEDs

description (table) 10-2

listening state (STP)

RSTP comparisons (table) 17-24

load balancing

configuring for CEF 26-7

configuring for EtherChannel 19-12

overview 19-4, 26-6

per-destination 26-7

login authentication

with TACACS+ 3-19

login banners 4-17

login timer

changing 7-5

log messages

See system message logging

logoutwarning command 7-6

loop guard

and MST 17-23

configuring 18-4

overview 18-3

M

MAC addresses

aging time 4-21

allocating 17-5

and VLAN association 4-20

building tables 4-20, 15-2

convert dynamic to sticky secure 33-5

default configuration 4-21

discovering 4-30

displaying 4-30, 7-3

displaying in DHCP snooping binding table 35-11

dynamic

learning 4-20

removing 4-22

in ACLs 37-12

static

adding 4-28

allowing 4-29

characteristics of 4-27

dropping 4-29

removing 4-28

sticky 33-4

sticky secure, adding 33-5

MAC Authentication Bypass

configure with 802.1X 32-35

MAC extended access lists 37-12

macros

See Smartports macros

main-cpu command 8-7

management options

SNMP 43-1

mapping

DSCP markdown values 30-24

DSCP values to transmit queues 30-55

mapping tables

configuring DSCP 30-58

described 30-14

mask destination command 44-11

mask source command 44-11, 44-12

Match CoS for non-IPV4 traffic

configuring 30-35

match ip address command 28-3

maximum aging time (STP)

configuring 17-18

MDA

configuration guidelines 32-20

described 32-19

members

automatic discovery 12-6

member switch

managing 12-12

member switch, cluster

defined 12-11

requirements 12-12

meminfo command 50-5

messages, to users through banners 4-17

metro tags 21-2

MFIB

CEF 27-5

displaying 27-18

overview 27-11

MIBs

compiling 48-16

downloading 48-14, 48-15

overview 43-1

related information 48-15

SNMP interaction with 43-4

modules

checking status 7-1

powering down 10-17

monitoring

802.1Q tunneling 21-12

ACL information 37-29

IGMP filters 20-21

IGMP snooping 20-13

Layer 2 protocol tunneling 21-12

multi-VRF CE 29-11

private VLANs 49-37

traffic flowing among switches 45-1

tunneling 21-12

VLAN filters 37-20

VLAN maps 37-20

M-record 17-23

MST

and multiple spanning trees 1-3, 17-22

boundary ports 17-27

BPDUs 17-23

configuration parameters 17-26

configuring 17-29

displaying configurations 17-34

edge ports 17-27

enabling 17-29

hop count 17-28

instances

configuring parameters 17-33

description 17-22

number supported 17-26

interoperability with PVST+ 17-23

link type 17-28

master 17-27

message age 17-28

regions 17-26

restrictions 17-29

to-SST interoperability 17-24

MSTP

M-record 17-23

M-tree 17-23

M-tree 17-23

MTU size

configuring 6-15, 6-21, 6-22

default 13-4

multicast

See IP multicast

multicast packets

blocking 39-2

multicast routers

displaying routing tables 27-16

flood suppression 20-10

Multicast Storm Control

overview 40-6

suppression on WS-X4014 40-7

suppression on WS-X4016 40-6

multidomain authentication

See MDA

Multiple Domain Authentication

configuring 32-28

overview of Host Mode 32-6

multiple forwarding paths 1-3, 17-22

Multiple Spanning Tree

See MST

multiple VPN routing/forwarding

See multi-VRF CE

multi-VRF CE

components 29-3

configuration example 29-7

default configuration 29-3

defined 29-1

displaying 29-11

monitoring 29-11

network components 29-3

packet-forwarding process 29-3

N

named aggregate policers, creating 30-30

native VLAN

and 802.1Q tunneling 21-4

specifying 15-6

NetFlow

aggregation

minimum mask,default value 44-11

destination-prefix aggregation

configuration (example) 44-16

minimum mask, configuring 44-11

IP

flow switching cache 44-9

prefix aggregation

configuration (example) 44-14

minimum mask, configuring 44-11

source-prefix aggregation

minimum mask, configuring 44-11

switching

checking for required hardware 44-6

configuration (example) 44-13

configuring switched IP flows 44-8

enabling Collection 44-7

exporting cache entries 44-9

statistics 44-9

NetFlow statistics

caveats on supervisor 44-6

checking for required hardware 44-6

configuring collection 44-6

enabling Collection 44-7

exporting cache entries 44-9

overview of collection 44-1

switched/bridged IP flows 44-8

Network Assistant

and VTY 12-11

configure

enable communication with switch 12-13, 12-17

default configuration 12-2

overview of CLI commands 12-2

network fault tolerance 1-3, 17-22

network management

configuring 22-1

RMON 45-1

SNMP 43-1

Network Time Protocol

See NTP

New Software Features in Release 7.7

TDR 7-3

Next Hop Resolution Protocol

See NHRP

NFFC/NFFC II

IGMP snooping and 20-4

NHRP

support 1-8

non-IP traffic filtering 37-12

non-RPF traffic

description 27-9

in redundant configurations (figure) 27-10

Nonstop Forwarding

See NSF

nonvolatile random-access memory

See NVRAM

normal-range VLANs

See VLANs

NSF

defined 9-1

guidelines and restrictions 9-9

operation 9-5

NSF-aware

supervisor engines 9-3

support 9-2

NSF-capable

supervisor engines 9-3

support 9-2

NSF with SSO supervisor engine redundancy

and CEF 9-5

overview 9-4

SSO operation 9-4

NTP

associations

authenticating 4-4

defined 4-2

enabling broadcast messages 4-7

peer 4-6

server 4-6

default configuration 4-4

displaying the configuration 4-11

overview 4-2

restricting access

creating an access group 4-9

disabling NTP services per interface 4-10

source IP address, configuring 4-10

stratum 4-2

synchronizing devices 4-6

time

services 4-2

synchronizing 4-2

NVRAM

saving settings 3-10

O

OIR

overview 6-18

Online Diagnostics 46-1

online insertion and removal

See OIR

Open Shortest Path First

See OSPF

operating system images

See system images

OSPF

area concept 1-8

description 1-8

P

packets

modifying 30-16

software processed

and QoS 30-16

packet type filtering

overview 41-15

SPAN enhancement 41-15

PAgP

understanding 19-3

passwords

configuring enable password 3-14

configuring enable secret password 3-14

encrypting 3-22

in clusters 12-7

recovering lost enable password 3-24

setting line password 3-14

PBR (policy-based routing)

configuration (example) 28-5

enabling 28-3

features 28-2

overview 28-1

route maps 28-2

when to use 28-2

PeerResetReason environmental variable

tracking supervisor engine resets 49-2

per-port and VLAN Access Control List 35-11

per-port per-VLAN QoS

enabling 30-48

overview 30-16

Per-VLAN Rapid Spanning Tree 17-6

enabling 17-20

overview 17-6

PE to CE routing, configuring 29-6

PIM

configuring dense mode 27-14

configuring sparse mode 27-14

displaying information 27-15

displaying statistics 27-20

enabling sparse-dense mode 27-14, 27-15

overview 27-3

PIM-DM 27-3

PIM-SM 27-3

ping

executing 7-7

overview 7-7

ping command 7-7, 27-15

PoE 11-8

configuring power consumption for single device 11-5

configuring power consumption for switch 11-5

power consumption for powered devices

Intelligent Power Management 11-4

overview 11-4

supported cabling topology 11-6

powering down a module 10-17

power management modes 11-2

show interface status 11-7

point-to-point

in 802.1X authentication (figure) 32-2, 32-17

police command 30-37

policed-DSCP map 30-59

policers

description 30-5

types of 30-10

policies

See QoS policies

policing

See QoS policing

policy-map command 30-33, 30-36

policy maps

attaching to interfaces 30-40

configuring 30-35

port ACLs

and voice VLAN 37-4

defined 37-3

limitations 37-4

Port Aggregation Protocol

see PAgP

port-based authentication

802.1X with voice VLAN 32-19

changing the quiet period 32-44

client, defined 32-2

configuration guidelines 32-23

configure 802.1X accounting 32-32

configure switch-to-RADIUS server communication 32-26

configure with Authentication Failed VLAN assignment 32-39

configure with Critical Authentication 32-36

configure with Guest-VLANs 32-32, 32-41

configure with MAC Authentication Bypass 32-35

configure with Wake-on-LAN 32-38

configuring

Multiple Domain Authentication 32-28

configuring Guest-VLAN 32-26

configuring manual re-authentication of a client 32-47

controlling authorization state 32-4

default configuration 32-22

described 32-1

device roles 32-2

displaying statistics 32-48

enabling 32-23

enabling multiple hosts 32-43

enabling periodic re-authentication 32-42

encapsulation 32-3

host mode 32-6

initiation and message exchange 32-3

method lists 32-23

multidomain authentication 32-19

multiple-hosts mode, described 32-6

port security

multiple-hosts mode 32-7

ports not supported 32-4

resetting to default values 32-47

setting retransmission number 32-45

setting retransmission time 32-44

topologies, supported 32-21

using with port security 32-15

with Critical Authentication 32-12

with Guest VLANs 32-8

with MAC Authentication Bypass 32-9

with VLAN assignment 32-7

port-based QoS features

See QoS

port-channel interfaces

See also EtherChannel

creating 19-6

overview 19-2

port-channel load-balance

command 19-12

command example 19-12

port-channel load-balance command 19-12

port cost (STP)

configuring 17-15

PortFast

and MST 17-23

BPDU filter, configuring 18-8

configuring or enabling 18-15

overview 18-5

PortFast BPDU filtering

and MST 17-23

enabling 18-8

overview 18-8

port priority

configuring MST instances 17-33

configuring STP 17-13

ports

blocking 39-1

checking status 7-2

dynamic VLAN membership

example 13-26

reconfirming 13-23

forwarding, resuming 39-3

See also interfaces

port security

aging 33-5

and QoS trusted boundary 30-26

configuring 33-7

displaying 33-26

guidelines and restrictions 33-31

on access ports 33-6, 33-21

on private VLAN 33-13

host 33-14

over Layer 2 EtherChannel 33-31

promiscuous 33-15

topology 33-14, 33-17, 33-31

on trunk port 33-16

guidelines and restrictions 33-14, 33-17, 33-20, 33-31

port mode changes 33-21

on voice ports 33-21

RADIUS accounting 32-16

sticky learning 33-5

troubleshooting

common system error messages 49-35

verifying that an address is secure 49-34

using with 802.1X 32-15

violations 33-5

with 802.1X Authentication 33-30

with DHCP and IP Source Guard 33-30

with other features 33-31

port states

description 17-5

port trust state

See trust states

power

inline 31-5

power dc input command 10-14

power handling for Supervisor Engine II-TS 11-12

power inline command 11-3

power inline consumption command 11-5

power management

Catalyst 4500 series 10-3

Catalyst 4500 Series power supplies 10-9

Catalyst 4948 series 10-17

combined mode 10-5

configuring combined mode 10-8

configuring redundant mode 10-7

overview 10-1

redundancy 10-3

redundant mode 10-5

Power-On-Self-Test diagnostics 46-3, 46-13

Power-On-Self-Test for Supervisor Engine V-10GE 46-7

power redundancy-mode command 10-8

power supplies

fixed 10-4

variable 10-4, 10-17

primary VLANs 38-2, 38-4

associating with secondary VLANs 38-14

configuring as a PVLAN 38-13

priority

overriding CoS of incoming frames 31-4

private VLAN

configure port security 33-14

private VLANs

across multiple switches 38-5

and SVIs 38-9

benefits of 38-2

community ports 38-4

community VLANs 38-3, 38-4

default configuration 38-10

end station access to 38-3

isolated port 38-4

isolated VLANs 38-3, 38-4

monitoring 49-37

ports

community 38-4

isolated 38-4

promiscuous 38-5

primary VLANs 38-2, 38-4

promiscuous ports 38-5

secondary VLANs 38-3

subdomains 38-2

traffic in 38-8

troubleshooting

common system error messages 49-38

verifying that an address is secure 49-38

privileged EXEC mode 2-5

privileges

changing default 3-23

configuring levels 3-23

exiting 3-24

logging in 3-23

promiscuous ports

configuring PVLAN 38-15

defined 38-5

setting mode 38-21

protocol timers 17-4

provider edge devices 29-2

pruning, VTP

See VTP pruning

pseudobridges

description 17-25

PVACL 35-11

PVID (port VLAN ID)

and 802.1X with voice VLAN ports 32-19

PVLAN promiscuous trunk port

configuring 38-2, 38-15, 38-19

PVLANs

802.1q support 38-12

across multiple switches 38-5

configuration guidelines 38-10

configure port security 33-13, 33-15, 33-17

configure port security in a wireless setting 33-31

configure port security over Layer 2 EtherChannel 33-31

configuring 38-9

configuring a VLAN 38-13

configuring promiscuous ports 38-15

host ports

configuring a Layer 2 interface 38-16

setting 38-21

overview 38-1

permitting routing, example 38-20

promiscuous mode

setting 38-21

setting

interface mode 38-21

Q

QoS

allocating bandwidth 30-56

and software processed packets 30-16

auto-QoS

configuration and defaults display 30-20

configuration guidelines 30-19

described 30-17

displaying 30-20

effects on NVRAM configuration 30-19

enabling for VoIP 30-19

basic model 30-5

burst size 30-31

classification30-6to 30-10

configuration guidelines 30-25

auto-QoS 30-19

configuring

auto-QoS 30-17

DSCP maps 30-58

dynamic buffer limiting 30-27

traffic shaping 30-57

trusted boundary 30-26

VLAN-based 30-52

configuring UBRL 30-42

creating named aggregate policers 30-30

creating policing rules 30-32

default auto configuration 30-17

default configuration 30-23

definitions 30-3

disabling on interfaces 30-40

enabling and disabling 30-51

enabling on interfaces 30-40

enabling per-port per-VLAN 30-48

flowcharts 30-8, 30-12

IP phones

automatic classification and queueing 30-17

detection and trusted settings 30-17, 30-26

overview 30-1

overview of per-port per-VLAN 30-16

packet modification 30-16

port-based 30-52

priority 30-15

traffic shaping 30-16

transmit rate 30-57

trust states

trusted device 30-26

VLAN-based 30-52

See also COS; DSCP values; transmit queues

QoS active queue management

tracking queue length 30-14

QoS labels

definition 30-3

QoS mapping tables

CoS-to-DSCP 30-58

DSCP-to-CoS 30-60

policed-DSCP 30-59

types 30-14

QoS marking

description 30-5

QoS policers

burst size 30-31

types of 30-10

QoS policing

definition 30-5

described 30-5, 30-10

QoS policy

attaching to interfaces 30-11

overview of configuration 30-33

QoS transmit queues

allocating bandwidth 30-56

burst 30-16

configuring 30-55

configuring traffic shaping 30-57

mapping DHCP values to 30-55

maximum rate 30-16

overview 30-14

sharing link bandwidth 30-15

Quality of service

See QoS

queueing 30-5, 30-14

R

RADIUS server

configure to-Switch communication 32-26

configuring settings 32-28

parameters on the switch 32-26

range command 6-4

range macros

defining 6-5

ranges of interfaces

configuring 6-4

Rapid Spanning Tree

See RSTP

rcommand command 12-12

re-authentication of a client

configuring manual 32-47

enabling periodic 32-42

reduced MAC address 17-2

redundancy

configuring 8-7

guidelines and restrictions 8-5

changes made through SNMP 8-11

NSF-aware support 9-2

NSF-capable support 9-2

overview 8-2

redundancy command 8-7

understanding synchronization 8-4

redundancy (NSF) 9-1

configuring

BGP 9-11

CEF 9-11

EIGRP 9-16

IS-IS 9-14

OSPF 9-13

routing protocols 9-5

redundancy (RPR)

route processor redundancy 8-3

synchronization 8-5

redundancy (SSO)

redundancy command 9-10

route processor redundancy 8-3

synchronization 8-5

related documentation xxxii

reload command 3-28, 3-29

Remote Network Monitoring

See RMON

replication

description 27-8

reserved-range VLANs

See VLANs

reset command 50-3

resetting a switch to defaults 3-31

restricting access

NTP services 4-8

TACACS+ 3-15

retransmission number

setting in 802.1X authentication 32-45

retransmission time

changing in 802.1X authentication 32-44

RFC

1157, SNMPv1 43-2

1305, NTP 4-2

1757, RMON 45-2

1901, SNMPv2C 43-2

1902 to 1907, SNMPv2 43-2

2273-2275, SNMPv3 43-2

RIP

description 1-9

RMON

default configuration 45-3

displaying status 45-7

enabling alarms and events 45-4

groups supported 45-2

overview 45-1

ROM monitor

boot process and 3-25

CLI 2-7

commands50-2to 50-3

debug commands 50-5

entering 50-2

exiting 50-6

overview 50-1

root bridge

configuring 17-9

selecting in MST 17-22

root guard

and MST 17-23

enabling 18-2

overview 18-2

routed packets

ACLs 37-22

route-map (IP) command 28-3

route maps

defining 28-3

PBR 28-2

router ACLs

description 37-3

using with VLAN maps 37-21

route targets

VPN 29-3

Routing Information Protocol

See RIP

RSPAN

configuration guidelines 41-16

destination ports 41-5

IDS 41-2

monitored ports 41-4

monitoring ports 41-5

received traffic 41-3

sessions

creating 41-17

defined 41-3

limiting source traffic to specific VLANs 41-23

monitoring VLANs 41-22

removing source (monitored) ports 41-21

specifying monitored ports 41-17

source ports 41-4

transmitted traffic 41-4

VLAN-based 41-5

RSTP

compatibility 17-23

description 17-22

port roles 17-23

port states 17-24

S

SAID

See 802.10 SAID

scheduling 30-14

defined 30-5

overview 30-6

secondary root switch 17-12

secondary VLANs 38-3

associating with primary 38-14

permitting routing 38-20

security

configuring 34-1

Security Association Identifier

See 802.10 SAID

sequence numbers in log messages 42-8

servers, VTP

See VTP servers

service-policy command 30-33

service-policy input command 24-2, 30-40

service-provider networks

and customer VLANs 21-2

set default interface command 28-4

set interface command 28-4

set ip default next-hop command 28-4

set ip next-hop command 28-4

set-request operation 43-4

severity levels, defining in system messages 42-9

sharing adjacencies

troubleshooting 49-29

show adjacency command 26-9

show boot command 3-31

show catalyst4000 chassis-mac-address command 17-3

show cdp command 22-2, 22-3

show cdp entry command 22-4

show cdp interface command 22-3

show cdp neighbors command 22-4

show cdp traffic command 22-4

show ciscoview package command 4-34

show ciscoview version command 4-34

show cluster members command 12-12

show configuration command 6-10

show debugging command 22-4

show environment command 10-2

show history command 2-4

show interfaces command 6-15, 6-19, 6-21, 6-22

show interfaces status command 7-2

show ip cache flow aggregation destination-prefix command 44-12

show ip cache flow aggregation prefix command 44-12

show ip cache flow aggregation source-prefix command 44-12

show ip cache flow command 44-9

show ip cef command 26-8

show ip eigrp interfaces command 25-14

show ip eigrp neighbors command 25-14

show ip eigrp topology command 25-14

show ip eigrp traffic command 25-14

show ip interface command 27-15

show ip local policy command 28-5

show ip mroute command 27-15

show ip pim interface command 27-15

show l2protocol command 21-12

show mac-address-table address command 7-3

show mac-address-table interface command 7-3

show mls entry command 26-8

show module command 7-1, 17-5

show PoE consumed 11-8

show power inline command 11-7

show power inline consumption command 11-5

show power supplies command 10-8

show protocols command 6-19

show running-config command

adding description for an interface 6-10

checking your settings 3-9

displaying ACLs 37-15, 37-17, 37-24, 37-25

show startup-config command 3-10

show users command 7-6

show version command 3-28, 3-29

shutdown, command 6-20

shutdown threshold for Layer 2 protocol packets 21-9

shutting down

interfaces 6-20

Simple Network Management Protocol

See SNMP

single spanning tree

See SST

slot numbers, description 6-2

Smartports macros

applying global parameter values 16-8

applying macros 16-8

applying parameter values 16-8

configuration guidelines 16-6

configuring 16-2

creating 16-7

default configuration 16-3

defined 16-1

displaying 16-13

tracing 16-6

website 16-2

SNMP

accessing MIB variables with 43-4

agent

described 43-4

disabling 43-7

authentication level 43-10

community strings

configuring 43-7

overview 43-4

configuration examples 43-16

configuration guidelines 43-6

default configuration 43-6

enabling 48-16

engine ID 43-6

groups 43-6, 43-9

host 43-6

informs

and trap keyword 43-11

described 43-5

differences from traps 43-5

enabling 43-14

limiting access by TFTP servers 43-15

limiting system log messages to NMS 42-10

manager functions 43-3

notifications 43-5

overview 43-1, 43-4

status, displaying 43-17

system contact and location 43-15

trap manager, configuring 43-13

traps

described 43-3, 43-5

differences from informs 43-5

enabling 43-11

enabling MAC address notification 4-22

enabling MAC move notification 4-24

enabling MAC threshold notification 4-26

overview 43-1, 43-4

types of 43-11

users 43-6, 43-9

versions supported 43-2

SNMP commands 48-16

SNMPv1 43-2

SNMPv2C 43-2

SNMPv3 43-2

software

upgrading 8-13

software configuration register 3-26

software switching

description 26-5

interfaces 26-6

key data structures used 27-7

SPAN

and ACLs 41-5

configuration guidelines 41-7

configuring41-6to 41-10

destination ports 41-5

IDS 41-2

monitored port, defined 41-4

monitoring port, defined 41-5

received traffic 41-3

sessions

defined 41-3

source ports 41-4

transmitted traffic 41-4

VLAN-based 41-5

SPAN and RSPAN

concepts and terminology 41-3

default configuration 41-6

displaying status 41-25

overview 41-1

session limits 41-6

SPAN enhancements

access list filtering 41-13

configuration example 41-15

CPU port sniffing 41-10

encapsulation configuration 41-12

ingress packets 41-12

packet type filtering 41-15

spanning-tree backbonefast command 18-15

spanning-tree cost command 17-15

spanning-tree guard root command 18-2

spanning-tree portfast bpdu-guard command 18-7

spanning-tree portfast command 18-6

spanning-tree port-priority command 17-13

spanning-tree uplinkfast command 18-11

spanning-tree vlan

command 17-9

command example 17-9

spanning-tree vlan command 17-8

spanning-tree vlan cost command 17-15

spanning-tree vlan forward-time command 17-19

spanning-tree vlan hello-time command 17-17

spanning-tree vlan max-age command 17-18

spanning-tree vlan port-priority command 17-13

spanning-tree vlan priority command 17-17

spanning-tree vlan root primary command 17-10

spanning-tree vlan root secondary command 17-12

speed

configuring interface 6-8

speed command 6-8

SSO

configuring 9-10

SSO operation 9-4

SST

description 17-22

interoperability 17-24

stack changes, effects on

system message log 42-2

stacks, switch

system messages

hostnames in the display 42-1

remotely monitoring 42-2

static addresses

See addresses

static routes

configuring 3-11

verifying 3-12

statistics

displaying 802.1X 32-48

displaying PIM 27-20

NetFlow accounting 44-9

SNMP input and output 43-17

sticky learning

configuration file 33-5

defined 33-5

disabling 33-5

enabling 33-5

saving addresses 33-5

sticky MAC addresses

configuring 33-7

defined 33-4

Storm Control

disabling 40-4

displaying 40-5

enabling 40-3

hardware-based, implementing 40-2

overview 40-1

STP

bridge ID 17-2

configuring17-7to 17-20

creating topology 17-4

defaults 17-6

disabling 17-19

enabling 17-7

enabling extended system ID 17-8

enabling Per-VLAN Rapid Spanning Tree 17-20

forward-delay time 17-18

hello time 17-17

Layer 2 protocol tunneling 21-7

maximum aging time 17-18

overview 17-1, 17-3

per-VLAN rapid spanning tree 17-6

port cost 17-15

port priority 17-13

root bridge 17-9

stratum, NTP 4-2

stub routing (EIGRP)

benefits 25-12

configuration examples 25-14

configuration tasks 25-13

configuring 25-9

monitoring and maintaining 25-13

overview 25-8, 25-9

restrictions 25-12

verifying 25-13

subdomains, private VLAN 38-2

summer time 4-13

supervisor engine

accessing the redundant 8-14

configuring3-8to 3-13

copying files to standby 8-14

default configuration 3-1

default gateways 3-11

environmental monitoring 10-1

redundancy 9-1

ROM monitor 3-25

startup configuration 3-25

static routes 3-11

synchronizing configurations 8-11

Supervisor Engine II-TS

insufficient inline power handling 10-15, 11-12

SVI Autostate Exclude

troubleshooting 49-39

SVI Autostate exclude

configuring 25-5

SVIs

and router ACLs 37-3

switched packets

and ACLs 37-21

Switched Port Analyzer

See SPAN

switching, NetFlow

checking for required hardware 44-6

configuration (example) 44-13

configuring switched IP flows 44-8

enabling Collection 44-7

exporting cache entries 44-9

switchport

show interfaces 6-15, 6-21, 6-22

switchport access vlan command 15-6, 15-8

switchport block multicast command 39-2

switchport block unicast command 39-2

switchport mode access command 15-8

switchport mode dot1q-tunnel command 21-6

switchport mode dynamic command 15-6

switchport mode trunk command 15-6

switch ports

See access ports

switchport trunk allowed vlan command 15-6

switchport trunk encapsulation command 15-6

switchport trunk encapsulation dot1q command 15-3

switchport trunk encapsulation isl command 15-3

switchport trunk encapsulation negotiate command 15-3

switchport trunk native vlan command 15-6

switchport trunk pruning vlan command 15-6

switch-to-RADIUS server communication

configuring 32-26

syslog

See system message logging

syslog messages 10-2

sysret command 50-5

system

reviewing configuration 3-10

settings at startup 3-27

system clock

configuring

daylight saving time 4-13

manually 4-11

summer time 4-13

time zones 4-12

displaying the time and date 4-12

overview 4-2

See also NTP

system images

loading from Flash memory 3-30

modifying boot field 3-27

specifying 3-29

system message logging

default configuration 42-4

defining error message severity levels 42-9

disabling 42-5

displaying the configuration 42-13

enabling 42-5

facility keywords, described 42-13

level keywords, described 42-10

limiting messages 42-10

message format 42-2

overview 42-1

sequence numbers, enabling and disabling 42-8

setting the display destination device 42-5

stack changes, effects of 42-2

synchronizing log messages 42-6

timestamps, enabling and disabling 42-8

UNIX syslog servers

configuring the daemon 42-11

configuring the logging facility 42-12

facilities supported 42-13

system MTU

802.1Q tunneling 21-5

maximums 21-5

system name

default configuration 4-15

default setting 4-15

manual configuration 4-15

See also DNS

system prompt, default setting 4-14, 4-15

T

TACACS+ 34-1

accounting, defined 3-16

authentication, defined 3-16

authorization, defined 3-16

configuring

accounting 3-21

authentication key 3-18

authorization 3-21

login authentication 3-19

default configuration 3-18

displaying the configuration 3-22

identifying the server 3-18

limiting the services to the user 3-21

operation of 3-17

overview 3-15

tracking services accessed by user 3-21

tagged packets

802.1Q 21-3

Layer 2 protocol 21-7

TCAM programming and ACLs 37-6, 37-8

TCAMs, troubleshooting 49-41

TDR

checking cable connectivity 7-3

enabling and disabling test 7-3

guidelines 7-3

Telnet

accessing CLI 2-2

disconnecting user sessions 7-6

executing 7-5

monitoring user sessions 7-6

telnet command 7-5

Terminal Access Controller Access Control System Plus

See TACACS+

TFTP

configuration files in base directory 3-5

configuring for autoconfiguration 3-4

limiting access by servers 43-15

TFTP download

See also console download

time

See NTP and system clock

Time Domain Reflectometer

See TDR

time exceeded messages 7-8

timer

See login timer

timestamps in log messages 42-8

time zones 4-12

Token Ring

media not supported (note) 13-4, 13-10

TOS

description 30-4

trace command 7-9

traceroute

See IP traceroute

See Layer 2 Traceroute

traceroute mac command 7-10

traceroute mac ip command 7-10

traffic

blocking flooded 39-2

traffic control

using ACLs (figure) 37-4

using VLAN maps (figure) 37-5

traffic shaping 30-16

translational bridge numbers (defaults) 13-4

transmit queues

See QoS transmit queues

transmit rate 30-57

traps

configuring MAC address notification 4-22

configuring MAC move notification 4-24

configuring MAC threshold notification 4-26

configuring managers 43-11

defined 43-3

enabling 4-22, 4-24, 4-26, 43-11

notification types 43-11

overview 43-1, 43-4

troublehsooting

ISSU 49-10

troubleshootiing

port security 49-34

troubleshooting

ACLs 49-4

high CPU 49-3

identifying CPU hogs 49-1

IP multicast

overview 49-17

PIM and IGMP protocols 49-17

topology and configuration 49-18

IP unicast 49-27

sharing adjacencies 49-29

verifying a router's MAC address 49-33

PVLANs 49-37

SVI Autostate Exclude 49-39

TCAMs 49-41

ACL optimization 49-7

Layer 4 operators 49-8

static 49-9

structure of the input and output CAMs 49-6

tracking supervisor resets through PeerResetReason variable 49-2

with CiscoWorks 43-4

with system message logging 42-1

with traceroute 7-8

trunk ports

configure port security 33-16

configuring PVLAN38-17to 38-18

trunks

802.1Q restrictions 15-5

configuring 15-6

configuring access VLANs 15-6

configuring allowed VLANs 15-6

default interface configuration 15-6

different VTP domains 15-3

enabling to non-DTP device 15-4

encapsulation 15-3

specifying native VLAN 15-6

understanding 15-3

trusted boundary for QoS 30-26

trust states

configuring 30-53

tunneling

defined 21-1

tunnel ports

802.1Q, configuring 21-6

described 21-2

incompatibilities with other features 21-5

type of service

See TOS

U

UDLD

default configuration 23-2

disabling 23-3

enabling 23-3

overview 23-1

unauthorized ports with 802.1X 32-4

unicast

See IP unicast

unicast flood blocking

configuring 39-1

unicast MAC address filtering

and adding static addresses 4-29

and broadcast MAC addresses 4-28

and CPU packets 4-28

and multicast addresses 4-28

and router MAC addresses 4-28

configuration guidelines 4-28

described 4-28

unicast traffic

blocking 39-2

unidirectional ethernet

enabling 24-2

example of setting 24-2

overview 24-1

UniDirectional Link Detection Protocol

See UDLD

UNIX syslog servers

daemon configuration 42-11

facilities supported 42-13

message logging configuration 42-12

UplinkFast

and MST 17-23

enabling 18-15

MST and 17-23

overview 18-10

User Based Rate Limiting

configuring 30-43

overview 30-42

user EXEC mode 2-5

user sessions

disconnecting 7-6

monitoring 7-6

V

VACLs

Layer 4 port operations 37-9

virtual configuration register 50-3

virtual LANs

See VLANs

Virtual Private Network

See VPN

VLAN ACLs

See VLAN maps

vlan command 13-6, 13-7

vlan database command 13-7

vlan dot1q tag native command 21-4

VLAN ID, discovering 4-30

VLAN Management Policy Server

See VMPS

VLAN maps

applying 37-17, 37-25

common uses for 37-18

configuration example 37-18

configuration guidelines 37-14

configuring 37-13

creating entries 37-15

defined 37-3

denying access example 37-19

denying packets 37-15

displaying 37-20

examples 37-19

order of entries 37-14

permitting packets 37-15

router ACLs and 37-21

using (figure) 37-5

VLANs

allowed on trunk 15-6

configuration guidelines 13-3

configuring 13-4

customer numbering in service-provider networks 21-3

default configuration 13-4

description 1-5

extended range 13-3

IDs (default) 13-4

interface assignment 13-8

limiting source traffic with RSPAN 41-23

monitoring with RSPAN 41-22

name (default) 13-4

normal range 13-3

overview 13-1

reserved range 13-3

See also PVLANs

VLAN Trunking Protocol

See VTP

VLAN trunks

overview 15-3

VMPS

configuration file example 13-29

configuring dynamic access ports on client 13-22

configuring retry interval 13-24

database configuration file 13-29

dynamic port membership

example 13-26

reconfirming 13-23

reconfirming assignments 13-23

reconfirming membership interval 13-23

server overview 13-17

VMPS client

administering and monitoring 13-24

configure switch

configure reconfirmation interval 13-23

dynamic ports 13-22

entering IP VMPS address 13-21

reconfirmation interval 13-24

reconfirm VLAM membership 13-23

default configuration 13-21

dynamic VLAN membership overview 13-20

troubleshooting dynamic port VLAN membership 13-25

VMPS server

fall-back VLAN 13-19

illegal VMPS client requests 13-20

overview 13-17

security modes

multiple 13-19

open 13-18

secure 13-19

voice interfaces

configuring 31-1

Voice over IP

configuring 31-1

voice ports

configuring VVID 31-3

voice traffic 11-2, 31-5

voice VLAN

IP phone data traffic, described 31-2

IP phone voice traffic, described 31-2

voice VLAN ports

using 802.1X 32-19

VPN

configuring routing in 29-5

forwarding 29-3

in service provider networks 29-1

routes 29-2

routing and forwarding table

See VRF

VRF

defining 29-3

tables 29-1

VTP

configuration guidelines 13-12

configuring13-13to 13-17

configuring transparent mode 13-16

default configuration 13-12

disabling 13-16

Layer 2 protocol tunneling 21-7

monitoring 13-16

overview 13-8

See also VTP version 2

VTP advertisements

description 13-9

VTP clients

configuring 13-15

VTP domains

description 13-9

VTP modes 13-9

VTP pruning

enabling 13-13

overview 13-10

VTP servers

configuring 13-14

VTP statistics

displaying 13-16

VTP version 2

enabling 13-14

overview 13-10

See also VTP

VTY and Network Assistant 12-11

VVID (voice VLAN ID)

and 802.1X authentication 32-19

configuring 31-3

W

Wake-on-LAN

configure with 802.1X 32-38

WCCP

configuration examples 47-8

configuring on a router 47-2, 47-10

features 47-4

restrictions 47-5

service groups 47-6

Web Cache Communication Protocol

See WCCP xxxi, 47-1

web caches

See cache engines

web cache services

description 47-4

web caching

See web cache services

See also WCCP

web scaling 47-1